<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Egregor Ransomware attack on Palo Alto in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/re-egregor-ransomware-attack-on-palo-alto/m-p/365290#M981</link>
    <description>&lt;P&gt;Dear Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN OS Version: 8.1.12&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;PAN MODEL:&amp;nbsp; PA-3020&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If Palo Alto have a valid signature of this&amp;nbsp;Egregor Ransomware attack ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also please check whether Palo Alto has any FAQ related&amp;nbsp;to Egregor Ransomware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Signature&lt;BR /&gt;&lt;SPAN&gt;Release&lt;SPAN class="pull-right"&gt;Post-7.1&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;Domain Name&lt;BR /&gt;Type&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;Name: generic:egregor.top&lt;/P&gt;&lt;P class=""&gt;Unique Threat ID: 385503381&lt;/P&gt;&lt;P class=""&gt;Create Time: 2020-11-16 07:32:05 (UTC)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="tabbed-header Post-71"&gt;Threat ID: n/a&lt;/P&gt;&lt;P class="tabbed-header Post-71"&gt;Current Release: n/a&lt;/P&gt;&lt;P class="tabbed-header Post-71"&gt;First Release: 3535 (2020-11-16 UTC)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;egregor.top&lt;/TD&gt;&lt;TD&gt;AntiVirus&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;Name: generic: egregor.top&lt;/P&gt;&lt;P class=""&gt;Unique Threat ID: 385503381&lt;/P&gt;&lt;P class=""&gt;Create Time: 2020-11-16 07:32:05 (UTC)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="tabbed-header Post-71"&gt;Threat ID: n/a&lt;/P&gt;&lt;P class="tabbed-header Post-71"&gt;Current Release: n/a&lt;/P&gt;&lt;P class="tabbed-header Post-71"&gt;First Release: n/a&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;egregor.top&lt;/TD&gt;&lt;TD&gt;Wildfire&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how to block this ransomware attack? If you have any idea please suggest.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthikeyan Balamurugan&lt;/P&gt;</description>
    <pubDate>Tue, 24 Nov 2020 16:29:18 GMT</pubDate>
    <dc:creator>karthikeyanB</dc:creator>
    <dc:date>2020-11-24T16:29:18Z</dc:date>
    <item>
      <title>RE: Egregor Ransomware attack on Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/re-egregor-ransomware-attack-on-palo-alto/m-p/365290#M981</link>
      <description>&lt;P&gt;Dear Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN OS Version: 8.1.12&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;PAN MODEL:&amp;nbsp; PA-3020&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If Palo Alto have a valid signature of this&amp;nbsp;Egregor Ransomware attack ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also please check whether Palo Alto has any FAQ related&amp;nbsp;to Egregor Ransomware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Signature&lt;BR /&gt;&lt;SPAN&gt;Release&lt;SPAN class="pull-right"&gt;Post-7.1&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;Domain Name&lt;BR /&gt;Type&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;Name: generic:egregor.top&lt;/P&gt;&lt;P class=""&gt;Unique Threat ID: 385503381&lt;/P&gt;&lt;P class=""&gt;Create Time: 2020-11-16 07:32:05 (UTC)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="tabbed-header Post-71"&gt;Threat ID: n/a&lt;/P&gt;&lt;P class="tabbed-header Post-71"&gt;Current Release: n/a&lt;/P&gt;&lt;P class="tabbed-header Post-71"&gt;First Release: 3535 (2020-11-16 UTC)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;egregor.top&lt;/TD&gt;&lt;TD&gt;AntiVirus&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;Name: generic: egregor.top&lt;/P&gt;&lt;P class=""&gt;Unique Threat ID: 385503381&lt;/P&gt;&lt;P class=""&gt;Create Time: 2020-11-16 07:32:05 (UTC)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="tabbed-header Post-71"&gt;Threat ID: n/a&lt;/P&gt;&lt;P class="tabbed-header Post-71"&gt;Current Release: n/a&lt;/P&gt;&lt;P class="tabbed-header Post-71"&gt;First Release: n/a&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;egregor.top&lt;/TD&gt;&lt;TD&gt;Wildfire&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how to block this ransomware attack? If you have any idea please suggest.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthikeyan Balamurugan&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 16:29:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/re-egregor-ransomware-attack-on-palo-alto/m-p/365290#M981</guid>
      <dc:creator>karthikeyanB</dc:creator>
      <dc:date>2020-11-24T16:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: RE: Egregor Ransomware attack on Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/re-egregor-ransomware-attack-on-palo-alto/m-p/365303#M982</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;Karthikeyan,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PAN has multiple signatures actively blocking Egregor Ransomware. We do not confirm coverage based on Malware names. We typically receive IOC's such as file hashes and confirm we have coverage for said hashes. Malicious files acquire&amp;nbsp;generic virus name which makes it hard to search it if we don't have a hash. Without a specific sample or hash, it would be hard to confirm if there is coverage or not.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you have access to Autofocus, you may search using Egregor tag and you will find samples related to this ransomeware.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are some hashes that I have found being related to Egregor activities. You can check them on Threatvault.&lt;/P&gt;
&lt;P&gt;967422de1acc14deb7e7ce803d86aff44e2652bfcd550e3a34c2e37abc883dee&lt;BR /&gt;4c9e3ffda0e663217638e6192a093bbc23cd9ebfbdf6d2fc683f331beaee0321&lt;BR /&gt;aee131ba1bfc4b6fa1961a7336e43d667086ebd2c7ff81029e14b2bf47d9f3a7&lt;BR /&gt;7caed5f406445c788543f55af6d98a8bc4f0c104e6a51e2564dd37b6a485cc18&lt;BR /&gt;92d72d4c1aaef1983a05bb65ee540236b98fdab4ca382d15a845ab6d07ea1fb8&lt;BR /&gt;004a2dc3ec7b98fa7fe6ae9c23a8b051ec30bcfcd2bc387c440c07ff5180fe9a&lt;BR /&gt;28f3f5a3ea270d9b896fe38b9df79a6ca430f5edab0423b3d834cf8d586f13e6&lt;BR /&gt;a376fd507afe8a1b5d377d18436e5701702109ac9d3e7026d19b65a7d313b332&lt;BR /&gt;3fd510a3b2e0b0802d57cd5b1cac1e61797d50a08b87d9b5243becd9e2f7073f&lt;BR /&gt;c1c4e677b36a2ee6ae858546e727e73cc38c95c9024c724f939178b3c03de906&lt;BR /&gt;9c900078cc6061fb7ba038ee5c065a45112665f214361d433fc3906bf288e0eb&lt;BR /&gt;2d01c32d51e4bbb986255e402da4624a61b8ae960532fbb7bb0d3b0080cb9946&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;KR,&lt;/P&gt;
&lt;P&gt;Mohamed&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 17:05:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/re-egregor-ransomware-attack-on-palo-alto/m-p/365303#M982</guid>
      <dc:creator>mmouhib</dc:creator>
      <dc:date>2020-11-24T17:05:52Z</dc:date>
    </item>
  </channel>
</rss>

