Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

Wiggly Wayne DDS posted:

Do you have selective hearing, or are just wilfully dense at this point?

I don't know, what would replace AV but be really expensive? That's not a viewpoint I've argued.

AV is cheap, it's <$5 per box per year for a multi-license of a top-shelf AV (BitDefender/Kaspersky/ESET/F-Prot). My Kaspersky licenses consume less than 1% of a circa-2010 processor and once you get them set they don't ever waste your time, while having top-shelf signature/heuristic rates. I've done :filez: and it's caught suspect files every time. I also bought a Malwarebytes lifetime license for $20 a couple years ago and that's my second layer. It ain't expensive.

Adbot
ADBOT LOVES YOU

Trabisnikof
Dec 24, 2005

Paul MaudDib posted:

I don't know, what would replace AV but be really expensive? That's not a viewpoint I've argued.

AV is cheap, it's <$5 per box per year for a multi-license of BitDefender/Kaspersky/ESET/F-Prot. My Kaspersky licenses consume less than 1% of a circa-2010 processor and once you get them set they don't ever waste your time, while having top-shelf signature/heuristic rates. I also bought a Malwarebytes lifetime license for $20 a couple years ago and that's my second layer. It ain't expensive.

Cheap snakeoil is still snakeoil. :shrug:

and like patent medicines, most av is actually worse than doing nothing

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

Trabisnikof posted:

most av is actually worse than doing nothing

OK cool, 95% of everything is poo poo. So can we agree that having something in the top 5% is worth something?

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork
Fun Shoe

Paul MaudDib posted:

I actually don't have plat and can't look up where he posts. Unlike the guy from this thread who stalked my posts so he could argue with me in another forum. I just could tell because he's a shitposter.

Where's the explanation? Link it for me. He told me to read a thread where his explanation was that the NSA was gonna get Grandma's cat pics. There was nothing but "under construction" on the first page of the thread and that was the first explanation he gave in the thread. I'm not joking.

quote:

All anti-virus products at their core operate the same and how they all update is as well. Anti-virus typically relies on signatures to know what is potentially malicious from what is not. However, this is its biggest flaw as those signatures can easily be thwarted by malware creators. As such, a determined attacker can easily create 2,000 different copies (in a single day no less) of the same malicious software and that may require the anti-virus vendor to create multiple signatures in order to successfully thwart it. The vendors know this and last year, Symantec admitted that at best they detect up to 45% of threats although there are suggestions that catching any new threats is at best 5% successful.

This is all on the backs of the AV industry's claims of having 'superb' features like suspicious behaviour detection and math-based anti-malware techniques--none of this really has made a dent in stemming the tide.

Don't let sites and organisations like AV-Test, Gartner, and whoever suggest that vendor X has the advantage over others. Their methodology either relies on being paid to be put in some "magic quadrant" (Gartner) which allows CIOs et al to just rubber stamp their choices or testing "real world" situations that otherwise are far from such.

What you need to consider besides common sense (most infections are the fault of users) is that there are other solutions besides anti-virus. These include simple things like network settings, popup and ad blockers, and keeping your system and browsers up to date.

also he wasn't seriously suggesting you install gentoo for your aunt you idiot

every single time you post in this thread you make an idiot out of yourself and i'm fairly certain that everyone is tired of it

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

online friend posted:

also he wasn't seriously suggesting you install gentoo for your aunt you idiot

Did I misclick into YOSPOS or is this the serious forum for actual advice?

The concept that re-encoding malware disrupts detection goes along with the fact that signatures detect bit-patterns in memory/files. But not everything is brand new, and you have heuristics for the stuff that is.

(USER WAS PUT ON PROBATION FOR THIS POST)

Trabisnikof
Dec 24, 2005

^
Hint: it was listed as a hyperbolic example along with giving users ipads instead of computers. Learn to read.


Paul MaudDib posted:

OK cool, 95% of everything is poo poo. So can we agree that having something in the top 5% is worth something?

