TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Should antivirus vendors block state malware?

18 点作者 FSecurePal大约 14 年前

3 条评论

_b8r0大约 14 年前
For those that don't know, the man quoted, Mikko Hypponen is a really smart guy, and completely wrong.<p>Antivirus solves a specific problem: compliance. AV demonstrates that you're taking steps to reduce the likelihood of you infecting another person's computer. In our experience at Mandalorian, Antivirus has roughly a 20-40% success rate at stopping malware. That's a wide margin, but still the wrong side of 50%. To put things into perspective, in the past several hundred penetration tests, there has not been one where the AV stopped our attack, subsequent compromise or persistence mechanisms. Let me clarify:<p>In the past 18 months the total number of simulated attacks by us on customer engagements that have been stopped by Antivirus is: 0.<p>I'm fairly confident that we've never had an AV stop us, but I don't have data going that far back. Now if that's what a commercial penetration testing outfit can do, what can governments do?<p>There's no real such thing as 'state malware' per se (well there is, but I'll come to that in a minute). When defending against state level attack you need to understand your adversary and their capabilities. A government attacking you or another government is not a technology, it's a threat group. They will have a specific goal in mind and it's up to you to identify it and defend accordingly.<p>Now assume that to develop something like Stuxnet is expensive. A government is going to require a lot of resources to create ordinance to use in these attacks. They'll start with things like metasploit because if they can get in with that they don't risk blowing their own code. Then you'll start seeing zero day exploits, botnet toolkits and more before you start seeing specifically developed targeted code.<p>The reason is simple - it takes months to develop the attack and the exploits and persistence are a massive part of that. If you can detect it, block it and share the indicators, that work is now burnt.<p>Antivirus vendors are not targeting that space (or if they are, they won't win - unless they're receiving the indicators of compromise, also known as IoCs).
评论 #2309694 未加载
评论 #2309680 未加载
tobylane大约 14 年前
Yes. The hole that the state malware use couldn't be kept secret, therefore it's not safe to not patch everything. Plus, the state has no right to free access to our computers without warrants. There are many sides to this argument.
Zak大约 14 年前
The answer to this seems obvious to me: much like a lawyer, the interests of a security vendor must align with those of its customers, even when some of those customers might be doing bad things.