{"id":101181,"date":"2020-05-19T09:30:22","date_gmt":"2020-05-19T16:30:22","guid":{"rendered":"\/blogs\/?p=101181"},"modified":"2024-07-08T01:35:57","modified_gmt":"2024-07-08T08:35:57","slug":"how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/","title":{"rendered":"How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner"},"content":{"rendered":"<h2>Introduction<\/h2>\n<p>This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will help you understand how ATP Rules work and how you can utilize them to prevent infections from prevalent malware families such as Emotet, LemonDuck and PowerMiner. Please read through the recommendation section to effectively utilize rules in your environment.<\/p>\n<p>ATP rules are a form of Attack Surface reduction technology which detects suspicious use of OS features and applications. These rules target behaviors which are often abused by malware authors. There can be cases where legitimate applications utilize the same behavior and hence rules need to be configured based on the environment.<\/p>\n<p>ATP rules within McAfee Endpoint Security (ENS) 10.5.3 and above have already detected over a million pieces of malware since the start of 2020. This blog will show you how to enable ATP rules and explains why they should be enabled by highlighting some of the malware we detect with them. We\u2019ll also show you how to maximize detection capabilities by tweaking some specific settings.<\/p>\n<p>First, let\u2019s start with an overview. We release ATP rules in three types: <strong>Evaluate, DefaultOn and HighOn<\/strong>.<\/p>\n<p><strong>Evaluate<\/strong> rules are tested in the field by McAfee to determine if they are robust enough to detect malicious activity while not producing false positives. Once a rule has been in evaluate mode for a period of time, McAfee researchers will analyze its performance and either make modifications or promote it to DefaultOn or HighOn. ENS ATP customers connected to McAfee ePolicy Orchestrator (ePO) can manually change Evaluate rules to Enabled mode.<\/p>\n<p><strong>DefaultOn<\/strong> rules are created when McAfee has high confidence that no legitimate applications will be impacted. These rules are then enabled by default in all McAfee Endpoint Security rule groups.<\/p>\n<p><strong>HighOn <\/strong>rules detect behavior that is known to be malicious but may have some overlap with non-malicious applications. These rules are set to Observe mode for systems in the \u201cBalanced\u201d rule group, but act as DefaultOn for systems in the \u201cSecurity\u201d rule group. Later in this blog, we cover how to change the rule group in Endpoint Security products to enable HighOn rules.<\/p>\n<p><strong>How to enable ATP rules in ENS 10.5.3 and above <\/strong><\/p>\n<p>By default, many ATP rules are set to Observe mode. To enable these rules in an active-blocking mode, login to the ePO Console and go to Menu-&gt;Configuration-&gt;Server Settings.<\/p>\n<p>Select\u00a0<strong>Adaptive Threat Protection<\/strong> and select the required rule group (<strong>Productivity<\/strong>,<strong>\u00a0Balanced<\/strong>, or\u00a0<strong>Security<\/strong>).<\/p>\n<p>As seen in Figure 1, Rule 329 is in Observe mode in the Balanced rule group and, in Figure 2 below, you can see it is Enabled by default in Security rule group.<\/p>\n<p>Note: As mentioned previously, we analyze rules from time to time and make modifications so you may have different settings in your environment, depending upon the content version.<\/p>\n<p style=\"text-align: center;\">\n<p>To enable a rule click on Edit below the rules and Select the rule you would like to change, then select the desired state \u2013 Disabled, Enabled, or Observe. Figure 3. shows how we can change the state of Rule 256 which helps in detecting Emotet and Trickbot downloaders.<\/p>\n<p>Click on Save and the rule should be enabled on the clients within a few minutes. Here you see that Rule 256 blocks malicious file JTI\/Suspect.131328 by default.<\/p>\n<p><strong>Change the assigned rule group to use HighOn rules in ENS 10.5.3 and above <\/strong><\/p>\n<p>In this section, we will step through how you can change the rule group to \u201cSecurity\u201d which will enable all the HighOn rules in block mode by default. We recommend you check the logs to see if the HighOn rules have detected clean activity within your environments before changing to this rule group.<\/p>\n<p>To change the rule group, login to the ePO console and go to Menu-&gt;Systems-&gt;System Tree<\/p>\n<p style=\"text-align: center;\">\n<p>Select a group and go to the Assigned Policies tab. Select \u2018Endpoint Security Adaptive Threat Protection\u2019 from the product dropdown.