Skip to content

微軟警告有2個類似BlueKeep的RDS重大漏洞

與BlueKeep不同之處,這些漏洞會影響更新的Windows版本,包括Windows 10
 
微軟於8月中旬發布了遠端桌面服務(Remote Desktop Service,RDS)中四個關鍵漏洞的修復程式,其中兩個與“BlueKeep”有關。
 
這四個遠端程式碼執行(Remote Code Execution,RCE)漏洞:CVE-2019-1181 / CVE-2019-1182 / CVE-2019-1222 / CVE-2019-1226,都可以由攻擊者發送特製的遠端桌面協定(Remote Desktop Protocol,RDP)訊息到遠端桌面服務(Remote Desktop Service,RDS)。
 
而CVE-2019-1181 及CVE-2019-1182這二個漏洞,出現在Windows RDS(之前叫Terminal Services)服務的遠端程式碼執行漏洞,攻擊者可利用遠端桌面協定(Remote Desktop Protocol,RDP)連上目標裝置發送惡意呼叫,成功開採者可在系統上執行任意程式碼,進而安裝程式、變更/刪除資料或開設管理員權限的帳號。和第一代BlueKeep(CVE-2019-0708)及2017年的Wannacry一樣,惡意程式可從受害電腦自我增生、並且在無需使用者任何動作情況下,感染其他未修補的電腦。
 
微軟表示這兩項漏洞是在日常作業中發現,呼籲受影響的系統用戶必須盡快修補,以避免因為這些易受攻擊的漏洞而產生相關的風險。另外啟用自動更新的電腦設備皆受到這些修復程式的保護,尤其是透過網路級別身份驗證者,可以部分解決特別是在組織中出現的威脅。
 
受影響的Windows版本包括Windows 7、8.1、Windows Server 2008 R2 SP1、Server 2012,以及Windows 10桌機及Server版本。在上述平台上,二項漏洞的CVSSBase Score皆為9.8(滿分為10),屬於重大(Critical)漏洞。至於第一代BlueKeep殃及的Windows XP、Server 2003、Server 2008這次則未受影響。此外,遠端桌面協定(Remote Desktop Protocol,RDP)本身也安然無事。
 
微軟表示自己發現的兩個新可疑漏洞與英國國家網絡安全中心(NCSC)發現的BlueKeep不同,也已同時提升遠端桌面服務(Remote Desktop Service,RDS)的安全性,且目前也沒有證據顯示有任何第三方知道這些漏洞。
 
全球資安大廠ESET一直致力開發主動偵測、多層級的安全技術,並結合自動化的機器學習和人類知識,超過30年的研究經驗,為各種規模的企業和端點平台,提供主動和智慧的防護產品或解決方案。連年榮獲Virus Bulletin 100獎項肯定, 優異的成績持續保持業界領先地位。全球擁有超過1億的用戶,代理機構遍及全球超過180個國家,支援多種語系,並提供在地化的服務協助、是個人及企業值得信賴的資安領導品牌。
 
若有任何資安需求,歡迎洽詢ESET資安專業團隊,服務電話:(02)7722-6899,或上官網查詢:https://www.eset.tw/
 

Dangerous spambot records French victims’ screens while they are watching sexual content online, ESET uncovers

BRATISLAVA – ESET researchers have uncovered malware-distributing spam campaigns targeting people in France. The malicious payload, named Varenyky by ESET researchers, comes with several dangerous functionalities. Not only can Varenyky be used to send spam, but it can also steal passwords and can spy on its victims’ screens when they watch sexual content online.

The first spike in ESET telemetry for this bot came in May 2019, and after further investigation ESET researchers were able to identify the specific malware used in the spam’s distribution. “We believe the spambot is under intense development as it has changed considerably since the first time we saw it. As always, we recommend that users be careful when opening attachments from unknown sources and ensure system and security software are all up to date,” says Alexis Dorais-Joncas, leading researcher at the ESET R&D center in Montreal.

