Pretending to be a VM to STOP Malware

แชร์
ฝัง
  • เผยแพร่เมื่อ 23 พ.ย. 2024

ความคิดเห็น • 823

  • @truestbluu
    @truestbluu 5 หลายเดือนก่อน +6855

    it also scares off valorant

    • @ottergauze
      @ottergauze 5 หลายเดือนก่อน +1349

      Ergo it's doing its job.

    • @spring_nottheseason2484
      @spring_nottheseason2484 5 หลายเดือนก่อน

      anything scares that spyware piece of sh!t

    • @KillianTwew
      @KillianTwew 5 หลายเดือนก่อน +473

      It's for our own good. 😢

    • @3RR0RNULL
      @3RR0RNULL 5 หลายเดือนก่อน +899

      @@ottergauzeYep, scaring off malware.

    • @OverRevy
      @OverRevy 5 หลายเดือนก่อน +223

      "Win Win"

  • @xymaryai8283
    @xymaryai8283 5 หลายเดือนก่อน +3079

    i love the idea of an anti-malware "spooking" malware away, just like
    "boo, i'm running vbox tools"
    "aaah, goodbye"

    • @localscripted
      @localscripted 5 หลายเดือนก่อน +93

      aaaaaaaaaaaaaaaaaaaah. scary :(

    • @KamiFrost99
      @KamiFrost99 5 หลายเดือนก่อน +12

      😂😂

    • @intuition_plays3824
      @intuition_plays3824 5 หลายเดือนก่อน +28

      I love its just crossing its fingers and praying that running stupid processes will stop it from doing anything

    • @theapexsurvivor9538
      @theapexsurvivor9538 4 หลายเดือนก่อน

      Turns out this is why certain religious symbols used to work on demons, they were just the physical spoofs of vbox tools in reality, convincing them that the developers were online and checking for bugs...

    • @cyby124
      @cyby124 4 หลายเดือนก่อน +8

      malware that does not care if its in a vm :🤣🤣🤣🤣🤣

  • @hamburger_eatspie
    @hamburger_eatspie 5 หลายเดือนก่อน +2235

    cyber scarecrow is so scary that Eric put it in a real VM just in case.

    • @KamiFrost99
      @KamiFrost99 5 หลายเดือนก่อน +178

      Yes. Wasn't because he was actively trying to run other malware with it or anything...

    • @lassebrustad
      @lassebrustad 5 หลายเดือนก่อน +17

      @@KamiFrost99 he could easily format the system after testing

    • @bogy5259
      @bogy5259 5 หลายเดือนก่อน

      But he cant Test this inside a VM ​@@KamiFrost99

    • @OzixiThrill
      @OzixiThrill 5 หลายเดือนก่อน +107

      @@KamiFrost99 See, when you're trying to test if a tool successfully masks some presence as another, it helps when you're not already running the other thing in the first place.

    • @KamiFrost99
      @KamiFrost99 5 หลายเดือนก่อน +47

      @OzixiThrill Yeah, good point. When you think about it, he kinda executed the whole thing wrong.
      He was testing Scarecrow in a VM (1) and ran malware that also wouldn't care to detect for such things (2).

  • @TheBoostedDoge
    @TheBoostedDoge 5 หลายเดือนก่อน +3091

    "we will not share it, or send you spam" tf you want my email and name for then?

    • @kujjii
      @kujjii 5 หลายเดือนก่อน +394

      From their FAQ: we ask you to share your email address with us so that we can contact you in the future about scarecrow.

    • @muba_7306
      @muba_7306 5 หลายเดือนก่อน +1054

      ​@@kujjiiso send spam :/

    • @TheBoostedDoge
      @TheBoostedDoge 5 หลายเดือนก่อน +413

      @@kujjii So, spam

    • @kaimuu
      @kaimuu 5 หลายเดือนก่อน +390

      they don't want to send you spam they just want to send you spam

    • @leivvvvvvvvv
      @leivvvvvvvvv 5 หลายเดือนก่อน +176

      @@TheBoostedDoge I am not defending them, just trying to give my opinion. They say that they wont send any spam, but you are still giving out your email address so its up to you to decide if you want to give it to them. I personally would not give them my information but you have to keep in mind, getting an email every few months about updates is not necessarily considered 'spam'. Its still weird and i wouldnt trust them.

  • @subversiveasset
    @subversiveasset 5 หลายเดือนก่อน +1615

    summary: prevents you from loading legitimate applications that don't like VMs; does nothing against most malware that don't like VMs. literally the worst of both worlds lol

    • @JackieJKENVtuber
      @JackieJKENVtuber 5 หลายเดือนก่อน +341

      If your software doesn't like VMs maybe it wasn't worth having it in the first place

    • @KamiFrost99
      @KamiFrost99 5 หลายเดือนก่อน +177

      Wrong. It does something against malware that doesn't like VMs. Those malware just weren't built sophisticatedly enough to care about VMs or AVs.
      Which is why most of them fail just against Windows Defender.
      Scarecrow really seems like a great idea, just not for anyone who isn't targeted by really clever people.

