zlacker

[parent] [thread] 30 comments
1. ravens+(OP)[view] [source] 2023-04-05 20:06:47
Windows Defender is a long standing bug in the Windows operating system. ;)

My impression is that its invention was for the sole purpose of eradicating the idea that Windows is insecure and prone to viruses, which explains why it can be overzealous and CPU hungry.

I would only enable it for family members who don't know what they are doing. For some reason, I haven't needed any form of active virus scanning in something like 15 years. If it turns out I've been infected this entire time, the criminals sure are taking their time stealing my money, etc.

replies(9): >>thewat+P2 >>squeak+45 >>olyjoh+Dc >>uni_ru+Kd >>acdha+gi >>0x457+HM >>mizzao+v61 >>LtdJor+q22 >>Too+1k8
2. thewat+P2[view] [source] 2023-04-05 20:25:24
>>ravens+(OP)
There's a misconception that you need to do something "stupid" to get a virus which is simply not the case. 0 days exist, and worms are still a thing (looking at you samba).

A great example is Pytorch just recently had a supply chain attack, and installing the nightly version between December 25th and December 30th, 2022 - would result in your home directory getting uploaded including ssh keys.

Chrome also just had a 0 day 2022 - CVE-2022-3075

Pytorch supply chain attack via Triton 2022/2023 - https://www.bleepingcomputer.com/news/security/pytorch-discl...

EDIT: Also there's a misconception that linux somehow doesn't get viruses - however the Pytorch attack affected linux users. Making a virus for windows gives you far more targets then linux, which is why they're far more common.

replies(6): >>lionko+k5 >>longsw+29 >>bakugo+za >>chlori+BW >>vladva+fh1 >>eviks+Ch1
3. squeak+45[view] [source] 2023-04-05 20:36:49
>>ravens+(OP)
> who don't know what they are doing.

I think this would describe the majority of computer users. And the majority of computer users are also using Windows.

> I haven't needed any form of active virus scanning in something like 15 years

Microsoft Defender antivirus was released alongside Windows 8 in 2012. And it's essentially a rewrite of Microsoft Security Essentials which came included starting with Vista. If you haven't been explicitly disabling it, which your comment sounds like, you've been running one without knowing it for 16 years

replies(1): >>Dalewy+S6
◧◩
4. lionko+k5[view] [source] [discussion] 2023-04-05 20:37:53
>>thewat+P2
windows users will also happily "run as administrator", while a lot of linux users know not to do that in my experience
replies(3): >>qup+2h >>ChuckN+8l >>0x457+dN
◧◩
5. Dalewy+S6[view] [source] [discussion] 2023-04-05 20:45:53
>>squeak+45
>Microsoft Defender antivirus was released alongside Windows 8 in 2012. And it's essentially a rewrite of Microsoft Security Essentials which came included starting with Vista.

Not quite.

Windows Defender was released together with Windows Vista, this was very rudimentary and only handled malware and spyware not unlike Malwarebytes, it did not handle viruses.

Microsoft Security Essentials was released standalone sometime during Windows 7's era, this was fully fledged anti-virus.

Microsoft Security Essentials was renamed Microsoft Defender and bundled with Windows starting from Windows 8, where it has stayed to this day.

replies(3): >>squeak+Fc >>olyjoh+Qc >>srj+Q31
◧◩
6. longsw+29[view] [source] [discussion] 2023-04-05 20:57:30
>>thewat+P2
There will always be 0 days out there, but they will always be very expensive and rare. If you have the ressources to buy or find a 0-day, you definetly won't blow it by executing known malware, or other stuff, which falls under the detected by AV's. I really don't thing that having AV installed will protect any user from a 0-day.

On the other side, you install a very invasive av software, which runs as privileged user and intercepts everything thats happening on your system. They even make a great target for malware by themself. Just recently ClamAV had a bug in it's file scanner, which let to an rce: CVE-2023-20032

◧◩
7. bakugo+za[view] [source] [discussion] 2023-04-05 21:05:06
>>thewat+P2
> 0 days exist,

And they're almost exclusively used in targeted attacks against valuable targets, because burning a 0-day to hack grandma's old laptop and steal her facebook password isn't a particularly good investment.

