Facebook Google Plus Twitter LinkedIn YouTube RSS 功能表 搜尋 資源 - 部落格資源-線上研討會資源-報告資源 - 活動icons_066 icons_067icons_068icons_069icons_070

適用於現代企業的 Petya/NotPetya 勒索軟體偵測

A new version of the Petya malware is spreading globally, including the European Union, Ukraine and Russia.It has already impacted many organizations, both large and small, and has compromised systems at Ukraine’s central bank, its state telecommunications company, municipal metro, and Kiev’s Boryspil International Airport.

Background

Petya ransomware is powered by Shadow Brokers exploits, which were leaked earlier this year.After compromising a system, the malware encrypts the data using a private key, and prevents users from accessing the system until it is restored or decrypted.The initial infection vector for this campaign appears to be a poisoned update for the MeDoc software suite, a tax software package used by many Ukrainian organizations.The malware then infects systems that are vulnerable to MS17-010 and spreads laterally across the infrastructure.

Note: The Petya malware creates a scheduled task which reboots up to one hour after infection.If the task is removed before execution, it does not reschedule, buying you some time.

Similar to the WannaCry ransomware that infected systems globally earlier this year, Petya takes advantage of known vulnerabilities that already have patches.In a world where malware threats arise every day, chasing daily threats is not advised.Organizations everywhere and of every size need a more strategic approach to proactively manage security threats (and protect themselves and their customers) by implementing good cyber hygiene practices, including regular patching, updates, backups, and continuous monitoring.

Tenable可以提供什麼幫助?

Patch vulnerabilities

Tenable customers should immediately patch systems vulnerable to MS17-010 if you haven’t already done so.Tenable.io™ Vulnerability Management has the following four plugins, released earlier this year, to detect vulnerable systems:

Plugin ID Plugin Title/Comments Exploits

97737

MS17-010:Security Update for Microsoft Windows SMB Server (4013389)

ETERNALBLUE

ETERNALCHAMPION ETERNALROMANCE ETERNALSYNERGY

WannaCry

EternalRocks

97833

MS17-010:Security Update for Microsoft Windows SMB Server (4013389) uncredentialed check

ETERNALBLUE

ETERNALCHAMPION ETERNALROMANCE ETERNALSYNERGY WannaCry

EternalRocks

Malware scan

Tenable customers can use the Malware Scan Policy in Tenable.io™ or SecurityCenter™ to detect machines infected with Petya, and the results will be reported under plugin 59275:

Plugin 59275 output

YARA detection

Tenable customers can also use YARA rules to identify infected systems through the Malicious File Detection Using YARA Nessus plugin.

Here’s a sample rule from Kaspersky which can be used with Nessus to detect the Petya malware :

Sample YARA rule for Nessus to detect Petya

儀表板

The Petya dashboard uses all the available methods mentioned above to consolidate the data for easy understanding of the systems most likely affected or at risk from the malware.The components bring in netstats from Nessus and the Nessus Network Monitor, and also display the content related to missing patches associated with SMB vulnerabilities.

Wrap-up

Most ransomware exploits well-known vulnerabilities that already have patches available.Implementing a proactive security program that includes regular patching and system updating is one of the best strategies you can use to prevent malware from infecting your systems.Make it a regular habit to patch and protect.

For more information

  • Learn more about Tenable.io, the first vulnerability management platform for all modern assets
  • Get a free 60-day trial of Tenable.io

Many thanks to the Tenable research team for their contributions to this blog.

Updated 6月 28, 2017.Initial research suggested that CVE-2017-0199 was a potential infection vector; we are doing additional research into that issue.

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io Vulnerability Management

免費 60 天

享受對現代化、雲端基弱點風險管理平台的完全使用權限,使您能夠查看和追蹤您的所有資產,且具有無與倫比的準確性。立即註冊,並執行您的第一次掃描,只需不到 60 秒。

Buy Tenable.io Vulnerability Management

享受對現代化、雲端基弱點風險管理平台的完全使用權限,使您能夠查看和追蹤您的所有資產,且具有無與倫比的準確性。Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

免費 7 天

Nessus® 是現今市場上最全面的弱點掃描軟體。Nessus Professional 將幫助自動化弱點掃描過程,在您的合規性週期內節省時間,並讓您的 IT 團隊參與其中。