    • @mulct4727
      @mulct4727 5 หลายเดือนก่อน +95

      @@KamiFrost99 just a touch of wisdom: most modern malware will use hard flags that this program cannot replicate, like checking cpuid leaf for common hypervisors. if a person who made a malware actually cared about being detected on vms, they wouldn't implement techniques that aren't as blind as looking for random processes. a good example of what malwares do (although it's very outdated) is a project called pafish, these cannot be replicated by a simple user-mode application and would require a kernel driver that hooks into core parts of the windows kernel to fake these values.

    • @breadcraft3605
      @breadcraft3605 5 หลายเดือนก่อน +11

      wrong. if programs that don't like vms won't start, malware that doesn't like vms wouldn't run either.

    • @ElShogoso
      @ElShogoso 5 หลายเดือนก่อน +10

      @@JackieJKENVtuber maybe, but I still wanna play Diablo 2 without getting banned

  • @redditrepo473
    @redditrepo473 4 หลายเดือนก่อน +91

    Startups like to do this thing where they collect user data to show Venture Capitalist firms/individuals that their service has "X amount of users" or some bs. It does actually translate into higher valuations for startups, so that is why they do it. I recommend using fake info for this type of data phishing.

  • @shep9194
    @shep9194 5 หลายเดือนก่อน +415

    >PC name is lain
    Oh this guy a serious programmer

    • @bambusem
      @bambusem 5 หลายเดือนก่อน +16

      real

    • @Akab
      @Akab 5 หลายเดือนก่อน +13

      I call my thinkpads "mainframe" 🥴

    • @omega3fatass61
      @omega3fatass61 4 หลายเดือนก่อน

      I wish a coplandOS distro or desktop environment existed lmao

    • @errormine
      @errormine 4 หลายเดือนก่อน +5

      lain is the name of the user account

    • @SullySadface
      @SullySadface 4 หลายเดือนก่อน +21

      we should all love lain

  • @doorible
    @doorible 5 หลายเดือนก่อน +96

    they took your advice and actually made a direct download

    • @Daniel-fn7ky
      @Daniel-fn7ky 4 หลายเดือนก่อน +2

      nice meru the succubus pfp

    • @doorible
      @doorible 4 หลายเดือนก่อน +5

      @@Daniel-fn7ky thanks, i take pride in it

    • @ThatOneWeeb420
      @ThatOneWeeb420 4 หลายเดือนก่อน +7

      At least you get praised,​@@doorible.
      I get questioned lol.

    • @zyxwv
      @zyxwv 4 หลายเดือนก่อน +1

      Based Meru pfp

    • @literallydeadpool
      @literallydeadpool 4 หลายเดือนก่อน +1

      gooner pfp 👅

  • @test-rj2vl
    @test-rj2vl 5 หลายเดือนก่อน +292

    It would actually be cool if everyone would install it. Then software devs would abandon VM checks if everyone use it for extra security.

    • @tedbasher3000
      @tedbasher3000 5 หลายเดือนก่อน +61

      they'd just implement better checks, as another commenter said, you can detect the synchronization of the host cursor to the guest cursor

    • @test-rj2vl
      @test-rj2vl 5 หลายเดือนก่อน +48

      @@tedbasher3000 Make this scarecrow emulate random host to guest cursor syncs when it detects computer idle. Then they can't rely on that anymore.

    • @bait6571
      @bait6571 5 หลายเดือนก่อน +3

      I doubt this increases rdtsc timings to spoof vmexit

    • @nothappyz
      @nothappyz 5 หลายเดือนก่อน +1

      ​@@bait6571 so what? This is hypothetical

    • @bait6571
      @bait6571 5 หลายเดือนก่อน +2

      @@nothappyz and following that hypothetical, they'd move onto better detection methods.

  • @nichohells
    @nichohells 5 หลายเดือนก่อน +97

    * scares them in linux *

  • @Renblade
    @Renblade 5 หลายเดือนก่อน +191

    You know what I like about your videos? You just post desktop and get straight to the point. You also pump out content frequently. Subbing to you today and should have done it sooner - thanks for the fun videos!

    • @shallex5744
      @shallex5744 5 หลายเดือนก่อน

      don't say pump out content, those are disparaging words

  • @Ethorbit
    @Ethorbit 5 หลายเดือนก่อน +330

    it also scares off games
    It is so dumb that anti-cheats think blocking obvious virtual machines does anything to stop cheaters

    • @Garlic_Bread69
      @Garlic_Bread69 5 หลายเดือนก่อน +35

      honestly i think client security on games heavily hurts server security which actually matters because you can bypass server security but you can never really break it like you can with client

    • @kran27_
      @kran27_ 5 หลายเดือนก่อน +75

      in my time reverse engineering, i've found that software cares more about stopping incompetent attackers by making things annoying to do, rather than actually making something difficult.

    • @Butterscotch_96
      @Butterscotch_96 5 หลายเดือนก่อน +24

      It's just malware disguised as a game

    • @DriftHyena
      @DriftHyena 5 หลายเดือนก่อน +29

      Games with these types of "anti cheats" will never see a dime from my wallet.

