Dangerous liaisons in cybersecurity: Attackers improve their phishing methods

 

The latest ESET APT Activity Report shows improved phishing techniques that threat actors currently utilize, highlighting the need for high-quality cybersecurity awareness training.

A general recommendation about phishing attacks is not to click on anything that looks suspicious. That’s easy to follow when employees receive an email full of grammatical errors and typos from an unknown source.

However, adversaries have been improving their tactics and experimenting with new ways to make their potential victims fall for phishing — tactics that may not be so easy to spot. And it’s not only about using AI to create grammatically correct or more convincing emails. Recently, ESET researchers noticed a new trend among North Korea-aligned groups trying to build relationships with their targets before sending them malicious content.

Statistically speaking, since human error is involved in most data breaches, it is logical that threat actors don’t hesitate to leverage this major attack vector. To address this, ESET created ESET Cybersecurity Awareness Training, a story-driven course available in English, French, Spanish, and Chinese languages informing employees about current cyber threats and helping businesses with compliance and insurance issues.

A costly mistake

Verizon’s 2024 Data Breach Investigations Report shows that 68% of breaches involved a non-malicious human element, like a person falling victim to a social engineering attack or making an error.

Most of those attacks started with phishing (tricking a user into giving sensitive information or downloading malicious content) and pretexting (use of a fabricated story, or pretext, to gain a victim’s trust) via email, accounting for 73% of breaches.

In 2024, the number of detected breaches involving pretexting surpassed the number of breaches involving traditional phishing attacks, according to Verizon’s data. This could be one indicator that threat actors feel the need to use more sophisticated techniques against their targets, according to the report.

Breaches involving a human element are not only prevalent but also costly, according to IBM’s Cost of a Data Breach Report 2024 conducted by Ponemon Institute. Ponemon’s researchers looked at 604 organizations in 16 countries and regions, finding that an average business loss due to phishing has now reached USD4.88 million per breach. This makes phishing attacks the second costliest type of attack, right after impacts from malicious insiders, which account for an average of USD4.99 million.

I have a proposal for you

Recent ESET findings confirm this trend of threat actors utilizing improved social engineering techniques.

In Q2 2024–Q3 2024, ESET researchers saw the North Korea-aligned activity cluster Deceptive Development and North Korea-aligned group Kimsuky enhancing their phishing attacks with pretexting methods. For example, both tried to use fake job offers to approach the targeted individuals, and only after the victim responded and a relationship was established did threat actors send a malicious package to the victim.

Another group, Lazarus, distributed fake job offers for desirable positions at large companies like Airbus or BAE Systems and delivered trojanized PDF viewers along with decoy PDF documents. This group also impersonated recruiters on professional networks and work platforms, distributing trojanized codebases under the guise of job assignments and hiring challenges with the aim of cryptocurrency theft.

Kimsuky targeted North Korea experts working for NGOs and researchers in academic circles with fake requests to grant a media interview or give a presentation. They tried to establish a relationship with a good old apple-polishing ― sending amiable emails that praised the target’s expertise and asked for help. Once the attackers gained the trust of their victim, Kimsuky delivered a malicious package, usually disguised as a list of questions that should be answered before the event.

The BlackBasta ransomware gang also adopted this relationship-oriented method when targeting businesses, according to the recent discovery of the ReliaQuest threat research team.

First, they send mass email spam targeting employees, provoking them to create a legitimate help-desk ticket to resolve the issue. Then, attackers posing as IT support or help desk staff contact employees via Microsoft Teams chat and send them a malicious QR code, likely for downloading a remote monitoring and management (RMM) tool that BlackBasta can exploit.

How to avoid a toxic relationship

Seeing the above-mentioned cases, it is clear that employees are a critical component of any business’s security that needs to be taken care of. In general, cybersecurity awareness training not only helps businesses to deflect user-oriented cyberattacks and fulfill compliance/insurance requirements but also decreases losses in case of a successful breach by around 5.2%.

ESET acknowledges this threat vector with the global launch of ESET Cybersecurity Awareness Training, which complements ESET PROTECT, a multilayered AI-powered solution for businesses.

Both employee training and multilayered security are integral parts of what ESET calls a prevention-first approach designed to completely evade cyber threats or mitigate them with no or only minimal disruptions in the business flow. It is a complex strategy of shrinking the attack surface while effectively reducing the complexity of cyber defense.

