Malware beats Windows Defender: How you get hacked

Sdílet
Vložit
  • čas přidán 15. 01. 2024
  • Password stealer malware has been on the rise since last year, and these infostealers are consistently good at bypassing or beating Windows Defender. In this video I demonstrate one I received via email vs Windows Defender and talk about how your stolen data is used on the dark web.
    Search the dark web to see what hackers know about you with today's sponsor: hi.flare.io/pcsecuritychannel...
    Buy the best antivirus: thepcsecuritychannel.com/best...
    Join the discussion on Discord: discord.tpsc.tech/
    Get your business endpoints tested by us: tpsc.tech/
    Contact us for business: thepcsecuritychannel.com/contact
  • Věda a technologie

Komentáře • 598

  • @patagum8289
    @patagum8289 Před 4 měsíci +368

    I could have sworn I've seen something like this before, but instead of a sponsorship, it was for discord game testing scams. Insane how widespread it's getting.

    • @Haorelian
      @Haorelian Před 4 měsíci

      Honestly, fell for one of those "Discord Game Testing" scams. Tried running the so-called "game," got hit with an error. Took me two days to realize it, checked all my accounts-no login, no spammy ads or malware. Lucky break, but still had to force logout and change all passwords. Lesson learned: steer clear of these scams, folks. A momentary lapse can lead to a world of trouble.

    • @user-jm8sy5ox2j
      @user-jm8sy5ox2j Před 4 měsíci +35

      Discord game sponsorships are different, they wanted you to run an actual exe which predictably gives you malware

    • @fireninja8250
      @fireninja8250 Před 4 měsíci +4

      So I shouldn't advertise my game on discord?

    • @farhanrejwan
      @farhanrejwan Před 4 měsíci +11

      @@fireninja8250 perhaps you still can, just don't ask them to run an exe file right away, or at least tell them to do the testings in a virtual machine.

    • @dsfs17987
      @dsfs17987 Před 4 měsíci

      what is insane that people will trust some random emails, not catch up on the weird email addresses, then download zip files, unzip them, and run additional programs requiring passwords - THAT is amazing, I mean - this isn't rm -rf and enter, there are red flags all through out that whole email convo, and still people fall for that crap

  • @AllExistence
    @AllExistence Před 4 měsíci +149

    Listen guys, never ever run or open any files that are password protected. There is almost no reason to encrypt stuff like that other than malware or personal data.

    • @liforra
      @liforra Před 4 měsíci +9

      Except if its expected to trigger antiviruses, like pirated software would

    • @AllExistence
      @AllExistence Před 4 měsíci

      @@liforra Unless you antivirus triggers at hacktools, or keygens, it's probably for a good reason.

    • @fraznofire2508
      @fraznofire2508 Před 4 měsíci +9

      @@liforra pirated software does not mean you should interact with it. Pirated content is infected more often than not

    • @liforra
      @liforra Před 4 měsíci

      @@fraznofire2508 honestly that is incorrect, i do actuallx pirate software and honestly, as long as youre a bit careful its really not that bad, but dont open isos those are suspicious because thexre usually not used as archive

    • @gizmowizard352
      @gizmowizard352 Před 4 měsíci

      As a experienced hacker, I must say that never ever open any file without checking with a reliable AV(not including Windows Defender).Even if it looks a like a legit Microsoft Windows file, still check it.We learnt that lesson with NoEscape.exe, which looks like Windows Defender itself.

  • @skyesky0
    @skyesky0 Před 4 měsíci +335

    "My operating system is TempleOS"

    • @tonnentonie2767
      @tonnentonie2767 Před 4 měsíci +1

      Can't hack the oracle

    • @wernerviehhauser94
      @wernerviehhauser94 Před 4 měsíci +8

      GEOS 2.0

    • @n0tjak
      @n0tjak Před 4 měsíci +4

      linux is more than enough

    • @wernerviehhauser94
      @wernerviehhauser94 Před 4 měsíci +34

      @@n0tjak I would argue that you haven't really understood the video. It is very likely that they also have a payload for Linux, which would be pretty easy to generate since the user is effectively executing it, Linux trusts the user (mostly) and there are less defense mechanisms on Linux against this type of attack (since it was increadibly rare in the past)

    • @n0tjak
      @n0tjak Před 4 měsíci +3

      @@wernerviehhauser94 true

  • @markusTegelane
    @markusTegelane Před 4 měsíci +189

    This is why we should always right click on a downloaded file and see properties to confirm that a file is what it claims to be (e.g. a PDF shouldn't be identified as an executable program)

    • @youdontneedmyrealname
      @youdontneedmyrealname Před 4 měsíci +121

      Show file extensions should be on by default.

    • @raylopez99
      @raylopez99 Před 4 měsíci +36

      And don't enter a "password" to "unlock" a file.

    • @youdontneedmyrealname
      @youdontneedmyrealname Před 4 měsíci +44

      @@raylopez99 password protect files are actually quite common. You just REALLY need to know where it's coming from, and best case scenario is you can open and edit it in a secure virtual environment.