    • @1KiloDepartment
      @1KiloDepartment 5 หลายเดือนก่อน

      @@kran27_ Adding to this: according to Steamworks documentation, Valve's own DRM is easy to defeat for a dedicated attacker!

  • @pezz2345
    @pezz2345 5 หลายเดือนก่อน +514

    Honestly this is an absolutely brilliantly hilarious idea, I love it! It's almost like dressing up as a robber and grabbing your TV once you hear someone trying to break into your house and being like "Ooops looks like there's two of us here, while I was here first so yeah" lol 😂

    • @intron9
      @intron9 5 หลายเดือนก่อน +139

      Hmm , it's more like making the house look like a set-up.

    • @mrpalindrome3067
      @mrpalindrome3067 5 หลายเดือนก่อน +70

      @@intron9 Like parking an unmarked van with obvious looking set of antennas and dishes in the roof. While also paying someone to circle the block with an icecream truck every 30 minutes.

    • @tacokoneko
      @tacokoneko 5 หลายเดือนก่อน +29

      this is going to be REALLY fun to get installed on school computers and then people can't take tests on the computers and the techs can't figure out why safe browser won't install

    • @SuperCryptic9
      @SuperCryptic9 4 หลายเดือนก่อน +7

      I like to think of it as installing security cameras at a store that aren't plugged in to anything (which companies actually do)

    • @JoshLathamTutorials
      @JoshLathamTutorials 4 หลายเดือนก่อน +3

      Funnily enough, a lot of advance malware does check for existing malware! However, they usually attempt to kill it to have the machine for themselves.

  • @Sparkette
    @Sparkette 5 หลายเดือนก่อน +464

    That "Safe Exam Browser" thing is a joke anyway. Defeating it is as easy as using a second device.

    • @jankus5133
      @jankus5133 5 หลายเดือนก่อน +110

      It is intended for kiosks and computer labs. It obviously provides laughable security in the home environment.

    • @tacokoneko
      @tacokoneko 5 หลายเดือนก่อน

      i dont think a single person has ever actually cheated by tricking safe browser, real cheaters likely use a phone thats 10 times easier to hide, more plausible deniability if caught like trying "my dying aunt is calling me" and a whole list of usual social engineering things real cheaters do that are way harder to get away with if you open up stuff on the monitored computer

    • @adamgreenhill110
      @adamgreenhill110 5 หลายเดือนก่อน

      ​@@jankus5133It's advertised for home use too... Which is funny

    • @untrust2033
      @untrust2033 5 หลายเดือนก่อน

      @@jankus5133 This.

    • @LucasWills
      @LucasWills 5 หลายเดือนก่อน

      @@jankus5133schools (and even my college professors) are using stuff like that for at-home exams anyway. It gives a false sense of security, but maybe it at least scares some students into not cheating

  • @Spiderfffun
    @Spiderfffun 5 หลายเดือนก่อน +78

    that's actually pretty cool, the issues you talked about in the start are pretty big tho.

    • @xinaesthetic
      @xinaesthetic 5 หลายเดือนก่อน +8

      Yeah something like that not being open source is a big red flag I'd say.

    • @jimmykrochmalska3501
      @jimmykrochmalska3501 5 หลายเดือนก่อน +8

      @@xinaesthetic i'd say its a yellow flag, its very easy to make backdoors and bypasses if evil people can just read the entire source code, while at the same time we dont know what the actual intentions are of the program

  • @miku
    @miku 5 หลายเดือนก่อน +90

    windows username lain.
    well. can't say I'm too surprised. nice detail.

    • @furkanyldz8460
      @furkanyldz8460 5 หลายเดือนก่อน

      what it means?

    • @downloadableram2666
      @downloadableram2666 5 หลายเดือนก่อน +27

      @@furkanyldz8460 It's a reference to the very avant-garde anime Serial Experiments Lain.

    • @Andatukasa
      @Andatukasa 5 หลายเดือนก่อน +1

      Ohhh, nice catch

    • @furkanyldz8460
      @furkanyldz8460 5 หลายเดือนก่อน

      @@downloadableram2666 thanks for info - i'm going to check anime , its seems very interesting

    • @longdreameclipse
      @longdreameclipse 5 หลายเดือนก่อน +3

      youtube veteran detected 😯

  • @SperkSan
    @SperkSan 5 หลายเดือนก่อน +12

    I agree, it is a REALLY cool idea to pose as malware researcher to prevent malware from running on your computer

  • @FirstNameLastName-gh9iw
    @FirstNameLastName-gh9iw 4 หลายเดือนก่อน +4

    I’ve really discovered that windows defender is the only thing you really need. If it’s getting around windows defender, it’s getting around basically whatever you’ve got

  • @Guardie
    @Guardie 5 หลายเดือนก่อน +80

    Okay but the idea of malware developers changing up their malware to check for scarecrow is kinda funny.
    Because if you then run scarecrow in a virtual machine it would trick the malware into running...
    Which is kind of the literal opposite of what it was intended to do

    • @tissuepaper9962
      @tissuepaper9962 4 หลายเดือนก่อน +4

      but it would be really useful for honeypots.

