Managing a Malware Outbreak

Size: px
Start display at page:

Download "Managing a Malware Outbreak"

Transcription

1 Sality A Case Study Authors: Mike Andrews Senior Principal Consultant Jerry Pierce Principal Consultant Shawn Baker Senior Consultant

2 Table of Contents Managing a Malware Outbreak... 1 Sality A Case Study... 1 Table of Contents... 1 Introduction... 2 Initial Infection... 2 Lessons Learned... 3 Propagation... 4 Lessons Learned... 5 Watching the Behavior... 5 Lessons Learned... 8 Remediation... 8 Workstations... 9 Servers... 9 File Server / NAS / SAN... 9 Lessons Learned Conclusion About Foundstone Professional Services... 11

3 Introduction For the vast majority of organizations, finding out they are under attack from a virulent, aggressive piece of malware is a stressful prospect. Not knowing what the malware is doing, or is capable of doing, can be terrifying. Some malware is what we call nuisance-ware. It displays annoying messages, modifies Internet browser or registry settings, or disables some functionality. Most other malware, however, can have serious impact on business continuity. Malicious malware can modify and delete data, install backdoors and keystroke loggers, and transmit files and information beyond network perimeters. They can even modify their own behavior over time by downloading patches and additional malware. There are many sources of information that detail how individual pieces of malware operate and their behavioral characteristics on a system. This whitepaper chronicles one of our incident response investigations where a multi-national organization with several sites discovered they had the Sality virus rampaging through their environment. We focus on the steps that were taken to contain and eradicate the malware and the resulting lessons learned. Initial Infection Generally, malware outbreaks start slowly. The first device to get infected is often a workstation or laptop that does not have adequate defenses. Anti-virus software is not installed, not current, or disabled. The operating system and applications are not patched. Sometimes a user inadvertently puts themselves, and company assets, at risk by installing browser plug-ins, cruising questionable web sites, or clicking on suspicious links in messages. In this particular investigation, the initial infection was probably caused by a file being opened from an untrusted site on the Internet, or brought into the organization via a USB thumb drive. Despite the huge amount of malware in existence, there is a lot of commonality among them. There are only so many strategies that can be employed to stay resident on a machine and propagate. Therefore, as long as antivirus clients are updated regularly, antivirus software from any vendor has a good chance of catching an infection attempt. However, in this particular Sality outbreak there were two issues. First, due to a configuration oversight, workstations were not receiving timely antivirus signature updates. In fact, some workstations were close to a year out-of-date with their virus signatures. A weakened security posture certainly helped the virus slip into the organization. The second contributing factor is the ability of recent virus variants to avoid detection by antivirus engines. Malware programmers subtly change an existing virus variant so that it does not match a known signature. This arms race between malware authors and antivirus vendors means that there is a period of increased risk between the time a new variant has been released, and when antivirus companies can detect and successfully stop/clean the infection. Some malware FOUND

4 has the ability to phone home and patch itself or download new code / instructions. During this incident, we observed this capability. Figure 1 shows a steady infection rate of the AG strain of the Sality virus over time. Notice the sudden jump in infections from other Sality strains at about the same point in time. This is often caused by new versions leveraging previously compromised machines to gain a foothold. Figure 1: Virus infection and eradication by strain One other factor that assisted this particular virus in propagating was the fact many workstations did not have a particularly secure setup. As is often the case, users had local administrative privileges so that they can install software, or because some critical application will not run without privileged access rights. Newer operating systems, such as Windows Vista, discourage users from always having administrative rights by prompting users when such elevated privileges are required (e.g. the much maligned User Account Control). Restricting administrative permissions severely limits the opportunity for a piece of malware to gain a permanent hold on a workstation. Lessons Learned Ensure that antivirus signatures are up-to-date and all protection mechanisms are enabled. Enable On-Access file scanning to scan files before they are accessed. Prevent program execution from TEMP folders. Many files get downloaded to a user s computer when surfing the Internet. These files are placed in a user s temporary folder and executed from there. Files downloaded from the Internet may be infected with malicious code FOUND