    • @raylopez99
      @raylopez99 Před 4 měsíci +14

      ​@@youdontneedmyrealname Yeah I've played around with type 2 virtual environments but I've never had a legitimate password protected file sent to me for business, and I've worked in Silicon Valley on multi-billion dollar deals back in the days (90s and 00s). Maybe it's different now, I dunno I'm retired.

    • @youdontneedmyrealname
      @youdontneedmyrealname Před 4 měsíci

      @@raylopez99 I work with medical records in my industry so encryption is a requirement for HIPAA compliance.

  • @nezu_cc
    @nezu_cc Před 4 měsíci +75

    this is a very effective way to get around not only Defender but also all the other sandbox-based solutions because what it effectively does is use the password you type in as the decryption key. Many sandboxes will try to interact with UI elements so a simple message box is not enough but asking for user input is because no sandbox out there will know the password. And the reason why it doesn't trip afterward is that defender does the bulk of its scanning before the file is run with only minimal heuristics at runtime.

    • @wannabedal-adx458
      @wannabedal-adx458 Před 4 měsíci

      But if you open this file in a sandbox, won't that still protect your system? Isn't that the purpose of a sandbox?

    • @nezu_cc
      @nezu_cc Před 4 měsíci +2

      @@wannabedal-adx458 I'm not talking about the sandboxes that a user might use (like sandboxie), I'm talking about the automated malware analysts sandboxes that run the sample in a clean VM each time and record everything the sample is doing (like cape sandbox).

  • @Sherin974
    @Sherin974 Před 4 měsíci +90

    It seems pretty crazy that a recently downloaded application doing a specific action like, grab session tokens, wouldn't alert ~something~. I understand(glad even) them not scanning a file with a password but I can't think of many things that would do that specific action.

    • @mollthecoder
      @mollthecoder Před 4 měsíci +11

      There's legit reasons for this, like if you're changing browsers and use its "import browser data" functionality. Although I do agree that there should be more in place to prevent these, it is a very fine line with high stakes, that must be tread carefully.

    • @theoldtruth1196
      @theoldtruth1196 Před 4 měsíci +1

      Indeed. I wonder why windows didn't say anything at all about running the unknown .exe?

    • @niccis1982
      @niccis1982 Před 4 měsíci +4

      @@theoldtruth1196 because it's not using administrator rights thus not requiring an Okay by the user and also not a certificate to show it's from a reputable source.

    • @erikkonstas
      @erikkonstas Před 4 měsíci

      ​@@niccis1982They're talking about SmartScreen, not UAC.

    • @gabrielandy9272
      @gabrielandy9272 Před 4 měsíci

      don't the passwords are stored incrypted by some form? i understand cookies being not, but hmm?

  • @SkoomaChugger
    @SkoomaChugger Před 4 měsíci +137

    this stuff really scares me cuz of how many older folks fall for this

    • @Pektar135
      @Pektar135 Před 4 měsíci +15

      That’s why I installed Kaspersky on the pc from my grandmother

    • @freen1364
      @freen1364 Před 4 měsíci +10

      So do kids

    • @nezu_cc
      @nezu_cc Před 4 měsíci +22

      older? I know people from almost every age group that have a high chance of falling for this and a lot of other seemingly easy to spot scams and malware. Not everyone is chronically online.

    • @ponponpatapon9670
      @ponponpatapon9670 Před 4 měsíci

      @@nezu_cc true, only being chronically online can you spot malware hehe

    • @SkoomaChugger
      @SkoomaChugger Před 4 měsíci +3

      @@nezu_cc obviously dr obvious but older folks fall for way more often than anybody else

  • @NicolasDominique
    @NicolasDominique Před 4 měsíci +12

    I had such e-mails with the fake sponsorship. And I always wondered how it even works.
    Thanks for showing me that.

  • @Lupinicus1664
    @Lupinicus1664 Před 4 měsíci +13

    Good, clear information. Very helpful. Glad you stressed that Defender will not protect you completely (in fact no software will) and that you need 'situational awareness'.

  • @javiTests
    @javiTests Před 4 měsíci +20

    I've seen a few CZcams channels that have been hacked with this method. I guess the best way of protecting against this is to never log in to CZcams studio in the same computer that one uses to read the emails. Maybe a simple VM is enough, but definitely we need to be aware of these attacks.

  • @the_2663
    @the_2663 Před 4 měsíci +4

    Thank you so much for your unbiased content. Please keep up the good work.

  • @tiagoferreira086
    @tiagoferreira086 Před 4 měsíci +30

    Oh man how much i laugh when you said that the criminals are discussing about win11 being spyware and don't like competition 🤣🤣🤣 that's absolutely hilarious

  • @takuminightcore1886
    @takuminightcore1886 Před 4 měsíci +6

    Appreciate the info I’m just curious will you be making an updated video of the best antivirus that you can get or has that not been changed since 2023 because I’m kind of curious to get an unbiased rating again instead of just going to some other places that they might be biasedespecially with free antivirus would be awesome too

  • @UtherV
    @UtherV Před 4 měsíci +8

    Thanks for the concise but insightful video!
    Would it be possible to do an analysis of how this same scenario would play when passwords are behind browser's protections (Edge's Windows Hello or Firefox's Master Password) or when using Passkeys? Thanks!