8. olyjoh+Dc[view] [source] 2023-04-05 21:18:43
>>ravens+(OP)
Defender is designed to tick a box on enterprise security checklists. That is about all it really excels at. It keeps IT people happy because they don't have to deal with a third party for their shitty AV.
◧◩◪
9. squeak+Fc[view] [source] [discussion] 2023-04-05 21:18:50
>>Dalewy+S6
You're right I was wrong about MSE which was the Windows 7 era. But Windows Defender was released in 2005 and was a rebrand of Microsoft AntiSpyware, which itself was a rebrand of GIANT AntiSpyware.

The version of Windows Defender that came with Vista was a bit different and included realtime scanning when executables were run.

◧◩◪
10. olyjoh+Qc[view] [source] [discussion] 2023-04-05 21:20:11
>>Dalewy+S6
They bought out the best AV product on the market, and initially it was amazing. They even improved on it at first, but then it started aging into the turd they is now Defender.
11. uni_ru+Kd[view] [source] 2023-04-05 21:25:21
>>ravens+(OP)
It's decent enough in the past 8-10 years that I don't bother with much free antivirus on my own or others' machines in the current year. It's a far cry from the Windows XP / 7 era where it was fucking useless and people got Ransomware or Rogues pretending to be AV's every other Tuesday just from using google images. Nowadays it is simply adequate for most people.

At this point the only other antivirus I bother keeping an install of on my personal system is Malwarebytes free in case things really go tits up and I need to run it and rkill from safe mode.

◧◩◪
12. qup+2h[view] [source] [discussion] 2023-04-05 21:42:51
>>lionko+k5
Yes, I have an absolutely pristine record and I have never, ever copy-pasted a script from the internet with sudo, or piped curl into bash because I'm lazy and I trust most github READMEs. Never.
replies(2): >>chlori+nX >>lionko+kw1
13. acdha+gi[view] [source] 2023-04-05 21:49:17
>>ravens+(OP)
> I would only enable it for family members who don't know what they are doing.

The problem is that this also includes most people who think they know what they’re doing. We’re in the middle of a big change in how general purpose computers work and it’s basically driven by accepting that people make mistakes, trusted sites or things like their URL shorteners or social media are compromised periodically, etc. Maybe you’re really good at never visiting dodgy websites, always use an ad blocker, etc. … but have you never installed the wrong Python, NPM, etc. package by mistake?

Short term, something like Defender makes sense for most devices used for web or email. Longer term, I think we need more focus on sandboxing, hardware MFA, etc. so we aren’t using systems so brittle that everything just falls apart if you make a mistake. I don’t want the entire world to be iOS but the status quo sucked more.

◧◩◪
14. ChuckN+8l[view] [source] [discussion] 2023-04-05 22:04:36
>>lionko+k5
>a lot of linux users know not to do that in my experience

README.md : "to get this to work, curl or wget the following script and run it as sudo"

Linux users: Aye

replies(1): >>lionko+qw1
15. 0x457+HM[view] [source] 2023-04-06 01:04:17
>>ravens+(OP)
> The sole purpose of eradicating the idea that Windows is insecure and prone to viruses

Well, during Windows XP days if you connect to a LAN with compromised devices (in some countries it was popular to just hook up the entire neighborhood to a series of switches or poorly managed office network) before you install every single update possible - too late, your machine is part of the botnet.

Also, some environments require antivirus running for certification even if the machine in question is a linux server with read-only volumes.

◧◩◪
16. 0x457+dN[view] [source] [discussion] 2023-04-06 01:07:48
>>lionko+k5
Honestly...I'm far for afraid of my $HOME being uploaded somewhere. You don't need "run as administrator" for that.
replies(1): >>thewat+E02
◧◩
17. chlori+BW[view] [source] [discussion] 2023-04-06 02:24:20
>>thewat+P2
This is true, but the overwhelming majority of malware on non-tech savvy peoples systems are going to be from silly things, like downloading and running a malicious executable, and not from 0 days.
◧◩◪◨
18. chlori+nX[view] [source] [discussion] 2023-04-06 02:31:46
>>qup+2h
I have literally never done this and do not understand why anyone would.

Installing software to the system should be handled by a package manager, but if you must install something like this, just throw it in a tmpfile and inspect the script before running it.

I know the response to this will be "but the things the script downloads and installs could be malicious", and while this is true, so long as the sources in the install script are fine, I consider this to be a separate issue (but still a big issue).

The issue of trusting source code or binaries is a thing but it doesn't justify copy pasta'ing random scripts in the shell.

Another thing to take note of, there in the past have been bugs in terminal emulators that allowed pasting certain characters that made the text look completely different than what it actually was, so pasting "ls $HOME" could have actually been "rm -rf ~/" for example.