ESET Cybersecurity Awareness Training aims for both of these goals. First, it helps employees to recognize standard and novel cybersecurity threats abusing human factors. Second, it is easy to deploy and operate thanks to deep integration possibilities with various systems, a customizable training portal, and an easy-to-use dashboard. Thus, businesses don’t need to spend more precious IT staff time on it than necessary.

Let’s make it interesting!

ESET Cybersecurity Awareness Training offers an engaging and story-driven experience that helps employees understand which common bad user habits of can endanger the whole company. It also explains how threat actors think — for example, how they search potential victims’ social network profiles to guess their passwords or impersonate them.

The training is based on three decades of ESET expertise in this area and is designed to change employee behavior, rather than merely to check a box for compliance or cyber insurance.

To keep employees vigilant in the long term, ESET Cybersecurity Awareness Training comes with phishing test simulations that businesses can run an unlimited number of times.

Benefits of Premium Cybersecurity Awareness Training

  • Comprehensive online cybersecurity awareness training courses
  • Multiple course options ranging from full 90-minute-long training to short courses taking from 5 to 15 minutes
  • Best practices for remote employees
  • Gamification that engages and changes behavior
  • Helps meet HIPAA, PCI, SOX, GDPR, CCPA compliance requirements
  • Helps meet cyber insurance requirements
  • Certification & LinkedIn badge
  • Unlimited phishing test simulations to test employees
  • Admin console allowing users to manage customizable groups of employees, track learners’ status, and run phishing simulation campaigns
  • School platform where employees can take their enrolled training
  • Automatic email reminders to learners
  • Deep integration with various popular third-party cloud-based services

Fruitful relationship with ESET

Even the best and most expensive cybersecurity solution in the world can be powerless against one fooled employee who shares their password or downloads a malicious file.

Help your employees to navigate through a maze of the evolving world of cyber threats and improve your defenses with ESET Cybersecurity Awareness Training.

 

Why AV-Comparatives named ESET HOME Security Essential its Product of the Year and what it means for home users

 

ESET HOME Security Essential delivers not only outstanding protection of digital life, but also is recognized as the perfect blend of simplicity, advanced customization for tech-savvy users, and low impact on device performance. 

What makes software perfect? Be it an email service, a video editor, a shopping app, or even a video game… First and foremost, it should be outstanding in doing what it is designed to do, right? That’s true, but not the whole story.

On 20 February, ESET was honored with AV-Comparatives’ Product of the Year 2024 Award for ESET HOME Security Essential at AV-Comparatives’ Awards Ceremony. This award is a result of more than 30 years of ESET experience and its efforts to deliver the best cyber protection for home users.

What makes the AV-Comparatives award particularly intriguing is the reviewers’ broad focus on multiple aspects of the assessed cybersecurity solutions. Leaving no stone unturned, they checked anti-malware capabilities, performance, overall user experience, and support across a series of tests in 2024.

Let’s take a look at how ESET HOME Security protects users against both laboratory and real-life scenarios, how it affects the protected device, and why it is so user-friendly.

 

Prevention trumps apprehension

ESET HOME Security Essential excelled across several protection tests, including AV-Comparatives’ Real-World Protection Test, Malware Protection Test, and Advanced Threat Protection Test. What does this mean for users? It proves that ESET can protect them from hundreds of thousands of threats trying to compromise their devices from a variety of entry points.

See for yourself:

Real-World Protection Test – This test aims to simulate real-world conditions users experience every day while browsing the Internet. Antivirus products are tested against hundreds of malicious URLs. Testers also note any required human interactions, i.e. blocking/allowing detected samples to execute.

Malware Protection Test – While in the Real-World Protection Test the gateway to a tested device is the web, in the Malware Protection Test the vectors can be, for example, network drives or USBs – or they cover scenarios in which the malware is already on the disk.

Advanced Threat Protection (ATP) Test – Also known as the Enhanced Real-World Test, this examination uses penetration techniques that allow attackers to target specific external computer systems, and it evaluates how well security products protect against such attacks. This test also evaluates protection against targeted advanced threats such as exploits and fileless attacks.

The Advanced Threat Protection Test also acknowledges the ESET prevention-first approach, where our technology is configured to stop attacks before they happen. To that end, half of the blocked malware samples (7 of 15) were stopped in their pre-execution phase, i.e. before the threat had run and was still inactive on the system.

