How do Security Products protect them self

Discussion in 'other anti-malware software' started by Ranget, Apr 15, 2012.

Thread Status:
Not open for further replies.
  1. trismegistos

    trismegistos Registered Member

    Joined:
    Jan 29, 2009
    Posts:
    363
    That would be your common drive by malware pushed by exploits. I agree that AVs would mostly be bypassed if they don't have the signature for that malware and it escaped heuristic detection. But as for HIPS/SRP/AE/Applocker, our guru, Rmus has elucidated, that these droppers are executables, so it won't execute under those. HIPS/AE/Applocker can also prevent dll loading and therefore stop most dll injections. HIPS in addition can also be configured to be prompted for any driver loading. As I said earlier, once kernel drivers are loaded, which is what rootkits do, it's definitely game over. It can just unhook the AVs, the AV will still be up and running and won't even notice the unhooking but it's definitely useless after that. But generally, malware do code injections into trusted processes to evade detections from Avs. I am not yet aware of a malware trojanising the AV but it's quite possible. But if your firewall can catch any outbound connection and can untrust the AV, a user can have such suspicion.

    The big problem for Anti-execution security layer is social engineering. The hacker can just obfuscate his malware into something a victim would likely execute or click. [HIPS can probably catch suspicious behaviours like dll injections, driver loading, keystroke logging, etc.] The hacker also can use exploit to do the job. For e.g, the Duqu malware was pushed by a zero day kernel exploit after opening a seemingly innocuous Word document. They said all security layers are bypassable by any kernel exploit but Faronics claimed they can still catch the main dll of that malware from executing, which I doubt.
     
    Last edited: Apr 22, 2012
  2. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    interesting thread/topic :) .....just to input info on how Dr. protect itself:

    Dr.Web is immune to any attempts by malicious programs to disrupt its operation. Dr.Web SelfPROtect is the unique anti-virus component that maintains the anti-virus’ security.

    * Dr.Web SelfPROtect is implemented as a driver that operates on the lowest system level. The driver can’t be stopped or unloaded without a system reboot.
    * Dr.Web SelfPROtect restricts access to a network, files and folders, certain branches of the Windows Registry and removable data-storage devices on the system driver level and protects the software from anti-antiviruses aiming to disrupt the operation of Dr.Web.
    * Some anti-viruses modify the Windows kernel through intercepting interrupts, changing vector tables or using other undocumented features. This may have a negative impact on the stability of a system and pave new ways for malicious programs to get into a system. At the same time, Dr.Web SelfPROtect maintains security of the anti-virus and doesn’t interfere with routines of the Windows kernel.
    * New! Automatic restoring of anti-virus modules
     
  3. Ranget

    Ranget Registered Member

    Joined:
    Mar 24, 2011
    Posts:
    846
    Location:
    Not Really Sure :/
    wouldn't hurt to try Drweb protection :D
    i will report back later

    BTW extremely helpful Post trismegistos's
     
  4. DX2

    DX2 Guest

    I know WSA is password protected to stop services or uninstall.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.