<\/p>\n<p>Click on \u2018My Default\u2019 policy under the \u2018Options\u2019 category.<\/p>\n<p>Scroll down to Rule Assignment. From the Rule Assignment drop-down list, select <strong>Security<\/strong> and click Save. This will update all the clients with \u2018My Default\u2019 policy to the Security rule group.<\/p>\n<p><strong>Enable HighOn rules in MVISION Endpoint \u00a0<\/strong><\/p>\n<p>To enable HighOn rules, MVISION Endpoint policy needs to be set to \u2018High Protection\u2019 if it is not already set by default. Follow these steps:<\/p>\n<p>Login to the ePO console and go to Menu-&gt;Systems-&gt;System Tree<\/p>\n<p>Select a group and go to the Assigned Policies tab. Select \u2018MVISION Endpoint\u2019 from the product dropdown.<\/p>\n<p>Click on \u2018Edit Assignment\u2019 under General Category.<\/p>\n<p>Change \u2018Inherit from\u2019 to \u2018Break Inheritance and assign the policy and settings below\u2019. Also, change the \u2018Assigned policy\u2019 to \u2018High Protection\u2019 from the dropdown list and click on \u2018Save\u2019. This will enable all the HighOn rules.<\/p>\n<h3>ATP Rules in the Wild<\/h3>\n<p>This section highlights three prevalent threats which ATP rules detect. We highlight one rule for each DefaultOn\/HighOn\/Evaluate to demonstrate the importance of monitoring rule updates and enabling more aggressive rules if they are suitable for your environment.<\/p>\n<h4><strong>PowerMiner (DefaultOn example)<\/strong><\/h4>\n<p>The PowerMiner malware is a cryptocurrency malware that has been prevalent since 2019. We have discussed this malware before in a previous blog on <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/\" target=\"_blank\" rel=\"noopener noreferrer\">AMSI detection<\/a>. The purpose of PowerMiner is to infect as many machines as possible to mine Monero currency. The initial infection vector is via phishing emails which contain a batch file. Once run, this batch file will execute a malicious PowerShell script that will then begin the infection process.<\/p>\n<p>ATP DefaultOn Rule 263 \u201cDetect processes accessing suspicious URLs\u201d and Rule 262 \u201cIdentify suspicious command parameter execution for Security rule group assignments\u201d blocks this threat once PowerShell is executed by the Dropper.bat and it attempts to download the malicious PS1 file.<\/p>\n<p>This is shown by the red cross in the flow chart above. As mentioned in the AMSI blog, this threat is also covered by our AMSI signatures but as we do with several threats, we have different forms of detection in case the malware authors modify their code to attempt to bypass one of them.<\/p>\n<p>The IP Map below shows the detections of this threat between October 2019 and January 2020 by the ATP Rules mentioned above.<\/p>\n<h4><strong>LemonDuck (HighOn example)<\/strong><\/h4>\n<p>LemonDuck, like PowerMiner, is a coin mining malware. It spreads via various methods such as the Eternal Blue exploit and Mimikatz. Once a machine has been infected, LemonDuck will create several scheduled tasks to download various components which include the coin mining functionality. The flow chart below shows the Lemon Duck infection process:<\/p>\n<p>&nbsp;<\/p>\n<p>ATP HighOn rule 329 \u201cIdentify and block suspicious usage of Scheduled Tasks in high change systems\u201d blocks LemonDuck at the schedule task creation stage. Again, like PowerMiner, McAfee also has an AMSI signature which detects this threat as LemonDuck!&lt;partial_hash&gt;.<\/p>\n<p>The IP Map below shows the detections of this threat between October 2019 and January 2020 by the ATP Rule mentioned above.<\/p>\n<h4><strong>Emotet Downloader (Evaluate example)<\/strong><\/h4>\n<p>Emotet is a Trojan which is responsible for downloading and executing several high-profile malwares including Trickbot, which is turn has been known to download and execute the Ryuk ransomware. Emotet is usually downloaded and executed on the victim\u2019s machine by malicious documents which are sent out via email spam. The malicious document will use PowerShell to download the Emotet executable and execute it. The flow is shown below:<\/p>\n<p>McAfee ATP rule 256 \u2018Detect use of long -encoded command PowerShell\u2019 and rule 264 \u2018Inspect EncodedCommand Powershell\u2019 will detect this behavior if enabled. This is not enabled by default as this behavior can be legitimate, so we recommend checking the detections in Evaluate mode and, if no false positives occur, then turning it on. This rule will also block other malware which performs the same activity as Trickbot. The IP Map below shows the detections Rule 256 has had between October 2019 and January 2020. This will include all threats detected by this rule, not just Emotet.