Jump to content

IOBit


Recommended Posts

:) :) ;):)

ATTENTION, IOBIT IS HOSTING THEIR STOLEN SECURITY CRAPWARE ON THIS WEBSITE: http://www.techspot.com/downloads/3580-iob...curity-360.html

Time to post a cease and desist letter to Techspot methinks?

:) :) :) :)

Until they remove the download, I would ask that users who wish to get involved please avoid going any farther than leaving a bad review and a link to the announcements.

Thank you. :(

Link to post
  • Replies 235
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

Posted Images

Sent an email asking that they remove all IoBit products from their listings, have not received a reply. Noticed from the avatars that they all appear to be rather young guys, so we shall see what if any reply is forthcoming. Put the pressure on folks, but do so in a nice polite professional manner.

Thanks

Wildman

Link to post
Too many copyrighted works that would need to be paid for.

Also, most legit companies are too busy trying to fight malware to add all of those bells and whistles. When you have very little need to research and develop your own technologies, you can add all of that stuff to your software.

Actually, musing on this, it would be nice if the legit companies formed a union and shared research, and detection information, but did not share detection engines, or removal systems.

This would at least allow for rapid detection of new threats by any member company, but still keep competition going regarding accuracy of detection engines, and speed of said engines. Also the ability to remove said problems would be distinct and unique to each member company. Thus, the best still win. If anything, it would allow for more man-hours to be dedicated to more threats.

Of course, membership in such a group would be voluntary, and subject to peer review, and not just grabbing and going like 2-bit. (Yes, 2 bit, not 10bit. Because there are 10 kinds of people who understand binary, those who do, and those who don't.)

In analogy... Alot of countries fought the same Nazis in WWII, and shared information on the enemy, and how to find them, however, all of them brought their own equipment to the fight, and their own strategies on how to best deploy it.

Zap :)

Link to post
Actually, musing on this, it would be nice if the legit companies formed a union and shared research, and detection information, but did not share detection engines, or removal systems.

This would at least allow for rapid detection of new threats by any member company, but still keep competition going regarding accuracy of detection engines, and speed of said engines. Also the ability to remove said problems would be distinct and unique to each member company. Thus, the best still win. If anything, it would allow for more man-hours to be dedicated to more threats.

Of course, membership in such a group would be voluntary, and subject to peer review, and not just grabbing and going like 2-bit. (Yes, 2 bit, not 10bit. Because there are 10 kinds of people who understand binary, those who do, and those who don't.)

In analogy... Alot of countries fought the same Nazis in WWII, and shared information on the enemy, and how to find them, however, all of them brought their own equipment to the fight, and their own strategies on how to best deploy it.

Zap :)

Link to post

The problem of sharing or pooling resorces is human nature. Individual companys get lazy and start relying on the collective instead of doing their own work. In the end everyone would ends up worse off.

Its one of those things that sounds good in theory but usually does not would in practice.

PS: Sorry for my previous blank post. A screw up on my part.

Link to post

^^ Not exactly. I hope I can respond, since your post is not clear.

If what you mean that companies do not do their own work anymore, that is not all the way true.

Malwarebytes does their own database, Avira does their own database, AVG does their own database, Avast - Ikarus - Kaspersky and many more do their own.

However, some companies do not, but have permission to pool in the database in to their own small engine to help them get started or to boost their own engine. For example, Emsi Software has their own database but also uses the Ikarus scanning engine as a booster. But, ClamWin pools in the ClamAV database as their engine - the only thing they did was change up or re-create the GUI (graphic user interface) and distribute it.

Then, you get to companies that do not ask for permission. Usually rogue software does these tasks. IOBit decided to pool in the Malwarebytes database and boost their own, without permission. They are now rogue. IOBit has pooled in several other databases, which have not been said.

It goes, "for every excellent security software, there will be a bunch of rogues copying because they cannot do the work themselves."

