Skip to content

ESET發現,利用最新Exchange漏洞的APT組數量在增加,成千上萬的電子郵件服務器遭到圍困

BRATISLAVA, MONTREAL – ESET Research has discovered that more than ten different advanced persistent threat (APT) groups are exploiting the recent Microsoft Exchange vulnerabilities to compromise email servers. ESET has identified more than 5,000 email servers that have been affected by malicious activity related to the incident. The servers belong to organizations – businesses and governments alike – from around the world, including high-profile ones. Thus, the threat is not limited to the widely reported Hafnium group.

In early March, Microsoft released patches for Exchange Server 2013, 2016 and 2019 that fix a series of pre-authentication remote code execution (RCE) vulnerabilities. The vulnerabilities allow an attacker to take over any reachable Exchange server, without the need to know any valid account credentials, making internet-connected Exchange servers especially vulnerable.

“The day after the release of the patches, we started to observe many more threat actors scanning and compromising Exchange servers en masse. Interestingly, all of them are APT groups focused on espionage, except one outlier that seems related to a known coin-mining campaign. However, it is inevitable that more and more threat actors, including ransomware operators, will have access to the exploits sooner or later,” says Matthieu Faou, who is leading ESET’s research effort into the recent Exchange vulnerability chain. ESET researchers noticed that some APT groups were exploiting the vulnerabilities even before the patches were released. “This means we can discard the possibility that those groups built an exploit by reverse engineering Microsoft updates,” adds Faou.

ESET telemetry flagged the presence of webshells (malicious programs or scripts that allow remote control of a server via a web browser) on more than 5,000 unique servers in over 115 countries.

ESET hourly detections for webshells dropped via CVE-2021-26855 – one of the recent Exchange vulnerabilities

Proportion of webshell detections by country (2021-02-28 to 2021-03-09)

ESET has identified more than ten different threat actors that likely leveraged the recent Microsoft Exchange RCE vulnerabilities in order to install malware like webshells and backdoors on victims’ email servers. In some cases, several threat actors were targeting the same organization.

The identified threat groups and behavior clusters are:

  • Tick – compromised the web server of a company based in East Asia that provides IT services. As in the case of LuckyMouse and Calypso, the group likely had access to an exploit prior to the release of the patches.
  • LuckyMouse – compromised the email server of a governmental entity in the Middle East. This APT group likely had an exploit at least one day before the patches were released, when it was still a zero day.
  • Calypso – compromised the email servers of governmental entities in the Middle East and in South America. The group likely had access to the exploit as a zero day. In the following days, Calypso operators targeted additional servers of governmental entities and private companies in Africa, Asia and Europe.
  • Websiic – targeted seven email servers belonging to private companies (in the domains of IT, telecommunications and engineering) in Asia and a governmental body in Eastern Europe. ESET named this new cluster of activity as Websiic.
  • Winnti Group – compromised the email servers of an oil company and a construction equipment company in Asia. The group likely had access to an exploit prior to the release of the patches.
  • Tonto Team – compromised the email servers of a procurement company and of a consulting company specialized in software development and cybersecurity, both based in Eastern Europe.
  • ShadowPad activity – compromised the email servers of a software development company based in Asia and a real estate company based in the Middle East. ESET detected a variant of the ShadowPad backdoor dropped by an unknown group.
  • The “Opera” Cobalt Strike – targeted around 650 servers, mostly in the US, Germany, the UK and other European countries just a few hours after the patches were released.
  • IIS backdoors – ESET observed IIS backdoors installed via webshells used in these compromises on four email servers located in Asia and South America. One of the backdoors is publicly known as Owlproxy.
  • Mikroceen – compromised the exchange server of a utility company in Central Asia, which is the region this group typically targets.
  • DLTMiner – ESET detected the deployment of PowerShell downloaders on multiple email servers that were previously targeted using the Exchange vulnerabilities. The network infrastructure used in this attack is linked to a previously reported coin-mining campaign.

“It is now clearly beyond prime time to patch all Exchange servers as soon as possible. Even those not directly exposed to the internet should be patched. In case of compromise, admins should remove the webshells, change credentials and investigate for any additional malicious activity. The incident is a very good reminder that complex applications such as Microsoft Exchange or SharePoint should not be open to the internet,” advises Faou.

