Thanks for the information!  I've been waiting on this for a while, so this is 
very good information (since Win8 didn’t have an Enterprise edition available 
to end users and hence AppLocker was never an option then).

Thanks!

-Aakash Shah

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Susan Bradley
Sent: Thursday, February 27, 2014 1:21 PM
To: [email protected]
Subject: Re: [NTSysADM] RE: Cryptolocker

Microsoft to add a standalone Windows Enterprise version to its business 
line-up | ZDNet#ftag=RSS14dc6a9:
http://www.zdnet.com/microsoft-to-add-a-standalone-windows-enterprise-version-to-its-business-line-up-7000026860/#ftag=RSS14dc6a9

On 2/27/2014 1:13 PM, Aakash Shah wrote:
> If you have access to the Enterprise editions of Windows, AppLocker is 
> another feature built into Windows to consider.  This is like Software 
> Restriction Policies, but allows you to add publisher rules more easily.  So 
> for instance, you can whitelist GoToMeeting by whitelisting the publisher's 
> certificate (Citrix).  This way, the exe's can potentially run from anywhere 
> as long as they are signed by the publisher.  This is very helpful when some 
> software writes into many different folders for each version (GoToMeeting is 
> one notorious example).
>
> -Aakash Shah
>
> -----Original Message-----
> From: [email protected] [mailto:[email protected]] 
> On Behalf Of Ziots, Edward
> Sent: Thursday, February 27, 2014 12:37 PM
> To: [email protected]
> Subject: RE: [NTSysADM] RE: Cryptolocker
>
> Like I think we all said that AV is not going to save you against todays 
> current malware attacks, even if your users aren't admin the malware can 
> right to user writeable areas of the OS. And from what the current samples I 
> have looked at in sandbox they are pretty malicious and leave a lot of IOC 
> (indicators of compromise on systems). ( Process injection, Mutex's, Memory 
> resident, Encrypted payloads, Anti-tampering, you name it, and ohh yes Signed 
> Malware with valid certificates and encrypted outbound communications are the 
> new craze)
>
> I have mentioned it before, if you control code execution on your systems you 
> are winning, if you don't you are losing.
>
> Z
>
> Edward E. Ziots, CISSP, CISA, Security +, Network +
> Security Engineer
> Lifespan Organization
> [email protected]
> Work:401-255-2497
>
>
> This electronic message and any attachments may be privileged and 
> confidential and protected from disclosure. If you are reading this message, 
> but are not the intended recipient, nor an employee or agent responsible for 
> delivering this message to the intended recipient, you are hereby notified 
> that you are strictly prohibited from copying, printing, forwarding or 
> otherwise disseminating this communication. If you have received this 
> communication in error, please immediately notify the sender by replying to 
> the message. Then, delete the message from your computer. Thank you.
>
>
>
>
> -----Original Message-----
> From: [email protected] [mailto:[email protected]] 
> On Behalf Of Susan Bradley
> Sent: Thursday, February 27, 2014 3:07 PM
> To: [email protected]
> Subject: Re: [NTSysADM] RE: Cryptolocker
>
> http://www.thirdtier.net/2013/10/cryptolocker-prevention-kit-updates/
>
> Yup, you find out which vendors have really bad updating strategies.
>
> On 2/27/2014 12:03 PM, Ryan Shugart wrote:
>> I actually have a test GPO to implement this, thanks.  The concern we're 
>> having is just what needs to be whitelisted and the process in finding that 
>> out.  It won't be fun, some not very smart software sticks executables into 
>> the %appdata% folder and runs from there, such as Java updates, for example.
>> Ryan
>>
>> -----Original Message-----
>> From: [email protected]
>> [mailto:[email protected]] On Behalf Of Susan Bradley
>> Sent: Thursday, February 27, 2014 12:52 PM
>> To: [email protected]
>> Subject: Re: [NTSysADM] RE: Cryptolocker
>>
>> Software restriction policies.
>>
>> Ignore the url the concepts are valid
>>
>> http://www.foolishit.com/vb6-projects/cryptoprevent/
>>
>> And yes it can also be done with group policy.
>>
>> I've never seen antivirus actually protect anyone.  I've seen a/v
>> vendors say they have protection but they are always one step behind
>> because it's really not a virus, it's a program that launches
>> encryption on your system.
