{"id":97203,"date":"2019-10-28T09:02:38","date_gmt":"2019-10-28T16:02:38","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=97203"},"modified":"2025-05-29T03:37:08","modified_gmt":"2025-05-29T10:37:08","slug":"did-you-check-your-quarantine","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/","title":{"rendered":"Did You Check Your Quarantine?!"},"content":{"rendered":"<h3>A cost-effective way to detect targeted attacks in your enterprise<\/h3>\n<p>While it is easy to get caught up in the many waves of new and exciting protection strategies, we have recently discovered an interesting approach to detect a targeted attack and the related actor(s). Quite surprisingly, a big part of the solution already exists in most enterprises: the tried, tested endpoint security platform. In this case, we used our own McAfee Endpoint Security (ENS). Along with ENS, we used GetQuarantine, a freeware tool from McAfee, and a third-party threat analytics service.<\/p>\n<h2>The Problem<\/h2>\n<p>We will begin with a working definition of a targeted attack:<\/p>\n<p><span style=\"color: #3366ff;\">A targeted attack is a threat in which a threat actor actively pursues and compromises a specific target. To achieve the goal, the adversary may adapt and improve their attack(s) to counter the victim\u2019s defenses and persist at it for a long period of time.<\/span><\/p>\n<p>What does this say? First, the adversary\u2019s objective is to compromise a specific target, not just an arbitrary target. Second, the adversary is skilled enough to know how defenses work and is resourceful enough to actively adapt and improve their attack to beat defenses. Third, the adversary is determined enough to pursue the objective for perhaps an indefinite period of time.<\/p>\n<p>Taken together, the above characteristics challenge most defense technologies. Why so? Because these characteristics run counter to the assumptions on which these technologies are based.<\/p>\n<p>At the heart of it, most defense technologies are signature-based, where the signatures are created either by a human analyst, by a machine, or by using instances of known malicious behavior. The cost of constructing signatures is high and is amortized by using the same signature to defend against the same attack elsewhere.<\/p>\n<p>Twenty years ago, when there were just a few thousand examples of malicious software around, it was relatively easy to find the origin, perpetrators, and the reason for the creation and release of a malicious file or application. Security researchers would manually analyze each sample, carefully identify similarities with previously known samples through sheer memory and label each sample with a unique name. This method worked well because the attacks then were opportunistic and aimed at spreading as wide as possible. This meant that anti-virus companies could discover an attack in one place, extract relevant detection signatures, and send the signature updates to its install base.<\/p>\n<p>Now, security threat intelligence companies receive hundreds of thousands of new malware samples every day. There is simply not enough time or resources to analyze each malware to answer who, what, when, and why? The best any anti-virus software can do is to classify a file into just two bins: good or bad. It is impossible for researchers to manually look at every sample and process them to the same detail as before. To make matters worse, attacks today are targeted. Attackers create one-off variants aimed at a specific enterprise. This makes it virtually impossible to connect attacks across enterprises to understand the attacker.<\/p>\n<p>And therein lies an important problem. Just as the numbers and sophistication of attacks have increased exponentially, the objective of tracking who is behind an attack, and identifying linkages between different malware samples and their authors, and the intent behind an attack, have been lost.<\/p>\n<p>Why should it matter? In the absence of information about who is attempting to breach an organization, defenders are left operating in the dark. They make security decisions based on breaches that happen elsewhere using threat intelligence that is most often irrelevant, and when relevant, is most likely outdated.<\/p>\n<h2>The Solution<\/h2>\n<p>Analysis of targeted campaigns shows that programs that are part of an attack usually show a couple of similar characteristics. First, the malware or attack mechanism is focused on one enterprise or, at most, one sector and second, the malware program demonstrates evolutionary characteristics where the actor repeatedly unleashes different variants of it. Our proposed solution focuses on these characteristics and tries to uncover targeted campaigns by finding binary semantics between malware found in customer environments and known targeted campaigns.<\/p>\n<p>Our solution strategy is:<\/p>\n<p><span style=\"color: #3366ff;\">Endpoint-security detects a malware sample. It is compared with a sample from a known targeted attack. If the similarity is high, it is a strong indication that the ENS detected sample is a part of that targeted attack and the threat actor is the same.<\/span><\/p>\n<p>The strategy is implemented in three building blocks: sample collector, sample storage and targeted attack analysis using third-party threat analytics application.