SonicWall Cloud GMS Launches for Managed Service Providers: Protect More. Fear Less.

On May 1, 1969, Joni Mitchell released her album, Clouds. In Both Sides Now, she penned these lyrics about the enigmatic nature of clouds:

I’ve looked at clouds from both sides now
From up and down and still somehow
It’s cloud’s illusions I recall
I really don’t know clouds at all

Exactly forty-eight years later, on May 1, 2017, SonicWall proudly launches Cloud GMS, the Global Management System for its next-generation firewalls.  Then as now, the cloud is enigmatic:  how do you know if a cloud management is right for your business?  The good news is that SonicWall gives you freedom of choice by offering both cloud and on-prem versions of GMS.  Keep reading and we will look at the cloud from both sides now.

First, cloud’s usage-based subscription model has financial advantages because of its zero upfront capital expense, which eliminates the barrier to entry for capital-constrained budgets.  Secondly, cloud’s pay-as-you-grow model enables businesses to scale painlessly because growth occurs by cloud-driven increases in cash flow with no outlays for more infrastructure.  Lastly, cloud equals simplicity, with no updates and fewer maintenance headaches for limited IT staff.

But cloud is not a clear-cut alternative to on-prem IT infrastructure for every business. There are many factors that should be considered.  First, cloud services are often geographically dispersed, whereas data privacy restrictions such as the European Union’s General Data Protection Regulation (GDPR) requires local access of data for security and compliance reasons.  Second, cloud services use shared resources with other businesses and that may cause sleepless nights for some IT managers who prefer direct control of infrastructure.  Lastly, cloud services are remote and susceptible to latency- or bandwidth-related issues.

The real value of technology is to make the business work in ways that maximize its growth and profitability. This means enabling the business to move in new directions to capture more customers, or to keep up with the market by out-competing the competition.  Whether you choose cloud or on-prem, GMS makes your business work better by enabling resellers to transform into managed service providers.  Or in the case of managed service providers who don’t yet have GMS, to increase operational efficiencies.  In both cases, businesses can increase their top line while improving their bottom line.  We invite you to learn more about the MSP practice in A Lucrative Opportunity in Managed Security Services and Cloud GMS in Integrating Global Management of Network Security.  If you are SonicWall Partner, start a free trial of Cloud GMS now by logging in to and clicking the Try button for Cloud GMS.

BIND Control Channel Denial of Service

BIND (Berkeley Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. It is maintained by ISC (Internet Systems Consortium).

A denial-of-service vulnerability exists in BIND named service, as described by ISC:

BIND 9.11.0 introduced a new option to allow “read only” commands over the command channel. Using this restriction, a server can be configured to limit specified clients to giving control channel commands which return information only (e.g. “rndc status”) without affecting the operational state of the server. The defect described in this advisory, however, is not properly stopped by the “read only” restriction, in essence permitting a privilege escalation allowing a client which should only be permitted the limited set of “read only” operations to cause the server to stop execution.

The vulnerability has been assigned as CVE-2017-3138. A remote, authenticated attacker can exploit this vulnerability by sending a crafted control channel message. Successful attack will lead to termination of the BIND named service. Administrators are urged to upgrade BIND to latest releases.

Sonicwall provides protection against this threat via the following signature:

  • IPS sid:12732 “ISC BIND rndc Control Channel DoS”

Hidden-Tear Kit gives birth to Karmen Ransomware

The SonicWall Threats Research team have recently been tracking a ransomware family known as Karmen. As expected, this ransomware encrypts various files on the system using the AES-256 encryption protocol rendering the files inaccessible until payment is made to the operators. Karmen is reported to be derived from an open source malware project hosted on github.com called Hidden Tear. Such projects make it easy for anyone to become a cyber criminal and generate malicious executable modules that can be used to infect machines on the internet. The first reported infections of this ransomware date back as far as December 2016.

Infection cycle:

The Trojan immediately reports the infection to a remote key server and sends a pregenerated unique ID:

The response is a Bitcoin payment address.

It also makes the following request to retrieve the Bitcoin ransom amount,

It then requests to download the Karmen decrypter program [Detected as GAV: Karmen.RSM_2 (Trojan)]:

Once run, it displays the following window:

The Trojan adds the following files to the filesystem:

  • %APPDATA%LocalTempadr.txt
  • %APPDATA%LocalTempbtc.txt
  • %APPDATA%LocalTempdel.bat
  • %APPDATA%LocalTempid.txt
  • %APPDATA%LocalTemplnk.txt
  • %APPDATA%LocalTempTTX49E1.tmp
  • %APPDATA%LocalTempEeGpNYHeR2QcRuKq.exe [Detected as GAV: Karmen.RSM_2 (Trojan)]

The dropped text files contain the following data:

  • adr.txt
    • 3A1zX8Vt1WUfxLtAnoo33Zk2Ebikig3RU2
  • btc.txt
    • 0.33
  • del.bat
    • @echo off
      taskkill /f /im EeGpNYHeR2QcRuKq.exe
      del %APPDATA%LocalTempEeGpNYHeR2QcRuKq.exe
      del %APPDATA%LocalTemplnk.txt
      del %APPDATA%LocalTempbtc.txt
      del %APPDATA%LocalTempadr.txt
      del %APPDATA%LocalTempdel.bat
  • id.txt
    • bcjytJMY2daB09
  • lnk.txt
    • http://195.3.144.69/

