Solved

Webroot can't detect malicious Word DOCs?


Userlevel 2
Badge +13
Why can't Webroot detect malicious Word DOCs?
 
I just got this doc in a spear phish e-mail and Webroot totally failed to identify the threat. This particular attack is 8 years old
First Seen In The Wild: 2010-11-20 23:29:33 
According to Virustotal the reason is that "Webroot: Unable to process file type" which suggests that Webroot can't detect ANY malicous word doc. That's pretty scary since we know it is a very common attack vector.

 
Is work being done on this? 8 years later can we get some protection?
 
https://www.virustotal.com/#/file/bc5e2cef534da102cd8b025ad4b404cf8cd832bced80c99918714bf3e3af3a13/details
icon

Best answer by BurnDaddy 11 October 2018, 01:41

View original

17 replies

Userlevel 7
Badge +63
The only suggestion I can add is to Submit a Support Ticket with the info you supplied and ask them why and please let us know what they say as we would like to know as well! The Community Staff are now gone and will not be back till Monday but support in open 24/7/365.
 
Thanks,
Userlevel 7
Badge +63
@ wrote:
I did make a support ticket. The official response is:
 
"This macro-enabled word document runs powershell to download and execute a malicious payload for the 'Emotet' banking trojan. While we do not yet detect the document itself, we would detect the execution of the payload in real time, and the hash for this payload has already been determined as malicious in our threat database."
 
Which sounds like I would have been protected if the VBA code had ran. Furthermore:
 
"We are currently beta testing our 'script shield' addition to our protective coverage, which will be better at detecting non-PE vectors such as .js files, powershell scripts, etc. Once that rolls out we should be able to stop the process at the powershell script execution (using this infection as an example), before it could connect and download the actual payload."
 
Which sounds like they are working on a more layered approach to blocking these attacks, as the payload will change over time.
Thanks for the info from support! Yes we are Beta Testing the new Script Shield see picture below:
 


 
 
Userlevel 7
Badge +54
@ wrote:
Sorry but I do not intend to spend neither money nor time with an antivirus which refuses to participate in any third party evaluation (AV Comparatives, AV Test) and has a detection rate inferior to MSE  which is the basic antivirus of all times.
Then don't. There is nobody here forcing you to, I am sure you will enjoy MSE.
@ wrote: 
Sorry but I do not intend to spend neither money nor time with an antivirus which refuses to participate in any third party evaluation ...
Yet, you’ll waste your and everyone else’s time here, on and off for years incidentally, to bi+ch and moan about a product you haven’t used in years? 
 
Unbelievable.
Userlevel 2
Badge +13
I did make a support ticket. The official response is:
 
"This macro-enabled word document runs powershell to download and execute a malicious payload for the 'Emotet' banking trojan. While we do not yet detect the document itself, we would detect the execution of the payload in real time, and the hash for this payload has already been determined as malicious in our threat database."
 
Which sounds like I would have been protected if the VBA code had ran. Furthermore:
 
"We are currently beta testing our 'script shield' addition to our protective coverage, which will be better at detecting non-PE vectors such as .js files, powershell scripts, etc. Once that rolls out we should be able to stop the process at the powershell script execution (using this infection as an example), before it could connect and download the actual payload."
 
Which sounds like they are working on a more layered approach to blocking these attacks, as the payload will change over time.
Hi total1, You have already answered your own question. It would be downright bonkers of you to pay for something you didnt feel was going to do you any good. Now, I dont think you are 100% bonkers but Ill have to read some more of your postings to make up my mind.
 
When time permits, will you post up some more comments so we can determine once and for all if you really are 100% bonkers ?
Userlevel 7
Badge +54
@ wrote:
@ wrote:
@ wrote:
 
Then don't. There is nobody here forcing you to, I am sure you will enjoy MSE.
Enjoing already for the last 3 YEARS.
Still have an unused Webroot license (3pc) in my account, never intend to use.
 

Userlevel 7
Thank you @ for posting Supports reply. Good info. 😉
@ wrote:
So , let's make this clear:
 
The malware is 8 years old, detected by the free MSE , but not Webroot, which is still "working" on some sort of detection...
Remind me again, why should I pay $30 /year for Webroot, when the free MSE performs better?
 
Just curios...
 
From the post above...
 
"While we do not yet detect the document itself, we would detect the execution of the payload in real time, and the hash for this payload has already been determined as malicious in our threat database."
 
Had the payload been executed, Webroot would've jumped on it.
 
So what's your point? (other than to start crap, as usual).
 
Just curious.
@ wrote:
Yet, you’ll waste your and everyone else’s time here, on and off for years incidentally, to bi+ch and moan about a product you haven’t used in years? 
 
Unbelievable.
Perfectly put.
Greetings 2U total1, very much oblige you spending our valuable time and thereby confirming our suspicions.On a side note, did you know that the best time to go to the Dentist is 2:30 ?
 
@ wrote:
Are there any moderators on this forum? I marked my accepted answer a long time ago and I keep getting these e-mails about thread updates. This thread derailed and should have been locked by now. There is nothing more to be added here.
You are automatically subscribed to a thread once you participate. To unsubscribe, click the three dots ("Options") in the upper-right of the thread and select "unsubscribe".
 


 
Also, these settings can be changed in your profile settings:
 


 
Hope this info helps. Also, they don't ever lock threads around here, though they should. 😉
Userlevel 7
@ wrote:
@ wrote:
@ wrote:
 
Then don't. There is nobody here forcing you to, I am sure you will enjoy MSE.
Enjoing already for the last 3 YEARS.
Still have an unused Webroot license (3pc) in my account, never intend to use.
What do you expect when you come to a forum with a negative attitude? Hmm
@ wrote:
to agree each other and to give KUDOS each other in a fantasia world...
OK, I'll grant you that, @ (or @ or @ or any of the other incarnations you have manifested in the past or will manifest in the future here, on Wilders—but I believe you've been banned from there—and doubtless on other Forums. Frankly, I can't keep up), you may have a point there.
 
But the problem is, you are the biggest problem. OK, Webroot is complete rubbish. OK, all of us are Koolaid fantasists. And yet you are still here. Honestly, you must have a gigantic personal problem whatever it is, because although you've seen the light you can't move on. Here you still are, stuck with us same kooky cult fantasists. Please, do yourself a favour and do move on. Life is too precious to waste on idiots like us or on cr*p AV products like ours.
Userlevel 2
Badge +13
Who gave Kudos to the SPAMBOT?
 
Some people just want to watch the world burn...
 
@ wrote:
@ wrote:
Life is too precious to waste on idiots like us or on cr*p AV products like ours.
Thank you for your eye-opener statement.
I will follow your advice.
Fantastic! Move on 😃
Userlevel 2
Badge +13
Are there any moderators on this forum? I marked my accepted answer a long time ago and I keep getting these e-mails about thread updates. This thread derailed and should have been locked by now. There is nothing more to be added here.

Reply