To first infect their targets, the Varenyky operators use spam with a malicious fake invoice attachment, which lures the victim into “human verification” of the document; after that the spyware executes the malicious payload. Varenyky exclusively targets French-speaking users located in France. The quality of language used to fool the user is very good, hinting that the operators are fluent in French.

After infection, Varenyky executes the Tor software that enables anonymous communication with its Command & Control server. From that point forward, criminal activity goes into full swing. “It will start two threads: one that’s in charge of sending spam and another that can execute commands coming from its Command & Control server on the computer,” says Dorais-Joncas. “One of the most dangerous aspects is that it looks for specific keywords such as bitcoin and porn-related words in the applications running on the victim’s system. If any such words are found, Varenyky starts recording the computer’s screen and then uploads the recording to the C&C server,” he adds.

We have seen fake sextortion campaigns in the past, but this capability could very well lead to real sextortion campaigns. While at the beginning the Varenyky operators didn’t leverage this approach, they have started to embrace it since the end of July. Furthermore, the cybercriminals are relying on bitcoin to monetize their wrong.

“Another noteworthy functionality is that it is able to steal passwords through the deployment of an application that we label as potentially unsafe,” says Dorais-Joncas. Other commands allow the attacker to read text or take screenshots.

The spam emails sent by the bot take the victims to fake smartphone promotions, whose sole purpose is to phish for personal information and credit card details. A single bot can send as many as 1,500 emails per hour. Interestingly, the targets of all the spam runs we observed were all users of Orange S.A., a French internet service provider.

For more details on this research, read “Varenyky: spambot à la Française” on WeLiveSecurity.com and follow ESET research on Twitter. 

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

FaceApp爆紅,出現新的網路詐騙手法

近日有一款可以把人臉變老、變笑臉的修圖軟體《FaceApp》在臉書及 IG 上爆紅,ESET研究團隊發現因為FaceApp的流行,出現了藉由使用假的“Pro”版本的應用程式作為誘餌的新詐騙手法
 
FaceApp應用程式提供各種面部修改過濾器,適用於Android和iOS,雖然應用程式本身是免費的,但某些功能(標記為“PRO”)需付費,而最近對FaceApp隱私問題的擔憂也引起了媒體的巨大關注。
 
ESET發現了試圖透過FaceApp不存在的“Pro”版本的兩種詐騙手法。
 
假網站
第一個方式,攻擊者使用了一個虛假的網站聲稱免費提供FaceApp的“旗艦”版本。
 
圖1.其中一個使用的詐騙網站
 
實際上,詐騙者會欺騙他們的受害者點擊無數的安裝其他付費應用、訂閱、廣告和問卷等的提議,受害者還會收到各種網站的請求,以允許顯示通知,啟用後,這些通知會進行下一步的詐騙性提議。
 
圖2.來自瀏覽器的通知進行下一步的詐騙
 
在測試的過程中,可以從Google Play下載取得免費版本FaceApp,但是,如不是在Google Play裡,而是其他的文件共享服務(如mediafire.com)下載該應用程序,如下面的圖3所示,這代表著很可能用戶已下載了惡意軟體。
 
圖3. FaceApp呈現為“FaceApp PRO”並從非官方來源下載
 
YouTube影片
第二種的詐騙方式為YouTube影片,其宣傳FaceApp免費“專業版”的下載連結,但是,縮短的下載連結其實是讓用戶從Google Play安裝各種其他應用程式,如下面的圖4所示的其中一個YouTube影片,在撰寫本文時,該影片已有超過150,000個觀看次數。
 
雖然此類詐騙手法通常僅用於投放廣告,但縮短的連結可能會導致用戶只需點擊一下即可安裝惡意軟體。過去就曾發生過類似情況,例如將Fortnite用作誘餌。
 
圖4.一個YouTube影片提供了一個連接,用於為Android的“FaceApp Pro”應用程式下載安裝包(APK)
 
上述連結被點擊了96,000次,但這並不是實際下載數量。 
 
圖5.YouTube影片中引用的假“FaceApp Pro”下載安裝包連結的數字訊息
 
結論
無論APP多麼有趣,請避免從非官方應用程式的來源處下載應用程式,並去了解該應用程式的相關訊息(開發人員,評級,評論等),特別是在Android系統中,每個受歡迎的應用程式或遊戲都有可能是假的;但幸運的是,對於注重網路安全的用戶而言,是可以透過他們所使用的資安產品中發現的,ESET資安專家建議為了維護您的行動裝置安全,請選用專業並值得信賴的資安品牌,ESET行動安全套裝適用於Android系統,讓您的行動裝置獲得更多的保障。
 
入侵指標(IoC)
 
 
***購買ESET行動安全套裝:https://www.eset.tw/estore/zh/

Windows零時差攻擊CVE-2019-1132利用漏洞鎖定目標攻擊

今年6月,ESET研究團隊發現針對東歐地區利用Windows中的提高本地權限擴張漏洞的零時差攻擊
 
其利用Microsoft Windows中的提高本地權限擴張漏洞,特別是win32k.sys元件中的NULL pointer dereference。當發現該漏洞時,就已向Microsoft資訊安全中心進行通報,該中心也及時修復了漏洞並發布了更新。
 
該漏洞影響的Windows版本如下:
Windows 7 for 32位系統Service Pack 1
Windows 7(用於​​基於x64的系統)Service Pack 1
Windows Server 2008 for 32位系統Service Pack 2
Windows Server 2008(用於基於Itanium的系統)Service Pack 2
Windows Server 2008(用於基於x64的系統)Service Pack 2
Windows Server 2008 R2(用於基於Itanium的系統)Service Pack 1
Windows Server 2008 R2(用於基於x64的系統)Service Pack 1
 
這與近年來揭露的許多其他Microsoft Windows win32k.sys漏洞一樣,此漏洞為利用彈出選單的攻擊手法,與2017年分析的Sednit組織透過提升本地特權漏洞方式非常相似。
 
此漏洞建立了兩個視窗;一個用於第一階段,另一個用於第二階段的開發。對於第一個視窗,它建立彈出選單對象並使用CreatePopupMenu和AppendMenu函數追加選單項目。此外,該漏洞利用設置了WH_CALLWNDPROC和EVENT_SYSTEM_MENUPOPUPSTART hooks。
 
然後該漏洞利用TrackPopupMenu函數顯示一個選單。此時,連接到EVENT_SYSTEM_MENUPOPUPSTART的代碼將被執行。此代碼嘗試通過向選單發送MN_SELECTITEM,MN_SELECTFIRSTVALIDITEM和MN_OPENHIERARCHY訊息序列打開選單中的第一個可用項目。
 
接下來為觸發此漏洞的關鍵點,利用已經建立初始選單的同時,即刻建立子選單,而該漏洞利用代碼處理WH_CALLWNDPROC hooks中的WM_NCCREATE訊息,當漏洞利用代碼檢測到系統處於此狀態時,它會向第一個選單發送MN_CANCELMENUS(0x1E6)訊息,取消該選單,但它的子選單仍然會被建立。
 
如果在核心模式下檢查這個子選單對象,就會看到tagPOPUPMENU-> ppopupmenuRoot等於0.這個狀態允許攻擊者在這個核心結構中使用該元素作為NULL pointer dereference。該漏洞利用在地址0x0處分配一個新頁面,該地址將被核心視為tagPOPUPMENU對象(請參考圖1)。
 
圖1. tagPOPUPMENU核心結構
 
此時,攻擊者使用第二個視窗,主要的漏洞利用目標是觸發第二個視窗的tagWND結構中的bServerSideWindowProc位址。這導致在核心模式下執行WndProc過程。
 
為了執行該操作,攻擊者通過調用user32.dll函數庫中的未導出的HMValidateHandle函數來洩漏第二個視窗的tagWND結構的核心內存地址。然後,漏洞利用程序在NULL頁面處製作一個假的tagPOPUPMENU對象,並將MN_BUTTONDOWN訊息發送到子選單。
 
