Unsigned Programs Attempting Internet Access

Discussion in 'other firewalls' started by Scott W, Jun 10, 2022.

  1. Scott W

    Scott W Registered Member

    Joined:
    Sep 21, 2008
    Posts:
    659
    Location:
    USA
    Are there any Windows Firewall Interface apps that can intercept and temporarily block an unsigned program from gaining outgoing internet access, with real-time notification requiring acceptance or denial?
     
    Last edited: Jun 10, 2022
  2. drhu22

    drhu22 Registered Member

    Joined:
    Aug 21, 2010
    Posts:
    585
  3. Azure Phoenix

    Azure Phoenix Registered Member

    Joined:
    Nov 22, 2014
    Posts:
    1,560
  4. Scott W

    Scott W Registered Member

    Joined:
    Sep 21, 2008
    Posts:
    659
    Location:
    USA
  5. Scott W

    Scott W Registered Member

    Joined:
    Sep 21, 2008
    Posts:
    659
    Location:
    USA
    Thank you. I'll definitely check out WFC.
     
  6. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,925
    digital signing is nor mandatory if a program is trustfully or not. even signed ms programs do not need web accces. if you want to block a program then just block it.
     
  7. Scott W

    Scott W Registered Member

    Joined:
    Sep 21, 2008
    Posts:
    659
    Location:
    USA
    Is that to say I need to scrutinize and allow or block every program requesting internet access? o_O
     
  8. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,925
    your question was very clear - how to block unsigned programs. i only wrote to you that signed programs are not more trustworthy than unsigned. so you left more questions behind from my view.

    edit
    i forgot to say that if you want to block unsigned malware then it could be disappointing that malware nowadays is signed and will find more than one way out.
     
    Last edited: Jun 11, 2022
  9. Scott W

    Scott W Registered Member

    Joined:
    Sep 21, 2008
    Posts:
    659
    Location:
    USA
    That certainly is disappointing (if that is true)!
     
  10. Buddel

    Buddel Registered Member

    Joined:
    Apr 28, 2015
    Posts:
    1,951
  11. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,366
    Location:
    Italy
    A simple way to block any unsigned malwares is to use the registry key "validate admin code signatures" + UAC always notify (to greatly decrease any bypasses) + HTTP javascript blocking in the browser.

    HTTP is now always predominant for distribution of unsigned malware:

    https://urlhaus.abuse.ch/browse.php?search=url_status%3Aonline
     
  12. Scott W

    Scott W Registered Member

    Joined:
    Sep 21, 2008
    Posts:
    659
    Location:
    USA
    If the above posts by @Brummelchen and @Buddel are correct, what's the point in doing that?
     
    Last edited: Jun 11, 2022
  13. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,925
    this IS true
    https://www.google.com/search?q=digitally signed malware

    eg
    https://www.trendmicro.com/en_us/re...-code-signing-abuse-in-malware-campaigns.html
    look at the table
    Code:
    Type     Number of software     Signed (overall downloads)
    Trojan      22,413              59.9%
    Dropper     43,423              85.6%
    what you try to achive is possible but as i wrote in another thread here today - an infected system is infected, a break out is a matter of time. goal is not to get infected.
     
  14. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,366
    Location:
    Italy
    Signed malwares exist.
    Install and forget.
     
  15. Scott W

    Scott W Registered Member

    Joined:
    Sep 21, 2008
    Posts:
    659
    Location:
    USA
    Of course, but since no antimalware system is perfect I was just trying to add another security layer to prevent data-theft.
     
  16. Buddel

    Buddel Registered Member

    Joined:
    Apr 28, 2015
    Posts:
    1,951
    I use OSArmor, which monitors and blocks suspicious process behaviour, as an additional layer of security: https://www.osarmor.com/
     
  17. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    It's good to try & exercise tighter control on apps that try to connect out. If a person images to external storage at least 3X/week (doesn't everyone?), then an infection is a relatively minor inconvenience. However, a malware that gets into a computer's knickers & then calls home sensitive info, BEFORE a clean image is restored, is a huge PITN!

    Ergo, in addition to OSA & my AV's built-in FW, I use Spyshelter for its anti-keylogger & HIPS (Host-based Intrusion Protection System) components. Those components provide added detections/filters/preventions for apps trying to call home.

    I also use my firewall's "block everything" button -- for those lengthy periods when I'm doing computer stuff (work or play) that needs no internet connection.
     
  18. imdb

    imdb Registered Member

    Joined:
    Nov 2, 2011
    Posts:
    4,208
     
  19. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    @imdb -- Yes, "Prevention" is often the "P" in HIPS. However, I consider "Prevention" is too optimistic a word for any security app, so I use "Protection"for the "P" in HIPS.
     
  20. imdb

    imdb Registered Member

    Joined:
    Nov 2, 2011
    Posts:
    4,208
    :thumb:
     
  21. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,644
    Location:
    USA
    Signed malware is a thing, and thanks to Let Encrypt so are https malware sites at no extra expense. This is why I never felt the push for SSL was worth all of the hype. Every time someone raises the bar, the bad guys get a taller ladder.
     
  22. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,925
    thats not the point, any AV is only one gear in the box. goal is to prevent to get infected.
    antivirus, firewall and/or router (routers prevent most intrusions), limited user account, some other light proactive or defensive mechanisms to catch unwanted executions (sandboxie can do this), virtual boxes like shadow defender or Deep Freeze. a hips or behavior blocker is nice as long it do not bother and might be to complicated (like Malware Defender was). keep system and used software uptodate. and create backups (not system restore).

    if you are aware of your own actions you can reduce the amount of security programs. if you share the computer with your family different accounts are mandatory with a different setup. and dont let unknown people use your computer. even "good" friends never know if their usb stick is clean (happend for real).

    SSL got not recommend because of malware, it just raises security to known pages and for logins. and in cases where microsoft lost a lot of data theses including several ssl certs (which were revoked meanwhile), in that short period anything can happen.

    fake windows updates, fake ccleaner with malware inside (happend now again). thats why safe-lists in browser are important, or an adblocker which exceed this.
    cat and mice, but who is the cat? same as: "If you make something idiot-proof, someone will just make a better idiot." (Murphy's law)
    blackhat, p-zero, def con, pwn2own...
    https://www.geeksforgeeks.org/top-10-cyber-hacking-competitions-capture-the-flag-ctf/
    in special mozilla and google have benefit from pwn2own and project-zero for their browsers.

    if a system is not uptodate it is vulnerable for theses attacks:
    https://googleprojectzero.github.io/0days-in-the-wild/rca.html
    example from list:
    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21882

    list of current exloits for windows
    https://packetstormsecurity.com/files/os/windows/

    but: Things are never as bad as they seem
    to get malware without user interaction (payload less) onto the system it must be bundled with other software, or it need a combined attack on several api, googles p-zero showed in 2021 such scenario for chrome and it was fixed within days.

    i get repeating myself. sorry.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.