H
hjlbx
Thread author
Source: Reddit AMA - We are Webroot, and we are here to answer all your questions • /r/sysadmin
Specifically addresses question regarding ransomware, but the outlined protection mechanisms and algorithms are generally applied to all malware types. Take note that the explanation below references Enterprise version of Webroot. However, once again, the protection mechanisms are essentially the same for Webroot's consumer products.
TylerWebroot 37 points 1 year ago
Great Question!
So there are multiple ways we go about detecting Encrypting Ransomware.
First - is going to be by hash detection from the cloud on the dropper. You don't just get cryptolocker immediately from a phishing email. Typically it's a zeus dropper that communicates to a command and control server which will then take already gathered info about your PC and then based on that info drop the appropriate encrypting ransomware pre-built for your PC environment. Because different operating systems may have different policies and require different commands to take control. Our Detection on Zero-day Zeus drops is some of the best around so we'll likely get the "invoice.scr" or whatever email attachment was before it even downloads Cryptolocker.
Second - would be the scenario where the zeus drop wasn't detected and was able to download the payload from the command and control server. We would then have cloud based detection based on that MD5 hash of Crpytolocker which was just downloaded and would be detected in real time before execution.
Third - would be the scenario where we don't get the Zeus dropper and we don't get the Encrypting ransomware payload through cloud detection. We would then have a preview analysis stage where there is behavioral and heuristics being applied before execution. A LOT of encrypting ransomware is going make sure you don't get your files back and the most common way is deleting the VSS (Volume Shadow Service) so you can't use tools like Shadow Explorer. We would detect on any unknown process trying to take action on vssadmin.exe to delete the restore points. We also have many other calssfields of heuristics based off of many other attributes common with encrypting ransomware - like unique registry entries, ect.
Fourth- Would be a scenario in which cloud detection on dropper and encrypting ransomware AND heuristics also didn't detect it. This is the part where journaling kicks in so every action by the unknown file or process is recorded. If a file that was previously unknown, gets classified as bad, it is quarantined and all actions reversed as recorded by the journaling. This includes restoring back registry entries and backup snapshots of the files from before modification. we’ll revert all changes made to all files on the operating system once a determination is received (15min - 4hours).
In addition to all that Jazz...Webroot has backup features built into our product that allow you to have directories constantly synced to the cloud. If you were to get infected by a zero day variant of encrypting ransomware you can just restore your files back as we save a snapshot history for each of your files up to ten previous copies.
TL;DR We protect you from cryptolocker through cloud detection, heurisitcs, journaling, and cloud storage. WE GOT DIS
Specifically addresses question regarding ransomware, but the outlined protection mechanisms and algorithms are generally applied to all malware types. Take note that the explanation below references Enterprise version of Webroot. However, once again, the protection mechanisms are essentially the same for Webroot's consumer products.
TylerWebroot 37 points 1 year ago
Great Question!
So there are multiple ways we go about detecting Encrypting Ransomware.
First - is going to be by hash detection from the cloud on the dropper. You don't just get cryptolocker immediately from a phishing email. Typically it's a zeus dropper that communicates to a command and control server which will then take already gathered info about your PC and then based on that info drop the appropriate encrypting ransomware pre-built for your PC environment. Because different operating systems may have different policies and require different commands to take control. Our Detection on Zero-day Zeus drops is some of the best around so we'll likely get the "invoice.scr" or whatever email attachment was before it even downloads Cryptolocker.
Second - would be the scenario where the zeus drop wasn't detected and was able to download the payload from the command and control server. We would then have cloud based detection based on that MD5 hash of Crpytolocker which was just downloaded and would be detected in real time before execution.
Third - would be the scenario where we don't get the Zeus dropper and we don't get the Encrypting ransomware payload through cloud detection. We would then have a preview analysis stage where there is behavioral and heuristics being applied before execution. A LOT of encrypting ransomware is going make sure you don't get your files back and the most common way is deleting the VSS (Volume Shadow Service) so you can't use tools like Shadow Explorer. We would detect on any unknown process trying to take action on vssadmin.exe to delete the restore points. We also have many other calssfields of heuristics based off of many other attributes common with encrypting ransomware - like unique registry entries, ect.
Fourth- Would be a scenario in which cloud detection on dropper and encrypting ransomware AND heuristics also didn't detect it. This is the part where journaling kicks in so every action by the unknown file or process is recorded. If a file that was previously unknown, gets classified as bad, it is quarantined and all actions reversed as recorded by the journaling. This includes restoring back registry entries and backup snapshots of the files from before modification. we’ll revert all changes made to all files on the operating system once a determination is received (15min - 4hours).
In addition to all that Jazz...Webroot has backup features built into our product that allow you to have directories constantly synced to the cloud. If you were to get infected by a zero day variant of encrypting ransomware you can just restore your files back as we save a snapshot history for each of your files up to ten previous copies.
TL;DR We protect you from cryptolocker through cloud detection, heurisitcs, journaling, and cloud storage. WE GOT DIS