Trellix Insights: LookBack threat campaign
Technical Articles ID:
KB92420
Last Modified: 2022-08-10 18:41:32 Etc/GMT
Last Modified: 2022-08-10 18:41:32 Etc/GMT
瞭解隨時適應新環境的 XDR 生態系統如何為您的企業注入活力。
Trellix 執行長 Bryan Palma 解釋了針對不斷學習的安全性的迫切需求。
下載最新的 Magic Quadrant 報告,依願景執行力與完成程度評估 19 位廠商。
依據 Gartner 的報告,「XDR 是一種新興技術,可提供改進的威脅預防、偵測和回應能力。」
企業在 2022 年應該注意哪些網路安全性威脅呢?
在網路安全行業中,從沒有片刻的無聊時光,如今正是採用這個新概念作為優勢來為企業提供助力的絕佳時機。
這兩個在網路安全領域值得信賴的領導者攜手合作,創造一個彈性數位世界。
Trellix 執行長 Bryan Palma 解釋了針對不斷學習的安全性的迫切需求。
Trellix Insights: LookBack threat campaign
Technical Articles ID:
KB92420
Last Modified: 2022-08-10 18:41:32 Etc/GMT Environment
IMPORTANT: This Knowledge Base article discusses a specific threat that is being automatically tracked by Trellix Insights technology. The content is intended for use by Trellix Insights users, but is provided for general knowledge to all customers. Contact us for more information about Trellix Insights.
Summary
Description of Campaign This campaign targets United States-based companies in the utilities sector with spear phishing emails. The emails contain Word documents with malicious VBA macros which infect the host with the LookBack remote access trojan. LookBack can:
Campaign IOC:
Minimum Content Versions:
Detection Summary:
Minimum set of Manual Rules to improve protection to block this campaign IMPORTANT: When you implement new rules or signatures, always first set them to Report mode before setting them to Block. Mitigate against triggering false positives when enabling new rules and signatures by always following best practices. For best practices for Endpoint Security Dynamic Application Containment rules, see: KB87843 - Dynamic Application Containment rules and best practices. Endpoint Security - Advanced Threat Protection: Rule ID: 332 Prevent Endpoint Security - Dynamic Application Containment: Executing any child process
Writing to another process's memory Closing another process Suspending a process Creating a thread in another process Allocating memory in another process Reading from another process's memory Endpoint Security - Exploit Prevention: Host Intrusion Prevention: Aggressive set of Manual Rules to improve protection to block this campaign IMPORTANT: When you implement new rules or signatures, always first set them to Report mode before setting them to Block. Mitigate against triggering false positives when enabling new rules and signatures by always following best practices. For best practices for Endpoint Security Dynamic Application Containment rules, see: KB87843 - Dynamic Application Containment rules and best practices. Endpoint Security - Access Protection Custom Rules: Executables (Include): Subrules: Subrule Type: Files Operations: Create Targets (Include): Endpoint Security - Access Protection Rules: Registering of programs to autorun
Endpoint Security - Dynamic Application Containment: Modifying users' data folders
Virusscan Enterprise - Access Protection Rules: Prevent programs registering to autorun
VirusScan Enterprise - Access Protection Custom Rules: Rule Type: File Process to include: File or folder name to block: File actions to prevent: Create Host Intrusion Prevention: Rule ID: 6010 Generic Application Hooking Protection Rule ID: 6011 Generic Application Invocation Protection Rule ID: 1020 Windows Agent Shielding - File Access Rule ID: 6010 Generic Application Hooking Protection Affected Products |
|