GTP
Well-Known Member
- Reaction score
- 9,465
- Location
- Adelaide, Australia
Excerpt from Security Now! podcast #636
"The researchers found that at least 34 anti-virus products failed to check the certificate's
validity, allowing malicious code to run on the system.
To determine if malformed signatures can affect the anti-virus detections they downloaded 5
random unsigned ransomware samples that almost all anti-virus programs detected as
malicious. They then took two expired certificates that previously had been used to sign both
legitimate software and in-the-wild malware and used them to sign each of the five ransomware
samples. And they found that many anti-virus products failed to detect the malware as
malicious...."
https://thehackernews.com/2017/11/malware-digital-certificate.html
Dan Goodin lists some of the AV's that failed here.
https://arstechnica.com/information...are-flourished-before-stuxnet-and-still-does/
@Emsisoft @UmbraEmsisoft how does Emsisoft handle this?
"The researchers found that at least 34 anti-virus products failed to check the certificate's
validity, allowing malicious code to run on the system.
To determine if malformed signatures can affect the anti-virus detections they downloaded 5
random unsigned ransomware samples that almost all anti-virus programs detected as
malicious. They then took two expired certificates that previously had been used to sign both
legitimate software and in-the-wild malware and used them to sign each of the five ransomware
samples. And they found that many anti-virus products failed to detect the malware as
malicious...."
https://thehackernews.com/2017/11/malware-digital-certificate.html
Dan Goodin lists some of the AV's that failed here.
https://arstechnica.com/information...are-flourished-before-stuxnet-and-still-does/
@Emsisoft @UmbraEmsisoft how does Emsisoft handle this?