    • @anywaytechreview
      @anywaytechreview Před 4 měsíci

      edge has windows hello?
      you mean to say microsoft edge wallet?
      windows hello is a windows feature not a microsoft edge feature

    • @defnotatroll
      @defnotatroll Před 4 měsíci +2

      @@anywaytechreview they mean that edge asks you to login using windows hello to reveal passwords

  • @jayzed2000
    @jayzed2000 Před 4 měsíci

    Hello there, I just watched the video and you said there's no reputation check in Windows Defender. However, there is a feature called Smart App Control which does rely on reputation. This could be avoided by having this feature enabled, right?

  • @user-jy6zg4ru1r
    @user-jy6zg4ru1r Před 4 měsíci

    what sandbox product do you use to run the malware tests ? do you use VirtualBox with a host adapter?

  • @PGW90RU14
    @PGW90RU14 Před 4 měsíci

    I don't know about the recent OS implementation. I guess that decryption and code execution are separate processes so anti-malware can intercept execution of the decrypted code. Is it right? If I remember correctly, code pages are RO (read-only) so, self-modified code became unusable at the some point of OS development (table jump style coding was also affected for a while).

  • @EADYT
    @EADYT Před 4 měsíci +10

    I wonder, did other AVs caught it? I mean, Bitdefender/Kaspersky/ESET and such, using their behavioral model and other real time protection modules?

    • @FJB-bl8xg
      @FJB-bl8xg Před 4 měsíci +2

      Intune Windows Defender will block it with ASR Attack Surface Reduction.

  • @nathanwildthorn6919
    @nathanwildthorn6919 Před 4 měsíci +4

    Great, _great_ video, Leo! 😊 Which (single) anti-malware anti-virus app would you recommend for use with Windows Defender?

    • @nathanwildthorn6919
      @nathanwildthorn6919 Před 4 měsíci

      @XenoD2 Indeed, it does !

    • @LoySevilla
      @LoySevilla Před 4 měsíci

      ​@@XenoD2to my knowledge win defender will turn off win you install MB

  • @FadedKai
    @FadedKai Před 4 měsíci +12

    First red flag was the Email it was set from.

    • @kbhasi
      @kbhasi Před 4 měsíci +2

      Some e-mail clients, particularly those made for mobile OSes (like iOS and Android) hide the sender e-mail address in order to provide what their UI/UX designers would see as a clean UI. However, many people who aren't tech-savvy, like my parents, wouldn't notice that it's possible to tap a not-so-obvious down arrow or the round profile picture to reveal the full e-mail address.

  • @jeremygeorgia4943
    @jeremygeorgia4943 Před 2 měsíci +1

    How exactly does the file work? What does it do? Is there any way to detect it? Is it a PDF, or does it have multiple extensions? I typically ignore attachments, unless I absolutely know who sent the attachment and why. However, if I happen to have any weird PDF's on my system, I'd like to know about them. I don't have any password protected ones. I'm pretty sure about that.

  • @alveera3610
    @alveera3610 Před 4 měsíci +1

    PC security channel, do you recommend adding another antivirus software to wins antivirus system like $Norton or kapersky free edition?? Thanks for this info, look forward to your future videos! Now subscribed 👍🏼 Thanks again 💯

  • @bluecrest9762
    @bluecrest9762 Před 4 měsíci +26

    This video makes it seem like you're discrediting Windows Defender, but you didn't really show whether other antiviruses can catch this thing. Code obfuscation techniques can disguise malware signatures, allowing them to evade some antivirus detection. You showed Norton giving a generic warning, but that's not the same as detecting the actual threat. It'd be good to see how some other antivirus programs handle this - does it sneak past them too? Maybe it's an issue for more than just Windows Defender. No antivirus is perfect, so comparing a few could give people a better idea of how hard this kind of attack is to catch.

    • @Bouwer2100
      @Bouwer2100 Před 4 měsíci +5

      basically this

    • @tablettablete186
      @tablettablete186 Před 4 měsíci +5

      Finally, someone with critical thinking

    • @OhHeyItsShan
      @OhHeyItsShan Před 4 měsíci +1

      Thank you! He also spotted the email header was not genuine and at 1:30 you can see so many grammar mistakes in the email - "All right, let's get to jobs" - JOBS? / "read WITH the Magix contract" - WITH? (common when it's scammers, not the case when its from a legit company like Magix). Those should have been enough signs to stop in his tracks without pursuing this anything further.

    • @jasongo3793
      @jasongo3793 Před 4 měsíci

      And where is the VirusTotal scan of the exe file? That way we can see how the other antiviruses works against this threat.

  • @roberthunter6927
    @roberthunter6927 Před 4 měsíci +8

    A lot of password protected files are common, and legit. For example, you want to buy the electronic forms of journal article, textbook or novel. So the PDF or whatever might be zipped and password protected. If you want to earn some money as a writer, it does not make sense to give full free access to all. Not everyone is honest enough to donate towards costs, etc.

  • @mateusdesousa-oh2wc
    @mateusdesousa-oh2wc Před 3 měsíci

    Watching the video, I had a question. I use Bitwarden for password security in the browser. Is it possible for a virus to steal my passwords in this case?

  • @b.c.2177
    @b.c.2177 Před 4 měsíci

    Thanks! And how about Portmaster firewall? Does it protect better?

  • @jorgitogaitan
    @jorgitogaitan Před 4 měsíci +9

    But the passwords only leaked if you saved them on the browser? Or are they being able to hit bitwarden and getting from the add-on??

  • @augusto3045
    @augusto3045 Před 3 měsíci

    Leo how this work in Emsisoft Antimalware >>?? Do you think Emsisoft go take with Behavior blocker?

  • @ray070784
    @ray070784 Před 3 měsíci

    serious question, is it going to make a difference if we're not connected to the internet when we open this malware? and how about after we click it, we do an offline scan? would it be detected as malware?

  • @arturodelcueto9364
    @arturodelcueto9364 Před 4 měsíci

    “farbar recovery scan tool English”, hello I just got downlod this file automatic and don’t know why, I got Malwarebytes and avg install together i also got Hitmanpro but I just got this file installed automatically and also when I just checked with virustotal I just detected the file as a malware. What should I do? Does the file is a third party extention for hitmanpro? Or what I’m not sure because this has not happend to me before so I do not know what to do

  • @297W
    @297W Před 4 měsíci +29

    if someone solely uses windows defender i always tell them to use configuredefender/group policy editor to increase the protection level to high plus or zero tolerance and the cloud check time to 60sec. defender’s actual behavioral capabilities have always been really weak

    • @enderagent
      @enderagent Před 4 měsíci +4

      linux is better

    • @sylussquared9724
      @sylussquared9724 Před 4 měsíci +9

      Instead of doing that I would recommend using defenderUI to lock it down
      Its just easier

    • @archduke0000
      @archduke0000 Před 4 měsíci +26

      @@enderagent every time, you're a self perpetuating meme.

    • @enderagent
      @enderagent Před 4 měsíci +4

      @@archduke0000 I'm confused on what you are saying, I believe this is the first time we have encountered, unless you remember me from somewhere else? Do elaborate ❤

    • @archduke0000
      @archduke0000 Před 4 měsíci +9

      @@enderagent no, you're a waste of time. Copy paste troll spam somewhere else.

  • @thilo5924
    @thilo5924 Před 4 měsíci +1

    Is it also possible to pull data from the Bitwarsen plug-in, for example. Or is something like that rarely the target of attack?
    And if I log out, it doesn't matter because the token will then be deleted and even if the password is known, 2fa is still active, right?

    • @Alextelefoon
      @Alextelefoon Před 4 měsíci +1

      no 2fa and a strong password is not te solution because the steal the whole session So the get a file (cookie) who say ur loged in. The onli thing is logout everytime. Thats why FB and google wont do anything because then the can not track you anymore. Good luck. I was hacked bu a bad extension. If the stole the bitwarden extension login pass i dont know. Good question.

    • @thilo5924
      @thilo5924 Před 4 měsíci

      the moment i log out their session is over right. Because it's the same login token ? But they still keep the Passwort ?@@Alextelefoon

    • @OH2023-cj9if
      @OH2023-cj9if Před 3 měsíci +1

      If you use the extension in a browser you are at risk. Always run the program and cut and paste in to sites.

    • @thilo5924
      @thilo5924 Před 3 měsíci

      @@OH2023-cj9if even if log out automatically every time I close the browser?

  • @basharyasser5913
    @basharyasser5913 Před 4 měsíci +4

    i tried to make an account via my hotmail & gmail accounts and the site said they dont accept addresses from them . what should I do?

  • @rgdgdgdrdrggdgdg
    @rgdgdgdrdrggdgdg Před 4 měsíci

    Leo you mentiones that this info stealer steals username & pass form the browser ....iven i you have independant password manager like lastpass?....can you simulate this malware with bitdefender, kaspersky, sophos home..can you do a video if these cybersecurity products can block or top the intrusion of sending and receving traffic.... i hiley presciate if you can make a vid as mentioned..thanks for the awareness Leo!!

  • @DunkelBisBunt
    @DunkelBisBunt Před 4 měsíci

    That's why I'd recommend a proper firewall (there are free ones) that catches every unusual outgoing connection and asks you if you want to allow it or not, because the most dangerous connections are not incoming but outgoing.

  • @SetSubarashii
    @SetSubarashii Před 4 měsíci +59

    Ways to prevent getting hacked
    Step 1: Don't Open Emails lul

    • @niezzayt3809
      @niezzayt3809 Před 4 měsíci +9

      when you tell the sender what kind of Operating System you have, like you might say Windows 11, you move to another Operating system, like Linux but in dual boot mode. And then open the Emails from there.

