<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking a site hosted malware in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-a-site-hosted-malware/m-p/14005#M10282</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would say it would be best if you could block the malware with antivirus/anti spyware profiles. For that to work, Palt Alto needs to have a signature for that specific malware.&lt;/P&gt;&lt;P&gt;I search through the threat database but did not find anything named seedabutor. If it doesn't exist under a different name, you could contact support and have them make a signature for it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 25 Feb 2013 21:58:04 GMT</pubDate>
    <dc:creator>torm</dc:creator>
    <dc:date>2013-02-25T21:58:04Z</dc:date>
    <item>
      <title>Blocking a site hosted malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-a-site-hosted-malware/m-p/14004#M10281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A new "parked domain" company and come to surface, and they seem to own a LOT of domain names, none of which brightcloud has correctly classified as "parked domain".&amp;nbsp; The server in question is hosting a piece of malware called seedabutor.b.&amp;nbsp; Our AV is catching it, but I'd love to just block the whole server instead of handling this each time I see a mispelled URL that lands on that server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of the URLs is &lt;A href="http://calgaryheral.com/" title="http://calgaryheral.com/"&gt;http://calgaryheral.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Another is &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://calgaryhomeshow.ca"&gt;http://calgaryhomeshow.ca&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now you can see that while they seem to be the same server, they are on different IP addresses.&amp;nbsp; So blocking by domain or IP isn't going to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, what can I do to block this specific strain of malware from coming in each and every time?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking forward to your guidance.&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 20:55:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-a-site-hosted-malware/m-p/14004#M10281</guid>
      <dc:creator>cenders</dc:creator>
      <dc:date>2013-02-25T20:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking a site hosted malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-a-site-hosted-malware/m-p/14005#M10282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would say it would be best if you could block the malware with antivirus/anti spyware profiles. For that to work, Palt Alto needs to have a signature for that specific malware.&lt;/P&gt;&lt;P&gt;I search through the threat database but did not find anything named seedabutor. If it doesn't exist under a different name, you could contact support and have them make a signature for it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 21:58:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-a-site-hosted-malware/m-p/14005#M10282</guid>
      <dc:creator>torm</dc:creator>
      <dc:date>2013-02-25T21:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking a site hosted malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-a-site-hosted-malware/m-p/14006#M10283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Basically what you can do (with the PA device):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Enable IPS and AV for all flows. At least with a profile such as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Critical: Block&lt;/P&gt;&lt;P&gt;High: Block&lt;/P&gt;&lt;P&gt;Medium: Block&lt;/P&gt;&lt;P&gt;Low: Default&lt;/P&gt;&lt;P&gt;Informational: Default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Enable SSL-termination (so the above IPS and AV inspection will also be on SSL traffic).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Enable URL-filtering and only allow already classified domains/URLs (by category). You will most likely need to enable dynamic lookups (against the urldb "cloud") since the downloadable db is only like top 10000 (or so) of each category.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Enable using a dynamic blocklist. This way you can have a box on your network which downloads and/or generates a txt-file with ipaddress which the PA box then will have a schedule for how often it should fetch this txt-file from this server and put it in a specific rule which you configured to block access. Either if there already exist a site which publishes recommended ip addresses to block and the particular bad sites are already included or if you do this on your own by using whois or such (for example if these sites is registered by the same user or so).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) If possible also limit which filetypes will be allowed to download from Internet (and since you have SSL-termination also SSL/HTTPS stuff will be covered by this). Preferly by a whitelist ("only these filetypes are allowed, drop any other").&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6) If PA didnt create a public threatid for these bad files you could contact your SE or the appid team and ask them to do so. If possible you can also create your own signature (depends on how dynamic the bad files are).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 06:37:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-a-site-hosted-malware/m-p/14006#M10283</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-02-26T06:37:40Z</dc:date>
    </item>
  </channel>
</rss>

