Download presentation
Presentation is loading. Please wait.
Published byAnnice Annabella Craig Modified over 6 years ago
1
Patching 3rd Party Apps in SCCM & Much More!
Defeating Ransomware Patching 3rd Party Apps in SCCM & Much More! Duncan McAlynn Sr. Solution Specialist HEAT Software
2
Duncan McAlynn HEAT Software Twitter Handle dmc_heat
Awards, accomplishments, etc. 6x MVP, CISSP, MCSE, MCSA, MCITP Experience 20yrs SMS/SCCM Consulting Favorite something; e.g., food Guns, BBQ, Kayaking & Photography @dmc_heat
3
Advisory from MMS Staff:
“Start off with a splash if you can. Hit a demo as early on or show an exciting end-state as an enticement if you can” @dmc_heat
4
Need a hashtag? #makes_IThappen! @dmc_heat
5
Randsomware An introduction @dmc_heat
6
Randsomware is not new! Trivia question:
When did we see the first ransomware? @dmc_heat
7
Randsomware is not new! Trivia question:
When did we see the first ransomware? Answer: AIDS/PC Cyborg 1989! @dmc_heat
9
@dmc_heat
10
Ransom32 Cryptowall Cryptolocker JIGSAW SAMSAM MAKTUB Locker Tox
Reveton Maktu Blocker Dogstectus JIGSAW CERBER Rokku KeRanger Cryptowall Petya Tesla Crypt Locky Radamant Samas @dmc_heat
11
Ransomware Delivery Channels & Mechanics @dmc_heat
12
Drive-By Delivery Channel Example
User visits a website using Internet Explorer (user agent string) User has a vulnerable plug-in installed like Adobe Flash or MSFT Silverlight Infected website (or ad network) uses Angler to deliver ransomware and execute it on the user’s machine Not opening malicious files Not falling for phishing attacks The user has simply visited a website! ALL IT REQUIRES IS HAVING A VULNERABLE PLUG-IN ON THE MACHINE! @dmc_heat
13
Example: Adobe Security Advisory
@dmc_heat
14
Ransomware The Impact @dmc_heat
15
Tweksbury, MA Police Department
“The cyberattack on Tewksbury police proved so sophisticated that specialists from federal and state law enforcement agencies — plus two private Internet security firms — could not unscramble the corrupted files. After five days of desperate efforts to unlock it, Tewksbury police decided to pay the anonymous hacker the $500.” – Boston Globe @dmc_heat
16
Hollywood Presbyterian Medical Center
“The malware locks systems by encrypting files and demanding ransom to obtain the decryption key. The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” [Chief Executive Allen Stefanek] said. “In the best interest of restoring normal operations, we did this.” – Los Angeles Times @dmc_heat
17
Ransomware Defensive Measures @dmc_heat
18
Defensive Measures Backups & Recovery
What if you backup encrypted files? Backups can be overwritten by encrypted files Version backups and rotation strategy How many do you have? How long will it take? Can you restore to normal? Can you retrieve the one that is pre- ransomware? Be cautious of VSS/Veeam backups Disconnect USB-based devices after backup @dmc_heat
19
Defensive Measures Anti-Virus Required but not the magic bullet
Vendors are always playing catch up Easy to change signature But becoming more behavioral-based Use recommended exclusions list for Microsoft server products: contents/articles/953.microsoft-anti- virus-exclusion-list.aspx EICAR Test File @dmc_heat
20
Defensive Measures Other approaches Application whitelisting
Device control Advanced Windows features @dmc_heat
21
Defensive Measures (Con’t)
Use Least Required Privileges Limit Network Drive Access Keep OS, Office, IE up-to-date with Windows Update or SCCM/WSUS Include 3rd Party Updates without Exception
22
Defensive Measures (Con’t)
Use Least Required Privileges Limit Network Drive Access Keep OS, Office, IE up-to-date with Windows Update or SCCM/WSUS Include 3rd Party Updates without Exception
23
MS Security Bulletins (Comparative)
Missing the Forest for the Trees Microsoft vulnerability share: 15.31% 2015 6.43% 2014 9.83% 2013
24
What’s The Solution? Frankly, there isn’t one. But, let’s
#makes*IThappen anyhow!
25
Just like Defense-in-Depth… Multi-Pronged Approach
26
Combine Native, MSFT/Community Add-Ons with 3rd Party Solutions
27
SCCM, Microsoft Security Compliance Manager, & HEAT Software PatchLink
(With a couple tidbits thrown in for good measure!)
28
Summary
29
And Then …
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.