    • @Conventil
      @Conventil 4 หลายเดือนก่อน +7

      CATCH TWENTY TWO
      malware in vm -> doesnt attack since it thinks its in a vm
      malware in scarecrow -> doesnt attack since it thinks its in a vm
      malware-ignoring-scarecrow in scarecrow vm -> doesnt recognize it being a vm

    • @GustvandeWal
      @GustvandeWal 4 หลายเดือนก่อน +14

      ​@@Conventil Not a catch 22.
      Needing working experience to be able to apply for a job,
      While not being able to get said experience because you'd need the job first,
      Is a model example of a catch 22.
      For something to be a catch 22, you need multiple paths. What you described collapses into one.
      (you can see that by observing that you only used "malware-ignoring-scarecrow" once)
      (scarecrow ends up nullifying the "vm" variable, etc.)

    • @user-bf3uy5ve9k
      @user-bf3uy5ve9k หลายเดือนก่อน

      As shown in the video, some malwares don't run if it detects a VM, if Scarecrow bypasses that, wouldn't it be quite useful for some people?

  • @jn567
    @jn567 5 หลายเดือนก่อน +82

    1:30 what if securety people just installed scarecrow in a VM to trick malware into disabling checks lol?

    • @raymondable
      @raymondable 5 หลายเดือนก่อน +5

      Scarecrow only spoofs non-VMs into appearing to be VMs. It cannot disable the VM checks as it's only designed to enable them.

    • @jn567
      @jn567 5 หลายเดือนก่อน +35

      @@raymondable he says "I hope malware people add a check for scarecrow that disables the vm checks"

    • @jn567
      @jn567 5 หลายเดือนก่อน +1

      I changed timestamp

    • @drdca8263
      @drdca8263 5 หลายเดือนก่อน +12

      @@raymondableIf malware can distinguish between “normal VM” and “normal”, and between “VM” and “non-VM scarecrow”, but can’t distinguish between “VM scarecrow” and “non-VM scarecrow”, then if they suspect that “scarecrow” indicates “non-VM scarecrow”, they might continue running if “VM with scarecrow” ?

    • @jaywebster624
      @jaywebster624 2 หลายเดือนก่อน

      What is a VM

  • @KillianTwew
    @KillianTwew 5 หลายเดือนก่อน +64

    He's a genius. Instant promotion to head of NSA. Congrats

  • @tinyrobot7443
    @tinyrobot7443 4 หลายเดือนก่อน +5

    Eric: *wants to show a technology that may or may not make viruses shot down on their own.*
    Windows defender: "Let me handle this for you"

  • @MechMK1
    @MechMK1 5 หลายเดือนก่อน +3

    The fact that it's not open source sets off some red flags for me. Absolutely nope-ing out right here.

  • @TheJoMan2
    @TheJoMan2 2 หลายเดือนก่อน +6

    0:46 "i don't like installing something this deep that isn't open source" *uses windows*

  • @tamius-han
    @tamius-han 5 หลายเดือนก่อน +10

    "I couldn't run Valorant"
    Well that suggests that Scarecrow does prevent malware from running?

  • @malwaredot
    @malwaredot 5 หลายเดือนก่อน +34

    i couldn't believe that he used personal email instead of a temp mail xD

    • @Asik_jasterek
      @Asik_jasterek 5 หลายเดือนก่อน +1

      I do it too

    • @Likemea
      @Likemea 5 หลายเดือนก่อน

      @@Asik_jasterek Sorry but I can't help you with that. Your profile picture may be inappropiate.

    • @theandroidsdarkside
      @theandroidsdarkside 5 หลายเดือนก่อน

      He said his info was already publicly online, so it doesn’t matter

    • @Voyajer.
      @Voyajer. 4 หลายเดือนก่อน +1

      @@theandroidsdarkside even then you're better off minimizing your presence

  • @thebombbird3261
    @thebombbird3261 5 หลายเดือนก่อน +57

    Could you make a video about malware escaping VMs? I heard it was possible but quite extremely rare.

    • @awesomekalin55
      @awesomekalin55 5 หลายเดือนก่อน +40

      It's only possible if there is a vulnerability in the hypervisor

    • @aevus
      @aevus 5 หลายเดือนก่อน +12

      I thought it would more often escape using the network

    • @thebombbird3261
      @thebombbird3261 5 หลายเดือนก่อน +2

      @@awesomekalin55 never thought of that for some reason

    • @internethistoriansociety3679
      @internethistoriansociety3679 5 หลายเดือนก่อน +31

      Unless you have a billion in bitcoin, are wanted by nsa or are using a 15 year old unpatched cracked license hyper visor, the odds someone would risk an exploit like that (worth hundreds of thousands if not millions ) on you is astronomical

    • @soniobolkata6692
      @soniobolkata6692 5 หลายเดือนก่อน

      Yes, I would also like seeing that kind of video

  • @mutated__donkey5840
    @mutated__donkey5840 4 หลายเดือนก่อน +2

    a non-open source, "anti malware" program seems like exactly the way to get malware onto someone who's a little tech savvy but not really tech savvy's computer.