You quote that figure like it matters. The fact is catching 95% (according to a firm funded by AV companies) of old poo poo doesn't help when re-encoding is a service anyone can buy with bitcoin. gently caress you can get pretty far just using mfsvenom.

But really this:

quote:

All anti-virus products at their core operate the same and how they all update is as well. Anti-virus typically relies on signatures to know what is potentially malicious from what is not. However, this is its biggest flaw as those signatures can easily be thwarted by malware creators. As such, a determined attacker can easily create 2,000 different copies (in a single day no less) of the same malicious software and that may require the anti-virus vendor to create multiple signatures in order to successfully thwart it. The vendors know this and last year, Symantec admitted that at best they detect up to 45% of threats although there are suggestions that catching any new threats is at best 5% successful.

This is all on the backs of the AV industry's claims of having 'superb' features like suspicious behaviour detection and math-based anti-malware techniques--none of this really has made a dent in stemming the tide.

Don't let sites and organisations like AV-Test, Gartner, and whoever suggest that vendor X has the advantage over others. Their methodology either relies on being paid to be put in some "magic quadrant" (Gartner) which allows CIOs et al to just rubber stamp their choices or testing "real world" situations that otherwise are far from such.

What you need to consider besides common sense (most infections are the fault of users) is that there are other solutions besides anti-virus. These include simple things like network settings, popup and ad blockers, and keeping your system and browsers up to date.

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE
Oh gee 2000 copies. My computer could create at least 3000.

How long does it take to generate a differently-optimized output via any random compiler? Like one optimization step? You could make LLVM dump like a million per hour. And you accuse me of posting breathless clickbait poo poo. :lol:

Again, that's why we have heuristics.

Paul MaudDib fucked around with this message at 06:47 on May 2, 2016

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork
Fun Shoe

Paul MaudDib posted:

Did I misclick into YOSPOS or is this the serious forum for actual advice?

jesus christ

how do you have such little self-awareness? how has it not occurred to you that maybe, just maybe the person you're arguing with is smarter than you, or at the very least knows a lot more about this poo poo than you do?

at what point do you decide that maybe it's time to cut your losses, swallow your pride and just shut up?

i guarantee you if you survey security professionals they'll tell you the exact same thing- AV is dead, and the focus has shifted to educating users on how to protect themselves against the myriad threats that they'll come across on a regular basis.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Paul MaudDib posted:

Top-tier antivirus software (Kaspersky, BitDefender, etc) consistently picks off 99.9%+ of known threats, 95%+ of unknown threats via heuristics, and 98%+ of malicious sites. That's pretty effective in my book.

Paul MaudDib posted:

One rule will never catch 99.9% of anything. You're an idiot who's trying to score points by making an impossible request.

Paul MaudDib posted:

Again, that's why we have heuristics.

Here's a post I wrote last year when dealing with a similar argument:

OSI bean dip posted:

Traditionally, anti-virus works through a few ways:
  • Signatures - this is really the most common way that AV vendors rely on and really all it is a list of items that indicate that whatever it is reading is good or bad. AV vendors have signatures for files they don't want to touch and files they do.
  • Behavioural - anything that does a number of steps in a specific order (or a single step) is monitored
  • Heuristics - don't really work but the idea is to figure out a pattern and work based on that
  • Sandbox - run the code within a virtual machine and determine if the outcome is good or not
  • Remotely - you'll see vendors claim they have a "cloud solution" when really it's not much different from that Python script I shared
The big problem with signature-detection is scale: back when the only attack vectors were floppies and BBSes, it was really a non-issue to just wait every six to twelve months to visit Computer City or CompUSA for a new-fangled edition of McAfee, which at the time was still under the nose John McAfee, except now his nose is above cocaine. The Internet was not really a major concern in the mid-90s because while there were things like worms going about, it was still relatively new and we were still in the age of joke viruses--ransomware is fairly old just for the record.

