A lot of people ask me about the best anti-virus programs out there. A consumer has so many choices these days it's hard to tell what's good and what's rubbish. From AVG to Panda, McAfee to Norton, the computer stores are brimming with candy colored boxes luring in unsuspecting customers. Obviously the best anti-virus is common sense. Don't download the .exe file attached to that weird e-mail in your spam folder. Don't crack/steal software using key generators from Russia. Easy stuff people, c'mon.
But as far as actual programs, the two I recommend are Windows Defender and Malwarebytes. Windows Defender is a program that comes for free on newer Windows computers and is a free download for older Windows machines. If you don't have it (and have a legal copy of Windows 7 or up), download Windows Defender here, it's free! Do it now.
But as for paid programs, I always recommend Malwarebytes Anti-Malware. Why? It's powerful, it's fast and it stays out of the darn way. The one thing I hate more than viruses are bloated slow anti-virus programs that slow down your computer more than the damn virus! I'm lookin' at you Norton!! But Malwarebytes is super slick. And now they're trying to make it even better with version 2.0. They are now shipping with built in and improved "Anti-Rootkit and Chameleon self-protection technologies" that they have been working for a year now. Most importantly, the detection and removal engine was significantly improved. It was already awesome, now it's going to be even sweeter. What's more is that they are giving the whole thing a much needed facelift.
They mention that this is beta and is not necessarily stable, but it's still worth a look. It's not 100% certain if the beta keys will continue to work after the beta. But they do mention that, although they are changing to a yearly subscription model, they will be honoring all the lifetime keys they have ever given away as well as giving out more lifetime keys. So if these beta keys expire and you see a good deal on a lifetime key, snatch it up. Trust me, this program is worth it!
Babax stealer is at least around since June 2019. At that time a user named ForlayPy gave away the source code for free after being dissatisfied with a customer they sold the source to.
A colleague of mine discovered the first Osno stealer sample[1] on 5th October 2020. The sample[1] is a packed .NET assembly with the module name FallGuysStats. The module name indicates that it is using a statistics generator for the Steam game Fall Guys as a lure. The config shows version Osno 2.1.5 and has placeholders for some of the functions, including FTP and Telegram settings.
By the end of October researcher @backsla3h noted that the stealer is sold on forums. The advertisment comparison of Babax and Osno shows not only an increased price but also four more features or "Benefits" for Osno: r77 and network spreading, Anti-AV and evasion of WindowsDefender via allowlist, AnarchyGrabber and microphone records. Additionally there is a ransomware module which is not advertised (yet). Most of these features are described in the following sections.
Although the advertisment calls this an exploit, it is actually an open source rootkit by bytecode77. The Github repo provides DLL's for this rootkit as well as an installer. Osno does the installation itself. Just like the rootkit installer, Osno registers the rootkit DLL to AppInit_DLLs and enables LoadAppInit_DLLs so it is loaded with every process. Because the rookit DLLs are not signed, it sets RequireSignedAppInit_DLLs to 0.
The rootkit uses MinHook to redirect WinAPI calls, so that it hides processes and file names, e.g., from explorer and taskmanager. The proof-of-concept binaries for the rootkit hide files and processes that start with "$77". Since Osno uses the proof-of-concept binaries, it needs to add the prefix "$77" to its own files to make it work.
Osno collects all accessible IP adresses in the local network, then downloads SharpExec binaries from Github. SharpExec is a tool with various commands for lateral movement. Osno executes the following command for every collected IP and domain:
The file gpustats.bx contains the path to the Osno executable. This command attempts to upload Osno to the given IP into the %TEMP% folder and executes it. That way Osno is able to spread to all accessible computers within the network.
Osno ransomware, or OsnoLocker as it is called in the code, has an implementation for XXTEA. However, it is not used in the current sample. Instead it overwrites the original content of the files with a marker. The marker is the string "OsnoRansom" appended by a randomly created string of length 50-200 characters consisting of uppercase letters A-Z and digits 0-9. Described as a regex this would be ^OsnoRansom([A-Z0-9])50,200$. The randomly created string will be different for every affected file.
