SandBlast blocks new attack vector, keeps zero-day prevention promise

Document created by Gad Naveh Employee on Sep 26, 2018Last modified by Gad Naveh Employee on Oct 9, 2018
Version 6Show Document
  • View in full screen mode

SandBlast Threat Extraction and CADET delivered on the Check Point zero-day prevention promise by blocking yet another completely new attack vector.

On June 11th, a researcher from SpecterOps discovered a new infection vector using the SettingContent-ms file type. The attack was rapidly updated and was used in a FlawAmmyy RAT Massive Malspam campaign that embedded the SettingContent-ms file into a PDF file. It bypassed previously introduced Windows 10 defenses, including Attack Surface Reduction (ASR) and detection of OLE-embedded dangerous file formats.

SandBlast Threat Extraction effectively cleaned the file by removing the JavaScript and embedded malicious file, rendering the file harmless. Additional network protection was achieved by CADET (Context-Aware Detection and Elimination of Threats), our AI-based technology, effectively preventing the RAT loader and malicious payload. CADET and Threat Extraction blocked the “Patient Zero” infection without the need for an update or a signature.

My recording of malicious file behavior vs. the cleaned file. Kudos to Netanel Ben Simon for staging the attack:


Another Great Threat Extraction win.




26.9.18 (GN) Edited to better explain the Screen Shot

4.10.18 (GN) Changed the screen capture to a video showing the malicious behavior vs. a cleaned file behavior

8.10.18 (GN) Updated the recording with narration

2 people found this helpful