<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cryptowall 2.0? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27858#M20315</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are some detection/prevention best practices Cryptowall:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Palo Alto Networks firewall detect over 242 Crypto variants and 2686 Ransom variants as of today. CryproWall could very well be known by another name in the Cryptolock/CryptoDefense ransom ware virus family; and detected by Palo Alto. But unfortunately it's not possible to say weather Palo Alto is currently detecting all the CryptoWall Ransom signature unless we have that signature variant. Once we have the signature we can investigate further and see if we are mitigating or not. Implementing Wildfire (non-license version) can help with capturing new signatures.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also effectively reduce the risks of this or any other malware within your organization by following the guidelines from our product management team for our Threat features:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use a layered approach: IPS signatures, AV, URL filtering and Wildfire for best protection&amp;nbsp; &lt;/P&gt;&lt;P&gt;1. IPS: consider using inline blocking with a strict policy&amp;nbsp; &lt;/P&gt;&lt;P&gt;2. AV: enable AV. To see our cryptolocker signatures search "LOCK" on our Threat DB portal. Keep in mind that we have added many of these samples under the names: Virus/Win32.generic.jnxyz" type name. Trojan-Ransom, Ransom/Win32.crilock.cl, Trojan/Win32.lockscreen.ajq&amp;nbsp; &lt;/P&gt;&lt;P&gt;3. Spyware/CnC detection to find infected systems that may try to pull down variants: ensure DNS detection is enabled; Look for ID # 13433 "CryptoLocker Command and Control Traffic"&amp;nbsp; &lt;/P&gt;&lt;P&gt;4. URL filtering with PANDB: prevent access to malicious/malware domains&amp;nbsp; &lt;/P&gt;&lt;P&gt;5: Wildfire: free version allows uploads of files for scanning; subscription version provides hourly updates 24 hours a day with latest malware coverage from all Wildfire samples seen in the past hour&amp;nbsp; &lt;/P&gt;&lt;P&gt;6. File blocking: no executables should be allowed to enter an enterprise without inspection.&amp;nbsp; &lt;/P&gt;&lt;P&gt;7. Decryption: leverage SSL decryption to inspect all of your user's webmail sessions (doesn't let you read their mail, but it does allow you to block malware downloads).&amp;nbsp; &lt;/P&gt;&lt;P&gt;8. Reporting: regularly look at your device's botnet report to spot any infections that came in via sneaker net&amp;nbsp; &lt;/P&gt;&lt;P&gt;9. Sinkhole: PAN-OS 6.0 feature to prevent infected systems from contacting command-and-control servers&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Khan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Oct 2014 20:40:15 GMT</pubDate>
    <dc:creator>kattaullah</dc:creator>
    <dc:date>2014-10-15T20:40:15Z</dc:date>
    <item>
      <title>Cryptowall 2.0?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27857#M20314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Starting to see Cryptowall 2.0 infections&amp;nbsp; anyone heard any updates from PA&amp;nbsp; on a threat update for this?&amp;nbsp;&amp;nbsp; based on my google search it's been in the wild for a week or so.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Oct 2014 20:34:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27857#M20314</guid>
      <dc:creator>travisj</dc:creator>
      <dc:date>2014-10-15T20:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptowall 2.0?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27858#M20315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are some detection/prevention best practices Cryptowall:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Palo Alto Networks firewall detect over 242 Crypto variants and 2686 Ransom variants as of today. CryproWall could very well be known by another name in the Cryptolock/CryptoDefense ransom ware virus family; and detected by Palo Alto. But unfortunately it's not possible to say weather Palo Alto is currently detecting all the CryptoWall Ransom signature unless we have that signature variant. Once we have the signature we can investigate further and see if we are mitigating or not. Implementing Wildfire (non-license version) can help with capturing new signatures.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also effectively reduce the risks of this or any other malware within your organization by following the guidelines from our product management team for our Threat features:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use a layered approach: IPS signatures, AV, URL filtering and Wildfire for best protection&amp;nbsp; &lt;/P&gt;&lt;P&gt;1. IPS: consider using inline blocking with a strict policy&amp;nbsp; &lt;/P&gt;&lt;P&gt;2. AV: enable AV. To see our cryptolocker signatures search "LOCK" on our Threat DB portal. Keep in mind that we have added many of these samples under the names: Virus/Win32.generic.jnxyz" type name. Trojan-Ransom, Ransom/Win32.crilock.cl, Trojan/Win32.lockscreen.ajq&amp;nbsp; &lt;/P&gt;&lt;P&gt;3. Spyware/CnC detection to find infected systems that may try to pull down variants: ensure DNS detection is enabled; Look for ID # 13433 "CryptoLocker Command and Control Traffic"&amp;nbsp; &lt;/P&gt;&lt;P&gt;4. URL filtering with PANDB: prevent access to malicious/malware domains&amp;nbsp; &lt;/P&gt;&lt;P&gt;5: Wildfire: free version allows uploads of files for scanning; subscription version provides hourly updates 24 hours a day with latest malware coverage from all Wildfire samples seen in the past hour&amp;nbsp; &lt;/P&gt;&lt;P&gt;6. File blocking: no executables should be allowed to enter an enterprise without inspection.&amp;nbsp; &lt;/P&gt;&lt;P&gt;7. Decryption: leverage SSL decryption to inspect all of your user's webmail sessions (doesn't let you read their mail, but it does allow you to block malware downloads).&amp;nbsp; &lt;/P&gt;&lt;P&gt;8. Reporting: regularly look at your device's botnet report to spot any infections that came in via sneaker net&amp;nbsp; &lt;/P&gt;&lt;P&gt;9. Sinkhole: PAN-OS 6.0 feature to prevent infected systems from contacting command-and-control servers&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Khan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Oct 2014 20:40:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27858#M20315</guid>
      <dc:creator>kattaullah</dc:creator>
      <dc:date>2014-10-15T20:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptowall 2.0?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27859#M20316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would also request you to check if you have the latest version of Application and Threat detection signatures. You can check this from Device-&amp;gt;Content updates-&amp;gt; Check now. Make sure that you download and install the new latest one available.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Oct 2014 20:48:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27859#M20316</guid>
      <dc:creator>kattaullah</dc:creator>
      <dc:date>2014-10-15T20:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptowall 2.0?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27860#M20317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Travisj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cryptowall was covered long back. I have a doubt abour cryptowall 2.0. I strongly suggest you to check with TAC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Oct 2014 21:03:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27860#M20317</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-15T21:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptowall 2.0?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27861#M20318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the responses.&amp;nbsp; We have most of that in place, completely block Zips, A/v scanning, users can't download files.&amp;nbsp;&amp;nbsp; The new varient seems to be getting around the older threat signatures somehow.&amp;nbsp;&amp;nbsp; I'm still trying to figure out exactly where it entered at and not having much luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where would i find the botnet report mentioned?&amp;nbsp; We have 2 pa2050's with a panorama server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Oct 2014 21:14:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27861#M20318</guid>
      <dc:creator>travisj</dc:creator>
      <dc:date>2014-10-15T21:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptowall 2.0?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27862#M20319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Travisj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer following document it has information about Bonet configuration and Reports. Let me know if that helps.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1774"&gt;Botnet Report in PAN-OS 4.0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, you may want to check with TAC on new variant.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Oct 2014 21:24:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27862#M20319</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-15T21:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptowall 2.0?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27863#M20320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have been hit by CryptoWall 2.0 also, behind our PA-500, and we have done/implemented all of the suggestions in kattaullah's post prior to the attack.&amp;nbsp; I am also awaiting an Application/Threat upload by Palo Alto.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Oct 2014 13:27:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27863#M20320</guid>
      <dc:creator>jhartsook</dc:creator>
      <dc:date>2014-10-20T13:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptowall 2.0?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27864#M20321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After researching last week I found out that the new variant uses TOR for Command and Control.&amp;nbsp; I blocked TOR application using security rule and that seems to have stopped it from actually doing any encrypting on new infections.&amp;nbsp; Only seen a couple since last Thursday so it looks like a new update to either PA or McAffee might be detecting and blocking the new variant now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;jhartsook:&amp;nbsp; the rule I used if interested is:&lt;/P&gt;&lt;P&gt;from zone ANY&amp;nbsp; to zone UNTRUST&amp;nbsp;&amp;nbsp; Application TOR&amp;nbsp;&amp;nbsp; Service ANY&amp;nbsp;&amp;nbsp; (make sure to change this off "default application" so that it will block on any port)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Oct 2014 14:49:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27864#M20321</guid>
      <dc:creator>travisj</dc:creator>
      <dc:date>2014-10-21T14:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptowall 2.0?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27865#M20322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And it looks like the Botnet report does not exist in 6.0 panos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Oct 2014 14:54:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27865#M20322</guid>
      <dc:creator>travisj</dc:creator>
      <dc:date>2014-10-21T14:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptowall 2.0?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27866#M20323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A recently published writeup on the Palo Alto Networks Blog regarding cryptowall 2.0 infection vectors, best practices etc:&lt;/P&gt;&lt;P&gt;&lt;A href="http://researchcenter.paloaltonetworks.com/2014/10/tracking-new-ransomware-cryptowall-2-0/" title="http://researchcenter.paloaltonetworks.com/2014/10/tracking-new-ransomware-cryptowall-2-0/"&gt;Tracking New Ransomware CryptoWall 2.0 - Palo Alto Networks BlogPalo Alto Networks Blog&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Oct 2014 15:32:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27866#M20323</guid>
      <dc:creator>goku123</dc:creator>
      <dc:date>2014-10-27T15:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptowall 2.0?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27867#M20324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cryptowall 2.0 is going through our PALO's as well.&amp;nbsp; I have the hash for it, i need a way to give it to Support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Nov 2014 00:58:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptowall-2-0/m-p/27867#M20324</guid>
      <dc:creator>markk96</dc:creator>
      <dc:date>2014-11-06T00:58:20Z</dc:date>
    </item>
  </channel>
</rss>