Once broadband became a thing and the new millennium dawned, malware started to change. Spam was really the big driving-force behind malware for a long time and to a certain extent still is, but it never became a huge issue in the malware sense until we started to see e-mail RBLs becoming popular--RBLs have been around since the mid-late 90s but became much more popular as everyone else started to get online. As a result of RBLs becoming popular, we started to see a shift in getting access to botnets for the purposes of sending e-mail spam as opposed to sharing files--much of the botnet activity I used to see back in the early-00s were really for people to share warez and porn.

Because of this shift in how botnets were being used, malware was becoming a bigger problem for the AV vendors to manage so then began an arms race between the writers and the defenders. It helps to understand the basic logic of how a signature works (and it should be mentioned that heuristics really fall into the signature category here so I won't elaborate much on them).

It's sort of hard to write into words (and I know that certain people are going to nitpick on what is written here because they want to be "right") but it sort of works like this:
  • What is the filename being used here? - Some malware (usually older) have filenames that are just consistent or have a predictable pattern. This is of course not reliable but if we're to look at this from a flow-chart then it allows for the next set of rules to go forward. The path of where the file resides is important too.
  • What's the file size? This may seem really dumb but both the filename and file size checks are super-important from a performance perspective because all we're doing is requesting details from the OS for the metadata.
  • What is the file type? This is done one of two ways usually: checking the extension and then checking for the magic pattern. There is a limited set of file extensions that AV engines by default will want to check--typically we're talking executables, libraries, drivers, et cetera. However, sometimes that isn't enough and what you can do instead is determine the file type by looking through the first few bytes or so and going based on that--Windows executables always start with with "MZ" on its first two bytes and PDFs will start with "%PDF" for example. This is also the first time the AV engine will touch the file.
  • Should it be an acceptable file type, what are the first few things it does right off of the bat? This is useful in the case of an executable because a number of junk programs will do things like constantly call the OS' API to do a bunch of things but then do nothing afterward. This can be checked through reading the first handful of software instructions but it is also checked within the sandbox as well.
  • Is this file encoded in a specific way? Malware tends to get packed, meaning that if you were to run the code through a debugger, you won't get the entire picture until you unpack it. There's a couple of ways to get around this: namely either running it in a sandbox then dumping what it loaded into memory or just outright detecting based on the packer itself--there are legitimate executable packers out there and there are known stolen copies which do happen to leave a signature on files. You can unpack the files as well but only if you are able to determine what the packer-type is to begin with. It's pretty easy to do this with Python if you're curious.
  • What patterns does it match? What strings does it have? If there are known strings then it can start to apply whatever rules to those. Sometimes it needs a specific pattern such as it's calling on a socket to connect to an IP address to determine its location but then it goes and reads the SAM file to see what users are on there immediately afterward--things like that.
I should disclaim that the above list is really a really, really simplified look at an AV engine as I cannot divulge too much further without putting myself at potential legal risk here (I'll leave this part to your guys' imagination), but what it does describe is that there are so many things signature-based AV engines have to look at in order to come to a conclusion whether or not a file is safe--keep in mind, signatures can be used to whitelist in addition to blacklisting. The problem with the signature system is really straightforward: it is really easy to determine how to get around it once you're aware that one exists. I may elaborate on these points or your questions if you want, but I may hold back too just because of what I said earlier here.

The thing is that the malware writers can use whatever they have at their disposal to pump out thousands of unique copies of their software that evade the signatures that have been created already. The idea behind heuristics is to come up with a pattern that potentially predicts this, but the packers already take that into account and can render any discovered pattern useless within a very short period of time. To combat that, AV vendors have agreements amongst many of themselves to share the data they already have, so Symantec may end up with McAfee's, Trend Micro's, Sophos', or Microsoft's data and vice-versa. VirusTotal for example is not popular with malware authors because VT themselves share the data with vendors who request access--at a fee of course, which is in order of a few thousand per month. They themselves have online testing tools that take popular AV engines and run the malware against and spit out results. It's really an arm's race that in my opinion the AV industry lost a decade ago, so the idea that you should go shopping around for different AV vendors is stupid.

