In point of fact, McAfee's and Kaspersky's scanners can both detect rootkits on live online systems, as I discovered while studying for my Reality+ cert
Since I was a bit too tired to go mountain biking today

instead I collected 95 samples, including exploits, rootkits, trojans (Zlob, DNSChanger, LoadAdv, VideoAccessCodec and others), backdoors, password-stealers, PUPs/adwares (including some DLLs, BHOs and EXEs harvested from a few live installs on my honeypot), a malicious HOSTS file, a QuickTime exploit, and a couple email worms. This is fresh real-world malware, hot off the bad guys' servers today.
I ran antivirus scans on folders containing the
95 malicious files. Online scanners are noted as such; other scanners were run as fully-installed products, except the McAfee command-line scanner.
Caveats: this isn't a scientific test, it isn't necessarily indicative of the softwares' performance on every category of threats, and it doesn't account for some of the proactive-defense capabilities that some of the softwares would provide in real-life scenarios. The main point isn't that brand A is better than brands C, D and E, it's that antivirus software has limitations and you should think about adding other layers of defense, including user education, non-Admin user accounts, etc.
[*]
McAfee's command-line scanner was run with all detection capabilities maxed, using the hourly beta 4100 DATs. It detected
36 of the 95 samples. Notably, it failed to detect any of the rootkits or any of the HTML exploit samples, and it failed to detect the current versions of the
sneaky Frogexer .GIFs.
[*]
F-Secure's online scanner detected
60 of the 95 samples.
[*]
Microsoft's Live OneCare online scanner detected
43 of the 95 samples. It was unable to
delete some of them, for unknown reasons, but it
detected more than I expected.
[*]
Kaspersky AntiVirus 7 detected
67 of the 95 samples using maxed-out settings (which is how I normally run it). And looking at the scan results, the reason KAV7 scored higher than F-Secure (which uses the KAV engine and sigs) appears to be the new heuristic-detection capabilities added to v7. KAV7 nevertheless missed all of the HTML exploits, all of the Frogexer pics, about half of the DLLs from actual adware/PUP installs, and some of the Trojans.
[*]
Computer Associates (CA), in its
default configuration, detected
26 of the 95 samples. There did not appear to be any additional scanning capabilities to enable, since heuristics were already enabled. CA missed nearly all of the HTML exploits, lots of Trojans, all the crafty .GIFs, the PUP/adware files, an email worm, a Spambot, Trojan-Downloaders, and some of the rootkit files. Evidently signatures and heuristics are not the main selling point
[*]
Symantec's online scanner detected
39 of the 95 samples.
[*]Oh, and Windows Defender detected
3 of the 95 samples
*golf clap*
Edit: adding the popular freebie antiviruses below...
[*]
AntiVir PersonalEdition Classic, in its
default configuration, detected
60 of the 95 samples. With all settings maxed out (heuristics at maximum,
all filetypes scanned, and all optional threat categories enabled) it nailed
71 of the 95 samples, including all but one HTML exploit, but still missed most of the files from live adware/PUP installations, some Trojans, and the crafty .GIF files.
[*]
AVG Free Edition, in its
default configuration (which already includes heuristics and archive scanning), detected
47 of the 96 samples. With the
Scan all files option enabled, it detected on one additional file, the malicious HOSTS file, leaving the HTML exploits, adware/PUP files, the crafty .GIF files and lots of Trojans undetected.
[*]
Avast! Personal Edition, in its
default configuration, detected
45 of the 95 samples. Setting the protection to
High instead of
Normal did not get any additional detections. Avast missed the same sorts of stuff that AVG did.
[*]
AOL Kaspersky, in its
default configuration, detected
59 of the 95 samples. With all settings maxed out, it detected
61 of the 95 samples thanks to the enabling of PUP detection. Detection pattern was similar to KAV7 except it didn't have the heuristic detections.
[*]
SUPERAntiSpyware detected
42 of the 95 samples. That was pretty impressive considering that the majority of the samples don't really fit its target
genre.
In my view, the results again underscore the value of backing up security software with other proactive measures such as
non-Admin user accounts,
SRP, fully-enabled
Data Execution Prevention,
patching of all installed software, removal of unnecessary software, and user education. Because even some of the best security software, using multiple engines and definition sets, is still only batting about .600 against the bad guys in the real world. Granted, signatures and heuristics don't tell the full story by themselves, but I think the point is clear.
Based on general knowledge of these malwares, I believe a computer being used by a Standard user on Vista, running IE7 Protected Mode, would be completely safe from all of the samples in this set (provided that the user doesn't have the option and the gullibility to elevate to Administrator level), particularly with a disallowed SRP in place, but regardless. This is why I keep getting out the soapbox to yammer on about the merits of least-privilege operation as an important part of a security strategy.
In retrospect, maybe it would've been less tiring to just go mountain biking...
