• flying_sheep
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    1
    ·
    edit-2
    4 months ago

    No, that’s not the take-away.

    Going without AV as a computer-savvy person is perfectly reasonable, as AV companies can’t be trusted, and AVs are notorious for having deep seated privileges and bad security themselves – therefore increasing your attack surface.

    The take-away is that if you’re deciding for an institution that’s contractually obligated to do a thing, you should do it.

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      8
      ·
      4 months ago

      I think it’s important to be clear about the difference between antivirus, and an in resident black box agent.

      An antivirus that you run on static files, is perfectly fine in any environment. t’s controllable it’s known you know the inputs you know the outputs. You know what you’re exposing to it. Even if the antivirus itself is a black box, you spin up a VM with the files you want to scan, you get the output of the scan, you destroy the virtual machine. So you don’t leak anything

      An agent that stays with privileged access to the machine, is basically a root kit, and they’re often black boxes. So a black box root kit is a huge security risk, especially if that black box needs to phone home to a service outside of your network. That’s just crazy. That’s more than an antivirus, that is I don’t even know the right word, but it’s a lot.

      • flying_sheep
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        4 months ago

        Very true. I doubt the researcher in question would object to use a virus scanner like you described.

        Every consumer antivirus software works like the black box rootkit you described, AFAIK.

      • stringere@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 months ago

        That’s more than an antivirus, that is I don’t even know the right word, but it’s a lot.

        I think SIEM is what you’re looking for: Security Information and Event Monitoring

    • Ajen@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 months ago

      Depending on how the contract was written, running a clamav scan periodically may have been sufficient.