And if it does, what type of code injection methods does it monitor, see link?
Thanks for asking this question!
If an .exe is injected into it can sometimes change its hash, and one of the main features SpyShelter has is hash monitoring. If you go to your SpyShelter Events tab and you see âbinary changedâ with a hash icon, that means an appâs binary has changed.
The second thing SpyShelter does is hold any unsigned executables. Injecting into an .exe can also make the executable unsigned in most cases from what I understand.
Therefore I think both of these features should help stop any injected executables.
However, some injection can be in memory and we may not be able to detect/stop that in our âeasyâ mode. But SpyShelter can prevent any new .exe from starting at all in our Paranoid mode, and in this case if that .exe was going to inject into another app it wouldnât be able to start to do the injection in the first place.
If you are a security researcher and would like to try injecting into executables and let us know your results any feedback is appreciated! Be sure and run SpyShelter in Paranoid for your testing.
Yes, but I donât know if hash monitoring is enough to detect code injection. And even if it did, itâs already too late to stop the damage. Like I said in the other topic, SS 15 should be focused on blocking malware post execution. So if some app manages to bypass AV, then SS should still be able to block it from doing damage.
In my view, SS should be able to block ââprocess memory modificationââ, the old SS Classic actually did have this option. So from what I understand, the new SS 15 doesnât block code injection at all? For example, some malware use basic code injection, but others use more advanced ones like process hollowing. SS 15 should be able to block this, like any other decent behavior blocker.
Thanks for your feedback on improving SpyShelter with process memory modification. Our team will investigate if itâs possible to do something like that in the future.
You wrote âSS 15 should be focused on blocking malware post executionâ. I donât agree. Antiviruses focus on this and remediation, but our focus is on application control and allowing you to control whatâs allowed to launch in the first place. Application control is something that antiviruses donât usually do and thatâs our focus, along with revealing what apps are doing in the background through visualization.
So in summary, we focus on letting you know what your apps are doing in the background, and app control. For example, maybe an app is not malware but itâs doing something you donât like⌠with SpyShelter you can pick up on that activity and block it even though itâs not actually malware. Or maybe something is just annoying or wasting your resources⌠same thing⌠you can block it or prevent it from ever starting.
I get what youâre saying, but perhaps I didnât explain it correctly, so I will give a bit more background info.
Basically I see SpyShelter as a tool that is meant to protect in case AV fails. So I completely agree with you that SS is about application control. If Iâm correct, SS will alert about registry modification, service/driver installation and file/folder modification. This way you can control both semi-trusted apps and block malware from doing damage.
What I would rather disable is the whitelisting, I donât want SS to alert me about every unknown app that Iâm launching. Thatâs why always disable UAC, itâs too annoying. So basically if Win Defender (and VirusTotal) tell me a file is clean, I donât want to be alerted about it. I do however want to be alerted about their behavior to get a clue if they might be malicious or not.
And thatâs why I also came up with this idea to make SS alert about advanced code injection methods, because this is a widely used technique by malware.
Same goes for SS being able to alert about apps trying to capture the screen and clipboard, and webcam and microphone usage by apps. Not to forget about network access. And you should be able to configure SS in a way that it will automatically block certain stuff, without even alerting. This is all about app behavior control.
BTW, I just noticed in this blogpost that SS is apparantly able to block ââInjections into other executablesââ, so is this the same as blocking code injection?
Good catch! We planned to make the new version have a specific code injection protection feature but we did not implement it.
Instead, preventing an executable from launching (with our Paranoid or Suspicious modes) that could potentially inject into another application should prevent any injections.
I think we should probably update the article and change it so we donât specifically mention that feature that was in the Classic version. Do you agree?
Yes, the article should obviously be changed if SS currently does not protect against code injection.
In my view, protection against code injection should be added though, itâs a dangerous and widely used technique that should be monitored by behavior blockers. Is this difficult to add in Win 11? From all the methods that were mentioned, I believe that at least the first 6 should be covered.
I have updated a ticket to update the web page. Thanks for pointing out that issue.
I have shared your comments with our team about looking at adding that functionality.
The text was removed from the page. Thanks again for letting us know of this issue.
BTW, perhaps itâs an idea to make it more clear on the SS website, what exactly each module does. I was looking at the SS screenshots on Softpedia and I noticed youâve got 8 modules that you can enable/disable, namely:
1 Threat Protection
2 Application Security Control
3 Executable Insights
4 Registry Integrity Control
5 System Integrity Control
6 File Integrity Control
7 Screenshot Protection
8 Keyboard Protection (not yet developed)
Of course you guys do provide information, but a bit more info would be nice.