The Trojan periodically sends the following request to the key server:

SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:

  • GAV: Karmen.RSM (Trojan)
  • GAV: Karmen.RSM_2 (Trojan)

SonicWall SMA OS 8.6 Delivers Seamless Remote Access Using Web-based Access Methods

Smartphones, laptops and internet connectivity have become necessities of life. We move around with powerful computing devices in our pockets or backpacks. This “on-the-go” lifestyle has transformed the way we work. Employees today want on demand access to resources and the ability to be productive from anywhere.  Organizations too are embracing cloud and mobile, and allowing employees to use their personal devices for work. This is a win-win situation for employees and organizations but also a big challenge for IT departments. IT has the daunting task of providing secure access to corporate resources without exposing risks such as:

  • Unauthorized users gaining access to company networks and systems from lost or stolen devices
  • Malware and ransomware infected devices acting as a conduit to infect company systems
  • Interception of company data in-flight on unsecured public WiFi networks
  • Loss of business data stored on devices if rogue personal apps or unauthorized users gain access to that data
  • The ability to react as quickly as possible to minimize the window of exposure before an attacker can potentially cripple the organization

To address these risks and empower IT, SonicWall Access Security (SMA) solutions with policy-enforced SSL VPN deliver seamless remote access with the highest standards of security. SMA OS 8.6 expands the feature set on the Secure Mobile Access (SMA) 100 Series appliances with enhanced security and intuitive features that deliver the best experience for remote access.

  • Microsoft RD Web Access integration – Admins can now select to offload applications on the RD Web Access portal, onto any web browser. This new feature provides users with seamless access to remote desktops and applications through web browsers.
  • Enhanced security – SMA uses an in-house connect agent to establish a secure connection for RD Web Access without needing to set up a VPN tunnel. The agent has no dependency on Java or Active X.
  • Driverless printer redirection –Print files from remote desktops seamlessly, just like printing a local file. Files on remote desktops can be published as a PDF on your local machine and can be printed locally.
  • Modernized UI – A refreshed UI that is even more intuitive for users and admins. The firmware conforms to the new SonicWall branding guidelines.

Customers with an active support contract can download SonicWall SMA OS 8.6  from mysonicwall.com.

Shadowbroker releases alleged NSA EquationGroup Exploit Code Dump (Easter Egg) on Good Friday, 4/14/2017.

The Sonicwall Threats Research team is actively researching the exploit and malware code released on Good Friday, (4/14/2017), by an anonymous group calling itself “Shadowbroker”, which claim to have stolen the cache of code and documents from a hacking team within the United States National Security Agency (NSA). We are creating this SonicAlert to update our customers about the security measures we are putting into place to protect against these newly disclosed threats.

On the same day as the Shadowbroker release, Microsoft published a blog to reassure Microsoft customers that:
“Most of the exploits that were disclosed fall into vulnerabilities that are already patched in our supported products. Below is a list of exploits that are confirmed as already addressed by an update. We encourage customers to ensure their computers are up-to-date.” (Microsoft Security Response Center)

FuzzBunch Exploitation Framework

Included in the released files are a set of executables and scripts that together form a custom-built, exploitation framework called “fuzzbunch”. The framework is launched from ‘fb.py’ and looks like the following below.

This particular exploit being shown is the “EternalBlue” exploit that exploits SMB protocol, and uses Doublepulsar payload. It requires that the attacker can reach the target at TCP/445. In practice this means that the attacker is already on the same LAN, or the target’s LAN is reachable through open ports from the attacking machine. As mentioned in the Microsoft blog (above) this attack is already patched by MS17-010.

1. Running and configuring the exploit framework:

2. Loading with Eternalblue Module, and Executing the SMB exploit:

3. Loading Doublepulsar payload and sending Pinging the installed backdoor:

4. This is the Windows 7 target process (PID 4) that has been compromised:

SonicWALL Intrusion Prevention Service (IPS) provides protection against the following threats:

  • EternalBlue,EternalSynergy,EternalRomance: (IPS:12700,12700,12792,12794,12786,12787,12801,12800, 12795, 12796 )
  • EmeraldThread (IPS:5691)
  • EducatedScholar (IPS:4555,2032)
  • EclipsedWing (IPS:5777,1250)
  • EternalChampion (IPS :12786,12787)
  • EsteemAudit (GAV: CVE-2017-9073)

SonicWALL Gateway Anti-Virus (GAV) provides the following protections:

  • GAV: Shadowbrokers.D (Trojan)
  • GAV: Shadowbrokers.D_2 (Trojan)
  • GAV: Shadowbrokers.A (Hacktool)
  • GAV: Shadowbrokers.A_2 (Hacktool)
  • GAV: Shadowbrokers.G (Hacktool)
  • GAV: Shadowbrokers.EG
  • GAV: Shadowbrokers.D_6
  • GAV: Shadowbrokers.D_5
  • GAV: Shadowbrokers.E
  • GAV: Shadowbrokers.C1_3
  • GAV: Shadowbrokers.C1
  • GAV: Shadowbrokers.DZ
  • GAV: Shadowbrokers.A_4
  • GAV: Shadowbrokers.D_4

The Seven Habits of Highly Effective Ransomware Attacks

In 2016, SonicWall detected a 600% growth in ransomware families. We saw a wide range of ransomware forms and attack vectors in the 2017 Annual Threat Report; some successful, others not so much.  So, what is at the core of any successful attack? If you understand the seven components of a ransomware campaign strategy, you can better defend yourself from one of the most pernicious forms of malware in history.