5 Block creation of autorun.in files. Much of the malware seen in recent months creates autorun.inf files on file shares and removal media. When an infected flash drive or network share is accessed, the operating system will look for the existence of these files. If found, the file is automatically executed which means that malware could execute with essentially no user interaction. In addition disable autorun / autoplay on all devices. For the Sality virus in particular, creation of read-only autorun.inf files in the root of all local drives and network shares will help to prevent the virus from spreading via this mechanism. Enable Access Protection in your antivirus software. This allows antivirus software to protect itself from being reconfigured or disabled. Set alerts when a process attempts to disable the antivirus software engine. These alerts advise when a user, or malicious software, attempts to stop the antivirus software to copy potentially unwanted programs (PUPs) or pieces of malware. Leverage enterprise antivirus products. Ensure your centralized system is regularly monitored or reviewed so outbreaks can be identified and responded to quickly. Early identification and eradication of malware infections may help prevent a single host infection from becoming a wide-spread epidemic. Train users to be aware of strange behavior of their workstations and report any incidents to IT. Remove file extension associations in the registry that are not used, or only used maliciously (e.g. PIF files). Restrict, or remove local administrative rights. Utilize third party User Access Control (UAC) software to grant access for applications that may require elevated privileges. All other actions are executed as a regular authenticated user account. Third party software, such as BeyondTrust s Privilege Manager, will allow for support across multiple workstation operating systems. Use the Run As functionality in Windows. Programs that require elevated privileges can be executed as a privileged user while other functions are performed as a regular authenticated user. This will require a second user account to execute the applications requiring elevated privileges. Disable the ability to access USB devices where appropriate. Propagation Malicious code comes in all shapes and sizes with various propagation methods. Some require no user interaction to spread (worms). Some are parasitic in nature, attach to files, and wait to be executed (viruses). Some malware does not try to replicate, but rather, affects the behavior of the machine (Trojan-horses). In order to increase infection rates and propagate further, there are also blended threats that can use a variety of these techniques FOUND

6 Sality is a virus that propagates by infecting or dropping files with the hope users will execute them with increased access permissions. Two main propagation vectors are used by Sality; infecting EXE files and dropping autorun.in files pointing to the infected executable files. Whenever a user executes an infected file or browses to a directory that contains an autorun.inf file, or inserts a USB device containing the autorun.inf file, the virus is executed. Once executed, the virus has a particular payload (see Watching the Behavior below), but it also attempts to spread to other devices. Sality achieves this by searching for mapped drives and infecting portable executable (PE) files stored on them as well as any files on USB media that is inserted into the machine. A potentially devastating prospect occurs if a domain administrator logs onto an infected machine, as the virus is now able to execute with additional privileges. It will attempt to open network share(s) with all computers it discovers on the network and, if successful, start to infect files on those drives as well. Because the domain administrator has the permissions to access a large number of machines with elevated rights, including server machines, the virus is able to spread very quickly. Lessons Learned Configure workstations to discourage automatic execution of code, disable autorun / autoplay and remove file extension associations in the registry that are not used, or only used maliciously (e.g. PIF files). Restrict permissions on shared folders and consider disabling auto-mount. Never allow users with domain administrator credentials to log directly into a workstation when a virus is loose in the enterprise. Users should log on to their workstations as a non-privileged (regular) user and use administrative accounts only as necessary to perform administrative job functions. Watching the Behavior Reverse engineering a piece of malware to determine its behavior is best left to experts. Malware behavior is often complex, obfuscated, and not always visible immediately. Malware can sleep and only wake after a random period of time or when a certain event occurs. Additionally, without careful procedures, there s the chance of inadvertently spreading the infection. For a known bit of malicious code, looking up its behavioral characteristic is easy on sites such as Anyone can submit files that they think contain malware (see ). Other sites which offer free analysis of suspected malicious files are and If deemed necessary using some free tools, malware behaviors can be observed and some basic analysis can be performed. Process Monitor is a very useful free tool available at FOUND