This protection is not theoretical. ESET detection engines have discovered and stopped many advanced threats such as Lumma Stealer. Sold on the dark web, this infostealer malware mostly targets cryptocurrency wallets, user credentials, and two-factor authentication browser extensions. It also tries to exfiltrate other data from compromised machines and can spread in multiple ways, including cracked installations of popular open-source and paid apps such as ChatGPT or Vegas Pro.

 

Great performance

The real magic behind this “product of the year” is not only making it effective, but ensuring those capabilities don’t significantly slow down the protected device or overwhelm users with false alarms.

Creating security capable of catching malware at every step of its deployment process is one thing (and there can be hundreds of those steps), but it takes a number of real experts to finetune it to effectively block malware without impacting the processes of legitimate software or triggering false alarms. To ensure that the products tested didn’t suffer from these issues, AV-Comparatives’ reviewers also checked for false positives while  products are in their default settings. “False positives can cause as much trouble as a real infection” reads the AV-Comparatives summary report.

ESET HOME Security Essential won the silver medal in the False Positives category as testers detected altogether only 15 false positives during all tests run in 2024. To compare, some other tested solutions produced around 30 false positives in a single test.

On top of that, ESET was also awarded for low system-impact while testers performed usual user procedures such as file copying, installing applications, or browsing websites.

AV-Comparatives’ awards for ESET HOME Security Essential

• Product of the Year 2024, having received the highest Advanced+ Award in all seven tests this year

• Gold Award for the Advanced Threat Protection Test

• Silver Award for Low False Positives

• Bronze Award for the Real-World Protection Test

• Bronze Award for Performance Test

User experience

When considering what the best software should look like, the critical part is user experience. And what did AV-Comparatives have to say about ESET HOME Security Essential?

“Reviewers were impressed by the clean, intuitive user interface designed for non-expert users, as well as extensive customization and scan options available for power users.”

They describe ESET HOME Security Essential as a well-designed and easy-to-use security product providing safe default settings and a clean, intuitive interface for non-expert users, where essential features like “help” and access-control are easily accessible. For power users, the settings dialog has plenty of advanced options, including excellent access-control.

In this way, ESET HOME Security Essential can perfectly serve both average Joes and tech-savvy home admins.

Learn more about ESET HOME Security solutions here.

The Product of the Year

So, what makes a software perfect? Perfect software seamlessly combines functionality, usability, and reliability. It addresses user needs effectively, providing intuitive and user-friendly interfaces that enhance the overall experience.

Having a cyber security solution with all these attributes is especially important when we are talking about protecting your data, identity, and finances. ESET HOME Security Essential is all-in-one protection for your digital life, and ESET is proud to say that it has triumphed as AV-Comparatives´ 2024 Product of the Year.

 

This real-life example shows why your Android should not connect to Wi-Fi automatically

The world of smartphones is full of automation and requires reputable Android protection.

Most smartphone users probably know that connecting to any random Wi-Fi hotspot available is not the best idea. But sometimes, an Android device can autonomously connect to a malicious Wi-Fi network without your awareness.

Imagine that you are at your favorite restaurant, your order is complete, and now you want to check your smartphone before the meal comes. However, without your knowledge, someone else is already monitoring everything you do on your device, including the websites you browse, the applications you use, and the credentials you enter.

An attack like this is possible. For example, if ESET malware researcher Lukáš Štefanko used his Cheap Yellow Display (CYD) tool running Evil M5 firmware for malicious purposes. Luckily, acting as an ethical pen tester, he just published a video showing how easy it can be to obtain Wi-Fi networks that smartphones want to reconnect to automatically. With this information, he could create a fake Wi-Fi access point, or an “evil twin” network, to gather sensitive data from a victim’s device.

Let’s dive a little deeper into these kinds of attacks, and what lessons we can learn from them.

 

Dangers of comfort zones

When creating software, developers always think about usability, user comfort, and user experience. So, it’s only natural that smartphones have an incorporated function to reconnect automatically to previously used and trusted networks.

However, cybercriminals love to exploit situations in which users feel safe and enjoy ever-present automation. The attack displayed by Lukáš Štefanko does the same — this technique preys on the fact that Android smartphones constantly and transparently tell nearby devices which Wi-Fi networks they have connected to, and want to reconnect to, automatically.

