TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cyber Scarecrow

606 pointsby toby_tw11 months ago

67 comments

scosman11 months ago
Fun concept.<p>If the creators read this, I suggest some ways of building trust. There’s no “about us”, no GitHub link, etc. It’s a random webpage that wants my personal details, and sends me a “exe”. The overlap of people who understand what this tool does, and people who would run that “exe” is pretty small.
评论 #40715473 未加载
评论 #40715364 未加载
评论 #40715446 未加载
评论 #40723731 未加载
评论 #40716538 未加载
评论 #40715425 未加载
评论 #40716059 未加载
mafriese11 months ago
I don&#x27;t understand why the software is built how it&#x27;s built. Why would you want to implement licensing in the future for a software product that only creates fake processes and registry keys from a list: <a href="https:&#x2F;&#x2F;pastebin.com&#x2F;JVZy4U5i" rel="nofollow">https:&#x2F;&#x2F;pastebin.com&#x2F;JVZy4U5i</a> . The limitation to 3 processes and license dialog make me feel uncomfortable using the software. All the processes are 14.1MB in size (and basically the scarecrow_process.dll - <a href="https:&#x2F;&#x2F;www.virustotal.com&#x2F;gui&#x2F;file&#x2F;83ea1c039f031aa2b05a082c63df12398e6db1322219c53ac4447c637c940dae&#x2F;details" rel="nofollow">https:&#x2F;&#x2F;www.virustotal.com&#x2F;gui&#x2F;file&#x2F;83ea1c039f031aa2b05a082c...</a>). I just don&#x27;t understand why you create such a complex piece of software if you can just use a Powershell script that does exactly the same using less resources. The science behind it only kinda makes sense. There is some malware that is using techniques to check if there are those processes are running but by no means is this a good way to keep you protected. Most common malware like credential stealers (redline, vidar, blahblah) don&#x27;t care about that and they are by far the most common type of malware deployed. Even ransomware like Lockbit doesn&#x27;t care, even if it&#x27;s attached to a debugger. I think this mostly creates a false sense of security and if you plan to grow a business out of this, it would probably only take hours until there would be an open source option available. Don&#x27;t get me wrong - I like the idea of creating new ways of defending malware, what I don&#x27;t like is the way you try to &quot;sell&quot; it.
评论 #40716046 未加载
评论 #40716158 未加载
评论 #40716939 未加载
评论 #40722787 未加载
99990000099911 months ago
Neat.<p>But this literally comes off as probably being malware itself.<p>If your going to ship something like this, it needs to be open source preferably with a GitHub pipeline so I can see the full build process.<p>You also run into the elephant repellent problem. The best defense to malware will always be regular backups and a willingness to wipe your computer if things go wrong.
评论 #40718713 未加载
helsinkiandrew11 months ago
I would assume there would be a small intersection of people that would download and install a windows program from an unknown web page and those that are worried about malware.<p>But perhaps I&#x27;m wrong
评论 #40715541 未加载
评论 #40715437 未加载
bendews11 months ago
Lol, this website is registered to someone in Iceland, despite the assurance that it is a &quot;security researcher living in the UK&quot;. I&#x27;m sure the results from this experiment will make a cool blog post about pwning tech savvy folks.
评论 #40715563 未加载
评论 #40715498 未加载
oleg_antonyan11 months ago
To check if your credit card is in scammers&#x27; database, please enter card number and cvv
iforgotpassword11 months ago
Narrator: and so the arms race continues.<p>I guess if this gets enough attention, malware will just add more sophisticated checks and not just look at the exe name.<p>But on that note, I wondered the same thing at my last workplace where we&#x27;d only run windows in virtual machines. Sometimes these were quite outdated regarding system and browser updates, and some non-tech staff used them to browse random websites. They were never hit by any crypto malware and whatnot, which surprised me a lot at first, but at some point I realized the first thing you do as even a halfway decent malware author is checking whether you run in a virtualized environment.
评论 #40715417 未加载
评论 #40715526 未加载
wruza11 months ago
Why does malware “stop” if it sees AV? Sounds as if it wanted to live, which is absurd. A shady concept overall, cause if you occasionally run malware on your pc, it’s already over.<p>Downloading a random exe from a noname site&#x2F;author to scare malware sounds like another crazy security recipe from your layman tech friend who installs registry cleaners and toggles random settings for “speed up”.