<\/p>\n<p><strong>Sample Collector (<a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/downloads\/free-tools\/getquarantine.html\" target=\"_blank\" rel=\"noopener noreferrer\">GetQuarantine<\/a>)<\/strong><\/p>\n<p>Sample collection is performed using McAfee proprietary licensed freeware, <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/downloads\/free-tools\/getquarantine.html\" target=\"_blank\" rel=\"noopener noreferrer\">GetQuarantine<\/a>. GetQuarantine is a McAfee e-Policy Orchestrator (ePO) deployable tool that can run on all endpoints protected by McAfee ENS. GetQuarantine runs as an ePO scheduled product deployment task. ENS cleans or deletes items that are detected as threats and saves copies in a non-executable format to the Quarantine folder. The GetQuarantine tool on a scheduled run, checks the quarantine folder and uploads items to the McAfee backend if items are not already uploaded during previous tool runs.<\/p>\n<p><strong>Sample Storage (McAfee Workflow &amp; AWS)<\/strong><\/p>\n<p>The McAfee workflow backend receives sample submissions from GetQuarantine and stores them in an S3 bucket. Samples are segregated per enterprise and made available for further analysis. Third-party analytics applications like <a href=\"https:\/\/www.cythereal.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">MAGIC<\/a> can be run on samples to extract targeted attack insights. Analytics services are available to McAfee customers participating in a third-party analytics program. For customers that do not participate in a third-party analytics program, sample processing ends at the McAfee backend layer and the sample eventually gets deleted without further analysis.<\/p>\n<p><strong>Targeted Attack Analysis <\/strong><\/p>\n<p>For our pilot implementation we used Cythereal MAGIC services. The McAfee backend submits samples to MAGIC for binary similarity analysis. Customers can check analysis reports using Cythereal website. Cythereal is McAfee\u2019s Security Innovation Alliance (SIA) partner.<\/p>\n<p><a href=\"https:\/\/www.cythereal.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cythereal MAGIC\u2122<\/a> (malware genomic correlation) is a web-service touted as \u201c<a href=\"https:\/\/www.zynamics.com\/bindiff.html\" target=\"_blank\" rel=\"noopener noreferrer\">BinDiff<\/a> on Steroids\u201d. The system carries out semantic similarity analysis of programs using advanced program analysis techniques at the assembly instruction-level code. The semantics of the program gives more meaningful insights than structural or behavioral characteristics. MAGIC can find similarity between samples submitted using GetQuarantine and also find variants of those samples from MAGIC\u2019s database. It has the facility to provide alerts for campaign detections and can generate YARA rules that can be used for searching other services, like VirusTotal.<\/p>\n<p>We first tried human-driven in-house analysis using open source tools like SSDEEP, <a href=\"http:\/\/roussev.net\/sdhash\/tutorial\/01-intro.html\" target=\"_blank\" rel=\"noopener noreferrer\">SDHASH<\/a>, <a href=\"https:\/\/github.com\/trendmicro\/tlsh\" target=\"_blank\" rel=\"noopener noreferrer\">TLSH<\/a>, etc. to prove the concept of identifying targeted attacks using the binary similarity of samples found in quarantine. Though we were successful in proving this concept with these open source tools, they were not very effective, especially with polymorphic variants, so we explored third-party options and identified <a href=\"https:\/\/www.cythereal.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cythereal<\/a> MAGIC\u2122.<\/p>\n<h2>Architecture<\/h2>\n<p>Figure 1 shows the overall architecture of our system:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97206\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/1-1.png\" alt=\"\" width=\"1277\" height=\"620\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/1-1.png 1277w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/1-1-300x146.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/1-1-768x373.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/1-1-1024x497.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/1-1-1030x500.png 1030w\" sizes=\"auto, (max-width: 1277px) 100vw, 1277px\" \/><\/p>\n<p style=\"text-align: center;\"><em>[Figure 1: McAfee ENS detects a suspicious sample by studying its behavior or other means and then moves the sample file to the quarantine folder. The scheduled execution of the GetQuarantine Tool configured in ePO as a scheduled task submits the sample to the McAfee backend. The third-party analytics app, periodically receives samples from McAfee backend for further analysis.]<\/em><\/p>\n<h2>Case Study<\/h2>\n<p>For a case study, we used samples from a McAfee discovered campaign,<a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-operation-oceansalt.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> Oceansalt.<\/a> We tested the solution\u2019s ability to group samples using semantic similarity and also tested the solution\u2019s ability to identify new variants of Oceansalt samples.<\/p>\n<h3>Illustration of the Solution\u2019s Ability to Group Malware From Quarantine<\/h3>\n<p>McAfee Endpoint Security (ENS) detected two samples of Oceansalt (as listed in Table 1). GetQuarantine submitted these samples to the McAfee backend. Targeted attack analysis of these files showed a semantic similarity of 95.1%. The comparison of their control-flow graphs in Figure 2 justifies the high semantic similarity score.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97207\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/2-1.png\" alt=\"\" width=\"563\" height=\"114\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/2-1.png 563w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/2-1-300x61.png 300w\" sizes=\"auto, (max-width: 563px) 100vw, 563px\" \/><\/p>\n<p style=\"text-align: center;\"><em>[Table 1: Oceansalt samples reported by McAfee\u2122 security operation center in June-July 2018.]