Quantcast
Channel: Symantec Connect - Products - Articles
Viewing all articles
Browse latest Browse all 818

Support Perspective: W97M.Downloader Battle Plan

$
0
0

Introduction

This is the tenth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).

This article gets down to some practical particulars on how to take a Defense in Depth approach to combat the current flood of malicious macro spam.

Big in the 90’s...

Macros are little programs that carry out some action when a document or template is opened.  They have been around for decades and are usually quite helpful.  Macro viruses are the unwanted variety written by someone with evil intent.  Whenever their documents are opened, the activity carried out is malicious.

The first macro virus was discovered in the summer of 1995, back in the days when many threats spread via floppy disk.  Technologies to battle them were developed and this attack vector was dead as disco for many years.

Symantec Delivers Detection and Repair of Word Macro Viruses
https://www.symantec.com/about/news/release/article.jsp?prid=19960129_01

...Back in the Teens

Just as USBs echo floppies as an infection vector, macro threats have come back again.  The modern malicious spam campaign has been ongoing since at least December 2014.

This has become a very common combination attack: the malicious .doc or .xls files arrive by email, are opened by an unsuspecting end user, and here comes a download of Trojan.Cridex or another equally dangerous payload. Some resources:

Ransomware: Return of the mac(ro)
https://www-secure.symantec.com/connect/blogs/ransomware-return-macro

DRIDEX and how to overcome it.
http://www.symantec.com/connect/blogs/dridex-and-how-overcome-it

The state of financial Trojans 2014
http://www.symantec.com//content/en/us/enterprise/media/security_response/whitepapers/the-state-of-financial-trojans-2014.pdf

Can Symantec Endpoint Protection Stop These Malicious Macros?  Yes.

Known malicious macro attachments are detected by SEP's AntiVirus component as W97M.Downloader . There are millions of new distinct samples each week with different filenames and hash values, so protection is constantly being updated.  The same goes for similar malicious attachments that pretend to be legitimate documents.  Some related detections:

Be sure to submit any undetected samples to Symantec Security Response!
 

Symantec Insider Tip: Successful Submissions!
https://www-secure.symantec.com/connect/articles/symantec-insider-tip-successful-submissions

Even if no AV detection yet exists, SEP's Intrusion Prevention System can block the ultimate payload from being detected.  Here's what that looks like in logs exported from the  Symantec Endpoint Protection Manager (SEPM) with some columns hidden for clarity:

sepm_logs_w97M.png

In this instance, a new malicious Word documents arrived on several different computers in the organization, was opened and the macro action was not stopped by AV.  It was however blocked by the IPS signature Web Attack: Malicious File Download 14.  These logs also provide security admins with the IP address of the attempted connection (so that a SEP Firewall policy can be created to block it!) and the name of the computer where the event took place.  (The people sitting at those machines are sure to receive some remedial training about how to handle suspicious emails!)

Should Symantec Endpoint Protection Have to Stop These Malicious Macros?  No.

SEP is a last line of defense.  Ideally these malicious macros should be stopped before they even reach the endpoint.  The arrive by email, so at the email server or email service is the best place to identify and block them.  .Cloud's scanners have an excellent record for blocking these threats.  Symantec Mail Security for Microsoft Exchange (SMSMSE) when configured to use Rapid Release definitions has the ability to block the very latest known malicious attachments.

Mail security products also have the ability to create policies that prevent the delivery of attachments with multiple extensions like ".doc.exe" or similar.  That is highly recommended!

Symantec Mail Gateway with Disarm technology will remove all active content, including malicious macros- it is effective against this form of attack.

About Disarming potentially malicious content in attached documents
http://www.symantec.com/docs/HOWTO93093

Symantec Messaging Gateway Disarm white paper
http://www.symantec.com/docs/TECH211412

Keep Old Macros From Running at All.

Also explore Microsoft's built-in methods of combating Macro threats.  This is incredibly powerful.

Social engineering tricks open the door to macro-malware attacks - how can we close it?
http://blogs.technet.com/b/mmpc/archive/2015/04/28/social-engineering-tricks-open-the-door-to-macro-malware-attacks-how-can-we-close-it.aspx

Be sure that all end users know how to safely handle suspicious mails.  When in doubt: don't open it!

In Conclusion....

Use today's technology to keep your organization safe from this retro threat.  Shelve that "Golden Oldie" of malicious macros where it belongs- in the past!

 Don't Wanna Cry, Dex


Viewing all articles
Browse latest Browse all 818

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>