The solution for AV vendors to keep the signature race going is to throw more people at it. It doesn't mean success but more bodies in seats in their labs does usually lead to better results. However, that becomes expensive so you have to make business decisions around that. I won't go much further into this but you'll probably get the idea.

AV vendors will come out and say that their cloud detection works but really all it is is a pre-warning for or from them. They'll get a hash sum from a client machine, run it against their DB, and if it has already has seen in it. they'll report back with details. The dirty little secret is that if your AV engine is already signature-based, you're going to have details about that hash sum anyway in the next update so all you're doing is pre-emptively checking against their set of signatures and hoping that they have seen it before you have managed to update.

Suspicious behaviour is a bit of a different beast all together and probably the worst of the bunch. It relies on a list of patterns within a pre-configured file in order to determine if the action taken by an application is legitimate or not. Here's a kicker: go and make a change to your Windows Firewall with it enabled; it might actually set it off. It works fine if you're running it on a single machine, but try and enable it corporate-wide across thousands of machines then deploy a change later via GPO that requires a task to be performed that the behaviour monitoring picks up on--your help desk will absolutely love you. AV vendors keep this sort of thing close to their chest on what they're actually looking for but I wouldn't be shocked if a list of what the look out for is floating about.

Sandboxing is useful to me because I can run the malware within a controlled environment to determine what the ramifications are, but there are solutions that will run malware at the perimeter and will react after the fact if it does something that is discovered to be malicious. You just have to hope that the box doesn't get compromised because of a a vulnerability.

So the reason why I have been giving [people who've learnt from their ways] poo poo for their opinions is because they both don't understand malware, how its remediated, and why a set of tools rambled off will do squat. They're quick to suggest software based on something they read elsewhere in this thread or on some other website, but they're then just as quick to defend their decisions when they're called out on their inability to explain them. Malware authors spend a lot of loving time going over how the whitehats are going after them and there is a lot of money to be made by them to keep it that way. You cannot assume that a list of software will fix the problem and that the only way to go about this is to assess how bad you think the risk is if you continue to use the machine post-infection. I consider it negligent to go about in this thread suggesting fixes without having any knowledge of what lead up to someone getting infected before.

I do recommend for those of you who are curious about the mindset of these guys that you contribute to Brian Krebs' forehead-reduction surgery by reading his book, Spam Nation. It's not a bad read as he does go into some detail about how malware, spam, and security in general became the way it is. I've had a few of you ask me questions via PM already and I am always happy to answer them as long as they're constructive and I feel comfortable to give an answer.

Now please stop it with the heuristics nonsense and if you want to argue in this thread, stop calling people and actually contribute to the conversation because this is in fact not YOSPOS.

Hopefully the above was too long for you to read because apparently you've had some trouble reading other things and have assumed I am talking about the NSA here.

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

online friend posted:

jesus christ

how do you have such little self-awareness? how has it not occurred to you that maybe, just maybe the person you're arguing with is smarter than you, or at the very least knows a lot more about this poo poo than you do?

at what point do you decide that maybe it's time to cut your losses, swallow your pride and just shut up?

i guarantee you if you survey security professionals they'll tell you the exact same thing- AV is dead, and the focus has shifted to educating users on how to protect themselves against the myriad threats that they'll come across on a regular basis.

Probably about the time you post an actual argument that isn't "trust me" or conspiracy theories or some clickbait poo poo.

And just for the record,

Baxta posted:

It's been alleged (but not proven) that NSA put backdoors in Dual_EC_DRBG. For latest news check out the Juniper stuff from last year.

