BTW, does SS protect against clipboard access? I wonder if this is still possible in Windows 11. Such a feature can protect against malware like MassJacker, see link. ![]()
Here is another example of an infostealer that targets password managers. I noticed that this one is targeting browser extensions of password managers. So thatâs another way how they try to intercept passwords. ![]()
We are finding we canât do this anymore, but if you find otherwise please post the details.
Ah, interesting! The reason I asked this question is because we are considering focusing on browser plugin protection as a new feature where you can allow/deny any new plugin. We thought it might help with this issue too.
I read your other comment/post here too, thank you!
This sounds like an interesting feature that is not offered by many tools. Some malware may indeed install malicious extensions.
But it wouldnât protect against infostealers who simply try to access data from targeted apps, obviously. And I assume that malicious extensions that are added silently to the browser, can always been seen via the browserâs extension manager, but Iâm not sure about that. ![]()
OK, that would be a bummer. I did read about a feature that has been added in Opera years ago, that tries to protect against malware. So I assume there still must be a way to monitor the clipboard, unless it can only be done by the app itself. ![]()
Here it is a recent article about Clipboard Protection Gen Blogs | Clipboard Protection: Our Latest Defense Against Evolving Threats
Their technology is integrated in Norton, Avast and AVG AVâs. Another software which has a similar feature is Adlice Protect Premium (formerly RogueKiller Anti-Malware) Free Virus Cleaner | RogueKiller AntiMalware ⢠Adlice Software
Here it is an article âClipboard Hijacking and How to Prevent Itâ https://layerlogix.com/clipboard-hijacking-and-how-to-prevent-it/
I will share these with our team. Thanks @Kaliban and @RasheedHolland. Hopefully these articles are still current with modern Windows 11.
I forgot about that so called ââsafe browsersââ can also block clipboard loggers. Iâm not sure how this is done, probably by virtualization.
Very useful, thanks! I wonder how much resource usage that requires though⌠hopefully itâs reasonable.
Thatâs the thing, itâs not clear if they simply block access to some clipboard API, or if they use virtualization or if they block interprocess communication. You might want to take a look at this ââonline bankingââ test. Some AVâs passed the test and some failed to protect the clipboard.
BTW, I forgot that SS 15 also doesnât offer one of the most interesting features of SS 12, and that is protection against banking trojans. This feature is still being offered by tools like HitmanPro.Alert and G DATA Internet Security. They basically monitor browser memory for modification, see link. SS Classic did the same.
Very useful, I will share this with the team!
I wonder if we can still do this with the latest Windows versions without triggering Windows Security, etcâŚ
BTW, there is currently another new HIPS on the market that offers a lot of stuff that SpyShelter 15 is currently lacking. I wonât name it, because itâs not political correct, but I can DM you, if youâre interested. The reason why I mention this, is because it will hopefully motivate you guys to improve SS 15. With that I mean, I would like to see more behavioral monitoring besides visibility features. ![]()
Yes, please message me, thank you!
I have send you a DM. ![]()
Received, thanks!!! We will check it out.