7 us/sysinternals/bb aspx. If you identify a particular file or process that is behaving suspiciously, this tool can capture and filter events related to the process. From this view it is easy to see if the process is attempting to access other files or registry keys, and if it is communicating on the network. Clearly, if a process such as Notepad.exe is attempting to write to numerous files or is sending network packets, something is seriously amiss. Figure 2: Process Monitor capturing file, registry and network information Once a malicious file has been identified, it can be transferred to a virtual machine environment that is disconnected from the main network and isolated from its host machine as well. Having a test network available may be necessary to wake certain parts of the malware s behavior. Once again, start Process Monitor, and watch what happens. Although behaviors differ between different variants of Sality, here s what we observed from one such infection. A user, browsing the Internet, visits a legitimate website. Unfortunately, this website has been compromised and an executable file is downloaded to the user s TEMP folder, from where it is executed. Within seconds of this program running, registry entries are created which indicate a Sality infection. A few seconds later, Notepad starts as a child of the explorer.exe process and begins communicating on the network. Approximately two hours later, two more executables are downloaded into the user s TEMP folder and executed. At this point the malware is only running on a single machine. If the user has mounted shares that contain executable files, the malware will infect these shared executables and the outbreak begins. In this case, had this organization s antivirus product been properly configured, it would have prevented the initial infection by disallowing the execution of code from the user s TEMP folder FOUND

8 Given this information two critical activities must be performed: 1. Check that the antivirus solution identifies the malware and successfully detects and removes it. If not, the vendor should be contacted and provided with a sample of the virus so that they can work on a solution. 2. Identify any sensitive data the malware is trying to access and any external sites on the Internet it is trying to communicate with. These sites should be blocked at the firewall/proxy for both incoming and outgoing traffic. These sites should be blocked by both the URI and IP addresses. Monitoring the firewall and/or proxy will give an idea of the level of infection and IP addresses of machines known to be infected so they can be taken off the network. Although there is much more to analyzing the behavior of malicious code, these basic principles can help in understanding what a piece of malware is doing and the answers to these critical questions: What is the scope of the infection? What is the behavior of the threat and what is at risk? Has any sensitive data been compromised? Once these questions are answered, you can go on to the clean-up operation. Sality is a Windows portable executable infector, meaning that it will search for executable files and wrap itself around them. When an infected file is executed, it will spread the contagion further. It primarily relies on two methods of infection once it has reached the inside of a corporate network. First, it searches the root folder of all local hard drives for executable files that it can infect. In some instances, an autorun.inf file will be created in the root folder of the drive. It will also place a malicious autorun.inf file on the root of any USB device attached to an infected machine. These autorun.inf files will cause anyone browsing the root folder of the device to execute the malicious content if autorun is not disabled. The second method of infection is enumeration of file shares. Sality searches for all mounted file shares, and will look for executable files within those shares to infect. This can be a very effective way to propagate if file servers are located that host applications. In most organizations, the virus similarly arrives via delivery from a compromised website. Once the virus takes hold inside an organization, the spread is typically very slow until it manages to reach executable files on one or more file servers. Unfortunately, many organizations do not have antivirus applications deployed on their file servers. Once a file server is infected with Sality, it will spread very rapidly as users access infected executables on file shares. It is usually at this point IT and Security staff become aware of the infection. Once detected, Sality cannot always be successfully removed from an infected file. In some instances, the executable must be deleted. This, of course, means the application is no longer available until the file has been replaced. On a file server, replacing one, two or even a dozen executables files is not difficult. Having to FOUND

