<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Quick and Dirty Alert in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quick-and-Dirty-Alert/m-p/40992#M13546</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sample this morning came with two word documents. AV Blade caught the emails.&amp;nbsp;Does Emotet usually send two attachments?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Nov 2018 14:02:49 GMT</pubDate>
    <dc:creator>Ryan_St__Germai</dc:creator>
    <dc:date>2018-11-08T14:02:49Z</dc:date>
    <item>
      <title>Quick and Dirty Alert</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quick-and-Dirty-Alert/m-p/40989#M13543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are witnessing a surge in weaponized Microsoft documents containing a macro.&lt;/P&gt;&lt;P&gt;This campaign has very low detection by signature based solutions. It uses advanced social engineering techniques designed to make the user open the document and enable the macro. As you can see in the screen shots these are similar but more graphically adapt to the notorious &lt;A href="https://blog.checkpoint.com/2016/03/02/locky-ransomware/"&gt;locky campaign&lt;/A&gt;&amp;nbsp;of 2016.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="73307" class="image-1 jive-image" height="436" src="https://community.checkpoint.com/legacyfs/online/checkpoint/73307_pastedImage_2.png" width="672" /&gt;&lt;IMG __jive_id="73310" class="jive-image image-4" height="439" src="https://community.checkpoint.com/legacyfs/online/checkpoint/73310_pastedImage_5.png" width="653" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Screen shot of documents cleaned by Threat Extraction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The last couple of days show a ten fold increase in the malicious files.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="73309" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/73309_pastedImage_4.png" /&gt;&lt;/P&gt;&lt;P&gt;The surge as seen in numbers in the last week.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SandBlast Threat Extraction cleans the macro from the document at zero time.&lt;/P&gt;&lt;P&gt;SandBlast prevents the download of the original file by three zero day engines: Macro Analyzer, CPU level detection on crash and the emulator by its malicious process activity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll update when there is more data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Gadi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 11:32:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quick-and-Dirty-Alert/m-p/40989#M13543</guid>
      <dc:creator>Gad_Naveh</dc:creator>
      <dc:date>2018-11-07T11:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: Quick and Dirty Alert</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quick-and-Dirty-Alert/m-p/40990#M13544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gad,&lt;/P&gt;&lt;P&gt;Can you tell if the TX is necessary for this protection to work or if TE will be able to catch it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 13:44:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quick-and-Dirty-Alert/m-p/40990#M13544</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-11-07T13:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: Quick and Dirty Alert</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quick-and-Dirty-Alert/m-p/40991#M13545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;Yes, TE is able to catch it and prevent it.&lt;/P&gt;&lt;P&gt;I'll upload a report&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 14:11:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quick-and-Dirty-Alert/m-p/40991#M13545</guid>
      <dc:creator>Gad_Naveh</dc:creator>
      <dc:date>2018-11-07T14:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: Quick and Dirty Alert</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quick-and-Dirty-Alert/m-p/40992#M13546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sample this morning came with two word documents. AV Blade caught the emails.&amp;nbsp;Does Emotet usually send two attachments?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2018 14:02:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quick-and-Dirty-Alert/m-p/40992#M13546</guid>
      <dc:creator>Ryan_St__Germai</dc:creator>
      <dc:date>2018-11-08T14:02:49Z</dc:date>
    </item>
    <item>
      <title>Re: Quick and Dirty Alert</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quick-and-Dirty-Alert/m-p/40993#M13547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not that I am aware of, please do share&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2018 14:32:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quick-and-Dirty-Alert/m-p/40993#M13547</guid>
      <dc:creator>Gad_Naveh</dc:creator>
      <dc:date>2018-11-08T14:32:16Z</dc:date>
    </item>
  </channel>
</rss>