  • @checkmate080
    @checkmate080 5 หลายเดือนก่อน +9

    dudes accent visited every former british colony

    • @liamdonegan9042
      @liamdonegan9042 4 หลายเดือนก่อน +2

      I thought i was going crazy

  • @distortions
    @distortions 5 หลายเดือนก่อน +9

    if this becomes popular then it will be straightforward to counter, Simply check for scarecrow, look at the processes directory, analyze the process, etc

    • @tissuepaper9962
      @tissuepaper9962 4 หลายเดือนก่อน +4

      but then you could use it as bait for a honeypot, to get advanced malware to run in a VM when it was designed not to. if that developer checks for scarecrow, you could install it in a VM on your honeypot server to trick the malware into thinking it's running on bare metal.

    • @distortions
      @distortions 4 หลายเดือนก่อน

      ​@@tissuepaper9962 It's unlikely to be the only factor considered by malware. Other system attributes, such as the presence of a GPU, would also be evaluated. Scarecrow serves as a preliminary checkpoint, triggering a deeper scan if necessary. In other words, malware may use Scarecrow as a initial indicator that the system is potentially a virtual machine or a sandbox environment, and if so, it will likely proceed to scan for other signs or attributes that would confirm its suspicions.
      For example, the malware may then check for the presence of specific files or directories associated with virtualization software, or inspect the system's memory usage patterns to determine if they are consistent with a virtualized environment. If these additional checks reveal evidence that suggests the system is indeed a virtual machine or sandbox

    • @black_m1n825
      @black_m1n825 3 หลายเดือนก่อน

      @@tissuepaper9962 So it turns into yet another game of cat and mouse.

    • @tissuepaper9962
      @tissuepaper9962 3 หลายเดือนก่อน

      @@black_m1n825 always has been

  • @magicjinn
    @magicjinn 5 หลายเดือนก่อน +3

    The email adress stuff is now optional, there's a "Or skip to direct download here" button.

  • @Aera223
    @Aera223 5 หลายเดือนก่อน +2

    A simple VM check is to see if SMART attributes can be read... But for userland software, a file recency check to ensure that there are both new and old files on the system

    • @TheRailroad99
      @TheRailroad99 4 หลายเดือนก่อน +2

      Wouldn't that trigger on any newly installed/ bought system?

  • @4chanshitposts425
    @4chanshitposts425 3 หลายเดือนก่อน +2

    "its not open source" Eric cried while booting up his windows computer.

  • @CheatwareOF
    @CheatwareOF 5 หลายเดือนก่อน +101

    Could it also not be Open source because they do not want Malware devs to look at the code and Notice it?

    • @EricParker
      @EricParker  5 หลายเดือนก่อน +120

      The binaries are more useful than the source for that. Assuming I wanted to check whether the fake vmware process matched what scarecrow shipped.

    • @oussama7132
      @oussama7132 5 หลายเดือนก่อน +38

      they're using a language that can be reversed easily, no obfuscation

    • @hydradragonantivirus
      @hydradragonantivirus 5 หลายเดือนก่อน +24

      Harmful thinking. That's why open source antiviruses not supported generally. Malware devs okay can see the code but open source community can fix this in short time.

    • @SolidTitanium
      @SolidTitanium 5 หลายเดือนก่อน +13

      ​@@hydradragonantivirus agree, if I have a lock on my door I rather have every smart guy out there with a copy of it so that they can improve upon it and ship updates instead of buying a master lock and having the company said it's super strong and unbreakable when in reality it's just trash.

  • @mx338
    @mx338 5 หลายเดือนก่อน +7

    If this also were to become prevelant, what would stop amy halfway sophisticated malware developer for just checking if Scare Crow was installed.

    • @Firstname-d6g
      @Firstname-d6g 2 หลายเดือนก่อน

      but you can then install scarecrow as bait inside a VM, which tricks advanced malware into running when it's not supposed to, which can boost reverse-engineering and cracking of the virus if a malware researcher is doing this.

  • @TheActualNoober
    @TheActualNoober 5 หลายเดือนก่อน +11

    man i feel like your content is increasing in quality, keep it up!
    also i really love the 30 minutes malware videos, they always cheer me up.

  • @Goblin_Hater_37
    @Goblin_Hater_37 5 หลายเดือนก่อน +2

    This video is so scary is scared away all youtube ads in my language

  • @yt-is-mal
    @yt-is-mal 5 หลายเดือนก่อน +2

    The idea is really cool, I would like to someday see an open source version and one I could use on Linux.