1. Intelligent target research

Any good scammer knows how to find the right people in an organization to target with the right message.  Hackers know that municipal and healthcare  are a ripe choice. Even though organizations are providing awareness education, people still click on cleverly created social media posts and emails. In addition to this, hackers can go to any public lead generation database and find the right set of victims for a phishing campaign.

2. Effective delivery

Since 65 percent of ransomware attacks happen through email, a scammer can easily send that infected attachment to someone in accounts payable claiming it is an unpaid invoice.  A similar attack brought BWL of Lansing, Michigan to its knees for two weeks and cost the utility provider around $2.4M USD. Secondly, developing sensationally titled social media posts with a farfetched photo are great at funneling people to infected web destinations, which make up roughly 35 percent of successful attacks.

3. Good code

Because companies are bolstering their security strategy, attackers should focus on ways of circumventing this.  First, aggressive hackers update their code frequently to get past signature-based counter-measures.  Second, the code should have several built-in evasion tactics to sneak past advanced defenses such as network sandboxes.  Cerber’s code provides a great example for other attackers to model. Malicious code authors are hoping the target does not deploy a multi-engine sandbox like SonicWall Capture Advanced Threat Protection, which is much more difficult to evade. Third, the code should worm from system to system to create as much havoc as possible and therefore increase the potential payoff.

4. Great understanding for infected systems

Any good hacker will know what he/she has infected and thereby ask for an appropriate ransom.  Endpoints such as a laptop are worth $1K, servers $5K and critical infrastructure as high as hundreds of thousands of dollars.  Hackers hope that their targets do not have segmented networks so they can infect multiple systems within a single attack. They also rely on inconsistent backups for a higher customer conversion rate.

5. Patience & persistence

In order for organizations to stay safe from an effective attack, they have to be right all the time.  For the attackers, they have to be right just once.  Although awareness, security, and consistent backups are the essential ingredients to ransomware defense, they are not perfect.  This is why good hackers keep trying, repackaging code into different delivery mechanisms and exploit kits.

6. Good customer support

The best ransomware variants have good customer support channels. Attackers use them to negotiate with victims and assure them that they will get their data back if they pay.

7. Good payment management

Although other ransomware variants have used other forms of payment, bitcoin is still the best choice. Bitcoin is easier to obtain and exchange, so ransomware attacks have a higher payout ratio against consumers with infected endpoints. To mitigate bitcoin wallet compromise, hackers will rotate the associated email address with a specific wallet, which also pressures victims to pay quicker.

I hope that you will be able to read these notes to understand what is in the mind of an attacker possibly targeting your industry or organization.  Use these tips to develop a good anti-ransomware and malware strategy.  For more information, please watch this webcast How To Protect Your Organization From Ransomware.

The Android banker Marcher continues to evolve

The Android banker malware – Marcher has been active since late 2013. It started as a stealer for Google Play credentials and credit card data but its goals and targets have shifted over time. SonicWall Threats Research team observed an instance of Marcher with a new notification screen on an infected device which shows signs of a potential new component to its functionality.

Refresher on Android Marcher

As stated earlier, Marcher has been active since late 2013 and has been part of a number of campaigns in different countries. Marcher continues to evolve from the days of its inception, below are few additions that have been observed over the years:

  • Started off as a Google Play credentials and Credit Card data stealer
  • Added the functionality to steal banking credentials by showing a fake login screen
  • Initially targeted German banks but later on banks from France and Australia were also targeted
  • Apart from spam and rogue SMS messages recently Marcher started spreading via porn websites
  • Along with banks few Marcher strains targeted popular Android apps like Whatsapp, Viber and Facebook
  • Amidst the popularity of Mario Run, it masqueraded as the Mario Run app for Android

Infection Cycle

The permissions requested by marcher have been more or less the same:

  • write_settings
  • get_tasks
  • access_network_state
  • uses_policy_force_lock
  • change_network_state
  • write_sms
  • call_phone
  • system_alert_window
  • internet
  • send_sms
  • vibrate
  • access_wifi_state
  • change_wifi_state
  • receive_boot_completed
  • wake_lock
  • read_contacts
  • read_sms
  • read_phone_state
  • receive_sms

Once installed and executed the app vanishes from the app drawer but there are three services which keep running in the background on the infected device:

  • FDService
  • GPService
  • PermissionsService


These services perform the following activities:

  • Request for Administrator access once the app is executed
  • Monitor the device and ensure that few hardcoded security apps are not running on the device, the following apps were monitored for the sample we analyzed:
    • CM Security Master App Lock – com.cleanmaster.security
    • Clean Master – Antivirus – com.cleanmaster.mguard
    • CCleaner – com.piriform.ccleaner
    • CM Speed Booster – com.cleanmaster.boost
    • Anti-virus Dr.Web Light – com.drweb
    • 360 Security – Antivirus Boost – com.qihoo.security
    • Kaspersky Antivirus & Security – com.kms.free
    • Mobile Security & Antivirus – com.eset.ems2.gp
    • 360 Security Lite – com.qihoo.security.lite
    • Norton Security and Antivirus – com.symantec.mobilesecurity
    • DU Speed Booster & Cleaner – com.dianxinos.optimizer.duplay

  • Display fake Google password screen and credit card screen to steal data from the victim, this component did not work for the sample we analyzed
  • Download fake login screen whenever a targeted banking app is executed. This feature did not work as well as the domain hosting these fake pages – rittar.com/ppcas82 – appears to be offline at the time of writing this blog

There are few receivers in the app which constantly monitor for few key events, once these events occur a specific action is performed. Most of the behavior is similar to older Marcher apps apart from one specific action:

  • The event of boot completion (android.intent.action.BOOT_COMPLETED) is monitored by com.constre.BootReceiver. This service ensures that upon every boot the three main services mentioned above are started, thereby ensuring malicious parts of the app are started as soon as the device boots up
  • The event of receiving an SMS (android.provider.Telephony.SMS_RECEIVED) is monitored by com.constre.SmsReceiver_ receiver. This malware is capable of executing commands that it receives via SMS messages
  • The event of enabling and disabling device administrator privileges (android.app.action.ACTION_DEVICE_ADMIN_DISABLE_REQUESTED and android.app.action.DEVICE_ADMIN_ENABLED, android.app.action.DEVICE_ADMIN_DISABLED) is monitored by com.constre.AdminReceiver. This receiver ensures that device admin piviledges are provided to the app at all times, if we try to disable the device admin privileges from the settings we see something new for Marcher.

    We are shown a screen which says that disabling the device admin privileges will lead to a phone reset. Phone reset or factory reset essentially wipes all the apps installed by the user, in other words it puts the phone back to ‘factory’ state i.e. just like when the user got the new device. If we click on ‘ok’ we see an additional screen stating that “System applications could not be removed”:

Device Admin and Marcher

Traditionally Android marcher samples have requested for device admin privileges. One of the main reasons malware request for this permission is to make it difficult for victims to remove the app from the device as the uninstall button gets greyed out in the settings. This new instance of Marcher takes this up a notch by threatening the victim that the phone will be reset to factory setting if the device admin rights are revoked. This forces the victim to think twice before uninstalling the app.

Revoking the admin rights does not reset the device in this case as it is just a bluff. However the screen which requests for admin rights keeps popping up thereby making it extremely annoying to use the device. Upon examination we saw an xml file named device_admin_new.xml which contains the strings that are seen in the screen mentioned above. Most of the older Marcher samples do not have this file, they just have the file named device_admin.xml

We said “most of the older” samples in the statement above as we did find few old samples with the same file device_admin_new.xml, however we did not see the same screen when we tried to remove the device administrator rights:

  • com.inggn (cc333988a21bf08a7b2a92daffe8a64e) has device_admin_new.xml but does not work as it does in the latest sample. We just see an overlay screen that asks for credit card details as soon as the malware is executed leaving us unable to do anything else
  • com.construct (ecae04f1367902abc89d3e1e5e6d360a) also has device_admin_new.xml but we were easily able to revoke the admin rights without seeing any additional screen

It looks like this feature was planned but never implemented till now, the worrying bit is the content displayed which states that the phone would be reset to factory state. It is possible that in the near future we see Marcher samples that are actually capable of resetting the device. Currently Marcher is know for stealing user sensitive data from an infected device but the capability of resetting a device will add a destructive force to Marcher.

SonicWall provides protection against multiple variants of this threat via the signatures below:

  • GAV: AndroidOS.Marcher.DAN (Trojan)
  • GAV: AndroidOS.Marcher.ADMR (Trojan)

Marcher with new device rese
t related screen:

  • com.constre – 898557907598665a203b50f833abc26c

Marcher samples that have device_admin_new.xml but do not show the same behavior:

  • com.inggn – cc333988a21bf08a7b2a92daffe8a64e
  • com.construct – ecae04f1367902abc89d3e1e5e6d360a

The following banks are targeted in the analyzed app:

  • Commonwealth bank of Australia – com.commbank.netbank
  • Westpac Mobile Banking – org.westpac.bank
  • St.George Mobile Banking – org.stgeorge.bank
  • BankSA Mobile Banking – org.banksa.bank

Recent Microsoft Office Zero Day (CVE-2017-0199) attacks spotted in the wild (Apr 13, 2017)

Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka “Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API.”