<\/p>\n<h3>Recommendations<\/h3>\n<p>By now you are likely asking yourself which rules you should turn on. Firstly, it should be noted that enabling ATP Rules will have no performance impact however, as highlighted in the first section, they can sometimes cause false positives.<\/p>\n<p>From the\u00a0collection of\u00a0ATP rules, we recommend\u00a0turning on\u00a0the <em>\u2018Observe\u2019 mode<\/em> rules mentioned in this blog.<\/p>\n<p>In addition to the rules mentioned for each threat, the\u00a0following rules can be turned to \u2018Enabled\u2019 mode from the EPO console as we described.\u00a0As mentioned, there is continuous evaluation of these rules by McAfee researchers which can result in rules moving to a different rule group or merging into other existing rules.<\/p>\n<ul>\n<li><em>Rule 238<\/em>&#8211; Identify abuse of common processes spawned from non-standard locations.<\/li>\n<li>Protection from files\u00a0being executed\u00a0from suspicious locations which are often used by attackers.<\/li>\n<\/ul>\n<ul>\n<li><em>Rule 309 <\/em>&#8211; Block processes attempting to launch from Office applications.\n<ul>\n<li>Office documents are the main vectors used to deploy malware. This rule prevents Office applications from being abused to deliver malicious payloads.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><em>Rule 312<\/em> &#8211; Prevent email applications, such as Outlook, from spawning script editors and dual use tool\n<ul>\n<li>Spam emails are common initial attack vectors being utilized by malware authors. This rule will help to detect suspicious use of email applications by preventing the launch of uncommon processes.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><em>Rule 323<\/em> &#8211; Prevent mshta from being launched as a child process.\n<ul>\n<li>Related to MITRE technique <a href=\"https:\/\/attack.mitre.org\/techniques\/T1170\" target=\"_blank\" rel=\"noopener noreferrer\">T1170<\/a>. Mshta.exe is a utility that executes Microsoft HTML Applications (HTA). Attackers can use mshta.exe to execute malicious .hta files and JavaScript or VBScript. This rule will help to detect the malicious use cases. You can read more about mshta <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/what-is-mshta-how-can-it-be-used-and-how-to-protect-against-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>In general, we recommend looking through your ATP logs and checking to see if any \u2018Observe\u2019 mode rules are causing detections. If you find any rules that are not detecting legitimate use cases, we advise changing them to \u2018Enabled\u2019 mode.<\/p>\n<p>We advise using ePO groups for a small number of machines and then monitor the changed environment for any false positives. If there are no false positives, you can then deploy the changes to a broader group.<\/p>\n<p>KB Article <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB82925\" target=\"_blank\" rel=\"noopener noreferrer\">KB82925<\/a> shows all the available ATP rules. You can also refer to the ATP Rules Release Notes which are updated when new rules are created, or existing ones are modified.<\/p>\n<h3>Conclusion<\/h3>\n<p>We hope that this blog has helped highlight how ATP rules protect your environment against a variety of threats and, by combining this technology with others like AMSI, we reinforce protection.<\/p>\n<p>This blog continues a series which help showcase our technology, so we also recommend reading the following:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/\">McAfee Protects against suspicious email attachments<\/a><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/\">McAfee AMSI integration protects against malicious scripts<\/a><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/using-expert-rules-in-ens-10-5-3-to-prevent-malicious-exploits\/\">Using Expert Rules in ENS to prevent malicious exploits<\/a><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/what-is-mshta-how-can-it-be-used-and-how-to-protect-against-it\/\">What Is Mshta, How Can It Be Used and How to Protect Against It<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>All testing was performed with the JTI Content Version 1134 and MVISION Endpoint Version 20.1.0.114 (in High Protection)<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will&#8230;<\/p>\n","protected":false},"author":1135,"featured_media":96564,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[6154,849],"class_list":["post-101181","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will help you\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will help