  • @ttkftykyfts
    @ttkftykyfts 5 หลายเดือนก่อน +5

    Oh wow! I was thinking of this some moments ago and then I see you posted a video about it. GG 😊

  • @rodok3836
    @rodok3836 5 หลายเดือนก่อน +5

    Great vid, let’s all love Lain

  • @Daniel_VolumeDown
    @Daniel_VolumeDown 5 หลายเดือนก่อน +8

    1:30 are you running software that pretenda that your pc is vm inside actual vm? Wouldn't then all thw software you tested detect the actual vm?

  • @MadisonMadi
    @MadisonMadi 4 หลายเดือนก่อน +1

    Probably has no use in this case, but i like how were able to see his license key, which usually a attacker would be looking for to steal things haha, like passwords, emails, tokens and whatever else you may have on your computer

  • @justanothercatinside
    @justanothercatinside 5 หลายเดือนก่อน +11

    This reminds me of some Worm virus on XP that if it detected that you have the .EXE file, it won't infest you, so you could just put a fake .txt file and mask it to pretend it to be the worm virus, and it won't do anything to you lol

  • @TGFEVR
    @TGFEVR 5 หลายเดือนก่อน +2

    Why the heck is this TH-cam channel so good

  • @kaz_iaa
    @kaz_iaa 4 หลายเดือนก่อน +2

    6:05
    14.1 MB binaries to do nothing is fucking insane LOL

  • @yellowcrescent
    @yellowcrescent 4 หลายเดือนก่อน

    Not super familiar with anti-VM actions by software, but there are a ton of ways to detect whether you're in a VM. My guess is that most software just uses #1 and #4 below because they can be easily implemented.
    1. Check the CPU, CPU flags, and core configuration -- the CPU model string and CPU flags, such as the 'hypervisor' flag; as well as the processor core configuration
    2. Check the DMI, SMBIOS, and ACPI information -- BIOS vendor: SeaBIOS, VMware, OVMF; mainboard vendor, memory vendor and model, etc.
    3. Check the PCI and USB devices -- this is probably the most difficult part to spoof when attempting to masquerade a VM as a real machine-- even if you use full host passthrough mode and use fully emulated devices for ethernet, disk, and sound, there will likely be an emulated VGA device and emulated keyboard/pointer devices, which would be easy to check for
    4. Checking for guest agents (vbox tools, vmware tools, QEMU guest agent, etc.) -- which to me is probably the laziest way and the easiest to defeat. If that is the only thing that Cyber Scarecrow is doing, it's basically useless as mentioned.

  • @dried9321
    @dried9321 5 หลายเดือนก่อน +4

    I do have a question. Why does the checks for the PySilon not include checks for drivers like the VFIO drivers? They are the ones commonly used in QEMU/KVM. My gaming VM has none of the blacklisted processes or files and I am not even hiding the fact that it is a VM.

  • @0xDEADBEEF_
    @0xDEADBEEF_ 5 หลายเดือนก่อน +7

    Regarding your comment of detecting fake vms by checking if multiple tools (ex. vbox guest additions and vmware user) are running, a real vm could also use multiple fake tools to trick the malware into thinking its an fake vm, or is my logic flawed?

    • @rijaja
      @rijaja 5 หลายเดือนก่อน +1

      That's exactly what I was thinking. If you want to analyze malware that you know checks for scarecrow, you can install scarecrow on the VM

  • @Astrid--
    @Astrid-- 5 หลายเดือนก่อน +2

    Woo! Thanks for making this video

  • @cycilism
    @cycilism 5 หลายเดือนก่อน +4

    Great video, throughly enjoyed this one

  • @hotmud9703
    @hotmud9703 4 หลายเดือนก่อน

    The fact that it’s not open-source is good, as virus creators won’t be able to reverse engineer it and just make their viruses immune.

    • @jnawk83
      @jnawk83 4 หลายเดือนก่อน +4

      What a load of crap. To anyone who understands machine code, all software is open source.

    • @GamerChillz
      @GamerChillz 4 หลายเดือนก่อน

      Hotmud as jnawk said not being open source only delays the reverse engineering process it doesn’t make it impossible any program you can download can be torn apart and reverse engineered your statement breeds a lot of misinformation and can be indirectly harmful

  • @proparkour1603
    @proparkour1603 5 หลายเดือนก่อน

    I recently discovered you channel and I love it. Any video on VM escaping worms anytime soon?

  • @Mempler
    @Mempler 4 หลายเดือนก่อน

    That's why competition is healthy, even between anti virus and malware. You always try something new

  • @seansingh4421
    @seansingh4421 5 หลายเดือนก่อน

    The best cyber scarecrow is just Windbg. Every malware fears a debugger

  • @zrehirs
    @zrehirs 5 หลายเดือนก่อน +5

    I WAS THINKING OF THIS EXACT SAME THING JUST A WEEK AGO.
    I GOT RECOMMENDED THIS VIDEO TODAY.
    I AM ABSOLUTELY TERRIFIED OF THE UNKNOWN MEANING OF THIS.

  • @maxmyzer9172
    @maxmyzer9172 5 หลายเดือนก่อน

    I like the idea - maybe if they had some kind of way of having this built into windows for unknown apps...