之後,核心最終將執行win32k!xxxMNOpenHierarchy函數。
 
圖2. win32k!xxxMNOpenHierarchy函數的反組譯代碼
 
此函數將NULL頁面上的精心設計對象傳遞給win32k!HMAssignmentLock。 bServerSideWindowProc位在win32k!HMDestroyUnlockedObject函數內設置,該函數位於win32k!HMAssignmentLock內部的幾個調用中。
 
圖3. win32k!HMDestroyUnlockedObject函數的反組譯代碼
 
一切完成後,漏洞可以將特定訊息發送到第二個視窗,以便在核心模式下執行WndProc。
 
最後該漏洞利用系統令牌替換當前進程的令牌。
 
已發布的更新程序在win32k!xxxMNOpenHierarchy函數中添加了對NULL pointer的檢查。
 
圖4.兩個win32k.sys版本之間的代碼差異 – 原始(左)和修補(右)
 
結論
該漏洞僅適用於舊版本的Windows,因為從Windows 8開始,不允許用戶端程序執行NULL頁面。 Microsoft將此處理操作反向移植到x64的系統的Windows 7。仍然使用Windows 7進行32位系統Service Pack 1的人更新到最新的操作系統,因為Windows 7 Service Pack 1的擴展支援將於2020年1月14日結束。這意味著Windows 7用戶將無法獲得重大的安全性更新。
 
入侵指標(IoCs)
 
全球資安大廠ESET一直致力開發主動偵測、多層級的安全技術,並結合自動化的機器學習和人類知識,超過30年的研究經驗,為各種規模的企業和端點平台,提供主動和智慧的防護產品或解決方案。連年榮獲Virus Bulletin 100獎項肯定, 優異的成績持續保持業界領先地位。全球擁有超過1億的用戶,代理機構遍及全球超過180個國家,支援多種語系,並提供在地化的服務協助、是個人及企業值得信賴的資安領導品牌。
 
若有任何資安需求,歡迎洽詢ESET資安專業團隊,服務電話:(02)7722-6899,或上官網查詢:https://www.eset.tw/
 

ESET launches Version 7.0 of File Security for Linux

BRATISLAVA – ESET,  a global leader in cybersecurity, has launched Version 7.0 of their ESET File Security for Linux product.

ESET File Security for Linux provides advanced protection to organizations’ general servers, network file storage and multipurpose servers. The software ensures the servers are stable and conflict-free in order to preserve system resources for vital tasks and avoid disrupting business continuity.

As the use of Linux servers increases in popularity with organizations, it is vital that all users and their businesses remain protected against the latest threats. ESET File Security for Linux is powered by the latest ESET LiveGrid® technology and eliminates all types of threats, including viruses, rootkits, worms and spyware. Version 7.0 offers a host of advanced features, including real-time file system protection, tighter security and a real-time web graphical user interface (GUI). 

Additionally, ESET File Security is fully compatible with the ESET Security Management Center and allows you to manage the software through a web interface, giving you the option to schedule on-demand scans, actions and security tasks.

Matus Cipak, product manager from ESET, says, “Just a single malicious file can pose a serious threat to organizations of any size, and a reliable and advanced security software system is an absolute must for modern businesses. With ESET File Security, users can rest assured that their organizations and their servers are fully protected against the latest threats. Whether it’s a targeted attack on your organization or hidden ransomware, ESET is proud to provide businesses with the absolute best in enterprise security.”

For further information on ESET File Security for Linux, click here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

SafeDNS重命名和重新分組幾個內容類別並引入新的類別

SafeDNS’s changed the names of several content categories and regrouped the categories, so it is easier for our users to grasp their essence to decide which of the categories to block or allow with the web filtering service.

So, we have renamed the category containing sites with child sexual abuse images, criminally obscene adult and child sexual abuse content from a list compiled by Internet Watch Foundation/IWF (UK). Now the category is called ‘Child Sexual Abuse (IWF)’, and we have moved to a large group of categories called ‘Illegal Activity’. To the same group, we have moved two more categories – ‘German Youth Protection’ and ‘Child Sexual Abuse (Arachnid)’.