The attack comes in the form of malicious word document with embedded malicious link in the objautlink object. The objautlink in rtf is an object type of OLE autolink. This link tries to connect to the attacker’s webserver, and downloads malicious script.

Decoding the rtf files gives you the url(s) the attacker is trying to connect to.

The original rtf data:

Decoded to hex which further gives the URL:

Another example:

The malicious script:

SonicWALL Threat Research Team has researched this vulnerability and released following signature to protect their customers.

  • SPY 1446 :Malformed-File rtf.MP.17
  • GAV: CVE-2017-0199.A

Decryption Wars: The Cyber Arms Needed to Fight the Dark Side of Encryption

For those following along, over the past two months there have been several reports, warnings, blogs and other industry analyses suggesting that HTTPS inspection by security companies is actually weakening security.  Those that know me well know that I am a huge proponent of performing HTTPS inspection.  I found myself arguing against the recommendations of various advisories that suggest the very thing I have been saying, or rather preaching, for the past several years was now bad.

To start at the beginning, I suggest you examine the root of this challenge: the HTTPS traffic and why it is what it is.  There are several reasons why we all wound up surfing an encrypted internet, and while some would blame various breaches, scandals and/or privacy concerns, the result is the same.  The vast majority of the sites that we surf on the internet today are encrypted.  This rightly includes things like banking and e-commerce sites, but it also includes all things social media and web mail. Even a simple internet search is now encrypted within an HTTPS session.  Some would argue explicitly and indefinitely that this is a great leap forward for privacy and that of course would include the bad guys.

That’s right, in this mad rush to encrypt the internet we have seemingly encrypted all the threats that go along with it.  In fact, if you really think about it, every major breach in the past five years either leveraged malicious payload inside the encrypted communication or was carried out against encrypted traffic.  This of course includes attacks such as spear phishing and ransomware embedded in encrypted webmail.  Here a few of the stories that recently got a lot of press:

  • The OPM Breach, March 2014 – resulted in approximately 18 million people having their personal information (including background data on individuals possessing classified and top secret clearances) leaked all over the web. The breach occurred because internal OPM employees were compromised when accessing their personal webmail accounts through malicious attachments, which were obviously encrypted and thus went uninspected.
  • The breach of the DHS, FBI and Justice Department of the United States, February, 2016 – when nearly 30,000 agents had their personal information leaked online due to a single compromised email account.
  • Snapchat breaches (yes, plural: two big ones – 2014 and 2016) – these breaches resulted in millions of users as well as Snapchat employees having their personal details released.
  • My favorite, the Ashley Madison Breach, 2015 – caused by a spear phishing campaign that resulted in a brand new, perfect hit list of only 37 million users.
  • The IRS Breach (I know, there are a few to choose from) in 2015 – exposed over 700,000 Social Security numbers just by normal processes embedded within the HTTPS site.
  • The Yahoo Breach, 2014 – caused by a single employee getting spear phished and resulting in leaking of over 1 billion accounts, passwords, and secret question information.

Again, in each of these breaches, and thousands more I didn’t list, the attack was carried out by either compromising the actual encryption of the sites of these companies, or by delivering malicious content through typically encrypted communications like webmail and social networking sites.  The baffling part is that the vast majority of these breaches could have been prevented by proper security procedures, certainly some end user training and yes, inspecting within the encrypted communications.

Here is where things get confusing and somewhat argumentative, thus the decryption war.  In order for security vendors to inspect the encrypted connection or payloads within the encrypted session itself, they must act as a man-in-the-middle and essentially break the encrypted session between the client and the destination site or service.  That is the rub to various providers who are attempting to ensure the privacy of the end user client connection, when here comes the security vendor to break that encryption deliberately to look inside.  The providers lock it up, the security vendors break it open.

In some cases, this level of inspection is even mandated by federal law.  It’s required to block things like pornography in K-12 schools and there are serious consequences if an organization fails to do so.  I am not just talking about blocking a notorious URL of a popular site, but remember when I wrote above that even internet searches are encrypted.  Well go to your favorite search engine, select to search by images and enter the dirty word of your choice.  At this point, assuming you don’t have safe search enabled, you may be surprised at how well your search engine works to find things.  But again, if you want to keep little Timmy off those search results, HTTPS inspection is paramount.

Yes, I am sure that I will hear pushback by some that say that the privacy of end user computing is more important than keeping little Timmy off of some adult images, but let’s look at another aspect, the enterprise.

Assume the large banking institution that manages your entire life’s savings hires a new employee bent on getting rich quick.  In this economy that is not a stretch to imagine.  One day, while working late, they open a file containing the top 1,000 most lucrative accounts, including yours, and upload it to their personal cloud storage drive or webmail account that is obviously front ended by HTTPS.  How can the bank’s data leakage policies be effective if they can’t inspect inside the HTTPS traffic?

Another example you say?  Okay, what about a harmless little scenario including a small county government.  Believe it or not the county and municipal networks have a lot of personal identifiable information that may pertain to you.  Maybe county records, medical information, employment records or even tax information.  Let’s assume an employee of the county falls for a spear phishing scam in their email or instant message application that unlocks and exflitrates all of the information about you that should have been safeguarded.  Are you okay with that?

