[REQUEST YOUR THOUGHTS]|Ransomware & SBIE

If it doesn't fit elsewhere, it goes here
bo.elam
Sandboxie Guru
Sandboxie Guru
Posts: 2809
Joined: Wed Apr 22, 2009 9:17 pm

Re: [REQUEST YOUR ASSISTANCE]|Ransomware & SBIE

Post by bo.elam » Mon Apr 11, 2016 12:27 pm

UPieper wrote:@bo
There's a tool called USBDLM which can be configured to always give the same drive letter to specific USB drives (eg. by volume label).
Hi UPieper, I dont think I ll use the tool but I appreciate you thinking of me and posting the link. 8)

Bo

RooJ
Posts: 82
Joined: Sun Dec 21, 2014 2:47 pm

Re: [REQUEST YOUR ASSISTANCE]|Ransomware & SBIE

Post by RooJ » Mon Apr 11, 2016 3:58 pm

bo.elam wrote:when I introduced the flash drive, it did not run sandboxed even though I force my USB drives. The reason being that when he assembled the computer back together, a different letter got assigned to my USB drives than the ones I had as Forced.
Hi Bo.. You should consider sandboxing all of the drive letters other than your main partition letters. Here's an example of one of my sandboxes:

Code: Select all

[SBNull]

Enabled=y
ConfigLevel=7
AutoRecover=y
Template=AutoRecoverIgnore
Template=LingerPrograms
Template=BlockPorts
Template=WindowsFontCache
BorderColor=#C0C0C0,ttl
ForceFolder=S:\
ForceFolder=A:\
ForceFolder=B:\
ForceFolder=D:\
ForceFolder=E:\
ForceFolder=G:\
ForceFolder=H:\
ForceFolder=I:\
ForceFolder=J:\
ForceFolder=K:\
ForceFolder=L:\
ForceFolder=M:\
ForceFolder=N:\
ForceFolder=O:\
ForceFolder=P:\
ForceFolder=Q:\
ForceFolder=T:\
ForceFolder=U:\
ForceFolder=V:\
ForceFolder=W:\
ForceFolder=X:\
ForceFolder=Y:\
ForceFolder=Z:\
ForceFolder=F:\Downloads
ForceFolder=C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup
ForceFolder=C:\Users\Roo\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
NotifyInternetAccessDenied=y
NotifyStartRunAccessDenied=y
BoxNameTitle=n
DropAdminRights=y
ProcessGroup=<StartRunAccess>,Randomname123.exe
ClosedIpcPath=!<StartRunAccess>,*
ClosedIpcPath=\RPC Control\spoolss
ClosedFilePath=C:\
ClosedFilePath=\Device\Mup\
ClosedFilePath=F:\
ClosedFilePath=R:\
ClosedFilePath=InternetAccessDevices
ClosedFilePath=\Device\TrueCrypt
ClosedFilePath=C:\Program Files\TrueCrypt\
InjectDll=F:\Apps\Sandboxie\SBExtra\sbiextra.dll
InjectDll64=F:\Apps\Sandboxie\SBExtra\sbiextra_x64.dll
You can see that anything running from any drive letter other than C, F and R (so rogue USB pen for instance) are automatically sandboxed in the SBNull box. Further to this only files named Randomname123.exe are allowed to run meaning in all likelyhood (unless some freakish coincidence occurs) nothing can run from the device automatically or accidently.

If I put a legitimate USB pen in it too will be protected by the Null sandbox; I can then copy files to and from the pen as usual and if I want to directly run something from it I can right click the file and choose a different sandbox/no sandbox.

(I'm aware the above set of rules has entries which aren't necessary and I could probably delete about 8 lines... I'm okay with it :P )

RooJ
Posts: 82
Joined: Sun Dec 21, 2014 2:47 pm

Re: [REQUEST YOUR THOUGHTS]|Ransomware & SBIE

Post by RooJ » Mon Apr 11, 2016 6:30 pm

• SBIE Configuration, specific to ransomware. Do you do anything different?

Nothing specific to ransomware.

• How do you use SBIE when going online? Opening email attachments? Recovering and saving files? (Office2016/Office36 can be included, that is being released ASAP.)

I use a locked down web browser which also has security addons enabled. I always use drop rights on web browsers and have blocked file paths to the majority of key document folders I care about.

I must say though; In order to strike a balance between usability and security I've changed the way I set up some of my sandboxes lately (especially office). I first lock down all important folders I know I don't want the program to access (using blocked access). I then run the sandboxed program for a few minutes clicking around in different options before checking sandboxies 'files and folders' view to see where the program saved files to. I exclude from the immediate recovery prompt all of the folders that the program uses to store temp files, configs etc. Once done I then add the root of F:\ (my main file storage partition) to my quick recovery list.
This means I won't be prompted to quick recover by the program saving settings or creating temp files, but It allows me to save and get a quick recovery prompt in any folder other than those I've specifically blocked. This has helped relieve the frustration I was beginning to feel using the 'files and folders' recovery system which often feels long-winded.

• How do you deal with forcing / not forcing web browsers? Or any program?

I force all web browsers on my system. The only time I run a web browser unsandboxed is to update it or it's addons.

• How do you eliminate it? (besides deleting your sandbox) do you do anything other than that?

I use a batch file to quickly clear multiple sandboxes as I have 18 at the moment. The batch file automatically opens the sandbox folder afterwards so I can see immediately that all boxes have been deleted. My sandbox is also contained on a ramdisk so rebooting ensures everything is taken care of. If It's a sandbox running in a VM then there's the added benefit of restoring a snapshot after each use.

• What would you suggest, a fix? and update? And update too...? that would make SBIE even better to protect against ransomware - malware? (By default, you're protected) but we're looking more of refinements or changes we've missed or not considered or you've wondered about...

I'll need to think this question over...

bo.elam
Sandboxie Guru
Sandboxie Guru
Posts: 2809
Joined: Wed Apr 22, 2009 9:17 pm

Re: [REQUEST YOUR THOUGHTS]|Ransomware & SBIE

Post by bo.elam » Mon Apr 11, 2016 11:07 pm

Hi Rooj 8), thanks for posting your SBNull Sandbox configuration, I ll check it out and adopt something. I am not sure if you wanted me, us, to answer the questions you wrote above, but here are my answers :mrgreen: . I see a lot of similarities in what we do, expected I guess.

• SBIE Configuration, specific to ransomware. Do you do anything different?
Nothing. I treat all programs and files the same way. Dont trust any.

• How do you deal with forcing / not forcing web browsers? Or any program?
I force my 2 browsers in their own sandbox. And set the sandbox according to the browser. I run Firefox in at least 5 sandboxes, four of them are dedicated. Some of this sandboxes are set light and some are tight. Three of my Firefox sandboxes are for visiting specific sites. I set this 3 sandboxes with the settings this sites work best in my computer, the result I look for creating and using this sandboxes and I get is plugin container rarely crashes.

Like you, the only time I run browsers (and other programs) out of the sandbox is for updating. I don't see any reason to do it for anything else.

Other programs? I pretty much force all programs that I use in a daily basis. Any file that runs in my computers, runs sandboxed from the day it gets created in the PC to the day the file gets deleted. That covers just about anything, Rooj. Attachments, etc.

I separate programs as much as possible. In my XP, I have 18 sandboxes, same as you. In the W7, I do less so I am using nine. And I set each sandbox according to the dedicated program or purpose for creating the sandbox. I always try to achieve the perfect balance between security and convenience. The result is that all my sandboxes are very comfortable to use and as resticted as they can be. I feel very very comfortable doing all I do all day long with SBIE, all feels natural.

In all my sandboxes I block access to personal files and folders. I try to keep those in only a few folders so its easy to do.

• How do you use SBIE when going online? Opening email attachments? Recovering and saving files? (Office2016/Office36 can be included, that is being released ASAP.)
I use Quick recovery and recover to the desktop or my Downloads folder. The Downloads folder is forced and set very restricted. All programs forbidden internet access, Drop rights.

The normal life of any attachment I recover is first it goes in my downloads folder and no matter where it ends up when I move it, its either going to run sandboxed via forced programs or forced folder. One way or the other or by navigating to it using a sandboxed windows explorer, the attachment will run sandboxed till the day it gets deleted.

• How do you eliminate it? (besides deleting your sandbox) do you do anything other than that?
No, I delete the sandbox and forget about it. I hardly ever save contents in any sandbox for more than a few hours or maybe a few days. Delete delete delete.