<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97208\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/3-1.png\" alt=\"\" width=\"503\" height=\"203\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/3-1.png 503w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/3-1-300x121.png 300w\" sizes=\"auto, (max-width: 503px) 100vw, 503px\" \/><\/p>\n<p style=\"text-align: center;\"><em>[Figure 2: Control-flow graph of Oceansalt samples from Table 1]<\/em><\/p>\n<h3>Illustration of the Solution\u2019s Ability to Link New Variants From the Wild to a Known Targeted Attack<\/h3>\n<p>Finally, we come to the use case that motivated this study. Malware belonging to a targeted attack is identified by its file-hashes. However, attackers use polymorphism and other obfuscations to create new variants. Though McAfee ENS may block such variants, it may not link it to the original attack. Targeted attack analytics can help fill this void.<\/p>\n<p>To test the solution\u2019s ability to locate such targeted attacks, we uploaded an Oceansalt sample (MD5: 531DEE019792A089A4589C2CCE3DAC95 [<a href=\"https:\/\/www.virustotal.com\/gui\/file\/1582eda79d7febbfbd708adbdc90e26cde94a1eae765d86a70977d765252e481\/details\">VT<\/a>]) to MAGIC and identified it as an APT. We then uploaded a large number (thousands) of malware samples via GetQuarantine. As we had thought, targeted attack analytics sent an alert that it had detected variants of Oceansalt (Figure 3).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97209\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/4-1.png\" alt=\"\" width=\"1038\" height=\"792\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/4-1.png 1038w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/4-1-300x229.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/4-1-768x586.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/4-1-1024x781.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/4-1-655x500.png 655w\" sizes=\"auto, (max-width: 1038px) 100vw, 1038px\" \/><\/p>\n<p style=\"text-align: center;\"><em>[Figure 3: Alert about detecting an Oceansalt variant in the quarantine]<\/em><\/p>\n<p>MAGIC\u2019s alert was triggered because it found two Oceansalt variants from the wild which were not previously reported by the McAfee SOC or any other global threat intelligence.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-97210\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/10\/5-1.png\" alt=\"\" width=\"760\" height=\"115\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/5-1.png 760w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/5-1-300x45.png 300w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><\/p>\n<p style=\"text-align: center;\"><em>[Table 2: Two new variants of Oceansalt samples found using semantic similarity]<\/em><\/p>\n<h2>Try Your Quarantine<\/h2>\n<p>We tested the GetQuarantine-based solution in our lab and found encouraging results. If you would like to try out this solution use the following steps, along with McAfee Endpoint Security (ENS):<\/p>\n<ul>\n<li>Download the beta version of <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/downloads\/free-tools\/getquarantine.html\" target=\"_blank\" rel=\"noopener noreferrer\">GetQuarantine<\/a>, a proprietary licensed freeware.<\/li>\n<li>Deploy it using the ePO ecosystem.<\/li>\n<li>On successful sample submission to the McAfee backend, receive an acknowledgment email.<\/li>\n<\/ul>\n<p>To obtain analysis results from the third-party analytics app, follow these steps:<\/p>\n<ul>\n<li>Visit <a href=\"https:\/\/www.cythereal.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cythereal MAGIC\u2122<\/a>.<\/li>\n<li>The MAGIC dashboard contains plots with details about various ongoing campaigns.<\/li>\n<li>Upon selecting a campaign in the plot, a table with all the associated malware is displayed where the customer can download samples and YARA rules.<\/li>\n<li>Whenever MAGIC detects a targeted attack, it sends an alert email to the registered email address of the customer, along with additional threat intelligence, such as information on the threat group, third-party research on the group, and associated IoCs. Customers can also see the list of alerts on the MAGIC website.<\/li>\n<\/ul>\n<h2>Summary<\/h2>\n<p>As you can see from this exercise, traditional AV still has lot to offer and can play an important role in overall security strategy againt targeted attacks. We can amplify signals coming out of AV detections using tools like GetQuarantine and by running analytics on quarantine artifacts to uncover targeted attacks. We can take an incremental approach in solving targeted attack challenges.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the&#8230;<\/p>\n","protected":false},"author":791,"featured_media":96564,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4619,5966],"class_list":["post-97203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Did You Check Your Quarantine?! | McAfee Blog<\/title>\n<meta name=\"description\" content=\"A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the many waves of new and exciting protection\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Did You Check Your Quarantine?! | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the many waves of new and exciting protection\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-28T16:02:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T10:37:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"659\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Prabhat Singh, Sameer Paranjape\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@prabhatsngh\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prabhat Singh, Sameer Paranjape\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/\"},\"author\":{\"name\":\"Prabhat Singh\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f86bd5dee04aef12358eac6d4124f713\"},\"headline\":\"Did You Check Your Quarantine?!