Thanks but i am using Voodooshield with avast.
Avast also block this ransomware by FileRepMalware but avast behavior shield is so slow to monitor the ransomware and failed to block it in time.
hi, according to the same test on malwaretips. Avast was bypassed while AVGâs IDP blocked it succesfully
This is the 4th time I have seen this happened
Hey guys,thanks for reporting.We have brought this to the attention of someone responsible for behaviour detection internally.Just like you guys I am curious about this possible issue and improving Avast.
We need some details from you guys right now.Were both avg and Avast were tested in a in working internet connection environment? And were both products tested only with IDP?
Screenshots of both products IDP detecting it and sample hash.
Now remember IDP is no silver bullet it just has multi stage detections so the malware did something at the end that got caught so files getting encrypted is not unusual Avast is always trying to make it better and filerep and Evo gen always are on toes detecting new samples as it did here so we should be protected.
according to what I read from the testers, both were tested with internet connections, under a VPN in VMs:
Avast free: File-Web-Behavior Shields, PUP enabled â blocked | Bonus test: only file shield was disabled â failed to react, no notification, everything was encrypted
AVG internet security: was tested at least 5-6 hours after avast, similar conditions. Default settings, PUP enabled. Blocked almost instantly by IDP and nothing was encrypted
the AVG tester performed a bonus test WITHOUT the internet connection and AVGâs IDP failed to react. As soon as he turned on the internet, IDP blocked it. The 2 testers thought that IDP was cloud-based because of this. Moreover, they noticed, everytime they ran the same samples, they received different numbers from IDP
EDIT: the tester told me this, thank you:
Avast did detect it as Filerep so perhaps it was not analyzed thoroughly as of that time. This could explain why IDP did not get the âcorrectâ answer from cloud or a confirmation of this file being malware.
AVAST: FileRepMalware - IDP did not detect.
AVG: Malware Gen - IDP detected.
Avast: Running the sample with internet connection with cloud enabled = IDP never reacted or reacted late?
AVG : Running the sample with internet connection with cloud enabled = IDP caught the sample immediately?
Itâs also important that both samples were tested near the same time.
Thanks for that. Iâve just asked one of the devs behind the Behaviour Shield. The most likely reason is that the AVG test was conducted 5-6 later.the cloud.
Regarding the behavior shield being dependent on the cloud, that isnât entirely true:
The cloud is just another layer, it checks the cloud for getting info, if the file is clean/bad etc.
The difference of these samples is because of the time between the two tests and that it meanwhile got classified.
Also, the behaviour shield is the last line of defence. Most of the time other mechanism should catch the malware which is why just testing the behaviour shield on itâs own isnât viable.
The tester of AVG told me that he also tested AVG without the internet connection after the sample being blocked by IDP in the previous test. IDP didnât react and everything was encrypted. Then, he turned on the internet and tested it again. IDP worked
Therefore, we agreed that without the internet, IDP wonât work properly
Sure, itâs not. It has itâs own rules and goodies Overall I think this whole thing is kinda overblown in terms of Avast vs AVG (or such). Let me explain my understanding/point of view:
First: The test itself is far from perfect and does not mimic real world scenario.
Avast in my test picked up the samples as FileRepMalware. This (as far as I know) is coming straight from the cloud or classification system(s). I say that because for example Windscribe VPN is blocking cloud access for some strange reasons. So while I did use Windscribe some time ago, detections from right click scan never showed âFileRepâ or similar âcloudâ detections.
Now onto AVGâs case: It was tested ~5 hours later. From the right click scan we can see this same file was now categorized as Malware-Gen - meaning it is deemed as malware and signature was created. So with Web/Behavior Shields on, IDP queried the cloud and since the file was 100% marked as malicious, it gave it random name and quarantined itâŚ? Seems like so.
I donât think Avast devs want to go into details on how their systems work. I donât see a problem - the file was detected correctly in both cases and VM was protected.
However, IDP itself was not able to detect the file via behavior in both cases (in my opinion). So thatâs where Devs need to work on.
That is not true. Without the cloud, you are just missing another layer. If you had the file shield enabled, it would get caught by file shield.
Ofcourse some IDP detections do come from the cloud (most come behaviorally) but that doesnât mean Avast would fail to detect the sample since the File Shield would catch it.
exactly. If there is a new variant of Jaff ransomware and it hasnât been detected by cloud or signatures, avast would be bypassed
Perhaps, hardened mode would be able to stop it but many people donât turn on HM