9 replace executable files, including operating system files, on hundreds or thousands of workstations is another thing entirely. It is important to note that the Sality virus is constantly modified and changed by the malware writers. We have identified variants of Sality that perform keystroke logging. Most variants phone home to look for instructions, additional tools, or even updates of the virus itself. If the virus manages to infect a system with Administrator level credentials, every file on that system is at risk of infection and data files contained on the system are at a serious risk of being transmitted to outside parties. If the virus has managed to be executed with Domain Administrator level privileges, the risk dramatically increases. Lessons Learned Suspect files can be submitted to antivirus vendors for automated analysis. If a malicious file has been discovered but your antivirus solution does not recognize it as nefarious, contact the vendor. Most antivirus vendors share information with each other. New variants of malware appear quickly and sharing malware behavior patterns helps everyone stay protected. Proxy outgoing traffic to create a choke point where it can be monitored and blocked. Consider an authenticated proxy, or personal outbound firewall, so malicious code cannot phone home without your knowledge. Categorize sensitive data within your organization and store it in a centralized location. This makes it easier to determine if sensitive information has been accessed by the malicious code. Remediation Now that you know what the malware is, the scope of the infection, and what resources it manipulates, a plan can be put in place to contain and remediate its impact. Many antivirus vendors produce stand-alone disinfectors, or stingers, for particular variants of malware. Most of these tools are free to download and use. For instance, McAfee offers a stinger which is available at These stingers are very helpful when you have a serious virus outbreak. However, these should not be considered a comprehensive solution. The malware they identify is often very limited, and they do not get updated as regularly as a traditional antivirus engine. Most of these stand-alone disinfectors, or stingers, perform four tasks. First, they scan memory looking for compromised processes. If any hooks are found, they are removed. Second, the stinger scans local storage for infected files. Depending on configuration settings, a subset of files known to host malware or all files are scanned. We recommend that you scan all files on a suspect machine. Third, the stinger will attempt to clean any infected files it locates. If it cannot clean a file, it will ignore it, quarantine it, or delete it. Again, this action is configurable. Finally, the stinger will rescan the system to confirm it is has been remediated FOUND

10 Remember, these tools do not have any on access protection mechanism. If one of these phases fails (e.g. removing the threat from memory), the malware can re-infect files that have been cleaned. Workstations If a workstation is infected, use a stinger or your antivirus product to do a full scan. Be sure to scan all files. Note any infections discovered and if the file was repaired, quarantined, or deleted. To be certain the device was successfully cleaned, reboot and run the scan again. There should be no further identification of the malware. When multiple scans continue to find something, it may be necessary to re-image the device. This is often faster than trying additional manual remediation steps. A very effective way to remediate stubborn infections is to use a virtual boot machine such as BartPE BartPE provides a memory resident version of Windows XP bootable from a CD/DVD. Virus scanning tools can be included on the boot disk. This allows the scanning of local drives without the potentially infected host operating system running. Servers In most cases, servers can be remediated in the same manner as workstations, although it usually takes longer due to the large number of files. Update the antivirus scanning software and perform a full system scan of all files on the server. Patch the system for all known vulnerabilities and note if any of the detected files could not be cleaned. This is where server remediation differs from workstations. With workstations, if an infected binary cannot be cleaned, there is usually another workstation that will have a good copy of the binary. With servers, there may be only one server running a particular application, and it is often a mission critical application. You may need to take that server offline for remediation. If remediation efforts fail on any server, the server will need to be rebuilt and updated before it can be brought back online. File Server / NAS / SAN Shared file systems are the hardest systems to clean effectively. The large number of files to scan means this effort can take a while, and if the server is still online, a user accessing the store increases the chance of reinfection or propagation. The best approach is to have an antivirus solution running on the fileserver or on the interface to the NAS / SAN that performs on-access scans for both reads and writes. This may cause performance issues in the short term. However, during a widespread infection, this is the best method of trying to protect the file servers. If a full scan is to be performed, the most effective method is to take the fileserver/nas/san off-line. This may be an inconvenience to users and cause business disruption, but it is the best way to ensure the server is malware free FOUND

