But loading a trojan into a Linux virtual machine and then distributing is a very targetet attack. The attacker has root access, and can craft the trojan any form s/he wants. I don't see how the AV would detect this type of custom-made trojan.
-------- Original Message --------
Subject: Re: [Full-disclosure] Virtual Machine Trojans: a new type of
threat?
From: Julio César_García_ Vizcaíno <[email protected]>
Date: Fri, April 17, 2009 9:38 pm
To: Peter Ferrie <[email protected]>
Cc: [email protected]
This is a very known issue in malware testing.
The threat depends on the AV used in the host.
It would be interesting which AVs really scan the virtual machines
files.
Bye!!
El vie, 17-04-2009 a las 14:09 -0700, Peter Ferrie escribió:
> > When a user downloads a virtual machine from the Internet, and then
> > runs it on his/her computer, the antivirus installed in the host machine
> > simply does not have access to the virtual machine, so the virtual machine
> > does not get scanned.
>
> That is simply not true. AVs can see inside VM images, and scan the files.
> The user can also install the AV inside the VM, which will also see the files.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
