Jump to content

Couple questions regarding on and post-execution protection.


Recommended Posts

From my knowledge Malwarebytes only scans files on-execution, so what about post-execution? Ive done a few tests in a virtual machine with it, and when it has had a few misses it does absolutely nothing, which caused me to assume it has no local behavior monitoring after execution and everything is done on-execution and in the cloud, which is my next question, why was it decided to not include on-access scanning of files? it makes sense as Malwarebytes can now run by itself and registers in security center, as its alone theres no conflicts with other AV's to worry about.

Link to post
Share on other sites

28 minutes ago, AnFriendlyFish said:

why was it decided to not include on-access scanning of files?

To keep as compatible with other AV programs that have on access detection's which includes Defender.

30 minutes ago, AnFriendlyFish said:

can now run by itself and registers in security center

Many of us turn the above off so defender will also be active.

Malwarebytes is not designed to function like normal AV scanners and uses a new kind of scan engine that relies mostly on heuristics detection techniques rather than traditional threat signatures.  Malwarebytes is also designed to look in all the locations where malware is known to install itself/hide, so a full or custom scan shouldn't be necessary, especially on any sort of frequent basis (like daily), especially since the default Threat Scan/Quick Scan checks all loading points/startup locations, the registry, all running processes and threads in memory, along with all system folders, program folders, and data folders as well as any installed browsers, caches, and temp locations.  This also means that if a threat were active from a non-standard location because Malwarebytes checks all threads and processes in memory, it should still be detected.  The only threat it *might* miss would be a dormant/inactive threat that is not actively running/installed on a secondary drive, however, if the threat were executed then Malwarebytes should detect it.  Additionally, whenever a new location is discovered to be used by malware the Malwarebytes Research team adds that location dynamically to the outgoing database updates so the locations that are checked by the default Threat/Quick Scan in Malwarebytes can be changed on the fly by Research without requiring any engine or program version updates/upgrades.

An AV will catch the file just by downloading it or just opening a folder with a detected file in it.

For example, you get an email with an infected attachment, Malwarebytes will not even blink until you run it yet Defender will detect it if it is in their database without even actually clicking on it. Remember the list of files Malwarebytes does not target.

Then I will leave you with this.

As good as Malwarebytes is, it is just a layer of protection.

Using a browser that has Ublock Origin and the Malwarebytes Browser guard enabled is also a layer of protection.

Not opening attachments from an email unless you were expecting it from a specific user during a specific time period.

Do not use Torrents. Do not install every free software you find. Do not click links in an unknown email. Go directly to the site listed in the email.

Having a monthly image of your computer on an external drive that is only connected during the backup is actually better than any protective software ever made. Macrium Reflect free is the program I use and place on every computer I service.

Link to post
Share on other sites

Thing is, this "traditional AV is bad/only uses signatures" meta needs to stop, theres not a single AV that does not do the same thing as Malwarbytes, i.e employing AI/ML, even if its to "BOoST SignaTUrEs ANd hEURIsTics" its still the same thing as Malwarebytes employs, at this point its just an marketing tactic to lure in the less tech savvy people thinking MBAM does is something special and somehow better over these "traditional, signature based" antiviruses.

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.