Secure Folders to protect folders (and use as anti-executable)

Discussion in 'other anti-malware software' started by Windows_Security, Oct 21, 2014.

  1. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    You're welcome and thanks for your explanation on how Secure Folders works, yet my other questions aren't answered:

    I locked a whole USB drive with X:\ letter.
    1. I'm wondering if a malware, specially cryptomalware, could be able to change drive letter to have access to it? In case it has the power/ability to run despite any security measure.
    2. If so, could that malware make use of diskmgmt.msc to attempt to change the letter?
    3. Is it possible for malware to accomplish that by any means other than diskmgmt.msc?
    4. If so, those other means can circumvent Secure Folders protection?
     
  2. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
  3. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    Yes. Anyway I added C:\Windows\System32\diskpart.exe to Vulnerable Processes in ERP. Thanks a lot.

    Any other means to change drive letter? :D
     
  4. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    Added to Vulnerable Processes too, thanks a lot.
     
  5. Buddel

    Buddel Registered Member

    Joined:
    Apr 28, 2015
    Posts:
    1,944
    Mister X, you seem to appreciate Secure Folders as much as I do. Thank you very much for your investigative questions, most/all of which have not been answered yet. Maybe some program guy will drop by who continues where the Secure Folders guy stopped a year or so ago.
     
  6. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    Both added. I also use SF whole drive proection on backup drives in the hope this will protect against possible ransomware encryption. Also thanks for the investigative questions @Mister X. And solutions @Dzp5t !
    No source code so he will have to start from the ground up. But Kees's post #226 is enlightening in this regard.
     
  7. @Dzp5t great answers, you need to have UAC on full though (on default UAC allows windows binaries).

    @Mister X @paulderdash Note that I said seems to work (my guess is based on grey box testing, not on reverse code engenering).

    Telling to ease up NVT on Wilders is like "calling names in a church", but setting up NVT that it auto allows on Windows & Program Files and auto allows trusted vendors in user folders wil make NVT+SecureFolders a quiet no pop-up solution.
     
  8. When using SecureFolders with another Anti-Executable or Software Restriction Policy
    - run Office apps in a limited user sandbox (no-execution)
    - protect personal folders/data partition (read-only)

    upload_2016-1-30_12-16-50.png

    Allow Windows Explorer and Office Applications access

    upload_2016-1-30_12-19-44.png
     
  9. Yes you are right
     
  10. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
  11. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    Thanks! Someone qualified could check it out? Please @anyone? And open a new thread.
     
  12. hjlbx

    hjlbx Guest

    @Mister X

    Secure Folders not same as SubiSoft Secure Folder; you will not want it.
     
  13. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    Yes I was skimming on that website and don't like it, it seems to have a lot of features I don't need.
     
  14. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    If there is a rootkit element to the malware, the answer is yes.

    You can use the old Comodo Leak Test(CLT) to test with. Test no. 4 of the rootkit series of tests is titled "ChangeDrvPath." Almost everyone fails that test.
     
  15. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    Thanks for your reply.
    Yes it failed. But is this test related to my question about malware changing the drive letter (not driver path)? Look:
     
  16. hjlbx

    hjlbx Guest

    I would think the drive letter is integral to its path within the Windows file system, but, of course, things IT are not always based on common sense... LOL.
     
  17. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    To me, the result is one and the same. However, using a rootkit to change the path via a driver is much more effective since the activity would be completely hidden. Also this technique defeats most conventional security products.
     
  18. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    So if I have drive X:\ protected by Secure Folders or any other security product then a very clever cryptomalware detects X:\ as a protected drive then it could change the letter to any other and encrypt my files. This is absolutely nasty and scary.
     
  19. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  20. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    Alright, I can see there could be many ways to circumvent already in-place Windows mechanisms (diskpart and diskmgmt.msc) to change them. But, malware should be able to install its own mechanisms to achieve changing of drive path/letters then I think ERP should be able to stop that.
     
  21. Djigi

    Djigi Registered Member

    Joined:
    Aug 13, 2012
    Posts:
    554
    Location:
    Croatia
    I read all 10 pages about this software.
    I have tested in Win 7 and Win 10 and it protect very good against Ransomware.
    Last test I made is vs Locky and SF did good.
    If You want I could make a video test about that.
     

    Attached Files:

    • 1.jpg
      1.jpg
      File size:
      81.5 KB
      Views:
      66
    • 2.png
      2.png
      File size:
      495.8 KB
      Views:
      60
    Last edited: Feb 25, 2016
  22. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    I have felt all along that it was plenty good enough for such bad malware but not actually tested it yet to be certain.

    Thanks for sharing your own results but when you say "SF did good" are you confirming it 100% stopped it cold?

    Thanks Again

    Regards, EASTER
     
  23. Djigi

    Djigi Registered Member

    Joined:
    Aug 13, 2012
    Posts:
    554
    Location:
    Croatia
    I'm not sure that understand what you are saying, sorry?
     
  24. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    It would be so nice if you could make it, please.
     
  25. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    For the love of God, who is willing to take over this software or create a very close to similar one with the same power and don't abandon it. Sometimes I wish I was a developer, sigh. Not enough grey matter up there ... :D
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.