I put a copy of my infected wordpress blog on my local hard disk and make a right click to scan for viruses with my F-SAFE antivirus.
Is there a solution or a method against that ?
Thanks to who helps and answers
Best whishes for the new year to everyone
I am only an F-Secure user (their home solutions).
You could check some things:
-- An ability to contact their F-Secure Labs.
for example, it is possible to transfer files and to receive feedback from Labs.
As described there:
-- To check settings under F-Secure SAFE manual scanning.
For example, 'check' to scan inside compressed files and 'uncheck' to scan only known file types.
Thanks for the answer
I am unable to find them by myself for making smaples and submit them to F-secure.
Sorry for my amateur opinion.
I think that "eval" code itself is not always malicious. So, to detect it only based on this is not an option.
Thus, certain piece of code or functionality should be known as a malicious or clearly harmful for static analysis (or dynamic ?! ones on the cloud). In addition, if there are any forms of obfuscation - then to detect item is much more troublesome.
I can to think about some reasons of "not detected":
-- file is not a malicious item. Or certain inserts are not known as a malicious;
-- malicious payload is obfuscated and detection is not applied;
-- to large size of scanned file (skipped as a result).
Is wordpress blog indeed with malicious inserts? If so - enough to check with one example to understand whether F-Secure detect it or not.
Perhaps, good to use specific tools for such. F-Secure home (?!) solution is not always too useful against specific tasks.