
Originally Posted by
DarkstaR
Virus detection relies on 2 methods:
#1: Signature detection
#2: Predictive heuristics
Hacking Tibia relies on only 3 abilities:
#1: Run when tibia runs
#2: Read memory (not keylogging, like 99% of the community thinks)
#3: send network data
Now let's take a look at the detection methods and intersect them with Tibian viruses:
#1: Signature detection wont work. Virus companies only develop signatures for wide-spread viruses that have been analyzed by professional malware analysts. Every time Tibia updates, the virus will change, and therefore the signature will change, causing it to be FUD (fully undetectable) again. So, even if the AV companies did get a signature (unlikely), it would take months got it to get into their database, and the signature would be obsolete by that time.
#2: Heuristics wont work. The main point of heuristics is to detect packed executables, system rootkits, keyloggers, and software which tries to stay persistent. Since most Tibian viruses are in the form of bots or MCs, they can easily run when Tibia runs without a need for persistence. They can also modify Tibia to load them automatically, which can still be detectable in some cases, but is easy to hide and highly effective. Since all a Tibian virus does is read account and password from memory, and then send that over the network, they usually don't get detected by signatures or other simple heuristics, so packers and rootkits aren't needed. This is because many legitimate programs do similar things (hell, XenoBot reads memory and sends network data hundreds of times per hour), so detecting it without much more solid predictive points would cause many false positives in the real world.
Conclusion:
With just a little bit of care and misdirection, Tibia viruses can be made that wont be detected. It doesn't take some malware development god. I can do it in my sleep. And you made me waste 10 minutes explaining why, instead of just taking my word for it, you annoying little cunt.