Link to post

From here:

2. Until now, there is NO any convincing proof to show Malwarebytes' fallacy. We ask Malwarebytes immediately stop spreading malicious rumors for hyping itself by IObit. We have many independent and objective reviewing tests and reports from 3rd parties. Any one can download and view them from this link: http://forums.iobit.com/forumdisplay.php?f=25. Or any one can perform a comparing test to see which anti-malware is superior. By its own database and advanced detection technology, IObit Security 360 scans faster, detects and removes more malware than any other anti-malware vendors, including Malwarebytes. Why a superior vendor need steal database from a lower-class one?

3. For the sake of avoiding disputes and possible problems in malware naming, we have deleted all disputed items in our database temporarily and updated IObit Security 360

Link to post

One of the things I keep close tabs on is malware that has both an active source and is polymorphic . I segregate these samples so that I can pay closer attention to them as these are the ones most likely to harm our users . Here is how IOBit is currently doing against these threats (all pulled from web between Oct. 13 and today) :

IObit Security 360

OS:Windows XP

Version:1.2.0.10

Define Version:1279

Time Elapsed:00:00:02

Objects Scanned:845

Threats Found:51

|Name|Type|Description|ID|

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\1(4).exe, 11-4906

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\CartoonPorn-Movies.40054(1).exe, 11-4906

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\cb(2).exe, 11-4906

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\cb15(1).exe, 11-4906

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\flash_player.45174(2).exe, 11-4906

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\flash_player.45174(3).exe, 11-4906

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\flash_stream-viewer.v.40000(1).exe, 11-4906

Trojan.XPACK, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\install(129).exe, 11-242

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\install.48300(1).exe, 11-4906

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\install.48413(1).exe, 11-4906

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\install.48428(2).exe, 11-4906

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\install.48428(3).exe, 11-4906

Trojan.XPACK, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\spyware(5).exe, 11-242

Trojan.XPACK, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\spyware(7).exe, 11-242

Refpron.AA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\svc(19).exe, 11-5599

Trojan.XPACK, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\svchost(10).exe, 11-242

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\video_update_installer.40000(1).exe, 11-4906

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\video_update_installer.40064(2).exe, 11-4906

TrojanDownloader.FakeAlert.ADA, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\video_update_installer.40064(3).exe, 11-4906

Trojan.Cript.XPACK, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses25\win(1).exe, 11-345

Kryptik.AWD, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses26\av-scanner.0.exe, 11-5298

TrojanDownloader.Agent.PME, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses26\load(12).exe, 11-2713

Kryptik.AVM, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses26\update_for_media_player_(KB972036)(2).exe, 11-6233

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(12).exe, 11-3086

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(2).exe, 11-3086

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(20).exe, 11-3086

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(22).exe, 11-3086

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(23).exe, 11-3086

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(24).exe, 11-3086

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(25).exe, 11-3086

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(26).exe, 11-3086

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(27).exe, 11-3086

Kryptik.AMH, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(36).exe, 11-4188

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(4).exe, 11-3086

Kryptik.AMH, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(40).exe, 11-4188

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(5).exe, 11-3086

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(6).exe, 11-3086

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(7).exe, 11-3086

Koobface.NCF, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses27\setup(9).exe, 11-3086

Kryptik.AUQ, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses28\pp.12.exe, 11-2836

Kryptik.AXJ, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses29\spyware(7).exe, 11-888

BHO.NTG, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses30\jrTT.exe, 11-1412

Injector.ADN, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses30\Resume.exe, 11-2283

TrojanDownloader.Sality, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses31\llllload.exe, 11-1387

Injector.AEL, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses32\1(7).exe, 11-4267

PSW.OnLineGames.NRD, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses33\aa2(1).exe, 11-1286

PSW.OnLineGames.NRD, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses34\aa4(5).exe, 11-1358

PSW.OnLineGames.NRD, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses34\new6(9).exe, 11-1358

Suspicious Malware_Heur, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses37\setup(93).exe, 8-17

Injector.PO, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses38\wetin.exe, 11-2656

PSW.OnLineGames.NRD, File, C:\Documents and Settings\Owner\Desktop\New Folder (10)\url misses42\39.exe, 11-1286

51/845 = 6%

Link to post

here I go:

I don't pretend to be offensive with the Chinese people but they know already the facts that several times these affect themselves:

-no law about intellectual property.