Bo

bo.elam
Sandboxie Guru
Sandboxie Guru
Posts: 2809
Joined: Wed Apr 22, 2009 9:17 pm

Re: [REQUEST YOUR ASSISTANCE]|Ransomware & SBIE

Post by bo.elam » Mon Apr 11, 2016 11:26 pm

RooJ wrote: Hi Bo.. You should consider sandboxing all of the drive letters other than your main partition letters. Here's an example of one of my sandboxes:
Thanks for posting, I ll check it out and adopt something. But right now this is how I handle USB drives. First if all I avoid other peoples flash drives. And then in both of my computers, forcing 2 letters cover the USB drives that I plug. So, any flash drive I plug, it opens up sandboxed. In my USB sandbox, I allow a few programs to run, none internet access and Drop rights. I think that's plenty. :)

Bo

RooJ
Posts: 82
Joined: Sun Dec 21, 2014 2:47 pm

Re: [REQUEST YOUR THOUGHTS]|Ransomware & SBIE

Post by RooJ » Tue Apr 12, 2016 8:23 pm

@Bo,
The questions were from the original post by Craig, I just copied them to address them individually.

Regarding suggestions,
By default it seems sandboxie has it covered so there's not much to improve for base protection. However, if developers ever get more time I think it may be worth adding some extra options to the file access -> direct access rules. I could be wrong but I think currently we can only allow a program to have full access to a folder, it's all or nothing. Some suggestions for extra options:

FileTypes: Allow a user to specify file types that are blocked from being written to the direct access folder or alternatively the user can specify filetypes that are allowed only.
Direct access write only: Allow a program to save into the folder directly but prevent it from seeing and editing any files that wern't saved by the sandboxed program during the current session. (sandboxie would need to handle filename conflicts)
Direct access read only: Allow a program to see the contents of a folder and save new files directly, but prevent it from modifying files that already existed and wern't saved by the sandboxed program during the current session.
Toast alerts(off by default): allow sandboxie to popup an alert when a file is saved to a direct access folder. This could also have a button which allows a user to quickly undue (delete) the file and automatically block further saves to the folder for a specified time (time configurable in options).

So as an example using 'direct access read only' with 'blocked filetypes' above would allow me to configure my parents laptop so that they could save to documents, images etc directly without getting the sandboxie prompt.. They could upload files without problem to sites like facebook.. But ransomware would be unable to overwrite files in these folders and executable files et al would be blocked from saving completely. Renaming files to blocked extentions after saving would also need to be blocked by sandboxie.

I'm aware the above has security risks, but along side start/run access rules etc it would still provide a valuable layer of security for people who can't deal with the added popups when saving (these people exist :roll:)

Also.. a way to control whether a program can run on the fly for more advanced users (default off) :P :
http://forums.sandboxie.com/phpBB3/view ... =4&t=22177

majokey
Posts: 17
Joined: Fri Apr 04, 2014 11:43 am

Re: [REQUEST YOUR THOUGHTS]|Ransomware & SBIE

Post by majokey » Fri Apr 15, 2016 4:30 am

So, here is what we are in need of:
:?: SBIE Configuration, specific to ransomware. Do you do anything different?
Not really. Can't see what could be done differently. I'm more worried about keyloggers stealing my passwords. A keylogger could run inside the sandbox and capture my passwords if I keep using the sandbox while the keylogger is running.

As a result, I have a setup inspired by the Qubes OS. I have several sandboxes called General Browsing, then Suspicious Sites, and then Work Sensitive, Private Sensitive, Bank, etc. The "sensitive" sandboxes are never used for anything else but logging into these important sites, plus if for instance an attachment must be downloaded, then the sandbox has first its content deleted before I use it to log into a sensitive site again.

:?: How do you use SBIE when going online? Opening email attachments? Recovering and saving files? (Office2016/Office36 can be included, that is being released ASAP.)
ALL my browsers are only used as sandboxed, apart from updating them (feel like naked at that point). ALL files originating from the Internet are first AV scanned and opened in the Sandbox, and then recovered, if they actually need to be saved.

:?: How do you deal with forcing / not forcing web browsers? Or any program?
Most of my programs are forced, so that they couldn't be launched unsandboxed automatically without my action. Like when you uninstall a program and it launches a browser to fill out a form where the vendor asks you why you uninstalled their lovely program an. I do not however intentionally use them in the "_forced" sandboxes, I launch them manually in specific sandboxes depending on what I'm doing, see previous point. The "_forced" sandboxes, e.g. "Palemoon_forced" are just a precaution. My list of forced programs therefore includes: Chrome, Firefox, Palemoon, MSIE, SRWare Iron, (Vivaldi is so far installed directly in a sandbox), Adobe Acrobat and Reader, MS Office and TeamViewer.

:?: IM clients?
I use three Skype "lines" using the "/secondary" switch to start more than one instance of Skype at a time. However, I haven't figured out how to launch the "primary" one in Sandboxie, as when I right-click on its icon, the "Run Sandboxed" item doesn't show in the context menu. Strangely, the two "/secondary" Skypes do show the icon. So I just never use the "primary" one.

