antimalware_software
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
antimalware_software [2025/08/26 15:51] – ultracomfy | antimalware_software [2025/08/30 16:26] (current) – ultracomfy | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | Information Technology/ | + | <WRAP column right 18%> |
+ | {{page> | ||
+ | </ | ||
+ | ~~Title: | ||
+ | <WRAP centeralign> | ||
+ | <fs xx-large> | ||
- | An antimalware program is a type of software used in the detection of and defense against malicious programs and exploits. Electronic devices can store all kinds of data, most importantly login credentials, | + | An antimalware program is a type of software used in the detection of and defense against malicious programs and exploits. |
+ | |||
+ | Electronic devices can store all kinds of data, most importantly login credentials, | ||
Most commonly, this is done through software, which is then called " | Most commonly, this is done through software, which is then called " | ||
- | ############################## | + | ====== |
- | ################### | + | ===== 0. Basics |
In general, the objective of an antivirus is to (1) prevent malicious code from ever executing on your system in the first place or, failing that, to (2) terminate a process if it is deemed to be malicious. | In general, the objective of an antivirus is to (1) prevent malicious code from ever executing on your system in the first place or, failing that, to (2) terminate a process if it is deemed to be malicious. | ||
- | ################### | + | ===== 1. Signature Detection |
- | Files are identifiable. With fancy mathematics, | + | Files are identifiable. With fancy mathematics, |
From here on, your life is simple. If someone gets infected, they call you and say "hey, we got infected by something, we don't know what", you find the source of the infection, you determine the signature of the file, add it to your list and with the next hourly " | From here on, your life is simple. If someone gets infected, they call you and say "hey, we got infected by something, we don't know what", you find the source of the infection, you determine the signature of the file, add it to your list and with the next hourly " | ||
Line 25: | Line 32: | ||
Critics will harp on and on about " | Critics will harp on and on about " | ||
- | ################### | + | ===== 2. Static Analysis |
Back to the start. We are an antivirus product. We are trying to protect the user from malicious code. The user is attempting to open a program. We stopped that attempt for now, because before we let a program execute we want to make sure that it is safe. So, the first thing we did was to run the program against our signatures. That test comes back negative. Well, cool, this means that we haven' | Back to the start. We are an antivirus product. We are trying to protect the user from malicious code. The user is attempting to open a program. We stopped that attempt for now, because before we let a program execute we want to make sure that it is safe. So, the first thing we did was to run the program against our signatures. That test comes back negative. Well, cool, this means that we haven' | ||
Line 35: | Line 42: | ||
The advantage to this approach is that it can get a pretty good insight into what a program may do without loading it into memory yet. This is critical because conventional malware can remain dormant on disk without causing harm; it is when it is loaded into memory (be it through the user executing it, or because of a scheduled task or through an autorun entry) that it starts doing malicious things. Analysing software without loading it into memory lets us look at the program without worrying too much. | The advantage to this approach is that it can get a pretty good insight into what a program may do without loading it into memory yet. This is critical because conventional malware can remain dormant on disk without causing harm; it is when it is loaded into memory (be it through the user executing it, or because of a scheduled task or through an autorun entry) that it starts doing malicious things. Analysing software without loading it into memory lets us look at the program without worrying too much. | ||
- | ################### | + | ===== 3. Sandboxing |
In cybersecurity terms, a sandbox refers to a protected virtual environment segmented off from the rest of the system, filled with all the sand imaginable but, ultimately, constrained to the sandbox. The box part here is the important part, as it means that nothing from inside that box can get out. Critically, this means a sandboxed program cannot access your data. This makes it perfect as a testing ground - throw a software sample in there and let it do its thing. Observe its behavior. Does it do anything scary? | In cybersecurity terms, a sandbox refers to a protected virtual environment segmented off from the rest of the system, filled with all the sand imaginable but, ultimately, constrained to the sandbox. The box part here is the important part, as it means that nothing from inside that box can get out. Critically, this means a sandboxed program cannot access your data. This makes it perfect as a testing ground - throw a software sample in there and let it do its thing. Observe its behavior. Does it do anything scary? | ||
Line 47: | Line 54: | ||
The cool thing about sandboxing, though, is that it too is able to independently identify malware, even if sample wasn't previously known. | The cool thing about sandboxing, though, is that it too is able to independently identify malware, even if sample wasn't previously known. | ||