For more technical details about these attacks exploiting the recent Exchange vulnerabilities, read the blogpost “Exchange servers under siege from at least 10 APT groups” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

比聖經創世紀更偉大:觸手協議創世紀

Everything Has a Beginning: The Genesis of Tentacle Protocol

You probably know all kinds of remarkable “genesis”: the biblical and canonized, where Adam and Eve have their first Tinder date, the British rock band from the 60s with excellent Peter Gabriel on vocals and Phil Collins on drums, and of course, the Hyundai Genesis, a passenger car manufactured by the South Korean brand Hyundai Motor Company since 2008… But this time, none of them interests us. We’ll leave the trunk capacity of the Hyundai for another day, but not today, today, in our ominous and greenish Pandora FMS Blog, we will talk about an even more important genesis for the history of the beginnings and the startings (drum roll), the beginnings of Tentacle Protocol.

And to talk about the origins of Tentacle Protocol, we had to make an effort to find our colleague Ramón Novoa Suñer, Head of the AI department and Senior Chief Programmer at Pandora FMS, a hero for the company, who has been here for as many years as it exists and that, therefore, houses all the possible knowledge on the matter, right within its experienced and ancient testa.

To find Ramón, we had to undertake a dangerous journey, crossing the icy glacier and the burning desert, traveling day and night without rest, risking our life and our physique, crossing the most spectral swamps and mountain slopes, enduring merciless winds, to finally reach the medieval fortress where he was, always involved in his chores and completely oblivious to the admiration that the world professes him.

Proposing an interview with Ramón was easy, but it took time to carry it out, that’s why I stayed with him as an apprentice. I slept in the highest tower of the castle and devoted myself to absorbing all kinds of technological knowledge that got thrown on me to the ground like little bones. I didn’t want to waste a second spent with him. After all, he is one of the most recognized geniuses in his field. The Dumbledore of programming.

Weeks passed, then years, but finally the long-awaited interview about the origin of the Tentacle Protocol that I longed for and that led me there came. Now I want to share it with you on this blog, as I ride away from the fortress as the voice of Master Ramón still resounds in my head:

Oh Master, what year would you say it was when the Tentacle Protocol was invented?

* Hmm … 2008, if I’m not mistaken, because by now it’s already been a few years… I would say shortly after I finished my degree and started working at Ártica. It still seems to me that it was yesterday, and here we are, more than a decade and a pandemic later…

*Important remark: All of the answers that Ramón gives us, should resonate in your head with the deep voice of a wise hermit, if not, you’re not reading this the right way.

¿Where does that science fiction name come from?

I’m very glad that you asked me that question, little Dim. You see, the Pandora FMS logo at that time was an octopus, so the name seemed like the most appropriate, don’t you think so? It is also a tribute to a popular video game from the 90s. You don’t need me to give you more clues, right? Authentic and pure people, the ones who are really worth it, will know what video game I refer to.

Do you remember who was involved in the project from the beginning?

The idea of the project came from Sancho Lerena, the famous CEO, and I was the developer. Keep in mind that at that time there were only two programmers in Ártica ST. We still had absolutely no idea about the people who would join us in this dream.

From what did the idea of this protocol arise? What is its true origin?

Well, at the very beginning, Pandora FMS agents used SSH or FTP to send data to the server. But users had a lot of trouble configuring these protocols correctly. So we decided to develop a simple protocol that would work without no more additional initial configuration than that of the IP address and the port of Pandora FMS server. Helping and simplifying has always been the purpose of the Tentacle Protocol, and boy did it do well.

What exactly is the Tentacle Protocol?

It is a text protocol (like SMTP or HTTP) to transfer files. The specification is very simple, it is given in our Wiki, the most sacred group of texts that I know, it contains from the Alpha to the Omega of this organization. The Tentacle Protocol is less efficient than a binary protocol, but more readable and easier to debug. Giving it that magic that it has.

What is it for?

Basically send and receive files. The advantage it has, as I mentioned before, is that it is very easy to configure. You don’t even need to specify the destination directory. It also supports slightly more advanced features such as data compression or the use of X.509 certificates.

How important is it for Pandora FMS?

It is essential for transferring XML data files from agents and satellite servers to Pandora FMS server. It is also used to manage remote configuration, file collections, etc. Also, the Tentacle server can work as a proxy.

Is it true that in good hands and used in the right way it could save the world?

If the instructions to save it had to be sent through a TCP/IP stack, I have no doubt.

Let’s fantasize, if you could rename it now, what would you call it?

