MRG Rogue Software Test

Discussion in 'other anti-malware software' started by LoneWolf, Aug 16, 2009.

Thread Status:
Not open for further replies.
  1. firzen771

    firzen771 Registered Member

    Joined:
    Oct 29, 2007
    Posts:
    4,815
    Location:
    Canada
    and thats why i dont use CIS. dont want any rogues connecting out with my fırewall... :)
     
  2. ssj100

    ssj100 Guest

    Well, I don't know why you stated that, and I guess I have to argue this point, as I'm pretty sure it's wrong and could be very mis-leading.

    I use CIS so that no rogues connect out with my firewall haha. If anyone can show me and prove to me otherwise, please give me the sample! I've been using CIS for over a year, and the only bypasses I've seen are with POCs (which also bypassed OA, MD, DefenseWall etc).
     
  3. firzen771

    firzen771 Registered Member

    Joined:
    Oct 29, 2007
    Posts:
    4,815
    Location:
    Canada
    im sure it does work. but if the whitelisting works as its supposed to and if thers more rogues etc. popping up as signed by them. i see a future potential vulnerability popping up. and no im not saying they sign them intentionally. im sure thers some sort of automated process that accidently has done it possibly.
     
  4. TonyW

    TonyW Registered Member

    Joined:
    Oct 12, 2005
    Posts:
    2,741
    Location:
    UK
    Although I don't use Comodo, could it be possible this has been fixed since the test was done so that now you're seeing the alerts?
     
  5. Saraceno

    Saraceno Registered Member

    Joined:
    Mar 24, 2008
    Posts:
    2,405
    Regarding RegGenie, the download.com link and softpedia link seem to be auto-generated, almost like filling out a template and clicking submit. Both download and softpedia would submit the setup file for scanning, and both would have found it clean so it would have earned the clean award.

    Given the mountains of programs on download.com and softpedia, I tend to trust ones where the editor reviews the program, and it's a personal write-up.

    And without getting into an argument over HIPS and AVs, I do find Joe's comment interesting. Although HIPS can provide almost impenetrable defence, if you compare the amount of decisions a user would make on a regular basis (that continual reading/mental processing of alerts) to seeing the odd false positive with a scanning type program (and the few seconds googling to see what that FP is), the latter really shouldn't be a concern to users who prefer a HIPS-type program.
     
  6. Saraceno

    Saraceno Registered Member

    Joined:
    Mar 24, 2008
    Posts:
    2,405
    You could be right, and that would apply to all the security programs tested.
     
  7. ssj100

    ssj100 Guest

    Hmm, I see your point, but I still haven't seen CIS being genuinely bypassed yet in over a year of using it. The thing is that even if rogues are signed by Comodo, it will not be placed in Comodo's white-list unless the program is deemed completely safe. That's how I understand it anyway.
     
  8. ssj100

    ssj100 Guest

    Hmm, I'm not sure mate. I didn't think Comodo updated its white-listing database in real-time (I thought they only released a new white-listing database with each new program release). I could be wrong though. I'll try asking on their forums.

    EDIT:
    From the Comodo user manual:
    "Comodo Internet Security can now validate digitally signed applications from Trusted Vendors. Trusted Vendors are those companies that digitally sign 3rd party software to verify its authenticity and integrity. This signature is then countersigned by an organization called a Trusted Certificate Authority. By default, Defense+ will detect software that is signed by a software vendor and counter-signed by a Trusted Certificate Authority. It will then automatically add that software to the local users’ Trusted Vendor list. Software companies may be interested to know that they can have their signatures added, free of charge, to the ‘master’ Trusted Vendor List that ships to all users with CIS...".
     
    Last edited by a moderator: Aug 20, 2009
  9. TonyW

    TonyW Registered Member

    Joined:
    Oct 12, 2005
    Posts:
    2,741
    Location:
    UK
    That's the thing - they're not malware. They're frauds/scams/rogues, but not malicious software. They don't do anything malicious and is why those AVs don't as yet list them.

    I know KL do list some frauds for example - they have a category called not-a-virus:FraudTool, and the list is growing daily. Admittedly, some of those will contain malware elements; the problem is getting them, and other AVs, to add more non-malicious detections to their bases, but it's not an easy task because there's so many of them, and as you've seen, they appear to exhibit legitimate behaviours, a few get digitally signed by some vendors, and it also involves more time to analyse which they could use in detecting real malware instead.
     
  10. raven211

    raven211 Registered Member

    Joined:
    May 4, 2005
    Posts:
    2,567
    Are rogues prevented by running with limited rights through either methods like LUA or sandboxing/policy (SandboxIE, DW, GW, etc.)?
     
  11. ssj100

    ssj100 Guest

    Hmm, I see what you're saying there. But could I argue that these "frauds/scams/rogues" are actually "malicious", in that they have a "malicious" intent? Therefore, since they ultimately have a "malicious" intent, they should still be considered "malware"?
     
  12. ssj100

    ssj100 Guest

    As far as I know, LUA will not allow the rogues to even execute.