◧◩◪
19. srj+Q31[view] [source] [discussion] 2023-04-06 03:28:15
>>Dalewy+S6
The guts are the same across these systems (defender, mse, forefront, etc). They use the same engine but it used to be defender only received antispyware signatures. There are some features on top but basically these are just wrappers around the same platform.

The original team that worked on this was awesome but a bunch of bad managers came over from Exchange and ruined it.

source: worked on this several years ago

20. mizzao+v61[view] [source] 2023-04-06 04:00:04
>>ravens+(OP)
I always disable Defender on my Windows machines as it eats both CPU and disk cycles for no reason, slowing things down to a halt. Was really noticeable on my Surface Book, which was otherwise a great machine.
◧◩
21. vladva+fh1[view] [source] [discussion] 2023-04-06 05:49:24
>>thewat+P2
> A great example is Pytorch just recently had a supply chain attack, and installing the nightly version between December 25th and December 30th, 2022 - would result in your home directory getting uploaded including ssh keys.

Do you think Defender would have helped with that? I'm highly doubtful.

What would probably have, is if MS's implementation of protected folders, or whatever it's called, wouldn't have been completely brain-dead.

> EDIT: Also there's a misconception that linux somehow doesn't get viruses - however the Pytorch attack affected linux users. Making a virus for windows gives you far more targets then linux, which is why they're far more common.

That's correct. But at least on Linux, if you're so inclined, you can spend a couple of hours setting up some AppArmor or SELinux profiles to prevent random crap for accessing ~/.ssh and ~/top-secret.

◧◩
22. eviks+Ch1[view] [source] [discussion] 2023-04-06 05:52:02
>>thewat+P2
Would windows defender have protected against this?
◧◩◪◨
23. lionko+kw1[view] [source] [discussion] 2023-04-06 07:53:36
>>qup+2h
I usually double check before running stuff as sudo, and piping into bash i dont really ever need (AUR). My heart goes out to those on distros where thats the way to distribute software.
replies(1): >>fransj+oW1
◧◩◪◨
24. lionko+qw1[view] [source] [discussion] 2023-04-06 07:54:37
>>ChuckN+8l
That is programmers etc using Linux, yes. Casual users wont touch the terminal.
replies(1): >>elygre+px1
◧◩◪◨⬒
25. elygre+px1[view] [source] [discussion] 2023-04-06 08:08:06
>>lionko+qw1
In my experience, there are relatively few casual users of Linux.
◧◩◪◨⬒
26. fransj+oW1[view] [source] [discussion] 2023-04-06 12:00:14
>>lionko+kw1
AUR is perfectly safe. Got it.
◧◩◪◨
27. thewat+E02[view] [source] [discussion] 2023-04-06 12:28:55
>>0x457+dN
> You don't need "run as administrator" for that.

This is what makes it so doable since you don't need any privilege escalation.

The reason why this is a big deal for a lot of people is your ssh keys will give you access to your git repos and other servers unless you have them password protected or use gpg/sk ssh keys which I think a lot of people don't do.

And of course if you can see the known hosts file/bash_history you'll likely have access to more servers to propagate to.

Also things like your browser cache is stored there.

replies(1): >>0x457+OS3
28. LtdJor+q22[view] [source] 2023-04-06 12:39:51
>>ravens+(OP)
It was consuming 25% of CPU while I was rendering a frame with Arnold on 3D Max. Thankfully, I'm not a professional (and thankfully, I moved to Gentoo).
◧◩◪◨⬒
29. 0x457+OS3[view] [source] [discussion] 2023-04-06 21:20:52
>>thewat+E02
Plenty of dangerous things stored in `~/`, they don't even need password for ssh-key if there is ssh-agent running (this is in case of dangerous process running, not just upload).

This is why I store keys on a hardware key that requires me to touch it when used and manually start ssh-agent when doing a lot of `git push`.

replies(1): >>thewat+RC6
◧◩◪◨⬒⬓
30. thewat+RC6[view] [source] [discussion] 2023-04-07 18:35:16
>>0x457+OS3
Yeah gpg/sk ssh keys are definitely the way to go.
31. Too+1k8[view] [source] 2023-04-08 08:58:29
>>ravens+(OP)
Defender was invented to remove the need for other third part anti virus scanners that would do even worse intrusions in the system than the example in TFA, giving windows a bad rep.

Originally it was a lot less hostile, over the years now itself became the villain it tried to fight.

[go to top]