评论 #40716202 未加载
评论 #40716228 未加载
评论 #40716249 未加载
评论 #40716286 未加载
评论 #40721679 未加载
efilife11 months ago
Ok, but why isn&#x27;t this open source? If it only creates some processes that don&#x27;t do anything, there&#x27;s nothing to hide, really
评论 #40716706 未加载
Andaith11 months ago
I heard you could do something very similar but with installing the Russian Keyboard layout and having it available as an option. A lot of malware from Russia won&#x27;t run on computers with a Russian keyboard layout, because they only get in trouble with the law if the malware impacts Russian users.
tgv11 months ago
Isn&#x27;t the risk then that they&#x27;ll first start scanning for &quot;Scarecrow&quot;, or is that hidden somehow?<p>Also somewhat surprised the source isn&#x27;t available. That makes trusting it harder, especially to the people it&#x27;s aimed at.
评论 #40715352 未加载
评论 #40720765 未加载
thrdbndndn11 months ago
One of the reference in &quot;How does it work&quot; [1] mentioned that some hackers will not mess with computers with Russian keyboard, so you can add one to reduce your chance of getting hacked.<p>Hilarious aside, it would only work if you don&#x27;t actually use multiple keyboard -- otherwise an additional one would make switching between multiple keyboards very annoying [*].<p>It also mentions some other changes like adding RU keywords to your registry. Again, these measures would have many side effects since lots of software actually use these registry entries for legit reasons. So I don&#x27;t know if this Cyber Scarecrow product would have this problem, since it does modify registry, too.<p>1: <a href="https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2021&#x2F;05&#x2F;try-this-one-weird-trick-russian-hackers-hate&#x2F;" rel="nofollow">https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2021&#x2F;05&#x2F;try-this-one-weird-trick...</a><p>*: A little rant: as someone who use three virtual keyboards (English, Chinese, Japanese), it is already a pain in ass to switch them since MS does not follow &quot;last used&quot; switching order (like alt+tab). Instead, it just switches in one direction.
评论 #40715780 未加载
评论 #40716678 未加载
评论 #40715799 未加载
Retr0id11 months ago
&gt; When hackers install malicious software on a compromised victim, they first check to make sure its safe for them to run. They don&#x27;t want to get caught and avoid computers that have security analysis [...] tools on them.<p>Game anti-cheat code makes similar checks (arguably it <i>is</i> malware, but that&#x27;s besides the point). So, running this <i>might</i> put you at risk of getting banned from your favourite game.
omeid211 months ago
When is Scarecrow Advanced++ with NextGen Anti-Detection and Cloaking will be released?<p>Jokes aside, this is a temporary fix at best, a waste of resources and impression of safety at worst.
评论 #40715551 未加载
评论 #40715576 未加载
评论 #40715405 未加载
russdill11 months ago
Wow, never ever install this if you plan to play games with cheat detection
webprofusion11 months ago
Source code or it didn&#x27;t happen.
khaki5411 months ago
Kind of like instead of buying $10k ADT home security system, just buy the sign for $20 and put it in the front yard.
评论 #40721013 未加载
no-dr-onboard11 months ago
Fun concept, but this is security by obscurity. Other heuristics:<p>- providing fake manifests to hardware drivers commonly associated with virtual machines - active process inspector handles - presence of any software signed by hexrays (the ini file is usually enough)
评论 #40720113 未加载
eigenvalue11 months ago
I really don&#x27;t get why this would be a 71mb installer that takes up 113mb when installed. If they are literally just fake processes running that have the right names, why couldn&#x27;t this be a 100kb installer?
s1mplicissimus11 months ago
Hahaha it&#x27;s such a lovely idea! Turning the opponents detection against them, I very much dig it!<p>Here&#x27;s a caveat though: Attackers will at some point notice scarecrows and simply work around them. Now suuure, if you have a better lock than your neighbours, that decreases your chances of getting broken into, but in the end this is a classic &quot;security by obscurity&quot; measure. So if your time and computer&#x2F;data is valuable, I would rather invest in other security measures (firewall, awareness training, backups etc.)