-law depends of the money they have and/or political influence.

-labour force brutal exploitation (low payment and long working schedules) ;)

-no democracy

Stealing intellectual property is a matter of everyday, it happens with thousands of brands and nothing happens. One of my best friends is a Chinese guy who is the son if a wealthy businessman. I met him at Uni in Melbourne down under; and one day he told me: my dad makes fakes of Tommy Hilfiger and Nike products, he has a team which copies everything from catalogs. He told me that was normal in China. Even more, he was disgusted as raw workers were treated and paid; he wanted to stay downunder to begin a new life far from his dad and the injustice.

I just called him to talk about this topic and he told me: "of course mate they are stealing". He promised me to make some inquires about; later I'll tell you all about it.

So, common sense and logic says: Iobit steals, and no just from Malwarebytes, I'm sure from many more. I have been reading some reviews about its performance was good... of course stealing from several companies. If they did it with one they do it to everybody.

Malwarebytes is a small giant which has defeated the anti virus heavyweights, smart users know that, people like paris hilton keeps using suckton.... ups sorry norton, mcafee, trendmicro etc.

KEEP BACKING UP MALWAREBYTES, SCREW THE CHEATERS

TO THE MALWAREBYTES PEOPLE: KEEP THIS LEVEL OF EFFICIENCY BECAUSE THE LOYALTY EXPOSED HERE IS THE RESULT OF YOUR EXCELLENT PRODUCT AND SERVICE

Thank you,

memo

Link to post

Ok, I just started playing around with IOBit 360 (latest version 1.2) and I must say I'm impressed ;):

  • It steals from the functionality of HijackThis
  • It steals from the functionality of Malwarebytes' Anti-Malware, including FileASSASSIN ("Unlock Delete")
  • It steals from Spybot Search & Destroy/SpywareBlaster with it's "Passive Defense" functionality
  • It steals from Secunia PSI with it's "Security Holes" checker
  • It steals from CCleaner (even the user interface looks the same) with its "Privacy Sweeper"

I'll be checking out Advanced System Care later to see what legitimate tools it mimics.

Link to post

Thanks for the link...I think the following is a joke:

And we also paid special attention to questions regarding the old database of IObit Security 360 among the feedback.

Hah, yeah right...they avoided the situation.

We have apologized for all the inconvenience, meanwhile, we have taken immediate actions to remove all disputed data and updated the whole database online on November 3.

Is this completely true?

Eventually, IObit would like to work with all anti-malware vendors, to enhance the overall evolution of malware detection...

Are they going to steal, or ask permission?

--------

I see IObit is playing the victim. They got caught (period). Also, I do not see their developers in the trenches with us.

They are not very strong apparently.

---------

They look for help from other vendors now, instead of just going out and stealing them, how thoughful of them to ask now.

Also, like Kenny94 said, why are their analysts not out in the field.

lol, like I said above...Are they going to steal, or ask permission?

Link to post

What can I say? IObit has really dug itself into a hole here. Not only are they stealing database information that good, reliable people worked on day in and day out at Malwarebytes, but they are also stealing from multiple other countries! Not to offend the Chinese people, but if they had more restrictions on this kind of stuff then justice would be served.

I've spread the word around my entire company that no one should use IObit. 15 people in my office have it!

I suggest everyone to tell everyone they know not to get any IObit stuff, and explicitly explain why. Malwarebytes belongs at the top of the food chain in computer security, and they don't steal!

Link to post
Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.