    • @tezcanaslan2877
      @tezcanaslan2877 Před 4 měsíci

      @@niezzayt3809use some locked down system like ios to open mails

    • @Alextelefoon
      @Alextelefoon Před 4 měsíci +5

      It can also with other files and with BROWSER EXTENSIONS.

    • @cpufrost
      @cpufrost Před 4 měsíci +1

      Use a whitelist, anything not on it is quarantined in a folder that only reads text/headers.
      Relying an security software to protect you is like relying on a gun safety to protect you from an armed robber.
      And it slows the fsck out of your computer, wasting resources and power.

    • @niezzayt3809
      @niezzayt3809 Před 4 měsíci +2

      @@cpufrost using "Whitelist" is still equal to "relying on" certain algorithm-which you might see it as software.
      Whenever dealing with Emails, it's not only about security. It's about Social Engineering. How you manipulate your recipient is more important than the contents of the Email itself.
      By pretending to lowering your guard can reveal the other party's true intentions.
      Therefore, if a malware was designed to attack certain OS, it is way simpler to just open it in another OS where the malware is completely useless.

  • @SumNumber
    @SumNumber Před 4 měsíci +2

    I have seen this password protected attacks in the past . At some point in the process people need to realize ,, " Wait a Minute ! " . I delete all these things without delay . I do not collaborate with any message that involves many steps or has links to the " Best new video " or " The great new shampoo " etc etc. I do not need an email to find out these things when there are hundreds of other avenues to use. :O) thanks for the share . ( The brain is meant to be used )

  • @the59th88
    @the59th88 Před 3 měsíci

    Great video. You just made me like relying on windows defender a bit more. 2 minutes in, and i have seen more flags thrown than a football game.

  • @nixnox4852
    @nixnox4852 Před 4 měsíci

    Does applying more strict options for security (such as what DefenderUI more easily exposes) in defender result in catching this?
    I supposed a larger question is, why can anything else read the browser's data, without requiring a privileged escalation prompt or outright browser/system exploit? Shouldn't this be exactly the sort of thing which is only readable by the program it belongs to by default?

  • @billlodhia5640
    @billlodhia5640 Před 4 měsíci

    How does this work with Defender Security Baseline being pushed by InTune to prevent process spawning?

  • @chizzlemo3094
    @chizzlemo3094 Před 4 měsíci

    can you be a little bit more technical, is the password protected pdf launching an encrypted LaZagne? Is it using Powershell at any point? Im surprised they need to ask the OS, seems a bit dumb

  • @BromTeque
    @BromTeque Před 4 měsíci +4

    I was consider trying out flare, but I can’t find any pricing… Like, do they actually provide prices anywhere? Because I sure as hell can’t find it, yet in their FAQ they state they have a "transparent pricing model". Cool cool, maybe add a link on that FAQ to prices?
    Makes it look sketchy as hell, so I’m out.

  • @zoastro
    @zoastro Před 4 měsíci +4

    Does Kaspersky flag anything from that type of attack?

  • @PCKodachi
    @PCKodachi Před 3 měsíci

    Thanks, Leo, for this 2024 update on this sneaky tactics. Poor WD 😅 and if WD starts to include Rep based, it can be chaotic for many!!🎉

  • @elric9892
    @elric9892 Před 4 měsíci

    I love how Outlook already suggests responses before i even opened my mails...

  • @C4Vendetta
    @C4Vendetta Před 4 měsíci

    What about Kaspersky? Curious if AVs like those do catch it

  • @nbrown5907
    @nbrown5907 Před 4 měsíci +2

    You can see where your emails are coming from when you hover your mouse in Windows 11 with Xfinity and google email but not on the phone. Is there a way on Android to see what the sender id is? My relatives that use their phones a lot have run into trouble with email before on their phones.

    • @kbhasi
      @kbhasi Před 4 měsíci

      Assuming you mean the official Gmail app, then that, the official Outlook app, and Apple 'Mail' (iOS) hide the e-mail address and only show the sender name. The user is expected to tap on the round profile picture to the left or a not-so-obvious down arrow to reveal the full address.

  • @peterwassmuth4014
    @peterwassmuth4014 Před 4 měsíci

    You are awesome Thank you!! 💯

  • @vasudevmenon2496
    @vasudevmenon2496 Před 4 měsíci

    Will configure defender or asr rules help in this matter? BTW, i only see your testimonial in flare.

    • @sakaraist
      @sakaraist Před 4 měsíci +1

      Yes, ASR will prevent it..

  • @SartinPixel
    @SartinPixel Před 4 měsíci +4

    I once log in my school's computer (dumb move), after 15mn my account was logged in another country, that's how fast viruses steal the cookies and transform accounts into spammers. After that day, I never log on other people's computer even families.

    • @kbhasi
      @kbhasi Před 4 měsíci +1

      I'm guessing the school you attended used Windows but didn't use Active Directory with policies set to not allow users to run their own software. Also, it could've been possible that you attended that school at a time when they were still using Windows XP, because I know that one of the school PCs did get infected with malware that spread via USB flash drives and ran using an Autorun exploit that I think was patched out in Windows Vista or 7, and I only noticed the malware due to bad coding that saw it open another Windows Explorer (File Explorer) window with the folder pane open.
      I also did get my Facebook account hacked once (back before they added 2FA support), particularly with it sending and accepting friend requests with people I don't know in real life, but it turned out that some bullies looked at me typing my password, and I only found out that it was done by bullies when a classmate tipped me off in person. I then changed my password and remotely logged them out. I can only imagine where those bullies are now.

