Barkly Endpoint security against ransom-ware

Discussion in 'other anti-malware software' started by sukarof, Feb 24, 2017.

  1. sukarof

    sukarof Registered Member

    Joined:
    Jun 22, 2004
    Posts:
    1,887
    Location:
    Stockholm Sweden
    Anyone tried Barkly that promises to stop ransom-ware by behavior analysis.

    As I understand it will stop the ransom-ware without bothering the user. That would be ideal since many other behavior tools tends to ask the user to decide.

    https://www.barkly.com/how-barkly-stops-ransomware
     
  2. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    That second sentence is almost funny. But just keep in mind that by the time that software does anything you are already infected. You'd be better off running Appcheck free, and have a good imaging plan.
     
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    I assume they are referring to perhaps signature detection upon download if scan settings are set for upon file creation. Or, perhaps rep scanning by SmartScreen upon download. Those are the only two I know of.

    Both are redundant, since any AV scanner will again scan upon execution.
     
  4. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Didn't even raise my curiousity to the level of asking for a trial
     
  5. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    They probably mean they block ransomware in the first stage, see link. Tools like AppCheck and HMPA ignore the first stage and take action in stage 2 when ransomware is about to start rapidly encrypting files. Too bad that these kind of companies don't offer simple consumer versions.

    https://www.wilderssecurity.com/thr...ternet-security-12.388577/page-8#post-2643761
     
  6. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    HMPA doesn't necessarily ignore the 1st stage, as some of the exploit things trigger before the cryptguard kicks in. With Appcheck you are correct.
     
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Correct, if ransomware performs process hollowing, or is delivered via exploit, then HMPA shuts it down before it can go to stage 2.
     
  8. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,882
    $30 per year per device - $2.50 a month plus tax. They offer a 15 day free trial - no credit card needed.
     
  9. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
  10. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Well this confirms my feeling. Using certificates to base a decision is about like using office macros. Also more good reason to just block powershell.exe
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.