:?: How do you eliminate it? (besides deleting your sandbox) do you do anything other than that?
Don't see what else could be done.

:?: What would you suggest, a fix? and update? And update too...? that would make SBIE even better to protect against ransomware - malware? (By default, you're protected) but we're looking more of refinements or changes we've missed or not considered or you've wondered about...
I can't pretend to be knowledgeable enough to comment on the technical side. My approaches focus on how to use your amazing tool to its fullest potential - in the Qubes-way. That said, I can imagine improvements when it comes to usability. The grouping/moving sandboxes seems to be mostly an afterthought, though perhaps I'm the only one who actually uses it :-) Especially because when I right-click a program to run it in a sandbox, the sandboxes are shown as just one long list without any groups. And my biggest issue is that the sandboxes can't be renamed unless they are cleared. Here's my situation, I'm researching something using my "Browsing_General_1" sandbox and the research is fruitful, so I'd like to continue with it in following days. But if I can't rename the sandbox, I have to remember in which one that research was. And mainly I need to be super-careful not to clear such a sandbox. So renaming without clearing would be #1 on my wish list. And as I can imagine that this might be impossible to achieve, as it would involve renaming the sandbox's directory, I suggest that perhaps tagging the sandboxes could be a feasible remedy - the name would stay the same, but I'd attach a tag "Sports Drinks Research" to it.

Finally, you guys should get a medal from Redmond (if not a $ billion or two), because you are the only reason I (and many my friends and associates) still use Windows! I don't use Sandboxie in order to use Windows (securely), I use Windows in order to use Sandboxie!! Qubes don't run on my hardware and the Firejail gentleman has a long way to go to get his thing where tzuk got Sandboxie.

Can't imagine existing without Sandboxie on the Internet these days any longer!

steamer
Posts: 9
Joined: Fri May 07, 2010 12:19 am

Re: [REQUEST YOUR THOUGHTS]|Ransomware & SBIE

Post by steamer » Sat Apr 16, 2016 10:15 pm

Haven't been here in a while, but saw this thread, so a few comments:

I am using drop rights in my Sandboxes. I sandbox browsers, Tixati, pretty much anything that works directly on the internet. I have not done anything special for ransomware, but that is primarily because I don't have time to research the topic and decide what Sandboxie settings might be useful. I did run across a thread - Wilders I think? - where someone had said Sandboxie had protected them.

Suggestions:

1. Ran across "Shade" (you need to check out their website) which allows you to set up a Sandbox by dragging icons into the Sandbox. I like the idea. Sandboxes could be represented by a map of sorts and administered from a graphical interface. You can link to advanced settings for the more complicated options, but the admin part of setting up, moving programs into and out of a Sandbox, and deleting Sandboxes could be done simply at the GUI level. I think many users would find that easier / nicer to use. The advanced scripting stuff could still be used by more advanced users.

2. Same idea for recovering downloaded files - I often leave several downloaded items in a Sandbox, then go back later and move them. Drag em where you want em.

3. Start a newsletter. There is probably a lot of knowledge at Invincia about ransomware. Not so much with Sandboxie users - we don't have our own internal IT departments available. It would be nice to have an article - maybe even over two or three monthly newsletters - about how ransomware manages to encrypt files, what exactly Sandboxie does to stop that, and how deleting your Sandbox would make the problem go away.

Make some of the knowledge about how to use Sandboxie available to users in the form of articles written for the general Sandboxie user. I think users will find this to be "value added" and I think it will promote loyalty to Sandboxie. Do some articles about using popular programs with Sandboxie. Then every few months, have an extra article for advanced users.

Get these articles on other security websites or let other bloggers use them as source materials to spread the Sandboxie story. You know, "buzz".
Newsletter subscribers lists could also be a good "emergancy notification" list if a weakness is found, telling them to install the latest version.

Been using Sandboxie for a while (yep, bought a license way back ...... 2006 I think it was - maybe early 07. Anyway, it has been a great investment. Invincia has been doing a very good job of replacing Tzuk. Hope those ideas are useful!

Craig@Invincea
Sandboxie Support
Sandboxie Support
Posts: 3523
Joined: Thu Jun 18, 2015 3:00 pm
Location: DC Metro Area
Contact:

Re: [REQUEST YOUR THOUGHTS]|Ransomware & SBIE

Post by Craig@Invincea » Sat Apr 16, 2016 10:26 pm

Good Stuff! Thanks!

