Why Popular Anti-Virus Apps 'Don't Work' 375
Avantare writes "ZDNet Australia has a writeup about why AV apps don't work. The reason given is because the malware authors are writing code that will get around the signatures of the application by testing their code on the most popular anti-virus software before release." This comes as a follow up to another article detailing the sad state of anti-virus software currently on the market.
Re:Kaspersky? (Score:3, Informative)
Mac AV Software (Score:1, Informative)
What I do (Score:4, Informative)
Re:No S**t (Score:5, Informative)
At least people are starting to realize this.
As for myself, I used to use Symantec's antivirus software both at home and at work, but a year ago decided it just wasn't worth it. The program was the most obscene resource hogs I've ever had the displeasure to use, and in the 7+ years of using the program it never once protected me from getting a virus. The same can be said for a lot of other AV offerings, and yet you still see some idiots suggesting you run 2-4 different AV applications just to "be sure you're safe".
Once people realize that the single best and most effective method of protecting themselves is common sense, they will be a lot better off. If you don't download from untrusted sources, don't click banners, don't install just any (activeX|extensions), and keep your machine patched, you'll be fine (YMMV of course).
The problem is that while people can buy Symantec's latest breakthrough in keeping your processor occupied, they cannot buy common sense.
Re:Signature-based recognition was doomed (Score:3, Informative)
More than ten years ago, before windows 95, and most people were using DOS and DOS virus scanners, I had someone (comparable to a modern day script-kiddie) from my high school ask me to scan a disk to see if the viruses he had on there were detected. Even then he knew if the popular virus scanners of the day couldn't detect them, that he could potentially use them. It was then I realized that virus scanners were a joke and never have used those crappy bloated active scanners since. I don't think any virus scanners ever had a good run because the average kid back in the day knew they could be fooled.
Re:Anti-virus Programs Aren't Up to Snuff (Score:4, Informative)
In my experience, Symantec software is worse... (Score:5, Informative)
You didn't mention the bugginess.
Safer link to Systrace (Score:3, Informative)
Re:And they are both wrong. (Score:4, Informative)
The problem here is that virus don't typically exploit any hole. They are simply programs that run with the privileges of the user who executes them.
A typical (old school) virus would do three things:
There are only two things you can do to protect against this, in general:
In Windows it is the second issue which allows viruses to spread - typically the local user would have write access to the system binaries, so eventually Notepad.exe would get infected, etc. Under Linux/Unix root generally is the only person who can write to system binaries, so a typical user can't infect them.
However Linux viruses do exist, and are trivial to write. The reason they don't spread is partly because users are used to getting their binaries from trusted sources, partly because they download things from source, and partly because most users don't run with the ability to modify system files. (Sure you might be able to infect ~/bin - but there isn't a big gain)
Windows is getting better at allowing non-Administrators to work properly, so sooner or later the ability of joe-random-desktop user to modify system binaries will disapear and at that point viruss will stop. Still there will be worms, trojans, and all the other nasties left!
I've gone on a bit much, but I wanted to drive the point home : Viruses do not exploit security holes. (In general)
I Tell My Clients the Following (Score:5, Informative)
1) You're not a company that gets thousands of virus-laden emails a day. You don't need to pay for Norton or McAfee. A 98-99% detection rate is perfectly adequate for a home user.
2) Install AVG or Avast AV. They're free, they update automatically, they're light on resources and they work.
3) Install Spybot Search and Destroy, SpywareBlaster, Ad-Aware and Windows Defender.
4) Install a software firewall like Kerio or just use Windows XP's firewall. If you install Kerio, use V2.1.5 because it's non-intrusive. The later versions are too picky and get in your face.
5) Stop using IE and use Firefox.
6) Lately, since trojans are on the upswing, I say install A-Squared anti-trojan which is free with manual updates.
7) Don't click on popups. Don't even click on the "No" button - click the window close button.
8) Don't install anything offered you by a Web site unless the site is a general freeware or shareware site that explicitly states it checks for spyware and adware.
9) Keep up with Windows updates and updates for the malware detector software.
10) Run a scan once a week or if you see any popups at all.
I've used these rules on Windows 98, 2000 and XP for four years with virtually NO spyware getting through - and that's with porn site visits and whatever else the Web can throw at me.