  • @someguystudios23
    @someguystudios23 4 หลายเดือนก่อน

    This is a cooler version of keeping task manager open in the background to keep btc miners from running

  • @jdrissel
    @jdrissel 4 หลายเดือนก่อน

    I had a similar idea many years ago. What I thought of was to look at the Red Pill code... If my memory serves I called it Lyrebird.

  • @Akab
    @Akab 5 หลายเดือนก่อน +1

    Honestly, running loonix makes more sense at that point. Runs better, less parties to trust, less bloat 👍

  • @FastRomanianGypsies
    @FastRomanianGypsies 5 หลายเดือนก่อน

    What a pain in the ass malware is, to have to resort to this level. I hate reality.

  • @fcantil
    @fcantil 4 หลายเดือนก่อน

    3:05 Ah... interesting. Good that I uh... haven't done that yet... ever. Imagine if I looked at their open source repo, found the specific file that detects VMs, removed an if statement, and then took an entrance exam on it just because I could. That'd be wacky.

  • @pezz2345
    @pezz2345 5 หลายเดือนก่อน +5

    I'm curious, do you have any good ways to monitor USB traffic for malicious activity? I have to regularly bring in new hardware like keyboards or mice into the enterprise and test and validate them, but I'm struggling to find some straight forward techniques apart from ripping these devices apart to look for unusual usb controllers or hoping if there is anything that the AV picks it up within our dev environments when I'm testing lol - - I do a basic review with process Explorer, and also start a ProcMon trace just to see if anything stands out but I think my trace might be too broad for it. Any advice?

    • @EricParker
      @EricParker  5 หลายเดือนก่อน +2

      Never thought of it, might be possible (with some sort of specialized software setup) to debug a usb controller. What kind of attacks are you dealing with (hidden keylogger, slipping malware into files?)

    • @coctailrob
      @coctailrob 5 หลายเดือนก่อน +2

      If you regularly get the same models of keyboard or mice you could use a USB power meter along with accuate scales. A modified device would draw more power and weigh more than the unmodified version

    • @BeefIngot
      @BeefIngot 5 หลายเดือนก่อน

      given just about anything has a microcontroller in it, and they can say anything, I feel like the only secure peripherals would be ones you loaded trusted firmware on yourself (as an organization).
      Good reason to get your company to approve custom mech keyboards.

  • @AllExistence
    @AllExistence 5 หลายเดือนก่อน

    If "legitimate" software doesn't like being tracked what it's doing, likely it's doing something you don't want to see.

  • @elektro860
    @elektro860 4 หลายเดือนก่อน +1

    It is definitely a good idea, but not every malware needs to be vm protected, since it usually is the same thing with some extra junk code and a different name

  • @RexorLeet
    @RexorLeet 3 หลายเดือนก่อน

    Question for Mr Parker. What microphone do you use? I just noticed that your microphone or audio settings or a mix of both are very nice. I was listening to music prior to viewing your video and even at a high volume, it didnt hurt my ear.

  • @yasumichi9590
    @yasumichi9590 4 หลายเดือนก่อน

    0:33 well well well, that's a very deep well

  • @ctbdjc
    @ctbdjc 4 หลายเดือนก่อน

    8:48 sea of thieves, we're sailing with the team. we're headed up north as far as the eye can see. we're care-free, we have no need to flee. i hit a skeleton with my (slice) banshee!

  • @realryleu
    @realryleu 5 หลายเดือนก่อน

    what we learned today: some malware developers don't care about VMs and windows defender has got hands

    • @almc8445
      @almc8445 5 หลายเดือนก่อน

      I think his choice of malware sources really has a lot of selection bias here - It's junk targeted at people who will disable defender, it's already detected and well known how it works...

  • @joopie46614
    @joopie46614 5 หลายเดือนก่อน +1

    This is so stupid but actually so smart at the same time

  • @mu11668B
    @mu11668B 5 หลายเดือนก่อน +1

    Such things existed years ago when I just stepped into this field. The reason why they didn't become popular is that they don't work. VMs are so common nowadays that I rarely run into samples allergic to VMs anymore.
    In simple words, do not use this. Even worse, it's closed source. It's not trustworthy AND not useful.

  • @Syrx_1
    @Syrx_1 5 หลายเดือนก่อน +1

    3:44 "borrow" ah yes the classic programmer term for stealing lmfao

  • @sturdyfool103
    @sturdyfool103 3 หลายเดือนก่อน

    Best product, prevents you from accidentally contracting Riot anti cheat

  • @lpoki8897
    @lpoki8897 5 หลายเดือนก่อน

    Cool in concept but I have my doubts that it'll ever be useful.
    As you said it will most likely stop you from using something you want to.
    And they are banking on malware to please only do VM detection and not start detecting Scarecrow.

  • @DaddyFrosty
    @DaddyFrosty 4 หลายเดือนก่อน

    I just opened Safe Exam Browser in dnSpy and just removed all of the anti-tab and all of the other features so that’s one way for those who are still in school.