11 Another strategy you can use to speed up the remediation process is to have multiple machines mounting different file shares from your file servers and each performing scans on a portion of your storage array. Once everything is remediated, it is still not the end of the incident. Careful monitoring of antivirus logs and network monitoring has to continue for at least a month to be sure that every machine is malware free. Just like a forest fire, one last small flare-up can set everything in motion again. Vigilance is key. Lessons Learned Booting devices to a memory resident operating system using a tool like BartPE is a very effective method for remediating infected machines. Determine early in the incident what machines require manual remediation and which ones should be re-imaged. It is often faster and takes less effort to re-image a machine. If reimaging, ensure a known clean image that has been disconnected from the infected network is used. Servers and SAN/NAS devices need special treatment and a clear operational decision based on business impact and risk. Be mindful that the malware may be in your backup media. Restore data within the known infection period with care, and mark such backups to be used with caution. Remove a recent, known good backup media set out of rotation and secure in a safe location for at least six months. Continue monitoring your antivirus solution, network traffic, and educate users of the incident so any potential flare-ups can be caught and addressed quickly Conclusion Malware outbreaks are going to happen. Given the number of new malware variants released on a regular basis, the IT and security community is looking at a long battle. But hope is not lost. IT staff can better position themselves for the likelihood of a malware infection. Recent trends in malware infections have shown that there are some preparatory steps which can be taken to minimize the effects of a malware outbreak and aid in the removal of the infection. Business impact can be minimized by implementing some security best practices. Keep systems patched for all known security vulnerabilities. Limit user access on workstations by removing local administrator access. Disallow domain administrator access logins at the workstation. Keep virus software scanning engines and definition files up to date. Maintain and review antivirus logs. Disable autorun / autoplay of all devices. Configure antivirus software to alert and prevent execution of autorun.inf files. Enable an On Access scans for both reads and writes. Prevent execution of programs from any TEMP directory. Disable all unnecessary services at startup FOUND

12 Enable a web proxy requiring authentication to help prevent malware from connecting to the Internet. Educate users about common malware infection vectors including web surfing, flash memory devices, attachments, etc. as part of security awareness training. By implementing these security practices, an organization can help minimize the threat from a malware outbreak on their network and expedite the process of cleaning and remediation. About Foundstone Professional Services Foundstone Professional Services, a division of McAfee. Inc. offers expert services and education to help organizations continuously and measurably protect their most important assets from the most critical threats. Through a strategic approach to security, Foundstone identifies and implements the right balance of technology, people, and process to manage digital risk and leverage security investments more effectively. The company s professional services team consists of recognized security experts and authors with broad security experience with multinational corporations, the public sector, and the US military FOUND

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

Best Practices for Deploying Behavior Monitoring and Device Control

Best Practices for Deploying Behavior Monitoring and Device Control Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...

More information

(Self-Study) Identify How to Protect Your Network Against Viruses

(Self-Study) Identify How to Protect Your Network Against Viruses SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

Security Consultant Scenario INFO 517-900 Term Project. Brad S. Brady. Drexel University

Security Consultant Scenario INFO 517-900 Term Project. Brad S. Brady. Drexel University Security Consultant Scenario INFO 517-900 Term Project Drexel University Author Note This paper was prepared for INFO-517-900 taught by Dr. Scott White. Table of Contents ABSTRACT.1 THE INTERVIEW...2 THE

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

STANDARD ON CONTROLS AGAINST MALICIOUS CODE EUROPEAN COMMISSION DIRECTORATE-GENERAL HUMAN RESOURCES AND SECURITY Directorate HR.DS - Security Informatics Security Brussels, 21/06/2011 HR.DS5/GV/ac ARES (2011) 663475 SEC20.10.05/04 - Standards European

More information

McAfee Avert Labs Finding W32/Conficker.worm

McAfee Avert Labs Finding W32/Conficker.worm McAfee Avert Labs Finding W32/Conficker.worm By Kevin Gudgion, Avert Labs Services Contents Overview... 2 Symptoms... 2 Characteristics... 2 Fighting W32/Conficker.worm... 5 Finding W32/Conficker.worm...

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Driving Company Security is Challenging. Centralized Management Makes it Simple. Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary

More information

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

ANDRA ZAHARIA MARCOM MANAGER

ANDRA ZAHARIA MARCOM MANAGER 10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Product Guide. McAfee Endpoint Security 10

Product Guide. McAfee Endpoint Security 10 Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,

More information

Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices

Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices 350 PIERS Proceedings, Cambridge, USA, July 5 8, 2010 Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices Dung Vu Pham 1, Malka N. Halgamuge 2, Ali Syed 1, and Priyan

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Getting Ahead of Malware

Getting Ahead of Malware IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Best Practices for DanPac Express Cyber Security

Best Practices for DanPac Express Cyber Security March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Sophos Endpoint Security and Control Help. Product version: 11

Sophos Endpoint Security and Control Help. Product version: 11 Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Sophos Endpoint Security and Control Help

Sophos Endpoint Security and Control Help Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor

More information

Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Maintaining, Updating, and Protecting Windows 7