Luckily, attacks that require the malicious actor to be physically present at the location aren’t common, but that doesn’t mean that they can’t happen. For example, Australia’s Federal Police (AFP) charged one of its citizens over an alleged evil twin attack on multiple domestic flights and airports in June 2024. His seized devices allegedly contained dozens of stolen personal credentials.

Other times, it can be a state-sponsored operation such as the plot of a UK-based spy ring, as described by a prosecutor during a recent trial. The spy ring, among other things, also operated in Germany, where its members allegedly used an International Mobile Subscriber Identity Catcher or IMSI catcher to intercept mobile phone traffic from a military base where Ukrainian soldiers were training.

 

Other threats

As you can see, connecting and reconnecting to publicly available Wi-Fi networks can pose a danger. And the list of possible threats doesn’t end with rogue hotspots:

Man-In-The-Middle (MITM) attack — In such attacks, cybercriminals intercept communications between a device and the Wi-Fi network, allowing them to access sensitive unencrypted information like passwords, credit card numbers, and personal messages.

Exploitation of vulnerabilities — Cybercriminals can exploit vulnerabilities in less-secure public networks, or vulnerabilities of a targeted mobile device (especially if it doesn’t have updated software), to distribute malware to connected devices. This malware can then be used to steal data, monitor users’ activities, or even take control of users’ devices.

Packet Sniffing — Public Wi-Fi networks often lack proper encryption, making it easier for hackers to eavesdrop on users’ online activities.

How to stay safe

Obviously, the basic security recommendation for Wi-Fi users is to disable automatic connections to Wi-Fi networks, and not use free publicly accessible Wi-Fi networks at all. If this is not possible for any reason, here are a few more tips:

Use a Virtual Private Network (VPN) —VPN creates a secure and encrypted connection between a user’s device and the internet.

Do not share sensitive data — Avoid websites and applications requesting sensitive information such as online banking or shopping sites while on public Wi-Fi.

Stay on top of updates — Keep your software and apps updated. Regular updates often include security patches that protect against known vulnerabilities.

ESET Mobile Security

When it comes to cybersecurity, ESET goes far beyond just simple antivirus — and this also applies to smartphones and mobile devices. ESET Mobile Security is built around the ESET prevention-first approach, stopping attacks before they can do any harm. This goal can be met by securing cybercriminals’ most common points of entry to devices while keeping the security solution simple to use.

ESET Mobile Security is well-prepared for attacks coming from malicious websites, thanks to multilayered protection against phishing, smishing, and scams. For example, Anti-Phishing enhanced by Link Scanner protects users against malicious websites, and Payment Protection delivers a new layer of security for sensitive payment and financial applications.

And the best part? The premium version of ESET Mobile Security utilizing all these features and more is 50% off between March 3 and March 9, 2025!

Enjoy technology with peace of mind

Most would agree that people love comfort, and, in fact, the entire technology industry is driven by users pursuing faster, easier, and more user-friendly solutions for their daily activities. And there is nothing bad about living in the lap of technological luxury; but don’t ignore the threats out there.

Luckily, with a pinch of cybersecurity awareness and a reputable security solution installed on your Android smartphone, you should be fine. Wi-Fi network attacks are well-known, and acclaimed cybersecurity companies such as ESET taking advantage of more than 30 years of experience have you covered.

 

North Korea-aligned DeceptiveDevelopment targets freelance developers with infostealers, ESET Research discovers

  • DeceptiveDevelopment targets freelance software developers through spearphishing on job-hunting and freelancing sites, aiming to steal cryptocurrency wallets and login information from browsers and password managers.
  • This operation primarily uses two malware families – BeaverTail (infostealer, downloader) and InvisibleFerret (infostealer, Remote Access Trojan – RAT).
  • DeceptiveDevelopment’s techniques are similar to several other known North Korea-aligned operations.

PRAGUE, BRATISLAVAFebruary 20, 2025 — Since 2024, ESET researchers have observed a series of malicious North Korea-aligned activities, where the operators, posing as software development  recruiters, entice the victims with fake employment offers. Subsequently, they try to serve their targets with software projects that conceal infostealing malware. ESET Research calls this activity cluster DeceptiveDevelopment. This North Korea-aligned activity is currently not attributed by ESET to any known threat actor. It targets freelance software developers through spearphishing on job-hunting and freelancing sites, aiming to steal cryptocurrency wallets and login information from browsers and password managers.

