sb-as logo
Story image

FireEye's latest security feature detects and protects from ransomware

FireEye have recently detected a cerber ransomware campaign with Exploit Guard, a new feature of FireEye Endpoint Security (HX)

According to the security company, the ransomware came in the guise of a Microsoft Word document attached to emails. FireEye say the document contains a malicious macro that contacts an attacker-controlled website to download and install the cerber ransomware. 

Ransomware is a common method of cyber extortion for financial gain, it typically involves users being unable to interact with their files, applications or systems until a random is paid.

Upon identifying the cerber ransomware, a FireEye research team were able to shut it down within hours of detecting the activity.

“FireEye hasn’t seen any additional infections from this attacker since shutting down the C2 server, although the attacker could configure one or more additional C2 servers and resume the campaign at any time,” a company statement read.

Here is the cerber ransomware attack cycle that FireEye observed in eight steps: 

  1. Target receives and opens a Word document.
  2. Macro in document is invoked to run PowerShell in hidden mode.
  3. Control is passed to PowerShell, which connects to a malicious site to download the ransomware.
  4. On successful connection, the ransomware is written to the disk of the victim.
  5. PowerShell executes the ransomware.
  6. The malware configures multiple concurrent persistence mechanisms by creating command processor, screensaver, startup.run and run once registry entries.
  7. The executable uses native Windows utilities such as WMIC and/or VSSAdmin to delete backups and shadow copies.
  8. Files are encrypted and messages are presented to the user requesting payment.

The most common way to deliver ransomware is via Word documents with embedded macros or a Microsoft Office exploit.

FireEye claim its Exploit Guard detects both of these attacks at the initial stage of the attack cycle.

Story image
Lumen launches managed security services for APAC market
The new service is designed to provide enterprise businesses with a proactive, connected security strategy to enhance threat detection and protection across endpoints. More
Story image
Security and operations collaboration key to success post COVID-19
“We are in an ultra-hybrid world with multi-everything, and in order to successfully navigate this landscape, ITOps, DevOps, and SecOps teams need to more closely align."More
Story image
Video: 10 Minute IT Jams – A glimpse inside a ransomware cell
This is our second IT Jam with SonicWall senior manager of product marketing Brook Chelmo, and in this video Brook walks us through his one-on-one experience with a member of a ransomware cell. More
Story image
Why best-practice threat data management provides confident automation
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. More
Story image
BlueVoyant acquires Managed Sentinel, builds out Microsoft MSS offerings
“Combining Managed Sentinel’s Azure Sentinel deployment expertise with BlueVoyant’s MDR capabilities will help customers operationalise and maximise Microsoft security technologies."More
Story image
Experiencing ransomware significantly impacts cybersecurity approach
"The survey findings illustrate clearly the impact of these near-impossible demands. Among other things, those hit by ransomware were found to have severely undermined confidence in their own cyber threat awareness."More