(It's almost definitely the NSA)

This is the only plausible vector that's actually been published. The NSA is not backdooring your AV to get ahold of your grandma's emails. Mass wiretapping and opportunistic decryption, sure, but they can get caught deploying targeted malware or MITMing exactly one time before a security researcher takes them apart.

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork
Fun Shoe

Paul MaudDib posted:

Probably about the time you post an actual argument that isn't "trust me" or conspiracy theories or some clickbait poo poo.

nobody's posting conspiracy theories? where are you getting this?

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

online friend posted:

nobody's posting conspiracy theories? where are you getting this?

A lack of reading comprehension skills tends to lead to this belief that we're concerning ourselves with the NSA backdooring anti-virus products I guess.

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

online friend posted:

nobody's posting conspiracy theories? where are you getting this?

This is literally a conspiracy theory about antivirus. The NSA is not targeting you personally, that is not a realistic threat vector. If they do, there is absolutely nothing you can do to defend against it, they can absolutely deploy something on the level of Equation Group or (hypothetically) BadBios and you will never know it.

OSI bean dip posted:

https://blog.kaspersky.com/equation-hdd-malware/

There are reasons why I poo poo all over anti-virus and malware re-mediation steps in the OP. One being the link I just posted and the other being that I used to work for an AV vendor.

However he just made a good post with an actual explanation. Re-encoding does disrupt the signatures that AV looks for. The signatures are there for picking off the low-hanging fruit - most threats are lazy poo poo that's multiple months old and that keeps someone (not naming names but she's my GF) from picking up viruses on streaming sites.

For unknown threats we have heuristics - they aren't 100% but they are the best defense against unknown threats. That's the current standard for picking off unknown threats. Shoot me whatever numbers you want from a real-world test, but it's a lot better than nothing. Between MBAM and Kaspersky we haven't had any breaches despite a lot of sketch behavior.

Group protections absolutely do work - herd strategies are viable as proved by evolution. If one of us is getting hosed by a virus, find the attacker and mark it as hostile. You may be the first person on the whole internet to encounter a threat, but you're probably not, particularly if you do behave safely on the whole. There are a lot of people on the internet or any given AV platform. A couple million PCs is viable as a perspective onto the world's infection threats.

I also think there's extra heuristics to be picked off here via deep learning of the virus code and behavior characteristics too.

Paul MaudDib fucked around with this message at 07:07 on May 2, 2016

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork
Fun Shoe

Paul MaudDib posted:

This is literally a conspiracy theory about antivirus. The NSA is not targeting you personally, that is not a realistic threat vector. If they do, there is absolutely nothing you can do to defend against it, they can absolutely deploy something on the level of Equation Group or (hypothetically) BadBios and you will never know it.

nobody ever said antivirus is poo poo because the NSA is loving with it

antivirus is poo poo because it's poo poo, and it can't detect poo poo

Paul MaudDib posted:

(not naming names but she's my GF)

why did you post this :confused:

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork
Fun Shoe
hey guys [shouting into next room] MY BOYFRIEND just got some adware on his laptop

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

online friend posted:

why did you post this :confused:

For some reason she refuses to use the Sonarr system I set up, idgi either

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE
For real though I appreciate that antivirus is a layer that can have its own vulnerabilities, but the number of critical vulnerabilities in a given antivirus package is much less than the number of vulnerabilities in software that is corralled within an AV perimeter. There's been like what, 2 escalation or escape attacks within a year? It's probably less than a half-dozen total. Versus how many exploits of software installed on client endpoints?

There's what, that one Xen escape, and like one Norton escape that got posted a while back, or something? How many peripheral Windows escalation/escape exploits and poo poo have been discovered within the same timeframe? And how many exploits of random applications?

Paul MaudDib fucked around with this message at 07:36 on May 2, 2016

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
My virus-repelling rock keeps my computer safe, I know it works because I've never seen a computer virus.

