Jump to content

Microsoft tWindows Application Verifier debugging tool exploit DoubleAgent


sman

Recommended Posts

Under windows, it is generally with admin account usage, and mostly by default.. so, as per gdata, if admin privilege / rights are accessible, than no need for av take-over for hacker to realize his intentions, as the system is already compromised..

So, it's a question of protecting exploiting the admin account and how?

Link to post
Share on other sites

Quote

So, it's a question of protecting exploiting the admin account and how?

Make sure UAC is enabled at the default level at least (since if a process tries to configure DoubleAgent, it'll ask you for Admin Rights)

Do not give Admin Rights (when asked) to an unknown process and/or operation.

Simple as that.

Link to post
Share on other sites

Hmm. with UAC the admin rights seem protected, but as far as I remember, there are ways to bypass UAC (there was some earlier discussions on MBAM/MBAE user privileges, where this aspect of Admin rights was explained and about some limitations. i dont' remenmber when.

Link to post
Share on other sites

Until then an Anti-Exploit (like Malwarebytes 3 Premium or Malwarebytes Anti-Exploit Beta) should protect you. You know, if you use your computer with a bit of common sense, like not browsing suspicious websites, not downloading suspicious files or installing unknown programs, you wouldn't have to worry about all that. Protecting yourself against DoubleAgent, UAC bypass, etc. is the same as protecting yourself from every other malware out there.

Link to post
Share on other sites

It is here that earlier discussions in the forum , assumes significance.. it was about something about MBAM privileges / feature suggestions maybe prior to version 2 or so in the forum, where some limitations were discussed.

Link to post
Share on other sites

can't find that old thread on Windows account discussion.. It was here it was suggested for 'local account' use and risks with Admin account and the relevance with MBAM feature additions..

Yes, we all know AV protection alone is not sufficient and need to be complemented with MBAM/MBAE.. But, what about in case of IoT security products by these very AV vendors, and MBAM/MBAE complementary role? In fact, even standalone AV products like Comodo, Norton etc. do offer refund/compensation in case of infection while use of their AV product & offer viability.. 

As the core issue is about protection even under OS vulnerabilities on topic, the complementary security beef up of AV/IoT protection is what it boils to and looked for..

Link to post
Share on other sites

Silence is golden but not always..

MBAM/MBAE complementary role with IoT security products esp. under the topic threat (keeping in view AV claims of complete protection and refund/compensation in case of infection during use of their product) is a grey region and needs to be defined..

Link to post
Share on other sites

The threat on topic can affect all Windows systems protected by standalone AV's / IoT products, so when it is about MBAM/MBAE mitigation of the threat, the role of MBAM/MBAE under IoT is what is to be defined (since IoT vendors, the very AV vendors, say the protection is complete and this when the standalone AV's too offer complete protection with refund/compensation on infection.).. so, it is relevant to define MBAM/MBAE role in protecting/mitigating the topic threat under AV/IoT environment.. Tks..

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.