Hello Bo, as always a sensible approach and one I adopt also. SBIE killed these dead i.e. no Locky download because of no internet access and even if it did download would have been trapped with no access to critical, sensitive or important personal and system files. I only know what the payload was because I'm running another product through it's paces and wanted to see how it reacted so ran unsandboxed (but in Shadow Mode).bo.elam wrote:Hi Chris. I force WinRar. When I run a RAR file, it runs in its own dedicated sandbox were no program is allowed access to the internet. I have Drop rights ticked and only WinRar.exe can run. Then I recover the file to my Downloads folder which is forced. And then eventually, if I decide to keep the file and move it elsewhere in the PC, when it runs, it will run sandboxed via forced programs or forced folders. For most files, it is rare when I run something unsandboxed and usually, most files run sandboxed for as long as they remain in my computers. I do a lot of what you do, as described in your post.cj716 wrote:The last 2 were rar files containing powershell scripts that downloaded Locky. Only one single engine on VT caught it on the day I got it. A week later there were 30.
Bo
Any product relying solely on signatures at the stage I got these would have been powerless to prevent a nasty Ransomware infection. Taking precautions and running internet facing apps, files you get from the internet or USBs etc and running applications known to be susceptible to exploits etc under SBIE protection with sensible settings like your's is a very effective way of preventing infection as you know. Also like you even known safe files I run sandboxed as a matter of course.
Should have pointed out in my post I also use forced folders extensively including forcing removable drives etc.with similar success. Another reason to add SBIE to your set-up.
Cheers