[clamav-users] Malware/ransomware and Yara signatures with clamav
Joel Esler (jesler)
jesler at cisco.com
Sun May 14 18:42:09 UTC 2017
ClamAV isn't only used for mail. Clamwin and Immunet client will catch this.
--
Sent from my iPhone
> On May 14, 2017, at 12:42, G.W. Haywood <clamav at jubileegroup.co.uk> wrote:
>
> Hi there,
>
>> On Sun, 14 May 2017, Alex wrote:
>>
>> Are clamav users protected from this ransomware?
>
> To be clear about this, the current excitement is caused by a 'worm'.
> That means if vulnerable, network-connected systems are not protected
> from each other, for example by a firewall, the worm can propagate
> itself between the systems with no user action whatever. All that is
> required is that the systems be running and connected to the network.
> This is why it has managed to affect over 200,000 systems in over 100
> countries in just a few hours.
>
> It has nothing to do with mail. Clamav is irrelevant because there is
> nothing for ClamAV to scan, at least until it is too late. So ClamAV
> scanning mail cannot protect against this threat, and was not designed
> to do so.
>
>> Are there possible variants not yet detected?
>
> Yes. And they'll keep coming.
>
>> Is there anything further we need to do to protect ourselves, as it
>> relates to scanning mail at the gateway?
>
> To repeat, this has nothing to do with mail. The issue is a buffer
> overflow caused by faulty coding present in Microsoft Windows products
> for almost as long as anyone can remember. All you can do is fix the
> vulnerable machines, or firewall them, or perhaps stop using them on a
> network. Windows 7, 10 and later boxes with automatic updates enabled
> should have picked up a fix in mid-March. As of yesterday a patch is
> available for other OS versions which are otherwise unsupported by
> Microsoft. I've just spent most of the weekend patching customers'
> 2003 Server and XP machines. Search the Microsoft Update Catalog for
> KB4012598. The download page has 13 assorted files for various
> flavours of XP, Vista, 8, Server 2003 and Server 2008 - or at least it
> did yesterday. When I grabbed the files the download servers were
> showing signs of stress, as you might expect, but they were at least
> holding up.
>
>> They're talking about more attacks coming on Monday?
>
> Forget Monday, they're here already.
>
> Comments on a postcard, please, to the NSA. For example you might
> like to remind them what the 'S' in those initials stands for, as they
> surely seem to have forgotten. And I think Donald fired the head of
> the wrong agency. Oh, hang on, that's a bit political for this list. :)
>
> --
>
> 73,
> Ged.
> _______________________________________________
> clamav-users mailing list
> clamav-users at lists.clamav.net
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
More information about the clamav-users
mailing list