Maintaining, Updating, and Protecting Windows 7 Lesson 7 Maintaining, Updating, and Protecting Windows 7 Learning Objectives Students will learn to: Understand Disk Defragmenter Understand Disk Cleanup Understand Task Scheduler Understand Action Center

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

What you can do prevent virus infections on your computer

What you can do prevent virus infections on your computer What you can do prevent virus infections on your computer A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily

More information

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

CDM Software Asset Management (SWAM) Capability

CDM Software Asset Management (SWAM) Capability CDM Software Asset Management (SWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT

More information

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Recommended Practice Case Study: Cross-Site Scripting. February 2007 Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

Seven Strategies to Defend ICSs

Seven Strategies to Defend ICSs INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take

More information

System Planning, Deployment, and Best Practices Guide

System Planning, Deployment, and Best Practices Guide www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda

More information

LASTLINE WHITEPAPER. In-Depth Analysis of Malware

LASTLINE WHITEPAPER. In-Depth Analysis of Malware LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).

More information

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats Jody C. Patilla The Johns Hopkins University Session ID: TECH-107 Session Classification: Intermediate Objectives Get more out

More information

Sophos Enterprise Console policy setup guide. Product version: 5.2

Sophos Enterprise Console policy setup guide. Product version: 5.2 Sophos Enterprise Console policy setup guide Product version: 5.2 Document date: September 2014 Contents 1 About this guide...4 2 General policy recommendations...5 3 Setting up an updating policy...6

More information

Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures

Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures Eric J. Eifert Vice President, Cyber Defense Division ManTech s Mission, Cyber, & Technology Solutions Presentation Overview

More information

Seven for 7: Best practices for implementing Windows 7

Seven for 7: Best practices for implementing Windows 7 Seven for 7: Best practices for implementing Windows 7 The early reports are in, and it s clear that Microsoft s Windows 7 is off to a fast start thanks in part to Microsoft s liberal Windows 7 beta program

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Why The Security You Bought Yesterday, Won t Save You Today

Why The Security You Bought Yesterday, Won t Save You Today 9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About

More information

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Nessus and Antivirus. January 31, 2014 (Revision 4)

Nessus and Antivirus. January 31, 2014 (Revision 4) Nessus and Antivirus January 31, 2014 (Revision 4) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 A Note on SCAP Audits... 4 Microsoft Windows Defender... 4 Kaspersky

More information

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting Running A Fully Controlled Windows Desktop Environment with Application Whitelisting By: Brien M. Posey, Microsoft MVP Published: June 2008 About the Author: Brien M. Posey, MCSE, is a Microsoft Most Valuable

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

Integrated Protection for Systems. João Batista [email protected] Territory Manager

Integrated Protection for Systems. João Batista Joao_batista@mcafee.com Territory Manager Integrated Protection for Systems João Batista [email protected] Territory Manager 2 McAfee Overview Proven Expertise And what it means to you Proof of Expertise Impact of Expertise 1 17 100 300

More information

McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h

McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h Summary McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h August 9, 2013 W32/Autorun.worm.aaeb-h has the ability to infect removable media devices, as well as mounted network shares. Infection starts

More information

Developing A Successful Patch Management Process

Developing A Successful Patch Management Process Developing A Successful Patch Management Process White Paper FoxGuard Solutions, Inc. August 2014 Introduction Almost every day, new vulnerabilities are discovered and disclosed to software vendors, who

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

SMALL BUSINESS EDITION. Sophos Control Center startup guide

SMALL BUSINESS EDITION. Sophos Control Center startup guide SMALL BUSINESS EDITION Sophos Control Center startup guide Product version: 4.0 Document date: September 2009 Contents 1 About this guide...3 2 System requirements...4 3 Installation...5 4 Protecting networked

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Controls Book

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Controls Book Larry Wilson Version 1.0 November, 2013 University Cyber-security Program s Book Cyber-security s Summary Council on Cyber-security Critical Security s (CSC) CSC-01 CSC-02 CSC-03 CSC-04 CSC-05 IT Asset

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Endpoint Security: Moving Beyond AV

Endpoint Security: Moving Beyond AV Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,

More information