Threat Report: Exposing Malware in Linux-Based Multi-Cloud Environments | Download Now

Carbon Black Cloud: Why is malware allowed to propagate to other devices?

Carbon Black Cloud: Why is malware allowed to propagate to other devices?

Environment

  • Carbon Black Cloud Web Console: All Versions
  • Carbon Black Cloud Sensor: All Versions
  • Microsoft Windows: All Versions
  • Apple MacOS: All Versions

Question

Why is malware allowed to propagate to other devices?

Answer

  • Carbon Black Cloud does allow the initial copying or creation of files on systems, as it does not run a reputation request on file creation. The sensor will wait until one of two conditions are met: 
    • The file to execute, at which time delay execute kicks in 
    • The sensor requests reputation in the next send window 
  • The sensor retrieves the reputation before allowing the file to run, so all file access to the malware will be blocked if the appropriate policies are in place. This is done for performance reasons and is expected behavior
  • If "Auto-delete known malware hashes after" is not enabled, the sensor will allow the file to remain on the device by default, but an in-place quarantine will prevents the known malware from running or allowing other files to access this file if the applicable policies enabled

Additional Notes

  • Depending on the policy rules in place, CBC will prevent any application from accessing a known malware, suspect malware, pup, or company black list file. This behavior is effectively considered a file quarantine or "quarantine-in-place". The read operation will be denied, logged, and provisionally included in any threat that may be created at that time
  • The “DENY” action will only deny access to the requested resource, but the “TERMINATE” action will actually terminate the process or thread
  • Both “DENY” and “TERMINATE” functions are essentially the same when the operation is “tries to run or is running” and an application is attempting to run for the first time; however, the "TERMINATE" action will be more effective in cases where the application was already running

Related Content


Was this article helpful? Yes No
No ratings
Article Information
Author:
Creation Date:
‎10-03-2022
Views:
687
Contributors