Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
No, I don’t. Just conjecture at the moment.

Okay. So just innuendo. I hope no one was left with any negative impression of Malwarebytes due to that. I suspect few of us visited that website to see that Malwarebytes was not mentioned at all.
 
Okay. So just innuendo. I hope no one was left with any negative impression of Malwarebytes due to that. I suspect few of us visited that website to see that Malwarebytes was not mentioned at all.
Maybe they will get a negative impression after watching this demo of what a scan with the free version achieves
 
  • Like
Reactions: johannnn
Part 2: Malwarebytes “real time protection” doesn’t stop you from installing malware, enter your password into malware installer.
In this case, the installation is stoped by Gatekeeper, because it’s an old malware and even Gatekeeper recognizes it.
 
  • Like
Reactions: johannnn
You ignored the links for Mac tests, so here they are again
https://www.av-comparatives.org/list-of-av-vendors-mac/
https://www.av-test.org/en/antivirus/home-macos/



If you want to scan downloaded files before opening them, use https://www.virustotal.com/
Free, real time protection from malware - BlockBlock https://objective-see.org/products/blockblock.html
Free malware scan - KnockKnock https://objective-see.org/products/knockknock.html

Malwarebytes can’t even protect themselves, they found out they were hacked from others https://www.zdnet.com/article/malwa...ed-by-the-same-group-who-breached-solarwinds/

And they might be stealing code https://www.theverge.com/2022/8/11/23301130/patrick-wardle-mac-code-corporations-stealing-black-hat
Solid advice, I pretty much have the same set up, plus the free Bitdefender from the Mac App Store which is an on demand only scanner which I run from time to time.

Q-6
 
You ignored the links for Mac tests, so here they are again
https://www.av-comparatives.org/list-of-av-vendors-mac/
https://www.av-test.org/en/antivirus/home-macos/



If you want to scan downloaded files before opening them, use https://www.virustotal.com/
Free, real time protection from malware - BlockBlock https://objective-see.org/products/blockblock.html
Free malware scan - KnockKnock https://objective-see.org/products/knockknock.html

Malwarebytes can’t even protect themselves, they found out they were hacked from others https://www.zdnet.com/article/malwa...ed-by-the-same-group-who-breached-solarwinds/

And they might be stealing code https://www.theverge.com/2022/8/11/23301130/patrick-wardle-mac-code-corporations-stealing-black-hat
The breach has nothing to do with the company's product and it's ability to perform said tasks. I don't see any carelessness or wrongdoing on their part with the breach.

From your link: the security firm said the hackers breached its internal systems by exploiting a dormant email protection product within its Office 365 tenant.

I don't use Malwarebytes but, lets be careful not to paint the wrong picture to fellow forum members.
 
  • Like
Reactions: 3Rock
So much concern about the company’s “good name”, yet no active user of the app takes the time to correct the misrepresentation of its functionality.
Took 21 seconds to scan my internal drive (2018 Mini).
Malwarebytes does not scan your hard drive, it scans known locations for malware that has already been installed. Only the trial or paid real time protection might stop you from installing malware.
 
So much concern about the company’s “good name”, yet no active user of the app takes the time to correct the misrepresentation of its functionality.

Malwarebytes does not scan your hard drive, it scans known locations for malware that has already been installed. Only the trial or paid real time protection might stop you from installing malware.
View attachment 2043665

You have pushed back against Malwarebytes seeming over representation of their product. You made great points and I learned from them. But you did dilute your arguments with a potentially unrelated criticism and an unsubstantiated allegation. I think that deserved a little pushback. I'm writing this to defend the pushback I posted about the code theft allegation.

No big deal. Your posts on Malwarebytes' shortcomings are most definitely net positive.
 
  • Like
Reactions: bogdanw
Drag & drop malware inside the Malwarebytes app, Malwarebytes doesn’t mind. Try to execute malware from inside the Malwarebytes app, no reaction from Malwarebytes. Apple’s protection puts a stop to the execution, recognizing the malware.
 
Drag & drop malware inside the Malwarebytes app, Malwarebytes doesn’t mind. Try to execute malware from inside the Malwarebytes app, no reaction from Malwarebytes. Apple’s protection puts a stop to the execution, recognizing the malware.
View attachment 2043730
And for those looking on who may not be aware, Apple has a support document explaining the built-in Malware protection that comes with MacOS.

https://support.apple.com/en-my/guide/security/sec469d47bd8/web And @bogdanw post show MacOS in action.
 
  • Like
Reactions: 3Rock
I apologize for suggesting Malwarebytes might be stealing code.
It’s probably beyond their technical expertise to do something like that. As far as I can tell, they didn’t even think that “real time protection” should protect their own app form being altered. The malware added to it was still there after a restart and a scan.

About the hacking incident, even if the doorman at the company was responsible by inserting an USB drive found on the street into the internal network, it still doesn’t look good for a company that describes itself as “Cybersecurity for Home and Business” to be hacked and don’t realize they have been hacked. In this case, probably the hackers didn’t find anything worth stealing.


About Apple’s protection, that malware was first uploaded to virustotal on 26 June 2020
https://www.virustotal.com/gui/file...4a7fec9f60f257cd0b1ab0f698ba2a5baca6b/details
(No, you can not download the malware from the link)

I was able to get past that Gatekeeper message in the video from post 29 by simply unpacking and repacking the pkg file (pkgutil --expand/pkgutil --flatten).
And in this video, a security researcher explains how malware authors got past XProtect by simply adding two spaces in their script
Code:
https://youtu.be/cAl7epCq0q4?t=2323

So far this year, Apple has patched “actively exploited” vulnerabilities four times
March 31, 2022 https://support.apple.com/en-us/HT213220
February 10, 2022 https://support.apple.com/en-us/HT213091
January 26, 2022 https://support.apple.com/en-us/HT213054
August 17, 2022 https://support.apple.com/en-us/HT213413
(I hope I didn’t miss any)
As a Big Sur user, I wonder if the Kernel vulnerability fixed in Monterey 12.5.1 is present in Big Sur and Apple left me vulnerable again. As it did from March to May https://forums.macrumors.com/threads/security-updates.2352472/post-31283868
 
  • Like
Reactions: svenmany
Most likely :(
But I expect there will be security update for BS in a few days (weeks?).
Apple just released Safari 15.6.1 for Catalina and Big Sur to fix the other vulnerability mentioned in https://support.apple.com/en-us/HT213413

Code:
http://swcdn.apple.com/content/downloads/42/33/012-57329-A_41P2VU6UHN/5fw5vna27fdw4mqfak5adj3pjpxvo9hgh7/Safari15.6.1CatalinaAuto.pkg


http://swcdn.apple.com/content/downloads/40/13/012-57330-A_1K7PZCZBI6/gyg7z5d7ay46omy3w3t5vytz97ji03gvmk/Safari15.6.1BigSurAuto.pkg

Safari 15.6.1
Released August 18, 2022
https://support.apple.com/en-us/HT213414
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.