>>
>> Encryption is not a virus.
>>
>> On 2/27/2014 11:36 AM, Ziots, Edward wrote:
>>> AV isn’t going to detect advanced malware like CryptoLocker.
>>>
>>> As a start I would do a egress filter trust to untrust for these IP’s.
>>>
>>> https://discussions.nessus.org/thread/6799
>>>
>>> The most
>>>
>>> recent alert I saw yesterday came from the Center for Internet
>>> Security <http://www.cisecurity.org/>. In their advisory,
>>>
>>> they listed the following IPs as being associated with the network
>>> activity:
>>>
>>> 144.76.192.130
>>>
>>> 192.155.83.72
>>>
>>> 212.2.227.70
>>>
>>> 95.59.26.43
>>>
>>> 162.243.66.243
>>>
>>> 162.243.70.51
>>>
>>> 166.78.144.80
>>>
>>> 192.210.230.39
>>>
>>> 194.28.174.119
>>>
>>> 195.22.26.231
>>>
>>> 195.22.26.252
>>>
>>> 195.22.26.253
>>>
>>> 195.22.26.254
>>>
>>> 212.71.250.4
>>>
>>> 50.116.8.191
>>>
>>> 69.61.18.148
>>>
>>> 74.91.124.113
>>>
>>> 86.124.164.25
>>>
>>> 87.255.51.229
>>>
>>> 93.189.44.187
>>>
>>> 95.211.172.143
>>>
>>> 96.43.141.186
>>>
>>> Are your 3^rd party software on the endpoints up to date?
>>>
>>> Z
>>>
>>> Edward E. Ziots, CISSP, CISA, Security +, Network +
>>>
>>> Security Engineer
>>>
>>> Lifespan Organization
>>>
>>> [email protected] <mailto:[email protected]>
>>>
>>> Work:401-255-2497
>>>
>>> This electronic message and any attachments may be privileged and
>>> confidential and protected from disclosure. If you are reading this
>>> message, but are not the intended recipient, nor an employee or agent
>>> responsible for delivering this message to the intended recipient,
>>> you are hereby notified that you are strictly prohibited from
>>> copying, printing, forwarding or otherwise disseminating this
>>> communication. If you have received this communication in error,
>>> please immediately notify the sender by replying to the message.
>>> Then, delete the message from your computer. Thank you.
>>>
>>> //
>>>
>>> *From:*[email protected]
>>> [mailto:[email protected]] *On Behalf Of *Ryan Shugart
>>> *Sent:* Thursday, February 27, 2014 2:27 PM
>>> *To:* [email protected]
>>> *Subject:* [NTSysADM] Cryptolocker
>>>
>>> Hi:
>>>
>>> We’ve been plagued with Cryptolocker for the past several months,
>>> just two infections yesterday.  We’re running McAfee 8.8 with the
>>> latest DATs and its just not finding this virus in time.  If anyone
>>> is using an antivirus solution that does detect this, can you let us know?
>>> We’re interested in a possible switch.
>>>
>>> Thanks.
>>>
>>> Ryan
>>>
>>> Ryan Shugart
>>>
>>> LAN Administrator
>>>
>>> MiTek USA, MiTek Denver
>>>
>>> 314-851-7414
>>>
>>>
>>> © COPYRIGHT, MITEK HOLDINGS, INC., 2011-2013, ALL RIGHTS RESERVED
>>>
>>> _  ________________________________ _
>>>
>>> This communication (including any attachments) contains information
>>> which is confidential and may also be privileged. It is for the
>>> exclusive use of the intended recipient(s). If you are not the
>>> intended recipient(s), please note that any distribution, copying, or
>>> use of this communication or the information in it is strictly
>>> prohibited. If you have received this communication in error, please
>>> notify the sender immediately and then destroy any copies of it.
>>>
>> --
>> Got your CryptoLocker prevention in place?
>> http://www.thirdtier.net/2013/10/cryptolocker-prevention-kit-updates/
>> Only two more patching days of XP.... are you ready?
>>
>>
>>
>>
>> © COPYRIGHT, MITEK HOLDINGS, INC., 2011-2013, ALL RIGHTS RESERVED
>> ________________________________ This communication (including any
>> attachments) contains information which is confidential and may also be 
>> privileged. It is for the exclusive use of the intended recipient(s). If you 
>> are not the intended recipient(s), please note that any distribution, 
>> copying, or use of this communication or the information in it is strictly 
>> prohibited. If you have received this communication in error, please notify 
>> the sender immediately and then destroy any copies of it.
> --
> Got your CryptoLocker prevention in place?
> http://www.thirdtier.net/2013/10/cryptolocker-prevention-kit-updates/
> Only two more patching days of XP.... are you ready?
>
>
>

-- 
Got your CryptoLocker prevention in place?
http://www.thirdtier.net/2013/10/cryptolocker-prevention-kit-updates/
Only two more patching days of XP.... are you ready?



Reply via email to