Recommended Posts

I'm not sure if this should be in the server section, but here it goes.

 

This is the second time I've had this issue occur. It appears that someone is getting a piece of malware that is infecting the public share on the server. I've been able to restore the data from backup, so we are OK on that front, but obviously that is not a solution to the problem if this keeps happening.

 

I just wanted to get opinions on how to tackle this. I talked with Trend Micro as they are the antivirus we are using and they said the ways these work is that they release the payload and then then it auto deletes itself form the infected machine. So if we try to do a malware scan, we won't find any traces of it.

 

My thoughts are first, to remove Admin rights from all the machines. I guess my second thought would be to see if any of the users have any local files that are encrypted as well.

 

Any thoughts would appreciated.

 

This is an all windows environment, Windows 7 Pro workstatations with SBS2011 as the only server.

Link to comment
https://www.neowin.net/forum/topic/1234873-malware-issue-on-file-shares/
Share on other sites

Is Volume Shadow Copies turned on? Great way to roll back files incase this happens, especially with a Cryptowall or Cryptolocker virus hits a user. We also use Trend for antivirus (OfficeScan 10.6). I would DEFINITELY remove admin privileges. People are stupid and will click on anything. I'd also implement group policy to block app data installs which is a popular place for malware to run in (See this thread at the bottom). Also install the Microsoft EMET 5.1 program on the client machines http://support.microsoft.com/kb/2458544. 

  On 29/10/2014 at 16:31, techbeck said:

Removing admin rights will not work.  Malware, like cryptolocker, does not require admin rights to install on a client PC.

 

First I would look at to narrow down the issue, who all has access to write to that file share?

 

Unfortunately, it is the "Public" folder, so anyone with Domain rights, will have access to it.

  On 29/10/2014 at 16:48, ProgRocker said:

But who can write to it? And what do you mean it's the Public folder? You mean like the default user profile "Public"?

 

It is a folder that all domain users have access to. All domain users have full control. We've had these permissions for the past 10 years or so and never had this issue. I suppose we could limit permissions to all the sub-folders to limit access and perhaps narrow it down.

  On 29/10/2014 at 16:57, D!ABOL!C said:

It is a folder that all domain users have access to. All domain users have full control. We've had these permissions for the past 10 years or so and never had this issue. I suppose we could limit permissions to all the sub-folders to limit access and perhaps narrow it down.

 

Think locking down shares needs to be done eventually.  Big security issue and hard to troubleshoot things like this.  Plus, cases more problems when people move/delete files they shouldnt.

 

What malware is it?

  On 29/10/2014 at 16:57, D!ABOL!C said:

It is a folder that all domain users have access to. All domain users have full control. We've had these permissions for the past 10 years or so and never had this issue. I suppose we could limit permissions to all the sub-folders to limit access and perhaps narrow it down.

 

Yep, Read and Execute is probably sufficient for most. 

  On 29/10/2014 at 17:01, techbeck said:

Think locking down shares needs to be done eventually.  Big security issue and hard to troubleshoot things like this.  Plus, cases more problems when people move/delete files they shouldnt.

 

What malware is it?

 

It's one of the Crypto Locker variants. It won't let you open any document (in this case Office Docs and PDF files) and it gives you a link to go to to decrypt the files etc.

 

At least the good news is that our backups work!

  On 29/10/2014 at 17:06, D!ABOL!C said:

It's one of the Crypto Locker variants. It won't let you open any document (in this case Office Docs and PDF files) and it gives you a link to go to to decrypt the files etc.

 

At least the good news is that our backups work!

 

Ahh, PITA.  It writes to a the APPDATA folder on the clients.  We recently implemented a policy change that prevents users from writing to that specific location.  We had a few instance with that malware where we couldnt tell what site/where it was coming from.  But cryptolocker doesnt remove itself from the client.  At least I have never seen it uninstall itself. 

How many domain PC's are you talking, are they all running Trend Micro?  Why is this getting past your anti-virus, most up to date AV's should be detecting and blocking this type of file before it becomes a problem?

 

Hopefully this doesn't come across as a dig, it's certainly not meant to be.  But two questions I would be asking.

  On 29/10/2014 at 17:14, AStaley said:

How many domain PC's are you talking, are they all running Trend Micro?  Why is this getting past your anti-virus, most up to date AV's should be detecting and blocking this type of file before it becomes a problem?

 

Hopefully this doesn't come across as a dig, it's certainly not meant to be.  But two questions I would be asking.

 

About 30 workstations total, all running Worry Free Business advanced.

 

And to be honest, why it is getting past the WFB is making me mad as well. It is up to date. I guess the only thing I can do is call Trend and make sure all the settings I have are correct.

  On 29/10/2014 at 17:14, AStaley said:

How many domain PC's are you talking, are they all running Trend Micro?  Why is this getting past your anti-virus, most up to date AV's should be detecting and blocking this type of file before it becomes a problem?

 

Hopefully this doesn't come across as a dig, it's certainly not meant to be.  But two questions I would be asking.

Because A/V usually doesn't catch stuff, it gets rid of it after the fact. A lot of malware will disguise itself under a legit process to run the payload. There is no anti-virus that traps 100% of the stuff, it just doesn't work like that. 

  On 29/10/2014 at 17:43, ProgRocker said:

Because A/V usually doesn't catch stuff, it gets rid of it after the fact. A lot of malware will disguise itself under a legit process to run the payload. There is no anti-virus that traps 100% of the stuff, it just doesn't work like that. 

 

I agree, but this software also has malware detection and it definitely didn't detect anything.

It won't. There is no way to protect yourself 100%, well not a way that you would be happy with or your users. Local lan access only, no internet, no outside files, no usb or any other way to copy files on. That would be the only way that you can be 100%.

Every software is designed differently, where one would catch another will miss. There isn't one software that is 100%. You can be mad at the av vendor all you want, it isn't their fault. People program these things to be undetectable.

I always refer to antivirus like a doctor. He isn't going to prevent you from getting a cold or the flu or breaking your arm. He's the "after-the-fact" remedy. 

 

I suggest reading the bleepingcomputer article i posted above. Implement the software restriction policies to prevent different extensions from running in the %appdata% and other known hotspot locations. Tell users to backup their stuff, if they don't have a backup of it, it's not important. With the cryptolocker stuff, once you get hit your only hope is backup, VSS, or pay the ransom. 

  On 29/10/2014 at 18:01, sc302 said:

It won't. There is no way to protect yourself 100%, well not a way that you would be happy with or your users. Local lan access only, no internet, no outside files, no usb or any other way to copy files on. That would be the only way that you can be 100%.

Every software is designed differently, where one would catch another will miss. There isn't one software that is 100%. You can be mad at the av vendor all you want, it isn't their fault. People program these things to be undetectable.

I agree that no AV is going to catch 100% of malware, it only takes a small modification to the payload to make the latest definitions obsolete. But Cryptlocker and its variants aren't a new threat they've been around a while and a good anti-malware setup should be running real time checks on file access etc.

It could be this time the guy has just been unfortunate and been hit by new variants not recognised by Trend Micro, but I would in his position still want to know how it got past my setup and what I could do to mitigate the threat from happening again (which is what he seems to be doing). At the very least it could indicate a hole in his setup that is exposing the rest of his network, such as someone plugging in an unauthorised laptop that doesn't have adequate protection.

I guess at this point, i'm going to upgrade to the newest version of Worry Free Business.

 

I'm also going to have them check and see if any user has any locally encrypted files. What sucks, is they have some users on laptops, that pop in and out of the office, so it's possible someone comes in with an infected notebook, it does the damage and they leave.

Well doesn't matter if this specific bug doesn't require admin rights..  There are many that do - there should be no reason for a user to have local admin rights.  Is it their machine to maintain and administer or yours? 

 

Also why does your auditing not tell you which machine last touched the files - this way you would know which machine encrypted them.   Turn on auditing and you can find the machine/user that is doing it.

 

Once you know the user/machine that is doing it.. You can get more details on the actual method of infection from the user - what they did, etc. is their machine infested..  As others have said there is no 100% magic software that can protect against all bugs..  You have read the articles - antivirus is dead  ;)

 

http://www.pcworld.com/article/2150743/antivirus-is-dead-says-maker-of-norton-antivirus.html

Hello,

 

A common infection vector are email messages which contain a file attachment (or a URL to an downloadable file).  The attachment (or URL) is an archive file that contains the ransomware, either in the form of a dropper or the actual executable.  Another vector is malvertising (malicious banner advertisements which use some sort of exploit kit to perform a drive-by download) hosted on an otherwise legitimate website [the advertising is usually purchased with stolen credit cards, etc.].

 

You may wish to consider blocking messages which contain attachments that have executables in them (for example, a .ZIP, .7Z or .RAR files with .COM|.EXE|.PIF|.SCR|{...} files in them at the mail gateway. 

 

Regards,

 

Aryeh Goretsky

While I agree that email with urls or attachments is a common attack vector - I just don't see how/why it is still viable..  In this day an age, with all the virus info that has been on major news outlets, etc..  How can anyone continue to click on ###### that they were not expecting??