BilleBarrett
Posts: 43
Joined: Tue Feb 10, 2015 10:22 am
Location: reensboro, North Carolina
Contact:

Re: [REQUEST YOUR THOUGHTS]|Ransomware & SBIE

Post by BilleBarrett » Fri Apr 22, 2016 11:30 am

1, I keep Sandboxie container off of the OS drive, i.e. d:\sandboxie
2. Every browser is in the Sandbox, except Edge (which do not use) I also make sure that Adobe Reader in is in the Sandbox, I get a lot of pdf files
Since I use outlook 2013, if I click on a link or attachment it will be handles in the Sandbox. I know that I can run Outlook in the Sandbox but my migration files setup 2 Gigs, but I don't because the email I delete, we'll just come back in
3. I stay away from webmail as much as I can, I have a few clients that use AOL Desktop and they get errors using Sandboxie
4. sorry I don't do IM on my PC's just my Android, with I con't care.
5. I use the Pro version of Ccleaner, so when ever I close my browser is does a cleanup, I also use Privazer to clean my system.
6. BitDefender has recently offer a free copy of BitDefender Anti-Ransomware software, I have it on all my clients systems, the outch of prevention
Since I run a remote monitoring service, one of the things my clients know is that if they get hit and they were not in the Sandbox my repair service call is billable.
Personally, I'd love to see an detail tutorial for me to use, I run mini seminars on Sandboxie and I get a great turn out for the 1 hr class.

bo.elam
Sandboxie Guru
Sandboxie Guru
Posts: 2809
Joined: Wed Apr 22, 2009 9:17 pm

Re: [REQUEST YOUR THOUGHTS]|Ransomware & SBIE

Post by bo.elam » Fri Apr 22, 2016 6:35 pm

BilleBarrett wrote:....., but I don't because the email I delete, we'll just come back in
Hi Bill, nice post. On that above, I think if you set up Outlook in Sandbox settings>Applications>E Mail reader, mails you delete in the sandbox wont come back. They are not supposed to. I never ran Outlook sandboxed but I used to use Outlook express, the saving or deleting mails in the sandbox worked out just fine once you setup the client in Sandbox settings.

Bo

stisev
Posts: 193
Joined: Sun Nov 02, 2008 12:32 pm

Re: [REQUEST YOUR THOUGHTS]|Ransomware & SBIE

Post by stisev » Fri Apr 22, 2016 10:53 pm

Hi all,

I am in a prime position to answer this question, as I have reached "Grandmaster" level in terms of testing new software. I can't tell you how many times SBIE has saved my computer from crappy software. In addition to adding security, I also use Sandboxie to "portablize" settings in case of a Windows re-install.


Please send this message to the Invincea CEO:
You guys can't see me, but I am tearing up while writing this. I want to thank you from the bottom of my heart for your support for the lifetime licenses. It's rare to find this kind of dedication from any company these days. I am in a tough situation with health & money problems and cannot afford another license for Sandboxie (or any luxury for that matter) so the fact that you guys rewarded the early adopters & people who supported tzuk in his early work is extremely appreciated. I try to do my part for your company, as I constantly advertise Sandboxie as my "Top 3" app and my friends who know me know what kind of high honor that is. I've probably spammed forums across the Internet with my glowing praise of your software.

Thank you so much Invincea!

Curt@invincea
Sandboxie Lead Developer
Sandboxie Lead Developer
Posts: 1638
Joined: Fri Jan 17, 2014 5:21 pm
Contact:

Re: [REQUEST YOUR THOUGHTS]|Ransomware & SBIE

Post by Curt@invincea » Sat Apr 23, 2016 8:47 pm

stisev wrote:Hi all,

I am in a prime position to answer this question, as I have reached "Grandmaster" level in terms of testing new software. I can't tell you how many times SBIE has saved my computer from crappy software. In addition to adding security, I also use Sandboxie to "portablize" settings in case of a Windows re-install.


Please send this message to the Invincea CEO:
You guys can't see me, but I am tearing up while writing this. I want to thank you from the bottom of my heart for your support for the lifetime licenses. It's rare to find this kind of dedication from any company these days. I am in a tough situation with health & money problems and cannot afford another license for Sandboxie (or any luxury for that matter) so the fact that you guys rewarded the early adopters & people who supported tzuk in his early work is extremely appreciated. I try to do my part for your company, as I constantly advertise Sandboxie as my "Top 3" app and my friends who know me know what kind of high honor that is. I've probably spammed forums across the Internet with my glowing praise of your software.

Thank you so much Invincea!
Thank you very much, stisev, for your kind words. Your msg has been delivered to the CEO and the entire Invincea team.

Post Reply

Who is online

Users browsing this forum: No registered users and 0 guests