you\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-19T16:30:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-08T08:35:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"659\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ankit Goel, Oliver Devane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ankit Goel, Oliver Devane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/\"},\"author\":{\"name\":\"Ankit Goel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/dc28cb8f3ec39b02e64ac9e2c714cdcb\"},\"headline\":\"How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner\",\"datePublished\":\"2020-05-19T16:30:22+00:00\",\"dateModified\":\"2024-07-08T08:35:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/\"},\"wordCount\":1810,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/\",\"name\":\"How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"datePublished\":\"2020-05-19T16:30:22+00:00\",\"dateModified\":\"2024-07-08T08:35:57+00:00\",\"description\":\"Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will help you\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"width\":659,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/dc28cb8f3ec39b02e64ac9e2c714cdcb\",\"name\":\"Ankit Goel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/3f8b0f794c3945987376e3b6c6cbc86d\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/IMG_6565-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/IMG_6565-96x96.jpg\",\"caption\":\"Ankit Goel\"},\"description\":\"Ankit Goel is a Software Engineer at McAfee and have about 5 years of experience in authoring content for detecting threats. He also help teams to collect data trends for visibility into threat landscape.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ankit-goel-9b2b2037\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/ankit-goel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner | McAfee Blog","description":"Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will help you","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner | McAfee Blog","og_description":"Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will help you","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-05-19T16:30:22+00:00","article_modified_time":"2024-07-08T08:35:57+00:00","og_image":[{"width":659,"height":500,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","type":"image\/jpeg"}],"author":"Ankit Goel, Oliver Devane","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Ankit Goel, Oliver Devane","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/"},"author":{"name":"Ankit Goel","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/dc28cb8f3ec39b02e64ac9e2c714cdcb"},"headline":"How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner","datePublished":"2020-05-19T16:30:22+00:00","dateModified":"2024-07-08T08:35:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/"},"wordCount":1810,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/","name":"How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","datePublished":"2020-05-19T16:30:22+00:00","dateModified":"2024-07-08T08:35:57+00:00","description":"Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will help you","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","width":659,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-to-use-mcafee-atp-to-protect-against-emotet-lemonduck-and-powerminer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/dc28cb8f3ec39b02e64ac9e2c714cdcb","name":"Ankit Goel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/3f8b0f794c3945987376e3b6c6cbc86d","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/IMG_6565-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/IMG_6565-96x96.jpg","caption":"Ankit Goel"},"description":"Ankit Goel is a Software Engineer at McAfee and have about 5 years of experience in authoring content for detecting threats. He also help teams to collect data trends for visibility into threat landscape.","sameAs":["https:\/\/www.linkedin.com\/in\/ankit-goel-9b2b2037\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/ankit-goel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/101181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1135"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=101181"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/101181\/revisions"}],"predecessor-version":[{"id":196167,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/101181\/revisions\/196167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96564"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=101181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=101181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=101181"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=101181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}