K
kurt wismer
Jason said:....
The build number mentioned on the web page was 572a not 562a as it should
have been.
ok... well, at least you fixed that in the text file..
Jason said:....
The build number mentioned on the web page was 572a not 562a as it should
have been.
kurt wismer said:FromTheRafters wrote:
[snip]Yes, it seems that signature based scanners will *always* fail
against day zero effect worms. Many of the new worms are
designed to take full advantage of this weakness.
please refer to my post of some days (weeks?) ago where f-prot was
detecting swen in my inbox heuristically...
scanners are not necessarily completely susceptible to the day zero
effect...
FromTheRafters said:kurt wismer said:FromTheRafters wrote:
[snip]
Yes, it seems that signature based scanners will *always* fail
against day zero effect worms. Many of the new worms are
designed to take full advantage of this weakness.
please refer to my post of some days (weeks?) ago where f-prot was
detecting swen in my inbox heuristically...
Yes. However, unlike Zvi, I don't consider heuristic detection
to be strictly a signature based scanning method.
F-Prot didn't
detect it as Swen, but rather likely detected the more generic
exploit code and knew it was something worth alerting you
about (was it indeed an *exploit* it alerted to?)
FromTheRafters said:Yes. However, unlike Zvi, I don't consider heuristic detection
to be strictly a signature based scanning method.
F-Prot didn't
detect it as Swen, but rather likely detected the more generic
exploit code and knew it was something worth alerting you
about (was it indeed an *exploit* it alerted to?)
No, but the signature based scanning which "identifies" a particular
malware is. In some cases a *new* virus or worm will not be
sufficiently *new* enough to not be detected as an *old* known
entity, and an *exploit* detection is not specific to a worm or virus.
(although they are being called trojans)
If a malware is sufficiently *new*, day zero still applies.
Zvi Netiv said:Note that I am rather choosy on my phrasing. Heuristics are based on *pattern
recognition*, which is a broader case of plain signature recognition. You could
describe it as signature based, with preprocessing and fuzzy logic. In no way
are heuristics "strictly signature based".
Although I don't know the specifics in Kurt's case, most chances are that what
disclosed the bogus message is the "<iframe src=" line. Plain trivial, and
expected.
"Not necessarily completely susceptible" is a funny expression. Like "not
necessarily completely lethal", i.e. it doesn't always kill, or kills, but only
slightly.
Heuristics are widely misunderstood in this group, and in result, attributed
capabilities that they doesn't possess. Heuristics can detect a new virus only
if it contains a *pattern* included in the product's database, which is a
signature, or one of several possible signature fractions, after appropriate
pre-processing.
The term "day zero" is misleading, as it gives the wrong impression of the
problem and lulls users into a false sense of being safe. A more appropriate
term is "new threat outbreak" phase, which may last for several days, more often
weeks, until countermeasures to the new threat are fully deployed.