Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

IPS signatures for Wannacry

I noticed that Snort has the following rules to detect WannaCry ramsonware and/or ms17-10 on its defect?

Snort rules

42329-42332, 42340, 41978

 

Can I assume , Sophos UTM, which seems to be running Snort has indeed rolled these signatures?   I looked everywhere in Sophos for such information with little luck.

 

Could anyone here help corroborate?

 

Thanks,

-Eric



This thread was automatically locked due to age.
Parents Reply Children
  • If you have a look at some of the Sophos stuff in the forum header you will find Sophos has had fixes for a while so some could be in but using different signatures?

    XG115W - v19.5.1 mr-1 - Home

    If a post solves your question please use the 'Verify Answer' button.

  • take a look at the list (link) which shows the snort pattern per today. some patterns which indeed are important for doublepulsar detection are only located in the warning section of malware and NOT in the blocking section of malware.

  •  Actually i did also look at that but... it doesnt mention UTM, it does mention patch windows and if you use SOPHOS intercept or SOPHOS EXP then you are safe. The article is focused on endpoints.

    The 2 important snort rules are in it, i cant say what the other missing snort rules do (any one has a listing what exactly the missing rules do ? 

     

     snort 42340 is set to DROP , snort rule 41978 is set to DROP according to the snort rules on the utm.

  • Yes 42340, 41978 are present and set to block. BUT to be more in detail, these are four doublepulsar detection rules (42329-42332). Problem I see (correct me if I am wrong) is that Sophos is not blocking the doublepulsar detections because these rules are only in the warning section. Would be interesting to know if it works if you manually add these rules at advanced and set them all to hard drop. But I fear this may not work. I guess Sophos has to move these four rules to the blocking list instead of the warning list.

     

    BTW setting "add extra warnings" will NOT work. Quote from manual: "Add extra warnings: When this option is selected, each group will include additional rules increasing the IPS detection rate. Note that these rules are more general and vague than the explicit attack patterns and will therefore likely produce more alerts. For that reason, the default action for these rules is Alert, which cannot be configured."