Research: 80% of Carberp infected computers had antivirus software installed

Discussion in 'other anti-virus software' started by King Grub, Jul 28, 2012.

Thread Status:
Not open for further replies.
  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    There is a paradox in this statement.

    First hueristics use algorithms to determine behavior. If the AV hasn't been updated, neither have the hueristic algorithms. So in this situation, your as vulnerable to new threats as you are with using outdated signatures.

    Then there is the issue of hueristic analysis overall. Scans are being performed for a predetermined period of time. The shorter the scan, the less likely the malware will be discovered but the lesser impact on system performance. The "low", "medium", and "high" settings for hueristics scanning used by AVs equates to the amount of time the object in question is being scanned.

    -Edit- Think of the duck analogy; if it looks, smells, and walks like a duck, it has to be a duck. If it looks like a duck, probability that it isn't malware is low. If it looks and smells like a duck, probability it isn't malware is 50/50 i.e. medium. If it looks, smells, and walks like a duck, probability is high that it isn't malware. Is it duck? Could be a small gooseo_O

    Behavior analysis i.e. host intrusion prevention system(HIPS) is much more effective in detecting new malware because it is watching access to protected areas in your system. If an unknown process is accessing protected system and user areas in your system, there is a high likelihood that the process is malware.

    Sandboxing is a form of HIPS in that the unknown process is isolated and it's privledges reduced so that it cannot access critical areas. Edit - sandboxing is not foolproof. Malware have in the past "jumped" sandboxes and infected systems.
     
    Last edited: Aug 1, 2012
  2. Escalader

    Escalader Registered Member

    Joined:
    Dec 12, 2005
    Posts:
    3,710
    Location:
    Land of the Mooses
    Hi:

    No such thing as a DA question only DA answers:

    1) WSA? Don't know ask WSA vendor if it would have "held"
    2) EMET (latest version of course!) might very well have blocked Carberp "IF" it attempted to use one of the baddies EMET blocks.

    EMET 3.0 has blocked a "bad" unsigned Outlook component for me once.
     
  3. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    I see no paradox.
     
  4. roger_m

    roger_m Registered Member

    Joined:
    Jan 25, 2009
    Posts:
    8,629
    Are you sure about? I have not done any recent reading on the subject, so things may well have changed. However going back a number of years the heuristic scan reamained the same no matter what level of heursitics you chose. There would be a number of factors which could indicate that a file was suspicious. In order to reduce false posatives there have to be several suspicious factors found before a file was flagged as being a potential threat by the antivirus. The number of suspicious factors found before alerting the user would be decreased with a high heuristic setting (greater chance by finding suspicious files - but more false posatives), and reduced with a low setting.
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Depending on the security app used, the process will be isolated and it's behavior observed. High hueristics will cause more tests to be performed hence the longer scan times and the higher likelihood of a false positive i.e. that process is safe but is flagged as malware. False positives are caused by faulty scanning algorithms hence the heavy penalty assessed by the AV test labs. Note however the likelihood that high hueristics will find malware is also highest.

    In my opinion hueristic is a classic example of "what is the greatest evil."
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.