<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Havex Malware in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12517#M9166</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steven -- The confusion here stems from the fact that folks are looking at threatvault2.paloaltonetworks.com rather than wildfire.paloaltonetworks.com. To be clear, the Havex samples are classified as malware, have been since June 24, and would show up with that verdict if seen on a firewall that has access to the WildFire cloud today. There &lt;EM&gt;absolutely&lt;/EM&gt; is a feedback mechanism in place here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The individual VM verdicts shown in ThreatVault (e.g. "This sample was found to be benign on this virtual machine") are an oversight on our part -- they don't always correspond to the current disposition of the sample, and weren't intended for display in ThreatVault reports. I've filed a bug to have them removed so we can avoid confusion on this issue in the future.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Jul 2014 01:21:30 GMT</pubDate>
    <dc:creator>cblackmore</dc:creator>
    <dc:date>2014-07-10T01:21:30Z</dc:date>
    <item>
      <title>Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12494#M9143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any information about PAN detection capability for the Havex malware family: &lt;A href="http://www.f-secure.com/weblog/archives/00002718.html" title="http://www.f-secure.com/weblog/archives/00002718.html"&gt;http://www.f-secure.com/weblog/archives/00002718.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Threat vault seems to produce no hits at the moment. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tuomo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jun 2014 10:47:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12494#M9143</guid>
      <dc:creator>Tuomo</dc:creator>
      <dc:date>2014-06-24T10:47:34Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12495#M9144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would like more information on this too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jun 2014 08:51:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12495#M9144</guid>
      <dc:creator>ITInfraNL</dc:creator>
      <dc:date>2014-06-27T08:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12496#M9145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is not showing up yet in the threat vault as an existing update for PA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" title="https://threatvault.paloaltonetworks.com/"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can open a ticket with support to get a more specific update.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jun 2014 00:10:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12496#M9145</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-06-28T00:10:50Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12497#M9146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you got some more information about havex/oldrea malware coverage in the threat signatures unitl now?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 05:36:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12497#M9146</guid>
      <dc:creator>PANUser-1234</dc:creator>
      <dc:date>2014-07-02T05:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12498#M9147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any update from PA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 07:25:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12498#M9147</guid>
      <dc:creator>LCMember2327</dc:creator>
      <dc:date>2014-07-02T07:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12499#M9148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While we wait for Palo Alto to wake up; please have a look at these:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-under-sabotage-threat" title="http://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-under-sabotage-threat"&gt;http://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-under-sabotage-threat&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf" title="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf"&gt;http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-=Tommy=-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 07:41:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12499#M9148</guid>
      <dc:creator>Dulle</dc:creator>
      <dc:date>2014-07-02T07:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12500#M9149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If this is a critical vulnerability to you, I would open a ticket. This will get the signature escalated internally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can't expect an official update from PA here.&amp;nbsp; These are just user to user support forums.&amp;nbsp; We are lucky that many PA employees spend a great deal of time here.&amp;nbsp; But official support is still via tickets to the support portal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:17:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12500#M9149</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-07-02T11:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12501#M9150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But we have.....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:35:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12501#M9150</guid>
      <dc:creator>Dulle</dc:creator>
      <dc:date>2014-07-02T11:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12502#M9151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like Havex made it into the ThreatVault:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/Home/VirusDetail/2889719" title="https://threatvault.paloaltonetworks.com/Home/VirusDetail/2889719"&gt;https://threatvault.paloaltonetworks.com/Home/VirusDetail/2889719&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:46:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12502#M9151</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-07-02T11:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12503#M9152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interestingly enough if you click on the hash links, PA's own WildFire flags it as benign! Hmph. :smileyplain:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:47:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12503#M9152</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-07-02T11:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12504#M9153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess that is just a one way conversation, wildfire pushes signatures to threats but not back the other way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They did just add this because I checked before posting this morning earlier and it wasn't there yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:51:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12504#M9153</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-07-02T11:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12505#M9154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We uploaded a sample of havex to Wildfire ca June 20th - problem is they don't check it on Acrobat reader 10.x....&lt;BR /&gt;PAN also need to update their Virtual machines...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:54:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12505#M9154</guid>
      <dc:creator>pivvre</dc:creator>
      <dc:date>2014-07-02T11:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12506#M9155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have coverage for Havex malware.&lt;/P&gt;&lt;P&gt;Please upgrade to latest Anti virus version released today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hari Yadavalli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 15:05:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12506#M9155</guid>
      <dc:creator>hyadavalli</dc:creator>
      <dc:date>2014-07-02T15:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12507#M9156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does WildFire flag a sample as malicious yet :smileylaugh:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 15:25:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12507#M9156</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-07-02T15:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12508#M9157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on the SHA provided in initial comment I see wildfire reported as malicious&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 15:49:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12508#M9157</guid>
      <dc:creator>hyadavalli</dc:creator>
      <dc:date>2014-07-02T15:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12509#M9158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="benign.png" class="image-0 jive-image" height="711" src="https://live.paloaltonetworks.com/legacyfs/online/14239_benign.png" style="height: 711px; width: 1044.6px;" width="1045" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 16:04:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12509#M9158</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-07-02T16:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12510#M9159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I only see one SHA reported as malware and rest as benign.&lt;/P&gt;&lt;P&gt;Please open a case with palo alto support and they'll address the issue with wildfire.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 16:54:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12510#M9159</guid>
      <dc:creator>hyadavalli</dc:creator>
      <dc:date>2014-07-02T16:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12511#M9160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't have a sample of the malware, I'm just "stirring the pot" to be honest&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 16:56:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12511#M9160</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-07-02T16:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12512#M9161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting info in Brightclouds Webinar on Dragonfly/havex right now,&lt;/P&gt;&lt;P&gt;I asked if there has been any information exchange between Symantec (which has a lot of information - and protect users - on Dragonfly/havex) and Paloalto. They said the did info ex with a lot of company, but not PAN - why not?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jul 2014 09:42:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12512#M9161</guid>
      <dc:creator>pivvre</dc:creator>
      <dc:date>2014-07-03T09:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12513#M9162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;&lt;A _jive_internal="true" class="jiveTT-hover-user jive-username-link" data-avatarid="1643" data-externalid="" data-presence="null" data-userid="16909" data-username="hyadavalli" href="https://live.paloaltonetworks.com/people/hyadavalli"&gt;hyadavalli,&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;Based on your responses here, I assume you work for PA.&amp;nbsp; Can you explain what happens with new signatures like this against the existing file database that was deemed benign?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt; Some of these "benign" files will be previously unknown viruses like Havex.&amp;nbsp; Does Wildfire check them again against new signatures?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;If a previously flagged benign file is uploaded again, is this automatically benign from the previous verdict?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;In short, how does PA clean up the hash database to be sure the new viruses are successfully identified?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jul 2014 10:44:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12513#M9162</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-07-04T10:44:18Z</dc:date>
    </item>
  </channel>
</rss>

