Using Trend Micro Products for Investigation
The following highlights several post-exploitation detections and remediation technology that can be used by customers to investigate and help with potential remediation in a customer’s environment.Trend Vision One™
Trend Vision One customers benefit from attack surface risk management and XDR capabilities of the overall platform, fed by products such as Trend Micro Apex One, allowing existing customers to stay up to date on the latest information on these vulnerabilities. Leveraging the Risk Insights family of apps, customers can scan for, and identify impacted assets, and stay up to date on latest mitigation steps, including how to use Trend products to detect and defend against exploitation.
Risk Insights > Executive Dashboard
An updated Zero Day Vulnerability page in the Trend Vision One Executive Dashboard has been launched to provide a lot of relevant information in one area for Trend Vision One users and will be updated as more information is released.
Curated Intelligence Reports
An updated Curated Intelligence Report in Trend Vision One for this 0-day has been added that will automatically conduct some endpoint activity sweeping for XDR customers that have this enabled.
Trend Micro Protection and Detection Against Exploitation
First and foremost, it is always highly recommended that users apply the vendor's patches when they become available. Microsoft has provided additional information and guidance hereIn addition to the vendor patches, Trend Micro does have some supplementary detection/protection patterns that may help provide additional protection against further potential exploits.
Preventative Rules, Filters & Detection
Trend Micro Cloud One - Network Security & TippingPoint Protection Filters
- 42965: HTTP: Suspicious iframe Using a Local File Handler Detected
- 42972: HTTP: Trojan.Win64.ThirdEyeStealer.A Runtime Detection (Exfiltrate Information)
- 42188: ICMP: Backdoor.Win64.ROMCOM.YACFT Runtime Detection
- 42189: HTTP: Backdoor.Win64.ROMCOM.YACFT Runtime Detection
Trend Micro Malware Detection Patterns (VSAPI, Predictive Learning, Behavioral Monitoring) for Endpoint, Servers (e.g. Apex One, Worry-Free Business Security Services, Worry-Free Business Security Standard/Advanced, Deep Security w/Anti-malware, etc.), Mail & Gateway (e.g. Cloud App Security, ScanMail for Exchange, IMSVA)
Known exploits associated with this vulnerability include:
- Trojan.W97M.CVE20170199.PFKNO
- Trojan.W97M.CVE202336884.YEDGL
- Backdoor.Win64.ROMCOM.YEDD1