A) Metal Gear Solid Protocol: Solid Snake you are the boss.
B) Testicle Protocol
C) Tenta-cool protocol
D) Protocol A Feira

E) “Octopus” too, in reference to Doctor Octopus as well.

And that was it for my story of how I managed to find Ramón Novoa at the end of the world and have him explain everything about the genesis of the Tentacle Protocol. I will never forget his hospitality, his erudition, or how the monk’s habit that I wore throughout the training in technological knowledge, there in the tower, was constantly killing my waist.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

網絡安全的未來:身份,分段和邊緣保護

What it takes to properly secure corporate networks in the world of remote work, BYOD & IoT

The workplace has changed thanks to COVID-19. Many of us continue to spend most, if not all, of our workdays at home, juggling Zoom meetings, kids, pets, relationships, cooking, cleaning…you name it. Since at least February 2020, organizations around the world have altered the way they operate – encouraging their employees to stay home, stay safe, but stay available.

On top of the immediate operational challenges that companies faced when shifting to full or hybrid work environments, the rise of remote work in response to COVID-19 has pushed a number of network security shortcomings to the surface. In response, cybersecurity vendors and IT professionals have accelerated the development of and search for solutions to fill these network security gaps.

As we return to the office and arrive in a post-COVID-19 world, these areas will dominate the evolutionary direction of corporate network security…

The Role of Identity

As people, we represent the weakest link in the network security armor. While we may wish we were infallible, we’re really full of bad cybersecurity habits, like weak passwords, forgetting to back up data, or clicking on hyperlinks in emails from strangers. Our identities, however, can also be our strongest means of securing networks. The rise of multi-factor authentication (MFA) identity and access management (IAM) tools is allowing organizations to verify employee identity and authenticate their access to the network in real-time, no matter the employee’s location or whether they’re attempting to connect with a managed or personal (BYOD) device.

Network Segmentation

Segmenting the network is a cybersecurity best practice. Period. For any companies, this practice is even a regulatory requirement (e.g., the Payment Card Industry data security standard (PCI)). Network segmentation is simply a means of dividing up a network into smaller parts, ensuring the right people only have access to the parts of the network that are relevant to them. It is a measure that improves the effectiveness of an organization’s investments in other security tools, and can help to prevent significant damage to critical data across the network after a company has experienced a breach.

Securing the Edge

Gartner introduced SASE a few years ago. It represents a new enterprise networking technology category that converges the functions of network and security solutions into a single, unified cloud service. This marks an architectural transformation, as it allows IT teams to leverage a holistic and flexible service to their businesses. Critical to this budding area is NAC. Specifically, the movement of NAC to the cloud eliminates expensive on-site hardware and hidden maintenance costs. With cloud NAC, like Portnox CLEAR, all that’s needed to control network access across a geographically dispersed network is an internet connection.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

世界消費者權益日:在線保護消費者權益

On March 15, 1962, President John F. Kennedy called on Congress to enact legislation to protect consumer rights – he was the first world leader to formally address the issue. Since 1983 this date has been marked as World Consumer Rights Day. The consumer movement uses this day every year to mobilize action on important issues and campaigns, including digital marketplaces, plastic pollution, and fair mobile phone services. Simply put, celebrating World Consumer Rights Day is an opportunity to demand that the rights of all consumers be respected and protected, and to protest against market abuse and social injustice that undermine those rights.

As the world becomes increasingly digitalized and consumption moves online – with 61% of consumers worldwide shopping online, more often now than they were before the pandemic – the digital aspect of consumer rights is more important than ever. Tech development, from IoT devices to financial technology (FinTech) to new online marketplaces, has a huge impact on consumer rights. As Consumers International notes, digital has become the default way of working for the majority of businesses – and with it comes consumer rights issues, including data protection, privacy, and online scams.

When consumers are online, businesses collect and store data about their purchases and behaviors. This can be convenient, with companies recommending what you’re interested in, sharing discounts, and even reminding you when you need to buy a birthday present. Unfortunately, the downsides can be far more troubling. Organizations may have access to information that helps to influence your decisions, removing some of your free choice without you even realizing. Also, big caches of data – including personally identifiable information (PII) – are attractive to cybercriminals. If breached by hackers, the information stored by online outlets can put you at risk of identity theft, phishing attacks, and scams. This may to contribute to the fact that less than one-third of global consumers (29%) feel very secure when shopping online.