The truth is simple.  If you are not inspecting your encrypted communications, then you are essentially blind to more than sixty-five percent of your overall internet usage.  Think about that.  To put that math into simple numbers, if you have a 100 Mbps Internet connection, then on average you may have 65 Mbps that you are not safeguarding.  That equates to roughly seven full length DVDs worth of data an hour.  So, the real question you should be asking is, “Do I feel lucky?”

In the defense of the data providers, there is a point of responsibility on behalf of the security vendors to ensure that they while they are inspecting and performing as a man-in-the-middle, they are not weakening the overall encryption level of the connection.  Meaning they cannot substitute stronger forms of encryption with weaker forms and subsequently some of the various security vendors are in fact, doing this.  However, from the security vendor perspective it is absolutely absurd that any network should inherently trust providers.  This applies directly to various providers from rushing out new forms of encryption that the security industry cannot yet inspect or protect.  The only result will be allowing more threats into the network.  I am sorry, providers, I refuse to simply trust you completely when it is readily proven that you are not always 100% secure.  With that, I will always inspect my encrypted traffic, and as a seasoned cyber warrior, I will always err on the side of caution.

Trust, but verify. 

Download a Solution Brief: Best Practices for Stopping Encrypted Threats

Microsoft Security Bulletin Coverage (March 14, 2017)

SonicWall has analyzed and addressed Microsoft’s security advisories for the month of March, 2017. A list of issues reported, along with SonicWall coverage information are as follows:

MS17-006 Cumulative Security Update for Internet Explorer (4013073)

  • CVE-2017-0008 Internet Explorer Information Disclosure Vulnerability
    IPS:12615 “Internet Explorer Information Disclosure Vulnerability (MS17-006)”
  • CVE-2017-0009 Microsoft Browser Information Disclosure Vulnerability
    IPS:12616 “Microsoft Browser Memory Corruption Vulnerability (MS17-006)”
  • CVE-2017-0012 Microsoft Browser Spoofing Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0018 Internet Explorer Memory Corruption Vulnerability
    IPS:12617 “Internet Explorer Information Disclosure Vulnerability (MS17-006) 2”
  • CVE-2017-0033 Microsoft Browser Spoofing Vulnerability
    IPS:12618 “Microsoft Browser Spoofing Vulnerability (MS17-006)”
  • CVE-2017-0037 Microsoft Browser Memory Corruption Vulnerability
    IPS:12620 “Microsoft Browser Memory Corruption Vulnerability (MS17-006) 2”
  • CVE-2017-0040 Scripting Engine Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0049 Scripting Engine Information Disclosure Vulnerability
    IPS:12621 “Scripting Engine Information Disclosure Vulnerability (MS17-006)”
  • CVE-2017-0059 Internet Explorer Information Disclosure Vulnerability
    IPS:12658 “Internet Explorer Information Disclosure Vulnerability (MS17-006) 3”
  • CVE-2017-0130 Scripting Engine Memory Corruption Vulnerability
    IPS:12664 “Scripting Engine Memory Corruption Vulnerability (MS17-006)”
  • CVE-2017-0149 Microsoft Internet Explorer Memory Corruption Vulnerability
    IPS:12666 “Internet Explorer Memory Corruption Vulnerability (MS17-006)”
  • CVE-2017-0154 Internet Explorer Elevation of Privilege Vulnerability
    IPS:12669 “Internet Explorer Elevation of Privilege Vulnerability (MS17-006)”

MS17-007 Security Update for Microsoft Edge (4013071)