--

"Heuristic" is literally just a fancy word for a slightly more complex type of signature. They have most of the same drawbacks as signatures, for example "a malicious attacker can just permute their virus a bit until it no longer gets flagged". Talking about how well something defends against "unknown threats" is utter bullshit, and the only way it could conceivably make sense is if you've gone balls-deep into the bacteriophage analogy and literally think that computer viruses are created via evolution and natural selection.

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

Jabor posted:

My virus-repelling rock keeps my computer safe, I know it works because I've never seen a computer virus.

No, I've had viruses try before and my girlfriend has as well. Hello logfiles.

Jabor posted:

"Heuristic" is literally just a fancy word for a slightly more complex type of signature. They have most of the same drawbacks as signatures, for example "a malicious attacker can just permute their virus a bit until it no longer gets flagged". Talking about how well something defends against "unknown threats" is utter bullshit, and the only way it could conceivably make sense is if you've gone balls-deep into the bacteriophage analogy and literally think that computer viruses are created via evolution and natural selection.

Well, they can't until they break whatever characteristic the heuristic is looking for. If you just re-encode a given virus it'll still trip most of the same heuristics as the old one. Assuming they worked in the first place.

Wiggly Wayne DDS
Sep 11, 2010



Paul MaudDib posted:

For real though I appreciate that antivirus is a layer that can have its own vulnerabilities, but the number of critical vulnerabilities in a given antivirus package is much less than the number of vulnerabilities in software that is corralled within an AV perimeter. There's been like what, 2 escalation or escape attacks within a year? Versus how many exploits of software installed on client endpoints? It's probably less than a half-dozen total.

There's what, that one Xen escape, and like one Norton escape that got posted a while back, or something? How many peripheral Windows escalation/escape exploits and poo poo have been discovered within the same timeframe? And how many exploits of random applications?
ahahahahaha

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

Paul MaudDib posted:

No, I've had viruses try before and my girlfriend has as well. Hello logfiles.

Are you literally running software with known vulnerabilities that known viruses are trying to exploit?

While simultaneously telling security professionals that you know better than them about security?

apseudonym
Feb 25, 2011

Paul MaudDib posted:

For real though I appreciate that antivirus is a layer that can have its own vulnerabilities, but the number of critical vulnerabilities in a given antivirus package is much less than the number of vulnerabilities in software that is corralled within an AV perimeter. There's been like what, 2 escalation or escape attacks within a year? Versus how many exploits of software installed on client endpoints? It's probably less than a half-dozen total.

I'm afraid this hasn't been true for at least 5 years, if not a whole lot longer. The problem is that if you're a security person who can write solid, correct, secure code you're in extreme demand and you're not going to stick around at an AV company getting paid trash for boring work.

Operating systems have improved extremely since what you learned starting out in tech and they've long surpassed in quality the AV software that claims to protect them.

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

apseudonym posted:

I'm afraid this hasn't been true for at least 5 years, if not a whole lot longer. The problem is that if you're a security person who can write solid, correct, secure code you're in extreme demand and you're not going to stick around at an AV company getting paid trash for boring work.

Operating systems have improved extremely since what you learned starting out in tech and they've long surpassed in quality the AV software that claims to protect them.

Not disagreeing with you directly but can you provide some comparative numbers on this? Like critical/severe vulnerabilities in client software versus the AV layers?

apseudonym
Feb 25, 2011

Paul MaudDib posted:

Not disagreeing with you directly but can you provide some comparative numbers on this? Like critical/severe vulnerabilities in client software versus the AV layers?

Keep in mind that vulnerability counts are not a great metric for security (1 remote code is as good as 20), what scope are you talking? "The client software" is pretty vague, and you need to kind in mind that most malware doesn't actually need exploits to do anything on a lot of platforms where AV is common (aka Windows).

If you'd like details on the AV side of horrible vulns I recommend looking into Project Zero and Tavis Ormandy's continued thrashing of all AV platforms out there, there are many vulns there are demonstrably make the device worse off than if the AV wasn't there at all.

