Silicon Shecky

Infosec Practitioner

  • About
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Links
    • Infosec
      • Burbsec
      • Infosec Exchange Mastodon
      • Hacks4Pancakes Blog
      • Krebs On Security
      • Bleeping Computer
  • Archives

Connect

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter

[footer_backtotop]

Copyright © 2025 ·Sixteen Nine Pro Theme · Genesis Framework by StudioPress · WordPress

Reputation, what is it good for? (Absolutely Nothing)

November 29, 2018 By Michael Kavka Leave a Comment

Reputation, something that should be taken (and usually is) seriously. It affects how we look at people and companies, what level of trust there is, and should we recommend said people/companies to others. In the world of NextGen AV and EDR reputation is suppose to work the same. This is not always the case, and can be very detrimental when it is not. When reputation levels are not proper inside of such software or security solutions you have situations where good software is blocked.

Let us start with a simple situation. You use a well known piece of software, say Commvault, which properly signs their software. CarbonBlack Protect, knows this software, and there is no issue with getting it whitelisted properly. This is not the case with CarbonBlack Defense. You would think that it would have the certificate already in the system (it doesn’t and there are other, more well known certificates that are not in there either), or at least have had the software in their back end as a known vector. Again, this is not the case as of this writing (again there is other software I have run into this issue with so it is not an isolated case). Easy enough to add the certificate into the system, but that does not make the software known at this point, it just adjusts the secret sauce scoring down, but does not guarantee that the software will not be blocked. Requesting an upload for every file that is run as part of the software would be a full time job for at least one person (if not multiple people) and that still does not mean that you will lose that unknown file tag. Even whitelisting the file itself (which can make for a huge database of exceptions to manage) does not guarantee the file will be allowed to do what it needs to do. The only way to guarantee is to put the path to the file(s) in a bypass mode of some sort. This will then prevent such things from being looked at or recorded, leaving blind spots on the system for malicious software/actors to hide in. This is an unacceptable risk, and really defeats the purpose of EDR software.

There are other issues with Unknown and Not Listed reputations that I have run into also. I have set certain policies up so that unknown software can do certain things, but surprisingly it gets blocked because the reputation in Not Listed, again even though it should be known software. The CarbonBlack Engineers have been working on this for over a month with no solution other than to put said software into a bypass type mode. Again, not a good solution.

I am lucky as I have been dealing with this on test machines before rolling out to the full company, and have heard of similar type issues with other NextGenAV and EDR products. The worst part is the response from the company, and length of time it is taking to track down such issues. This sort of issue should be a deal breaker for anyone who wants to use such software. AV is still an important and needed product on endpoints, and the shift to EDR software can be a good thing, but not when it leaves you blind. This is yet another reason why I feel EDR software is not quite ready for prime time, or in other words, the reputation I have of such software is diminishing rapidly.

Filed Under: Reviews, Security Tagged With: CarbonBlack, Reputation, Unknown Software

RSS Taggart Institute Intel Feed

  • Cybersecurity Reading List - Week of 2025-10-27 October 27, 2025 Ian Campbell
  • US declines to join more than 70 countries in signing UN cybercrime treaty October 27, 2025
  • Google disputes false claims of massive Gmail data breach October 27, 2025 Lawrence Abrams
  • Attackers bypass patch in deprecated Windows Server update tool October 27, 2025 Matt Kapko
  • Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild October 27, 2025 Unit 42
  • X: Re-enroll 2FA security keys by November 10 or get locked out October 27, 2025 Lawrence Abrams
  • Ransomware profits drop as victims stop paying hackers October 27, 2025 Bill Toulas
  • Sweden’s power grid operator confirms data breach claimed by ransomware gang October 27, 2025
  • 'House of Dynamite' Is About the Zoom Call that Ends the World October 27, 2025 Matthew Gault
  • Windows will soon prompt for memory scans after BSOD crashes October 27, 2025 Sergiu Gatlan

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP