<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WannaCry - how to protect our system with help from PANOS? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156550#M51402</link>
    <description>&lt;P&gt;Doing a search on the PA Threat Vault it looks like there were some AV and Wildfire signatures added in the last few days as well (search for "wanna").&lt;/P&gt;</description>
    <pubDate>Sun, 14 May 2017 02:29:15 GMT</pubDate>
    <dc:creator>jsalmans</dc:creator>
    <dc:date>2017-05-14T02:29:15Z</dc:date>
    <item>
      <title>WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156531#M51394</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it a way to help protect our Windows systems from attacs from internet/lans using url protection (or other technics)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to &lt;A href="https://mobile.twitter.com/msuiche/status/863284743940575232" target="_blank"&gt;https://mobile.twitter.com/msuiche/status/863284743940575232&lt;/A&gt; it's using hardcoded url so it could be possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;</description>
      <pubDate>Sat, 13 May 2017 16:08:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156531#M51394</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2017-05-13T16:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156542#M51396</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm using BrighrCload url categorysation and ...&lt;/P&gt;&lt;P&gt;According to Cisco Talos &lt;A href="http://blog.talosintelligence.com/2017/05/wannacry.html" target="_blank"&gt;http://blog.talosintelligence.com/2017/05/wannacry.html&lt;/A&gt; this malware using (used) url uqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com&lt;/P&gt;&lt;P&gt;but - surprise!! Brighcloud says:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2017-05-13_205900.png" style="width: 715px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9244iAA951554293242D3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2017-05-13_205900.png" alt="2017-05-13_205900.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;How it is possible? For what we paying?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The same with PAN DB&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2017-05-13_210120.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9245i60478F809135C24D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2017-05-13_210120.png" alt="2017-05-13_210120.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WIth regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;</description>
      <pubDate>Sat, 13 May 2017 19:02:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156542#M51396</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2017-05-13T19:02:18Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156543#M51397</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are advised not to block access to that domain. As read on the blog you linked to:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;The above subroutine attempts an HTTP GET to this domain, and if it fails, continues to carry out the infection. However if it succeeds, the subroutine exits."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So if you block it the HTTP GET fails and&amp;nbsp;the ransomware executes...&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 13 May 2017 19:50:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156543#M51397</guid>
      <dc:creator>rodvand</dc:creator>
      <dc:date>2017-05-13T19:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156544#M51398</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;693-3991 update package was released about 1h ago and it's covers MS17-010.&lt;/P&gt;&lt;P&gt;But MS17-010 was patched by Microsoft in March 2017 - so why PaloAlto released update for threat provention so late?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;</description>
      <pubDate>Sat, 13 May 2017 21:56:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156544#M51398</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2017-05-13T21:56:01Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156549#M51401</link>
      <description>&lt;P&gt;PAN released App and threat version 692 in the end of April&amp;nbsp;covering MS017-010 with default action alert. Today's release changes default action to reset-both. In both releases the vulnerability has severity critical.&lt;/P&gt;</description>
      <pubDate>Sat, 13 May 2017 23:17:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156549#M51401</guid>
      <dc:creator>rodvand</dc:creator>
      <dc:date>2017-05-13T23:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156550#M51402</link>
      <description>&lt;P&gt;Doing a search on the PA Threat Vault it looks like there were some AV and Wildfire signatures added in the last few days as well (search for "wanna").&lt;/P&gt;</description>
      <pubDate>Sun, 14 May 2017 02:29:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156550#M51402</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2017-05-14T02:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156552#M51404</link>
      <description>&lt;P&gt;Palo Alto released a blog post on May 12 with an update on May 13 about which methods are available to on PAN-OS to prevent WanaCrypt0r attacks.&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;UPDATED: Palo Alto Networks Protections Against WanaCrypt0r Ransomware Attacks&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://researchcenter.paloaltonetworks.com/2017/05/palo-alto-networks-protections-wanacrypt0r-attacks/" target="_blank"&gt;http://researchcenter.paloaltonetworks.com/2017/05/palo-alto-networks-protections-wanacrypt0r-attacks/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 14 May 2017 04:34:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156552#M51404</guid>
      <dc:creator>acc6d0b3610eec313831f7900fdbd235</dc:creator>
      <dc:date>2017-05-14T04:34:47Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156558#M51408</link>
