Ransomware Test Report - 2025
Ransomware Test Report - 2025
Test summary
This report has been prepared to evaluate the activities of Malwarebytes, Avast and Windows Defender against Ransomware attacks. In the test, a specially developed Ransomware Pyload tool was used.
Software used in the test
Malwarebytes
Avast antivirus
Microsoft Windows Defender (Windows 10/11 versions)
Attack vector: pyload
The pyload used in the test is a Ransomware module that encrypts certain file extensions (.TXT, .PNG, etc.) in the target system using a Fixed Switch and IV with a CBC algorithm. After encryption, encrypted content is written on the original files and the .dust suffix is added to the file extensions. In addition, a ransom note is left to the desktop user.
Pyload takes the following steps:
Scans the target extension files under the user's profile directory.
Passwords with AES-256 CBC.
Changes the extensions of files to .dust.
Leaves the ransom note on the desktop.
Test results
Three antivirus software could not detect the file encryption attack by Pyload.
The encryption of the files has been completed and file access was prevented.
The ransom grade has become visible in the system.
Real -time protection modules of antiviruses could not stop the attack and no warning or quarantine was performed.
Evaluation
Tested antivirus software failed to detect the AES-256-based Ransomware attack by PYLOAD. This shows that although the unique signature cannot be created due to the use of fixed switches and IV, and that the Pyload code is not polymorphic or obfuske, an effective detection mechanism is not activated.
Suggestions
Strengthening of behavioral analysis and anomalial detection modules of antivirus products.
Integration of real -time -following systems of file encryption activities.
Using unique switches in each installation instead of fixed cryptographic switches.
Development of user training and system backup policies.
Yorumlar
Yorum Gönder