  • @NotIlham
    @NotIlham 5 หลายเดือนก่อน

    This thing might be perfect when we modified the core count, disk name, gpu driver name, motherboard name and other hardware replaced into vmware or vbox stuff

  • @Eldritch_
    @Eldritch_ 5 หลายเดือนก่อน +1

    me when viruses give u a bsod when you're running it on a vm:

  • @tgirlshark
    @tgirlshark 5 หลายเดือนก่อน

    this is such an incredible niche edge case way of dealing with malicious software lmao why

  • @LanceThumping
    @LanceThumping 4 หลายเดือนก่อน

    If this takes off enough (or the technique does) then it might get used by regular people to scare off malware and it might get used by security analysts to re-enable malware that they are trying to analyze that has been updated to detect it and think the VM flags are fake.

  • @ajealicethefemme
    @ajealicethefemme 5 หลายเดือนก่อน +2

    Hiya. Whats the software that you are using there to track network requests? Is that a system that is using the wireguard key to tunnel all traffic through that application? If so its pretty cool!

  • @kovanova9409
    @kovanova9409 5 หลายเดือนก่อน +1

    The user is Lain? Seems fitting.

  • @jacobp.2024
    @jacobp.2024 5 หลายเดือนก่อน

    I CAN'T GET OVER THIS. IT'S LIKE A DIGITAL SCARECROW. AND IT WORKS.

  • @Creative2233
    @Creative2233 5 หลายเดือนก่อน +5

    Good video!

  • @LibertyMonk
    @LibertyMonk 4 หลายเดือนก่อน

    "We wont share it or send you spam" is *supposed to* mean "we'll send rare emails, but not often enough to be annoying."
    If they stick to it and send like, an email per year, or for every major update etc that's not spam. That's like, what mailing lists are for. Spam is when you're on hundreds of mailing lists, and don't care about any of it, or a few of the lists break bad and just fill your inbox.

  • @unclesmrgol
    @unclesmrgol 4 หลายเดือนก่อน

    To defeat: Check to see if both vbox and vmware is installed. Assume scarecrow is running if both are.

  • @ThePCguy17
    @ThePCguy17 4 หลายเดือนก่อน

    I mean, I cheated my way through exam software pretty easily. It was there to stop me cheating on tests in an online class...and since I was at home I just pulled out my phone and googled the answers. I had more trouble because it was difficult to google the answers to obscure astrophysics questions than because some software thought it could "control my machine."

  • @Nerdtality
    @Nerdtality 4 หลายเดือนก่อน

    They have recently added a "Or skip to direct download here" button. No signup required.

  • @kiryonnakira7566
    @kiryonnakira7566 4 หลายเดือนก่อน

    6:21 THIS IS A WAR CRIME

  • @averagenickichviewer
    @averagenickichviewer 3 หลายเดือนก่อน +1

    Let's all love lain

  • @LuizDahoraavida
    @LuizDahoraavida 5 หลายเดือนก่อน

    The idea is pretty interesting but the execution by this 'scarecrow' thing looks pretty shoddy

  • @Norieu
    @Norieu 5 หลายเดือนก่อน +1

    1:50 I'm hearing duvet in my head

  • @doomprr
    @doomprr 3 หลายเดือนก่อน

    The only issue is that some malware will detect 'virtualization' and just nuke the system entirely or bloat itself to fill the drive

  • @KizukiKotataki
    @KizukiKotataki 5 หลายเดือนก่อน +2

    i love SEB. it's open source. i can simply recompile the code without the vm protection and kiosk mode, allowing alt tabs.

  • @ErroredPerson
    @ErroredPerson 5 หลายเดือนก่อน

    Plot twist: The malware tricked you after opening it.

  • @Mysdia
    @Mysdia 4 หลายเดือนก่อน

    It sounds like a neat idea, But I suspect making a few registry keys and running process names is too superficial.
    Need to actually look at what are the predominant methods malware uses to detect analysis environments.

  • @V530-15ICR
    @V530-15ICR 5 หลายเดือนก่อน +1

    3:04 school pc moment

  • @thesun___
    @thesun___ 4 หลายเดือนก่อน

    Well, if Scarecrow closed-sourced, it's malware in itself until proven otherwise.

    • @matgaw123
      @matgaw123 4 หลายเดือนก่อน

      No?

    • @matgaw123
      @matgaw123 4 หลายเดือนก่อน

      You kinda have a point but also that apply to almost every app

    • @matgaw123
      @matgaw123 4 หลายเดือนก่อน

      Also he proved that it isn't In the video

  • @krajeq
    @krajeq 5 หลายเดือนก่อน

    malwares now gonna check and be like "wow bro has both virtualbox addtions and vmware tools installed." ;P

  • @Jdbye
    @Jdbye 5 หลายเดือนก่อน

    Pro: It stops anti-cheat from running.

  • @zawadlttv
    @zawadlttv 5 หลายเดือนก่อน +1

    if the source code isnt available, for the malware its harder to find out the cues for vm are just flukes

  • @whateverppl1229
    @whateverppl1229 4 หลายเดือนก่อน

    kind of funny to see. Normally we try to make the vm look like a normal pc.