Got it

Solution for Protecting Huawei Full Series of Products Against the Variant Ransomware GlobeImposter 3.0 Highlighted

Latest reply: Oct 9, 2021 19:37:51 1624 7 4 0 0

Solution for Protecting Huawei Full Series of Products Against the Variant Ransomware GlobeImposter 3.0

 

Recently, researchers from Huawei Weiran Labs have captured a new ransomware sample. After analysis, it is found that the behavior of the sample is almost identical to that of the ransomware family GlobeImposter's samples. The notice is as follows: https://isecurity.huawei.com/sec/web/viewBlog.do?id=1980.

According to the monitoring of Huawei Enterprise GSC, the ransomware may burst in the near future. The impact and suggestions are as follows:

1. Impact on Services

The ransomware can encrypt audio, video, database, text, and other types of files and add the file name extension .****4444, such as Rat4444, Tiger4444, Snake4444, Monkey4444, and Dog4444.

The GlobeImposter uses the RSA2048 algorithm to encrypt data. Currently, there is no effective solution to restore the encrypted data.

 

2. Solution

2.1 Remove the network cable from the infected host for disconnection.

The asymmetric encryption algorithm is used. After a host is compromised, it is difficult to restore data. However, there is a possibility to restore data because some ransomware has software logic bugs. To defend against ransomware, multiple antivirus software companies jointly provide decryption tools in https://www.nomoreransom.org/ to help victims crack part of ransomware families. Victims can try the tools to restore their data.

2.2 For a survival host, the following operations are suggested:

As the ransomware uses brute force to crack weak passwords and uses port 3389 to remotely log in to the system and implant viruses:

(1) Disable RDP on the host (the remote desktop function becomes unavailable) and block ports 445, 3389, 135, and 139 on the firewall and switch to prevent spread. (Note: Blocking the ports may affect normal services. Before doing so, check whether services are carried on the ports to avoid the adverse impact on services.)

 

(2) Do not click emails or attachments from unknown sources, especially attachments with the following extensions: .js, .vbs, .exe, .scr, and .bat because such attachments may contain password capture tools or viruses.

 

2.3 Host security hardening

(1) Change the default password of the administrator account and disable guest accounts.

2) Change the simple password to a complex password that contains at least 10 characters of uppercase letters, lowercase letters, digits, and special characters. Do not use a string of digits, such as a phone number or an employee ID, as the account password.

(3) Set an account locking policy. For example, if incorrect passwords are input for five consecutive times, the login is prohibited.

(4) Update Windows patches in a timely manner, install antivirus software, and set a password for exiting or changing the settings of the antivirus software to prevent the antivirus software from being disabled.

(5) Periodically back up data. If a cloud server is used, take snapshots.

 

3. Suggestions for Protecting Security Devices

For the USG series next-generation firewalls, FireHunter6000 series sandboxes, and IPS, update the detection engine and virus database to the latest versions. Deploying Huawei USG firewalls and the sandbox FireHunter6000 together can effectively defend against ransomware attacks:

(1) Deploy the NGFW/NGIPS to block the reconnaissance behavior (such as vulnerability exploitation) before the ransomware is delivered.

(2) Deploy switches and firewalls that support the network deception function to deceive the ransomware to intrude simulated services and capture their intrusion behaviors, reducing the probability of attacks on the real system and minimizing the loss.

(3) Deploy a sandbox to inspect email attachments. A firewall can restore traffic to files and send the files to the sandbox for inspection.

 

4. Summary of Defense Configuration Methods for Involved Products 

  (1) Firewall and sandbox


  (2) AR


  (3) CE series switches


  (4) S series switches

For further inquiries or technical support, please contact the Huawei local TAC or Huawei Global Service Hotline(https://e.huawei.com/en/service-hotline-query)

 

new threaten is comming.
View more
  • x
  • convention:

THANKS
View more
  • x
  • convention:

Posted by sim_157 at 2019-03-13 09:27 new threaten is comming.
good sharing to help us to improve the network security
View more
  • x
  • convention:

good
View more
  • x
  • convention:

very good
View more
  • x
  • convention:

very useful
View more
  • x
  • convention:

HI
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.