ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Ransomware

    IT Discussion
    ransonware cryptolocker
    7
    36
    6.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender
      last edited by Dashrender

      In my previous post, I basically walked through my whole thought process from problem to solution, which I outline again below.


      being specific is only good after you know about the badness.

      Whitelisting is good because you only trust things you know are good.

      Back to lockie - sure, you'd love your AV to kill this - but zero day exploits just slip right by AV. Why would I look at blocking Word.exe? or block all .doc/.docx files? my users need these for their day to day operations.

      As I mentioned, I think the white list would still completely solve this because, when you open the bad Word document, it goes to the internet, downloads a file, and tries to execute that file.... but execution is prevented by the whitelist.

      In a zeroday situation, the AV is definitely not going to protect you.

      J 1 Reply Last reply Reply Quote 0
      • J
        Jason Banned @Dashrender
        last edited by Jason

        @Dashrender said:

        As I mentioned, I think the white list would still completely solve this because, when you open the bad Word document, it goes to the internet, downloads a file, and tries to execute that file.... but execution is prevented by the whitelist.

        No it doesn't If they wrote it all in VBScript as a Macro without using external things you can not block it with this solution without blocking office or word.

        DashrenderD 1 Reply Last reply Reply Quote 0
        • DashrenderD
          Dashrender @Jason
          last edited by

          @Jason said:

          @Dashrender said:

          As I mentioned, I think the white list would still completely solve this because, when you open the bad Word document, it goes to the internet, downloads a file, and tries to execute that file.... but execution is prevented by the whitelist.

          No it doesn't If they wrote it all in VBScript as a Macro without using external things you can not block it with this solution without blocking office or word.

          Can an entire cryptoware solution be done purely in VBScript? If so, then disabling Macros seems like a requirement as a next step.

          J 1 Reply Last reply Reply Quote 0
          • J
            Jason Banned @Dashrender
            last edited by

            @Dashrender said:

            Can an entire cryptoware solution be done purely in VBScript? If so, then disabling Macros seems like a requirement as a next step.

            Good luck with that. Many people write their own macro's in excel to help with their jobs.

            1 Reply Last reply Reply Quote 1
            • J
              Jason Banned
              last edited by

              How are those Doc Files getting in anyway? does your solution not include a cloud spam/email filter to pull out things like that?

              DashrenderD 1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @Jason
                last edited by

                @Jason said:

                How are those Doc Files getting in anyway? does your solution not include a cloud spam/email filter to pull out things like that?

                Pull out things like what? Zeroday exploits?

                J 1 Reply Last reply Reply Quote 0
                • J
                  Jason Banned @Dashrender
                  last edited by

                  @Dashrender said:

                  @Jason said:

                  How are those Doc Files getting in anyway? does your solution not include a cloud spam/email filter to pull out things like that?

                  Pull out things like what? Zeroday exploits?

                  Files that have macro's in them. No reason those would be emailed from the outside.

                  DashrenderD 1 Reply Last reply Reply Quote 1
                  • DashrenderD
                    Dashrender @Jason
                    last edited by

                    @Jason said:

                    @Dashrender said:

                    @Jason said:

                    How are those Doc Files getting in anyway? does your solution not include a cloud spam/email filter to pull out things like that?

                    Pull out things like what? Zeroday exploits?

                    Files that have macro's in them. No reason those would be emailed from the outside.

                    Well I'll take you back to your own post

                    @Jason said:

                    Good luck with that. Many people write their own macro's in excel to help with their jobs.

                    I've had vendors send me quotes using their own sheets that contain macros they use to gather data before - sure it's rare, but it happens.

                    J 1 Reply Last reply Reply Quote 0
                    • J
                      Jason Banned @Dashrender
                      last edited by

                      @Dashrender said:

                      @Jason said:

                      @Dashrender said:

                      @Jason said:

                      How are those Doc Files getting in anyway? does your solution not include a cloud spam/email filter to pull out things like that?

                      Pull out things like what? Zeroday exploits?

                      Files that have macro's in them. No reason those would be emailed from the outside.

                      Well I'll take you back to your own post

                      @Jason said:

                      Good luck with that. Many people write their own macro's in excel to help with their jobs.

                      I've had vendors send me quotes using their own sheets that contain macros they use to gather data before - sure it's rare, but it happens.

                      That's way different. Internal use vs sending them out. Sending them out is just as bad or worse than sending an .exe or .bat etc? I'm sure you block those? We strip macros. Vendors don't like it? Find another one.

                      DashrenderD 1 Reply Last reply Reply Quote 0
                      • DashrenderD
                        Dashrender @Jason
                        last edited by

                        @Jason said:

                        @Dashrender said:

                        @Jason said:

                        @Dashrender said:

                        @Jason said:

                        How are those Doc Files getting in anyway? does your solution not include a cloud spam/email filter to pull out things like that?

                        Pull out things like what? Zeroday exploits?

                        Files that have macro's in them. No reason those would be emailed from the outside.

                        Well I'll take you back to your own post

                        @Jason said:

                        Good luck with that. Many people write their own macro's in excel to help with their jobs.

                        I've had vendors send me quotes using their own sheets that contain macros they use to gather data before - sure it's rare, but it happens.

                        That's way different. Internal use vs sending them out. Sending them out is just as bad or worse than sending an .exe or .bat etc? I'm sure you block those? We strip macros. Vendors don't like it? Find another one.

                        To the best of my knowledge I can't strip macros with AppRiver - but I'll check into it tomorrow to be sure. They can block by extension - which I've done in the past... but doesn't help here.

                        J 1 Reply Last reply Reply Quote 0
                        • J
                          Jason Banned @Dashrender
                          last edited by

                          @Dashrender said:

                          @Jason said:

                          @Dashrender said:

                          @Jason said:

                          @Dashrender said:

                          @Jason said:

                          How are those Doc Files getting in anyway? does your solution not include a cloud spam/email filter to pull out things like that?

                          Pull out things like what? Zeroday exploits?

                          Files that have macro's in them. No reason those would be emailed from the outside.

                          Well I'll take you back to your own post

                          @Jason said:

                          Good luck with that. Many people write their own macro's in excel to help with their jobs.

                          I've had vendors send me quotes using their own sheets that contain macros they use to gather data before - sure it's rare, but it happens.

                          That's way different. Internal use vs sending them out. Sending them out is just as bad or worse than sending an .exe or .bat etc? I'm sure you block those? We strip macros. Vendors don't like it? Find another one.

                          To the best of my knowledge I can't strip macros with AppRiver - but I'll check into it tomorrow to be sure. They can block by extension - which I've done in the past... but doesn't help here.

                          Weird if it can't. Ours can strip them or print them to PDF and replace them

                          DashrenderD 1 Reply Last reply Reply Quote 0
                          • DashrenderD
                            Dashrender @Jason
                            last edited by

                            @Jason said:

                            @Dashrender said:

                            @Jason said:

                            @Dashrender said:

                            @Jason said:

                            @Dashrender said:

                            @Jason said:

                            How are those Doc Files getting in anyway? does your solution not include a cloud spam/email filter to pull out things like that?

                            Pull out things like what? Zeroday exploits?

                            Files that have macro's in them. No reason those would be emailed from the outside.

                            Well I'll take you back to your own post

                            @Jason said:

                            Good luck with that. Many people write their own macro's in excel to help with their jobs.

                            I've had vendors send me quotes using their own sheets that contain macros they use to gather data before - sure it's rare, but it happens.

                            That's way different. Internal use vs sending them out. Sending them out is just as bad or worse than sending an .exe or .bat etc? I'm sure you block those? We strip macros. Vendors don't like it? Find another one.

                            To the best of my knowledge I can't strip macros with AppRiver - but I'll check into it tomorrow to be sure. They can block by extension - which I've done in the past... but doesn't help here.

                            Weird if it can't. Ours can strip them or print them to PDF and replace them

                            A macro?

                            J 1 Reply Last reply Reply Quote 0
                            • C
                              Carnival Boy
                              last edited by

                              You can block macros in Word, but leave them in Excel. Most ransomware comes as an infected Word document rather than an Excel document doesn't it? This is what I do.

                              You can also allow macros to run in protected locations eg your intranet/fileserver. So if the user wants to run a macro in external file, they would simply need to save a copy on their intranet/fileserver and then open it from there (I think).

                              J 1 Reply Last reply Reply Quote 0
                              • J
                                Jason Banned @Carnival Boy
                                last edited by

                                @Carnival-Boy said:

                                You can also allow macros to run in protected locations eg your intranet/fileserver. So if the user wants to run a macro in external file, they would simply need to save a copy on their intranet/fileserver and then open it from there (I think).

                                That's not blocking them though, a user could save the malicious file to the fileserver and then it would run the malicious code.

                                1 Reply Last reply Reply Quote 0
                                • J
                                  Jason Banned @Dashrender
                                  last edited by

                                  @Dashrender said:

                                  @Jason said:

                                  @Dashrender said:

                                  @Jason said:

                                  @Dashrender said:

                                  @Jason said:

                                  @Dashrender said:

                                  @Jason said:

                                  How are those Doc Files getting in anyway? does your solution not include a cloud spam/email filter to pull out things like that?

                                  Pull out things like what? Zeroday exploits?

                                  Files that have macro's in them. No reason those would be emailed from the outside.

                                  Well I'll take you back to your own post

                                  @Jason said:

                                  Good luck with that. Many people write their own macro's in excel to help with their jobs.

                                  I've had vendors send me quotes using their own sheets that contain macros they use to gather data before - sure it's rare, but it happens.

                                  That's way different. Internal use vs sending them out. Sending them out is just as bad or worse than sending an .exe or .bat etc? I'm sure you block those? We strip macros. Vendors don't like it? Find another one.

                                  To the best of my knowledge I can't strip macros with AppRiver - but I'll check into it tomorrow to be sure. They can block by extension - which I've done in the past... but doesn't help here.

                                  Weird if it can't. Ours can strip them or print them to PDF and replace them

                                  A macro?

                                  It can be set to strip the macro's out or Print the whole file to a PDF. The PDF would not have macro's. Our solution even will scan for urls in documents and see what they are.

                                  DashrenderD 1 Reply Last reply Reply Quote 0
                                  • DashrenderD
                                    Dashrender @Jason
                                    last edited by

                                    @Jason said:

                                    It can be set to strip the macro's out or Print the whole file to a PDF. The PDF would not have macro's. Our solution even will scan for urls in documents and see what they are.

                                    what are you using?

                                    J 1 Reply Last reply Reply Quote 0
                                    • J
                                      Jason Banned @Dashrender
                                      last edited by

                                      @Dashrender said:

                                      @Jason said:

                                      It can be set to strip the macro's out or Print the whole file to a PDF. The PDF would not have macro's. Our solution even will scan for urls in documents and see what they are.

                                      what are you using?

                                      Mimecast

                                      https://community.mimecast.com/docs/DOC-1454

                                      1 Reply Last reply Reply Quote 0
                                      • 1
                                      • 2
                                      • 2 / 2
                                      • First post
                                        Last post