A new category, ‘Crypto-Mining’, is added to the ‘Illegal Activity’ group. The category contains sites that are known to stealthily mine cryptocurrencies.

Two more categories are renamed – the one we used to call ‘Banner Ads’ into ‘Online Ads’, and the ‘Politics’ category is now called ‘Politics, Society and Law’.

A significant change is that we now have an entirely new group of categories, called ‘Security’. In this group, we have moved the three long-existing categories you know well – ‘Virus Propagation’, ‘Phishing’, and ‘Botnets’.

In the large group of categories, called ‘General Sites’, there’s a new category, ‘Online Libraries’. Its name is pretty much self-explanatory. The category contains online library sites.

We sincerely hope the new names of the filtering categories and new way of grouping them makes it clearer what content the categories have and whether to ban them or not.

Go to the Web Filtering tab of your SafeDNS Dashboard and check the changes. You might want to block some of the new categories to improve your internet security further!

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

郵件伺服器元件Exim再傳重大漏洞

全球將近六成伺服器使用的郵件伺服器元件Exim再傳重大漏洞,此漏洞可讓駭客以最高權限執行任意指令。

Qualys的研究人員發現,開源郵件傳輸代理程式(Mail Tansfer Agent,MTA)-Exim有一個嚴重的安全漏洞,在某些情況下,它可以讓遠程攻擊者在未更新的郵件服務器上執行他們選擇的命令。

*Qualys:雲端弱點管理品牌

Exim存在編號CVE-2019-10149的遠端指令執行(Remote Command Execution,RCE)漏洞。該漏洞讓攻擊者可以execv()函數以根權限執行指令,無需引發記憶體毁損或ROP(Return-Oriented Programming),進而接管受害伺服器。

本地端攻擊者或是在特定非預設組態下的遠端攻擊者可輕鬆開採這項漏洞。遠端攻擊者則需要連續和目標伺服器保持7天連線,並以每幾分鐘 1 byte的速度傳輸進行攻擊。但研究人員提醒,有鑒於Exim程式碼的複雜性,可能出現更快的攻擊方法。

本漏洞的CVSS v3.0版被列為重大風險。受影響版本包括4.87 到4.91版的Exim。Exim管理組織也呼籲用戶應升級到最新版本4.92版

因惡意軟體犯罪者經常利用電子郵件擴散感染,故企業郵件伺服器成為重要的第一防線。ESET Mail Security 替多個平台提供最佳的反惡意軟體與主動掃描,更快的效能、整合反垃圾郵件及占用系統資源低等特性可處理高流量郵件伺服器工作。

※ 採用屢獲殊榮的技術並多次獲得VB SPAM+ 認證,最新一期, ESET 仍是維持第一的殊榮。

 

For  Exchange Server- https://www.eset.tw/business/mail-security-exchange/

For  Linux / BSD / Solaris- https://www.eset.tw/business/file-security-linux/

For  IBM Domino- https://www.eset.tw/business/mail-security-domino/

For  Kerio- https://www.eset.tw/business/kerio-security/

欲知更多產品資訊,歡迎電洽台灣二版專業資安團隊(02)7722-6899

原文出處:https://www.welivesecurity.com/2019/06/07/mail-server-software-exim-critical-bug/

THE FIREWALL ISN’T A FIX-ALL

Understanding the limitations of perimeter security

June 10, 2019

Firewalls.

Everybody in IT knows what they are and nearly every company has them, some even without knowing it. They prevent unwanted communication. In most cases, it’s the first line of defense against network threats. They are effective, and are part of the list of basic requirements for any network security infrastructure.
But are firewalls enough? How about “Next Generation Firewalls”? To answer that, it is helpful to have at least a basic understanding of how firewalls work. Firewalls work like a ticket agent at the airport – you have a ticket? Great, you’re on the flight. No ticket? Go away. In technical terms, firewalls are based on rules that describe the network communication, which can, for example, allow or deny communication only from specific subnets, IP addresses, on particular ports, or no communication at all.
Firewalls haven’t stayed static, and they have become more advanced; like Next Generation Firewalls or Web Application Firewalls. Next Generation Firewalls are like a gatekeeper on steroids – not only will they not let you in if you don’t have a ticket, but will kick you out if you misbehave during the communication for which you had access. Essentially like a bouncer at a bar on New Year’s – you can come in if you have a ticket, but if you start being “fresh” with your fellow party-goers, you get tossed out. Beside basic firewall features, Next Generation Firewalls also contain Application Firewalls, which controls specific services or applications (not just IPs and ports) and Intrusion Prevention Systems, which block unwanted or malicious communication and are also referred to as IPS.
That’s a lot of walls.

