WannaCry is a ransomware family targeting Microsoft Windows. On Friday May 12, a large cyberattack based on this threat was launched. At this time, it is estimated that more than 250,000 computers in 150 countries have been infected, each demanding a ransom payment.
The initial attack vector is unclear, but an aggressive worm helps spread the ransomware. A critical patch was released by Microsoft on March 14 to remove the underlying vulnerability in supported versions of Windows, but many organizations have not yet applied this patch.
Computers running unsupported versions of Windows (Windows XP, Windows Server 2003) did not have an available patch, but Microsoft released a security patch for Windows XP and Windows Serve 2003 over the weekend.
How McAfee products can protect against WannaCry ransomware
McAfee is leading the way enterprises protect against emerging threats such as WannaCry ransomware, remediate complex security issues, and combat attacks with an intelligent end-to-end security platform that provides adaptable and continuous protection as a part of the threat defense lifecycle.
McAfee had zero-day protection for components of the initial WannaCry attack in the form of behavioral, heuristic, application control, and sandbox analyses. This post provides an overview of those protections with the following products:
- McAfee Network Security Platform (NSP)
- McAfee Host Intrusion Prevention (HIPS)
- McAfee Endpoint Protection (ENS)
- McAfee VirusScan Enterprise (VSE)
- McAfee Advanced Threat Defense (ATD)
- McAfee Web Gateway (MWG)
- McAfee Threat Intelligence Exchange (TIE)
Frequently updated technical details can be found in the McAfee Knowledge Center article KB89335.
McAfee Network Security Platform (NSP)
McAfee NSP is one product that quickly responds to prevent exploits and protect assets within networks. The McAfee NSP team works diligently to develop and deploy user-defined signatures (UDS) for critical matters. Within a 24-hour period, several UDS were created and uploaded for customers to deploy on their network sensors. In this case, the UDS explicitly targeted the exploit tools EternalBlue, Eternal Romance SMB Remote Code Execution, and DoublePulsar. There were also related indicators of compromise that were released which could be added to a blacklist to block potential threats associated with the original Trojan.
- 0x43c0b800—NETBIOS-SS: Windows SMBv1 identical MID and FID type confusion vulnerability (CVE-2017-0143)
- 0x43c0b400—NETBIOS-SS: Windows SMB Remote Code Execution Vulnerability (CVE-2017-0144)
- 0x43c0b500—NETBIOS-SS: Windows SMB Remote Code Execution Vulnerability (CVE-2017-0145)
- 0x43c0b300—NETBIOS-SS: Microsoft Windows SMB Out of Bounds Write Vulnerability (CVE-2017-0146)
- 0x43c0b900—NETBIOS-SS: Windows SMBv1 Information Disclosure Vulnerability (CVE-2017-0147)
The NSP Research Team has reviewed the information for CVE-2017-0148 and has created the following UDS:
- NETBIOS-SS: MS17-010 EternalBlue SMB Remote Code Execution
- NETBIOS-SS: SMB DoublePulsar Unimplemented Trans2 Session Setup Subcommand Request
- HTTP: Windows Kernel Information Disclosure Vulnerability (CVE-2017-0175)
- HTTP: Microsoft Windows Edge IE Mixed Content Warnings Bypass Vulnerability (CVE-2017-0064)
- HTTP: Microsoft Scripting Engine Memory Corruption Vulnerability (CVE-2017-0234)
- HTTP: Microsoft Scripting Engine Memory Corruption Vulnerability (CVE-2017-0236)
The UDS is available from KB55447 only for registered users. Log in to https://support.mcafee.com to access the article.
McAfee Host Intrusion Prevention (HIPS)
McAfee HIPS 8.0 with NIPS Signature 6095 (which will be released on May 16), provides protection against all four of the preceding known variants of WannaCry.
For the interim period, HIPS custom signatures can be created to protect against the encryption of files. Refer to KB89335 for the latest information on these configurations.
Custom Sig #1: WannaCry Registry Blocking Rule
Use Standard Subrule
Rule Type = Registry
Operations = Create, Modify, Change Permissions
Parameters, include Registry Key
Registry Key = \REGISTRY\MACHINE\SOFTWARE\WanaCrypt0r
Executable = *
Custom Sig #2: WannaCry File/Folder Blocking Rule
Use Standard Subrule
Rule Type = Files
Operations = Create, Write, Rename, Change read-only/hidden attributes,
Parameters, include Files
Files = *.wnry
Executable = *
McAfee Endpoint Protection (ENS) and McAfee VirusScan Enterprise (VSE)
McAfee recommends the following Adaptive Threat Protection configurations to protect against the WannaCry exploit and unknown variants.
McAfee Endpoint Security 10.5—Adaptive Threat Protection
McAfee Endpoint Security 10.5 with Adaptive Threat Protection Real Protect & Dynamic Application Containment (DAC) provides protection against known or unknown exploits for WannaCry.
- Configure the following setting in the Adaptive Threat Protection—Options Policy:
Rule Assignment = Security (default setting is balanced)
- Configure the following rules in the Adaptive Threat Protection—Dynamic Application Containment policy:
Dynamic Application Containment—Containment Rules
(Refer to KB87843–Best Practices for ENS Dynamic Application Containment Rules and set the recommended DAC rules to “Block” as prescribed.)