 

Just freaking amazing the lack of what you would think is common sense..

  On 31/10/2014 at 13:02, BudMan said:

While I agree that email with urls or attachments is a common attack vector - I just don't see how/why it is still viable..  In this day an age, with all the virus info that has been on major news outlets, etc..  How can anyone continue to click on ###### that they were not expecting??

 

Just freaking amazing the lack of what you would think is common sense..

 

I would agree, why would anyone click on what is often clearly a random link.  But then I look at my work emails and think "that's why"...

  On 31/10/2014 at 13:02, BudMan said:

While I agree that email with urls or attachments is a common attack vector - I just don't see how/why it is still viable..  In this day an age, with all the virus info that has been on major news outlets, etc..  How can anyone continue to click on ###### that they were not expecting??

 

Just freaking amazing the lack of what you would think is common sense..

 

You would be surprised what they would click on. I know they usually send lots of Office type documents and I know some of these malware things like to tack on the exe at the end. If they don't see that, boom, it's over.

I do have the email protection to prevent that stuff, so I am hoping that is not the issue.

This topic is now closed to further replies.
  • Posts

    • Fair shout! But the best way to get this on our news side would be to have Pulasti @LoneWolfSLhave a crack at Early Access when its in a playable state  
    • Interesting. Seems to promote or invite more people to use whatsapp.
    • AI is going to destroy online as well as offline worlds.
    • QOwnNotes 25.8.0 by Razvan Serea QOwnNotes is a open source (GPL) plain-text file notepad with markdown support and todo list manager for GNU/Linux, Mac OS X and Windows, that (optionally) works together with the notes application of ownCloud (or Nextcloud). So you are able to write down your thoughts with QOwnNotes and edit or search for them later from your mobile device (like with CloudNotes) or the ownCloud web-service. The notes are stored as plain text files and you can sync them with your ownCloud sync client. Of course other software, like Dropbox, Syncthing, Seafile or BitTorrent Sync can be used too. Features: the notes folder can be freely chosen (multiple note folders can be used) sub-string searching of notes is possible and search results are highlighted in the notes application can be operated with customizable keyboard shortcuts external changes of note files are watched (notes or note list are reloaded) older versions of your notes can be restored from your ownCloud server trashed notes can be restored from your ownCloud server differences between current note and externally changed note are showed in a dialog markdown highlighting of notes and a markdown preview mode notes are getting their name from the first line of the note text (just like in the ownCloud notes web-application) and the note text files are automatically renamed, if the the first line changes compatible with the notes web-application of ownCloud and mobile ownCloud notes applications compatible with ownCloud's selective sync feature by supporting an unlimited amount of note folders with the ability to choose the respective folder on your server manage your ownCloud todo lists (ownCloud tasks or Tasks Plus / Calendar Plus) or use an other CalDAV server to sync your tasks to encryption of notes (AES-256 is built in or you can use custom encryption methods like Keybase.io (encryption-keybase.qml) or PGP (encryption-pgp.qml)) dark mode theme support theming support for the markdown syntax highlighting all panels can be placed wherever you want, they can even float or stack (fully dockable) support for freedesktop theme icons, you can use QOwnNotes with your native desktop icons and with your favorite dark desktop theme support for hierarchical note tagging and note subfolders support for sharing notes on your ownCloud server portable mode for carrying QOwnNotes around on USB sticks Evernote import QOwnNotes is available in many different languages like English, German, French, Polish, Chinese, Japanese, Russian, Portuguese, Hungarian, Dutch and Spanish QOwnNotes 25.8.0 changelog: More warning log messages were ignored for Qt 6.9.1 Download: QOwnNotes 25.8.0 | 71.4 MB (Open Source) Download: QOwnNotes for Other Operating Systems View: QOwnNotes Home Page | Screenshot Get alerted to all of our Software updates on Twitter at @NeowinSoftware
    • Patch My PC - Home Updater 5.3 Final is out.
  • Recent Achievements

    • Collaborator
      bullgod69 earned a badge
      Collaborator
    • Enthusiast
      Ed B went up a rank
      Enthusiast
    • Reacting Well
      Xinotema earned a badge
      Reacting Well
    • Dedicated
      Edward266 earned a badge
      Dedicated
    • First Post
      Markvens earned a badge
      First Post
  • Popular Contributors

    1. 1
      +primortal
      760
    2. 2
      ATLien_0
      187
    3. 3
      +FloatingFatMan
      151
    4. 4
      Xenon
      118
    5. 5
      wakjak
      113
  • Tell a friend

    Love Neowin? Tell a friend!