Now, let’s look at whether they are as effective as they are expected to be.

Physical access

Picture a situation where an attacker tries to get into your network the easy way – through physical means. Firewalls are configured to ignore any communication that originates in the external network and is aimed at the core switch. The physical attack can include interaction with employees (more on that in our previous blog post), dumpster diving, physical access to areas, even the restricted ones, and more. In most cases, it’s enough to get into a conference room (sometimes even alone), plug your device into the network via wire and the attacker is into the network and off to the races. It’s then possible to set up a remote connection from within the network, because firewall policies for internal networks are often much less restrictive than those for external network (employees need to be able to work), allowing undisturbed access inside the network, not cut off by a firewall.

Remote access

Of course, access can be gained even without any physical access. For example, a new critical vulnerability is discovered for a popular network device provider which allows anyone to execute commands from the console on that device. Cases like this don’t happen every day, but they happen nevertheless. And when they happen, they can be catastrophic, because they are unknown to the existing network security tools or network/network security administrators. An attacker with remote shell access on such a device is then able to do anything. At that point, network is his, not yours.
While vulnerabilities like this are not as common, there are other remote attacks that are efficient, effective, and more common. In our previous blogpost we described one phishing scenario and we can build on that here. Say an attacker sends a crafted .pdf file via email to the victim. Since email communication is something that nearly every company needs, the email itself is not blocked. Maybe it’s disguised as an invoice or as a charity offer (as in the previous blog post), but once that file opens, the attacker gains full access to that computer and possibly even anything that’s available from there. You might think “but we use tools that prevent any malware in emails, we’re safe.” You might be right, but these are functionally just protection against spambots. Keep in mind that this will catch only known files – that are known to the security tool. If someone sends new malware, or specially created malware (which is usually how this attack is accomplished), then it won’t help.
Sign Up


BYOD

Finally, consider the example of the “personal device” – where (for example) Karen in the Accounting Department brings her phone to the office, and connects it to the network. Karen likes to watch MMA, but happens to use her mobile to stream content from sites which don’t respect authors and performance rights – what might be called a “bootleg feed” or a torrent site. As these streaming sites are notoriously rife with malware, Karen’s device is now infected – because she isn’t deploying mobile device security. When she accesses the trusted internal wifi network via her phone, she is opening up a direct pipeline for all of the malware on her phone, without having to go through the firewall.
In all of these scenarios, the firewall is ineffective, because not all of the communication comes through the firewall. This means that while a firewall is effective, it doesn’t offer 100% protection. Gaps exist, just a few of which have been included here.

But how to close the gap?

With enough time and effort, any network can be penetrated. To minimize the damage, you need to take precautions steps and close gaps left by tools like firewalls. How can you do this? To be able to identify what dangers have escaped your firewall, you need to be able to visualize every communication and every device in the network. Network Traffic Analysis (NTA) solutions monitor network traffic from communications not just through the firewall, but within the firewall as well – closing the gap on not just targeted attacks from outside, but also on BYOD, and other “safe” communications within the network. With full visibility, you know about everything that happens, right when it happens, which means you can respond to detected attacks before any serious damage happens to your organization, saving money, reputation, and your IT team’s sanity.