Knowing who has access to information about you is an important step in protecting your data. Mark this World Consumer Rights Day by checking where your information is stored – and what you can do to limit it. According to ESET’s new research into data security and financial technology, consumers around the world are not always aware of how their data is treated. Of those consumers who use free FinTech apps around the world, 50% do not know if these apps sell their data. Seemingly, consumers in different countries have vastly different attitudes to this. Brazil and the UK have the lowest levels of awareness, with over 60% of consumers in both countries not knowing if FinTech apps are selling their data (Brazil 62%, UK 63%). In contrast, far more FinTech users in the US are in the know about how free apps use their data – less than a third (31%) do not know if their data is being sold.

Knowing who has access to your data and how it is being used is a key aspect of protecting your consumer rights online. In President Kennedy’s words, consumers – both online and in store – deserve “the right to safety, the right to be informed, the right to choose, and the right to be heard.” To find out more about World Consumer Rights Day, visit the Consumers International website. For more information on ESET, how to keep your data safe online, and our global FinTech research, click here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

現已推出GREYCORTEX MENDEL 3.7

GREYCORTEX has released the latest version of its Mendel Network Detection and Response solution. Version 3.7.0 brings important features and improvements. The main features in Mendel 3.7.0 include CISCO ISE user identity integration and response, CISCO Firepower incident response, SNMP appliance monitoring & SNMP trap, or AWS, MS Azure and Google cloud deployability.

ENHANCED INTEGRATION WITH YOUR INFRASTRUCTURE

Better visibility on user identity

For use cases when Mendel has no direct access to AD/LDAP server or with limited permissions then user identity could be provided via integration with CISCO Identity Service Engine (ISE).

Active response to threats

For situations where it is necessary to respond to emerging threats, we will ensure appropriate steps through integration with CISCO network elements. If this is unavoidable, you can block endpoint communication, isolate part of the network, etc.

SNMP Appliance Monitoring

With incorporation of SNMP agent and trap functionality you are able to oversee MENDEL appliances with your current infrastructure monitoring solution.

MORE EFFICIENT OPERATIONS 

New upgrade management to all your appliances

Upgrade the whole Mendel deployment through a single point  = collector’s UI. Choose either “One click” multi upgrade or upgrade each sensor individually. Upgrade is performed by two step method, to keep sensor running for maximum time and shorten the maintenance time.

Mendel installation on common cloud services 

Amazon Web Services, Microsoft Azure and Google Cloud are now supported for deployment of Collector or Central Event Management (CEM).

Utilization of high-speed disks within MultiTier storage and optimized database queries

Use your fast disks not only for the operation of the system itself, but also for a much faster response of the user interface when displaying the „hot“ data and views of them. If your deployment does not have multi-tier storage with fast disks, we still bring you a faster response in the GUI by optimizing the database queries.

False Positives for limited time period

Hide events only for the time that is relevant and related to the maintenance of your infrastructure, tests, etc. Apply false positives with specific time frame and/or recurrence.

Conditional PCAP recording

Data captures can be triggered on-demand or by specified conditions (user-defined & event-based).

OT/ICS/SCADA

Asset discovery 

Ability to discover devices in network using various OT protocols to get asset details such as firmware versions, and many others.

Policy monitoring

We introduce a new script approach in IDS rules which allows you to define custom policy rules to monitor allowed values and perform whitelists/blacklists operations inside OT protocols like IEC104, MMS and many others.

ALL FEATURES – IT

CISCO ISE user identity integration and response
CISCO Firepower incident response
SNMP appliance monitoring & SNMP trap
Upgrade management over appliances
AWS, MS Azure and Google cloud deployability
High-speed disk utilization within multi-tier storage
False positives for limited time period
Trigger based PCAP recording
Processing netflow data with NAT information
Switch flow errors  from flags to real calculation
Connect Mendel sensor to secondary collector (HA)
Deactivate inactive Sensor on Collector
User Documentation available via GUI
Time validity of false positives
Connect Mendel sensor to secondary collector (HA)
Deactivate inactive Sensor on Collector 

FEATURES – OT / ICS

Asset Discovery
Parsing MQTT, COAP and Profinet protocols
Detection of LoRaWAN protocol

