Latest On-Line Banking Test

Discussion in 'other anti-virus software' started by itman, Feb 19, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    https://avlab.pl/sites/default/files/68files/protection_epayment.pdf

    In the test, AVLab experts used scripts written in the Python programming language, the system command interpreter, PowerShell and widely available tools for Linux system. All “harmful” scripts, which checked the tested solutions protection, weren’t detectable by antivirus signatures, so reader can consider that samples used in the test were completely undetectable for antivirus applications.

    Glad to see that Eset was the only vendor to pass the man-in-the-middle test although it needs work against clipboard based attacks:

    ESET Smart Security, for effective protection against the ARP tables infection. Software from Slovak developer, as the only one, effectively protects sensitive user data in the protection test against man-in-the-middle attacks, for which ESET company deserves a recommendation from AVLab experts.

    Also appears this was a test using "synthetic" malware. Again, further proof that this concept is getting totally out of control.
     
    Last edited by a moderator: Feb 19, 2017
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    From conclusions:
     
  3. guest

    guest Guest

    So a Polish product wins a Polish test
     
  4. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    I had the same thoughts although there were a few comments over at malwaretips.com that the product actually does have excellent on-line banking protection.
     
  5. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    I'm not sure what to think about this test. It makes more sense to test these apps against banking trojans, not against simulators. On the other hand, sometimes these simulators lead to improvements.

    But anyway, most of the tests should be tackled by blocking access to memory of the browser process. This means malware shouldn't be able to inject code and read memory. Blocking malware from monitoring the clipboard and screen is also quite easy to achieve.
     
  6. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Does nothing if the site is compromised. Doesn't test the real problem, the human
     
  7. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    I can't speak for the validity of the "synthetic" malware used. But employing Python was a good choice since it is used by a lot of financial malware:

    Refs:
    https://www.anomali.com/blog/crushing-python-malware
    http://www.bluekaizen.org/writing-your-own-malware/
     
  8. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Well, the second one is rather interesting:
    I wonder what it would take for it to be detected. How long that would take. Anyone have an ELI5 for that?

    More generally, I'd like to have "synthetic malware" that 1) most AV apps recognized, but as new, so they would (if permitted) upload for analysis. That would be very useful in testing how securable AVs are against exfiltration.

    Anyone know of such a thing?
     
  9. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  10. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
  11. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    This is the AV Lab Cylance created as a response to negative results it has received from AV Labs employing established standard AMTSO methodology and samples.

    I would be cautious of any samples downloaded from the site. I strongly suspect they have been altered to favor Cylance's detection methods which are more slanted toward pentetration exploits of vulnerabilities rather than documented real malware methods. Additionally since Cylance is directed to the enterprise market, many to these exploits will be for example, directed to corp. network vulnerabilities, etc. that would not be applicable to a home user.
     
  12. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Yes, I saw the criticism:

    https://www.mrg-effitas.com/testmyav-an-independent-next-gen-testing-vendor/
    http://d-4digital.com/msp-launches-av-testing-website-to-stamp-out-misleading-reports/

    I'm just looking for stuff that will reliably trigger uploads to AhnLab's Smart Defense, Emsisoft's Anti-Malware Network, ESET's LiveGrid, Microsoft's Customer Experience Improvement Program, AVIRA's Protection Cloud, etc, etc. So it would have to be new, not in their databases, but related enough to known malware that it would always get detected. And also, have no real payload :)
     
  13. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    CIA sponsored and distributed U.S. taxpayer dollars at-work.
     
  14. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Now that, I didn't see ;)
     
  15. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    You'll have a problem on this regard. Most if not all AV behavior analysis will examine a process for malicious like behavior before triggering a reputation scan and alerting. Win 10's SmartScreen on the other hand is for the most part is all reputation based.
     
  16. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    Cylance receives or did receive CIA funding. Research it.
     
  17. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    are you saying this means Cylance has a back door built it or their control center spies on it's customers?
     
  18. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    I was looking at testmyav the other day. maybe I will give it another look.
     
  19. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    I didn't say nor imply that. I'm just pointing out that it does or has received funding from the CIA.

    For the hardcore privacy types that @mirimir is writing an article, this fact will drive them bonkers - even if it's all absolutely harmless. Conspiracy theories run riot... but that's every user's right.
     
  20. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    It appears to download malware from testmyav you need a likedln account and form some reason I am not able to create one. :doubt:

    was just curious to see how cylance faired with their files. also noticed in their tools section they offer a few tools for changing the hash of the malware.
     
  21. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    I'm not going to recommend that readers do their own testing :)
     
  22. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    I would do it in a sandbox. plus I have a ton of security software ;)
     
  23. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  24. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    I had no problem going to testmyav yesterday. today when I got there I get what is in my screen shot.
     

    Attached Files:

  25. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    Edit

    was able to go to the site just fine with chrome. then tried again with IE 11 and was able to access it again. scratching head.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.