It is not true that Magniber doesn’t target home users. In fact, there are many discussions about Magniber on Chinese Virus Rescue forums, and most victims are home users.Although any video with working ransomware can be kinda shocking, the truth is that there is no need to worry. The method used by Magniber (MSI file) is very rarely used against home users.
Furthermore, for any AV one can find working malware. There is no perfect & usable protection against malware. Even such a strong protection like CF with @cruelsister settings cannot save many users. Of course, the installer/fix will be blocked, but this is expected for pirated software, game mods, or cracks. The blocked malware cannot expose the malicious actions, so the user will simply turn off the protection and still can be infected.
Microsoft can efficiently (but not perfectly) fight such malware in several ways:
So, we will see the normal cat & mouse game. When Microsoft (or any other AV) is going to improve the protection, the Magniber fellows will make necessary modifications, and so on.
- Making the samples very short-living (Block At First Sight + post-execution detections). Even if the sample could infect a few users, then after several minutes other users can be often protected against this sample.
- Adding the methods used by ransomware to ASR rules.
- Blocking delivery paths, when the malicious actors would like to use the malware in widespread attacks (weaponized documents, scripts, etc.).
- Adding the malicious URLs to SmartScreen (used also system-wide by Defender's Network Protection).
It is not true that Magniber doesn’t target home users. In fact, there are many discussions about Magniber on Chinese Virus Rescue forums, and the most victims are home users.
Kaspersky can block it and rollback encrypted files, but Avast can not.Does Avast BB and kaspersky SW block this rat?
Weaponized documents seem to be the home user's biggest enemy. Exe files will be blocked by most email providers, so it's unlikely that they will be delivered to your inbox. You have to go looking for them. But docs come in all the time, and can look legit, especially if the sender's address was spoofed.Blocking delivery paths, when the malicious actors would like to use the malware in widespread attacks (weaponized documents, scripts, etc.).
All cruelsister tests that I remember seeing were performed by executing clearly-named malware files sitting in orderly fashion on her desktop.Did I miss something, or we not given any information on how the malware was delivered to the system? @Andy Ful will surely have his similar opinion. Rightly so, as I suspect a drag&drop method, which unfortunately makes some of Microsoft's mechanisms not work.
Did I miss something, or we not given any information on how the malware was delivered to the system? @Andy Ful will surely have his similar opinion. Rightly so, as I suspect a drag&drop method, which unfortunately makes some of Microsoft's mechanisms not work.
The transmission method is still various forums, cracked software websites, fake pornographic websites, etc. When users visit these websites, they are induced to download from third-party network disks.
It is not true that Magniber doesn’t target home users.
Block at first sight doesn’t work for Magniber ransomware.
Adrian- You missed nothing, and I thank you very much for bringing up this point! So to answer:Did I miss something, or we not given any information on how the malware was delivered to the system? @Andy Ful will surely have his similar opinion. Rightly so, as I suspect a drag&drop method, which unfortunately makes some of Microsoft's mechanisms not work.
Yes. If you want to be protected against such (so far) rare threats then, additional protection is required.Wonderful music, the video shows that WD is not efficient with this Malware variant which leaves me concerned because it is my current setup. It even bypassed the WD protected folders.
Yes. If you want to be protected against such (so far) rare threats then, additional protection is required.
There are several well-known options for Defender (based on the file reputation lookup): CatchPulse (SecureaPlus), Comodo Firewall with @cruelsister settings, Crystal Security (???), Hard_Configurator (Recommended_Settings), SWH + RunBySmartScreen, VoodooShield. I am not sure if I can recall all.
Another option is using a very aggressive solution like WiseVector StopX or skip Defender and use a paid AV like KIS (@harlan4096 settings) or Norton.
In all the above cases, one has to face the problem of false positives. So, some discipline is required or a wise method to manage the blocked/detected files.
I'm thinking the SRP-enforced rules used in H_C (Hard_Configurator) would maybe block either of the UAC elevation commands using C:\Windows\System32\wbem\WMIC.exe as explained further down the cybereason article in this link:
Threat Analysis Report: PrintNightmare and Magniber Ransomware
Actually, any possibility CS could test this malware with H_C ?
Yes. If you want to be protected against such (so far) rare threats then, additional protection is required.
There are several well-known options for Defender (based on the file reputation lookup): CatchPulse (SecureaPlus), Comodo Firewall with @cruelsister settings, Crystal Security (???), Hard_Configurator (Recommended_Settings), SWH + RunBySmartScreen, VoodooShield. I am not sure if I can recall all.
Another option is using a very aggressive solution like WiseVector StopX or skip Defender and use a paid AV like KIS (@harlan4096 settings) or Norton.
In all the above cases, one has to face the problem of false positives. So, some discipline is required and a wise method to manage the blocked/detected files.
I know the sample CS used was probably different and even modified, but I just wanted to use something that was at least somewhat relevant.This article is not related to the Magniber sample used in the video. It used an exploit which is patched for several months.
CS' approach of using something like CF or SBie to contain is rather powerful; it uses blanket treatment of everything, no matter how harmful or even harmless it might be, and no matter what steps it uses, or how it may be modified by the attacker, including LOLBins utilized in its attack. It simply contains it, stopping the malware dead in its tracks from committing malicious modification to the target system.The H_C blocks MSI files via SRP. This can work well against the malware designed to be run by the user unintentionally as a movie, photo, document, etc. But in this particular attack, the user is convinced to run the fake update and expects that it can be blocked, so he/she will turn off the H_C protection and be infected anyway. This issue is similar to using Comodo Firewall.
...
The SRP approach can be powerful too, but only if a true default-deny setup is used, which of course has the drawback of requiring the end user to manage rules on a mostly ongoing basis, carefully crafting allow rules where necessary, without compromising security in the process. Micro-management of this approach can be painstaking and undesirable for many. I do like how you utilize it in H_C though
Using CF in CS settings is similarly painful to using the H_C Strict_Recommended_Settings. In CF the list of trusted vendors is disabled or highly shortened, so one has to often whitelist the software installations/updates or add the new vendors to the list. A bigger problem is when the software is unsigned because CF blocks also DLLs, so whitelisting is more complicated.
Hi Wat! Indeed the malware requested beaucoup elevations, including for TCB (Trusted Computer Base) which pretty much opens the system to all sorts of potential nastiness. Also as is getting typical of ransomware, SeBackupPrivilege (to allow file Reads) and SeRestorePrivilege which will grant write access can be seen. By the way, UAC at the maximum level does not peep at all, including on initial run (should have included this tidbit in the video but it slipped my mind as I hate UAC!).Of course we don't yet know if CS' test resulted in the malware gaining elevated privileges,
I also would have gotten rid of CF i I had to use those settings! The hardest thing to understand about CF is that Simple is Best, and that is almost counter-intuitive in the Security field.I used CF some months ago using a combination of containment plus HIPS in Paranoid mode, as well as firewall rules restricting inbound and outbound