Identify anomalies

But what good is a mere visibility if there are countless packets every second? No one will be able to go through it all in real time – even with a team of thousands. So how to make sure that this incident gets the attention it deserves? NTA technology also helps to identify anomalous communications – devices acting strangely – on the network. Since an infected device starts to behave differently than it’s normal behavior – even in hard-to-identify ways – NTA technology; like MENDEL from GREYCORTEX, solves the problem, because it analyzes all network traffic and is able to spot these anomalous behaviors nearly immediately. It then informs the network team, allowing them to isolate infected or questionable devices from the rest of the network, preventing further damage, as well as to further investigate the incident without any risk of compromising further devices.
Having a firewall greatly improves the security of your network, but relying only on firewalls is irresponsible for many reasons – poor configuration, advanced threats or above-mentioned gaps. To be sure that nothing leaves your network without you knowing about it or having a say in it, you need bigger guns than just a firewall, even a next generation one. For significant improvement in your security, you need NTA solution to identify the hidden connected devices on the network, as well as to identify anomalous behavior that shows the hidden work of a compromised device.

台灣二版【2019年度經銷商認證活動】成功圓滿落幕~

台灣二版(ESET亞太區獨家總代理)為了讓各經銷商夥伴提供用戶更優質及專業的服務,每年5月舉辦優良經銷商認證,分享ESET或代理產品的最新技術與資訊,取得【黃金級認證】經銷商,將享有專屬折扣,並有機會得到台灣二版優先轉介客戶與最新產品訊息與優質回饋等。藉由經銷商認證機制,能提供給舊雨新知良好的夥伴們更多的優勢,營造與台灣二版之雙贏局面。
 
近年資安事件層出不窮及資安威脅日益擴大下,2019年度台灣二版代理了更全面與完善的資安產品,並擴大招募全台經銷夥伴,期望對於用戶的服務範圍透過認證方式能更加完整。今年已於5月22~29日分別在北中部舉辦,參加人數再創新高,出席率也達到百分百,在經銷夥伴們熱烈的支持下,成功圓滿落幕!
 
今年在課程中除了分別針對業務及工程人員進行相關產品課程講座、台北之音(Hit FM)等客戶的成功案例分享外;亦新增了ESET企業新版(V7)重要功能說明及新產品【ESET 動態威脅防禦 (ESET DYNAMIC THREAT DEFENSE) 】,面臨勒索病毒的肆虐,7版加強了這個部份的防護,使企業用戶免於受害;而ESET 動態威脅防禦則是專門解決未知威脅的付費型雲端服務。另外為了因應詭譎多變的網路環境,台灣二版於今年隆重推出高端智慧化網路封包監控解決方案-【人工智慧監控軟體(GREYCORTEX MENDEL)】,來協助企業做好資安佈局並防患於未然,內容緊湊充實,也有助於經銷商提供客戶更完善的全面資安防護建議及服務,並與台灣二版更加緊密的合作。
 
今年通過認證資格的廠商,如同往年一樣,除了擁有黃金經銷商專屬優惠和服務外,台灣二版更得到電商YAHOO平台的商品贊助,提供給此次認證活動成績最優異的經銷商夥伴,增添了活動的豐富度及熱鬧氣氛,特別謝謝他們的支持與協助,未來也非常歡迎企業客戶或異業與我們配合,共同創造雙贏。
 
感謝所有合作夥伴對於2019年度經銷商認證活動的熱情參與,活動成功圓滿落幕,今年還有未能參與的新舊廠商們,每年二版都將於五月舉辦大會,期望來年再度給予支持並與台灣二版攜手共創佳績~
 
查詢通過認證廠商資訊: https://www.eset.tw/purchase/shop
 
感謝贊助商: 
 
 
 
【當日活動照片】 
 
ESET亞太區獨家總代理  台灣二版(Version 2)
ESET官方網站:www.eset.tw
客服電話:02-7722-6899 
技術支援信箱:support@version-2.tw
 
關於台灣二版Version 2
Version 2 是亞洲其中一間最有活力的IT公司,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,當中包括通訊系統、資安、網路、多媒體及消費市場產品。透過公司龐大的銷售點、經銷商及合作伙伴,Version 2提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括香港、中國、台灣、新加坡、澳門等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、學術機構、政府部門、無數成功的中小企業及來自亞洲各城市的消費市場客戶。