ENHANCEMENTS

Process VMware ESXi NSX-T IPFIX format
Add support for storing Suricata Variables in DB
Enhance update server update data sources
Semi-automated restoration of SMB backup
IDS signatures using the detected application
Display the logged-in user name on all pages
False positive change Priority field Default text
False positive not applicable into past by default
Import new JA3 hash codes from ja3er.com
Add description field into data exports
Hide user from managerial/security reports and email
Added assignee, reporter and date of last updated to Incident exports (PDF)
Reworked Firewall settings with new location in UI
Better explanation over data transfer between hosts in peers graph
Evaluate and add IPv6 multicast address into monitored subnets
System logs in mshell
CAT tool for ME localization 

OFFICIAL MENDEL PRODUCT SUPPORT

With release of version 3.7.0 full-service support will be provided for the versions 3.7.x and 3.6.x. Limited service support is provided for previous version 3.5.x. Versions 3.4.x and older are no longer supported, end-users with valid support and maintenance or active SW subscription can upgrade to the supported version(s).

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

醫療保健提供商從Aruba ClearPass轉移到Portnox CLEAR

AbsoluteCare is a fast-growing regional integrated healthcare provider headquartered in Baltimore, Maryland, with facilities up and down the East Coast, including Atlanta, Philadelphia, and Washington, DC. Since 2000, AbsoluteCare has provided medical assessment and treatment to tens of thousands of people through its “wrap-around” care model.

“Several years ago, as the company continued to grow, many of our customers, including companies like Anthem and BlueCross BlueShield said we needed to be HITRUST certified in order to work with them,” said Chris Becker, AbsoluteCare’s National IT Director. As part of that journey towards HITRUST certification, Becker and his team discovered that they would need to implement a network access control (NAC) solution.

“At that time, we looked at HP Aruba ClearPass and Cisco ISE, and decided to go with Aruba,” Becker continued. “We spent quite a bit of money to get it implemented – relying on outside consultants to get it up and running and conduct training – it’s a rather large application. We ultimately used it minimally because much of the functionally was overly complex.”

In general, the company utilizes managed corporate devices across its workforce, specifically Dell laptops running Windows X, as well as a number of iPads and iPhones. “We have a small population of BYOD, but we don’t encourage it – it’s just more work to manage the compliance of those devices with the limited internal IT resources we have,” Becker stated.

Migration Challenges

In the summer of 2020, AbsoluteCare found itself in a bind during a datacenter migration. “We decided to move our Aruba servers from one datacenter to another, and we found out – oh my gosh – this is going to cost us like $30,000 just to move it,” continued Becker. The hidden costs didn’t end with just the migration, however. Becker and his team realized they would have to incur more fees to upgrade ClearPass because the version was nearly three years old.

“We saw dollar signs. Lots of dollar signs. Not only that, but ClearPass really didn’t grow with us – you almost have to be an HP Aruba expert to really make the solution work for you the way you need it to,” Becker recalled.

clearpass nac quote

Headed in a Different Direction

To avoid paying staggering professional services fees for the expertise needed to execute the ClearPass server transfer, Becker and his team opted to go out in search for a new NAC solution that would eliminate these hidden costs and provide a lightweight, flexible option for network access control.

“We definitely wanted cloud. We’re fans of cloud – both private and public,” Becker indicated. “Portnox CLEAR definitely fit the core requirement to act as our NAC solution, but it also offered other benefits through its optional agent that made it the clear winner for us.”

Out With the Old, In With the New

AbsoluteCare was able to swiftly roll out Portnox CLEAR with its AgentP add-on, allowing Becker and his team to leverage the platform’s on-or-off network endpoint risk posture assessment and automatic device remediation capabilities for users on its wired and wireless networks.

“This is one of the things I really liked about Portnox,” said Becker. “When we initially got access to the environment to conduct our proof of concept, we set up our account and then set a meeting for a week out to assess where we were and what we still needed to do. Well, my systems admin basically got everything configured in a few days all on his own.”

portnox clear v. aruba clearpass

For AbsoluteCare, Portnox CLEAR’s ease of use was a major selling point. “I mean, coming off of something like ClearPass, where you basically need to be a systems engineer to figure it out – Portnox CLEAR was just a piece of cake,” Becker reveled…

Want to read the full case study? Download it today.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Greycortex就像醫生一樣,阻止客戶感染網絡疾病

What a person encrypts, a person can also decrypt. This was true a couple of years ago. Nowadays, cyber-criminals use advanced technologies and their attacks are much more sophisticated and targeted, and consequences are much worse. “Not only the good guys (i.e. cyber protection companies) but also the bad guys are evolving. Attacks are aimed at weak points and human errors,“ says Petr Chaloupka, CEO of GREYCORTEX, a company that focuses on IT and industrial network security. The story of this company that succeeded among the fastest growing tech companies began long before its foundation. It is a story about passion, vision, skills and a ton of humour. And, in a way, it is connected to the beginning of computerisation in Czechoslovakia.

Maybe you too still have a vivid memory of this history chapter and maybe you remember 8-bit computers – or maybe you don’t. Luckily, there is Petr Chaloupka, the founder and CEO of GREYCORTEX, and his memories of a contest from the ’90s, a text game passed around on cassettes and floppy disks that were created very long ago for 8-bit computers. Cassettes and floppy disks were… well, just google it, kids! “This game was protected by a password that was announced on a certain day in the newspaper, on the radio and on TV to give everyone the same fair start. However, my friend and I didn´t feel like waiting and so, after several hours of reverse engineering, we identified the password and came to the conclusion that what a person encrypts, a person can also decrypt. And that is maybe where my lifelong passion for cybersecurity started and this seemingly innocent story signalled my future professional career“.

A STORY OF A COMPANY STANDING ON THE FRONT LINE IN THE BATTLE AGAINST HACKER ATTACKS

The first chapter of the GREYCORTEX story began around 2005. “I was working on an antivirus for Linux, which was a completely insignificant platform for cybercriminals back then and for which there was no malware. There were only a few lab experiments for proving that there could be one. My colleague Michal Drozd used to hack banking systems using social engineering and customised malware“, reminisces Petr Chaloupka about the beginnings with a smile. The group includes another Petr – Petr Chmelař. “Back then, he was working on machine learning principles that would be capable of finding video signal anomalies. A strong technology for which there may have been another use. What about transferring it from the video world into a computer network“? asks Petr Chaloupka rhetorically with a good portion of irony.

However, you are probably more curious about the ending of the first plotline, about Michal Drozd and his bank story. There was no shocker – Michal Drozd stood on the right side and banks paid him to do what he did. We would say today that he was an ethical hacker. “However, if he had decided to become a cybercriminal, he would be very rich by now,“ adds Petr Chaloupka.

But let’s be more serious now. Fast forward fifteen years later. Petr Chaloupka sums up that Linux is a common and widespread platform, interesting enough for cybercriminals to attack. GREYCORTEX is now a well-established company focusing on the development of security products for network protection, machine learning and AI research, and the second fastest growing tech company in the Rising Stars category of the Deloitte Technology Fast 50 competition.

“Were we visionaries back then? I don’t know. Maybe we were just the three right people at the right place, and if we had never met, nothing would have happened. Literally. But we did meet, a couple of good questions were asked and we started to look for answers together.“

THOROUGH AND COMPLETE SECURITY

The second chapter of the GREYCORTEX story was about visionary questions in the end; for example, how can someone manage to break into a bank or any other company without having to leave their home? And how come they don’t get caught? Then the right answers came and with them the first specific solution.

“Somewhere around 2014, things blended really well and when five more friends and colleagues joined us at the end of 2015, everything was ready to establish a company and start our business. It needs to be said that all founders are still with us in different roles in the company, helping it grow.“

Petr Chaloupka

Four years later, the company became five times as big. “Our product ‘Mendel’, which can uncover hidden threats in the network, from unknown devices to advanced attacks, has matured. After overcoming some childhood diseases and puberty, it is becoming a model for others – we helped introduce another branch of cyber security into the world! It used to be called NTA (Network Traffic Analysis) in the past; now it is called NDR (Network Detection and Response),“ says Petr Chaloupka.

Don’t worry if you are getting a little lost in all the information, you have a right to that and you deserve an explanation: NDR combines deep visibility into infrastructure with the capability to detect known and unknown attack and malware types and to react to them in real time. So, it is clearer now, isn’t it? Same as the fact that “the world is changing, technologies are changing and we are changing with them. It is important that we have done our bit and continue to give cybercriminals a hard time and ruin their filthy and immoral business,“ remarks Petr Chaloupka.

What was the worst in the beginning? “Even in our case, it holds true that all theory is grey, but the golden tree of life springs ever green, so we do everything in a completely different manner than we used to. However, the most important thing is that we learned to understand what it means not only to have a good product but also to sell it and persuade clients that they need it. You could say that we are selling insurance or that we are like Eastern medicine – we ensure that the client does not become infected and he pays us for not getting ill.“

To sum it up, Petr Chaloupka views success and failure as communicating vessels. “A functioning and growing company is a success, even though it arose from humble financial background and was basically only a dream of a few founders some 6 years ago. From the beginning, we had a vision of building a global company and so our plans now are clear – to strengthen our position in the territories in which we already operate and gradually add other locations to reach our goal. It is definitely important to find balance between this dream goal and the need to have both feet on the ground (or at least one foot).“

This article was originally published here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

ESET指出已有十多個駭客組織正在開採Exchange Server的ProxyLogon漏洞

國際資安大廠ESET發現已有十多個駭客組織正在開採微軟於3月2日修補、統稱為ProxyLogon的4個Exchange Server安全漏洞,而且自微軟公布相關漏洞之後,ESET所偵測到的惡意Web Shell大幅增加。

根據ESET的調查,在微軟公布及修補ProxyLogon漏洞之前,就有多個駭客組織開採了相關漏洞,從1月3日的Hafnium,2月28日的Tick,3月1日的LuckyMouse、Calypso Websiic,到3月2日的Winnti,而當微軟公布及修補漏洞之後,又再出現了Tonto、ShadowPad 、Opera、IIS、Mikroceen DLTMiner,而上述除了DLTMiner是為了植入挖礦程式之外,其它所有組織都是屬於鎖定間諜行動的APT駭客組織。

駭客的攻擊路徑類似,在利用ProxyLogon漏洞進駐受駭者系統之後,會先植入惡意的Web Shell,再安裝額外的惡意程式。於是,ESET密切觀察全球Exchange Server上的惡意Web Shell,發現在微軟發布及修補ProxyLogon漏洞之前,被嵌入惡意Web Shell的伺服器不超過200臺,但3月10日時,全球115個國家已有超過5,000臺伺服器含有惡意Web Shell。

ESET研究人員表示,他們至少看到了超過10個APT駭客組織濫用相關漏洞,並針對特定目標發動攻擊,這些駭客組織包括LuckyMouse、Tick,以及Winnti Group等。而對於目前全球的受害情況如何,ESET也提出相關數據──他們對自家用戶進行遙測的結果發現,該公司在全球超過115個國家裡,偵測到至少5千個已遭植入網頁殼層(Web Shell)、疑似受害的Exchange伺服器。

根據ESET的數據顯示,他們約從2月28日就陸續偵測到有Exchange伺服器受害,但在微軟發布修補程式之後,遭到攻擊者濫用CVE-2021-26855漏洞攻擊的郵件伺服器數量,約於世界協調時間(UTC)3月3日零時開始大幅增加,到了4時凌晨,最多出現將近2千臺伺服器被植入網頁殼層。再者,ESET也看到,一些受害組織的Exchange伺服器上,遭到多組人馬鎖定。


以下是ESET揭露的駭客組織與攻擊行動:
1.Tick(Bronze Butler)
開始發動攻擊時間:2021年2月28日
攻擊目標:一家東亞IT服務業者

2.LuckyMouse(APT27、Emissary Panda)
開始發動攻擊時間:2021年3月1日
攻擊目標:一個中東政府實體

3.Calypso
開始發動攻擊時間:2021年3月1日
攻擊目標:中東與北美政府實體

4.Websiic
開始發動攻擊時間:2021年3月1日
攻擊目標:7臺郵件伺服器。這些伺服器所有者的身分,包含了亞洲的IT、電信,以及工程公司,以及一個東歐政府機關。

5.Winnti Group(Barium、APT41)
開始發動攻擊時間:2021年3月2日
攻擊目標:一家石油公司,以及一家建築設備公司

6.Tonto Team(CactusPete)
開始發動攻擊時間:2021年3月3日
攻擊目標:東歐的一家採購公司,以及一家軟體開發暨資安顧問公司

7.未確認身分的駭客組織:此組駭客濫用ShadowPad的攻擊行動
開始發動攻擊時間:2021年3月3日
攻擊目標:一家東亞軟體開發公司,以及一家中東的房仲公司

8.未確認身分的駭客組織:此組駭客發動“Opera”Cobalt Strike攻擊行動
開始發動攻擊時間:2021年3月3日
攻擊目標:截至3月5日約650臺伺服器遭鎖定,多數位於美國,以及德國、英國等歐洲國家