  • @TheVideotoaster
    @TheVideotoaster Před 4 měsíci +2

    Does not accept email addresses from Rogers, Live, Yahoo. What good is it?

  • @luisb7107
    @luisb7107 Před 4 měsíci +3

    Can you try tje windows sandbox vs maleware... I know of some people that say that its perfectly safe, but im not sure if its compable to a "normal" isolated VM

  • @galenklassen8634
    @galenklassen8634 Před 3 měsíci

    Great video as usual

  • @atussentinel
    @atussentinel Před 4 měsíci +1

    It'll be fun to reverse engineer the payload, any chance there will be a video about that?

  • @od1sseas663
    @od1sseas663 Před 4 měsíci +12

    Does Kaspersky’s heuristics detect it?

    • @greghust8608
      @greghust8608 Před 4 měsíci +2

      I'm actually curious to see if it gets detected by the modern antiviruses (Kaspersky, Malwarebytes, BitDefender etc).

    • @tybronx2446
      @tybronx2446 Před 4 měsíci

      Boosting this, would like to know as well

  • @TheCocoaDaddy
    @TheCocoaDaddy Před 4 měsíci +15

    So, what other anti-malware tool(s) could have protected against this kind of threat, if any? Thanks for posting!!!

    • @draculemihawk10
      @draculemihawk10 Před 4 měsíci +5

      Kaspersky and most likely Bitdefender

    • @alifsheikh4237
      @alifsheikh4237 Před 4 měsíci

      ​@@draculemihawk10i think you are talking about the premium plan of kaspersky, but what about the free plan?

    • @L2002
      @L2002 Před 4 měsíci +1

      Well it's obviously not a pdf, it's an executable application, so don't open it

    • @A42yearoldARAB
      @A42yearoldARAB Před 4 měsíci

      those do not scan password protected files either do they?@@draculemihawk10

    • @kitsunekaze93
      @kitsunekaze93 Před 4 měsíci +1

      make sure to check every file you download to make sure its actually what you think it is.
      dont run unknown filetypes, and REALLY dont run unknown exe files

  • @balajisharathkumar9753
    @balajisharathkumar9753 Před 4 měsíci +1

    nowadays brower protection and antivirus sepcific to avoid these malwares but even it in place they malwares get inside in enterprise but still siem tools might detect these hardware even in firewall dose these even those there will be detections or leftover might present , any way a great vidoe

  • @yspegel
    @yspegel Před 4 měsíci +20

    But who wouldn't get seriously alarmed by a password protected file AND the password in the SAME attachment? That defeats the purpose of pw protection unless you want to bypass security.

    • @3polygons
      @3polygons Před 4 měsíci +2

      You would be surprised...

    • @yspegel
      @yspegel Před 4 měsíci +2

      @@3polygons you're probably right and I shouldn't be surprised, knowing the average pc user.... but still

    • @A42yearoldARAB
      @A42yearoldARAB Před 4 měsíci

      Often video games have this, but still a video game should be much larger

    • @JJFlores197
      @JJFlores197 Před 4 měsíci

      @@yspegel Have you ever worked in IT tech support? You would be surprised at the amount of people using computers who understand next to nothing about computers nor have any computer security training or knowledge. I work in school IT as an IT tech. We run several phishing campaigns per year and its astonishing how many people, even "higher ups" who fall for them. We've had several people flat out enter their email and password into one of our phishing campaigns because according to the email, they're supposed to "validate their account information".

  • @user-gi5nv3br6m
    @user-gi5nv3br6m Před měsícem

    THANKS A LOT, GREAT CHANNEL

  • @andrejasvrzic2979
    @andrejasvrzic2979 Před měsícem

    Not sure if anyone mentioned, but it say Application under the Type when looking in the file Explorer

  • @GeorgeG-is6ov
    @GeorgeG-is6ov Před 4 měsíci

    Could you do a browser security tier list?

  • @SpikyRoss
    @SpikyRoss Před 4 měsíci +1

    What kind of website is app flare? I was about to register but it doesn't even accept gmail address lol

  • @Ashi13ff
    @Ashi13ff Před 27 dny

    some time ago I click on the pdf attachment of a scam email, I had avast av back then, It said it was pishing virus, but when I clicked on the pdf It automatically open on microsoft edge. after some time I reseted the pc and changed all my passwords, Am I safe? sorry for bad english

  • @KamlopTyplo
    @KamlopTyplo Před 4 měsíci

    Could you please test that malware on kaspersky and bitdefender ?

  • @bluntdocto2571
    @bluntdocto2571 Před 4 měsíci +4

    I am working on my Secruity+ and the hacks nowadays are getting so good especially with AI this going be hard af job.

