1. /
  2. Security Response/
  3. Suspicious.Insight

Suspicious.Insight

Risk Level 1: Very Low

Discovered:
January 29, 2010
Updated:
February 15, 2010 3:03:06 AM
Type:
Other
Systems Affected:
Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
Suspicious.Insight is a detection for files that have not yet developed a strong reputation among Symantec’s community of users. Detections of this type are based on Symantec’s reputation-based security technology.

The reputation-based system uses “the wisdom of crowds” (Symantec’s tens of millions of end users) connected to cloud-based intelligence to compute a reputation score for an application, and in the process identify malicious software in an entirely new way beyond traditional signatures and behavior-based detection techniques.

When detections of this type are triggered in Norton products the user may be warned that the application is unproven, thus allowing the user to make the final decision. Future versions of Symantec's Endpoint Protection products will include this functionality. When used in these products, administrators will be able to configure blocking policies based on their specific tolerance for risk.

Today, the vast majority of malware is generated in real-time on a per-victim basis, which means that each such malicious program will be rated as being entirely new and low-prevalence by a reputation-based system. In contrast, most legitimate software has vastly different characteristics – it often comes from known publishers, has high adoption rates, shares much in common with earlier versions of the software, and so on. The Suspicious.Insight detection, therefore, is meant to inform the user that a given application is unproven and not yet well known to Symantec’s tens of millions of users.

For more information:

The following resources provide more information about Symantec’s reputation-based security system.

Article: How Reputation-based Software Transforms the War on Malware
Blog: Not all Reputation Technologies are Created Equal
Blog: Norton Internet Security 2010 – Download Insight
Blog: The New Model of Consumer Protection: Reputation-based Security
Product Tutorial: How To Use Norton Download Insight

Threat Assessment

Wild

  • Wild Level: Low
  • Number of Infections: 0 - 49
  • Number of Sites: 0 - 2
  • Geographical Distribution: Low
  • Threat Containment: Easy
  • Removal: Easy

Damage

  • Damage Level: Low

Distribution

  • Distribution Level: Low

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
Internet Security Threat Report, Volume 17
Symantec DeepSight Screensaver