9.未確認身分的駭客組織:此組駭客發動IIS後門攻擊行動
開始發動攻擊時間:2021年3月3日
攻擊目標:4臺郵件伺服器,位於亞洲與南美洲

10.Mikroceen(Vicious Panda)
開始發動攻擊時間:2021年3月4日
攻擊目標:一家位於亞洲中心的公營事業公司

11.DLTMiner
開始發動攻擊時間:2021年3月5日
攻擊目標:N/A


原文出處:https://www.welivesecurity.com/2021/03/10/exchange-servers-under-siege-10-apt-groups/

#若有任何資安需求,歡迎洽詢台灣二版資安專業團隊,服務電話:(02)7722-6899,或上官網查詢:https://version-2.com.tw/?skip=1

 

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟體提供商,其 獲獎產品——NOD32防病毒軟體系統,能夠針對各種已知或未知病毒、間諜軟體 (spyware)、rootkits和其他惡意軟體為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲 得了更多的Virus Bulletin 100%獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳 能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布里斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事 處,代理機構覆蓋全球超過100個國家。

【ESET】舊版軟體版本將於2021年終止支援服務(End of Life)

  • 什麼是終止支援服務(End of Life)?
    在ESET產品結束其生命週期,將不再提供支援或協助,並無法保證產品之功能,含模組更新(其中包含病毒碼更新)。
  • 該如何確認ESET使用版本號?
    【開啟ESET產品】→【說明及支援】→【技術支援詳細資料:產品版本】
    相關詳細資訊請參閱:【說明文件
  • 若為受影響之版本號,該如何升級?
    若為Windows 7 & Server 2008 R2請先更新Windows KB4474419KB4490628
    若為Windows 10建議移除舊版ESET重啟電腦後,再次下載並安裝;
    若為Windows XP、Server 2003建議系統需更新,若無法更新系統也請安裝ESET符合之產品。
    相關詳細資訊請參閱:
    【Windows 7 & Server 2008 R2-說明文件】【Windows XP、Server 2003-說明文件
  • 受影響之ESET產品 (未提及之系統皆為Windows 系統)

     

    ESET Business 產品名稱版本號停止支援新版載點
    ESET Endpoint Security6.6.x2021/03新版載點
    5.x-6.4.x2021/06
    ESET Endpoint Antivirus7.0.x-7.2-x2021/12新版載點
    ESET File Security for Microsoft Windows Server6.0.x-6.4.x2021/06新版載點
    ESET Mail Security for Microsoft Exchange Server新版載點
    ESET Mail Security for IBM Domino;新版載點
    ESET Security for Microsoft Sharepoint Server新版載點
    ESET Mail Security for Microsoft Exchange Server6.5.x2021/08新版載點
    ESET Mail Security for IBM Domino新版載點
    ESET Security for Microsoft Sharepoint Server新版載點
    ESET Remote Administrator (ERA)All version2020/12ESET PROTECT
    ESET Security Management Center (ESMC)7.0.x2021/11
    ESET File/Mail/Gateway Security for Linux/FreeBSD4.x含以下2021/12不再支援更新
    ESET Endpoint Security for macOS6.8.x含以下2021/06新版載點
    ESET Endpoint Antivirus for macOS新版載點
    ESET 舊版產品版本號停止支援新版載點
    ESET NOD32 Antivirus Business Edition4.x含以下2021/06ESET官網確認您的產品,
    再至下載符合您系統之軟體新版載點
    ESET Smart Security Business Edition
    ESET Home 產品名稱版本號停止支援新版載點
    ESET Smart Security10.x含以下2019/02新版載點
    ESET NOD32 Antivirus13.x含以下2021/10新版載點
    ESET Internet Security新版載點
    ESET Smart Security Premium新版載點


    完整詳細資訊,請參閱 https://support-eol.eset.com/tw/trending_eol_products_2021.html
    更多End of Life資訊請參閱:
    ESET End of Life policy (Business products)【相關說明
    ESET End of Life policy (Home products)【相關說明

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟體提供商,其 獲獎產品——NOD32防病毒軟體系統,能夠針對各種已知或未知病毒、間諜軟體 (spyware)、rootkits和其他惡意軟體為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲 得了更多的Virus Bulletin 100%獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳 能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布里斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事 處,代理機構覆蓋全球超過100個國家。