forty11 months ago
I guess the indicators used largely overlap with the ones used by anti-cheat software, so you probably want to think twice before using that on your gaming pc :)
评论 #40717053 未加载
flerchin11 months ago
Krebs said that some malware checks for a cyrillic keyboard to try and geo target outside of the country of operation. This seems to be the same type of thing.<p><a href="https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2021&#x2F;05&#x2F;try-this-one-weird-trick-russian-hackers-hate&#x2F;" rel="nofollow">https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2021&#x2F;05&#x2F;try-this-one-weird-trick...</a>
评论 #40721027 未加载
stefanve11 months ago
I get the idea but the &quot;science&quot; is based on reports it doesn&#x27;t look like this has been tested with actual malware. Would be interesting to know how well it works<p>Also make it OSS and ask for donations. Not sure what your feature earning model is but is seems easy to replicate and as point out several times right now it asked to blindly thrust you
SamuelAdams11 months ago
Another simple trick is to add the Russian or Ukraine virtual keyboard to your OS. I’m curious if this tool does this as well.<p><a href="https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2021&#x2F;05&#x2F;try-this-one-weird-trick-russian-hackers-hate&#x2F;" rel="nofollow">https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2021&#x2F;05&#x2F;try-this-one-weird-trick...</a>
评论 #40717034 未加载
mschuster9111 months ago
As much as I&#x27;d love to see something like this everywhere, the problem is it&#x27;s useless for everyone who loves to play online games or watch DRM-encumbered content, so the majority of the population... because DRM, anticheat and malware all fear the same set of tools&#x2F;indicators.
评论 #40717159 未加载
评论 #40715558 未加载
nubinetwork11 months ago
If you&#x27;re going to go through the effort of faking honeypot&#x2F;analysis tools, why not just run them?
评论 #40715329 未加载
评论 #40715571 未加载
评论 #40715344 未加载
xiaodai11 months ago
not surprised if this is the trojan horse
评论 #40715457 未加载
sim7c0011 months ago
&quot;Fake Processes. Scarecrow will create a number of background processes that don&#x27;t do anything, but look like security research tools. Fake registry entries. Scarecrow creates registry entries to make it look like security tools are installed on your computer.&quot;<p>I&#x27;d be interested to see this tested, there&#x27;s tons of good malware repos out there like vx-underground&#x27;s collections that can be used to test it.<p>If you dont wanna share the source, somewhat logical. Perhaps run a test versus gigabytes of malware samples and let us know which ones actually query these process names &#x2F; values you create and disable themselves as a result??
mistercheph11 months ago
More likely than not this is malware
verandaguy11 months ago
This is a really cool concept! Even if it&#x27;s difficult to trust it as-is (for reasons stated ad nauseam in other comments), this might put gas on the fire of a so-far small area of malware research, which will be good for the community at large.<p>It&#x27;s obviously an arms race when it comes to malware, but this could be a significant step forward on the defensive side, forcing malware developers to evolve their TTPs.
etrvic11 months ago
I decided to use Bitdefender a few months ago becouse i suspected my Mac had malware. I was right, there was a adware in the firefox files so it did it’s job.<p>But, my experience with the antivirus was horrible. When i first opened the app there were popus everywhere advertising for their other products, and the overall ui didn’t look trustworthy.<p>I am no security expert, so I’m asking: is this the best way to deal with malware?
评论 #40717354 未加载
TurkishPoptart11 months ago
I&#x27;ve heard one thing that motivates malware to ignore your computer is having a Russian keyboard installed. <a href="https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2021&#x2F;05&#x2F;try-this-one-weird-trick-russian-hackers-hate&#x2F;" rel="nofollow">https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2021&#x2F;05&#x2F;try-this-one-weird-trick...</a>
Copenjin11 months ago
Very nice and well executed idea, but I think that in many cases this could be overestimating the competence of the attacker.
maronato11 months ago
It asks for our names and emails, provides an opaque exe and no source code, asks to be run as admin, pings home, doesn’t say who you are or how many of you there are, and justifies it all with “trust me bro”.<p>People, this is malware. Please don’t fall for it.<p>I don’t think it’s wise to leave this on the front page. I hope dang agrees and takes it down.