“As part of a fake job interview process, the DeceptiveDevelopment operators ask their targets to take a coding test, such as adding a feature to an existing project, with the files necessary for the task usually hosted on private repositories on GitHub or other similar platforms. Unfortunately for the eager work candidate, these files are trojanized: Once they download and execute the project, the victim’s computer gets compromised,” explains ESET researcher Matěj Havránek, who made the discovery and analyzed DeceptiveDevelopment.

DeceptiveDevelopment’s tactics, techniques, and procedures are similar to several other known North Korea-aligned operations. Operators behind DeceptiveDevelopment target software developers on Windows, Linux, and macOS. They steal cryptocurrency primarily for financial gain, with a possible secondary objective of cyberespionage. To approach their targets, these operators use fake recruiter profiles on social media. The attackers don’t distinguish based on geographical location, instead aiming to compromise as many victims as possible to increase the likelihood of successfully extracting funds and information.

DeceptiveDevelopment primarily uses two malware families as part of its activities, delivered in two stages. In the first stage, BeaverTail (infostealer, downloader) acts as a simple login stealer, extracting browser databases containing saved logins, and as a downloader for the second stage, InvisibleFerret (infostealer, RAT), which includes spyware and backdoor components, and is also capable of downloading the legitimate AnyDesk remote management and monitoring software for post-compromise activities.

In order to pose as recruiters, the attackers copy profiles of existing people or even construct new personas. They then either directly approach their potential victims on job-hunting and freelancing platforms, or post fake job listings there. While some of these profiles are set up by the attackers themselves, others are potentially compromised profiles of real people on the platform, modified by the attackers.

Some of the platforms where these interactions occur are generic job-hunting ones, while others focus primarily on cryptocurrency and blockchain projects and are thus more in line with the attackers’ goals. The platforms include LinkedIn, Upwork, Freelancer.com, We Work Remotely, Moonlight, and Crypto Jobs List.

Victims receive the project files either directly via file transfer on the site, or through a link to a repository like GitHub, GitLab, or Bitbucket. They are asked to download the files, add features or fix bugs, and report back to the recruiter. Additionally, they are instructed to build and execute the project in order to test it, which is where the initial compromise happens. The attackers often use a clever trick to hide their malicious code: They place it in an otherwise benign component of the project, usually within backend code unrelated to the task given to the developer, where they append it as a single line behind a long comment. This way, it is moved off-screen and stays mostly hidden.

“The DeceptiveDevelopment cluster is an addition to an already large collection of money-making schemes employed by North Korea-aligned actors and conforms to an ongoing trend of shifting focus from traditional money to cryptocurrencies,” concludes Havránek.

For a more detailed analysis and technical breakdown of DeceptiveDevelopment, check out the latest ESET Research blogpost, “DeceptiveDevelopment targets freelance developers,” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

Heatmap of different victims of DeceptiveDevelopment

 

ESET Announces Participation Among Knowledgeable Respondents in Report on Threat Intelligence

  • ESET has been included among knowledgeable respondents in an independent Best Practice report: How To Measure The Effectiveness And Value Of Threat Intelligence.
  • ESET Threat Intelligence (ETI) offerings are ideally suited to meet the needs described in the report of the CART model.

BRATISLAVAFebruary 26, 2025ESET, a global leader in cybersecurity solutions, is proud to announce its participation among knowledgeable respondents whom Forrester surveyed in its Best Practice report: How To Measure The Effectiveness And Value Of Threat Intelligence. Forrester, a respected research firm, highlighted the essential characteristics of credible threat intelligence, summarized in the CART model: Complete, Accurate, Relevant, and Timely. ESET Threat Intelligence offerings align closely with these principles, empowering organizations to strengthen their security posture and stay ahead of advanced threats.

“For us, our inclusion in Forrester’s report reinforces our commitment to delivering actionable, high-quality threat intelligence that meets the evolving needs of today’s organizations,” said Juraj Knapec, Product Manager for ESET Threat Intelligence. “By focusing on clarity, accuracy, and timeliness, we enable our clients to make critical decisions faster, reduce exposure, and bolster their defenses against advanced threat actors.”

Forrester’s CART framework underscores the needs for threat intelligence that is:

  • Complete: Covering a wide range of sources and threat vectors.
  • Accurate: Offering curated and verified insights from practical experience.
  • Relevant: Delivering tailored, actionable information that aligns with organizational needs.
  • Timely: Enabling proactive decisions by anticipating emerging threats.

