Last couple of days, we seen massive ransomware attacks which is actually exploiting a vulnerability in SMB, EternalBlue, DoublePulsar are used by attacker to exploit and executed the malicious code. Ransomware exploiting MS17-010 ( Microsoft Windows Vulnerability) has been wreaking havoc worldwide.
Two ransomware variant seen in wild:
Two ransomware variant seen in wild:
- Wannacry ransomware
- AES-NI ransomware
![]() |
Wanna cry ransomware sample during debugging |
Wanna cry ransomware attacked many hospitals and forced them to operate at very limited service and list is very massive.
Precautions to be taken
a - If required, raise case with OEM for getting details
b - All changes to follow proper approvals and change management process
Post made by
newWorld
![]() |
Wanna cry |
![]() |
AES-NI Ransomware |
Precautions to be taken
Patch Management
Ensure all Workstations and Servers have the latest Microsoft patches, especially the ones related to MS17-010.
Ensure all Workstations and Servers have the latest Microsoft patches, especially the ones related to MS17-010.
Antivirus
Ensure AV signatures are updated on all assets. Identify critical assets and target them first. Block IOCs on AV solution.
Get the details with regards to the name of the malware and verify if this malware has been detected in the logs for last 1 week.
Ensure AV signatures are updated on all assets. Identify critical assets and target them first. Block IOCs on AV solution.
Get the details with regards to the name of the malware and verify if this malware has been detected in the logs for last 1 week.
IPS
Ensure IPS signatures are updated. Verify if the signature that can detect this vulnerability / exploit attempt is enabled and is in blocking mode.
Get the details with regards to the name of the Signature and verify if this Signature has been detected in the logs for last 1 week.
Ensure IPS signatures are updated. Verify if the signature that can detect this vulnerability / exploit attempt is enabled and is in blocking mode.
Get the details with regards to the name of the Signature and verify if this Signature has been detected in the logs for last 1 week.
EMail Gateway
Ensure EMail Gateway solutions has all relevant updates for detecting possible mails that may bring the Trojan in the environment.
Ensure EMail Gateway solutions has all relevant updates for detecting possible mails that may bring the Trojan in the environment.
Proxy
Ensure Proxy solution has updated database. Block IOCs for IP Address and Domain names on the Proxy.
Verify last one week logs for the IOCs on Proxy and take action on sources of infection.
Ensure Proxy solution has updated database. Block IOCs for IP Address and Domain names on the Proxy.
Verify last one week logs for the IOCs on Proxy and take action on sources of infection.
Firewall
Block the IP addresses on Perimeter Firewall.
Verify logs for last one week.
Block the IP addresses on Perimeter Firewall.
Verify logs for last one week.
Anti - APT Solutions (FireEye, Trend Micro)*
Ensure signatures are up to date.
Check for possible internal sources of infection and take actions.
Ensure signatures are up to date.
Check for possible internal sources of infection and take actions.
SIEM
Check logs to verify if any of the IOCs have been detected in 1 week logs.
Note:Check logs to verify if any of the IOCs have been detected in 1 week logs.
a - If required, raise case with OEM for getting details
b - All changes to follow proper approvals and change management process
Post made by
newWorld
No comments:
Post a Comment