MHi there,

On Fri, 11 Sep 2020, Wirth Ervin via clamav-users wrote:

I was looking after "Does ClamAV catch WannaCry malware?" on Google,
but I haven't found any significant answer about this.

The answer to your question is probably "yes, with qualifications".

One of those qualifications is that you haven't said how the malware
might be delivered to the systems which you're concerned about.  If
ClamAV doesn't get to see the malware before it gets onto the systems
then it won't be able to do anything about it.  At least on Windows,
ClamAV has no way to catch things on the fly and it behaves a bit like
the free version of a MalwareBytes product.  You need to scan anything
which might be suspect before you put it on the potentially vulnerable
computer.  If you're going to surf random Websites using a vulnerable
OS or browser, ClamAV isn't going to offer any security at all.

About the time that WannaCry was really active, I came across several
USB sticks in a drawer in a workshop on a client's premises.  Any one
of them could have taken down the CNC plasma cutter, for which they'd
recently paid eighty grand.  It was still running Windows XP, and its
manufacturer had neither installed anti-virus software nor changed the
firewall settings from the XP defaults.  About the best I could do was
try to educate their staff, firewall the machine (jobs were sent to it
by Windows 7 workstations on the LAN), keep on top of the backups, and
sweep the workshop now and then for threats like those USB sticks.  It
was a long way from ideal but it seems to have been enough.

If we ass-u-me that systems thesedays are either patched or protected
by other means, the WannaCry malware shouldn't now be a big worry to
anyone.  There are more serious, active threats around.  If you're
unfortunate enough to be dealing with a manufacturer like the one that
supplied that plasma cutter, or if you have legacy software preventing
upgrades to a supported version of Windows, you probably have a never-
ending task.  People will sometimes run a vulnerable Windows OS in a
virtual machine, and take periodic snapshots to give them a fallback
position in case of the almost inevitable.  It isn't a complete answer
but it can help you sleep more easily.

Asking "Does ClamAV catch WannaCry malware?" is a rather like asking
"Do the police catch criminals?".  There are many different criminals
and the police don't catch all of them.  There can be many different
versions of any particular malware (sometimes they're referred to as
different "strains" of the same basic malware) and one of the things
that malware authors spend a lot of time on is hiding their product,
in more-and-more-creative ways, from the things designed to detect it.
Granted some of these people are script kiddies and don't make much of
an impact, but some of them are *really* good at what they do, so you
can't take anything for granted.

Here's a one-line command I just typed, output on the line below it:

$ grep -a -s -i wannacry databases/* | wc -l
550

A signature takes up one line in the signature database.  The above
command used 'grep' to do a case-insensitive search for the string
'wannacry' in all the files in the ClamAV database directory on my
clamd server, and count the lines containing that string.  I use a
number of third-party signature databases from several sources, so
from the above command I don't see information about which databases
contain which signatures.  For a handle on that I can count the lines
per database:

$ grep -a -s -i wannacry databases/* | cut -d':' -f1 | uniq -c
     13 daily.cld
    537 malwarehash.hsb

So I see thirteen signatures in the 'official' ClaAV database, and 537
in the 'malwarehash' database from Sanesecurity.  This tells me there
are many signatures somehow linked to the same basic WannaCry malware,
and presumably that means there's no particular limit to the ways in
which the malware might be hidden.  No real surprise, miscreants have
been modifying their malware ever since their first arrest.  But it
doesn't end there: there's no particular reason why a signature which
aims to match WannaCry will have a label which means anything at all
to the casual observer.  Let me now look for 'ransom' in *just* the
official 'main' and 'daily' databases:

$ grep -i ransom databases/main* databases/daily* | wc -l
24184

Hmmmmmm.  There are orders of magnitude more singatures which mention
'ransom' than there are which mention 'WannaCry'.  Is there a reason
that you asked about WannaCry in particular?

I am using Windows 7 (on notebook) and 10 (on PC).  When there was
the worldwide peak of WannaCry, it was interesting to see it mostly
affected older Windows versions, like 7 (at my workplace).

The vulnerabilities exploited by WannaCry were patched in Windows 7
and other supported systems several months before it hit the fan.  IT
security at your workplace appears to have been questionable at best.
Let's hope it's better now, but I wouldn't put my own money on it.

Speaking of money...

I was thinking to pick ClamAV, since I've seen that some popular AV
softwares like Malwarebytes (the first one detected WannaCry) put
the Malware/Ransomware protection to their Premium package.

have you estimated how much your systems are worth to you?

--

73,
Ged.

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to