Of course, but how many encounter these with safe surfing habits, etc.?There are zero click malware like those NSO and iSoon make.
Of course, but how many encounter these with safe surfing habits, etc.?There are zero click malware like those NSO and iSoon make.
Zero, these zero-click exploits are not designed for you, me and the MalwareTips audience, they are expensive, take whole teams working for prolonged period of times to develop and are used where they should be. This is, where the exfiltrated information will have the necessary value. Usually, in state-sponsored attacks against businesses and famous persons. It is pointless to even add these into the mix, they are not relevant.Of course, but how many encounter these with safe surfing habits, etc.?
You are literally stating what @cruelsister shows in the video... that "Windows by default is focused on 'usability' [and is insecure]."the video in this thread is totally fake, it's not showing any Windows security issue. Windows by default is focused on "usability".
There is no manipulation in the video "by omission." If every POC, pentest demo, or video creator had to "inform the viewer" of all the technical infos, of all the exceptions to what they are showing - then nobody in the industry would do the work. The video is in a format that is standard industry practice. Besides, the video is targeted to an audience that understands what is being shown. If they do not understand, then it is on them to put in the effort to figure it all out.The main manipulation of the video in this thread (and several comments), comes from omitting this fact, not informing the reader that it is 100% possible to configure Windows so that both Windows Defender and Firewall cannot be disabled.
Really? Please provide a few links to evidence that corroborate this statement. What you need to provide is documented proof that a single pentester executed a malware, and that malware was able to manipulate, tamper with, and hijack "a safe Windows process" outside of containment to establish comms.And in real life, it's possible to find thousand of cases where virus/malware hijacked all these "safe files" allowed by Comodo, and managed to have comms.
Because it can be configured to generate outbound connection alerts.Why would I use a 3rd party firewall in this case?
Didn't you just say "Windows by default is insecure because it is configured for usability"? Yeah. You did say that. Not exactly in those words but you did say it multiple times. So not only are you saying default Windows is insecure, that the insecure Windows defaults are the right configuration for average users.For average users, Windows Defender + Firewall default settings are part of that right equation.
It is just a demo video. Nothing more. Nothing less. It is representative of something that is regularly seen at BlackHat, DefCon, Wild West Hackin' Fest, or even a local BSides meeting.Indeed, nefarious actors can do anything once they have access to Windows OS, but that is dependent on the user, e.g clicking malicious links, etc. So for all intent and purposes this "critique" is simply video clickbait. Entertaining? Enlightening? Maybe. Stay safe, not paranoid. Word.
Exactly the unspoken point made in the video so whether you realize it or not, you are agreeing with @cruelsister . That it is so insecure by default is all the more reason that people are better served by using any of a number of security solutions with Comodo being just one of them.Readers should take care,
Windows is not focused on security.
I think in the case of Emsisoft, it hardens and controls the Windows Firewall -- it is in some sense the 3d-party firewall.Thanks for the test, but I have one point to share. The video clearly recommends using a 3rd party firewall. Why? Some products claim that they can protect WF from being tampered with (such as Emsisoft). Why would I use a 3rd party firewall in this case?
Emsisoft said they harden WF with their BB. Trend Micro has WF Booster. F-Secure too relies on WF and I believe their BB protects WF.I think in the case of Emsisoft, it hardens and controls the Windows Firewall -- it is in some sense the 3d-party firewall.
PS ZoneAlarm firewall only works with MS Defender and info I read says it not compatible with 3d-party AV.
If one resides in nations such as Egypt or Iran, it is within the realm of possibility as those governments heavily surveille their own citizens. The only thing keeping those programs limited to the usual targeting of activists, dissidents, and perceived political enemies are the lack of personnel and resources. Otherwise something like half of all nations would stick agents in their citizens' underwear.Of course, but how many encounter these with safe surfing habits, etc.?
If one resides in nations such as Egypt or Iran, it is within the realm of possibility as those governments heavily surveille their own citizens. The only thing keeping those programs limited to the usual targeting of activists, dissidents, and perceived political enemies are the lack of personnel and resources. Otherwise something like half of all nations would stick agents in their citizens' underwear.
But you are correct for the typical netizen.
The main assumption in this thread is the ability to run malware with high privileges. It is true that under this assumption, one can dismantle Windows Firewall, but also any software Firewall, AV drivers, and services. There are well-known methods to do it.
Enough said. Bravo!Generally, all Firewalls (in reasonable settings) from home AVs are insufficient to protect users against info stealers. Even the Comodo Firewall is insufficient without applying auto containment, and such a setup is very similar to the protection based on the file reputation where the untrusted files are simply blocked. The main protection here is file reputation (or file whitelisting) and not the Firewall.
No, not at all. FirewallHardening will indeed add a bunch of Rules for various things (probably one of the best would be a block on PowerShell Outbound requests). However, as in the video, if WF is disabled FIRST it does not matter what rules are in place (oh, and WFH does not include a rule for this malware).
AppGuard can block the particular malware from the video. However, it can be bypassed on the default settings when using shortcuts and scripting methods. You must restrict popular LOLBins for more protection.slightly off topic: "untrusted files are simply blocked." I'm running AppGuard 6.7 again, this time successfully -- just needed to get comfortable with it. As Shadowra mentioned in recent video test, blocks everything (paraphrase) but whatever should be running is running -- fwiw my current experience.
A common failing of tests like this.The test was done without the first infection stage (malware delivery).
thanks! & you have a very good app for that.AppGuard can block the particular malware from the video. However, it can be bypassed on the default settings when using shortcuts and scripting methods. You must restrict popular LOLBins for more protection.![]()
In India and SE Asia, infections from USB flash drive sharing is rampant.A common failing of tests like this.