ESET Threat Intelligence solutions were designed with these principles in mind. By prioritizing quantitative metrics and providing clarity in threat analysis, ESET ensures its clients receive reliable, actionable data to help mitigate risks effectively.

The report also highlights a critical challenge. Many security and risk professionals struggle to measure the value and effectiveness of their threat intelligence, leading to wasted resources and missed opportunities. Forrester emphasizes the importance of using robust quantitative and qualitative metrics to demonstrate the impact of threat intelligence within an organization, which ESET addresses by providing clear threat intelligence metrics to simplify decision-making, as well as quantitative insights that showcase measurable value and drive strategic outcomes.

As further stated in Forrester´s Best Practice report: How To Measure The Effectiveness And Value Of Threat Intelligence: “Metrics are essential for you to demonstrate the effectiveness of threat intelligence, but resist the temptation to rely solely on consumption-based metrics… more does not necessarily mean better. The right target value for a given metric is unique to each organization’s cybersecurity maturity and risk profile.” Built on the robust CART framework, ETI allows us to customize each threat intelligence solution to meet the unique needs of our clients, ensuring they receive the most targeted and relevant information.

ESET Threat Intelligence provides real-time data on malicious files, domains, IPs, URLs, botnets, and APT activity to help organizations act swiftly. Its Advanced Persistent Threat (APT) Reports offer in-depth analyses of advanced threats, with the PREMIUM packages including direct analyst consultations. Curated, actionable insights enhance detection and response, while seamless SIEM and TIP integration maximizes efficiency. With these offerings, ESET empowers clients to automate threat searches, stay ahead of emerging risks, and reduce incident response times, ultimately strengthening their cybersecurity architecture.

For more information about ESET Threat Intelligence, please visit our website.

 

【CYBERSEC 2025資安大會】即將登場,台灣二版 誠摯邀請您共襄盛舉!

【CYBERSEC 2025資安大會】即將登場,誠摯邀請您共襄盛舉!
2025年4月15日至17日,台北南港展覽館,探索最新資安技術與解決方案!
在數位化浪潮中,資安已是企業營運的關鍵核心!我們這次帶來最強資安產品陣容,助你全面強化防禦、掌握最新趨勢!

強大資安類別陣容:
Endpoint & Device Security (端點與裝置安全)
Network Security & Monitoring (網路安全與監控)
Cloud Security & IT Infrastructure (雲端安全與 IT 基礎架構)
Application & Data Protection (應用與數據保護)
Backup, Recovery & IT Service Management (備份、復原與 IT 服務管理)
Threat Intelligence & Security Operations (威脅情報與安全運營)
Compliance & Risk Management (合規與風險管理)
Open Source & IT Support (開源與 IT 支援)

台灣二版 攤位號碼:Q304
■ 最新資安解決方案,親自體驗Demo!
■ 專家現場分享,讓你一次掌握業界趨勢!
■ 精美贈品+現場互動,驚喜滿滿!

攤位講座時程:( 資安講座分享,現場互動送好禮!

4月15日(二) 10:30 – 10:50【OpenLogic/Cloudcasa】
4月15日(二) 11:30 – 11:50【ESET/UnderDefense】
4月15日(二) 13:00 – 13:20【Parallels RAS/Openlogic】
4月16日(三) 11:00 – 11:20【NordSecurity/GREYCORTEX MENDEL】
4月16日(三) 13:30 – 13:50【Jumplcoud/UnderDefense】
4月16日(三) 14:30 – 14:50【Atera/Parallels RAS】
4月17日(四) 11:30 – 23:50【Storware/Keepit】
4月17日(四) 12:30 – 12:50【GREYCORTEX MENDEL/UnderDefense】

演講議程:4/16 (三) 15:30 – 16:00
主講人:高級產品經理 盧惠光
主題:雲端數據安全與韌性:從威脅防禦到災後復原的全面戰略

無論你是企業IT人員、資安專家,還是想了解最新防禦技術的夥伴,這場盛會你絕對不能錯過!歡迎蒞臨現場交流,拿好禮!