OsnoLocker puts a ransom message into a file called RecInstruct.osnoned (sic!). It proceeds to write an executable to disk named Osno Decryptor.exe[3] whose purpose is to lock the screen, display the ransom message that was placed in RecInstruct.osnoned and ask for a decryption code. This Osno Decryptor.exe has the module name FakeRansomware.
Osno is a wiper in its current form and payment will not help to get any files back. Recovery of files via shadow volumes copies can work, though. Future versions of Osno might use the already implemented XXTEA to encrypt files.
Osno stealer implements the code of AnarchyGrabber 3. An article by Bleepingcomputer describes the additional features of the latest AnarchyGrabber version. Just like that version, Osno will force Discord to load JScript files inject.js and discordmod.js. To do that it puts the JScript files into the folder %AppData%\Discord\\modules\discord_desktop_core\osno. Discord will then act as a stealer.
So we have already identified six different copied sources and tools that are deployed by Osno: SharpExec, AnarchyGrabber, Da Pure C++ Clipper, CSharp-RunPE, Anti-Analysis, r77 rootkit. It is likely that there are more copied sources in those functions I didn't look at as they are beyond the scope of this article.
Firstly, most of the serious sounding features are only possible after the malware sucessfully accessed the system and gained administrator privileges. That includes the rootkit and the anti-AV. The lateral movement portion depends on an external tool that needs to be downloaded first. It is only successful if network adminstrators disregard security measures alltogether, thus, unlikely to cause serious outbreaks.
Secondly, many of the stealer's features have been taken from public respositories and are known to defenders, making detection of the malware easier. Osno seems to have been worked around some of those tools. E.g., it uses the r77 rootkit binaries as is, although they are unfinished and only work with drawbacks. Osno renames its files to make them work for the rootkit binaries instead of implementing a rootkit that works for the Osno files.
The ransomware, which may have been self-implemented, seems not finished yet, which is confirmed by existence of non-implemented XXTEA code and the fact that this feature is not advertised. Later versions will likely use encryption instead of destroying files.
Malwarebytes is an anti-malware app for finding and removing potentially harmful files from your computer. This program, formerly known as Malwarebytes Anti-Malware, can rid your computer of any threat: spyware, adware, Trojans, rogue software, etcetera.
Using the free version of Malwarebytes is very simple. All you have to do is click once to start scanning your computer, which can last from a few seconds to a few minutes, depending on the size of your hard drive and your processor's power. Once the scan is finished, you'll see a general summary of all the threats it found. By clicking on the 'view report' button, you can access additional details.
It's important to note that while the free version of Malwarebytes can scan your computer for threats, the paid version offers many other features. The most important and useful of these additional features is real-time protection. Thanks to this shield, you can prevent all kinds of problems before they even occur. Another useful tool included with the paid version is a blocker for potentially dangerous websites.
Malwarebytes is one of the best anti-malware tools available online. This program has been a benchmark since 2006 and has one of the most important security databases in the world. In addition, it is by far one of the easiest security apps to use, making it perfect for all kinds of users.
Yes, Malwarebytes is a free software. The free version of this anti-spyware software, however, has a reduced range of features compared to the Premium version, which can be purchased from the official website.
The Premium version of Malwarebytes has several additional features: real-time protection, blocking of malicious web pages, quick scanning of active threats, protection against forced uninstallation, and suspension of notifications during gaming sessions.
Yes, Malwarebytes works perfectly on Windows 11. The program is compatible with any version of Windows higher than XP, as well as with any version of MacOS higher than 10.11. It is also compatible with Android, iOS, and ChromeOS.
For some reason, after downloading and installing mallow, I have a hard time lagging the computer (although it is clean). And with iron, everything is in order. Well, that's okay. Outside viruses and ...
everyone knows that to be able to try a pro 15 days is not enough, which becomes a "quick" collection effort; without knowing what the matter is about or is what fails afterwards. ... so we would need...
b1e95dc632