Page 15 - CSI - Cisco Security Instroduction - BT
P. 15

Timeline of ‘WannaCry’ Ransomware Defense







                    Microsoft Security Bulletin                Cisco NGFW | Meraki MX                     Shadow Brokers                             Cisco NGFW | Meraki MX
                    March 14th, 2017                           March 14th, 2017                           April 14th, 2017                           April 25th, 2017


                    On March 14th, Microsoft                  On the same day, Cisco Talos released       A group known as “The Shadow Brokers”      Talos releases Snort™ signatures #42329,
                    released a patch (MS17-010)               Snort™ signature #41978 to detect           released a set of vulnerabilities allegedly sourced  #42332, #42340 for Double Pulsar and
                    for a new SMB vulnerability.              vulnerabilities identified in MS17-010.     from the National Security Agency (NSA) that go  Anonymous SMB shares.
                                                                                                          by the names of Eternal Blue and Double Pulsar.


















             Cisco TALOS
                                              Cisco Umbrella                      Cisco AMP                           Cisco Umbrella                       Cisco Investigate
          With more than 250 world class      May 12th, 2017 | 10:12 UTC          May 12th, 2017 | 9:33 UTC           May 12th, 2017 | 7:43 UTC            May 12th, 2017 | 7:30 UTC
          researchers around the globe
          and a global network of             Cisco Umbrella adds attribution of the attack  Approximately 60 minutes after the first   Cisco Umbrella pushes kill switch domain  @MalwareTechBlog releases information
                                              type to ransomware and moves the kill switch  seen samples, AMP detected the  globally into Newly Seen Domains categories  about a new attack dubbed ‘WannaCry’ on
          intelligence and data sources,      domain to the malware category.     ransomware. Threat was detected via   which resulted in protection against the  Twitter and his blog.
          Cisco continues to monitor,                                             automatic analysis rules and low prevalence  ransomware and spreading of the worm.
                                                                                  methods.                                                                 Cisco Investigate screenshot was included in
          research, and protect customers                                                                                                                  the blog as it was used as a part of the
                                                                                  AMP successfully detected and blocked on                                 intelligence collection and discovery.
          against ‘WannaCry’ and other                                            endpoints, email and web gateways, and
          emerging threats.                                                       network security.




          18
   10   11   12   13   14   15   16   17   18   19   20