<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is wildfire mistaken? false negative? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/is-wildfire-mistaken-false-negative/m-p/21072#M15377</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had a similar discussion with "my" Sales Engineer at PA that wildfire claimed "benign" for a malware (in my case a custom made one to test how well behavioural (spelling?) analysis works).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A major flaw with wildfire, in my opinion, is that wildfire will whitelist any signed (by known CA in the chain) applications. To me that is just bad looking at the stolen realtek certs and the others which have been used for the past year or two.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps this could be the reason in your case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other thing is what wildfire triggers on. It seems that it doesnt trigger on downloaders but rather the actual payload. Which I also finds a bit odd because if you trigger on the downloader (which often use at least one exploit) you would have a higher probability to keep your clients clean (or at least get a notify on how the actual malware got in). Otherwise you will (if lucky) only get a warning from Wildfire for the actual payload but the source of the infection will remain unknown (and can infect others when new payload is generated - on the other hand the downloader itself can of course also get new versions to avoid signaturebased detections).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Dec 2012 08:24:11 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-12-06T08:24:11Z</dc:date>
    <item>
      <title>Is wildfire mistaken? false negative?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-wildfire-mistaken-false-negative/m-p/21071#M15376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i'm testing wildfire at the moment.&lt;/P&gt;&lt;P&gt;We had a security incident on a corporate notebook there were a lot of dropped "ZeroAccess.Gen Command and Control Traffic" in the thread-log.&lt;/P&gt;&lt;P&gt;We scanned the laptop with different virus/spyware scanners and found a file which i'm uploaded to wildfire and virustotal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wildfire says it's Benign.&lt;/P&gt;&lt;P&gt;Virustotal with 24/44 detect ratio says its a backdoor.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/file/8bec8e81dd143cfecb4e4119d646c90205c0e6c734331ba2478aad861f0550fe/analysis/" title="https://www.virustotal.com/file/8bec8e81dd143cfecb4e4119d646c90205c0e6c734331ba2478aad861f0550fe/analysis/"&gt;Antivirus scan for a928ac4e1a34c4eb035b4ed6a8f7a6cb at 2012-11-27 21:16:41 UTC - VirusTotal&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So who is wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sebastian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 08:02:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-wildfire-mistaken-false-negative/m-p/21071#M15376</guid>
      <dc:creator>sebastian</dc:creator>
      <dc:date>2012-12-06T08:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Is wildfire mistaken? false negative?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-wildfire-mistaken-false-negative/m-p/21072#M15377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had a similar discussion with "my" Sales Engineer at PA that wildfire claimed "benign" for a malware (in my case a custom made one to test how well behavioural (spelling?) analysis works).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A major flaw with wildfire, in my opinion, is that wildfire will whitelist any signed (by known CA in the chain) applications. To me that is just bad looking at the stolen realtek certs and the others which have been used for the past year or two.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps this could be the reason in your case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other thing is what wildfire triggers on. It seems that it doesnt trigger on downloaders but rather the actual payload. Which I also finds a bit odd because if you trigger on the downloader (which often use at least one exploit) you would have a higher probability to keep your clients clean (or at least get a notify on how the actual malware got in). Otherwise you will (if lucky) only get a warning from Wildfire for the actual payload but the source of the infection will remain unknown (and can infect others when new payload is generated - on the other hand the downloader itself can of course also get new versions to avoid signaturebased detections).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 08:24:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-wildfire-mistaken-false-negative/m-p/21072#M15377</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-12-06T08:24:11Z</dc:date>
    </item>
    <item>
      <title>Re: Is wildfire mistaken? false negative?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-wildfire-mistaken-false-negative/m-p/21073#M15378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sebastian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We will take a look at this sample and get back to you. Stay tuned...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alfred&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 15:23:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-wildfire-mistaken-false-negative/m-p/21073#M15378</guid>
      <dc:creator>fredallee</dc:creator>
      <dc:date>2012-12-06T15:23:59Z</dc:date>
    </item>
  </channel>
</rss>