- | ################### | + | ===== 4. Behavioral Detection |
Behavioral detection is what truly distinguishes good products from terrible ones. It is, however, also the hardest to get right, if you get it working at all. Of course we as humans don't care about cybersecurity in terms of software or code. As a company, you don't want internal documents to be exfiltrated to a hacker group - what you want is a system that can stop //that//, not just " | Behavioral detection is what truly distinguishes good products from terrible ones. It is, however, also the hardest to get right, if you get it working at all. Of course we as humans don't care about cybersecurity in terms of software or code. As a company, you don't want internal documents to be exfiltrated to a hacker group - what you want is a system that can stop //that//, not just " | ||
Line 54: | Line 61: | ||
The cool thing about behavioral detection is that it works entirely independently and does not discriminate. Even the most trusted corporation on the planet might one day get hacked and publish a malicious update that will harm your computer/ | The cool thing about behavioral detection is that it works entirely independently and does not discriminate. Even the most trusted corporation on the planet might one day get hacked and publish a malicious update that will harm your computer/ | ||
- | The advantage of this approach is that, regardless of whatever program you throw at it - known or not, popular or not, new or not, published by a trusted source or not, system online or not, downloaded from a shady website or not, ran from an unknown USB drive or not - behavioral detection can spot them all (while non-malicious programs are fine). Additionally, | + | The advantage of this approach is that, regardless of whatever program you throw at it - known or not, popular or not, new or not, published by a trusted source or not, system online or not, downloaded from a shady website or not, ran from an unknown USB drive or not - behavioral detection can spot them all (while non-malicious programs are fine). Additionally, |
The downside is that behavioral detection is //hard//. To understand which system operations exactly are // | The downside is that behavioral detection is //hard//. To understand which system operations exactly are // | ||
- | ################### | + | ====== How protection doesn' |
- | Common sense. | + | ===== 1. Common Sense ===== |
+ | Common sense is the single most frequent advice that can be found on the internet. And it's true - human judgement can be a good and sometimes even the most effective layer of protection against threats of all kind. But.. who doesn' | ||
+ | |||
+ | With heavy and potentially dangerous machines, operator training and safe handling standards are one half of the equation. The other half sits in the design department with skilled and knowledgeable people who recognize that even the most knowledgeable and experienced operator will make a mistake. Just a lapse of judgement. A brief moment of distraction, | ||
+ | |||
+ | As I said, proper education and training //are// a crucial part of protecting users from cybersecurity | ||
+ | |||
+ | Risk management, a proper science that would //never// even //think// about suggesting something as ridiculous as this, is about minimizing risks at every stage of the process - at the human level, sure, but also at the mechanical level. That's why 50% of the resources of product design go into researching how humans could possibly fuck up using the product, and then minimizing the ways in which it can happen in the first place or how to minimize the potential damage. | ||
+ | |||
+ | And that still doesn’t cover risks beyond your control. Supply chain attacks, insecure devices on your network, careless family members, colleagues, or even vendors whose own security might be weak—all are threats you cannot fix with judgment alone. The digital landscape has countless entry points far beyond simply “not downloading shady files", | ||
+ | |||
+ | ===== 2. What not to rely on: Windows Defender? ===== | ||
+ | There is a pervasive myth that common sense plus Windows Defender are enough to keep you safe. Or that Windows Defender is as safe or safer than other products on the market. Obviously, " | ||
+ | |||
+ | Maybe. In fact, that’s the setup I personally rely on. But the problem is that common | ||
+ | |||
+ | For years, Defender was a failure. The most basic job of antivirus is keeping a signature list of known malware. Any serious product should ace this by default. Defender didn’t. It consistently missed well-known, widely publicized malware, including samples that were years old. Tests showed detection rates around 40%-60%, while products like Kaspersky or Bitdefender hit 98%. Despite that, people insisted Defender was “good enough", | ||
+ | |||
+ | Now, Defender has improved. It finally catches the obvious malware, its detection rates have climbed to around 95%, and it’s become a passable baseline product. Ironically, this means that people who were wrong for years are now accidentally right, but for the wrong reasons. Their logic hasn’t improved - the facts just shifted closer to their narrative. | ||
+ | |||
+ | Even so, Defender still has major shortcomings. Its scanning is largely signature-based, |
antimalware_software.1756216310.txt.gz · Last modified: 2025/08/26 15:51 by ultracomfy