usrbinbash11 months ago
Many of the most dangerous threat actors simply don&#x27;t care about getting caught. They are operated, financed and protected by nation states, and&#x2F;or operate from geopolitical locations where law enforcement is lacking.
mistercheph11 months ago
How I pwned hacker news (2024)
pogue11 months ago
Sounds like a very interesting concept. I&#x27;d like to see someone actually test this though.<p>Try running this on a Windows PC with Windows Defender off &amp; just Scarecrow running. You could use the MaleX test kit [1] or a set of malware such as the Zoo collection [2] or something more current. I&#x27;d be very interested to see how many malware executables stop half way through their installation after seeing a few bogus registry entries&#x2F;background programs running. I&#x27;m not trying to imply it&#x27;s worthless, but it needs some actual &quot;real world&quot; test results.<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;Mayachitra-Inc&#x2F;MaleX">https:&#x2F;&#x2F;github.com&#x2F;Mayachitra-Inc&#x2F;MaleX</a> [2] <a href="https:&#x2F;&#x2F;github.com&#x2F;ytisf&#x2F;theZoo">https:&#x2F;&#x2F;github.com&#x2F;ytisf&#x2F;theZoo</a>
评论 #40715510 未加载
dns_snek11 months ago
While this is a really interesting idea, and assuming that it&#x27;s actually completely safe, the irony is that it looks <i>exactly</i> what I would expect a trojan to look like - somewhat vague promises of security that could be interpreted as snake oil, conveniently packaged as an EXE with scant information about who&#x27;s behind it, what it does, and no way to verify any of it. No offense to the authors :)
salzig11 months ago
Next Iteration: malware checks for scarecrow and starts anyways ^^
dncornholio11 months ago
This software pings home. Also uses .NET which is complete overkill for such a simple app.<p>Would not recommend installing. It&#x27;s someone&#x27;s hobby project that runs as administrator.
评论 #40718110 未加载
swarnie11 months ago
I wonder if you can make malware think your language and keyboard layout is Russian without having to endure the setup, that&#x27;s been known to deter some nasty stuff.
slimebot8011 months ago
So immediately I am wondering what is the list of processes names are?<p>Lots of people on HN could easily spin up their own fake processes if they knew the names?
mrweasel11 months ago
Get a PTR record for your IP, let it resolve to honeypot087.win.internal.security.example.com, that will make your IP less interesting... To some people
jowea11 months ago
Should make it look like you&#x27;re Russian too.
makach11 months ago
legit, or best malware install attempt ever? assume all is good if you detect the cyberscarecrow process? how can this have a long-term effect?<p>if you have malware probing your processes to decide if it can run or not you have a very serious problem regardless of whether it decides to run or not, there is an entrance to your systems you don&#x27;t know about.
nsbk11 months ago
This may very well be the greatest British deception since the WWII carrot propaganda. But for malware. Nice!
lbotos11 months ago
&quot;It&#x27;s early days, were only in Alpha.&quot; -&gt; It&#x27;s early days, we&#x27;re only in Alpha.
checjsout11 months ago
I wonder if it would trick the compliance department into thinking my computer is safe and leave it alone.
richwater11 months ago
Anyone who downloads this is a moron.
Dwedit11 months ago
Will this cause actual code signature checks to tell if the EXE running is fake or not?
dogben11 months ago
A simple magic is to set system language and locale to Russian.
评论 #40715681 未加载
评论 #40715580 未加载
评论 #40715583 未加载
评论 #40715575 未加载
mrjin11 months ago
I&#x27;m wondering since when software can be scared?
评论 #40716511 未加载
m3kw911 months ago
Does it really work? Let’s see some stats
efilife11 months ago
Genius! Weird nobody invented this before
annoyingnoob11 months ago
Anyone run this through VirusTotal?
poopcat11 months ago
That is a very fun logo.
marcodiego11 months ago
I call BS. How it works says: &quot;When hackers install malicious software on a compromised victim, they first check to make sure its safe for them to run.&quot;; Download asks e-mail and name; Does not seems multiplatform and would never install anything like that on my computer in a dream unless it were open source.
评论 #40716631 未加载
评论 #40716571 未加载
zb311 months ago
Jia Tan is back :D
tazjin11 months ago
Cat, meet mouse.
otikik11 months ago
Heh.<p>The arms race continues.
MrVandemar11 months ago
No Linux version?<p>:-)
mdip11 months ago
Setting aside the concerns with this specific implementation and thinking more of &quot;the idea&quot; I think the biggest concern is this sort of application causing legitimate software to fail to run[0] and how one would &quot;white-list&quot; an application from seeing these &quot;fake artifacts designed to trick malware.&quot;<p>The problem is &quot;the fake components&quot; would have to be prevented from being detected by legitimate software and the only way I can think to do that would be to execute everything in a sandbox that is capable of: (a) hiding some contained running processes (the fake ones) from the rest of the OS while (b) while allowing the process that &quot;sees the fake stuff&quot; to be seen by everything else &quot;like any old process.&quot;<p>Applying ACLs (and restricting white-listed processes) might work in some cases; might equally just be seen as a permissions problem and result in a nonsensical error (because the developers never imagined someone would change the permissions on an obvious key), or it might be that the &quot;trick&quot; employed is &quot;Adding a Russian Keyboard&quot; which <i>can</i> be very disruptive to the user &quot;if they use more than one input language&quot; or &quot;is one of those places where a program may read from there never expecting to encounter an error.&quot;<p>A lot of this seems like it would require use of containerization -- docker&#x2F;docker-like -- for Windows apps. I&#x27;m familiar with a few offerings here and there, but I&#x27;ve worked with none of them and I run Linux more than Windows these days. So my questions really boil down to:<p>Where&#x27;s Windows containerization at? Would it be possible to run an application in a docker or docker-like container with a Windows kernel which can have its environment controlled in a manner that is more transparent to the application running within the container? Is there any other approach which would allow for &quot;non-white-listed applications&quot; to run containerized and &quot;see the Scarecrow artifacts&quot;, while allowing the white-listed applications[1] to run outside of the container in a manner that hides <i>some</i> of the processes within the container. Can it do all of that in a manner that would work if the same &quot;check&quot; were repeated immediately after confirming an Elevation dialog[2]? from the white-listed application in a manner that couldn&#x27;t be defeated by repeating the same &quot;check&quot; after presenting an elevation dialog?<p>Again, that&#x27;s assuming &quot;this is a brilliant idea&quot; -- and there&#x27;s some evidence that as a concept, at least, it would help (ignoring this particular implementation of the idea), but it still suffers from its success, so the extent that it helps&#x2F;is adopted equates to how long any of these techniques aren&#x27;t defeated. And just from the sense I get of the complexities required to &quot;implement this in a manner that legitimate won&#x27;t fail, too&quot;, I suspect it will be easier to defeat a tool like this than it will be to protect against its defeat. In other words, the attacker is a healthy young cat chasing a tired old mouse.<p>[0] Anti-cheat being the most obvious, but those are often indistinguishable from malware. I&#x27;d encountered plenty of games&#x2F;apps in the 90s that refused to run when I ran software to trace aspects of their memory interaction. I had some weird accounting app that somehow figured out when <i>my own code</i> (well, code I mostly borrowed from other implementations) was used for the same purpose.<p>[1] The assumption being that &quot;a legitimate application which does these kinds of checks&quot; is also likely to refuse to run within a container unless it&#x27;s <i>impossible</i> to detect the container as reliably as everything else (and vendors are completely tolerant of false positives if the affected customers don&#x27;t represent enough in terms of profit, or the solution is &quot;don&#x27;t run that unusual security software when you run ours&quot;).<p>[2] I&#x27;ve seen it enough with Easy Anti-cheat that I just click &quot;Yes&quot; like a drone. There was at least one occasion when it popped up after I had installed some developer tooling but <i>not</i> had a game update come down between launches. Because it was a huge install, it may just have been that the game detectedI have no idea <i>why</i> this happens -- on a few occasions, I had no update applied between loads but had installed other software so it could have been &quot;to fix something that software broke&quot; but it could also have been &quot;to re-evaluate the environment as an administrator because something changed enough on the system to warrant a re-check that it is still compliant with the rules&quot;
评论 #40718789 未加载
marcodiego11 months ago
<a href="https:&#x2F;&#x2F;xkcd.com&#x2F;272&#x2F;" rel="nofollow">https:&#x2F;&#x2F;xkcd.com&#x2F;272&#x2F;</a>
puppycodes11 months ago
i&#x27;m confused about the tradeoff of not running the software that your pretending to be running? Most AV definitly feels like malware itself so maybe thats your point? But it would probably be better to run good software than fake bad software?