● 台灣二版活動資訊:https://cybersec.ithome.com.tw/2025/exhibition-page/2692

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

【公告】台灣二版 農曆新年連續假期 各項服務因應措施公告

親愛的顧客您好,感謝對台灣二版一直以來的支持與愛護,全體員工預祝新年快樂~

為因應1/27(一)至1/31(五)農曆新年連續假期,各項服務內容調整如下並溫馨建議您優先使用電子郵件信箱與我們聯繫,請您先在相關的電子郵件信箱說明問題或需求並留下您的聯絡方式,服務團隊將於假期結束後第一個上班日2/3(一)回覆,未能即時回覆您的詢問或未盡理想之處,願能諒解與擔待,

●技術支援相關事宜,請您mail至以下電子郵件信箱
support@version-2.tw

●企業業務報價相關事宜,請您mail至以下電子郵件信箱
enterprise@version-2.tw

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

【資安快訊】Fortinet無線網路管理器爆重大漏洞,可遭駭客接管管理權限

近日,知名網路安全公司 Fortinet 旗下的無線網路管理產品 FortiWLM(Fortinet Wireless LAN Manager) 被揭露存在一項高風險漏洞,可能導致讓駭客完全接管管理權限,進而影響企業與機構的網路安全。

該漏洞被追蹤為 CVE-2024-XXXXX,攻擊者可利用此漏洞繞過身份驗證機制,直接獲取管理權限,進一步操控受影響設備,更能進一步來部署惡意軟體或攔截網路流量。這可能導致機密資料外洩、業務中斷,甚至可以為更大規模的網路攻擊鋪路。

Fortinet 已發布官方公告,建議使用者儘速升級至最新版本。

〞受影響版本與修補時程
受影響的版本包括:
FortiWLM 8.6.0 至 8.6.5 版本
FortiWLM 8.5.0 至 8.5.4 版本
Fortinet已於2023年9月底發布的8.6.6和8.5.5版本中修復此漏洞。然而,值得注意的是,從漏洞被發現到正式發布安全公告,Fortinet花費了將近9個月的時間,這段期間內許多用戶可能都處於資安風險中。

防護建議
考慮到 FortiWLM 在關鍵環境中的部署,此漏洞可能導致全網路中斷和敏感資料外洩。資安專家建議:
FortiWLM 管理員應立即更新至最新版本(8.6.6或8.5.5以上版本)
定期檢查並套用所有可用的安全更新
強化系統存取控制,監控異常的系統存取行為
實施網路隔離措施,限制對管理介面的存取 〟(註1)

 

近年來,駭客頻繁針對企業級設備進行攻擊,以及透過零日漏洞或未修補的安全缺陷來入侵系統。這次 Fortinet 漏洞的曝光,再次提醒企業與組織,網路安全的維護不能只有依賴設備本身,還需要建立完整的資安應對策略,以降低潛在風險。

(註1)引用:資安人/Fortinet無線網路管理器爆重大漏洞,可遭駭客接管管理權限(2024/12/20)

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

【資安快訊】Palo Alto Networks防火牆配置工具Expedition驚傳重大漏洞遭利用



美國網路安全暨基礎設施安全局(CISA)於本週四證實,Palo Alto Networks 的防火牆配置工具 Expedition 出現重大資安 漏洞(CVE-2024-5910),且已遭駭客積極利用。此漏洞可能導致管理員帳號遭到接管,引發資安疑慮。

根據 Synopsys 網路安全研究中心(CyRC)研究員 Brian Hysell 的發現,此漏洞源自關鍵功能缺乏身分驗證機制。具備網 路存取權限的攻擊者可藉此漏洞輕易接管 Expedition 管理員帳號。Palo Alto Networks 已於 2024 年 7 月釋出修補程式,並 建議無法立即升級的用戶務必限制 Expedition 的網路存取權限。

原文出處:https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=11367

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

Mozilla修補遭到利用的Firefox零時差漏洞

Mozilla基金會發布資安公告,緊急修補Firefox重大層級的零時差漏洞CVE-2024-9680,這項漏洞由資安業者ESET通報,存在於Animation元件的時間軸,為記憶體釋放後再存取使用(Use After Free)漏洞,CVSS風險評分達到9.8(滿分10分),該基金會發布Firefox 131.0.2,以及長期支援版(ESR)128.3.1、115.16.1修補。值得留意的是,已有攻擊者試圖利用這項漏洞。
針對這項漏洞帶來的影響,Mozilla基金會指出,攻擊者若是觸發漏洞,就有機會藉由Animation元件的時間軸,引發記憶體釋放後再存取使用的現象,而能在特定處理程序執行程式碼。

原文出處:https://nvd.nist.gov/vuln/detail/CVE-2024-9680

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。