08-15-2016 11:42 PM
How to block Vegclass@aol.com.XTBL Ransomware virus in Cisco ESA?
08-16-2016 04:34 AM
Hey John,
I would suggest the best option is if you have a sample, to open a TAC case so we can escalate the new variants to the Virus vendors being used, and also to the AMP engine available.
Else may i ask what type of attachment is this ransomware within?
Perhaps a filter to stop certain filetypes may also help alleviate some concerns.
Regards,
Matthew
08-16-2016 09:48 PM
HI Matthew,
How can we block those extension xtbl files? we also experience this same scenario also.
Best regards!
08-16-2016 09:49 PM
Hello ccg-security,
As the extension is not a supported filetype on the ESA - I would recommend the attachment filename rule to be used to stop this type of file extension by its naming convention.
Regards,
Matthew
08-16-2016 09:55 PM
08-16-2016 09:58 PM
Hello ccg-security,
I would generally add in for this type of file via a content filter (or message filter)
Attachment File Info - Filename -> ends with -> (?i)\.xtbl
Action : drop/quarantine/strip by attachment filename -> (?i)\.xtbl
Then submit and apply this filter to your setup and commit.
Essentially any emails containing attachment that ends in extension .xtbl wil lbe actioned by your filter.
Regards,
Matthew
08-16-2016 09:59 PM
Hi Matthew,
Thank you very much for this. We will try this later on our end via GUI and update you if its work.
Thank you and best regards!
08-16-2016 11:33 PM
Hi Matthew,
How can we track in message tracking on ransomeware Vegclass? Hope for your prompt response.
Thank you!
08-17-2016 08:36 AM
08-18-2016 02:20 AM
Hi Libin,
Thank you for providing the capture screenshot. We already filtered based on .xtbl attachment but failed. I think that it didn't pass through the ironport. Mcafee endpoint will do the isolation about the malware.
We also block .xtbl files from incoming and outgoing messages in case it passess through the ironport.
Thank you and best Regards!
08-30-2016 12:22 PM
I'm sorry for my english. I'm using google translator. I am Brazilian and work with enterprise network management that work.
I was attacked on the last weekend (27/08/2016) overnight.
Some information that can help understand how the virus works.
This .xtbl estenção is created in the own attack machine, the program that does this is a normal .exe, after this application be in your being infected is created parameter to run (.exe file-name) only after this is done the files start to be encrypted and gain .xtbl estensão.
So in my opinion, will not do anything to block the input files of that type in the firewall.
I have helped.
08-30-2016 12:35 PM
Hello
We could use the exe file sample to update the Sophos signatures to ensure future instances are avoided, also content and message filters can be configured to block .exe filenames.
Libin
09-29-2016 01:17 PM
Olá,
Conseguiu descriptografar seus arquivos?
AdolfoPD@yahoo.com.br
11-16-2016 01:17 PM
hi to all, i can help for your xtbl encrypted files, pls send me your few encrypted files (pdf, doc, xls files are preferable) to my email address, mcerdem82@yahoo.com
11-16-2016 01:18 PM
hi to all, i can help for your xtbl encrypted files, pls send me your few encrypted files (pdf, doc, xls files are preferable) to my email address, mcerdem82@yahoo.com....
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide