A few months ago I agreed to participate in a beta test program for Artic Wolf. They are a Spiceworks partner and have a really interesting product. They send you an appliance that just analyzes traffic on your network, nothing more than a passthrough device. But they have a security concierge service that actively watches and manages customer devices for threats. They've detected some threats that we did not even know existed (some that even VIPRE did not catch).
Today we got an alert from VIPRE about active protection and it blocking an attempt to run FileExtractorSetup.exe on someone's machine. That was good. We started scrubbing that machine pretty soon afterward. Then, only a few minutes later, we get the following message from Artic Wolf:
Nick,
A file was recently seen being downloaded to a workstation within your network that may have undesired results if installed. The file is called "FileExtractorSetupG.exe", and was downloaded to the following workstation: ipdaddress\WorkstationName.
I ran an analysis on the file and it came back with the following results:
SHA256: 6f8f317a612e1f20a5810210554ef24fb099a0b2263bef429c58cfd1f3723eac
File name: FileExtractorSetupG.exe
AV Detection ratio: 3 / 50
Analysis date: 2014-03-07 15:41:44 UTC ( 0 minutes ago )
AV Agent Virus Signature AV Date
DrWeb Adware.Downware.1838 20140307
Norman FakeNSIS.A 20140307
VIPRE InstallCore (fs) 20140307
If you have any questions please let me know.
I must say I have been very impressed with their product, especially the security concierge service. They analyze traffic to see trends, if devices on your network might be attempting to access systems in other countries, etc. They do all of the analysis and log review that you wish you did. Definitely check them out if you get the chance.
Now I just need to try and convince management to keep their service for the next year (which will be a paid endeavor).