The single most important rule is number 5 - use Firefox. With no ActiveX, the stuff can't get in unless you have an OS vulnerability or you deliberate install it in response to a prompt you don't understand.
Finally, if they really want to be secure, switch to Mac or Linux.
Re:Just follow a few basic steps... (Score:5, Informative)
Remove administrative priviledges from your everyday account.
Keep your software and OS updated.
Do not run software with a bad security record.
MOD PARENT DOWN. Bad Link. (Score:4, Informative)
Official Clam Anti-Virus for Windows link: ClamWin [clamwin.com]. ClamWin is free and excellent, but slower at scanning than commercial products, in my experience.
Re:But... (Score:3, Informative)
The codebase between variants can easily be changed to the point where heuristics & previous def files will not recognize it.
It's worse with a (encrypted) polymorphic virus, because those are hard enough for the anti-virus guys to decode the morphing bits without various blackhats tweaking the virus/morph/encryption code and re-releasing the virus.
Re:Just follow a few basic steps... (Score:1, Informative)
1. Use the Portable Version of Firefox. It dosen't cache off to disk and cleans up user history when you close the app.
2. Use a reputable firewall. I have the latest version off ZoneAlarm and the default controls allow the user to specify what gets in or out.
3. Use a reputable AV. I have the latest version of AVG and its pretty good at staying upto date and scans quite often.
4. Use a reputable Anti-Spyware program. I have the latest version of Ad-Aware SE and it picks up stuff that ZA and AVG miss as well as spyware.
5. Get iolo's System Mechanic. It can prevent hackers from hacking and finding stuff on your drive by encrypting the free space, deleted file name, and data by overwriting those area's per U.S. DOD encrypting standards. It also cleans out your digital history of where you've been and what you've opened.
6. Use common sense. If you close pop-ups by closeing them on the toolbar at the bottom of the screen instead of clicking close on the window you'll save yourself headaches (quite a few pop-ups use PINP format so that it opens when you try click the X to close it).
Linux is not a silver bullet. (Score:5, Informative)
* Delete files
* Read confidential files from that one user (a typical computer might only have 1 or 2 users)
* Send out spam
* Install a keylogger
* Read the users contact list and forward itself to all users on that list.
* Install itself to start up with user priveleges when the computer boots (by modifying the users configuration files)
* Pretty much anything...
However having separate users does limit the damage and it makes it a lot easier to clean up since no executable files are affected, root should be safe, and the system should still be stable and consistent once the virus is removed. (This is not true if the virus has gained root priveleges, and really you should assume that it has, if you really want to be safe).
Much of the security of Linux comes from:
* The peer review process.
* The speed that the most serious holes are patched and the ease of applying these patches on most distribution.
* Vulnerable services are not usually open to attack after a default install.
* 'Biodiversity' - an attack against a specific application will not affect all users.
* New install media with latest bug fixes issued regularly and easy to obtain.
* Large amounts of software is available from the distribution repository so you don't need to download and run installers from third-party web pages.
* Smaller market share gives attackers less incentive to attack.
I'm not saying that ALL software for Linux is secure, and that ALL distributions respond promptly to security vulnerabilities, but it is possible to be reasonably secure if you choose the right vendor and don't be stupid by installing random screensavers from dodgy websites.
Re:Did I miss something? (Score:4, Informative)
At the rate things are going, article writers won't even bother with the body of the story any more, it will just be a title and ads.
Re:Linux is not a silver bullet. (Score:2, Informative)
* Install itself to start up with user privileges when the user logs in after a reboot (by modifying the users configuration files)
Also, cron jobs would make it so the user doesn't have to log in.
Re:What is Anti Virus? (Score:2, Informative)
Re:The AV app would tell him (Score:4, Informative)
This is an excellent question. Mostly, you notice a well-hidden rootkit by using tcpdump on some other machine to sniff all of the traffic from the suspect machine [1], and then concentrate on stuff that's not local to your subnet.
If you don't have a user on the machine running a chat program, seeing traffic to or from the IRC port, 6667, tends to be a very common sign that the machine is giving or receiving orders as part of a botnet. Forcing the machine to do all web access via a proxy and then checking the proxy logs after a day or two also tends to be revealing.
[1]: This should be done where both machines are connected on the same hub, or perhaps using the "monitor" or "span" port that newer intelligent switches have for diagnostic testing.