Saturday, May 13, 2017

Ransomware Exploiting NSA Tools (ShadowBroker Leak)

Last couple of days, we seen massive ransomware attacks which is actually exploiting a vulnerability in SMB, EternalBlue, DoublePulsar are used by attacker to exploit and executed the malicious code. Ransomware exploiting MS17-010 ( Microsoft Windows Vulnerability) has been wreaking havoc worldwide.
Two ransomware variant seen in wild:
  • Wannacry ransomware
  • AES-NI ransomware
Wanna cry ransomware sample during debugging

Wanna cry ransomware attacked many hospitals and forced them to operate at very limited service and list is very massive.
Wanna cry

AES-NI Ransomware

Precautions to be taken

Patch Management
Ensure all Workstations and Servers have the latest Microsoft patches, especially the ones related to MS17-010.
Antivirus
Ensure AV signatures are updated on all assets. Identify critical assets and target them first. Block IOCs on AV solution.
Get the details with regards to the name of the malware and verify if this malware has been detected in the logs for last 1 week.
IPS
Ensure IPS signatures are updated. Verify if the signature that can detect this vulnerability / exploit attempt is enabled and is in blocking mode.
Get the details with regards to the name of the Signature and verify if this Signature has been detected in the logs for last 1 week.
EMail Gateway
Ensure EMail Gateway solutions has all relevant updates for detecting possible mails that may bring the Trojan in the environment.
Proxy
Ensure Proxy solution has updated database. Block IOCs for IP Address and Domain names on the Proxy.
Verify last one week logs for the IOCs on Proxy and take action on sources of infection.
Firewall
Block the IP addresses on Perimeter Firewall.
Verify logs for last one week.
Anti - APT Solutions (FireEye, Trend Micro)*
Ensure signatures are up to date.
Check for possible internal sources of infection and take actions.
SIEM
Check logs to verify if any of the IOCs have been detected in 1 week logs.
Note:
a - If required, raise case with OEM for getting details
b - All changes to follow proper approvals and change management process

Post made by
newWorld

No comments:

Operating system - Part 1:

 In our blog, we published several articles on OS concepts which mostly on the perspective for malware analysis/security research. In few in...