--
Joel Esler
Manager, Talos Group



On May 23, 2016, at 1:52 PM, C.D. Cochrane 
<c...@post.com<mailto:c...@post.com>> wrote:


My 2 cents would be that rapid traditional signature updates are not a viable 
solution to this long term problem.
I'm pretty sure the current generation of Locky, Dridex, Nemucod, etc. 
ransomware is generated using millions
of tiny mutations so that almost every email attachment has a unique signature. 
There is no way to keep up with
that. ClamAV got more than a million virus samples per day, last time I 
inquired.
...Chris

As for they claim above about Dridex etc being too numerous to handle,
Sane Security seems to be doing just a fine job of it. (So its just a
lame response).

I'm not sure what heuristic Sane Security uses. My original point was that a 
traditional signature (sigtool?)
on the current generation of malware seems to be a non-scalable idea. One 
million new sigs per day is not
realistic. ClamAV must evolve if it is going to remain useful. There has to be 
a better scheme to ID new
malware than sigtool.

Otherwise, groach is right.  ClamAV is just a redundant way to scan for virus 
files from 2008 or see if your
latest files can generate FPs.


Obviously going to disagree.  We are pushing almost a thousand pieces of 
detection every four hours now, and that will only increase from here.



_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to