F5F Stay Refreshed Software Operating Systems Yes, malware can attempt to bypass a virtual machine, though effectiveness depends on the security measures in place.

Yes, malware can attempt to bypass a virtual machine, though effectiveness depends on the security measures in place.

Yes, malware can attempt to bypass a virtual machine, though effectiveness depends on the security measures in place.

Pages (2): 1 2 Next
B
bradso90
Junior Member
10
10-20-2023, 10:23 PM
#1
It's definitely doable. Even when Guest Isolation is disabled, malware can still find ways to compromise a virtual machine. Your experience with scanning in both safe and non-safe modes is a good practice, and having a system image backup provides some protection.
B
bradso90
10-20-2023, 10:23 PM #1

It's definitely doable. Even when Guest Isolation is disabled, malware can still find ways to compromise a virtual machine. Your experience with scanning in both safe and non-safe modes is a good practice, and having a system image backup provides some protection.

C
CyberPim
Member
221
10-21-2023, 12:05 AM
#2
It depends on whether the hard drive was split into partitions. If not, it might cause issues, but in any case I’m pretty sure you’re okay. What are you working on?
C
CyberPim
10-21-2023, 12:05 AM #2

It depends on whether the hard drive was split into partitions. If not, it might cause issues, but in any case I’m pretty sure you’re okay. What are you working on?

K
61
10-21-2023, 06:10 AM
#3
Curiosity about various malware types and their actions in unprotected environments. Adware stands out the most due to persistent pop-ups, while keyloggers quietly collect data as they operate in the background. Scamware and system hijackers appear the most intimidating, often forcing users to restore earlier system states.
K
Kris_The_Furry
10-21-2023, 06:10 AM #3

Curiosity about various malware types and their actions in unprotected environments. Adware stands out the most due to persistent pop-ups, while keyloggers quietly collect data as they operate in the background. Scamware and system hijackers appear the most intimidating, often forcing users to restore earlier system states.

B
BunnyTeam1234
Member
64
10-22-2023, 01:39 PM
#4
If the disk is not partitioned or separate from your Windows Installation, Malware might(small chance) be able to infect your system. It is usually impossible to get out of Virtual Machine, unless you have some sort of connection between your host machine and the virtual machine.
B
BunnyTeam1234
10-22-2023, 01:39 PM #4

If the disk is not partitioned or separate from your Windows Installation, Malware might(small chance) be able to infect your system. It is usually impossible to get out of Virtual Machine, unless you have some sort of connection between your host machine and the virtual machine.

F
FatihTerim
Member
184
10-29-2023, 03:43 PM
#5
It really varies depending on the malware; sometimes even in virtual environments it can reach your main system, ransomware is particularly dangerous.
F
FatihTerim
10-29-2023, 03:43 PM #5

It really varies depending on the malware; sometimes even in virtual environments it can reach your main system, ransomware is particularly dangerous.

L
Luch505
Junior Member
22
10-29-2023, 10:14 PM
#6
The main link between host and guest is the network adapter drivers, allowing the guest to access the internet. I'm running VMware Workstation 10, specifically a Type 2 Hypervisor.
L
Luch505
10-29-2023, 10:14 PM #6

The main link between host and guest is the network adapter drivers, allowing the guest to access the internet. I'm running VMware Workstation 10, specifically a Type 2 Hypervisor.

L
luukieluke21
Member
180
10-30-2023, 01:29 AM
#7
Simply. Malware or trojans can circumvent your Windows firewall VM shells even when they're disabled, as long as USB and LAN power remain active. Many users today leave devices in this state, running Erp on Asus and Gigabyte with power management features enabled.
L
luukieluke21
10-30-2023, 01:29 AM #7

Simply. Malware or trojans can circumvent your Windows firewall VM shells even when they're disabled, as long as USB and LAN power remain active. Many users today leave devices in this state, running Erp on Asus and Gigabyte with power management features enabled.

G
195
10-30-2023, 03:17 AM
#8
I believe running both Linux and Windows on the virtual machine along with the host computer can reduce infection risks.
G
GetShrekedN00B
10-30-2023, 03:17 AM #8

I believe running both Linux and Windows on the virtual machine along with the host computer can reduce infection risks.

C
chiploster
Junior Member
38
10-30-2023, 02:04 PM
#9
The only way I can imagine infection would be through VMware's integration tools, though that seems highly improbable if they built Workstation without vulnerabilities. If you followed all other safety measures, it seems you did so correctly.
C
chiploster
10-30-2023, 02:04 PM #9

The only way I can imagine infection would be through VMware's integration tools, though that seems highly improbable if they built Workstation without vulnerabilities. If you followed all other safety measures, it seems you did so correctly.

D
DJ_PvPz
Member
184
10-30-2023, 08:25 PM
#10
For all practical purposes, a virtual machine stands as a separate unit... "Partitioning" isn't relevant here. That said, the methods used by malware and viruses to propagate within a local area network still operate... file shares and any other ways files move between devices (like sending emails or backing up to shared volumes) remain effective. If you mount a directory from your guest system onto the VM, the malware could spread there and potentially reach the host if accessed. Some hypervisors automatically integrate the host drive into the guest environment during mounting (such as VirtualBox). To prevent this, ensure no external drives are mapped back to the host. On both machines, check the network settings—disable discovery in advanced sharing options—to limit exposure.
D
DJ_PvPz
10-30-2023, 08:25 PM #10

For all practical purposes, a virtual machine stands as a separate unit... "Partitioning" isn't relevant here. That said, the methods used by malware and viruses to propagate within a local area network still operate... file shares and any other ways files move between devices (like sending emails or backing up to shared volumes) remain effective. If you mount a directory from your guest system onto the VM, the malware could spread there and potentially reach the host if accessed. Some hypervisors automatically integrate the host drive into the guest environment during mounting (such as VirtualBox). To prevent this, ensure no external drives are mapped back to the host. On both machines, check the network settings—disable discovery in advanced sharing options—to limit exposure.

Pages (2): 1 2 Next