HitmanPro.ALERT Support and Discussion Thread

Discussion in 'other anti-malware software' started by erikloman, May 25, 2012.

  1. guest

    guest Guest

    And CryptoGuard is only one layer. There are other layers which may have prevented the malware in an earlier stage:
     
  2. XhenEd

    XhenEd Registered Member

    Joined:
    Mar 31, 2014
    Posts:
    536
    Location:
    Philippines
    Just being devil's advocate here, maybe there's still a point in doing CryptoGuard-only test to cater the possibility, no matter how slim, that the whole exploit and other mitigations might fail, or that the malware might even not trigger those mitigations. And so, CryptoGuard, as the last line of defense against ransomware, must act accordingly. CryptoGuard must never say, "This software acts like a ransomware, but it passed the first layers of defense, so I must stay quiet." :)
     
  3. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,649
    Location:
    Paris
    In the past such tests of CryptoGuard has led to added defenses of the product as a whole, which speaks rather highly of the Developers. But trying to put the same old point a different way, running malware from the desktop will only be invalid if a product has a warning to never expect protection from either saving and running files from the desktop or running files from a flash drive.

    But as I am aware of no such protection preclusions...
     
  4. guest

    guest Guest

    Is a new video in preparation? Or, when can we expect it
    :)
     
  5. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Yes I agree, it makes sense to test CryptoGuard on its own, because of this reason. But in certain cases, ransomware will be stopped by the anti-process hollowing feature, perhaps you can also test this? Would be interesting to know.
     
  6. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,649
    Location:
    Paris
    Sometime in the next 24 hours (released either before or after I go out)- as to Process Hollowing, there is a Cerber (the first sample tested) that attempts to screw with svchost.
     
  7. mrhex1

    mrhex1 Registered Member

    Joined:
    Jul 2, 2016
    Posts:
    19
    Location:
    Timbuktu
    I monkeyed around with a Cerber .exe in a Windows 10 VM here a few days ago. I uploaded my CS homework in a .docx file onto the VM. Then I activated the file. I had to turn off Windows Defender, click past SmartScreen & then trigger the .exe. The Cerber ransomware loaded with all of its scary things such as parroting back into the speakers that my files have been encrypted. But surprisingly my file was intact until I disabled cryptoguard. I doubt my test will be as extensive as cruelsister's.
     
  8. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Yes, that's what I would like to know, how many of the ransomware samples that you test are blocked by HMPA's process protection.
     
  9. peterk62

    peterk62 Registered Member

    Joined:
    Feb 10, 2009
    Posts:
    51
    I am getting an Intruder Alert whenever I open a web site in Edge. I am running Windows 10 Home with Alert 3.6.4 build 588, running as a normal user. This seems to happen on any web site; going to the same site in Chrome does not result in any warnings. Scanning with HitmanPro and Zemana AntiMalware shows no issues.

     
  10. Telos

    Telos Registered Member

    Joined:
    Jul 26, 2016
    Posts:
    171
    Location:
    Frezhnacz
    Looking like build 589 has some ransomware tweaking coming... :oops:
     
  11. Victek

    Victek Registered Member

    Joined:
    Nov 30, 2007
    Posts:
    6,219
    Location:
    USA
    Build 589? Has a new build been mentioned?
     
  12. Stupendous Man

    Stupendous Man Registered Member

    Joined:
    Aug 1, 2010
    Posts:
    2,859
    Location:
    the Netherlands
    I guess Telos foresees cruelsister's CryptoGuard test to result in modifications in a next HMPA build.
     
  13. guest

    guest Guest

    The video was published some hours ago (HMP.A build 588 was tested):

    HitManPro Alert vs Ransomware
    https://www.youtube.com/watch?v=qNTD2kr1q58
     
  14. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,649
    Location:
    Paris
    Stupendous- They are quite good at recoding HMP.A to improve it. Case in point is that they added protection for the original Bart (which zips personal files and password protects the created archives) with Build 588. This was actually a pain as I had a build 586 video completed and had to trash it and redo it as 588 improved the mechanistic detection of the product- very annoying!!
     
  15. guest

    guest Guest

    :argh:
     
  16. Victek

    Victek Registered Member

    Joined:
    Nov 30, 2007
    Posts:
    6,219
    Location:
    USA
    Thanks for testing :thumb: It looks like the "revenge" ransomware was the only one to bypass CryptoGuard; is that correct?
     
  17. NiteRanger

    NiteRanger Registered Member

    Joined:
    Nov 15, 2016
    Posts:
    651
    Location:
    Far East
    HMPA is improving on its ransomware detection but not its removal. If just using HMPA alone then how to recover a mix of files if they were infected by a ransomware? Any recommendation of some software to recover files?

    I believe a dedicated antiransom software with files recovery will complement HMPA nicely.
     
    Last edited: Apr 16, 2017
  18. Victek

    Victek Registered Member

    Joined:
    Nov 30, 2007
    Posts:
    6,219
    Location:
    USA
    When you say "removal" do you mean the removal of the malware? If so that's what HitmanPro is for. HMP.Alert just alerts (and blocks of course) :) Regarding recovering files if CryptoGuard is not bypassed there no need for recovery, but if it is bypassed then the only thing that's going to help is a decrypter tool.
     
  19. guest

    guest Guest

    and the "Sage" Ransomware has encrypted all files
     
  20. NiteRanger

    NiteRanger Registered Member

    Joined:
    Nov 15, 2016
    Posts:
    651
    Location:
    Far East
    I meant the removal of the malware. HMPA blocks the ransomware but does it removes the ransomware file from the system?

    Thanks
     
  21. guest

    guest Guest

    The malware is blocked, but it is not removed.
    But after a click on "Scan Computer", HitmanPro is scanning the PC and is able to remove it.
     
  22. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590

    Sure there is. Just image your system frequently. I image hourly.
     
  23. NiteRanger

    NiteRanger Registered Member

    Joined:
    Nov 15, 2016
    Posts:
    651
    Location:
    Far East
    HMP uses BD and Kaspersky engines which independently are not strong in antiransomware. Now, I believe HMP does not buy the complete BD & Kaspersky engine modules over which makes them worse as compared to BD and Kaspersky products themselves. So you think HMP alone is good for the detection and removal of ransomware?
     
  24. NiteRanger

    NiteRanger Registered Member

    Joined:
    Nov 15, 2016
    Posts:
    651
    Location:
    Far East
    Are you referring to creating restore points with instant rollback or system image roll back.....with scheduling, of course?
     
  25. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    M

    Nice video;) Noticed a few files were encrypted with the 7-Zip.

    AS long as I was there also took a look at your Shadow Defender Vid. Happened to notice you had a pic of a woman with an M below it :thumb:
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.