Hot Take Kaspersky and various other AVs can't detect simple ransomware script

If none of that came true, a new name will be created
the new malware:
Walter White GIF by Breaking Bad
 
Malware is not malware just because of the actions it performs, but because these actions are not clearly announced and mentioned. If the renaming behaviour is clearly announced and explained, users download the script with the renaming intention in mind.

If Bitdefender wants to detect and block every micro action remotely resembling ransomware, that’s Bitdefender’s vision for their products, nothing wrong.
But it is not an industry-wide practice and standard that everyone should follow.
 
It is an open question whether scripts are required on home users' machines.
Microsoft trends towards "Disinclined to permit script execution on home users' machines" to categorically and definitively solve the problem of users generally not knowing what they're doing. In other words, protecting users from themselves - and by extension via the internetworks - everyone else.

It would be better to allow scripting and some administrative tasks only from a special troubleshooting account.
Microsoft agrees, but then there's that troublesome "User Rights" and "Users Want to Use Stuff" dinosaur thinking that infects and poisons the minds of the majority.

And then expecting users to do a little bit of work - like switch accounts or a flipping a few Booleans - well... that's, that's... that's just downright anti-consumer. It's wrong! It's harmful! It causes generational and group trauma! It's anti-hooman!!
 
Last edited:
If Bitdefender wants to detect and block every micro action remotely resembling ransomware, that’s Bitdefender’s vision for their products, nothing wrong
It is like deciding to stay home because I cannot look right and left before crossing street.
Sacrificing usability for blind security.
 
  • Hundred Points
  • Like
Reactions: Khushal and Trident
It is like deciding to stay home because I cannot look right and left before crossing street.
Sacrificing usability for blind security.

Scripts were not introduced for home users, but for Administrators in Enterprises. Why must home users suffer because of this?
Similarly, why restrict drivers by introducing zebras? Why should drivers and car manufacturers care about creatures that use feet?
 
Last edited:
Scripts were not introduced for home users, but for Administrators in Enterprises. Why must home users suffer because of this?
Similarly, why restrict drivers by introducing zebras? Why should drivers care about creatures that use feet?
Home users need scripts for coding and other reasons ;)
 
Home users need scripts for coding and other reasons ;)

They do not.
It is like saying that swimmers need muddy waters to swim.:)
Even if 0.01% home users would like to use scripts for a specific purpose, it does not mean that allowing scripts for the remaining 99.99% is a reasonable idea.

Edit.
Playing with scripts is OK. The tiny percentage of home users who would like scripting might buy the extended Windows version with enabled scripting or play with scripts on the troubleshooting account.
 
Last edited:
I would like to know what will smart app control Classify this script will it allow this script to run or it will block it🤔

Your script isn't doing anything... Why are you insisting on seeing it blocked? I don't understand...
Launched with ESET, access denied even though I launched it in administrator mode...
Windows isn't stupid enough to let a poor BATCH file destroy the system... x)
You have Windows folder protection, etc., but nothing has been touched, not even my files.

Capture d’écran 2025-09-10 220129.png Capture d’écran 2025-09-10 220208.png
 
SAC is blocking any potentially "dangerous" extension with motw (reg, lnk, vbs, vbe, cmd, ps1, bat, ....) and for lnk even if does not have motw but the file of the shortcut has.

Yes, indeed, it works like an Anti-Exe (such as AppGuard or Avast! Free's Smart mode).
 
Yes, indeed, it works like an Anti-Exe (such as AppGuard or Avast! Free's Smart mode).
On my K, I am using it like this: I uncheck the box "Do not trust digitally signed applications" and also disable "Trust Kaspersky Security Network (KSN)". I leave K very restricted, so that any new or unknown file that tries to run will be blocked and will not have any access to the internet. ;)

1757536108712.png

1757536195223.png
 
And then expecting users to do a little bit of work - like switch accounts or a flipping a few Booleans - well... that's, that's...
fwiw sidenote, I just visited my Ludite brother out of town, he had NEVER updated his android, did that for him, also unlocked, so I asked him to pick PIN, set lock, and it autolocked after I we parted, and he threw a sh!tfit. :ROFLMAO:
 
SAC is blocking any potentially "dangerous" extension with motw ...

It is not as good as blocking any potentially dangerous file type. :)
SAC can only block about 10% of such file types (the most dangerous ones).
It is "incredibly effective" at home, but would not be effective against targeted attacks in Enterprises.