For example, I assume Module 1 is a cloud based AV and Module 2 is a whitelist. And itâs not clear to me what Module 3 exactly does. Which registry keys does Module 4 monitor?
Does Module 5 only monitor service/driver installation, or does it also monitor service/driver tampering? Some malware will try to disable certain service and drivers.
I assume Module 6 blocks access to certain folders (for example the Downloads and Documents folder), but can you also configure folders to be totally locked or read-only? And can you assign trusted apps that should be allowed folder access?
https://www.softpedia.com/get/Security/Security-Related/SpyShelter-Personal-Free.shtml
BTW, here is some more info about process/code injection.
Of course I donât expect you guys to implement protection against all of this stuff, because itâs quite complex, but protection against basic code injection should be possible, similar to SS Classic.
I think that article may be our old out of date version. We no longer have the âModule 5â feature, but instead we prevent executables from launching at all so they canât install drivers.
We do have the folder feature in our latest version under âFile Integrity Controlâ. Yes, you can control the things above that you request. Please give it a try under âProtectionâ.
OK, so thatâs what I meant, this means that the information should be updated. So basically, SS 15 doesnât monitor code injection and service/driver installation, while SS Classic did.
But what I donât understand is why didnât you guys further develop SS 14, why did you guys decide to start from scratch? I assume that when you bought SpyShelter from Datpol (Polish company), you guys got all of the code right?
BTW, you didnât answer my question about Module 3, what exactly does it alert about? And in which module are webcam and microphone access covered?
BTW, we already talked about this, but once again I have to mention that ââpreventing executables from launchingââ is basically an AVâs job, like Windows Defender. So to me that is no selling point, I wouldnât buy SS for this. Or does SS 15 use a third party AV engine? Or is it based on VirusTotal? This is completely unclear to me.
Thatâs why I mentioned several times that the job of behavior blockers/anti-loggers like SS is to monitor app behavior. So apps that are already allowed to run (because AV says they are clean) should still be monitored for suspicious behavior, I suppose thatâs what we call Zero Trust. And thatâs why my goal is to get SS 15 at the same level as SS Classic in terms of protection, I think that should be the objective.
I see that protection against code injection is also mentioned in the ââYou Make The Rules With SpyShelterââ section, this should also be corrected.
Use SpyShelterâs powerful âRulesâ system to see how the executables on your PC are behaving, then block problematic behavior. For example, executables injecting into other executables, or unexpected changes to sensitive parts of the Windows Registry, and much more. You can even make rules based on publisher, for example you could allow all executable activity from Mozilla, or another publisher you trust.
Over here is mentioned that SS detects service/driver installation, this should also be corrected. But now that I think of it, shouldnât the registry monitor (Module 4) in SS be able to block service/driver installation?
SpyShelter can allow or deny the following application behaviors with Windows:
- ⢠Windows Registry Access (as mentioned previously)
- ⢠New Windows Services
- ⢠New Windows Drivers
- ⢠Access to certain files and folders
Our software has System Integrity Control that should prevent services/drivers as you suggested. Sorry for any confusion. Please switch it on to try it out.
This is an interesting thing to post because it almost seems like you havenât installed SpyShelter yet? Are you not using SpyShelter yet on your own PC?
We have a free trial where you can use all the features for a limited amount of time.
Perhaps you are a security researcher learning about different products? If so, thatâs great and Iâm glad to discuss SpyShelter with you and I enjoy doing so, but I think youâd have better understanding if you installed our app and turned on âParanoidâ mode under âProtectionâ. Then you can understand why people like SpyShelter.
SpyShelter lets you decide which apps/publishers are allowed to launch, so you can prevent privacy violating apps or adware apps from launching for example. We give you major control over your PC with our powerful âRulesâ system.
We also keep track of software-related changes to your PC so you can see them in real-time. This may not be malware, but instead privacy violators, resource wasters, adware, and other badware type apps that arenât specifically malware.
Please give SpyShelter a try if you havenât? If I misunderstood something please let me know. And like I said, I really enjoy posting here in the forum and answering everything so please feel free to continue asking. If you use a Mac for example and you canât use SpyShelter, I am glad to answer your questions, no problem!
Itâs just surprising that you compare us to an AV because SpyShelter doesnât look or act like one and itâs pretty obvious if youâre using it? Please install SpyShelter and give it a try.