<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Analysis ransomware in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/analysis-ransomware/m-p/280512#M75855</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of our servers have been infected by any kind of ransomware. We can see several files encripted. So we are seeing any evidence about the infection in the PA. The only trace that we saw in PA is that the infected server sends many dns sessions to strange domains:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AV.JPG" style="width: 573px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20852i820A24DB078243ED/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="AV.JPG" alt="AV.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;S is there any way to prevent these external dns sessions? are these sessions related with ransomware virus?&lt;/P&gt;&lt;P&gt;I tried to find the ID in spyware profile in order to chenge the action from alert (current) to drop) but i cant not find it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any advice to know what it happened and solved it in future?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 01 Aug 2019 12:04:32 GMT</pubDate>
    <dc:creator>BigPalo</dc:creator>
    <dc:date>2019-08-01T12:04:32Z</dc:date>
    <item>
      <title>Analysis ransomware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/analysis-ransomware/m-p/280512#M75855</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of our servers have been infected by any kind of ransomware. We can see several files encripted. So we are seeing any evidence about the infection in the PA. The only trace that we saw in PA is that the infected server sends many dns sessions to strange domains:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AV.JPG" style="width: 573px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20852i820A24DB078243ED/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="AV.JPG" alt="AV.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;S is there any way to prevent these external dns sessions? are these sessions related with ransomware virus?&lt;/P&gt;&lt;P&gt;I tried to find the ID in spyware profile in order to chenge the action from alert (current) to drop) but i cant not find it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any advice to know what it happened and solved it in future?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 12:04:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/analysis-ransomware/m-p/280512#M75855</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2019-08-01T12:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: Analysis ransomware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/analysis-ransomware/m-p/280531#M75858</link>
      <description>&lt;P&gt;you should enable DNS sinkhole in the antispyware profile, and if you're on PAN-OS 9.0 you can consider adding the DNS security service&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;protectionwise it would be good to have full protection profiles (AV, TP, AS, WF, URL)&amp;nbsp; set up on all your policies on the firewall , and traps on the endpoint to defend against 0-day&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you could also look into running a &lt;A title="Best Practice Assessment" href="https://live.paloaltonetworks.com/t5/Best-Practice-Assessment-Blogs/The-Best-Practice-Assessment-BPA-tool-for-NGFW-and-Panorama/ba-p/248343" target="_blank"&gt;BPA&lt;/A&gt; to tighten up your security posture&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 13:42:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/analysis-ransomware/m-p/280531#M75858</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-08-01T13:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: Analysis ransomware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/analysis-ransomware/m-p/280563#M75862</link>
      <description>&lt;P&gt;To make suggestions relevant to your environment&amp;nbsp;we'll need a lot more information about your device config (security policy and other subscription services you have and how they're configured.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That said, like&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;mentioned using the BPA to shore up your config.&amp;nbsp; To help prevent this in the future you should make sure you're using file blocking profiles to at least track all files devices on your network are downloading from the Internet.&amp;nbsp; You should also look into blocking file types which hosts typically have no business downloading from the Internet.(VBS for instance.)&amp;nbsp; You can look into implementing GEO blocking which will help prevent some infections.&amp;nbsp; Make sure you have SSL decryption deployed in your environment to help add visibility&amp;nbsp;in your firewall to catch potentially malicious payload which is delivered via an encrypted session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Before making any changes though be sure to understand what you're looking at blocking and making sure there aren't any business processes which might be impacted from any changes you might make.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 16:35:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/analysis-ransomware/m-p/280563#M75862</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-08-01T16:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: Analysis ransomware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/analysis-ransomware/m-p/280699#M75870</link>
      <description>&lt;P&gt;Is there any way to change the default action (Alert) for "Spyware generic"? I tried to look but i cant not find it&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 08:10:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/analysis-ransomware/m-p/280699#M75870</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2019-08-02T08:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: Analysis ransomware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/analysis-ransomware/m-p/280944#M75891</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;You can set exceptions. However I would recommend using the criticallity&amp;nbsp;as a best practice.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 601px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20879i84FEC929AD480296/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Also as described above, set up DNS sinkhole as well as wildfire. If you setup packet capture, you might only get the DNS requests. You can use a free safe DNS source such as quad9 until&amp;nbsp;you are comfortable&amp;nbsp;with purchasing one. This service is not a replacement for sinkhole, it is a compliment to it.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 20:49:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/analysis-ransomware/m-p/280944#M75891</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-08-02T20:49:58Z</dc:date>
    </item>
  </channel>
</rss>

