• @[email protected]
    link
    fedilink
    English
    34 months ago

    Why? It’s not hard. They typically hash files and look for hits against a database of known vulnerabilities.

    • @[email protected]
      link
      fedilink
      74 months ago

      Yes and if viruses use something like base64 encoding or other methods, the hashes dont match anymore.

      As far as I understood it, it is pretty easy to make your virus permanently un-hashable by just always changing some bits

      • @[email protected]
        link
        fedilink
        English
        24 months ago

        The xz backdoor was a packaged file distributed with the standard packages though. It would be trivial to find.

        • @[email protected]
          link
          fedilink
          14 months ago

          This is obviously not about this known file.

          It is about “would this scanner detect a system package from the official repos opening an ssh connection”

    • Possibly linux
      link
      fedilink
      English
      2
      edit-2
      4 months ago

      That doesn’t work against polymorphic malware

      I think the best way is to monitor calls and behavior. Doing that is a privacy nightmare