      <description>&lt;P&gt;since this thread exists, an emergency update 698 was released yesterday, which I believe changed the default for &lt;SPAN&gt;CVE-2017-0144&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; and CVE-2017-0146&lt;/SPAN&gt; to reset-both.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but if your vulnerability protection profile always reset for critical, it's moot. only if you're using default should you ensure you are current.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 May 2017 10:01:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156558#M51408</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-05-14T10:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156638#M51434</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/31654"&gt;@_slv_&lt;/a&gt;&amp;nbsp;So my question is you're concerned about the&amp;nbsp;efficacy of the Brightcloud filtering service, but the URL had (has?) a categorization of "unknown." &amp;nbsp;A good security policy would be to a block "unknown," but in most organizations that's not possible so that's a risk we run. &amp;nbsp;Allowing access to sites not yet categorized in order to provide the least impact to the business while accepting some risk of malicious activity which come from these "unknown" locations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd argue I'd be more concerned about that site being categorized at "sports" and malicious content coming from there versus an "unknown" report.&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 12:49:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156638#M51434</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2017-05-15T12:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156681#M51448</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;: IMHO PaloALto/BrightCloud should be shamed - this is not first time when well known attack occur (I created my topic at saturday afternoon) and everyone who is concerned about security known this host. Why PANDB and BrightCVloud doesnt categrysied it as malware site - I don't know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tryed many time report polish phishing sites to BrightCloud - every time I got respond that everything is OK....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone know how it was at Cisco/Checkpoint ? When concurent system reported this site/host as a malware?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In situations like this - TIME - is most important thing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 17:16:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156681#M51448</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2017-05-15T17:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156716#M51456</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/31654"&gt;@_slv_&lt;/a&gt;&amp;nbsp;Currently Cisco's URL filtering service says the URL which you posted here is "Neutral"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cisco_URL_Lookup.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9254i757831DA92E9A20E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Cisco_URL_Lookup.PNG" alt="Cisco_URL_Lookup.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I assume Talos (Cisco' own threat research team) would have told the URL filtering service about the maliciousness of this site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ZScaler is one of the leading cloud web proxies also shows this site as "benign." &amp;nbsp;I'm not giving Palo / Brightcloud an out, but I think casting aspersions that the service is not adequate is innapropriate in this case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ZScaler_URL_Lookup.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9255i9FB1BFA32441EF54/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ZScaler_URL_Lookup.PNG" alt="ZScaler_URL_Lookup.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bluecoat's URL filtering shows this category as "Suspicious.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BC.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9256iAB9FE06AC5BEB839/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="BC.PNG" alt="BC.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 18:32:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156716#M51456</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2017-05-15T18:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156720#M51460</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/31654"&gt;@_slv_&lt;/a&gt;&amp;nbsp;Please read this article:&lt;/P&gt;&lt;P&gt;&amp;nbsp;-&amp;nbsp;&lt;A href="https://www.theguardian.com/technology/2017/may/13/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack" target="_blank"&gt;https://www.theguardian.com/technology/2017/may/13/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The infection STOPS if the malware can reach the domain successfully. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you block the domain, then the encryption/ransomware process STARTS. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given this information, please let us know why you believe the domain should be blocked. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 18:50:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156720#M51460</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2017-05-15T18:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156724#M51464</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/22017"&gt;@jvalentine&lt;/a&gt;:that's wired ... blocking c&amp;amp;c starting encrypting..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we will see how will behave new wariants ot wannacry.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 19:11:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156724#M51464</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2017-05-15T19:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156795#M51480</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/31654"&gt;@_slv_&lt;/a&gt;&amp;nbsp;It certainly is different than what you would expect. &amp;nbsp;It's not really C2, though... the working theory is that the author placed that check as a "kill switch" in case they wanted to stop the campaign. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And you're absolutely correct... new variants will pop-up and their behaviors will need to be analyzed. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 00:46:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156795#M51480</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2017-05-16T00:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: WannaCry - how to protect our system with help from PANOS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156829#M51488</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And we have "new one" without killing-switch &lt;A href="http://www.securityweek.com/patched-wannacry-ransomware-has-no-kill-switch" target="_self"&gt;http://www.securityweek.com/patched-wannacry-ransomware-has-no-kill-switch&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 07:13:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wannacry-how-to-protect-our-system-with-help-from-panos/m-p/156829#M51488</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2017-05-16T07:13:39Z</dc:date>
    </item>
  </channel>
</rss>

