Kaspersky Lab has defended its handling of a controversial experiment criticised by some as a marketing exercise of questionable technical value. The Russian anti-virus firm created 20 innocent executable files, adding fake malware detections for ten of the sample, before uploading the files to online online malware scanning …
A great leap forward
If anyone is using "Clod-based" detection methods then we have a real problem in the security industry!
Think of it like spaghetti - chuck some at a wall and see what sticks.
Surely that's the definition of pen testing?
Of course, the clod would be best distributed by the use of a rotating air movement device.
You can finish the joke for yourself.
I'd like to know who was the 14 antivirus publishers that updated their signatures with the fake detection. Once I know, I can completely avoid them ones, because they clearly are not checking the files themselves.
Given the large number of variants that all these products claim to detect, and the small number of people with the experience to determine what they do, I'd say it was odds on that none of the publishers fully check all the files that they block.
Excellent advice, though. Since they *aren't* checking, and since new variants are arriving faster than the update cycle, all AV products are broken by design. To secure your system, you have to stop executing untrusted code. That means switching off the "user-friendly" features in your browser and email client, and forcing less-expert users to use less trusted accounts. AV software's "post-infection detection" simply doesn't have a role to play here, so if you think you need AV then you've completely mis-understood the problem and probably already lost the battle.
Isn't this some kind of record? Rentagob Cluely isn't pontificating about this, and it's less tenuously related to his employer's business than usual even...
KAV is still the best, would never trust anything else.
Regardless of how you look at it ...
Muddying the waters doesn't help.
Unless you're tickling trout, or noodling catfish, that is ;-)
I "reported" a file KVM.EXE (I think) on my PC to F-Secure, which claimed (DeepGuard) to have detected the program fiddling in the Registry and blocked that. But I think the file actually may be an on-screen caps lock indicator and/or function key display for my netbook. That doesn't explain the Registry thing but if I've accidentally made it recognised as a virus worldwide, well, whoops.
F-Secure also objected to the VLC media player's Registry activity, once. Apparently VLC is respectable freeware, although it seems to have attached itself without asking(?) in more places in Windows than I like, i.e. Windows Explorer context menus.
It's a no-win situation
If we implement detection of some sample based solely on the fact that XYZ's scanner detects it, we're being accused of not doing proper analysis and copying other company's detection. If we don't detect the sample because our analysis has shown it is obviously not malicious, it gets into the testes' test sets and our detection rate in the tests is lowered. When we protest, we're being told that "but half a gazillion other products already detect it".
Welcome to the world of anti-virus research, where your only choices are bad ones and worse ones.
"If we don't detect the sample because our analysis has shown it is obviously not malicious"
If it's obviously not malicious, it's not malicious, QED. Flag it as "other vendors report this as malicious, but we believe it safe". There is precedent ... see the EICAR Standard Anti-Virus Test File.
"it gets into the testes' test sets and our detection rate in the tests is lowered"
So the fuck what? The tests are obviously flawed if they are showing false positives.
"When we protest, we're being told that "but half a gazillion other products already detect it"."
Again, so the fuck what? Are you good at AV (malware detection, whatever), or are you good at spinning how you want the media to see you? Pick one, ignore the other, the rest will take care of itself.
"The goal was not to show any problems with VirusTotal or AV [anti-virus] vendors, but to show that AV vendors detecting a sample does not automatically guarantee that it's really malware - simply because false positives can happen, and they duplicate quickly," Kalkuhl told El Reg.
Well, Kaspersky should know all about false positives sib ce their product has produced some of the most damaging false positives in recent years, deleting system files and generally screwing up systems.
Do what's right
Dr Bontchev: surely any ethical third party who tests and comments on your threat-scanner will only use genuine threat software as test samples... or perhaps not? Does a magazine reviewer just take some suspect files from the same repository that was used in this exercise? For that matter, what about cookies? Some scanners do say, "Ugh! You have a cookie on your computer! It can be used to track your use of web sites!" And I genuinely don't understand why that's a problem. So perhaps it isn't.
Doing the right thing.
Actually I reckon that Kaspersky have done us all a favour here. Imagine what fun we would have had if someone with a sense of humour and a malicious streak had figured out this wonderful "how to game the world's AV engines into producing false positives" loophole instead of them?
how would that exactly work? it would have to be a major vendor releasing signature updates to the files, not just "someone with a malicious streak"
sure if you owned kaspersky and had full access to there systems there is alot more dangerous and "fun" things which could be done, like keeping you'r own malware off the radar..
[Random musings] Would it help if...
...the likes of VirusTotal had a mandatory option you had to select when uploading a file:
* I believe this is a suspicious file
* I believe this is a false positive
And if others had submitted the same file (by checksum) you could view the proportion who chose each button? And the AV firms could also see that of course.
Also, it would be nice if Virustotal maintained a distinct list of the filenames submitted for each identical file (by checksum). If they appear random then it's more likely a real infection but if they are all named the same...
Oh, perhaps the volume of hapless users submitting files versus the small number of geeks doing the same would make the above ideas useless?!
Virus scanners have their limits
At best, they can only detect what they're told to detect, or use heuristics to flag something as a possible danger.
That's why I used* Startup Guard. It alerts you when something is trying to install itself, and gives you the option to allow or deny. the program.
*Used, because the last Win machine I had popped its clogs when the motherboard went boom a while back. after years of service.
(Beer Icon, because a faithful old servant, no matter how cranky and temperamental, deserves one last toast.)
A Tit is a tit for awe that!
False positives render a beyond the safety requirement status, whereas, false negatives will really screw up the system. So, better that it thinks a few things are viruses which aren't, than it thinks a few viruses aren't !!
Seems so clear to me that I had to put on dark glasses just to look at it !
Crock 'O Crap
Kaspersky's credibility is now equal to ZERO.
False positive on a program of no value is of no consequence.
- Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
- Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
- Feast your PUNY eyes on highest resolution phone display EVER
- Analysis Oh no, Joe: WinPhone users already griping over 8.1 mega-update
- AMD demos 'Berlin' Opteron, world's first heterogeneous system architecture server chip