  • CVE-2017-0009 Microsoft Browser Information Disclosure Vulnerability
    IPS:12616 “Microsoft Browser Memory Corruption Vulnerability (MS17-006)”
  • CVE-2017-0010 Scripting Engine Memory Corruption Vulnerability
    IPS:12622 “Scripting Engine Memory Corruption Vulnerability (MS17-007) 2”
  • CVE-2017-0011 Microsoft Edge Information Disclosure Vulnerability
    IPS:12623 “Microsoft Edge Information Disclosure Vulnerability (MS17-007)”
  • CVE-2017-0012 Microsoft Browser Spoofing Vulnerability
    There are no known exploits in the wild.”
  • CVE-2017-0015 Scripting Engine Memory Corruption Vulnerability
    IPS:12624 “Scripting Engine Memory Corruption Vulnerability (MS17-007) 3”
  • CVE-2017-0017 Microsoft Edge Information Disclosure Vulnerability
    IPS:12626 “Microsoft Edge Information Disclosure Vulnerability (MS17-007) 2”
  • CVE-2017-0023 Microsoft PDF Memory Corruption Vulnerability
    ASPY:2063 “Malformed-File pdf.MP.217”
  • CVE-2017-0032 Scripting Engine Memory Corruption Vulnerability
    IPS:4604 “HTTP Client Shellcode Exploit 1”
  • CVE-2017-0033 Microsoft Browser Spoofing Vulnerability
    IPS:12618 “Microsoft Browser Spoofing Vulnerability (MS17-006)”
  • CVE-2017-0034 Microsoft Edge Memory Corruption Vulnerability
    IPS:12672 “Microsoft Edge Memory Corruption Vulnerability (MS17-007) 2”
  • CVE-2017-0035 Scripting Engine Memory Corruption Vulnerability
    IPS:12613 “Scripting Engine Memory Corruption Vulnerability (MS17-007) 1”
  • CVE-2017-0037 Microsoft Browser Memory Corruption Vulnerability
    IPS:12620 “Microsoft Browser Memory Corruption Vulnerability (MS17-006) 2”
  • CVE-2017-0046 Scripting Engine Memory Corruption Vulnerability
    IPS:12614 “Microsoft Edge Memory Corruption Vulnerability (MS17-006) 1”
  • CVE-2017-0065 Microsoft Browser Information Disclosure Vulnerability
    IPS:12673 “Microsoft Browser Information Disclosure Vulnerability (MS17-007)”
  • CVE-2017-0066 Microsoft Browser Security Feature Bypass Vulnerability
    IPS:12674 “Microsoft Browser Same Origin Policy Bypass (MS17-007)”
  • CVE-2017-0067 Scripting Engine Memory Corruption Vulnerability
    IPS:12675 “Scripting Engine Memory Corruption Vulnerability (MS17-007) 9”
  • CVE-2017-0068 Microsoft Browser Information Disclosure Vulnerability
    IPS:6753 “Cross-Site Scripting (XSS) Attack 8”
  • CVE-2017-0069 Microsoft Edge Spoofing Vulnerability
    IPS:12678 “Microsoft Edge Spoofing Vulnerability (MS17-007)”
  • CVE-2017-0070 Scripting Engine Memory Corruption Vulnerability
    IPS:12662 “Scripting Engine Memory Corruption Vulnerability (MS17-007) 4”
  • CVE-2017-0071 Scripting Engine Memory Corruption Vulnerability
    IPS:12663 “Scripting Engine Memory Corruption Vulnerability (MS17-007) 5”
  • CVE-2017-0094 Scripting Engine Memory Corruption Vulnerability
    IPS:12665 “Scripting Engine Memory Corruption Vulnerability (MS17-007) 6”
  • CVE-2017-0131 Microsoft Edge Memory Corruption Vulnerability
    IPS:12667 “Microsoft Edge Memory Corruption Vulnerability (MS17-007) 1”
  • CVE-2017-0132 Microsoft Edge Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0133 Scripting Engine Memory Corruption Vulnerabilty
    IPS:12668 “Scripting Engine Memory Corruption Vulnerability (MS17-007) 7”
  • CVE-2017-0134 Microsoft Edge Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0135 Microsoft Edge Security Feature Bypass
    There are no known exploits in the wild.
  • CVE-2017-0136 Microsoft Edge Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0137 Microsoft Edge Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0138 Scripting Engine Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0140 Microsoft Edge Security Feature Bypass
    IPS:12670 “Microsoft Edge Same Origin Policy Bypass (MS17-007)”
  • CVE-2017-0141 Scripting Engine Memory Corruption Vulnerability
    IPS:12671 “Scripting Engine Memory Corruption Vulnerability (MS17-007) 8”
  • CVE-2017-0150 Scripting Engine Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0151 Scripting Engine Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0152 Scripting Engine Memory Corruption Vulnerability
    There are no known exploits in the wild.

MS17-008 Security Update for Windows Hyper-V (4013082)

  • CVE-2017-0021 Hyper-V vSMB Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0051 Microsoft Hyper-V Network Switch Denial of Service Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0074 Hyper-V Denial of Service Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0075 Hyper-V Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0076 Hyper-V Denial of Service Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0095 Hyper-V vSMB Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0096 Hyper-V Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0097 Hyper-V Denial of Service Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0098 Hyper-V Denial of Service Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0099 Hyper-V Denial of Service Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0109 Hyper-V Remote Code Execution Vulnerability
    There are no known exploits in the wild.

MS17-009 Security Update for Microsoft Windows PDF Library (4010319)

  • CVE-2017-0023 Microsoft PDF Memory Corruption Vulnerability
    ASPY:2063 “Malformed-File pdf.MP.217”

MS17-010 Security Update for Microsoft Windows SMB Server (4013389)

  • CVE-2017-0143 Windows SMB Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0144 Windows SMB Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0145 Windows SMB Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0146 Windows SMB Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0147 Windows SMB Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0148 Windows SMB Remote Code Execution Vulnerability
    There are no known exploits in the wild.