    And with a properly configured Sandboxie, the rogues will not be able to start/run, will not be able to access the internet, and will not be able to access sensitive areas of your computer. Sounds like over-kill haha, but that's how Sandboxie works.
     
  13. TonyW

    TonyW Registered Member

    Joined:
    Oct 12, 2005
    Posts:
    2,741
    Location:
    UK
    Perhaps the reason you get the alerts now is the digital certificate was revoked on those applications you tested.
     
  14. TonyW

    TonyW Registered Member

    Joined:
    Oct 12, 2005
    Posts:
    2,741
    Location:
    UK
    I know what you're saying, and it is a difficult area. Some argue how can AVs/AMs be expected to detect "intent" if they don't do anything untoward to your system except provide a scan list of non-existent errors and urge you to pay to fix said errors. It is indeed a problem, but I think the industry as a whole is trying to play catch up in this arena.
     
  15. ssj100

    ssj100 Guest

    Well, the 3 applications that apparently "bypassed" Comodo don't have digital signatures mate. Actually, 2 out of the 3 applications don't have digital signatures. pconpoint.exe has a digital signature that has expired haha.
     
  16. thathagat

    thathagat Guest

    well you now seem to be neck deep in it.................;)
     
  17. ssj100

    ssj100 Guest

    By the way, with regards to whitelist, here's a reply from a Comodo moderator:
    "The white list only gets updated with new releases of CIS".

    Anyway, TonyW, as far as I'm aware, I've always got alerts from Defense+ for the 3 rogues apparently "bypassing" it.
     
  18. ssj100

    ssj100 Guest

    Haha, nah it's cooled down actually. And this is a different matter. We're talking about Defense+ getting bypassed here, not some political issue haha.
     
  19. Calderon

    Calderon Former Poster

    Joined:
    Aug 19, 2009
    Posts:
    3
    Littlebits (or Mike L. J.),

    The Admin of SSUpdater.com
    (a site with links for Cracks, KeyGens, Patches etc.)

    whose members have severely criticized WildersSecurity

    -under the encouragement/incitement of the SSUpdater Admins/Mods-
    ,like you,

    should Not come to lecture and patronize!

    We know very well who you really are…
     
  20. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA
    you want to know the sad thing about a thread like, you take some smuck like me, who doesnt understand 90 percent of it, in the end, I dont trust anyone anymore.

    thats sad.
     
  21. Calderon

    Calderon Former Poster

    Joined:
    Aug 19, 2009
    Posts:
    3
    The next time a New MRG Test is released,
    readers must remember that
    -Sveta of MRG
    and
    -GrandCommander of SSUpdater (a site with links to Cracks, Keygens, Patches etc.)
    is the same person
    (a Serbian VX Collector without any
    Computer Studies
    and Professional Experience
    in the Security software Industry)!

    Just search GrandCommander's Posting at SSUpdater:
    He wrote against Malwarebytes, CounterSpy, Nod32
    and criticized AV-Comparatives, WildersSecurity etc.

    Now, he comes here, under the Mask/Hood of MRG, and tries to convince us
    that he has No connection with SSUpdater.

    Since you play the Malware Researcher, offer us some info:

    a) From what Computer Science Department did you graduate?
    b) Which Security Software companies had you worked with before you joined MRG?
     
  22. Saraceno

    Saraceno Registered Member

    Joined:
    Mar 24, 2008
    Posts:
    2,405
    Calderon, thread has moved on chief. ;) Send him a private message if you're requesting that info.

    I'm reading ssj100 and TonyW's discussion!
     
  23. BlueZannetti

    BlueZannetti Registered Member

    Joined:
    Oct 19, 2003
    Posts:
    6,590
    Folks,

    Let's keep directed comments towards the personal situation of members out of this conversation. Period.

    Those out there performing efficiacy testing may or may not trot out their academic qualifications. At times it's germane, at other times less so. However, it's up to the individual member to determine the extent of public disclosure that's right for them. Whether an individual has an alternate name at other sites is not a matter for this board unless that becomes germane to an indirect astroturfing campaign.

    Readers need to perform their own due diligence with that reality in mind. Readers also need to be aware that, as illustrated early in this very thread, there are people who will ignore any sense of social or personal responsibility in an effort to forward their personal agenda/grudge/whatever. Eventually, those situations emerge from the shadows. However, that emergence should be based on fact, not idle speculation or innuendo.

    Let's get back to matters of a technical nature. In the end, that is what matters.

    Blue
     
  24. andyman35

    andyman35 Registered Member

    Joined:
    Nov 2, 2007
    Posts:
    2,336
    You're spot on with what you're saying but TonyW has it right.How can any security program judge the intentions behind a software application? There's no heuristic algorhythm to detect human greed alas :mad: .
     
  25. smage

    smage Registered Member

    Joined:
    Sep 13, 2008
    Posts:
    378
    Hi,

    I think that the test was performed with Comodo default settings, that is, "Comodo Internet Security" and not "Proactive Security"

    Try doing the test agin with default settings and let us know what happens.

    Thanks.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.