Jump to content

Recommended Posts

Why are you worried about one type of Ransomware when there are many families ?

 

Then there are so many data stealers, backdoors, data miners and other trojans that are far more prevalent.

 

If Malwarebytes has samples of the malware in question they will create signatures for it just as with any other PE file Malwarebytes' Anti-Malware ( MBAM ) targets.

 

As for Malwarebytes' Anti-Exploit ( MBAE ) it doesn't care what family the malware is in.  It doesn't work at the file level and use signatures and heuristics MBAE works at the action level. 

Please reference:  MBAE FAQ

Link to post
Share on other sites

Thank you David for the prompt reply. Very enlightening information. I'm just another paranoid average "joe-user" freaked-out by the constant daily barrage of cyber attack news.

 

I've been a MBAM user for several years - and so far I've experienced no attacks on my PC - so I guess I'm a satisfied MBAM user. But I'm also pretty darn diligent! 

Link to post
Share on other sites

Paranoia is just another word for a heightened sense of situational awareness.

 

The point being if you concentrate on one particular malware you may get blindsided by a different one. Thus one must have a stance against any and all malware regardless of a particular type or family sub-type.

 

Another way to look at is...  If you are too busy watching the front door of your house, the intruder may come in through the back door or a rear window.

 

Remember - Protection is all about perpetual vigilance.

Link to post
Share on other sites

Hello unbob.

I hope you find what follows helpful. It is a whole lot to digest. But basically comes down to tightening up on security practices and procedures.

In brief, no one single program is going to give you an all-perfect shield.

A lot depends on what computer users do, their daily safety practices, and the security protocol at your place.

 

 

Our softwares detect the most prevalent malwares out in the wild. But there is no guarantee whatever if one single computer user at your place lets their guard down, and for example, opens a bad attachment or is super quick to click without checking, especially with email.

In addition, be aware that crypto ransomwares continuously evolve and has rapid change cycles. Newer versions are coming out quicker. Thus "their tell-tale fingerprints" change all the time.

Please keep in mind that your antivirus is in the front line of your computer protection.

Next, comes your software firewall.

and hopefully somewhere, ahead of your computer’s internet connection is a hardware router. ( another layer of protection).

Only after all these, does our software come into the picture. It is designed as a supplement.

That is a brief rundown on the need for a layered set of protections.

No one single security application can detect and remove all threats, it’s a statistical impossibility.

We update MBAM as many as a dozen times per day and are always researching and adding new detection and removal routines to the database.

Our research team is constantly analyzing and reviewing new infections for inclusion into our database. With the prevalence of new variants and infections the staff is working around the clock.

All security programs will still not be able to catch everything at some point, this is a given known fact and is the main reason why security professionals across the globe strongly advocate a ‘layered’ approach to security:

Dedicated antivirus

Dedicated antimalware

Third party firewalls

Backups on a regular basis of all important personal documents, files, etc. Backup is your best friend.

Other Safer practices & malware prevention:

Follow best practices when browsing the Internet, especially on opening links coming from untrusted sources.

Never open attachments that come with unexpected ( out of the blue ) email no matter how enticing.

Never open attachments from the email itself. Do not double click in the email. Always Save first and then scan with antivirus program.

Never click links without first hovering your mouse over the link and seeing if it is going to an odd address ( one that does not fit or is odd looking or has typos).

Use a Standard user account rather than an administrator-rights account when "surfing" the web.

See more info on Corrine's SecurityGarden Blog http://securitygarden.blogspot.com/p/blog-page_7.html

Dont remove your current login. Just use the new Standard-user-level one for everyday use while on the internet.

Have a hardware router between the incoming internet-modem and your computer.

Configure your Antivirus software to check for updates daily, at a time in which you are sure the computer will be on.

Check in at http://windowsupdate.microsoft.com

Windows Update and install any security or Important Updates offered.

Make certain that Automatic Updates is enabled.

How to configure and use Automatic Updates in Windows

http://support.microsoft.com/kb/306525

 

Check on other update issues as well, by getting, installing and using Secunia Personal Software Inspector (PSI) on a regular basis.

See How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector

http://www.bleepingcomputer.com/tutorials/tutorial174.html

Keep your system and programs up to date. Several programs release security updates on a regular basis to patch vulnerabilities. Keeping your software patched up prevents attackers from being able to exploit them to drop malware.

That is especially so for Java ( if you have it) , Adobe Flash, Acrobat Reader  ( or other PDF reader), and Windows vulnerabilities.

 

Pay close attention when installing 3rd-party programs. It is important that you pay attention to the license agreements and installation screens when installing anything off of the Internet. If an installation screen offers you Custom or Advanced installation options, it is a good idea to select these as they will typically disclose what other 3rd party software will also be installed.

Take great care in every stage of the process and every offer screen, and make sure you know what it is you're agreeing to before you click "Next".

It bears repeating: Backup is your best friend.

Keep multiple generation backups on external storage drives as insurance.

 

H. T. H.

Edited by Maurice Naggar
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.