MS17-011 Security Update for Microsoft Uniscribe (4013076)

  • CVE-2017-0072 Uniscribe Remote Code Execution Vulnerability
    ASPY:2094 “Malformed-File otf.MP.22”
  • CVE-2017-0083 Uniscribe Remote Code Execution Vulnerability
    ASPY:2095 “Malformed-File ttf.MP.10”
  • CVE-2017-0084 Uniscribe Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0085 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0086 Uniscribe Remote Code Execution Vulnerability
    ASPY:2096 “Malformed-File ttf.MP.11”
  • CVE-2017-0087 Uniscribe Remote Code Execution Vulnerability
    ASPY:2097 “Malformed-File ttf.MP.12”
  • CVE-2017-0088 Uniscribe Remote Code Execution Vulnerability
    ASPY:2098 “Malformed-File ttf.MP.13”
  • CVE-2017-0089 Uniscribe Remote Code Execution Vulnerability
    ASPY:3447 “Malformed-File ttf.MP.14”
  • CVE-2017-0090 Uniscribe Remote Code Execution Vulnerability
    ASPY:4784 “Malformed-File ttf.MP.15”
  • CVE-2017-0091 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0092 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0111 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0112 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0113 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0114 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0115 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0116 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0117 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0118 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0119 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0120 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0121 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0122 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0123 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0124 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0125 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0126 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0127 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0128 Uniscribe Information Disclosure Vulnerability
    There are no known exploits in the wild.

MS17-012 Security Update for Microsoft Windows (4013078)

  • CVE-2017-0007 Device Guard Security Feature Bypass Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0016 SMBv2/SMBv3 Null Dereference Denial of Service Vulnerability
    IPS:12599 “Windows SMB Tree Connect Response DoS 2”
  • CVE-2017-0039 Windows DLL Loading Remote Code Execution Vulnerability
    IPS:12612 “Windows DLL Loading Remote Code Execution Vulnerability (MS17-012) 1”
  • CVE-2017-0057 Windows DNS Query Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0100 Windows COM Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0104 iSNS Server Memory Corruption Vulnerability
    There are no known exploits in the wild.

MS17-013 Security Update for Microsoft Grap
hics Component (4013075)

  • CVE-2017-0001 Windows GDI Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0005 Windows GDI Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0014 Windows Graphics Component Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0025 Windows GDI Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0038 Windows Graphics Component Information Disclosure Vulnerability
    ASPY:1383 “Malformed-File emf.MP.12”
  • CVE-2017-0047 Windows GDI Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0060 GDI+ Information Disclosure vulnerability
    ASPY:4990 “Malformed-File emf.MP.10”
  • CVE-2017-0061 Microsoft Color Management Information Disclosure vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0062 GDI+ Information Disclosure Vulnerability
    ASPY:4991 “Malformed-File emf.MP.11”
  • CVE-2017-0063 Microsoft Color Management Information Disclosure vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0073 Windows GDI+ Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0108 Graphics Component Remote Code Execution Vulnerability
    ASPY:4992 “Malformed-File ttf.MP.9”

MS17-014 Security Update for Microsoft Office (4013241)

  • CVE-2017-0006 Microsoft Office Memory Corruption Vulnerability
    ASPY:4493 “Malformed-File psd.TL.1”
  • CVE-2017-0019 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0020 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0027 Microsoft Office Information Disclosure Vulnerability
    ASPY:1360 “Malformed-File xls.MP.55”
  • CVE-2017-0029 Microsoft Office Denial of Service Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0030 Microsoft Office Memory Corruption Vulnerability
    ASPY:1368 “Malformed-File doc.MP.43”
  • CVE-2017-0031 Microsoft Office Memory Corruption Vulnerability
    ASPY:1368 “Malformed-File doc.MP.43”
  • CVE-2017-0052 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0053 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0105 Microsoft Office Information Disclosure Vulnerability
    ASPY:4996 “Malformed-File rtf.MP.16”
  • CVE-2017-0107 Microsoft SharePoint XSS Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0129 Microsoft Lync for Mac Certificate Validation Vulnerability
    There are no known exploits in the wild.

MS17-015 Security Update for Microsoft Exchange Server (4013242)

  • CVE-2017-0110 Microsoft Exchange Server Elevation of Privilege Vulnerability
    There are no known exploits in the wild.

MS17-016 Security Update for Windows IIS (4013074)

  • CVE-2017-0055 Microsoft IIS Server XSS Elevation of Privilege Vulnerability
    There are no known exploits in the wild.

MS17-017 Security Update for Windows Kernel (4013081)

  • CVE-2017-0050 Windows Kernel Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0101 Windows Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0102 Windows Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0103 Windows Registry Elevation of Privilege Vulnerability
    There are no known exploits in the wild.

MS17-018 Security Update for Windows Kernel-Mode Drivers (4013083)

  • CVE-2017-0024 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0026 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0056 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0078 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0079 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0080 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0081 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2017-0082 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.

MS17-019 Security Update for Active Directory Federation Services (4010320)

  • CVE-2017-0043 Microsoft Active Directory Federation Services Information Disclosure Vulnerability
    There are no known exploits in the wild.

MS17-020 Security Update for Windows DVD Maker (3208223)

  • CVE-2017-0045 Windows DVD Maker Cross-Site Request Forgery Vulnerability
    There are no known exploits in the wild.

MS17-021 Security Update for Windows DirectShow (4010318)

  • CVE-2017-0042 Windows DirectShow Information Disclosure Vulnerabitliy
    GAV:12611 “Kovter.A_311”

MS17-022 Security Update for Microsoft XML Core Services (4010321)

  • CVE-2017-0022 Microsoft XML Core Services Information Disclosure Vulnerability
    IPS:12610 “Microsoft XML Information Disclosure Vulnerability (MS17-022)”