评论 #40715537 未加载
评论 #40715938 未加载
moi238811 months ago
“It’s a trust thing”<p>Yeah. That won’t work for anything security related, I’m afraid.
mdip11 months ago
Outside of the authorship&#x2F;open-source fears[0], this is one of the more interesting ideas to surface in anti-virus.<p>Facing reality: anti-malware tooling is inadequate -- so inadequate, I haven&#x27;t found a reason to purchase it for the one Windows machine I still have. People say &quot;Defender works well enough, now!&quot; and I think that&#x27;s a pretty adequate way of describing it in that anti-malware has an impossible job and that is evident by every vendor&#x27;s failure to succeed at it. So why pay for it?<p>It&#x27;s <i>always</i> a cat-and-mouse game. This is an interesting approach, though, because it could shift the balance a little bit. Anti-malware&#x27;s biggest problem is successfully identifying a threat while minimally interfering with the performance of an application. A mess of techniques are used to optimize this but when a file has to be scanned, it&#x27;s expensive. It&#x27;d be interesting to see if it&#x27;d be possible to eliminate some variants of malware from on-demand scanning &quot;if this tool defeats the malware as effectively&quot;, pushing scanning for those variants to an asynchronous process that allows the executable to run while it is being scanned.<p>I can see a lot of the problems with this kind of optimization[1]: it turns a &quot;layer in the onion&quot; into a replacement for an existing function which has more unknowns as far as attacks are concerned. Creating the environmental components required to &quot;trick the malware&quot; may be more expensive than just scanning. White-list scenarios may not be possible: I suspect anti-cheat services and potentially legitimate commercial software might be affected, as well[2] ... getting them to white-list a tool like this won&#x27;t be easy unless the installed base is substantial. I suspect that &quot;hiding the artifacts this tool creates to trick malware&quot; from a white-listed processes might be impossible.<p>For at least a brief moment, this might be a useful tool in preventing infections from unknown threats. Brief, because -- by the author&#x27;s own admissions (FAQ) -- it will devolve into a cat-and-mouse game if the tool is popular enough. There&#x27;s another cat-and-mouse game, though. If this technique isn&#x27;t resource intensive while offering protection somewhere in line with what it would take to implement, all of the anti-virus vendors will implement it -- including Microsoft. And they will be seen by customers as far better equipped to play &quot;cat&quot; or at least &quot;the choice you won&#x27;t get fired over.&quot;<p>And that&#x27;s where it makes a <i>whole lot of sense</i> to open-source the product. It&#x27;s a clever idea with a lot of unknowns and a very low likelihood of being a business. Unless it&#x27;s being integrated into a larger security suite (same business challenges, but you have something of &quot;a full product&quot; as far as your customers are concerned), it&#x27;s only value (outside of purely altruistic ones) would be either &quot;popping the tool on the author&#x27;s related business&#x27;s website&quot; to bring people to a related business&#x2F;service or as a way to promote the author&#x27;s skill set (for consulting&#x2F;resume reasons). I&#x27;m not arrogant enough to say there&#x27;s <i>no way</i> to make money from it, I just can&#x27;t see it -- at least, not one that would make enough money to offset the cost of the &quot;cat and mouse&quot; game.<p>[0] Which, yeah, &quot;I wouldn&#x27;t run it on my computer&quot; but I give the authors enough of the benefit of the doubt that &quot;it&#x27;s new&quot;<p>[1] Not the least of which being that I do not author AV software so I have nothing to tell me that any of my assumptions about on-demand scanning are correct.<p>[2] It used to be a common practice to make reverse engineering more difficult.
sneak11 months ago
&gt; <i>Scarecrow creates registry entries to make it look like security tools are installed on your computer.</i><p>Best simple anti-malware technique: don’t run Windows.
评论 #40716424 未加载