  • @diomedes-fp
    @diomedes-fp Před 4 měsíci

    Thanks a lot, I'm been reciving mount of this type of email.

  • @SireSquish
    @SireSquish Před 4 měsíci +2

    How come the actual password stealing payload didn't trigger the AV once it was decrypted and running?

    • @kbhasi
      @kbhasi Před 4 měsíci

      I believe it's because the malware exploits Windows Defender only scanning the file before running and initially running. The fake password prompt tricks the user into triggering the malware infection on command after Windows Defender had finished scanning.

    • @SireSquish
      @SireSquish Před 4 měsíci

      @@kbhasi Ah, that makes sense yeah.

  • @harmonbrentdm
    @harmonbrentdm Před 4 měsíci +4

    How good is this with Malwarebytes..

  • @moetocafe
    @moetocafe Před 4 měsíci +10

    To a wary user it doesn't look like big threat - there are multiple red flags.
    But many dumb office workers would potentially eat the bait.

  • @DavidStringham
    @DavidStringham Před 3 měsíci

    Brilliant! Encrypt the payload and have the user enter the encryption key. AV wouldn't detect anything but the decoder stub and seemingly random data even with sandboxing.

  • @Capt-Intrepid
    @Capt-Intrepid Před 4 měsíci +20

    NO. That's not a PDF. That's an executable (application).exe The icon is a pdf. But the file extension is .EXE !!! 2:08

    • @FrostlifeV
      @FrostlifeV Před 4 měsíci +9

      Did you even watch the whole thing, it's literally written there by him.

    • @Capt-Intrepid
      @Capt-Intrepid Před 4 měsíci +8

      @@FrostlifeV That's not what he said at 2:08

    • @tablettablete186
      @tablettablete186 Před 4 měsíci +2

      ​@@FrostlifeVOP is right

    • @jaydoubleyou780
      @jaydoubleyou780 Před 4 měsíci +5

      Yes, I thought I was losing it, video should be corrected. He makes it seem like a PDF will execute if you put the password in and steal your cookies. I literally had to freeze it a few times to make sure it was an EXE and not a PDF when it's listed in the zip folder as an application and Leo said it was a PDF. I was like what exploit is this in PDF I have to look out for now? Also wish he stressed how every time you use windows to make sure file extensions are not hidden. It happens, still love the Channel.

    • @balsalmalberto8086
      @balsalmalberto8086 Před 4 měsíci

      ​@@jaydoubleyou780 exactly this. the filename is shown by norton and has exe extension. if It's a PDF exploiting software than it can be mitigated .. Anybody knowledgeable about computers should know never to run stray executable from random person. micrsoft makes it too easy for malicious to prey on the unsuspecting because they hide the file extension by default and again by not flagging an executable that grabs browser data as unexpected and possible harmful behavior. MS hates nirsoft tools but a random executable has free reign to do basically the same thing so it seems.

  • @DavidM2002
    @DavidM2002 Před 4 měsíci +1

    How safe is it to use a virtual machine to open something like a PDF if it turns out to be malicious ? How about the Windows Sandbox app ? the reason I ask is because I run a Windows 11 desktop and run a Windows 11 virtual machine on my QNAP NAS and I can copy and paste files between them. That makes it seem to me that they are more connected than I would have thought.

  • @kshysztof9649
    @kshysztof9649 Před 4 měsíci

    I have a blank grabber on my PC that I'm testing on myself, and oddly enough, I could not extract the exe file from a password protected zip file. But that could be due to having a shitty script

  • @MalwareLab150
    @MalwareLab150 Před 4 měsíci

    I have a question, how to safely run no escape malware on virtualbox?, thanks a lot

  • @chiroyce
    @chiroyce Před 4 měsíci +1

    How does it execute even though it is password protected? I'm not too familiar with Windows executable files but I think its because the PDF contains a payload or its just a password protected exe disguised as a PDF.

    • @SmilerRyanYT
      @SmilerRyanYT Před 4 měsíci

      An actual pdf would be password protected and the reader would ask for it. In this case it's probably password protected to run the actual payload, and not to "unprotect" the document.

    • @VoAviation
      @VoAviation Před 4 měsíci

      I'm not an expert in cybersecurity by any means, but I have a theory that the actual payload to "hack" your device is encrypted, and so it's unintelligible so the antivirus can't tell what it does (because to it, it seems like a bunch of garbage data). And when you enter the password, it tries to decrypt the payload using that password, and after verification, the decrypted payload is executed.

    • @chiroyce
      @chiroyce Před 4 měsíci +1

      @@VoAviation Would a PDF viewer voluntarily execute an encrypted "so called PDF" file?

    • @VoAviation
      @VoAviation Před 4 měsíci

      @@chiroyce A PDF viewer would do nothing (or throw an error) because this is an EXE file disguised as a PDF. It does not actually have any PDF inside that the reader can read.

    • @SmilerRyanYT
      @SmilerRyanYT Před 4 měsíci

      As far as I'm aware that's all correct. It's just an exe with a pdf icon (not actually a pdf that any pdf reader can recognise). And all that exe does is open another exe that is encrypted/password-protected which is how it can avoid detections.