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

apseudonym posted:

Keep in mind that vulnerability counts are not a great metric for security (1 remote code is as good as 20), what scope are you talking? "The client software" is pretty vague, and you need to kind in mind that most malware doesn't actually need exploits to do anything on a lot of platforms where AV is common (aka Windows).

If you'd like details on the AV side of horrible vulns I recommend looking into Project Zero and Tavis Ormandy's continued thrashing of all AV platforms out there, there are many vulns there are demonstrably make the device worse off than if the AV wasn't there at all.

Thrashing any given platform doesn't prove that it's more vulnerable than an unthrashed platform. I highly encourage you to consider the medical problem of detection rates of (eg) thyroid nodules versus actual cancerous nodules. A vulnerability is not the same thing as a virus, just the same as a benign nodule is not the same as a cancerous nodule.

Not that the things he's finding aren't real, but once a professional goes looking for problems they find them. What he's doing is good, but that doesn't prove that he's finding more in AV relative to other stuff unless he actually looks at the other stuff.

Also, like I said - ransomware is a type of virus that advertises the fact that you've been infected. Comparing reported rates of ransomware versus stealth/botnet viruses is not valid either for the same reason. 100% of ransomware users know they have it, <10% of botnet users (probably <1%) know they have it.

Also, the fact that Windows is vulnerable is not relevant to AV vulnerabilities (unless they catch it). You were claiming that AV itself exposes extra vulnerabilities - platform vulnerabilities themselves do not count as AV vulnerabilities.

Paul MaudDib fucked around with this message at 08:03 on May 2, 2016

Boris Galerkin
Dec 17, 2011

I don't understand why I can't harass people online. Seriously, somebody please explain why I shouldn't be allowed to stalk others on social media!
This thread was nice and informal but now it sucks.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

Paul MaudDib posted:

Also, the fact that Windows is vulnerable is not relevant to AV vulnerabilities (unless they catch it). You were claiming that AV itself exposes extra vulnerabilities - platform vulnerabilities themselves do not count as AV vulnerabilities.

Perhaps you should actually read the stuff people are asking you to read, because "the AV itself exposes extra vulnerabilities" is literally true and you would be aware of that if you'd even glanced at the linked stuff.

doctorfrog
Mar 14, 2007

Great.

Boris Galerkin posted:

This thread was nice and informal but now it sucks.

Yep.

Trabisnikof
Dec 24, 2005

Paul MaudDib posted:

Well, they can't until they break whatever characteristic the heuristic is looking for.

Lol, this is literally what they do, in an automated fashion against multiple AV systems at once.


People even offer this as SaaS even.

Dex
May 26, 2006

Quintuple x!!!

Would not escrow again.

VERY MISLEADING!
we live in a world where "sleep(30)" is enough to bypass a lot of av's attempts at sandboxing, yet that kid who had malwarebytes on a usb stick at school still thinks heuristics is a magic spell

paul misspelled reference, your name is a boring word, please stop

Thanks Ants
May 21, 2004

#essereFerrari


We run AV because one client requires the "has antivirus" box ticked if you want to do business with them, and lying about it was probably a step too far.

Daman
Oct 28, 2011
what's the problem with using AV on idiot computers to quell the flow of blackshades/darkcomet hackforums trojans they try to run. really. it's known that users can't be taught. extremely common trojans like these don't crypt their on disk persistence and they'd be swept up because of this.

it exposes them to LPE occasionally but it's not like malware authors are trying to implement that for specific AV vendors when UAC bypasses are way more public and easy.

yeah the point I've heard is "users will disable AV just to run it" but that's less the case if they remember uncle jimmy saying that's how they get you. even if they do, hey, maybe they don't next time after you DBAN their poo poo.

