We are aware of email spreading and browser password scraping plugins. However, we like to scope this to stopping local self-propagation of the bot first. 3/x
1️⃣ Create host fw rules to disable SMB inbound/outbound.
2️⃣ Blow away all persistent payloads.
3️⃣ Reboot to purge in-memory payloads & free locked files
4️⃣ When all clear, remove fw rules
4/x
1️⃣ Disabling SMB is going to break authentication, file sharing, scanning devices, etc.. This approach is extreme if not very limited in time.
5/x
*Probably* not going to break anything here unless these worms change their TTPs.
6/x
Another concern is the race condition which can happen between blowing away peristence & the reboot. Would love to hear your thoughts here (delete on reboot?) 7/x
Business operations may change this priority though. That said, I think this step might be case-by-case. 9/x
Probably endless other scenarios. Would ❤️ your thoughts on enumerating the most common/risky ones. 11/x
I only ask you to refrain from “you should wipe every host” comments. We know this the right answer in theory. However, security in practice is a separate beast. 12/12
Thanks you so much #infosec!