Hello,
I just got hit with Cryptowall 3.0 on Friday and SEP on the infected workstation didn't prevent the attack until it started to detect help_decrypt.txt .png .html files. The endpoint client was up-to-date so I'm not sure why this happened. Wasn't Sophos AV suppose to prevent such malware behaviour from fully executing? Did anyone encounter the same thing?
FYI, Cryptowall managed to delete my shadow copy but luckily I do have backups.
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
one of the best defenses against cryptowall is to NOT run as admin. if you do that then your shadow copies are safe and you also have your backups..[:)]
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
Or... Endpoint could do its job as well and help prevent infection.
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
it does if you configure your workstation correctly. If you are running as admin there's nothing anything can do to totally protect you.
OPNSense 64-bit | Intel Xeon 4-core v3 1225 3.20Ghz
16GB Memory | 500GB SSD HDD | ATT Fiber 1GB
(Former Sophos UTM Veteran, Former XG Rookie)
Well obviously, yes. However, the failure of Endpoint not even catching it or warning about it is bad. Configured workstations with decent anti-virus can and will still catch things like this. My point was specifically failure on the virus engine part, not about the configuration of a computer.
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
Or... Endpoint could do its job as well and help prevent infection.