<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New IPS/IDS signatures for WannaCry in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/new-ips-ids-signatures-for-wannacry/m-p/22570#M223</link>
    <description>The following NIDS signature updates are available via  liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-REQUEST-REMOTE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft Windows  that may lead to remote code execution. The vulnerability is in the processing  of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024217" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024217&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-REQUEST-REMOTE2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry. There are other signatures that depend on this signature  being enabled.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024220" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024220&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-RESPONSE-REMOTE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry. This signature tests for the "smbv1.remote"  FlowTag being set before generating an event on network traffic. This FlowTag  is defined by the MS:SMBV1-REQUEST-REMOTE signature, which is required for this  signature to generate an event.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024218" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024218&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    TRJN:WANNACRY-DNS-LOOKUP&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: TROJAN&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: This signature looks for DNS traffic  associated with the WannaCry ransomware. The source of this event should be  investigated.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024291" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024291&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    TRJN:WANNACRY-DNS-LOOKUP2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: TROJAN&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: This signature looks for DNS traffic associated  with the WannaCry ransomware. The source of this event should be investigated.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024293" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024293&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    TRJN:WANNACRY-DNS-LOOKUP3&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: TROJAN&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: This signature looks for DNS traffic  associated with the WannaCry ransomware. The source of this event should be  investigated.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024294" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024294&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Thu, 18 May 2017 18:27:00 GMT</pubDate>
    <dc:creator>Dudley__Jeff</dc:creator>
    <dc:date>2017-05-18T18:27:00Z</dc:date>
    <item>
      <title>New IPS/IDS signatures for WannaCry</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/new-ips-ids-signatures-for-wannacry/m-p/22570#M223</link>
      <description>The following NIDS signature updates are available via  liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-REQUEST-REMOTE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft Windows  that may lead to remote code execution. The vulnerability is in the processing  of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024217" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024217&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-REQUEST-REMOTE2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry. There are other signatures that depend on this signature  being enabled.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024220" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024220&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-RESPONSE-REMOTE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry. This signature tests for the "smbv1.remote"  FlowTag being set before generating an event on network traffic. This FlowTag  is defined by the MS:SMBV1-REQUEST-REMOTE signature, which is required for this  signature to generate an event.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024218" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024218&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    TRJN:WANNACRY-DNS-LOOKUP&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: TROJAN&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: This signature looks for DNS traffic  associated with the WannaCry ransomware. The source of this event should be  investigated.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024291" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024291&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    TRJN:WANNACRY-DNS-LOOKUP2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: TROJAN&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: This signature looks for DNS traffic associated  with the WannaCry ransomware. The source of this event should be investigated.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024293" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024293&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    TRJN:WANNACRY-DNS-LOOKUP3&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: TROJAN&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: This signature looks for DNS traffic  associated with the WannaCry ransomware. The source of this event should be  investigated.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024294" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024294&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 18 May 2017 18:27:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/new-ips-ids-signatures-for-wannacry/m-p/22570#M223</guid>
      <dc:creator>Dudley__Jeff</dc:creator>
      <dc:date>2017-05-18T18:27:00Z</dc:date>
    </item>
  </channel>
</rss>

