<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Détection — Expert Community</title>
        <link>https://community.bitdefender.com/en/</link>
        <pubDate>Thu, 03 Oct 2024 22:06:28 +0000</pubDate>
        <language>en</language>
            <description>Détection — Expert Community</description>
    <atom:link href="https://community.bitdefender.com/en/discussions/tagged/detection/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>How do certain administration tools get its &quot;suspicious&quot; mark?</title>
        <link>https://community.bitdefender.com/en/discussion/91213/how-do-certain-administration-tools-get-its-suspicious-mark</link>
        <pubDate>Fri, 08 Apr 2022 09:07:04 +0000</pubDate>
        <category>Security Research Team</category>
        <dc:creator>rifqiramadhan</dc:creator>
        <guid isPermaLink="false">91213@/en/discussions</guid>
        <description><![CDATA[<p>This might sound like a very broad question but I'll explain why.</p><p>I was shown a video that BitDefender was apparently white-listing a commonly used tool for reverse shell, <code spellcheck="false" tabindex="0">netcat,</code> in video below. I took the video with a grain of salt, because looking at the virtual machine, it looks like it was quite customized.</p><div data-embedjson="{&quot;height&quot;:113,&quot;width&quot;:200,&quot;photoUrl&quot;:&quot;https:\/\/i.ytimg.com\/vi\/Nc4J5sqUndU\/hqdefault.jpg&quot;,&quot;videoID&quot;:&quot;Nc4J5sqUndU&quot;,&quot;showRelated&quot;:false,&quot;start&quot;:0,&quot;url&quot;:&quot;https:\/\/www.youtube.com\/watch?v=Nc4J5sqUndU&quot;,&quot;embedType&quot;:&quot;youtube&quot;,&quot;name&quot;:&quot;Bypass Antivirus Terbaik 2021 untuk akses reverse shell (AV terbaik menurut AntivirusGuide.com)&quot;,&quot;frameSrc&quot;:&quot;https:\/\/www.youtube.com\/embed\/Nc4J5sqUndU?feature=oembed&amp;autoplay=1&quot;}">
    <a href="https://www.youtube.com/watch?v=Nc4J5sqUndU" rel="nofollow noopener ugc">
        https://www.youtube.com/watch?v=Nc4J5sqUndU
    </a>
</div><p>I read a lot about netcat and apparently it also has uses other than reverse shell. So I began my self-research on "how do anti-malware provider decides if netcat is a malicious tool or just a very powerful tool for adminstration that needs to be whitelisted".</p><p>First I looked at VirusTotal's compiled source of threat intel. One of the netcat scan result is this:</p><div data-embedjson="{&quot;body&quot;:&quot;VirusTotal&quot;,&quot;url&quot;:&quot;https:\/\/www.virustotal.com\/gui\/file\/222c75cfb301029637aea1da60e7b6fa37a1a4213fda8d014a0f01edecd47c61\/detection&quot;,&quot;embedType&quot;:&quot;link&quot;,&quot;name&quot;:&quot;VirusTotal&quot;}">
    <a href="https://www.virustotal.com/gui/file/222c75cfb301029637aea1da60e7b6fa37a1a4213fda8d014a0f01edecd47c61/detection" rel="nofollow noopener ugc">
        https://www.virustotal.com/gui/file/222c75cfb301029637aea1da60e7b6fa37a1a4213fda8d014a0f01edecd47c61/detection
    </a>
</div><p>As you can see, even BitDefender is split on detection, BitDefenderTheta gave a detection, and normal BitDefender is not.</p><p>And then I read a publication on ResearchGate.</p><p>if the link is broken, the publication is:</p><p>"Testing antivirus engines to determine their effectiveness as a security layer" by Jameel Haffejee and Barry Irwin from Rhodes University on 2014.</p><p>The study showed that antivirus evasion may have a great impact on detection by antivirus. They used netcat as "sample malware". It shows that netcat apparently was not really detected by many antivirus provider.</p><p>While we know that netcat can be used for legit reasons, and so does many other administration tools that's even paid for instance AnyDesk, TeamViewer, and even Atera Network.</p><p>I only found 1 discussion regarding a person ranting about how strict Bitdefender can be in terms of blocking administration software.</p><div data-embedjson="{&quot;recordID&quot;:90287,&quot;recordType&quot;:&quot;discussion&quot;,&quot;body&quot;:&quot;&lt;p&gt;Hello, this is my first post.  I&amp;#039;ve sent a support ticket regarding Bitdefender blocking a Remote Desktop program that I use with my clients.  This started beginning of Jan 2022 with new definition files I assume.  The program is rutserv.exe found in the following Windows location C:\\Program Files (x86)\\Remote Utilities - Host&lt;\/p&gt;&lt;p&gt;When I try to restore from quarantine, the folder location is denied and therefore I cannot add as an Exception&lt;\/p&gt;&lt;p&gt;Has anyone else come across this issue or have any comments?&lt;\/p&gt;&lt;p&gt;Thx&lt;\/p&gt;&lt;p&gt;Tony&lt;\/p&gt;&quot;,&quot;bodyRaw&quot;:&quot;[{\&quot;insert\&quot;:\&quot;Hello, this is my first post.  I've sent a support ticket regarding Bitdefender blocking a Remote Desktop program that I use with my clients.  This started beginning of Jan 2022 with new definition files I assume.  The program is rutserv.exe found in the following Windows location C:\\\\Program Files (x86)\\\\Remote Utilities - Host\\nWhen I try to restore from quarantine, the folder location is denied and therefore I cannot add as an Exception\\nHas anyone else come across this issue or have any comments?\\nThx\\nTony\\n\&quot;}]&quot;,&quot;format&quot;:&quot;rich&quot;,&quot;dateInserted&quot;:&quot;2022-02-03T14:20:01+00:00&quot;,&quot;insertUser&quot;:{&quot;userID&quot;:240175,&quot;name&quot;:&quot;Spada4IT&quot;,&quot;url&quot;:&quot;https:\/\/community.bitdefender.com\/en\/profile\/Spada4IT&quot;,&quot;photoUrl&quot;:&quot;https:\/\/community.bitdefender.com\/applications\/dashboard\/design\/images\/defaulticon.png&quot;,&quot;dateLastActive&quot;:&quot;2022-02-03T14:15:34+00:00&quot;,&quot;banned&quot;:0,&quot;punished&quot;:0,&quot;private&quot;:false,&quot;label&quot;:&quot;&quot;},&quot;displayOptions&quot;:{&quot;showUserLabel&quot;:false,&quot;showCompactUserInfo&quot;:true,&quot;showDiscussionLink&quot;:true,&quot;showPostLink&quot;:true,&quot;showCategoryLink&quot;:false,&quot;renderFullContent&quot;:false,&quot;expandByDefault&quot;:false},&quot;url&quot;:&quot;https:\/\/community.bitdefender.com\/en\/discussion\/90287\/remote-utilities-blocked&quot;,&quot;embedType&quot;:&quot;quote&quot;,&quot;name&quot;:&quot;Remote Utilities Blocked&quot;}">
    <a rel="nofollow" href="https://community.bitdefender.com/en/discussion/90287/remote-utilities-blocked">
        https://community.bitdefender.com/en/discussion/90287/remote-utilities-blocked
    </a>
</div>
<p>But out of curiousity, how do you weigh administration tools, between "this is totally fine and legit" and "we will delete this"?</p><p>Thank you!</p>]]>
        </description>
    </item>
   </channel>
</rss>