Content Dependent Security Products
McAfee Endpoint Security 10.1, 10.2, and 10.5—Threat Prevention
McAfee Endpoint Security 10.x Threat Prevention with AMCore content Version 2978 or later provides protection against all four of the preceding currently known variants of WannaCry.
McAfee VirusScan Enterprise 8.8 with DAT content 8527 or later provides protection against all four of the preceding currently known variants of WannaCry.
McAfee Endpoint Protection (ENS) and McAfee VirusScan Enterprise (VSE) Access Protection proactive measures
The McAfee ENS and McAfee VSE Access Protection rules will prevent the creation of the .wnry file. This rule prevents the encryption routine, which creates encrypted files that contain a .wncryt, .wncry, or .wcry extension. By implementing the block against .wnry files, other blocks are not necessary for the encrypted file types.
Use McAfee VSE Access Protection rules:
Rule Type: Registry Blocking Rule
Process to include: *
Registry key or value to protect: HKLM—/Software/WanaCrypt0r
Registry key or value p protect: Key
File actions to prevent: Create key or value.
Rule Type: File/Folder Blocking Rule
Process to include: *
File or folder name to block: *.wnry
File actions to prevent: New files being created
Use McAfee ENS Access Protection rules:
File Name or Path: *
SubRule Type: Registry key
File, folder name, or file path: *\Software\WanaCrypt0r
SubRule Type: Files
File, folder name, or file path: *.wnry
McAfee ENS Dynamic Application Containment rules triggered by Ransom-WannaCry variants:
Rule Name: Executing any child process
Rule Name: Accessing user cookie locations
Rule Name: Creating files with the .html, .jpg, or .bmp extension
Rule Name: Creating files with the .exe extension
Rule Name: Modifying users’ data folders
Rule Name: Modifying startup registry locations
Rule Name: Modifying critical Windows files and registry locations
Rule Name: Reading or modifying files on any network location
Rule Name: Modifying files with the .bat extension
Rule Name: Modifying files with the .vbs extension
Rule Name: Creating files with the .bat extension
Rule Name: Reading files commonly targeted by ransomware-class malware
Rule Name: Creating files on any network location
Rule Name: Writing to files commonly targeted by ransomware-class malware
Rule Name: Modifying the hidden attribute bit
Configure your endpoint security system to protect against file encryption from WannaCry (and future unknown variants)
Customers not using McAfee ENS Adaptive Threat Protection security may not have McAfee-defined content protection against not yet released variants. We recommend configuring repository update tasks with a minimal refresh interval to ensure new content is applied when it is released by McAfee.
Additional protections against the encryption routine can be configured using McAfee VSE/ENS Access Protection rules, or McAfee HIPS custom rules. Refer to KB89335 for the latest information on these configurations.
McAfee VSE and McAfee ENS Access Protection rules, and McAfee HIPS customer signature will prevent the creation of the .wnry file.
The rules prevent the encryption routine, which creates encrypted files that contain a .wncryt, .wncry, or .wcry extension.
By implementing the block against .wnry, other blocks are not necessary for the encrypted file types.
Refer to KB89335 (accessible to McAfee registered customers) for the latest information on these configurations.
McAfee Advanced Threat Defense (ATD)
McAfee ATD machine learning can convict a sample on a “medium severity” analysis.
McAfee ATD has observed the following:
- Obfuscated file
- Exploitation through shellcode
- Network propagation
- Elicited ransomware behavior
- Encryption of files
- Created and executed suspicious scripting content
- Behaved like a Trojan macro dropper
McAfee ATD observed 22 process operations, including five runtime DLLs, 58 file operations, registry modifications, file modifications, file creations (dll.exe), DLL injections, and 34 network operations.
Further analysis continues on other variants. McAfee is identifying what other behaviors can be extracted to detect future attacks.
McAfee Web Gateway (MWG)
McAfee Web Gateway (MWG) is a product family (appliance, cloud, and hybrid) of web proxies that provides immediate protection against WannaCry variants delivered through the web (HTTP/HTTPS) using multiple real-time scanning engines.
Known variants will be blocked by McAfee Global Threat Intelligence (GTI) reputation and antimalware scanning as web traffic is processed through the proxy.
Coupling MWG with ATD allows for further inspection and an effective prevention and detection approach.
McAfee Threat Intelligence Exchange (TIE)
McAfee Threat Intelligence Exchange (TIE) further enhances a customer’s security posture. With the ability to aggregate reputation verdicts from ENS, VSE, MWG, and NSP, TIE can quickly share reputation information related to WannaCry with any integrated vector. By providing the ability to use GTI for a global reputation query, TIE also enables integrated products to make an immediate decision prior to execution of the ransomware payload, leveraging the reputation cached in the TIE database.
As one endpoint protects, detects from any related variants, and updates the reputation score to TIE, this fully encompassing approach extends protection to endpoints by disseminating this information to all endpoints integrated with TIE. This bidirectional sharing of threat intelligence is duplicated in capability with MWG and NSP. Thus, as the potential threat attempts to infiltrate through the network or web, MWG and NSP will provide protection and detection and share this intelligence with TIE to inoculate endpoints—immediately protecting the enterprise with no further execution of the convicted variant on a potential “patient zero” in the environment.