<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Havex Malware in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12518#M9167</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;&lt;STRONG&gt;&lt;A _jive_internal="true" class="jiveTT-hover-user jive-username-link" data-avatarid="-1" data-externalid="" data-presence="null" data-userid="27408" data-username="cblackmore" href="https://live.paloaltonetworks.com/people/cblackmore"&gt;cblackmore&lt;/A&gt; &lt;/STRONG&gt;&lt;/SPAN&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response on the process.&amp;nbsp; This is the response I was looking for ultimately from PA.&amp;nbsp; I do have one question then.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the threat vault vm verdict is not the correct procedure to determine a files status, what is the procedure we should use to verify a files status in Wildfire?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Jul 2014 11:51:08 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2014-07-10T11:51:08Z</dc:date>
    <item>
      <title>Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12494#M9143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any information about PAN detection capability for the Havex malware family: &lt;A href="http://www.f-secure.com/weblog/archives/00002718.html" title="http://www.f-secure.com/weblog/archives/00002718.html"&gt;http://www.f-secure.com/weblog/archives/00002718.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Threat vault seems to produce no hits at the moment. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tuomo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jun 2014 10:47:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12494#M9143</guid>
      <dc:creator>Tuomo</dc:creator>
      <dc:date>2014-06-24T10:47:34Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12495#M9144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would like more information on this too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jun 2014 08:51:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12495#M9144</guid>
      <dc:creator>ITInfraNL</dc:creator>
      <dc:date>2014-06-27T08:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12496#M9145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is not showing up yet in the threat vault as an existing update for PA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" title="https://threatvault.paloaltonetworks.com/"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can open a ticket with support to get a more specific update.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jun 2014 00:10:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12496#M9145</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-06-28T00:10:50Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12497#M9146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you got some more information about havex/oldrea malware coverage in the threat signatures unitl now?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 05:36:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12497#M9146</guid>
      <dc:creator>PANUser-1234</dc:creator>
      <dc:date>2014-07-02T05:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12498#M9147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any update from PA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 07:25:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12498#M9147</guid>
      <dc:creator>LCMember2327</dc:creator>
      <dc:date>2014-07-02T07:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12499#M9148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While we wait for Palo Alto to wake up; please have a look at these:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-under-sabotage-threat" title="http://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-under-sabotage-threat"&gt;http://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-under-sabotage-threat&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf" title="http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf"&gt;http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-=Tommy=-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 07:41:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12499#M9148</guid>
      <dc:creator>Dulle</dc:creator>
      <dc:date>2014-07-02T07:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12500#M9149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If this is a critical vulnerability to you, I would open a ticket. This will get the signature escalated internally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can't expect an official update from PA here.&amp;nbsp; These are just user to user support forums.&amp;nbsp; We are lucky that many PA employees spend a great deal of time here.&amp;nbsp; But official support is still via tickets to the support portal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:17:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12500#M9149</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-07-02T11:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12501#M9150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But we have.....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:35:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12501#M9150</guid>
      <dc:creator>Dulle</dc:creator>
      <dc:date>2014-07-02T11:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12502#M9151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like Havex made it into the ThreatVault:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/Home/VirusDetail/2889719" title="https://threatvault.paloaltonetworks.com/Home/VirusDetail/2889719"&gt;https://threatvault.paloaltonetworks.com/Home/VirusDetail/2889719&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:46:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12502#M9151</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-07-02T11:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12503#M9152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interestingly enough if you click on the hash links, PA's own WildFire flags it as benign! Hmph. :smileyplain:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:47:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12503#M9152</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-07-02T11:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12504#M9153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess that is just a one way conversation, wildfire pushes signatures to threats but not back the other way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They did just add this because I checked before posting this morning earlier and it wasn't there yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:51:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12504#M9153</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-07-02T11:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12505#M9154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We uploaded a sample of havex to Wildfire ca June 20th - problem is they don't check it on Acrobat reader 10.x....&lt;BR /&gt;PAN also need to update their Virtual machines...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 11:54:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12505#M9154</guid>
      <dc:creator>pivvre</dc:creator>
      <dc:date>2014-07-02T11:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12506#M9155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have coverage for Havex malware.&lt;/P&gt;&lt;P&gt;Please upgrade to latest Anti virus version released today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hari Yadavalli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 15:05:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12506#M9155</guid>
      <dc:creator>hyadavalli</dc:creator>
      <dc:date>2014-07-02T15:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12507#M9156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does WildFire flag a sample as malicious yet :smileylaugh:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 15:25:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12507#M9156</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-07-02T15:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12508#M9157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on the SHA provided in initial comment I see wildfire reported as malicious&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 15:49:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12508#M9157</guid>
      <dc:creator>hyadavalli</dc:creator>
      <dc:date>2014-07-02T15:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12509#M9158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="benign.png" class="image-0 jive-image" height="711" src="https://live.paloaltonetworks.com/legacyfs/online/14239_benign.png" style="height: 711px; width: 1044.6px;" width="1045" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 16:04:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12509#M9158</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-07-02T16:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12510#M9159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I only see one SHA reported as malware and rest as benign.&lt;/P&gt;&lt;P&gt;Please open a case with palo alto support and they'll address the issue with wildfire.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 16:54:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12510#M9159</guid>
      <dc:creator>hyadavalli</dc:creator>
      <dc:date>2014-07-02T16:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12511#M9160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't have a sample of the malware, I'm just "stirring the pot" to be honest&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 16:56:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12511#M9160</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-07-02T16:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12512#M9161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting info in Brightclouds Webinar on Dragonfly/havex right now,&lt;/P&gt;&lt;P&gt;I asked if there has been any information exchange between Symantec (which has a lot of information - and protect users - on Dragonfly/havex) and Paloalto. They said the did info ex with a lot of company, but not PAN - why not?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jul 2014 09:42:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12512#M9161</guid>
      <dc:creator>pivvre</dc:creator>
      <dc:date>2014-07-03T09:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: Havex Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12513#M9162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;&lt;A _jive_internal="true" class="jiveTT-hover-user jive-username-link" data-avatarid="1643" data-externalid="" data-presence="null" data-userid="16909" data-username="hyadavalli" href="https://live.paloaltonetworks.com/people/hyadavalli"&gt;hyadavalli,&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;Based on your responses here, I assume you work for PA.&amp;nbsp; Can you explain what happens with new signatures like this against the existing file database that was deemed benign?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt; Some of these "benign" files will be previously unknown viruses like Havex.&amp;nbsp; Does Wildfire check them again against new signatures?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;If a previously flagged benign file is uploaded again, is this automatically benign from the previous verdict?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="j-post-author"&gt;In short, how does PA clean up the hash database to be sure the new viruses are successfully identified?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jul 2014 10:44:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/havex-malware/m-p/12513#M9162</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-07-04T10:44:18Z</dc:date>
    </item>
  </channel>
</rss>