\",\"datePublished\":\"2019-10-28T16:02:38+00:00\",\"dateModified\":\"2025-05-29T10:37:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/\"},\"wordCount\":1724,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/\",\"name\":\"Did You Check Your Quarantine?! | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"datePublished\":\"2019-10-28T16:02:38+00:00\",\"dateModified\":\"2025-05-29T10:37:08+00:00\",\"description\":\"A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the many waves of new and exciting protection\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"width\":659,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Did You Check Your Quarantine?!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f86bd5dee04aef12358eac6d4124f713\",\"name\":\"Prabhat Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/559eafbdbc8e52df9352421a2fb43046\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Prabhat-Singh-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Prabhat-Singh-96x96.jpg\",\"caption\":\"Prabhat Singh\"},\"description\":\"Prabhat is the Vice President of Engineering and leads the Data Insights and Engineering group at McAfee. He is responsible for McAfee\u2019s global cloud based protection and security analytics infrastructure engineering and the SIEM product. A cybersecurity industry veteran, Prabhat has led McAfee through various technology pivots, ranging from design and engineering of the Global Threat Intelligence cloud, RealProtect Machine Learning cloud and McAfee\u2019s INSIGHTS product\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/prabhatkumarsingh\/\",\"https:\/\/x.com\/prabhatsngh\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/prabhat-singh\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Did You Check Your Quarantine?! | McAfee Blog","description":"A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the many waves of new and exciting protection","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Did You Check Your Quarantine?! | McAfee Blog","og_description":"A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the many waves of new and exciting protection","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-10-28T16:02:38+00:00","article_modified_time":"2025-05-29T10:37:08+00:00","og_image":[{"width":659,"height":500,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","type":"image\/jpeg"}],"author":"Prabhat Singh, Sameer Paranjape","twitter_card":"summary_large_image","twitter_creator":"@prabhatsngh","twitter_site":"@McAfee","twitter_misc":{"Written by":"Prabhat Singh, Sameer Paranjape","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/"},"author":{"name":"Prabhat Singh","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f86bd5dee04aef12358eac6d4124f713"},"headline":"Did You Check Your Quarantine?!","datePublished":"2019-10-28T16:02:38+00:00","dateModified":"2025-05-29T10:37:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/"},"wordCount":1724,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/","name":"Did You Check Your Quarantine?! | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","datePublished":"2019-10-28T16:02:38+00:00","dateModified":"2025-05-29T10:37:08+00:00","description":"A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the many waves of new and exciting protection","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","width":659,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/did-you-check-your-quarantine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Did You Check Your Quarantine?!"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f86bd5dee04aef12358eac6d4124f713","name":"Prabhat Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/559eafbdbc8e52df9352421a2fb43046","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Prabhat-Singh-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Prabhat-Singh-96x96.jpg","caption":"Prabhat Singh"},"description":"Prabhat is the Vice President of Engineering and leads the Data Insights and Engineering group at McAfee. He is responsible for McAfee\u2019s global cloud based protection and security analytics infrastructure engineering and the SIEM product. A cybersecurity industry veteran, Prabhat has led McAfee through various technology pivots, ranging from design and engineering of the Global Threat Intelligence cloud, RealProtect Machine Learning cloud and McAfee\u2019s INSIGHTS product","sameAs":["https:\/\/www.linkedin.com\/in\/prabhatkumarsingh\/","https:\/\/x.com\/prabhatsngh"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/prabhat-singh\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/791"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=97203"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97203\/revisions"}],"predecessor-version":[{"id":214717,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97203\/revisions\/214717"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96564"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=97203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=97203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=97203"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=97203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}