Facebook Google Plus Twitter LinkedIn YouTube RSS 菜单 搜索 资源——博客资源——在线研讨会资源——报告资源——事件icons_066 icons_067icons_068icons_069icons_070

现代企业对 Petya/NotPetya 勒索软件的检测

A new version of the Petya malware is spreading globally, including the European Union, Ukraine and Russia.It has already impacted many organizations, both large and small, and has compromised systems at Ukraine’s central bank, its state telecommunications company, municipal metro, and Kiev’s Boryspil International Airport.

Background

Petya ransomware is powered by Shadow Brokers exploits, which were leaked earlier this year.After compromising a system, the malware encrypts the data using a private key, and prevents users from accessing the system until it is restored or decrypted.The initial infection vector for this campaign appears to be a poisoned update for the MeDoc software suite, a tax software package used by many Ukrainian organizations.The malware then infects systems that are vulnerable to MS17-010 and spreads laterally across the infrastructure.

Note: The Petya malware creates a scheduled task which reboots up to one hour after infection.If the task is removed before execution, it does not reschedule, buying you some time.

Similar to the WannaCry ransomware that infected systems globally earlier this year, Petya takes advantage of known vulnerabilities that already have patches.In a world where malware threats arise every day, chasing daily threats is not advised.Organizations everywhere and of every size need a more strategic approach to proactively manage security threats (and protect themselves and their customers) by implementing good cyber hygiene practices, including regular patching, updates, backups, and continuous monitoring.

Tenable 可如何提供帮助

Patch vulnerabilities

Tenable customers should immediately patch systems vulnerable to MS17-010 if you haven’t already done so.Tenable.io™ Vulnerability Management has the following four plugins, released earlier this year, to detect vulnerable systems:

Plugin ID Plugin Title/Comments Exploits

97737

MS17-010:Security Update for Microsoft Windows SMB Server (4013389)

ETERNALBLUE

ETERNALCHAMPION ETERNALROMANCE ETERNALSYNERGY

WannaCry

EternalRocks

97833

MS17-010:Security Update for Microsoft Windows SMB Server (4013389) uncredentialed check

ETERNALBLUE

ETERNALCHAMPION ETERNALROMANCE ETERNALSYNERGY WannaCry

EternalRocks

Malware scan

Tenable customers can use the Malware Scan Policy in Tenable.io™ or SecurityCenter™ to detect machines infected with Petya, and the results will be reported under plugin 59275:

Plugin 59275 output

YARA detection

Tenable customers can also use YARA rules to identify infected systems through the Malicious File Detection Using YARA Nessus plugin.

Here’s a sample rule from Kaspersky which can be used with Nessus to detect the Petya malware :

Sample YARA rule for Nessus to detect Petya

仪表盘

The Petya dashboard uses all the available methods mentioned above to consolidate the data for easy understanding of the systems most likely affected or at risk from the malware.The components bring in netstats from Nessus and the Nessus Network Monitor, and also display the content related to missing patches associated with SMB vulnerabilities.

Wrap-up

Most ransomware exploits well-known vulnerabilities that already have patches available.Implementing a proactive security program that includes regular patching and system updating is one of the best strategies you can use to prevent malware from infecting your systems.Make it a regular habit to patch and protect.

For more information

  • Learn more about Tenable.io, the first vulnerability management platform for all modern assets
  • Get a free 60-day trial of Tenable.io

Many thanks to the Tenable research team for their contributions to this blog.

Updated 六月 28, 2017.Initial research suggested that CVE-2017-0199 was a potential infection vector; we are doing additional research into that issue.

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io Vulnerability Management

免费 60 天

享受现代、基于云的漏洞风险管理平台的完整权限,可让您以无与伦比的精确度查看和跟踪所有资产。立即注册,并在 60 秒内运行您的首次扫描。

Buy Tenable.io Vulnerability Management

享受现代、基于云的漏洞风险管理平台的完整权限,可让您以无与伦比的精确度查看和跟踪所有资产。Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

免费 7 天

Nessus® 是当今市面上最全面的漏洞风险扫描工具。Nessus Professional 可帮助自动化漏洞风险扫描过程,节省合规周期的时间,并可让您提升 IT 团队敬业度。