We run Malwarebytes Enterprise in addition to SCEP, they've both caught
cryptlocker. They get along well, and MB updates pretty quickly.


On Thu, Feb 27, 2014 at 2:03 PM, Ryan Shugart <[email protected]> wrote:

> I actually have a test GPO to implement this, thanks.  The concern we're
> having is just what needs to be whitelisted and the process in finding that
> out.  It won't be fun, some not very smart software sticks executables into
> the %appdata% folder and runs from there, such as Java updates, for example.
> Ryan
>
> -----Original Message-----
> From: [email protected] [mailto:
> [email protected]] On Behalf Of Susan Bradley
> Sent: Thursday, February 27, 2014 12:52 PM
> To: [email protected]
> Subject: Re: [NTSysADM] RE: Cryptolocker
>
> Software restriction policies.
>
> Ignore the url the concepts are valid
>
> http://www.foolishit.com/vb6-projects/cryptoprevent/
>
> And yes it can also be done with group policy.
>
> I've never seen antivirus actually protect anyone.  I've seen a/v
> vendors say they have protection but they are always one step behind
> because it's really not a virus, it's a program that launches encryption
> on your system.
>
> Encryption is not a virus.
>
> On 2/27/2014 11:36 AM, Ziots, Edward wrote:
> >
> > AV isn't going to detect advanced malware like CryptoLocker.
> >
> > As a start I would do a egress filter trust to untrust for these IP's.
> >
> > https://discussions.nessus.org/thread/6799
> >
> > The most
> >
> > recent alert I saw yesterday came from the Center for Internet
> > Security <http://www.cisecurity.org/>. In their advisory,
> >
> > they listed the following IPs as being associated with the network
> > activity:
> >
> > 144.76.192.130
> >
> > 192.155.83.72
> >
> > 212.2.227.70
> >
> > 95.59.26.43
> >
> > 162.243.66.243
> >
> > 162.243.70.51
> >
> > 166.78.144.80
> >
> > 192.210.230.39
> >
> > 194.28.174.119
> >
> > 195.22.26.231
> >
> > 195.22.26.252
> >
> > 195.22.26.253
> >
> > 195.22.26.254
> >
> > 212.71.250.4
> >
> > 50.116.8.191
> >
> > 69.61.18.148
> >
> > 74.91.124.113
> >
> > 86.124.164.25
> >
> > 87.255.51.229
> >
> > 93.189.44.187
> >
> > 95.211.172.143
> >
> > 96.43.141.186
> >
> > Are your 3^rd party software on the endpoints up to date?
> >
> > Z
> >
> > Edward E. Ziots, CISSP, CISA, Security +, Network +
> >
> > Security Engineer
> >
> > Lifespan Organization
> >
> > [email protected] <mailto:[email protected]>
> >
> > Work:401-255-2497
> >
> > This electronic message and any attachments may be privileged and
> > confidential and protected from disclosure. If you are reading this
> > message, but are not the intended recipient, nor an employee or agent
> > responsible for delivering this message to the intended recipient, you
> > are hereby notified that you are strictly prohibited from copying,
> > printing, forwarding or otherwise disseminating this communication. If
> > you have received this communication in error, please immediately
> > notify the sender by replying to the message. Then, delete the message
> > from your computer. Thank you.
> >
> > //
> >
> > *From:*[email protected]
> > [mailto:[email protected]] *On Behalf Of *Ryan Shugart
> > *Sent:* Thursday, February 27, 2014 2:27 PM
> > *To:* [email protected]
> > *Subject:* [NTSysADM] Cryptolocker
> >
> > Hi:
> >
> > We've been plagued with Cryptolocker for the past several months, just
> > two infections yesterday.  We're running McAfee 8.8 with the latest
> > DATs and its just not finding this virus in time.  If anyone is using
> > an antivirus solution that does detect this, can you let us know?
> > We're interested in a possible switch.
> >
> > Thanks.
> >
> > Ryan
> >
> > Ryan Shugart
> >
> > LAN Administrator
> >
> > MiTek USA, MiTek Denver
> >
> > 314-851-7414
> >
> >
> > (c) COPYRIGHT, MITEK HOLDINGS, INC., 2011-2013, ALL RIGHTS RESERVED
> >
> > _  ________________________________ _
> >
> > This communication (including any attachments) contains information
> > which is confidential and may also be privileged. It is for the
> > exclusive use of the intended recipient(s). If you are not the
> > intended recipient(s), please note that any distribution, copying, or
> > use of this communication or the information in it is strictly
> > prohibited. If you have received this communication in error, please
> > notify the sender immediately and then destroy any copies of it.
> >
>
> --
> Got your CryptoLocker prevention in place?
> http://www.thirdtier.net/2013/10/cryptolocker-prevention-kit-updates/
> Only two more patching days of XP.... are you ready?
>
>
>
>
> (c) COPYRIGHT, MITEK HOLDINGS, INC., 2011-2013, ALL RIGHTS RESERVED
> ________________________________
> This communication (including any attachments) contains information which
> is confidential and may also be privileged. It is for the exclusive use of
> the intended recipient(s). If you are not the intended recipient(s), please
> note that any distribution, copying, or use of this communication or the
> information in it is strictly prohibited. If you have received this
> communication in error, please notify the sender immediately and then
> destroy any copies of it.
>



-- 
Probable Contrarian

Reply via email to