  • @dg-hughes
    @dg-hughes Před 4 měsíci +1

    Well the Flare trial didn't go so well it refuses any gmail email address. Or hotmail, or Outlook, or Proton brb buying a server, installing Linux, and creating my own email server....

  • @R.-.
    @R.-. Před 4 měsíci

    Q: if one Windows PC on a home wifi network is compromised by someone opening one of these PDF attachments, are other Windows PCs on the same wifi network at risk of infection?

  • @dvuemedia
    @dvuemedia Před 4 měsíci +1

    Hmm...how can I try Flare if it doesn't accept Gmail email addresses?

  • @06howea1
    @06howea1 Před 4 měsíci

    Does it work against the "new outlook" app?

  • @user-pr1vd9em1n
    @user-pr1vd9em1n Před 4 měsíci

    Believe 2FAs should block access to accounts?

  • @panl8370
    @panl8370 Před 4 měsíci +1

    can you make an updated 2024 version of "Free Security Tools Everyone Should Use" , and also test MiTeC Task Manager DeLuxe free?

  • @Lcua7
    @Lcua7 Před 4 měsíci

    One question:
    I was told you can already get hacked by clicking on a link in a Email, so why do they try to make you download an application and run it?
    Is my Information false?

    • @VoAviation
      @VoAviation Před 4 měsíci

      Depends on the type of link and vulnerabilities of your browser, but ideally, a website can't do anything to your computer other than overload it maybe. However a downloaded executable can. I still wouldn't recommend clicking on random links though.

  • @SireSquish
    @SireSquish Před 4 měsíci

    I have a dedicated folder for downloading any suspicious emails, and NTFS permissions are set to deny execute (ALL) in that folder. It's not much, but it's one extra onion layer.

  • @ent2220
    @ent2220 Před 4 měsíci

    I wonder how they'd accomplish this on Linux. File managers and therefore the desktops don't execute scripts by default. If they add a .desktop file, it would be fishy right then and there as we can see the extension and know what it is by default.

  • @Crazmuss
    @Crazmuss Před 4 měsíci

    How it elevate permissions? Did not see any prompt.

  • @StealthyFox5
    @StealthyFox5 Před 4 měsíci

    Can u test the malwarebytes Google extension please?

  • @muddin8097
    @muddin8097 Před 4 měsíci

    How do they get in to your accounts without the actual passwords?

  • @ivok9846
    @ivok9846 Před 4 měsíci

    2:44 wait: how exactly is your password accessible to that malware? you're storing password in your browser? and they're inside easy to access txt file, they're not "scrambled"?

  • @fspeshalxo69
    @fspeshalxo69 Před 4 měsíci +1

    hey , can you please have a video of this malware gets detected by other anti virus ? thinking about buying anti virus

    • @ObakuZenCenter
      @ObakuZenCenter Před 3 měsíci

      Paid versions often try to justify their cost by adding on features that aren't often all that useful. Try some of the free versions of antivirus solutions. In testing they are just as good as the paid versions often, just with less stuff added.
      It also means that you'll have at least some idea of how resource intensive an antivirus product is, or if you find it irritating, for example if there are a lot of false positives.

  • @mnageh-bo1mm
    @mnageh-bo1mm Před 4 měsíci

    So how do they do it , what's the catch ?

  • @boksorunfedaisi6287
    @boksorunfedaisi6287 Před 4 měsíci

    Can you make a video about Windows AppLocker?

  • @gabrielandy9272
    @gabrielandy9272 Před 4 měsíci

    but why the antivirus don't scan the code while its being executed instead?

  • @CaveyMoth
    @CaveyMoth Před 4 měsíci

    Ooh, I love Magix Music Maker for PS2! "I'm 'bout to break in!"

  • @JCRocky5
    @JCRocky5 Před 3 měsíci

    What about malwarebytes? Can you test that please?

  • @geforcertx3060
    @geforcertx3060 Před 4 měsíci

    Can you do Kaspersky Plus vs WannaCry please?

  • @JaiRudraNath
    @JaiRudraNath Před 4 měsíci

    What if all apps use One Time Password that changes every time and sent to your mobile as text message .. unless they hack your phone which is bit difficult, the computer info will be useless ..

  • @xjarhead1964
    @xjarhead1964 Před 4 měsíci +2

    I used your link it says it doesn't except addresses from Yahoo or Hotmail!!! What?

    • @akhilsvarughese
      @akhilsvarughese Před 4 měsíci

      Same. Then noticed "cyber threat intelligence platform built for organizations". Use an email alias, works

  • @vladgulico8605
    @vladgulico8605 Před 4 měsíci

    can pup like steal my information because malwarebytes found one in my pc?

  • @kimsena268
    @kimsena268 Před 4 měsíci +1

    hi. dude, i always watch your video Leo. Plz update AVG or Avast signature! Compare with Windows defender :)

  • @RogierYou
    @RogierYou Před 4 měsíci

    What is you tell them you run MacOS ?