for idiots it seems like the cost is some LPE issues that nobody's going to give a gently caress about trying to exploit on random idiots while the gain is not being infected by xxxDarkSlayer666xxx but instead someone who put effort into crypting and keeping their botnet in memory w registry persistence. it's better for an idiot to be infected by a professional with a moneymaking agenda than a teenager who just wants to gently caress with ppl tbh

Antillie
Mar 14, 2015

I haven't run AV on my personal machines for about 4 years and have not had any problems. Mostly because in the previous 12 it only ever caught two things. Both of those were direct results of me doing things that I knew full well I shouldn't have been doing. In my experience AV is slow, costs money I would rather spend elsewhere (only $35 for one year of Kaspersky on three machines, but still), and doesn't provide much actual protection. Not being an idiot is far more useful for the security of your machine than any AV ever will be.

Antillie fucked around with this message at 14:28 on May 2, 2016

Wiggly Wayne DDS
Sep 11, 2010



If you've not paid attention to AV vulns lately we're pointing at zero interaction pre-auth rces to system - not lpes. That or destroying any concept of cert validity. Worse than the disease.

Dex
May 26, 2006

Quintuple x!!!

Would not escrow again.

VERY MISLEADING!

Daman posted:

yeah the point I've heard is "users will disable AV just to run it" but that's less the case if they remember uncle jimmy saying that's how they get you.

uncle jimmy should just tell people to install their software updates

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Wiggly Wayne DDS posted:

If you've not paid attention to AV vulns lately we're pointing at zero interaction pre-auth rces to system - not lpes. That or destroying any concept of cert validity. Worse than the disease.

Yeah. Like just look at this list of really loving dumb vulnerabilities:

Remote debugger in TrendMicro left enabled
Comodo forwards to non-mutable API calls on the host
Comodo disables aspects of Chrome's sandbox
TrendMicro has RCE problems
Kaspersky buffer overflow

And these are just a random sampling of vulnerabilities from that Project Zero page.

Or you can see Tavis' Sophail presentation from 2011, which covers issues like XSS in the web protection module amongst others. This presentation is really what started the rabbit hole for him to go down on how loving dumb AV is designed.

And lastly we have a bug for Symantec coming our way.

Wells
Sep 21, 2008

THIS IS A BIZ!!!
Lipstick Apathy
my takeaway is that if you sell a product with the promise of security and it actually makes your computer less secure, it's not worth it if all it does it catch "the low hanging fruit". (if it even does that)

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork
Fun Shoe

Wells posted:

my takeaway is that if you sell a product with the promise of security and it actually makes your computer less secure, it's not worth it if all it does it catch "the low hanging fruit". (if it even does that)

the vendor's literal job is to sell you a product, and they do that by giving you numbers that make you feel all warm and fuzzy but don't really have much of a basis in reality

if the vendor doesn't sell you a product, they don't get paid

Wells
Sep 21, 2008

THIS IS A BIZ!!!
Lipstick Apathy
sorry, I'm dumb and meant "buy" instead of "sell". the thing you said is 100% correct

e: though the context I was thinking of it wasn't corporate/business, it was w/r/t the idiot family member person. but I guess the same thing applies though to all endpoint consumers of antivirus- if you give them some AV, they're going to be emboldened to open up stupid junk attachments because they think they are being protected. even if the av catches some of them, it won't get all of them. the only real solution is education, but I imagine that's a shitshow too.

Wells fucked around with this message at 15:46 on May 2, 2016

Adbot
ADBOT LOVES YOU

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork
Fun Shoe
the focus has 100% shifted from recommending antivirus to recommending adblockers and the like because, as has been said over and over and over again, there's way too much poo poo for even the best antivirus to catch nowadays

"you are your own adversary" is completely true, the worst threat to your security is your own activities

AV will catch the relatively benign stuff, like adware, but the poo poo that you actually need to be concerned about is a whole hell of a lot harder to catch

i would recommend reading the talos blog (shameless plug) because there's a lot of insanely cool poo poo in there about how modern malware works, and the efforts to detect and block it

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply