How Lumifi Rescued a Healthcare Company from a Devastating Ransomware Attack and Transformed Their IT Infrastructure

Executive Summary

A healthcare company with multiple service locations experienced a severe ransomware attack that completely shut down their systems. Lumifi, alongside other partners, BOK and Solytics Partners, provided critical project and remediation services. This case study explores how Lumifi's intervention not only resolved the immediate crisis but also transformed the healthcare company's IT infrastructure, significantly enhancing their security posture.

Client Background

Company Size: 500 Employees

Industry: Healthcare

Locations: 11 service locations, 2 corporate locations

What happened?

A large healthcare company fell victim to a ransomware attack on all their systems. Leadership was alerted in the middle of the night when the attack took place. Employees could not access their files, there were ransom notes on computers, the entire environment was down and the company was forced to operate without immediate access to patient information and other valuable resources accessible through infected devices.

Challenges

The healthcare company had an IT department but lacked a Security Operations Center (SOC) for monitoring. This lack of protection left them vulnerable to a ransomware attack, which occurred unexpectedly in the middle of the night. The entire system was down, and no one could access files, bringing the business to a standstill.

Specific Challenges:

Challenge Impact:

Lumifi's Intervention

Initial Response:

Steps Taken:

  1. Collaboration with IT Forensic Experts: Brought in an incident response firm for forensic analysis.
  2. Onboarded New Devices with Updated Security: Educated employees on how to securely use devices purchased by the healthcare company to replace infected devices.
  3. System Monitoring: Installed Palo Alto Cortex XDR to enable SOC monitoring by Lumifi.
  4. Device Management: Increased the number of monitored devices to about 463.

Long-term Solutions:

Results

Recovery and Improvement:

Quantifiable Outcomes:

Client Sentiment:

What is Proofpoint and How Does it Work?

Proofpoint is a cybersecurity platform that protects workers and data from cybercriminals that target email, social media, and mobile devices. It provides enterprise-level cloud-based solutions against phishing, social engineering, and Business Email Compromise (BEC) attacks. 

 Proofpoint Email Protection is the flagship product, protecting user inboxes from phishing scams, imposter emails, and advanced cybersecurity threats by analyzing incoming messages using highly refined AI-enabled filters. 

Why do security leaders choose Proofpoint? 

94% of public data breaches begin through email. Without a strong email security solution in place, organizations are highly vulnerable to sophisticated threat actors who can impersonate co-workers and trusted third-party contacts. 

Proofpoint helps reduce the risks associated with email phishing, credential-based attacks, email account compromise, and malware. Since email is one of the most popular vectors for gaining initial access to target networks, excellent email security can make a significant difference in an organization’s overall security posture. 

 Proofpoint’s email security and protection platform actively blocks malware, spyware, and trojan horse attacks. It helps organizations reduce the risk of email fraud and provides security leaders with visibility into email-related compliance and policy risks. 

How does Proofpoint improve email security? 

 Proofpoint uses multi-layered threat detection to stop email threats from arriving in the inbox altogether. This reduces the need to train employees how to distinguish between phishing emails and legitimate messages. 

 Here are some of the technologies and features included in each layer of security Proofpoint includes in its email defense solutions: 

How does Proofpoint work in practice? 

Proofpoint’s email security solutions are designed to offer an optimal balance between security and usability. Its products are cloud-native and compatible with a wide combination of technologies, enabling organizations to maintain granular control over risks associated with advanced email threats. 

 Since many of Proofpoint’s email security technologies prevent spam, unwanted emails, and malicious attachments from arriving in the inbox altogether, end-users experience minimal friction when using the solution—if they notice it at all. 

 Proofpoint provides security leaders and IT administrators with multiple tools and reports for improving operational and cloud security throughout the organization. Here are a few examples: 

1. Dynamic risk scoring 

Proofpoint scores threats from a scale from one to 1,000 based on the following factors: threat actor sophistication, spread and focus of attack targeting, type of attack and overall attack volume. These dynamic risk scores accompany incoming messages as they enter the network. 

The score helps companies to understand the risk for both the individual user and the overall risk for the company. Security leaders can filter and search for messages using these scores to understand which threats need to be prioritized first. 

2. Custom rules and configurable controls 

Email classification using Proofpoint can be done in many languages. Emails will be divided in specific quarantine categories based on potential threat: spam, phishing, imposter email, malware, bulk email, and adult content. 

The analysis function will identify graymail and mark those emails at a lower priority to limit inbox clutter. Users can “promote” emails to a higher priority or move emails to a lower priority. 

Companies can customize the rules of what is considered “acceptable use” while using Proofpoint to better align with their specific needs. 

3. Deep visibility and message tracing 

Proofpoint has an advanced message tracing features a high-performance search engine which allows users to pinpoint hard-to-find log data. 

Security leaders have access to sixty different real-time reports detailing mail flow and security trends. This allows organizations to be proactive when addressing any potential issues and trends as they are identified.  

Users have the ability to create “safe” and block lists of email senders as well. This allows security leaders to proactively reduce the organization’s attack surface while keeping trusted contacts accessible. 

4. Opportunities to reduce your attack surface 

Proofpoint delivers intelligence about your organization’s high-impact targets — which it calls Very Attacked People (VAPs). The platform will inform security teams where sensitive information is potentially being exposed across email and the cloud. Companies will have the ability to lock down access to specific files in the cloud, prevent data loss and archive communications. 

 Proofpoint offers security awareness training that helps users prepare for what a potential threat might look like. The training alerts users to the most recent phishing attacks and lures through their “Attack Spotlight Series”. Training materials are interactive and game-based, keeping users engaged while providing valuable insight into modern email threats. 

Improve email security resilience with Lumifi 

Keep hackers and cybercriminals out of your organization’s inbox and prevent them from spoofing your email domain name to launch attacks on others. Proofpoint is a vital part of your overall security tech stack, but it is not the only tool that matters. 

Lumifi can help you detect and respond to threats in real-time, providing 24/7 monitoring and response that integrates email security, endpoint security, and comprehensive security log management into a single, unified service. Find out how Lumifi ShieldVision™ provides unlimited visibility and deep context into security events on your network in near real-time. 

Deliver Best-Fit Cybersecurity for Every Client

In theory, cybersecurity is simple. Most managed cybersecurity service providers would agree they know what best practices should be implemented, and they know what technologies, skillsets and processes are required to achieve them. We all have a favorite cybersecurity framework to help compartmentalize and systematize a robust and comprehensive cybersecurity operation too.

But here’s the problem – cybersecurity doesn’t happen in a vacuum. One business’s SecOps has to factor in all of the unique business needs, industry requirements, and IT systems in place… oh, and the familiar restrictions of budget and staff.

Mo Customers. Mo Problems.

For Managed Service Providers, the challenge is multiplied by the number of unique business clients. There is no one-size-fits-all SecOps model, so you’re faced with two big questions:

  1. How do I deliver right-sized SecOps to each customer based on their goals?
  2. How do I achieve that without losing my mind and my margins?

Here are some recommendations to answer these two questions.

Delivering Right-Sized Cybersecurity Starts with a Proper Assessment

MSPs face the challenge of managing multiple clients with different cybersecurity postures, demands and risk tolerances. So, you need to be willing and able to address their particular needs. A cybersecurity gap assessment untangles cybersecurity issues and presents them in an organized manner, allowing you to compartmentalize and analyze them more clearly and confidently.

However, most cybersecurity assessments are one-size-fits-all and assume that you want to immediately get to the best/optimal state in all categories. Again, cybersecurity doesn’t work in a vacuum. This can be frustrating for many organizations as the assessment just tells them where they fall short of every “ideal” best practices. That's where our Cybersecurity Maturity Model and Gap Analysis comes in.

Cybersecurity Gap Analysis

Netsurion’s Cybersecurity Gap Analysis and Maturity Roadmap allows you to measure your current state against a desired state, not just a universally determined “best state".

Where to Start 

Our Cybersecurity Gap Analysis and Maturity Roadmap allows organizations and their service providers to assess their current state and define their desired state, providing them with a roadmap to their desired end state, not a universally determined “best state”. Every business is unique, and not everyone needs or wants the Ferrari F8 Tributo of cybersecurity. The point is to assess where your business is today and where your business should be tomorrow.

The Benefits

Check out our free Cybersecurity Gap Analysis and Maturity Roadmap for a clear, organized, and customizable way to assess your goals and needs.  You can run it for yourself. You can run it for your clients. Every time, you'll get a customized Maturity Model current score and end score overall broken down by predict, prevent, detect, and respond capabilities. In addition, a customized PDF report is generated that provides a list of priorities to focus on in building your roadmap to your desired state. It also allows you to:

  1. Prioritize gaps or risks in security posture.
  2. Identify opportunities to consolidate technologies.
  3. Use the assessment as both a sales tool and a client business review tool.
Maturity Model

Netsurion’s Maturity Model allows you to define your current and desired state, and offers recommendations to fill the gap.

Gap Analysis

Netsurion’s Gap Analysis organizes your current capabilities and desired capabilities across the cyberthreat timeline so you can focus on predict, prevent, detect, or respond shortcomings.

Delivering Right-Sized Cybersecurity Efficiently and Cost-Effectively

Now, you might be thinking “Great, delivering tailored cybersecurity to every client means infinite complexities for my business operations and more technology investments”. Discovering and articulating the unique challenges and goals of your client is nice, but how do you realistically deliver it?

We think the answer centers around the concept of Managed Open XDR partnership.

In addition, Managed Open XDR providers are increasingly offering capabilities in the Predict and Prevent categories such as vulnerability management and managed endpoint security.

The result is not more technology and more complexity. The result is a technology and service partnership that flexes to deliver right-sized SecOps to the full spectrum of your client base.

Open XDR

5 Pitfalls in Cloud Cybersecurity Shared Responsibility Model 

Cloud computing offers many advantages for modern businesses, such as flexibility, scalability, efficiency, and innovation. But it also poses its own challenges and security risks. How can you secure your data and assets in the cloud? Who is in charge of what in the cloud environment? 

The shared responsibility model helps address these questions and more. The shared responsibility model is a framework that defines the security and compliance roles and responsibilities of cloud service providers (CSPs) and customers for different components of the cloud environment. CSPs are responsible for securing the cloud infrastructure and services, such as servers, networks, storage, and databases. Customers are responsible for securing their data and applications in the cloud, as well as their operating systems, software, and network configurations, depending on the type of cloud service they use. The shared responsibility model aims to prevent cloud security gaps and ensure accountability resulting in a stronger security posture for all parties. 

However, the shared responsibility model is not foolproof. There are many pitfalls that can compromise this model and expose customers to security threats. Here are five of these pitfalls and how to avoid them. 

Pitfall 1: Misunderstanding Cloud Security 

One of the common difficulties regarding the shared responsibility model is misunderstanding cloud security. Some customers have extreme views on cloud security, either too optimistic or too pessimistic. For example, some customers may think that the cloud is so secure that they have nothing left to do. They may assume that the CSP has done it all and that they can relax and enjoy the benefits of the cloud without worrying about security. This is not true, as there are many aspects that remain in the customer’s domain, such as data protection, access management, configuration settings. Relying on the CSP alone can lead to security gaps or missed opportunities. 

On the other hand, some customers may think that the cloud is so insecure that they can’t use it. They may fear that it exposes them to more threats and vulnerabilities than their own data centers. They may also distrust the CSP’s ability or willingness to protect their data and assets. This is also not true, as there are many advantages of cloud security that customers can leverage, such as scalability, automation, resilience, intelligence, etc. The CSPs have a strong incentive to maintain a high level of security for their customers, as their reputation and revenue depend on it. 

So, the truth is somewhere in between these two extremes. Cloud security is neither a magic formula nor a nightmare. It is a shared responsibility that requires both parties to work together and understand their roles and obligations.  

Cloud Security Myths vs. Facts
The CSP is liable for any security breach or data loss in the cloud.   The CSP is only liable for breaches or losses that result from their own negligence or misconduct. The customer is still responsible for complying with laws and regulations, securing their own data and applications, and reporting any incidents or issues. 
The customer has no control or visibility over their data and assets in the cloud.  The customer has full ownership and control over their data and assets in the cloud. They can choose where to store their data, how to encrypt it, who can access it, how to monitor it, etc. They can also use tools and services provided by the CSP or third parties to enhance the visibility and auditability of their cloud environment.  
The customer can use the same security tools and practices in the cloud as they do on-premises.   The customer may need to adapt or adopt new security tools and practices in the cloud to match the different characteristics and challenges of cloud computing. For example, they may need to use more automation and orchestration tools to manage their security configurations across multiple cloud services and regions. They may also need to use more identity-based and data-centric security approaches to protect their data and assets in a dynamic and distributed cloud environment.  

Pitfall 2: Over-delegation of Responsibility 

Another hazard in the shared responsibility model is over-delegation of responsibility. Some customers may not fully understand what really remains on their plate when they move systems to the cloud. They may make the assumption that the CSP is responsible for everything and do not pay attention to their own obligations. This can be risky and result in compliance issues or breaches. 

For example, some customers may think that they do not need to worry about patching or updating their software or applications in the cloud because they assume that the CSP will do it for them. However, this depends on what type of cloud service model they use. If they use Infrastructure as a Service (IaaS), they are still responsible for patching and updating their guest operating systems and applications running on top of the CSP’s infrastructure. If they use Platform as a Service (PaaS), they are still responsible for patching and updating their application code running on top of the CSP’s platform. If they use Software as a Service (SaaS), they may not need to patch or update anything, but they still need to configure their settings and preferences according to their security requirement. 

Therefore, it is important to read carefully what the provider has said in their documentation about their responsibilities and limitations. They may say it in detail, but it can be exhausting and sometimes not very clear. Some of the key documents to look for are: 

By reviewing these documents carefully, customers can avoid potential misunderstandings and unrealistic expectations about what the provider can or cannot do for them. 

Pitfall 3: Capability vs. Responsibility Gap 

A third risk in the shared responsibility model is the capability vs. responsibility gap. Some customers may not have the skills, resources, or tools to fulfill their responsibilities in the cloud. They may lack the expertise, staff, or budget to implement effective security measures for their data within the new cloud environment.  

This can be problematic since they could miss critical vulnerabilities or threats while failing to comply with applicable regulatory requirements or industry standards present in their cloud environment. 

One way to address this gap is to invest in training, hiring, or retaining skilled staff who can handle their cloud security responsibilities effectively.  

Another way to address this gap is to use specialized tools or services provided by independent software vendors (ISVs) or other CSPs to enhance their security capabilities in the cloud. However, this can further complicate who is responsible for what and forces teams to manage and monitor yet another CSP. 

One of the most popular, and secure, methods is to leverage third-party vendors or partners to help with cloud security needs. For example, utilizing a managed service providers (MSPs) or managed security service providers (MSSPs) to outsource some or all security tasks in the cloud helps offload the management of cloud-based platforms and IT infrastructure to a single vendor, simplifying security and management at once. 

Pitfall 4: Default Settings and Configurations 

A common mistake in the shared responsibility model is using default settings and configurations for cloud services or applications without changing or reviewing them. This can create security vulnerabilities and expose user systems to attacks. 

Default settings and configurations can be problematic for several reasons. They can enable unwanted features that consume resources or disable important services that provide security. They can also leave some options open or unclear, resulting in confusion or inconsistency. 

For example, some customers may not enable multi-factor authentication (MFA) for their accounts or resources in the cloud, because they think that it is too cumbersome or unnecessary, making them more susceptible to credential theft or compromise. Many users may not consider changing default encryption keys or algorithms for their data in transit or at rest in the cloud. However, this can make them more vulnerable to data breaches or leaks, because these defaults may not meet their specific security requirements or standards. They may also be shared with other customers or known to attackers. Customers should use their own encryption keys or algorithms that are unique, strong, and compliant with their policies. 

It is important to customize the default settings and configurations of your cloud services or applications according to your risk acceptance level, security requirements, and best practices. You should also monitor and update them regularly to keep up with changes in your environment and use the tools and services offered by your CSP or third parties to help you manage and automate them effectively. 

Pitfall 5: Lack of Visibility and Accountability 

A fifth breakpoint in the shared responsibility model is lack of visibility and accountability. Some customers may lack insight into their cloud environment or enough oversight of their CSP’s actions. They may not know what is happening in their cloud environment, what their CSP is doing for them, or have enough documented evidence to prove their compliance and performance. 

For example, cloud users may not have a clear inventory of their cloud-based assets such as servers, databases, and applications. They may not know what they have, where they are, who owns them, who uses them, how they are configured, how they are protected, or how they are performing. This can make them more prone to errors, waste, and insecurities. 

Another example is some customers may not have a clear audit trail of their activities in the cloud, such as who did what, when, where, why, and how. They may not have logs, reports, or alerts to monitor and measure their actions and outcomes, making them more vulnerable to incidents and may also fail to comply with some regulations and standards. 

Therefore, it is important to have a high level of visibility and accountability for your cloud environment and your CSP’s actions. You should also have: 

What’s Next? 

The shared responsibility model is a key concept for understanding cloud security and defining who is responsible for what in a cloud environment. It helps both CSPs and customers to prevent gaps in security and ensures accountability across the cloud and customer environments. By avoiding these pitfalls, you can improve your cloud security posture and performance, while still enjoying the benefits from cloud computing. 

8 Essential Skills for Modern Cybersecurity Professionals

Cybersecurity is one of the most in-demand and rewarding fields in the IT industry. As cyberthreats continue to evolve and pose challenges to individuals and businesses, cybersecurity professionals need to have a diverse set of skills to protect data, networks, and systems.  

We understand that each organization and security operations team will vary somewhat, and that some of these skills may be of more or less importance depending on the roles within each organization. That is to say, there’s not a one-size-fits-all set of skills. 

However, given the trends of the increasing complexity and sophistication of cyberthreats, the ongoing shortage of cybersecurity talent, and the expanding scope of cybersecurity domains, these diverse skills are more valuable than ever. 

essential skills

Here are 8 skills that are essential for modern cybersecurity professionals: 

  1. Fundamental technological skills: A solid understanding of fundamental concepts and principles of information technology forms the bedrock of cybersecurity professionals' expertise. This encompasses a range of essential competencies, such as network configuration and management, firewall installation and configuration, administration of various operating systems, encryption, antivirus, VPN, and more. These skills can help them understand how systems work and how to secure them. They can also acquire these skills through certifications or courses. 
  1. Programming and scripting languages: Proficiency in various programming and scripting languages, such as JavaScript, Python, C++, and SQL will be required for most cybersecurity roles. These languages enable professionals to write, test, and deploy secure code, automate tasks, analyze data, and create solutions. Depending on the purpose and scenario, different languages can offer different advantages and functionalities. For example: JavaScript for web development and security; Python for data analysis and automation; C++ for low-level programming and reverse engineering; SQL for database management and injection attacks. 
  1. Verbal and written communication: Verbal and written communication are crucial skills for cybersecurity professionals. Explaining technical concepts to non-technical audiences, writing clear reports and documentation, and collaborating with others are key tasks in most security roles, from analyst to C-suite. By having excellent communication skills, professionals can present their ideas and insights effectively and persuasively. This is essential when considering timely communication in the event of an incident. By having excellent communication skills, professionals can build trust with clients and stakeholders, proliferate knowledge among users and employees, and positively influence senior management and decision makers when reviewing cybersecurity solutions. 
  1. Logical thinking and troubleshooting: Cybersecurity professionals need to have strong analytical and problem-solving skills. They need to be able to analyze problems, find root causes, apply solutions, and troubleshoot technical issues to improve their security performance. By using logical thinking and troubleshooting skills, professionals can solve complex and challenging problems in a systematic and efficient manner. They can also use various examples of the common problems or challenges they face and how they solve them. For example: using the OSI model to troubleshoot network issues; using debugging tools to fix code errors; or using root cause analysis to identify the source of a security breach. 
  1. Risk identification and management: Risk identification and management is a crucial skill for cybersecurity professionals. It involves assessing vulnerabilities, creating solutions, and implementing security policies and practices. By identifying potential threats and risks posed by internal and external sources, professionals can devise appropriate countermeasures to protect their assets and operations. Moreover, by monitoring and evaluating the effectiveness of their security systems and processes, they can ensure continuous improvement and compliance. Cybersecurity professionals can also use various frameworks or methodologies to perform risk identification and management effectively, such as NIST 800-171, ISO 27001, ARS v3.1.  
  1. Threat intelligence: Remain knowledgeable of the latest threats, attack vectors, and techniques used by threat actors. The ability to collect, analyze, and disseminate threat intelligence from various sources and apply threat intelligence to their security operations and strategies is key. This includes, but is not limited to, tasks such as threat hunting, vulnerability management, and incident response. By having threat intelligence skills, professionals can improve their situational awareness and visibility, enhance their detection and prevention capabilities, reduce their response time and costs, and support their strategic planning and decision making. They can also use various tools, platforms, or frameworks to collect and analyze threat intelligence data, such as threat intelligence feeds, threat intelligence frameworks like MITRE ATT&CK, and Threat Intelligence services.
  1. Incident response and forensics mindset: Cybersecurity professionals need to be capable of effectively responding to and investigating security incidents by collecting and analyzing digital evidence, identifying the root causes, and recommending appropriate remediation actions. They need to be able to use various tools and methods, such as network forensics, malware analysis, memory forensics, and log analysis. By having an incident response and forensics mindset, professionals can handle complex and sophisticated security incidents, such as advanced persistent threats (APTs), ransomware attacks, or data breaches. They can also follow some of the best practices or standards to handle security incidents effectively, such as NIST 800-171.  
  1. Desire continuous learning and adaptability: Last, but certainly not least, cybersecurity professionals need to have a growth mindset and a passion for learning new technology. They need to stay updated on the latest trends and developments in cybersecurity, learn new tools and techniques, and adapt to changing environments. By having a passion for learning, professionals can enhance their knowledge and skills, and keep up with the fast-paced and dynamic nature of cybersecurity. They can also use various sources or channels to stay informed and updated on new technological developments, such as blogs, podcasts, newsletters, webinars and pursue professional development opportunities, such as certifications, courses, or conferences throughout their career. 

Additional Skills that are helpful for cybersecurity: 

These are some of the top skills for modern cybersecurity professionals that can help you succeed in this dynamic field. By developing these skills, you can not only protect your organization’s data but also advance your career prospects. 

This Common Strategy is Killing Your Cybersecurity Revenue

For many of you reading this, it’s Q4 and you might be looking at your YTD sales and scratching your head about the low customer adoption of your cybersecurity services. Cybersecurity is a hot commodity, right? Every business needs it, right? So why aren’t your sales numbers rocketing right off your spreadsheet?

In talking to MSPs on a regular basis about go-to-market strategies, marketing, and sales enablement, I noticed something that is all too common that is stifling sales and as a result perpetuating the risk exposure of SMBs.

Right Product. Wrong Package.

You may have built a world-class cybersecurity solution – hired the right staff, chose the right tech, picked the right partners – but the way you present it to your customers is everything.

The problem I see is MSPs have organized their offering into the typical Good-Better-Best packaging model we’re all super familiar with in the SaaS market. There are two big problems with that.

Problem #1 – Nobody Likes Buying Cybersecurity

cybersecurity revenue

Cybersecurity is not something any business is excited to spend more money on. When was the last time you bought the BEST life insurance policy? What about the BEST car insurance you could find? You need them, but are you looking for the BEST, or the best-fit for your risk tolerance level? Unless you’re a wealthy hypochondriac or a terrible driver with a Ferrari, I’m going to guess you weren’t drawn to the BEST plans. And come to think of it, are insurance plans ever packaged in a Good-Better-Best way? No. And for good reason. So, step 1 – take a page from their playbook.

Problem #2 – Cybersecurity is Not Simply a Product

The Good-Better-Best model works for a single-purpose SaaS product. But cybersecurity is much more complex – it’s a combination of multiple products, various levels of service, and a sliding scale of asset coverage. When you borrow this tiered packaging model from the SaaS market, you’re forcing your buyer into making a very difficult choice with very few options. Not only does your buyer not like buying cybersecurity, but they also don’t fully understand the ramifications of their choices. So, they’re going to do what humans do… hedge their bets. When you had to purchase something that frankly was over your head, what did you choose? The most expensive premium option? The dirt-cheap option? Nope. You probably hedged your bets and went with the middle or, if you’re a cheapskate like me, the one slightly-below-middle-but-not-the-cheapest.

Remember that for most SMBs, telling them all of the cybersecurity services they need is like you being told you need an Automatic Pulsation Vacuum Double Cow Milker with Food-grade Silicone Cups and Tube and Stainless Steel Bucket (apparently it’s a thing!), but you have to choose whether you want to pay a little or a lot for it.

cybersecurity revenue

Cybersecurity and Home Security

So, in addition to looking at the insurance industry for a hint that borrowing the SaaS Good-Better-Best model might not be appropriate, you don’t have to look far to consider a better approach to cybersecurity packaging. Consider home security services. Instead of asking consumers plainly whether they want good, better, or best security, the packaging options are centered on “scope” (what do you want to protect) and “service” (how much work do you want to avoid).

Recommended Approach

The answer to smarter cybersecurity packaging is thankfully right under our noses. I’m sure you’ve heard of the NIST Cybersecurity Framework (CSF).  If not, this framework is quickly becoming the standard for both explaining and architecting cybersecurity capabilities, and more frequently being used by cyber insurance providers to evaluate policyholders and determine premiums.

nist cybersecurity framework

Simplify cybersecurity conversations using the NIST Cybersecurity Framework

Align your cybersecurity products and services to these five NIST CSF functions and now your customer can better understand the scope of cybersecurity and what they are choosing. Allow them to configure the protection that fits their risk tolerance.

Don’t make it a “this or that” choice. That is too limiting when it comes to cybersecurity complexity and the variations amongst business IT estates. Instead, you could offer choices within each NIST CSF function. Within these single-purpose NIST CSF functions, it is totally practical to build out tiered choices based on size/scope of coverage or sophistication of solution.  

nist cybersecurity framework 1

Give your customer the ability to customize their cybersecurity to fit their needs.

As a buyer, I can now begin to wrap my head around the cybersecurity functions I need from you and can choose the good-better-best levels within these areas based on risk tolerance and what’s a “best-fit” for my organization. It’s no longer an all-or-nothing situation where perhaps you’ve currently lumped all your truly recommended capabilities into the “BEST” option which the buyer perceives as overkill.

Expected Outcomes

Now that you haven’t boxed your customer in to choosing “good” cybersecurity or possibly “better” cybersecurity, but rarely the “best” cybersecurity, look forward to seeing more of those advanced cybersecurity functions going to work for your revenue numbers and your customers’ cybersecurity posture.

Flexible Offerings Require Flexible Solutions

I realize this is all well and good if your cybersecurity stack allows you to mix and match different solutions within these five NIST CSF functions. You’ll certainly need vendors and partners that allow you flex scope and service amongst things like endpoint protection, security monitoring, threat hunting, SIEM coverage, and more on a per client basis to make this practical and affordable.

Contact Lumifi for a more flexible way to scale your cybersecurity services across your full range of customers. 

Make the Choice Simpler for Your Clients

Whether you use the NIST Cybersecurity Framework above or another, the important part is to help your clients make the best choice for them and to feel confident in their choice. Using a gap analysis is a great method to consult your client and help them make informed decisions.

Scary Cyber Threats of 2023 and How to Vanquish Them

In terms of new critical vulnerabilities released, each year seems to be worse than the last. Unfortunately, it’s a trend that security analysts are unlikely to see decrease anytime soon. As businesses integrate new technology into their tech stack, they also introduce new avenues of attack. And these attackers are relentless.

Malicious actors are able to alter a script or modify a piece of malware more quickly than the time it typically takes to release security updates and implement patching. For that reason, organizations are constantly on their heels when it comes to cyber threat protection.

But all hope is not lost! While it’s easy to get overwhelmed by the sheer number of new threats, focusing on the rather limited number of attack vectors can make cybersecurity a lot less frightening.

Compromised Credentials

compromised credentials

Credential theft, or compromised credentials, refers to instances where unauthorized individuals obtain usernames and passwords, frequently due to phishing, social engineering, or data breaches. These stolen login credentials offer a direct route into an organization's digital assets and infrastructure.

Once they obtain access to credentials, malicious actors can use them in attacks in a variety of ways. One of the most popular techniques is "credential stuffing," in which attackers attempt to access several internet accounts utilizing stolen credentials, exploiting the unfortunate practice of using the same password across various platforms. Additionally, credential theft can act as a springboard for lateral movement within a network, enabling hackers to advance undetected from one system to another and escalate their attack.

While not quite as exciting as other attack vectors included below, compromised credentials are one of the most common and easiest ways for cyber criminals to gain access and expand the scope of their attacks. In fact, the 2023 Verizon Data Breach Investigation (DBIR) revealed that 83% of breaches involved external actors and of these breaches, 49% involved the use of stolen credentials.

Limit the potential impact by implementing:

Advanced Social Engineering

Advanced Social Engineering

Social engineering can be summed up as “the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.”

Better stated, social engineering is a deceptive tactic cybercriminals use to exploit the vulnerability of human psychology rather than technical flaws. The intention is to trick someone into disclosing private information, allowing unwanted access, or taking activities that can jeopardize security.

“Social engineering" refers to a broad class of attacks, but it covers specific types of attack techniques, including phishing. Most are familiar with phishing, which involves sending deceptive messages that appear to be from a trusted or reliable source, enticing recipients to click on malicious links, download malware, or divulge confidential information.

More recently, attackers have opted for targeted phishing methods, or spear-phishing, as a more effective method of access. Rather than simply playing on general human weakness, spear-phishing usually contains company-specific information in targeted campaigns. Think of an email from your CEO asking you to wire $100,000 to a vendor you are familiar with. Obviously, the bank information doesn’t go to the vendor bank, but to the bank of the attackers. Targeted spear-phishing attacks also continue to be one of the most common ways to inject malware into a victim’s network and systems.

In fact, phishing has become such a popular method of attack that multiple government agencies recently joined forces to create a Phishing Guidance document, “STOPPING THE ATTACK CYCLE AT PHASE ONE”.

Social engineering attacks are particularly difficult to defend since they exploit human weaknesses and not a particular device or system. Humans want to be helpful and efficient. Phishing and other social engineering attacks prey on this by creating a sense of urgency and authority.

What Can I Do?

The good news is by being vigilant and implementing employee training and policies, you can decrease the risk of falling victim to social engineering attacks. The most effective defense against social engineering is simply awareness and education. Be sure to educate yourself and your employees on social engineering tactics and methods.

Here are some quick tips to reduce compromise from these types of attacks.

Verify the Source

Before taking any action, you should always confirm the legitimacy of the sender. Inspect the sender's email address and domain to ensure it matches the official contact information of the organization. Be cautious of lookalike characters masquerading as the real deal.

Break the Loop

Attackers who utilize social engineering frequently create a closed-loop communication mechanism. For instance, an email that demands you text a strange phone number or contains a dubious link to wire money. Break the cycle by contacting the person or business using a separate method of contact to confirm their legitimacy.

Limit Information Exchange

Be cautious about the information you disclose. Phishers often use seemingly innocuous details to craft convincing messages. Avoid oversharing personal or sensitive data, even if a message appears trustworthy.

Assess Realism

Evaluate the credibility of the message. Are the claims, demands, or offers within the communication realistic and reasonable? A red flag should be raised if anything looks too good to be true.

Take Your Time

Attackers that use social engineering and phishing frequently create a false sense of urgency to manipulate targeted victims. Successful phishing attacks are frequently the result of hasty decisions. Slow down and take the time to scrutinize emails, messages, and requests.

By following these steps you'll reduce the likelihood of a successful social engineering attack.

Exploitation of Vulnerabilities

Exploitation of Vulnerabilities

One of the most often exploited vulnerabilities by cybercriminals is unpatched software. It's common for software developers to address security flaws when they release new updates. However, failing to update your software opens your system to attack. Cybercriminals are constantly on the lookout for outdated software, as it provides an easy point of entry into a system.

Aside from the known vulnerabilities exist zero-day threats, which are vulnerabilities previously unknown to security experts. When cybercriminals discover these vulnerabilities before security experts, they can exploit the flaw to infiltrate systems, typically without detection.

So, what can you do about it?

The first step is to ensure that all software is kept up to date. However, with over 50% of the vulnerabilities in the national vulnerability database scoring high or critical on the CVSS, it’s not feasible that an IT team dedicated solely to patching would be able to keep up with this rate. Realistically, an average organization could likely patch 10% of the high or critical vulnerabilities each month. If you don't have time to manually update all software on a regular basis, it is best to invest in a managed service that will handle updates automatically.

Results from vulnerability scanning typically leave IT professionals to determine the patching order on their own, often without the context needed to make an informed determination. Vulnerability management helps organizations by providing prioritization of scan results and performing automated tasks, allowing time to focus on what truly matters: proactively addressing critical vulnerabilities and strengthening their overall security posture. This not only streamlines the patching process but also frees up valuable resources for strategic security planning, threat mitigation, and continuous monitoring to stay one step ahead of evolving cyber threats. It's also important to use security software that is designed to detect threats and prevent them from infiltrating your system.

Misconfigured Cloud-Based Applications

Misconfigured Cloud-Based Applications

The use of cloud-based applications has become extremely popular over the years as businesses search for convenient methods to store and retrieve their data. However, this convenience can result in a significant security trade-off. Many cloud application providers boast an expansive user base but weak default settings. These misconfigurations and a potentially large number of victims make them an attractive target for attackers.

In cloud/user agreements, the user is typically. in charge of protecting the applications and data they choose to host on the cloud services, while cloud service providers are responsible for safeguarding the network, hardware, and equipment required to deliver their cloud services.

Unfortunately, end users often fail to adhere to security best practices when configuring their cloud applications, leaving them open to attack. Typically, default configurations or misconfigurations of cloud-based applications are what leave an organization vulnerable. Hackers can exploit these weaknesses to gain access to sensitive data, install malicious software, and even take control of the entire network. Default configurations are such a common concern that CISA listed it as #1 in a recent article on the Top Ten Cybersecurity Misconfigurations advisory.

What can I do about it?

First and foremost, it's crucial to ensure that your cloud-based applications are correctly configured. Regularly review and update your security settings, check for any known vulnerabilities, and address them immediately. Review access controls frequently and ensure that only those who require access have it. Implementing multi-factor authentication (MFA) adds an additional layer of security, making it more challenging for hackers to gain access to your data. To further enhance your security, consider implementing a managed extended detection and response (XDR) solution to help detect and respond to potential threats in real time.

Weaponization of Legitimate Tools

Weaponization of Legitimate Tools

The weaponization of legitimate tools is not a new concept, but it has become increasingly common in recent years. Cybercriminals use these tools because they are often overlooked by security teams and can easily bypass traditional security measures. Additionally, these tools often have legitimate functionality that allows malicious actors to move laterally across a network and exfiltrate data without raising suspicion.

Nowhere was this made more apparent than CL0P and its weaponization of Cobalt Strike. Cobalt Strike is a legitimate tool used for penetration testing, but in the hands of cybercriminals, it becomes a powerful weapon for lateral movement and data theft. While not specifically a method of entry, CL0P (and other ransomware groups) leveraged Cobalt Strike as a means of lateral movement and as a remote access trojan. This approach takes a threat from compromised credentials to a multi-faceted attack.

What Can I Do?

The first step is to ensure that all legitimate tools used in your organization are properly secured and monitored. This includes ensuring that they are updated regularly, access is limited to authorized personnel, and all activity is logged and monitored. It's also important to implement a zero-trust approach to your network security, meaning that no user or device is trusted until thoroughly verified.

MFA Bypass and Interception

MFA Token Hijacking

What happens when a means of security turns malicious?

As multi-factor authentication is more widely recognized and adopted as a strong security policy, cybercriminals have developed intricate means of access by bypassing or intercepting MFA methods. These methods take advantage of the flow of authentication methods used by MFA systems. In the case of token hijacking, attackers are going after MFA systems in an effort to steal an authentication token that will give them access to the user's account secretly. They do this by seizing the authentication token and sending it to themselves during the process. Once the attacker gets the token, they can use it whenever they want to gain access to the user's account, even after the user has logged out.

MFA token hijacking is a relatively new cyber-attack technique that exploits the flow of authentication tokens used by MFA systems. MFA token hijacking is a dangerous threat because MFA has long been considered the gold standard for securing user accounts. This attack exposes the vulnerability of modern MFA systems and demonstrates the need for more advanced security measures. It also underscores the need for constant vigilance on the part of system administrators and users alike.

What Can I Do?

There are several actions you can take to reduce or mitigate the risk of MFA token hijacking. First, use complex passwords that are hard to guess, and avoid using the same password for multiple accounts. This may seem like a no-brainer, but weak or reused passwords are still a significant problem. Longer-term solutions would be:

What’s a Business to Do Then?

Having security prevention basics like AV and endpoint protection is still important, but far from complete protection. In fact, these scary attack vectors typically evade most legacy endpoint security solutions. Since perfect prevention is not possible, it’s important that IT security teams adjust their mindset to assume that it’s a matter of when, and not if a breach will occur.

Rather than focus on a prevention-only defense, it’s vital to include threat detection and incident response solutions in your security strategy. Incorporating relevant security frameworks like NIST and a defense-in-depth approach helps detect threats quickly and respond to incidents faster, minimizing the damage an attack could have on your business.

By making security a top priority and being proactive in implementing these cybersecurity measures, businesses can better protect themselves against these and other emerging threats.

Which security functions outsource poorly and which outsource well

The IT security industry’s skill shortage is a well-worn topic. Survey after survey indicates that a lack of skilled personnel is a critical factor in weak security posture. If the skills are not available in your organization then you could: a) ignore the problem and hope for the best, or b) get help from the outside. Approach “a” is simply a dereliction of duty, and approach “b” has some negative connotations associated with the word “outsource”. It throws up images of loss of control and misaligned priorities.

As a service provider, we agree, and prefer to describe our SIEMphonic services as co-sourcing. Is it a panacea? Not really. Nothing is ever a silver bullet. There are security functions that do well when co-sourced, and then there are those that really must be performed internally. How do you know which is which?

This opinion from a Gartner Analyst breaks down defines defense as requiring deep knowledge of what to defend and how to defend. The former requires detailed knowledge of your IT environment, business processes, assets, systems, application, personnel, company culture, mission, and other knowledge of your IT, business and culture. The latter requires detailed understanding of threat actors, attacks methods, exploits, attacks, vulnerabilities, security architecture, and other security domain knowledge.

Using the above general guideline as a touchstone, here are two areas that can be done outside:

Here are two tasks that should remain in-house:

If your organization is affected by skill shortage, then consider co-sourcing. Just be mindful of what does well vs. poorly with this model, and plan accordingly.

EventTracker’s co-sourced solutions can provide your organization with advanced tools, backed by world-class experts that monitor your network 24/7.

Who suffers more - cybercrime victims or cybersecurity professionals?

So you got hit by a data breach, an all too common occurrence in today’s security environment. Who gets hit? Odds are you will say the customer. After all it’s their Personally Identifiable Information (PII) that was lost. Maybe their credit card or social security number or patient records were compromised. But pause a moment and consider the hit on the company itself and how that affects the cybersecurity professionals. The hit includes attorney fees, lost business, reputational damage, and system remediation costs.

They deserve it, you say? They were negligent and must suffer the consequences. But spare a thought for the individuals on the “front line,” defending their organizations against the entire world of cyber criminals. They are victims, too. And it may not be a lack of diligence or due care on their part either. In the meantime they may experience the same disappointment and grief as a customer whose data is compromised. They are confused. They may feel a lack of focus and confidence in themselves. They may have sleepless nights and an increased level of anxiety. Not very different than a caregiver to a sick patient.

As in the patient/caregiver scenario, all the attention is focused on the patient. Consider this excerpt from American Nurse that says, “While nurses may not suffer the same way patients do, we experience pain, frustration, lack of resources, and many other forms of suffering when delivering care to patients and their families. In our highly regulated healthcare environment, administrators commonly view nursing as the highest cost center instead of a revenue generator. Typically, nursing is factored into room and board on the patient’s bill.”

This will sound eerily familiar to the IT staff on the front line of responding to a data breach.

How can you help?

Why a Co-Managed SIEM?

In simpler times, security technology approaches were clearly defined and primarily based on prevention with things like firewalls, anti-virus, web, and email gateways. There were relatively few available technology segments and a relatively clear distinction between buying security technology purchases and outsourcing engagements.

Organizations invested in the few well-known, broadly used security technologies themselves, and if outsourcing the management of these technologies was needed, they could be reasonably confident that all major security outsourcing providers would be able to support their choice of technology.

Gartner declared this was a market truth for both on-premises management of security technologies and remote monitoring/management of the network security perimeter (managed security services).

Net result? The “human element” is back into the forefront of security management discussions. The skilled security analyst and subject matter expert for the technology in use have become exponentially more difficult to recruit, hire, and retain. The market agrees: The security gear is only as good as the people you are able to get to manage it.

With the threat landscape of today, the focus is squarely on detection, response, prediction, continuous monitoring and analytics. This means a successful outcome is critically dependent on the “human element.” The choices are to procure security technology and:

If co-sourcing is a thought, then selection criteria must consider the expertise of the provider with the selected security technology. Our Co-managed SIEM offering bundles comprehensive technology with expertise in its use.

Technology represents 20% or less of the overall challenges to better security outcomes. The “human element” coupled with mature processes are the rest of the iceberg, hiding beneath the waterline.

Why Comply with PCI Security Standards

Why should you, as a merchant, comply with the PCI Security Standards?

At first glance, especially if you are a smaller organization, it may seem like a lot of effort, and confusing to boot. But not only is compliance becoming increasingly important, it may not be the headache you expected.

Compliance with data security standards can bring major benefits to businesses of all sizes, while failure to comply can have serious and long-term negative consequences.

Here are some reasons why.

Compliance with the PCI DSS means that your systems are secure, and customers can trust you with their sensitive payment card information:

Compliance improves your reputation with acquirers and payment brands — the partners you need in order to do business

Compliance is an ongoing process, not a one-time event. It helps prevent security breaches and theft of payment card data, not just today, but in the future:

Compliance has indirect benefits as well:

But if you are not compliant, it could be disastrous:

You’ve worked hard to build your business – make sure you secure your success by securing your customers’ payment card data.

Your customers depend on you to keep their information safe – repay their trust with compliance to the PCI Security Standards.

Why is patching important to the security of your business?

Network Security Basic Training Series: Patching

In this series of articles, we will explore some of the basic ways that business of all sizes can keep their computer systems safer.

While it is impossible to say that a system can never be breached, if you are not doing some of the basics to help protect your system and your data, then you are more likely to experience a breach. In this first article, we will discuss system and application patching.

How can patching help your business’ security?

Keep up with regular patching

If you are not keeping up with regular patching of your computer and the programs that run on it – then you are simply asking for trouble. Many of the breaches that make the news (and I am sure many more that don’t make headlines) are caused by holes in software for which a patch existed by the vendor.

If you buy a new PC from the local computer retailer, chances are you have had to update it with a lot of patches soon after taking it out of the box. These updates come out typically on a monthly basis, and they should be allowed to download to your system and be applied.

In larger companies where there are hundred or thousand s of computers to update, there will most likely be a commercial patching solution used that can download the update files once and then apply them to all the systems that need them on a rolling basis.

What you want to avoid is the delay of these patches from getting applied.

Sure, there are times where the patches want to update your system and then reboot, and the time the patches choose to be applied may not be the perfect time for you to stop what you are doing.

It is ok to postpone the application of patches until later in your day or when you shutdown the computer, but you should never delay more than needed and I would say it is never advised to go more than 48 hours after the patches are available to get them applied.

Update 3rd party programs

What is being referred to above is mostly the operating systems patches, but what about 3rd party programs such as Adobe, Java, Flash, etc.?

These too need to be updated often, and even though it may be annoying to see the pop-up on your screen notifying you of available patches, you should always take the time to apply the latest updates to keep your system protected.

Even if you don’t use a particular program but it is installed on your computer, you should keep that up to date as well so it cannot be exploited.

There are even free utilities such as Update Checker from FileHippo that can run as a separate program and check your computer to see what available updates exist for you. “The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases. These are then neatly displayed in your browser for you to download.”

The Update Checker works on any PC running Windows 8, 7, Vista, XP, 2012, 2008, 2003, 2000, ME or 98. I have found this utility particularly useful for keeping programs up to date that I didn’t even know had updates available for – including Skype, Google Earth, and more.

What happens if you do not apply software patches to your computer?

If you leave your systems unpatched, then hackers or software exploits may use holes in older versions of software to find a way to get into your computer and/or steal your data. Hackers could also use these software weaknesses in unpatched software to gain information about you and your web activities in order to scam you later via email or phone.

Probably the worst example of what hackers can do nowadays once they are able to get into a computer is the rise of ransomware, where the contents of your hard drive are locked until you pay a ransom to the hackers.

Keep in mind that a compromised system may hurt not only that one system, but others as well. If you use your computer on a network that includes other computers, your issue could affect them as well.

If you use a laptop at home and it gets compromised, then you bring the laptop to work, that issue could follow you to your workplace and affect the other computers on the corporate network as well.

In summary, it is best practice to keep your system up to date at all times. Be sure to turn on any automatic updates that are available to your operating system and any 3rd party applications.

If you need to use a utility to scan your computer for 3rd party applications that may need updates, be sure to file on like the Update Checker noted above and use it regularly.

In future articles we will discuss more topics that can help you keep your system and your data safer.

Why Managed Endpoint Security Eliminates Cybersecurity Blind Spots

Incomplete cybersecurity information visibility comes at a cost. Without real-time comprehensive visibility, organizations experience blind spots that handcuff your cybersecurity protection and increase risk. IT environments are increasingly complex as they span on-premises, cloud, endpoint, and hybrid approaches. This wide and diverse infrastructure leaves plenty of room for attackers to hide and emerge when least expected.  

Why Endpoint Security Coverage is Critical

Non-technical users, and in particular the endpoints they use, make soft targets for cyber criminals. Regardless of how well your servers and firewalls are monitored and protected, what level of risk are you willing to take when your sensitive data and reputation are at stake?

A data breach now takes on average 127 days to detect and costs $2.64 million, according to Ponemon Institute. Comprehensive visibility and real-time analysis of telemetry provides an early warning of cybersecurity threats before extensive damage occurs. Threats caught earlier, are easier to defend and remediate against, and less expensive to address.

You may already have a threat protection platform and a 24/7 security operations center (SOC). However, if that platform’s sensors aren’t deployed across an organization’s entire attack surface, crucial log data will not be collected and visibility reduced, creating a security gap that exposes you to damaging exploits.

Stats

Why Organizations Fail at Endpoint Security Despite Capable Technology

Endpoint Protection Platforms (EPPs) like anti-virus and anti-malware alone are insufficient to safeguard sensitive data. If technology alone could solve for cybersecurity gaps, businesses today would be more effective at defending against well-funded threat actors, instead of facing rampant data leaks and ransomware attacks. Also, organizations may implement log sensors that only monitor core devices like firewalls and servers, leaving endpoints exposed.

Benefits of comprehensive network and infrastructure visibility include:

Learn more about how endpoint security reduces SMB Cyber Risks.

Full Visibility Shouldn’t be Challenging

Many organizations believe that they need to invest heavily in cybersecurity technology, and then go it alone. What makes endpoint security reach its full potential is managed security experts with the knowledge and time to manage it. When managed in-house, endpoint security often becomes a sideline task and falls aside to other large projects and daily routines and meetings.

Business leaders are either unaware of the importance of endpoint security coverage or convinced that their organization has sufficient coverage, justifying their lack of spending on endpoint protection. There’s not a silver bullet to achieve instant visibility. As the table below illustrates, evolve your security maturity in stages, from perceived high-value devices like core firewalls and servers as well as endpoints.

Entry-level visibility Better visibility Ideal visibility
Monitoring core devices like firewalls and servers. Monitoring on-network endpoints like laptops and workstations. Monitoring all core devices such as firewalls and servers, as well as workstations, especially remote.

Ask yourself if you have the staff and skills to keep your cybersecurity optimized. Your team is too busy already so don’t just throw more tech on the stack. Find a Managed Endpoint Security partner that offers people, process, and technology in the right combination to scale and increase efficiency.

Proactive Protection 24/7/365 by Security Experts

Overcoming advanced threats requires mature technology, skilled people, and a more rapid incident response than in years past. It is challenging to hire and retain cybersecurity staff with the over two million current IT job openings. A managed Security Operations Center (SOC) monitors and protects customer infrastructure around the clock without the cost and overhead of building it yourself. SOC-as-a-Service is a managed SOC solution that enables you to mature your security position quickly and at scale. Instead of being reactive regarding threats, rest assured that your infrastructure and customers are monitored and protected by a fully staffed team of experts.

Optimize your Endpoint Coverage 

Budget-constrained businesses out to cut corners are fooling themselves that endpoint security doesn’t matter. More than ever, endpoint security is a crucial layer in a defense-in-depth approach to cybersecurity. Operational simplicity eliminates the need to constantly update and tune sensors, rely on internet connectivity, or worry about burdensome maintenance to keep pace with threats.

As a managed security service provider and trusted advisor, look for opportunities to consolidate not only your own tech stack but that of your end customers. You can take easy steps to minimize cybersecurity risk, enhance compliance, and eliminate visibility gaps without breaking the bank. Learn how extended detection and response (XDR) coverage in our Managed Threat Protection delivers capabilities like holistic visibility and attack surface reduction to predict, prevent, detect, and respond to incidents faster.

Why Naming Conventions are Important to Log Monitoring

Log monitoring is difficult for many reasons. For one thing there are not many events that unquestionably indicate an intrusion or malicious activity. If it were that easy the system would just prevent the attack in the first place. One way to improve log monitoring is to name implement naming conventions that imbed information about objects like user accounts, groups and computers such as type or sensitivity. This makes it easy for relatively simple log analysis rules to recognize important objects or improper combinations of information that would be impossible otherwise.

However asking for special naming convention changes for the sake of log monitoring may be difficult to pull off. It’s common to treat log monitoring as strictly one-way activity in relation to the production environment. By that I mean that security analysts are expected to monitor logs and detect intrusions with no interaction or involvement with the administrators of the systems being monitored other than for facilitating log collection.

I realize that such a situation may not be easy to change but if security analysts can have some input in the standards and procedures followed upstream from log collection they can greatly increase the detectability of suspicious or questionable security events. Here’s a few examples.

There are at least 3 kinds of user accounts that every organization uses:
• End-user accounts
• Privileged accounts for administrators
• Service/application accounts

Each of these 3 accounts are used in different ways and should be subject to certain best practice controls. For instance no person should ever logon to an interactive logon session (local console or remote desktop) with a service or application account. But of course a malicious insider or external threat actor is more than happy to exploit such accounts since they often have privileged authority and are frequently insecure because of difficulties in managing these accounts. Conversely, end-user and admin accounts assigned to people should not be used to run services and applications. Doing so will cause all kinds of problems. For instance, if Service A is running as User B and that user leaves the company, Service A will fail the next time it is started after User B is disabled. In audits I’ve seen highly privileged admin accounts of long departed employees still active because staff knew that there were different applications and services running with these credentials. This of course creates all kinds of security holes including residual access for the terminated employee.

Event ID 4624 makes it easy to distinguish between different logon session types with the Logon Type field. See the table below. But of course Windows can’t tell you what type of account just logged on. Windows doesn’t know the difference between end user, admin or service accounts. But if your naming convention embeds that information you can easily compare account type and logon type and alert on inappropriate combinations. Let’s say that your naming convention specifies that service accounts all begin with “s-“. Now all you need to do is set up a rule to alert you whenever it sees Event ID 4624 where Logon Type is 2 or 10 and account name is like “s-*”.

This is just one example of why it is so valuable to implement naming conventions that embed key information about objects. If you name groups with prefixes or something else that tags privileged groups as such, it now becomes very easy to detect whenever a member is added to privileged group. Perhaps you follow certain procedures to protect privileged accounts from pass-the-hash attacks such as limiting admins to only logging on to certain jump boxes. If privileged accounts and jump box systems are recognizable as such by their name then you can easily alert when a privileged account attempts logon from a non jump box system.

This of course requires upfront cooperation from administrators who may resistant to changing their naming styles just for the sake of logs. And you need to get to know the procedures and controls used to keep your network secure so that you can configure your SIEM to recognize when intruders or malicious insiders bypass these controls. But both challenges are worth the effort to face.

Will CIOs Be the Final Victim After a Breach

In the wake of their breach, Target announced on March 5, 2014 that their CIO, Beth Jacob was announcing her resignation.

In December of 2013, Target announced to the public that it had been the victim of a cyber crime resulting in the loss of 40 Million credit cards and possibly as many as 70 million personal records of its customers. When something of this magnitude is announced to the public, there needs to be someone to blame and the Chief information Officer (CIO) is the perfect scapegoat.

In many corporate cultures, the role of the CIO was often overshadowed by the Chief Technology Officer (CTO). In fact, many boards viewed the CIO as a subordinate of the CTO and the corporate structure was organized in that manner.

Recently, with the need to focus on “Big Data”, compliance initiatives (such as PCI, HIPPA, or SOX), and data security, the CIO has been elevated in status. This heightened status comes with the additional burden of being responsible for the systems when things go wrong.

In the case of Target, Ms. Jacob, resigned while Target is working to restructure its payment environment so that a similar breach cannot happen in the future. An interim CIO will be put into place to oversee the overhaul, and the long-term plan for the company has not yet been announced.

In the modern corporate landscape, the CIO is often held responsible for the electronic security of their company. When a hacker succeeds, the CIO may be held as failing in their duties and letting down the company.

Data security is a complicated matter, and it is important to always keep in mind that to protect data you must always be perfect. For a hacker to steal data, he only has to succeed once.

Wireless Security for Business

In today’s business world, a major draw for many customers is the ability to stay connected to the outside world while outside the office. Having access to the Internet is a must to accomplish this.

In order to provide this connectivity, this typically means having a wireless network set up for your customers to use. However, it also means placing your business at a potential risk.

In one of the highest profile cases of its time in 2007, the retailer TJX, operator of stores such as T.J. Maxx, Marshalls, and Sierra Trading Post, suffered a breach with over 45 million customer credit and debit card numbers stolen. Brian Krebs of Krebs on Security contributes the breach of TJX to a wireless network being hacked and wireless security.

Outlined below are three steps that will help ensure that a guest wireless network will not put your business at risk for a breach or any other illegal action.

Three Steps For A Secure Wireless Network

Work Smarter – Not Harder

Log collection, SIEM and security monitoring are the journey not the destination.  Unfortunately, the destination is often a false positive.  This is because we’ve gotten very good at collecting logs and other information from production systems, then filtering that data and presenting it on a dashboard.  But we haven’t gotten that good at distinguishing events triggered by bad guys from those triggered by normal everyday activity.

A honeynet changes that completely.

At the risk of perpetuating a bad analogy, I’m going to refer to the signal-to-noise ratio often thrown around when you talk about security monitoring.  If you like that noise/signal concept then the difference is like putting an egg timer in the middle of Times Square at rush hour.  Trying to hear it is like trying to pick out bad guy activity in logs collected from production systems.  Now put that egg timer in a quiet room.  That’s the sound of a bad guy hitting an internal honeynet.

Honeynets on your internal network are normally very quiet.  The only legitimate stuff that’s going to hit them are things like vulnerability scanners, network mapping tools and… what else?  What else on your network routinely goes out and touches IP addresses that it’s not specifically configured to communicate with?

So you either configure those few scanners to skip your honeynet IP ranges, or else you leverage them as positive confirmation that your honeynet is working and reporting when it’s touched.  You just de-prioritize that expected traffic to an “honorable mention” pane on your dashboard.

On the other hand, (unless someone foolishly publishes it) the bad guy isn’t going to know the existence of your honeynet or its coordinates.  So as he routinely scans your network, he’s inevitably going to trip over your honeynet — if you’ve done it right.  But let’s talk about some of these points.

First, how would a bad guy find out about your honeynet?

So, honeynets are definitely a matter of security through obscurity.  But you know what?  We rely on security through obscurity a lot more than we think.  Encryption keys are fundamentally security through obscurity.  Just really, really, really, good obscurity.  And security through obscurity is only a problem when you are relying on it as a preventive control – like using a “secret” port number instead of requiring an authenticated connection.  Honeynets are detective controls.

But what if you are up against not just a persistent threat actor but a patient, professional and cautious one who assumes you have a honeynet and you’re listening to it?  He’s going to tiptoe around much more carefully.  If I were him, I would only touch systems out there that I had reason to believe were legitimate production servers.  Where would I collect such information?  Places like DNS, browser history, netstat output, links on intranet pages and so on.

At this time, most attackers aren’t bothering to do that.  It really slows them down and they know it just isn’t necessary in most environments.  But this is a constant arms race, so it’s good to think about the future.  First, a bad guy who assumes you have a honeynet is a good thing because of what I just mentioned.  It slows them down, giving more time for your other layers of defense to do their job.

But are there ways you to optimize your honeynet implementation for catching the honeynet-conscious, patient attacker?   One thing you can do is go through the extra effort and coordination with your network team to reserve more and smaller sub-ranges of IP addresses for your honeynet so that it’s widely and granularly dispersed throughout address space.  This makes it harder to make a move without hitting your honeynet, and further reduces the assumption that attackers usually find it safe to make — that all your servers are in range for static addresses, workstations in another discreet range for DHCP, and then another big block devoted to your honeynet.

The bottom line though is honeynets are awesome.  You get very high detection with a comparatively small investment.  Checkout my recent webinar on Honeynets sponsored by EventTracker, who now offers Honeynet-as-a-Service that is fully integrated with your SIEM.  Deploying a honeynet and keeping it running is one thing, but integrating it with your SIEM is another.  EventTracker nails both.

Your Best Defense Against Ransomware Might Be Your Employees

Ransomware, while not a new model for hackers, has certainly been wreaking havoc on businesses in 2016 – particularly in healthcare and financial services.

While your business’ data security program should consist of many components, perhaps the most effective defense to ransomware is building a culture of data security amongst your employees.

By nature, ransomware relies primarily on “social engineering”, baiting people into clicking a link in an email or other method of ultimately downloading a malicious program into the company network. Once on the network, the ransomware goes to work encrypting files or an entire hard drive rendering them inaccessible followed by a demand for money in exchange for decrypting the data again.

While there are certainly technology and protocols that should be employed to defend against ransomware, malware, and any other form of data breach, let’s start with the “people” factor as that is the vulnerability ransomware most frequently preys on.

Chief Information Security Officers and data security experts agree that the weakest link in a company’s security chain is typically people. Businesses of all sizes should consider building a culture of data security by 1) Training, 2) Empowering, and 3) Incentivizing employees to be on guard for data breach attacks.

Training

Offer employees interactive training resources like seminars, webinars as a benefit to help them protect their own personal data security. Employees that are more security-savvy for their own personal data safety are going to be great defenders of the company’s data as well.

This can be built into and marketed as an employee benefit along with common benefits like medical, dental, legal counsel, and more.

Empowering

Communication from upper-management on the danger of cyber-threats and the critical role every individual plays in protecting the business’ and customers’ data. Every employee should walk away feeling that cybersecurity is a real threat to them and their colleagues and that they are encouraged to be vigilant and report concerns to IT.

Incentivize (or “Gamify”)

One way companies can really solidify this culture of security is through Gamification. For instance, consider developing a scoring system by which employees can report/forward suspicious emails to the IT security department. Should the email be a legitimate threat, points are given the employee.

The points can be displayed on a leaderboard for bragging rights and also points could be exchanged for rewards once certain levels are achieved. It may sound silly, but if the rewards are appealing and the bragging rights are fun, that may easily be enough to make every single employee a security watch dog for your company!

Take Care of the Basics

Building a culture of security amongst your employees is one “cog” in your security system. There are many others.

Your Voice for SMB Compliance Pains

As a small- to medium-size business (SMB) owner, you know how important a smooth, uninterrupted transaction process is to your bottom-line. To ensure this smooth process, you have network security in place that includes mandated Payment Card Industry Data Security Standard (PCI DSS) compliance activities that happen to land within your responsibility.

Should you not comply with PCI DSS, and a breach occurs, the fines and penalties can be quite costly, not to mention brand and business reputation damage. PCI DSS is necessary, but quite cumbersome for an SMB to maintain.

We believe that every business should have the means to protect themselves and their customers from cyberattacks, and the PCI Security Standards Council (PCI SCC) shares this belief. We’re working together to make compliance management more efficient, and therefore, strengthen the security of all merchants.

Are you a small merchant that needs compliance help?

Take a look at the following PCI-relevant questions. Though this list is far from complete, if you answer no to any of these, we can guarantee you are not meeting the PCI requirements and could use assistance.

As small merchants and Netsurion customers know, PCI DSS ensures that all companies that process, store or transmit credit card information maintain a secure environment. Complying with the standard means a company’s systems are secure, and perhaps most importantly, that customers can trust that brand when they hand over their sensitive payment card data.

Small businesses, however, often operate remotely with minimal IT budgets and internal resources. They often cannot fortify their payment systems on their own—let alone keep track of their PCI compliance statuses.

Lengthy self-assessment questionnaires and multiple cybersecurity layers that need to be put in place to remain compliant can lead to confusion and frustration.

Luckily, the PCI SSC Small Merchant Task Force exists as a dedicated global effort to help improve payment data security for small businesses

Co-chaired by Barclaycard and the National Restaurant Association (NRA), the task force collaborates on guidance and resources that simplify data security and PCI Data Security Standard (PCI DSS) compliance for some of the most vulnerable businesses preyed upon by cybercriminals.

This task force relies on the vast knowledge of its members to provide:

  1. Best practice recommendations on what is needed to protect the payment environment, including working with security assessors, vendors, and service providers
  2. Easy-to-understand content and resources unique to small business needs that will help them take advantage of PCI best practices, standards, training programs, and solutions
  3. Ongoing input to the council on current trends, issues, and concerns for small merchants

PCI DSS applies to all organizations or merchants that accept, transmit, or store cardholder data, regardless of size or number of transactions. This means that even small restaurants, retailers, hotels, and doctors’ and lawyers’ offices all need to stay on top of their compliance statuses.

SMB retailers vary from small operations with one or a few locations, to larger entities with many edge locations, such as franchises or branch offices. The dispersed nature of their businesses can create security gaps and challenges, leaving them vulnerable to data breaches.

Reputational damage and revenue loss from breach news going public impact the individual edge locations, as well as the corporate brand on a national or even global scale.

According to the 2016 Verizon Data Breach Investigations Report, “remote attacks against the environments where card-present retail transactions are conducted” resulted in 534 total breach incidents, of which 525 had confirmed data disclosure. Clearly, more needs to be done to improve security at each and every location under the brand umbrella.

Mark Cline, Vice President of Sales, was appointed to this special task group. He will focus efforts on serving as your voice, to help make compliance more achievable and understandable for SMBs across the globe.

Mark has been working in cybersecurity and compliance since 2005 with an early stage security startup in Atlanta, GA. Mark has worked with thousands of small-and-medium size merchants to help understand and navigate compliance requirements as well as supporting fortune 500 companies with high level cybersecurity and consulting engagements. Mark has also led functions for a security consulting firm specializing in, PCI, HIPAA, FISMA, FedRAMP, SOC compliance audits, penetration testing, social engineering, and vulnerability scanning.

All businesses, even small merchants, need to be able to quickly detect and prevent threats from causing massive damage to their networks and systems, by monitoring and protecting all of their endpoints.

One of the most important things to note is that a managed firewall is essential but no longer a significant enough barrier on its own when it comes to today’s evolving threat landscape. Risk mitigation has become crucial, including monitoring outbound traffic for exfiltrating data.

Netsurion and EventTracker are extremely honored to have members of the task force, so we can use our industry expertise and information to help shape the PCI standard for the better.

Navigating Your Managed Cybersecurity Options

If you’re aiming to improve your organization’s threat detection and incident response (TDIR) capabilities, I’m willing to bet you’re annoyed and frustrated by trying to navigate the managed cybersecurity market that’s rife with imprecise terminology and vendors willing to bend definitions to fit their solutions. As a result, you have an extremely difficult job in trying to find the right solutions, let alone pick the best one.

So, in short, if you are looking for wider attack surface coverage, deeper threat detection, and faster incident response, I hope this article gives you some clarity and confidence in your evaluation process.

Step 1: Untangle the Market Categories

Unfortunately, cybersecurity market analysts and vendors invent a new solution category every time they simply improve a feature or introduce a new approach. As a result, to improve threat detection and incident response, you have to sift through the following market categories. I’ll explain my take on what actual nuances matter in each category.

img build buy partner[3]

Step 2: Consider Attack Surface Coverage

Once you understand the nuances of the categories and can articulate what scope of technology and service are important to you, next is to evaluate which vendors have the wherewithal to protect your environment. This is a great way to quickly pare down the field of contenders. Look for an online library of data source integrations or similar terminology. Disqualify any platform that doesn’t cover your IT estate, especially vulnerable legacy systems that might not always be fully patched.

Attack Surface

Protect more than your “Digital Front Door”
Your business has many points of cyber-attack vulnerability

Step 3: Inspect the Detection

So, you’ve shortlisted the type of provider and shortlisted those that cover your assets. Now, it's time to inspect that coverage as not all data source integrations are created equal. Watch out for really weak integrations that may collect data but not really mine intelligence and serve up actionable alerts. Ask your vendor to explain their Common Indexing Model (CIM) which is what makes it possible for their system to identify Indicators of Compromise (IoCs) across multiple assets. A vendor’s integration is much more than ingesting data. Ask to understand these five (5) elements – Parsing Rules, Correlation Rules, Alerts, Dashboards, and Reports. A common requirement is in-depth Microsoft 365 integration.

Step 4: Be Skeptical About Response

This is where the rubber meets the road as they say. Because of the multiple stages and hands-on activity involved, Incident Response requires particular attention. Reality is you and the vendor should accept a shared responsibility (or “shared fate”) mentality to truly have a successful outcome. Ask your vendor about how much involvement you have in shaping the SecOps Runbook and IR Playbook. Ask about Automated Response as well as Guided Remediation support. Both machine and human involvement should be expected. Speaking of humans, throughout the tuning, monitoring, detection and response stages, insist on a full understanding of their SOC’s dedication to your environment and specialized roles in malware analysis, threat intelligence, threat hunting, incident response, and customer success management.

BONUS: Consider an MSP

Because of their intimate knowledge of the IT environment and advantages of an existing relationship, IT managed service providers (MSPs) are taking on more managed cybersecurity responsibilities including threat detection and incident response. A winning cybersecurity combination for many organizations is to work with an MSP that is a cybersecurity generalist but brings a Managed XDR specialist into the SecOps picture. Such vendors must be MSP-ready and account for multi-tenant management, flexible pricing models for continuous scaling up and down, and simple deployment.

Align Your Cybersecurity Posture to Your Cyber-Risk Tolerance

Your business’s IT network is constantly connected to the Internet, includes countless SaaS applications and API connections, and is accessed by employees and vendors located anywhere in the world. As a result, your business is always exposed to cyber-risk, some of which is avoidable, but also some of which is unavoidable. Your cyber-risk tolerance, the types and amount of risk, on a broad level, an organization is willing to accept in its pursuit of value, governs your cybersecurity spend and correspondingly your cybersecurity posture. In simpler times, deploying a firewall to guard the network and installing signature-based anti-virus at the endpoints was considered appropriate to get a medium level of cybersecurity. The evolution of the threatscape makes such a posture antiquated and consequently exposes the organization to very high levels of cyber-risk. 

Avoidable risks are those you can address by implementing standard cybersecurity practices (i.e. patch management, multi-factor authentication, strong password policies, least privilege access, security awareness training, and more). The big question to ask yourself and your organization is “what is acceptable exposure to unavoidable risk (our cyber-risk tolerance) and how do we best align to it (our cybersecurity posture)? 

3 types of unavoidable cyber risk

What Are These Unavoidable Cyber Risks?

They basically fall into these three camps: 

Mitigating these risks essentially require: 

What’s the Best Way To Improve Your Cybersecurity Posture?

Managed Detection & Response (MDR) services are enjoying high rates of acceptance with organizations that accept that such services are a must for modern threat defense.  

Not to be confused with simply Managed Endpoint Detection & Response software, MDR services can have a wider scope of coverage.  

The global MDR market size is expected to grow from an estimated value of USD 2.6 billion in 2022 to USD 5.6 billion by 2027, at a Compound Annual Growth Rate (CAGR) of 16.0% from 2022 to 2027. Some of the factors that are driving the market growth includes addressing the shortage of skilled cybersecurity professionals and budget constraints, government regulations, and strict regulatory compliance.  

What benefits do MDR services provide in terms of risk reduction? In a nutshell, this service reduces unavoidable cyber-risk. 

Is There a Scalable MDR Approach for Your Business’s Needs Today and Tomorrow?

Your organization is not static. It’s always changing – and hopefully growing. As organizations grow, typically their cyber-risk tolerance shrinks. How do you invest in a proper MDR solution to solve for today’s risk tolerance while avoiding a future rip-and-replace to meet a more stringent risk tolerance in the future? 

There are two axes on which your MDR solution should flex with your organization’s cyber-risk tolerance to deliver an aligned cybersecurity posture. 

What Other Characteristics of MDR Can Impact Cyber-Risk Tolerance and Cybersecurity Posture Alignment?

There are three primary characteristics to dive into when selecting an MDR solution: 

Is it Extended Detection & Response (XDR)? XDR (Extended Detection & Response) is an evolution of threat detection and incident response (TDIR) that successfully breaks down the traditional data and environment silos of legacy SecOps platforms to deliver wider attack surface visibility, deeper threat detection – and ultimately, faster incident response. XDR does not necessarily mean other security controls are rendered obsolete. Rather, XDR platforms must ingest, normalize, and correlate telemetry from all sources such as SIEM, EDR, and UEBA to reduce noise, identify true Indicators of Compromise (IoCs), trigger appropriate automated response, and deliver actionable alerts. 

Is it Open? Open XDR is a class of XDR that is vendor-agnostic in terms of its protection scope. Open XDR, sometimes called Hybrid XDR, is designed to integrate with other security technologies to avoid ripping and replacing them – thus they are “open” to ingest anything and everything the platform can. The key, however, is to inspect the quantity and quality of data source integrations the Open XDR platform provides. 

Is it Managed? Managed XDR delivers this platform as-a-service combined with our 24x7 SOC (Security Operations Center) to not only provide platform hosting and tuning, but also a jointly defined SecOps Runbook, an IR Playbook, around-the-clock security monitoring, proactive threat hunting, and guided remediation support. 

Malware’s Crazy Names: Where Do They Come From? 

Do you ever wonder where malware names come from? What's in a name, after all? There’s Heartbleed, Melissa, and GooLoad. There’s even ILOVEYOU. All these names appear to have come from nowhere, just like the malware they’re attached to.  

There is no universally adopted standard for naming malware, although you’d think there would be (more on this later). After all, thanks to the World Meteorological Organization, we have official annual lists of names for hurricanes. The International Astronomical Union has formalized the familiar cultural names for hundreds of stars like Betelgeuse and Sirius and defined an alphanumeric nomenclature for the millions of other celestial bodies in the universe. And the World Health Organization names virus variants, like Omicron for Coronaviruses and H1N1 for influenza. 

Is There a Method to the Malware Naming Madness?  

The short answer is sort of. Usually, malware is named by the threat researcher who discovers it. These analysts work in the computer and network security industry, typically for commercial or government organizations. And there are patterns that these researchers often follow. 

For example, there are names for malware types that are based on functionality, such as banker, downloader, backdoor, dropper, spyware, keylogger, or Trojan. Similarly, a name is sometimes based on the method by which the malware actually operates. Heartbleed, for example, was so named because it bled secret banking information back to the attacker - information considered to be the heart of the victim organization. The media latched onto the name Heartbleed because it is so descriptive and emotional - as well as sufficiently scary - garnering it a lot of attention. 

Names may also designate a malware family. Malware authors continue to innovate, often creating new variants of existing malware to avoid detection or increase their impact. If the researcher can identify commonality in the code signature, malicious commands, and attack style, then it is likely the new threat is based on a known malware family. 

Sometimes threats are named by the malware author, rather than a researcher, and promoted as a kind of branding. For example, the Janus syndicate was especially aggressive in promoting its ransomware modules, Petya and Mischa (or Misha). These were sold as a pair in underground forums, and Janus was anxious to make sure that the names were something that they controlled because they generated billions of dollars in revenue. 

malware names graphic

When Patterns Don’t Apply, Malware Names Can Get Interesting

Sometimes the people naming malware just get creative. Many years ago there was ILOVEYOU, named for its email attachment “love-letter-for-you.txt,” a file that carried malicious code. This is back when we were quite naive about these malicious attachments. What made it suspicious was that the attack arrived as an email from a business contact. Typically, you don’t get love letters in this environment. But it was a simple virus for a much simpler time.  

Here are some other interesting names out there in the wild: 

Attempts To Tame the Mess

While there is no single, global registry of official names for all the malware out there, there have been attempts to establish standards for naming. In 1991 the Computer Antivirus Research Organization (CARO) came up with the first Virus Naming Convention. It looked like this: 

Family_Name.Group_Name.Major_Variant.Minor_Variant[[:Modifier] 

The malware landscape has changed considerably since then, as have the means of detection, rendering the 1991 convention obsolete. However, CARO meets annually and has continued to update what it today calls the CARO Malware Naming Scheme. Formally adopted by some organizations, including Microsoft, the format of the current scheme is: 

Type:Platform/Family.Variant!Suffixes 

In practice, a name following scheme looks like this

Email-Worm:Win32/Bagle.aav!dll 

In reality, however, every anti-virus (AV) vendor uses its own naming convention, although most are a variation of the CARO scheme. The result? Things are still messy. For example, names of the email worm Bagle (and its variants) that turn up in a web search include w32.Beagle.A@mm, I-Worm.Bagle.gen, Email-Worm.Ein32.Bagle.ge, and Worm:HTML/Bagle!mail. So much for standardization! 

It doesn’t help that antivirus (AV) terminology itself is very quirky and inconsistent. Most AV products defend against malware, and “malware” is much broader than “virus.” But in the mind of the public, the word “virus” has stuck and is often used interchangeably with malware. Similarly, “Trojan” is often used as a synonym for virus. But in fact, it is an attack vector.  

So, if malware names in the news amuse you, or leave you scratching your head, you’re not alone. Don’t dismay. The name makes some kind of sense, at least to the person who named it.  

Three myths surrounding cybersecurity

A common dysfunction in many companies is the disconnect between the CISO, who views cybersecurity as an everyday priority, versus top management who may see it as a priority only when an intrusion is detected. The seesaw goes something like this: If breaches have been few and far between then leaders tighten the reins on the cybersecurity budget until the CISO proves the need for further investment in controls. On the other hand, if threats have been documented frequently, leaders may reflexively decide to overspend on new technologies without understanding that there are other, nontechnical remedies to keep data and other corporate assets safe.

Does your organization suffer from any of these?

Myth: More spending equals more security

McKinsey says, “There is no direct correlation between spending on cybersecurity (as a proportion of total IT spending) and success of a company’s cybersecurity program.” Companies that spend heavily but are still lagging behind their peers may be protecting the wrong assets. Ad hoc approaches to funding (goes up when an intrusion is reported, goes down when all is quiet on the western front) will be ineffective in the long term.

Myth: All threats are external

Too often, the very people who are closest to the data or other corporate assets are the weak link in a company’s cybersecurity program. Bad habits — like sharing passwords or files over unprotected networks, clicking on malicious hyperlinks sent from unknown email addresses, etc. — open up corporate networks to attack. In this study by Intel Security, threats from inside the company account for about 43 percent of data breaches. Leaders must realize that they are actually the first line of defense against cyberthreats, which is never the sole responsibility of the IT department.

Myth: All assets are equally valuable

Are generic invoice numbers and policy documents that you generate in-house as valuable as balance sheets or budget projections? If not, then why deploy a one-size-fits-all cybersecurity strategy? Does leadership understand the return they are getting on their security investments and associated trade-offs? Leaders must inventory and prioritize assets and then determine the strength of cybersecurity protection required at each level. McKinsey cites the example of a global mining company that realized it was focusing a lot of resources on protecting production and exploration data, but had failed to separate proprietary information from that which could be reconstructed from public sources. After recognizing the flaw, the company reallocated its resources accordingly.

These three myths are common, but the list goes on…Now it’s time to decide what to do about it. Research is a great start, but time is of the essence. According to a 2017 Forbes survey, 69% of senior executives are already re-engineering their approach to cybersecurity. What’s your next step?

EventTracker reviews billions of logs daily to keep our customers safe. See what we caught recently and view our latest demo.

SIEM and Return on Security Investment (RoSI)

The traditional method for calculating standard Return on Investment (RoI) is that it equals the gain minus the cost, divided by the cost. The higher the resulting value, the greater the RoI. The difficulty in calculating a return on security investment (RoSI), however, is that security tends not to increase profits (gain), but to decrease loss – meaning that the amount of loss avoided rather than the amount of gain achieved is the important element.

Following the standard RoI approach, RoSI can be calculated by the sum of the loss reduction minus the cost of the solution, divided by the cost of the solution. In short, a high result is better for RoI, and a low result is better for RoSI.

This is where it gets difficult: how do you measure the ‘loss reduction’? To a large extent it is based on guesswork and surveys. Bruce Schneier in The Data Imperative concluded, “Depending on how you answer those two questions, and any answer is really just a guess — you can justify spending anywhere from $10 to $100,000 annually to mitigate that risk.”

What we find as a practical outcome of delivering our SIEM-as-a-service offering is that many customers value the anecdotes and statistics that are provided in the daily reports and monthly reviews to demonstrate RoSI to management. Things such as how many attacks were repulsed by the firewalls, how many incidents were addressed by criticality, anecdotal evidence of an attack disrupted or misconfiguration detected. We publish some of these anonymously as Catch of the Day.

It’s a practical way to demonstrate RoSI which is easier to understand and does not involve any guesses.

Improve Security with a Cyber Hygiene Routine

As advanced threats continue to morph and escalate, it’s easy to gravitate towards the latest tool or “shiny object” in the news. An estimated 80% of threats and vulnerabilities are more than twelve months old, highlighting the challenge of legacy infrastructure and products. Use good cyber hygiene to prevent or mitigate security problems with IT practices that maintain health and resiliency.

This article outlines the challenges of adopting cyber hygiene, security, the benefits of implementing these foundational practices, and how MSPs can recommend practical steps to cyber hygiene.

What is Cyber Hygiene

Like brushing teeth, cyber hygiene is part routine and part repetition. Protective routines reinforce procedures and user behavior that keep sensitive customer data safe. In the face of rapid change, cybersecurity fundamentals never go out of style.

Cyber Hygiene Obstacles Abound

It can be challenging to balance fighting new and emerging cyber threats while maintaining legacy systems and IT processes. Small-to-medium-sized businesses (SMBs) face the same threats as larger enterprises but with far fewer resources.

“Over the last 18 months, Netsurion’s EventTracker Security Operations Center (SOC) detected attackers performing reconnaissance to look for unpatched systems, unnecessary ports and protocols, and security gaps to exploit,” states Shavonn Mealing, vice president of channel at Netsurion. “Attack surface complexity has also grown, requiring protection across servers, datacenters, and cloud computing assets.”

The ongoing shortage of IT and cybersecurity experts means that small security gaps compound into far-reaching consequences.

Minimize Risk and Complexity with Cyber Hygiene

Poor IT practices increase exposure and cost. IT complexity can unfold over time, resulting in a lack of process understanding and system manageability.

Cyber Hygiene Tips

Enhance security operations efficiency with a balance of cyber hygiene technology and routines. For example, implementing good user password practices reduces authentication risks. MSSPs are well poised to advise SMBs regarding solutions and best practices like automation and repeatable outcomes.

Good Habits Safeguard Data and Users

There are several crucial steps to develop best practices and an operational routine for cyber hygiene:

Implementing robust cybersecurity procedures is vital to defend against modern threats. Cyber hygiene helps maintain a strong security posture and minimize vulnerabilities.

Enhance People Vigilance

Embrace foundational security that the Cybersecurity and Infrastructure Security Agenda (CISA) terms “being Cyber Smart” to make it easier to manage the inevitable attacks and third-party software gaps. Remember that people are often the weakest link in protecting organizations to become more proactive and overcome blind spots. According to a Stanford University study, human error causes 88% of all data incidents and breaches. Netsurion’s Mealing points out, “Process repetition and training reinforcement are just some ways to help bolster cyber hygiene with your employees and customers.”

How MSSPs Can Help

It’s easy for businesses and service providers to become distracted by the latest buzzword or point product. Help your customers be proactive and vigilant regarding cyber hygiene basics. As a trusted advisor, stay focused on baseline cybersecurity actions that remove the most significant risk at the least cost. Overcoming advanced threats requires more mature technology, skilled people, and comprehensive incident response than in years past. Netsurion’s Managed Threat Protection offering provides an integrated approach beyond standalone solutions. Learn more about the advantages of co-managed security at Netsurion.

Believe it or not, compliance saves you money

We all hear it over and over again: complying with data protection requirements is expensive. But did you know that the financial consequences of non-compliance can be far more expensive?
 
The Ponemon Institute once again looked at the costs that organizations have incurred, or are incurring, in meeting mandated requirements, such as the EU General Data Protection Regulation (GDPR), the Payment Card Industry Data Security Standard (PCI-DSS), and the Healthcare Information Portability and Accountability Act (HIPAA). The results were compared with the findings from a 2011 Ponemon survey on the same topic. The differences were stark and telling.
 
Average costs of compliance have increased 43%, up from around $3.5 million in 2011 to just under $5.5 million this year, while non-compliance costs surged from $9.4 million to $14.8 million during the same period. On average, organizations that are found non-compliant with data protection obligations these days can expect to fork out at least 2.71 times more money getting started and proving compliance than if they had been compliant in the first place.
 
For most enterprises, the cost associated with buying and deploying data security and incident response technologies account for a bulk of their compliance-related expenditure. On average, organizations in the Ponemon survey spent $2 million on security technologies to meet compliance objectives. The study found that businesses today are spending on average about 36% more on data security technologies and 64% more on incident response tools compared to 2011.
 
Financial companies tend to spend a lot more - $30.9 million annually - on compliance initiatives than entities in other sectors. Organizations in the industrial sector and energy/utilities sector also have relatively high compliance-related expenses of $29.4 million and $24.8 million respectively, on an annual basis.
 
So, what is the hardest regulation to satisfy? GDPR. 90% of the participants in the Ponemon studied pointed to GDPR as being the most difficult regulation to meet.
 
Need to get off to a fast start? Thinking NIST 800-171 or PCI-DSS? Our Managed SIEM service, powered by EventTracker technology, was designed to do just that. Check out all the compliance regulations we support.
 
It's a paradox, but the less you might spend, the more you might pay.

7 Steps to Better Website Security for National Cybersecurity Awareness Month

Threats and threat actors continue to evolve and morph, creating advanced and even more dangerous tactics to mitigate. October is National Cybersecurity Awareness Month (NCSAM). NSCAM 2019 centers on the theme of Own IT. Secure IT. Protect IT., advocating a proactive approach to enhanced cybersecurity in the workplace and at home.

Your online web presence is the crown jewel of your business or government organization. Your website conveys your brand to prospective customers and often facilitates e-commerce and citizen services. It is also a doorway into your business, servers, and valuable financial data, as well as links you to a global supply chain network. Good website security is vital for data protection and even disaster recovery and resiliency.

Inside threat

Facts to Know

Impacts and Motivations of Website Attacks Threats and attacks against your website or portal can lead to reduced revenue, dissatisfied visitors, compliance fines, and a lack of trust by valuable customers, e-commerce buyers, and business partners. Hackers have a wide range of motivations for website attacks:

Inside threat

Regardless of the hacker’s initial motivation, website threats are real and require a range of countermeasures to deter these attacks. Build cybersecurity into your site technology and staff practices from the start, don’t bolt it on after it’s too late.

Simple Website Protection Steps to Own IT. Secure IT. Protect IT.

Use authentication best practices. Eliminate credential compromise and account takeover by requiring strong passwords, implementing role-based access controls (RBAC), and eliminating logins immediately for departing employees and vendors. System admins with their privileged access to data centers and servers are especially targeted. Don’t make it easy for hackers to buy and sell your organization’s logins on criminal forums.

Disable unnecessary accounts and web plug-ins. You can’t manage and patch assets that are long forgotten and sitting unused. Hacker tactics, techniques, and procedures (TTPs) actively exploit legacy applications and systems with known security gaps that provide low hanging fruit to attack.

Implement regular vulnerability assessments. Avoid website attacks by identifying vulnerabilities, malware, and configuration gaps that leave you exposed. Think like a hacker with a systematic approach to vulnerability scanning and remediation.

Maintain good cyber hygiene. Don’t forget cybersecurity basics that are low hanging fruit for attackers: use network segmentation to partition your network to limit the “blast radius” and ease restoration after a cyber attack. Avoid vendor default settings that represent the first path that threat actors will attempt. Rapidly apply security patches when they are released, especially for website software and tools.

Automate data backups. Ensure regular data backups and store them separately from your operating network and servers. A robust backup strategy is crucial for data security as well as disaster recovery and continuity requirements for frameworks such as PCI DSS (Payment Card Industry Data Security Standards). Organizations with current backups who were impacted by malicious ransomware have been able to recover and return to operations with minimal impacts.

Add advanced endpoint protection.  Always-on tablets, laptops, and mobile devices make soft targets for attackers. It only takes a single user or misconfigured device for attackers to gain malicious access. Managed services such as EventTracker SIEM with Endpoint Detection and Response (EDR)  fortify your security and reduce attack surface that can make your organization and sensitive data vulnerable.

Enable visibility with full logging and monitoring. Today’s threat landscape demands more than a “set it and forget it” approach. Continuous monitoring 24/7 by cybersecurity experts provides early detection of targeted attacks as well as insider threats.

Our Approach

We understand that your website is crucial, representing your brand, building community trust, facilitating citizen services, and generating online revenue. Hackers are actively targeting websites with advanced tools that require advanced security to remain protected. A proactive approach to website security ensures compliance with regulatory mandates such as HIPAA (Health Insurance Portability and Accountability Act) and Protected Health Information (PHI). SOC-as-a-Service (SOCaaS) provides 24/7 visibility from security experts with an award-winning Security Information and Event Management (SIEM) that strengthens your website defenses, controls costs, and optimizes your existing IT and Security teams.

Conclusion

Constant internet connectivity provides opportunity for innovation and modernization, but also presents an opportunity for potential cybersecurity threats that can compromise your most valuable asset: customer and financial information. Your website is vital for brand visibility and to conduct business. It is crucial to maintain site security and access to the rest of your organization’s data and valuable assets. While there is no silver bullet, we covered some practical countermeasures to help you Own IT. Secure IT. Protect IT. and reduce the likelihood of website attack. 

10 Free and Open Source Cybersecurity Tools to Know

Open source software is an attractive option for many IT leaders and teams, especially at small and mid-sized organizations. Instead of paying large licensing fees to an enterprise software vendor, your team can customize the source code of free open source platforms and security tools. 

The overall market for open source software services market was worth $30 billion in 2023 and is estimated to hit nearly $120 billion by 2032. That translates to an annual compound growth rate of 16%: 

Source: Global Market Insights

Cybersecurity tools corner a large market share of open source software. There are plenty of free open source cybersecurity tools that meet requirements for enterprise-grade security software. 

Many of these free open source security tools do not offer the same capabilities as the paid enterprise alternative. Some cybersecurity professionals use open source solutions to test a wide range of options before deciding on the full enterprise security tool they want to integrate. 

However, since you can modify the code base of open source security solutions, they may offer greater flexibility than some commercial tools. In this case, it's up to your security team to customize that tool to meet the needs of your unique security posture.  

Small and mid-size enterprises often use a combination of free and paid open source tools to improve their organization's cybersecurity in a cost-effective way. Customizing open source solutions to protect digital assets and networks reduces the need to pay licensing fees, but you'll still pay for the infrastructure they use to host and manage those tools. 

10 open source cybersecurity tools you should know 

1. Kali Linux

Kali Linux is an open source Debian-based Linux distribution offering a variety of free software, cyber security utilities and penetration testing tools. It is one of the main open source penetration testing tools that new ethical hackers use to hone their craft. 

It is one of the few hacking-focused Linux distributions that comes pre-packaged with tools for reconnaissance and delivering payloads, as well as several other penetration-testing utilities. Use Kali Linux to test cybersecurity postures, discover security vulnerabilities, and conduct ethical hacking operations. 

Kali uses WSL (Windows Subsystem for Linux), which allows users to run Linux executable files directly from a Windows 10 system. The Kali OS supports embedded devices such as Raspberry Pi, Beaglebone, Odroid, HP & Samsung Chromebook as well as popular mobile device operating systems like Android OS. 

2. KeePass

KeePass is a free and open source password manager that securely stores passwords. This security tools enables users to have a single place for their unique passwords for websites, email accounts, webservers or network login credentials. 

KeePass works by storing passwords in a secure database, which unlock by entering a single master key. Database encryption is using the most secure encryption algorithms available: AES-256, ChaCha20 and Twofish. It encrypts the complete database, which means user names, notes, and more are encrypted along with the password fields. 

Like many open source access management and network security tools, KeePass comes under a freemium model. You can download and use the basic version of the tool for free, but you'll need to pay for the commercial version if you want an advanced range of features like a one-time password generator or built-in browser extension. 

3. Metasploit Framework

Metasploit is an exploitation and vulnerability validation tool that you can use offensively to test your systems for known and open vulnerabilities. As one of the most popular open source vulnerability scanners available, independent security professionals often use it for security auditing and network security assessments. 

This security tool helps you divide the penetration testing workflow into manageable sections. You can also use it to set up your own workflows. Since it is owned by Rapid7, some of its more valuable security workflows are only available through the commercial solution. 

Metasploit enables security teams to conduct a wide range of techniques for auditing and network port scanning, which scans about 250 ports usually exposed to external services. An auto-exploitation feature works by cross-referencing open services, vulnerability references and fingerprints to find corresponding exploits. It supports a variety of platforms but is particularly well-suited to testing web server components in mid-sized Linux environments. 

4. Nikto

Nikto is a free and open source web server scanner, which scans web servers for multiple vulnerabilities. The testing covers thousands of potential vulnerabilities and harmful files, and additionally conducts patch management for more than a thousand web server systems. The web server scanner finds version-specific problems on hundreds of different servers. 

Users can also perform checks for server configuration issues such as the presence of multiple index files and HTTP server options. This open source security tool identifies installed web servers and software as well. 

Nikto uses a command-line interface, which makes it well-suited for technically competent security consultants and auditors. However, the project is not a large, well-funded institution, and the package of exploit rules you need to use Nikto effectively is not free. This extra hidden cost can make it less attractive to cybersecurity experts who expect a fully open source vulnerability scanning solution  

5. Nmap

Nmap—also called Network Mapper—is used for penetration testing and security auditing. It uses NSE scripts to detect vulnerabilities, misconfigurations and security issues concerning network services. 

Nmap discovers network and ports before a security audit starts and then uses the scripts to detect any recognizable security problems. The app fetches raw data and then determines a host type, type of operating system (OS) and all the hosts available within the network. 

Network administrators can use Nmap also for performing tasks around network inventory, service upgrade schedules and monitoring uptime. It is commonly included in educational courses that focus on cybersecurity technical skills, so many cybersecurity teams are already familiar with it.   

The open source security tool runs on Linux, Windows and Mac OS X. While it does have a graphical user interface, most security professionals and penetration testers prefer the command-line tool. It is designed specifically for scanning large networks but can be used to scan single hosts. 

6. OpenVAS

OpenVAS is an open source and full-fledged vulnerability scanner, free for use. Users can perform unauthenticated testing and authenticated testing for various high level and low-level Internet and industrial protocols. 

This tool also enables performance tweaking for large-scale scans. Users can perform any type of vulnerability test by taking advantage of its internal programming language. 

OpenVAS provides comprehensive vulnerability scanning capabilities for a free solution, and it is supported by an active online community. However, it can be overwhelming for inexperienced users and its interface is not the most modern. 

7. OSSEC

OSSEC is an open source, scalable and multi-platform Host-based Intrusion Detection System (HIDS) that allows organizations to detect malicious activities and analyze security incidents effectively. 

Use OSSEC on-premises and in the cloud for the purpose of server protection or as a log analysis tool that monitors and analyzes firewalls, IDSs, web servers and authentication logs. 

OSSEC can withstand cyberattacks and system changes in real-time utilizing firewall policies, integration with third parties such as CDNs and support portals. The application features self-healing capabilities and provides application and system-level auditing for compliance with many common standards such as PCI-DSS and CIS. 

OSSEC can be combined with other open source tools to create a functioning Security Information and Event Management (SIEM) solution. Although the process is complex, you can equip it with customized threat detection rules and even add machine learning support for basic behavioral analytics. 

8. Security Onion

Security Onion is a Debian-based Linux distribution for detecting threats, enterprise security monitoring and log management. True to its name, it incorporates multiple layers of security tools such as Elasticsearch, Logstash, Kibana, Snort, Suricata, Zeek, OSSEC, Wazuh, Sguil, Squert, NetworkMiner and others to protect an organization against cyber threats. 

It is an all-in-one open source security solution that provides users with various tools to detect threats and monitor their systems, but it relies on a wide variety of third-party open source tools. This adds to the complexity of running operational security systems with Security Onion, since you'll need a technically competent team capable of handling potential security issues across the entire tech stack. 

9. VeraCrypt

VeraCrypt is a security tool for disk encryption. It runs on Windows, Mac OSX and Linux and creates a virtual encrypted disk within a file before mounting it as a real disk. 

This tool encrypts an entire partition or storage device such as a USB flash drive or hard drive before dumping it the cloud or elsewhere. Users can also pre-boot authentication by encrypting a partition or drive where the Windows OS is installed. 

VeraCrypt encrypts in real-time and supports hidden drives and hidden operating systems on a machine. However, misconfigurations can cause critical file failures and other undesired results. Since VeraCrypt doesn't perform file-by-file encryption, making a change to a single file in a partition will invalidate the entire disk image. Synchronizing encrypted backups with VeraCrypt can be a time-consuming process. 

10. Wireshark

Wireshark is a free and open source tool for network protocol analysis. This cybersecurity tool enables security professionals to observe network traffic at a deep level. It shows each element of individual data packets, allowing analysts to identify the packet format and troubleshoot network issues with great accuracy. 

It is available for multiple platforms including Windows, Linux, and macOS. It supports deep inspection of hundreds of protocols, live capture, and offline analysis of network data. Advanced users can decrypt multiple protocols including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2. 

Since Wireshark is designed for manually investigating individual network connections and assets, it does not offer the level of visibility of a full-featured Network Detection and Response (NDR). It is more of a tool for observing specific instances of network traffic in response to potential threats or other issues. 

Lumifi Secures Top Honors as Most Innovative MDR Provider in Global Infosec Awards 2024

Mitigating Risk: Understanding Vulnerabilities in the Ivanti Product Suite

In recent months, the Ivanti product suite has encountered several high-profile vulnerabilities, raising concerns within the cybersecurity community. Since the start of the calendar year, four critical vulnerabilities have been associated with Ivanti Connect Secure, Policy Secure, and Neurons. While the vendor has diligently addressed each vulnerability and deployed mitigations, the recurrence of vulnerabilities within a short timeframe underscores the importance of maintaining vigilance when managing Ivanti products.

Overview of Vulnerabilities

These vulnerabilities, when exploited together, create a high impact attack chain. For instance, CVE-2024-21893 has been observed being leveraged alongside CVE-2024-21887, resulting in remote code execution. The unauthenticated SSRF vulnerability within CVE-2024-21893 can be used to perform an arbitrary HTTP GET request, which can then be modified to exploit the command injection vulnerability within the '/api/v1/license/keys-status' endpoint, potentially leading to the establishment of a reverse shell with an attacker's machine.

Additionally, CVE-2023-46805, an authentication bypass vulnerability, can be exploited via a path traversal vulnerability found in the "/api/v1/totp/user-backup-code" endpoint. Due to the lack of authentication on this endpoint, adversaries can access public-facing endpoints. This vulnerability has also been observed being exploited in conjunction with CVE-2024-21887, facilitating remote code execution.

Customer Call to Action

  1. Upgrade to Secure Versions: Ensure that all known instances of Ivanti Connect Secure and Ivanti Policy Secure are updated to Ivanti Connect Secure version 22.5R2.2 and Ivanti Policy Secure version 22.5R1.1, respectively, to mitigate these vulnerabilities.
  2. Legacy Instance Investigation: Identify any legacy instances of Ivanti Connect Secure or Policy Secure and engage with the Lumifi SOC for additional investigation to prevent exploitation.

Lumifi's Response

  1. Proactive Detection: Following the disclosure of the proof-of-concept by Rapid7 on January 31st, Lumifi engineered a detection mechanism to identify potential exploitation attempts.
    Continuous Threat Research: The Lumifi SOC conducts ongoing threat research to ensure that any updates regarding new indicators of compromise (IoCs) are reflected within their threat hunts in customer environments.
  2. In conclusion, the recent vulnerabilities affecting the Ivanti product suite highlight the critical need for proactive security measures and prompt updates. By remaining vigilant and implementing recommended actions, organizations can mitigate risks and protect their environments against potential exploits. If you have any concerns or require assistance, please reach out to Lumifi for support.

Why Risk Classification is Important

Traditional threat models posit that it is necessary to protect against all attacks. While this may be true for a critical national defense network, it is unlikely to be true for the typical commercial enterprise. In fact many technically possible attacks are economically infeasible and thus not attempted by typical attackers.

This can be inferred by noting that most users ignore security precautions and yet escape regular harm. Most assets escape exploitation because they are not targeted, not because they are impregnable.

As Cormac Herley points out “a more realistic view is that we start with some variant of the traditional threat model, e.g., it is necessary and sufficient to defend against all attacks” but then modify it in some way, e.g., defense effort should be appropriate to the assets.” However, while the first statement is absolute, and has a clear call-to-action, the qualifier is vague and imprecise. Of course we can’t defend against everything, but on what basis should we decide what to neglect?”

One way around this is by risk classification. The more you have to lose, the harder you must make it for the attacker. If you can make the value of the attack to be less than the monetization value then a financially motivated attacker will move on as its not worth it.

Want to present a hard target to attackers at an efficient price? Consider our Co-managed SIEM service. You can get 80% of the value of a SIEM for 20% of the do-it-yourself price.

What Does It Cost to Build a Security Operations Center (SOC)?

Your organization needs dedicated space and infrastructure for conducting security operations.

 

Introduction to Security Operations Centers (SOCs) 

Your SOC is where most of your organization’s security processes take place. Those processes require specialized equipment and expertise. Consolidating that footprint into a single place makes economic sense and drives security performance. 

That doesn’t mean every organization has to fill a windowless room with floor-to-ceiling flatscreen monitors and hire dozens of analysts. A small business SOC might be able to run  with no more than two or three humans, though burnout becomes real as does single points of failure.. 

Achieving 24/7 alarm monitoring and coverage does require a significant investment in equipment, personnel, training, and maintenance. An effective SOC is more than the physical location where the security team works — it’s also the software and tech stack that team uses to detect and respond to security threats. 

Taken altogether, they allow the security team to proactively address security threats and mitigate risks in real-time. Some of the activities that take place there include: 

To achieve these goals, the organization must equip its SOC appropriately. Read on to find out how your organization can achieve that and what it might cost, depending on your security needs. 

Components of a SOC 

The Security Operations Center has three main components — people, process, and technology. The unit can only function when each of these three components works effectively in tandem. 

Security leaders spend a great deal of time optimizing each of these three components and making sure they work together flawlessly. The SOC cannot function without all three components working together. 

Component 1: People 

The first and most important SOC component is its people. It’s also the one that is disrupted most frequently. There are currently 4 million unfilled roles in the cybersecurity industry, which means almost all SOCs work in a resource-strained environment.  

The typical SOC has four roles: 

Component 2: Process 

Processes are formalized policies that inform security operations. Without comprehensive written policies, SOC team members would be unable to communicate or collaborate effectively. 

Successful SOCs have exhaustive sets of policies for addressing a wide range of security threats, technological issues, and more. Many establish policies according to an industry-wide cybersecurity framework like NIST or SANS. Most change and test policies frequently. 

A few examples of formal processes you may include in your SOC include: 

Component 3: Technology 

Your security tech stack determines the capabilities that your team has when detecting and responding to threats. Thousands of different security technologies exist, and every security leader equips the SOC according to its unique needs. 

Many security architects build their organization’s capabilities around the SOC Visibility Triad: 

Factors that influence the cost of building a SOC 

Building an effective SOC means accurately identifying the size, scope, and scale of your organization’s security needs. A small business requires a completely different approach than a multinational enterprise or a government organization. 

The SOC model you choose will deeply impact the cost of building and maintaining it. Most security architects follow one of the six core SOC models: 

Cost breakdown: Personnel and equipment 

Here are the costs you can expect to pay to build an SOC in 2024. These figures assume 24/7 security monitoring and alert coverage for a network supporting 5000 users, with a one-time implementation cost. 

Personnel 

Equipment 

Considerations for budgeting and planning 

Personnel and equipment are not the only costs associated with building an SOC. You will also have to invest in training, maintenance, and additional support for security operations. This is especially true if your organization is large, complex, or operating in a regulated industry. 

Also, you should consider the impact of skills scarcity on your in-house security staff over time. Cybersecurity professionals know that their skills are in high demand, and will ask for better compensation at every opportunity. If you delay raises too long, you may find yourself understaffed when competing organizations offer them a better deal. 

Outsourcing vs. in-house SOC — pros and cons 

Choosing to build an in-house SOC comes with challenges, but many security leaders feel it is the best way to ensure top security performance. Here are some of the pros and cons associated with building and staffing your own dedicated SOC: 

Outsourced SOC 

Pros:

Cons 

In-house SOC 

Pros:

Cons:

Cost-effective solutions for building and maintaining your SOC 

The cost and complexity of building a fully in-house dedicated SOC makes it infeasible for all but the largest organizations. Given that an industry-wide cybersecurity talent shortage exists, small businesses and enterprises will have to outsource some of their security capabilities to managed service providers. 

For many security leaders, the key question is deciding how to split their security program between internal and external solutions. Working with reputable security vendors on value-generating initiatives can make the difference between building a successful SOC or wasting huge amounts of time and resources on implementation projects that don’t succeed. 

Your organization may benefit from freeing its internal security team to focus on high-impact strategic initiatives like crafting new policies and improving processes. Bringing in a reputable managed detection and response vendor like Lumifi to mitigate attack risks allows you to make the most of your SOC while leveraging world-class expertise and technology in a sustainable, scalable way. 

 

Lumifi Offers Free Cybersecurity Assessments in Wake of Multibillion-Dollar Cyberattack

Exabeam Americas Technical Person of the Year | Grant Leonard | Lumifi

The Future of AI in Cybersecurity: How to Plan Ahead for AI Disruption

Find out how AI is likely to impact the cybersecurity industry in the next decade. 

Artificial intelligence has been an integral part of the cybersecurity industry for several years now. However, the widespread public adoption of Large Language Models (LLMs) that took place in 2023 has brought new and unexpected changes to the security landscape. 

LLMs like OpenAI’s ChatGPT, Google’s Bard, and others have opened new capabilities — and new threats — across the global economy. Security leaders in every sector and industry will need to change their approach to accommodate this development. 

It’s almost certain that new AI-powered tools will increase the volume and impact of cyberattacks over the next few years. However, they will also enhance the capabilities of cybersecurity leaders and product experts. Lumifi’s Research and Development uses the latest AI tools to refine our MDR capabilities every day. 

These developments will likely occur at an uneven pace, typical of a global arms race. Cybercriminals may gain a temporary advantage at some point, only to be subdued by new cybersecurity deployments, and then the cycle will repeat. 

This volatile environment should inspire cybersecurity professionals to increase their AI proficiency. Individuals with broad experience, product expertise, and a successful track record will be highly sought after in the industry. 

What exactly do LLMs do? Cybersecurity use cases explained 

LLMs enable anyone to process large amounts of information, democratizing the ability to leverage AI. This offers significant advantages to people and organizations who want to improve the efficiency, intelligence, and scalability of data-centric workflows. 

When the cybersecurity industry was dominated by hardware products, security leaders only changed products when the next version of their preferred hardware was available. Now, AI-powered software can update itself according to each individual use case, requiring security teams to continuously evaluate LLM systems for safety and compliance. 

Let’s look more closely at each use case and how it’s likely to evolve as AI technology advances. 

How new AI technologies will enhance cybersecurity workflows 

There are two major advantages to leveraging LLM capabilities in cybersecurity.   

These two benefits will certainly improve over time and lead to new AI capabilities for security teams. SOC analysts may soon be able to read thousands of incident response playbooks at once and identify security gaps and inconsistencies in near real-time.  

This will require the creation of a domain-specific cybersecurity LLM capable of contextualizing incident response playbooks at the organizational level. AI-powered SIEM platforms like Exabeam already provide in-depth behavioral analytics for users and assets, and in time we’ll see similar capabilities expanding into threat response and recovery workflows as well. 

Threat actors will leverage AI to break down operational barriers 

LLMs are invaluable for threat actors, especially when it comes to gaining initial access to their victims’ assets. By practically eliminating language, cultural, and technical communication barriers between people communicating, they’ve made it much harder for people to reliably flag suspicious content. 

Cybercriminals are already using AI to enhance and automate operations in four key areas: 

According to one report, phishing attacks have surged more than 1200% since ChatGPT was first released in November 2022. Credential phishing attacks have risen by an astonishing 967% in the same time frame. 

Adjusting to a security landscape dominated by AI means understanding its limitations 

It’s no secret that influential tech leaders and investors are pouring significant resources into AI. Some thought leaders warn that the emerging technology will change every aspect of our lives — going so far as to say we’re charging headfirst into an AI apocalypse fueled by the development of Artificial General Intelligence (AGI). 

While the technology is new, exaggerating the danger of disruptive technology is a familiar cycle. Plato was famously skeptical of writing, and 16th century Europeans destroyed printing presses out of fear. It’s normal to be anxious about new technology. 

 Like writing, printing, and every other technology before it, artificial intelligence has limitations. Security leaders who understand those limitations will be able to navigate the challenges of a society increasingly reliant on AI-powered technologies.  

Many tech leaders think this is an engineering problem and believe that eventually LLMs will contextualize information with human-like accuracy. 

This may not be true. We still don’t know how the human brain contextualizes information and articulates it into language. Contextualizing insight by combining data with real-world experience remains a task best-suited to human experts. 

1. AI-powered workflows are resource-intensive 

According to the International Energy Agency, training a single AI model uses more electricity than 100 US homes consume in a year. A typical ChatGPT query consumes 2.9 watt-hours of electricity — about the same amount of energy stored in a typical AA battery. 

By comparison, the human brain consumes about 300 watt-hours of energy per day. Yet it accomplishes significantly more during this time than even the most efficient LLMs. 

This suggests that there’s more to improving neural network performance than simply adding more nodes and introducing more parameters. It also places an upper limit on the feasibility of increasingly energy-intensive AI processes. At some point, the costs will outweigh the benefits. 

2. I models have difficulty contradicting consensus 

AI training models operate on consensus. If a significant majority of parameters suggest that a certain LLM response is likely to be correct, the LLM will confidently declare the corresponding answer. If the training set data is not accurate, the answer won’t be either. 

When it comes to pure facts, overcoming this limitation may be technically feasible. But when it comes to opinions, values, and judgements, AI-powered tools are not equipped to offer anything but the most basic responses. 

This means that even highly advanced future AI tools may not be able to make convincing arguments against popular consensus. It’s easy to see how this can lead to severe security consequences, especially in cases where popular wisdom turns out to be wrong. 

3. You can’t credit (or blame) AI models for the decisions they make 

AI ethics remains a challenging issue for technology experts, cognitive scientists, and philosophers alike. This problem is deeply connected to our lack of understanding of human consciousness and agency. 

Currently, there is no real consensus about the moral status of artificially intelligent algorithms. This makes it impossible to attribute moral decisions to AI-powered tools or claim they know the difference between “right” and “wrong”. 

We can’t treat AI algorithms as moral agents without also attributing some form of “personhood” to them. Most people strongly doubt that LLMs like ChatGPT are “people” in that sense, which means someone else must take responsibility for the decisions that AI algorithms make — including their mistakes. 

Where will AI take the cybersecurity industry? 

Security leaders are beginning to distinguish between generative AI and predictive AI. While people are understandably excited about generative AI, the true information security workhorse is predictive AI, which is a must-have technology in today’s security operations center environment. 

As the stakes of AI-powered cybercrime get higher, leaders will become increasingly risk averse. Few executives or stakeholders will be willing to risk their livelihoods on unproven security solutions and vendors. 

In this scenario, security leaders who entrust their detection and response workflows to reputable product experts with proven track records will be rewarded. If your detection and response provider doesn’t leverage proven AI expertise in its blue team operations, it will eventually fall behind. 

Positive security incident outcomes may become difficult to achieve, but guaranteeing them will be crucial. Learn more about how Lumifi achieves this critical goal by combining AI-enriched data with human expertise and best-in-class automation. Secure your spot for our webinar, Unveiling ShieldVision's Future & New Series of Enhancements, taking place on February 14th to learn more.  

Lumifi is a managed detection and response vendor with years of experience driving consistent results with the world’s most sophisticated AI technologies. Find out how we combine AI-enhanced automation with human expertise through our ShieldVision™ SOC automation service. 

  

Understanding MDR, EDR, EPP, and XDR

The cybersecurity industry is notorious for coining terms and acronyms that rise and fall out of favor before they even have a chance to be fully understood. We get it – rapid innovation can be messy and lead to confusion and clutter. While it’s exciting and encouraging to see so many solution providers invent new solutions and improve upon others, resulting in new concepts, sometimes all of this terminology is honestly just an effort to stand out from the crowd. As a result, business and IT leaders are left wondering what cybersecurity solutions they truly need, which ones are redundant, and which ones are complementary.

So, this is Lumifi’s effort to clear the air, to help you separate fact from fiction, and ultimately make the best choice in cybersecurity solutions for your organization.

MDR

This has been a hot term in recent years. Managed Detection and Response (MDR) is actually missing a word. That assumed word is “threat”, as in managed threat detection and response. Some argue that the missing word is “endpoint”, but then again, that gets into EDR, which yes, could be delivered as a managed service…but we’ll get into that later.

What exactly constitutes MDR? MDR isn’t a technology – it’s a service. What makes MDR unique is its focus on leveraging technology and expertise to continuously monitor IT assets, to quickly detect and effectively respond to true cybersecurity threats.

The technology behind an MDR service can include an array of options, and this is an important thing to understand when evaluating MDR providers. The technology stack behind the service determines the scope of attacks accessible to detect. Cybersecurity is about “defense-in-depth” – having multiple layers of protection to counter the multiple attack vectors possible. Various technologies are used to provide more complete visibility and thus more complete detection and response capabilities. To name a few, some of the technologies behind an MDR service include:

EDR

If MDR is about managed threat detection and response, what is EDR? EDR stands for endpoint detection and response. Again, that word “threat” is missing as the name of the game isn’t detecting that endpoints exist. Sometimes referred to, less commonly but more correctly, as ETDR, the difference between MDR and EDR is scope. EDR is focused on threat detection and response on the endpoint environment specifically. This means that EDR is focused on activity on the device as opposed to on the network – think laptops, servers, and critical business devices like POS systems.

To better understand what EDR is and is not, you first have to realize that “detection and response” are only two elements of the Predict, Prevent, Detect, and Respond cybersecurity framework. For full disclosure, in true cybersecurity fashion of having competing and overlapping terminology, this is very similar to the NIST Cybersecurity Framework’s five functions of: identify, protect, detect, respond, recover. But stay with me, let’s understand this in light of the Predict, Prevent, Detect, and Respond framework.

EDR deals with threats that have gotten past the Predict and Prevent functions. Very important – yes, but not a complete endpoint protection platform. Which brings us to our next term – EPP.

EPP

EPP stands for endpoint protection platform. Don’t worry about the introduction of the term “platform” at this point, as that can start a whole other nerd fight here. Rather, focus on the term “protection”. While EDR focuses on detecting and responding to endpoint threats, EPP is more complete in that it covers the four cybersecurity functions of Predict, Prevent, Detect, and Respond while still being solely focused on the endpoint environment. As such, EPP solutions to various degrees may encompass EDR. But the devil is in the details. What’s important to note is since no EPP is 100% effective, you must ask what detection and response you have in place for attacks that evade the prevention controls.

Speaking of prevention, EPP is more commonly replacing the basic prevention solutions like anti-virus and anti-malware that are only effective to various degrees against known threats. More advanced EPP solutions leverage Artificial Intelligence (AI) to increase the ability to thwart unknown or zero-day attacks, or even fileless attacks that don’t leave signature-based footprints.

In short:

MDR is a managed cybersecurity service backed by various technologies to provide a range of threat detection and response capabilities to mitigate damage caused by cyber attacks that evade prevention controls. The layers of technology employed, and vigilance and expertise of the staff determine how truly effective an MDR provider can be.

EDR is similar in purpose but focused on endpoint environments only. EDR solutions may be technology-only or a managed service – as in Managed EDR. I apologize now for adding that term to the mix.

EPP is a more comprehensive protection covering the lifecycle of a threat, from prediction and prevention to detection and response. However, how effective it is on each of those four functions varies from vendor to vendor.

XDR

No, we’re not gaslighting you. We have another detection and response term. The “X” in XDR conveys the concept of threat detection and response across multiple security controls – considering both endpoint and network activity. Yes, endpoint and network threat detection and response is a natural evolution, or perhaps convergence, of several solutions, primarily SIEM and EPP. You may begin to see more buzz around XDR, but in reality, it’s a useful term to denote that a solution is capable of aggregating and correlating telemetry from many security controls to more holistically defend the IT infrastructure. Just remember that this term alone does not encapsulate which specific controls are included. Nor does it imply that the solution is managed by a Security Operations Center (SOC) team.

MSSP

But that’s not all. What’s an MSSP? A Managed Security Service Provider is broader in nature and refers to an organization (people + technology), not a single service. While MDR is a service many MSSPs deploy, which focuses on active threat detection and response, an MSSP is also concerned with centralized log management for compliance reporting and investigative reports. An MSSP should also have a robust, fully-staffed SOC equipped with technology – typically a SIEM-based platform – and a range of cybersecurity experts including security platform administrators, security analysts, malware analysts, a threat intelligence lab, and incident response analysts. Generally speaking, an MSSP has the wherewithal to bring MDR, EDR, and EPP functionality to bear in a complete package. This may be most ideal for resource-strapped IT teams that must focus on more than just cybersecurity and want the confidence of knowing a team of experts with the right tools are watching their back.

Is your business at risk of a data breach?

Highlights from the 2016 Verizon Breach Investigations Report (Part 1 of 3)

The 80 page 2016 Verizon Breach Investigation Report is packed with valuable insights that every business owner should be aware of to be inform about the dangers & effects of a data breach and prevent it too.

We know time is valuable so we decided to save you some time and point out to you the 3 main topics you should understand from this report:

This week, let’s focus on who is at risk.

Unfortunately, there is no region, industry or organization that is risk-free from hackers. Every business possesses valuable information that attracts hackers.

However, some industries get impacted more than others.

As per the report’s definition, an incident is a security event that compromises the confidentiality, integrity, or availability (CIA) of an information asset. A breach is the confirmed disclosure, not just the potential exposure of data to an unauthorized party.

The financial services industry took the lead with 795 breaches in 2015.

This should not be a surprise, as the information that financial firms and banks hold is vital. Hackers entering the network of any of these businesses in the financial industry will have access to customers’ account numbers, social security numbers, date of birth, addresses, and it goes on. This is all a hacker needs to steal a person’s identity and sell it.

"The financial sector ranks behind healthcare and pharmaceuticals in per capita data breach cost at $259 per record lost. In 2015 alone, over 169 million records were exposed."

The accommodation (lodging) industry was greatly impacted last year and stands in second place with 282 breaches.

Trump’s hotels and Rosen Hotels & Resorts were just a couple of the hotels that made the headlines. In these particular breaches, their payment card network was the one infected.

This mean that names, payment card numbers, expiration dates and CVV codes for cards used at these hotels were collected by hackers - different data than obtained from financial businesses, but vital nonetheless.

The fact that the payment card network was hacked shows that it can happen to just about any business who takes credit cards, not just hotels.

Rounding out the top 5 industries breached in 2015 is finance (795), accommodation (282), information (195), public (193) and Retail (137).

Whether your business’ industry made the top 5 or not, it doesn’t mean you are off the hook. Regardless of size, industry or location, any business that holds customers’ data in their network, processes payment data or offers free Wi-Fi to guests, is an attractive target to hackers. Does your business fall into one of these 3 categories?

Welcome to the New Security World of SMB Partners

Yet another recent report confirms the obvious, that SMBs in general do not take security seriously enough. The truth is a bit more nuanced than that, of course—SMB execs generally take security very seriously, but they don’t have the dollars to do enough about it—although it amounts to the same thing.

This year, though, SMBs are going to have to look at security differently. Why? That is because enterprise execs are repeatedly seeing their own networks hurt because of less-than-terrific security from SMB partners that do distribution, providing supplies or handling anything from backup to bookkeeping. Faced with their own security mandates—whether from PCI, HIPAA, European Union or any other external body—they are going to crack down on SMB partners.

Hence, unless you want those enterprise-level contracts to take a walk, your security return-on-investment (ROI) calculation just got a lot messier.

What new actions can SMBs expect from their enterprise-level partners in 2016? Until now, most have satisfied their obligations and kept their corporate counsels at bay through contractual agreements. In short, they put in their partner contracts that the partner is obligated to comply with a laundry list of security measures. Write it down, make SMB partners sign it and they’re all done.

The problem with enterprises going solely with the contractual obligation route is that the proverbial stick (as in carrot and stick) is limited to reactive situations. If something bad happens with the enterprise operation’s security and a forensic investigation eventually points the finger at the SMB partner and that probe specifically concludes that the SMB had violated the contract’s obligations, that SMB partner doesn’t merely lose the contract. They will also certainly be sued for the resultant damages, which could easily bankrupt some SMBs. That’s sufficient incentive/deterrent, right?

Not anymore. From the enterprise’s perspective, that stick only kicks in after a breach and only if enough evidence exists to tie it back to the SMB partner. Given the ever-increasing talent of many cyberthieves to hide and delete their trails, it’s a gamble that many cash-strapped SMBs are willing to take. What are the odds of both of those things happening, those SMB execs think, given the vast security arsenal deployed by their multi-billion-dollar enterprise partner?

Therefore, to up the real—as opposed to merely pledged—compliance with its SMB-partner security rules, enterprises are going to start surprise snap inspections and demanding access to sensitive IT systems. Some might even go so far as to try and entrap partners by creating fake sub-suppliers to respond to the SMB partner’s RFPs and see if they follow the rules and demand what they are supposed to demand.

Why would enterprises go through this effort, seemingly to hurt partners? Because that’s what will be required. If XYZ enterprise doesn’t loudly and publicly expose and punish a couple of SMB partners, a sufficient deterrence won’t exist.

The whole point here is to change that SMB exec’s ROI calculation. By increasing the number of ways an SMB partner’s lack of security compliance can be caught/detected, they want that ROI to force those partners to invest the security dollars. The rationale is essentially: “If you won’t invest in security because you need to for your own company’s protection, or because you have signed a contract that you will, then do so because we need to make an example of somebody and you don’t want that to be you.”

Next Step: how to deliver the most cost-effective security. Once you have conceded to the new ROI calculations and have decided that you must increase your security budget, the natural inclination—especially in an SMB environment—is to calculate the absolute minimum dollars to comply.

This is also known as checklist security, which is frowned upon. That said, it’s a step-up from rolling the dice that you won’t get caught. Here’s a trick: Guarantee your safety by having your people work with the enterprise partner’s IT security people on what your options are.

You may be surprised at how reasonable they can be. The best part is that by doing so—in e-mail as much as possible, to create a powerful paper trail—you are protected. Despite the bogus reputation of enterprise IT that they don’t sweat pricing details, they do. No one is better at squeezing a contractor nickel than a Fortune 500 IT security manager.

Not only will they steer you to the most cost-effective options, but they might even make a referral for you, so that you can benefit from a small taste of your partner’s volume-purchasing pricing. They might even help you out by participating directly in those vendor calls. After all, you are a partner.

And because you are working with them—and don’t forget that paper trail—you can’t be blamed for choosing whoever the enterprise IT people suggested.

OK, in reality, you can be blamed for anything.

Five Steps to Protect Retailers from Credit Card Theft

The Georgia based fast food company, Chick-fil-A, has confirmed that it is investigating a potential credit card breach.

The investigation is focused on the company’s point-of-sale (POS) network at some of its restaurants and the breach is thought to have occurred between December of 2013 and September of 2014.

Brian Krebs, an Internet blogger who specializes in banking security, reported that one financial institution claims that the common thread among approximately 9,000 of its affected customers are purchases at Chick-fil-A restaurants.

It is important to stress that security breaches of this nature can be caused by a variety of issues – newly discovered software flaws, lax security from a service provider, insider fraud, weak network security and countless other avenues.

There is also the possibility that the data which has been compromised did not originate from Chick-fil-A at all.

Theft can occur at numerous places along the payment chain. For example, it may be necessary to examine the bank where the electronic transactions were processed.

In one sense, it does not matter how the breach occurred. The fact that credit cards at a major corporation have once again been stolen highlights the threat that all quick serve restaurants and retailers of every size are facing from data thieves.

Businesses interested in keeping their networks and data secure should start with simple security measures that can effectively mitigate the growing problem that hackers represent.

While nothing is fool proof, the following suggestions could have prevented most (if not all) of the breaches that have garnered so much attention in the past 12 months:

These suggestions might on the surface seem simplistic, but almost every major breach in the last 12 months failed to incorporate at least one of them.

Of course, this list is not an all-inclusive way to prevent every type of credit card theft, but it is interesting to ponder, how much theft could have been prevented if just these five elements had been implemented correctly.

Remember that it costs nothing for data thieves to attempt to hack a business, so for them every business is a worthwhile target.

Netsurion specializes in providing state-of-the-art-data cloud-based firewall solutions tailored for organizations like Chick-fil-A, and has been a leader in the field for more than seven years.

Three paradoxes disrupting IT Security

2017 has been a banner year for IT Security. The massive publicity of attacks like WannaCry have focused public attention like never before on a hitherto obscure field. Non-technical people, including board members, nod gravely when listening as the CISO or wise friend harangue them for attention, behavior change or budget on the topic of IT Security. It’s in a way comforting to think that such attention is a good thing. After all, there’s no such thing as bad publicity, right? This is certainly the age of “I don’t care what the news papers say about me as long as they spell my name right".

Not so fast, my friend. Despite all of the attention, all of the massive investment by venture funds in IT Security, all of the hand wringing and tut-tutting after the latest attack makes the front pages, there are some deeply rooted inconsistencies if you look closely at the scene.

Paradox #1: More data, less information

For some time now, we are drowning in data but starving for insight. This recent survey of CIOs shows that:

In 2010, Eric Schmidt, of Google noted that every two days, we create as much information as we did from the dawn of civilization up to 2003. Data is everywhere, but insight is not. Why? Because the barriers to producing data are so low. In the Middle Ages, when paper was a sign of wealth, and books were locked up in monasteries, knowledge was considered valuable and creating it was costly. Today the challenge is different. We live at the opposite extreme, where instrumentation in practically every network connected device emits data, nonstop. The challenge, as always, is what does it all mean, to me, now? That level of insight continues to be elusive. Getting at it requires a mix of technology, data science and domain expertise and process discipline — a trifecta that is rare.

Paradox #2: More connectivity, less understanding

Today more and more of our lives are online. Every desktop, phone, tablet, watch, automobile and x-ray machine is online and generating reams of data. Networks are interconnected leading to even larger networks. So much so that no less a personage than Elon Musk worries that Skynet is about to become self-aware. Sure, connectivity has created tremendous positive changes, including new markets in developing nations, efficiencies in the marketplace and benefits for social interaction that were unthinkable a mere decade ago. But the same connectivity that lets you travel the globe in one click works the other way also. Deplorables from far flung locales can be at your doorstep with one click.

The sprawling network also begets the problem of not knowing your “home” turf. There is increasingly less understanding of the ways into and out of complex interconnected networks which makes them harder to defend. And, what of the Mir Jafar‘s amongst us — the scary thought of the insider threat? Effective defense demands actionable intelligence. It’s essential to answer the 4 Ws (who, what, where, when), but prevention and effective countermeasures require the 5th W (why), which is knowing motive, i.e., understanding. In his blog, David Bianco describes network defense as defenders working to push attackers up the pyramid pf pain. The highest form of defense is to understand the attackers’ tactics, techniques and procedures (TTP) so as to deny them their prize.

Paradox #3: The wisdom of crowds, the irrelevance of crowds

The latest buzzword in IT Security circles for the past couple of years has been threat intelligence, or crowd-sourced observations of bad behavior with the attendant publishing of these actors and their actions on a global scale. If the bad guys collaborate and share info on TTPs (ransomware as a service?) then should defenders do the same? Should every defender be left to analyze artifacts from the past and work in isolation to determine the future?

Surely the answer is no, and yet there’s the question of applicability and relevance to our specific network. If Ivan the Terrible is on the rampage in Kazakhstan, should the sheriff of Middleburg, VA worry and shore up his defense against the TTP used there? Probably not. And so the paradox. While crowds can give you a million eyes, it doesn’t necessarily translate into actionable intelligence to defend your network.

Disruption is a good word, signifying creativity and innovation—shaking up things in a good way. But disruption often has unintended consequences. More information, connectivity and crowdsourcing are also shrinking insight, eroding understanding and empowering irrelevant data points. These are points to ponder as we journey deeper into this 21st century.

Tip of the hat to Amy Zegart whose article in The Atlantic got the neurons firing.

Monitoring File Permission Changes with the Windows Security Log

Unstructured data access governance is a big compliance concern.  Unstructured data is difficult to secure because there’s so much of it, it’s growing so fast and it is user created so it doesn’t automatically get categorized and controlled like structured data in databases.  Moreover unstructured data is usually a treasure trove of sensitive and confidential information in a format that bad guys can consume and understand without reverse engineering the relationship of tables in a relational database.

Most of this unstructured data is still found on file shares throughout the network, and file system permissions are the main control over this information.  Therefore knowing when permissions change unstructured is critical to governance and control. File permissions should normally be fairly static but end-users are (by default) the owner of files and subfolders they create and can therefore change permissions on those files. And of course, administrators can change permissions on any object.  Either way you need to know when this happens. Here’s how to do it with the Windows Security Log.

First we need to enable the File System audit subcategory.  You’ll find this in any group policy object under Computer ConfigurationWindows SettingsSecurity SettingsAdvanced Audit Policy ConfigurationSystem Audit PoliciesObject Access.  Enable File System for success.  (By the way, make sure you also enable Computer ConfigurationWindows SettingsSecurity SettingsLocal PoliciesSecurity OptionsAudit: Force audit policy subcategory settings to override audit policy category settings to make sure your audit policy takes effect.) Now you need to enable object level auditing on the root folders containing your unstructured data.  For example, if you have a shared folder called c:files, go to that folder in Windows Explorer, open the security tab of the folders properties, click Advanced and select the Auditing tab.  Now add an entry for Everyone that enables successful use of the Change permissions as shown below.

At this point Windows will begin generating two events each time you change permissions on this folder or any of its subfolders or files.  One event is the standard event ID 4663, “An attempt was made to access an object”, which is logged for any kind of audited file access like read, write, delete, etc.  That event will show WRITE_DAC under the Access Request Information but it doesn’t tell you what the actual permission change was.  So instead, use event ID 4670, “Permissions on an object were changed”, which provides the before and after permissions of the object under Permissions Change as shown in the example below.

“What does D:AI(A;ID;FA;;;AU)(A;ID;FA;;;WD)(A;ID;FA;;;BA)(A;ID;FA;;;SY)(A;ID;0x1200a9;;;BU) mean?” This is the original access control list of asdf.txt but in the very cryptic Security Descriptor Definition Language (SDDL).  SDDL definitely isn’t something you want to manually parse and translate on a regular basis, but you can when necessary.

Look for the “D:” which is close to the beginning of the string or even the very beginning in this case.  “D:” means Discretionary Access Control List (DACL) which are the actual permissions on the object as opposed to other things that show up in a security descriptor – like owner, primary group and the audit policy (aka SACL).  Until you hit another letter-colon combination like “S:” you are looking at the object’s permissions.  An ACL is made up of Access Control Entries which correspond to each item in the list you see in the Permissions tab of an object’s properties dialog.  But in SDDL before listing the ACEs comprising the ACL you will see any flags that affect the entire ACL as a whole.  In the example above you see AI as the first element after D:.  AI stands for SDDL_AUTO_INHERITED which means permissions on parent objects are allowed to propagate down to this object.

Now come the ACEs.  In SDDL, each ACE is surrounded by parenthesis and the fields within it delimited by semicolons.  The first ACE in the event above is (A;ID;FA;;;AU).  The first field tells you what type of ACE it is – either A for allow or D for deny.  The next field lists any ACE flags that specify whether this ACE is an inherited ACE propagated down from a parent object and if and how this ACE should propagate down to child objects.  The only flag in this ACE is ID which means the ACE is in fact inherited.  The next field lists the permissions this ACE allows or denies.  In this example FA stands for all file access rights.  The next 2 fields, Object Type and Inherited Object Type,  are always blank on file system permissions (hence the 3 semicolons in a row); they are only used places like Active Directory where there are different types of objects (user, group, computer, etc) that you can define permissions for.  Finally, the last field is Trustee and identifies the user, group or special principal begin allowed or denied access.  Here you will either see the SID of the user or group if the ACE applies to a so-called “well-known” SID you’ll the corresponding acronym.  In this example AU stands for Authenticated Users.

Event ID 4670 does a great job of alerting you when permissions change on an object and telling you which object was affected and who did it.  To go further and understand what permissions where actually changed you have to dive into SDDL.  I recommend Ned Pyle’s 2-part TechNet blog, The Security Descriptor Definition Language of Love for more information on SDDL.

7 Questions Answered About Windows 7 End-of-Support

Is your organization still using Windows 7? Microsoft support is coming to a close in a few short months. If you think end-of-support for legacy systems doesn’t impact your organization, think again.

Microsoft ends all support for Windows 7 on January 14, 2020. This end-of-support means no more Windows 7 patching, bug fixes, or security updates to protect older systems that may include your e-commerce server or point-of-sale (POS) system or financial database with Personally Identifiable Information (PII).

How pervasive is the Microsoft Windows 7 user base? According to Dublin-based StatCounter GS, the global Windows 7 Server Pack 1 (SP1) market share is still 33.6% as of May 2019. Windows 7 will become increasingly vulnerable without security updates. Anecdotal evidence garnered from threats like WannaCry following Windows XP end-of-support says that adversaries will step up attacks on Windows 7 users as these organizations have lower security maturity, making them attractive targets.

Migrating Windows 7 operating systems (OS) requires time and money and with just months remaining until January 2020, you need to come up with a plan. These Windows cycles might especially impact small and medium-sized businesses (SMBs) who have more finite IT teams lacking skill sets to address the changes. While it might be tempting to look for workarounds, this is the end of the line for Windows 7. Non-compliance penalties for HIPAA (Health Insurance Portability and Accountability Act) or PCI DSS (Payment Card Industry Data Security Standard) are likely to far outweigh the risk and expense of migrating and being compliant.

Performance and security are two areas that have evolved considerably over the last three or four years, and your organization may have some unique considerations to assess in order to optimize your limited resources. Recent technical advancements mean that you can improve security and protection all while reducing complexity and cost. Here are some crucial questions that you may be asking as you move ahead, or even wrap up your Windows 7 migration.

1. What is the timing of Windows 7 end-of-support?

Microsoft will discontinue all Windows 7 support on January 14, 2020. Microsoft has been forthcoming about the Windows product lifecycle, so this should not come as a surprise. However, you may have found that day-to-day IT priorities and security firefighting has overtaken migration planning. Allocating resources for migration may be a challenge for organizations such as city and state government, as well as educational institutions. Windows 7 is not the only product facing end-of-support. Here is a list of Microsoft support deadlines to note:

Product End-of-Support Date
Windows 7 Server Pack 1 January 14, 2020
Windows Server 2008 R2 SP1 January 14, 2020
SQL Server 2008 SP4 July 9, 2019
Office 2010 October 13, 2020

The time to mobilize is now. Develop a migration plan that encompasses any IT timelines that your vertical industry or organization may follow. For example, allow extra time to freeze ordering and shipping system development 60 days before the retail holiday season or year-end break for educational institutions.

2. What are some implications associated with legacy software and hardware?

Some of the organizational impacts of older systems and hardware include:

Obsolete platforms are at greater risk of malware and viruses that adversaries can exploit to access your data or other businesses in your supply chain and operating network. In the event of a data breach due to unpatched legacy software or hardware, sizable compliance fines or negative publicity may result if the data breach is deemed to be preventable.

3. What are my options for migrating off Windows 7?

Organizations have four possible paths when migrating off legacy operating systems and devices:

Here’s what Microsoft has to say to businesses running Windows 7.

4. Could Windows 7 end-of-support impact my compliance posture?

In a nutshell: yes. Running Windows 7 after January 14, 2020 could violate security and privacy safeguards such as PCI DSS and HIPAA for organizations of all sizes. Criteria 6.2 of PCI DSS requires the installation and maintenance of current security patches on POS devices; patches for Windows 7 will stop after the end-of-support date. HIPAA similarly requires the ability to apply patches to devices that handle PHI (Protected Health Information) and Windows 7 devices would not be compliant after the looming January date.

If migration is not an option or there are unforeseen delays, compensating controls may be used to address compliance and audit requirements. These compliance-related compensating controls involve identifying, examining, and mitigating risks along with documenting and maintaining security levels over time. Notify your PCI QSA (Qualified Security Assessor) of any compensating controls or document them in your organization’s self-assessment reports.

The optimal approach is to successfully migrate to Windows 10 with plenty of time built in for contingencies. Always consult a PCI DSS or HIPAA expert for compliance recommendations about your specific entity and protected data.

5. How can I protect my Windows 7 infrastructure in the short term?

Here are some practical tips for robust security controls to help you think like a hacker when it comes to protecting your Windows 7 infrastructure as you prepare for migration:

Note that Microsoft customers with Windows 7 support contracts will continue to receive any updates, patches, and bug fixes that Microsoft provides through January 14, 2020.

6. What are some migration steps as I move to Windows 10?

There are three primary steps to consider in your migration to Windows 10.

Don’t wait until the last minute when new workstations may be in short supply along with vacationing IT staff and users who may hinder migration. Engage outside help to leverage experts who have done this consistently to avoid surprises if your organization doesn’t have a lot of migration experience.

7. What technology solutions are available to support my endpoints?

Endpoint technology has seen significant advancements since Windows 7’s introduction in 2009. EDR capabilities are one of the newer layered defense tools in the endpoint battle that block known malware and unknown, or Zero-day attacks, to protect organizations from costly data breaches. Anomaly detection to maximize endpoint security is a crucial step to prevent, detect, respond to, and predict threats. EDR also supports threat hunting by pinpointing attacks in progress and isolating impacted endpoints or servers, while minimizing false positives that waste your valuable time. EventTracker EDR is a 24/7 managed service that closes security gaps created by legacy systems with a defense-in-depth strategy that bolsters endpoint security to contain threats early and reduce dwell time across all stages of the threat chain.

Conclusion

A move to Windows 10 provides numerous benefits such as increased performance, usability, and operating efficiencies. Hardware today is optimized for Windows 10, and legacy OS users face security risks, rising operating costs, lost productivity, and an inability to capitalize on hardware and software improvements. While migrating requires time and money, the benefits outweigh the disadvantages that could include compliance fines, data breaches, and damaged brand reputation.

As you eliminate Windows 7, keep security top of mind as you assess the strategic choices available to you today. EDR can be another compensating control to place legacy equipment like Microsoft Windows 7 in lockdown mode. Advanced cybersecurity threats have increased in severity and volume, and your security solutions must likewise protect your sensitive data and customer trust. Security risks increase as the looming end-of-support date of January 14, 2020 approaches.

Are you facing a Windows 7 migration? Watch our webcast on Windows 7 Migration: A Cybersecurity Reboot to learn more about your options for protecting your employees and customers, sensitive data, and infrastructure.

Experimenting with Windows Security: Controls for Enforcing Policies

By Randy Franklin Smith

Experimenting with Windows Security

Interest continues to build around pass-the-hash and related credential artifact attacks, like those made easy by Mimikatz. The main focus surrounding this subject has been hardening Windows against credential attacks, cleaning up artifacts left behind, or at least detecting PtH and related attacks when they occur. 

All of this is important – especially because end-users must logon to end-user workstations, which are the most vulnerable systems on the network.

Privileged admin accounts are another story. Even if you eliminated pass-the-hash, golden ticket, and other credential artifact attacks, you would remain vulnerable whenever admin accounts logon to insecure endpoints.  Keystroke logging, or simply starting a process under the current user’s credentials, are viable methods for stealing or hijacking the credentials of a locally logged-on user.

So, the big lessons learned with Mimikatz and privileged accounts are to avoid using privileged credentials on lower security systems, such as any system in which web browsing or email occurs, or any type of file or content is downloaded from the internet. That’s really what ESAE (aka Red Forest) is all about. But privileged accounts aren’t limited to just the domain admin accounts contemplated by the Red Forest. There’s many other privileged accounts for member servers, applications, databases, devices, and so on.

Privileged accounts should only be used from dedicated administrative workstations maintained at the same level of security as the resources being administered.

How do you implement controls that really enforce this kind of written policy? And how do you detect attempts to circumvent?

When it comes to Windows, you have a few options:

I’ll briefly explain each one and show how you can monitor attempts to violate the policies.

Logon Rights

There’s five logon types and corresponding “allow and deny rights” for each, with “deny” overriding “allow”, of course. You define these in group policy and they are enforced by the local systems in which the group policy objects are applied. For instance, if you have an OU for end-user Workstations and you assign “deny logon locally” to an AD admin group, those members won’t be able to logon at the console of workstations regardless of their authority.

img login rights1

If someone tries to violate a “deny logon” right you can catch this by looking for <a data-cke-saved-href=" www.ultimatewindowssecurity.com="" />event ID 4625 – an account failed to logon with status or sub-status code 0xc000015b. But be aware that these events are logged via the local workstation – not on the domain controller. This is another reason to use native Windows Event Collection to get events from your workstations.

Workstation Restrictions

This is something you’d have to specify on individual user accounts as shown below in Active Directory User and Computers. This control only applies to interactive logons.

img workstation restrictions1

In this example, I’ve allowed Tamas to logon only at SAW1 (secure admin workstation 1). Depending on how many SAWs and admins you have, this could be tedious. If Tamas tried to logon at a different workstation, that computer would log <a data-cke-saved-href=" www.ultimatewindowssecurity.com="" />event ID 4625 – an account failed to logon with status or sub-status code 0xC0000070. The domain controller would log event ID 4769 with failure code 0xC.

Authentication Silos

This is a new feature of AD that allows you to carve out groups of computers and users, and limit those users to those computers – centrally from AD Authentication policy silos, which are containers you can assign user accounts, computer accounts, and service accounts to. You can then assign authentication policies for this container to limit where privileged accounts can be used in the domain. When accounts are in the Protected Users security group, additional controls are applied, such as the exclusive use of the Kerberos protocol. With these capabilities, you can limit high-value account usage to high-value hosts. Learn more about silos in Implementing Win 2012 R2 Authentication Silos and the Protected Users Group to Protect Privileged Accounts from Modern Attacks.

When a user tries to logon outside the silo of permitted computers, the domain controller will log event ID 4820: A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions.

Bad guys have more methods and shrink-wrapped tools than ever to steal credentials, so it’s especially important to lock down privileged accounts and prevent artifacts of their credentials from being littered throughout your network where the bad guys can find them. Windows gives you controls for enforcing such policies and provides an audit trail when someone attempts to violate them. Remember that besides just non-compliant or forgetful admins, these events may signal a bad guy who’s successfully stolen privileged credentials but is unaware of the controls you’ve put in place.  So, take these events seriously.

Going Mining for Bitcoin

While you’ve been busy defending against ransomware, the bad guys have been scheming about new ways to steal from you. Let’s review a tactic seen in the news called bitcoin mining.

Hackers broke into servers hosted at Amazon Web Services (AWS) that holds information from multi-national, multi-billion-dollar companies, Aviva and Gemalto. The criminals were using computer power to mine the cryptocurrency, bitcoin.

Though anyone could try to mine bitcoin off their computer services, the process is very energy intensive, and could be costly in electricity expenses alone. But it’s worthwhile for many hackers because a successful attempt can be very lucrative.

To avoid the high cost of going at it alone, most bitcoin miners join a pool of different computers that combine their powers to solve complex algorithms. Successfully solving the problem generates a set number of new bitcoin, which are worth upwards of $4,300 each. Bitcoin can be mined until there are a total of 21 million bitcoin that exist.

How should you defend against this? Know your baseline and watch for anomalies. See how EventTracker caught a bitcoin miner, hidden behind a rarely used server dedicated for key-fob provisioning.

Catching Hackers Living off the Land Requires More than Just Logs

If attackers can deploy a remote administration tool (RAT) on your network, it makes it so much easier for them. RATs make it luxurious for bad guys; it’s like being right there on your network. RATs can log keystrokes, capture screens, provide RDP-like remote control, steal password hashes, scan networks, scan for files and upload them back to home. So if you can deny attackers the use of RATs, you’ve just made life a lot harder for them.

We are getting better at catching so-called advanced persistent threats by detecting the malware they deploy on compromised systems. We can say this because experts are seeing more attackers “living off the land.” Living off the land means an attacker goes malware-free and instead relies on the utilities, scripting engines, command shells and other native resources available on systems where they gain an entry point.

By living off the land, they keep a much lower profile. They aren’t stopped as much by application control and whitelisting controls. There’s no malware for antivirus to detect.

And Windows provides plenty of native resources for this kind of attacker. (Linux and UNIX do too, but I’m focusing on Windows since client endpoints initially targeted by today’s attackers mostly run Windows.) You might be surprised how much you can do with just simple batch files, let alone PowerShell. And then there’s WMI. Both PowerShell and WMI provide a crazy amount of functionality. You can access remote systems and basically interface with any API of the operating system. You can open up network connections for “phoning home” to command and control servers, and more. This is all stuff that in years past required an EXE or DLL. Now you can basically do anything that a custom built EXE can do but without touching the file system which so much of our current security technology is based on.

How do you prevent attacks like this? PowerShell has optional security restrictions you can implement for preventing API access and limiting script execution to signed script files. With WMI it’s not as clear. Obviously, all the normal endpoint security technologies have a part to play.

But let’s focus on detection. It’s impossible to prevent everything and mitigate every vulnerability. So we can’t neglect detection. The challenge with detecting attackers that are living off the land is twofold. The activities you need to monitor:

  1. Aren’t found in logs
  2. Are happening on client endpoints

Both of these create big challenges. Let’s talk about #1 first. A.N. Ananth and I describe the types of activities that are clues to possible attacker living off the land in 5 Indicators of Evil on Windows Hosts using Endpoint Threat Detection and Response and I encourage you to watch that session which is full of good technical tips. But the point is that what you need to watch for isn’t in the Windows security log or other logs. Instead, detection requires a combination of file scanning, configuration checks, querying of running processes and so on — all stuff that requires code running on the local system or very powerful and complex remote access. If we were only talking about servers, we could consider deploying an agent. But to catch today’s threats, you need to be monitoring where they begin, which is on client endpoints — the desktops and laptops of your employees. And there’s no way to remotely reach into that many systems in real time, even if you overcame the technical hurdles of that kind of remote access. So that leaves agents, which always cause a degree of pushback.

But it’s time to stop calling them agents. Today what we need on endpoints are sensors. It’s a subtle but important shift in mindset. In the physical world, everyone understand the need for sensors, and that sensors have to be deployed where the condition is being monitored. If you want to know when someone enters your building at night, you need a sensor on every door. Likewise, if you want the earliest possible warning that your organizations have been compromised, you need a sensor on every endpoint.

So I encourage you to start thinking and speaking in terms of leveraging your endpoints as a sensor rather than yet another system that requires an agent. And look for security vendors that get this. EventTracker has done a great job of evolving their agent into a powerful and irreplaceable endpoint security agent that “sees” things that are just impossible to see any other way.

Threatscape 2012 – Prevent, Detect, Correct

The past year has been a hair-raising series of IT security breakdowns and headlining events reaching as high as RSA itself falling victim to a phishing attack.   But as the year set on 2011, the hacker group Anonymous remained busy, providing a sobering reminder that IT Security can never rest.

It turned out that attackers sent two different targeted phishing e-mails to four workers at its parent company, EMC.   The e-mails contained a malicious attachment that was identified in the subject line as “2011 Recruitment plan.xls” which was the point of attack.

Back to Basics:

Prevent:

Using administrative controls such as security awareness training, technical controls such as firewalls, and anti-virus and IPS, to stop attacks from penetrating the network.   Most industry and government experts agree that security configuration management is probably the best way to ensure the best security configuration allowable, along with automated patch management and updating anti-virus software.

Detect:

Employing a blend of technical controls such as anti-virus, IPS, intrusion detection systems (IDS), system monitoring, file integrity monitoring, change control, log management and incident alerting   can help to track how and when system intrusions are being attempted.

Correct:

Applying operating system upgrades, backup data restore and vulnerability mitigation and other controls to make sure systems are configured correctly and can prevent the irretrievable loss of data.

The 5 W’s of Security Management

The 5 W’s of security management

I’ve seen it happen about a thousand times if I’ve seen it once. A high profile project ends up in a ditch because there wasn’t a proper plan defined AHEAD of time. I see this more often in “squishy” projects like security management because success isn’t easily defined. It’s not like installing a web application firewall, which will be deemed a success if it blocks web attacks.

Security management needs a different set of drivers and a more specific and focused discussion of what is “success,” before solutions are evaluated. Before vendors are consulted. Before you do anything. I know it’s hard, but I want you to take a deep breath. If you can’t answer the following questions about your project, then you have a lot of work to do before you are ready to start thinking about specific solutions.

First and foremost, you need to have a clear understanding of your goals and your budget and make sure to line up your executive support. Ultimately someone is going to have to pay the check for whatever it is you want to buy. So you will be a lot better off if you take a bit of time up front and answer all these sticky questions.

A favorite tactic of mine is to ask the 5 W’s. You remember those, right? It was a grade school thing. Who, what, where, when and why? Pretty much anything you need to do can be clarified and distilled by isolating the issues into the 5 W’s. I’m going to kick start your efforts a bit and walk you through the process I take with clients as they are trying to structure their security management initiative.

Why?
The first thing to understand is WHY you are thinking about security management? What is the driver for the project? Are important things falling through the cracks and impacting your operation efficiency? Did an incident show a distinct lack of data that hindered the investigation? Maybe an auditor mandated a more structured approach to security management? Each of these (and a ton of other reasons) is a legitimate driver for a security management project and will have a serious impact on what the project needs to be and accomplish.

Once you have a clear understanding of why, you need to line up the forces for the battle. That means making sure you understand who has money to pay for the project and who has the final approvals? If you don’t understand these things, it’s very unlikely you’ll drive the project through.

Who?
After you have a clear idea of which forces will be at your disposal, you can determine the WHO, or which folks need to be part of the project team. Do the network folks need to be involved, the data center folks and/or the application folks? Maybe it’s all of the above, although I’d push you to focus your efforts up front. You don’t want to be in a position where you are trying to boil the ocean. You want to be focused and you want to have the right people on the team to make sure you can achieve what you set out to achieve. Which brings us to the next question…

What?
This gets down to managing expectations, which is a blind spot for pretty much every security professional I know. Let me broaden that. It’s an issue for everyone I know, regardless of what they do for a living. If you aren’t clear and thus your senior team isn’t clear about what this project is supposed to achieve, it’s going to be difficult to achieve it.

Any organization looking at security management needs to crisply define what the outcomes are going to be and design some success metrics to highlight those outcomes. If it’s about operations, how much more quickly will issues be pinpointed? What additional information can be gathered to assist in investigations, etc? This is really about making sure the project has a chance of success because the senior team (the ones paying the bill) knows where it’s going ahead of time.

Where?
This question is all about scope. Believe me, defining the scope effectively is perhaps the most critical thing you can do. Get it wrong on the low side and you have budget issues, meaning you don’t have nearly enough money to do what your senior team thinks is going to get done. Budget too high and you may have an issue pushing the project through or getting the approval in the first place.

Budgeting is much more of an art, rather than a skill. You need to understand how your organization gets things done to understand how you can finesse the economic discussion. A couple of questions to understand are: Is this an enterprise deployment? Departmental? Regional? Most importantly, is everyone on board with that potential scoping?

When?
The last W is about understanding the timeline. What can/should be done first? This is where the concept of phases comes into play, especially if your budget is tight. How do you chunk up the project into smaller pieces that can be budgeted for separately? That usually makes a big number go down a bit easier.

The key is to make sure you have a firm understanding of the end goal, which is presumably an enterprise-wide deployment of a security management platform. You can get there in an infinite number of ways, depending on the project drivers, the budget, and the skill set you have at your disposal.

But you certainly can’t get there if you don’t ask these questions ahead of time and determine a logical strategic plan to get to where you need to be. Many projects fail from a lack of planning rather than a lack of execution. As long as all of your ducks are in a row when you start the process, you have a much better chance to get to the end of the process.

Or you can hope for a good outcome. I heard that’s a pretty dependable means of getting things done.

Industry News

Cyber-crime bigger threat than cyber-terror

Although the threat of cyber-terrorism exists, the greatest risk to Internet communication, commerce and security is from cyber-crime motivated by profit. Attacks have evolved from cracking passwords into vast coordinated attacks from thousands of hijacked computers for blackmail and theft.

Foster a Healthy Security Posture

Healthcare organizations and providers focus on offering a high-level of care for their patients’ health and wellbeing; however, what is often overlooked is providing that same level of care when handling patients’ personally identifiable information (PII).

That's not to say that practices and healthcare organizations are purposely careless with sensitive information.

What's closer to the truth is in many circumstances, when a breach occurs, the practice has implemented at least some of the security measures to comply with necessary requirements, but end up in the headlines anyway, including having to face hefty fines.

Securing medical records is a complex undertaking.

It goes far beyond the minimal technical requirements of HIPAA and involves a precise balance of technical knowledge of IT teams, properly trained office or hospital staff, and even third-party vendors that service systems within an organization. All too frequently in healthcare settings, these responsibilities are pushed aside, proven by the recent major hacks at health insurers, hospital networks, and medical centers.

According to Ponemon Institute’s Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, nearly 90 percent of healthcare organizations suffer data breaches.

Why are thieves targeting healthcare?

The answer is quite simple: profit. Personal health information is extremely attractive due to its lasting value.

Think about it this way, if credit card information is stolen, the cardholder can cancel the card and report it to the credit bureaus as soon as the theft or fraud is noticed, destroying any future profitability.

However, when identity theft is accomplished through stolen healthcare data, the amount of money a hacker can generate by opening fraudulent credit accounts in someone’s name makes credit card theft seem like a drop in the bucket. The higher the amount of money the hacker makes, the greater the impact the theft has on the life of the individual – causing potential mistrust for the compromised healthcare organization.

In 2016 it was reported that victims of medical identity theft paid an average of $13,500 to resolve the crime!

It's important to understand that cybercriminals are aware of these facts and figures. Efforts to exploit this have resulted in hackers, once perceived as lone individuals, becoming more organized in their approach, running their malicious operations like full-time businesses. They are well-funded with labs, and an abundance of time and resources devoted toward research and development.

So, what is needed to make healthcare security stronger and prevent these incidents?

Healthcare organizations need an array of security technologies that can be used to prevent malicious attacks and keep personal healthcare information safe, while retaining the day-to-day ease-of-use.

Encrypt all the things.

In early 2016, it was discovered that nearly 400,000 records were compromised when a staff member’s computer was stolen due to unencrypted records. HIPAA technical requirements state that electronic personal health information (ePHI)—whether at rest or in transit—must be encrypted.

Protect against Ransomware.

Ransomware is still as relevant today as it was when we first began covering stories of healthcare organizations becoming targets.

Your employees are one of your greatest defenses against ransomware. Proper ongoing training on how to not only handle sensitive records, but also how to identify potential threats is imperative.

Remove unauthorized devices.

The risk of mobile threats and privacy issues continues to grow at alarming rates due to the millions of apps available for all ages, and the growth of devices used globally. Cisco predicts that by 2020 the number of people who own mobile phones will exceed the amount of people that have access to running water and electricity.

Not only is the use of mobile devices prevalent from a personal standpoint, from shopping to banking, the healthcare industry has started leveraging those devices more to keep up with competition and demand for better, faster, more convenient service.

USB devices, such as flashkeys and thumb drives can easily infect computers with self-replicating viruses that spread—similar to the floppy disks of years past. A USB device can emulate a keyboard and install malware and other malicious material. A USB drive or external hard drive can infect connected computers upon initial start, before antivirus tools have a chance to catch the attack.

Vet your third-party vendors.

Your systems may be secure, but what happens when you require outside assistance with an issue? Ensure that all vendors you use follow guidelines to secure their related technology to keep both you and your data safe and secure.

There is a strategy known as “vendor as vector”, which can be a direct attack on a healthcare system or an attack on a smaller practice’s IT vendor in order to breach many clients at once.

Ensuring these third-party companies have the latest endpoint security in place is also part of the healthcare practice’s responsibility.

Gain real-time breach detection and response.

This is a fairly new addition since it's been an expensive technology, typically elusive for many smaller practices and organizations. With advances in technology, there are breach detection and response solutions for SMBs at a reasonable price-point.

Leverage the latest Security Information and Event Management (SIEM).

SIEM has become a key technology in fighting off cybercriminals and keeping healthcare companies informed of suspicious network activity. SIEM platforms ingest the millions of logs generated by all the systems and devices in the infrastructure and then sort through them for you, in real-time.

Proper SIEM systems can pinpoint a threat in real-time and alert you immediately, helping stop an attack in its tracks, while tracking it to the device it started in.

Whatever size healthcare organization, every patient should have peace-of-mind that their personal information is safe when they step into a provider’s office and fill out a form with their full medical history and personal information.

Today’s cyberthreats require new ways of thinking and new tools to protect healthcare organizations against breaches, and the resulting company and patient data loss.

It’s time that the industry make use of these advanced tools packaged with the services needed to use them effectively to keep them safer and better protected from the relentless attacks—creating a healthier security posture and fostering patient trust.

Detecting Ransomware: The Same as Detecting Any Kind of Malware?

Ransomware burst onto the scene with high profile attacks against hospitals, law firms and other organizations.  What is it and how can you detect it?

Ransomware uses the same methods to initially infect an endpoint such as drive-by-downloads, phishing emails, etc.  Then it generates necessary encryption keys, communicates with command and control servers and gets down to business encrypting every file on the compromised endpoint. Once that’s done it displays the ransom message and waits for the user to enter an unlock code purchased from the criminals.  So at the initial stages of attack, trying to detect ransomware is like any other end-point based malware.  You look for new EXEs and DLLs and other executable content-like scripts.  For this level of detection check out my earlier webinars with EventTracker:

As criminals begin to move from consumer attacks to targeting the enterprise, we are going to see more lateral movement between systems as the attackers try to either encrypt enough endpoints or work their way across the network to one or more critical servers.  In either case their attacks will take a little longer before they pull the trigger and display the ransom message because they need to encrypt enough end-user endpoints or at least one critical server to bring the organization to its knees.  These attacks begin to look similar to a persistent data theft (aka APT) attack.

Detecting lateral movement requires watching for unusual connections between systems that typically don’t communicate with each other.  You also want to watch for user accounts attempting to logon to systems they normally never access.  Pass-the-Hash indicators tie in closely with later movement and that one of the things discussed in “Spotting the Adversary with Windows Event Log Monitoring: An Analysis of NSA Guidance”.

So much of monitoring for ransomware is covered by the monitoring you do for any kind of malware as well as persistent data theft attacks.  But what is different about ransomware?

  1. Detonation: The actually detonation of ransomware (file encryption) is a very loud and bright signal. There’s no way to miss it if you are watching.
  2. Speed: Enterprise ransomware attacks can potentially proceed much faster than data theft attacks.

Detonation

When ransomware begins encrypting files, it’s going to generate a massive amount of file i/o – both read and write.  It has to read every file and write every file back out in encrypted format.  The write activity may occur on the same file if directly being re-written, the ransomware can delete the original file after writing out an encrypted copy.  In addition, if you watch which files ransomware is opening you’ll see every file in each folder being opened one file after another for at least read access.  You will also see that read activity in bytes should be matched by write activity.

Of course there are potential ways ransomware could cloak this activity by either going low and slow, encrypting files over many days or by scattering its file access between many different folders instead of following an orderly process of all files in one folder after another.  But I think it will a long time before enough attacks are getting foiled by such detection techniques that the attackers go to this extra effort.

How prone to false positives is this tactic?  Well, what other legitimate applications have a similar file i/o signature? Backup and indexing programs would have a nearly identical file read signature but would lack the equal amount of write activity.

The downside to ransomware detonation monitoring is that detection means a ransomware attack is well underway.  This is late stage notification.

Speed

Ransomware attacks against an enterprise may proceed much faster than persistent data theft attacks because data thieves have to find and gain access to the data that is not just confidential but also re-saleable or otherwise valuable to the attacker.  That may take months.  On the other hand, ransomware criminals just need to do either of the following:

  1. Lockdown at least one critical server – without which the organization can’t function. The server doesn’t necessarily need any confidential data nor need it be re-saleable.  On a typical network there’s many more such critical servers than there are servers with data that’s valuable to the bad guy for re-sale or other exploitation.
  2. Forget servers and just spread to as many end-user endpoints as possible. If you encrypt enough endpoints and render them useless you can ransom the organization without compromising and servers at all.  Endpoints are typically much easier to compromise because of their intimate exposure and processing of untrusted content and usage by less security savvy end-users among other reasons.

So beefing up your ransomware monitoring means continue with what you are (hopefully) already doing: monitoring for indicators of any type of malware on your network and watching for signs of lateral movement between systems.  But for ransomware you can also possibly detect late stage ransomware attacks by watching for signature file i/o by unusual processes.  So you need to be fast in responding.

And that’s the other way that ransomware differentiates itself from data theft attacks: the need for speed.  Ransomware attacks can potentially reach detonation much faster than data thieves can find, gain access and exfiltrate data worth stealing.  So, while the indicators of compromise might be the same for most of a ransomware or persistent data theft attack, reducing your time-to-response is even more important with ransomware.

A Perfect Storm Ahead: MSSP Preparation for Economic Uncertainty

Marketplace changes are inevitable. Rapid shifts to remote work, cloud computing, and digitalization have all led to increased demand and spending on IT and cybersecurity in recent years. Enterprises and Service Providers face economic challenges of inflation, rising labor costs (if you can even hire talent), and supply chain issues. Financially motivated attacks are likely to accelerate in times of economic uncertainty. Smart channel leaders should be proactive and guide clients on prioritizing cybersecurity investment as a driver of business growth.   

Is Cybersecurity More Immune to Budget Downturns?  

High-profile data breaches and bad publicity have made cybersecurity a Board of Directors and executive leadership priority. The cost of a data breach now approaches $4 million, and attackers remain undiscovered internally for an average of four months. Protecting sensitive data and assets is no longer a compliance checkbox but now a way to instill consumer and investor confidence. Some might argue that unlike discretionary goods, cybersecurity spending is immune to economic pressures and business downturns. While financial forecasts vary widely regarding the likelihood of a slowdown, it’s an opportunity to better prepare for whatever lies ahead.

Use this effective 6-point plan to prepare for any possible cost-cutting or reprioritization.

1. Boost operational agility: Decisions like transitioning from products to SaaS (Software-as-a-Service) can streamline operations but also create challenges and risks. Remain focused on your ideal client audience to enhance profitability, differentiate on value, and instill customer loyalty. Over time, remember to frequently re-evaluate any packaging and pricing decisions to ensure continued fit with the marketplace and changing customer expectations. Minimize startup risk and investment by selecting a managed cybersecurity partner with broad capabilities such as 24/7 experts and advanced threat protection.

img economic headwind1

2. Balance cyber risk and business growth: Managed Security Service Providers (MSSPs) want the ability to tailor their solution portfolio to distinct customer requirements that grow over time; your cybersecurity portfolio should also adapt and evolve with the marketplace. Enhance your agility and flexibility by scaling your cybersecurity portfolio as your client base expands or account penetration deepens. Look for vendor partners that can:

Business growth and technological innovation cannot occur without cybersecurity - as costly data breaches demonstrate. It’s no longer one or the other, and organizations must do both to be successful.

3. Augment your IT team: At best, hiring IT and cybersecurity professionals in today’s job market is difficult and retaining them even more challenging. Evaluate areas where you can augment your team by partner with outside experts who free up your team for other strategic projects and activities. Rather than creating and staffing your own DIY Security Operations Center (SOC), for example, consider a SOC-as-a-Service approach that lets you provide 24/7 monitoring on your behalf without having to hire hard-to-retain experts. A co-managed cybersecurity service enables you to have as much or as little hands-on operation and involvement as you prefer. A managed service helps you retain your existing staff knowing that additional expertise is available, especially to augment smaller IT teams. 

4. Explore ways to streamline or consolidate: Most enterprises likely have too many cybersecurity vendors and tools to manage effectively. That’s primarily because new security measures tend to get deployed one at a time. The net result is a technology sprawl that can create siloes and cybersecurity gaps. Partners and their clients want to run fast and learn, but too many tools and the lack of support add cost and complexity. Look for tool and solution overlaps and redundancies that provide an opportunity to streamline vendors and processes. These challenges have prompted organizations to turn to MSSPs for managed services to simplify cybersecurity operations.

As you plan ahead, future-proof your cybersecurity operations by simplifying processes and increasing agility.

5. Automate and orchestrate where feasible: Automation, machine learning (ML), and artificial intelligence (AI) are all commonplace in cybersecurity now. These sophisticated tools and technologies accelerate threat correlation and speed up threat response times. While staff shortages and rising labor costs are sometimes catalysts for automation and orchestration, they can help detect stealthy attacks that evade detection and enhance time-to-respond (TTR). However, automation and technology need to be combined with cybersecurity professionals to balance human and artificial intelligence.

6. Prioritize cost management: “Cash is king” in times of financial uncertainty. It’s crucial to invest in growing business profitably while maintaining responsible spending. Use cost avoidance by assessing a managed cybersecurity solution as you skip DIY hardware purchases and expensive tech hires.

Keep A Step Ahead

Don’t let economic headwinds and changes catch you off guard and unprepared. Top channel leaders bring both optimism and front-line practicality to the conversation. Some best practices for uncertain economic times include automating and streamlining where possible, managing expenses, and using a managed service to augment staffing and capabilities. As their trusted advisor, you can help savvy organizations securely grow their business and navigate marketplace changes. Our adaptive security solution, Netsurion Managed Threat Protection, integrates with your existing security investments and technology stack, quickly scaling to evolving business needs.  

8 Threats to Watch for this Holiday Season

This holiday season will be like no other with the continued use of remote work, greater online sales, third-party sourcing from across the globe, and employees taking much-needed time off. Cyber criminals will take advantage of these seasonal distractions to steal sensitive data, hold it for ransom, or use you as a stepping-stone to more lucrative victims. Hackers often strike when businesses let their guard down, gaining access to networks but laying low to strike later. Once centered on key shopping days like Black Friday and Cyber Monday, cyber attacks are now extending across all of November and December and into the new year, making comprehensive vigilance and 24/7 visibility even more challenging. It’s time to fight back against cyber criminals with defense-in-depth resiliency for proactive protection at this crucial time of year.

Here’s a list of 8 threats to watch for and best practices to defend against them:

We’ve Made Your List. Now, Check It Twice!

‘Tis the season to be wary of cyber crime, as hackers don’t just attack larger enterprises. Cyber criminals also use advanced persistent threats (APTs) to target MSPs and mid-sized businesses. Adversaries often target mid-sized businesses because they are supply chain partners of larger firms or may have security gaps that are easy to exploit. Hackers are continually reinventing their tactics, techniques, and procedures (TTPs) to catch you off guard and evade detection, so it’s important to stay on top of vulnerabilities and real-world attacks. And as you look towards the future, ensure cybersecurity is a year-round priority. 

A Day in the Life of a Consumer

Consumer Intro

I found out how quickly a brand could change from being a favorite of mine to becoming an entity I would never trust again. The result was a new sense of awareness the hard way, and my last visit to our favorite food joint.

I was sitting in my office at work and decided to take a break to balance my credit card with my checking account. I went to my personal email to catch up as well, and saw an alert for a card. But the odd thing was, the alert was for a card I had recently closed and should have been at a zero balance.

The email notification showed it over $5,000!

This caused some feelings I don’t wish to recall. Had my identity been stolen? Who was to blame?

My eyes opened to this vulnerable position for the first time 10 years ago, and then shut indefinitely to the brand that happened to be part of this experience.

As a consumer, I decide what brands to purchase from or invest in based on my gut feelings about them.

I search for bargains, but I am also willing to pay more for quality, peace of mind, atmosphere, and how the experience of the brand makes me feel. Once I find a brand I like, I stick with it, loyally, unless something goes very wrong.

I go through a number of checkpoints all at once when making buying decisions, automatically. Things run through my head like: Do I like the packaging, the atmosphere, the product, the service, the price, and most of all do I trust them?

This applies to all industries, from food, hotel, and travel, to healthcare and retail.

Setting the scene

We frequented this wonderful place often. It was a micro-brewery with an amazing menu, nice atmosphere, great service, and best of all, it was a newer restaurant close to home.

By the time I was expecting my second child, our visits became weekly occurrences. I loved the healthy options they offered and my husband reveled in the sweet treats and savory fare.

This restaurant was a sit-down establishment, with wait staff. I would never have dreamed that our credit card data would be compromised there.

I hadn’t even thought about it being a possibility at small retail locations or large brand-name establishments for that matter.

Here's the deal:

Taking a step back, there is something you should understand about me. I am a Type A personality and completely in control of our finances. I love to save, I have a very high credit score, and have never in my life paid interest on a credit card, as I pay them off in full every month.

I earned my credit score by being responsible, which also came easy. I not only bought only what I could afford, I often passed on buying things that I could afford, and do this even more today. I used credit cards then, and now, because of the convenience, the points, and the sense of security in them over a debit card or cash.

So, what happened?

It all started with a peculiar email notification from my past credit card company, showing thousands of dollars in recent purchases on a card that was not in use. I picked up the phone and called the card’s customer service line immediately.

I told them the scenario: My card had been closed weeks prior, it should have shown a zero balance, and it showed that it not only had over $5,000 on it, the purchases were made overseas!

The customer service rep asked me if I lost the card because the purchases were made with a physical card on location. No, I had not. In fact, I had cut it up when I closed it.

That’s when a sense of loss, vulnerability, violation, and anger set in.

It felt very creepy too.

The card company of course took care of this right away for me and ensured the card was not used any longer. It did not impact me financially, but it did impact me emotionally.

After some research, I discovered that people can steal magnetic strip information from your card with a special tool, and sometimes there could even be servers at restaurants who might do this. They accept your card and take it with them for a few minutes, which is part of protocol, so we never noticed anything strange at first.

Once they have the magnetic strip, they can make a new physical card and sell it!

We narrowed it down to this scenario being the culprit, at our favorite place. This theft halted our weekly visits and in 10 years, we haven’t returned.

Is the customer king nowadays?

I think about this scenario from time to time, and realize how important it is for me to be able to trust the place that I’m doing business with.

Although the restaurant brand itself didn’t steal from me, their employee did, and so their brand was ruined.

This particular experience I shared was 10 years ago. Cyber criminals have been on the rise for years, continuing to find new ways to steal. My experience was a singular one. Imagine the implications of thousands or millions or consumers like me, experiencing a full breach of data. A brand is only as strong as the people who support it.

Today, I focus on protecting myself with security measures that include card monitoring services, on top of the fact that I review my accounts weekly and check every line item.

When I think of this, it begs the question: If a restaurant, hotel, doctor’s office, etc. decides to accept credit cards as payment, then why don’t they all want to protect themselves, let alone their customers?

This customer holds companies and brands collecting my data to high standards.

The Bottom Line?

The bottom line is that royalty leads to loyalty. The customer is king and always right. When a brand operates under this assumption, their business thrives.

This story was written by a consumer, based on a real-life scenario she experienced a few years back.

Balancing Privacy and Security

In the wake of the most recent terrorist bombing in Boston, it is easy to understand why some people would be willing to sacrifice a few liberties to the government in favor of more security.

A common train of thought is that an honest person does not have anything to hide, so the intrusion into our private lives is really a minor thing.

In a Utopian society, I would tend to agree with that sentiment, but we live somewhere else.

Privacy vs. Security

When it comes right down to it, think about what makes up our government. There are the buildings, the laws, and even the history, but in essence, our government is a collection of people.

For the most part, they are our friends and neighbors dedicated to servicing our needs and keeping our great country running. When you have a group of people, you can expect most of them to be upstanding citizens, but it would be naive to think that none of them would be unscrupulous. When the dishonest ones are given access to power, especially intruding into our lives, the results can be catastrophic.

Recently, a New York police officer was arrested for his part of hacking into his ex-girlfriends e-mail and abusing his access to police data.

While I hope he is proven innocent and that there has been some kind of misunderstanding, Edwin Vargas (a government representative), has been charged with paying a hacking firm to break into approximately 40 e-mail accounts (21 have been reported to be from fellow officers).

Also, he is accused of illegally accessing the National Crime Information Center database, which he is allowed to access because of his status as a police officer. There are rules governing the use of this database, and Mr. Vargas allegedly ignored them.

According to published reports, this activity had been going on between 2010-2012.

This kind of behavior is neither unique to Mr. Vargas nor surprising when you consider that some people just have a tendency to abuse power when they obtain it. With a quick search on the Internet, you can find thousands of cases where government officials abused their offices.

Ben Franklin got it right in 1775 when he said, “They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.”

We need to remember that the freedoms we give up to the “government” are being put into the hands of real people who may not have our best interests at heart.

Top 6 uses for SIEM

Security Information and Event Management (SIEM) is a term coined by Gartner in 2005 to describe technology used to monitor and help manage user and service privileges, directory services and other system configuration changes; as well as providing log auditing and review and incident response.

The core capabilities of SIEM technology are the broad scope of event collection and the ability to correlate and analyze events across disparate information sources. Simply put, SIEM technology collects log and security data from computers, network devices and applications on the network to enable alerting, archiving and reporting.

Once log and security data has been received, you can:

Logs from firewalls and IDS/IPS sensors are useful to uncover external threats; logs from e-mail servers, proxy servers can help detect phishing attacks; logs from badge and thumbprint scanners are used to detect physical access

Computers, network devices and application logs are used to develop a trail of activity across the network by any user but especially users with high privileges

Most enterprises have critical data repositories in files/folder /databases and these are attractive targets for attackers. By monitoring all server and db resource access, security is improved.

With all logs and security data in one place, an especially useful benefit is the ability to correlate user activity across the network.

Often the source of funding for SIEM, when properly setup, auditor on-site time can be reduced by up to 90%; more importantly, compliance is to the spirit of the law rather than merely a check-the-box exercise

Answer Who, What, When, Where questions. Such questions are the heart of forensic activities and critical to draw valuable lessons.

SIEM technology is routinely cited as a basic best practice by every regulatory standard and its absence has been regularly shown as a glaring weakness in every data breach post mortem.

Want the benefit but not the hassle? Consider SIEM, our service where we do the disciplined blocking and tackling which forms the core of any security or compliance regime.

Is the IT Organizational Matrix an IT Security Problem?

Do you embrace the matrix?

Not this one, but the IT Organizational Matrix, or org chart. The fact is, once networks get to a certain size, IT organizations begin to specialize and small kingdoms emerge. For example, endpoint management (aka Desktop) may be handled by one team, whereas the data center is handled by another (Server team).  Vulnerability scanning may be handled by a dedicated team but identity management (Active Directory? RSA tokens?) is handled by another.  At this level of organization, these teams tend to have their own support infrastructure.

However, InfoSec controls are not separable from IT.  What this matrix at the organizational level becomes is a graph of security dependencies at the information level.  John Lambert explains in this blog post.

For example, the vulnerability scanning systems may use a “super privileged account” that has admin rights on every host in the network to scan for weaknesses, but the scanners may be patched or backed up by the Server team with admin rights to them.  And the scanner servers themselves are accessed with admin rights from a set of endpoints that are managed by the Desktop team.

This matrix arising from domain specialization creates a honeycomb of critical dependencies. Why is this a problem? Well because it enables lateral movement. Attackers who don’t know the map or org chart can only navigate the terrain as it exists. In this case, though, the defenders may manage from the network map like good little blue tin soldiers.

If this is your situation, it’s time to simplify. Successful defenders manage from the terrain, not the map.

Prevention is Key in Cybersecurity

“You see, but you do not observe. The distinction is clear.” Sherlock Holmes said this to John Watson in “A Scandal in Bohemia.” Holmes was referring to the number of steps from the hall to the rooms upstairs. Watson, by his own admission, has mounted those steps hundreds of times, but could not say how many there were. The same can be said in the world of IT cybersecurity. A lot of data, an overwhelming amount actually, is available from hundreds of sources, but rarely is it observed. Having something and getting value from it are entirely different.

This is also underlined in the story, “Peace Health employee accessed patient info unnecessarily.” On Aug. 9, a Vancouver medical center, Peace Health, discovered that an employee accessed electronic files containing protected health information, including patient names, ages, medical records, account numbers, admission and discharge dates, progress notes, and diagnoses. An investigation revealed that the employee accessed patient information between November 2011 and July 2017.

What? This had been going on for 5 years and was just discovered? It would seem this is another case of “You see but do not observe,” and indeed the distinction is clear. Log data showing what this employee was doing had been accumulating and faithfully archived, but it was never examined.

What was the impact? There was reputational damage, plus the costs incurred (letters, call center expenses, etc.), and possible fines by HHS for the HIPAA violation. Plus, there was disruption of regular tasks to investigate the extent and depth of this incident and related incidents that may have occurred.

Ben Franklin observed that an ounce of prevention is worth a pound of cure. The same is true in cybersecurity. We at EventTracker know that it’s hard to pay attention given the volume of security data that is emitted by the modern network. Therefore, we provide security monitoring as a service, so that you don’t just get more technology thrust your way, you gain the actual outcome you desire.

Every Merchant Needs Electronic Data Protection

How many days go by between news stories involving computer breaches?

In the last month alone, with the Sony breach fresh on everyones mind, Anthem Inc. announced that they lost 80 million records, Chick-fil-A announced that they were investigating a potential credit card security breach, and several Marriott locations managed by White Lodging (which already had a different incident in 2013), are looking into a newly reported credit card breach.

If these were the only incidents, it would still be considered a huge amount.

However, this list fails to include the over 25 small businesses that announced breaches during the same time period. Merchants, especially small ones, wonder how they are supposed to operate their businesses effectively in the new corporate landscape which has cyber criminals attempting to steal data, especially credit cards, at every turn.

Why Every Merchant Needs Electronic Data Protection

The truth of the matter is that as long as sensitive data is gathered by merchants, thieves will attempt to steal it. We are referring not only to credit card numbers, but driver’s licenses, social security numbers, or other personal or confidential information that can be sold on the black market, as well.

The crux of the issue is that many small merchants are currently unable to protect this data when faced with the ever-changing technological advancement the cyber criminals are making. Clinging to the hope of a “Silver Bullet” that can fix all their woes, merchants are hoping that as the US moves to EMV chip cards for payment (like the ones used in Europe), that credit card theft will become a thing of the past.

The credit card companies are pressuring merchants to accept this new type of payment card, and merchants who fail to upgrade will specifically be responsible for all credit card fraud after October of this year.

For more information about merchant liability, check out this link.

However, there is a misconception regarding EMV that any business accepting credit cards should understand.

EMV credit cards are difficult, but not impossible to replicate.

With EMV cards, it is difficult to replicate the physical credit card if stolen from a merchant at the time of the swipe, similar to what happened with the Target breach. That does not mean that the transactions are safe from being retrieved by hackers.

In fact, EMV transactions still send credit card data in clear text that hackers can use for credit card fraud. Since creating fake cards is more difficult with these EMV cards, hackers steal the data from merchants and then perpetrate on-line fraud instead of in person fraud.

In other words, criminals will steal the data and then use the credit cards to purchase merchandise from those who sell goods or services on the web.

So if EMV will not solve the problem, what can a small merchant do?

The answer is not complicated, but it does require a shift regarding how business is conducted.

Protecting data needs integration into how things run, and security measures should not be considered “add-on” components which are really outside of the core operations of the business. Security should include using up-to-date software for point of sale operations, best practices for network security such as highly secure firewalls, employee education, and testing to validate those measures in place.

A good starting point is implementing the PCI Data Security Standards. Unfortunately, many merchants find this set of requirements difficult, or impractical, to implement on their own. While it is true that PCI Data Security is complex, it is also true that there are options for managing many of the PCI components that cause small businesses so many headaches.

Managed Network Security

Much like physical security or an alarm system, experts are brought in to verify that physical inventory and cash are protected. There is no reason this should be different for electronic security as well.

There are many complicated issues when it comes to protecting sensitive data. That does not mean that you cannot find support and help to both mitigate your risk and simplify what it takes to keep your electronic data secure.

In the same way that the hacking community has grown in sophistication, so has the managed security industry. With minimal effort it should be possible to determine where you have gaps in your data and security plans, and with the right consultant you should be able to find an affordable solution to help you keep your customer’s information safe.

Hacking is the new reality, and it is up to merchants to accept the fact that in the electronic era, there is a huge amount of data that entices criminals to pay attention to what is stored.

Taking action is the only option.

If you cannot manage the scope of the problem yourself it is prudent to look for professional help. There are no longer options to ignore the problem and hope that you skate under the radar of the criminals.

3 Tips to Stretch Your Cybersecurity Dollar

Businesses are always looking for ways to deliver increased value to clients while optimizing efficiency, and this year is no exception. Digital transformation, remote work, and economic uncertainty are just some of the challenges impacting organizations today. As you plan next year’s budget, it’s a good idea to assess current operational successes and opportunities to increase efficiency and effectiveness. Here are some practical recommendations to increase cybersecurity effectiveness and help you optimize finite budgets and time.

1. Simplify Your Tech Stack

Recent security breaches and ransomware attacks have led to a proliferation in point products that can add complexity and cost. Organizations have an average of 75 security tools, and “tool bloat” requires more experts to hire, train, and operate the technology. You can minimize cyber sprawl in order to enhance security and operational efficiency. According to Ponemon Institute’s “Cost of a Data Breach 2022” report, security system complexity was the top item of 25 that increased data breach costs.

While there’s no silver bullet or single vendor covering the entire threat chain, streamlining your technical infrastructure saves time and money. First, evaluate whether your organization has unused or even unsanctioned applications that create risk and can be jettisoned. Second, lo ok for cybersecurity solutions that improve attack surface coverage and address the broadest vulnerabilities and risks, all tailored to your security posture. Finally, consider integrated solutions like Netsurion’s Managed Open XDR that offers defense-in-depth with single-pane-of-glass visibility and a predict, prevent, detect, and respond approach to advanced threats.

2. Augment Your Staff with Managed Open XDR

The global shortage of over 3 million security professionals has created a cybersecurity staffing crisis. Almost 60% of organizations state that the staffing shortage impacts their risk posture. If you could hire a cybersecurity expert, retaining them over time becomes an even more significant challenge as larger enterprises woo staff away. Managed XDR offers an affordable and flexible approach to enhance your existing staff and technical skills and scale up and down instantly.

With Managed XDR, you receive the Security Operations Center (SOC) “function” in a SaaS model along with cybersecurity experts, comprehensive technologies like SIEM and Endpoint Protection, and managed services like vulnerability assessments and network flow scanning. Our research shows that an in-house SOC requires 9-12 months to implement, involves 12 dedicated professionals for 24/7/365 coverage, and can cost anywhere from $1.5 to $5 million/year. On the other hand, Managed XDR accelerates your security maturity without CAPEX and the challenge of hiring and retaining technical experts. You can rapidly onboard your users with Managed XDR that scales with you.

3. Cloud-Deployed Security Controls Without Hardware

Managed Open XDR can include SaaS-based cloud deployment options. With no hardware to purchase or maintain, cloud-based security controls reduce total cost of ownership (TCO) with a pay-as-you-grow model. The platform is already implemented, provisioned, tested, and often paired with a managed service that speeds up onboarding and time-to-value. SaaS solutions make Work-from-Home (WFH) easy with its anytime, from anywhere access. In addition, a centralized cloud console lets you focus on your business and not on managing hardware. Also, log storage in the cloud scales with your customers to simplifying meeting compliance requirements. To deter today’s financially motivated threat actors, it’s crucial to protect sensitive data with comprehensive visibility across endpoints, mobile devices, and cloud.  

Next Steps

Security complexity is increasing in the face of exploding cyber threats. But there are ways to streamline IT operations and spend, all without sacrificing compliance, data security, and customer engagement:

Staying competitive and profitable in this challenging environment requires a unified blend of people, processes, and technology. Whether you are implementing a SOC for the first time or augmenting to add weekend and after-hours coverage, 24/7 cybersecurity analysts in a managed service work as an extension of your in-house team. 

Mitigate Software Supply Chain Attacks with SIEM and EDR

At Black Hat 2019, Eric Doerr, GM of the Microsoft Security Response Center, reminded attendees of the interconnectedness of enterprise software supply chains and of their vulnerability to attack. Eric highlighted how supply chain compromises come in many guises:

The list of supply chain attack vectors is long and nefarious, and of course applies to hardware as well – peripherals, networking equipment, IoT devices, even server blades.

Supply chain cybersecurity best practices dictate a number of straightforward defenses:

But as Eric pointed out, “I’m in your supply chain, and you’re probably in mine.” Software and services produced by one vendor can, and do, end up in other vendors’ manifests and stacks, propagating deep among suppliers and consumers. The multiplicity of organizations, code and services in this cascade of supply and consumption almost guarantee the inclusion of exploitable vulnerabilities and embedded hostile code.

Today, in the face of international sourcing, admixture of proprietary and open source code, and huge variability in vendor practices, securing the enterprise supply chain borders upon the impossible. What steps can CISOs and IT security teams take to mitigate risk from vendor and community-supplied software and firmware?

The first step is developing a strategy. Certainly, it makes sense to follow and enforce the supply chain security practices outlined above. But how do you mitigate the threats that survive the vendor-consumer gauntlet? Once past these protections, having effectively side-stepped perimeter defenses, supply chain attacks can run amok on your networks, inside your applications and across your data, on par with privilege escalations and high-level insider attacks.

Until the modern software supply chain cleans up its act, through self-regulation or government mandate, the best way to mitigate sourcing risk is with comprehensive Security Information and Event Management (SIEM) – integrating security monitoring, threat detection and response, combined with Endpoint Detection and Response (EDR). Netsurion’s EventTracker SIEM and EDR together address supply chain threats, as follows:

In today’s landscape of interwoven ecosystem relationships and complex provenance of software and firmware, securing your technology supply chain ranges from daunting to near impossible. CISOs worry about fully vetting the integrity of software and hardware sourcing.  They lose sleep thinking about potential ingress of malicious and vulnerable code across purchasing, development, IT and other entry points. With Netsurion SIEM and EDR, CISOs and security practitioners can rest easier and devs continue leveraging high value ecosystem software and firmware. Try it today.

MDR is a Critical Capability for MSSPs: Keys to Making the Right Choice

MSSPs need airtight threat detection and rapid, reliable remediation. The optimal way to do this is to ensure you have top-notch MDR capabilities 24/7/365. Many MSSPs partner with an MDR provider to achieve this.

MSSPs face frequent hurdles in their quest to grow their security business, maintain current customer satisfaction, and enhance IT operations and efficiency:  

Service Providers can embrace MDR as a crucial layer of cybersecurity defense. Managed Detection and Response (MDR) can overcome these real-world customer challenges with fast deployment, continual adaptation, and much-needed cybersecurity expertise as a managed security service. 

What is MDR

Managed Detection and Response (MDR) is a managed cybersecurity solution that delivers services tied to 24/7 threat monitoring, detection, and response. MDR minimizes the burden of running complex software and tools by combining and managing the right security analytics and technology. It encompasses a Security Operations Center (SOC) that includes tech stack expertise and extends value by aggregating, analyzing, and executing an incident response playbook.

MDR provides multiple layers of protection to counter the multiple attack vectors possible. Various technologies used to provide enhanced visibility and better detection and response include Security Information and Event Management (SIEM), and Endpoint Protection Platforms (EPP).

Challenges that MDR Addresses

There are three critical capabilities that an MDR solution must provide:

rube goldberg machine

How MSSPs Can Help

Advanced cybersecurity is becoming more critical as sophisticated threats have accelerated, from financially-motivated cyber criminals to well-funded nation-state attackers targeting software supply chains. According to Gartner, “By 2025, 50% of organizations will be using MDR services for threat monitoring, detection and response functions that offer threat containment capabilities.” With strong business community relationships, MSSPs are well-positioned to embrace MDR and evolve their technology stack. There are several options to adopt MDR: purchase MDR tech and manage it yourself, team up with a proven MDR service provider, or a hybrid approach.

Avoid MDR Pitfalls

When deciding to embrace and adopt MDR, focus on how that solution adds value to your customer relationships and brings in new revenue streams without tying up capital and adding business risk. Whether you are purchasing and managing your own MDR tool, teaming up with an MDR service provider, or have found a hybrid approach, be aware of the hazards you can face when evaluating moving forward with an MDR solution:

  1. MDR vendors that tout technology only without a SOC for 24/7 monitoring and incident response, placing the burden on you to spin up these human-led services.
  2. Unproven MDR solutions that contain bloated features that add cost and complexity.
  3. Inflexible solutions that can’t be tailored to your unique environment and team may not adapt to changing threat landscape requirements.

Netsurion provides MDR services that enable MSSPs to quickly improve their cybersecurity maturity to substantially decrease risk.  

MDR Buyer’s Guide

MDR addresses the technology and human element needed for cybersecurity outcomes against advanced threats. Interest in MDR services is growing as organizations look for ways to defend against stealthy and persistent cyber criminals. MSSPs will find a wide range of MDR definitions and approaches, so becoming an educated decision maker is crucial. Find the managed cybersecurity solution that’s right for your customer base and augments your current capabilities. Netsurion empowers MSSPs to better predict, prevent, detect, and respond to threats with a defense-in-depth approach to MDR. Learn more in our comprehensive MDR Buyer’s Guide.

Do Hackers Fear U.S. Jails?

In what should only be considered a victory for the U.S. Department of Justice, 2 of the 4 alleged Subway hackers have already been sentenced, and one of the remaining criminal’s trial is set to begin shortly.

The 4th identified co-conspirator, has not yet been brought to justice, but hopes run high that he will also be caught and convicted.

These men who perpetrated a sophisticated attack against the computers systems of the famous sandwich chain have been responsible for potentially $10 Million dollars in computer fraud, according to a press release from the U.S. Department of Justice.

As a security professional, I am usually the first one to stand up and cheer when I hear that hackers have been found and arrested.

While it is true that most of these criminals do not violently attack their victims, they continually erode the confidence consumers and businesses have in general as it comes to individual security. Every time a card is electronically stolen, the retail industry as a whole suffers

The only issue I have with recent events is that the sentences seem too light to deter other hackers from following in the footsteps of these Romanians.

For what could be a $10 Million crime, Iulian Dolan, 28, of Craiova, Romania was sentenced to 7 years. That’s 1 year for every $1.4 Million stolen.

More recently, Iulian’s co-conspirator, Cezar Butu, 27, of Ploiesti, Romania was sentenced to 21 months. That’s 1 month for every $476 Thousand stolen.

To professional criminals, time in jail is a calculated risk.

Hackers are like any other criminal. They perpetrate these crimes to make money. One of the costs of doing business is being arrested and going to jail.

With these sentences, both men will soon be back on the street, having served their jail time, and free to electronically look for more pockets to pick.

I commend the efforts of law enforcement to capture these elusive criminals. I just wish the sentences were more commiserate with the severity of the crimes. Other hackers now have a baseline to determine if their activity is worth risking a short stint in a U.S. prison.

In other words, a criminal can easily see himself risking a few months in jail if the payoff is big enough. Longer jail times means that a hacker might reconsider his crime because the risk is greater for every dollar stolen.

Just how dangerous is ransomware?

The word “ransomware” has been in the headlines quite a bit this year. The Institute for Critical Infrastructure Technology (ICIT) has even called 2016 the year of ransomware.

Ransomware is a business’ worst nightmare. This malware infects computers and restricts the users from accessing any of their data until paying the ransom.

Imagine a hospital unable to access patients’ data or a financial institution unable to manage their customers’ accounts? What would you do to get that data back?

Victims of ransomware have been presented with the following choices: Restore their backups (if they had any and if they do, it takes quite a few days to retrieve it all) or pay the ‘ransom’ to get the data back.

Assuming they get the data back, at that point these businesses have had operations grind to a halt for days, spent money on retrieving this data and most of all, their business’ reputation has taken a hit.

Take action before being the next victim.

In addition to having Netsurion’s remote-managed network security as your first line of defense against ransomware, here are a few things you can do yourself to protect your business.

Preventative and Proactive

Staff Training & Education

Limit Access

Netsurion remote-managed network security is your best first line of defense against ransomware! Contact us today to learn more.

Find Out Who Is Affected By A Data Breach?

1 in 3 people who are affected by a data breach will also be a victim of identity theft or fraud.

The number of data breaches continues to increase. Cybercrime affects your brand, your customers and your employees in ways that are unrecoverable at times.

Javelin Strategy & Research, reported that 1 in 3 people who are affected by a data breach will also be a victim of identity theft or fraud. Along with that, U.S. consumers lost more than $16 billion last year alone.

Don't let your business be affected next.

Our remotely-managed network and data security services, and PCI compliance solutions, ensure your brand is secure from all security threats - both internally and externally.

Netsurion protects your brand so you can focus on growing your business.

Find Out Who Is Affected By A Data Breach?

Five Fallacies That Are Holding Back Adoption of Threat Hunting

Organizations can no longer afford to be just reactive, relying solely on detection and response when it comes to cybersecurity. Threat hunting is the next step. It is a proactive approach to uncovering threats that otherwise go undetected, like multi-stage ransomware attacks and malware that lies dormant in your network until activated to exfiltrate data.

What is Threat Hunting?

Threat hunting is the human-executed process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions. This proactive line of defense creates a rapid response before attackers change their methods or escape detection. Threat hunting is a necessary component of comprehensive, layered security.

Common Fallacies About Threat Hunting Hold Adoption Back

Recent research from the SANS Institute shows that threat hunting adoption is growing, and it works. Sixty-eight percent of organizations measuring their threat hunting saw a 25% to 75% improvement in overall security posture. However, lack of staff and skills — along with common misconceptions about what threat hunting is — all stand in the way of broader adoption. Here are some of the fallacies our Netsurion Security Operations Center (SOC) experts have encountered “in the wild,” and what you really need to know about threat hunting.

1. Threat hunting and incident response are the same thing. Threat hunting is “before.” Incident response is “after.” They are not the same thing. If you are threat hunting, you are proactively looking for a sign of an incursion or anomalous activity in your network as part of prevention and detection. If you find something, you need to escalate it so the appropriate IT or IT security person can take action. That action, which follows the threat hunting activity, is incident response.

Threat Hunting Triggers PDR

2. Compliance mandates require threat hunting. By compliance mandates, we’re typically talking about complying with the security requirements put forth by the Payment Card Institute Data Security Standards (PCI DSS), General Data Protection Regulation (GDPR) and Health Insurance Portability and Accountability Act (HIPAA) frameworks for instance. Their security mandates address two things: security hygiene, and best practices in terms of security configuration. You can be compliant with these regulations and still have security breaches because most requirements address the least common denominator of security. As such, these regulations do not mandate threat hunting. Threat hunting is going above and beyond the basic requirements set forth by regulatory mandates.

3. Threat hunters have to know what they are looking for. Not always. Threat hunting may be triggered by an alert or an alarm that the threat hunter investigates to determine the cause. Or it can be triggered by security news, as in the case of log4j, Hafnium, and SolarWinds vulnerability new coverage, or an internal observation.

These hunts are for a known/known threat — you know what it is and that it happened. Another kind of threat hunting is looking for an unknown/unknown threat — the most difficult to find. Threat hunters proactively investigate anomalous activity in the network — like a spike in the number of attacks on a website or scans on a firewall, or an unusual number of login failures. The focus is on Root Cause Analysis (RCA).  

Threat Hunting Triggers

4. Artificial intelligence and Machine Learning can take care of threat hunting. We see Machine Learning (ML) as a force multiplier for threat hunting, not a replacement for it. There are a lot of nuances and variabilities that human threat hunters are much better equipped to address. At Netsurion, we use ML for anomaly detection, which the human threat hunters then pursue. But can we give the job entirely to ML? Not yet. The technology today is still quite limited compared to the scope of the problem, but it is definitely the way of the future.

5. If you have threat intelligence, you don’t need threat hunting. Threat intelligence and threat hunting are two different things. You need threat intelligence to do threat hunting. This includes both internal threat intelligence, such as understanding your network and the baseline for what is normal. You can also subscribe to threat intelligence from any number of vendors. It consists of information about threat actor motives, targets, and attack behaviors that has been aggregated to provide threat context and insight for security professionals. If you find something unusual in your network, these threat databases give you a place to look up whether it is a known threat.

Threat hunting, performed by an elite team of threat hunters working out of our SOC, is an integral component of Netsurion’s Managed Open XDR solution. We integrate MITRE ATT&CK® threat intelligence with our hypothesis-driven approach to proactive, continuous threat hunting. Learn more here, or watch this webinar for a demo of threat hunting using our platform.

Case of the Disappearing Objects: How to Audit Who Deleted What in Active Directory

I often get asked how to audit the deletion of objects in Active Directory. It’s pretty easy to do this with the Windows Security Log – especially for tracking deletion of users and groups which I’ll show you first. All you have to do is enable “Audit user accounts” and “Audit security group management” in the Default Domain Controllers Policy GPO. You’ll find these 2 policies under Security SettingsAdvanced Audit Policy Configuration. Make sure you also enable the Security Option named “Audit: force audit policy subcategories to override…”; this option ensures that the latter settings actually take effect.

Within a few minutes all your domain controllers will begin auditing changes to domain users and groups – including deletions. The events to look for are

4730 – A security-enabled global group was deleted
4734 – A security-enabled local group was deleted
4758 – A security-enabled universal group was deleted
4726 – A user account was deleted

Here’s an example of event ID 4726:

A user account was deleted.

Subject:

Security ID: WIN-R9H529RIO4YAdministrator

Account Name: Administrator

Account Domain: WIN-R9H529RIO4Y

Logon ID: 0x1fd23

Target Account:

Security ID: WIN-R9H529RIO4Ybob

Account Name: bob

Account Domain: WIN-R9H529RIO4Y

Additional Information:

Privileges –

As you can see there’s a different event ID for each scope of group which I’ve indicated by underlining above. The fields under Subject, as always, tell you who deleted the group and under Deleted Group you’ll see the name and domain of the group that was removed. Then of course there’s 4726 for the deletion of user accounts. Interpreting this event is easy; the Subject fields identify who did the deleting and the Target fields indicate the user account that is now gone.

Monitoring deletions of organizational units (OUs) and group policy objects (GPOs) requires a few more steps. First you need to enable “Audit directory service changes” in the same GPO as above. But Active Directory doesn’t automatically start auditing deletions of OUs and GPOS yet. Next you need to open Active Directory Users and Computers. Select and right-click on the root of the domain and select Properties. Click the Security tab, then Advanced and then the Audit tab. Now you are looking at the object level audit policy for the root of the domain which automatically propagates down to child objects. Here you need to add 2 entries that audit the successful use of Delete permission for organizationalUnit and groupPolicyContainer objects as shown below.

advanced-security-settings

Within a few minutes your domain controllers should start logging event ID 5141 whenever either type of object is deleted. To determine what kind of object was deleted look at the Class field which will be either organizationalUnit or groupPolicyContainer. The other fields under Object: and Directory Service provide the name a domain of the object deleted and of course the Subject tells us who deleted the object. Here’s an example of a deleted GPO. Notice that the GUID of the GPO is listed instead of is more friendly Display Name. That’s because the GPOs are identified in their official Distinguished Name by GUID.

A directory service object was deleted.

Subject:

Security ID: ACMEadministrator

Account Name: administrator

Account Domain: ACME

Logon ID: 0x30999

Directory Service:

Name: acme.com

Type: Active Directory Domain Services

Object:

DN: CN={8F8DF4A9-5B21-4A27-9BA6- 1AECC663E843},CN=Policies,CN=System,DC=acme,DC=com

GUID: CN={8F8DF4A9-5B21-4A27-9BA6-1AECC663E843}ADEL:291d5001- 782a-4b3c-a319-87c060621b0e,CN=Deleted Objects,DC=acme,DC=com

Class: groupPolicyContainer

Operation:

Tree Delete: No

Correlation ID: {140c9cef-8dc1-48f4-8b4a-de79230731a6}

Application Correlation ID: –

Going back to users and groups for a moment, remember that the method described above also results in all other changes to users and groups to be audited as well which I think is important to do. But if you really only want to track deletions you can actually use the same method just described for OUs and GPOs for users and groups too. All you need to do is add audit entries to the root of the domain for user and group objects. Then Active Directory will start recording 5141 for user and group deletions too.

Ransomware Protection: Who’s Responsible for What?

Ransomware risk changed dramatically for Managed Security Service Providers (MSSPs) and their clients in 2021. The Kaseya hack used a vulnerability in the popular Virtual System Administrator (VSA) remote management software to spread ransomware through MSSPs to an estimated 1,500 small-to-medium-sized businesses (SMBs) worldwide. The Cybersecurity and Infrastructure Security Agency (CISA) warns that more of the same is coming in 2022.

This article provides insights about mutual ransomware responsibilities to set expectations, ensure threat lifecycle coverage, and enhance client satisfaction.

MSSP Mitigation Responsibilities Against Ransomware

Clients know about the escalating ransomware threats and are understandably concerned. As an MSSP, are you making it clear where your responsibilities begin and end for both you and your clients? Miscommunication regarding ransomware and cybersecurity roles and responsibilities can lead to finger pointing, a lack of action in the middle of a security incident, and even dissatisfaction with the business relationship.

Justifiably, MSSP clients should expect their service providers to do everything they can to protect them against ransomware and widespread vulnerabilities like Log4j. Service providers should take both strategic and tactical approaches to multi-layered security.

MSSPs should also be ready to demonstrate that they meet cyber hygiene fundamentals on their own systems, including encryption of network traffic and effective patch management. In particular, you must make sure that you are proactive in patching and keeping current on remote monitoring and management tools used to access client systems. Cyber criminals are actively targeting MSSPs as a steppingstone to targeted client accounts and other supply-chain partners.

Shared Cybersecurity Responsibility

Other mitigations and hardening within MSSP control that clients expect, include:

The Precedent for Shared Cybersecurity Responsibility

At the same time, MSSPs can expect their clients to assume responsibility for the elements of cybersecurity under their control — with joint responsibilities clearly defined in writing if possible.   

There is established precedent for shared security responsibility by cloud providers. For example, this matrix from Microsoft makes it clear that responsibility for information and data, end user devices, and accounts and identities is always retained by the client. Microsoft is always responsible for physical hosts, the physical network, and the physical data center. However, responsibility for the layers in the middle – operating system, network controls, applications, and identity and directory infrastructure – varies depending on the type of cloud service and may be shared by the client and Microsoft.

Clients Can Retain or Delegate their Responsibilities

MSSP clients can be expected to perform basic security practices such as their own patching of operating systems and applications if they are not part of a managed security service offering. Unless otherwise stated, client security responsibilities can include endpoint protection, vulnerability management, account privilege policy management, security awareness training for employees, virtual private networks (VPNs) for internet access and remote work, and Multi-factor Authentication (MFA) for network and application access.   

Alternatively, clients can engage their MSSP to provide any or all of these security capabilities. As a trusted advisor, you can help elevate cybersecurity and ransomware protection as a strategic priority and shared responsibility. Given the high visibility of third-party vulnerabilities and the continued threat of ransomware, now is a good time to talk to clients about their level of protection and how you can help.  

Key Takeaways

What is important for MSSPs and their clients is clarity about who is responsible for what aspects of cybersecurity management. MSSPs, especially those serving SMBs that have limited in-house IT or security expertise, should use plain language in outlining ransomware and cybersecurity roles and responsibilities so there can be no misunderstandings.

A Solution That Makes It Easier for MSSPs and Their Clients

Use these four steps to predict, prevent, detect, and respond to escalating ransomware:

Lumifi’s approach to managed threat protection ensures transparency and allows you to set client expectations regarding cybersecurity responsibilities and deliverables.

Lumifi Seeking to Acquire MDR Cybersecurity Firms to Accelerate Growth: Lumifi Is on Fast Track to Expand Cybersecurity Footprint Worldwide

Scottsdale, AZ (October 24, 2023) Lumifi, a cybersecurity industry leader, is embarking on a strategic expansion plan by targeting MDR Cybersecurity Firms. This strategic direction gains its foundation from Lumifi's recent landmark acquisition, Castra, valued at $14 million, which further fortifies the SOC Visibility Triad, a concept initially introduced in a Gartner® research report titled "Apply Network-Centric Approaches for Threat Detection and Response"1 We believe that Lumifi has followed this path diligently followed for 15 years.

By integrating top-tier cybersecurity analysts with cutting-edge systems, Lumifi steadfastly maintains its gold standard in safeguarding its esteemed clientele. This development comes in the wake of Lumifi's $30 million acquisition of Datashield from ADT in April 2022. The company is now primed to secure 2-4 more acquisitions within the next 6 to 18 months, bolstering its position in the cybersecurity landscape.

According to Gartner® “The renewed focus on the human element continues to grow among this year’s top cybersecurity trends,” says Gartner Senior Director Analyst Richard Addiscott. “Security and risk management leaders must rethink their balance of investments across technology, structural, and human-centric elements as they design and implement their cybersecurity programs.” 2

 Each day brings new threats and challenges, further compounded by artificial intelligence (AI). Cybercriminals have become more sophisticated, and thus, the detection and mitigation of security threats must be thorough. Lumifi’s approach to cybersecurity integrates system, network, and device monitoring with human expertise. The company’s advanced security framework is monitored 24 hours a day/7 day a week by a team of U.S.-based cybersecurity analysts and former military and DoD experts.

Lumifi/DataShield is the pioneer in managed detection and response (MDR), and has established itself as a prominent industry leader. With over 15 years of experience, initially focusing on packet captures and forensics, Lumifi/Datashield gained recognition in its early stages from Lumifi/Datashield for their instrumental role in shaping the current MDR landscape. Today, Lumifi stands as a premier outsourced service, dedicated to equipping organizations with specialized threat-hunting capabilities and swift responses to emerging security risks.

“We are experiencing increasing demand for our comprehensive and proactive MDR services,” said Michael Malone, CEO of Lumifi. “Keeping our customers out of harm’s way 24/7 requires the perfect combination of breakthrough yet highly reliable and proven technology solutions and qualified human expertise.  Now, our next steps for expansion necessitate finding and acquiring the best MDR companies that complement and expand upon all that we are presently offering.”

While many cybersecurity solutions necessitate regular oversight, Lumifi sets itself apart by providing a cutting-edge Managed Detection and Response (MDR) service. This unique approach synergizes the capabilities of our Security Operations Center with our in-house developed platform, ShieldVision™. Recognized as a top-tier Security Orchestration Automation and Response (SOAR) solution, ShieldVision™ stands out in threat detection, proactive hunting, and immediate automated interventions. As Lumifi pursues acquisitions of firms like Castra, the company’s focus is not just on expanding our tech arsenal, but also on deepening it’s engineering expertise.

David Norlin, CISO at Lumifi, notes, “Our strategic partnerships with technology frontrunners like Palo Alto Cortex, Extrahop, and Exabeam highlight our dedication to pushing boundaries and strengthening our industry leadership.”

Lumifi's growth strategy has garnered unwavering support from its investors, who eagerly anticipate expanding its technology stack and human capital. The recent success of the Castra acquisition has further fueled investor excitement as they eagerly look forward to Lumifi surpassing customer expectations across diverse industries, including Fortune 500 companies, prominent government agencies, and discerning legal firms. Castra recently was recognized for the second year in a row as one of CRN’s fastest growing technology vendors in North America.

“We are amazed about the high caliber of protection technology and services provided by Lumifi,” said Chris Graber, Managing Director, Corporate Investments & Acquisitions at BOK Financial. “They have a winning combination of human and cybersecurity integrated solutions that effectively detect and thwart cyberattacks.  The Lumifi cybersecurity services are resonating with top-tier clients.”

Staying ahead of cybercriminals is no easy task, but Lumifi continues to evolve and innovate. The strategic initiative to acquire new MDR partners is another game-changing move that further strengthens Lumifi’s capabilities to provide unparalleled defense of critical customers.

“Lumifi is defining the future of cybersecurity,” said Frank Mora, Senior Partner of HCAP Partners. “The company is well positioned to acquire additional MDR partners and will fortify their customers with the best possible system, network, and device monitoring capabilities.”

For cybersecurity firms looking to explore collaborative opportunities and consider becoming a part of the Lumifi family, contact Matthew Decker at [email protected]. We are eager to engage with partners who share our vision and commitment to excellence.

1 Gartner, “Top Strategic Cybersecurity Trends for 2023,” Lori Perri, published April 19, 2023.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

 2 Gartner, “Applying Network-Centric Approaches for Threat Detection and Response,” Augusto Barros et al., March 18, 2019, ID G00373460

About Lumifi

Lumifi, headquartered in Scottsdale, is a vanguard in the cybersecurity industry, dedicated to protecting digital assets and fortifying cyber defenses for businesses across the board. With a team of experts and state-of-the-art technology, Lumifi is shaping the future of cyber safety.

About SkySong, The ASU Scottsdale Innovation Center

SkySong, The ASU Scottsdale Innovation Center is one of the premier economic engines in the Valley of the Sun. The project’s success is a direct result of a focus on innovation and technology that attracts companies ranging from some of the world’s best known brands to one-or two-person startups.

###

Copyright ©2023 Lumifi.  All rights reserved. Lumifi and ShieldVision are trademarks or registered trademarks of Lumifi.  Trademarks of other companies mentioned appear for identification purposes only and are property of their respective companies.

 

Can general purpose tools work for IT security?

This post got me thinking about a recent conversation I had with the CISO of a financial company. He commented on how quickly his team was able to instantiate a big data project with open source tools. He was of the view that such power could not be matched by IT security vendors who, in his opinion, charged too much money for demonstrably poorer performance.

The runaway success of the ELK stack has the DIY crowd energized. Why pay security vendors for specialist solutions when a “big data” project that we already have going on, based on this same stack, can work so much better, the thinking goes. And it’s free, of course.

What we know from 10+ years of rooting around in the security world is that solving the platform problem gets you about a quarter of the way to the security outcome. After that comes detection content, and then the skills to work the data plus the process discipline. Put another way, “Getting data into the data lake, easy. Getting value out of the data in the lake, not so much.”

In 2017, it is easier than ever to spin up an instance of ELK on premises or in the cloud and presume that success is at hand just because the platform is now available. Try using generic tools to solve the security problem and you will soon discover why security vendors have spent so much time writing rules and why service providers spend so much effort on process/procedure and recruitment/training.

Three key advantages for SIEM-As-A-Service

Three key advantages for SIEM-As-A-Service

Security Information and Event Management (SIEM) technology is an essential component in a modern defense-in-depth strategy for IT Security. SIEM is described as such in every Best Practice recommendation from industry groups and security pundits. The absence of SIEM is repeatedly noted in Verizon Enterprise Data Breach Investigations Report as a factor in late discovery of breaches. Indeed attackers are most often successful with soft targets where defenders do not review log and other security data. In addition, all regulatory compliance standards, such as PCI-DSS, HIPAA, FISMA etc specifically require SIEM technology be deployed and more importantly be used actively.

This last point (“be used actively”) is the Achilles heel for many organizations and has been noted often, as “security is something you do, not something you buy.” Organizations large and small struggle to assign staff with necessary expertise and maintain the discipline of periodic log review.

New SIEM-As-A Service options

SIEM services are available for buyers that cannot leverage traditional on premise, self-serve products. In such models, the vendor assumes responsibility for as much (or as little) of the heavy lifting as desired by the user including: Installation, Configuration, Tuning, Periodic review, Updates and responding to incident investigation or audit support requests.

Such offerings have three distinct advantages over the traditional self-serve, on premise model.

1) Managed Service Delivery: The vendor is responsible for the most “fragile” and “difficult to get right” aspect of a SIEM deployment – that is installation, configuration, tuning and Periodic review of SIEM data. This can also include upgrades, performance management to get speedy response and updates to security threat intelligence feeds.
2) Deployment options: In addition to the traditional on premise model, such services usually offer cloud based, managed hosted or hybrid solutions. Options for host based agents and/or premise based collectors/sensors allow for great flexibility in deployment
3) Utility pricing: Contrast with traditional perpetual models that require capital expenditure and front loading, SIEM-As-A-Service follows the utility model with usage based pricing and monthly expenditure. This is friendly to Operational Expenditures.

SIEM is a core technology in the modern IT Enterprise. New As-A-Service deployment models can increase adoption and value of this complex monitoring technology.

Top three high risk behaviors that compromise IT Security

The insider threat is typically much more infrequent than external attacks, but they usually pose a much higher severity of risk for organizations when they do happen. While they can be perpetrated by malicious actors, it is more common the result of negligence. In addition to investing in new security tools and technology to protect against external threats, companies should place higher priority on identifying and fixing internal risks. Here are the top 3 high risk behaviors that compromise IT security:

1) Sharing login credentials: Convenience is the enemy of security. It is far too often more convenient to share credentials than create a unique login for each user. However, by doing so they leave the company vulnerable to data breach. While it may not be practical to completely eliminate shared credentials, a password manager that is accessible to multiple persons who need common access can shield the actual password from the user but still make it available.

2) Shadow IT or installing web applications: Users download unauthorized applications to their work computers or mobile devices. It also can occur when they subscribe to Software as a Service (SaaS) applications without IT approval. As employees spend large amounts of time at their desktop or laptop, it’s inevitable that they consider the device personal. The intention may be harmless–streaming music, looking for travel deals, shopping for personal items–but the danger is very real. Malvertising on such popular sites is frequently the reason for compromise.

3) Uploading of files to personal storage: Dropbox, Google Drive, etc. are often convenient ways of sharing company documents either between employees for collaboration or for use at home and work. The dedication is commendable, the behavior is still a risky one. Popular services were created for convenience and not necessarily for security.

What’s the remedy? Frequent updates and reminders. It’s so different than the procedures used in manufacturing facilities to minimize accidents. One single training session during onboarding isn’t enough. Regular IT and security updates are essential.

How did we decide on these particular behaviors, you ask? It’s based on observations by our EventTracker Essentials team; we review more than 1 billion logs every day to keep our customers safe. While training is a must, monitoring is also necessary. Many of these behaviors can be observed and appropriate measures such as training can be taken as a result.

As President Reagan observed, Doveryai, no proveryai.

Ten Steps to Defend Your Microsoft Exchange Servers from ProxyLogon Exploit

Microsoft has detected multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Servers. According to reports, observations of attacks leveraging the critical vulnerabilities are increasing very rapidly. In the span of a few days, over 30,000 organizations – small businesses and municipalities included - across the U.S. have been hacked.

Since then, Microsoft has issued emergency, out-of-band patches to address the security flaws. In the meantime, it is critical that organizations take appropriate action to quickly detect and effectively respond to exploit attempts.

Cyber criminals are actively exploiting these vulnerabilities and the result of not addressing it can be very damaging, including the leak/loss of emails, lateral movement within your network, or execution of ransomware. Use this guide to better understand the exploit and 10 concrete actions you should take to defend your network.

What’s the Impact?

Successful exploitation of these vulnerabilities allows an unauthenticated attacker to execute arbitrary code on vulnerable Exchange Servers, enabling the attacker to gain persistent system access, as well as access to files and mailboxes on the server and to credentials stored on that system. Successful exploitation may additionally enable the attacker to compromise trust and identity in a vulnerable network. After successful exploitation activities, attackers can gain access to email accounts and install additional malware/ scanning tools to remain persistent on the network.

Note: this impacts on-premises versions of Microsoft Exchange Server and does not impact Exchange Online.

What Happened?

Advanced Persistent Threat (APT) group, HAFNIUM, leveraged a chain of four zero-day vulnerabilities, together dubbed ProxyLogon. Since then, at least 10 other APTs have followed suit in targeting servers around the world. These vulnerabilities, also called Common Vulnerabilities and Exposures (CVE) are:

What Should You Do Now?

Netsurion’s Security Operations Center (SOC) actively monitors customer networks for Indicators of Compromise (IOCs) such as ProxyLogon. If you are not protected by a managed security service provider already taking action on this threat, our SOC recommends the following immediate course of action:

  1. First and foremost, update impacted on-premises Exchange Servers immediately.
  2. Validate whether any unknown tasks and services are existing on the Exchange Server and disable the unknown tasks, then run a complete anti-malware scan with the updated signature.
  3. Perform a Password Reset operation on all Exchange Server accounts.
  4. Validate and remove unknown .aspx, .bat, and unknown executable files from the following paths and restore the files from an uninfected backup file:
    • C:ExchangeFrontEndHttpProxyowaauth
    • C:inetpubwwwrootaspnet_client
    • C:inetpubwwwrootaspnet_clientsystem_web
  5. Ensure that a strong password policy is in place.
  6. Ensure that Multi-Factor Authentication (MFA) is enabled for Exchange account logins.
  7. Remove unwanted applications from the server.
  8. Upgrade operating systems to the latest version.
  9. Run vulnerability scans on the host and patch all critical vulnerabilities.
  10. Ensure that the regular backup operation and proper network segmentation is in place for public-facing servers.

What Should You Do Long-term?

You may find more detailed information from Cybersecurity & Infrastructure Security Agency’s (CISA) Alert AA21-062A.

Lastly, our recommendation is to instill comprehensive 24/7 security monitoring, threat detection and response capabilities with a managed security service provider (MSSP) to plug gaps in expertise and availability of your on-staff resources.

Netsurion customers are kept updated in this Security Advisory in regard to actions taken within our Managed Threat Protection service and our EventTracker threat protection platform.

IT Service Providers: Mind the Security Gap

Hackers will find a way in, and customers will then look for a way out.

Persistent threats affecting businesses of all sizes and in all verticals are becoming more consistent and hitting more frequently. The 2016 Verizon Data Breach report analyzed 100,000 incidents across industries and verticals, of which 3,141 were confirmed data breaches.

According to the report, phishing and point-of-sale (POS) attacks are still extremely common—but can wreak the most havoc.

Though these attack vectors aren’t new, phishing emails are becoming more and more convincing as cybercriminals improve the URL and domain appearances, colors, logos and email content, as not to raise red flags.

Once the phishing links are activated, either installing malware or stealing credentials, they can wreak havoc on the network, the company’s reputation (in the case of the infamous W-2 phishing scam that hit dozens of companies this year) or the compromised individual’s identity.

As for POS intrusions, do we even need to explain?

In the most recent cases of Eddie Bauer and a slew of hotels, including Millenium, Kimpton, HEI and more, once POS malware gets onto the network, it exfiltrates sensitive information, including customer card data, negatively impacting customer loyalty, reputation and company finances, especially once the news hits the media (and it almost always will).

These are just two examples. The breach report also names DDoS attacks, crimeware varieties and web app attacks as some of hackers’ evolving choice methods.

Cybersecurity firm Proofpoint specifically called out ransomware—where your device is locked down, and all of your files are encrypted until you can pay a designated amount of Bitcoin— as the most preferred malware type for cybercriminals in 2016.

As these methods progress, the underground world of cybercrime is becoming more industrialized. Hacker groups see themselves as full-on, functioning businesses. According to the 2016 Symantec Internet Security Threat Report, cybercriminals are forming professional networks and becoming significantly bolder in which targets they pursue… and the amounts of money they seek. The report states:

“Just as legitimate businesses have partners, associates, resellers, and vendors, so do those enterprises operating in the shadows.”

With all of these advancements lurking on the Dark Web, companies need a combination of the best security technologies and defenses to protect their sensitive data and brands. And IT service providers need to make these offerings available to their customers.

The Impact on IT Service Providers

IT service providers that don’t offer information security solutions are leaving clients highly vulnerable to all of the threats we know—and the terrifying amount that we don’t. This vulnerability, if exploited, could greatly impact clients—not only because of the immediate monetary loss in breach damages but because of future profit impact, decrease in customer loyalty and harm to overall brand reputation.

In turn, the IT service provider could also suffer. Most customers understand the risk that cybercriminals pose to their businesses, and they expect the outsourced providers to give them options to protect themselves. If the outsourced provider has access to a customer’s confidential information, and that company is breached, the provider could be hit with some of the financial burden.

In addition, if current and prospective customers find out that the provider is not offering sufficient data security options —they could take their business elsewhere, creating an overall recipe for reputational disaster.

Today, businesses are motivated to consolidate IT service providers to get as many services “under one roof.” The fewer vendors and providers they have to coordinate with and spend money on—the better. And security is top of mind.

CompTIA ran a survey earlier this year called Security in the IT Channel and found that customers are no longer just paying lip service to security—they’re expecting action and offerings along with their other IT services.

The channel firms surveyed said their customers expressed the most interest in firewalls and antivirus, with newly emerging interest in security information and event management (SIEM).

The Solution is in Partnership

It may sound intimidating for the service provider—but there is one way to make filling the information security services gap faster and easier: through partnerships. This approach leads to lower costs, higher profits and more effective solutions, since you’re pairing up with an expert in that security specialty.

If cybercriminals are forming partnerships to advance their ‘business success,’ IT service providers need to do the same with security services firms…so they don’t lose the fight or their customers’ trust.

Netsurion, for example, is partnering with IT service providers to help improve the state of security for businesses—and to help them stay ahead of the most advanced threats. Netsurion's solution partners provide merchants with payment processing and/or merchant technology solutions protected by Netsurion remote-managed network security, secure Wi-Fi and PCI compliance management services.

We are a partner channel-focused company because we realize the best way to safeguard consumers, merchants, and businesses alike is to deliver comprehensive integrated solutions resulting in strong, simple and affordable data security. We’re currently offering a variety of layered solutions, including:

Netsurion’s managed security services are resold by established IT service providers including Resource Point of Sale, CoCard, DCR and POS Solutions.

Take it from our recently announced partners— adding security services to your offerings will only bode well for your business:

“At ReSource Point of Sale, we understand the importance that network security has in the POS industry. As a company whose priority is providing excellent customer service, we know how much our customers will benefit from having the peace of mind that their POS data is secured,” said Nik Parra, CTO, ReSource Point of Sale. “We are excited to partner with Netsurion to strengthen our customers’ networks and continue to excel in the services we provide.”

“CoCard is owned and managed by ISOs for the benefit of the individual ISO. Our mission is to provide a pathway for ISOs and agent resellers to maximize individual business strategies within the payment processing arena and enhance the overall economic return for all members,” said Ray Raya, a vice president at CoCard. “We’re excited to offer Netsurion’s services alongside our own—giving our customers state-of-the-art essentials for merchant processing, security and compliance, all under one roof.”

Interested in learning more about securing your customers? Visit our partner page. 

The Key Difference between “Account Logon” and “Logon/Logoff” Events in the Windows Security Log

An area of audit logging that is often confusing is the difference between two categories in the Windows security log: Account Logon events and Logon/Logoff events.  These two categories are related but distinct, and the similarity in the naming convention contributes to the confusion. That being said, what is the difference between authentication and logon?  In Windows, when you access the computer in front of you or any other Windows computer on the network, you must first authenticate and obtain a logon session for that computer. A logon session has a beginning and end. An Account Logon event  is simply an authentication event, and is a point in time event.  Are authentication events a duplicate of logon events?  No: the reason is because authentication may take place on a different computer than the one into which you are logging.

Workstation Logons

Let’s start with the simplest case.  You are logging onto at the console (aka “interactive logon”) of a standalone workstation (meaning it is not a member of any domain).  The only type of account you can logon with in this case is a local user account defined in Computer Management Local Users and Groups.  You don’t hear the term much anymore but local accounts and SAM accounts are the same thing.  In this case both the authentication and logon occur on the very same computer because you logged on to the local computer using a local account.  Therefore you will see both an Account Logon event (680/4776) and a Logon/Logoff (528/4624) event in its security log.

If the workstation is a member of a domain, at this point it’s possible to authenticate to this computer using a local account or a domain account – or  a domain account from any domain that this domain trusts. When the user logs on with a domain account, since the user specifies a domain account, the local workstation can’t perform the authentication because the account and its password hash aren’t stored locally.  So the workstation must request authentication from a domain controller via Kerberos.  An authentication event (672/4768) is logged on which ever domain controller handles the authentication request from the workstation.  Once the domain controller tells the workstation that the user is authenticated, the workstation proceeds with creating the logon session and a records a logon event (528/4624) in its security log.

What if we logon to the workstation with an account from a trusted domain?  In that case one of the domain controllers in the trusted domain will handle the authentication and log 672/4768 there, with the workstation logging 528/4624 the same as above.

In all such “interactive logons”, during logoff, the workstation will record a “logoff initiated” event (551/4647) followed by the actual logoff event (538/4634).  You can correlate logon and logoff events by Logon ID which is a hexadecimal code that identifies that particular logon session.

Accessing Member Servers

After logging on to a workstation you can typically re-connect to shared folders on a file server.  What gets logged in this case?  Remember, whenever you access a Windows computer you must obtain a logon session – in this case a “network logon” session.  You might assume that the logon session begins when you connect to the share and then ends when you disconnect from it – usually when logging off your local workstation.  Unfortunately this is not the case: Windows servers only keep network logon sessions alive for as long as you have a file open on the server.  This accounts repeated logon/logoff events on Windows file servers by the same user throughout the course of the day.  With network logons, Windows 2003 logs 540 instead of 528 while Windows 2008 logs 4624 for all types of logons.

When you logon at the console of the server the events logged are the same as those with interactive logons at the workstation as described above.  More often though, you logon to a member server via Remote Desktop.  In this case the same 528/4624 event is logged but the logon type indicates a “remote interactive” (aka Remote Desktop) logon.  I’ll explain logon types next.

When looking at logon events we need to consider what type of logon are we dealing with: is this an interactive logon at the console of the sever indicating the user was physically present, or is it a remote desktop logon?  For that matter the logon could be associated with a service starting or a scheduled task kicking off.  In all such cases you will need to look at the Logon Type specified in the logon event 528/540/4624.  A full list of Logon Types is provided at the provided links for those events but in short:

Logon Type

Description

2

Interactive (logon at keyboard and screen of system)

3

Network (i.e. connection to shared folder on this computer from elsewhere on network)

4

Batch (i.e. scheduled task)

5

Service (Service startup)

10

RemoteInteractive (Terminal Services, Remote Desktop or Remote Assistance)

Events at the Domain Controller

When you logon to your workstation or access a shared folder on a file server, you are not “logging onto the domain”. Each Windows computer is responsible for maintaining its own set of active logon sessions and there is no central entity aware of everyone who is logged on somewhere in the domain.  After servicing an authentication request, the domain controller doesn’t maintain information about how you were logging (console, remote desktop, network, etc) or when you logged off.

On domain controllers you often see one or more logon/logoff pairs immediately following authentication events for the same user.  But these logon/logoff events are generated by the group policy client on the local computer retrieving the applicable group policy objects from the domain controller so that policy can be applied for that user.  Then approximately every 90 minutes, Windows refreshes group policy and you see a network logon and logoff on the domain controller again.  These network logon/logoff events are little more than noise.  In forensic situations, they provide an estimate of how long the user was logged on (as long as the user remains logged on group policy will refresh about every 90 minutes), and can help to infer that the preceding authentication events for the same user were in conjunction with an interactive or remote desktop logon as opposed to a service or scheduled task logon.

What about the other service ticket related events seen on the domain controller? Basically, after your initial authentication to the domain controller which logs log 672/4768 you also obtain a service ticket (673, 4769) for every computer you logon to including your workstation, the domain controller itself for the purpose of group policy and any member servers such as in connection with shared folder access.  Then as computers remain up and running and users remain logged on, tickets expire and have to be renewed which all generate further Account Logon events on the domain controller.

The Facts: Good, Bad and Ugly

Both the Account Logon and Logon/Logoff categories provide needed information and are not fungible:  both are distinct and necessary.  Here are some important facts to understand, and accept about authentication and logon/logoff events.

  1. To determine definitely how a user logged on you have find the logon event on the computer where the account logged on.  You can only make some tenuous inferences about logon type by looking at the domain controller and that requires analyzing multiple events.
  2. To determine when a user logged off you have to go to the workstation and find the “user initiated logoff” event (551/4647).
  3. To correlate authentication events on a domain controller with the corresponding logon events on a workstation or member server there is no “hard’ correlation code shared between the events.  Folks at Microsoft have suggested the Logon GUID field in these events would provide that but my research and experiments indicate that unfortunately the GUIDs are either not supplied or do not match.  So to make that correlation you basically have to dead reckon based on time, computer names and user account names.
  4. Account Logon events on domain controllers are great because they allow you to see all authentication activity (successful or failed) for all domain accounts.  Remember that you need to analyze the security logs of all your domain controllers – security logs are not replicated between DCs.
  5. Account Logon events on workstations and member servers are great because they allow you to easily pick out use of or attacks against local accounts on those computers.  You should be interested in that because using local accounts is bad practice and bad guys know they tend to be more vulnerable than domain accounts.  But, you don’t have to use Account Logon to detect logon attempts on local accounts; you can use Logon/Logoff events if you know what you are doing.  When viewing a Logon/Logoff event compare the domain name in the event details to the computer name that generated the event; if they match you are looking at a local account logon attempt – otherwise the domain name field with reflect some domain.  So can you survive with only enabling Logon/Logoff events on member servers and workstations?  I suppose so.
  6. Logon/Logoff events are a huge source of noise on domain controllers because every computer and every user must frequently refresh group policy.  If you disable this category on domain controllers what will you lose?  You will lose some visibility into logons at the domain controller itself such as when an admin logs on at the console, via remote desktop or a service or scheduled task starts up.  In all cases Account Logon events will still be logged but see points 1 and 2 above.
  7. Successful network logon and logoff events are little more than “noise “on domain controllers and member servers because of the amount of information logged and tracked.  Unfortunately you can’t just disable successful network logon/logoff events without also losing other logon/logoff events for interactive, remote desktop, etc.  Noise can’t be configured out of the Windows security log; that’s the job of your log management / SIEM solution.

Account Logon (i.e. authentication) and Logon/Logoff events.  All things considered, I’d like to see both categories enabled on all computers ideally.  I haven’t seen these events create a noticeable impact on the server but the amount of log data might exceed your log management / SIEM solution’s current capacity.  If you can’t afford to collect workstation logs, I still suggest enabling these 2 categories on workstations and letting the log automatically wrap after reaching 100MB or so.  Chances are the data will be there if you need it for forensic purposes.

Should I be doing EDR? Why isn’t anti-virus enough anymore?

Detecting virus signatures is so last year. Creating a virus with a unique signature or hash is quite literally child’s play, and most anti-virus products catch just a few percent of the malware that is active these days. You need better tools, called endpoint detection and response (EDR), such as those that integrate with SIEMs, that can recognize errant behavior and remediate endpoints quickly.

The issue is that hackers are getting better at covering their tracks, and leaving very few footprints of their dastardly deeds.

I like to think about EDR products in terms of hunting and gathering. Most traditional endpoint products that come from the anti-malware heritage are gatherers: they are used to collect malware that they can identify, based on some known patterns. That works well in the era when writing malware was a black art that had specialized skills and tools. Now there are ready-made exploit kits, such as Angler and tools called packers and crypters. These have made it so easy to produce custom malware that the average teen can do it with a Web browser and little programming knowledge.

But gathering is just one part of the ideal EDR product: they also need to be hunters too. They should be able to find that proverbial needle in the haystack, especially when you don’t even know what a needle looks like, except that it is sharp and can hurt you. The ideal hunter should be able to track down malware based on a series of unfortunate events, by observing behaviors such as making changes to the Windows registry, dropping a command shell remotely or from within a browser session, or by inserting an infected PDF document. While some “normal” apps exhibit these activities, most don’t. For example, some EDR products can track privilege escalation and credential spoofing, common activities of many hackers today that like to gain access to your network from a formerly trusted endpoint and use it as a base of operations to collect and export confidential data. To block this kind of behavior, today’s tools need to map the internal or lateral network movement so you can track down what PCs were compromised and neutralize them before your entire network falls into the wrong hands.

Part of the hunting experience is also being able to record what is happening to your network so you can go to the “videotape” playback function and see when something entered your environment and what endpoints it has infected. From there you should be able to isolate and remediate your PCs and return them to an uninfected state. Some EDR products offer a special kind of isolation feature that basically turns their network connection off, except for communicating back to the central monitoring console. That is a pretty nifty feature.

Finally, an EDR product should be able to use big data techniques to visualize trends and block potential attacks. Another aspect of this is to integrate with a variety of security event feeds and intelligence from Internet sources such as VirusTotal.com. You might as well leverage what researchers around the world already know and have already seen in the wild. Microsoft has jumped into this arena with their Windows Defender Advanced Threat Protection. Announced at the RSA show in March, it will be slowly rolled out to all Windows 10 users (whether they want it or not) thanks to Windows Update.  Basically what Microsoft is doing is turning every Windows 10 endpoint into a sensor with this tool, and sending this information to its cloud-based detection service called Security Graph. Other EDR vendors do similar things with their endpoint agents.

When you go shopping for an EDR product, ask your vendor these questions:

EventTracker offers EDR functionality within its SIEM platform. You can learn more about it here.

Lumifi Acquires Castra to Deliver Next-Generation Managed Detection and Response

Chapel Hill, NC and Scottsdale, AZ  —  October 4, 2023  —  Lumifi’s recent acquisition of Castra Managed Services aims to expand its capabilities and reinforce its commitment to the Gartner Visibility triad. With Castra’s expertise in Exabeam, the SIEM capabilities will reach new heights.

Lumfi®, a leading innovator in managed detection and response (MDR), proudly announced its acquisition of Castra Managed Security. Castra is a revered enterprise-level MDR firm specializing in Exabeam, a security information and event management (SIEM) platform.

The partnership between Lumifi and Castra amplifies the Gartner SOC Visibility Triad, enhancing visibility through combined expertise in network detection and response (NDR), endpoint detection and response (EDR,) and SIEM within their security operations centers. This collaboration powers a 24/7/365 cutting-edge Security Operations Center (SOC), merging Lumifi’s innovative ShieldVision™ software with Castra’s distinguished MDR services. ShieldVision ™ an advanced multi-tenant platform that excels in threat hunting, detection, and swift automated responses. At the same time, Castra’s expertise in the Exabeam infrastructure ensures top-tier security at cost-effective rates for businesses of all scales.

Grant Leonard, co-founder of Castra, emphasized the value of partnerships, saying, ” I am excited about the immediate synergies between Lumifi and Castra. We are excited to bring honed Castra services to a much larger audience and scale.” 

David Norlin, CISO of Lumifi, expressed his enthusiasm for the partnership, stating, “We’re thrilled to join forces with Castra. This collaboration strengthens our SIEM capabilities, offering our clients more choices and control in designing their security architectures. We remain committed to providing diverse technological options that guarantee unparalleled service quality, and the Castra acquisition exemplifies this commitment.” 

Tony Simone, co-founder of Castra, emphasized the value of partnerships, saying, “Castra’s journey has been about forging valuable collaborations. Our partnership with Lumifi allows companies to elevate their SIEM capabilities and adopt next-generation programs, enabling security leaders to enhance their infrastructure while aligning with their business objectives.” 

Michael Malone, CEO of Lumifi, highlighted the broader impact of the collaboration, stating, ” With the escalating threats across all areas of cybersecurity, many companies find themselves vulnerable. Partnering with Castra is a decisive step, leveraging our recent growth capital to realize our broader vision. Together, we’re bridging the cybersecurity skills gap, ensuring businesses are fortified against the diverse and evolving threats of today.” 

To provide peace of mind against the latest cyber threats, Lumifi offers a turn-key cybersecurity monitoring and management solution at an affordable monthly price. This solution delivers advanced levels of security to businesses of all sizes across regulated industries, including energy, manufacturing, healthcare, finance, and more.

About Lumifi:

Lumifi is a leading provider of managed detection and response (MDR) services, offering Fortune 500-level security solutions to support security-conscious teams. Their approach integrates system, network, and device monitoring with human expertise, following the Gartner Visibility Triad principles, to create a robust protective shield for businesses of all sizes. Lumifi’s exclusive software, ShieldVision™, delivers state-of-the-art attack simulation, automated remediation, and continuous threat monitoring. This advanced security framework is monitored around the clock by a team of US-based cybersecurity analysts and former military and DoD experts, ensuring businesses are always secure. To discover how Lumifi can safeguard your business, visit lumificyber.com.

About Castra Managed Services:

Since its inception in 2012 by co-founders Tony Simone and Grant Leonard, Castra has been a beacon in managed detection and response services, serving over 2000 organizations globally. This year, Castra ranked 104th on the top 250 global MSSP/MDR list, marking its 3rd appearance on the prestigious list. Additionally, Castra secured the second spot in the “fast-growth” top 150 from CRN and received multiple “Partner of the Year” awards from Exabeam. With unmatched SIEM and SOAR expertise, Castra ensures customers maintain a security edge without compromising transparency. Catering to a diverse clientele—from Fortune 50 giants to nimble startups—Castra’s services span various industries. Learn more at castra.io.

For press inquiries, contact: 

Brittany Kent

Growth Marketing Lead

Lumifi

Email: [email protected] 

No Business is Too Small for Hackers!

It's National Small Business Week! Let's celebrate the hard work you do and make sure your business continues to grow.

Have you ever thought about what would happen if your business is affected by a data breach?

We constantly hear in the news about well-known brands being breached. You watch the news and you may think to yourself “Oh that would never happen to me… The big guys are the easy targets for hackers.”

In a way, hackers do love going after “The Big Guys” since the bigger the company, the more credit card information they have, hence more money for the hackers to go after.

The reality is that the easiest targets for hackers are small businesses.

Big corporate brands have a whole IT team working to make their networks secure, so it makes it much harder for a hacker. Yet, as we have seen, many times they still manage to get in.

So imagine just how quickly a hacker can get into multiple networks of small businesses since small businesses tend to not have an IT staff monitoring their network activity.

Easy target, right?

Do you ever hear the news about the small restaurant down the street that got breached?

Not really, but just because it isn’t front page worthy does not mean that small businesses aren’t getting breached as well. They are just not making the headlines in the news.

The sad truth is that a breach will hurt a small business and its reputation.

According to First Data Market Insight, $36,000 is the average cost of a data breach for small businesses.

Could you imagine the effects that it will take on your profits? What about your customers?

You may not make it in the news, but your customers will find out. On top of the costs of a data breach, your regular customers may stop shopping or dining at your store or restaurant.

In fact, 31% of customers have terminated their relationship with a business after being breached.

Check out the following measures you must take to prevent a data breach.

Here’s a little more explanation on each:

Sounds like adding a lot more duties on your plate?

Luckily, you can always outsource these duties to a specialized team whose main job is pretty much all of the above and more.

The cost of a data breach will always be higher than the cost of protecting your business. When it comes to protecting your business, Netsurion knows that many small businesses do not have the IT staff needed to make sure your network is secure.

Hence, we take care of security, so you can take care of your business and customers.

IT Community Shaken By Shellshock Vulnerabilities

In the wake of Heartbleed, comes a new form of exposure that could potentially do much more damage than any other vulnerability of its kind.

SHELLSHOCKED

It is known as Shellshock. Shellshock affects Linux and UNIX implementations that use the BASH command interpreter.

The fix for the issue is simple. Upgrade your version of BASH to one that is not vulnerable. The problem lies in the sheer number of servers, workstations, and devices that have this issue.

For years, due to stability, inherent security, and cost factors, Linux (and its variants) have been the most widely deployed Internet and backbone systems in the world. In other words, the servers and purpose built appliances that run the websites and route traffic on the Internet potentially have this vulnerability. Shellshock simply tricks the BASH command interpreter to execute unauthorized commands when it encounters what it believes is a variable.

The patches to fix this are readily available, but the number of systems involved with this upgrade are mind boggling. Across the world, it is estimated that millions of servers and other equipment must be patched, and that is only referring to the core systems that manage and control the Internet.

Who Else Is At Risk?

On top of these systems come the workstations and purpose built appliances that are based on Linux.

Many home automation controls use a version of Linux as well as household electronics such as cable boxes and DVD players. Every one of them could be affected by Shellshock, meaning a hacker could cause anything from disruption in services to potential infiltrating your home network and stealing personal information.

As if the previous 2 scenarios were not enough, many Apple products that run iOS have this vulnerability as well. Therefore, iPhones and iPads are not exempt from the issue either. Usually, you can depend on the security of these devices, but this time, it is the underlying operating system that is at risk.

Luckily, a security update / patch is all that is needed to properly protect against this issue. But the real question on people’s mind is whether or not we will find any other rampant security flaw in Linux or UNIX.

How To Protect Yourself

Here at Netsurion, our customers can rest assured that our security devices are not susceptible to Shellshock, while other firewalls are. It is, therefore, critical to look to your vendor, if you do not use Netsurion, to ensure that your systems have been updated properly.

Like Heartbleed, Shellshock reminds us that security is an ongoing process. Updates and patches are part of any good security program, and the longer you allow yourself to fall behind in the update process, the more you could be leaving your systems exposed to serious security threats.

Key Takeaways from MITRE ATT&CKcon 3.0 for Defenders

MITRE ATT&CKcon 3.0, the conference dedicated to the ATT&CK community, returned at MITRE headquarters in Virginia last month. As a refresher, MITRE ATT&CK® is a knowledge base of adversary tactics and techniques based on real-world observations.

In this article, I’m excited to share insights that I gathered from both speakers and conversations with global defenders at ATT&CKcon 3.0. These insights are about community involvement, tailoring cybersecurity data to the right audience, linking disparate events together to accelerate identification, and capitalizing on the untapped opportunity to educate small-to-medium-sized businesses (SMBs).

1. Community Involvement with MITRE ATT&CK Remains Strong

The ATT&CK community has formed to discuss, exchange, and improve the use of adversarial tactics, techniques, and procedures (TTPs) in practical use cases. The record-high 155 global submissions and contributions made to ATT&CK last year exemplify how the community is committed to cybersecurity threat sharing and analysis. In turn, MITRE enhanced the ATT&CK framework by adding coverage for areas such as cloud and Industrial Control Systems (ICS).   

img attackcon1

This vendor-neutral collaboration continues to evolve in the ever-changing threat landscape. Enterprises and government entities continue to learn about ATT&CK and are in various stages of adoption and day-to-day utilization.

2. Lead with the Data and User Stories

ATT&CKcon 3.0 speakers highlighted lessons learned in communicating with data. It’s crucial to tailor technical content and messaging to each audience, such as conveying risk and outcomes to executives and more operational details to technical professionals. Many presenters took their own advice and put the bottom-line up front (BLUF) in a concise summary. Avoid the HiPPO effect where a High Paid Person’s Opinion (HiPPO) weighs more than data and facts in driving cybersecurity decisions. Finally, research has shown that human beings relate to and recall more when storytelling and emotion are used in communication, so work to weave in use cases and examples where feasible.

img technical comm1

3. Optimize Analyst Efficiency with a Threat-Informed Defense

Many red team analysts and threat hunters experience alert fatigue in dealing with today’s expanding volume of cybersecurity alerts. Limited context and threat enrichment make it challenging to distill actual adversary actions and outcomes. Presenters at the ATT&CK conference spoke about threat-informed defense and risk-based alerting to better prioritize and correlate insights. Connecting the dots on seemingly unrelated or innocuous security events in your environment, especially using ATT&CK tactics and techniques, enables faster incident response. Risk prioritization and threat automation also improve Security Operations Center (SOC) analyst efficiency and effectiveness in a world of limited resources.

4. Cybersecurity is Human-centric Security

Over three million unfilled cybersecurity job openings necessitate even smarter cyber threat detection and incident prioritization to enhance the efficiency and effectiveness of limited resources. There is no silver bullet in cybersecurity; it takes a balance of people, process, and technology. Devices alone are insufficient to create actionable threat intelligence. It requires hands-on expertise from humans in the form of SOC analysts, threat intelligence analysts, and threat hunters.

Cybersecurity teams are spread thin, so it’s even more crucial to automate routine tasks and prioritize how human experts, like SOC analysts, can address more stealthy and dangerous threats. The TTPs of ATT&CK enable smaller teams with finite staff and expertise to understand adversaries and better defend themselves. On a different note, it was encouraging to meet the all-female team of cyber analysts from Temple University who presented at ATT&CK regarding how students map social engineering techniques to the ATT&CK matrix. For many of us, myself included, it was the first face-to-face conference and training attended in more than 20 months. With in-person attendance limited, the ATT&CK team plans to post all the conference’s video presentations online.

5. Continue to Educate SMBs  

Larger organizations and vendors were first to embrace ATT&CK and integrate it into their tech stack and product portfolios. It was exciting to see ATT&CK users and presenters sharing insights and collaborating for a more robust global defense. But with over 80 percent of organizations deemed SMBs, it’s crucial that they be educated and involved in adopting the standard terminology and TTPs. As a master Managed Security Service Provider (MSSP), Netsurion is focused on arming IT service providers and end customers with up-to-date means to defend against advanced persistent threats.

Final Thoughts for Optimizing Cybersecurity

Whether you are just starting your cybersecurity career or looking to enhance your capabilities and efficiencies, the ATT&CK framework improves outcomes and fosters information sharing. It also simplifies Cybersecurity Threat Intelligence (CTI) for global defenders, collecting and analyzing current and future attacks to enhance decision making. We have led the way with ATT&CK’s integration in Netsurion’s Managed Threat Protection solution to help organizations of all sizes better prepare for today’s advanced cyber criminals.

There Is No Honor Among Thieves – Target Could Take Advantage of This

For the past several months, there have been numerous stories about major retailers that have been breached by hackers. The result is that millions of credit cards have been stolen.

In the case of Target, so far it is reported that 40 Million customer credit cards have been exposed, and 70 Million total records with personal information have been stolen. The customers who are affected in such a breach feel let down by the merchants who lost their data, and the merchants feel like victims because thieves stole data from them, but they are being blamed.

So what happens after the breach is announced?

Inevitably, a big retailer like Target makes some generic announcement talking about the efforts they are making to boost their security, and usually some kind of free credit monitoring service is offered.

In the case of Target, the website that was supposed to handle this service was so inundated by requests, that for several days, it was nearly impossible for their customer to sign up. This caused quiet a negative rash of social media backlash, and people in general seemed dissatisfied with Target’s response.

Compounding the issue is the fact that Target is facing huge lawsuits, so it is obvious that every announcement is being screened by both public relations personnel and their legal team.

What is Target to do?

I propose that Target and other large retailers who have been victimized use their capital resources to greater effect. Not only can they win back the hearts and minds of their customers who have had their credit cards stolen, but they will also cause other hackers to pause before attempting something as brash as stealing 40 Million credit cards.

Think about what would happen if Target offered $1 Million to anyone who provides information that leads to the arrest and conviction of the party (or parties) who were responsible for the breach.

When hackers launch attacks of this nature, rarely can they do it without assistance from multiple sources who have specific knowledge or skills as it relates to security. Programmers for example rarely also have skills to penetrate firewalls. Therefore, a team of people is usually assembled to pull off a major breach like the one that happened at Target. The thing is, groups of people rarely have the ability to keep everyone completely silent.

Also, this culture is ruled by the almighty dollar, and $1 Million is enough of a reward, that if someone let critical information out, it is likely the person they told would be swayed to turn them in rather than keep their confidence. Despite the old saying, there really is no honor among thieves, and it has been our experience that they will turn on each other when a profit is to be made.

Of course, it is easy from our perspective to spend Target’s money for them, and they have teams of people whose job it is to monitor and improve their image.

On the other hand, if you saw a full-page ad this weekend in the Wall Street Journal announcing that Target was offering this reward to help catch the thieves who have caused them so much trouble, would your opinion of the brand go up? Especially if Target went on a campaign talking about how we are all victims.

The idea would be that Target would spend its money to bring the criminals to justice so that we can all sleep better at night. Maybe it would have no affect, but the people we have polled thought that it would do wonders for Target’s image. All retailers might want to consider this kind of response instead of hiding behind a legal barricade.

It’s just a thought, but remember, ID theft is an attack that people take personally, so showing victims something that makes them feel better is the first step to helping them move on.

Top 3 Microsoft 365 Security Concerns and What to do About Them

Microsoft 365 is immensely popular across all industry verticals in the small-to-medium-sized business (SMB) space. It is often the killer app for a business and contains valuable, critical information about the business. Accordingly, Microsoft 365 resiliency and defense are top concerns on IT leader’s minds.

Is Microsoft 365 defense totally up to the vendor, Microsoft, and the user has no responsibility? Hardly. Microsoft is merely providing the software-as-a-service, hosted on their infrastructure. While they do have some responsibility for securing the infrastructure and keeping the application up to date, you are the admin and it’s your data; therefore it is your responsibility to secure your tenant.

While the motivations and capabilities of attackers vary widely, most attacks still follow a common process, a basic pattern, and proceed from one step to the next to achieve the desired outcomes. This step-wise process can be defended against by focusing defense measures on choke points in the chain. Of course, any step can be bypassed through exploit technologies, so the best strategies apply defenses at every step along the threat chain that is shown below.

Cyber Kill

Concern 1: Data Exfiltration

Microsoft 365 encompasses many different types of data including: Email, documents, Teams converations and SharePoint data. In fact, even breaching your Active Directory information can be useful to an attacker. Data can be stolen in any number of ways, including through a breach of an account with access to the data, or through system and infrastructure attacks that give them local or system admin privileges to computers that store the data outside of Microsoft 365. Why would cyber criminals want to do this? Many reasons such as the theft of intellectual property, the desire to blackmail you, the intention to sell your data on the black market, or to use the data to further entrench themselves in your systems.

Prevention: Focus on not just the data, but also the accounts needed to access the data. Enforce least privilege, establish access control lists, define external sharing policies, and use data classification schemes to identify high risk data.

Detection: Finding a breach is complicated because it is difficult to distinguish normal usage from abnormal usage patterns, especially since the data will most likely be accessed with an account that has the needed privileges. Out-of-ordinary behavior detection within Security Information and Event Management (SIEM), platforms are useful in such cases. Especially when reviewed by experienced eyes to catch anomalous interactions with data, especially for large downloads. Conversely, attackers can also use a “low and slow” approach to avoid detection and remove data slowly, especially if they are knowledgeable insiders.

Remediation: This is the hardest attack scenario to fix because the cat is already out of the bag. Two things to focus on

Concern 2: Privilege escalation and lateral movement

The attacker has managed to compromise one or more accounts in your tenancy and is now working towards global administrator privileges.

Prevention: Make your global administrator community small; a minimum of two and a maximum of five for any size of tenant. Require multi-factor authentication (MFA) for global administrators, and regularly review activity of such users.

Detection: The key here is to monitor activity. This type of attack causes anomalous activity that deviates from a well-understood baseline.

Remediation: Enable multi-factor authentication. Examine everything that the attacker has done to your data and what they have done to further entrench themselves in your tenancy. Look for new accounts that have had recent changes (such as promotion to tenant admin), global configuration changes, and every interaction with data from the affected accounts.

Concern 3: Account compromise

An account in your Microsoft 365 tenant is breached such that it can be used by an attacker to interact with either resources in Microsoft 365, or with your on-premises infrastructure. There are a variety of ways that this can happen including spear phishing for credentials with harvesting websites, or spear phishing with malware to install rootkits and keyloggers.

Prevention: Use high quality authentication mechanisms such as passwords and MFA. Monitor for multiple failed logon attempts.

Detection: The key to an effective account breach detection is understanding what a normal pattern of activity looks like for your users. There are several features that exist in the activity data that you can use to find illicit or anomalous activity. For example, the data includes the following: IP addresses (which can be correlated to geographies), date and time, the specific action performed, and user agent.

Remediation: Enabling Multi-Factor Authentication (MFA) is a common, and powerful, remediation to keep the account safe after it has been breached. Monitor the account for a period of time to ensure it hasn’t been re-breached.

While Microsoft has provided guidelines on how a user should secure their Microsoft 365 tenant, making sure everything is secure and remains secure can become complicated and is time consuming. Looking for IT and cybersecurity simplicity? We make securing Microsoft 365 and your systems easier by providing predefined reports, dashboards, and alerts via the Netsurion Managed Threat Protection solution. The service is backed by a 24/7 Security Operations Center (SOC) to be ever vigilant.

Demystifying PCI Compliance

PCI compliance: that daunting phrase you always hear in the world of payments…but never truly understand.

We’re here to sum it up for you—what it is, why it’s important and what you need to meet this standard.

With this blog, we hope to demystify the concept, so you can take the necessary steps to keep your payment card data secure—and your customers feeling confident in your brand.

What is PCI compliance… and who does it apply to?

As the Payment Card Industry (PCI) rapidly expanded, the Payment Card Industry Security Standards Council (PCI SSC) developed a set of requirements called the Payment Card Industry Data Security Standard (PCI DSS). These specifications ensure that all companies that process, store or transmit credit card information maintain a secure environment.

PCI applies to all organizations or merchants that accept, transmit or store cardholder data, regardless of size or number of transactions.

This means restaurants, retailers, hotels, doctors’ and lawyers’ offices—and much, much more—all need to stay on top of their compliance statuses.

What are the benefits of PCI compliance?

Complying with the standard means your company’s systems are secure, and perhaps most importantly, that your customers can trust you when they hand over their sensitive payment card data.

Customers that feel confident in your security are more likely to be loyal, repeat customers and may recommend you to others in the long run. Not to mention that it improves your reputation with the partners you need to do business—the acquirers and payment brands.

Compliance also offers indirect benefits—for example, through your efforts to comply with PCI-DSS, you’ll likely be better prepared to comply with other relevant regulations like HIPAA or SOX.

It will also be a solid basis for a corporate security strategy and will help you identify ways to improve the overall efficiency of your IT infrastructure.

What are the consequences if I don’t meet the PCI DSS?

If you fall out of compliance—or are not compliant from the start—it could lead to disastrous consequences.

If your business experiences a financial data breach, your customers, your business success and reputation, and the associated financial institutions might all be negatively impacted.

Just one incident can severely damage your reputation and your ability to conduct business effectively, far into the future. Account data breaches can lead to catastrophic loss of sales, relationships and good standing in your community, and depressed share price if it’s a public company.

Possible negative consequences also include lawsuits, insurance claims, cancelled accounts, payment card issuer fines and government fines.

Read more about The Impact of a Data Breach.

How to become PCI compliant...and retain that compliance.

Well, becoming and staying PCI compliant is not easy, but it’s certainly achievable.

Compliance is an ongoing process, not a one-time event. But there’s a major benefit to all of that work. It helps prevent security breaches and theft of payment card data, not just today, but in the future.

As data compromise becomes ever more sophisticated, it becomes more difficult for an individual merchant to stay ahead of the threats. The PCI Security Standards Council is constantly working to monitor threats and improve the industry’s means of dealing with them through enhancements to PCI Security Standards and by the training of security professionals.

When you stay compliant, you are part of the solution—a united, global response to fighting payment card data compromise

Take a look at the following PCI questions. This list of questions is by no means complete, but we can guarantee that if you answer “no” to even one of the following questions, then you are not PCI compliant:

How did you do? To supplement our recommendations, here is a full PCI compliance checklist from the PCI Security Standards Council.

Can you check off all of these PCI DSS requirements?

  1. Install and maintain a firewall configuration to protect cardholder data.
  2. Do not use vendor-supplied defaults for system passwords and other security parameters.
  3. Protect stored cardholder data.
  4. Encrypt transmission of cardholder data across open, public networks.
  5. Protect all systems against malware and regularly update anti-virus software or programs.
  6. Develop and maintain secure systems and applications.
  7. Restrict access to cardholder data by business need to know.
  8. Identify and authenticate access to system components.
  9. Restrict physical access to cardholder data.
  10. Track and monitor all access to network resources and cardholder data.
  11. Regularly test security systems and processes.
  12. Maintain a policy that addresses information security for all personnel.
  13. Additional PCI DSS Requirements for Entities using SSL/early TLS.

Need help with PCI compliance?

No worries, here’s how Lumifi can help!

We’ve been helping merchants with PCI compliance since its inception by providing affordable systems and services that make compliance easy and efficient.

Your focus should remain on running your business, not worrying about the status of your compliance. That’s why Netsurion helps you get compliant through enterprise-class firewalls with best-in-class security architecture, helping you stay compliant with efficient internal and external network scanning and online training.

We can also help you conveniently report your compliance with our PCI Compliance Management portal.

EventTracker Enterprise and the Cyber Kill Chain

The Cyber Kill Chain model by Lockheed Martin describes how attackers use the cycle of compromise, persistence and ex filtration against an organization. Defense strategies that focus exclusively on the perimeter and on prevention do not take into account the kill chain life cycle approach; this is a reason why attackers are continuing to be so successful. Defending against persistent and advanced threats requires methods that detect and deny threats at each stage of the kill chain.

Focusing on perimeter defenses gives the appearance of concentrating resources on the most exposed assets and attack vectors. This thinking means the attacker needs to be successful only once out of an unlimited number of attempts. Defenders, conversely, must be right every time. This is not only wrong but also untenable. Just because there has been a successful malware infection or SQL injection attack against your network, it does not follow that the attacker has won and you have lost. The kill chain highlights that this is clearly not the case, because the attacker wins only when all phases of the Cyber Kill Chain have been executed successfully. A successful attack is an end-to-end process and described as a “chain” because an interruption at any stage can interrupt the entire attack. This turns the burden on the attacker who must now succeed at each and every step whereas a defender must succeed at only on step.

The EventTracker Enterprise solution is a mix of technology, skilled experts and process discipline designed to address defense across the entire cyber kill chain. Here’s how EventTracker Enterprise maps to the Cyber Kill Chain.

Recon  Defined as identification, target selection, organization details, information on technology choices. EventTracker Enterprise detects attempts by receiving and analyzing Web server logs, performing vulnerability scan, external penetration testing, all integrated with local, global and community threat intelligence. Our EventTracker Honeynet offering is designed to deceive attackers and expose them by their actions rather than by reputation (which is too often neutral).

Deliver  Transmission of the malware is initiated by either the target (users browse to a malicious Web presence, leading to the dropping of malware, or they open a malicious PDF file) or by the attacker (SQL injection or network service exploitation). EventTracker Enterprise provides security analytics and network behavioral analysis integrated with threat intelligence to detect such attempts.

Exploit  After delivery to the user or endpoint, malware will gain a foothold by exploiting a known vulnerability. Sadly it is most likely that a patch has been available for months or years but not implemented. The EventTracker Enterprise vulnerability Management service provides a managed service to systematically discover vulnerabilities and make it easier to remediate them thereby reducing the attack surface.

Install  Usually this is a remote-access trojan (RAT), stealthy in its operation, allowing persistence or “dwell time” to be achieved. The attacker seeks to control this without alerting the defenders. EventTracker Enterprise technology includes Endpoint Threat Detection features which catches threats that evade the signature based anti virus. The Change Audit (aka FIM) feature tracks file changes at endpoints and is a robust technique to detect unwanted installation.

C&C  Now that the attacker has control of assets inside the network, using methods such as DNS, Internet Control Message Protocol (ICMP), websites he tells the controlled “asset” what to do next and what information to gather. A staging host is identified to which all internal data is copied, and then compressed and/or encrypted and made ready for exfiltration. EventTracker Enterprise can detect such activities by analysis of DNS activity, file integrity monitoring and network traffic analysis all integrated with IP reputation intelligence.

Exfiltrate – In this final phase the attacker exfiltrates data and maintains dwell time in the network and then takes measures to identify more targets, expand their footprint. After the compromise, subsequent attack activity is performed as internal user. EventTracker Enterprise activity monitoring function performs continuous monitoring to identify out of ordinary user access to data, including frequency, times of day and from locations previously unseen. Network behavioral analysis highlight devices that are moving data around that is not part of its role (traffic to hosts that stand out), an exceedingly high volume of DNS traffic to an external DNS server that is not defined for external host name resolution, traffic protocols being actively used that are against policy or trusted user attempting clearly malicious activity such as an FTP session to an unexpected destination.

Defending a network in today’s threat landscape requires a blend of technology, expertise and process discipline. EventTracker Enterprise can help at an attractive price point.

What tools are hackers using to access businesses’ networks?

Highlights from the 2016 Verizon Breach Investigations Report (Part 2 of 3)

On our previous post regarding what puts a business at risk of a data breach, we showed you that regardless of the business’ size, location or industry, many of them are targets to hackers.

So how are hackers getting into these businesses’ networks and stealing data?

There are 3 items to focus on before we speak about the type of incidents that lead to a breach: vulnerabilities, phishing and credentials.

It is important to understand what these 3 items mean as they are usually present in many of the attacks that are classified as breaches in the Data Breach Investigation Report.

With that said, let’s dig into the some of the patterns on the DBIR that caused breaches in 2015:

These are only a few ways a hacker can access a business’ data. We have provided a few of the patterns explained in the DBIR, however, businesses must understand that these can be prevented with the correct team and procedure in place.

Next week, we will discuss solutions that a business can do to prevent each of these threats.

It is important to keep in mind, that if a business does not have the IT staff to fully manage a network, a third party with experience can always help. Let our team give you a hand! At Netsurion, we have years of experience in managing network security to prevent any of the incidents explained earlier.

Security Logging as a Detective and Deterrent Control Against Rogue Admins

Intrusion detection and compliance are the focus of log management, SIEM and security logging.  But security logs, when managed correctly are also the only control over rogue admins.  Once root or admin authority has been given to, or acquired by, a user, there is little they cannot do:  with admin authority, they can circumvent access or authorization controls by changing settings or using tools to leverage their root access to tamper with the internals of the operating system.

Audit logs, when properly managed, can serve as a control and deterrent against the privileged super user’s authority. Simply enabling auditing and deploying a log management solution may not suffice; to really be a deterrent, the audit log must be protected from deletion or tampering by rogue admins.

First and foremost, log data must be moved as frequently as possible from the system where it is generated to separate secure log repository.  Today’s enterprise log management solutions do a great job of frequent log collection and long term archiving.  However, who has privileged access to the log management solution and the systems on which it runs?

A log management process is not an effective control if administrators have privileged access to the log management components.  Though administrators should not be denied access to run reports, configure alerts or research logs, privileged access to the log management solution that allows someone to disable, erase or otherwise compromise the integrity of the log collection and archival process should be carefully managed.

A log management solution cannot serve as a deterrent over administrators who have privileged access at the application level or any of the infrastructure components on which it runs.  This includes:

And if the log management application or any of the above components run inside a virtual machine this also includes:

Physical access to any of these components could potentially allow administrators to compromise the integrity of the audit trail.  To the extent possible, the log management solution should run on a completely separate infrastructure.

Remember such separation is a protection against not just internal rogue admins but outsiders who succeed in obtaining privileged access.  Typically the larger the organization, the more important and practical it is to achieve maximum separation between the log management solution and the environment it monitors.

Beyond hardware and software separation, the log management application, database servers, storage, OS and other components also need careful management. Larger organizations generally have dedicated information security teams, and usually within that group is someone responsible for the audit log management process.  For full accountability and separation of duty, that team should have no privileged access to production business systems monitored by the log management process.  Ideally that group would provide the oversight necessary for all components in the log management solution and supervise any action that touches the audit log to insure its integrity and prevent the introduction of backdoors into the system.

There are a host of reasons why even “supervised access” can be compromised:  staff in smaller IT shops aren’t always able to specialize so the possibility for separation of skills and duties may not exist. When an in-house log management system can’t be physically and logically separated, log management as a service may be an alternative to consider.  With cloud-based log management, the entire system is controlled by a professional service team at a separate site. Services can be set up with role-based access control so the ability to erase audit logs is controlled.  If organizations can overcome the frequent pushback to sending audit logs to the cloud, full isolation and integrity of log data can be achieved without building a separate log management system, and without the requirement of expertise for audit log management.

Whether an organization goes with an in-house audit log management or turns to the cloud-based service, it should carefully assess its choices in architecture and administrative responsibility. When the worst happens, audit logs may be the only deterrent and detective control over rogue admins.  Are they secure?

Criminal Gang NOBELIUM Ramps Up Attacks

Threat researchers detected threat group NOBELIUM conducting several waves of malicious spear phishing email campaigns. Each wave used different technical lures and social engineering to fine-tune which threat performed best against targeted government agencies, consultants, and non-profits in over 20 countries.

What’s at Risk

This most recent spear phishing campaign is attributed to NOBELIUM, the threat group believed responsible for the wide-scale SolarWinds Orion attack. Also known as Cozy Bear and APT29, NOBELIUM demonstrates their stealth and ability to adapt their cyber criminal techniques to evade detection. NOBELIUM phishing emails contain malware that could inflict damage by:

Mitigation Requires Vigilance

Modern threats require organizations to PREVENT, DETECT, and RESPOND to active threats and even PREDICT future attacks before they happen. Effective cybersecurity mitigation uses multiple layers of security controls that combine people, process, and technology.

Nobelium

Cyber attacks have become more sophisticated as technology has become more pervasive and complex. Cyber criminals often tailor their malicious attacks and techniques to specific business victims because the payout outweighs the time spent. Boost your organizational security by taking these recommended steps to reduce NOBELIUM’s impact:

  1. Implement deep learning to stop attacks before they do damage
  2. Monitor your infrastructure and sensitive data 24/7 with cybersecurity experts
  3. Augment anti-virus and perimeter protection with defense-in-depth protection
  4. Patch application vulnerabilities as soon as feasible after vendor notification
  5. Store data backups off-site on a completely-separate network from production data
  6. Create and maintain an incident response plan
  7. Disable unnecessary services and apps to reduce your attack surface
  8. Use Multi-Factor Authentication (MFA) to mitigate leaked login credentials and password re-use
  9. Offer security awareness training to all your employees
  10. Run vulnerability scans that help you think like an attacker and pinpoint security gaps

As always, we can help you detect never-before-seen threats and block these new threat variants. Netsurion’s Managed Threat Protection offers extended detection and response (XDR) capabilities such as improved visibility and multiple security controls.

Longer-Term Implications

Constant vigilance is key against cyber criminals that capitalize on our reliance on technology. Attackers vary their malicious techniques, looking for every security gap that they can exploit. Avoid a reactive approach or “check-box mentality” as these threats escalate in volume and complexity; proactive protection can help enterprises overcome cybersecurity pitfalls.

This rise in cyber attack sophistication and scale has also served to raise concerns by world leaders. At the G7 Summit held in the United Kingdom, common initiatives were discussed to protect critical infrastructure, privacy, and financial systems like payments.

We also commit to work together to urgently address the escalating shared threat from criminal ransomware networks. We call on all states to urgently identify and disrupt ransomware criminal networks operating within their borders and hold those networks accountable for their actions.

-G7 member states as quoted in Cyber Defense Magazine
https://www.cyberdefensemagazine.com/g7-calls-on-russia/

Protecting our global infrastructure and supply chains requires an industry-wide effort across government, businesses, and supply chain partners like service providers.

Conclusion

Use a proactive approach to cybersecurity to stay ahead of well-funded and trained cyber criminals. These advanced threats are also increasing faster than the talent pool of security analysts and experts. With Netsurion and our 24/7 SOC, we are an extension of your team and provide coverage around the clock against these ever-present threats. Let us work with your stakeholders to share past outcomes and successes with similar organizations.

Related Resources   

The following references and resources provide insight to avoid falling prey to exploitive cyber criminals.

Best Practices for MSPs Offering Security Services

During our recent webinar “Ask Netsurion Anything,” our panel of experts addressed questions on topics ranging from meeting customer needs to business best practices. Here are the key takeaways from that session and guidance for MSPs offering security services to their customers.

Is partnering an effective way to add security services to my offering stack?

MSPs are looking toward partnerships when they don’t have the bandwidth or the expertise in-house to offer security services. Partnering with an established security services vendor is key for delivering best-of-breed services. For example, you could build your own SOC, but our research shows that it costs anywhere from $1.5 to $5 million. Alternatively, you can partner with someone already in that business and bundle it into your services stack. Partnering is definitely something we are seeing more and more of. 

How do I properly align our clients’ security expectations with what we are providing?

Start with an understanding of your client’s level of risk tolerance and the level of protection they want. A gap analysis will reveal their full threat landscape and the risks they are looking at. It’s up to the MSP to determine what’s required to meet that client’s security expectations. That may be a SIEM and a SOC with Managed Detection and Response (MDR) . It may be that the client needs to invest in Endpoint Detection and Response (EDR). Or the client may need a full-stack solution.

Then you can set expectations by being clear about the solution that you can offer and how it addresses their risks. Be explicit about what is included, what reports will be issued when, how alerts happen, and who is responsible for what when responding to those alerts.

What’s the best approach to getting customers to adopt advanced threat detection and response or any other more advanced offering?

One approach that we’ve seen work well is to version your security services offerings — V1, V2, V3, and so on. This allows you to bring additional services to your offering stack in phases and communicate with your customers about the new features and the benefits they convey. When it comes time for renewals, customers are primed to move to the new version to get the new capabilities. In this approach, you also specify a window of time before retiring earlier versions to give customers a chance to plan for the transition.

If a prospect insists on retaining a legacy anti-virus product because the license is still valid, should we insist on an upgrade to modern EDR before we accept them as a customer?

The short answer is yes. The customer is looking to you for your expertise. They have anti-virus, but they need improved, next-generation protection. This is an opportunity to show your value by explaining the risks of relying solely on anti-virus for protection. Remember that when you’re looking at a prospect, you’ll be adopting their challenges. You don’t want to put yourself or your other clients at risk. Sometimes we all need to be willing to walk away from an opportunity that is not a good fit for business or risk reasons.

When it comes to regulatory compliance, who is responsible for the data – the business owner, the MSP, or the security services vendor?

The owner of the data, unequivocally, holds the ultimate responsibility. The MSP and the vendor are responsible to their respective customers to protect the data as best as possible and to identify events that indicate an intrusion into their network. But the customer is ultimately responsible for the security of their data.

Will 24x7 monitoring of security events reduce my client’s cyber insurance premiums?

That depends on the insurance company, but it’s definitely possible that 24x7 monitoring will help reduce rates. There are some cyber insurance companies that won’t cover companies that don’t have the protection that managed detection and response offer.

How can I show a business owner the ROI from 24x7 security monitoring?

Make sure you work with a security services partner that provides detailed reports that you can share with your client to address this. For example, our weekly or monthly reports show all the priority one events we’ve seen during the reporting period, whether or not they turned out to be true positives. This demonstrates that there’s a lot of work being done by the 24/7 SOC so your customer doesn’t have to do it themselves or invest in the expertise it takes. The customer is paying for a level of protection that will be there when that event is a positive, and they get a phone call alerting them to take action to protect their data.

How much protection do small and medium-sized businesses need? Are ransomware attackers going after small and medium-sized businesses as opposed to large ones?

Size does not matter. If your customer brings in a profit that can be stolen, they are subject to attack. No one is too small — as we say, “security by obscurity” no longer exists. Rather, it’s a question of how easy a company is to infiltrate. Ransomware attackers are targeting more businesses than before, including small and medium-sized operations. They are specializing on industries that are lagging behind in security. These industries as well as small businesses lack security maturity in general and thus are easy targets for ransomware and all kinds of attacks.

Conclusion

The need for security, and the consequences of going without it, are gaining visibility across businesses of all sizes, including the small and medium-sized businesses that are the sweet spot for MSPs, and more companies are looking to outsource security. Partnering with a security services provider like Netsurion to offer these services creates a new revenue stream for you without the time and cost it would take to build and run an in-house solution. Given the growing opportunity in this area, it is an exciting time to be an MSP.

The Perimeter is Dead: Long-live the Perimeter

In 2005, the Department of Homeland Security commissioned Livermore National Labs to produce a kind of pre-emptive post-mortem report. Rather than wait for a vengeful ex-KGB hacker agent to ignite an American pipeline until it could be seen from space, the report issued recommendations for preventing an incursion that had yet never happened, from ever happening again.
 
Recommendation Number 1: Know your perimeter.
"The perimeter model is dead," pronounced Bruce Schneier, author of The New York Times' best seller Data and Goliath, and the CTO of IBM Resilient. "But there are personal perimeters. It doesn't mean there exists no perimeters. It just means it's not your underlying metaphor any more. So, I wouldn't say to anyone running a corporate network: There are no perimeters, zero."

"The traditional fixed perimeter model is rapidly becoming obsolete," stated the CSA's December 2013 white paper,” because of BYOD and phishing attacks providing untrusted access inside the perimeter, and SaaS and IaaS changing the location of the perimeter. Software defined perimeters address these issues by giving application owners the ability to deploy perimeters that retain the traditional model's value of invisibility and inaccessibility to ‘outsiders’, but can be deployed anywhere – on the internet, in the cloud, at a hosting center, on the private corporate network, or across some or all of these locations."

This reality invalidates the model of safeguarding the corporate network via the fortress model, one where all assets are inside and a well-defined perimeter exists, which can be defended. Instead, each asset requires a micro-fortress around it, regardless of where it is located. The EventTracker sensor enables a micro-fortress around and near the endpoint on which it operates. It provides host-based intrusion detection, data leak protection and endpoint threat detection. While the sensor itself operates on any Windows platform, it is able to act as a forwarder for any local syslog sources, relaying logs over an encrypted connection.
 
Welcome to your software defined perimeter.

Ransomware is only getting started

By Randy Franklin Smith

Ransomware is about denying you access to your data via encryption. But that denial has to be of a great enough magnitude create sufficient motivation for the victim to pay. Magnitude of the denial is a factor –

If the motivation-to-pay is about the value of the data, remember that the data doesn’t need to be private. It just needs to be valuable. The intrinsic value of data (irrespective of copies) is only the first factor in determining the value of the criminally encrypted copy of the data. The number copies of the data and their level of availability exert upward or downward pressure on the value of the encrypted data. If the victim has a copy of the data online and immediately accessible, the ransomware encrypted copies have little to know value. On the other hand, if there are no backups of the data, the value of the encrypted copy skyrockets.

But ransomware criminals frequently succeed in getting paid even if the value of the encrypted copy of data is very low. And that’s because of the operations interruption. An organization may be hit by ransomware that doesn’t encrypt a single file containing data that is intrinsically valuable. For instance, the bytes in msword.exe or outlook.exe are not valuable. You can find those bytes on billions of PCs and download them at any time from the Internet.

But if a criminal encrypts those files, you suddenly can’t work with documents or process emails. That user is out of business. Do that to all the users and the business is out of business.

Sure, you can just re-install Office, but how long will that take? And surely the criminal didn’t stop with those two programs.

Criminals are already figuring this out. In an ironic twist, criminals have co-opted a white-hat encryption program for malicious scrambling of entire volumes. Such system-level ransomware accomplishes complete denial of service for the entire system and all business operations that depend on it.

Do that to enough end-user PCs or some critical servers and you are into serious dollar losses no matter how well prepared the organization.

So we are certainly going to see more system-level ransomware.

But encrypting large amounts of data is a very noisy operation that you can detect if you are watching security logs and other file i/o patterns which just can’t be hidden.

So why bother with encrypting data in the first place. Here’s 2 alternatives that criminals will increasingly turn to:

Storage device level ransomware

I use the broader term storage device because of course mechanical hard drives are on the way out.  Also, although I still use the term ransomware, storage device level ransomware may or may not include encryption. The fact is that storage devices have various security built-in to them that can be “turned.”  As a non-encryption but effective example, take disk drive passwords. Some drives support optional passwords that must be entered at the keyboard prior to the operating system booting. Sure the data isn’t encrypted and you could recover the data, but at what cost in terms of interrupted operations?

But many drives, flash or magnetic, also support hardware level encryption. Turning on either of these options will require some privilege or exploitation of low integrity systems but storage level ransomware will be much quieter, almost silent, in comparison to application or driver level encryption of present-day malware.

Threat of release

I’m surprised we haven’t heard of this more already. Forget about encrypting data or denying service to it. Instead exfiltrate a copy of any kind of information that would be damaging if it were released publicly or to another interested party. That’s a lot of information — not just trade secrets. HR information. Consumer private data. Data about customers. The list goes on and on and on.

There’s already a burgeoning trade in information that can be sold – like credit card information. But why bother with data that is only valuable if you can sell it to someone else and/or overcome all the fraud detection and lost limiting technology that credit card companies are constantly improving?

The data doesn’t need to be intrinsically valuable. It only needs to be toxic in the wrong hands.

Time will tell how successful this will be it will happen. The combination of high read/write I/O on the same files is what makes ransomware standout right now. And unless you are doing transparent encryption at the driver level, you have to accomplish it in bulk as quickly as possible. But threat-of-release attacks won’t cause any file system output. Threat-of-release also doesn’t need to process bulk amounts of information as fast as possible. Criminals can take their time and let it dribble out of the victim’s network and their command and control systems. On the other hand, the volume of outbound bandwidth with threat of release is orders of magnitude higher than encryption-based ransomware where all the criminal needs to send is encryption keys.

As with all endpoint based attacks (all attacks for that matter?) time is of the essence. The time-to-detection will continue to determine the magnitude of losses for victims and profits for criminals.

Are you guilty of any of these PCI myths?

PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security standards designed to ensure all companies that process, store or transmit credit card information maintain a secure environment.

We often hear business owners tell us all kinds of reasons on why they do not need to be PCI compliant or even explain to us that they are PCI compliant without knowing that they are not.

We get it, taking care of a business is a lot of work and learning about PCI compliance can be a whole other full time job. PCI is a continuous effort to be and stay compliant while also keeping track of its updates. See latest PCI DSS updates.

The reality is that PCI applies to any company of any size that accepts credit card payments. If your company accepts credit card payment, stores it, process it and transmits cardholder data, you must have that data secured with a PCI compliant provider.

PCI compliance can be confusing, however that doesn't mean that it has to be difficult. Understanding PCI involves understanding the definitions of the terminology used such as compliance, validation, and assessments.

We have gathered what have been common comments that we hear from business owners. And today, we would like to bust these myths! Here we go!

We hope these myths are cleared out for you now. Learning about PCI is vital to the security of your business and most of all, your customers!

If you are interested in continuing your PCI education and learn about the different merchant and validation levels please read more here. And of course, reach out to us for any questions you may have.

Tips for Protecting Information While on the Go: What Summer Travelers Need to Know About Security

As the summer traveling season quickly approaches, most travelers envision exchanging work clothes and school books for shorts, flip flops, and beach umbrellas as they look forward to that well-deserved vacation. While planning their road trips and flights, many can’t wait to see faraway attractions for the first time, or feel the sand between their toes with a cool drink in hand while watching the waves roll in from the horizon.

Unfortunately, hackers have their own plans this summer — to steal travelers’ personal information from their laptops, smartphones, and other devices connected to the internet through public Wi-Fi at airports and hotels.

Hackers can access personal information from public Wi-Fi-connected devices through an attack that emulates a legitimate Wi-Fi access portal. This allows nearby threat actors to see everything public Wi-Fi users do online, including logging into their bank accounts, entering credit card numbers on websites, or checking email.

A hacker can also trick public Wi-Fi users into accessing what looks like a safe website when they are actually opening a fake version that asks to download a “security patch” or another critical update. Upon complying, it is possible that the Wi-Fi users unknowingly consent to install malware, which can give cyberthieves more access to their computers, phones or tablets — even after they return home from vacation.

Because hackers can easily access personal information over public Wi-Fi, travelers should practice great caution and diligence in defending themselves against becoming the next cyberattack victim while waiting at airports and staying at hotels.

Tips for using Wi-Fi at airports and hotels when traveling 

Posting to social media

In addition to taking precautions when using public Wi-Fi at hotels and airports, travelers should also think twice about posting their activities on social media such as Facebook, Twitter, Instagram, or LinkedIn while they are far from home.

While it may be fun to share vacation adventures with friends or work activities with colleagues in real time, this can tip off cyberthieves — who may have home addresses. Even if the hackers aren’t following the travelers directly, they can easily find who is on vacation through Twitter by simply logging into the site and looking up #Hawaii, for instance.

These thieves can arrive at travelers’ homes disguised as repair technicians or delivery persons and steal their personal belongings without arousing suspicion. Given the risk, travelers should wait until they get home before sharing their travel pictures and comments on social media.

Playing it safe

While away from home on vacation on business this summer, travelers using public Wi-Fi at hotels and airports must play it safe when connecting to the internet or posting to social media. After all, hackers are always out there in cyberspace, looking to steal whatever they can from the next victim.

With these tips, however, vacationers should be able to finally unwind and relax.

May Your Holidays be Merry, Bright, and Hack Free: Security Tips for the Biggest Shopping Season

Holiday Hack 

While you are reveling in the holiday season and all of the shopping deals it has to offer, also consider sharing these tips to help family and friends stay safe when they head out on the hunt for the perfect gift.

Though there are many companies out there responsible for securing merchant locations from the risks of data breaches, people’s own risky behavior often leads to their ID theft problems, no matter how well merchants protect them.

And with more and more merchants accepting chip cards this year, hackers are likely to go back to tried and true methods for preying on individual cardholders.

Here is a simple checklist of dos and don’ts to help make sure your credit card information doesn’t become a nicely wrapped present for some hacker.

So if you want to make sure all of your personal information is safe this holiday season, be sure to remember these easy steps. Never let your guard down, not even for one second, because the one step you skip could lead to the one time a hacker chooses you.

How to Use Process Tracking Events in the Windows Security Log

I think one of the most underutilized features of Windows Auditing and the Security Log are Process Tracking events.

In Windows 2003/XP you get these events by simply enabling the Process Tracking audit policy.  In Windows 7/2008+ you need to enable the Audit Process Creation and, optionally, the Audit Process Termination subcategories which you’ll find under Advanced Audit Policy Configuration in group policy objects.

These events are incredibly valuable because they give a comprehensive audit trail of every time any executable on the system is started as a process.  You can even determine how long the process ran by linking the process creation event to the process termination event using the Process ID found in both events.  Examples of both events are shown below.

Process Start WinXP/2003 592 A new process has been created.Subject:

Security ID: WIN-R9H529RIO4YAdministrator
Account Name: Administrator
Account Domain: WIN-R9H529RIO4Y
Logon ID: 0x1fd23

Process Information:

New Process ID: 0xed0
New Process Name: C:WindowsSystem32notepad.exe
Token Elevation Type: TokenElevationTypeDefault (1)
Creator Process ID: 0x8c0

Win7/2008 4688
Process End WinXP/2003 593 A process has exited.Subject:

Security ID: WIN-R9H529RIO4YAdministrator
Account Name: Administrator
Account Domain: WIN-R9H529RIO4Y
Logon ID: 0x1fd23

Process Information:

Process ID: 0xed0
Process Name: C:WindowsSystem32notepad.exe
Exit Status: 0x0

Win7/2008 4689

Trying to determine what a user did after logging on to Windows can be difficult to piece together.  These events are valuable on workstations because often, they are the most granular trail of activity left by end-users: for example, you can tell that Bob opened Outlook, then Word, then Excel and closed Word.

The process start event tells you the name of the program and when it started.  It also tells you who ran the program and the ID of their logon session with which you can correlate backwards to the logon event. This allows you to determine the kind of logon session in which the program was run and where the user (if remote) was on the network using the IP address and/or workstation name provided in the logon event.

Process start events also document the process that started them using Creator Process ID which can be correlated backwards to the process start event for the parent process.  This can be invaluable when trying to figure out how a suspect process was started.  If the Creator Process ID points to Explorer.exe, after tracking down the process start event, then it’s likely that the user simply started the process from the start menu.

These same events, when logged on servers, also provide a degree of auditing over privileged users but be aware that many Windows administrative functions will all show up as process starts for mmc.exe since all Microsoft Management Console apps run within mmc.exe.

But beyond privileged and end-user monitoring, process tracking events help you track possible change control issues and to trap advanced persistent threats.  When new software is executed for the first time on a given system it’s important to know that, since it implies a significant change to the system or it could alert you to a new unauthorized and even malicious program running for the first time.

The key to this seeing this kind of activity is to compare the executable name in a recent event 592/4688 to executable names in a whitelist – and thereby recognizing new executables.

Of course, this method isn’t foolproof because someone could replace an existing executable (on your whitelist) with a new program but with the same name and path as the old.  Such a change would “fly under the radar” with process tracking.  But my experience with unauthorized changes that bypass change control and APTs indicates that while certainly possible, the methods described here-in will catch their share of offenders and attackers.

To do this kind of correlation you need to enable process tracking on applicable systems (all systems if possible, including workstations) and then you need a SIEM solution that can compare the executable name in the current event to a “whitelist” of executables.

How you build that whitelist is important because it determines if your criteria for a new executable is unique to “that” system, or if it is based on a “golden” system, or your entire environment.  The more unique your whitelist is to each system or type of system, the better.  You can build the whitelist by either scanning for all the EXE files on a given system or by analyzing the 592/4688 events over some period of time.  I prefer the latter because there are many EXE files on Windows computers that are never actually executed and I’d like to know the first time any new EXE is run – whether it came with Windows and installed applications out of the box or whether it is a new EXE recently dropped onto the system.  On the other hand if you only want to detect when EXEs run which were not present on system at the time the whitelist was created, then a list built from simply running “dir *.exe /s” will suffice.

If you opt to analyze a period of system activity make sure that the period is long enough cover the full usage profile and business process profile for that system – usually a month will do it. Take some time to experiment with Process Tracking events and I think you’ll find that they are valuable for knowing what running on your system and who’s running it.

How to Protect Healthcare Data: 5 Cybersecurity Tips for MSPs

Contributed by: Meaghan Moraes, Blog and Social Media Manager at Continuum

For MSPs serving clients in the healthcare industry, protecting data can be complex. With compliance enforcement like HIPAA , for instance, distinguishing the owner of your clients’ data is critical —especially due to the lack of security awareness training amidst healthcare end users. The 2018 Cloud Security In-depth Report by Netwrix shows that 55% of healthcare organizations rated their own employees as the biggest security risk. In fact, according to the recently published Verizon PHI Data Breach Report, 58% of healthcare data breach incidents involve insiders, the highest percentage of insider threats in any industry.

In this post, you will learn the five key data security tips to better protect SMB clients in healthcare, ultimately enabling your posture as a trusted healthcare Information Technology (IT) security partner.

Why Risk Mitigation Hinges on Data Ownership

Oftentimes, business owners believe that the IT team is responsible for data security. The reality is that the company’s owner, Board of Directors, Managing Partner, CEO, President, or CFO are whom will get dragged into litigation after a data breach. They are considered the owners of the data, they also approve budget for cybersecurity, and have the responsibility to protect data. And it is they who will be asked to show what steps they took towards due care in protecting their clients’ data.

This distinction is extremely important for the healthcare industry, and for MSPs to understand as you work to avoid and prevent breaches of this sensitive data. Here are some important places to start.

1. Manage Your Network

At this stage in the evolution of cybersecurity and managed services, it’s crucial that you have the advanced tools to help identify the current inventory of devices on your clients’ networks and are notified when new devices are added — enabling network visibility.

With managed SIEM services and 24/7 support from cybersecurity experts, you’ll have real-time alerting, network logs, and activity monitoring to help you demonstrate healthcare compliance.

2. Apply Patches and Software Updates

Implementing incremental patching and software updates are key steps in preventing cyber attacks and mitigating risk. This helps ensure the highest levels of security are upheld, from the MSP, to the healthcare data owner, to the end user.

3. Allow Limited Access

Access to sensitive and critical data should remain on a need-to-know-basis, and users with access should only be able to see information critical to their jobs. You should also make sure to automatically remove access when it’s no longer needed.

There’s an even greater emphasis on limiting access for end users in healthcare. For example, healthcare professionals who need to access a patient's electronic health records through a clinical portal should be following a protocol to ensure the information is only accessed by those who have permission to view it. Access to health data should be restricted to authorized staff, and this access should be reviewed frequently. In addition, the system should employ multi-factor authentication (MFA) and access control lists for administrative access to the system.

4. Enhance Security Awareness Training

While one simple click on the wrong link is all it takes for an environment to become infected, many of these threats can be easily avoided with the right level of education. Offering training courses is an inexpensive way to reinforce your defenses by providing your employeesRemove term: managed services provider (MSP managed services provider ( with the means to recognize and report suspected attacks such as phishing and malware.

5. Work with a Trusted Partner to Enhance Data Protection

Outsourcing cybersecurity services and employing advanced tools built for MSPs will help you ensure your healthcare security strategy is strong and that your clients’ data is safe, while freeing up your own employees so they can focus on other business priorities.

With advanced threats continuing to permeate the healthcare industry, your clients in this space will continue to turn to your expertise and ultimately, your security protections. With these tactics in place, data ownership and risk status will remain clear.

What good is Threat Intelligence integration in a SIEM?

Bad actors/actions are more and more prevalent on the Internet. Who are they? What are they up to? Are they prowling in your network?

The first two questions are answered by Threat Intelligence (TI), the last one can be provided by a SIEM that integrates TI into its functionality.

But wait, don’t buy just yet, there’s more, much more!

Threat Intelligence when fused with SIEM can:
• Validate correlation rules and improve base lining alerts by upping the priority of rules that also point at TI-reported “bad” sources
• Detect owned boxes, bots, etc. that call home when on your network
• Qualify entities related to an incident based on collected TI data (what’s the history of this IP?)
• Historical matching of past, historical log data to current TI data
• Review past TI history as key context for reviewed events, alerts, incidents, etc.
• Enable automatic action due to better context available from high-quality TI feeds
• Run TI effectiveness reports in a SIEM (how much TI leads to useful alerts and incidents?)
• Validate web server logs source IP to profile visitors and reduce service to those appearing on bad lists (uncommon)
and the beat goes on…

Want the benefits of SIEM without the heavy lifting involved? SIEM may be for you.

Lumifi Defense Against Backoff

In the wake of the numerous recent data breaches, many consumers are demanding answers into the how and why surrounding companies who have inadvertently allowed data to be compromised given security measures accessible today.

After a breach is confirmed, the process typically involves PCI Forensic Investigators spending time researching and investigating compromised networks, logging files, and any other pieces of the system traceable to not only how the hackers gained access, but once in control of a machine, how data was removed or retrieved.

Investigative reports post-breach have uncovered vast amounts of useful information employed to reactively secure networks going forward. The industry, as a whole, has learned that in many of the instances the culprit responsible for the data theft is linked to businesses utilizing remote access, or more specifically, insecure remote access.

It would come as no surprise then that the method of choice for many blackhats (a.k.a. computer hackers) looking to enter a system has been identifying insecure remote access.

This method includes several different remote platforms, of which you can read more about in the DHS article on Backoff: New Point of Sale Malware. Hackers search for such inconsistencies and once located, it is only a matter of moments before they are able to connect to machines remotely, many times gaining administrative privileges in the process.

Once they have these privileges, it is quite easy for them to download the Backoff malware on the machine in order to begin sending credit card data to their destination of choice. Gaining access however, is only one step of the hacker's overall goal: retrieving sensitive information from systems with malicious intent.

What Backoff Is, And What It Is Not

Before moving forward, it is important to understand that the Backoff malware is not infectious. That is to say, simply visiting a web page will not result in the malware being downloaded onto a machine, rather it must be installed, much like any other application used for legitimate purposes.

Therefore, the most common way that Backoff, and its latest variants, have infiltrated systems is through the use of insecure remote access. The Department of Homeland Security brief about Backoff points out that of the 1000 plus businesses affected by Backoff, the majority were compromised through the use of remote access lacking sufficient security measures.

Imagine for a moment if remote access granted to a vendor serving all locations for a particular company were to become compromised. Then it is highly plausible that a savvy hacker could penetrate not only the single location, but could obtain access to an entire brand, tarnishing their reputation and ultimately plunging profits in the process.

How It Works

Backoff works by allowing criminals to (remotely) control the infected system, seizing credit card data out of memory, writing files with sensitive authentication data, and ultimately transmitting the stolen information using standard HTML posts.

There is nothing particularly innovative about how Backoff works, but the completeness of its design and simplicity has allowed some of the biggest credit card thefts in history.

Not only is the software itself fairly simplistic, but hackers can easily obtain a copy of Backoff from the Internet, streamlined so it causes few issues when installing on a remote machine; and it was so well written it is extremely effective at stealing data once it is in place.

Protecting Against New and Unknown Threats

The original Backoff software sent data in clear text that could be detected using a network sniffer, or Intrusion Detection System. The sniffer examined the data traveling over the network and could detect credit card data in the stream, preventing malicious traffic from being sent from the POS system.

Clever cyber-criminals, however, tend to stay one step ahead, continually creating new and enhanced versions of malware and other attack techniques.

Need proof? Just look at the latest version of Backoff, Backoff ROM. It was updated with the ability to encrypt outbound credit card data, making sniffer detection and prevention methodology all but ineffective. To a network sniffer, encrypted data appears as gibberish, removing any patterns that would allow the sniffer to recognize the transmission as credit card data.

It typically takes several months for security and anti-virus providers to identify new strains of viruses and react through incorporating added protection into their products and services. Factoring in the time and effort needed to fully deploy the updates and systems have now been unprotected with out-of-date software for months.

The glaring issue here is software solutions, such as anti-virus programs, are usually between 6 to 12 months behind major malware releases, and therefore not enough to protect against sophisticated threats. It is therefore necessary for companies to embrace a more holistic approach when looking to protect your business is necessary.

Maintaining an effective defense against all vulnerabilities, new and unknown, along with forward thinking initiatives to protect against other modes of cyber-attack requires using techniques that focuses on blocking the behaviors that attackers use, rather than any one specific attack or malware.

Firewall installation and proper configuration are integral parts to security, but what happens when the firewalls are not setup correctly?

Many SMB's rely on internal IT teams lacking the security expertise or discipline required to continually monitor firewall security, keep abreast of the latest threats, and make the adjustments necessary to thwart attacks. A large portion of these businesses mistakenly believe a firewall can be set up once and will continue to provide adequate protection for an infinite amount of time.

However, as we mentioned before, effective firewall protection requires a combination of continually updated technology complemented by expert monitoring and adjustment. Firewall protection falls short when businesses fail to initially configure their firewalls properly, or when they deploy firewalls that may lack particular modes of protection necessary to thwart certain types of attacks like Backoff.

Having a dedicated security expert managing your firewall can make the difference between a costly breach and a bullet-proof defense. A security expert will be able to recognize when an unusual event has occurred, investigate to determine the level of danger posed by the event, and take the appropriate measures to ward off present and future attacks.

A common complaint surrounding data security is that the steps required to maintain protection tend to interfere with efficiency, thus causing employees to blur the line or even outright circumvent the security measures which easily leads to break down in the overall protection of the network quite quickly.

This isn't to say that you have to compromise efficiency for security. What is closer to the truth is the need for understanding throughout the company on why security initiatives and processes were determined as best practices in the first place, and continuing to follow through with them.

Protecting Your Business With Secure Remote Access

Some of the methods that protected against Backoff are fairly basic security measures, those of which too many retailers have ignored. These methods are recommended regardless of initiatives like the Payment Card Industry Data Security Standard (PCI).

First and foremost, verify your remote access is secure. This includes using:

In following the advice above you are ensuring that passwords in place are sufficient to deter the time and energy to crack, especially considering that 2-factor authentication is an added security measure hackers rarely have direct access to view. In utilizing a single user per username, or unique credentials, activity can then be tracked back to a specific user.

In addition, developing a proper firewall protection program that incorporates limiting both inbound and outbound traffic to the necessary minimum is critical. Consistency in reviewing your practices and updating when necessary is key to make sure that you are, and stay, protected.

Best practices should be followed to minimize risk.

For example, firewall segmentation limiting access separates the channels storing info in order to minimize access to sensitive data along with the overall data that can be breached.

How Lumifi Defeated Backoff

During the recent rise in data breaches, Lumifi has remained successful in preventing penetration and data export, even before the Backoff threat was known and understood.

By combining our advanced capabilities such as the double-duty firewall design, DNS blocking and network segmentation with proper firewall configuration, along with testing and continuous updating and adjustment, Lumifi managed firewalls effectively protected from threats, both new and even those unknown at the time.

Unparalleled Secure Remote Access

Accessing a network remotely is an essential capability for most businesses. Unfortunately, opening up an unsecured port compromises the network’s integrity and can also invite hackers.

Some of the largest breaches in recent history can be attributed to weak remote access or unsecured VPN connections.

We provide not only secure remote access SSL VPN into a network, but through our partnership with Juniper Networks, we offer Host Checker, a service that performs a check on all endpoint computers ensuring they conform to security requirements before access over the VPN is allowed.

Inbound & Outbound Data Security

Domain Name Servers (DNSs) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them into Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers access Websites based on IP addresses.

Our industry leading IP-based web traffic routing technology provides battle-tested protection against malware-based data theft where other firewalls have fallen short. Unlike most self managed solutions, and even some third party solutions, we created outbound traffic restrictions as part of our base configuration. These outbound restrictions were instrumental in stopping Backoff from affecting numerous businesses infected by this malware.

As an added layer of security, Lumifi's centrally managed firewall network allows us to control where network traffic goes, preventing it from resolving malicious sites or based on countries, as well as denying traffic requests containing other potential vulnerabilities.

Backoff attempted transmission and was examined by the intermediary DNS security component, determining it suspicious. Data was therefore blocked from being sent to the requested Backoff server address. Because the Web address to which the Backoff server was attempting to send the credit card data was not a known or listed entity, our firewall (and it's unique configuration) refused the request, rendering Backoff ineffective.

The knowledge that even the most secure firewall can be accessed, be it via improper configuration or an employee error, is essential. Malware will continue to be a significant issue for businesses accepting credit cards in the foreseeable future, and it is key that all businesses become aware of how to secure their environments.

It would be irresponsible to ignore the problem or pretend that it could never happen to you. Taking the appropriate steps today will help you avoid joining the ever-increasing list of businesses that realize they are a hacker's latest victim. Proper management of security and consistent maintenance should be the goal of any security program.

MORE INFORMATION:

Cybercrime has grown to epidemic proportions, and the effects on multi-location brands, individual franchisees and other small businesses can be devastating and unrecoverable. We believe franchisors, franchisees and SMBs that lack IT resources should be able to access and benefit from enterprise-class network security.

Our goal is to ensure our customer's brands are protected from both internal and external threats by providing them robust and powerful network management, security, and compliance services at a fraction of the costs associated with a self-managed solution.

SIEM, UEBA, SOAR and Your Cybersecurity Arsenal

The evolution of Security Information and Event Management (SIEM) solutions has made a few key shifts over time. It started as simply collecting and storing logs, then morphed into correlating information with rules and alerting a team when something suspicious was happening. And now, SIEM solutions are providing advanced analytics and response automation.

Today’s advanced SIEM solutions:

  1. Incorporate purpose-built sensors to continually collect digital forensics data across an organization.
  2. Leverage artificial intelligence and machine learning to identify out-of-the-ordinary network behavior that may indicate possible malware or a data breach.

Advanced SIEM requires continual tuning to learn what is deemed abnormal behavior for a given organization.

At EventTracker, this all happens through our ISO 27001 certified Security Operations Center (SOC), where expert analysts work with this intricate data to learn the customer network and the various device types (OS, application, network devices etc.). Ideally, these experts work in tandem with the customers’ internal IT teams to understand their definition of normal network activity.

Next, based on this information and the available knowledge packs within EventTracker, we schedule suitable daily and weekly reports, along with configure alerts. The real magic happens when this data becomes “flex reports”. These reports focus on valuable information that is embedded within the description portion of the log messages. When these parameters are trended in a graph, all sorts of interesting, actionable information emerges.

User and Entity Behavior Analytics

In addition to noticing suspicious network behavior, SIEMs have evolved to include User Behavior Analytics (UBA), or User and Entity Behavior Analytics (UEBA). UBA/UEBA triggers an alert when unusual user or entity behavior occurs. This is an important feature now that compromised credentials make up 76% of all network intrusions.

When credentials are stolen, they tend to be used in unusual ways, places, and times. For instance, if a log in occurs that is outside the normal pattern, then this is immediately flagged for investigation. If user ‘‘Susan’’ usually logs in to “Workstation5” but suddenly logs in to “Server3”, then this is out of ordinary and may merit an investigation.

Security Orchestration Automation and Response (SOAR)

While alerts to suspicious behavior are necessary, the real goal is acting on the suspicious behavior as quickly and effectively as possible. That’s the next evolution of SIEM: Security Orchestration Automation and Response (SOAR).

While traditional SIEMs can “say” something, those that incorporate SOAR can “do” something.

SOARs consolidate data sources, use information provided by threat intelligence feeds, and automate responses to improve efficiency and effectiveness.

For example, with EventTracker, if an infected USB is plugged into a laptop, even if it’s off the network at the time, and malware begins to run, EventTracker will detect the insertion of the USB, as well as detect any suspicious communication to a low-reputation IP address. It will also catch any suspicious processes that begin to run. Once detected, EventTracker automatically stops the communication and the executable, preventing a potential data breach.

Get the Most Out of Your SIEM

As attacks continue to become more sophisticated and persistent, traditional security tools that just focus on protecting the perimeter will continue to be replaced by solutions that also have detection and response capabilities, in particular on the endpoint devices.

When is an alert not an alert?

The Riddler is one of Batman’s enduring enemies who takes delight in incorporating riddles and puzzles into his criminal plots—often leaving them as clues for the authorities and Batman to solve.

Question: When is a door, not a door?
Answer: When it’s ajar.

So riddle me this, Batman: When is an alert not an alert?

Users of the EventTracker platform know that one of its primary functions is to apply built-in knowledge to reduce the flood of all security/log data to a much smaller stream of prioritized alerts. However, in most cases, without applying local context, this is still too noisy. Netsurion provides a risk score that is computed based on the asset value and the Common Vunlerability Scoring System rank of the source.

This allows us to separate “alerts” into different priority levels. The broad categories are:

And so, there are alerts and then there are actionable and prioritized alerts. Over-reacting to awareness or compliance alerts will drain your energy and eventually sap your enthusiasm, not to mention cost you in real terms. Under-reacting to actionable alerts will also hurt you by inaction that could reduce attacker dwell time and minimize the damage of ransomware or a data breach.

Find out more.

SIEM and Return on Investment: Four Pillars for Success

Return on investment (ROI) — it is the Achilles heel of IT management. Nobody minds spending money to avoid costs, prevent disasters, and ultimately yield more than the initial investment outlay. But is the investment justified?

It is challenging to calculate the ROI for any IT investment, and security information and event management (SIEM) tools are no exception.

We recently explored some basic precepts or “pillars” of the ROI of SIEM tools and technology. These pillars provide some sensible groundwork for the difficult endeavor to justify intangible costs of SIEM tools and technology.

Pillar 1. Think Risk: Before and After

Before and after — meaning life with SIEM tools and, subsequently, life without. SIEM tools help eliminate risk. In most cases, risk has a quantifiable cost. While it’s difficult to say how much was saved by avoiding a major intrusion, examining the effect by comparing conditions before, and after, is a good start.

In an ROI analysis, develop a statement such as “before we invested in SIEM practices, tools, or technique X, we were greatly at risk. After we deployed XX, our risk was greatly reduced, if not eliminated.”

Then prove and substantiate the statement. The after statement may be characterized with quantitative data, such as the number of intrusions or access points that were eliminated. The more you can quantify, the better. If you can’t quantify, estimate as best you can, but be consistent and realistic.

Pillar 2: Think Cost Avoidance versus “Return”

In other words, don’t expect revenues or a gain from the investment.  Rather, the return is the prevention of intrusion and costly security disaster that SIEM afforded. Cost avoidance is your return.

When the security IT firm RSA published a whitepaper on this very topic (SIEM and ROI), they focused on this dimension of ROI: it’s more about cost avoidance than it is about “return.” Cost avoidance is at the heart of the value that SIEM provides.

RSA wrote, “Most experts — who for years argued for or against a ‘return on security investment (ROSI)’ — agree that the value an SIEM solution brings is primarily in the realm of cost avoidance, not ‘return’ as it’s defined in the purest economic sense. So whether you’re looking for an ROI, ROSI, total cost of ownership (TCO), or a breakeven point, the goal is demonstrable value.”

The value of a SIEM solution must be viewed differently. It’s better seen in the cost it avoided rather than the direct dividend or revenue it yielded. As the whitepaper stated: “it’s not a cotton candy machine.”

Pillar 3:  Focus on A Variable That Can Be Measured: Time

If you don’t focus on quantifiable variables in your ROI analysis, you’ll be loaded up with assumptions. And assumptions carry little weight in business justification exercises.

Instead of assuming, use time as a key variable that SIEM helps improve in several ways. Explore how much time is saved. For example, if you are in a market or industry characterized by heavy compliance and auditing, consider the preparation that such compliance requires. SIEM tools save preparation time. Time saved can be redirected to other security needs that are already competing for attention in the daily schedule of today’s busy security manager.

In addition to time saved, there’s also an improvement in reaction time. When the sky is falling, the ability of an organization to trace, find and secure swiftly and promptly is critical. Good tools enable that. Improvements in reaction time can be measured.

Add time saved and reaction time improved, and you’re using a quantifiable variable as a measure of value and ultimately ROI.

Pillar 4:  Consider the Cost of a Solution  Without Early Discovery

Disaster recovery has many costs that are both tangible and intangible. Liken a security intrusion or major breach to a medical problem: the earlier you discover it, the more options you can implement and the greater are the chances that you can mitigate risk. SIEM tools help discover noncompliance and implement detection earlier. This allows more courses of action and presents them sooner — often before an incident occurs or begins to spiral.

Without early discovery, damage may ensue. But how much does it cost?

Cost estimates of security breaches may be found in news reports.  For example, the following cost estimates of data breaches were found with a simple media search:

“Maricopa Community College data breach cost $20 million, including $2.3 million in lawyer fees.”

“The Target breach cost $17 million in third-quarter expenses.”  It should be noted there were later citations that said their fourth quarter recognized $60 million in costs, and then another editorial estimated $1 billion in costs when all was said and done.

Yet another is a headline that read: “Navy Intranet Breach Cost $10 Million.”

And the list goes on and on, with the point being that citing news media reports is a quick and somewhat reliable means of presenting the costs associated with remediation and recovery. It strengthens the case for SIEM tool purchases and helps put some urgency into cost avoidance — and is based on someone else’s hardships after an intrusion, not yours.  But it paints a picture of what the price of disaster and a large-scale breach could look like.

Determining the ROI of SIEM is not hard when it is approached in a logical way with known information built on a foundation of cost avoidance, time saved, and improved reaction time.

The ROI of SIEM is best explained in the trouble it avoids and the disaster it prevents.

Protecting Legal Data: 3 Ways MSPs Can Enhance Cybersecurity

Contributed by: Meaghan Moraes, Blog and Social Media Manager at Continuum

The legal world is centered on offering clients protection—and in the current technology environment, that extends to cybersecurity. With the proper security procedures, policies, training, and IT security in law firms, advanced cybersecurity is yet another way that lawyers can protect their clients today.

However, that’s much easier said than done, as firms and other organizations in the legal space have extremely desirable data, yet many are inadequately prepared for sophisticated breach attempts—making businesses in this vertical primary targets of cyber attacks.

In fact, according to a survey by law firm eWranglers, only 33% of responding firms had implemented data protection policies, and a similar 33% had implemented employee cybersecurity training. It’s clear that these types of small businesses need to seriously invest in cybersecurity in order to withstand the landscape for years to come. Oftentimes, this requires the help of a managed IT service provider (MSP) that can provide the tools, support, and security partnership that these legal firms otherwise wouldn’t have access to.

So, how can you seize that opportunity as an MSP to protect your legal clients with the enhanced cybersecurity that will safeguard their data? The following three steps will help you improve your clients’ security posture and mutual business growth.

1. Develop Policies and Procedures

Implementing clear and explicit cybersecurity policies for clients is an effective way to not only better protect their data, but to instill trust and forge a lasting partnership that they can turn to. The best way to execute these policies and procedures is through initial and consistent security awareness training. It’s important that your set of policies address these four things:

Every policy you develop for your clients should have accompanying procedures that illustrate what actions must occur.

2. Establish Preventative Measures

Another key finding from the eWranglers survey was that, with only 25% with device encryption and a mere 17% with directory security, many law firms lack a fully developed prevention infrastructure. While many legal organizations have some aspects of cybersecurity-related compliance policies, they often don’t have real, comprehensive preventative measures dedicated to security.

Prevention can include employee background checks, implementing user accounts, asset controls, network security protocols, browser filters, and data encryption. But, in this volatile IT landscape, prevention only goes so far and planning for an undesired incident is crucial.

3. Have an Incident Response Plan

Helping your clients create an incident response plan brings pragmatism and order to a chaotic situation, and ultimately helps them recover faster. Essentially, the plan just takes some road mapping and internal and external collaboration.

Once you can ensure your legal clients are identifying circumstances, safeguarding against further damage, collecting external intelligence, collecting logs and data, and notifying necessary parties, they’ll be as prepared as possible for whatever is thrown their way.

Covering these three areas will allow you to offer your legal clients the advanced protection they now demand.

MSPs Need Both Cybersecurity Automation and Human Expertise

The rising level of security threats and public incidents demand new approaches to people, processes, and technology that optimize manual processes and harness the benefits of automation. Automation and machine learning (ML) remove inefficiencies and the potential for error or security gaps. While programmatic threat detection and incident response minimize false positives along with staff and skill shortages, it is not a panacea or quick fix. Human analysts are still the most vital link in cybersecurity defense that differentiates you in the marketplace.

Trends Driving Adoption of Automation

There are six top trends prompting Managed Service Providers (MSPs) and enterprises to embrace automated threat detection and response. In addition to challenges in hiring and retaining hard-to-find cybersecurity professionals, there are hidden costs inherent in the massive amounts of alerts that can trigger false positives.

img cybersecurity automation1

In light of global IT challenges like staff shortages, ML and automated threat detection and response enhance efficiency, job satisfaction, and retention of cybersecurity experts – whether in Netsurion’s Security Operations Center (SOC) or partner and customer environments.    

However, some inhibitors of automation and ML include the lack of talent to implement, the time and cost involved, and a focus on day-to-day security operations.

Benefits and Challenges of Automation

Cybersecurity incorporates automation, machine learning (ML), and artificial intelligence (AI) to accelerate threat correlation and reduce incident response times when minutes matter. Rising labor costs are often the catalyst to exploring automation benefits. A more programmatic threat defense improves efficiency and effectiveness by:

  1. Enhancing threat correlation in real-time
  2. Reducing “noise” and false positives that waste analyst attention
  3. Providing threat context and actionable intelligence
  4. Accelerating a rapid response

It can also be used to chain together seemingly disparate insights that can reveal more persistent and advanced threats lurking stealthily in your organization. Ideally, automation enhances Security Operations Center (SOC) analyst effectiveness by streamlining routine tasks and providing insight and threat context that results in better decision making.

However, some inhibitors of automation and ML include the time and cost involved, as well as a focus on day-to-day security operations instead of future-oriented SecOps improvements.  Another downside of automation and ML is the human expertise needed to develop the algorithms and ongoing system tuning and optimization.

Advantages and Pitfalls of Human Experts

Given the shortage of cybersecurity staff to fill an estimated 3 million IT and security role, it’s no wonder that automation and machine learning is viewed as a viable solution to the ongoing IT staff and cybersecurity skills shortage. A proactive defense requires constant vigilance and robust security operations. Security must work in tandem with automation and ML along with dedicated experts to implement defense-in-depth protection and future-proof your security investment.

One of the arguments against human-led threat response is that it is labor intensive and therefore more expensive. But the security gap or technology misstep that results in a data breach is equally costly in terms of damaged brand reputation, lost customers and revenue, and possible compliance fines.

Pitfalls of humans include time away due to vacation or training as well as the key challenges of hiring and retaining security experts in the first place. If you don’t have the expertise or an in-house SOC, leverage 24/7/365 SOC experts like Netsurion to augment your team and customize cybersecurity to customer environments.

A Blend of Security Automation and Human Expertise is Needed  

Cybersecurity experts are needed to architect the customer solution, prepare the necessary runbooks and playbooks, tailor and prioritize threat detection, respond to suspicious events and possible incidents, and enhance threat remediation over time. While automation and machine learning are leveling the playing field for small-to-medium-sized businesses (SMBs) and their service providers, it doesn’t stand alone. Humans are still needed to reduce business and cybersecurity risk and assess qualitative and quantitative results over time. Some IT decisions have performance and productivity impacts, so incorporate humans in-the-loop when blocking devices and quarantining access to users for the first time. MSSPs must demonstrate why a two-pronged approach of automation and human-led cybersecurity is warranted.

Evolve From Alerts to Proactive Threat Response

Overcoming advanced and morphing threats requires more mature technology, skilled people, and rapid incident response than in years past. Service providers must blend automation and ML along with dedicated security experts to implement defense-in-depth protection and future-proof security investments used by their customers. To enhance customer resilience, balance the best of both options - human and artificial intelligence. Netsurion provides a comprehensive managed service and complete platform for MSSPs to predict, prevent, detect, and respond to escalating threats.

How Strong Are Your Passwords? Tips To Keep You Protected

Passwords keep your accounts and network safe but may also be a gateway for hackers. It's very important that you create strong passwords that will keep you protected.

Below are tips that we recommend you use when creating your passwords. Take a look at the infographic and check if you are already practicing these techniques.

If not, take a moment to do so.

At Lumifi, we encourage you to create strong passwords and even enable two-factor authentication, as well. Two-factor authentication will validate the identity of the person logging into the network.

First, make sure your first factor is strong by following these tips and second, enable two-factor authentication to ensure that whoever is accessing the network is actually who they claim to be.

Demystifying MDR: Five Myths for MSSPs

Small-to-medium-sized businesses (SMBs) are continuously seeking ways to safeguard their data and resiliency against persistent criminals through increased cyber defenses. But their security service providers often find that they are ill equipped to address advanced threats, let alone know where to begin. Managed Detection and Response (MDR) solutions are gaining traction with resource-constrained organizations looking for 24/7 proactive protection. The threat landscape and MDR marketplace is evolving, creating confusion for Managed Security Service Providers (MSSPs) and customers alike.

This blog separates MDR fact from fiction. Read on to learn the most common myths our team hears, along with MDR insights and realities to help discover the best-fit solution.

MYTH # 1:  MDR is just the latest “shiny object” in cybersecurity.

Fact: MDR is here to stay as it solves real customer challenges like the skills shortage.

Resource-constrained SMBs are actively looking for a security solution provider with the right expertise and services for 24/7 monitoring, threat detection, and comprehensive response. To address escalating cyber threats, MDR providers integrate more log sources, high-fidelity alerting, and a rapid response to minimize lateral movement and attacker dwell time. It also reduces the impact of a cybersecurity incident by providing advanced detection and response that organizations can’t efficiently operate on their own.

Managing an outsourced detection and response capability is not new, and MDR is service rather than software or hardware. It provides a 24/7 Security Operations Center (SOC) that offers better visibility into the growing attack surface that cyber criminals can exploit. While it’s impossible to predict the future, MDR addresses actual market problems and has seen rapid adoption by MSSPs as well as by end customers. By 2025, 50% of organizations will be using MDR services, according to Gartner.

MYTH # 2:  My customers are too small for MDR safeguards.

Fact: MDR’s proven results benefit organizations of all sizes.

Today’s cybersecurity threats readily evade signature-based detection like anti-virus and anti-malware. Financially motivated cyber criminals target businesses large and small, especially those with intellectual property or supply chain contacts. A patchwork of siloed products and tools lack holistic visibility that creates unintended security gaps. Over 40% of cybersecurity incidents have impacted SMBs and cyber criminals in SMB organizations take longer to uncover and mitigate them.

Don’t be lulled into a false sense of security that creates a risk gap due to insufficient investment, as well as increased cyber threats and targeted attacks. Navigate through the options of MDR to move from a reactive approach to a more proactive coverage of business-critical networks, servers, data centers, and cloud data for your customers.

MYTH # 3: MDR is complicated and costly for MSSPs to adopt.

Fact: Reduce the risk of an inadequate MDR solution that wastes time and money.

As the first step in an MDR evaluation process, know that it is not another siloed point product. MDR is generally a Software as a Service (SaaS) solution, requiring no hardware or capital investment. MDR can consolidate the number of tools and vendors to purchase, onboard, and manage – saving valuable time.

With MDR, a more robust cybersecurity posture can also pay dividends. It prepares organizations to rapidly detect and effectively respond to advanced threats that could cause a security incident and jeopardize resiliency.

Myths Facts

MYTH # 4:  I must build my own Security Operations Center for MDR.

Fact: SOC-as-a-Service augments your team with 24/7 coverage and expertise.

A SOC is a cybersecurity command center that monitors, detects, investigates, and responds to suspicious activities and incidents. Standing up a SOC is costly with hardware, software, and people expenses like hiring, training, and retaining hard-to-find cybersecurity experts. Instead of building a SOC on your own or operating it around-the-clock, SOC-as-a-Service enables you to quickly scale your security capabilities without the cost and overhead. Cybersecurity analysts in the SOC work as an extension of your in-house team on incident handling, threat intelligence, and threat hunting.   

MYTH #5: Every MSSP is ready to offer an MDR solution.

Fact: One size does not fit all. Tailor your service provider solutions to your goals, capabilities, and target customers.

Conduct an assessment regarding MDR along with your future objectives and current capabilities. Be careful not to overextend yourself and risk poor service delivery and disappointed customers. While MDR definitions vary, your current offerings may be closer to defense-in-depth coverage than you realize. Look to add comprehensive visibility and simplicity with as much increased attack surface coverage as possible and a streamlined tech stack; point products merely add more complexity. If you don’t possess the staff or expertise for DIY MDR, consider a co-managed MDR solution from an MSSP provider who has your back and is committed to your success.

Conclusion

MSSPs can assist organizations in becoming more proactive regarding the escalating threat landscape and to invest in more capable threat detection and response. MDR evolved to help security teams overcome the challenge of an ever-expanding attack surface without the same resources and staff as larger enterprises. As you evaluate MDR solutions, look for providers with the most comprehensive coverage and proven track records. Align your staffing and budget with Lumifi's MDR to address continuously evolving threats. By enhancing your security operations with these four steps – predict, prevent, detect, and respond – your customers will be well-positioned to address today’s security challenges and the uncertain threat landscape.

Auditing File Shares with the Windows Security Log

Over the years, security admins have repeatedly asked me how to audit file shares in Windows.  Until Windows Server 2008, there were no specific events for file shares.  The best we could do was to enable auditing of the registry key where shares are defined.  But in Windows Server 2008 and later, there are two new subcategories for share related events:

File Share Events

This subcategory allows you to track the creation, modification and deletion of shared folders (see table below).  You have a different event ID for each of those three operations.  The events indicate who made the change in the Subject fields, and provides the name the share users see when browsing the network and the patch to the file system folder made available by the share.  See the example of event ID 5142 below.

A network share object was added.

Subject:
Security ID:  W8R2wsmith
Account Name:  wsmith
Account Domain:  W8R2
Logon ID:  0x475b7

Share Information:
Share Name:  *AcmeAccounting
Share Path:  C:AcmeAccounting

The bad news is that the subcategory also produces event ID 5140 every time a user connects to a share.  The data logged, including who accessed it, and their client IP address is nice, but the event is logged much too frequently.  Since Windows doesn’t keep network logon sessions active if no files are held open, you will tend to see this event frequently if you enable the “File Share” audit subcategory.  There is no way to configure Windows to produce just the share change events and not this access event as well.  Of course, that’s the point of a SIEM and log management platform which is at the heart of Netsurion Open XDR, which filters out the noise.

5140 A network share object was accessed
5142 A network share object was added.
5143 A network share object was modified
5144 A network share object was deleted.

Detailed File Share Events

Event ID 5140, as discussed above, is intended to document each connection to a network share, and as such it does not log the names of the files accessed through that share connection.  The “Detailed File Share” audit subcategory provides this lower level of information with just one event ID – 5145 – which is shown below.

A network share object was checked to see whether client can be granted desired access.

Subject:
Security ID:  SYSTEM
Account Name:  WIN-KOSWZXC03L0$
Account Domain:  W8R2
Logon ID:  0x86d584

Network Information:
Object Type:  File
Source Address:  fe80::507a:5bf7:2a72:c046
Source Port:  55490

Share Information:
Share Name:  *SYSVOL
Share Path:  ??C:WindowsSYSVOLsysvol
Relative Target Name: w8r2.comPolicies{6AC1786C-016F-11D2-945F-00C04fB984F9}MachineMicrosoftWindows NTAuditaudit.csv

Access Request Information:
Access Mask:  0x120089
Accesses:  READ_CONTROL
SYNCHRONIZE
ReadData (or ListDirectory)
ReadEA
ReadAttributes

Access Check Results:
READ_CONTROL: Granted by Ownership
SYNCHRONIZE: Granted by D:(A;;0x1200a9;;;WD)
ReadData (or ListDirectory): Granted by D:(A;;0x1200a9;;;WD)
ReadEA: Granted by D:(A;;0x1200a9;;;WD)
ReadAttributes: Granted by D:(A;;0x1200a9;;;WD)

This event tells identifies the user (Subject fields), the user’s IP address (Network Information), the share, and the actual file accessed via the share (Share Information) and then provides the permissions requested and the results of the access request.  This event actually logs the access attempt and allows you to see failure versions of the event as well as success events.

Be careful about enabling this audit subcategory because you will get an event for every file accessed through network shares each time the application opens the file.  This can be more frequent than imagined for some applications like Microsoft Office.  Conversely, remember that this category won’t catch access attempts on the same files if a locally executing application accesses the file via the local patch (e.g. c:docsfile.txt) instead of via a patch.

You might also want to consider enabling auditing on individual folders containing critical files and using the File System subcategory.  This method allows you to be much more selective about who, which files and what types of access are audited.

For most organizations, enable the File Share subcategory if it’s important to you to know when new folders are shared. You will probably want to filter out the 5140 occurrences.  Then, if you have file level audit needs, turn on the File Access subcategory, identify the exact folders containing the relevant files and enable auditing on those folders for the specific operations (e.g. Read, Write, Delete) needed to meet your audit requirements.  Don’t enable the Detailed File Share audit subcategory unless you really want events for every access to every file via network shares.

Internet Explorer 8 - People Still Love It, But There’s a Problem

Microsoft has confirmed that Internet Explorer 8 (IE8) has a “Zero Day Vulnerability” that has already been exploited to enable the compromise of computer systems.

This is a technical way of saying that the issue with IE8 is currently unpatched, and other security mechanisms are not currently effective in preventing the exploit.

RELATED READING: Why is patching important to the security of your business?

Given time (beyond “Day Zero”), this vulnerability will be patched or other systems will be able to prevent the issue, but because this issue is so new, it is currently able to reek havoc on systems that visit compromised websites.

This type of issue with a browser is so damaging because computer hackers who take advantage of it, can execute malicious code on the affected machines without the user needing to download anything or without any indication that the machine has been compromised.

All a user has to do to be infected is to go to a website that has a malicious script embedded on it, and viola you have been hacked! No bells, no whistles, no pop-ups of any kind will appear in your browser. You will not have any indication of an issue (until something bad happens on your machine).

Most of the time, the hackers are installing Remote Access Trojans so that they can get information about the affected machines or take them over completely.

So what should you do if you still run IE8?

Well, there are a couple of options.

You can make sure that you pay attention to Microsoft bulletins and down load the patch when they release it. They are aware of the issue, and that is step one in fixing it. They have promised that a fix to this problem will be coming shortly.

Your other option is to upgrade to other versions of Internet Explorer.

At the time of this publishing, IE9 and IE10 did not have the same vulnerabilities.

IE8 is old, but it is still the most used version of IE today. It is its popularity that makes it such an attractive target for hackers.

If you use IE8, update your system regularly and be careful where you browse.

How do you determine IT security risk?

How much security is enough? That’s a hard question to answer. You could spend $1 or $1M on security and still ask the same question. It’s a trick question; there is no correct answer. The better/correct question is how much risk are you willing to tolerate? Mind you, the answer to this question is a “beauty in the beholder” deal, and again there is no one correct answer.

The classic comeback from management when posed this question by the CISO is to debate what risk means, in a business context, of course. To answer this, consider the picture below.

How do you determine IT security risk?

This is your tax dollars at work. It comes from a NIST publication called “Small Business Information Security” and is available here. It presents a systematic method to first identify and thereafter mitigate the elements of risk to your business. To a small business owner, this may all be very well but can be overwhelming.

Did you know that you are not alone in tackling this problem? Our SIEMphonic program is specifically designed to provide co-management. We get that for a small business owner, it’s difficult to deploy, manage and use an effective combination of expertise and tools that provide early detection of targeted, advanced threats and insider threats. With SIEMphonic Enterprise Edition and SIEMphonic MDR Edition, we work together with you to analyze event data in real-time, then collect, store, investigate, and report on log data for incident response, forensics and regulatory compliance. Let us help you strengthen your security defenses, respond effectively, control costs and optimize your team’s capabilities through SIEMphonic.

How many people does it take to run a SIEM?

You must have a heard light bulb jokes, for example:
How many optimists does it take to screw in a light bulb? None, they’re convinced that the power will come back on soon.

So how many people does it take to run a SIEM?
Let me count the ways.

Assuming the SIEM has been installed and configured properly (i.e, in accordance with the desired use cases), a few different skill sets are needed (these can all be the same person but that is quite rare).

SIEM Admin: This person handles the RUN function and will maintain the product in operational state and monitor its up-time. Other duties include deploying updates from the vendor and optimizing system performance. This is usually a fraction of a full time equivalent (FTE). About 4-8 hours/week for the typical EventTracker installation.

Security Analyst: This person handles the WATCH function and uses EventTracker for security monitoring. In the case of an incident, reviews activity reports and investigates alerts. Depending on the extent of the infrastructure being monitored, this can range from a fraction of an FTE to several FTEs. Plan for coverage on weekends and after hours. Incident response may require notification of other admin personnel.

SIEM Expert: This person handles the TUNE function and refines/customizes the SIEM rules/content and creates rules to support new use cases. This function requires the highest skill level, familiarity with the network and expertise with the SIEM product.

Back to the (bad) joke:
Q. So how many people does it take to run a SIEM?
A. None! The vendor said it manages itself!

Healthcare Practices are at Particularly High Risk of Data Breach

The CDC estimates that close to 80% of office-based physicians use some form of electronic medical records. This proliferation of EMR, coupled with recent breaches of patients’ personal healthcare information and personal identifiable information has highlighted the need for security of medical office networks.

HIPAA mandates the need to place safeguards to protect patients’ healthcare information which is becoming more complicated as facilities offer WiFi to their patients and employees.

Netsurion's regulatory compliant managed network services ensure your patients’ PHI and PII are protected.

With data breaches continually on the rise, it is critical to have a trusted managed network and data security solution in place that is compatible with all EMR solutions, includes enterprise-level firewalls, and provides 360 web traffic monitoring - all at an affordable cost for small- and medium-sized practices.

Helping Enterprises of All Sizes Accelerate Their Security Journey

Change is the only constant in the IT security space. Here at Netsurion, we strive to empower organizations to take on ever-evolving cyber threats regardless of the size and scope of their business operations. With this core mission in mind, we are proud to introduce John Addeo as our new Chief Revenue Officer. He is equipped with over 20 years of Enterprise IT business experience and an impressive history of jumpstarting channel growth at cybersecurity and IT companies including Rapid7 and Red Hat.

Q: John, what inspired you to join Netsurion’s leadership team?

A: I want to start by saying that I am thrilled to be part of such a talented team. Through my time in the cybersecurity industry, I’ve been able to reflect on just how important managed security solutions are for companies regardless of their vertical market or security maturity. Joining Netsurion gives me an opportunity to dig into the big issues that prevent organizations from improving their security posture, namely, the struggles of attracting and retaining skilled cybersecurity expertise, technology challenges in deployment and ongoing management, and the high cost of attack surface protection. I’m excited to showcase Netsurion’s top-notch managed extended detection and response (XDR) as a solution to those problems. Cybersecurity protection is not the core of most companies’ offerings, and as organizations are more aware of the need the biggest obstacle is how to start and where to go for help. We want to make sure organizations know we are here to help solve these complex challenges and protect their company. There’s a big opportunity to simplify security and make it affordable and I’m happy to lead Netsurion’s efforts. 

Q: What are you most looking forward to in your new role as CRO?

A: I’m really looking forward to helping our customers and partners address real-world challenges. We give them the cybersecurity expertise and tools they need to protect their business. We also have a great partner program that allows MSPs and MSSPs to leverage our resources to offer managed XDR services to their own customer base. Ultimately though, I’d like to expand both our channel and sales offerings even further by tapping into the needs of solution providers who want to help their clients solve complex security challenges and leverage an award-winning managed security offering. We can help them build their business by giving them the power to start customers on their journey toward security maturity.

Discussions about cybersecurity are in boardrooms without a doubt. A data breach can cost companies millions of dollars and disrupt operations, so this is a business problem as much as it is a cyber problem. Netsurion sponsored a recent CyberEdge report which found that 85% of organizations suffered from a successful cyber attack last year and 63% of ransomware victims paid hackers to get their data back. Netsurion partners are solving customers’ cybersecurity challenges on the front lines, and we want to ensure they have the tools and support needed to lead the charge.

Q: In closing, what message would you like to convey to current and prospective customers and partners?

A: I believe the primary goal of any great CRO is to create a strategy to facilitate meaningful, lasting relationships with our customers and partners. The cyber threat landscape is more complex than ever before, and we recognize that cybersecurity solutions must be tailored to the risks, goals, and attack surface of each organization. Whether you’re a small business, a healthcare organization, an MSP, a larger enterprise, or a partner, we can help you predict, prevent, detect, and respond to escalating cyber threats. I’m delighted to be able to help drive cross-functional alignment and agile execution in this rapidly changing technological world.

Black Hat Recap: Cybersecurity Insights That Enhance Security Operations

Black Hat 2019 was a learning experience and success for all. All of the hackers, presenters, vendors, and attendees have gone home, but what you learned in Vegas doesn’t have to stay in Vegas. Hopefully you are bringing new information and insights back to your daily operations. Here are some of Netsurion’s key takeaways from Black Hat 2019.

All in all, we also learned many organizations out there still struggle to find the right cybersecurity partner that can offer a turn-key yet customizable solution for their IT security, threat protection, and compliance management needs. If we did not have the pleasure of meeting with you at Black Hat, or you didn’t have time to see a demo of our solutions, we’d like to invite you to our next product demo.

blackhat demo 20191
blackhat team 20191

5 Security Tips for Small and Multi-location Tax and Accounting Firms: Tax Season and Beyond

Tax season is a busy time of year for hackers, given the ample opportunities to steal personal and financial information through phishing, hacking into computer networks, or other underhanded methods.

Small and multi-location tax and accounting firms in the cross hairs

Hackers are targeting these businesses – whether a small CPA firm or tax-preparation franchise -- during this period because of the high volume of tax returns and other documents that they handle in preparing people’s taxes. These documents – often transmitted through cyberspace and stored on PCs or in the cloud -- contain copious amounts of personally identifiable information (PII), which can be used to conduct identity theft or fraud and sold on the black market.

And don’t think that being small or in a remote office makes you an uninteresting target. In fact, it’s just the opposite. Hackers see small businesses as more vulnerable, having committed cyberattacks against 42 percent of them in 2015, according to the National Small Business Association.

What these businesses can do to protect themselves – and their clients

Here are five tips that go beyond the basics you probably already know, like watching out for phishing and malware, keeping your anti-virus software up-to-date and using different hard-to-guess passwords for different services.

1. Use secure remote access to your office PCs so that they are less vulnerable to cyberattacks.

Remotely accessing your office PCs through a laptop or tablet may let you keep your business going while you’re on the road or at home, but it also creates opportunities for hackers to attack your network and steal vital information.

That’s why it’s critically important to make sure you have secure remote access, and here are two ways to do just that:

2. Learn how to stay safe in a public hotspot.

It is often difficult to know for sure whether the Wi-Fi hotspot you’re using while sitting on a park bench or in the corner coffee shop is safe, so you should take a few precautions while on public Wi-Fi. Never enter a password for any web service or credit-card information on public Wi-Fi, unless you double-checked that you have an HTTPS connection and clicked on the padlock to confirm you are at the site that you think you are.

Even with that, be very wary of accessing your bank information or paying with a credit card. Also, if you see a pop-up message that indicates something is wrong with the “certificate” of the location you are trying to access, then you should immediately stop using that connection altogether. Certificate errors are the most common sign that someone is trying to trick you into revealing your data.

You may want to avoid the issue altogether by using your smartphone as a tethered internet device. Many carriers, such as AT&T, Verizon and Yahoo, and Sprint, have a way to let you set up your phone as a secure Wi-Fi hotspot that can be accessed by other devices such as your laptop or tablet. This way, your data is unavailable to a nearby hacker since the connection is through a cellular network.

3. Encrypt files with password protection and send password separately through other channels.

You should encrypt files on your computer with passwords to deter hackers from getting access to information stored in those files, in the event you are breached. If a file is sent to someone through email, the password should be sent to the recipient in segments through different channels, such as text, IM or over the phone. This will prevent hackers from obtaining the password to the encrypted file, if they have compromised your PC, for example.

4. Lock down your network with a firewall.

Most businesses have several firewalls in their PCs, cable modems and servers, and maybe even a dedicated firewall device. An improperly configured firewall, however, offers no defense at all, and proper management is a highly specialized skill that even a highly trained IT specialist may not have.

Your firm should hire a managed security service provider, or MSSP, to make sure it has the firewall protection it needs. Your business should also create strong passwords for firewalls, servers, and network devices instead of using default codes – and change them often – to limit remote access to the appropriate people such as managers or vendors who perform routine system maintenance.

5. Get big-company security for cheap.

Large firms employ an advanced security technology called security information and event management (SIEM) to help monitor their network and device alerts, and breach detection to detect and block threats. These technologies, however, are really complicated to operate and manage, which has put them out of reach for small businesses.

SIEM and breach detection are available as a managed service from certain providers. As a result, this protection is in reach of any size company or remote office, so firms will be able to focus on providing the best service to their clients with the peace of mind of having enterprise-class security to protect them.

Whatever the size of your financial services firm, you should ensure that you have the proper cybersecurity measures and follow best practices to prevent your business from falling victim to the next cyberattack. Hackers are continually coming up with newer, more sophisticated ways to steal valuable information through breaches, so it is imperative that you remain ever vigilant against the next attack to protect the security of your business and your clients - not only during tax time but throughout the entire year.

Tracking removable storage with the Windows Security Log

With data breaches and Snowden-like information grabs, I’m getting increased requests for how to track data moving to and from removable storage, such as flash drives.  The good news is that the Windows Security Log does offer a way to audit removable storage access.  I’ll show you how it works, and since Netsurion's Open XDR has some enhanced capabilities in this area, I’ll briefly compare native auditing to Open XDR.

Removable storage auditing in Windows works similar to and logs the exact same events as File System auditing.  The difference is in controlling what activity is audited.

To review, with File System auditing, there are 2 levels of audit policy.  First you enable the Audit File System audit subcategory at the computer level.  Then you choose which folders you wish to audit and enable object level auditing on those folders for the users/groups, permissions and success/failure results that need to be monitored.   For instance, you can audit Read access on C:documents for the SalesReps group.

However Removable Storage auditing is much simpler to enable and far less flexible.  After enabling the Removable Storage audit subcategory (see below) Windows begins auditing all access requests for all removable storage.  It’s equivalent to enabling auditing Full Control for Everyone.

Local Security Policy

As you can see, auditing removable storage is an all or nothing proposition.  Once enabled, Windows logs the same Event ID 4663 as for File System auditing.  For example, the event below shows that user rsmith wrote a file called checkoutrece.pdf to a removable storage device Windows arbitrarily named DeviceHarddiskVolume4 with the program named Explorer (the Windows desktop).

Microsoft Windows Security Auditing

How do we know this is a removable storage event and not just normal File System auditing?  After all, it’s the same event ID as used for normal file system auditing.  Notice the Task Category above which says Removable Storage.  The information under Subject tells you who performed the action.  Object Name gives you the name of the file, relative path on the removable storage device and the arbitrary name Windows assigned the device the first time it was connected to this system.  Process information indicates the program used to perform the access.  To understand what type of access (e.g. Delete, Write, Read) was performed look at the Accesses field which lists the permissions actually used.

If you wish to track information being copied from your network to removable storage devices you should enable Audit Removable Storage via group policy on all your endpoints.  Then monitor for Event ID 4663 where Task Category is Removable Storage and Accesses is wither WriteData or AppendData.

As you can see Microsoft took the most expedient route possible to providing an audit trail of removable storage access.  There are events for tracking the connection of devices – only the file level access events of the files on the device.  These events also do not provide the ability to see the device model, manufacturer or serial number.  That device information is known to Windows – it just isn’t logged by these events since they captured at the same point in the operating system that other file access events are logged.  On the other hand, Netsurion's Open XDR logs both connection events and information about each device. In fact, Open XDR event allows you selectively block or allow access to specific devices based on policy you specify.

Use VPN Properly to Support Work-from-Home Employees

Virtual Private Networks (VPNs) are a major piece of internet infrastructure holding together the work-from-home workforce right now. VPNs are responsible for encrypting web traffic, keeping data safe, and protecting privacy.

Description

With most employees working from home amid COVID-19 (coronavirus) outbreak, VPN servers have now become paramount to a company's backbone, and their security and availability must be the focus going forward for IT teams. It is now more important than ever that companies and IT staff set up systems to capture metrics about the performance and availability of VPN services.

Affected Systems

CISA (Cybersecurity and Infrastructure Security Agency) has issued an advisory for all VPN servers and client software.

Recommendations

Here are some tips for securing company resources in remote working:

Enable Multi-Factor Authentication for VPN accounts

In the light of an expected increase in VPN phishing attacks, companies should look very closely at enabling a multi-factor authentication (MFA) solution to protect VPN accounts from unauthorized access. In a report last year, Microsoft said that enabling a MFA solution for online accounts usually blocks 99.9% of all account takeover (ATO) attacks, even if the attacker has valid credentials for the victim's account.

VPN servers must be patched and updated

In addition to enabling MFA to protect VPN accounts for employees working from home, organizations should review the patching levels of corporate VPN products.

Previous attacks have targeted VPN servers from vendors such as Palo Alto Networks, Fortinet, Pulse Secure, and Citrix. Patches should be applied, and advisories should be followed, for critical vulnerabilities mentioned below:

With more and more companies needing VPN capabilities to allow workers to log into private corporate systems and do their duties, IT staff are responding by putting up more VPN servers to deal with the surging traffic. IT staff now need to pay close attention to the new VPN servers they are putting up and make sure these systems have been patched for the vulnerabilities listed above, which are some of the most targeted vulnerabilities today.

The danger of DDoS attacks on VPN servers

With so many organizations moving their employee workforce to work-from-home roles, there is now a new threat on the horizon -- extortions. Hackers could launch DDoS attacks on VPN services and exhaust their resources, crashing the VPN server and limiting its availability for mission-critical operations.

With the VPN server acting as a gateway to a company's internal network, this would prevent all remote employees from doing their jobs, effectively crippling an organization that has little to no workers on-site. Furthermore, SSL-based VPNs (like Pulse Secure, Fortinet, Palo Alto Networks, and others) are also vulnerable to an SSL Flood (DDoS) attack, just like web servers.

Social Engineering and phishing attacks are common tactics for hackers

The rapid introduction of work-from-home accelerates risk from adversaries. Remind employees to stay aware of potential phishing attempts, and if in doubt, don’t open or click on unknown or suspicious emails. People are sometimes the weakest link that malicious actors target in their stealthy attempts to inflict damage or steal sensitive data.

Conclusion

With the increased use of remote work, organizations should ensure that their VPN solution is monitored, patched, and closely managed to protect against active exploits. Expect phishing emails and social engineering attempts related to COVID-19 to continue, especially against high-value targets like sys admins in order to steal credentials. Please don’t hesitate to contact Lumifi or your customer success manager with any questions or to discussion something suspicious.

Resources

Thieves Tried to Steal Credit Cards from Nordstrom

When you think of the name Nordstrom, what comes to mind?

A large department store with valuable products at fair prices? Crowds pushing and squeezing their way to critical mass as the last few items left on the sales rack are consumed? How about an easy avenue for thieves to steal your credit cards?

The department store giant garnered unwanted attention earlier this month when they announced that a Florida store fell victim to a team of thieves who attached extremely small devices called key loggers in line with their keyboards where they plug into the registers. These devices look like extensions to a standard keyboard, and they are extremely hard to detect.

According to a statement made by local law enforcement, the men were captured on video adding the devices.

In a nutshell, these small pieces of hardware are designed to capture everything that is typed on the keyboard. This is also the same interface that the credit card machines can use to process credit cards.

Therefore, through this technology, it is possible to steal passwords and credit cards without anyone being the wiser.

In this particular case, Nordstrom believes that they detected the issue and removed the dangerous equipment before the thieves could return and retrieve sensitive information.

The reason this story has captured so much attention is because the devices used are so small that there was an excellent chance that they could have gone unnoticed. Also, more sophisticated models of key loggers have built-in wireless capabilities. They are still only about 1.5 inches long, but they too can steal key stokes, credit cards, or other sensitive data.

In turn, they can then send that data to an outside receiver without anyone coming back into the store. Thieves would be using radio waves to gather sensitive data, and it would be nearly impossible to detect the theft until people noticed the fraudulent charges to their accounts.

The real problem with this type of theft is that there has been a noticeable rise in thieves using these purpose-built devices to assist them with their activities. ATMs and convenience stores have been the two industries most heavily targeted historically, but back in 2011 Michaels had approximately 90 stores in 20 states affected by a similar theft. Unlike Nordstrom, Michaels did not stop the thieves before credit cards were stolen.

We are ushering in a new era in electronic data theft – hackers are adding electronics to POS systems, so look for strange behavior around your registers and devices you do not recognize.

Learn Why Data Privacy is Good for Your Business

Following many high-profile data breaches, consumers have elevated data privacy to front-page news and included it as criteria for brand selection and engagement. Consumers around the globe now realize that they aren’t always aware or informed about how their private information is used or shared. Fifty-four percent of consumers are more concerned with protecting their personal information than they were a year ago, according to a survey reported by Security Magazine. Furthermore, 78% of respondents stated they would stop engaging with a brand online if the brand experienced a data breach. When a business practices strong privacy compliance, it can shorten the sales cycle and increase customer trust, according to another third-party study. Data privacy impacts the bottom line and business executives are more keenly aware of its growing importance in today’s always-on digital environment.

Read on to learn why data privacy is critical to your business and view some easy-to-use tools to help along the way to reach your goals. With an estimated 2.5 quintillion bytes of data created daily, it’s imperative to have better transparency and control regarding data use and sharing. A data breach can lead to sensitive personal information getting into the hands of cybercriminals, competitors, and dangerous nation-state attackers. Password reuse also means that leaked personal login details likely impact professional applications and resources as well.

Why Data Privacy and Data Security is so Important

Data privacy involves ensuring the confidentiality, integrity, and availability of data to safeguard against unauthorized use. It’s defined as exercising control over how Personally Identifiable Information (PII) is collected, stored, or used for an individual. Organizations like yours are responsible for being good data stewards of your employee data as well as customer data. For businesses, data security builds upon PII to protect intellectual property, operating plans, and confidential financial results.

The data privacy landscape is changing as regulations such as the California Consumer Privacy Act (CCPA) and General Data Protection Act (GDPR) raise the bar for organizations to adopt in meeting consumer expectations and new legislation. Data privacy and cybersecurity are converging as people, processes, and technology protect against advanced threats and stealth data breaches.  As NIST points out, an investment in data privacy increases trust in systems, products, and services across your entire supply chain. You will need to balance the risk and reward of data privacy and information security according to your security maturity and risk posture. Staying ahead of evolving data privacy requirements simplifies operations and enhances your customer loyalty, compliance mandates, and competitive advantage.

Data Privacy Toolkit

Data privacy regulations are stringent. Not complying with them could result in fines, damage to your company’s reputation, or could force you to close your doors. Below are a few data privacy resources to leverage online.

As a business, here are a few things you can do to ensure you’re safeguarding your customers’ data.

Protecting information for your business is just as important as protecting your personal information. Here are some tips to safeguard your data.

EventTracker is Netsurion’s SOC-as-a-Service (SOCaaS) solution with its scalable multi-tenant architecture and proven outcomes that provides powerful, affordable threat protection and data security to your customers. Learn more about Lumifi.

Certificates and Digitally Signed Applications: A Double Edged Sword

Windows supports the digitally signing of EXEs and other application files so that you can verify the provenance of software before it executes on your system.  This is an important element in the defense against malware.  When a software publisher like Adobe signs their application they use the private key associated with a certificate they’ve obtained from one of the major certification authorities like Verisign.

Later, when you attempt to run a program, Windows can check the file’s signature and verify that it was signed by Adobe and that its bits haven’t been tampered with such as by the insertion of malicious code.

Windows doesn’t enforce digital signatures or limit which publisher’s programs can execute by default, but you can enable that with AppLocker.  As powerful as AppLocker potentially is, it is also complicated to set up, except for environments with a very limited and standardized set of applications.  You must create rules for at least every publisher whose code runs on your system.

The good news, however, is that AppLocker can also be activated in audit mode.  And you can quickly set up a base set of allow rules by having AppLocker scan a sample system.  The idea with running AppLocker in audit mode is that you then monitor the AppLocker event log for warnings about programs that failed to match any of the allow rules.  This means the program has an invalid signature, was signed by a publisher you don’t trust or isn’t signed at all.  The events you look for are 8003, 8006, 8021 and 8024 and these events are in the logs under AppLocker as shown here:

If you are going to use AppLocker in audit mode for detecting untrusted software remember that Windows logs these events on each local system.  So be sure you are using a SIEM with an efficient agent, like EventTracker, to collect these events or use Windows Event Forwarding.

Better yet, if you have EventTracker, don’t bother with AppLocker – use EventTracker’s automatic Digital Forensics Incident and Incident Response feature for unknown processes.  EventTracker watches each process (and soon each DLL) that your endpoints load and checks the EXE’s hash against your environment’s local whitelist (which EventTracker can automatically build). If not found there, EventTracker checks it against the National Software Reference Library.  If the EXE still isn’t found to be legit, EventTracker posts it to the dashboard for you to review.  EventTracker automatically provides publisher information if the file is signed, and other forensics such as the endpoint, user and parent process.  With one click you can check the process against anti-malware sites such as VirusTotal. EventTracker goes way beyond AppLocker in its ability to detect suspicious software and giving the tools and information to quickly determine if the program is a risk or not, including the use of digital signatures.

There are some other issues to be aware of, though, with digitally signed applications and certificates.  Certificates are part of a very complicated technology called Public Key Infrastructure (PKI).  PKI has so many components and ties together so many different parties there is unfortunately a lot of room for error.   Here’s a brief list of what has gone wrong in the past year or so with signed applications and the PKI that signatures depend on:

  1. Compromised code-signing server: I’d said earlier that code signing allows you to make sure a program really came from the publisher and that it hasn’t been modified (tampered).  But it depends on how well the publisher protects their private key.  And unfortunately Adobe is a case in point.  A while back some bad guys broke into Adobe’s network and eventually found their way to the very server Adobe uses to sign applications like Acrobat.  They uploaded their own malware and signed it with Adobe’s code signing certificate’s private key and then proceeded to deploy that malware to target systems that graciously ran the program as a trusted Adobe application.  How do you protect against publishers that get hacked?  There’s only so much you can do.  You can create stricter rules that limit execution to specific versions of known applications but of course that makes your policy much more fragile.
  2. Fraudulently obtained certificates: Everything in PKI depends on the Certification Authority only issuing certificates after rigorously verifying the party purchasing the certificate is really who they say they are.  This doesn’t always work.  A pretty recent example is Spymel a piece of malware signed by a certificate DigiCert issued to a company called SBO Invest.  What can you do here?  Well, using something like AppLocker to limit software to known publishers does help in this case.  Of course if the CA itself is hacked then you can’t trust any certificate issued by it.  And that brings us to the next point.
  3. Untrustworthy CAs: I’ve always been amazed at all the CA Windows trusts out of the box.  It’s better than it used to be but at one time I remember that my Windows 2000 system automatically trusted certificates issued by some government agency of Peru.  But you don’t have trust every CA Microsoft does.  Trusted CAs are defined in the Trusted Root CAs store in the Certificates MMC snap-in and you can control the contents of this store centrally via group policy
  4. Insecure CAs from PC Vendors: Late last year Dell made the headlines when it was discovered that they were shipping PCs with their own CA’s certificate in the Trusted Root store.  This was so that drivers and other files signed by Dell would be trusted.   That might have been OK, but they mistakenly broke The Number One Rule in PKI.  They failed to keep the private key private.  That’s bad with any certificate let alone a CA’s root certificate.  Specifically, Dell included the private key with the certificate.  That allowed anyone that bought an affected Dell PC to sign their own custom malware with Dell’s private key and then once deployed on other affected Dell systems to run it with impunity since it appeared to be legit and from Dell.

So, certificates and code signing are far from perfect — show me any security control that is.  I really encourage you to try out AppLocker in audit mode and monitor the warnings it produces.  You won’t break any user experience, the performance impact is hardly measurable and if you are monitoring those warnings you might just detect some malware the first time it executes instead of the 6 months or so that it takes on average.

Avoid Three Common Active Directory Security Pitfalls

While the threats have changed over the past decade, the way systems and networks are managed have not. We continue with the same operations and support paradigm, despite the fact that internal systems are compromised regularly. As Sean Metcalf notes, while every environment is unique, they all too often have the same issues. These issues often boil down to legacy management of the enterprise Microsoft platform going back a decade or more.

There is also the reality of what we call the Assume Breach paradigm.  This means that during a breach incident, we must assume that an attacker a) has control of a computer on the internal network and b) can access the same resources of legitimate users through recent log on activity.

Active Directory (AD) is the most popular Lightweight Directory Access Protocol (LDAP) implementation and holds the keys to your kingdom. It attracts attackers, as honey attracts bees. There are many best practices to secure Active Directory, but to start, let’s ensure you stay away from common pitfalls. Below are three common mistakes to avoid:

  1. Too many Domain Admins: Active Directory administration is typically performed by a small number of people. Membership in Domain Admins is rarely a valid requirement.Those members have full administrative rights to all workstations, servers, Domain Controllers, Active Directory, Group Policy, etc., by default. This is too much power for any one account, especially in today’s modern enterprise. Unless you are actively managing Active Directory as a service, you should not be in Domain Admins.
  2. Over-permissioned Service Accounts: Vendors have historically required Domain Admin rights for Service Accounts even when the full suite of rights provided is not actually required, though it makes the product easier to test and deploy. The additional privileges provided to the Service Account can be used maliciously to escalate rights on a network. It is critical to ensure that every Service Account is delegated only the rights required, and nothing more. Keep in mind that a service running under the context of a Service Account has that credential in LSASS (protected memory), which can be extracted by an attacker. If the stolen credential has admin rights, the domain may be quickly compromised due to a single Service Account.
  3. Not monitoring admin group membership: Most organizations realize that the number of accounts with admin rights increases on a yearly, if not monthly basis, without ever going down. The admin groups in Active Directory need to be scrutinized, especially when new accounts are added. It’s even better to use a system that requires approval before a new account is added to the group. This system can also remove users from the group when their approved access expires.

By avoiding these pitfalls, and securing Active Directory properly, you are on your way to keeping your “kingdom” safe. But like Thomas Paine said, “Those who expect to reap the blessings of freedom must, like men, undergo the fatigue of supporting it.” There are a number of ways to reap the benefits of a secure infrastructure, but there are many intracacies required to make this a reality. Solutions, like SIEMphonic Enterprise, takes on “fatigue” required to with a dedicated 24/7 SOC.

Click here for more details or sign up for a free demo today.

Buy, Rent, or Uber Your Security Operations Center

We all know that data breaches cost a lot—an average of $3.6M per organization.

For cyber criminals, everyone’s a target—and perfect prevention isn’t practical. We must assume that, at some point, every organization’s IT infrastructure will be breached. That’s why we need to continuously monitor, investigate, and respond to cyber threats 24/365 if we are to avoid costly breaches and the potential impact to reputation, revenue, and customer confidence.

What better way to provide continuous monitoring and analysis than through a security operations center (SOC)? With the people, processes, and platform to continuously look across the entire organization’s networks, servers, endpoints, applications, and databases, a SOC applies expert knowledge to detect and dig into potential threats. One of the key benefits of a SOC is preventing the devastating impact of a breach by reducing the dwell time (the time between when an attacker compromises a network—minutes—and when the organization discovers the threat—typically months!)

Cost and complexity are roadblocks

Any way you look at it, a SOC is complex and expensive. It requires a lot of specialized hardware and software to generate events and alerts, which must be examined by highly skilled security analysts who can determine which ones represent real threats.

The platform is costly.

You need a well-tuned SIEM (security information and event management) to provide the visibility foundation, along with firewalls, IPS/IDS, vulnerability assessment tools, endpoint monitoring solutions, and more. All of this must be fed by threat intelligence that is specific to your organization’s goals and risk tolerance, and the results need to be augmented by machine learning and fine-tuned by human experts.

Processes are costly as well.

Detailed organization-specific playbooks need to be written, spelling out what should happen when ransomware, malware infections, distributed denial of service attacks, or other threats are seen. They specify how to investigate, what evidence to gather, and when and how to escalate.

Perhaps the most expensive component is people.

It’s difficult enough to hire a team of highly skilled security analysts with the bandwidth and expertise to perform continuous monitoring, while we are experiencing a worldwide shortage. It’s even harder to retain them in the face of stiff competition for scarce talent.

The Complete SOC: Platform. People. Process.

Capabilities

Finding the best route

Reaching the goal of continuous coverage is not a simple make/buy decision: it’s more of a buy/rent/co-manage decision: should you build your own SOC, outsource your SIEM (or SOC) platform, or leverage a co-managed SOC solution.

1. Building your own SOC is akin to buying a car to get from Point A to Point B.

You incur all the platform, process, and people costs – but you are in total control over where you are going and how to get there (i.e. what your organization sees as risks, threats, and responses). Of course, the cost and complexity could be prohibitive.

2. Outsourcing your SIEM or SOC platform is like renting a car.

You don’t have to make the capital outlay for hardware, but you still need to carry out all the processes—and you must hire, train, and retain your own SOC team. It’s less expensive than building your own SOC, but still quite pricy.

3. Leveraging a co-managed SOC solution is like using Uber to get to your destination.

You augment your own internal team with seasoned security experts with mature processes driving a powerful SIEM platform, yet you remain in control of the ultimate destination. A co-managed SOC ensures that the collective team is operating in concert to reach your organization-specific goals.

Uber your way to a SOC

The goal is to get from Point A (your organization’s current security and compliance posture) to Point B (stronger security posture, compliance confidence, and incident readiness). Clearly, the most cost-effective way to reach that goal is via a co-managed SOC – the Uber approach. You get the best of both worlds: the best people, processes, and platform, at the lowest cost. Not only do you avoid the people and process costs, you retain control over the aspects that are specific to your organization: your risk tolerance, your market realities, and your definition of what’s most important to you.

Maybe it’s time to follow the lead of the ride-sharing world, and take the smarter route to a SOC. Netsurion is the only managed security service provider that combines our own ISO-certified 24/7 SOC with our own award-winning SIEM platform for a truly integrated co-managed security solution.

Advanced HTTP Flood Attacks Are Becoming Commonplace: Make Sure Your Organization is Prepared

Cybercriminals are now leveraging attack vectors previously only available to well-funded nation-state actors.

Security professionals know the dangers associated with distributed denial-of-service attacks (DDoS). These attacks typically target the core data transmission protocols that form the foundation of every organization' internet services. 

(more…)

Cloud Security Starts at Home

Cloud security is getting attention and that’s as it should be.  But before you get hung up on techie security details, like whether SAML is more secure than OpenID Connect and the like, it’s good to take a step back.  One of the tenets of information security is to follow the risk.  Risk is largely a measure of damage and likelihood.  When you are looking at different threats to the same cloud-based data then it becomes a function of the likelihood of those risks.

In the cloud we worry about the technology and the host of the cloud.  Let’s focus on industrial-strength infrastructure and platform-as-a-service clouds like AWS and Azure.  And let’s throw in O365 – it’s not infrastructure or platform, but its scale and quality of hosting fits our purposes in terms of security and risk.  I don’t have any special affection for any of the cloud providers, but it’s a fact that they have the scale to do a better, more comprehensive, more active job on security than my little company does, and I’m far from alone.  This level of cloud doesn’t historically get hacked because of stupid operational mistakes or flimsy coding practices with cryptography and password handling, or because of obscure vulnerabilities in standards like SAML and OpenID Connect (they are present). It’s because of tenant-vectored risks.  Either poor security practices by the tenant’s admins or vulnerabilities in the tenant’s technology which the cloud is exposed to or on which it is reliant.

Here are just a few scenarios of cloud intrusions with a tenant origin vector

S.no. Tenant Vulnerability Cloud Intrusion
1. Admin’s PC infected with malware Cloud tenant admin password stolen
2. Tenant’s on-prem network penetrated VPN connection between cloud and on-prem network
3. Tenant’s Active Directory unmonitored Federation/synchronization with on-prem AD results in an on-prem admin’s account having privileged access to the cloud.

I’m going to focus on the latter scenario.  The point is that most organizations integrate their cloud with their on-prem Active Directory, and that’s as it should be.  We hardly want to go back to the inefficient and insecure world of countless user accounts and passwords per person.  We were able to largely reduce that of the years by bringing more and more on-prem apps, databases and systems online with Active Directory.  Let’s not lose ground on that with the cloud.

But your greatest risk in the cloud might just be right under your nose here in AD on your local network.  Do you monitor changes in Active Directory?  Are you aware when there are failed logons or unusual logons to privileged accounts?  And I’m not just talking about admin accounts.  Really, just as important, are those user accounts who have access to the data that your security measures are all about.  So that means identifying not just the IT groups in AD, but also those groups which are used to entitle users to that important data.  Very likely some of those groups are re-used in the cloud to entitle users there as well.  Of course the same goes for the actual user accounts.

Even for those of us who can say our network isn’t connected by VPN or any direct connections (like ExpressRoute for Azure/O365) and there’s no federation or sync between our on-prem and cloud directories your on-prem, internal security efforts will make or break your security in the cloud and that’s simply because of #1.  At some point your cloud admin has to connect to the cloud from some device.  And if that device isn’t secure or the cloud admin’s credential handling is lax, you’re in trouble.

That’s why I say that for most of us in the cloud need to first look inward for risks.  Monitoring, as always, is key.  The detective control you get with a well implemented and correctly used SIEM is incredible and often the only control you can deploy at key points, technologies or processes in your network.

State Sponsored Hacking – More Than an Issue for Sony

We live in a brave new world where the spies of yesteryear, like James Bond and Jason Bourne, are truly falling away into the realm of fantasy.

These smooth operators have been replaced by the slightly awkward, pasty-faced, computer hacker, who can gather more data or do more damage with a keyboard than a field agent could ever hope to accomplish with a gun and some daring.

Traditionally speaking, hackers were primarily criminals looking to make a buck or cause some havoc.

More recently, many nations utilize them as a military tactical unit meant to wage war on the electronic battlefield. Much like a bombing run would damage targets in the physical sense, hackers use technology to disrupt the digital front.

This latest attack, which was aimed at Sony, is a prime example of how a nation can bring this new weapon into play. According to claims by an FBI press release on 12/19/2014 and statements made by FBI Director James Comey on 1/7/2015, Sony was the victim of state-sponsored hacking.

Evidence cited indicates that North Korea targeted the media company when it planned to release a movie in which a couple of bumbling TV personalities are hired by the CIA to assassinate Kim Jong-un.

Before the hacking incident, this movie was destined to be released; watched by a few die-hard Seth Rogan and James Franco fans; and immediately go into the annals of movie obscurity.

That, of course, was not the case once Sony garnered international attention after the alleged state sponsored hacking. If Sony was indeed attacked by North Korea in the manner claimed by the FBI it could reasonably be considered an act of war.

The Sony breach has now become international news and the movie is on the mind of the world. Sony was heavily pressured by the public to release the film after the hacking incident.

Originally, Sony indefinitely postponed the release after consulting with theater owners. The decision was based on the promised physical violence that hackers claimed would follow if they did. Claiming it was concerned for the welfare of US movie goers, Sony decided to cancel the US release.

Even President Obama criticized Sony in a press conference about this decision, stating that the company should not have pulled The Interview from theaters.

Since then, Sony has released the film on-line and in some movie theaters across the US. In response to this attack The Whitehouse plans to focus (at least in part) on cyber security during the upcoming State of the Union Address. Experts agree that a new Whitehouse sponsored cyber bill will be forthcoming.

Cyber Warefare

There are several reasons that countries are moving to cyber warfare.

First of all, it is normally quite difficult to prove who originated an attack. Even with all the evidence gathered by the FBI and other government agencies, many experts do not agree that we can definitively claim who was responsible for the attack. In fact, it is completely plausible that a group of rogue hackers managed to essentially frame North Korea because the US was already looking at other possible state sponsored hacking attacks before the incident involving Sony

Despite who is to blame, one thing is certain from looking at the disruptive nature of this attack. The hackers spent, comparatively speaking, very little in time, money, and resources to infiltrate Sony.

On the other hand, the company has since spent millions of dollars in cyber security, logistics, press releases, and slew of other unplanned expenditures. They have shouldered a huge financial burden due to this attack.

In the same vein, the US government has had congressional meetings, inquiries, and spent countless man hours trying to trace the origin of this attack and in developing, as President Obama stated, “An appropriate response.”

Even if North Korea was responsible for this attack and it can be proven, can we honestly claim victory? From a cost perspective in both time and money, hackers have the advantage.

In Summary

The Internet has been unsafe for several years. Malware, salacious material, and cyber bullying are not new issues that we have not faced previously, however, security has never been more critical than it is currently.

State sponsored hacking is still in its infancy and look what it has already achieved. Managing Internet connections and protecting sensitive networks is more crucial now than at any other time in history.

For more information on how you can protect yourself and your business, check out this article regarding the Five Steps to Protect Retailers from Credit Card Theft.

Top 3 traits of a successful Security Operations Center

Traditional areas of risk - financial risk, operational risk, geopolitical risk, risk of natural disasters - have been part of organizations’ risk management for a long time. Recently, information security has bubbled to the top, and now companies are starting to put weight behind IT security and Security Operations Centers (SOC).

Easier said than done, though. Why you ask? Two reasons:

From our own experience creating and staffing an SOC over the past three years, here are the top three rules:

1) Continuous communication

It’s the fundamental dictum (sort of like “location” in real estate). Bi-directional management to the IT team.

Management communicates business goals to the technology team. In turn, the IT team explains threats and their translation to risk. Management decides the threat tolerance with their eye on the bottom line.

We maintain a Runbook for every customer which records management objectives and risk tolerance.

2) Tailor your team

People with the right skills are critical to success and often the hardest to assemble, train and retain. You may be able to groom from within. Bear in mind, however, that even basic skills, such as log management, networking expertise and technical research (scouring through blogs, pastes, code, and forums), often come after years of professional information security experience.

Other skills, such as threat analysis, are distinct and practiced skill sets. Intelligence analysis, correlating sometimes seemingly disparate data to a threat, requires highly developed research and analytical skills and pattern recognition.

When building or adding to your threat intelligence team, especially concerning external hires, personalities matter. Be prepared for Tuckman’s stages of group development.

3) Update your infrastructure

Security is 24x7x365 – automatically collect, store, process and correlate external data with internal telemetry such as security logs, DNS logs, Web proxy logs, Netflow and IDS/IPS. Query capabilities across the information store requires an experienced data architect. Design fast and nimble data structures with which external tools integrate seamlessly and bi-directionally. Understand not only the technical needs of the organization, but also be involved in a continuous two-way feedback loop with the SOC, vulnerability management, incident response, project management and red teams.

Easy, huh?

Feeling overwhelmed thinking about a Security Operations Center? Get SIEM Simplified on your team. 

Think you are too small to be hacked?

As a small business, how would you survive an abrupt demand for $250,000? It’s ransomware, and as this poll shows, that’s what an incident would cost a small business. Just why has ransomware exploded on to the scene in 2017? Because it works. Because most bad guys are capitalists and are driven by the profit motive. Because most small business have not taken the time to guard their data. Because they are soft targets. What makes the news headlines are the attacks on large companies like Merck, Maersk or large government, NHS Hospitals in the UK, etc. But make no mistake, small businesses get hit every day – they’re just not in the headlines. After all, more people miss work due to the common cold, but this never makes the news. On the other hand, a single case of Ebola and whoa!

Unfortunately this leads to confirmation bias. Since you don’t hear about it, it must not be a thing, right? That’s dangerous thinking for a small business. The large corporations can bounce back from cyberattacks; they have the depth of pocket to hire the experts needed during the crisis. But how does a small businesses cope? Breach costs can go to $250,000, not to mention the destruction of client trust if word gets out that confidential information was leaked.

So what do you do? Try these three steps:

  Educate
It starts with you and your employees. Know your digital assets and maintain an up-to-date inventory. Invest in training of employees, as they are the weakest link in the IT security game.
Protect
Minimum diligence includes up-to-date anti-virus, a managed next-gen firewall and regular patching. Step it up with endpoint protection. Regular reviews of user and system activity is a solid, low-cost improvement to close the gap.
Co-source
Get an expert on your team. It’s too expensive to get dedicated resources, but this doesn’t mean you have to go it alone.  Co-sourcing is an excellent technique to have an expert team on call that specializes in cybersecurity.
***Some images from FreePik.com

3 Do's and 1 Don't to Improve Your IT Security

Overwhelmed by the hype from security vendors in overdrive? Notice the innovation and trends and feel like jumping on the bandwagon? It’s a urge that many buyers in mid-size companies feel and it can be overpowering. That flashy vendor demo, that rousing speech at a tradeshow, that pressure of keeping up with the Joneses. So what have you done for your security lately is a nagging thought.

Relax and take a deep breath. Let’s look calmly and identify some security actions that you can take which a) won’t break the budget b) can be practically implemented and c) will scale.

What is the reality?

So what can you practically do to improve your security posture? Three things you can DO:

  1. Cover the basics of patching, hardening, vulnerability management.
  2. Invest in security monitoring and incident response. Maybe co-managed SIEM or maybe managed EDR?
  3. Figure out what security functions can be delivered as a service to overcome staffing limitations.

And the one DON’T:

  1. Don’t fall for vendor hype, rush out and buy the shiny new whizzbang security doohickey being touted as the must-have product of the week.

 
Cybersecurity requires a multi-layer strategy encompassing prevention, detection, and response. Work with a security partner who can deliver on these three components, augment your team with security expertise, and deliver it as a managed service to make things simple. As the UK government said in 1939 in preparation for World War II, Keep Calm and Carry On. Good advice like best practices never go out of style.
 

Last Year's Cyber Attack Trends — This Year's Implications

Red teams attack, blue teams defend.
That’s us – defending our network.

So what attack trends were observed in 2015? And what do they portend for us blue team members in 2016?

The range of threats included trojans, worms, trojan downloaders and droppers, exploits and bots (backdoor trojans), among others. When untargeted (more common), the goal was profit via theft. When targeted, they were often driven by ideology.

Over the years, attackers have had to evolve their tactics to get malware onto computers that have improved security levels. Attackers are increasingly using social engineering to compromise computer systems because vulnerabilities in operating systems have become harder to find and exploit.

Ransomware that seeks to extort victims by encrypting their data is the new normal, replacing rogue security software or fake antivirus software of yesteryear that was used to trick people into installing malware and disclosing credit card information. Commercial exploit kits now dominate the list of top exploits we see trying to compromise unpatched computers, which means the exploits that computers are exposed to on the Internet are professionally managed and constantly optimized at an increasingly quick rate.

However, one observation made by Tim Rains, Chief Security Advisor at Microsoft was, “although attackers have accumulated more tricks and tactics and seem to be using them in a more focused, fast paced way, they still focus on a relatively small number of ways to compromise computers.” These include:

In fact, Rains goes on to note: “Notice I didn’t use the word ‘advanced.’

As always, it’s back to basics for blue team members. The challenge is to defend:

If this feels like Mission Impossible, then you may be well served by a co-managed service offering in which some of the heavy lifting can be taken on by a dedicated team.

Time is money. Downtime is loss of money.

Time is money. Downtime is loss of money. The technological revolution has introduced a plethora of advanced solutions to help identify and stop intrusions. There is no shortage of hype, innovation, and emerging trends in today's security markets. However, data leaks and breaches persist. Shouldn't all this technology stop attackers from gaining access to our most sensitive data? Stuxnet and WannaCry are examples of weaknesses in the flesh-and-bone portion of a security plan. These attacks could have been prevented had it not been for human mistakes.
 
Stuxnet is the infamous worm (allegedly) authored by a joint U.S.-Israeli coalition, designed to slow the enrichment of uranium by Iran's nuclear program. The worm exploited multiple zero-day flaws in industrial control systems, damaging enrichment centrifuges. So, how did this happen?

 
If human beings had updated their systems, we may never have added "WannaCry" to our security lexicon. WannaCry and its variants are recent larger-scale examples. Microsoft had issued patches for the SMBv1 vulnerability, eventually removing the protocol version from Windows. Still, some 200,000 computer systems were infected in over 150 countries worldwide to the tune of an estimated $4 billion in ransoms and damages.
 
The lesson here? We care too much about gadgets and logical control systems, and not enough about the skilled staff needed to operate this technology. Gartner estimates that 40 percent of mid-size enterprises don't have a cybersecurity expert in their organization. A labor shortage for security professionals will prevent you from filling this talent gap for at least three years. A logical solution is to assess which security functions can be effectively delivered as a service to minimize internal staffing requirements.

Services (such as EventTracker Enterprise) solve popular use cases including:

The cost of doing nothing is significant.

SIEM: Sprint or Marathon?

Winning a marathon requires dedication and preparation. Over long periods of time. A sprint requires intense energy but for a short period of time. While some tasks in IT Security are closer to a sprint (e.g., configuring a firewall), many, like deploying and using a Security Information and Event Management (SIEM) solution, are closer to a marathon.

What are the hard parts?

  1. Identifying the scope
  2. Ingesting log data and filtering out noise events
  3. Reviewing the data with discipline

Surveys show that 75% of organizations need to perform significant discovery to determine which devices, platforms, applications and databases should be included in the scope for log monitoring. The point is that when most companies really evaluate their log monitoring process, most of them don’t really know what systems are even available for them to include. They don’t know what they have. Additionally, 50% of organizations later realize that this initial discovery phase is not sufficient to meet their security needs. So, even after performing the discovery, they are not sure they have identified the right systems.

While on-boarding new clients, we usually identify legacy systems or firewall policies that generate large volumes of unnecessary data. This includes discovery of service accounts or scripts with expired credentials that appear to generate suspicious looking login failures. Other common items uncovered include network health monitoring systems which generate an abnormal amount of ICMP or SNMP activity, backup tools and internal applications using non-standard ports and cleartext protocols. Each of these false positives or legitimate activities add straw to the haystack(s), which makes it more difficult to find the needle. Every network contains activities that might appear suspicious or benign to an outside observer that lacks background on everyday activities of the company being monitored. It is important for network and security administrators to provide monitoring tools with additional context and background detail to account for the variety of networks that are thrown at them.

Reviewing the data with discipline is a difficult ask for organizations with a lean IT staff. Since IT is often viewed as a “cost center,” it is rare to see organizations (esp. mid-sized ones) with suitably trained IT Security staff.

Take heart — if getting there using only internal resources is a hard problem, our EventTracker Enterprise service gets you there. The bonus is the cost savings compared to a DIY approach.

Practical Ways to Implement Threat Hunting

If you think your organization is too small to be targeted by threat actors, think again. Over 60% of organizations have experienced an exploit or breach, so the stealthy and ever-evolving hacker may already be in your organization performing reconnaissance or awaiting strategic command and control (C&C) instructions. Businesses of all sizes are targeted by adversaries for a range of objectives, from monetizing data to making a political statement. Small and mid-sized businesses are especially at risk due to their limited IT and security resources and the evasive nature of advanced persistent threats. Organizations are now going on the offensive and considering a proactive approach to threat hunting given the evolving threat and risk landscape.

What is threat hunting?

Threat hunting can uncover threats you might otherwise not discover until some damage is done. Some organizations are already performing threat hunting, whether formally or informally, to detect data breaches sooner and reduce dwell time – the time cybersecurity hackers spend lurking in your systems and doing damage. Threat hunting is defined as:

The process of proactively and iteratively searching through networks to detect isolate advanced threats that evade existing security solutions.1

While not new, threat hunting has gained traction and focus recently as organizations look for additional ways to identify system and data compromise. Concerning threat management, a research study states that 43% of respondents ranked proactive threat hunting as an organizational priority for the next 12 months.2 More mature security organizations are taking a “hunt or be hunted” mentality to cybersecurity to augment alert management and incident response functions that tend to be more reactive.

Assess your threat hunting program.

Threat hunting can minimize or even counterbalance the risks of a data breach: lost revenue, decreased customer loyalty, defections among IT and security staff, and poor brand reputation. Some organizations with high security maturity and staff expertise may decide to build these threat hunting skills internally; whereas other organizations large and small may choose to augment their staff and skills with external threat hunting expertise. As Figure 1 below illustrates, organizations can evolve from a security foundations role to passive defense before adopting a more active defense capability. Network security monitoring is an essential and recommended step in the sliding scale. An active defense posture involves proactive learning from adversaries to use threat and log data to make smarter decisions faster.

Practical Ways to Implement Threat Hunting
Figure 1: The Sliding Scale of Cyber Security per SANS Institute.3

According to this SANS Institute framework, only the very largest and mature organizations and government entities have the resources to use legal measures and a true offensive position to combat cyber attackers.

Key benefits and considerations for threat hunting.

There are many advantages to a more proactive approach to cyber defense:

On the other hand, concerns about adding threat hunting to IT and security team workloads include the lack of data and visibility, a shortage of cybersecurity and threat hunting skills or staff, and the tradeoffs of proactive hunting versus day-to-day operational responsibilities such as alert and incident management. Larger firms may opt to have specific threat hunting analysts or to utilize external expertise for assistance. Embracing threat hunting can provide a cybersecurity payoff but requires planning and patience.

Tailor hunting strategy to your organization.

Proactive threat hunting can help identify adversaries faster and reduce the risk of data loss but requires balancing people, processes, and technology to be most effective. Businesses looking to embark on this journey should consider the following:

  1. Ensure your organization’s commitment to proactive threat hunting with executive awareness and even involvement. Threat hunting may involve a cultural shift for your company so educate organizational leaders on threat hunting and share that aggressive offensive techniques like “hacking back” are off the table.
  2. Develop a proactive approach that moves beyond more reactive incident response (IR). Start by creating an initial idea or hypothesis regarding where adversaries might strike and drill down in these systems, applications and logs for anomalies. Track your approach and progress to refine it and create repeatable processes over time.
  3. Understand how threat actors operate and the threat landscape for your organization and vertical industry sector. Think like a hacker and identify your most valuable and attractive assets to assess the tactics, techniques, and procedures (TTPs) that a threat actor may use.
  4. Leverage existing tools and resources such as SIEM monitoring to investigate indicators of compromise (IoCs). SIEM solutions such as our offer easy-to-use data filtering and fast searching that serves as a strong foundation for security analytics specific organization. Start small and stay focused initially as you hone your threat hunting skills and demonstrate progress to technical and executive leadership.
  5. Evaluate external assistance and expertise to elevate outcomes for your threat hunting that is typically done by more senior analysts. Not all organizations will have the commitment, focus, staff, and time to devote to threat hunting; external organizations and MSSPs (Managed Security Services Providers) can augment your team or even take on this role with your guidance. are a much more practical route for most IT security resource-strapped organizations.

You can watch the webinar “Let’s Go Threat Hunting: Gain Visibility and Insight Into Potential Threats and Risks” to learn more about where threat hunting fits in the threat lifecycle, what is needed to hunt, and how to start your proactive investigation process.

ENDNOTES
1 "Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge - TechRepublic". TechRepublic. Retrieved 2018-11-05.
2 “Threat Monitoring, Detection and Response Report: 2017”, Crowd Technology Partners. Retrieved 2018-11-07.
3 The Sliding Scale of Cyber Security,” SANS Reading Room, August 2015, p. 2, Figure 1.

MSPs: How to Add Security Services Fast and Affordably

You’ve seen it over and over again in the headlines – small subcontractors are often soft-target gateways for hacking large clients. Middle-tier businesses are very attractive and vulnerable targets for ransomware attacks. And, as recently seen in the news, Managed Service Providers (MSPs) attacked through trusted supply-chain software vendors can put their own clients at risk. These unfortunate facts have created a demand for IT service providers, including MSPs, to expand their cybersecurity offerings or at least explain their own security preparedness to customers.

In this article you will learn how Reliable IT, a Meriplex company, became even more valuable to its clients without the burden and expense of expanding their own cybersecurity staff.

Offering Security Services as an MSP is Within Reach

The demand for advanced Managed Threat Protection services is enormous. Worldwide spending on information security and risk management technology and services is expected to grow more than 12 percent this year, reaching $150.4 billion according to Gartner.

The jump to offering Managed Security Service Provider (MSSP) services, however, for an MSP can be daunting and costly. If you DIY, you must ante up for a team of very expensive cybersecurity professionals to staff a basic set up, let alone trying to staff a 24/7/365 Security Operations Center (SOC) to respond to cybersecurity alerts as they happen. And on top of that, a cybersecurity skills shortage is making it more difficult than ever to find and retain experienced staff.

Seventy-six percent of security professionals say it is difficult to recruit cybersecurity staff, and there are so many job openings that it can be hard to keep excellent employees from jumping ship when you find them. Along with the cost and skills shortage comes the even greater challenge of managing a SOC effectively. You could be faced with process latency issues, a lack of adequate monitoring and management tools, and knowledge imbalances among staff.

How Reliable IT Got Started Quickly with a Master MSSP

Reliable IT recognized how partnering with a Master MSSP would be the link to not only their own business’ cybersecurity, but also a great offering to grow their business as well. They knew that adding managed security services to their IT service offerings could differentiate their company, increase loyalty, and prevent them from putting their own clients at risk.

Reliable IT’s core markets – healthcare organizations and financial services – are often prime targets for cyber attacks, including data breaches. As of May 2021, nearly 60 percent of ransomware incidents in the healthcare sector worldwide impacted organizations in the U.S., according to research by the Health Sector Cybersecurity Coordination Center. At least 72 percent of those incidents resulted in data leaks. In the banking and healthcare industries IT is often relegated to small teams that don’t specialize in cybersecurity. In Reliable IT’s other core market, community banking, cybersecurity rapidly became table stakes for IT service providers.

To solve the security services dilemma quickly, affordably, and effectively, Reliable IT turned to Master MSSP Netsurion to augment its services with a comprehensive security offering. The term Master MSSP is a new approach pioneered by Netsurion, which provides cybersecurity services to very large enterprises directly. It also enables MSPs, like Reliable IT, and other remote service providers to offer world-class threat prevention, detection, and response cybersecurity services to their clients with fast time to value.

Reliable IT chose to partner with Netsurion as the MSSP for their clients and to also protect their own business. With this approach, instead of starting from scratch and investing significant resources and time, Reliable IT gave its client base immediate access to a proven team and Managed Threat Protection solution from a company ranked 23rd worldwide in MSSP Alert’s Top 250 MSSPs list.

One important differentiator that Reliable IT benefits from is access to Netsurion’s proprietary and powerful Security Information and Event Management (SIEM) platform which delivers real-time alerting and incident response, threat intelligence, system behavior analysis and correlation, log searching, and forensic analysis. The partnership also includes cybersecurity experts around the clock, providing threat hunting and incident response support. This provides the human expertise necessary to manage and use the adaptive threat protection technology to predict, prevent, detect, and respond to threats across the entire attack surface.

Reliable IT also benefits from Netsurion’s PCI DSS compliance support through Self-Assessment Questionnaire (SAQ) assistance, a centralized portal for vulnerability scan management, file integrity monitoring, audit-ready reporting, and a data breach financial protection program. On the healthcare side, Netsurion simplifies HIPAA compliance through real-time security incident detection and compliance report review processes. By providing “single-click” issue flagging and report annotation, HIPAA audit-ready summaries are available on demand.

Without the proper support and guidance, many end-customers assume Endpoint Protection Platforms (EPPs) like anti-virus and anti-malware are advanced enough to deter hacking attempts. Nothing could be further from the truth. But with Netsurion, Reliable IT now helps clients stay on top of potential threats.

We’ve had clients where we’ve seen potentially successful logins from a bad actor  and we were immediately able to block it within minutes, so no damage was done.

Aaron Biehl
Senior VP at Meriplex

“Successful attacks take time, but with rapid detection and response the attack chain is broken. Cyber criminals never really have a chance to move laterally. We may have even prevented attacks from being successful several times. Without this level of protection, it could take months for you to identify a threat to your environment. If that happens, the worst-case scenario is you — or your client — eventually learns about the compromise from a ransomware demand or an FBI alert that your data is for sale on the dark web. With a SIEM, you’re likely to catch that threat before the damage is done,” Biehl added.

By partnering with a Master MSSP, Reliable IT expanded beyond their core success in IT administration, usability, and performance management. Learn more about Reliable IT’s managed IT support and guidance services and Netsurion’s Master MSSP partner program online.

Backoff Has Been Upgraded Harder to Detect

So when you are a hacker and you write the most successful financial transaction hacking software in history, what do you do next?

Well, if your are the makers of Backoff, you upgrade it.

A New Version of Backoff

There is a new version of Backoff that has been found, and it is called “ROM” or “Backoff ROM”. Like its predecessor, it is designed to steal credit card data from POS systems and send that data to servers on the Internet.

The reason that Backoff ROM is making such a splash is that the communication channel it uses (unlike previous versions) is encrypted. Therefore, several of the successful mechanisms that were used to detect the software and the transmission of credit card data will no longer work.

In other words, it just became more difficult for users to even detect that they have the malware than it was before.

The original software sent data in clear text, and by using a network “sniffer” or Intrusion Detection System it was possible to examine the data traveling over the network, detect credit cards in the stream, and prevent the malicious traffic. Now that Backoff ROM has the ability to encrypt that data, this methodology will no longer work. To a network scanner, encrypted data looks like gibberish.

Therefore, finding a pattern that can be matched up to a credit card is nearly impossible.

Protect Remote Access

So does that mean it is not possible to prevent Backoff ROM? Does everyone who runs a POS system have little to no defense?

The answer is no. You can protect yourself against this threat because Backoff ROM and Backoff have the same basic architecture when it comes to deployment and data exfiltration.

As we stated in our previous blog article about Backoff, the malware is not infectious. This means that it is not a computer virus that can cripple a machine just because a user goes to a dangerous web page. Instead, Backoff must be installed, much like any other application that you would use for legitimate purposes. Therefore, the most common way that Backoff, and its latest variants infiltrate a system is through the use of insecure remote access.

The Department of Homeland Security brief about Backoff points out that in a majority of the 1000 businesses that have been affected by Backoff were mainly compromised through the use of remote access that did not have enough security measures in place.

Therefore, the first step is to use good security for remote access. It should require complex passwords, be two factor authenticated, assigned to individual users, and have a mechanism to log access. Requirement 8 in the Payment Card Industry Data Security Standards (PCI DSS) has many components which if they were all being followed would have prevented numerous cases where Backoff managed to penetrate a network.

Click here for a look at the PCI standard if you want to know what the payment card brands expect that you will be doing if you run a retail establishment.

Limit Access to and From the Internet

For the most part, Backoff and Backoff ROM tries to capture credit cards in the stream of a POS transaction and then send that data over the Internet. With Backoff ROM, that transmission is now harder to read because it is encrypted, but you can still limit where on the Internet your systems can send data.

Therefore, having restrictive firewall rules that limit outbound traffic from within your point of sale network will be critical in the event that you do have an installation of Backoff on your systems. Strong firewall rules that only allow traffic to known sites will be a great measure that you can take to protect your network from Backoff.

This is why PCI requires (as its first Requirement) strong firewall management.

The Netsurion Difference

Our customers have had no data stolen by Backoff because the security measures that are most effective against this software is part of our PCI compliance solutions:

  1. Global Security Mesh – The Netsurion Managed Firewall solution that limits outbound traffic from the payment environment
  2. Remote Access SSL VPN – Our remote access VPN solution that creates a VPN tunnel after 2 factor authentication. It exceeds the needs as defined by PCI.
  3. IP Data Blocker with DNS Blocking – Our least access default policy along with our DNS proxy service which severely limits the effectiveness of malware trying to exfiltrate data from a computer network.

MSPs Versus Ransomware in 2022: Where Multi-Layered Security Fits In

Skyrocketing ransomware threats and extortion demands show no sign of slowing down in 2022. Average ransomware demands surged by 518% in the first half of 2021 compared to 2020, while payments climbed by 82% in the same period, according to Infosecurity Magazine. Crippling ransomware attacks caused an average business downtime of six days with costs in the millions.

Cyber criminals actively target SMBs who often lack the resources to fortify defenses against malware like ransomware. In 2022, MSPs can play an even more crucial role in safeguarding small-to-medium-size businesses (SMBs) against ransomware.

This article will provide insights into how MSPs can protect their own house, and their customers, against ransomware with a layered approach to cybersecurity.

Multi-prong assaults require a multi-layered strategy

Netsurion’s security analysts often detect ransomware as part of a multi-faceted assault. Deployed by cyber criminals using leaked or stolen login credentials, these attacks appear like valid users on the network. Ransomware tactics often include a “low and slow” approach that evades detection from siloed tools that lack 24/7 visibility.

REvil, Conti, and Darkside are just a few examples of criminal gangs that successfully use a ransomware tactic called double extortion. In 2022, organizations will continue to uncover exploitation by these well-funded ransomware gangs who adapt and morph their proven techniques. Ransomware-as-a-service (RaaS) enables less sophisticated attackers to scale up to disrupt unsuspecting victims. Proactive prevention is needed upfront to block as many threats as possible, and rapidly detect and remediate everything else.     

What would your layered approach look like?

Imagine trying to keep up with the constant shower of threats, including what happens when they do get in – which will occur. A layered approach to cybersecurity provides redundancy in case of security control failure or a future vulnerability is uncovered. Defense-in-Depth security protects against a wide range of threats to cover all the bases. The optimal balance of people, process, and technology can safeguard your customers as well as your own operations. Use a 4-step approach to predict, prevent, detect, and respond (PPDR) to ransomware. 

img threat lifecycle1
  1. Predict future attacks before they happen: You can’t protect what you cannot see. To be more proactive and stop pre-attacks earlier, add holistic visibility to each customer’s infrastructure, assets, and attack surface. Threat intelligence is one way to learn more about cybersecurity gangs and their real-world attacker tactics, techniques, and procedures (TTPs). Vulnerability management that encompasses regular scanning pinpoints security gaps before cyber criminals exploit them – providing much-needed time to resolve without attackers lurking. 
  2. Prevent unknown threats: Your legacy anti-virus (AV) and signature-based tools can prevent known attacks but are largely ineffective against unknown and Zero-day attacks. While ransomware prevention may seem like wishful thinking, cybersecurity preparedness and a multi-layered approach overcome merely reacting to breaches instead of predicting and preventing threats. Endpoint protection and mobile security are two ways to stop attacks in real-time before they execute and cause harm. A prevention-first approach dramatically reduces false positives and focuses more of your time on higher-value areas like patching, threat hunting, and hardening customer defenses. 
  3. Detect threats before harm is done: Identify threats in your customer’s infrastructure immediately before ransomware damage occurs. Speed up detection with single-pane-of-glass visibility backed by cybersecurity experts who augment your team. Multiple layers of defense provide extended detection and response (XDR) capability encompassing SIEM, endpoint detection and response, and intrusion detection.
  4. Respond rapidly to remediate fully: Detection of a ransomware attack takes 175 days on average.  A 24/7 SOC (security operations center) uses machine learning and automated playbooks to quickly identify the root cause of security incidents.  An integrated platform with comprehensive visibility provides additional threat context to get your customers back to business faster with full recovery.

Defense-in-depth security helps you prepare for and prioritize the most dangerous threats, both known and unknown.

MSP benefits of defense-in-depth

As you prepare for the new year, now’s the time to evaluate your product and service portfolio in response to rising ransomware. MSP advantages include:   

Expertise plus technology safeguards your entire attack surface across servers, network devices, cloud assets, and endpoints.

Four Key Steps to Rapid Incident Response

Is it possible to avoid security breaches? Judging from recent headlines, probably not. Victims range from startups like Kreditech, to major retailers like Target,to the US State Department and even the White House. Regardless of the security measures you have in place, it is prudent to assume you will suffer a breach at some point. Be sure to have a response plan in place — just in case.

If you find it difficult to justify the time needed to develop a response plan, consider how long you will have to formulate a response once an attack begins. According to a 2013 Verizon study, 84% of successful attacks compromised their targets in a matter of hours. The brief time window for detecting and mitigating attacks requires not only constant monitoring but a rapid response. That means having a plan in place.

As you formulate your strategy for handling breaches, keep in mind four key aspects of incident response including: analysis and assessment, response strategy, containment, and prevention of a subsequent attack.

The first step in managing a security breach is detecting it. This is one of the most difficult challenges facing IT professionals. You are trying to detect a stealth adversary with many potential points of entry into your system and you have no knowledge of when the attack will occur. Also, attack-related events may occur in rapid succession or over extended periods of time. Some of the steps in the attack may appear innocuous, such as an executive unknowingly downloading and opening malicious content. Others may be more apparent, such as a disgruntled employee downloading large volumes of customer data to a USB drive. In all cases, analyzing logs and integrating data from multiple application and servers logs can help identify events indicative of an attack.

The response strategy spans both technical and business aspects of your organization. An incident response team should be in place to address the breach. This will include containing the threat (discussed below), notifying stakeholders, and communicating the progress of the response efforts. There may be a need to coordinate with those responsible for business continuity and disaster recovery in cases of large-scale attacks, such as suffered by Sony last year.

Containment is the process of isolated compromised devices and network segments to limit the spread of a breach. Containment can be as crude as cutting power to a compromised device. If malicious activity originates with a mobile device, a mobile device management (MDM) system can block that device from accessing network resources. Network administrators can change firewall filtering rules to limit traffic into and out of a subnet. They may also consider updating DNS entries of compromised servers to point to failover servers, assuming those have not been compromised. Monitoring application, operating system, and network logs during containment operations can help understand the effects of your responses

The fourth issue to keep in mind is preventing subsequent attacks. A security breach can have wide and unexpected consequences. It is also a potential opportunity to learn how your security measures were compromised. Was someone tricked by a phishing lure? Was an administrator account compromised by simple, brute force dictionary attack? Did an insider take advantage of excessive privileges? Security Information and Event Management systems support forensic analysis and can help integrate event data from across your infrastructure. This may enable you to find correlations between events that lead to insights about the behavior of the attackers and the vulnerabilities in your systems.

This brief discussion of incident response planning touches on just some of the most salient aspects dealing with a breach. Sources, such as CERT, provide detailed resources to help organizations create computer security incident response teams and incident response best practices.

MSSP Live 2022 Top MSP Cybersecurity Takeaway: Teamwork Makes the Dream Work

A common dedication to providing excellent client services, a driving need to enhance cybersecurity capabilities and an outstanding cyber monetization opportunity generated tremendous energy and focus among attendees at the recently concluded first annual MSSP Live event.

Our onsite team gleaned these key takeaways from session presentations and conversations with global services providers.

1. Partnership is a must

The overarching consensus was that partnerships are key to winning the cybersecurity battle. Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) can partner with cybersecurity vendors to bring powerful cybersecurity services down market to small and medium businesses (SMBs) and small and medium enterprises (SMEs), a greenfield for cyber monetization.

2. Time to market is critical

Clients are looking for ways to operationalize a shared security model tailored to their organization. Like yesterday. With costs of a U.S. cybersecurity incident now reaching $4.35 Million, customer organizations understand it’s crucial that they move fast and with confidence in battling advanced threats.

img mssp live takeaway1

3. Buyers are informed and ready

Even SMBs and SMEs are aware they are soft targets at high risk and are looking for solutions they can afford, and trust.  By partnering with a managed open Extended Detection and Response (XDR) platform provider like Netsurion, MSPs and MSSPs can boost security readiness for their clients and get it done fast.

4. 24x7 SOCs, open XDR and proven track record are best in class requirements

A cybersecurity vendor/partner is essential to protect the expanded attack surface from on premise to cloud to mobile, gain deeper threat detection and increase response effectiveness with trained resources and state-of-the art technology. Security Operations Center (SOC) experts like those at Netsurion augment your staff and can prevent cyber attacks.

5. DIY is a non-starter

The barriers are high for MSPs and even MSSPs for delivering high quality cybersecurity services efficiently and cost effectively to best serve clients. The recruiting, retention and oversight staffing issues alone are daunting. Add to that the resources required in technology and facilities, the demands of keeping pace, the time needed to stand up a facility and the skepticism of clients for new entrants that make DIY a non-starter.

If you are not convinced, see our blog on The True Cost of Setting Up and Operating a 24x7 Security Operations Center (SOC) | Netsurion.

Next Steps

In business, as in sports, teamwork makes the dream work. Cybersecurity is a perfect example of how MSPs, MSSPs and businesses of all sizes can team up with Netsurion and win the fight against data breaches, ransomware, identity theft and all of the other threats facing us all.

Learn more about how Netsurion's MSP/MSSP Partner Program Benefits online or contact our channel team.

Pay Attention to System Security Access Events

There are five different ways you can log on in Windows called “logon types.” The Windows Security Log lists the logon type in event ID 4624 whenever you log on. Logon type allows you to determine if the user logged on at the actual console, via remote desktop, via a network share or if the logon is connected to a service or scheduled task starting up. The logon types are:

sept2013newsletter1

There are a few other logon types recorded by event ID 4624 for special cases like unlocking a locked session, but these aren’t real logon session types.

In addition to knowing the session type in logon events, you can also control users’ ability to logon in each of these five ways. A user account’s ability to logon is governed by five user rights found in group policy under Computer Configuration/Windows Settings/Security Setting/User Right Assignments. There is an allow and deny right for each logon type. In order to logon in a given way you must have the corresponding allow right. But the deny right for that same logon type takes precedence. For instance, in order to logon at the local keyboard and screen of a computer you must have the “Allow logon locally” right. But if the “Deny logon locally” right is also assigned to you or any group you belong to, you won’t be able to logon. The table lists each logon type and its corresponding allow and deny rights.

Logon rights are very powerful. They are your first level of control – determining whether a user can access a given system at all. After logging in of course their abilities are limited by object level permissions. Since logon rights are so powerful it’s important to know if they are suddenly granted or revoked. You can do this with Windows Security Log events 4717 and 4718 which are logged whenever a given right is granted or revoked respectively. To get these events you need to enable the Audit Authentication Policy Change audit subcategory.

Events 4717 and 4718 identify the logon right involved in the “Access Granted”/”Access Removed” field using a system name for the right as shown in corresponding column in the table above. The events also specify the user or group who was granted or revoked from having the right in the “Account Modified” field.

Here’s an example of event ID 4717 where we granted the “Access this computer from the network” to the local Users group.

System security access was granted to an account.
Subject:

Security ID: SYSTEM
Account Name: WIN-R9H529RIO4Y$
Account Domain: WORKGROUP
Logon ID: 0x3e7

Account Modified:

Account Name: BUILTINUsers

Access Granted:

Access Right: SeNetworkLogonRight

One consideration is that the events do not tell you who (which administrator) granted or revoked the right. The reason is that user rights are controlled via group policy objects. Administrators do not directly assign or revoke user rights on individual systems; even if you modify the Local Security Settings of a computer you are really just editing the local group policy object. When Windows detects a change in group policy it applies the changes to the local configuration and that’s when 4717 and 4718 are logged. At that point the user making the change directly is just the local operating system itself and that’s why you see SYSTEM listed as the Subject in the event above.

So how can you figure out who a granted or removed the right? You need to be tracking group policy object changes, a topic I’ll cover in the future.

Perfect protection is not practical

With distressing regularity, new breaches continue to make headlines. The biggest companies, the largest institutions both private and government are affected. Every sector is in the news. Recounting these attacks is fruitless. Taking action based on the trends and threat landscape is the best step. Smarter threats that evade basic detection, mixed with the operational challenge of skills shortage, make the protection gap wider.

An overemphasis on prevention defines the current state of defenses as shown in the pie chart below.

According to a 2015 cybersecurity report, over 85% of senior IT and business leaders report that they feel there is a labor crisis of skilled cybersecurity workers. Gartner believes approximately 50% of budgeted security positions are vacant; on average, technical staff spend about four years in a position before moving on. The threats that this outnumbered corps are working to confront are evolving so fast that security departments’ staffing methods are often hopelessly out of date.

The main lesson to learn is that “perfect protection is not practical, so monitoring is necessary.”

Are you feeling overwhelmed with the variety, velocity and volume of cyber attacks? Help is at hand. Our EventTracker managed detection and response offering blends best-in-class technology with a 24/7 iSOC to help strengthen your security defenses while controlling cost.

How to Detect Low Level Permission Changes in Active Directory

We hear a lot about tracking privileged access today because privileged users like Domain Admins can do a lot of damage. But more importantly, if their accounts are compromised the attacker gets full control of your environment.

In line with this concern, many security standards and compliance documents recommend tracking changes to privileged groups like Administrators, Domain Admins and Enterprise Admins in Windows, and related groups and roles in other applications and platforms.

But in some systems you can also granularly delegate privileged access, ultimately giving someone the same level of authority as a Domain Admin, but “underneath the radar.” This is especially true in AD. This capability is a double-edged sword. It’s necessary if you are going to implement least privilege, but it also creates a way for privileged access to be granted inadvertently, or even maliciously in such a way that will go unnoticed unless you are specifically looking for it. Here’s how:

First you need to enable “Audit Directory Service Changes” on your domain controllers — probably using the Default Domain Controllers Policy GPO.

Then open Active Directory Users and Computers and enable Advanced Features under View. Next select the root of the domain and open Properties. Navigate the Audit tab of the domain’s Advanced Security Settings dialog shown below.

advanced_security_settings

Add an entry for “Everyone” that audits “Modify permissions” on all objects like the entry highlighted above. At this point domain controllers will record Event ID 5136 whenever someone delegates authority of any object in the domain — whether an entire OU or a single-user account. Here’s an example event:

A directory service object was modified.

directory_service_object

This event tells you that a MTGpad-rsmith (that’s me) modified the permissions on the Scratch organizational unit in the MTG.local domain. nTSecurityDescriptor and “Value Added” tell us it was a permissions change. The Class field tells the type of object and DN gives us the distinguished name of the object whose permissions were changed. Subject tells us who made the change. I removed the lengthy text for Attribute Value because it’s too long to display and it’s in SDDL format which isn’t really human readable without a significant amount of effort. Technically, it does provide you with the full content of the OU’s new access control list (aka Security Descriptor) but it’s just not practical to try to decode it. It’s probably going to be faster to actually find the object in Active Directory Users and Computers and view its security settings dialog via the GUI.

So the Security Log isn’t perfect, but this method does give you a comprehensive audit trail of all permission changes and delegation within Active Directory. If you combine this with group membership auditing you’ll have a full picture of all changes that could impact privileged access in AD which is a key part of security and compliance.

Lumifi Cyber’s Success Propels Expansion Plans at Scottsdale’s SkySong Tech Hub

Scottsdale, AZ (September 13, 2023), Lumifi Cyber, a leading player in the cybersecurity arena, proudly announces its significant long-term commitment through 2030 at SkySong, The ASU Scottsdale Innovation Center. This strategic move is an endorsement of Scottsdale’s burgeoning tech community and a testament to Lumifi Cyber’s commitment to growth, innovation, and community development.

Unlike other cybersecurity solutions that require constant management and oversight, Lumifi Cyber delivers Managed Detection and Response (MDR) services that actively hunt and assess threats while keeping costs low and working with existing cybersecurity toolsets.  Lumifi Cyber’s team of cybersecurity professionals defend large and small organizations all over the world. The company has clients in nearly every industry with a long history of supporting mission-critical assets for institutions in government, healthcare, financial and legal sectors.

Jim Sadler, LOCATE AI broker responsible for the SkySong corporate services solution for Lumifi Cyber, expressed great excitement about this development, saying, “LOCATE and our technology and real estate services team are thrilled to support the industry leading cybersecurity firm and Lumifi Cyber’s significant growth trajectory. They’re at the forefront of redefining our city’s tech landscape and their operation fits nicely with SkySong, The ASU Scottsdale Innovation Center.”

Michael Malone, CEO of Lumifi Cyber, shared his enthusiasm: “This commitment marks a pivotal moment in Lumifi Cyber’s journey. Not only does it reflect our relentless pursuit of excellence in cybersecurity, but it also signifies our belief in Scottsdale’s potential to be a global tech powerhouse. Our commitment to our customers remains unwavering as we grow – to provide top-tier solutions and service. Furthermore, by deepening our roots here, we aim to contribute positively to the local economy and community.”

“We’re proud to be working with both Sadler and Lumifi Cyber again on this important phase of growth at SkySong,” said Sharon Harper, Chairman and CEO of Plaza Companies, the master developer of SkySong. “Michael Malone’s entrepreneurial growth and industry leadership exemplify the enterprise growth and path towards accelerating technology transfer at SkySong that we strive to embody.”

Plaza Companies is the master developer of SkySong, in partnership with University Realty, the City of Scottsdale and Holualoa Companies.

Lumifi Cyber’s Expansion will bring these Key Highlights:

HCAP Partners, a California-based private equity firm and Tulsa, Oklahoma-based BOK Financial Corporation are investors.

In conclusion, the expansion underscores Lumifi Cyber’s commitment to growth, community engagement, and innovation. Positioned within the SkySong hub, which serves as a nexus for technology, research, education, and entrepreneurship, Lumifi Cyber is perfectly poised to drive forward ASU, Greater Phoenix, and the global knowledge economy.

About Lumifi Cyber

Lumifi Cyber, headquartered in Scottsdale, is a vanguard in the cybersecurity industry, dedicated to protecting digital assets and fortifying cyber defenses for businesses across the board. With a team of experts and state-of-the-art technology, Lumifi Cyber is shaping the future of cyber safety.

About SkySong, The ASU Scottsdale Innovation Center

SkySong, The ASU Scottsdale Innovation Center is one of the premier economic engines in the Valley of the Sun. The project’s success is a direct result of a focus on innovation and technology that attracts companies ranging from some of the world’s best known brands to one-or two-person startups.

About Plaza Companies

Plaza Companies is the developer of the project in partnership with University Realty, the City of Scottsdale and Holualoa Companies. Lee and Associates provides the brokerage services and Plaza Companies provides the property management and construction services.

Vulnerability Management and Protection: Think Like a Hacker

Today’s modern attack surface encompasses the network, cloud, endpoints, mobile devices, and applications and is constantly under attack from well-armed cyber criminals. Vulnerability management offers strategic insight into vulnerable applications and devices from the viewpoint of a cyber criminal, that you can plug before attackers can exploit. Vulnerability management is for service providers as well as their end-customers. Cyber criminals are actively targeting MSSPs; a more comprehensive approach to threat and vulnerability management can assist service providers in protecting the crucial supply chain.

This article will take you through a risk-based approach to vulnerability management, the benefits as an MSSP, partnership considerations, and pitfalls to avoid.

What is Vulnerability Management

A formal vulnerability management program helps your team become more proactive with cybersecurity and to speed up detection and remediation, all while staying compliant. According to the International Organization for Standardization (ISO 27002), a vulnerability is defined as, “… a weakness of any asset or group of assets that can be exploited by one or more threats.” Vulnerability management is a foundational component of compliance frameworks like PCI DSS and HIPAA. Unlike one-time scanning, vulnerability management is an ongoing approach to risk management, vulnerability assessment, and rapid response.

Vulnerability Management Pitfalls

While vulnerability scans and assessments are not new, many organizations lack the structure and scale to provide the comprehensive vulnerability management and actionable remediation that end- customers demand. Legacy vulnerability software and tools are often complex and lack important requirements like risk prioritization, customization to individual organizational risks, as well as visibility into modern configuration, cloud, and container risks and threats. Service providers and businesses alike may also lack the staff and skills to advise on best practices for managing vulnerabilities and reducing risk.

MSSP Benefits of Providing Vulnerability Management

Given that a data breach now costs over $4 million dollars, any improvement in vulnerability management effectiveness and coverage is a welcomed addition. Here are some benefits of adding managed vulnerability capabilities to your MSSP portfolio:

Reinforces your trusted advisor role: Risk-based vulnerability management positions you with end-customer executive decision makers. Vulnerability management isn’t about scanning, but rather, improving your cybersecurity maturity over time.

Increase revenue: Offering another in-demand service creates an attractive up-sell opportunity. If you aren’t offering vulnerability management services today, chances are your end-customers are purchasing them from another third-party vendor, minimizing your ability to land-and-expand incremental revenue.

Strengthens end-client retention: Boost customer loyalty and engagement by augmenting IT tasks that offload time-consuming tasks, allowing your end-clients to focus on other programs and technologies.

Prioritization is Key

There will inevitably be more vulnerabilities identified than can be immediately addressed, so a successful vulnerability management program reduces the false positives and “noise”. Tailor your vulnerability management offering to end-customer risks, corporate goals, IT staff and expertise, and cybersecurity maturity. Look beyond routine CVSS (Common Vulnerability Scoring System) outcomes to identify vulnerabilities, misconfigurations, and risky software to focus on what’s most urgent. Continue to work with end-customers to maintain that visibility and configuration control over time by reducing drift.

Prioritize vulnerabilities with the greatest impact to your end-customers by evaluating asset value, the severity of vulnerability gaps, and the level of threat it poses to each unique organization. Rank detected vulnerabilities from highest to lowest severity to pinpoint areas with the greatest cybersecurity impact. This prioritization improves your analyst efficiency and effectiveness.

Vulnerability

As you evaluate vulnerability management programs, be aware that vulnerability management is not a “one-size-fits-all” approach, but rather should be customized to your business and associated risk profile.

Partner Considerations for Vulnerability Management 

You may already be using vulnerability scanning software and tools, but have found that they are time-consuming, often don’t cover today’s diverse assets, and produce a deluge of raw data that is not always actionable. Overcome the disadvantages of legacy vulnerability management tools and software that can’t keep up with modern threats and well-funded cyber criminals. Look for a vulnerability management solution that provides:

  1. Visibility Across the Entire Attack Surface
    Overcome blind spots that can hamper protection for you and your customer with real-time SOC monitoring across all points in the expanding attack surface.
  2. Flexibility of Deployment
    Look for a solution with a variety of deployment models, comprehensive scans and assessments, and agent and agent-less scanning to address a wide range of customer use cases and compliance requirements.
  3. Timeliness and Rapid Results
    Enables end-users to act immediately based on comprehensive remediation recommendations and avoids bulky processes and reports that get in the way.

The Good News

Service providers can leverage vulnerability management to significantly improve an organization’s defenses against breaches and crippling ransomware. Instead of relying on complex software or tools that don’t scale, a managed program for vulnerabilities establishes you as a trusted advisor that scales up as your efforts grow over time. The addition of vulnerability management as a service is straightforward, well understood by Small-to-Mid-sized Businesses (SMBs) and does not require costly hardware and software. MSSPs are well positioned to take the vulnerability management recommendations and work with end-customers on remediation steps and plans.

The Bottom Line

Attack surface protection is crucial as networks expand along with risks from remote employees and connections from third-party supply chain partners. Vulnerability Management helps reduce dwell time, the time that hackers are in an environment performing reconnaissance or even removing sensitive data. Move beyond traditional scanning to continuous visibility and actionable remediation as your end-customers evolve their security maturity. Protect customer infrastructure and assets while reducing the level and magnitude of threats. When offered as a managed service, risks are eliminated, hacker dwell time is cut short, and data breaches are avoided. Learn more about Netsurion’s comprehensive vulnerability management program that enhances visibility and prioritization with a managed service that augments your staff and skills.

Top 5 SIEM complaints

Here’s our list of the Top 5 SIEM complaints:

  1. 1) We bought a security information and event management (SIEM) system, but it’s too complicated and time-consuming, so we’re:
    • a) Not using it
    • b) Only using it for log collection
    • c) Taking log feeds, but not monitoring the alerts
    • d) Getting so many alerts that we can’t keep up with them
    • e) Way behind because the person who knew about the SIEM left
  2. 2) We’re updating technology and need to retrain to support it
  3. 3) It’s hard to find, train and retain security expertise
  4. 4) We don’t have enough trained staff to manage all of our devices
  5. 5) We don’t have trained resources to successfully respond to a security incident

What’s an IT Manager to do?

Get a co-managed solution, of course.

Here’s our solution to Top 5 SIEM complaints. 

The 5 stages of SIEM Implementation

Are you familiar with the Kübler-Ross 5 Stages of Grief model?

SIEM implementation (and indeed most enterprise software installations) bear a striking resemblance to that 5 stage model.

 

Cybersecurity Cyber Crime in 2023: What MSPs Need to Know

Managed service providers face a double-edged sword in the world of cyber security and cybercrime. In May 2022, a joint cybersecurity advisory from the UK, Australia, Canada, New Zealand and the US warned that MSPs are increasingly being targeted by cyber criminals. And cyber attacks on MSP customers, small-and medium-sized businesses (SMBs), will also continue to rise. It’s shaping up to be another year of increasingly sophisticated cyber incidents. Here are seven trends shaping the IT security landscape that MSPs should be particularly aware of for 2023.

1. Accelerated shifts to hybrid work and cloud weaken the perimeter.

Endpoints are increasingly disconnected from the “office” network and instead are much more mobile. People work from anywhere (WFA) these days - home, grandma’s house, their kids’ soccer game. At the same time, servers are rapidly migrating from in-house data centers to public (or private) cloud. This continues to weaken the traditional notion of “perimeter” and what is inside versus outside the network. Attackers are adapting to exploit new weaknesses and the new network diagram. Are your protection and detection capabilities doing the same? Can you scan for vulnerability independent of location? Is your XDR service up to the task of detecting attacks in the public cloud?

2. Ransomware and attacks on operational tech (OT) will increase.

It’s sad to say, but crime does pay, and the takeaway for criminal gangs is that there are many, many weaknesses that can be exploited profitably in the always-on, rich Western world. Ransomware is expected to increase in volume and proliferate beyond North America to Europe. High-interest targets will include industries that have been slow to get on the security bandwagon or have a broad operational technology and IoT attack surface, or both — like manufacturing. Industries that have more to defend, such as medical/pharmaceutical companies whose revenue grew manyfold during pandemic times, will also be specific targets.

3. Wicked skill shortage of security professionals continues.

This trend has been true for some years now and shows no signs of slowing. As Blue Teams expand their recruiting globally, we will see the shortage of experienced security staff following this trend. From a buyer’s perspective, one way of adding scarce skills to your team is to selectively and carefully add services from external providers. For suppliers of such services, more automation and more training of junior staff are a must.

4. Bad guys do their homework. Do you?

Postmortems for successful attacks repeatedly show patient attackers who take their time to lure victims, place malware, map the network, and learn patterns to stay below the detection threshold of even the most vigorously defended networks. Are you also doing homework to stay up to date on your own network, its map and its changes? Do you include the detection/protection you have in place, its efficacy, coverage and trends? For medium and large networks, it’s a job in itself — one that is apparently thankless and low ROI, but there is no escaping it. Company boards are beginning to have specific dedicated cybersecurity committees that will demand accountability.

5. Cyber risk will dictate business transactions.

Given that risks increasingly come through an organization’s supply chain and extended interconnected vendor and partner network, more and more medium and large businesses will use cyber risk as a determining factor in selecting partners and vendors. In days of yore, it was product quality, price and availability that largely determined vendor selection – now add cyber risk to the equation. Are you prepared to explain and demonstrate your cyber security posture to a customer? To your cyber insurance provider?

6. Data privacy laws will cover more and more endpoints.

GDPR-like data privacy laws in countries outside the EU will cover more and more users and endpoints. Governments are recognizing that such laws may be needed to protect their citizens and commerce. The intent is to increase the baseline minimum standards for ecommerce in much the same way as laws for motor safety evolved in the previous century with the growing risks of automobiles on the highways. While this is well intentioned, implementation and enforcement will be spotty and whimsical. The onus will fall on the network owner. Using external “expert” providers is a lower cost way of addressing this requirement and scaling over time. Most companies do not themselves adapt their legal contracts to satisfy GDPR but outsource that work to legal experts who specialize in this area. Expect the same with cybersecurity compliance.

7. Identity is the new endpoint.

With the dissolving of the enterprise and network "perimeter" (see number one above), you are who you authenticate as. Remote access is the rule, not the exception. Attackers have noticed and work hard to compromise users. When they are successful, you will find yourself dealing with an insider attack, which is much harder to detect. Methods such as enforcing multi-factor authentication (MFA), especially for high value admin accounts, and using User & Entity Behavior Analytics (UEBA) to identify out-of-ordinary or first-time-seen actions are the way out. These require meaningful data collection, machine learning and an active 24x7 SOC. Are these detections part of your XDR service provider’s repertoire?

Next steps for MSPs

As these trends manifest in the coming year, MSPs can help their SMB clients be aware of changes in their risk profile and new vulnerabilities they need to protect. Likewise, MSPs should keep in close contact with their security service provider partners. Don’t hesitate to ask the tough questions to make sure your service provider’s capabilities are evolving to address changes in attacker behavior and the IT landscape. 

Cybersecurity is an Investment, Not a Cost Center

The cybersecurity threat landscape is in constant motion – ever evolving. According to Kaspersky Labs, 323,000 new malware strains are discovered daily! Clearly, this rate of increased risk to a company’s assets and business continuity warrants a smart investment in cybersecurity. Unfortunately, many companies are not keeping pace with their increasing risk, nor could they ever be expected to if their leadership views cybersecurity as a cost center while still viewing other innovations, such as digital transformation, as an investment.

For any digital transformation project to be successful and return the anticipated value, cybersecurity must be considered foundational.

Just as that new $500 suit is an investment to help you get that new job, the cost to have it tailored is part of that investment. The same goes for digital transformation and cybersecurity. But for many companies, the digital transformation is long underway, and cybersecurity desperately needs to catch up. That new suit needs to be tailored quickly before another person sees you in that poor-fitting getup.

A successful cybersecurity strategy is without much hope if executive leadership does not champion the proper investment and prioritize the efforts. The result is too often organizations piecemealing pointed IT security solutions one-at-a-time, failing to prioritize wholistic cybersecurity projects. This only exacerbates the risks to the business, but also hampers the efficiency in accomplishing other technology projects deemed as competitive differentiators.

So, where do you start to improve your cybersecurity posture ASAP?

  1. Get executive support immediately so you don’t spin your wheels on half-baked inefficient IT security practices.
  2. Change the mindset by showing cybersecurity is an investment in the company’s future.
  3. Keep in mind the cybersecurity triad of “platform, people and process”, and seek complete solutions that can ensure long-term success.

Here are some tools to help you along your journey…

Cybersecurity Maturity Model

It’s important to take a step back and understand where you are today, where you should be, and where you want to go next. By considering all four key aspects of a complete security architecture – prevent, detect, respond, and predict – a good Cybersecurity Maturity Model provides a practical stair-step approach toward the appropriate level for your organization.

img cybersecurity maturity model ops[1]

SIEM Total Cost of Ownership Calculator

Security Information and Event Management (SIEM) is the foundation of any well-grounded IT security strategy. However, depending on your organization’s unique requirements, staffing, and deployment situation, the total cost of SIEM can vary widely. Use our SIEM TCO calculator to compare 1-year and 3-year costs of self-managed and Co-Managed SIEM solutions.

tco1

Calculate your TCO now

About the PCI Security Standards Council

The PCI Security Standards Council is an open global forum, launched in 2006, that is responsible for the development, management, education, and awareness of the PCI Security Standards, including the Data Security Standard (PCI DSS), Payment Application Data Security Standard (PA-DSS), and PIN Transaction Security (PTS) requirements.

The Council's five founding global payment brands - American Express, Discover Financial Services, JCB International, MasterCard, and Visa Inc. - have agreed to incorporate the PCI DSS as the technical requirements of each of their data security compliance programs. Each founding member also recognizes the QSAs, PA-QSAs and ASVs certified by the PCI Security Standards Council.

All five payment brands, along with Strategic Members, share equally in the Council's governance, have equal input into the PCI Security Standards Council and share responsibility for carrying out the work of the organization. Other industry stakeholders are encouraged to join the Council as Strategic or Affiliate members and Participating Organizations to review proposed additions or modifications to the standards.

On this website you'll find useful information about the PCI Security Standards Council, the PCI DSS requirements for merchants, vendors and security consulting companies, and the Council's certification and merchant support services, all created to mitigate data breaches and prevent payment cardholder data fraud.

Note that enforcement of compliance with the PCI DSS and determination of any non-compliance penalties are carried out by the individual payment brands and not by the Council. Any questions in those areas should be directed to the payment brands.

Identity is the New Endpoint

For most organizations, the network map has changed dramatically. Once organizations had a defined network perimeter that clearly distinguished “inside” from “outside.” Endpoint devices like workstations and desktops were “inside,” physically and virtually. They could be authenticated once and trusted thereafter. After all, these devices never left the building.

Physical security further reinforced the fortress approach. Users were authenticated by the card reader at the front door or the security officer at the front desk, assuring their identity. Once inside they were clearly visible to co-workers, making it difficult for an outsider to pretend to be that trusted employee John.

Three trends are dissolving the network perimeter

Three major trends have completely upended this concept of the corporate IT network providing a protective perimeter around IT assets and data. Today, virtually every organization employs SaaS (software as a service) applications that, along with their associated data, reside outside of the network. Additionally, hybrid cloud has become the new normal, with IT resources residing in the public cloud as well as on premises.

And now, with mobility and employees working remotely, your endpoints and their users could be anywhere - grandma’s house, the kids’ soccer game, or on vacation in Costa Rica. The additional methods you used to rely on to validate that user - the front door card reader, the security guard, the co-workers - are long gone.

You can’t make assumptions about users based on IP address, because people can access your network from anywhere on the internet. When Netsurion went to a work-from-home mode during the pandemic, we got an alert that there was a successful login to our network from Cuba. It turned out Cuba was home to one of our South Florida employees. So, when we said, “Work from home,” he went home. But that location was out of the ordinary for us, so it got our attention. We investigated, and his manager confirmed that the location was valid. It was not a case of credential compromise.

The point is, location has changed so drastically that the assumption you made in the past - that if you know the endpoint and the IP address, you know the user - no longer applies.

The big risk: when outside attackers look like insiders

Why is protecting identity so important? If an attacker succeeds in masquerading as a legitimate user, then that outsider suddenly looks like an insider - and insider attacks are typically extremely difficult to detect. The potential for damage from an outsider masquerading as an insider is significant. The attacker can stay undetected inside your network for a long time, lying dormant or sniffing around to scout out valuable data to steal. Their behavior looks legitimate, and they don’t leave a trail of invalid or failed logins that usually indicate a breach.

If the attacker compromises a user with administration privileges, that’s an open door to go anywhere in the network that your configurations allow. That happened to one organization we know that failed to subdivide their network into domains, and an attacker was able to login to multiple departments over several months and access systems and data. The attacker got spooked by the arrival of law enforcement at the front door. Mistakenly assuming he had been detected, he burned the infrastructure down. In the subsequent postmortem, a pattern of unexpected logins showed the probing conducted by the attacker in the months prior to detection.

Looking forward, user identity is the new endpoint to be protected, rather than only the device

That means you have to find a way to authenticate that your user John really is John, and not an attacker who has found a way to log on as John.

Passwords versus multi-factor authentication

If you are only relying on passwords, your protection is weak. Passwords are relatively “soft” targets that, in today’s interconnected world, are easily compromised. Stolen passwords are always for sale on the dark web, and there are many easy-to-access password cracking tools that attackers can use. And even though user education has gotten much better, the attackers using phishing and social engineering are also persistent in compromising user identities.

Much stronger protection comes from good password hygiene, like requiring password changes every 30 or 60 days, and even more so from multi-factor identification (MFA). With MFA, the user has to have two things simultaneously: something they know, like a password, and something they have, like a mobile phone where you can receive a one-time authentication code or a fingerprint for a biometric fingerprint reader on a laptop.

In our experience, convenience is the greatest enemy of security. When people bypass the default or don’t elect to implement MFA to protect their identity, they put your network at risk.

The next level of protection: User and Entity Behavior Analytics

The defense against insider attacks - or outsiders that have gained insider access - is User & Entity Behavior Analytics (UEBA). It uses machine learning (ML) to establish a baseline of normal behavior for each network user. Then the ML monitors massive amounts of telemetry to detect behavior that falls outside that normal range.

Anomalous user behavior revealed one of the largest security breaches of the 21st century. A security company (not ours) questioned a long-time employee’s request to register a new phone for MFA. By contacting the employee, the analyst discovered that the request came from an attacker already inside the network. That started the forensics that ultimately led to discovering the supply chain breach involving SolarWinds remote management software.

Netsurion employs UEBA as part of our Managed Open XDR solution, using our ML technology and analyst expertise to stop malicious insiders and outsiders masquerading as insiders. Once our ML identifies anomalous behavior by a user or a system, it is automatically elevated to a Security Operations Center (SOC) analyst for review. With advance directives from the customer, we can immediately block the suspicious action to protect highly sensitive data or systems.

Alternatively, we escalate what we’ve observed to the network owner for visibility. That’s how we found out that it was our employee logging in from Cuba, not an attacker. You can learn more about our UEBA capability here, or schedule time with a Cybersecurity Advisor to see if our managed service is a good fit.

Protecting your business from hacker’s attacks

Highlights from the 2016 Verizon Breach Investigations Report (Part 3 of 3)

Last week we covered the main tools hackers are using to access businesses’ networks.

As you learned, there are 3 items to focus on which caused most data breaches last year: vulnerabilities, phishing and weak credentials. Under these 3 focus points, we covered the 4 patterns of attack used by hackers, expanded on how dangerous these attacks are and how hackers are making it hard to protect your business.

But did you know, many of these attacks can be prevented with a little help and knowledge?

Web App Attacks

Point-of-Sale Intrusions:

Payment Card Skimmers:

To prevent these card skimmers, physical security will be needed. It is important to note that both, the business, and the consumer will need to take their own precautions.

Cyber-Espionage:

One of the main things to take care of is protecting your network. And three ways of doing this is by:

Along with protecting your network you must monitor internal networks, devices, and applications.

Implementing such security can greatly reduce your chances of having your business be the next victim of a data breach. These aren’t easy and simple steps but they sure are better than the steps a business owner deals with after their business is breached. Not to mention, the money lost in a breach. If any of these steps are complicated to carry on your own or by your IT staff, Lumifi can always help. We focus on taking care of the security of businesses, so business owners can run their business worry-free.

This is our last post from our 3 part series of Highlights from the 2016 Verizon Breach Investigations Report. If interested in reading the previous 2, click on the titles below:

Scattered Spider, Oktapus, UNC3944, Scatter Swine – MGM Resorts Compromise

Threat Summary:
On September 11th, 2023, MGM Resorts suffered a crippling ransomware attack that resulted in 10 days of computer system downtime as well as an estimated overall loss of $80,000,000. The threat actor, dubbed Scattered Spider, is claiming ownership of this hack and alleges to have ties with the infamous ALPHV/BlackCat ransomware gang. In this threat brief we will detail the events that occurred from initial access to recovery of MGM’s systems, common TTPs observed from this threat actor and other affiliated groups, as well as review detection, prevention, and mitigation options that would have been crucial to MGM’s security in all stages of this attack.

Lumifi’s Analysis:
To fully understand this attack, we need to look back into the previous operations of this threat actor. Throughout 2022 and early 2023, this threat actor primarily targeted systems that would provide access to SIM swapping attacks, as well as performing privilege escalation through BYOVD attacks (CVE-2015-2291.) Performing a SIM swapping attack would allow the threat actor to gain access to any data sent to the victim’s phone number. By establishing pre-requisite access to these systems, the threat actor already had the infrastructure in place to receive MFA codes sent to the target’s phone number via SMS, as well as masquerade as the target when making outbound calls.

Fast forward to September 8th, 2023; The threat actor places a call to MGM Resort’s internal IT helpdesk impersonating a legitimate employee (whose information was likely located on social media such as LinkedIn or Facebook.) Once connected with a helpdesk agent, a password reset is requested and processed for the impersonated user account, with MFA being bypassed via SIM swapping, resulting in initial access for the attacker. Currently, this is all the information that has been confirmed in regard to the MGM compromise, however, the rest of the attack chain is predictable based on previous activity from this threat actor.

After gaining initial access, this threat actor has been observed using a VPN or local proxy to geolocate to the local area where the attack is occurring, in an attempt to blend in with the regular traffic and evade detection. Then the threat actor installs legitimate remote access software such as TeamViewer or AnyDesk as a persistence mechanism into the compromised environment. In the past, this threat actor has also been observed creating publicly accessible VMs in the victim’s cloud environment as a means of persistence.

Once persistence is established, this threat actor will spend significant time reviewing internal documentation, resources, and chat logs in an attempt to help with privilege escalation and long-term persistence. Additionally, this threat actor often achieves privilege escalation by targeting password managers and PAM systems as well as utilizing tools such as Mimikatz, Trufflehog and GitGuardian. After gaining escalated privileges, this group will begin to move laterally in the environment and performing internal reconnaissance to identify critical infrastructure.

After successfully gaining access to critical infrastructure, this threat actor will begin performing exfiltration of sensitive data via tools like RClone and DropBox. After the desired data is exfiltrated, the Volume Shadow Copy service is stopped and all shadow copies are deleted or corrupted. Finally, this threat actor will deploy the ALPHV ransomware variant resulting in the encryption of critical systems and leave threatening notes in text files, contact executives via email and text, as well as infiltrating communication channels used to respond to incidents.

Lumifi’s Current Coverage and Mitigation Recommendations:

The Scattered Spider APT is also known to have overlap and ties to a number of other ransomware groups and APTs as demonstrated via the below screen capture from a Mandiant threat researcher at Sleuthcon 2023. Considering the wide array of connections and overlap between these groups, there is also a high likelihood of the tactics observed by one group being utilized by others.

Link between Threat Actors (Lapsus, Oktapus, Scattered Spider)

Source: Jake Nicastro, Mandiant, at Sleuthcon 2023

Mitigation for the threats posed by this APT would include:

RetailNOW Recap 2016: Security Top of Mind for Attendees

The Netsurion team was lucky enough to attend the RetailNOW 2016 conference last week, hosted by the Retail Solutions Providers Association (RSPA) in Grapevine, Texas.

The event, aimed at connecting the point-of-sale (POS) technology ecosystem, was extremely successful because it gave us the perfect platform to further connect with our existing partners—and to meet and interact with industry leaders.

Cybersecurity and breach prevention were some of the hottest topics at the conference—and we were able to share our expertise in these areas through breakout sessions and presentations.

Our “What’s up breaches!” tee shirts were also a great way to get the word out, with plenty of attendees sporting them throughout the week.

There have been many high profile breaches at well-known, big-budget chain restaurants and hotels recently. This just shows that even companies with expansive, big-budget security are still being targeted.

During our speaking sessions, we emphasized network security as the most important first line of defense.

It all comes down to this:

A well segmented network can be the difference between a successful business and a business in the headlines of the latest data breach.

According to the National Cyber Security Alliance:

96 percent of data breaches target the payment card industry. Such breaches can be caused by POS malware, employee mistakes, and internal or external hacking.

Not to mention that as businesses protect themselves from these threats, new technologies, such as EMV, biometrics and mPOS, arise. Technology gets better; hackers get smarter…so what are businesses doing to keep their brands and data secured?

Sure, it’s important for businesses to embrace technology for the convenience of their customers and to stay competitive in the market. However, also important to remember the security risks that new (and more) technology brings.

This threat landscape and new technologies should ultimately push retailers to embrace network security as a first line defense strategy. Data security and PCI compliance should be the priority of any business in today’s market.

And businesses of all sizes deserve a chance to achieve enterprise-level data and network security.

Netsurion’s goal is to provide multi-location businesses with affordable but equally effective alternatives to self-managed security solutions—keeping the burden off the owners’ shoulders and away from their brand reputation.

Post-RetailNOW, Jim Roddy, reseller & ISV business advisor at Vantiv, posted this excellent conference roundup.

In the write-up, he stated:

“Managed services is no longer a far-off concept for POS providers. Many resellers I talked with have fully embraced the recurring revenue business model and are looking to expand it even further in their business. There are now model resellers you can pattern your business after if you want to move to the as-a-Service model.”

Mark Bartig, our senior vice president of Sales & Marketing, actually appeared on a panel discussion carried by Vantiv called “Security as A HUGE revenue opportunity.” The panel of experts offered best practices and tips around how providers can position security products and managed services to monetize security recurrently.

And we’re lucky enough to have extremely supportive resellers who see the value in making their customers more secure. They’re a major factor in making our ultimate network and data security goals for all businesses a reality.

We are honored that they feel our support for them in return. To wrap up a productive and educational few days at the conference, we were thrilled to learn that we were selected as the ‘Reseller Support Services’ winner at the 2016 RSPA Vendor Awards of Excellence.

The annual awards are honors given to RSPA vendor members in recognition of their outstanding achievements in service, quality and channel engagement.

Netsurion was nominated by our partners and voted as the winner by the RSPA members. Our award was the last one introduced by RSPA. They mentioned it received an "overwhelming" response from the RSPA reseller community and that Netsurion was the only company worthy of being nominated for this category. This was truly a tribute to the entire Netsurion team, as it shows that our partners appreciate us as much as we appreciate them.

Thank you to everyone who helped make RetailNOW an overall success for Netsurion—we look forward to talking security with you all next year!

How to Protect Your Network from Ransomware Tips from the FBI

The FBI estimates that more than 4,000 ransomware attacks have occurred daily since the beginning of 2016. That’s a 300% increase from the previous year. This is due in part to the thriving sector of “ransomware-as-a-service.” Individuals don’t need to possess a certain skill set, but rather, malware developers advertise their ransomware on the dark web to be distributed by less sophisticated attackers. This allows developers/advertisers to take their cut from the ransom amount paid.
 
The cyber criminals behind these attacks aren’t necessarily picky; they target big companies, small businesses, government entities, and individuals. But the damage they cause to small- and medium-size businesses (SMBs) is particularly alarming. A recent report by a security firm last year noted that 22% of SMBs affected by ransomware had to cease operations immediately. One-third had suffered a ransomware attack in the previous year.
 
“If you haven’t been a victim of ransomware or any other type of computer attack, you have to operate as if it’s just a matter of time before you are – and take the steps to protect yourself and mitigate the resulting damage or loss,” says Sheraun Howard, supervisory special agent with the FBI’s Cyber Division in Washington, D.C.
 
How it Works
While the names, details, and entry points of each attack vary, the concept remains the same. First, the bad actors deliver the ransomware. This is often done by spearphishing emails – targeted phishing emails aimed at specific employees that contain personal details to perpetuate the fraud. These emails or email attachments will contain an exploit for a particular software application vulnerability that provides the attacker access to your computer. After the attacker has access to your computer, they typically use additional malware to propagate throughout your network and drop their ransomware onto your environment. Once the ransomware has been delivered in one way or another, it prevents the targeted user from accessing their data or systems by encrypting their files. The targets receive an email, text file, or screen message demanding that they pay a ransom in order to regain that access.
 
How to Defend Yourself
The FBI recommends that all businesses take the following steps to reduce their risk of a ransomware attack:

  1. Educate your employees about the risks
  2. Create a security incident response plan
  3. Update and patch software and firmware
  4. Manage privileged accounts
  5. Audit user access to your systems
  6. Use firewalls, spam filters, and anti-virus programs

 
These six recommendations are a solid start for individuals and companies, but at some point, advanced threat protection with Co-Managed SIEM will need to be evaluated and adopted to truly stay ahead of attacks.
 

Report All the Binary Code Executing on Your Network with Sysmon Event IDs

By Randy Franklin Smith

Computers do what they are told, whether good or bad. One of the best ways to detect intrusions is to recognize when computers are following bad instructions – whether in binary form or in some higher level scripting language. We’ll talk about scripting in the future, but in this article I want to focus on monitoring execution of binaries in the form of EXEs, DLLs and device drivers.

The Windows Security Log isn’t very strong in this area. Event ID 4688 tells you when a process is started and provides the name of the EXE – in current versions of Windows you thankfully get the full path – in older versions you only got the file name itself.  But even the full pathname isn’t enough. This is because that’s just the name of the file; the name doesn’t say anything about the contents of the file. And that’s what matters because when we see that c:windowsnotepad.exe ran how do we know if that was really the innocent notepad.exe that comes from Microsoft? It could be a completely different program altogether replaced by an intruder, or more in more sophisticated attacks, a modified version of notepad.exe that looks and behaves like notepad but also executes other malicious code.

Instead of just the name of the file we really need a hash of its contents. A hash is a relatively short, finite length mathematical digest of the bit stream of the file. Change one or more bits of the file and you get a different hash. (Alert readers will recognize that couldn’t really be true always – but in terms of probabilistic certainty, it’s more than good enough to be considered true.)

Unfortunately, the Security Log doesn’t record the hash of EXEs in Event ID 4688, and even if it did, that would only catch EXEs – what about DLLs and device drivers? The internal security teams at Microsoft recognized this need gap as well as some which apparently led to Mark Russinovich, et al, to write Sysmon. Sysmon is a small and efficient program you install on all endpoints that generates a number of important security events “missing” from the Windows Security Log.  In particular, sysmon logs:

Together these 3 events created a complete audit record of every binary file loaded (and likely executed) on a system where sysmon is installed.

But, in addition to covering DLLs and drivers, these events also provide the hash of the file contents at the time it was loaded.  For instance, the event below shows that Chrome.exe was executed and tells us that the SHA 256-bit hash was 6055A20CF7EC81843310AD37700FF67B2CF8CDE3DCE68D54BA42934177C10B57.

Process Create:

UtcTime: 2017-04-28 22:08:22.025

ProcessGuid: {a23eae89-bd56-5903-0000-0010e9d95e00}

ProcessId: 6228

Image: C:Program Files (x86)GoogleChromeApplicationchrome.exe

CommandLine: “C:Program Files (x86)GoogleChromeApplicationchrome.exe” –type=utility –lang=en-US –no-sandbox –service-request-channel-token=F47498BBA884E523FA93E623C4569B94 –mojo-platform-channel-handle=3432 /prefetch:8

CurrentDirectory: C:Program Files (x86)GoogleChromeApplication58.0.3029.81

User: LABrsmith

LogonGuid: {a23eae89-b357-5903-0000-002005eb0700}

LogonId: 0x7EB05

TerminalSessionId: 1

IntegrityLevel: Medium

Hashes: SHA256=6055A20CF7EC81843310AD37700FF67B2CF8CDE3DCE68D54BA42934177C10B57

ParentProcessGuid: {a23eae89-bd28-5903-0000-00102f345d00}

ParentProcessId: 13220

ParentImage: C:Program Files (x86)GoogleChromeApplicationchrome.exe

ParentCommandLine: “C:Program Files (x86)GoogleChromeApplicationchrome.exe”

Now, assuming we have the ability to analyze and remember hashes, we can detect whenever a new binary runs on our network.

Sysmon allows you to create include and exclude rules to control which binaries are logged and which hashes are computed based on an xml configuration file you supply sysmon at installation time or any time after with the /c command. Sysmon is easy to install remotely using Scheduled Tasks in Group Policy’s Preferences section. In our environment, we store our sysmon.xml file centrally and have our systems periodically reapply that configuration file in case it changes. Of course, be sure to carefully control permissions where you store that configuration file.

Just because you see a new hash – doesn’t necessarily mean that you’ve been hacked. Windows systems are constantly updated with Microsoft and 3rd party patches. One of the best ways to distinguish between legitimate patches and malicious file replacements is if you can regularly whitelist known programs from a systems patched early – such as patch testing systems.

Once sysmon is installed you need to collect the sysmon event log from each endpoint and then analyze those events – detecting new software. EventTracker is a great technology for accomplishing both of these tasks.

Logging for HIPAA Part 2; Secure auditing in Linux

HIPAA Logging HOWTO, Part 2

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) outlines relevant security and privacy standards for health information – both electronic and physical. The main mission of the law is “to improve portability and continuity of health insurance coverage in the group and individual markets, to combat waste, fraud, and abuse in health insurance and health care delivery” (HIPAA Act of 1996 http://www.hhs.gov/ocr/privacy/).   A recent enhancement to HIPAA is called Health Information Technology for Economic and Clinical Health Act or HITECH Act. The act  seeks to “promote the adoption and meaningful use of health information technology” and “ addresses the privacy and security concerns associated with the electronic transmission of health information.“(HITECH Act of 2009 )

As we mentioned before, HIPAA itself does not descend to the level of security controls and technologies to implement.  This requires the organizations affected by HIPAA – also known as “covered entities” –to try to follow the spirit of the regulation as opposed to its letter.  What is also interesting to note is that insurance companies and many hospitals that accept payment cards are subject to both HIPAA and PCI DSS (covered in our previous newsletters). Understandably, the scope of their applicability across the organization might be different since payment processing systems should not store patient health information and vice versa.  Still, considering the same technical and administrative controls for both regulations is prudent and will save money in both the short term and long term.

The previous newsletter focused on general HIPAA logging and log review processes and platform logging. This newsletter installment covers application logging issues specific to medical applications.

While platform level logging is useful for protecting sensitive health information, and it is a fact that a majority of health information is stored in databases and processed by healthcare specific applications and.  Such applications are either procured from specialty vendors or developed internally – war via outsourced developers.

HIPAA of audit controls, mentioned in Section 164.312(b), apply to application logging as much or more than to platform logging. This means that custom applications need to be engineered to have adequate logging.  Existing application logging needs to be assessed having adequate logging – it should be noted that many legacy applications will often not record sufficient details for events and might even skip logging events altogether. Thus, before embarking on this project, it makes sense to determine which applications within your organization contain Protected Health Information (PHI) and what their existing levels and methods of logging are.

Let’s define some of the guidance for what to log to satisfy the spirit and letter of HIPAA Security Requirement as well as NIST 800-66 HIPAA clarifications.

Application Logging Guidance

Before we can define good HIPAA logging,  let’s consider typical security use for log data.

From high-level, best audit logs tell you exactly what happened – when, where and how- as well as who was involved. Such logs are suitable for manual, semi-automated and automated analysis. Ideally, the can be analyzed without having the application that produced them at hand – and definitely without having the application developer on call.  In case of healthcare applications, such developer might not be an available at all and the security team will have to proceed on their own. From the log management point of view, the logs can be centralized for analysis and retention.  Finally, they should not slow the system down and can be proven reliable, if used as forensic evidence.

Two primary things need to be defined.

It should also be noted that certain details should never be logged.  The example is obvious: application or system passwords should never appear in logs (this, sadly, still happens for web applications sometimes).  Just as obviously, the health information itself should be kept out of logs.

What events to log?

What is the overall theme for selecting which events to log?

Clearly, we need to know who, when and why accesses any of health information.  We also need to know who adds, changes or deletes it.  But this is not all – we also need to note who tries but fails to read, change or delete information.  If we are unable to record access to each piece of data, we need to carefully record all access to the application itself.

Next, we need to know who performs other actions on systems that process health information as such activities might affect future access to healthcare data.  For example, we need to record if somebody turns logging off or adds a new component to the system which might enable unfettered access to data.  In addition, we need to record other critical events a caring on health information systems, as such events might present circumstantial evidence for unauthorized access.

The following list presents a structured view of the above criteria:

While creating a comprehensive ”what to log” list for every healthcare application in existence is probably impossible, the above list should give you a useful starting point for your relevant applications.  It can be converted into your application logging policy without much extra work.  Please refer to previous newsletter for setting up log monitoring and review process.

What details to log?

Next, what data should you log for each event, and at what level of detail should you log it?  The overall theme we use here is the following:

Who was involved?

What happened?

Where did it happen?

When did it happen?

Why did it happen?

How did it happen?

The list below gives you a starting point based on that theme:

Timestamp + time zone : this helps to answer “when” question, time zone is essential for distributed applications

System, application or component: this helps to answer “where” question and needs to provide relevant application context as well

Source:  for messages related to network connectivity or distributed application  operation, logs also need to answer “where from” question by providing a network source.

Username: this helps to answer “who” question – for those events that are relevant to user or administrator activities

Action: this helps to answer “what” question by providing the nature of the event that is recorded in the log

Object: this also helps to answer “what” question by helping to know which system component or other object (such as user account) has been affected

Status:  this also helps to answer “what” question by explaining whether the action aimed at the object succeeded or failed (other types of status are also possible, such as “deferred”)

Priority: last but not least, every logged event should have an indication of how important it is.  While creating a uniform scale for renting events by importance is impossible since different organizations will have different priorities (for example, events affecting availability vs. confidentiality of information might be read differently)

Thus, a useful application audit log message might look like this:

2010/12/31 10:00:01AM GMT+7 priority=3, system=mainserver, module=authentication, source=127.0.0.1, user=anton, action=login, object=PHI_database, status=failed, reason=“password incorrect”

By the way, notice that another field is added to the above example log message in order to explain the reason for failure. Also notice that the above examples is not in XML – as we mention above, human readability is a useful property to have in logs and computers can deal with name=value pairs just as well as with XML. XML Health Level Seven (HL7) based messages can be easily converted to text, for those application that can log in HL7.

We also mentioned above that being able to easily centralize logs is essential for distributed log analysis either across multiple systems or across multiple application components of a distributed application.  While syslog has been the king of log centralization due to its easy UDP delivery, modern cross-platform application frameworks like a call for publish/subscribe model for log delivery, similar to the ones used in modern Windows versions.  In this case security monitoring tool can request a subscription for a particular type of a logged event – and receive all relevant logs in near real-time, if needed.

Conclusions

In addition to that very basic conclusion – you must log access to sensitive healthcare data– we have to remind our readers that the importance of logging will only grow – along with growing application complexity.  In particular, the need to analyze application behavior and movement of sensitive information across distributed and cloud-based application calls for us to finally get application logging under control.

Software architects and implementers need to “get” logging – there is NO other way since infrastructure logging from network devices and operating systems won’t do it  for detecting and investigating application level threats to ePHI. Security team – ultimately responsible for log review – will need to guide developers towards useful and effective logging that can be used for both monitoring and investigative activities.

Certainly, logging standards such as MITRE CEE (cee.mitre.org) will help – but it might take a few years before they developed and their adoption increases. Pending a global standard, an organization should quickly build and then use its own application logging standard for applications. HIPAA compliance presents a great motivation to creating and adopting such logging standards.

Industry News

Pirate Bay hack exposes user booty
Security weaknesses in the hugely popular file-sharing website thepiratebay.org have exposed the user names, e-mail and Internet addresses of more than 4 million Pirate Bay users… An Argentinian hacker named Ch Russo said he and two of his associates discovered multiple SQL injection vulnerabilities that let them into the user database for the site.

Zeus is back with terrorism-themed spam run
Trojan-laden emails claiming to offer official terrorism information have been hitting inboxes… The emails are spoofed to look like they originate from the U.S. Department of Homeland Security, Pentagon or Transportation Security Administration. Users are encouraged to click on two links, supposedly leading to reports, but which are actually ZIP files containing the insidious Zeus, or Zbot, trojan.

Related Resource: Webinar – Learn how implementing change control in your enterprise can help you handle critical security challenges including BOTnet and zero-day attacks.

Database admin gets 12 months for hacking employer
A former database administrator for Houston’s GEXA Energy was sentenced to 12 months in prison and fined $100,000 for hacking into his former employer’s network. He remotely accessed the GEXA Energy network without authorization, impaired the availability of data and copied a database file containing personal information. GEXA Energy estimates that Kim’s actions resulted in a loss of at least $100,000.

Did you know?  Security violations by insiders are often the hardest to discover, but cause the greatest damage and cost the most to repair. EventTracker helps by monitoring all user and admin activity, automatically detecting policy violations and out-of ordinary or suspicious behavior

Maximize your SIEM ROI

Aristotle put forth the idea in his Poetics that a drama has three parts — a beginning or protasis, middle or epitasis, and end or catastrophe. Far too many SIEM implementations are considered to be catastrophes. Having implemented hundreds of such projects, here are the three parts of a SIEM implementation which if followed will in fact minimize the drama but maximize the ROI. If you prefer the video version of this, click here.

The beginning or protasis

The middle or epitasis

The end or catastrophe

3-Minute Breakdown of Cybersecurity’s Biggest Buzzwords

The cybersecurity market is loaded with ambiguous buzzwords and competing acronyms that make it very difficult to clearly distinguish one infosecurity capability from another.

If your efforts to understand what cybersecurity components you need to focus on have left you frustrated, you're not alone.

Let’s cut to the chase and separate fact from fiction regarding cybersecurity’s biggest buzzwords.

Artificial Intelligence, Machine learning, and User and Entity Behavior Analytics

That’s right. These big three really all belong in one group.

Artificial intelligence (AI) and machine learning (ML) are two very significant concepts right now, and often seem to be used interchangeably. However, while related, they are not quite the same thing.

Artificial intelligence is the wider concept of machines being able to carry out tasks in a way that we would consider "smart" while ML is the application of AI based on the idea that machines should be able to learn on their own from the data provided to them.

An actionable security intelligence platform uses machine learning to understand and predict normal system activities and event occurrences within an enterprise. In the context of cybersecurity, machine learning is leveraged for User and Entity Behavior Analytics (UEBA).

UEBA capabilities use machine learning to gain an understanding of how users (humans) and entities (machines) typically behave within an environment. It looks for risky, anomalous activity that deviates from normal user behavior, and alerts accordingly based on what may indicate a threat.

Common examples include a user accessing a system at an unusual time or location, or simply accessing a system not in their routine. In terms of entity behavior, an example would be a compromised computer being used as an entry point to attempt to log into various other servers and assets.

All of this analysis, correlation, and reporting is done by first collecting and storing event and log data within the SIEM (Security Information and Event Management) technology – bottom-line, an actionable security intelligence platform.

Security Information and Event Management (SIEM)

But wait, you may be asking yourself "Didn't some vendor tell me 'SIEM is dead"? Nothing could be further from the truth. What's really being said is the first-generation SIEM platform is dead. That being the one that was nearly impossible to deploy, collected massive amounts of logs, and spit out an umanageable pile of false positive alerts for an analyst to ignore. Of course, that SIEM is, and should be, dead.

What's misleading in that statement is today's understanding and expectations of a SIEM is much different. Any SIEM solution worth its salt is going to incorporate functionality originally delivered by point-solutions such as endpoint threat detection and response (EDR), intrusion detection system (IDS), user and entity behavior analysis (UEBA), threat intelligence feeds, and more.

Furthermore, today's most effective SIEM solutions should offer practical pricing models, deployment options, and managed services.

Security Orchestration and Automated Response (SOAR)

Machine learning capabilities allow a platform to more effectively find the proverbial "needle in a haystack" by detecting and alerting to real threats and minimizing false positives.

But security analysts still need to respond to such incidents.

EventTracker incorporates SOAR functionality to reduce response times, improve remediation consistency, and increase SOC productivity. For instance, unknown processes can be immediately terminated, monitored for propagation of suspected malware, and placed in an incident report in an enterprise's IT management platform (Security Orchestration).

In such case, when EventTracker detects a threat, it does not just "say something", it "does something" (Automated Response).

Intelligence-Driven Security Operations Center (iSOC)

Technology is only part of the equation. Many organizations lack the staff and resources to realize the full potential of their investment in threat lifecycle management.

A comprehensive managed solution includes a team of security analysts armed with global and local threat intelligence, which is layered on top of a SIEM platform to perform 24/7 monitoring, analysis, and incident response.

This is basically SOC-as-a-Service. The “i" in iSOC means that this group includes a threat research lab, which in some cases is an entity in and of itself.

An iSOC typically consists of:

With Netsurion's Managed Threat Protection solution, the iSOC understands the unique needs of an organization and manages systems administration and tuning, builds out response play books, and conducts regular executive summaries using critical observation reports (CORs).

This co-managed SIEM solution is, for many organizations, a much more cost-effective method to achieve security and compliance results.

So, there you have it. Artificial intelligence (AI), machine learning (ML), User and Entity Behavior Analytics (UEBA), Security Orchestration and Automated Response (SOAR), and Intelligence-Driven Security Operations Center (iSOC) are concepts that are often misconstrued or misused, but when properly understood, they really do convey beneficial cybersecurity concepts and capabilities.

The best way to apply these concepts to your organization, depends on your unique situation. Talk to a Netsurion expert to find out what cybersecurity solution is right for you.

Flax Typhoon APT 

Threat Summary:
Flax Typhoon is a suspected China-based, nation-state threat actor whose TTPs appear to be closely aligned with espionage objectives and extended persistence. Despite activity tracing back to mid-2021, this APT's final objectives are unknown and they have been observed mostly targeting government, education, and critical manufacturing organizations in Taiwan; Though a small subset of attacks have occurred in North America, Africa, and Southwest Asia. The tactics and techniques utilized in these attacks are easily modified for use against a broad range of networks and industries and could have disastrous outcomes if carried out against an organization. With minimal "out-of-the-box" coverage by traditional security vendors, Lumifi aims to break down the attack methods of this threat actor as well as provide coverage and mitigation guidance for potential attacks following a similar attack chain.

Lumifi's Analysis:
Flax Typhoon has been observed utilizing tools such as Mimikatz, China Chopper Webshell, Metasploit, and the SoftEther VPN client in the past, however they primarily specialize in hands-on keyboard activity as well as Living-off-the-Land techniques.

This threat actor gains initial access by exploiting known vulnerabilities in public-facing servers across a variety of services, including (but not limited to) VPN, SQL, Java, and web applications with the goal of dropping a web shell allowing for remote code execution (RCE) against the targeted server. Once the server is compromised, if the threat actor doesn't have administrative permissions, they will run a piece of malware such as Juicy Potato to obtain local system permissions to gain access to WMIC, Powershell, or Command Line with local administrator permissions.

Once full system access is achieved, Flax Typhoon disables network-level authentication for RDP and modifies the sticky keys binary to launch Windows Task Manager as a debugger, giving the threat actor access to launch a Windows command interface and create memory dumps with system level permissions. While RDP is typically running only on an internal-facing network interface, the threat actor will also install a legitimate VPN bridge to call back to the network infrastructure under their control, giving them long-term system level access to a compromised host.

To deploy this VPN, the threat actor uses one of many LOLBins, such as Powershell, BITSAdmin, or CertUtil, to download the executable for SoftEther VPN from their infrastructure. Once this file is downloaded, a service or scheduled task is created to automatically launch the VPN bridge upon startup of the compromised machine. In order to make detection more difficult, the file's name is changed to 'conhost.exe' or 'dllhost.exe' to imitate legitimate Windows components. The actor also utilizes a VPN over HTTPS mode built-in to the VPN to blend in with legitimate HTTPS traffic and helps evade most network security controls.

At this point, a foothold is established on a compromised host and an unusual pattern emerges. In some cases, LOLBins such as WinRM and WMIC will be used to move laterally to other systems on the network, or the threat actor will attempt to dump LSASS and access the SAM registry hive in order to access account password hashes to access other resources on the network via password cracking or pass-the-hash attacks. However, in most cases minimal activity occurs after persistence is established on a network. Due to this behavioral pattern and the lack of data-collection/exfiltration objectives, it is suspected that these attacks are part of a larger espionage campaign, though final objectives of this campaign have not been observed.

Lumifi's Current Coverage and Mitigation Recommendations:
Lumifi currently has a number of detections in our content library that would successfully detect this threat actor at multiple points in their attack chain. The usage of tools such as Metasploit and Mimikatz would be detected via our rule 'LMFI - Powershell Exploitation Framework Activity'. Usage of BITSAdmin or CertUtil to download a malicious file would be detected by our rules 'LMFI - Persistence using BITSadmin' and 'LMFI - Suspicious Certutil Usage' respectively. Along with these detections, we have also created detections specifically focused on this attack chain, which detect the persistence mechanisms associated with disabling NLA for RDP and spawning any suspicious processes from accessibility functions such as command-line consoles and task manager. These rules are titled 'LMFI - NLA for RDP Tampering' and 'LMFI - Suspicious Process Spawned from Accessibility Functions'.

As for mitigations and defending against Flax Typhoon, this starts with vulnerability management, especially on any systems exposed to the public internet. Additionally, registry auditing should be enabled so that any registry changes made to critical registry keys is logged and can be used for threat hunting and event correlation. RDP usage should be reduced to a minimum and any systems that are not expected to maintain RDP connections should generate an alert. Finally, utilize MFA on all accounts and regularly change passwords.

How the EventTracker/Netsurion merger will bring you more powerful cybersecurity solutions

We are delighted that EventTracker is now part of the Netsurion family.

On October 13, 2016 we announced our merger with managed security services Netsurion. As part of the agreement, Netsurion’s majority shareholder, Providence Strategic Growth, the equity affiliate of Providence Equity Partners, made an investment in EventTracker to accelerate growth for our combined company. Netsurion’s managed security services protect multi-location businesses’ information, payment systems, and on-premise public and private Wi-Fi networks from data breaches, data loss, and other risks posed by hackers.

We are thrilled to join with a dynamic and leading security organization to provide a managed network security service that couples our cutting-edge managed SIEM offering with a state-of-the-art managed firewall.

As the threat landscape evolves rapidly and hackers become more sophisticated, it’s become clear that comprehensive security solutions, like SIEM, are necessary to protect organizations from current and emerging threats and ensuring your brand is safe. However, many small and multi-location businesses cannot afford, and do not have the knowledge to manage such complex systems. Combining our cloud-based SIEM capabilities with Netsurion’s expertise in managed security services allows us to deliver SIEM to a class of businesses that previously was unable to afford and manage such sophisticated security measures. Now any sized branch or remote office, franchise, or sole proprietor operation can use Netsurion’s managed network security service or EventTracker’s SIEM services without the costs and complexity of full-time dedicated resources.

This transaction is only the beginning of a series of amazing new offerings we will be announcing in the coming months. We will soon be introducing a new product offering that will bring enterprise-level SIEM security down to the multi-location environment, as well as enhanced PCI-DSS compliance services, including a new FIM solution and PCI QSA consulting services.

Sustainable vs. Situational Values

I am often asked that if Log Management is so important to the modern IT department, then how come more than 80% of the market that “should” have adopted it has not done so?

The cynic says “unless you have best practice as an enforced regulation (think PCI-DSS here)” then twill always be thus.

One reason why I think this is so is because earlier generations never had power tools and found looking at logs to be hard and relatively unrewarding work. That perception is hard to overcome even in this day and age after endless punditry and episode after episode has clarified the value.

Still resisting the value proposition? Then consider a recent column in the NY Times which quotes Dov Seidman, the C.E.O. of LRN who describes two kinds of values: “situational values” and “sustainable values.”

The article is in the context of the current political situation in the US but the same theme applies to many other areas.

“Leaders, companies or individuals guided by situational values do whatever the situation will allow, no matter the wider interests of their communities. For example, a banker who writes a mortgage for someone he knows can’t make the payments over time is acting on situational values, saying: I’ll be gone when the bill comes due.”

At the other end, people inspired by sustainable values act just the opposite, saying: I will never be gone. “I will always be here. Therefore, I must behave in ways that sustain — my employees, my customers, my suppliers, my environment, my country and my future generations.”

We accept that your datacenter grew organically, that back-in-the-day there were no power tools and you dug ditches with your bare hands outside when it was 40 below and tweets were for the birds…but…that was then and this is now.

Get Log Management, it’s a sustainable value.

Ananth

Mobile Tech in Healthcare Can Put Your Practice at Risk

Providing your patients with Wi-Fi while they wait, obtaining their information from an iPad, or allowing them to check their records online is simply expected and not seen as a luxury anymore. While you focus on providing the best health service for your patients, it is easy to under-estimate the risks that you may be putting your practice should you implement mobile tech without basic security measures.

With hackers out there “turning doorknobs” looking for unlocked networks, it’s absolutely necessary to not forget about security.

Many healthcare practices think a data breach will never happen to them. But the truth of the matter is that only “The Big Guys” like Anthem, Excellus and Premera (to name a few) make the Data Breach headlines… precisely why hackers primarily go after small practices!

After all, those smaller practices tend to lack the resources to keep their network security top-of-mind.

Protect your practice from being the next victim of a mobile tech data breach.

Provide your patients with the latest and most convenient technology you can while keeping their data and your practice secured. See how Lumifi can help make that happen.

Monitoring DNS Traffic for Security Threats

Cyber criminals are constantly developing increasingly sophisticated and dangerous malware programs. Statistics for the first quarter of 2016 compared to 2015 shows that malware attacks have quadrupled.

Why DNS traffic is important

DNS has an important role in how end users in your enterprise connect to the internet. Each connection made to a domain by the client devices is recorded in the DNS logs. Inspecting DNS traffic between client devices and your local recursive resolver could reveal a wealth of information for forensic analysis.

DNS queries can reveal:

Identifying the threats using EventTracker

While parsing each DNS log, we verify each domain accessed against:

Any domain which matches any of the above mentioned criteria warrants attention and an alert is generated along with the client which accessed it, and the geological information of the domain (IP, Country).

Using behavior analysis, EventTracker tracks the volume of connections to each domain accessed in the enterprise. If the volume of traffic to a specific domain is more than average, alert conditions are triggered. When a domain is accessed for the first time, we check the following:

Recent trends show that cyber criminals may create dynamic domains as command and control centers. These domains are activated for a very short duration and then discarded, which makes the above checks even more important.

EventTracker does statistical/threshold monitoring of query, client, record type and error. This helps in detecting many DDOS attacks like NXDOMAIN attack, Phantom domain attack, random sub-domain attack, etc. EventTracker’s monitoring of client DNS settings will help to detect DNS hijacking and generate an alert for anything suspicious, including information about the client as well as its DNS setting. The EventTracker flex dashboard helps in correlating attack detection data and client details, making attack detection simpler.

Monitoring the DNS logs is a powerful way to identify security attacks as they happen in the enterprise, enabling successful blocking of attacks and fixing vulnerabilities.

IT Security: How Much Should You Spend?

Just how much should you be spending on IT Security? It’s a vexing question to answer for many reasons as each situation has their unique circumstances and factors. But here are some insights garnered over the last decade in cybersecurity.

First off, what constitutes security spending? Dedicated security hardware, software, personnel, and services for sure, but security spending is often embedded in other areas in hidden ways. It can vary by industry, geography, and corporate culture. IT security spend will be higher in regulated environments with stringent compliance requirements and can also increase if a new threat is acknowledged, or in the aftermath of a breach.

Who spends the least on security? Two kinds of organizations - those that are ignoring the problem and underspending, and those that have a mature IT program. The process discipline and safeguards established by mature IT programs minimize unexpected incidents and thus reduce unforeseen costs.

Spending on technologies such as firewalls remains constant because of continually changing threats. Older threats will be addressed more efficiently, but new technologies and an ever-changing threat landscape bring new threats that necessitate a spending increase. Spending for "letting the good guys in" such as multi-factor authentication and access management is often discretionary, but often required for strategic business initiatives such as home banking or regulatory compliance. Such projects that get funded and implemented as part of larger IT projects are usually not part of the information security budget.

On average, a security spending level of 3 - 6 percent of total IT budget is considered the norm. If you add in compliance spending as part of security, that's another 3 - 6 percent of the IT budget. If you include business continuity spending, that's another 2 percent bringing it to 10 -14 percent of the total IT budget. If you spend much less than the norm, be advised to revisit your security assumptions and posture given today’s advanced threats.

Make your security dollars go farther and respond quickly to new threats by co-sourcing IT security functions, such as security monitoring, vulnerability management, endpoint protection, and SOC-as-a-Service (SOCaaS). For a small to mid-sized organization, the added benefit in such a managed services plan helps solve the IT security talent shortage.

Learn more about how Lumifi advances protection without breaking the bank.

Malware, Ransomware, and the Next Big Threat

Imagine the lost revenue for a major retailer if they needed to shut down all of their stores for a few days, or even a few hours, especially over the busy holiday season. It would be worth millions to have those systems unfrozen.

It will not be long before cybercriminals utilize ransomware that freezes all of a business’ POS systems, and the ransom will not be for the release of data, it will be for the ability to get back in business. The impact would be devastating.

“We are not far away from a major breach of a POS system that has nothing to do with stealing credit card data, but instead is intended to hold the business’ ability to conduct transactions hostage for a large ransom. Stealing credit card data takes months, whereas ransomware takes minutes.

- Kevin Watson, CEO, Netsurion1

If it seems like there is a new data breach every day, you’re right. As of August 30, 2017, there have been 956 breaches reported and more than 19 million records exposed.

Not all breaches make the news but when they do, it’s because countless individuals have been affected and a company’s or brand’s reputation has been destroyed.

What exactly is malware and ransomware?

Malware

Malware, or “malicious software,” can take on many forms including viruses, worms, Trojan horses, spyware, adware, scareware, and ransomware. Malware is any piece of code designed to infect a computer or mobile device for malicious purposes, such as recording or stealing personal data, passwords, credit card information, etc. The information is then studied for behavioral purposes, stored and used against a person or company, or sold online through the “Dark Web.”

The universal purpose is financial. Malware allows hackers to steal personal identities, corporate or government secrets, and even unreleased movies, books, or music. There is no end to what information can be stolen and repurposed for illicit gain.

It can also be used to access and control corporate, educational, recreational, healthcare, or government computer systems and alter the way those systems conduct business; anything from changing grades on report cards, to voter fraud, to cutting power to homes.

Just as one strain of malware strikes, gets identified and a fix created, copycat variants begin appearing almost immediately, making it more and more difficult to combat. New complex strains are getting progressively more destructive to individuals and businesses, making it difficult to predict and prevent future attacks.

Ransomware

Ransomware is the current trend and, potentially, the most dangerous to a company or brand.

Often transmitted by email, it locks your computer and prevents access to your data until a ransom (usually in Bitcoin) is paid. While this type of attack is not new, it has become much more sophisticated by encrypting files and data with a coded “lock” and the hacker has the “key.” To get the key, you must pay the ransom. Of course, there’s no guarantee you will ever get your data or use of your computer system back, regardless if you pay.

If you sell goods or services, and accept credit card payment, you are at a high risk and held accountable by PCI DSS compliance regulations, no matter your industry.

Point-of-Sale Malware

Point-of-sale (POS) malware continues to make headlines and inflict damage on brand reputation and profit margins alike. Cybercriminals can widely impact most or even all locations by exploiting the POS system itself.

It’s not much of a leap to go from POS malware stealing credit card data to POS ransomware holding a business hostage. The difference: Typical credit card malware must successfully persist on the target’s network for months while it syphons off credit card data. A ransomware attack needs only minutes to execute its plan.

What would the victimized retailer be willing to pay to unlock their POS systems? If a brand was bleeding millions per day in actual revenue and potentially more in resulting data breach fines, brand reputation, and loss of customer loyalty, one could easily foresee the company being willing to pay a ransom of $2 million, which may be less than what they’d lose if they successfully restored operations on their own in just two or three days.

The best ways to protect yourself from an attack still ring true:

While this is good, sound advice, it is not enough for a corporate entity that has multiple endpoints and relies on many internal and external users, third-party software providers, and needs to have internet access.

Why it still happens

No matter what size of the business, it’s rare to find a truly robust and large InfoSec team prepared to handle every endpoint security threat. The hard reality is that distributed, or frequently referred to as “edge” locations, are usually far too small to have the kind of dedicated cybersecurity expertise and teams that are available at the corporate level.

The result is that these independently owned stores and franchise locations are often the weak link, a fact that is not lost on cybercriminals.

For most retailers, network security currently consists of a firewall and anti-virus installed on each workstation and server. Unfortunately, as cybercriminals have become more sophisticated in their attacks, these defense measures alone are not enough to protect the network.

Specifically, firewalls and anti-virus software are vulnerable to compromised third-party remote access tools, zero-day malware, and abnormal user behavior, all of which have been seen before in major retail breaches.

Since most ransomware is a form of a zero-day malware, firewalls and anti-virus software cannot prevent most ransomware attacks. To prevent these types of vulnerabilities, additional protection is required.

Unfortunately, IT teams are overwhelmed just maintaining the current systems and no longer have time to review log files or track every suspicious incident. And most are not trained in cybersecurity. It is becoming impossible for companies to exist without dedicated security teams, either on staff or outsourced to a third party. Finding the budget and other resources for such a staff is no longer an option.

In addition, the compliance industry standards in existence today, including PCI DSS, HIPAA, SOX 404, FISMA/NIST 800-53, SANS CAG, GLBA, NISPOM, etc., are constantly being updated to meet current security and economic needs.

Regular IT teams are overwhelmed just maintaining the current systems and no longer have time to review log files or track every suspicious incident. And most are not trained in cybersecurity. It is becoming impossible for companies to exist without dedicated security teams, either on staff or outsourced to a third party. Finding the budget and other resources for such a staff is no longer an option.

The best offense is a good defense

Anti-virus and anti-malware are not enough. Firewalls are not enough. Security patches and endless updates are not enough. The solution is to go beyond bare-bones regulatory compliance-based security and begin implementing real security measures that predict, prevent, detect, and respond to advanced threats.

If you want to prevent or stop a malware attack today, you need an extensive security network that includes a detailed road map, sophisticated software packages, and a team of experts that are certified in cybersecurity and dedicated solely to monitoring log files, analyzing data, recognizing threats and being able to combat those threats in real time while proactively working to prevent future attacks.

A company’s or brand’s reputation is on the line every time there is a data breach or ransom attack. These attacks can target third-party providers that are used by dozens of recognizable companies. If you own a major hotel, for example, and your third-party POS provider is hacked, your customers and brand suffer. The same goes for every industry.

To turn your defense into the best offense, it is recommended that you do the following:

Even with all of the latest, greatest software and security teams in place, another form of malware is just around the corner, waiting to break into some unsuspecting system. Companies today need to stay vigilant in the war on cyberterror, not just protecting themselves from known threats, but being proactive to defend against future threats.

Cybersecurity and the protection of corporate and client data should be the top priority for 2018. Budgets and resources should be adjusted accordingly.

These cyberterrorists won’t go away until things like ransomware cease to be profitable for them.

Detecting Zeus, Logging for incident response, and more

Logging for Incident Response: Part 1 – Preparing the Infrastructure

From all the uses for log data across the spectrum of security, compliance, and operations, using logs for incident response presents a truly universal scenario –you can be forced to use logs for incident response at any moment, whether you’re prepared or not.  An incident response (IR) situation is one where having as much log data as possible is critical. You might not use it all, and you might have to work hard to find the proverbial needle in the haystack of logs – still, having reliable log data from all – affected and unaffected – systems is indispensable in a hectic post-incident environment.

The security mantra “prevention-detection-response” still defines most of the activities of today’s security professionals. Each of these three components is known to be of crucial importance to the organization’s security posture. However, unlike detection and prevention, the response is impossible to avoid. While it is not uncommon for an organization to have weak prevention and nearly non-existent detection capabilities, they will often be forced into response mode by attackers or their evil creations – malware. Even in cases where ignoring the incident that happened might be the chosen option, the organization will implicitly follow a response plan, even if it is as ineffective as to do nothing.

In this paper, we will focus on how to “incident-response-proof” your logging – how to prepare your logging infrastructure for incident response. The previous six articles focused on specific regulatory issues, and it is not surprising that many organizations are doing log management just to satisfy compliance mandates. Still, technology and processes implemented for PCI DSS or other external mandates are incredibly useful for other uses such as incident response.  On top of this, many of the same regulations prescribe solid incident response practices (for additional discussion see “Incident management in the age of compliance”)

Basics
Even though a majority of incidents are still discovered by third parties (seeVerizon Breach Report 2010 and other recent research), it is clear that organizations should still strive to detect incidents in order to limit the damage stemming from extensive, long-term compromises. On the other hand, even for incidents detected by the third parties, the burden of investigation – and thus using logs for figuring out what happened –falls on the organization itself.

We have therefore identified two focal points for use of logs in incident response:

Sometimes the latter use-case is called “forensics” but we will stay away from such definitions since we would rather reserve the term “forensics” for legal processes.

Incident Response Model and Logs
While incidents and incident response will happen whether you want it to or not, a structured incident response process is an effective way to reduce the damage suffered by the organization.  The industry-standard SANS incident response model organizes incident response in six distinct stages (see (http://www.sans.org/rr/whitepapers/incident/Incident Management 101 Preparation & Initial Response (aka Identification)  By: Robin Dickerson (posted on January 17, 2005)

Preparation includes tasks that need to be done before the incident: from assembling the team, training people, collecting, and building tools, to deploying additional monitoring and creating processes and incident procedures

Logs are extremely useful, not just for identification and containment as we mention above, but for all phases of incident response process.  Specifically, here is how logs are used at each stage of the IR process:

  1. Preparation: incident response logs help us verify controls (for example, review login success and failure histories), collect normal usage data (learn what log messages show up during routine system activity), and perform a baseline (create log-based metrics that describe such normal activity), etc.
  2. Identification: logs containing attack traces, other evidence of a successful attack, or insider abuse are pin-pointed, or alerts might be sent to notify about an emerging incident; also, a quick search and review of logs helps to confirm an incident, etc.
  3. Containment: logs help us scope the damage (for example, firewall logs show which other machines display the same scanning behavior in case of a worm or spyware infestation), and learn what else is lost by looking at logs from other systems that might contain traces similar to the one that is known to be compromised, etc.
  4. Eradication: while restoring from backups, we need to also make a backup of logs and other evidence:  preserving logs for the future is required, especially if there is risk of a lawsuit (even if you don’t plan to sue, the other side might)
  5. Recovery: logs are used for confirming the restoration and then measures are put in place to increase logging so that we have more data in case it happens again; incident response will be much easier next time
  6. Follow-Up: apart from summarizing logs for a final report, we might use the incident logs for peaceful purposes: training the new team members, etc.

As a result, the IT infrastructure has to be prepared for incident response logging way before the first signs of an incident are spotted.

Preparing the Infrastructure
In light of predominantly 3rd party incident discovery, the incident response process might need to be activated at any moment when notification of a possible incident arrives.  From this point onward, the security team will try to contain the damage and investigate the reason for the attack or abuse based on initial clues. Having logs will allow an organization to respond better and faster!

What logs needs to be collected for effective IR? This is very simple: any and all logs from networks, hosts, applications, and other information systems can be useful during response to an incident. The same applies to context data – information about users, assets, and vulnerabilities will come in handy during the panic of incident response. As we say above, having as much log data as possible will allow your organization to effectively investigate what happened, and have a chance of preventing its recurrence in the future.

Specifically, make sure that the following log sources have logs enabled and centrally collected:

Detailed discussion of logging settings on all those systems goes beyond the scope of this paper and might justify not just reading a document, but engaging specialty consultants focused on logging and log management.

Tuning Log Settings for Incident Response
What logs should be enabled on the systems covered above? While “log everything” makes for a good slogan, it also makes log analysis a nightmare by mixing together more relevant log messages with debugging logs which are used much less often, if at all. Still, many logging defaults should be changed as described below.

A typical Unix (Solaris, AIX, etc.) or Linux system will log the following into syslog: various system status and error messages, local and remote login/logout, some program failures, and system start/stop/restart messages. Logs that will not be found will be all logs tracking access to files, running processes, and configuration changes. For example, to log file access on Linux, one needs to use a kernel audit facility, and not simply default syslog.

Similarly, on Windows systems the Event Log will contain a plethora of system status and error messages, login/logout records, account changes, as well as system and component failures.  To have more useful data for incident response , one needs to modify the audit policy to start logging access to files and other objects.

Most web servers (such as Apache and Microsoft IIS) will record access to web resources located on a server, as well as access errors. Unlike the OS platforms, there is not a pressing need for more logging, but one can modify the /etc/http/httpd.conf to add logging of additional details, such as referrer and browser type.

Databases such as Oracle and MS SQL Server log painfully little by default, even though the situation is improving in recent database versions such as Oracle 11g. With older databases, you have to assume to have no database logs if you have not enabled them during the incident preparation stage. A typical database will log only major errors, restarts, and some administrator access, but will not log access, or changes to data or database structures.

Firewalls typically log denied or blocked connections, but not the allowed connections by default: as our case study showed, connection allowed logs are one of the most indispensable for incident response. Follow the directions for your firewall to enable such logging.

VPN servers will log connections, user login/logouts, errors; default logging will be generally sufficient.  Making sure that successful logins – not just failures-  are logged is one of the important preparation tasks for VPN concentrators.

Network IDS and IPS will usually log their alerts, various failures, user access to the sensor itself; the only additional type of “logging” is recording full packet payload.

Implementing Log Management
Log management tools that can collect massive volumes of diverse log data without issues are hugely valuable for incident response.  Having a single repository for all activity records, audit logs, alerts, and other log types allows incident responders to quickly assess what was going on during an incident, and what led to a compromise or insider abuse.

After logging is enabled and configured for additional details and additional logged events, the logs have to be collected and managed to be useful for incident response.  Even if a periodic log review process is not occurring, the logs have to be available for investigations.  Following the maturity curve (see http://chuvakin.blogspot.com/2010/02/logging-log-management-and-log-review.html), even simply having logs is a huge step forward for many organizations.

When organizations start collecting and retaining logs, the question of retention policy comes to the forefront.  Some regulations give specific answers: PCI DSS for example, mandates storing logs for one year.  However, determining proper log storage for incident response can be more difficult. One year might still be a good rule of thumb for many organizations, since it is likely that investigating incidents more than one year after they happened will be relatively uncommon,but certainly possible – so longer retention periods such as three years may be useful).

In the next paper, we will address how to start reviewing logs for discovering incidents, and also how to review logs during incident response. At this point, we have made a huge step forward by making sure that logs will be around when we really need them!

Conclusions
Even though compliance might compel organizations to enable logging, deploy log management, and even start reviewing logs, incident response scenarios allow the value of logs to truly manifest itself.

However, in order to use logs for incident response, the IT environment has to be prepared – follow the guidance and tips from this paper in order to “IR-proof” your logging infrastructure.  A useful resource to jumpstart your  incident response log review is “Critical Log Review Checklist for Security Incidents” which can be obtained at http://chuvakin.blogspot.com/2010/03/simple-log-review-checklist-released.html in various formats.

About Author

Dr. Anton Chuvakin (http://www.chuvakin.org) is a recognized security expert in the field of log management and PCI DSS compliance.  He is an author of books “Security Warrior” and “PCI Compliance” and a contributor to “Know Your Enemy II”, “Information Security Management Handbook”; he is now working on a book about computer logs.  Anton has published dozens of papers on log management, correlation, data analysis, PCI DSS, security management (see list www.info-secure.org) . His blog http://www.securitywarrior.org is one of the most popular in the industry.

In addition, Anton teaches classes (including his own SANS class on log management) and presents at many security conferences across the world; he recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries.  He works on emerging security standards and serves on the advisory boards of several security start-ups.

Currently, Anton is building his security consulting practice www.securitywarriorconsulting.com, focusing on logging and PCI DSS compliance for security vendors and Fortune 500 organizations.  Dr. Anton Chuvakin was formerly a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging Evangelist, tasked with educating the world about the importance of logging for security, compliance and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook University.

Are You Listening to Your Endpoints?

There’s plenty of interest in all kinds of advanced security technologies like threat intelligence, strong/dynamic authentication, data loss prevention and information rights management. However, so many organizations still don’t know that the basic indicators of compromise on their network are new processes and modified executables. This is so important because in every high profile case of data breaches over the past few years a common thread has been the presence of a malicious program that provided the attackers with persistent access to the internal network of the victim organization.

Moreover, some security technologies – such as strong authentication – are no defense if you have malicious code running on the endpoint of a strongly authenticated user.

So rapid detection of malicious code is paramount and the importance can’t be over-stated. Detecting malicious code isn’t easy and traditional signature-based AV is only going to catch comparatively “old” and widely distributed malware. It isn’t likely to catch the targeted attacks we are up against today in which the bad guy uses shrink wrapped tools to build and package a unique malicious agent to use against your organization.

How do you detect and even prevent malware like this?

Like everything it takes a defense-in-depth approach. Advanced 3rd party application white-list and advanced memory protection are very effective. But whether you have such technologies deployed or on the radar, your SIEM solution can provide you early warning when new software is observed on your network.

The key thing is to look for Event ID 4688 in the Windows security log. Compare the executable name in that event to a list of whitelisted EXEs you expect to see –or better yet a list of executables that automatically build from past events.

You want these events from every possible system – including workstations. If you are concerned about the amount of log data involved, the sponsor of this article, Netsurion Open XDR, provides an agent that can efficiently forward just the relevant events you want from thousands of endpoints.

Will there be false positives? Yes – especially until you refine your rules to take into account patches.

Will this catch every malicious agent? Of course not. After all, there are multiple ways to insert malicious code on an endpoint and some are completely in-memory with no new executable involved. 3rd party advanced memory protection products or Microsoft’s EMET can provide some help with detecting memory exploits though using your SIEM to collect and monitor those events is the obvious thing to do if you use EMET or another memory protection technology.

Some malware embeds itself in the existing, trusted EXEs and DLLs so it makes sense to monitor for modifications to such files. Again you want this from your workstations – not just server endpoints. Getting EXE/DLL modification events requires either Windows file monitoring or a file integrity monitoring (FIM) solution. Enabling auditing of just EXE and DLL files with Windows file auditing though is not that easy. You can’t configure audit policy on files with Group Policy without also impacting permissions. The reason why widely distributed scripts would be required. FIM is definitely an easier route. Again, it’s worth mentioning that Netsurion Open XDR agent includes FIM monitoring making it easy to catch changes to existing software as soon as it happens.

The bottom line is this: to stop breaches we’ve got to detect and respond to malicious agent software. Are you listening to your endpoints?

Research points to SIEM-as-a-Service

SC Magazine released the results of a research survey focused on the rising acceptance of SIEM-as-a-Service for the small and medium sized enterprise.

The survey, conducted in April 2016, found that SMEs and companies with $1 billion or more in revenue or 5,000-plus employees faced similar challenges:

This come as no surprise to us. We’ve been seeing these trends rise over the past several years. Gartner reports that by 2019, total enterprise spending on security outsourcing services will be 75 percent of the spending on security software and hardware products, and that by 2020, 40 percent of all security technology acquisitions will be directly influenced by managed security service provider (MSSP) and on-premises security outsourcing providers, up from less than 15% today.

It used to be that firewalls and antivirus were sufficient enough stop gaps; but in today’s complex threatscape, the cyber criminals are more sophisticated. The weak point of any security approach is usually the unwitting victim of a phishing scam or the person who plugs in the infected USB; but “securing the human” requires the expertise of other humans, trained staff with the certification and expertise to monitor the network and analyze the anomalies. An already busy IT staff can become even more overburdened; identifying, training and keeping security expertise is hard. So is keeping up with the alerts that come in on a daily basis, and being current on the SIEM technology.

Thus, the increasing movement towards a co-managed SIEM which allows the enterprise to have access to the expertise and resources they need to run an effective security program without ceding control. SIEM-as-a-Service: saving time and money.

7 Things IT Pros Should Know about HIPAA and Protecting Patient Data

It has grown more challenging to protect patient privacy and secure sensitive data under HIPAA (Health Insurance Portability and Accountability Act) as the volume and persistence of cyber attacks have increased in recent years. Healthcare institutions often have vast databases of sensitive information such as credentials and credit card data that cyber criminals seek to monetize and sell on the dark web. Threat actors use advanced threats like Zero-day attacks to target healthcare organizations, using ransomware like Emotet and Locky to spread and infect other systems. HIPAA outlines requirements for healthcare organizations and their supply chain partners to follow in areas such as risk management, security incident handling and investigation, log monitoring, encryption, and security awareness training. These ever-increasing HIPAA mandates create challenges for healthcare providers, health plans, and healthcare clearing houses to stay current and compliant with healthcare mandates.

HIPAA Compliance Considerations

The 700,000 + healthcare provider and payor organizations in the United States face a myriad of compliance and security mandates that represent a sizable target for threat actors to exploit. It is crucial for IT Pros to understand the following compliance facts and security criteria if they plan to, or already support, healthcare organizations that are covered by the privacy and cybersecurity aspects of HIPAA:

  1. Understand the definition of PHI
    Penalties are assessed for leaks of Protected Health Information (PHI). PHI/ePHI includes any information that identifies an individual and relates to at least one of the following:
    • The individual’s past, present, or future physical or mental health
    • The provision of healthcare to the individual
    • The past, present, and future payment for healthcare

    Disclosure of PHI/ePHI due to careless mistakes or willful neglect are violations of HIPAA compliance regulations.

  2. Security is everyone’s job
    Everyone across the healthcare ecosystem is responsible for safeguarding PHI/ePHI, from employees, executives, and clinicians, to supply chain partners. Organizations in the healthcare ecosystem such as attorneys, data service providers, billing agents, and Managed Security Service Providers (MSSPs) are also responsible for maintaining healthcare privacy and security. These healthcare supply chain partners may have access to confidential healthcare information; HIPAA governs data leakage whether intentional or inadvertent. Security awareness training can also educate employees and executives alike to the importance of data security and ever-changing cybersecurity threats. In addition, a HIPAA best practice for business associates is to limit access to PHI data only to those with a specific “need to know” to reduce the attack surface and propagation of sensitive healthcare and patient information.
  3. Insider threats constitute a big risk
    Healthcare is the only industry where insider threats outnumber external threats, according to the Verizon Data Breach Investigations Report 2019. An insider threat is an organizational risk that flows from employees, former employees, contractors, and supply chain partners. Because insiders often have access to sensitive data, have direct knowledge about computer systems, and know where security gaps may exist, these insider threats are considered some of the most challenging to detect and mitigate. A Security Information and Event Management (SIEM) solution that includes User and Entity Behavior Analytics (UEBA) enables anomalous behavior detection against these insidious insider threats.
  4. A SIEM can simplify HIPAA compliance
    HIPAA compliance need not be difficult and time-consuming. System logs provide evidence of anomalous events but are co-mingled with millions of other routine audit logs. A SIEM solution centralizes collection, real-time analysis, and storage of logs that can detect and pinpoint advanced threats. IT organizations large and small can add SIEM software or even a managed SIEM solution to enhance compliance reporting and better prepare for an audit. EventTracker SIEM is a world-class SIEM that includes pre-defined reports for compliance frameworks including HIPAA and many other frameworks. In addition, the absence of SIEM technology has been regularly shown as a glaring weakness in data breaches post-mortem.
  5. The cost of non-compliance can be sizable
    In 2018, the Office for Civil Rights (OCR) within the U.S. Department of Health and Human Services (HHS) issued 11 penalties for HIPPA non-compliance totaling over $23 million. They assessed fines for both data breaches as well as the lack of required Business Agreements (BAs) with supply chain partners. The average fine totaled $500,000, which is a vast sum to a small and medium-sized healthcare providers or associated businesses. In addition to the financial penalties, other impacts include lost internal productivity, negative publicity, and a decrease in patient loyalty. The OCR is using these penalties to send a message to the entire healthcare community that healthcare data and privacy gaps are typically preventable.
  6. HIPAA compliance requires people, processes, and technology
    The first step in HIPAA compliance is to understand an organization’s unique risks and how these risks can be exploited, as well as remediated.A holistic approach is needed to assess the threats specific to the healthcare industry. In addition to security technology, human expertise and processes are crucial to monitor network systems and create actionable information regarding routine events and suspicious activities worthy of further investigation. Many healthcare organizations lack the IT and security staff and expertise to detect and stop the industry’s data breaches. For example, EventTracker SIEMphonic is a co-managed security solution supported by an ISO certified 24/7 Security Operations Center (SOC), that delivers and orchestrates all the critical security capabilities needed to predict, prevent, detect, and respond to security incidents.
  7. Compliance is the starting point
    Although HIPAA compliance can be complicated and necessitates time and planning to implement, it remains your starting point. Just as threat actors are evolving, cybersecurity and data privacy practices must continue to adapt and improve. Modern threats require modern threat mitigation technology and practices. IT and security pro’s alike must stay informed and educated about current and considered compliance mandates and enhancements such as the possible HIPAA changes that the US Health and Human Services (HHS) department announced for 2019 with implementation anticipated in 2020.

    Defend Against Healthcare Threats

    EventTracker SIEM provides solutions to help both healthcare providers and payers improve security, simplify compliance, and protect sensitive patient data. Ensure your organization has the people, processes, and technology to remain vigilant to the healthcare sector’s ever-increasing threats.

Transforming Cybersecurity: Lumifi’s Journey with Azure Sentinel in the Accounting Industry

Description of Pain or Challenge:​
An accounting company’s internal IT strategy prompted the move to a colo data center, which offered security monitoring services. While the accounting team initially favored our service, they were not given the option to retain it. After observing another partner’s attempt to manage a SIEM (now required to use Azure Sentinel), they found the newly mandated service lacking in knowledge, security expertise, and consultative guidance. Consequently, the accounting company initiated internal efforts to return to Datashield (Lumifi).

Solution Overview:
With previous experience in NetWitness, the organization transitioned to Azure Sentinel, necessitating thorough onboarding. Lumifi, supporting Sentinel as a monitored SIEM solution, expedited the adoption process, achieving operational status within weeks, a significant improvement from their previous provider.

Leveraging Lumifi’s Sentinel expertise, the organization swiftly embraced logging best practices and operational monitoring. This laid a robust foundation for further development, encompassing custom content creation, parsing, and dashboard development. Lumifi’s contributions enhanced SIEM maturity. Beyond technical implementation, Lumifi delivers continuous threat hunting, content development, and insights into emerging cybersecurity threats and events

Technology Description:
Formerly NetWitness, Migration to Azure Sentinel, Lumifi Managed Security Services

Enhancing Healthcare Security: A Success Story

Challenge: An existing RSA customer, a hospital, recognized the need for enhanced security operations despite using a Government, Risk & Compliance (GRC) solution.

Solution: We proposed RSA NetWitness as a comprehensive solution, seamlessly integrating with their current SIEM, EDR solution, firewalls, and existing network infrastructure. Our 24/7/365 Managed Detection and Response (MDR) services provided improved visibility. Partnering with a dedicated MDR provider who communicated regularly and acted as an extension of their security team was crucial. This allowed the hospital's security team to focus on proactive, strategic initiatives, boosting efficiency and achieving GRC goals.

Technology Description: RSA NetWitness for Packets and Logs, Lumifi Managed Security Services, Lumifi ShieldVision

Optimizing Security Infrastructure for a Logistics Company: A Success Story

Security Tools: Palo Alto XSIAM

Description of Pain or Challenge:​ The client had deployed RSA NetWitness and Palo Cortex but was unsatisfied with the deployment's progress. They sought to consolidate into a single solution, eliminate the need for multiple systems, and required custom ingest and alert content for their proprietary solutions. Staffing a 24/7 SOC proved challenging, and they lacked the expertise to manage the technology effectively.

Solution Overview: Lumifi provided a solution that replaced multiple legacy SIEM deployments, enhancing visibility and enabling the SOC to take additional actions during incidents. This consolidation streamlined their technology stack onto the Palo Alto Networks platform. XSIAM, deployed via SaaS, granted remote access to employees.

Lumifi's expertise and differentiators expanded account services, delivering a positive customer experience through exceptional service quality.

Technology Description: Content Development, Palo Alto XSIAM, In-depth knowledge of the client's environments, and understanding of specific vertical needs.

Six Proactive Steps to Expand Attack Surface Coverage

Organizations use 40+ products and IT tools on average to manage networks, SaaS applications, and endpoints. This fragmented approach creates data siloes and blind spots that hamper detection and incident response. Attackers actively look for easy targets like misconfigured websites and unpatched applications to exploit. Service Providers can leverage their strong business relationships and trusted advisor roles to help businesses protect their expanding attack surface and be more proactive regarding malware and breaches.

Expanding Attack Surfaces

An attack surface encompasses all the avenues that cyber criminals or unauthorized users can initiate an attack or extract data. Attack surfaces include networks, endpoints, cloud infrastructure, and SaaS applications. Digital transformation, work-from-anywhere, and always-on devices have expanded the attack vectors that defenders must safeguard.

blog attack surface img11

Minimizing attack vectors to improve attack surface protection is not new. It’s a cybersecurity best practice in compliance frameworks such as the NIST Risk Management Framework (RMF).

Attack Surface Coverage Improves Business Security

Businesses have many points of vulnerability, too many to monitor and protect on their own.   Executives may not be aware or prepared for today’s sophisticated threats. IT decision makers may be so focused on daily operations and putting out fires that they overlook tool sprawl that limits visibility and actual cybersecurity effectiveness. Some benefits of attack surface coverage include:

Service providers are well-positioned to defend against financially motivated attackers looking for easy business targets.

Best Practices to Minimize Attack Surface Risk

Reduce the potential for a successful attack with these practical steps:

Step 1: Identify and shore up any vulnerability gaps

Layered security defenses are needed to quickly mitigate threats posed by persistent and well-funded adversaries. The first tactic used by cyber criminals is network reconnaissance which looks for unpatched vulnerabilities and configuration errors. Think like a hacker to help your clients shrink their attack surface with rigorous scanning, vulnerability management, and guided remediation steps.  

Step 2: Boost endpoint protection where attackers often enter

Endpoint security is vital as 70% of data breaches occur via compromised laptops and workstations. Coverage gaps and the lack of insight into where critical data resides hamper device security.

blog attack surface img21

Service providers can use a prevention-first approach followed by detection and response against known and unknown threats to minimize attacker exploits on business endpoints.

Step 3: Simplify tech stack complexity

The explosion in point products and tools leads to integration blind spots, underutilized investments, and alert fatigue trying to swivel between them all. Eliminating unused or default functionality and redundant products can reduce attack surfaces and risks. Streamline and simplify your infrastructure with solutions like extended detection and response (XDR) that offer improved visibility and the ability to “connect the dots” for faster threat detection and response.

Step 4: Increase cloud security for comprehensive protection

Software-as-a-Service (SaaS) applications and public cloud infrastructures like Amazon Web Services (AWS), Microsoft Azure, and Microsoft 365 (M365) are mission critical. The widespread adoption of cloud computing and shortage of cloud security expertise make cloud security even more essential. Cyber criminals know that cloud attack surfaces are often overlooked and misconfigured. Holistic attack surface coverage that includes cloud security can alert you to cloud security gaps and guided remediation steps long before a disastrous failure occurs.   

Step 5: Implement network segmentation

Break the network up into logical groups with separate security policies and access. The goal of micro-segmentation is to limit the impact of any unforeseen data incident and make it more difficult to move laterally across an organization. While not new, network segmentation is a relatively easy way to protect infrastructure and attack surface.

Step 6: Enhance visibility and event correlation

One crucial way to improve visibility is to unify logs and device telemetry for a single source of truth. Log integration across firewalls, applications, databases, and cloud infrastructures enable service providers to respond rapidly to security incidents at scale. Look for vendor-neutral partners that leverage existing infrastructure, security licenses, and telemetry out of the box. This open approach provides greater visibility and avoids rip-and-replace projects. Cybersecurity experts in a 24/7 security operations center (SOC) then augment technology to provide guided remediation steps that simplify service provider operations.

Netsurion Brings it all Together

In a connected and always-on world, ignoring security gaps jeopardizes networks and business resiliency. Safeguarding IT infrastructure and sensitive data is challenging and requires constant vigilance and 24/7/365 monitoring. A managed solution augments IT teams and decreases false positives, a boon to overworked MSPs and cyber defenders. 

Key Elements of MDR for Powerful and Practical Cybersecurity

The rise in ransomware attack volume and sophistication is a wake-up call for executives and IT departments alike. Traditional perimeter-focused defenses, such as firewalls, are no longer sufficient against stealthy and financially-motivated attackers. There are several ways to achieve a Managed Detection and Response (MDR) outcome:

  1. Do-it-Yourself (DIY)
  2. Outsourced
  3. Hybrid approach

MDR’s defense-in-depth benefits organizations by enhancing threat visibility, augmenting skills and expertise, responding to current vulnerabilities, and adding proactive prevention, detection, and response. Here is a recommended approach for evaluating MDR and what it entails:  

Do you have a SIEM for full visibility? Organizations must protect an ever-increasing attack surface that encompasses physical servers, workstations, endpoints, and mobile devices. To ensure comprehensive visibility, you need to correlate log data in a security information and event management (SIEM) platform for quick search, analysis, and incident response. Cybersecurity experts view SIEM as a foundational capability that organizations of all sizes and maturity levels should adopt.

Do you use MITRE ATT&CK for better threat correlation? Developed by MITRE, the ATT&CK® framework is based on real-world threat observations. The framework’s tactics, techniques, and procedures (TTPs) enable security defenders to improve threat hunting and complete discovery of ongoing attacks. Implementing MITRE ATT&CK on your own can be complex and time-consuming. Our threat protection platform, EventTracker, natively maps the ATT&CK knowledge base into its console for enhanced visibility and threat enrichment, so you benefit from the MITRE ATT&CK framework without doing the heavy lifting.

Do you have EDR to protect the endpoint? A significant percentage of today’s threats originate from always-on endpoints like laptops, tablets, servers, and virtual machines. Organizations can improve threat detection time with endpoint detection and response (EDR) capabilities, especially when protecting legacy and unpatched devices. Stopping an attack early in the cyber attack lifecycle restricts adversary access, reconnaissance, and damage. Our deep learning capabilities even accelerate threat prevention across a broad range of operating systems and file types. The business case for EDR is simple, with its proven results to protect your critical devices from Zero-day attacks and mutating malware.

Can you automate cybersecurity? Automation can reduce mundane tasks repeated hundreds of times a day by cybersecurity analysts, leaving more time for proactive tasks like threat hunting. Streamlining cybersecurity reduces false positives and ensures that you only see validated and high priority threats. We speed up the predict, prevent, detect, and respond process while improving analyst efficiency and accelerating threat detection. Netsurion’s security simplifies IT operations and provides learn-once-defend-everywhere insights. 

Do you have a SOC for 24/7 incident response capability? A Security Operations Center (SOC) allows organizations to fully monitor, detect, investigate, and respond to cyber threats 24/7/365. Hackers don’t work only Monday through Friday, and neither should your cybersecurity protection. But the obstacles to build and maintain an in-house SOC are significant. The high cost of hardware and software alone is daunting, but even more expensive is recruiting, training, and retaining cybersecurity analysts. Lumifi delivers SOC-as-a-Service with analysts who work as an extension of your in-house team.

MDR solutions and provider capabilities can vary widely. Make sure to tailor your assessment and selection process to current as well as future requirements.

Checklist for a More Proactive Defense  
Consider the following criteria when navigating the MDR selection process:

  1. Don’t rely exclusively on legacy endpoint tools like anti-virus and anti-malware because they are insufficient against today’s persistent attackers.
  2. Select a managed security service provider (MSSP) that has deep expertise to augment your in-house staff and skills.   
  3. Avoid unproven MDR solutions that contain bloated features that add cost and complexity.
  4. Invest in MDR that consolidates your tech stack and simplifies operations. 

Future Steps

MDR solutions are gaining traction because they offer powerful yet practical cybersecurity capabilities while potentially consolidating technology and costs. Netsurion offers unified MDR capabilities such as:

Our managed detection and response solution overcomes the challenges of DIY point tools. Learn how MDR from Lumifi aligns your staffing and budget with technology that drives the outcomes you need for today’s advanced threats.

Ivanti/MobileIron Sentry Authentication Bypass Vulnerability (CVE-2023-38035)

CVE-2023-38035 Threat Summary:

CVE-2023-38035 allows an unauthenticated attacker to access sensitive admin configuration APIs on versions 9.18 and prior of Ivanti Sentry over port 8443. These configuration APIs are then used by the MobileIron Configuration Service (MICS), which upon successful exploitation, could lead to remote code execution with root permissions and configuration changes to MICS.

Lumifi's Analysis:

Exploiting this vulnerability is only possible via internal access by a threat actor or if the MICS is configured on a port exposed to the internet. If the threat actor does not have access to this service initially, then this vulnerability can be chained with two other vulnerabilities in Ivanti Endpoint Manager Mobile (CVE-2023-35078 and CVE-2023-35081) to lead to the successful exploitation of this Ivanti Sentry authentication bypass.

Lumifi's Recommendations:

While the Lumifi content library contains many detections that would alert on a variety of theoretical attack paths that could spawn from this vulnerability, there currently isn't enough information regarding the exact mechanism of exploitation to reliably detect this vulnerability. As such, Lumifi recommends restricting access to Ivanti Sentry to a management network only IT administrators can access and ensure that the System Manager Portal (on port 8443 by default) is not exposed to external networks. Additionally, any vulnerable versions should be patched via the RPM scripts available on Ivanti's KB (https://forums.ivanti.com/s/article/KB-API-Authentication-Bypass-on-Sentry-Administrator-Interface-CVE-2023-38035?language=en_US).

Three Indicators of Attack

For many years now, the security industry has become somewhat reliant on ‘indicators of compromise’ (IoC) to act as clues that an organization has been breached. Every year, companies invest heavily in digital forensic tools to identify the perpetrators and which parts of the network were compromised in the aftermath of an attack.

All too often, businesses are realizing that they are the victims of a cyber attack once it’s too late. It’s only after an attack that a company finds out what made them vulnerable and what they must do to make sure it doesn’t happen again.
This reactive stance was never useful to begin with and given the threat landscape, is totally undone as described by Ben Rossi.

Given the importance of identifying these critical indicators of attack (IoAs), here are eight common attack activities that IT departments should be tracking in order to gain the upper hand in today’s threat landscape.

Here are three IoAs that are both meaningful and relatively easy to detect:

  1. After hours: Malware detection after office hours; unusual activity including access to workstations or worse yet, servers and applications, should raise a red flag.
  2. Destination Unknown: Malware tends to “phone home” for instructions or to exfiltrate data. Connections from non-browsers and/or on non-standard ports and/or to poor reputation of “foreign” destinations is a low noise indicator of breaches.
  3. Inside Out: More than 75% of attacks, per the the Mandian m-report, are done using stolen credentials. It is often acknowledged that Insider attacks are much less common but much more damaging. When an outsider becomes a (privileged) insider, your worst nightmare has come true.

Can you detect out-of-ordinary or new behavior? To quote the SANS Institute…Know Abnormal to fight Evil. Read more here.

The Cost of False IT Security Alarms

Think about the burglar alarm systems that are common in residential neighborhoods. In the eye of the passive observer, an alarm system makes a lot of sense. They watch your home while you’re asleep or away, and call the police or fire department if anything happens. So for a small monthly fee you feel secure. Unfortunately, there are a few things that the alarm companies don’t tell you.

1) Between 95% and 97% of calls (depending on the time of year) are false alarms.

2) The police regard calls from alarm companies as the lowest priority and it can take anywhere between 20-30 minutes for them to arrive. It only takes the average burglar 5 minutes to break and enter, and be off with your valuables.

3) In addition to this, if your call does turn out to be a false alarm, the police and fire department have introduced hefty fines. It is about $130 for the police to be called out, and if fire trucks are sent, they charge around $410 per truck (protocol is to send 3 trucks). So as you can see, one false alarm can cost you well over $1,200.

With more than 2 million annual burglaries in the U.S., perhaps it’s worth putting up with so many false positives in service of the greater deterrent? Yes, provided we can sort out the false alarms which sap the first responder.

The same is true of information security. If we know which alerts to respond to, we can focus our time on those important alerts. Tuning the system to reduce the alerts, and removing the false positives so we can concentrate only on valid alerts, gives us the ability to respond only to the security events that truly matter.

While our technology does an excellent job of detecting possible security events, it’s our service, which examines these alerts and provides experts who make it relevant using context and judgement, that makes the difference between a rash of false positives and the ones that truly matter.

The Assume Breach Paradigm

Given today’s threat landscape, let’s acknowledge that a breach has either already occurred within our network or that it’s only a matter of time until it will. Security prevention strategies and technologies cannot guarantee safety from every attack. It is more likely that an organization has already been compromised, but just hasn’t discovered it yet.

Operating with this assumption reshapes detection and response strategies in a way that pushes the limits of any organization’s infrastructure, people, processes and technologies.

In the current threat landscape, a prevention-only focus is not enough to address determined and persistent adversaries. Additionally, with common security tools, such as antivirus and Intrusion Detection Systems (IDS), it is difficult to capture or mitigate the full breadth of today’s breaches. Network edge controls may keep amateurs out, but talented and motivated attackers will always find the means to get inside these virtual perimeters. As a result, organizations are all too often ill prepared when faced with the need to respond to the depth and breadth of a breach.

Assume Breach is a mindset that guides security investments, design decisions and operational security practices. Assume Breach limits the trust placed in applications, services, identities and networks by treating them all—both internal and external—as not secure and probably already compromised.

While Prevent Breach security processes, such as threat modeling, code reviews and security testing may be common in secure development lifecycles, Assume Breach provides numerous advantages that help account for overall security by exercising and measuring reactive capabilities in the event of a breach.

With Assume Breach, security focus changes to identifying and addressing gaps in:

Assume Breach verifies that protection, detection and response mechanisms are implemented properly — even reducing potential threats from “knowledgeable attackers” (using legitimate assets, such as compromised accounts and machines).

To defend effectively, we must:

Since this can be overwhelming for any but the largest organizations, our SIEM Simplified service is used by many organizations to supplement their existing teams. We contribute our technology, people and processes to the blue team and help defend the network.

See what we’ve caught recently.

Diagnosing Account Lockout in Active Directory

Symptom

Account Lockouts in Active Directory

Additional Information

“User X” is getting locked out and Security Event ID 4740 are logged on respective servers with detailed information.

Reason

The common causes for account lockouts are:

Troubleshooting Steps Using EventTracker

Here we are going to look for Event ID 4740. This is the security event that is logged whenever an account gets locked.

  1. Login to EventTracker console:
  2. Select search on the menu bar
  3. Click on advanced search
  4. On the Advanced Log Search Window fill in the following details:

Once done hit search at the bottom.

You can see the details below. If you want to get more information about a particular log, click on the + sign

Below shows more information about this event.

Now, let’s take a closer look at 4740 event. This can help us troubleshoot this issue.

Log Name Security
Source Microsoft-Windows-Security-Auditing
Date MM/DD/YYYY HH:MM:SS PM
Event ID 4740
Task Category User Account Management
Level Information
Keywords Audit Success
User N/A
Computer COMPANY-SVRDC1
Description A user account was locked out.
Subject:
Security ID NT AUTHORITYSYSTEM
Account Name COMPANY-SVRDC1$
Account Domain TOONS
Logon ID 0x3E7
Account That Was Locked Out:
Security ID S-1-5-21-1135150828-2109348461-2108243693-1608
Account Name demouser
Additional Information:
Caller Computer Name DEMOSERVER1
Field My Description
DateTime This shows Date/Time of event origination in GMT format.
Source This shows the Name of an Application or System Service originating the event.
Type This shows Warning, Information, Error, Success, Failure, etc.
User This is the user/service/computer initiating event. (Name with a $ means it’s a computer/system initiated event.
Computer This shows the name of server workstation where event was logged.
EventID Numerical ID of event.
Description This contains the entire unparsed event message.
Log Name The name of the event log (e.g. Application, Security, System, etc.)
Task Category A name for a subclass of events within the same Event Source.
Level Warning, Information, Error, etc.
Keywords Audit Success, Audit Failure, Classic, Connection etc.
Category This shows the name for an aggregative event class, corresponding to the similar ones present in Windows 2003 version.
Subject: Account Name Name of the account that initiated the action.
Subject: Account Domain Name of the domain that account initiating the action belongs to.
Subject: Logon ID A number that uniquely identifying the logon session of the user initiating action. This number can be used to correlate all user actions within one logon session.
Subject: Security ID SID of the locked out user
Account Name Account That Was Locked Out
Caller Computer Name This is the computer where the logon attempts occurred

Resolution

Logon into the computer mentioned on “Caller Computer Name”  (DEMOSERVER1) and look for one of the aforementioned reasons that produces the problem.

To understand further on how to resolve issues present on “Caller Computer Name”  (DEMOSERVER1) let us look into the different logon types.

LogonType Code 0
LogonType Value System
LogonType Meaning Used only by the System account.
Resolution No evidence so far seen that can contribute towards account lock out
LogonType Code 2
LogonType Value Interactive
LogonType Meaning A user logged on to this computer.
Resolution User has typed wrong password on the console
LogonType Code 3
LogonType Value Network
LogonType Meaning A user or computer logged on to this computer from the network.
Resolution User has typed wrong password from the network. It can be a connection from Mobile Phone/ Network Shares etc.
LogonType Code 4
LogonType Value Batch
LogonType Meaning Batch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention.
Resolution Batch file has an expired or wrong password
LogonType Code 5
LogonType Value Service
LogonType Meaning A service was started by the Service Control Manager.
Resolution Service is configured with a wrong password
LogonType Code 6
LogonType Value Proxy
LogonType Meaning Indicates a proxy-type logon.
Resolution No evidence so far seen that can contribute towards account lock out
LogonType Code 7
LogonType Value Unlock
LogonType Meaning This workstation was unlocked.
Resolution User has typed a wrong password on a password protected screen saver
LogonType Code 8
LogonType Value NetworkCleartext
LogonType Meaning A user logged on to this computer from the network. The user’s password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext).
Resolution No evidence so far seen that can contribute towards account lock out
LogonType Code 9
LogonType Value NewCredentials
LogonType Meaning A caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity, but uses different credentials for other network connections.
Resolution User initiated an application using the RunAs command, but with wrong password.
LogonType Code 10
LogonType Value RemoteInteractive
LogonType Meaning A user logged on to this computer remotely using Terminal Services or Remote Desktop.
Resolution User has typed wrong password while logging in to this computer remotely using Terminal Services or Remote Desktop
LogonType Code 11
LogonType Value CachedInteractive
LogonType Meaning A user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials.
Resolution No evidence so far seen that can contribute towards account lock out as domain controller is never contacted in this case.
LogonType Code 12
LogonType Value CachedRemoteInteractive
LogonType Meaning Same as RemoteInteractive. This is used for internal auditing.
Resolution No evidence so far seen that can contribute towards account lock out as domain controller is never contacted in this case.
LogonType Code 13
LogonType Value CachedUnlock
LogonType Meaning This workstation was unlocked with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials.
Resolution No evidence so far seen that can contribute towards account lock out as domain controller is never contacted in this case.

How to identify the logon type for this locked out account?

Just like how it is shown earlier for Event ID 4740, do a log search for Event ID 4625 using EventTracker, and check the details.

Log Name Security
Source Microsoft-Windows-Security-Auditing
Date date
Event ID 4625
Task Category Logon
Level Information
Keywords Audit Failure
User N/A
Computer COMPANY-SVRDC1
Description An account failed to log on.
Subject:
Security ID SYSTEM
Account Name COMPANY-SVRDC1$
Account Domain TOONS
Logon ID ID
Logon Type 7
Account For Which Logon Failed:
Security ID NULL SID
Account Name demouser
Account Domain TOONS
Failure Information:
Failure Reason An Error occurred during Logon.
Status 0xc000006d
Sub Status 0xc0000380
Process Information:
Caller Process ID 0x384
Caller Process Name C:WindowsSystem32winlogon.exe
Network Information:
Workstation Name computer name
Source Network Address IP address
Source Port 0
Detailed Authentication Information:
Logon Process User32
Authentication Package Negotiate
Transited Services
Package Name (NTLM only)
Key Length 0

Logon Type 7 says User has typed a wrong password on a password protected screen saver.

Now we understand what reason to target and how to target the same.

Applies to

Microsoft Windows Servers
Microsoft Windows Desktops

Contributors

Ashwin Venugopal, Subject Matter Expert at EventTracker
Satheesh Balaji, Security Analyst at EventTracker

Do you know where your data is?

Network Security Basic Training Series: Data

In this fifth article of the series, we continue to explore some of the basic ways that businesses of all sizes can keep their networks safer. These include tools you can implement on your own and understand why taking action is so important to the safety of your business.

Today we will discuss the topic of data and ways to keep track of where sensitive data resides and where it is going.

So let’s begin with inventorying hardware and software.

It’s a common phrase used in the IT community that “you can’t secure what you can’t manage”, or another way to think of this is that you cannot secure what you don’t even know exists on your network.

In order to tackle the task of securing your company data, you first have to know that it exists in the first place. Many corporate users don’t realize where they may be putting their data, and many corporate network administrators and executives may not realize where their employees may be putting the data that runs their company.

First things first: do an inventory!

To get started, I recommend that you take inventory of what PCs, servers, laptops, tablets, and phones are on your network and able to connect to your shared drives, email, and other systems. If you already have an inventory, chances are it may reside in a spreadsheet or other document, and if it is a little outdated or not complete, it’s time to do it again.

Ideally you should have a system in place that is doing automatic inventory, and keeping a central database up-to-date with any new devices or changes to the systems that are being monitored. Before you do any type of inventory of corporate owned devices, be sure that you have permission (in writing) first before you start.

You should never scan any system that you do not own or don’t have approval to scan.

But what do I use to do an inventory?

There are many products available to help you do IT inventorying. Some cost money and others cost a LOT of money. What you choose is up to you and should match your particular requirements.

However, there is a FREE solution that I have used for years that may help get you started; It’s called Spice Works. I have used this product in the past to help me audit the local network that I am connected to and I even use this product at home to keep my home network inventory up-to-date.

What should I audit using these tools?

What you ideally want to audit is the PCs, laptops, servers, tablets, phones, and other devices that are connected to your network. Then from there, using these tools you would want to audit the software that is installed on the devices.

One of the features of the SpiceWorks tool is the ability to audit hardware, software, and even tell you the “health” of those devices. You can tell how much space is left on a hard drive, how much memory is installed on a device, and how much is in use, and I have even had the system tell me when the toner in my wireless printer was low so I could re-order it!

What about my data? How do I tell where it is?

Now that you have a high level overview of the devices on your network and what programs are installed on them, it’s time to move on to determining where your data is. This can be difficult without specialized tools that can scan your devices for data files (such as documents, spreadsheets, databases, etc.) and those tools are typically grouped into a category called “Data Loss Prevention” or “DLP” type of tools.

These can be very costly for the SOHO or SMB type of user, but for larger enterprises, they should be considered a requirement. Without a costly tool like DLP, you can take other steps to try and determine where data may reside.

Here are some of those steps:

Important Note:

With any of the steps listed above, be sure you are authorized to do these steps by your employer before doing these types of scans. Also ensure that you have the proper policies in place that lets your employees know that these types of audits will be done periodically and that proper responses and possibly sanctions may be applied if employees are found violating your established policies. 

What about USB sticks and external hard drives?

One of the most dangerous type of device being used on corporate environments these days are USB sticks and external USB connected hard drives.

While these can be just fine if they are provided by you for your employees to use, the ones they buy on their own and bring in from home could have devastating consequences to your business if not managed properly.

USB drives do not typically arrive with encryption on them, nor do they have anti-virus built in. If you do not block these devices, you should have a written policy in place that says that they must be checked and pro-approved for use before they are allowed to plug into your corporate owned devices.

Users can inadvertently bring in viruses from home on them, and they can also be used to copy sensitive corporate data and be brought home or lost in transit.

Summary:

While the steps above may not find ALL the corporate data on the devices that are connected to your corporate network, it is a start and is better than doing nothing at all. Using the process above, you may end up finding personally owned devices on your network that you did not know were there, or you may even find data that you thought was better secured than it is.

When you find things that do not meet the corporate standards for use and storage, you should take steps to fix the situation so that data is not allowed to continue to be out of your control.

Accelerate Your Time-to-Value with Security Monitoring

A hot trend in the Managed Service Provider (MSP) space is emerging, transforming from an MSP to a Managed Security Service Provider (MSSP). Typically, MSPs act as an IT administrator, however, the rapid rise of cloud-based Software-as-a-Service (SaaS) is reducing margins for MSPs. This change is forcing MSPs to compete on price, causing buyers to become less loyal. Many MSPs are looking to add cybersecurity and IT compliance practices to their offerings for customers that are aware of the implications of a breach.

The statistics are remarkable. Gartner Inc. predicts worldwide information security spending will climb to $93 billion in 2018. In addition, Cybersecurity Ventures predicts that by 2021, global cybersecurity spending will exceed $1 trillion.

Customers recognize the necessity for better cybersecurity, which increases demand for your solutions, and are willing to pay for it, which increases your margin. Once you get to know their network and compliance requirements, customers are much more apt to stay put and not shop around on price alone. It’s no surprise that MSPs are actively seeking ways to get in on the ground floor in cybersecurity.

So how would you go about this? The classic approach is to frame the problem as a technical one. After all, most MSPs are, at their heart, technical people. All too often, MSPs seeking to become MSSPs approach the problem by reviewing available technologies and seek the best fit from a features viewpoint. And that's where you would be wrong.

It’s About People, Platform, and Process

74% of organizations are only reviewing logs weekly. The simple reason is, that while you can buy security tools, you simply cannot buy security monitoring capability. The "big hero" approach is neither scalable nor effective. To successfully implement a 24/7 security monitoring service aside of acquiring tools, an MSP would need to:
a) Hire and train a team of at least 6 staff members
b) Create and refine the security operations processes
c) Provide both lateral and top-down support

From our own experience, given full commitment plus the necessary budget and tools, this is a year-long process. Expect to be in the red during this year with costs far outstripping revenue. Tool vendors leave these "problems" for you to solve which makes for a high time-to-value (TTV) and lower probability of success.

Don't let your (technical) heart overrule your (business) head. It may sound exciting to get low-cost tools, maybe even one that is open source, allowing you to roll up your sleeves as a Linux guru, but that approach will put you in a world of hurt.

Why Drive Your Cybersecurity When You Can Uber?

The good news is that it’s the age of Uber. Compare Hertz rental car, the equivalent of buying software, versus Uber ride share, the equivalent of a co-managed security and compliance service. There are numerous advantages to adopting a co-managed approach. These include proven technology backed by a robust team of experts. Most important, low TTV, a minimal upfront investment, and a high probability of success.

When seeking a partner as an MSP or MSSP, keep these evaluation criteria in mind:

MSPs can and should definitely consider adding a security and compliance practice. Your customers are asking for it and your stockholders will thank you for it. Accelerate your TTV by partnering with a service provider, not buying more tools, that allows you to focus on your core competency.

5 cyber security myths, the importance of time synchronization, and more

Time won’t give me time: The importance of time synchronization for Log Management

Does this sound familiar? You get off a late night flight and wearily make your way to your hotel. As you wait to check in, you look at the clocks behind the registration desk and do a double-take. Could it really be 3:24:57 PM in Sydney, 1:36:02 PM in Tokyo, and 11:30:18 PM in New York? Of course not; time zones are separated by full hours – not minutes and seconds. The clocks have become de-synchronized and are showing incorrect readings.

But while de-synchronized clocks at a hotel are a minor nuisance, de-synchronized clocks across distributed servers in a corporate network are a serious and sometimes risky headache. This is all the more apparent when log aggregation and SIEM tools are in use to visualize and correlate activities across geographically distributed networks. Without an accurate timestamp on the log files, these solutions are unable to re-create accurate sequencing patterns for proactive alerting and post-incident forensic purposes.

Think a few minutes or even seconds of log time isn’t important? Consider the famous hacking case recounted by Clifford Stoll in his 1990 real-life thriller, The Cuckoo’s Egg. Using log information, a 75 cent (USD) accounting error was traced back to 9 seconds of unaccounted computer usage. Log data and a series of impressive forensic and tracking techniques enabled Stoll to track-back the attack to Markus Hess, in Hanover, Germany. Hess had been collecting information from US computers and selling the information to the Soviet KGB. A remarkable take-down that started with a mere 9 seconds of lost log data.

Needless to say, accurate synchronization of log file timestamps is a critical lynchpin in an effective log management and SIEM program. But how can organizations improve their time synchronization efforts?

Know what you have

If you don’t know what you’re tracking, it will be impossible to ensure all the log information on the targets is synchronized. First things first: start with a comprehensive inventory of systems, services, and applications in the log management/SIEM environment. Some devices and operating systems use a form of standardized time stamping format: for example, the popular syslogprotocol which is used by many Unix systems, routers, and firewalls, is an in process IETF standard. The latest version of the protocol includes parameters that indicate if the log and system is time synchronized (isSynced) to a reliable external time source and if the synchronization is accurate (synAccuracy).

Other parameters to check for that can impact the accuracy of the synchronization process include the time zone of the device or system and the log time representation, 24 hour clock or AM/PM format. Since all logs do not follow the same exact format, it’s also important that the log parsing engine in use for aggregation and management is capable of identifying where in the log file the timestamp is recorded. Some engines have templates or connectors that automatically parse the file to locate the timestamp and may also provide customizable scripts or graphical wizards where administrators can enter in the parameters to pinpoint the correct location for timestamps in the log. This function is particularly useful when log management systems are collecting log data from applications and custom services which may not be using a standard log format.

Normalize

Once you know where the timestamp information is coming from (geographically, time zone, system, application, and/or service) it’s time to employ normalization techniques within the log management system itself. If a log is being consumed from a device that is known to have a highly accurate and trustworthy external time source, the original timestamp in the log may be deemed acceptable. Keep in mind, however, that the log management engine may still need to normalize the time information to recreate a single meta-time for all the devices so that correlation rules can run effectively.

For example, consider a company with firewalls in their London, New York City, and San Jose offices. The log data from the firewalls are parsed by the engine and alert that at 6:45 pm, 1:45pm, and 10:45am on January 15th 2010 a denial of service was detected. For their local zones, these are the correct timestamps, but if the log management engine normalizes the geographic time into a single meta-time, or Coordinated Universal Time (UTC), it’s clear that all three firewalls were under attack at the same time. Another approach is to tune the time reporting in the devices’ log files to reflect the desired universal time at the correlation engine rather than the correct local time.

For devices and logs that are not accurately synchronized with external time sources, the log management engine could provide its own normalization by tracking the time the log file information was received and time stamping it with an internal time value. This approach guarantees a single time source for the stamping, but accuracy can be impeded by delays in log transfer times and would be ineffective for organizations that batch transfer log information only a few times a day.

Trust the Source

Regardless of which kinds of normalization are used, reliability of the time source matters. During a criminal or forensic examination, the timestamps on your organizations network may be compared to devices outside. Because of this, you want to make sure the source you are using is as accurate as possible. One of the most common protocols in use for time synchronization is NTP (Network Time Protocol)3 which provides time information in UTC. Microsoft Windows systems implement NTP as WTS (Windows Time Service) and some atomic clocks provide data to the Internet for NTP synchronization. One example of this is the NIST Internet Time Service4.

There are some security concerns with NTP because it uses a stateless protocol for transport and is not authenticated. Also, there have been some incidents of denial of service attacks against NTP servers making them temporarily unavailable to supply time information. What can we do about that? Not much – despite the minor security concerns, NTP is the most widely used (and widely supported) protocol for network device time synchronization, so we can do our best to work around these issues. Consider adding extra monitoring and network segregation to authoritative time sources where possible.

All Together Now

When it comes to log management and alerting, the correct time is a must. Determine which devices and systems your log management system is getting inputs from, make sure the time information is accurate by synchronizing via NTP, and perform some kind of normalization on the information – either on the targets or within the log mgmt engine itself. It’s a little tricky to make sure all log information has the correct and accurate time information, but the effort is time well spent.

Ransomware-as-a-Service is Skyrocketing

No matter what business you are in, it’s likely you view ransomware as one of the top cyber threats today. Adversaries are adapting and morphing their harmful techniques to better evade detection and infect a wider set of targets. As a result, ransomware has skyrocketed in the past two years, according to Cofense. Ransomware losses in 2020 are estimated at $1.4 billion in the U.S. alone, covering downtime, lost wages, and customer defections.

Targeted spear-phishing attacks continue to be one of the most common ways to inject malware into a victim’s network and systems. REvil, Emotet, Locky, Ryuk, Conti, and HAFNIUM are just a few examples of the most prolific and dangerous ransomware types in the news. Hundreds, if not thousands, of variants now exist on the criminal underground thanks to Ransomware-as-a-Service (RaaS). RaaS is skyrocketing because it’s lucrative for cyber criminals and doesn’t require advanced skills, according to Forrester Research. Newer ransomware campaigns can include crippling extortion demands that threaten to publicly release sensitive information such as client lawsuit data or patient healthcare procedure files if ransoms go unpaid.

Adversaries are increasingly targeting small-to-medium-sized businesses (SMBs) that often do not have the staff or skills to defend themselves. Hackers know that many smaller firms might not survive a ransomware attack and therefore might feel more pressure to avoid the downtime by paying a ransom. SMBs without robust cybersecurity staff and expertise are increasingly teaming up with IT Service Providers for holistic cybersecurity coverage. Continuous monitoring, advanced threat detection, and integration with existing security tools and platforms can improve cybersecurity resilience – ensuring you’re prepared to fight ransomware.

How SOC-as-a-Service Detects Ransomware

Advanced threats require more advanced technology, greater talent, and more diligent incident management than in years past. Instead of developing a Security Operations Center (SOC) on your own with finite time and funds, SOC-as-a-Service (SOCaaS) enables you to get started quickly with minimal investment. With SOCaaS, you receive the SOC “function” as a service. Not just the software, but also the people in the form of dedicated cybersecurity experts, the proven processes, and the SIEM platform needed to perform the network and endpoint threat monitoring, prevention, detection, and response for your organization.

Attackers are evolving their craft and so should you. SOCaaS enables IT teams to effectively address the evolving threat of ransomware with these best practices:

Key Takeaways

No organization or government entity is immune from ransomware. It is crucial for SMBs and service providers to minimize the risk and cost of advanced malware and ransomware. With SOCaaS, you can focus your IT and cybersecurity staff on running day-to-day security operations, knowing that the likelihood of advanced attacks is minimized.

A Security Operations Center (SOC) is the foundation for comprehensive cybersecurity monitoring. SOCaaS provides many benefits to IT service providers, such as optimizing existing staff and capabilities, and expanding offerings in a scalable way without the risk of capital investment and hiring hard-to-find security experts. With its 24/7 SOC, Netsurion’s Managed Threat Protection offers advanced threat protection such as ransomware mitigation and helps your cybersecurity posture with simplicity… all with less risk and financial investment.

Big Data or Smart Questions for Effective Threat Hunting

Advances in data analytics and increased connectivity have merged to create a powerful platform for change. Today, people, objects, and connections are producing data at unprecedented rates.?According to DOMO, 90% of all data today was created in the last two years with a whopping 2.5 quintillion bytes of data being produced per day. With more Internet of Things (IoT) devices being produced, new social media outlets created, and the increasing number of people turning to search engines for information, the numbers will continue to grow.

So, what do we do with this overwhelming amount of data? Big data may be analyzed to reveal patterns, associations, and trends. Big data is the engine of data analytics growth and in most big data circles is defined by the Four Vs below.

  1. Volume: massive and passively generated
  2. Variety: originating from both individuals and machines at multiple points in the data value chain
  3. Velocity: generally operating in real time
  4. Veracity: referring to the uncertainty due to bias, noise or abnormality in data

Smart Questions

In a reasonably sized network, log data can be big data, but how do you extract value or intelligence from it? That has more to do with analytic capability and the ability to ask smart questions.

big data blog1

Known Data Known Question, the lower left quadrant, is for optimizing data standardized processes and procedures. The data sources are known, leaving the only question of timeliness and data quality.

The Known Data Unknown Question, the lower right quadrant, is best suited for domain experts such as our EventTracker Enterprise SOC team to discover questions they didn’t know to ask. It’s part of the “threat hunting” model. You go into the known jungle but cannot say what you will find. Once you stumble upon an anomaly, you move up/down and sideways to outline the contours and study the adjacent data till the entire kill-chain is revealed.

The Known Question Unknown Data, the upper left quadrant, is about pre-defined queries and reports that have been learned from past experiences or at other installations. They produce questions that are worth asking and in search of data to be asked against. A value-add of a co-managed SIEM is community intelligence. Once the community is aware of a certain pattern of attacks at one installation and uncover it, the lessons are rapidly applied to others to determine if similar attacks have or are occurring there.

The Unknown Data Unknown Question, the upper right quadrant, is the domain of machine learning or explorative or predictive computing. EventTracker uses the same Elasticsearch engine as a data store. Work is underway to leverage this investment to automatically model the behavior of your data – in real time to identify issues faster, streamline root cause analysis, and reduce false positives.

As the saying goes, it’s not what you have but what you do with it, that counts. Our EventTracker Enterprise Co-managed security service extracts actionable intelligence from big data for more effective security monitoring, threat detection, and incident response. Unlike other solution, you don’t just get technology, but outcome!

AI-powered Ransomware: AI is Now a Critical Piece of Today' Security Puzzle

As ransomware groups enhance their capabilities with generative AI and sophisticated automation, security leaders need to extend their detection and response capabilities more than ever. 

(more…)

True Cost of Data Breaches

The Cisco 2017 Annual Cybersecurity Report provides insights based on threat intelligence gathered by Cisco's security experts, combined with input from nearly 3,000 Chief Security Officers (CSOs), and other security operations leaders from businesses in 13 countries. 
 
Here are some takeaways:

What can/should you do about Data Breaches?

  1. Improve threat defense technologies and processes after attacks by separating IT and security functions 
  2. Increase security awareness training for employees 
  3. Implement risk mitigation techniques

Think Like a Hacker with MITRE ATT&CK

The threat landscape continues to accelerate, with sophisticated attacks becoming more commonplace as ransomware-as-a-service accelerates and legacy security tools fail to keep up. Financially motivated cyber criminals are explicitly targeting small and medium-sized businesses to steal sensitive data. As defenders, we may be asking ourselves questions such as:

Security analytics such as that from MITRE ATT&CK® enables organizations to apply data to improve your defensive posture and use this threat intelligence to prioritize security strategies and decisions. Better understand your adversaries and further bolster your strengths while identifying weaknesses and mitigate them.

MITRE ATT&CK Overview

The MITRE Company is a not-for-profit organization whose ATT&CK knowledge base covers over 90 threat actors and almost 300 of their distinctive threat techniques. ATT&CK (Adversarial Tactics, Techniques & Common Knowledge) is a cybersecurity framework that provides organizations with more effective defense, detection, and remediation. Continuously updated, ATT&CK is a useful capability for both public and private sector organizations.

Enhance Your Existing Operations

It is useful to note that ATT&CK does not replace existing frameworks that you may be familiar with or use, such as NIST’s Cyber Security Framework (CSF). It augments data intelligence and ensures defense-in-depth capabilities as organizations enhance their security maturity and adopt proven best practices. You can start simple with ATT&CK adoption and don’t have to embrace all the components and capabilities to benefit from the threat repository.

The Value of MITRE ATT&CK

The ATT&CK framework assists organizations of all sizes to better understand the evolving threat landscape. Your valued customers trust you with their data and reputation. Adopting ATT&CK provides several critical benefits as you continually enhance your security portfolio:

Getting Started with ATT&CK

Understanding and adopting ATT&CK on your own can be complex and time consuming; you may not even know where to begin and how to best harness the data. Netsurion proactively assists partners and end customers with risk mitigation and threat response by building in ATT&CK as a free capability in our threat protection platform, EventTracker. With its native MITRE ATT&CK capability, EventTracker makes it easy to benefit from ATT&CK and investigate what is determined to be a true threat.

Keeping pace with financially-motivated hackers is crucial. Advanced threats require advanced tools. Integrated capabilities like ATT&CK help ensure that businesses are proactive in using real-world tactics in the battle against cyber threats.

Learn more about MITRE ATT&CK’s 

PCI 3.0 – A Wake Up Call for SAQ C Merchants

Most merchants who have been validating their PCI compliance for a few years now probably know which SAQ type applies to them.

In PCI 2.0, it has been fairly simple. And now we are facing PCI 3.0. My, how things have changed.

There are several new SAQ types, and a major change has occurred with one of the old standards that we all came to know. SAQ C looks nothing like its previous incarnations.

Merchants should be prepared to increase their security measures to comply with the PCI 3.0 standard.

Let’s start with the most basic change in SAQ C. Which type of merchants should now use SAQ C to validate their compliance?

It used to be any merchant who processes over the Internet, did not store credit cards, and whose point of sale environment was isolated from other payment networks. The 2 most common environments to which this applied were IP based stand alone terminals, and Integrated POS systems that did not store credit cards.

With the advent of PCI 3.0, a new SAQ was developed, SAQ B-IP. Now, IP based terminals have their own standard, which is extremely similar to the 2.0 version of SAQ C. This means that integrated POS systems that do not store credit cards are alone in their usage of SAQ C, and that would be the end of the story if SAQ C had not been so radically altered.

Many merchants invested in various security products so that they would not store credit cards in their POS systems and thus eliminate several of the PCI requirements that they would otherwise face. Such technologies may include end to end encryption systems or tokenization processes that render stored data useless to cyber thieves if it is compromised.

In previous version of PCI, SAQ C merchants would not need to have a logging program (requirement 10 was omitted completely); nor would they need to implement file integrity monitoring; and lastly, a penetration test was not a requirement.

In PCI 3.0 all three of these requirements are in SAC C, and merchants who previously managed to comply with PCI will need to implement many new security measures before they will be compliant again.

While SAQ C is still less onerous than SAQ D, the gap between them has been closed significantly. If you were to poll merchants about which elements in PCI consistently give them the most grief, they would probably name logging, file integrity monitoring, and a penetration test.

Previously, SAQ C merchants were not burdened with these requirements, but those days have passed. It is our concern that merchants have not been properly educated about these changes, and it will be a rude awakening when they discover that they are required to implement them.

If you are a merchant and want to review SAQ C for yourself, you can find it on the PCI Security Standards Council’s website at: https://www.pcisecuritystandards.org/documents/SAQ_C_v3.pdf

Securing Zoom Conferencing to Protect Data

Business uncertainty has led to widespread adoption of working from home. Since most meaningful tasks in any organization require teamwork, this remote work approach has naturally led to a dramatic rise in the use of collaboration tools such as Zoom Conferencing

In March, the daily usage of Zoom increased over 5 times. The platform makes it easy for corporate users and their clients to hop on meetings whenever needed. It is also popular with educators and students seeking to move the curriculum online. Where the good guys go, the bad guys soon follow and so this sudden increase in the platform’s popularity has attracted cybercriminals who seek to hijack meetings and exploit security vulnerabilities.

Zoom has acknowledged the nature and extent of its security weaknesses. Zoom CEO and founder Eric S. Yuan apologized for the confusion related to this issue, saying "We recognize that we have fallen short of the community's – and our own – privacy and security expectations. For that, I am deeply sorry," Yuan explained that Zoom “was built primarily for enterprise customers – large institutions with full IT support.” He added that Zoom would be "enacting a feature freeze, effectively immediately, and shifting all our engineering resources to focus on our biggest trust, safety, and privacy issues."

Security challenges with Zoom Video Conferencing include:

Security best practices for Zoom Conferencing include:

Stay safe, be well. Learn more about how Lumifi protects organizations against work-from-home cybersecurity risks.

Hungry...Hungry...HIPAA

I have fond memories of playing a board game called Hungry Hungry Hippos in my younger days.  Children would drop small white marbles onto a game board while furiously slamming their fists on a small, plastic, hippo-shaped lever. The hippos’ mouths would chomp at rapid speeds in attempts to capture as many marbles as humanly possible. 

Today’s medical practices mirror the chaos of the game. Each day seems more hectic than the previous with visiting patients, emergency calls, demanding doctor schedules, medical billing and coordinating with insurance companies…all while trying to maintain a timely waiting room experience.

And each aspect of this chaos creates real-life white marbles—little snippets of personal data that need to be captured and secured…credit card details here, personal medical histories there; social security numbers and health insurance policy details collected a moment later…

Despite all of the confidential data medical organizations house compliance, and security are never top of mind in the field.

The harsh reality is that these offices and hospitals just aren’t ready to secure those white marbles and win the game against their sneaky opponents—the hackers. Cybercriminals are more than ready to swoop in, click the lever a few times and collect all of the marbles when the organizations’ backs are turned from the game board.

I recently had the opportunity to attend a social event with some of the top surgeons in my local community. My wife works in the medical device field and scheduled a networking event with her most established clients, and of course, I volunteered (was forced) to attend.

I jumped at the chance to rub elbows with top surgical talent, but I also had another agenda…I wanted to take this one-on-one time to pick their brains on HIPAA, compliance, and security and see how’d they’d fare in the fight against hackers.

Now, face time with a neurosurgeon is slim so I had to pitch my opening line to gain their attention and keep them engaged.

My brilliant opening line:

“How do you protect your patients’ personal data?”

It’s a simple question at the core— but the responses were astonishing:

“We have antivirus.”

“We take a HIPAA training course every year.”

“We don’t store personal data.”

“I think we have an IT guy for this.”

These answers don’t even scratch the surface of everything I heard, but it was all equally surprising and telling of the importance of protecting patient data—and how little medical professionals really know about today’s threat landscape.

When I asked if they were worried about a breach of said data, the majority replied:

“We are just a small office. We’re not a target.”

I was talking with an orthopedic surgeon that has around 60 employees and roughly 40-50 patients that pass through his office daily. Even he had the “Breaches happen, but they won’t happen to us” mindset.

Sure it’s usually the healthcare giants like Anthem, Excellus or Premera that make the breach headlines. But just because hackers can mine larger troves of data from the big guys doesn’t mean smaller practices are in the clear.

Cybercriminals know these offices are often barely secured (or left completely unprotected)...and that they still house sensitive medical, financial and personally identifiable information.

In fact, only 33 percent of healthcare organizations agree they have sufficient resources to prevent or quickly detect a data breach. This means that hackers don’t have to try very hard to compromise almost 2/3 of medical practices in order to pocket their marbles.

So, what can you do to protect your patients’ data and comply with regulations such as PCI and HIPAA?

Here are the most essential tips to help you stay ahead in the security game:

A good security plan can be overwhelming at first, but with the right knowledge and expertise, it can be simplified and managed to reduce the exposure of your practice or hospital and limit the amount of risk.

No matter how small your organization is, you should still stand up against the hackers. Stay hungrier. Don’t let them come in and win the whole game.

No security plan is foolproof, but ignoring HIPAA, compliance standards, and security posture is foolish.

MSSP /SaaS /Cloud Computing – Confused? I know I am

There is a lot of discussion around Security MSSPs, SaaS (Security as a Service) and Cloud Computing these days. I always felt I had a pretty good handle on MSSPs and SaaS. The way I look at it, you tend to outsource the entire task to Security MSSPs. If you outsource your firewall security, for instance, you generally have no one on staff that worries about firewall logs and you count on your MSSP partner to keep you secure – at least with regards to the firewall. The MSSP collects, stores and reviews the logs. With SaaS, using the same firewall example above, you outsource the delivery of the capability — the mechanics of the collection and storage tasks and the software and hardware that enable it, but you still have IT personnel on staff that are responsible for the firewall security. These guys review the logs, run the reports etc. This general definition is the same for any security task, whether it is email security, firewall or SIEM.

OK, so far, so good. This is all pretty simple.

Then you add Cloud Computing and everything gets a little, well, cloudy. People start to interchange concepts freely, and in fact when you talk to somebody about cloud computing and what it means to them, it is often completely different than what you thought cloud computing to be. I always try to ask – Do you mean security IN the cloud, i.e. using an external provider to manage some part of the collection, storage and analysis of your security data (If so go to SaaS or MSSP)? Or do you mean security OF the cloud — the collection/management of security information from corporate applications that are delivered via SaaS (Software as a Service, think Salesforce)?

The latter case has really nothing to do with either Security SaaS or MSSP since you could be collecting the data from the applications such as Salesforce into a security solution you own and host. The problem is an entirely different one. Think about how to collect and correlate data from applications you have no control over, or, how these outsourced applications affect your compliance requirements. Most often compliance regulations require you to review access to certain types of critical data. How do you do that when the assets are not under your control? Do you simply trust that the service provider is doing it right? And what will your auditor do when they show up to do an audit? How do you guarantee chain of custody of the log data when you have no control over how, when, and where it was created? Quickly a whole lot of questions suddenly pop up that there appear to be no easy answers.

So here are a few observations:

The combination of the above is very likely going to become a bigger and bigger issue, and if not addressed will prevent the adoption of cloud computing.

The True Cost of Setting Up and Operating a 24x7 Security Operations Center (SOC)

Understanding the costs behind setting up and running a Security Operations Center is important to making informed decisions about how much protection you can afford and how you will go about acquiring it. The simple answer to the question “How much does a SOC cost?” is that it depends on many variables. In this article we will break down those variables and provide typical costs that you can use to inform your decision making about how to best protect your organization.

What is a SOC?

A Security Operations Center, or SOC (pronounced “sock”), is a centralized function that incorporates the people, processes, and technology required to monitor an organization’s IT infrastructure, address IT security issues as they occur, and manage and enhance the organization’s security posture.

Through the combination of people, processes, and technology, a modern SOC provides these IT security functions:

What does a SOC cost?

To answer that question, we need to level set with some assumptions. The costs we provide below assume 24x7 operations, which requires at least 12 dedicated employees plus coverage for vacations, sick time and training. The labor cost component is based on U.S. East Coast labor rates, including wages and benefits. And the tooling or technology cost component assumes a network supporting 5,000 people. The estimates include a one-time implementation cost, but do not include overhead costs for a physical location.

Set up of a SOC includes compiling tactical runbooks, which define your team’s response to specific incidents like ransomware attacks or data breaches, and your overarching incident response playbook. It also includes selecting, purchasing and installing security software and the hardware it will run on, plus calibrating this technology for your specific operations.

Setup and operational costs depend on the level of SOC operations you are trying to achieve. Here are cost breakdowns for three levels of SOC operations.

Basic

A basic SOC that provides mostly detection with limited investigation and no proactive threat hunting will cost $1.5M per year, comprised of $300K for technology and $1.2M for labor for 12 professionals, including wages and benefits. It will take three months to set up and start operations, and six to nine to achieve steady-state operations.

Intermediate

An intermediate SOC has really good detection because tooling includes a Security Information and Event Management (SIEM) system and User and Entity Behavior Analysis (UEBA), as well as network forensics. It is staffed by analysts working at multiple levels (L1, L2, L3) who attempt to be proactive, but with limited results. This intermediate SOC will cost $2.5M per year, comprised of $400K for technology and $2.1M labor. Labor costs include the basic 12-person staffing plus additional L2 analysts for handling escalations plus partial FTEs for product support and IT support. Anticipate that it will take six months to set up operations and about a year to achieve maturity.

Advanced

An advanced SOC requires a heavy investment in tooling and threat intelligence feeds. The additional tooling includes investment in advanced automation, such as using AI to parse massive volumes of data and eliminate false positives, and workflow automation to handle opening tickets for detected anomalies and routing them to the correct analyst for investigation. Automation frees up the analysts to be involved in threat hunting, which involves proactively searching networks, endpoints and security data for indicators of cyber threats, including signs of malicious, risky, or suspicious behavior. Operators of advanced SOCs also perform periodic “red team” exercises to uncover gaps or lapses in security posture. This level of SOC will cost $5M per year, comprised of $1.1M for technology and $3.9M for labor. Additional staffing is included for an L2 escalation team, a threat hunting team, multiple FTEs for product and IT support, and additional intelligence feeds to support threat hunting. Assume 12 months to set up and start operations, and 18 to 24 months to achieve maturity.

Does the location of a SOC matter?

Typically, the physical location of the SOC does not matter. After all, the network assets protected by the SOC are typically distributed between on-premises, home, public cloud, and Software-as-a-Service (SaaS). Also “distributed” are the hard-to-come-by skilled people who work in IT security and prefer to work from home.

One caveat is that security data from your dispersed assets does need to be centralized somewhere, whether that is in an on-premises data center or in the cloud. Depending on the nature of your business or your organization’s location, you may be affected by data residency requirements that specify where that data is stored. But wherever that data is located, remote access between your SOC technology, your security data, and SOC personnel is reliable, economical and easily done.

The impact of skills scarcity

Why is remote access important? It can help overcome one of the most significant barriers to building and running your own SOC: people. Recent research says that the number of unfilled cybersecurity jobs worldwide grew 350% between 2013 and 2021, from 1M to 2.5M. That translates into high competition for scarce skills, which impacts both staffing and retention. You’ll need to hire analysts, people who can install, configure and manage your security technology stack, and people who can manage SOC operations. Plus, with technology’s rapid evolution and the ever-changing threat landscape, you’ll have to invest in continuous training and technology refresh.

However, there is an alternative to spending $5M a year for an advanced SOC. You can co-source and get the around-the-clock capabilities of an advanced SOC for a fraction of the cost, in a fraction of the time. Netsurion’s Managed Open XDR and SOC-as-a-Service (SOCaaS) offerings provides an integrated approach that relieves the people challenges of an in-house SOC operation and optimizes your cybersecurity investments. 

Cost of Setting Up and Operating a SOC

Level Technology Labor Cost Total
Basic $300,000 $1,200,000 $1,500,000
Intermediate $400,000 $2,100,000 $2,500,000
Advanced $1,100,000 $3,900,000 $5,000,000

MDR Cybersecurity: Strengthening Defenses Against Modern Threats

In our interconnected world, the specter of cyber attacks casts a formidable shadow. With each technological advancement, cybercriminals adapt their tactics and strategies, posing new challenges for organizations. To effectively counter these ever-evolving threats, robust cybersecurity measures are essential. Among these measures, Managed Detection and Response (MDR) has emerged as a pivotal component in fortifying defenses against modern cyber threats. In this blog, we will delve into the pivotal role of MDR in cybersecurity and its profound impact on strengthening an organization's security posture. 

Common Cybersecurity Challenges and the Need for MDR 

Cybersecurity challenges have become increasingly complex, with attackers employing sophisticated techniques such as ransomware, zero-day exploits, and advanced persistent threats (APTs). Traditional security measures often fall short in detecting and responding to these threats effectively. This is where MDR comes into play. MDR combines advanced threat detection technologies with skilled analysts who actively monitor and respond to security incidents, helping organizations stay one step ahead of cybercriminals. 

Understanding the Threat Landscape: Emerging Risks and Trends 

The threat landscape is constantly evolving, making it crucial for organizations to keep up with the latest risks and trends. From nation-state attacks to supply chain vulnerabilities, new threats continue to emerge. This section will delve into some of the emerging risks and trends in the cyber threat landscape, including the rise of insider threats, the increasing sophistication of phishing attacks, and the impact of the Internet of Things (IoT) on cybersecurity. 

How MDR Enhances Cybersecurity Defense 

MDR enhances cybersecurity defense by providing continuous monitoring, threat hunting, and incident response capabilities. Unlike traditional cybersecurity solutions that rely primarily on preventive measures, MDR takes a proactive approach. It leverages advanced technologies such as machine learning, behavioral analytics, and threat intelligence to detect and respond to threats in real-time. This section will highlight the key components of MDR and how they work together to bolster an organization's security posture. 

Collaborative Approach: MDR and Security Operations Centers (SOCs) 

Effective cybersecurity requires collaboration between different teams within an organization. MDR teams work closely with Security Operations Centers (SOCs) to ensure a holistic approach to cybersecurity. This section will explore the collaborative relationship between MDR and SOCs, emphasizing the importance of information sharing, incident response coordination, and threat intelligence exchange. It will also discuss the benefits of integrating MDR capabilities into existing SOC infrastructure. 

Case Studies: MDR Success Stories in Countering Cyber Attacks 

To illustrate the effectiveness of MDR, this section will present real-world case studies showcasing successful outcomes achieved through MDR implementation. These case studies will highlight different industries and the specific threats they faced, demonstrating how MDR detected, analyzed, and neutralized cyber attacks. By examining these success stories, readers will gain a deeper understanding of MDR's practical applications and its impact on cybersecurity. 

The Future of MDR in Cybersecurity 

MDR is a vital component in fortifying an organization's defenses against contemporary cyber threats. By combining advanced technologies, skilled analysts, and collaborative efforts with SOCs, MDR offers a proactive and effective approach to cybersecurity. As the threat landscape evolves, MDR must adapt accordingly. This section explores the future of MDR, including the integration of artificial intelligence and machine learning, the impact of regulatory changes, and the importance of ongoing training in the MDR field. 

As organizations strive to protect their sensitive data and digital assets, MDR remains an indispensable part of their cybersecurity strategy. By leveraging advanced technologies and human expertise, MDR enables proactive threat detection and response, mitigating potential damages. In the dynamic realm of cybersecurity, MDR serves as a steadfast beacon of defense, providing organizations with the assurance they need to navigate the digital landscape securely. 

Three critical advantages of EventTracker Essentials

By now it’s accepted that SIEM is a foundational technology for both securing a network from threats as well as demonstrating regulatory compliance. This definition from Gartner says: Security information and event management (SIEM) technology supports threat detection and security incident response through the real-time collection and historical analysis of security events from a wide variety of event and contextual data sources. It also supports compliance reporting and incident investigation through analysis of historical data from these sources. The core capabilities of SIEM technology are a broad scope of event collection and the ability to correlate and analyze events across disparate sources.”

However, SIEM is not fit-and-forget technology, nor is it technically simple to implement and operate. In order to bring the benefits of SIEM technology to the small network, with a decade of experience behind us, we developed EventTracker Essentials to address the problems beyond mere technology. Here’s three specific advantages:

1) No hardware to procure or maintain

EventTracker Essentials is hosted in our Tier-1 data center freeing you from having to procure, maintain and upgrade server class hardware. Disk in particular is a challenge. Log data grows exponentially and while consumer disk cost is relatively inexpensive, the same cannot be said for business class disk cost.

2) More data? Fixed cost!

The hallmark of a successful SIEM implementation is growing volumes of data. Many SIEM solutions are priced based on log volume indexed or received (the so-called events per second). More data inevitably means more unforeseen cost. With EventTracker Essentials, you get simple t-shirt sizing (Small, Medium, Large) and you can leave both the cost and implementation of data storage to us.

3) Skill shortage

There is an African proverb that says, “It takes a village to raise a child.” In fact, it takes various skills to RUN and WATCH a SIEM solution. This specific problem is why many SIEM implementations become shelfware. Writing and tuning detection rules, performing incident investigations, and understanding how to search means that analysts need both security knowledge and specialized SIEM tool expertise. The IT Security space has zero unemployment, high staff acquisition costs and ongoing training costs. Buying a SIEM solution is easy. There are many providers and an end-of-quarter discount is always around the corner. Getting value from it? Not so much. With EventTracker Essentials, we start with a proper implementation (after all as Aristotle noted, well begun is half done) and then our 24/7 Security Operations Center escalates P1 events to your team.

EventTracker Essentials delivers visibility and detection across your enterprise. Not just technology…results!

The Ten Steps Post Data Breach

Have you ever thought about what would happen if (or more likely, when) your business suffers a data breach? What are the the ten steps post data breach? 

Do you have a plan of action? 

Nearly 60% of businesses have experienced a breach in the last two years.

But we do want you to know that every single business needs a plan in case the worst ever occurs. Our PCI and data security experts will make sure you are prepared to take action accordingly should a data breach occur.

To learn more about the ten steps post data breach, schedule a free consultation today.

1 Ponemon Institute, 2014

Why are Workstation Security Logs so Important?

No one needs to be convinced that monitoring Domain Controller security logs is important; member servers are equally as important: most people understand that member servers are where “our data” is located. But I often face an uphill battle helping people understand why workstation security logs are so critical.

Frequently I hear IT administrators tell me they have policies that forbid the of storing confidential information locally. But the truth is, workstations and laptops always have sensitive information on them – there’s no way to prevent it. Besides applications like Outlook, Offline Files and SharePoint workspace that cache server information locally, there’s also the page file, which can contain content from any document or other information at any time.

But even if there were no confidential information on workstations, their security logs are still very important to an enterprise audit trail, forensics and for detecting advanced persistent threats. There’s a wealth of audit trail information logged by workstations that can’t be found anywhere else and consequently a host of questions that can only be answered by workstation logs.

First of all, if you care about when a user logged off, this information can only be found in the workstation’s security log. Domain controllers audit the initial authentication during logon to a workstation but essentially forget about the user thereafter. Logoff times cannot be determined based on shared folder connections because Windows does not keep network logons open to file servers between file accesses. So, during logout from Windows, the only computer on the network that logs this is the workstation.

And what about logon failures? Yes, domain controllers do log authentication failures but the events logged are tied to Kerberos and the error codes are based on RFC 1510’s failure codes. Kerberos failure codes are not as granular and do not map directly to all the reasons a logon can fail in Windows. Therefore some authentication failure codes provided in event IDs 4768 and 4771 can mean any one of several possible reasons. For instance, failure code 0×12 which Kerberos defines as “Clients credentials have been revoked” can mean that the logon failed due to the account being disabled, locked out or outside of authorized logon hours.

With today’s focus by bad guys on the endpoint it’s also important to know if someone is trying to break into a workstation. If the attacker is breaking into the workstation with a domain account, the evidence of this can be found in the domain controller security logs by looking for the same to events mentioned above. However workstations also have local accounts and these are big targets for attackers since local accounts are often poorly secured and tend to fly under the radar in terms of security monitoring. When you attempt to logon to a workstation with a local account, this activity is not logged on the domain controller. Since the authentication is being handled locally the event is also logged locally in the form of event ID 4776. The event description can be confusing; it reads: “The domain controller failed to validate the credentials for an account.” What it should actually say is “the system” instead of “domain controller” because this event is logged on all types of computers.

Files that a user accesses on file servers with file system auditing on those servers can be tracked, but an audit trail of what programs were being executed by the user is logged on workstation security logs. During forensic investigations I’ve found that knowing what programs a user ran and for how long can be crucial to documenting what actually occurred. Furthermore, many of the advanced persistent threat (APT) attacks being waged depend on malicious executables run on end user workstations. You can’t afford not to have a record of what’s running on your endpoints. Unfortunately, the Process Tracking (aka Detailed Tracking) category only logs programs run on the local computer therefore no information about end user desktop program usage is available in domain controller or member server security logs. The only process events logged on servers are the actual server programs that execute there.

There’s a lot of critical audit trail information only available if auditing is enabled on the workstations. Of course enabling auditing on workstations is one thing while collecting logs from thousands of additional computers is another. There are some very important workstation security events which Windows auditing does not record. For instance, Windows does not audit when devices or removable storage like flash drives are connected or disconnected, and it does not record what files are transferred to or from the removable storage, nor does Windows audit the installation of software.

Workstations are really just as important as any other component of a secure network. If an attacker can compromise the workstation of a user with access to critical information the attacker can impersonate that user and access any information or applications that user has access to on the network. Even workstations of users without access to sensitive resources are important because attackers, especially in APT, scenarios are happy to start with any endpoint as beach head and attack other systems from there. Moreover workstations are arguably the most vulnerable components of your network since they process so much content from the Internet connected with web browsing and email, because they come into contact with potentially infected files on removable storage and because they connect to other insecure networks like Wi-Fi hotspots.

In a webinar I will present later this year in cooperation with Prism Microsystems I’ll delve more deeply into these issues and how to address them. It’s important that we educate decision makers about why endpoint security and audit logs from endpoints are so important. We have to get beyond the mainframe inspired mindset that security only matters on the centralized systems where critical data resides. Be sure to register for this event and invite your manager.

Is a Business Really Protected or is it Home Alone: Prevent, Detect, and Respond for True Security

Protecting a business’ IT infrastructure and data can be difficult with the abundance of threats out there, the array of new data privacy regulations, and many cybersecurity solutions to choose from. Even today, far too many businesses still claim protection with just anti-virus and firewall, when these measures aren’t enough to keep up with advanced threats.

Relying on only these prevention tools is short-sighted, especially as technology and managed services have evolved to offer a full spectrum of protection. Unless the business owner is an IT whiz and has time to devote to cybersecurity daily, the task of determining what they truly need to be protected can get overwhelming quickly.

To help connect the dots, this article likens business protection to home security in an analogy that aims to simplify what every business, large and small, needs to have in place to be truly protected.

Now, unless you are Kevin McCallister, the character from ‘Home Alone’ who can stay ahead of the thieves’ every move while thwarting attacks with some wicked booby traps, there is no way you are going to avoid the inevitable. Especially with “kick-the-door-in” anti-virus and firewalls as your “protection”.

Anti-virus and firewalls are “…what the French call les incompetents.”

There are three ways to protect a home or business, and without all three in play, you are not truly protected. These three critical areas are PREVENT, DETECT, and RESPOND.

In ‘Home Alone’, the thief character, disguised as a trusted police officer, enters easily to pull information directly from the unsuspecting home owners. His shtick is: “There’s always a lot of burglaries around the holidays…we just want to be sure you are taking the proper precautions.” Mr. McCallister’s reply?

“Oh yeah, well we have automatic timers for our lights, locks for our doors, that’s about as well as anybody can do these days, right?”

When you think about home security, it is easy to relate to the prevent, detect, and respond methods in action.

home alone blog image11

In this home security scenario those door locks and automatic lights = anti-virus and firewall for a business. They may be under the prevent category, but what about detect and respond? After the doors are kicked in, what’s stopping the thief from robbing you blind (ransomware for businesses, stealing data, causing you to lose business via network downtime), including priceless heirlooms that can never be replaced (customer confidence and brand reputation)? If you value your home and its contents, you can clearly see that door locks and motion sensing exterior lights don’t do much to put you at ease.

Protect your business like you would your own home: “This is my house, I have to defend it.”

Today, people go beyond the typical automatic lights and door locks to a fully integrated security system that can prevent attacks, but also detect and respond to even more than theft or unwelcome entry.

home alone blog image21

In all threat cases in a home with full security, responders are called to contain the damage, investigate, and offer remediation.

The beauty of this full-spectrum security is that you don’t need to be home 24/7 to catch it yourself. We recognize the risks we take without this full security in our homes.

This is the same for businesses, only on a much grander scale, with threats coming from a cyber angle and far too many to hunt and catch for a small IT team wearing multiple hats that lack a dedicated security analyst. It’s difficult for SMBs to hire a team of highly skilled security analysts with the bandwidth and expertise to perform continuous monitoring. It’s even harder to retain them in the face of stiff competition for these scarce resources.

To top it off, small-to-medium size businesses (SMBs) are just as vulnerable, or more so, than the large organizations. On average, each user at an SMB receives nine malicious emails per month. (Symantec ISTR) and 58% of malware attack victims are small businesses (Verizon 2018 DBIR).

Due to tight budgets and a cybersecurity skill shortage, SMBs are partnering with Security Information and Event Management (SIEM) vendors to tap expertise without ceding control. Managed Service Providers (MSPs) are in an ideal position to save the day for SMBs that could use the expert guidance and pricing that meets their unique needs. SIEM is a reality for SMBs thanks to Netsurion’s Managed SIEM for MSPs – EventTracker Essentials. According to Gartner, co-managed security is on the rise and expected to grow five-fold by 2020.

Perfect prevention is not practical. EventTracker Essentials focuses on detection and response to protect your business from advanced persistent threats that regularly circumvent prevention mechanisms like firewall and anti-virus.

home alone blog image31

Cyber attacks don't discriminate by size or valuation, and small businesses are growing as the favored target of attacks. The cost of doing nothing can be greater than the cost of protecting your business.

Here are some important security questions to consider:

  1. Are you assuming your perimeter defense is perfect? What if the attack gets past your firewall and anti-virus?
  2. Are you confident that every endpoint is always patched perfectly?
  3. Are you confident that every user on your network is safe from phishing scams?
  4. If an employee’s network login credentials are compromised, how would you know?
  5. If you have a compromised O365 email account, how would you know?
  6. If an IT Admin abused their privileges, how would you know?
  7. How valuable is your sensitive company data? What risk do you face if it is lost or held ransom?
  8. What was the last security incident in your network? How was it found? Fixed? How long had it been in the network? What were lessons learned?
  9. When was your last audit? How easy was it to demonstrate compliance?

As Kevin said, do “You guys give up, or are you thirsty for more?”

Whipping paint cans at thieves or concocting an elaborate “fun house” to thwart the enemy is not feasible at home or with business. Go beyond simple prevention methods of the past with a true protection model that includes detect and respond capabilities.

Contact our sales team or partner channel organization to learn more. Also, download the “Zero to SOC” whitepaper to learn the real requirements for a security operations center (SOC) to monitor, detect, investigate, and respond to cyber threats 24/7, and an affordable way to get that protection.

Managed Detection Response Solutions: Enhancing Cybersecurity Defense

Today’s rapidly evolving digital landscape, organizations face an ever-growing threat of cyber-attacks. The traditional reactive approach to cybersecurity is no longer sufficient to protect sensitive data and critical systems. Managed Detection Response (MDR) solutions have emerged as a proactive and effective approach to enhance cybersecurity defense. In this blog, we will explore the core components, benefits, key features, and best practices for evaluating MDR providers, along with real-world examples of successful MDR implementations. By the end, you will have a comprehensive understanding of MDR solutions and be equipped to make informed decisions when choosing an MDR provider. 

Understanding the Core Components of MDR Solutions 

Benefits of MDR Solutions for Organizations 

Implementing MDR solutions offers several benefits for organizations seeking to enhance their cybersecurity defense: 

Key Features and Capabilities of Effective MDR Solutions 

When evaluating MDR providers, it is essential to consider the following key features and capabilities: 

Evaluating MDR Providers: Considerations and Best Practices 

When evaluating MDR providers, consider the following best practices: 

Real-World Examples of Successful MDR Implementations 

Several organizations have successfully implemented MDR solutions to enhance their cybersecurity defense. One notable example is Company X, a global financial institution. By partnering with an MDR provider, Company X achieved real-time threat detection, reduced incident response times, and enhanced their overall security posture. As a result, they experienced a significant decrease in security incidents and improved compliance with industry regulations. 

Recommendations for Choosing MDR Solutions 

Managed Detection Response (MDR) solutions offer a proactive and effective approach to enhance cybersecurity defense. By leveraging advanced technologies, expert analysis, and real-time threat detection capabilities, MDR solutions enable organizations to stay ahead of cyber threats. When choosing an MDR provider, carefully consider their core components, benefits, key features, and incident response capabilities. Evaluate the provider's experience, technology stack, and integration with threat intelligence. Real-world examples of successful MDR implementations can provide valuable insights and guide your decision-making process. Implementing an MDR solution can significantly strengthen your organization's cybersecurity defense and mitigate the risks associated with modern cyber threats. 

Storm-0558 Unleashes Authentication Token Forgery

Threat Summary:

Storm-0558 is suspected to be a China-based, nation-state threat actor whose TTPs are closely aligned with espionage objectives. This threat actor managed to compromise an inactive MSA signing key which was then used to sign fabricated authentication tokens. Authentication tokens are short-lived credentials that are used to authenticate users to a service. They are typically generated by a server and then passed to the client. The client then presents the token to the server to prove that it is authorized to access such service. Storm-0558 acquired an inactive Microsoft account (MSA) consumer signing key, and then the key was used to sign MSA authentication tokens. The group was then able to use this key to forge authentication tokens for Azure AD enterprise and MSA consumer accounts. These forged tokens allowed Storm-0558 to access OWA and Outlook.com. Microsoft has since invalidated all MSA keys that were active prior to the incident.

Lumifi's Analysis:

We've concluded that the specific exploit utilized in this attack isn't reliably detectable due to the attack being performed by compromising an MSA key and signing a fabricated authentication token. However, this threat actor has been observed performing specific activities shortly after exploitation which are reliably detectable.

Lumifi Current Coverage:

Lumifi currently has a number of detections in our content library that would successfully detect this threat actor's exploitation attempts and attack chain. Our foreign login-based rules would detect this attack upon successful authentication of the threat actor. Additionally, we have developed and tailored a number of rules around suspicious O365 and email activity ranging from potential exfiltration detections to logins from a new IP.

Challenges with Threat Intelligence or why a Honeynet is a good idea

Shared threat intelligence is an attractive concept. The good guys share experiences about what the bad guys are doing thereby blunting attacks. This includes public-private partnerships like InfraGard, a partnership between the FBI and the private sector dedicated to sharing information and intelligence to prevent hostile acts against the U.S.

The analogy can be made to casinos that share information with each other about cheaters and their characteristics via the Gaming Board or the Griffin Book. If you share the intelligence then everybody but the cheater wins. So why not the same for cyber security?

For one thing, you are dealing with anonymous adversaries capable of rapid change, unlike the casino analogy where facial recognition can identify an individual even if their appearance is modified. Also, the behavior of the casino cheat tends to be similar (for example sit at the craps table or counting cards at blackjack as in Rain Man). In the cybersecurity world, all the defender has to go on is the type of attack (malware, phishing, ransomware), an IP range, and possibly a domain name. So the indicators of compromise (IOCs) that can be shared are file hashes, domain names, and sender email domains-all multiplying and morphing at digital speed. The IOCs are very hard to share globally at the scale and speed of the internet.

In addition, when the good guys share the IOCs, they do so in ways that are visible to bad guys as well (e.g., upload suspect files to Virus Total). This is leveraged by the bad guys to know the progress of the defenders and therefore adapt their attack.

So what now?

One solution is to implement local threat intelligence with a honeynet, a cyber-defense product that thwarts attempts by attackers to gain information about a private network. Comprised of multiple virtualized decoys strategically scattered throughout the network to lure bad actors, honeynets can provide intelligence about malicious activity against the network. This solution is effective in identify bad actors including insiders, by their behavior, in your neighborhood. This blog describes the how they differ from Threat Intelligence.

SIEM: Security, Incident AND Event MANAGEMENT, not Monitoring!

Unfortunately, IT is not perfect; nothing in our world can be. Compounding the inevitable failures and weaknesses in any system designed by fallible beings, are those with malicious or larcenous intent that search for exploitable system weaknesses. As a result, IT and the businesses, enterprises and users depending upon reliable operations are no strangers to disruptions, problems, even embarrassing, even ruinous releases of data and information.  The recent exposure of the passwords of hundreds of thousands of Yahoo! and Formspring users are only two of the most recent, public occurrences that remind us of the risks and weaknesses that remain in the systems of even the most sophisticated service providers.

The wise, or maybe more correctly, experienced solution or system designer recognizes the risk of attempts at unauthorized access to files and data. To frustrate such attacks and minimize their impact, they will design and apply various fail-safe strategies and tactical protective mechanisms as part of good design tactics. Issues of security are of prime concern and a barrier to use of many technologies (cloud in all its models represents a prime example) and implementation strategies, such as outsourcing services.

One of the reasons that solutions such as SIEM products exist is as a part of the operational response to the risks of failure in data and information protection. In the best implementations, they are used as part of a closed loop process. A basic process would include monitoring to detect suspect or anomalous behaviors which mark intrusion attempts and reveal suspect procedural patterns (e.g. repeated password failures). Upon identification and verification, they typically trigger an event alarm and report to a responsible party. The notified individual may accept and act on the notice. Alternatively, they may perform their own check to assure the alarm is valid. They will then determine what corrective action, if any, is needed and initiate the action. Some installations are set up to automatically trigger corrective action (such as isolating the system or port) in parallel with the notification. But, experience has shown that such process definition alone is not a guarantee of protection and risk reduction.

In fact, a review of a failed process that resulted in a major data leak at a service provider gives an indication of how the best designed system can fail. The company had in place a process which included all the proper activities, as well as a reasonable sequence of review and actions to take in response to an alert to an attempted intrusion or attack. Unfortunately, they had no process to oversee the process and assure that someone reviewed the notification of a suspicious event once it was sent. If the notification arrived out-of-hours, or if it was lost, there was no verification of receipt or provision to check to verify follow-up. The resulting debacle was all but inevitable.

Keep in mind when evaluating internal, as well as external data services that contractual guarantees, compliance audits, code testing and reviews have failed to be 100% effective to prevent data exposure, intrusion or leaks. There are no 100% fail-safe solutions; a workable solution should be viewed as one that reduces risk to an acceptable level.

An effective SIEM solution must include an on-going process of maintenance, review and validation testing to assure that it is working correctly, remains relevant and focused on the appropriate issues. Assumptions have to be documented, reviewed and tested to assure they match reality. Boundaries, trip-points and threshold limits need to be reviewed. This holds true even and especially for analyses designed to adjust automatically to circumstances to assure they do not ‘drift’ away from critical values.

SIEM solutions are available in a wide variety of service combinations.  The typical solution includes the functionality needed for event management, information management and network behavior analytics. This allows them to build a comprehensive view of what is happening based on a combination of real-time data and event log information.  Many additional options exist for those with more comprehensive concerns and management needs.  Additional frequently desired functionality includes risk analysis, vulnerability management, security controls, such as integration with identity and access management. Best practices in corporate governance have raised compliance monitoring and management capabilities, including the ability to assess and build compliance reports to be a critical extension.

Finally, any production process requires periodic maintenance and review to remain effective. Communication and reporting flows have to be verified to assure not only that the information and alert arrives, but that it is monitored and reviewed in a regular and timely manner. The temptation exists to assume that a SIEM solution would be complete based on functionality alone. It should now be clear that a successful system of data protection requires a combination of solution functionality, process and management that effectively reduces and maintains the risk of a breach to a level acceptable to the service and enterprise needs.

[1] http://www.bbc.co.uk/news/technology-18811300

The Evolution of Managed Detection Response: A Comprehensive History 

Introduction to Managed Detection Response (MDR): 

Managed Detection Response (MDR) has emerged as a crucial component in the field of cybersecurity, providing organizations with enhanced threat detection and response capabilities. In this blog, we will delve into the history of MDR, exploring its origins, advancements, and its current role in the modern cybersecurity landscape. 

Early days of MDR (Origins and Influences):

The concept of MDR can be traced back to the early 2000s when organizations started recognizing the limitations of traditional security measures. The rise of sophisticated cyber threats necessitated a more proactive approach to threat detection and incident response. Influenced by the principles of Managed Security Service Providers (MSSPs), MDR began to take shape as a comprehensive solution that combined technology, expertise, and proactive threat hunting. 

Advancements in Threat Detection and Response: 

As cyber threats continued to evolve, so did the techniques and technologies used in MDR. The introduction of advanced threat intelligence platforms, machine learning algorithms, and behavioral analytics revolutionized the way threats were detected and analyzed. Real-time monitoring and continuous threat hunting became the norm, allowing organizations to detect and respond to threats faster than ever before. 

Rise of Managed Security Service Providers (MSSPs): 

The rise of MSSPs played a pivotal role in the evolution of MDR. These specialized service providers offered organizations the expertise, technology, and 24/7 monitoring required for effective threat detection and response. MSSPs leveraged their experience and knowledge to build robust MDR solutions, ensuring that organizations of all sizes could benefit from enhanced cybersecurity capabilities. 

MDR in the Modern Cybersecurity Landscape: 

In today's rapidly evolving threat landscape, MDR has become an essential component of an organization's cybersecurity strategy. With the increasing complexity and frequency of cyber-attacks, organizations are turning to MDR providers to augment their security operations. MDR offers a comprehensive approach that combines threat detection, incident response, and continuous monitoring, providing organizations with the peace of mind they need to protect their sensitive data and critical assets. 

Key Milestones and Innovations in MDR:

The history of MDR is marked by several key milestones and innovations. From the introduction of cloud-based MDR platforms to the integration of artificial intelligence and automation, each development has brought new levels of efficiency and effectiveness to the field. Notable milestones include the adoption of proactive threat-hunting techniques, the incorporation of threat intelligence feeds, and the development of threat containment strategies. 

Future Outlook of MDR Solutions: 

As the cybersecurity landscape continues to evolve, MDR will play an increasingly vital role in safeguarding organizations against sophisticated threats. The fusion of human expertise and advanced technologies will continue to drive innovation in MDR, enabling organizations to detect and respond to threats in real time. Looking ahead, we can expect further advancements in machine learning, automation, and collaborative threat intelligence sharing, empowering MDR to stay ahead of emerging cyber threats. 

In conclusion, the evolution of Managed Detection Response has been a remarkable journey, driven by the need for robust cybersecurity in the face of ever-evolving threats. By understanding its origins, advancements, and current role, organizations can appreciate the importance of MDR and make informed decisions to protect their digital assets in an increasingly complex threat landscape.

Strengthening State and Local Government Cybersecurity

Security Tools: Microsoft Sentinel, Microsoft Defender for Endpoint, RSA Netwitness Packets

Description of Pain or Challenge: Various agencies using different security tools, leading to technology sprawl and no centralized SOC. Concerns arose due to diverse attack types and the lack of a central SOC to handle alerts and remediation tasks.

Solution Overview: Lumifi deployed a central security technology stack with Microsoft Defender for Endpoint and Microsoft Sentinel. A central SOC was established to migrate various technologies into this unified stack, ensuring comprehensive alert management and investigations. Lumifi recommended retaining Netwitness for packets to maintain network visibility.

Agencies were consolidated under a unified security instrumentation, resulting in increased response and reduced visibility gaps. The experienced SOC provided invaluable support, avoiding task shortfalls and negative outcomes. Lumifi's expertise and tools, including Shieldvision and Microsoft Security tools, along with seasoned Packet experts, played a pivotal role in achieving success.

Technology Description: ShieldVision, Microsoft Security tools expertise, and Packet experts with over a decade of experience.

Enhancing Accounting Firm's Cybersecurity with Lumifi's Expertise

Security Tools: Microsoft Sentinel, Defender for Endpoint

Description of Pain or Challenge: An accounting firm invested in Microsoft E5 licensing but encountered difficulties in fully implementing Defender for Endpoint. Moreover, they lacked the expertise to deploy Microsoft Sentinel or efficiently manage either tool to their maximum potential.

Solution Overview: Lumifi collaborated closely with the client to fine-tune Defender for Endpoint, expanding the environment review to encompass both the endpoint tool and SIEM (Security Information and Event Management) capabilities. Providing industry best practices tailored to their organization, Lumifi successfully completed the onboarding process for the tools. This was particularly appealing to the small business, as it offered 24/7 monitoring without the need for an extensive in-house team with graduated resource capabilities.

The onboarding process was executed seamlessly, and the client expressed widespread positive feedback. Their overall security posture saw a significant improvement through the successful tool onboarding and knowledge sharing with key roles within the client organization. Consequently, this client became a valuable reference for Lumifi's future engagements with industry-specific clients or those requiring expertise in specific technologies.

Technology Description: Microsoft Sentinel, Defender for Endpoint, Dedicated Onboarding Team.

Overcoming Security Challenges in the Aerospace and Defense Sector

Security Tools: RSA Netwitness​

Description of Pain or Challenge:​ Our aerospace and defense client had deployed RSA Netwitness, a powerful security tool. However, they encountered dissatisfaction with the deployment's progress and completion. The main pain points were the lack of readily available custom content to address their specific needs and the inability to establish a 24/7 Security Operations Center (SOC) due to resource constraints. Furthermore, their existing staff lacked the necessary expertise to effectively onboard and manage the new SIEM technology.​

Solution Overview: Recognizing the significance of CMMC (Cybersecurity Maturity Model Certification) compliance in the aerospace and defense sector, our team brought a wealth of expertise in this area during the sales process. This expertise played a crucial role in their decision to choose our services. Additionally, our team's extensive experience with RSA Netwitness and our proficiency in creating tailor-made content, conducting threat-hunting operations, and overall security management proved to be key advantages that set us apart from the competition. Furthermore, we fulfilled their requirements for staffing, ensuring they had the necessary resources to maintain their security posture effectively.​

Since the engagement began, our team quickly identified several issues in their existing administrative processes. We efficiently addressed these concerns and demonstrated our exceptional services, impressing the client. As a result, they decided to redirect their spending from other professional vendors to further invest in our services. This transition allowed our team to take the lead and steer the project towards success.​

Technology Description: Our solution encompassed comprehensive content development, leveraging the capabilities of RSA Netwitness, and utilizing our profound compliance knowledge, particularly in CMMC. This combination of technological prowess and expertise empowered us to provide an effective and tailored security solution for our aerospace and defense client.​

How to Detect and Mitigate Compromised Credential Attacks

Most security technologies are ineffective against unauthorized users with stolen credentials. 

Cybersecurity vendors spend a great deal of time and money warning against technical exploits and ransomware attacks. These are undoubtedly serious threats, but they are not nearly as complex or dangerous as compromised credential attacks. 

In fact, although ransomware dominates headlines in the cybersecurity industry, Verizon’s 2022 Data Breach Investigations Report states that compromised credentials are behind half of all attacks. Stealing login credentials is quickly becoming the fastest, easiest way for hackers to gain access to victims’ networks. 

Unlike technical exploits, credential compromise attacks often leave very few traces, if any. When hackers gain access to a legitimate user’s login credentials, they become invisible to most detection solutions. SIEM 1.0 platforms are designed to detect external threats, not internal ones. The same goes for many enterprise-level firewalls and endpoint solutions. 


"Pay attention to those 'that’s odd' moments."

Tony Simone |  Vice President Lumifi


Even among solutions that can detect insider threats, it is often a complex, time-consuming, and error-prone task. In a scenario where malicious insiders are rapidly gaining access to increasingly sensitive data sources in your organization, you can’t afford to waste time or resources this way. 

User Entity and Behavioral Analytics (UEBA) Technology is Key 

Modern SIEM platforms like Exabeam utilize UEBA technology to dive deeper into the actions of authenticated users. This provides a level of visibility that other detection technologies cannot match. Without this degree of visibility, tracing the activities of a compromised account requires running dozens of painstaking search queries manually – with no guarantee you’ll get accurate results. 

Exabeam’s UEBA technology leverages machine learning to establish a baseline for each individual user in your network. Each user’s baseline accounts for the applications they access, the files they modify, the privileges they have, and more. 

When an individual user starts to deviate from that established baseline, Exabeam takes notice and begins to rate their behavior against a pre-established threat threshold level. The more an individual user deviates from their established routine, the higher their score becomes. The SIEM assigns priority to each alert based on how severely the user is deviating from their established behavior. 

This way, each alert represents a collection of suspicious behaviors instead of one single action. This dramatically decreases the number of false positives analysts encounter and streamlines incident investigation. 

This capability is not limited strictly to users, either. As suggested in its name, UEBA technology also analyzes the behaviors of routers, servers, and endpoints throughout your network. 

Preassembled User Activity Timelines Optimize Event Response 

In a SIEM 1.0 environment, analysts conduct investigations by reviewing user activities using a complex sequence of search queries. This lets them assemble the data they need to understand the incident scenario they are facing. However, this process can take hours to complete and becomes more demanding as the environment grows in size and complexity. 

One of the most practical benefits of the UEBA approach is that it enables the SIEM to automatically create a timeline of user activity. Analysts can drill down into the individual actions that contribute to a particular user’s risk score and make decisions based on that data. Instead of taking hours to build a narrative, the entire scenario is evident from the very beginning.  

This means that incident response can happen in mere minutes. Analysts can immediately tell if malicious insiders are responsible for suspicious activities, or if benign organizational assignments – like job role or department changes – are at fault. There is no need for gathering evidence using the tedious point-click-and-pivot method, so analysts can respond quickly and decisively to security events. 

Combine UEBA SIEM Technology with On-Demand Expertise 

Highly automated UEBA technology provides accurate, curated data on security events, but it cannot mitigate those events on its own. Human expertise remains the cornerstone of effective information security. The experience and availability of analyst talent is a critical element of your overall security posture. 

Lumifi provides managed detection and response services that cater to UEBA-enabled enterprises in need of scalable security expertise. By entrusting detection and response to our team of highly trained US-based security analysts, you gain both an in-depth visibility into the effectiveness of your security posture and a scalable solution for addressing security incidents even in high-volume environments.  

These capabilities allow us to address credential compromise risks effectively and consistently.

Contact us to find out how your organization can leverage Lumifi MDR services to protect itself against these types of attacks.

Secure, Usable, Cheap: Pick any two

This fundamental tradeoff between security, usability, and cost is critical. Yes, it is possible to have both security and usability, but at a cost, in terms of money, time and personnel. While making something both cost efficient and usable, or even making something secure and cost-efficient may not be very hard, it is however  more difficult and time consuming to make something both secure and usable. This takes a lot of effort and thinking because security takes planning and resources.

As a system administrator, usability is at the top of their list. However, as a security administrator, security will be on top of their list – no surprise here really.

What if I tell you that the two job roles are orthogonal? What gets a sys admin bouquets, will get a security admin, brickbats and vice versa.

Oh and when we say “cheap” we mean in terms of effort – either by the vendor or by the user.

Security administrators face some interesting tradeoffs. Fundamentally, the choice to be made is between a system that is secure and usable, one that is secure and cheap or one that is cheap and usable. Unfortunately, we cannot have everything. The best practice is not to make the same person responsible for both security and system administration. The goals of those two tasks are far too often in conflict to make this a position that someone can become successful at.

Three Causes of Incident Response Failure

Breaches continue to be reported at a dizzying pace. In 2018 alone, a diverse range of companies — including Best Buy, Delta, Orbitz, Panera, Saks Fifth Avenue, and Sears — have been victimized.

These are not small companies, nor did they have small IT budgets. So, what’s the problem?  

Threats are escalating in scope and sophistication. Often times, new technologies are added to the enterprise network and not fully tested for security flaws. This creates issues for security teams, making it difficult to defend gaps and protect against persistent threats. Another issue facing security team is over emphasis on prevention has caused an under investment in security monitoring and incident response. 

Is your team faced with any of these three issues that can lead to failure to respond to incidents, malware, and threats properly?

1: Alert fatigue- multiplying security solutions to tackle the threat avalanche causing a large alert volume.
Even when centrally managed and correlated with a Security Information and Event Management (SIEM) solution, the workload of verifying and triaging an alert often overwhelms an in-house security team. The harder parts of research and enrichment come after the alert is verified, defining the who, what, where, when, and what to do about it. In the meantime, more alerts continue to pile up, making it difficult for an in-house security team to keep up with the ever-changing threat landscape. 

2: Skill shortage- everyone has a limited security budget.
Even if budget was a non-issue, skill shortage continues to be acute globally. Where can you find a mass of capable people? And how do you train and keep them? By the way, did you notice that management seems to be somehow more amenable to buying yet another tool than adding headcount? Artificial Intelligence (AI) continues to be a mirage, self-driving cars anyone?

3: Tribal knowledge- security processes require a transfer of knowledge from senior to new or junior resources.?
Incident response requires a deep knowledge of existing systems and reasons why things are set up the way they are. Even when highly documented policies and procedures are in place, companies often rely heavily on their most senior analysts to make decisions based on their experience and knowledge of the organization. 

Throwing money at this problem is not the answer, working smarter is the better answer. If you have problems with alert fatigue, skill shortage, or tribal knowledge, Co-Managed SIEM can help you. According to Gartner’s How and When to Use Co-Managed Security Information and Event Management report, “Co-managed SIEM services enable security and risk management leaders to maximize value from SIEM and enhance security monitoring capabilities, while retaining control and flexibility.”

Managed Detection Response Celebration: Join Our Exciting Journey!

We're thrilled to announce our momentous milestone as we start our journey of 15 years in the managed detection response field. Reflecting on our achievements, we express our appreciation for our outstanding team and valued industry partners. To honor this occasion, we're introducing Lumifi Day, a special celebration dedicated to our team members.

Lumifi Day is a heartfelt tribute to our team's unwavering commitment and expertise. Their contributions have shaped our success and positioned us as leaders in the industry. Join us in celebrating, and stay tuned for engaging content highlighting our journey and showcasing our team's connection to the industry.

Throughout Lumifi Day, we'll share behind-the-scenes glimpses and how we've contributed to the innovation of managed detection response (MDR) in cybersecurity. Our partnerships have played a vital role in our growth, and we believe collaboration and knowledge-sharing drive advancements in our industry.

Lumifi Day isn't just about the past; it's about the future. We're energized by the opportunities ahead and remain committed to being at the forefront of innovation. By investing in research, development, and top talent, we aim to shape the industry's future.

We sincerely thank our employees, clients, partners, and stakeholders for their unwavering support. Your trust has been the driving force behind our accomplishments. Stay tuned for captivating content that showcases our journey, team expertise, and industry developments.

Let's celebrate 15 years of managed detection response and the incredible people who made it all possible. Together, we'll forge ahead into an exciting future.

Security Subsistence Syndrome

Security Subsistence Syndrome (SSS) is defined as a mindset in an organization that believes it has no security choices and is underfunded, so it minimally spends to meet perceived statutory and regulatory requirements.

Andy Ellis describes this mindset as one “with attitude, not money. It’s possible to have a lot of money and still be in a bad place, just as it’s possible to operate a good security program on a shoestring budget.”

In the face of overwhelming evidence that traditional defenses such as signature based anti-virus and firewalls are woefully inadequate against modern threats, SSS leads defenders to proclaim satisfaction because they have been diligent in implementing these basic precautions.

However, people who deal with incident response today quietly assume that the malware will not be detected by whatever anti-virus tools are installed. The question of “does AV detect it?” never even comes up anymore. In their world, anti-virus effectiveness is basically 0% and this is not a subject of any debate. This is simply a fact of their daily life, as noted here.

So how does the modern IT manager defend effectively (and efficiently — since cost is always a concern) against this threat landscape?

The answer is in a suite of technologies now called endpoint threat detection and response (ETDR or EDR). These are IT analytics solutions which provide visibility and insight into abnormal behavior that could represent potential threats and risks and enable enterprises to improve their security posture. A sensor at the endpoint is used to detect the launch of new processes and compares the MD5 (or SHA) hash of this process to determine if it has been seen before/trusted.

Can your SIEM provide ETDR? EventTracker can. Time to upgrade?

Ten Work-from-Home Cybersecurity and Productivity Tips

Social distancing is a term applied to certain actions that are taken by Public Health officials to stop or slow down the spread of a highly contagious disease such as COVID-19. Out of an abundance of caution and following the guidance of state and federal governments, many companies are practicing social distancing by encouraging or requiring employees to work from home. This action, although prudent, presents problems in the cybersecurity domain as workers move from a trusted and secured office network to a remote location, where in most cases only Internet connectivity and electric power are imperatives. This move extends a corporate network in ways that make it more difficult to secure and thus presenting an opportunity for cyber criminals to take advantage of the situation. In fact, cyber criminals are already using "Coronavirus" and “COVID-19” as subject lines for phishing scams - hoping to fool some unsuspecting worker into clicking on a link or opening an attachment that results in the installation of malware or unwittingly handing over usernames and passwords.

With that in mind, here are some tips to stay safe as you and your employees work from home:

  1. Avoid mixing work and leisure activities on the same device. Work activities should be confined to the work devices and personal activities such as Facebook, Instagram, etc. to personal devices. Commingling activities increases risk.
  2. Ensure your devices have anti-virus and that the virus definitions are kept up-to-date.  New viruses and malicious sites will appear rapidly as this crisis continues, so be sure to update definitions regularly.
  3. Ensure your devices have the latest operating system and application updates. These almost always contain security enhancements.
  4. Use multi-layer security solutions like Netsurion’s EventTracker Managed Threat Protection that can add an extra protection for laptops when they’re not connected to the office network. Utilizing a SIEM that is backed by a 24/7 SOC so it’s constantly monitored for threats will also relieve a challenge for in-house IT teams who are now constrained supporting many work-from-home (WFH) users.
  5. Ensure you home Wi-Fi is secured using strong Wi-Fi encryption such as WP2and a strong unique password for access; and by changing the Wi-Fi router admin password from the default.
  6. Remove bogus add-on's for browsers (often used for shopping) as they can steal data or download malware.
  7. Have a backup strategy and follow it. Even the best security plans can have holes, and users make mistakes. If a ransomware attack was to get through, your files could be gone in an instant. Make sure your backup plans cover all servers and workstations.
  8. If your office has set-up a virtual private network (VPN) to connect back to corporate servers, make sure the VPN client software is updated.
  9. Have a list of IT contacts that all of your employees know, and their work hours, to call in the event of an IT emergency.  Better to find out about a possible breach when it happens, not the next morning.
  10. Lastly, and worthy of its own five bonus tips, be especially aware of potential phishing attacks:
    • Be suspicious of any emails referencing the Coronavirus, even if they appear to come from a trusted source (friends, HR, government agency) as these could be phishing emails. Phishing scams try to create an impression of urgency in order to panic you into clicking on the link or opening the attachment, so beware.
    • It’s generally fine to click on links when you’re on trusted sites but clicking on links that appear in random emails and instant messages isn’t wise. A phishing email may claim to be from a legitimate company and when you click the link to the website, it may look exactly like the real website however it is not. To be safe, hover over links before clicking on them and read the actual URL they are pointing to. Make sure the link is taking you to the sender’s site, or to another trust site – if you don’t recognize the URL it’s generally not a good idea to follow the link.
    • Beware of emails that do not contain your name, especially if they are asking for information from you. Most phishing emails will start with “Dear Customer” so you should be alert when you come across these emails. When in doubt, go directly to the source rather than clicking a potentially dangerous link.
    • Be especially wary of emails asking you to check or renew passwords and login credentials.
    • Beware of unusual requests such as to send a wire transfer even from people you know. There have been many instances of phishing emails appearing to come from executives or other people within the company that are not legit. If it seems unusual (i.e. “I’ve been here for 3 years and have never received an email from the CEO, but I did today”) or out of character, call the requestor and ask if the email is real.

Following these tips will help keep your and your company’s data stay cyber-safe while working outside of the office during these trying times. Be vigilant.

An interview with Michael Malone: The evolution of MDR

Q. Can you share with us the journey of Datashield/Lumifi and how it has evolved in the field of Managed Detection and Response (MDR)? What were the key milestones and challenges along the way? 

Datashield/Lumifi has come a long way in Managed Detection and Response (MDR). Our journey began as an investment by myself and EMC Ventures (now Dell) when we recognized the immense potential in this space. We did not anticipate that we would become one of the pioneering MDR companies in 2010! Throughout our evolution, we have encountered significant milestones and challenges that have shaped our growth and expertise in providing top-notch MDR services to our clients.

Q. MDR has rapidly transformed the cybersecurity landscape. How did Datashield/Lumifi identify the potential of MDR early on, and what were the key factors that influenced the decision to focus on this particular area? 

It was easy! We recognized the potential of Managed Detection and Response (MDR) early on by closely monitoring the evolving cybersecurity landscape and observing the increasing sophistication of cyber threats and the growing need for comprehensive security solutions. Several key factors influenced our decision to focus on MDR. 

 Firstly, the acquisition of Netwitness packet technology by EMC/RSA presented a game-changing opportunity for real-time forensics, enabling us to better serve our customers by swiftly identifying and mitigating threats. Additionally, the demand for proactive threat detection and response solutions, combined with our expertise in cybersecurity, further solidified our belief in the value of MDR as a crucial area to concentrate our efforts on. 

Q. As a leader in the MDR space, what advancements do you foresee Datashield/Lumifi making in the near future? Are there any specific areas or technologies that you believe will have a significant impact on the future of MDR? 

I foresee significant advancements from Lumifi in the next year. Our ongoing investment in Shieldvision and Backquery, which allow seamless integration with various EDR and SIEM tools, will be a game changer.  

With this technology, we aim to provide our customers with a comprehensive and user-friendly platform, offering a single pane of glass access to all the necessary data for forensic analysis and proactive incident response. This innovative approach will enhance our ability to help customers effectively mitigate threats and stay ahead in the ever-evolving MDR landscape. 

Q. In your opinion, what sets Datashield/Lumifi apart from other MDR providers in the market? How does the company differentiate itself in terms of technology, expertise, or approach? 

Our extensive experience of 15 years in the cybersecurity industry distinguishes us from other providers. Unlike them, we have a proven track record of delivering Managed Detection and Response (MDR) services. We understand that despite technological advancements, human expertise remains crucial. Our approach combines advanced software technology with highly skilled teams to effectively address security issues in diverse customer environments. We strongly focus on customer satisfaction and customize our solutions to cater to specific needs and industries. This combination of human intelligence and cutting-edge technology enables us to deliver comprehensive and reliable MDR services that outperform our competitors. 

Q. Looking ahead, where do you see Datashield/Lumifi positioned in the advancements of MDR in the next 5 years? What specific goals or targets has the company set for itself in terms of growth and innovation? 

In the next five years, Lumifi aims to establish itself as the dominant player in MDR, driving significant advancements in the field. We have set ambitious goals to drive growth and foster innovation, focusing on our customers' success and security. Our primary objective is to expand our market share by acquiring new customers and enhancing our offerings through continuous technological advancements. 

We understand that achieving success in this industry relies on the synergy between people, processes, and technology. To this end, we remain committed to nurturing a skilled and dedicated workforce. We will continue to invest in intelligent and talented individuals who ensure our customers' ongoing success and security. 

Q. Looking even further into the future, how do you envision the MDR landscape evolving in the next 10 years? What major trends or changes do you anticipate, and how is Datashield/Lumifi preparing to stay at the forefront of these developments? 

Looking ahead to the next ten years, I foresee a remarkable transformation in the Managed Detection and Response (MDR) landscape, driven by technological advancements, particularly in automation and AI. These innovations will revolutionize MDR solutions, enabling faster threat detection, more accurate incident response, and improved overall security outcomes. 
Lumifi is fully committed to embracing these advancements and harnessing their potential to stay at the forefront of the industry. By leveraging automation and developing AI capabilities, we aim to optimize our detection and response processes, empower our analysts with intelligent tools, and deliver enhanced protection to our clients. 

Moreover, as the MDR market evolves, we anticipate a significant consolidation. Current MDR providers cannot scale and will need to keep pace with technological advancements, ultimately causing them to lose profitability. We will continue to maintain a proactive approach to technical integration, and our unwavering commitment to continuous innovation positions us well to navigate these changes and maintain our leadership position in the MDR space. 

  1.  

 

Micheal Malone | CEO of Lumifi

 

How to Protect Financial Data: 4 Cyber Risks MSPs Can't Ignore

Contributed by: Meaghan Moraes, Blog and Social Media Manager at Continuum

Banks have always been a prime target for cybercriminals. With enormous stores of cash and consumer data, and the massive threat of financial losses, regulatory consequences, and reputational damage, there’s really no choice for financial institutions but to innovate and accelerate their cybersecurity strategies.

Although banks and credit unions are monitored closely, with quarterly or semi-annual audits performed by government regulators, security doesn’t stop there. Many small-to medium-sized businesses (SMBs) in finance work with a managed IT services provider (MSP) and rely on their cybersecurity tools, education, and continuous protection.

Below, we’ll cover four vulnerabilities MSPs should be hyper-aware of in 2019 so they can better secure their clients’ financial data.

Mobile Vulnerability

As consumers have less and less cash on hand, banks are becoming more mobile-accessible to easily and instantly enable payments and transfers. While convenience is at an all-time high, so is cyber risk for financial institutions.

In a recent study on the cybersecurity of 30 major banking apps, all 30 had at least one known security risk identified, and 25% of them included at least one “high-risk security flaw.” Their vulnerabilities included insecure data storage, insecure authentication, and code tampering.

While mobile banking is now the way of the world, it’s important that MSPs hone in on their clients’ mobile security, as well as the mobile security of the end user.

Web-Based Vulnerability

According to a recent report that named the financial sector the “most vulnerable to attack” of all the industries tested, web-based banking applications have also been shown to lack effective security. Researchers found that every financial site they tested contained at least one high-severity vulnerability.

Similar to mobile, web transactions are simply the way consumers are accustomed to banking now. So, for financial companies to keep up with consumer behavior while avoiding a major cyber attack, they’ll need to lean on an MSP who can enhance their mobile and web cybersecurity protocols.

Third Party Vulnerability

There have been a number of major banking cyber attacks that were caused by shared banking systems and third-party networks. It is common for financial organizations to rely on third party vendors for their daily operations. Yet, these businesses should be informed on the level of cyber risk associated with this practice–and the responsibility ultimately falls on the business’s MSP. It’s crucial that third party security is continuously monitored for cybersecurity vulnerabilities and security awareness training is consistently administered to end users. Lack of awareness could ultimately cost your clients millions.

Cryptocurrency Vulnerability

One in five financial firms today are saying they might start trading cryptocurrencies later this year. While the involvement of major institutions could potentially add a layer of security to the crypto industry, it would take extreme measures to ensure real security of these digital currencies.

What does this mean for MSPs working with clients in the financial industry? It’s important to assure them that no matter what, there will always be some level of risk—however, you can take the measures necessary to control that risk level, keep it within an acceptable range for the business, and proactively detect and respond to threats in their environments.

While finance is a high-risk industry, the pay-off of taking the right steps to keep businesses secure is well worth it.

Malicious Insiders in Healthcare: The Moment UEBA was Made For

With UEBA-powered platforms like Exabeam, you can catch threat actors who already work within your network. 

External threats aren't the only kind of threat security leaders need to prepare for. Insider threats often pose an even greater risk. 

(more…)

How to Leverage UEBA to Address Your Organization' Unique Risk Profile

You can make UEBA technology work right out of the box – but custom configuration is needed to unlock its real value.  

User Entity and Behavioral Analytics (UEBA) technology is a game-changing addition to any security tech stack. UEBA-enhanced insights allow security teams to detect sophisticated attacks that other technologies often miss. 

Compromised credentials and malicious insiders are excellent examples. Static rules-based SIEM platforms are not well-suited to detecting these kinds of attacks because their rules often rely on authorization credentials.  

In most cases, these systems automatically extend trust to authorized users even if they do suspicious things – like encrypting mission-critical files and directories. UEBA technology addresses that risk by monitoring the activities of authorized, validated users for signs of compromise. 

But how do UEBA solutions know how to triage alerts effectively? Why do they prioritize some activities over others? 

The answers to these questions will help security leaders optimize UEBA implementation in ways that directly address the risks unique to their organizations. 

How Default UEBA Configurations Work 

UEBA platforms identify suspicious behavior by looking at user and asset activity and assigning a baseline risk score to each one. The more a user, server, or application deviates from their routine, the greater the severity of the alert triggered. 

In a default plug-and-play configuration, this baseline risk score is arbitrary. It simply represents whatever activities were being carried out on the network at the time of implementation. It doesn't "know" anything about the organization' risk profile, security processes, or other activities. 

Sophisticated UEBA solutions use self-evolving machine learning solutions to fine-tune their models over time. This essentially means triggering alerts and observing whether analysts categorize them as false positives or real attacks. 

It also means that any security risks present prior to UEBA implementation may be perpetuated from that moment forward. If you happen to deploy UEBA in the middle of a sophisticated "low and slow" cyberattack, it might assume that things like privilege escalation and lateral movement are perfectly normal. 

Security leaders who prioritize getting UEBA up and running as soon as possible may ultimately normalize threatening behavior in ways that undermine the technology' most valuable features. If the platform in question doesn't provide deep visibility into how its risk assessment algorithms actually work, problematic assumptions can embed themselves throughout the organization' security posture. 

Custom Configurations Enhance UEBA Performance from Day One 

When an organization takes time to measure its exposure to real-world security risks, it earns the ability to address those risks more effectively using UEBA technology. Custom rules and playbooks are a vital part of this process. 

UEBA platforms like Exabeam can leverage custom rules to analyze user and asset behavior. These custom rules allow the system to accurately process false positives, meaningfully prioritize high-severity alerts, and take the organization's unique security architecture into account. 

For example, consider an organization with users who travel frequently and log on remotely. Custom UEBA configuration allows the security team to monitor high-risk activities without waiting for the system to learn how to categorize those activities as high-risk on its own. That might mean focusing on VPN usage, server locations, and other characteristics that violate the company' specific remote work policies. 

Those policies are unique to the organization itself. They aren't going to be part of any default UEBA configuration. Custom rules enable the organization to align its UEBA-powered detection platform with its own assessed security risks. 

Custom playbooks offer many of the same benefits. Although there are broad similarities in the ways individual organizations remediate active cyberattacks, no two organizations are perfectly alike. Custom configurations provide improved visibility and allow security professionals to detect, address, and mitigate risk more effectively than default deployments. 

How Lumifi Uses Custom Rules to Improve Risk Management 

Lumifi has spent years developing more than 1,800 unique custom rules for Exabeam. These rules are templates that take unique characteristics of the organization' security posture into account, allowing analysts to quickly build a robust foundation for improving risk management using UEBA technology. 

These are not plug-and-play rules. Custom rules like the ICMP Unequal rule must be configured by an expert who can determine the ideal threshold between normal and suspicious activity. 

Security leaders who entrust Lumifi with the development and implementation of these rules gain visibility into processes that their security tech stack would otherwise overlook. Every organization can maximize the benefit of UEBA technology with Lumifi product experts leading the way. 

What You Should Know About 
PCI DSS 4

What is PCI DSS v4.0?

The Payment Card Industry Data Security Standard (PCI DSS) is a worldwide standard that establishes adequate operational and technical criteria for account data protection. The next evolution of the standard PCI DSS v4.0 was released on March 31, 2022.

The latest revision of the PCI standard, PCI DSS v4.0, significantly changes the criteria while emphasizing ongoing security and including new approaches to comply with them. PCI DSS v4.0 replaces the PCI DSS version 3.2.1 to handle emerging threats and technologies strategically, offer innovative approaches for combating growing threats, and secure other elements in the payment ecosystem.

All organizations that manage, store, transmit, or process Sensitive Authentication Data (SAD) and/or Cardholder Data (CHD) or have the potential to compromise the security of the Cardholder Data Environment (CDE) are required to comply with PCI DSS. This covers all organizations that process credit card accounts, such as issuers, acquirers, merchants, processors, and other service providers.

The PCI DSS v3.2.1 will be in use for two years after the release of PCI DSS v4.0 on March 31, 2022. The goal of the transition period, which runs from March 31, 2022, to March 31, 2024, is to provide organizations adequate time to acquaint themselves with the PCI DSS v4.0 updates, update their reporting templates, and forms, and plan and implement those updates. Some rules go into effect immediately, but the majority do not take effect until March 31, 2025, giving organizations a full year to implement the challenging ones.

What’s New in PCI DSS v4.0?

The PCI DSS v4.0 updates intend to address the ever-evolving security requirements of the payments industry, promote security as a continuous process, boost flexibility, and enhance procedures for organizations employing various security-related approaches.

The PCI SSC released PCI DSS 4.0 on March 31, 2022, and introduced sixty-four new requirements that organizations need to comply with if applicable to their environments. As with any major compliance framework update, organizations should take a proactive approach between the standard release and its effective date.

The mandates defined under the new PCI DSS take effect in three stages. The first is for thirteen new requirements effective immediately for any PCI DSS 4.0 Report on Compliance (ROC) or Self-Assessment Questionnaire (SAQ) validation assessment completed since the release of the new standard. The second is after March 31, 2024, when the current version of the standard PCI DSS 3.2.1 retires. All assessments completed on or after April 1, 2024, will need to be under PCI DSS 4.0. Finally, the remaining fifty-one new requirements are best practices until March 31, 2025, and are required to be in place on April 1, 2025. For a comprehensive view, please refer the Summary of Changes from PCI DSS v3.2.1 to v4.0, found in the PCI SSC Document Library.

As you consider these changes, be sure to take action. At Lumifi, we assist with network security while ensuring that you adhere to all regulations to keep your company PCI compliant, yes, even with the most recent changes. Give this to us to handle for you.

Why Aren't Security Experts Talking About Public Administration?

Government agencies are quietly suffering a significant uptick in security incidents and data breaches – but the cybersecurity industry doesn't seem to have noticed yet. 

One insight stands out among the many contained in Verizon' 2023 Data Breach Investigation Report.  

(more…)

Top 5 Takeaways from Verizon's 2023 Data Breach Report

Cybercriminals are adopting new, more sophisticated tactics. Security leaders can't depend on purely technical solutions that ignore the human element. 

If there is one broad theme to Verizon's 2023 Data Breach Report, it's that the arms race between cybercriminals and cybersecurity professionals hinges on the human element more than ever. The report declares this clearly in its opening summary, saying that: 

(more…)

PCI DSS 4 Requirements: What It Means for You

If you are a merchant or service provider, then you may know about the changes coming for the Payment Card Industry Data Security Standard (PCI DSS) in Version 4.0 coming into effect from April 1st, 2024.

The Council periodically reviews and updates PCI DSS to ensure it continues to protect against old threats and new emerging threats.

PCI DSS: A Baseline for Data Security

PCI DSS is more than just about cardholder data; it extends to protecting any sensitive data within an organization. While initially focusing on cardholder account data, it now covers a broader range of sensitive information, including names and addresses. This standard applies to any entity involved in processing cardholder data, even if this processing is outsourced.

Transitioning to PCI DSS 4.0

The transition from version 3.2.1 to 4.0 is a pivotal phase. Version 4.0 is already available for assessment, alongside version 3.2.1, which remains in effect. However, by March 31st of the following year, version 3.2.1 will be officially retired, and only version 4.0 assessments will be conducted.

Key Changes in PCI DSS 4.0

Version 4.0 reflects evolving technology and emerging threats, particularly pertinent to E-commerce. Notably, cloud technology is referenced over 40 times, highlighting its prominence in today’s landscape. Moreover, version 4.0 emphasizes the need for flexibility in implementing security measures, allowing merchants to tailor solutions to their unique circumstances.

Seven Crucial New Requirements in PCI DSS 4.0

3.3.2 - Encryption of Sensitive Authentication Data (SAD): All SAD, including CVV, must be encrypted, regardless of whether the primary account number (PAN) is present. This requirement ensures heightened security in handling authentication data.

5.4.1 - Protection Against Phishing Attacks: Implement an automated phishing protection mechanism to reduce the risk of falling prey to phishing attempts. This measure fortifies defenses against social engineering threats, reducing potential vectors for malware and ransomware attacks.

6.4.3 - Managing Payment Page Scripts: Merchants must maintain an inventory of all scripts on their E-commerce payment pages. This includes ensuring the integrity of each script to prevent unauthorized modifications and verifying their authorization and execution.

8.3.6 - Password Length Requirement: Passwords of users and administrators accessing the cardholder data must be a minimum of 12 characters. Encourage the use of passphrases for added security.

11.3.1.2 - Authenticated Internal Vulnerability Scans: When conducting internal vulnerability scans, authentication should be employed. This enhances the accuracy and detail of vulnerability assessments, providing a comprehensive view of potential security risks.

11.6.1 - Detect changes of HTTP headers & Payment Pages: A change and tamper detection mechanism must be implemented to ensure unauthorized modifications are quickly reported to security personnel to maintain security.

12.5.2 - Verification of PCI Scope every 12 months: Merchants with cardholder data environments (CDEs) must periodically verify their PCI scope. This involves identifying data flows, documenting storage methods, encryption, and access controls, as well as assessing any changes that may impact security.

Preparation for PCI DSS 4.0 Compliance

Familiarize yourself with Version 4.0: Understand the changes from 3.2.1 to version 4.0 thoroughly. Utilize the resources provided by the PCI Security Standards Council for detailed insights.

Assess Impact on Your Organization: Evaluate how the new requirements will affect your existing information security program. Identify the potential changes, and plan accordingly.

Consider Automation Solutions: Given the complexity of compliance, consider utilizing automated solutions for tracking scripts, ensuring payment page integrity, and managing vulnerability scans.

Stay Informed and Document Changes: Stay updated with PCI DSS developments and document any changes made in response to the new requirements. Consistent documentation is essential for demonstrating compliance.

Merchants may seamlessly handle the switch to PCI DSS 4.0 by being well-prepared and having a thorough awareness of the new criteria. This will guarantee ongoing cardholder data safety and adherence to industry standards.

Need help? Netsurion is here for you.

Since PCI's inception, we have assisted merchants with compliance by offering managed network security solutions that are both cost-effective and easy to understand.

Your focus should remain on running your business, not worrying about the status of your compliance. For more information on PCI Compliance, visit our compliance support resource.

The Ultimate Playbook to Become an MSSP

Now that advanced cybersecurity protections are a must-have in today’s landscape, organizations of all sizes are increasingly seeking out and leaning on a trusted security partner to manage their security services. A recent study released by Forrester revealed that 57 percent of companies are seeking outside help for IT systems monitoring and 45 percent are outsourcing threat detection and intelligence. As a result, managed IT service providers (MSPs) are presented with a major opportunity to step in as that cybersecurity leader through an expanded services portfolio that officially deems them an “MSSP”—a Managed Security Services Provider.

As it stands, 42 percent of employees in small- and medium-sized businesses (SMBs) would not know what to do if their business experienced a cyber attack, which stems from the fact that 47 percent do not have employee security awareness and training programs in place. As MSPs integrate security into their services, they will not only significantly decrease the margin of error for their clients’ information security, but they will be one step closer to cementing their status as their go-to provider on an ongoing basis.

But that doesn’t happen overnight, and there’s no silver bullet to security. As you start to think about adding layers of security to your offering in an effort to address your clients’ top concerns, your strategy will begin to develop. Here are some helpful steps to devising a solid strategy and then successfully selling what you have to offer as an MSSP.

Devising Your Cybersecurity Strategy

With advanced threats like rapidly evolving and hyper-targeted malware and ransomware, basic security tools alone aren’t enough to keep SMB clients secure; additional cybersecurity is needed for more complete and holistic protection. 

MSPs and SMBs need more advanced and comprehensive security —such as endpoint and network security, security operations center (SOC) services, log management, DNS filtering, and user training—in order to remain one step ahead of threats at all times. A proactive approach to cybersecurity will inform MSPs of exactly how well-protected their clients are from specific risks. Capabilities such as advanced security profiling and risk scoring, employee security training, and incident response planning can help you consistently predict and manage risk.

When it comes to immediate and robust detection capabilities, it’s crucial to offer endpoint and network management so you can detect suspicious behaviors on all endpoints and across the network so you can immediately roll back and minimize any damage.

Lastly, with SOC services, you’ll have the ability to monitor and mitigate threats in real time, and offer remediation services and deep forensics as well. 

Once you have pinned down which protections will comprise your comprehensive solution, it’s time to package your unique offering with effective messaging.

Selling Your Managed Security Services

When prospecting or cross-selling to clients, you can refine your message to speak to the SMB mindset around security. MSPs need to not only evolve their strategies to survive, but get client buy-in on them.

When working to achieve buy-in, the best method for engaging clients is to develop a common language. Compare a typical business function your client performs - like marketing, for instance - to security. Just as you work to know your audience, understand where to focus and report on those efforts, the same methodology can be applied to your security service delivery. You need to understand the threat landscape, consistently measure risk, and report on risk levels. Finding that type of common ground will help you clearly illustrate how you’re aiming to deliver your cybersecurity offering.

It’s helpful to frame the conversation with clients around risk. You can work with them to define acceptable risk and determine what it will take to get to their desired state. Make sure your client sees your relationship as ongoing. If they’re at an unacceptable risk level, you can ensure them that your security services will get them to the acceptable range, and you will maintain that by consistently identifying, prioritizing, and mitigating gaps in coverage.

Taking an approach that not only brings to life what your services will represent, but also justifies additional fees and services will cement you as the MSSP that will undoubtedly keep your clients as protected and profitable as possible.

RSA Conference Key Takeaways for Cybersecurity Defenders

RSA Conference 2020 has come and gone. It still maintains its status as the largest security event in the world, although attendance dipped from last year due to virus jitters and travel restrictions. While the mood at RSA Conference (RSAC) overall was a bit more subdued than in the past, attendee engagement with the Netsurion team to discuss co-managed SIEM in the expo hall was at an all-time high. We were also honored with recognition in CSO’s Hottest New Cybersecurity Products at RSA Conference 2020 for our holistic MITRE ATT&CK integration with our managed SIEM, EventTracker (more details below).

 *csoonline.com

Here are our insights from conversations with cybersecurity decision makers at RSA Conference 2020.

1. The “human element” theme underscores both the people risk and future opportunity.

Humans are the leading cause of data breaches, whether unintentional errors or disgruntled employees or persistent external cyber criminals. While automation and technologies like artificial intelligence (AI) and machine learning (ML) play an important and evolving role in cybersecurity, they do not replace the people and processes still required for risk management and mitigation. There is no silver bullet for all vulnerabilities and threats. Our human ability to adapt and persevere are crucial attributes in improving our cybersecurity posture. It was refreshing to see the human element front and center at RSA Conference, including a focus on topics like developing younger cyber professionals, avoiding security staff burnout, and leveraging managed service providers to augment skills. For most organizations, particularly with skilled cybersecurity professionals in short supply, the total cost of ownership (TCO) of a co-managed solution has a much higher ROI than a Do-it-Yourself solution.

2. MITRE ATT&CK integration detects advanced threats faster.

RSAC illustrated that businesses, government agencies, global partners, and vendors of all sizes and geographies are widely adopting MITRE ATT&CK® as a methodology to bolster defenses and share threat intelligence. ATT&CK is a repository of real-world cybersecurity adversary techniques that serve as an early warning for defenders to reduce attacker dwell time. Our demonstration of EventTracker SIEM integration with ATT&CK was extremely well received as organizations saw firsthand how our SOC-as-a-Service detected advanced threats faster.

3. Lifelong learning is key in our fast-paced industry.  

Navigating the many concurrent tracks and presentation opportunities at RSAC is always a challenge.  One crowd-pleasing session at RSAC is The Cryptographers’ Panel. This year saw moderator Zulfikar Ramzan join with cryptographers Whitfield Diffie, Arvind Narayanan, and Tal Rabin along with two of RSA’s founders, Ronald Rivest and Adi Shamir. These well-known mathematicians and scientists covered a wide range of issues from ethics to privacy to the human role in cybersecurity.

4. MSP involvement at RSAC is on the upswing.

Managed IT service providers’ attendance at RSAC has continued to grow in recent years. With an estimated 70% of all high-tech sales going through a channel partner of some type (MSP or VAR), it’s the perfect timing for increased participation in RSAC’s knowledge transfer, personal development, and solutions development. Netsurion, as a Master MSSP, is focused on arming and equipping IT service providers and resellers with the means to provide managed security services.

5. Cybersecurity staffing challenges require a realistic approach.

With 3.5 million open cybersecurity positions, one approach to overcome the staff and skills shortage is to (A) prioritize efforts and projects, (B) weigh which projects could and should be performed internally versus with a managed security service provider, and (C) be realistic about risk management. We often hear from enterprises that purchased a SIEM software that the departure of their primary SIEM admin has left them understaffed to navigate the SIEM for threat detection and analytics. If you are experiencing this scenario, you are not alone. SOC-as-a-Service can augment your skills and enable your team to work on other initiatives they are best suited for. Look beyond the buzz at RSAC to Managed Security Service Providers (MSSPs) such as Netsurion with a proven track record and customer successes of managed SIEM organizations with 24/7/365 capabilities. On a different note, it was encouraging to meet the students who attended RSAC’s College Day and used the opportunity to advance their cybersecurity skills.

Final Thoughts

While it’s easy to focus on the risk caused by humans, RSA Conference 2020 also left us feeling upbeat about the future and our collective role in protecting customers, employees, and data.  Public-private partnerships, threat intelligence sharing, managed services to augment staff and skill shortages, and cyber preparedness are all crucial to rebound from the inevitable data breach. It’s not about the myth of perfect protection, but the reality of rapid detection and thorough remediation. Whether you attended RSA Conference 2020 in person or are committed to ongoing personal development and staying on top of new threats, solutions, and proven practices, we can all learn from each other and collaborate for a more cyber resilient world. If we didn’t connect at RSA Conference 2020, we invite you to check out an upcoming EventTracker solution demo that will also include how we leverage MITRE ATT&CK integration to further improve your threat detection and response time.

Use Automation to Enhance the Value of Human Expertise in the SOC

Automation isn't always a replacement for human expertise. The two must work together to generate lasting security value. 

Security Operations Centers have struggled with workforce shortages for years. Experts were already alarmed at the growing cybersecurity talent gap back in 2017 

(more…)

What you should know about programs, ports and services

Network Security Basic Training Series: Programs, Ports and Services

In this fourth article of the series, we continue to explore some of the basic ways that businesses of all sizes can keep their computer systems safer. We will discuss the topic of programs, ports and services.

So let’s begin by discussing installed programs.

Many computer users are very unaware of the various programs that may be running on their computer. Whether it be that they installed the program months or years ago and have now forgotten it was there, or maybe it’s that they know about the program but they don’t use it regularly.

It could also be that they use the program every day but they don’t know enough about computers to know how it works and whether or not it is leaving their system open to hackers and malware.

If you are unsure of what programs are installed on your computer, go look. If you use a Windows based system, navigate to the Control Panel and look under Programs and Features to see a list of programs that are currently installed on your system.

Caution – before you proceed – be sure you have a good backup of your PC – just in case!

The Control Panel is a good place to check for unknown or unwanted programs that can be uninstalled, but be careful, some of the things listed here are utilities and drivers that make your PC work – so if you accidentally remove those items, you could make your PC not work any longer.

What do I look for exactly?

A good piece of advice is to sort this list by the date that it was installed on, and examine the list from the most recently installed to the items that were installed a long time ago.

Look for programs that just plain “look strange” to you – such as printer drivers for printers you don’t have connected to your PC, or coupon printers that you don’t recall installing, or other applications that make absolutely no sense to you.

The other thing to focus on when reviewing this list are applications that you may have once installed for a reason but no longer use or need. If you don’t need to use them, remove them.

This will save space on your hard drive and will help you as we progress through the review of the remaining items in this article.

If you do decide to uninstall some programs, you should reboot your system after you are done.

Ok, what about those ports?

When we discuss ports, we are discussing TCP and UDP ports. A good definition from WikiPedia on what ports are can be found here.

Why do I care about ports?

Knowing what ports are open and listening for traffic to/from your PC is a big part of computer security. For example, if you happen to be running an FTP server on your PC but don’t know it, you could be exposing holes on your PC that others (hackers) could use to get into your system and get data out of it.

One way to find out what ports your computer is listening on is to use the NETSTAT command – this article explains this method.

If you are comfortable with computers and want a more comprehensive test that you can run on your own, using the NMAP utility is a favorite choice for many. Using the NMAP utility will not only tell you what ports are open on a system, but the utility will also try to determine the operating system of the device that is tested.

This utility is a great way to inventory all the devices on your home or corporate network as well (if used on a corporate network, be sure you have permission to use it before you start scanning the network!).

And what about Services?

Services go along with programs that are installed on your computer, and by reviewing what services are running, you can learn a lot about your system and potentially speed things up a bit too. To review services on a Windows based system, go to Computer Management, and click the Services link.

From here you will see a list of services and their status (Running or Not) along with information about the service (usually) and the user account that the service runs under.  

Before disabling any running services, be sure you know what you are disabling. From this screen you can also disable certain services from reloading the next time you start your computer, and by doing so, you may speed up the overall performance of your system.

Be careful though, as with programs, these services may be needed to run your computer, so be sure you know what you are disabling before you do it.

In summary, it is best practice to know what programs are installed don your computer and to uninstall the ones that you don’t need anymore. It’s also good to know what ports and services are running on your PC.

Doing all of the steps above doesn’t mean that a virus or a hacker cannot get into your computer, but by not checking your system periodically for things that just “look weird”, you are simply asking for trouble.

In future articles we will discuss more topics that can help you keep your system and your data safer.

Ransomware's Next Move

Have we seen the true business impact of of ransomware yet, or has this just been a proof-of-concept? The recent news about WannaCrypt and Petya ransomware should not come as a surprise. The outbreaks are due not only to the ransomware’s ability to spread but also to mutate. While IT security teams identify, hunt, and remove specific variants of the ransomware, there may already be unknown mutated varieties lurking dormant and ready to execute. We expect stories like this will continue to pop up as organizations only hunt “known” threats after enough other organizations come across them. As shown in the graph below provided by Proofpoint Q1 2017 Quarterly Threat Report, there were 4.3x new ransomware variants in Q1 2017 than in Q1 2016!

Ransomware's Next Move

Polymorphic and mutating malware… yep, you read that right

EventTracker Security Center 8.3 includes just such a capability to combat modern ransomware and polymorphic and mutating malware. Dormant Malware Hunter is a new capability introduced by EventTracker. Modern malware, including ransomware, copies itself with different names and hashes to various folders, so that if the original is identified and removed, the clones remain ready to attack at a later time. Dormant Malware Hunter identifies hidden EXE and DLL files that have never executed, while exempting those found on a known safe files list. As a result, copies of malware can be removed from the network, preventing re-infection or propagation.

Such capability to hunt down these dormant and unknown threats allows IT security teams to fully cleanse their network of ransomware variants… even the ones not yet known to global threat intelligence feeds.

“Ransom-a-Retailer” may be cyber-criminals next game

Netsurion, also predicts the next wave of ransomware attacks could be retail and hospitality, and the impact could be crippling. Incidents like these that impacted Honda and Renault certainly impact the bottom-line by slowing production. But sales are still being made and orders fulfilled. Granted, they may have experienced a hiccup in efficiency. If these attackers turn their attention to the much-maligned POS system which frequents the headlines for credit card data theft, and choose to hold a retailer ransom by preventing them from making transactions with consumers, such retailers could bleed millions of dollars in lost revenue daily until they recover the function of the POS systems.

Black Friday 2017 may truly be a dark day

Consider things from the cyber-criminals point of view. They apparently have no problem hacking into a POS system and siphoning off credit card data for months undetected. I’ll forego naming the many brands victim of such breaches as I’m sure the incidents are already familiar to you. But here’s the thing… the going rate for stolen credit card data on the black market is in decline. A US credit card used to be able to fetch $20-30, but of late that data is falling closer to $5-10. Simple supply-and-demand – there’s too much stolen credit card data available!

What would prevent that same cyber-criminal from using those same infiltration tactics to deploy ransomware on the POS and within minutes, not months, have what they need. If a major retailer was unable to ring out a single consumer on Black Friday, the busiest brick-n-mortar shopping day of the year, what ransom would they be willing to pay? How many millions of revenue would they lose even if they recovered without paying the ransom?

To guard retailers from such harm before it becomes the “next big thing in ransomware”, EventTracker launched EventTracker Essentials in December 2016. The managed endpoint threat detection and response solution is unique in that it takes the appropriate set of capabilities from its enterprise SIEM and makes it logistically and economically practical to deploy to each and every POS system across every retail outlet.

IT security for franchise retailers is tougher than herding cats

In the more complex franchise-model space, retail and hospitality brands have the added challenge of wrangling thousands of storefronts owned by upwards of hundreds of different franchise owners running their own show. Without a proper solution that accounts for such complexity, securing a franchised brand from ransomware at these many vulnerability points (think X number of POS terminals multiplied by Y number of locations across multiple/separate franchise businesses) is like herding cats (still one of my favorite commercials of all time). Netsurion, however, has added a specially packaged version of EventTracker Essentials into its already leading managed network security, resilience and compliance service for merchants. The solution brings the same needed endpoint threat detection and response capability to the “edge” locations of the franchise merchants.

Here’s to hoping merchants of all shapes and sizes heed the prevalent warnings and evidence that POS systems are extremely vulnerable and a ransomware attack could be devastating. An ounce of prevention is worth a pound of cure!

How To Defend Against Threat Group Attacks

It’s no secret that cybersecurity threats are rising for organizations of all sizes and industries.  U.S. cybersecurity authorities like the CISA, NSA, and the FBI are aware of recent reports of increased malicious cyber activity and expect this trend to continue. Organizations face security gaps and weaknesses from a patchwork of IT products and tools with little visibility and a false sense of security. In addition to IT staff shortages, expanding attack surfaces like cloud computing and work-from-anywhere enable threat actors to expand their reach and damage. Cyber attackers have noticed these challenges and are vigilant to exploit them. A deeper understanding of attackers can help better detect and respond to these persistent threats.

What are Cyber Threat Groups

Cyber threat groups are attackers who operate in a coordinated and synchronized manner. These adversary groups continue to morph their behavior and Tactics, Techniques, and Procedures (TTPs) to evade detection. Threat group characteristics include organization, synchronization, well-trained and well-funded, patience to achieve their nefarious goals, and being part of a criminal ecosystem. As threat groups seemingly disappear or are taken down by global law enforcement, new groups with similar TTPs and ransomware tools reappear quickly.  

Types of Threat Groups  

Cyber crime groups behave like legitimate businesses with training, incentives, promotions, and customer support. Many threat groups have existed for years, honing their exploitation skills over time. There are three primary types of threat groups:

Types of Cyber Criminals
  1. Financially motivated attackers (FINs): These groups use threat vectors like phishing emails, ransomware, and click fraud to monetize their work. Cyber crime is extremely lucrative and relatively low risk. These financial attackers are patient, use “low and slow” techniques, and prey on human nature and social engineering to exploit victims. EXAMPLE: theft on the SWIFT financial network and Bank of Bangladesh has been attributed to REvil, also known as Sodinokibi and GandCrab.
  2. Nation-state adversaries (APTs): These well-funded attackers use espionage and cyber theft to exfiltrate sensitive information like intellectual property to advance the country’s goals and political agenda. If not actually a part of the government, they may garner complicit support in a permissive environment. Nation-state adversaries use Advanced Persistent Threats (APTs) for their nefarious activities, and they are known to lurk for many months to achieve their objectives. EXAMPLE: the Nobelium gang known as APT 29 is believed responsible for the SolarWinds attack aimed at disrupting thousands of unsuspecting victims.
  3. Hacktivists: While less frequent than financially motivated actors and nation-state adversaries, they nonetheless wreak havoc on businesses and governments. Hacktivists are motivated by political and social ideology and to promote unrest or public change. EXAMPLE: the attack on Sony Pictures as retribution to stop the release of a film unflattering to North Korea.

Tradecraft and motivations across financially minded adversaries and nation-state criminals are blurring. State governments use e-crime to fund government operations and bypass economic sanctions.

Threat Group Identification

It is challenging to identify an entity, organization, or country responsible for a specific adversary attack. Awareness and insight into threat group TTPs is helpful in better defending your infrastructure. Threat groups are often called by differing names across vendors, industry, and law enforcement, making it even more complicated to understand their motivations and tactics. APT 41, with its alleged ties to the Chinese Ministry of State (MSS), is also known as BARIUM and Wicked Spider. MITRE ATT&CK® is a knowledge base of adversary tactics based on real-world observations. The database also outlines threat groups and criminal gangs for practical security analysis and insight.

Dissect adversary behavior to strengthen defenses.

The MITRE Corporation

SMBs are Attractive Targets

Small-and-Medium-Sized Businesses (SMBs) may think they are too small to be targeted by attackers, but that is far from the truth. Cyber criminals target many businesses and SMBs may be targeted for their intellectual property, supply chain contacts, or perceived security weaknesses. Adversaries often use legitimate tools and services that evade detection, as our Security Operations Center uncovered. Attackers know that organizations large and small are focused on protecting their brand reputation and are likely to pay a cyber ransom. Stealthy and sophisticated attacks against service providers enable criminals to scale and achieve a larger ROI for their effort. So how can businesses understand well-funded threat groups and effectively protect themselves?

How You can Defend Against Adversaries and Stealthy Attacks

Here are some mitigation steps recommended by CISA to prevent, detect, and respond to suspicious security activity or possible incidents:

Threat Intelligence Reduces Your Attack Surface and Risk

Cyber criminals have a broad range of motives and methods, and their risks cannot be ignored.  Knowledge of these threat groups and their tradecraft reduces your likelihood of becoming a victim of a costly security incident. With cyber resiliency, businesses can better predict, prevent, detect, and respond to dynamic threats. Netsurion helps you predict, prevent, detect, and respond to adversary attacks with a managed open XDR solution. Comprehensive visibility and proactive threat hunting help shield you against stealthy threat actors.

Uncover C&C traffic to nip malware

In a recent webinar, we demonstrated techniques by which EventTracker monitors DNS logs to uncover attempts by malware to communicate with Command and Control (C&C) servers. Modern malware uses DNS to resolve algorithm generated domain names to find and communicate with C&C servers. These algorithms have improved by leaps and bounds since they were first see in Conficker.C. Early attempts were based on a fixed seed and so once the malware was caught, it could be decompiled to predict the domain names it would generate. The next improvement was to use the current time as a seed. Here again, once the malware is reverse engineered it’s possible to predict the domain names it will generate. Nowadays, the algorithms may use things like the current trending twitter topic as a seed to make prediction harder.

But hold on a second, you say – we don’t allow free access, we have installed a proxy with configuration and it will stop these attempts. Possibly. However, a study conducted between Sep 2015-Jan 2016 showed that less than 34% of outbound connection attempts to C&C infrastructure were blocked by firewalls or proxy servers. Said differently, more than 60% of the time an infected device successfully called out to a criminal operator.

Prevention technologies look for known threats. They examine inbound files and look for malware signatures. It’s more or less a one-time chance to stop the attacker from getting inside the network. Attackers have learned that time is their friend. Evasive malware attacks develop over time, allowing them to bypass prevention altogether. When no one is watching, the attack unfolds. Ultimately, an infected device will ‘phone home’ to a C&C server to receive instructions from the attacker.

DNS logs are a rich source of intelligence and bear close monitoring.

Catch Malware Hiding in WMI with Sysmon

By Randy Franklin Smith

Security is an ever-escalating arms race. The good guys have gotten better about monitoring the file system for artifacts of advanced threat actors. They in turn are avoiding the file system and burrowing deeper into Windows to find places to store their malware code and dependably trigger its execution in order to gain persistence between reboots.

For decades, the Run and RunOnce keys in the registry have been favorite bad-guy locations for persistence, but we know to monitor them using Windows auditing for sysmon. This is so that attackers in-the-know have moved on to WMI.

WMI is such a powerful area of Windows for good or evil. Indeed, the bad guys have found effective ways to hide and persist malware in WMI. In this article, I’ll show you a particularly sophisticated way to persist malware with WMI Event Filters and Consumers.

WMI allows you to link these two objects in order to execute a custom action whenever specified things happen in Windows. WMI Events are related to but more general than the events we all know and love in the event log. WMI Events include system startup, time intervals, program execution and many, many other things. You can define a __EventFilter which is basically a WQL query that specifies what events you want to catch in WMI. This is a permanent object saved in the WMI Repository. It’s passive until you create a consumer and link them with a binding. The WMI Event Consumer defines what the system should do with any events caught by the filter. There are different kinds of Event Consumers for action like running a script, executing a command line, sending an email, or writing to a log file. Finally, you link the filter and consumer with a __FilterToConsumerBinding. After saving the binding, everything is now active and whenever events matching the filter occur, they are fed to the consumer. 

So, how would an attacker cause his malware to start up each time Windows reboots? Just create a filter that catches some event that happens shortly after startup. Here’s what PowerSploit uses to for that purpose:
 

SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE
TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System' AND
TargetInstance.SystemUpTime >= 200 AND
TargetInstance.SystemUpTime < 320

Then you create a WMI Event Consumer which is another permanent object stored in the WMI Repository. Here’s some VB code adapted from mgeeky’s WMIPersistence.vbs script on Github. It’s incomplete, but edited for clarity.  If you want to play with this functionality refer to https://gist.github.com/mgeeky/d00ba855d2af73fd8d7446df0f64c25a:
 

Set objInstances2 = objService1.Get("CommandLineEventConsumer") 
Set consumer = objInstances2.Spawninstance_
consumer.name = “MyConsumer”
consumer.CommandLineTemplate = “c:badmalware.exe”
consumer.Put_

Now you have a filter that looks for when the system has recently started up, and a consumer which runs c:badmalware.exe but nothing happens until they are linked like this:
 

Set objInstances3 = objService1.Get("__FilterToConsumerBinding")
Set binding = objInstances3.Spawninstance_
binding.Filter = "__EventFilter.Name=""MyFilter"""
binding.Consumer = "CommandLineEventConsumer.Name=""MyConsumer"""
binding.Put_

At this point, you have a filter that looks for when the system has recently started up and a consumer which runs c:badmalware.exe.

As a good guy (or girl), how do you catch something like this? There are no events in the Windows Security Log, but thankfully Sysmon 6.10 added three new events for catching WMI Filter and Consumer Activity as well as the binding which makes them active.
 

Sysmon Event ID Example
19 - WmiEventFilter activity detected WmiEventFilter activity detected:
EventType: WmiFilterEvent
UtcTime: 2018-04-11 16:26:16.327
Operation: Created
User: LABrsmith
EventNamespace:  "rootcimv2"
Name:  "MyFilter"
Query:  "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System' AND TargetInstance.SystemUpTime >= 200 AND TargetInstance.SystemUpTime < 320"
20 - WmiEventConsumer activity detected WmiEventConsumer activity detected:
EventType: WmiConsumerEvent
UtcTime: 2018-04-11 16:26:16.360
Operation: Created
User: LABrsmith
Name:  "MyConsumer"
Type: Command Line
Destination:  "c:badmalware.exe "
21 - WmiEventConsumerToFilter activity detected WmiEventConsumerToFilter activity detected:
EventType: WmiBindingEvent
UtcTime: 2018-04-11 16:27:02.565
Operation: Created
User: LABrsmith
Consumer:  "CommandLineEventConsumer.Name="MyConsumer""
Filter:  "__EventFilter.Name="MyFilter""

 
As you can see, the events provide full details so that you analyze the WMI Operations to determine if they are legitimate or malicious. From event ID 19 I can see that the filter is looking for system startup.  Event Id 20 shows me the name of the program that executes, and I can see from event ID 21 they are linked.

If you add these events to your monitoring you’ll want to analyze activity for a while in order to whitelist the regular, legitimate producers of these events in your particular environment. 

That’s persistence via WMI for you, but you might have noted that we are not file-less at this point; my malware is just a conventional exe in c:bad. To stay off the file system, bad guys have resorted to creating new WMI classes and storing their logic in a PowerShell script in a property on that class. Then they set up a filter that kicks off a short PowerShell command that retrieves their larger code from the custom WMI Class and calls. Usually this is combined with some obfuscation like base64 encoding and maybe encryption too.

The Perils of Using Remote Access Software

Network Security Basic Training Series: Remote Access

In the last article of the Network Security Basic Training Series, we covered how patching is important and necessary to the security of your business.

In our latest installment we talk about the Perils of Using Remote Access Software.

While software that can be installed on your PC and used to remotely connect when you are away from your home office can be very handy, it also comes with risks that may not be apparent at first.

Various products exist to allow you to access your computers remotely, including TeamViewer, GoToMyPC, AAA PC Remote Control Software and several others. If not setup properly and securely, many of these products can leave your PC open to external hackers or malware that could potentially get into your PC without your knowledge— and possibly steal your data or do damage to your system.

One of the main issues with any product like this is that many use a password to protect the remote capabilities, and some users choose to re-use passwords that they use for other systems including bank accounts, social media accounts, etc.

Most recently – there is a great deal of press about the issues over at TeamViewer. According to a recent CSO Magazine article:

“Several TeamViewer users have reported unauthorized access over the last few days, leading some to suspect that the remote connection company has been hacked. The unauthorized access reports started showing up on Reddit around the same time that the company suffered possible DNS issues that triggered an outage lasting for several hours.”

A response from TeamViewer stated:

“TeamViewer experienced a service outage on Wednesday, June 1, 2016. The outage was caused by a denial-of-service attack (DoS) aimed at the TeamViewer DNS-Server infrastructure. TeamViewer immediately responded to fix the issue to bring all services back up.”

What is not completely known yet is how this reported DNS outage for TeamViewer may have affected the users of the product (if at all), and if this incident is related at all to the reports from users having their information and accounts compromised.

TeamViewer had a very similar issue to the most recent incident that occurred to GoToMyPC who has been the target of a password attack. This only shows how important passwords should be.

Passwords for such applications should be strong, unique and not used elsewhere.

Here's what you can do to protect yourself from these incidents:

If you use any remote access software on your computer, you should immediately check the security of how it is setup. First and foremost, if you no longer need to use the remote access software, then remove it.

If you are unsure if it has been setup securely or not – then remove it you can consult with someone that can help you get it setup securely.

If you have to continue to use the remote access features, then you should be sure that any passwords you may be using are unique and very strong and that you are not using the same password for any other systems or accounts.

I don’t use remote access software at home, but it is used at my company – so how can I protect my company?

If your company uses remote access software for vendors or employees, it should be secured and very restricted to only those users that absolutely need to use this method of connection. Remote capabilities should be reviewed at least annually to ensure that orphaned accounts do not remain.

Another thing that you can do to protect other users at your company and your corporate data is to ensure that you have a good managed firewall in place and that activity through your network is monitored for unusual activity. The last thing you need is to have a hacker or rogue employee with remote access to your network and private data without that activity being detected.

Incidents like this should hopefully be shut down before any damage can be done.

Managed network security firms such as Netsurion can secure your company network and ensure that things like remote access software are not even allowed through the firewall and, therefore, not able to be used as an access point into your computer and your company’s sensitive data.

They can also monitor other activity that is allowed in and out of your network to ensure that no suspicious issues are seen and not responded to.

The Bottom Line?

The bottom line is this – if you don’t need to have remote access software on your computer, then take it off and don’t use it. If you do have to use it – be sure that it is set up securely and that the activity for that program is somehow logged and monitored.

The Bite Behind the Bark: Enforcement Power of GDPR

There’s an old saying: Their bark is worse than their bite. However, this is not the case with the penalties of non-compliance when it comes to the General Data Protection Regulation (GDPR).

With the enforcement date of the GDPR having passed on May 25, 2018, any company not in compliance could be in for a very nasty shock. And remember, GDPR is not limited to European Union (EU) businesses. Any entities processing the personal data of EU citizens have to comply. This impacts mostly any website today as well.

So, what is personal data in the GDPR world?

It’s things like tracking IP addresses, geographic data, and basically any information relating to an identified or identifiable person.

Ignorance does not equal compliance and GDPR is sure to make its “bite” felt for non-compliance. GDPR even recommends that businesses employ a privacy officer, as there is no more hiding behind a vendor or consultancy. This goes for small- and medium-size businesses (SMBs) as well as large global organizations. The penalties of non-compliance and the new power given to data protection authorities makes enforcement of these regulations the key to ensuring these rules get followed.

The Bark Heard Around the World

The scope of GDPR positions the EU as a leader in data protection, so don’t be surprised if other countries follow suit. Under GDPR, should a company of any size fall short of compliance, financial penalties abound…which is the bite that could bring an SMB to its knees.

If you process sensitive data on a large scale (like some social media platforms for example), you might have to appoint a data protection officer. Some large organizations are forming huge cross-functional teams to support GDPR compliance. This might include leaders from areas like product/services, UX/UI, policy, and legal.

Imagine the financial impact of any organization trying to pull resources to dedicate to this one mandate? Any way you slice it, businesses collecting consumer information through online tracking, which is a given nowadays, will need to comply – which impacts sea to shining sea.

The Data Breach Bite

With no lack of data breaches on the horizon, a big GDPR focus is around security and data breach. The EU is doing what the U.S. hasn’t been able to do yet – set a universal standard for breach disclosures, which include:

Backed by fines that are sure to hurt, GDPR unleashes the fury on sloppy security which could not only cost reputation harm, but really hurt the bottom line, or perhaps bottom out an SME altogether. Some factors that play into substantial fines might be:

If your answers to these questions find that the issue arose from technical problems or lack of reporting, fines can reach up to 2% of revenue from the prior year. However, if the issue is found to be a general lack of compliance with key parts of the GDPR regulation, the fines rise to 4% of revenue from the prior year.

So, what are some of the issues that could lead to the higher fines?

Sending personal data to “third countries” or international organizations that don’t provide proper data protection, or not adhering to the principles of processing personal data can lead to these larger fines. As you can imagine, some of these companies have annual revenues in the tens of billions, so the fines are substantial.

Add to that the image blow a business takes when found to have been breached, and the revenue hit becomes even larger.

For over a year now, the GDPR’s bark has certainly been heard. And now that the compliance date has come and gone, companies will soon find out that the bite for non-compliance can really hurt. What can you do now?

Visit our contact page to learn more about what needs to be done and how to protect your company.

References

GDPREU.org
TechCrunch

Security Signals Everywhere: Finding the Real Crisis in a World of Noise

Imagine dealing with a silent, but mentally grating barrage of security alerts every day. The security analyst’s dilemma? They either need to cast nets wide enough to identify all potential security incidents, or laser-focus on a few and risk missing an important attack.

A recent Cisco study covered in CSO found that 44 percent of security operations managers saw more than 5,000 security alerts a day. As a consequence, they can only investigate half of the alerts they receive every day, and follow up on less than half of alerts deemed legitimate. VentureBeat says the problem is far worse. Just 5 percent of alerts are investigated due to the time and complexity of completing preliminary investigations.

The CSO article recommends better filtering to reduce threat fatigue, while focusing efforts on the most important risks to a company’s industry and business. These are great suggestions. However, in a world of exploding risks, you need a dedicated team of experts on point 24/7, while deploying technology to stay ahead of the threat landscape.

This is all very cumbersome and expensive. Even the largest companies in the world may not have this level of resources. That is where a tailored, affordable managed threat detection and response or co-managed SIEM comes into play. Here’s why co-managed SIEM is better than a DIY scenario for the digital transformation era:
 

  1. A dedicated SWAT team for security – You may have great analysts, but they’re stretched and may be tired. Expand their reach with a team of external experts who can partner on calibrating and monitoring security services, follow up on alerts, and augment your team when you need more resources due to business growth, staff departures, or an inability to hire enough experts.
  2. – It’s challenging to optimize processes when you’re constantly fighting fires. Leave that work to your partner. EventTracker’s Security Operations Center, for example, is ISO/IEC 27001-certified, and we have to work hard to maintain that certification by continually improving our information management systems for our clients.
  3. – Self-managing a SIEM solution can be expensive and difficult. Co-management is on the rise and expected to grow five-fold by 2020. EventTracker’s SIEMphonic platform provides all the managed security services you need, including SIEM and log management, threat detection and response, vulnerability assessment, user behavior analysis, and compliance management. It collects data from a variety of sources, including your platform, application and network logs; alerts from intrusion detection systems; and vulnerability scans and analyzes it all.  In addition, our HoneyNet deception technology uses virtualized decoys throughout your network to lure bad actors and sniff out attacks.

If you’re concerned about the rise of risks, you should be. Your information security team has great expertise and skills – but it’s probably time to extend their reach.
 
Empower your company with co-managed SIEM and hone in on the real crises, despite a world of noise. Get managed security service today.

Renew Focus on Web Application Security

Today’s always-on digital businesses and service providers rely on web applications and APIs to fuel growth, run eCommerce sites and customer portals, and engage 24/7 with customers. Cyber criminals are also targeting these public-facing assets for monetary gain or to make a political statement. In fact, 43% of data breaches have been tied to web application vulnerabilities, highlighting the importance of understanding and protecting these business-critical assets. Managed Service Providers (MSPs) must also make protecting web applications a key priority.

This article outlines software security best practices as well as web application importance, the implications of security gaps, and the challenges and best practices for protecting web applications. 

Insight on Web Applications

A web application or “web app” runs on a web server with user access via a web browser. Examples of web apps include online forms, eCommerce shopping carts, email programs, collaboration software, and business tools like Microsoft 365 and Google Workspace. Web application protection involves incorporating security measures during the software development cycle and not bolting it on as an afterthought. Users of third-party software must also maintain defenses against malicious web attacks within their MSP businesses and customer operations, with vulnerability scanning and comprehensive patch management. Legacy tools like Web Application Firewalls (WAFs) are a good foundation but are no longer sufficient against modern cyber criminals who are persistent and well-funded. Web apps can collect personally identifiable information (PII), use login credentials that cyber criminals can exploit to elevate privileged access, or serve as an entry point to valuable data for ransomware exfiltration.

Attacks on Web Apps are Rising

The volume of web applications in use is skyrocketing as organizations look to increase customer and citizen engagement, and 24/7 access to web portals and tools. This pervasive use of web apps makes them a tempting target for cyber criminals. Web attacks can be used by financially-motivated or politically-led attackers for either monetary gain or to deface a website for a visible statement. The rise in web application use and acceleration of software development cycles has also led to more human errors that can create unintended security gaps. Finally, Ransomware-as-a-Service (RaaS) has made more advanced tools and TTPs (tactics, techniques, and procedures) available to less sophisticated cyber criminals in the underground ecosystem.

Web Apps Can Create Risk

The average business has hundreds of software applications in use, creating IT complexity to maintain over time. Besides lost revenue, you and your customers can experience tarnished brand reputation, decreased revenue, compliance fines, as well as customer dissatisfaction and even defections surrounding web app attacks.

blog renew focus 11

Ensure your digital transformation initiatives are backed with web application security to reduce risk, maintain resilience, and evade cyber criminals.

Leverage Best Practices in the OWASP Top 10

The Open Web Application Security Project (OWASP) Foundation is a not-for-profit organization that guides the development and maintenance of security software applications and trusted APIs. A real-world list of software threats called the OWASP Top 10 outlines often-exploited software gaps based on data analytics and the expertise of software and cybersecurity industry professionals.

blog renew focus 21

Comprehensive vulnerability management that includes OWASP coverage is the foundation of proactive cybersecurity, moving beyond legacy tools like WAFs.

A Layered Defense to Business Enablement

Business-critical web servers and online applications are driving digital transformation as well as customer and citizen engagement. Web applications will continue to be an attractive threat vector for cyber criminals. In addition to OWASP best practices, advice for web app security across your entire organization and customer base includes:

A multi-layered security strategy includes the staff, processes, and technology to defend against web app attacks and dangerous cybersecurity threats. Netsurion Managed Threat Protection is comprehensive cybersecurity for today’s relentless attackers who start with the easy payoff of unpatched systems and known vulnerabilities.

SIEMpocalypse?

Did you know that Microsoft is a security vendor? No, it’s true. For years, the company was hammered by negative public perception and the butt of jokes around the 2002 "trustworthy computing" memo. The company has steadily invested in developing a security mindset and the product results are now more visible to the public. Noteworthy announcements include Windows-as-a-service designed to updated the core operating system against ever-evolving threats and more recently, the beta test of Azure Sentinel billed as a cloud-based SIEM (security information and event management) platform.
 
What does it all mean to the buyer of SIEM and EDR (endpoint detection and response) platforms? Well, for one thing, it surely means a significant competitor. Buyers who gravitate towards platform buys and can self-serve their security needs will now have a new option. In the EDR space, this means those considering big-name vendors such as Carbon Black, SentinelOne, Tanium, and the like, will begin evaluating Windows Defender ATP. 
 
In a similar vein, the Azure Sentinel platform takes aim at big-name standalone SIEM vendors such as IBM QRadar, Micro Focus ArcSight, Exabeam, and LogRhythm. If you were able to mount a defense of your network using such high-end solutions, why then there is yet another platform to consider.
 
But wait, is the real problem the lack of a scalable cloud-based platform? Notice platform has been in italics throughout the article. Is the lack of a scalable, cloud-based platform the main obstacle to better security for the typical business? Not really. If you gave away a free license to any of these big-name products to a typical MSP (managed service provider) or medium-sized enterprise, it still wouldn't improve security much and wouldn't generate the hoped-for outcome. You know why, it’s mad skillz and process discipline along with scalable, preferably hosted technology, that is needed. And of course, the global IT security skill shortage affects everyone, MSP and end-buyer alike.
 
Recognizing this core problem many years back, EventTracker introduced Enterprise for the Enterprise and Essentials for the MSP. This month, we introduced EventTracker EDR, a managed service built on the same technology and services foundation. Hosted in a U.S. datacenter plus mad skillz delivered from a 24/7, ISO 27001 certified SOC (security operations center). Everything we do is based on our core concept that repeatable, consistent, scalable security outcomes are only possible when you meld best-in-class technology with disciplined subject matter experts.
 
So, do you want to buy more technology? Or do you want outcomes?
 
P.S. The recent S-1 filing by Lyft says: "We believe that the world is at the beginning of a shift away from car ownership to Transportation-as-a-Service or TaaS. Lyft is at the forefront of this massive societal change. Car ownership has economically burdened consumers. U.S. households spend more on transportation than on any expenditure, other than housing. On a per household basis, the average annual spend on transportation is over $9,500, with the substantial majority spent on car ownership and operation.

Now substitute car ownership in the above paragraph with SIEM or EDR ownership. The as-a-service concept is here to stay.

P.P.S. The filing also says: "The average cost of a new vehicle in the United States has increased to over $33,000, which most American households cannot afford."

Is that your situation with SIEM and EDR technology? If so, relief is at hand. Learn more about our Zero to SOC approach to co-managed security.

Looking back: Operation Buckshot Yankee & agent.btz

It was the fall of 2008. A variant of a three year old relatively benign worm began infecting U.S. military networks via thumb drives.

Deputy Defense Secretary William Lynn wrote nearly two years later that the patient zero was traced to an infected flash drive that was inserted into a U.S. military laptop at a base in the Middle East. The flash drive’s malicious computer code uploaded itself onto a network run by the U.S. Central Command. That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control. It was a network administrator’s worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary.

The worm, dubbed agent.btz, caused the military’s network administrators major headaches. It took the Pentagon nearly 14 months of stop and go effort to clean out the worm — a process the military called Operation Buckshot Yankee. It was so hard to do that it led to a major reorganization of the information defenses of the armed forces, ultimately causing the new Cyber Command to come into being.

So what was agent.btz? It was a variant of the SillyFDC worm that copies itself from removable drive to computer and back to drive again. Depending on how the worm is configured, it has the ability to scan computers for data, open backdoors, and send through those backdoors to a remote command and control server.

To keep it from spreading across a network, the Pentagon banned thumb drives and the like from November 2008 to February 2010. You could also disable Windows’ “autorun” feature, which instantly starts any program loaded on a drive.

As Noah Shachtman noted, the havoc caused by agent.btz has little to do with the worm’s complexity or maliciousness — and everything to do with the military’s inability to cope with even a minor threat. “Exactly how much information was grabbed, whether it got out, and who got it — that was all unclear,” says an officer who participated in the operation. “The scary part was how fast it spread, and how hard it was to respond.”

Gen. Kevin Chilton of U.S. Strategic Command said, “I asked simple questions like how many computers do we have on the network in various flavor, what’s their configuration, and I couldn’t get an answer in over a month.” As a result, network defense has become a top-tier issue in the armed forces. “A year ago, cyberspace was not commanders’ business. Cyberspace was the sys-admin guy’s business or someone in your outer office when there’s a problem with machines business,” Chilton noted. “Today, we’ve seen the results of this command level focus, senior level focus.”

What can you learn from Operation Buckshot Yankee?
a) That denial is not a river in Egypt
b) There are well known ways to minimize (but not eliminate) threats
c) It requires command level, senior level focus; this is not a sys-admin business

What is EDR and Why It is Critical to SMB Security?

The Current Threat Landscape and Endpoint Security   

Over 7 billion global devices in an always on and continuously connected world create a soft target for today’s attacker. Whether working to monetize data or make a political statement, adversaries are well funded and staffed in the battle for endpoint access and control. Traditional endpoint security methods such as anti-virus software are no match for the growing sophistication and volume of advanced threats found in the current threat landscape. According to the Ponemon Institute, over 52% of businesses have experienced a security incident that has bypassed traditional defenses. Modern cybersecurity threats evade signature-based detection and are useless against advanced threats such as insider risks, zero-day attacks, and file-less malware. This growing security gap is the catalyst for Endpoint Detection and Response solutions.

What is EDR?

Data breaches take an average of 197 days to be uncovered, and organizations often receive notification via law enforcement or card holder merchant services instead of detecting the breach themselves. Reducing the time attackers spend in an organization – called dwell time – and detecting incidents sooner can have a dramatic improvement in data breach costs and protecting brand reputation. Gartner Research defines Endpoint Detection and Response (EDR) solutions as those that record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems. There are usually two product approaches to EDR: self-managed EDR software or a managed service. Organizations of all sizes and verticals are embracing EDR and anomaly detection as a crucial way to prevent, detect, respond to, and predict cybersecurity attacks. In addition, Gartner Research is forecasting a 3x increase in EDR adoption through 2020.

What Are Considered Critical EDR Capabilities?

The EDR market is still evolving with solutions and providers varying widely in features and scope. However, the majority of EDR solutions encompass these five primary capabilities:

What is EDR and Why It is Critical to SMB Security?

From insights into unfolding endpoint attacks to root cause analysis and blocking of actual threats, rapid detection is essential to stop threats early. While many small and mid-sized businesses (SMBs) understand the need for better security effectiveness, they may not be familiar with all the options for advanced threat detection or know where to start. All too often, overworked IT teams opt to re-image a laptop without a full investigation into root cause and a forensic investigation of the scope of the compromise. The result? A loop of re-compromise as the adversary capitalizes on systemic weaknesses in people, processes, and technology that negatively impacts business resiliency.

What Limitations Exist with Traditional Anti-Virus Security?

Anti-virus (AV) software is one traditional security tool that relies on an ever-growing library of signature-based recognition. Attackers adapt to the evolving threat landscape by changing and mutating their tactics, often reverse engineering anti-virus tools to learn how to bypass detection, according to “Endpoint Protection and Response: a SANS Survey” from June 2018. With the disclosure of more and more data breaches, SMBs realize that anti-virus software has some sizable drawbacks. Some anti-virus limitations include:

While anti-virus and next-gen anti-virus (NGAV) tools offer some level of protection, layered security defenses are needed to mitigate stealthy and mutating threats. Endpoint detection and response (EDR) is one such approach. Organizations can accelerate cybersecurity effectiveness when integrating EDR and security information and event management (SIEM), all with a managed service and 24/7 security operations center (SOC). These three components, when properly integrated and managed, provide a SMB with powerful and efficient advanced threat protection.

Conclusion

Security incidents are inevitable. Organizations of all sizes must also adapt to the changing threat landscape and further invest in detection and response capabilities.  With their finite IT and security teams and resources, SMB organizations must focus on reducing the attack surface that makes them vulnerable to attackers and enabling integrated solutions such as co-managed SIEM and managed EDR service that provide defense-in-depth security.

Tracking Physical Presence with the Windows Security Log

How do you figure out when someone was actually logged onto their PC?  By “logged onto” I mean, physically present and interacting with their computer. The data is there in the security log, but it’s so much harder than you’d think.

First of all, while I said it’s in the security log, I didn’t say which one. The bad news is, it isn’t in the domain controller log.  Domain controllers know when you logon, but they don’t know when you logoff. This is because domain controllers just handle initial authentication to the domain and subsequent authentications to each computer on the network. These are reflected as Kerberos events for Ticket-Granting Tickets and Service Tickets, respectively. But domain controllers are not contacted and have no knowledge of when you logoff – at all.  In fact, look at the events under the Account Logon audit policy subcategory. These are the key domain controller events that are generated when a user logs on with a domain account. As you can see, there is no logoff event. That event it only logged by the Logoff subcategory.

And really, the whole concept of a discreet session with a logon and logoff has disappeared.  You may remain “logged on” to your PC for days, if not weeks.  So the real question is not, “Was Bob logged in?” It’s more about, “Was Bob physically present, interacting with the PC?”  To answer this, you have to look at much more than simple logon/logoff events, which may be separated by long periods of time during which Bob is anywhere but at his computer.

Physical presence auditing requires looking at all the events between logon and logoff, such as when the console locks, the computer sleeps and screen saver events.

Logon session auditing isn’t just a curious technical challenge. At every tradeshow and conference I go to, people come to me with various security and compliance requirements where they need this capability. In fact, one of the cases that I was consulted as an expert witness centered around the interpretation of logon events for session auditing.

The absolute only way to track actual logon sessions is to go to the workstation’s security log. There you need to enable 3 audit subcategories:

  1. Logon
  2. Logoff
  3. Other Logon/Logoff

Together, these 3 categories log 9 different events relevant to our topic:

But how do you correlate these events? Because that’s what it’s all about when it comes to figuring out logon sessions. It is by no means a cakewalk.  Matching these events is like sequencing DNA, but the information is there.  The best thing to do is experiment for yourself.  Enable the 3 audit policies above and then logon, wait for your screen saver to kick in, dismiss the screen saver, lock the console as though you are walking away and then unlock it.  Allow the computer to sleep. Wake it back up.

As you can see, there is some overlap among the above events. What you have to do is –between a given logon/logoff event pair (linked by Logon ID) — identity the time periods within that session where the user was not present as a result of:

And count any session as ending if you see:

As you can see, the information is there. But you have to collect it, and that is a challenge for most organization because of the sheer number of workstations. SIEM solutions like EventTracker automate this for you whether by remote event collection, which can be practical in some cases, or with the more feasible end-point agent.

Universal Plug and Play - New Report on an Old Problem

In the dark ages of personal computers (1980′s and 90′s), you either needed to be a computer geek or have access to one if you wanted any device to work with your computer.

You had to go through a complicated driver installation process, and possibly replace system files.

If someone who was used to the process of adding a network card to a system today looked at the process of how to do it in 1989, they would swear that the early computer user was practicing witchcraft.

Today, when you plug something into your computer it lets you know that it detected something and can either use the default driver (assuming one exists), or you can choose your own. My how the world has changed.

The technology that allows this type of communication between devices is known as Universal Plug and Play (UPnP). It was designed to allow devices on the same network to communicate to each other and for systems to control aspects of each other without over complicating the process. It makes adding devices to a network much more convenient, but convenience and security are always diametrically opposed.

In other words, unlimited (and poorly patched) UPnP devices are ripe feeding grounds for computer hackers who want into you system.

In a recent report made by Rapid 7, a Internet security firm, there are approximately 40-50 million devices exposed to the Internet with a host of UPnP vulnerabilities. The real issue is that UPnP was never designed to be exposed to the Internet and security was never a consideration in its design.

On top of that, early versions of it were easy to infiltrate and force the affected devices to run malicious code. Several current devices are still running the vulnerable version of UPnP because their manufacturers did not update the code on their hardware.

Since this blog focuses on the security of retailers, why am I including this report?

The simple answer is that if you are running a switch, printer, router, or other device that is UPnP enabled, you are potentially exposing your network to computer hackers. If you take credit cards, and have to comply with PCI, then section 6 (which asks about applying security patches), and section 11 (which includes internal vulnerability scans and penetration testing) become much more critical if you have UPnP devices on your network.

The first vulnerability I personally ever read about on UPnP was exposed in 2001. 12 years later, and not much has changed on this front. UPnP should not be enabled if you are concerned about security.

If you must use it because of how your network is put together or managed, than at least know that you are running the latest versions of the technology that are less vulnerable to attacks. If you are unsure of where you stand, find a modern day geek (or at least your technology provider) and ask.

The Impact Of A Data Breach

What is the true cost of a data breach? A data breach affects your business, brand, and reputation. But it can be prevented.

Threat Hunting: Five Myths for MSPs to Overcome

Threat hunting is gaining traction as businesses look for more proactive methods to combat multi-stage ransomware attacks and devious “low and slow” hackers. Threat hunting complements threat detection and response to provide a more comprehensive and layered approach. Many managed service providers (MSPs) actively seek ways to become proactive and offer guided remediation that actively stops and blocks threats. The lack of staff and skills, along with unfamiliarity with threat hunting processes and techniques, can all inhibit adoption.  

With a better understanding of what truly is threat hunting and identifying common misconceptions of threat hunting, you’ll be set to successfully add it to your cybersecurity services portfolio.

What is Threat Hunting

Threat hunting can uncover threats you might otherwise not discover until a data breach is found, often months later. Threat hunting is the process of proactively and iteratively searching to detect and isolate advanced threats that evade existing security solutions. This proactive defense creates a rapid response before attackers change their methods or escape detection.

Threat Hunting Advantages

In addition to reducing risk, proactive threat hunting offers benefits to MSPs and their end-customers. These advantages include the ability to:

MSP Overcome

MSPs should also serve as cybersecurity role models to implement threat hunting for early threat detection and cyber resilience in their organizations. 

Misconceptions About Threat Hunting

Here are some real-world insights from Netsurion Security Operations Center (SOC) analysts to separate threat hunting myths from reality:  

Myth # 1: Threat hunting can be fully automated. Artificial Intelligence (AI) is all the rage, and companies are in overdrive to exploit the term. The reality is that the analytical nature of the threat hunting process prevents it from being fully automated. Humans will always be needed as part of the cybersecurity process to identify cyber criminals who mutate their tactics, techniques, and procedures (TTPs) to evade automated detection. However, the data collection and threat context enrichment steps can often be enhanced and accelerated with automation.

Myth # 2: Anyone can hunt. The best hunters are curious and passionate people who understand the ever-changing threat landscape. They use this expertise to tailor threat hunting for customer environments, industries, and risks. Indeed, formulating the correct question is the critical first step for cyber analysts in hunting. It also involves looking for suspicious behavior that automated tools alone won’t uncover. Most organizations lack threat hunting proficiency, so Netsurion includes threat hunting as an integral capability of its managed solution.   

Myth # 3: Threat hunting is the same as penetration testing. These two security practices have different objectives. A penetration test is an authorized attempt to hack and gain access to an organization's data assets while acting as a malicious external actor. Its purpose is to identify exploits for a rapid threat response before any potential cyber attack. On the other hand, human-led threat hunting identifies threats (potential or ongoing) that penetration tests may not have picked up internally.

Myth # 4: Threat hunting always finds malware or attackers. More often than not, threat hunting will find more policy violations and misconfiguration than any malware or cyber criminals. Such detections are highly valuable and actionable, and addressing them reduces noise. Eventually, though, threat hunting will uncover evil.

Myth # 5: Threat hunters spend most of their time hunting. Surprise! A lot of a threat hunter’s time isn’t spent threat hunting but preparing the hunt plan. These steps can include research and testing as well as approvals, developing documentation, or educating network owners that adding a new log source is truly necessary. Post-hunt tasks include documenting results, presenting findings, and building threat detection content and playbooks for the SOC. A hunter spends less time in an actual threat hunt and more time preparing before and after the real threat hunt itself.

A Way Forward

MSSPs are seeing an uptick in demand for threat hunting by their customers. The rise in ransomware and public scrutiny regarding cybersecurity incidents has fostered a need for proactive adversary detection and response. As you explore ways to offer threat hunting to your customer base, look for master managed security service providers who build these hunt capabilities into their solutions to do the heavy-lifting behind the scenes. Netsurion Managed Threat Protection predicts, prevents, detects, and responds to advanced threats to stay ahead of cyber criminals when every minute matters.

Six Simple Rules For Safe Credit Card Handling

Let's face it, it's becoming more and more frequent to read about credit card data breaches in the news these days.

Unfortunately, what is not touched on as frequently as the numerous electronic threats are the physical security issues present in restaurant and retail establishments.

Netsurion's CEO Kevin Watson posted a blog in January 2015 listing Five Steps to Protect Retailers from Credit Card Theft. To follow up on the information presented in that article, we want to provide additional knowledge that retailers can utilize in protecting themselves from credit card theft.

Why is Safe Credit Card Handling Important?

We are, and have been, rapidly migrating toward a cashless society. Consumers today expect and deserve to feel safe and secure when presenting credit cards during transactions.

Therefore a certain social as well as business obligation exists for restaurants, retailers, and other businesses to respect the personal data of consumers. This extends to the employees that represent those businesses, as well.

So without further hesitation, here are Netsurion's Six Simple Rules For Safe Credit Card Handling.

Six Simple Rules for Safe Credit Card Handling Procedures

Six Simple Rules For Safe Credit Card Handling

 

BONUS: Free Credit Card Handling Video

Restaurants and retail establishments post the highest turnover rates, with each employee costing employers up to $3,000 or more to train. With such high turnover rates and costs associated with training employees, any and all free training should be a welcome resource in assisting with securing and running a business.

Netsurion offers employers a free Safe Credit Card Handling Video, complete with a confirmation to indicate that the employee has viewed and completed the video in its entirety.

After viewing the video, one should find it to be comprehensive enough for all employees involved, from part-time employees to managers and owners alike. Employees benefit greatly, and could be enticed to study the video. This training may be added to an application as a skillset, increasing an employee's odds of being hired, making a higher wage, and being more desired as an employee trained in safe credit card handling procedures.

Owners can benefit by reducing the ever-increasing credit card data threat to their business.

PCI 3.0 Is Coming - Are You Ready?

Every 3 years the Payment Card Industry Data Security Standard (PCI) is updated to a new version. The time for the next release is right around the corner.

Version 2.0 will be replaced by PCI 3.0 in just a few weeks, and the question you need to ask yourself is:

Are you prepared for PCI 3.0?

Starting on January 1, 2014, you will be able to apply the new standard to your business and comply with all that it contains, but if there are elements in the new version of PCI 3.0 that you cannot meet, all hope is not lost. You can continue to validate your compliance to version 2.0 of the PCI Standard for all of 2014 if you so choose.

In other words, next year you can pick to comply with either PCI 2.0 or PCI 3.0.

When the standard is released it is understood that you might have to change your operations in order to meet the new version, so you are given a year to make those adjustments.

But wait, there's more!

There is more good news if you want to look at the new standard.

From the perspective of the merchant, the new standard (at least the draft version we were able to preview before the official release) does not look significantly different from the previous one. More information is required from the network diagram, and the penetration testing requirement has more guidance, but there are few substantive changes.

On the other hand, service providers (those who can affect the security of a merchant like a POS provider or a web hosting provider) will need to provide more information to the merchants who are working on PCI compliance under PCI 3.0.

The standard expects more due diligence focused on how a service provider affects the security of the merchant who is taking credit cards. This is probably the greatest difference between 2.0 and PCI 3.0, and it will be interesting to see how this plays out in the future.

It is important to remember the PCI is the minimum security that a merchant should put into place so that their customers’ credit cards are protected. Security should be viewed as any other company policy – you always need to run your business in a certain manner, not just during your validation efforts.

If you integrate security into your regular business practices first, then you will find that PCI will naturally follow.

Logs vs Bots and Malware Today

Despite the fact that security industry has been fighting malicious software – viruses, worms, spyware, bots and other malware since the late 1980s, malware still represents one of the key threat factors for organizations today. While silly viruses of the 1990s and noisy worms (Blaster, Slammer, etc.) of the early 2000’s have been replaced by commercial bots and so-called “advanced persistent threats,” the malware fight rages on.

In this month’s newsletter article, we take a look at using log data to understand and fight malicious software in your organization.

The first question we have to address is why are we even talking about using logs in this context when we have had dedicated “anti-virus” security software for nearly 30 years? One of the dirty secrets of the security industry is that the effectiveness of traditional anti-virus software has been dropping over the last few years. The estimates place anti-virus software effectiveness at 30 percent to 50 percent at best – which means that 50 percent to 70 percent of malicious software present on today’s computers is not detected automatically by leading anti-virus tools. Even such widely disputed estimates are hotly debated, as there is no single consistent methodology for testing antivirus software. Whatever the estimates, heavily customized malware will almost always be missed, and therefore needs to be detected using other means. Such malware has become much more common now that criminals have found a lucrative business in stealing bank credentials, card numbers, and other valuable information from consumers and businesses alike.

As a result, other technologies have to step in to help antivirus tools in their mission: stopping the spread of malicious software. Log data provides information about system and network activities that can be used to look for machines behaving “under the influence” of malicious software.

Logs to Fight Malware

So, how can we use logs to fight malicious software?

Let’s start with firewall logs. They can help reveal connectivity patterns from the network to the outside world, serving as proof that one system connected (in case of a successful connection message) or tried to connect (in case of a failed or blocked connection log messages) to another system. This is very useful to establish the path of the malware within your organization’s infrastructure – from the initial infection to the subsequent spreading of that infection.

Along the same lines, firewall logs and network flow data can serve as proof of a lack of connectivity: firewall blocking connections not followed by a successful attempt prove that the malware was unable to connect outside to its “headquarters” and sensitive data was most likely not stolen after being acquired by the malware. These logs are vital, and provide very useful information while assessing the cost and impact of a malware incident – assuming your firewall logs are being collected by your log management tool.

Logs can also help you detect malware initiated scans – combining multiple hits on the firewall into a single pattern – a scan – gives us the information about malware spread and reconnaissance activities. SIEM tools can create alerts upon seeing such a pattern in logs. Typically, if you see a scan by an internal system that hits (or tries to hit) a large number of external systems, you have an infected system inside your perimeter. On the other hand, spyware sometimes has its own log signatures, such as multiple attempts to connect to a small set of systems over port 80 or a high TCP port. In fact, one can match firewall logs to known “blacklists” of malware sites —please refer to the SANS Internet Storm Center and other sources for such lists.

Which Logs Are Best?

So, what types of logs are most useful for detecting and fighting malicious software?

As mentioned above, firewall logs are incredibly useful for malicious software tracking – but only as long as outbound connections (successful and blocked) are recorded in logs.

Since modern IDS and IPS devices have signatures for network malware detection including worms, viruses, and spyware, their logs are useful for learning the impact to infected systems, as well as the number and nature of infection attempts in your environment.

Even looking at the logs from your anti-virus can be incredibly helpful to detect situations when an anti-virus tools detects the “evil presence” but fails to clean it automatically. A characteristic log message is generated by most major antivirus vendor tools in such circumstances. This log may be your sole indication that the system is infected.

These logs are useful for detecting the occurrences where the malware tries to damage an antivirus tool or interfere with its update mechanism, thereby preventing the up-to-date virus signatures from being delivered. Whenever an anti-virus software process dies, a log is created by the system, and reviewing such log records can serve as early indication of a possible incident, as well as provide key evidence further in the investigation.

Additionally, modern anti-virus software will log when an update is applied, and indicate if an update fails, leaving the system unprotected, AND when an update succeeds. As a result, the log will serve as evidence as to the state of your protection. If the machine still has malware despite having updated anti-virus signatures, it means that the malware specimen is probably too new for the AV tool to catch.

Web proxy logs can be used for detection of file uploads and other outbound information transfers via the web, initiated by data-stealing malware. Looking for methods and content-type in combination with either known suspicious URLs or user-agent (i.e. web client type) can often reveal spyware infections that are actively collecting data and channeling it out of your environment. Admittedly, a well-written spyware can certainly fake the user-agent field, but it can be useful to add to our query above. Proxy logs may indicate a pattern of activity where a machine shows a set of connections and data uploads in rapid sequence with attempts to many systems suggesting malware may be the cause.

Operating system logs are also useful for malware tracking since modern operating systems will require software updates and process terminations – and both can be performed by malicious software. Even simply logging the application launches with process names allows us to match those names against known lists of malware applications, sometimes with surprising and scary results.

Quick Case Study

In one recent example, in a recent case a regular desktop was seen scanning all over the internal network. This was discovered by analyzing the firewall logs and uncovering a spike in volume after this scanning started en masse. The desktop was quickly cut from the network soon after this discovery, and an incident was declared. When the system was investigated, an impressive array of malware was discovered – along with a dead anti-virus software, killed by the malware. Logs also helped to answer the question “Did it infect anybody else?!” For this purpose, the same logs from firewalls revealed that no other system manifested such scanning apart from the investigated one. So, it was determined that the scanning campaign didn’t lead to infections of other systems.

Conclusions

To conclude, nowadays, anti-virus solutions are MUCH more likely to miss the malware, compared to a few years ago. Logs present a critical piece of information for detecting and investigating infections. Automatically collecting, baselining, and analyzing logs will sometimes result in faster detections then only using anti-virus tools. By using a log management tool to collect and analyze firewall, IDS/IPS, server and web proxy logs you can quickly find evidence of malware activities across systems and networks.

Idea to retire: Do more with less

Ideas to Retire is a TechTank series of blog posts that identify outdated practices in public sector IT management and suggest new ideas for improved outcomes.

Dr. John Leslie King is W.W. Bishop Professor in the School of Information at the University of Michigan and contributed a blog hammering the idea of “do more with less” calling it a “well-intentioned but ultimately ridiculous suggestion.”

King writes: “Doing more with less flies in the face of what everyone already knows: we do less with less. This is not our preference, of course. Most of us would like to do less, especially if we could have more. People are smart: they do not volunteer to do more if they will get less. Doing more with less turns incentive upside down. Eliminating truly wasteful practices and genuine productivity gains sometimes allows us to do more with less, but these cases are rare. The systemic problems with HealthCare.gov were not solved by spending less, but by spending more. Deep wisdom lies in matching inputs with outputs.”

IT managers should respond to suggestions of doing more with less by assessing what really needs to be done…what can reasonably be discarded or added that enables the IT staff to go about their responsibilities without exceeding their limits?

Considering these ideas as they relate to IT Security, a way to optimize input with outputs may be by considering a co-managed solution focused on outcome. Rather than merely acquiring technology and then watching it gather dust as you struggle to build process and train (non-existent) staff to utilize it properly, start with the end in mind – the desired outcome. If this is a well managed SIEM solution, (and associated technology) then perhaps a co-managed SIEM approach may provide the way to match output with input.

7 things you need to know about Anti-Virus protection.

Network Security Basic Training Series: Anti-Virus Protection

In this article we will discuss the topic of anti-virus protection. There are many questions that come up when we talk about this topic. So here are a few answers to your questions.

First, let’s look at a definition from Wikipedia of what a computer virus is: “A computer virus is a malware that, when executed, replicates by reproducing itself or infecting other programs by modifying them. Infecting computer programs that can include as well are data files, or the boot sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected".

The term computer virus was a misnomer until it was coined by Fred Cohen in 1985. Viruses often perform some type of harmful activity on infected hosts, such as acquisition of hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the computer useless.

However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without user consent.”

According to research done by Symantec, more than 317 million pieces of malware (computer viruses or other malicious software) were created in 2014 alone.

That’s more than 1 million new threats released each day on average!

In summary, it is best practice to use a good anti-virus product and to keep I up to date at all times. Using anti-virus software doesn’t mean that a virus cannot get into your computer, but without good virus protection, you are simply asking for trouble.

In future articles of this series, we will discuss more topics that can help you keep your system and your data safer.

Petya Ransomware – What it is and what to do

A new ransomware variant is sweeping across the globe known as Petya. It is currently having an impact on a wide range of industries and organizations, including critical infrastructure such as energy, banking, and transportation systems. While it was first observed in 2016, it contained notable differences in operation that caused it to be “immediately flagged as the next step in ransomware evolution.”

What is it?

This is a new generation of ransomware designed to take timely advantage of recent exploits. This current version is targeting the same vulnerabilities (ETERNALBLUE) that were exploited during the recent Wannacry attack. In this variant, rather than targeting a single organization, it uses a broad-brush approach that targets any device it can find that its attached worm is able to exploit.

The gravity of this attack is multiplied by the fact that even servers patched against the SMBv1 vulnerability exploited by EternalBlue can be successfully attacked, provided there is at least one Windows server on the network vulnerable to the flaw patched in March.

How it spreads?

Early reports also suspected that some infections were spread via phishing emails with infected Excel documents exploiting a CVE-2017-0199, a Microsoft Office/WordPad remote code execution vulnerability.

The attackers have built in the capability to infect patched local machines using the PSEXEC Windows SysInternals utility to carry out a pass-the-hash attack. Some researchers have also documented usage of the Windows Management Instrumentation (WMIC) command line scripting interface to spread the ransomware locally.

Unlike WannaCry, this attack does not have an internet-facing worming component, and only scans internal subnets looking for other machines to infect. Once a server is compromised by EternalBlue, the attacker is in as a system user.

What it does

The malware waits for 10-60 minutes after the infection to reboot the system. Reboot is scheduled using system facilities with “at” or “schtasks” and “shutdown.exe” tools. Once it reboots, it starts to encrypt the MFT table in NTFS partitions, overwriting the MBR with a customized loader with a ransom note.

The malware enumerates all network adapters, all known server names via NetBIOS and also retrieves the list of current DHCP leases, if available. Each and every IP on the local network and each server found is checked for open TCP ports 445 and 139. Those machines that have these ports open are then attacked with one of the methods described above.

The criminals behind this attack are asking for $300 in Bitcoins to deliver the key that decrypts the ransomed data, payable to a unified Bitcoin account. Unlike Wannacry, this technique would work because the attackers are asking the victims to send their wallet numbers by e-mail to “[email protected],” thus confirming the transactions.

There is no kill-switch as of yet, and reports say the ransom email is invalid, so paying up is not recommended.

Technical Details

Talos observed that compromised systems have a file named “Perfc.dat” dropped on them. Perfc.dat contains the functionality needed to further compromise the system and contains a single unnamed export function referred to as #1. The library attempts to obtain administrative privileges (SeShutdowPrivilege and SeDebugPrivilege) for the current user through the Windows API AdjustTokenPrivileges. If successful, the ransomware will overwrite the master boot record (MBR) on the disk drive referred to as PhysicalDrive 0 within Windows. Regardless of whether the malware is successful in overwriting the MBR or not, it will then proceed to create a scheduled task via schtasks to reboot the system one hour after infection.

As part of the propagation process, the malware enumerates all visible machines on the network via the NetServerEnum and then scans for an open TCP 139 port. This is done to compile a list of devices that expose this port and may possibly be susceptible to compromise.

The malware has three mechanisms used to propagate once a device is infected:

  1. EternalBlue – the same exploit used by WannaCry.
  2. Psexec – a legitimate Windows administration tool.
  3. WMI – Windows Management Instrumentation, a legitimate Windows component.

These mechanisms are used to attempt installation and execution of perfc.dat on other devices to spread laterally.

For systems that have not had MS17-010 applied, the EternalBlue exploit is leveraged to compromise systems.

Psexec is used to execute the following instruction (where w.x.y.z is an IP address) using the current user’s windows token to install the malware on the networked device. Talos is still investigating the methods in which the “current user’s windows token” is retrieved from the machine.

C:WINDOWSdllhost.dat w.x.y.z -accepteula -s -d C:WindowsSystem32rundll32.exe C:Windowsperfc.dat,#1

WMI is used to execute the following command which performs the same function as above, but using the current user’s username and password (as username and password).

Wbemwmic.exe /node:”w.x.y.z” /user:”username” /password:”password” “process call create “C:WindowsSystem32rundll32.exe ”C:Windowsperfc.dat” #1″

Once a system is successfully compromised, the malware encrypts files on the host using 2048-bit RSA encryption. Additionally, the malware cleans event logs on the compromised device using the following command:

wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D %c:

What steps has EventTracker Enterprise taken?

  1. Closely monitoring announcements and details provided by industry experts including US CERT, SANS, Microsoft, etc.
  2. Reviewed the latest vulnerability scan results from your network (if subscribed to ETVAS service) for vulnerable machines. ETVAS service subscribers who would like us to scan your network again can request us at [email protected] and we will perform a scan at your convenience.
  3. Updated the Active Watch List in your instance of EventTracker with the latest Indicators of Compromise (IOCs). This includes MD5 hashes of the malware variants, IP addresses of  C&C servers, the email address [email protected]
  4. Monitoring system reboots and additions to the Scheduled Tasks list
  5. Watching Change Audit snapshots in your network for changes to registry (RunOnce)
  6. Updated ETIDS with snort signatures as described by Cisco Talos
  7. Performing log searches using known IOCs

Recommendations

User Location Affinity

User Location Affinity

It’s clear that we are now working under the assumption of a breach. The challenge is to find the attacker before they cause damage.

Once attackers gain a beach head within the organization, they pivot to other systems. The Verizon DBIR  shows that compromised credentials make up a whopping 76% of all network incursions.

However, the traditional IT security tools deployed at the perimeter, used to keep the bad guys out, are helpless in these cases. Today’s complex cyber security attacks require a different approach.

EventTracker 8 includes an advanced security analytic package which includes behavior rules to self-learn user location affinity heuristics and use this knowledge to pinpoint suspicious user activity.

In a nutshell, EventTracker learns typical user behavior for interactive login. Once a baseline of behavior is established, out of ordinary behavior is identified for investigation. This is done in real-time and across all enterprise assets.

For example if user Susan typically logs into wks5 but now because her credentials are stolen, they are used to login to server6, this would be identified as out-of-ordinary and tagged for closer inspection.

EventTracker 8 has new features designed to support security analysts involved in Digital Forensics and Incident Response.

Threat Intelligence and The Pyramid of Pain

There is great interest among security technology and service providers about the intersection of global threat intelligence with local observations in the network. While there is certainly cause for excitement, it’s worth pausing to ask the question “Is Threat Intelligence being used effectively?”

David Bianco explains that not all Indicators of Compromise (IOCs) are created equal. The pyramid defines the pain it will cause the adversaries when you are able to deny those indicators to them.

Threat Intelligence and The Pyramid of Pain

Hash Values: SHA1, MD5 or other similar hashes that correspond to specific suspicious or malicious files. Hash Values are often used to provide unique references to specific samples of malware or to files involved in an intrusion. Netsurion can provide this functionality via its Change Audit feature.

IP Addresses: or even net blocks. If you deny the adversary the use of one of their IP addresses, cyber criminals can usually recover quickly. Netsurion addresses these via its Behavior module and the associated IP Reputation lookup.

Domain Names: These are harder to change than IP addresses. Netsurion can either use logs from a proxy or scan web server logs to detect such artifacts.

Host Artifact: For example, if the attacker’s HTTP reconnaissance tool uses a distinctive User-Agent string when searching your web content (off by one space or semicolon, for example. Or maybe they just put their name. Don’t laugh. This happens!). Host Artifacts can be detected by the Behavior module in Netsurion's Open XDR platform, when focused on the User Agent string from web server logs.

Tools: Artifacts of tools (e.g. DLLs or EXE names or hashes) that the attacker is using, can be detected via the Unknown Process module within Netsurion's Open XDR platform via the Change Audit feature.

Tactics, Techniques & Procedures: Netsurion Open XDR integrates the MITRE ATT&CK knowledge base of real-world adversary tactics, techniques, and procedures (TTPs) into our console. This intuitive ATT&CK threat intelligence improves threat hunting by understanding how hackers operate. Learn more about threat hunting.

Bottom line: Having Threat Intelligence is not the same as using it effectively. The former is something you can buy, the latter is something you develop as a capability. It not only requires tools but also persistent and well-trained human analysts.

Want both? Consider Managed Threat Protection to proactively guard your critical business infrastructure with a team that understands adversarial tactics and techniques.

Netsurion services and OpenSSL the Heartbleed issue

Many of our customers and resellers have asked how Heartbleed affected Netsurion services. In a nutshell, the managed services that make up our product offerings were not directly affected by Heartbleed.

What is Heartbleed?

Heartbleed is the name given to an OpenSSL vulnerability where a service running specific versions of OpenSSL could be compromised by a hacker into revealing protected information in memory.

The end result is that it is possible to uncover security keys so that the secure communication of the system could be compromised. This affected numerous websites around the world.

In addition, hardware vendors such as Cisco and Juniper both announced that they had software and hardware that was affected by the Heartbleed vulnerability.

The Juniper announcement was a cause of concern for us here at Netsurion because we use many of their solutions as part of our managed services. As it turns out, the list of vulnerable products did not include any equipment or software that Netsurion supports as part of our services.

At the time of this article, Juniper had made it clear that they would be working on patches and updates to address the issues posed by Heartbleed in the immediate future.

The Impact?

So does this mean that all customers running Netsurion services can breathe a sigh of relief and ignore the issues posed by Heartbleed entirely?

The short answer is “no”.

While it is true that Netsurion supplied services are not affected by Heartbleed, that does not mean that if you are a customer or reseller of ours that you do not have another system that you use which could be affected by this vulnerability.

For example, LogMeIn is a highly popular tool for remote access and management of workstations. According to their blog article, they were affected by Heartbleed (for the full article click here). They have already created an update to their software that according to them should be implemented to avoid further issues. (They also have other suggestions in a related blog article that should be read as well if you use LogMeIn.)

As a matter of good security, it is necessary to evaluate any service you use on the Internet and discover whether or not it has an issue with Heartbleed.

Before We Go

One last point on this topic has to do with the locations that rely upon Netsurion to manage their Internet connection through the use of our managed firewall services.

As previously stated, our firewalls were not affected by Heartbleed, but the equipment in front of our firewall (the ISP router or modem for example) might have an issue.

To help determine if there is something potentially damaging to the secure environment of our customers, we are already looking for Heartbleed as part of our External ASV Scanning service. We can detect this flaw, and we are currently running a special scan to examine the hosts that have been setup to determine if any of our customers have equipment or services that could be potentially vulnerable to Heartbleed.

As we discover potential issues, we will provide our individual customers and resellers with the information they need to properly manage the affected environments.

Incident Response: Whose Job is It?

Effective Incident Response (IR) always involves the IT security professionals who know their business and cybersecurity posture best. But whose job is it to actually respond to incidents, and what are the best practices?

First, let’s define “response”

“Incident Response” is an ambiguous term that cybersecurity vendors and IT pros use loosely and sometimes end up speaking past each other. It’s important to remember that “response” comes in multiple stages. When it comes to cybersecurity monitoring, the Department of Homeland Security mantra of “See Something? Say Something!” applies. So, first off, make sure you can SEE more threats with wide attack surface coverage, deep threat intelligence, and smart incident correlation.

With effective Detection in place, Incident Response is the "Say Something" part; and we'd add "Do Something." Technically speaking, this consists of:

These are what we consider the three stages of Incident Response.

incident response blog img1 1

Who owns “Response?”

As you can probably see, not ONE party can effectively own everything involved in response. The hard truth is, the organization impacted is ultimately held accountable, and there is no outsourcing that fact. However, your trusted cybersecurity partner should work with you to create an Incident Response playbook to determine swim lanes of responsibility.

Beyond that, let’s face the fact that it takes a village to respond, and identify who is best to do which role in IR. In our shared security model, we propose that the 24x7 Managed Extended Detection & Response (MXDR) provider be responsible for monitoring, aka “See Something,” as well as for the initial response - “Say Something”…and even some of the “Do Something.” The capabilities of MXDR help to identify threats sooner with always-on monitoring, proactive threat hunting, and automated and guided remediation paired with wide attack surface coverage. The organization’s IT team (or MSP if IT is outsourced) should be responsible for further action, hands-on system changes and updating policies to prevent further occurrences.

Best Practices

Once you’ve determined the swimlanes in your IR playbook, here are some best practices we recommend.

1. Enlist 24/7 Managed Detection & Response Professionals

Managed security providers like Netsurion learn your environment, monitor it closely, and offer guided threat response. Consider a combination of skilled security analysts and an open XDR platform to accelerate and optimize your IR response rates. Furthermore, enlist partners for hands-on Digital Forensics and Incident Response (DFIR) should a breach occur.

2. Leverage Automated Incident Response as a Force Multiplier

Automated response capabilities use workflows to take immediate triage actions, automate remedial tasks, and orchestrate activity between multiple systems. For example, an automated response workflow could include:

  • Terminating unknown processes immediately
  • Monitoring propagation of suspected malware
  • Suspending accounts that violate policies
  • Generating an incident report in your management platform

3. Share the Load

By working with a dedicated Managed XDR partner who guides you through defining your SecOps runbook and Incident Response playbook, you can free up your team to work on other projects while being ready to respond to cybersecurity incidents quickly and efficiently.

How can Netsurion help?

Netsurion offers both automated response by our Open XDR platform and guided remediation by our 24x7 SOC. Our SOC experts work with you to create a more efficient response that uses less of your organization’s resources. Learn more about Netsurion Incident Response and check out “Four Key Steps to Rapid Incidence Response.”

Reach out to us to learn more about how we can help manage your Incident Response.

Key takeaways from the presidential debate on cybersecurity.

The presidential debate, as entertaining as it was for many, was a great place to hear about the focus needed on cybersecurity issues in this country. Both candidates, Hilary Clinton and Donald Trump, were asked the following question on the topic of cybersecurity in the U.S:

“On securing America. We want to start with a twenty first century war happening every day in this country. Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who's behind it? And how do we fight it?”

It appeared that both candidates made comments to show that this topic was of vital importance to the security of the US and our data.

While much of the focus of the comments were focused on Russia as an adversary, I think it’s safe to say that the attacks against the US comes from a variety of sources that we need to be on the defense for as a nation.

So what should we do?

There are many opinion’s on this, but mine includes having the Internet Service Providers be responsible for providing “cleaner” traffic down to end users.

If an ISP can do some basic “block and tackling” such as checking network traffic for viruses, or blocking certain countries that have shown that they won’t cooperate with prosecution of hackers that attack US companies and individuals.

What else can be done?

Along with the attention being given to this topic by the Presidential candidates, it would be good to see more mandates pushed down around things such as cybersecurity event correlation, data sharing, and standards for non-government entities.

For example, it should not be the norm now for a large corporation to go without security basics such as SIEM tools with advanced threat intelligence powering it, managed by an outside entity. I think it’s pretty clear that most corporations, regardless of size, cannot (or simply will not) adequately staff their cybersecurity operations center to monitor threats to the corporate data they are responsible for.

If the new President were to mandate that certain protections need to be in place for any corporate entity that stores, processes, or handles consumer, financial, healthcare, and payment data, it would go a long way towards setting the bar higher than it is now.

Sure, we have PCI and HIPAA regulations, but many of those are “checkbox” regulations today that are loosely audited and without real ramifications until after a major breach.

What about data sharing?

This is an area where I think we need some real governmental reform. It’s a shame when there is data out there on how to protect a company from hackers, but it’s only available to those with certain security clearances or those that subscribe to a paid feed of threat intelligence.

Sure, there are local and regional groups that try their best to setup private sharing methods, but I think what is really needed is a directive that all threat intelligence that can help better protect a corporate entity should be made available to those that need it.

After all, why would anyone keep that information from a company that could use it to defend themselves?

Can your Cybersecurity Posture be Called "Reactive Chaos"?

Does this chaos sound familiar? You have no control of your environment and most of your efforts are diverted into understanding what happened, containing the damage, and remediating the issue. New projects, including cloud development and mergers and acquisitions, are significantly stalled. If this does sound familiar, then most likely you are blind to what is happening on the network, unaware of where the weaknesses are, and without the ability to quickly assess risk.

This is the alternate reality organizations enter once they have been materially compromised. It stops business, costs millions, and can have an incalculable impact on current and future customers. You get here by thinking tactically all the time. No time to step back and consider the big picture, instead always making small changes and more investments in new, disparate tools. This wasn't the business plan you started the year with, but it is what will be managed for months, and likely a few years to come.

How can you avoid this? Get visibility of your entire security posture and be able to measure it easily, and preferably, continuously so you can take proactive action – including endpoints and networks. This is important and useful in monitoring, responding to, and in some cases, being able to block potential exploits. But this is only a start.

Embed the culture of security: Have you appointed a cybersecurity champion?
You need a cybersecurity champion just as you need a leader for a fire drill – one who practices and directs the possibly panicked staff in evacuating the floor/building in the event of a fire or other emergencies. By embedding security culture into the organization, you can have the visibility and assurance that you need for the best defense against reactive chaos.

Systemically avoid reactive chaos.
Automate and orchestrate wherever possible to provide better visibility. Co-source when necessary, as it gives you access to experts in cybersecurity at an affordable price point.

Square Cash - A Money Transfer Game Changer?

While all the details are not fully understood yet, and only a select few Square members are allowed to try it, Square Cash (now Cash App) was announced by the company as a way to send money to people.

The process will allow a Square user to send cash to a non-Square user by sending the money directly to their debit card via an e-mail authorization process. At least, that is what is described today.

Square has not yet opened up Square Cash to everyone. On their website, Square explains that the program is currently “Invite Only”.

Square became famous for enabling individuals to take credit cards for payments on their smart phones and tablets.

They are also currently trying to get into the point of sale business with another offering, and it seems that they are now also trying to get into the person to person payment business with Square Cash. What is interesting about all of these technologies is that they all rely on the Internet.

While Square solutions have fallen under criticism for lackadaisical security in the past, and the Payment Card Industry (PCI) Security Standards Council has not made a definitive mandate for mobile payment security (only guidance is provided), Square has excelled none-the-less at bringing excitement to their target markets.

Square strives to make financial transactions simple enough so that the average person on the street can participate.

Before Square, a regular person without a bank supplied merchant account could not take credit cards. Today, Square allows everyone with a smart phone to accept credit cards, and now the company is focusing on another market – person to person cash payments.

Square saw the impact smart phones would have on everyone’s life. To that end, they hosted their solutions (at least their data) in the cloud, and their customers have flocked to them. This is just another indication that in the future, business will be moving more of their operations to the Internet.

It also means that companies in the future need to be prepared to offer their services on the Internet where appropriate; provide Internet access inside their brick and mortar locations to meet customer expectations; and be willing to embrace new technology to stay relevant in the minds of their customers.

If the plans for your business do not include wireless communication for your staff or at least your customers, you might find yourself on the outside of the technological future looking in.

How to Combat the Rising Costs of Cybersecurity Insurance

Even though your business may have cybersecurity insurance, it doesn’t mean you can avoid the steps necessary to prevent bad things from happening. Similar to our own healthcare, it’s no secret that being diligent with preventative care and a consistent healthy lifestyle not only protects your health but also protects your pocketbook from more serious illness, no matter what kind of insurance you have. The same can be said for dental care and insurance. Just because you have insurance doesn’t mean you don’t brush your teeth.

Businesses across all sectors are starting to recognize the importance of cybersecurity insurance (also known as cyber risk insurance or cyber liability insurance), especially those companies that store financial, personal health, or other client data. Up until recently, many companies considered this insurance policy as enough protection against a breach. The truth is that insurance companies are not in the business of spending money. They make money and will not continue to cover those businesses that are costing them a payout. Or they will find another way to make it back, such as higher premiums and deductibles.

The increase in a remote workforce drew the attention of cyber criminals, and many companies have stated they were not prepared for a data breach caused by the remote workforce.

According to a report issued by Standard & Poor’s Corp., “Cyber insurance premiums, which now total about $5 billion annually, will increase 20% to 30% per year on average.” Most of this is due to increased claim frequency and the severity of the claims. One of the main reasons behind this is that SMB cyber investments have not kept up with the escalation in advanced persistent threats.

It’s become clear that businesses need to ensure they have the right IT infrastructure in place to provide the security necessary to not only predict and prevent threats, but also detect and respond to a data breach, ransomware, or other cyber attack. Optimally, a fully Managed Threat Protection solution can meet this need and more, which is a must-have for today’s mobile and remote workforce. Along with peace of mind, this protection also can lead to lower insurance rates due to prevention measures being implemented.

4 Steps to Combat Rising Costs of Cybersecurity Insurance:

  1. Implement an employee cybersecurity awareness training program
  2. Achieve and maintain IT security compliance requirements, which is the starting point, not the end goal of cybersecurity
  3. Adopt a Zero Trust approach to security
  4. Close security gaps by engaging a managed security service provider to help predict, prevent, detect, and respond to threats

Cybersecurity insurance is a key part of any business’ future protection against a breach. By predicting and preventing the breach before it happens, and having a plan to detect and respond when one occurs, you can save money and time, as well as reputational harm.

In Summary

In the past two years, cyber security insurance prices have increased 50% year over year. By ensuring organizations comply with even the most basic cybersecurity controls, providers can drastically reduce their exposure to risk. However, to be truly covered today, you have to prevent, detect, and respond to active threats and even predict future attacks before they happen.

Cyber insurance kicks in during post-breach – but what happens before? Preparing and shoring up your cybersecurity posture means investing in people, processes, and technology. Effective cybersecurity requires multiple layers of security controls and the right combination of technology and expertise. The good news is that you don’t have to do this alone. Netsurion offers powerful and practical cybersecurity with a defense-in-depth approach that considers every attack vector and attack surface within your IT infrastructure. This equals peace of mind before, and after a breach.

Backoff Is the New Standard by Which Other Malware Will Be Judged

Every now and then hackers develop a piece of malware that is so insidious that it changes the landscape of computer security and acceptable practices.

While there are many contenders for this dubious list, CodeRed, Zeus, and now Backoff are certainly worthy of inclusion. In 2001, CodeRed highlighted the need for servers to be patched regularly and to be isolated in a DMZ (demilitarized zone). Introduced in 2007 (with variants still active today), Zeus demonstrated how well organized hacker communities were and how easily man in the middle attacks could be used to compromise sensitive financial data.

Backoff

Today, Backoff is ruining the reputation of many retail businesses and reeking havoc financially through the theft of credit card data. In fact, Backoff has garnered the attention of the U.S. Department of Homeland Security (DHS).

What is Backoff?

Wanting to warn retail businesses of the danger of this malware, the DHS released an advisory entitled, “Backoff: New Point of Sale Malware”. In the document, retailers are warned of how hackers are using this software after they penetrate a Point of Sale Network that uses insecure remote access.

Specifically, the document mentions Microsoft’s Remote Desktop, Apple Remote Desktop, Chrome Remote Desktop, Splashtop, Pulseway, LogMeIn, and Join.Me.

However, it is important to note that any remote access software that is not managed in a secure fashion could be used to compromise a system. Regardless of the remote access platform that is penetrated, hackers often find that they have administrative privileges on the remote machines once they connect, so it is simple for them to upload the Backoff malware at that point and begin the theft of credit cards.

How Backoff Works

Backoff works by allowing further remote control of the infected system, grabbing credit card data out of memory, writing files with sensitive authentication data, and transmitting the stolen information using standard HTML posts.

There is nothing particularly innovative about how Backoff works, but the completeness of its design and simplicity has allowed some of the biggest credit card thefts in history.

Hackers can easily obtain a copy of Backoff from the Internet; it is streamlined so that it causes few issues installing it on a remote machine; and it was well written so that it is extremely effective at stealing data once it is in place.

The Means to Defend Against Backoff

The key to defeating Backoff is by embracing basic security measures which too many retailers have ignored regardless of initiatives like the Payment Card Industry Data Security Standard (PCI).

First and foremost, make sure that remote access is secure. This includes using 2 factor authentication, strong passwords, and unique credentials so that activity can be tracked back to a specific user. For Netsurion customers, this would be our Secure Remote Access SSL VPN.

In addition, make sure that you have a good firewall protection program that incorporates limiting both inbound and outbound traffic to the minimum that is necessary. Again, Netsurion customers receive this service with our Threat Management solution. Whether or not you use security provided by us, you should review your practices to make sure that you are protected.

Malware will continue to be a significant issue for retailers for the foreseeable future, and it is key that retailers become aware of how to secure their environments. It would be irresponsible to ignore the problem or pretend that it could never happen to your businesses.

Software solutions such as anti-virus programs are usually between 6 to 12 months behind major malware releases, so it is necessary to embrace a more holistic approach when looking to protect your business. Taking the proper steps today will help you avoid joining the ever increasing list of businesses who realize that they are a hacker’s latest victim, and that is the goal of any security program.

2015: “The Year of the Healthcare Hack"

2015 was a tough year for the healthcare industry.

Some are even calling 2015 “the year of the healthcare hack”.

Last year, over 65% of the data breaches occurred in the healthcare industry, it is safe to say that security should be a priority for 2016.

Healthcare records can be sold by hackers for a lot more than credit card data. Hence, hackers will continue to be determined to obtain healthcare records.

How are you protecting your practice in 2016?

Learn about the effects that data breaches had on the healthcare industry throughout 2015 in the infographic below. Protecting your practice is simple and affordable – get started!

Data-Breaches

Five Takeaways from the 2019 SIEM Study

We recently released the findings of the Security Information and Event Management (SIEM) study conducted by Cybersecurity Insights. The study surveyed over 345 IT and Security executives and practitioners, with 45% of them small and mid-sized firms with 999 or fewer employees and the balance comprised of enterprise organizations with 1,000 or more employees. This study provides insights into the trends, key challenges and solution preferences regarding continuous monitoring and SIEM solutions.

Some of the Top Findings from the SIEM Study include:

  1. Flexible Delivery Approaches Win Out with IT Security Teams
    Organizations continue to utilize a range of deployment approaches for SIEM solutions, balancing requirements for hands-on control, operating expense funding, and staffing models. According to respondents, 54% have a SIEM that is deployed on-premises with another 25% delivered as a service. Over 20% use a hybrid approach with both on-premises deployment with an “as a service” model.
     
  2. SIEM Provides A Range of Security and Compliance Benefits
    Twenty-three percent of those surveyed say faster detection and response is their top SIEM benefit with 14% of respondents noting advantages such as more efficient security operations in the #2 spot with better visibility into threats accounting for the # 3 benefit. Tied for the # 4 spot at 8% each are: better prioritization of indicators of compromise (IoCs), a better compliance posture, and better threat analysis. The survey documented a high level of user satisfaction with their SIEM solution overall 
  3. SIEM Technology Effectively Detects Advanced Attacks
    IT and Security decision makers and practitioners recognize the role SIEM plays in detecting sophisticated and ever-evolving attacks. Survey respondents across a wide variety of verticals and organizational sizes consider SIEM most effective for #1 detecting unauthorized access, # 2 identifying advanced persistent threats (APTs), and # 3 insider attacks, whether intentional or done by careless insiders. It’s worth noting that the EventTracker SIEM platform, coupled with the EventTracker SOC service, successfully detects and responds to these external and internal attack types.
     
  4. Staff-Issues the Largest Challenge for SIEM
    Study respondents outlined the biggest hurdles to maximizing the value of their SIEM platform. Forty percent stated that their most significant challenge is a lack of skilled and trained staff to operate the SIEM effectively. Another 34% each responded that having to manually create and refine rules was challenging with an identical number impacted by a lack of budget. It’s not surprising that staff and skills shortages are a challenge, given that there will be 3.5 million unfilled cybersecurity positions by 2021, according to research firm Cybersecurity Ventures.
     
  5. Nearly Half of SIEM Budgets are Rising
    IT Security budgets overall have been rising in recent years as organizations place increased focus on detecting and stopping threats and enhancing their overall risk posture. But businesses face a myriad of options to choose from regarding security products and services. While over 50% expect their SIEM budgets to remain unchanged, a significant 40% anticipate increases of up to 20% over the coming 12 months.

Key Recommendations for IT Security Executives and Practitioners:

Here are some practical recommendations to improve your network visibility, threat protection, and overall security operations.

Add Comprehensive Visibility to Protect Infrastructure, Assets, and Data
Over 30% of research respondents do not currently have SIEM security services that provide 24/7 visibility and correlation of actions with known threats. Many compliance mandates such as PCI DSS and best practice frameworks such as the SANS Top 20 recommend SIEM monitoring. While moving to a SIEM platform may seem daunting, our Zero to SOC paper outlines a practical and affordable way to achieve tailored protection that detects threats quickly without breaking the bank.

Revisit Your SIEM Performance and Organizational Fit
Onboarding a SIEM solution requires time, funding, expertise, and on-going tuning; it is not a “set it and forget it” type of application. Some short-staffed firms find that the departure of their log monitoring analyst results in the platform being shelved or abandoned by a lack of resources. If you have “shelfware” or find that your SIEM effectiveness is not where you’d like, it’s time to rethink your approach. Co-managed SIEM solutions like EventTracker’s offer end users the control and joint policy implementation required along with the outside expertise and threat intelligence they lack.

Enhance Your Security Maturity Beyond the Compliance Checkbox
Compliance is often the initial trigger that prompts organizations to invest in SIEM monitoring.  While meeting compliance mandates is essential, additional SIEM solution benefits include the ability to uncover threats proactively and take action quickly. SIEMs such as EventTracker SIEMphonic incorporate advanced threat protection such as intrusion detection, threat intelligence, and user behavior analytics. A SIEM enables organizations of all sizes to understand their risks fully, prioritize actions and make better and faster security decisions. Take a strategic top-down view of risk management and use SIEM visibility and reporting to guide efforts such as insider threat assessment.

The Transition to EMV Isn't Over

Merchants should know by now that after October 1st the liability for card-present fraud will shift to whichever party is the least EMV-compliant in a fraudulent transaction. This means that merchants will be more accountable if EMV is not implemented.

Embracing EMV will keep the liability as it is today (credit card company reimburses customers and then seeks restitution from the merchant bank and merchant).

But as it can be seen from the infographic, although October 1st is the deadline that major U.S Credit cards have set, this will be a process for many, especially the small businesses.

As long as a single magnetic stripe card is accepted at a merchant location, their PCI profile does not change from what it was before EMV. Since EMV cards are still vulnerable to compromises, there is no reduction in the PCI standard for a merchant who implements it.

PCI compliance can be a complex labyrinth of requirements and recommendations. Luckily, Lumifi’s team of highly-trained and experienced engineers are here to provide you with the IT support you need at each and every business location.

The Transition to EMV Isn't Over

Consolidation: The Cure for Cybersecurity Vendor Sprawl

There are three cybersecurity “givens” that small-to-medium-sized businesses (SMBs) often face. One is you are not too small to be targeted by cyber criminals. Even big ransomware gangs are refocusing their efforts on mid-sized victims to avoid scrutiny. A second is that your attack surface is expanding – particularly with the move to cloud, Software-as-a-Service (SaaS) adoption, and Work-From-Home (WFH) – while threat actors continue to evolve new, more sophisticated approaches. The third is that you probably have too many cybersecurity tools and vendors to be effective. One Ponemon study found that companies deploy on average 47 different cybersecurity solutions and technologies. That’s in large part because new security measures tend to get deployed one by one. They’re either newly available technologies or point solutions to emerging cybersecurity threats and vulnerabilities. The resulting sprawl in security operations can actually decrease cybersecurity effectiveness when you don’t have the expertise and resources to manage all the tools, or the people and time to interpret and act on the analytics they generate.

The Cure for Sprawl is Consolidation

The cure for this technology and vendor sprawl is consolidating cybersecurity tools and vendors to simplify your security operations. For example, look for instances where there are overlapping capabilities between vendors. To consolidate, choose a partner that has both the breadth of cybersecurity technology and depth of cybersecurity expertise to handle multiple functions.

Lack of resources to monitor and evaluate the flow of data from your security infrastructure is a common problem for SMBs. Consider consolidating log data and forwarding it to a SOC-as-a-Service provider. These security vendors can apply expertise plus advanced tools such as AI to monitor log data 24x7 and alert you to events that require your scrutiny. This frees up your staff to focus on the matters that are critical to protecting your assets as well as providing around-the-clock coverage.

Defense-in-Depth: A Method for Uncovering Consolidation Opportunities

Before you can make fully informed decisions about consolidation, you need to consider your entire cybersecurity infrastructure and vendor network. One approach is to organize your analysis around the defense-in-depth threat cycle, which provides an end-to-end approach to managing security before and after the “boom” (a security incident). With this approach, you can identify overlaps as well as gaps in a multi-layered approach to cybersecurity.

Left of Boom: Predict and Prevent

While you can’t eliminate risk entirely, you can reduce it or proactively manage it pre-breach by minimizing the likelihood of a cyber attack.

Predict: The predict phase of defense-in-depth focuses on understanding your attack surface and efficiently managing vulnerabilities. Does your vulnerability management solution include remediation recommendations as well as scanning and reporting, so you can take action when vulnerabilities are discovered? How are you incorporating new devices and resources such as cloud and containers? Can your vulnerability management provider also deliver actionable threat intelligence based on threat data feeds from partners and open-source providers?

Vulnerability management and patching are foundational to any security program’s left-of-boom capabilities. The value lies in getting actional mitigation steps from scanning that you can execute effectively and efficiently. However, vulnerability management is often neglected internally because limited resources are focused higher up the tech stack, and it’s painful to disrupt the business to do the necessary scanning. A trusted provider can take this off your hands and ensure that scanning takes place consistently and at your convenience to minimize interruptions.

PPDR

Prevent: How deep and broad is your endpoint protection? Do you have multiple vendors in this space to cover all physical endpoints (including all widely used endpoint operating systems and file types) as well as virtual desktop solutions like Amazon Workspaces and virtual desktops from Citrix, VMware, and Microsoft? If so, can one vendor cover all endpoints with a single solution?

And does that one vendor also provide threat hunting within your environment to protect you against the most evasive known and unknown threats? Many of these threats, including ransomware and advanced persistent threats, sit in a victim’s environment for days or weeks before a payload is activated. Threat hunting, particularly solutions that employ both human and artificial intelligence, can help prevent the boom.

Right of Boom: Detect and Respond

Take steps post-breach to reduce the impact of a successful cyber attack.

Detect: XDR, which stands for Extended Detection and Response, has experienced growing adoption. XDR is all about consolidation. It combines multiple capabilities such as NDR (network) and EDR (endpoint) under the “X” moniker. So, if you currently have multiple vendors for a myriad of detect and respond solutions, you are in a great position to simplify your security operations by going with a single vendor that can truly deliver consolidated visibility and management.

For the detect component of XDR, you want to make sure a provider’s solution includes a SIEM (Security Information and Event Management) component to aggregate log data from across your environment (network, endpoints, cloud) for real-time analysis. Managed solutions should include SOC-as-a-Service, to provide expert review of rule-based alerts from the SIEM.

An Intrusion Detection System (IDS) also plays a critical detect role in those first minutes after the boom by identifying unusual patterns or anomalies in your network and systems. To be effective, an IDS needs continuous tuning to keep up with the emerging threat intelligence. The provider’s Security Operations Center (SOC) offers actionable insights about malicious activity. SOC specialists in behavioral analysis analyze anomalies in human activity detected within the network, such as accessing sensitive data or initiating downloads, to help guard against insider threats.

Respond: Respond is the “R” in XDR. Part of your response capability should be automated to provide real-time blocking of suspicious activity before any damage is done. Response automation like Application Control is one example of how to terminate suspicious activity. Ideally, the service provider you choose for consolidation will include Incident Response support as well, including customizing playbooks to your environment. Look for a provider that collaborates with you and provides timely support while you maintain hands-on-the-keyboard mitigation responsibility. And if you have other strategic priorities to manage or lack the staff or skills, look for a Managed Security Service Provider (MSSP) with a 24x7 Security Operations Center (SOC) that can augment your team.

The Final Note: Platform Versus Conglomeration

When you are considering consolidating vendors, look at how your candidates came to offer more than a single-point solution. It is not unusual in the security marketplace for companies to grow by acquisition, in many cases offering a conglomeration of disjointed point products or services under the guise of a consolidated solution.

Netsurion takes a managed platform approach, the benefit of which is that capabilities are unified at the core and accessed from one centrally managed console. Our defense-in-depth capabilities work together to predict, prevent, detect, and respond to threats across your business. Learn more about defense-in-depth with Netsurion Managed Open XDR.

Cybersecurity Trends and Predictions 2019

The year 2018 saw ransomware families such as CryptoLocker and variants like Locky continue to plague organizations as cybersecurity adversaries morph their techniques to avoid detection. Several massive data breaches this year include Quora, Ticketmaster, and Facebook that exposed over 200 million records worldwide. While high-profile breaches may make the news headlines, over 60% of small and mid-sized firms have experienced data loss or a breach themselves. While smaller firms may believe that they are not targeted by hackers, they comprise the global supply chain connected to much larger enterprises. SMBs also find that their IT and security staff is stretched thin juggling day-to-day operations with cybersecurity capabilities insufficient for their unique organization and industry sector risks.

As the year winds down, here’s what small and mid-sized organizations may experience in 2019 with an eye towards enhancing security.

Cybersecurity Threats Impact Uptime:

Organizations of all sizes struggle to maintain uptime of point of sale (POS) systems and avoid lost productivity due to business data loss. Patching, ransomware, and data breaches all impact network and system uptime. Enhanced investment in your infrastructure and cybersecurity during 2019 ensures that your organization can detect and remediate threats quickly to meet resiliency and uptime objectives.

Malware Continues to Endanger Organizations:

Malware like viruses, worms, bots, and banking trojans will continue using advanced evasion techniques to challenge organizations and consumers alike. Malware that morphs and evades detection increases recovery costs; rapid detection and blocking will continue to be essential in minimizing dwell time and damage. While traditional anti-virus alone is not enough to stop malware, endpoint detection and response (EDR) software provides enhanced protection necessary to catch new and otherwise unknown malware strands.

Cybersecurity Shortages Drive New Business Models:

According to Ponemon Institute research, 73% of small and mid-sized organizations state that insufficient personnel keep IT security from being fully productive. A lack of cybersecurity staff and skills can lead to creative approaches to maintain protection and compliance. Many organizations will tap a trusted managed security services provider (MSSP) to complement their existing staff and capabilities.

You Can’t Manage What You Can’t See:

Over 40% of organizations consider getting full visibility to all assets and vulnerabilities to be a top challenge, according to a threat monitoring report. Comprehensive infrastructure and log monitoring provide real-time insights that can identify suspicious behavior, flag further action, and help prioritize where to focus limited resources. A Security Information and Event Management (SIEM) service such as Netsurion Enterprise provides the visibility and actionable intelligence you need for sustained protection.

New Privacy and Data Breach Regulations Gain Traction:

Following the strict privacy and breach notification guidelines in EU GDPR (General Data Protection Regulation), many anticipate that US lawmakers will consider enacting similar regulations. The California Consumer Privacy Act signed into law in 2018 is a harbinger of such legislation. The Forbes Technology Council weighs in on data privacy impacts for organizations of all sizes.

Effective Security Starts at the Top:

You and your executives set the tone on security that successfully balances organizational growth with risk mitigation. Over 62% of small and medium-sized firms have experienced a data breach, so it’s important to be proactive and invest accordingly. Year-end is the ideal time to evaluate your current security posture and ensure that you are evolving and investing in security as your adversaries step up the game. If you don’t have the right skills or staff, engage a trusted advisor like a managed security services provider (MSSP) to assess any security gaps.

The cost of cybersecurity threats includes reduced productivity, lost online revenue, compliance gaps, and even fines. Many small and mid-sized organizations should approach 2019 with both strategic and tactical security measures that involve people, processes, and technology. Detecting a data breach takes 107 days on average so augment your expertise in security and compliance to maintain uptime and growth.

Are honeypots illegal?

In computer terminology, a honeypot is a computer system set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of IT systems. Generally, a honeypot appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.

Lance Spitzner covers this topic from his (admittedly) non-legal perspective.

Is it entrapment?
Honeypots are not a form of entrapment. For some reason, many people have this misconception that if they deploy honeypots, they can be prosecuted for entrapping the bad guys. Entrapment, by definition is “a law-enforcement officer’s or government agent’s inducement of a person to commit a crime, by means of fraud or undue persuasion, in an attempt to later bring a criminal prosecution against that person.”

Does it violate privacy laws?
Privacy laws in the US may limit your right to capture data about an attacker, even when the attacker is breaking into your honeypot but the exemption under Service Provider Protection is key. What this exemption means is that security technologies can collect information on people (and attackers), as long as that technology is being used to protect or secure your environment. In other words, these technologies are now exempt from privacy restrictions. For example, an IDS sensor that is used for detection and captures network activity is doing so to detect (and thus enable organizations to respond to) unauthorized activity. Such a technology is most likely not considered a violation of privacy as the technology is being used to help protect the organization, so it falls under the exemption of Service Provider Protection. Honeypots that are used to protect an organization would fall under this exemption.

Does it expose us to liability?
Liability is not a criminal issue, but civil. Liability implies you could be sued if your honeypot is used to harm others. For example, if it is used to attack other systems or resources, the owners of those may sue. The argument being that if you had taken proper precautions to keep your systems secure, the attacker would not have been able to harm my systems, so you share the fault for any damage occurred to me during the attack. The issue of liability is one of risk. First, anytime you deploy a security technology (even one without an IP stack), that technology comes with risk. For example, there have been numerous vulnerabilities discovered in firewalls, IDS systems, and network sniffers. Honeypots are no different.

Obviously this blog entry is not legal advice and should not be construed as such.

Is the ELK Stack a SIEM?

The ELK (Elasticsearch, Logstash, Kibana) stack is a popular open source log analysis and management platform. The collection, processing, normalization, enhancement, and storage of log data from various sources are grouped under the term “log management.” It is a necessary component in any Security Information and Event Management (SIEM) solution, but insufficient by itself. The ELK stack can be configured to perform all these functions, but it involves a fair bit of work to set it up and an entirely separate challenge to monitor its output. And so, since open source has the best possible price, some are initially captivated by the potential of great power at zero cost.

Building Blocks for SIEM

There are many necessary components to build a SIEM solution and remember the saying: It’s not what you have but what you do with it, that counts.

Log collection: Aggregate data from multiple data sources including applications, the infrastructure (e.g., servers, databases), security controls (e.g., firewalls, VPNs), network infrastructure (e.g., routers, DNS), and external security databases (e.g. threat feeds). Using a combination of Beats and Logstash, you can build a logging architecture consisting of multiple data pipelines. Not for the faint of heart, but it can be done.

Log processing: All those data source types generate data in different formats. Logs must be normalized to search and analyze the data. This normalization process involves breaking down the various log messages into meaningful field names, mapping the field types correctly, and enriching specific fields where necessary. Without log parsing, there is no meaning and actionable insights. You can do log parsing with Logstash that supports many different filter plugins. Logstash can also break up your logs, enrich specific fields with geographic information, drop fields, and add fields, for instance. Just contribute expertise and lots of time to tweak and get correct.

Storage and retention: Index for fast search, retain for forensic and compliance purposes to allow you to process larger volumes of data over time. Think of scalability, fault resilience, handle disconnects, and data bursts. Just add expertise and time, lots of time. ELK doesn’t perform log archiving, so that responsibility falls on your shoulders. Note that compliance frameworks such as PCI DSS (Payment Card Industry Data Security Standard) and HIPAA (Health Insurance Portability and Accountability Act) often require 365 days or more of log archiving.
 
Querying: Once your data is collected, parsed, and indexed in Elasticsearch, the next step is querying the data. Log queries enable you to conduct a forensic investigation into previous security incidents. You can do this with Kibana using the Lucene syntax. You do know Lucene, right?

Dashboards: Kibana supports a wide array of different visualization types and allowing users to slice and dice their data in any way they like. You can create pie charts, graphs, geographical maps, single metrics, data tables, and more, to be useful. Of course, all this is complicated and requires intimate knowledge of your data and the different fields constructing the log messages. Since ELK has no role-based access control (RBAC), every user sees everything. You are faced with learning and using X-pack if you want RBAC.

Is the ELK Stack a SIEM?

Correlation: The connection of signals coming in from different data sources in a pattern could indicate a security breach. A correlation rule defines the specific sequence of events that forms this pattern. No such thing exists within the ELK stack. It is now up to your security analysts to use Kibana queries, based on the parsing and processing performed using Logstash, to correlate between events. Finding and retaining staff can be a challenge given today’s cybersecurity resource and skills shortage.

Alerts: The ELK Stack, in its open source form, does not ship with a built-in mechanism for alerting on suspicious activity. To enable this capability, you will need to augment the ELK Stack with an alerting plugin or add-on. Other tools such as X-pack or ElastAlert are needed along with more time to set up, configure, and maintain.

Incident Management: How well you handle the problem detection and analyst alert function determines the actual Return on Investment (ROI) of SIEM. The ELK stack is useful when it comes to helping your in-house analysts identify a cybersecurity event. Without recommendations for remediating cybersecurity gaps, the ELK stack does not have many capabilities for incident management.

So, is the ELK stack a SIEM? Nope, just as lumber, nails, and a circular saw at the home improvement store isn't a backyard deck. ELK has capability for centralized logging; but in raw form, it isn’t a SIEM. It’s a Do-It-Yourself (DIY) tool for those with the staff, skills, and patience to create a solution on their own. Netsurion can assist organizations looking for rapid time to deployment and results with comprehensive SOC-as-a-Service (SOCaaS) from an award-winning SIEM provider.

How We Help

Organizations that have started on their SIEM journey often find themselves in one of two places:

  1. Under-invested in their initial implementation, assuming they have the staff and skills needed for a DIY implementation, and not getting the hoped-for value, or
  2. Over-licensed with a bloated SIEM solution and stuck paying higher maintenance costs for that unused capacity over many years

We filter out the “noise” of raw logs to enhance your operational effectiveness and enable you to focus on the highest priority incidents and suspicious activities.

EventTracker co-managed SIEM provides these robust capabilities out of the box:

Lumifi enables visibility and correlation with straightforward implementation. And since it’s co-managed, we augment your staff to address the IT and Security staff and expertise shortages.

Cybercrime Doesn't Take a Holiday

The holidays are a busy time for most business owners as they ramp up to serve consumers excited to find holiday specials, or even as they prepare for time away from their businesses to spend time with friends and family. Hackers know that you are distracted from your core duties and normal routine and will look for vulnerabilities in your systems. Avoid becoming an easy target during this busy time with these tips.

  1. Stay vigilant during the holidays. Don’t be distracted during peak seasons. Hackers specifically target U.S. holidays when they know your attention is focused on seasonal revenue and retail customer engagement. Keep crucial systems and servers patched during the holidays, orchestrate regular vulnerability scans, remind all of your employees of cybersecurity best practices, and maintain visibility on holidays and weekends.
  2. Make sure your retail business has a cellular failover plan. The internet connection can go down at point-of-sale (POS) systems for reasons beyond your control. You want to avoid downtime at all costs, literally, so you don’t lose out on business. Adding an automatic cellular failover solution ensures 99.99% uptime.
  3. Take control of your internet’s performance. During a busy shopping season, your internet service provider’s infrastructure may be under high stress. A good way to fight back against fluctuating network performance is to ensure traffic is properly segmented and the POS payments traffic is properly prioritized. Make sure you set the right threshold for when the connection should switch to the cellular failover network.
  4. Your POS system is PCI DSS compliant so you’re all set, right? Not necessarily, PCI compliance is just the bare minimum needed to secure transactions and protect customer data. During the holiday season, you may want to beef up network monitoring at your retail stores and refresh your incident response plan. Stay informed about advanced threats that are common during this time of the year. Don’t let ransomware ruin your holidays.
  5. Think like a hacker to identify valuable targets. Threat actors are financially motivated and look to steal your sensitive data to re-sell or use login credentials. Attractive targets include credit card data, loyalty program databases, gift card inventory, and login credentials to other assets or supply-chain partners. A managed Security Information and Event Management (SIEM) platform provides you with continuous monitoring and alerting to identify suspicious activity and quickly detect intrusions before more damage occurs.
  6. Protect your website and e-commerce assets. E-commerce uptime of your organization’s website is business critical. Web applications are now the number one threat vector across the retail sector. You need to detect and stop these costly attacks. We recommend you disable unnecessary accounts and web plug-ins, automate data backups, and avoiding vendor default settings that hackers know and will try first. Maintain comprehensive data backups so that ransomware attacks can’t pressure you for payment. Here are 7 Steps for Better Website Security.
  7. Avoid login and password compromise. Your privileged accounts such as system admin credentials and IT vendor accounts are the doorway to crucial company systems and websites. Require strong passwords, implement “least privilege” and role-based access controls, and eliminate logins for long-gone former employees and contractors. Don’t make it easy for hackers to buy and sell your organization’s logins on criminal forums.

We hope these tips help you have a safe, secure, and hack-free holiday season. Need help? We’ve got you covered so you can focus on running your business. Contact us to learn more aboutSIEM, or SOC-as-a-Service (SOCaaS) for small-to medium-sized retailers.

 

Top three reasons SIEM solutions fail

We have been implementing Security Information and Event Management (SIEM) solutions for more than 10 years. We serve hundreds of active SIEM users and implementations. We have had many awesome, celebratory, cork-popping successes. Unfortunately, we’ve also had our share of sad, tearful, profanity-filled failures. Why? Why do some companies succeed with SIEM while others fail? Here is a secret for you: the product doesn’t matter. The size of the company doesn’t matter. It’s something else. SIEM can deliver great results but it can soak up budget, time and leave you frustrated with the outcome. Here are the (all too) common reasons why SIEM implementations fail.

Reason 1: You don’t have an administrator in charge.

We call this the RUN function. A person in charge of platform administration. A Sys Admin who:

Reason 2: The boss isn’t committed.

For the SIEM solution to deliver value, the executive in charge must be fully committed to it, providing emotional, financial and educational support to the administrator. You tell your team that this is the company’s system and everyone’s going to use it. You invest in outside help to get it up and running, and use it the right way with the proper training and service. You don’t cave in when people complain because they don’t like the color of the screen or the font, or that things take extra clicks, or that it’s not “user friendly.” For this system to work, your people will need to do more work. You provide resources to help them, but you stand firm because this is your network. You realize that using this product the right way will help you make your company safer…and more valuable. Stand firm. Commit. Or you will fail.

Reason 3: You’re not using the data.

Our best implementations have 2-3 key objectives satisfied by the SIEM systems each day. Managers read these reports and rely on the data to help them secure their network. Have a few key objectives or you will fail. We call this the WATCH function for obvious reasons.

We are a premier provider of SIEM solutions and services, but with all due respect we would advise against buying a SIEM solution if a client is not prepared to invest in an administrator or reports, or shows little interest in adopting the system into their company culture.

Cloud and SaaS Security: Mind the Gap

Software-as-a-Service (SaaS) applications and infrastructure providers like Amazon Web Services (AWS) and Microsoft Azure have become the norm for organizations large and small. Enhancing cloud security maturity is even more critical given the proliferation of cloud workloads and a chronic shortage of cloud expertise. Instead of achieving the desired digital transformation and cloud optimization, organizations that ignore cloud cybersecurity gaps or underinvest can do more harm than good. Service providers are well-positioned to capitalize on cloud computing and cybersecurity growth as trusted advisors to business decision makers.

This article walks through cloud responsibilities, the benefits of comprehensive attack surface protection, cloud security considerations, and how you can better prepare for cloud security.  

The rising importance of cloud computing and SaaS applications

Cloud adoption has gone mainstream, with almost 95% of businesses using the cloud today. Top drivers for cloud use include:

Additional cloud workloads and apps mean sensitive data like Personal Health Information (PHI) and credit card numbers are even more widely dispersed. Organizations need to apply the same rigorous cybersecurity controls, compliance, and threat detection used for on-premises resources to cloud infrastructure. Still, there is often uncertainty regarding cloud security roles and responsibilities, and where to begin.

SaaS-Security

Who’s responsible for cloud security  

Customers may erroneously believe that their MSSP is responsible for virtually all aspects of IT and network infrastructure and security. Protecting cloud workloads and SaaS applications is a shared responsibility with MSSPs, end customers, and cloud infrastructure providers like AWS. According to the Center for Internet Security, a SaaS provider is solely responsible for host infrastructure, physical security, and network controls. On the other hand, service providers and customers share responsibility for areas such as application-level controls, Identity and Access Management (IAM), and endpoint protection. While it’s a shared responsibility, the end customer ultimately retains full responsibility for protecting their data and managing the risk.

Businesses aren’t the only ones to capitalize on public cloud and pervasive SaaS applications. Cyber criminals have quickly embraced the cloud and know how to exploit cloud and SaaS technology, looking for easy targets like misconfigurations on public-facing websites that are straightforward to attack and monetize.  

Comprehensive visibility eliminates blind spots

Organizations use hundreds of operational tools to manage on-premises and cloud-based workloads and SaaS applications. This fragmented approach creates data siloes and blind spots that can impact security and operational effectiveness. Without end-to-end visibility and control, detecting and remediating threats wherever they reside can take longer and give cyber criminals a foothold into your infrastructure. A holistic approach to security analytics can also overcome another common data challenge: filtering out false positives to get to actionable insights that matter to each organization.

Considerations for protecting cloud workloads

Augment your traditional technologies like anti-virus and anti-malware to assess how cloud security can strengthen your cybersecurity maturity. These businesses understand that financially motivated cyber criminals will exploit security gaps, whether on-premises or in the cloud or a hybrid approach.

Look for cloud security solutions that:

The threat landscape has evolved. Investment in cloud security capabilities helps future proof your portfolio and prepare you for the future.

Cloud adoption is a driver for enhanced cloud security

As you embark on or expand your cloud journey, it’s crucial to outline cloud security gaps and how to mitigate them. Gartner projects cloud spending growth of 23%. So protecting cloud workloads and SaaS applications demands the same oversight and resources as on-premises assets, albeit with the challenges surrounding a shortage of cybersecurity and cloud experts. To streamline vendor and portfolio complexity, you now have access to comprehensive attack surface coverage for endpoints, data centers, and cloud workloads. Learn more about Netsurion’s Managed Threat Protection with cloud coverage across infrastructure providers such as AWS and Microsoft Azure along with out-of-the-box support for hundreds of SaaS applications.

Protecting Managed Service Providers from Cyber Attacks

Eliminate the domino effect from MSP compromise that can damage reputation and trust across a portfolio of your hard-earned clients.

As a Managed Service Provider (MSP) offering IT infrastructure and end-user systems, your clients rely on you with their valuable assets, sensitive data, and intellectual property. MSPs are often viewed as trusted advisors that augment their customers’ teams and therefore often have the keys to the kingdom in the form of privileged access to their systems and servers. MSPs are also vital players in the global supply chain with their clients across all verticals such as retail, wholesale, regulated industries, and critical infrastructure. A compromise in one MSP can propagate to other clients and organizations, creating a domino-like chain reaction if not adequately mitigated.

What security best practices can MSPs utilize to avoid becoming a headline?

Why MSPs Make Attractive Targets

Attackers target MSPs for one of two reasons: to make a political statement, or more likely, to acquire valuable intelligence and confidential business data to use or monetize. With over 35,000 MSPs worldwide, there are ample candidates to attack by identifying security gaps and vulnerabilities. Successfully breaching one MSP is efficient for attackers who gain access to hundreds if not thousands of clients; persistent adversaries may also target a specific government or large corporation and hope MSPs are the “weakest link” in the attack chain.

MSP Vulnerabilities Continue In 2019

Despite the previous DHS alert to MSPs regarding adversaries trying to infiltrate service providers, industry incidents this year include:

So, how can you avoid a damaging breach? We recommend adopting these strategic and tactical approaches to service provider security to protect your brand reputation and customer loyalty.

Protect MSP Networks and Assets

Service providers should embrace both strategic and tactical approaches to a layered approach to security. While there is no silver bullet to prevent data breaches, there are actions to deter cybercriminals, demonstrate compliance, and implement security best practices.

Strategic Approaches to Service Provider Security

Tactical Actions for MSP Security

Service providers must be ever vigilant and proactive with their own security posture in addition to safeguarding their customers’ operations and data. Lumifi has the proven track record to assist MSPs with strategic and tactical approaches to cybersecurity, all with an ISO-certified 27/7 SOC with our own award-winning SIEM platform. Contact Lumifi to learn how a layered approach to security can protect you and your valued clients.

Subtraction, Multiplication, Division and Task Unification through SIEM and Log Management

When we originally conceived the idea of SIEM and log management solution for IT managers many years ago, it was because of the problems they faced dealing with high volumes of cryptic audit logs from multiple sources. Searching, categorizing/analyzing, performing forensics and remediation for system security and operational challenges evidenced in disparate audit logs were time consuming, tedious, inconsistent and unrewarding tasks.  We wanted to provide technology that would make problem detection, understanding and therefore remediation, faster and easier.

A recent article in Slate caught my eye; it was all about Infomercials…staple of late night TV and a pitch-a-thon that was conducted in Washington DC for new ideas. The question is just how would you know a “successful” idea if you heard it described?

By now, SIEM has “Crossed the Chasm” , indeed the Gartner MQ puts it well into mainstream adoption, but in the early days, there was some question as to whether this was a real problem or if, as is too often the case, if SIEM and log management was a solution in search of a problem.

Back to the question — how does one determine the viability of an invention before it is released into the market?  Jacob Goldenberg, a professor of marketing at Hebrew University in Jerusalem and a visiting professor at Columbia University, has coded a kind of DNA for successful inventions. After studying a year’s worth of new product launches, Goldenberg developed a classification system to predict the potential success of a new product. He found the same patterns embedded in every watershed invention.

The first is subtraction—the removal of part of a previous invention.

For example, an ATM is a successful invention because it subtracts the bank teller.

Multiplication is the second pattern, and it describes an invention with a component copied to serve some alternate purpose.  Example: the digital camera’s additional flash to prevent “red-eye.”

A TV remote exemplifies the third pattern: division. It’s a product that has been physically divided, or separated, from the original; the remote was “divided” off of the TV.

The fourth pattern, task unification, involves saddling a product with an additional job unrelated to its original function. The iPhone is the quintessential task unifier.

SIEM and log management solutions subtract (liberate) embedded logs and log management functionality from source systems.

SIEM and log management solutions (via aggregation) the problems that can be detected with correlation that would have gone unnoticed otherwise.

EventTracker also meets the last two criteria–arguably decent tools for managing logs ought to have been included by OS and platform vendors (Unix, Linux, Windows, Cisco all have very rudimentary tools for this, if anything); so one can say EventTracker provides something needed for operations (like the TV remote) but not included in the base product.

With the myriad features now available such as configuration assessment, change audit, netflow monitoring and system status, the task unification criteria is also satisfied; you can now address a lot of security and operational requirements that are not strictly “log” related – “task unification”.

When President Obama praised innovation as a critical element in the recovery in his State of the Union, he may not have had “As Seen on TV” in mind but does SIEM fit the bill?

What’s the message supposed to be?  That SIEM and log management solutions are (now?) a good invention? SIEM has crossed the chasm!

The EPS Myth

Often when I engage with a prospect their first question is “How many events per second (EPS) can EventTracker handle?” People tend to confuse EPS with scalability so by simply giving back an enormous-enough number (usually larger than the previous vendor they spoke with) it convinces them your product is, indeed, scalable. The fact is scalability and Events per Second (EPS) are not the same and many vendors get away from the real scalability issue by intentionally using the two interchangeably. A high EPS rating does not guarantee a scalable solution.If the only measure of scalability available is an EPS rating, you as a prospect should be asking yourself a simple question. What is the vendor definition of EPS? You will generally find that the answer is different with each vendor.

At the end of the day, an EPS measure is generally a measure of a small, non-typical normalized event received. Nothing measured about actually doing something useful with the event, and indeed, pretty much useless.

With the lack of definition of what an event actually is, EPS is also a terrible comparative measure. You cannot assume that one vendor claiming 12,000EPS is faster than another claiming 10,000EPS as they are often measuring very different things. A good analogy would be if you asked someone how far away an object was, and they replied 100. For all the usefulness of the EPS measure the unit could be inches or miles.

EPS is even worse for ascertaining true solution capability. Some vendors market appliances that promise 2,000 EPS and 150 GB disk space for log storage. They also promise to archive security events for multiple years to meet compliance. For the sake of argument let’s assume the system is receiving, processing and storing 1000 windows events/sec with an average 1K event size (a common size for a Windows event). In 24 hours you will receive 86 million events. Compressed at 90% this consumes 8.6GB or almost 7% of your storage in a single day. Even with heavy compression it can handle only a few weeks of data with this kind of load. Think of buying a car with an engine that can race to 200MPH and a set of tires and suspension that cannot go faster that 75MPH. The car can’t go 200, the engine can, but the car can’t. A SIEM solution is the car in this example, not the engine. Having the engine does not do you any good at all.

So when asked about EPS, I sigh, and say it depends, and try to explain all this. Sometimes it sinks in, sometimes not. All in all don’t pay a lot of attention to EPS – it is largely an empty measure until the unit of measure is standardized, and even then it will only be a small part of overall system capability.

Steve Lafferty

Master the Art of Selling Managed Security Services as an MSP

Contributed by: Lily Teplow, Content Marketing Manager at Continuum
 
When it comes to selling security, one of the major challenges faced by managed services providers (MSPs) is changing the mind set of small- and medium-sized business (SMB) owners. With massive breaches hogging news headlines today, security is hard to ignore—yet many SMBs choose to do so because they don’t realize how “at risk” they may be.
 
Oftentimes, MSPs can’t progress in their sales conversations because of this mindset. But as you look to break further into the security space and offer clients with a reliable solution, your journey will start with how you position yourself. In this post, we’ll share important tricks of the trade to help you master the art of selling managed security, starting with these tips.

Redefine Cybersecurity and Risk

Generally, small businesses assume they’re already protected from cyber attacks. With basic protections like anti-virus and firewall, they should be completely covered, right? Wrong.
 
Cybercriminals and their attacks have grown more sophisticated in recent years, innovating their attempts to evade basic protections and legacy solutions that most SMBs rely on. What’s more, cybercriminals recognize that this is a vulnerability and continuously look to exploit it.
 
When first approaching sales conversations with SMB clients or prospects, it’s best to re-set the standard of how they might perceive cybersecurity and its associated risks. This doesn’t mean hitting them over the head with scaremongering statistics they’ve probably seen before. It means putting into perspective the threat landscape and the level of risk they’re willing to accept.
 
Ask them: “what security threats are you most concerned about?” Simply posing this question will get them thinking about what they’re up against and what they need protection from. And, their answer may be that they’ve struggled with ransomware or their employees need better security training—giving you even better ammunition when proposing your solution to address these specific needs.
 
Then you can ask them, “are you equipped to handle these threats on your own?” If the answer is “no”—which it likely will be—it means that their level of risk is higher than they might’ve thought. However, by partnering with the right managed security services provider, they’ll have access to a more advanced security solution to stay protected against these threats and substantially lower their risk level.

Build Trust

An SMB won’t put their business in the hands of someone they do not trust. Therefore, it’s important to present your services—and your relationship—in a way that establishes and builds trust.
 
This all starts with transparency. Provide peace of mind by keeping clients updated on major vulnerabilities and help them deploy an effective and secure plan of action. Also, discuss how you’re committed to keeping lines of communication open with your clients and meeting with them on a regular basis. You can even give examples as to how you’ve helped mitigate active threats for clients that are similar to them.
 
The next step in building trust is accuracy. A trusted MSP will be able to confirm the accuracy of threats and have the tools necessary to remain protected. Conducting routine network assessments, for example, will reassure your clients that the solution you’re providing is working and that they can rely on your partnership to keep them secure.
 
Lastly, showcase how you’ll be part of their team. Position yourself as a true security advisor, providing both the technical support and the security expertise they need to maintain their ideal level of protection. For many, knowing that they have a team of security experts watching out for them 24/7/365 is enough to get them to listen and seriously consider investing in your services.

Focus on the Business Benefits, Not Tech Specs

In any sales conversation or proposal, you want to stray away from concentrating on the technical features of your solution. This may be difficult for many MSPs because these features are what make the solution work, but that doesn’t necessarily resonate with the person or prospect sitting in front of you.
 
Instead, highlight the business benefits. How does your solution solve some of the pain points they’re experiencing? How does it align with their key business initiatives? Essentially, what’s the benefit of them doing business with you?
 
Let’s look at one example, with the business benefit being a more comprehensive security strategy. You could say something along the lines of:

“How do you fight an infection you may not even know you have? Your business needs to be able to address infections that aren't as blatant as ransomware—ones that are instead getting increasingly stealthy and evasive. Your security strategy needs to adapt, and the best answer is to partner with us.
 
Our cybersecurity solution can provide you with both the foundational and highly advanced protections you need. Together, we’ll be able to establish a unique protection plan for your specific environment—protecting you from the cyber threats that you’re most concerned about. Additionally, our services are backed by our team of highly-skilled security experts who take care of the analysis, monitoring, and threat intervention needed to stop attacks in their tracks and keep your business safe.”

When selling security services, keep in mind that it’s no longer a question of if businesses need security; it’s a question of what level of security they need. With these selling tips, you’ll be better equipped in your sales conversations to convince prospects and clients that you can provide the level of protection they seek.

5 types of DNS attacks and how to detect them

The Domain Name System, or DNS, is used in computer networks to translate domain names to IP addresses which are used by computers to communicate with each other. DNS exists in almost every computer network; it communicates with external networks and is extremely difficult to lock down since it was designed to be an open protocol. An adversary may find that DNS is an attractive mechanism for performing malicious activities like network reconnaissance, malware downloads, or communication with their command and control servers, or data transfers out of a network. Consequently, it is critical that DNS traffic be monitored for threat protection.

Attack 1: Malware installation. This may be done by hijacking DNS queries and responding with malicious IP addresses. The goal of malware installation can also be achieved by directing requests to phishing domains.

Indicators of compromise: Forward DNS lookups of typo squatting, domain names that look or sound similar (gooqle.com for example); modifications to hosts file; DNS cache poisoning.


Attack 2: Credential theft. An adversary may create a malicious domain name that resembles a legitimate domain name and use it in phishing campaigns to steal credentials.

Indicators of compromise: Forward DNS lookups of typo squatting, domain names that look or sound similar (gooqle.com for example); modifications to hosts file; DNS cache poisoning.


Attack 3: Command & Control communication. As part of lateral movement, after an initial compromise, DNS communications is abused to communicate with a C2 server. This typically involves making periodic DNS queries from a computer in the target network for a domain controlled by the adversary. The responses contain encoded messages that may be used to perform unauthorized actions in the target network.

Indicators of compromise: DNS beaconing queries to anomalous domain, low time-to-live, orphan DNS requests.


Attack 4: Network footprinting. Adversaries use DNS queries to build a map of the network. Attackers live off the terrain so developing a map is important to them.

Indicators of compromise: Large number of PTR queries, SOA and AXFER queries, forward DNS lookups for non-existent subdomains in the root domain.


Attack 5: Data theft. Abuse of DNS to transfer data; this may be performed by tunneling other protocols like FTP, SSH through DNS queries and responses. Attackers make multiple DNS queries from a compromised computer to a domain owned by the adversary. DNS tunneling can also be used for executing commands and transferring malware into the target network.

Indicators of compromise: Large number of subdomain lookups or large lookup size; long subdomains; uncommon query types (TXT records).


Feeling overwhelmed? There is a ton of detail to absorb and process discipline to put it into practice for 24/7 threat detection and response. Allow us to do the heavy lifting with our co-managed SIEM. Whether you use on-premise DNS like Microsoft DNS server or Infoblox or cloud services from OpenDNS, we’ve got you covered. 

A haunting tale, just in time for the fall: Don’t let what happened to them, happen to you

The old Haunted Hotel with squeaky wood floors, welcomed all guests who dared enter the front doors. Guests arrived from every nation – every corner of world – ready to spend money and explore.

Once Vlad the Impaler’s castle, the building is a fortress, but they had since expanded to a vast empire of Haunted Hotels. Even after the age of online payments and technology, they operated with the assumption that nothing could penetrate their walls or systems. It all worked like a charmed-spell, day-in and day-out, from front-desk and online transactions to room service, restaurants, sundries, and the spa.

NCSAM LP

Sure, they had cyber goblins, witches, and the like. But that was all folklore…{gulp} right?

As legend goes, the hotel has a past...the grim reaper of retail – Breach the Blob – tarnished the Haunted Hotel’s foundation and reputation with gooey sludge that seemed to stick everywhere.

Breach slithered undetected for months and months, allowing its goo-filled malware mites and ransomware rats to infect every terminal, system, and device. That gross blob even spread to other Haunted Hotel locations across the world, easily.

The mess buried the hotel brand and owners for some time, and was quite the cleanup effort. Many files were lost, including the cost of a revenue hit, law suits, and most importantly, consumer trust. They thought they were PCI compliant (turns out not so much), so auditors continued the burial until the hotel was almost not able to recoup.

Emerging from the ground, determined to get through it, the hotel brand and franchise owners dusted off the dirt and got to work. They conducted due diligence to thwart a repeat of its breach-haunting past.

The hotel had done everything right (or so they thought) to keep the malware mites and point-of-sale (POS) ransomware rats away. They had a firewall in place and anti-virus capabilities installed.

Even in the Cloud, they felt secure, as long as their in-house Ghost Security Officer, Anti-Virus, was around. Day in and day out, Anti-Virus feverously inspected each and every system, comparing against the Most-Wanted list to protect against Breach and its brutes.

It had been so long since the last Breach sighting that they had gotten a little too comfortable. Plus, Haunted Hotels operated with the notion that they are bigger now with more protection, it won’t happen to them (when they were small they also thought it wouldn’t happen to them – they were too small to be a “target”). We all know being small actually made them a nice target.

During the time Breach first hit, they were lucky to get unburied from the mess and recoup. Most small businesses wouldn’t have made it past dawn with Breach the Blob trespassing.

The old Haunted Hotels were as successful as ever, and this haunting was behind them. Then the unthinkable happened again, but this time Breach brought friends.

It was a clear black night with the full moon casting a bright eerie hue. The guests were buzzing with chatter in the hotel bar and restaurants, while others were settled in for the night.

Anti-Virus, the resident Ghost Security Officer, was always visibly stressed, but tonight he looked like he’d seen another ghost. Anti-Virus had failed and he knew it, but was trying hard not to let on (hey – he’s got his wife and two little goblins at home to think about; he can’t lose his day job).

Although Anti-Virus and the firewall protect against the grim reaper in some ways, that creep Breach was several steps ahead. It slithered in, undetected by those humans running things.

Even though Anti-Virus knew, he certainty couldn’t tell anyone – he’s a ghost for creepsake, and he’s got goblins to feed. Breach knew this – and he knew the vulnerabilities. Plus, the best vulnerability of all – the human being.

As nightfall turned to day, that creep Breach had:

  1. Stolen 70,000+ customer credit card numbers and personal data
  2. Lured in a POS ransomware rat that held all of the Haunted Hotel’s POS systems hostage, rendering them useless, and costing $20,000,000 per day in lost revenue
  3. Invited a “man in the middle” (MITM) to creep into people’s rooms, invading their smartphone connection and spying on them via their webcam
  4. Muddied the back-office connected systems with malware – trojans, viruses, and worms
  5. Assaulted with a “drive-by download” from an employee’s computer

Now WAKE UP. Yes, it was a terrible dream. A nightmare in fact. Luckily for Haunted Hotels, they had more up their sleeve.

Little did Anit-Virus know, they were being watched all along by the Chief Ghost Security Officer, SIEM (known as ‘security information event management’ by close friends and relatives). SIEM has capabilities that are like kryptonite to a creep like Breach. It can not only find and track an attack in real-time, SIEM protects every endpoint of every system in place, from location to location. And alerts those humans to threats so they can do something about Breach before he infects anything else.

The moral of the story?

Anti-virus, firewalls, and P2PE are not enough when dealing with ‘breaches’ like Breach the Blob. The Haunted Hotel story only spins yarns about some of the threats out there… watch your back – there are many, many more.

Even vendors you use, that get breached, can impact you and your business due to the system connections. And insider jobs? Humans aren’t perfect and cybercriminals know it. They prey on the weaknesses within our system defenses and on the imperfections of human beings. Due to this, it’s not possible to stop all attacks, but you can be ready to defend against them.

Security within your business is your responsibility. So is your customers’ data. The moral of the story? Deploy Netsurion’s comprehensive suite of cybersecurity solutions, then you can say: “What’s up breaches? We’re ready for you.”

In a world of fear… cybersecurity doesn’t have to be scary

Get informed and stay informed with our monthly webcasts about educational cybersecurity topics. Get added to our newsletter!

Five Myths About Ransomware

Ransomware is a popular weapon for cyber criminals. Worldwide in 2020, there were 304 million ransomware attacks, a 62% increase from the year prior, according to Statista. All verticals are vulnerable to these ransomware attacks, which if successful, are a blot on financial statements of the targeted organizations. The success of these attacks underscore poor endpoint protection plans and strategies that befall companies of every size and every vertical. This leads to most organizations reacting to ransomware rather than planning against it, which is expensive in staff hours and of course hurtful to reputation.

Ransomware attacks have disrupted organizations around the world, from hospitals across Ireland, Germany and France, to pipelines in the United States and banks in the U.K. The threats are serious, and they are increasing

- White House memo in 2021 on cybersecurity

Here are five common misconceptions about ransomware. Read on to learn how ransomware works, ways to detect it, and how to mitigate it.

Myth #1: Ransomware is a Zero-day attack.

In fact, exploiting a Zero-day vulnerability is an expensive proposition for a malicious actor. In reality, most malware targets known vulnerabilities, which while well-documented and easily remediated, remain unpatched. Therefore, a systematic schedule of patching and endpoint system updates within 30 days of becoming available is the most effective way to minimize the threat of ransomware, and indeed most “targeted” attacks.

Myth #2: Anti-virus and perimeter solutions are sufficient protection.

Signature-based protection has been widely used for 20+ years and is a necessary and effective protection mechanism. However, this approach is well known and easily evaded by attackers. In addition to signature-based anti-virus solutions, it is necessary to consider Endpoint Detection and Response solutions supported by monitoring and analytics.

Myth #3: Flat networks make an ideal architecture.

Many ransomware attacks are successful because attackers breach perimeter security solutions and web-facing applications. Most networks are flat or unsegmented, making them easy for attackers to gain broad organizational access. Segmenting network assets into trust zones and enforcing traffic flow rules is the way to go. Unlike a flat network, a segmented network limits the blast radius and impact of a potential data breach. Limiting risk and exposure is just one step in ensuring business resilience.

Myth #4: IT admins always follow best practices.

When administrator accounts are not properly monitored, it exposes super users to hacker opportunism. High priority target accounts include System Admin workstations with drive mappings and often used (and sadly common) administrator passwords to critical servers. Monitoring administrator accounts for unauthorized use, access, and behaviors is a cybersecurity best practice in frameworks such as the NIST Risk Management Framework (RMF).

Myth #5: Ransomware is all about tools and technology.

While critical products like SIEM and Endpoint Protection Platforms improve ransomware defense, tools alone are not sufficient against today’s evolving cyber criminals. As the figure below highlights, technology is just the tip of the iceberg in threat mitigation. Cybersecurity and ransomware are a people issue, from social engineering and insider threats to configuration errors that create security gaps. The right combination of people, process, and technology is essential given the ever-rising threat of ransomware and business exploitation. With over 3 million unfilled cybersecurity jobs, look to proven service providers for security expertise as a necessary boost to your staff and skill set.

Five Myths About Ransomware

Take the Next Step

Ransomware variants and criminal gangs show no signs of slowing down. Attackers have been quick to shift their techniques to take advantage of configuration mistakes and endpoint gaps. Minimize ransomware risk and expense with a proactive and practical approach to cybersecurity. With Netsurion’s Managed Threat Protection, rapid detection and response elevates your security posture and can mean the difference in 206 days detection to closer to real-time prevention. Learn more about our complete managed security platform to predict, prevent, detect, and respond to threats across your entire organization.

Building Trust: Four Tips for MSSPs

As the threat landscape continues to evolve, you can build trust by adding value to security outcomes and emphasizing your expertise. How do you position yourself as a strategic consultant with a seat at the planning table? How do you demonstrate hard and soft skills to customer stakeholders?

Make Building Trust a Stated Objective

Best-in-class MSSPs are marked by their customers looking to them for guidance and advice. As an organization, you should strive to distinguish yourself from competitors who are more focused on short-term transactions. Leadership should ensure their teams are aware that building trust is one of the team’s objectives and key results (OKRs) and find ways to both influence and measure this objective. Examples of potential OKRs that can be measured include “Hold QBRs with every client” or “increase Net Promoter Score to X”.

What’s the value of your client’s trust? Some of the forefront benefits to organizations that influence enterprise outcomes and strategic business decisions include:

Establish Your Trusted Advisor Role

Whether the customer’s organization has decades of achievement or is more of a startup, your team can always further establish its role for driving positive results. Here are some ways to strengthen your position as a trusted advisor:

  1. Demonstrate active listening. Start with understanding the customer’s business, internal company priorities, and organizational structure and staff. After asking open-ended questions, engage with empathy and recap challenges and future direction. Resist the temptation to drive the conversation and instead focus on connecting with customers and soliciting new ideas and approaches to company challenges.

    Trusted advisors don’t play off scripts. Scripts don’t allow for listening, according to Gartner in their research CIOs Must Become Trusted Advisors.

  2. Share collective knowledge. As an MSSP, objectivity and technical expertise gained from hundreds or even thousands of your end-customers improve information sharing and decision-making. As a trusted advisor, you help synthesize and connect the dots on industry trends and disruptive challenges as you harness this “network effect”. Leverage your knowledge of customer organizations to share cyber threat intelligence gained from people, process, and technology capabilities such as MITRE ATT&CK integration.
     
  3. Put your customer’s best interest first. To build mutual trust and serve as a problem solver, elevate customer needs before your own. You may have to help resolve their questions or issues, for example, before pursuing future opportunities. Long-term relationships involve honest communication. Your risk assessment, for example, may pinpoint cybersecurity risks the customer faces and that are out of alignment with stated customer goals and risk tolerance.
     
  4. Take a long-term view. Learn more about your customer’s primary goals and objectives for the year for IT as well as cybersecurity. To end-customers with big goals such as digital transformation, outline how your capabilities minimize business and technical risk while augmenting existing staff and skills. With over 4 million open security positions, client organizations are receptive to your MSSP expertise. Also, help elevate cybersecurity with senior leaders who are more apt to view it as a business-critical decision and investment. Finally, maintain continuous customer communication and engagement to “show the love” long after the contract closes.

Trust Benefits Both Parties

In these unprecedented times of changing sales models and hyper-competition, it’s crucial to build trust with current and prospective customers for positive results and retention of hard-earned clients. As you enhance your impact and influence, you are able to add value beyond tactical purchase decisions prone to annual re-assessment and potential cost-cutting measures. MSSPs with a seat at the planning table gain insight into future enterprise goals and how technology serves as a business enabler.   

And as a reward for MSSPs, you’ll see noticeable improvements in customer retention and satisfaction. Both of these are critical for growing your business as they’ll drive efficiency within your team and customer partnership.

Pain-Free Data Security for Medical Offices

It’s understandable that the primary goal of any healthcare practice is to keep their patients healthy and safe. But what about keeping their patients’ data safe too?

All too frequently, this responsibility is not given its appropriate attention, but with the breaches headlines that healthcare made in 2015, we think it’s time they start making data security a priority.

We get it… to those who don’t fully understand it, security can seem complicated or just another expense. But every patient needs to have peace of mind that their data is safe when they step into a doctor’s office and fill out a long form filled with information such as social security, date of birth, home address, credit card payment and all the valuable personal information that healthcare practices keep.

Secure your data. Protect your practice.

That’s why Netsurion makes it simple and affordable to maintain strong data security and HIPAA compliance, while healthcare practices can continue to focus on one thing: keeping patients healthy! Learn more.

For of all sad words of tongue or pen, the saddest are these: 'We weren't logging'

It doesn't rhyme and it's not what Whittier said but it's true. If you don't log it when it happens, the evidence is gone forever. I know personally of many times where the decision was made not to enable logging and was later regretted when something happened that could have been explained, attributed or proven had the logs been there. On the bright-side there're plenty of opposite situations where thankfully the logs were there when needed. In fact, in a recent investigation we happened to enable a certain type of logging hours before the offender sent a crucial email that became the smoking gun in the case thanks to our ability to correlate key identifying information between the email and log.

Why don't we always enable auditing everywhere? Sometimes it's simple oversight but more often the justification is:

Let's deal with each of those in turn and show why they aren't valid.

We can't afford to analyze it with our SIEM

Either because of hardware resources, scalability constraints or volume based licensing organizations limit what logging they enable. Let's just assume you really can't upgrade your SIEM for whatever reason. That doesn't stop you from at least enabling the logging. Maybe it doesn't get analyzed for intrusion detection. But at least it's there (the most recent activity anyway) when you need it. Sure, audit logs aren't safe and shouldn't be left on the system where they are generated but I'd still rather have logging turned on even if it just sits there being overwritten. Many times, that's been enough to explain/attribute/prove what happened. But here's something else to consider, even if you can't analyze it "live" in your SIEM, doesn't mean you have to leave it on the system where it's generated - where's it's vulnerable to deletion or overwriting as it ages out. At least collect the logs into a central, searchable archive like open-source Elastic.

We don't have a way to collect it

That just doesn't work either. If your server admins or workstation admins push back against installing an agent, you don't have to resort to remote polling-based log collection. On Windows use native Windows Event Forwarding and on Linux use syslog. Both technologies are agentless and efficient. And Windows Event Forwarding is resilient. You can even define noise filters so that you don't clog your network and other resources with junk events.

Logging will bog down our system

This bogey-man is still active. But it's just not based on fact. I've never encountered a technology or installation where properly configured auditing made a material impact on performance. And today storage is cheap and you only need to worry about scheduling and compression on the tiniest of network pipes - like maybe a ship with a satellite IP link. Windows auditing is highly configurable and as noted earlier you can further reduce volume by filtering noise at the source. SQL Server auditing introduced in 2008 is even more configurable and efficient. If management is serious they will require this push-back be proven in tests and - if you carefully configure your audit policy and output destination - likely the tests will show auditing has negligible impact.

When it comes down to it, you can't afford not to log. Even if today you can't collect and analyze all your logs in real-time at least turn on logging in each system and application. And keep working to expand collection and analysis. You won't regret it.

Four CompTIA ChannelCon Takeaways for MSPs to Boost Cybersecurity

It was great to be back in Chicago for ChannelCon 2022. Thank you to CompTIA for their successful event, with 1,000 attendees and vendor partners for the extensive formal and informal learning opportunities enabling us to recommend and reinvigorate after the last 24 months.

Here are some noteworthy findings from CompTIA’s research “MSP Trends 2022”:   

It was valuable to exchange ideas and strengthen relationships with other vendors and service providers at our booth, in hallway talks, and over a drink. While virtual meetings are useful, nothing can replace one-on-one conversations and personal engagement. I value feedback from partners on the front lines to ensure they have the people, process, and technology needed to respond to today’s cybersecurity challenges.

Here are my key takeaways from session presentations and conversations with global services providers in our sponsored booth. I am excited to meet more of you who defend small-to-medium-sized businesses (SMBs).

1. Bridge the skills gap

Cybersecurity is not all about the newest or most powerful technology. It takes expertise, the human element, and the right technology to achieve defense-in-depth protection. Experts in a 24/7 Security Operations Center (SOC) provide around-the-clock monitoring, investigation, and incident response that is not practical or scalable for most partners or businesses to staff, train, and retain in-house. At Netsurion, we are fortunate to have security experts who protect our partners and customers around the clock. With over 2 million open IT (Information Technology) positions, I am happy to see CompTIA continuing to educate and upskill the industry on the challenges faced addressing complex Cybersecurity services.

2. A channel opportunity to elevate security

Momentum is increasing with almost 60% of purchases now going through the channel. Cybersecurity spending is targeted to reach $192.7B by 2028, according to Grand View Research with an estimated $5.6B by 2028 in MDR (Managed Detection & Response) SOC services, so an opportunity exists for service providers to move beyond offering just traditional point products like endpoint and network security into advanced Cybersecurity services for Detection, Response and Remediation. As you expand and scale your solution portfolio, look for providers like Netsurion to partner with that cover the entire threat lifecycle with comprehensive services to predict, prevent, detect, and respond rapidly to cybersecurity incidents.

3. Avoid rip-and-replace

Not all vendor capabilities are comparable, so it is “buyer beware” to ensure an apples-to-apples comparison when evaluating services and offerings. For example, Netsurion was talking with a prospective partner in our booth who asked about “true multi-tenancy” considering other vendors who talk about it but have yet to operationalize it. The same goes for “threat hunting", a service many claims to offer but delivers at vastly various levels of maturity. Look beyond the buzzwords and hype to understand capabilities, hidden costs, and solutions fit for your organization and goals. Focus on leveraging your existing infrastructure, tools, and solutions – and those of your customers – to avoid a rip-and-replace mentality that is costly and time-consuming. As you grow with your customers, look for a solution that scales with you and avoids long implementation cycles and one-time capital expenditures.

Partner Team

4. Simplifying security operations

IT technology and cybersecurity can seem complex, with point products cobbled together over time and many vendors to manage. Service Providers can help enterprises streamline their decision process and tech stack to increase efficiencies. The recent push for remote work and digital transformation makes it even more imperative to advise businesses on protecting their sensitive data, assets, and business reputation. Cybersecurity is a technology enabler that fosters business confidence, and you are well-poised as a trusted advisor.

Final Thoughts

The cybersecurity talent shortage is driving demand for managed services. This trend, in turn, prompts Managed Service Providers (MSPs) to evolve their offerings and expand services and ensure they are addressing their customer's Cybersecurity needs and provide proactive threat detection and remediation services. Customers and partners alike focus on business outcomes like growing the business, minimizing risk, and streamlining operations. Netsurion’s cybersecurity experts and 24/7 Security Operations Center (SOC) can accelerate your go-to-market, expand your services, and augment your team with a co-managed approach that enables you to help your customers address their Cybersecurity challenges. Learn more about Managed XDR (eXtended Detection and Response) solutions and critical platform components.

Once More Unto the Data (Breach), Dear Friends

As I reflect on this year, a Shakespearean quote plays out in my mind – when King Henry the Fifth is rallying his troops to attack a breach, or gap, in the wall of a city, “Once more unto the breach, dear friends”. Sadly, this has become the new normal. But even more so, 2017 has felt like Lemony Snicket's, A Series of Unfortunate Events. There were massive data breaches, unintended exposures of sensitive information on the internet, and other unfortunate tech incidents. 
 
Here are the five to illustrate the variety:

  1. Dallas Emergency Sirens: Just before midnight on a Friday in early April, all 156 of the emergency sirens in Dallas started sounding simultaneously for no apparent reason. The hubbub lasted a full 90 minutes before the sirens could be manually overridden and shut down, during which time panicked residents flooded 911 with calls. Dispatchers who typically pick up within 10 seconds were so overwhelmed that the wait time hit six minutes. Officials blamed hackers for the intrusion into their emergency alert system. Nobody had ever thought this could happen.
  2. WannaCry The National Security Agency has for years been diligently finding major weaknesses in commonly used pieces of software. Instead of alerting the affected companies about the vulnerabilities, however, it’s been hiding those aces up its sleeve for future use. This year, a group of hackers calling themselves the Shadow Brokers, stole a bunch of those exploits then proceeded to turn them loose on the internet. North Korea used one such NSA-developed hacking technique to target Windows, resulting in a piece of ransomware called “WannaCry” that crippled an estimated 230,000 computers around the world. Brad Smith, Microsoft’s Chief Legal Officer remarked, "An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen.”
  3. State Election Systems: Russian hackers targeted election systems in 21 states during the 2016 presidential election (to say nothing of their activity on FacebookTwitter, Reddit, etc.), as part of what the Department of Homeland Security called “a decade-long campaign of cyber-enabled operations directed at the U.S. Government and its citizens.” Jeanette Manfra, acting as assistant secretary for the office of cybersecurity and communications, told the Senate Select Committee on Intelligence that "the cyberattacks were intended or used to undermine public confidence in electoral processes.”
  4. : In September, consumer credit ratings agency, Equifax, revealed hackers had stolen the personal details of roughly half of all Americans – 143 million people. Equifax waited five months to tell anyone and then bungled its response, initially forcing those affected to sign a legal document prohibiting them from joining a class-action suit, then inadvertently directing potential victims to a fake phishing site which proceeded to steal yet more information.
  5. Deep Root Analytics: This summer, a Republican data analysis company called Deep Root Analytics left exposed a 1.1-terabyte online database containing the personal information of 200 million American voters. Not just birthdays and addresses, this leak included deeply personal information about individual voters, including their likely stance on abortion, gun control, stem cell research, environmental issues, and 44 other categories.

Will 2018 be better? 
There is the promise of advancements in fields like AI and machine learning. And we could learn from our mistakes but nah, not really. I don't mean to be a nattering nabob of negativism. Given the increasing penetration of IT in every facet of life, so long as those tasked with administering these increasingly complex systems are equipped with weaponry from the last war, then it’s hard to see improvement.

Still bringing a knife to a gunfight? SIEM can help level the odds.
 

Use MITRE ATT&CK to Thwart Ransomware Faster

Ransomware has made a resurgence and is impacting both IT service providers and the businesses they serve. What if you had insights into cyber criminal tactics and techniques happening in your environment? What if you knew more about the adversaries you face in this cyber battle? Can you help prioritize potential threats to stop a ransomware attack before it’s too late? The MITRE ATT&CK framework enables defenders to optimize protection beyond legacy tools like anti-virus.

MITRE ATT&CK Recap

As a summary, MITRE launched ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) to document and globally share adversary behavior in a practical way. Benefits of the ATT&CK framework include:

Adversaries often re-use the same techniques that they understand and have found successful, enabling defenders like you to help predict, prevent, detect, and rapidly respond to advanced threats.

Offense is the best driver for cybersecurity defense.

- The MITRE Corporation

Today, many organizations are using ATT&CK to better plan and prepare against advanced threats like ransomware.

Prepare for Ransomware Analysis and Detection

The ATT&CK framework provides a common language for threat analysts to use when describing analyst behavior. This common threat terminology helps with consistent and clear communication within your organization as well as across world-wide threat-sharing entities. Cybersecurity decision making also improves when ATT&CK is integrated with Security Information and Event Management (SIEM) such as Netsurion’s threat protection platform. The tactics in ATT&CK have their foundation in network, application, and infrastructure systems and logs, making SIEM correlation and threat analytics even more useful.

Understand Your Current Defenses to Close Ransomware Gaps

ATT&CK is based on actual tactics, techniques, and procedures (TTPs) used in real-world threat campaigns like ransomware. ATT&CK also provides details on 100+ threat actor groups across the adversary lifecycle, from Reconnaissance to Action on Objectives as Diagram 1 shows. Defenders are often challenged to find that many ATT&CK techniques include legitimate system functions used for malicious purposes, making quick detection of cyber criminals even more crucial. While implementing ATT&CK on your own can be resource intensive and time-consuming, solutions such as Netsurion’s Managed Threat Protection integrates the ATT&CK framework so that you don’t have to. You now have the same threat context on cyber criminal as organizations with much larger security teams.

img threat lifecycle1 1
Diagram 1:  Comprehensive cybersecurity protection across the threat lifecycle is enhanced significantly when MITRE ATT&CK is properly integrated.

Continue to Evolve your Security Posture

The ATT&CK framework is immediately usable in IT environment. As adversaries morph their nefarious techniques, so too does MITRE as it adapts and updates the ATT&CK cyber threat intelligence and TTPs. The framework has expanded over time to address cloud and mobile technologies. Your valued customers trust you with their data and reputation; adopting the MITRE ATT&CK framework ensures that you don’t fall behind when it comes to protecting business-critical data and maintaining uptime.

Optimize your Protection with MITRE ATT&CK Integration

Organizations of all sizes use ATT&CK to better address the evolving threat landscape. Faster response minimizes dwell time, the dangerous time hackers spend in an organization’s infrastructure performing reconnaissance and doing damage. Integration of ATT&CK with SIEM log correlation and data analytics provides single-pane-of-glass visibility and improved decision making.

Conclusion: Leverage a Layered Defense

MITRE’s ATT&CK framework outlines what known attackers do when they enter your network. We seamlessly integrate ATT&CK with a managed service that predicts, prevents, detects, and rapidly responds to ransomware and other cybersecurity incidents. This defense-in-depth approach strengthens cybersecurity at all stages of the attack lifecycle, from pre-breach to post-breach. 

Cybersecurity Professionals

As data breaches occur more and more, it is no secret that the market needs more cybersecurity professionals.

The demand keeps on growing as more and more hacker threats occur. Here are a few statistics on the need to educate the next generation on becoming Cybersecurity Professionals. 

At Netsurion, we have a great team equipped with skills and knowledge to help companies that need a hand with their network security. To help you achieve the best protection and security your business needs, schedule a free security consultation today.

Don't miss out on this offer, but more importantly the opportunity to protect your business and your brand.

Death by a Thousand cuts

You may recall that back in 2012, then Secretary of Defense Leon Panetta warned of “a cyber Pearl Harbor; an attack that would cause physical destruction and the loss of life.”

This hasn’t quite come to pass has it? Is it dumb luck? Or are we just waiting for it to happen?

In his annual testimony about the intelligence community’s assessment of “global threats,” Director of National Intelligence James Clapper sounded a more nuanced and less hyperbolic tone. “Rather than a ‘cyber Armageddon’ scenario that debilitates the entire U.S. infrastructure, we envision something different,” he said, “We foresee an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on U.S. economic competitiveness and national security.”

The reality is that the U.S. is being bombarded by cyber attacks of a smaller scale every day—and those campaigns are taking a toll.

Now the DNI also went on to say “Although cyber operators can infiltrate or disrupt targeted [unclassified] networks, most can no longer assume that their activities will remain undetected, nor can they assume that if detected, they will be able to conceal their identities. Governmental and private sector security professionals have made significant advances in detecting and attributing cyber intrusions.”

Alan Paller of the SANS Institute says “Those words translate directly to a simpler statement: ‘The weapons and other systems we operate today cannot be protected from cyber attack.’ Instead, as a nation, we have to put in place the people and support systems who can find the intruders and excise them fast.”

So then what capabilities do you have in this area given that the attacks are continuous and ongoing against your infrastructure?

Want to do something about it quickly and effectively? Consider SIEM Simplified our service offering that can take the heavy lift required to implement such monitoring programs off your hands.

POS VARs - Don’t be a Target!

When business owners start looking at Point-of-Sale (POS) systems, they may feel overwhelmed at the infinite amount of options they can find online. How does a business owner make a decision? How do they know it’s the right decision?

As a POS reseller/vendor, how do you stand out?

The key is to provide your customers with more than just a tool to process credit cards. Offer your customers additional services that can make their lives a little easier.

Everyone likes the convenience of getting everything in one place, right? Are you doing that for your customers?

Did you know that in 2015, there were more than 430 million new pieces of POS malware?1

Although it is the business owner’s responsibility to secure their credit card transactions and become PCI compliant, if you, as a POS reseller/vendor, are able to provide them with such services, you will be able to position your company as their preferred POS vendor.

So how do you offer your customers these services?

The easiest way is to partner with a company that specializes in the security field. As a partner, you will have the ability to sell PCI and security services to your customers on top of the POS system that they are purchasing.

For example, Netsurion trains its partners on what each service entails and provides them with the resources needed to sell these services through a portal designed just for them. It becomes a win-win situation for all three parties.

Help your customers become and remain PCI compliant

Any business that processes, stores or transmits credit card transaction data must be PCI compliant.

Becoming and staying PCI compliant is not an easy task, and it is certainly not a task a small business owner can do on their own. It is important and vital to every business to have a PCI vendor that educates and offers a simplified solution.

In the event of a breach, a small merchant can be held liable for lost card data, and even worse, fined for it. This can be detrimental to an SMB’s revenue and reputation— and can potentially put them out of business.

Help your customers prevent credit card data breaches

No business owner ever wants to experience the hassle and stress associated with being breached.

In 2015, 780 data breaches occurred for a total of more than 177 million records exposed.2

Businesses don’t just get hit with the high costs and fees of being breached, but their brand’s reputation often goes down the drain, staving off even the most loyal of customers.

As a POS VAR, you have the responsibility to offer your customers a compliant system and install.

By partnering with Netsurion, you can always be confident that your customers are educated on compliance and security and that they have a trusted advisor to help walk them through and conquer the hurdles of PCI compliance and network security.

Learn about the benefits of partnering with Netsurion.

Sources:
Symantec Internet security Threat Report1
Identity Theft Resource Center – Data breach report Dec. 20152

Dirty truths your SIEM vendor won’t tell you

Analytics is an essential component of a modern SIEM solution. The ability to crunch large volumes of log and security data in order to extract meaningful insight can lead to improvements in security posture. Vendors love to tell you all about features and how their particular product is so much better than the competition.

Yeah, right!

The fact is, many products are available and most of them have comparable features. While software is a necessary part of the analytics process, it’s less critical than product marketing hype would have you believe.

As Meta Brown noted in Forbes, “Your own thought processes – the effort you put in to understand the business problem, investigate the data available, and plan a methodical approach to analysis – can do much more to simplify your work and maximize your chance for success than any product could.”

Techies just love to show off their tech macho. They can’t get together without arguing about the power of their code, speed of their response or the size of their clusters.

The reality? Once you invested in any of the comparable products, it’s the person behind the wheel that makes all the difference.

If you suffer from skill shortage, our remote managed SIEM Simplified solution may be for you.

Equifax’s enduring lesson — perfect protection is not practical

Equifax, one of the big-three US credit bureaus, has disclosed a major data breach. It affects 143 million individuals — mostly Americans, although data belonging to citizens of other countries, for the most part Canada and the United Kingdom, were also hit.

It’s known the data was stolen, not just exposed. Equifax disclosed it had detected unauthorized access. So this isn’t simply a case of potential compromise of data inadvertently exposed on the web. Someone came in and took it.

How the breach occurred remains publicly unknown, and Equifax has been close-mouthed about the details. But there’s considerable speculation online that the hackers exploited a patchable yet unpatched flaw in Equifax’s website.

Quartz suggests an Apache Struts vulnerability. Markets Insider says it’s unclear which vulnerability may have been exploited. The Apache Struts team has issued a statement which says: Regarding the assertion that especially CVE-2017-9805 is a nine year old security flaw, one has to understand that there is a huge difference between detecting a flaw after nine years and knowing about a flaw for several years. If the latter was the case, the team would have had a hard time to provide a good answer why they did not fix this earlier. But this was actually not the case here –we were notified just recently on how a certain piece of code can be misused, and we fixed this ASAP. What we saw here is common software engineering business –people write code for achieving a desired function, but may not be aware of undesired side-effects. Once this awareness is reached, we as well as hopefully all other library and framework maintainers put high efforts into removing the side-effects as soon as possible. It’s probably fair to say that we met this goal pretty well in case of CVE-2017-9805.

So where to turn? Is it reasonable to assume that Equifax should be rigorous in updating its systems, especially public facing ones with access to such valuable data? Yes, of course. But it frankly doesn’t matter what it was written in, how it was deployed, or whether it was up to date. How do you explain (apparently) no controls to monitor unusual activity? That’s dereliction of duty, in 2017.

Perfect protection is not practical, thus monitoring is necessary. Rinse and repeat, ad nauseam, it seems.

Looking for an expert set of eyes to monitor your assets? Contact Lumifi

Hackers May Just Look to Embarrass You

When you think about electronic security, what comes to mind?

Do you consider how vulnerable your customer credit cards are, or how easily someone can break into your on-line bank account?

These are the most profitable avenues of attack that thieves usually focus on, but occasionally, cybercriminals are motivated by something besides greed.

It could be that a hacker group thinks of themselves as some kind of social watch dog, and instead of targeting you financially, they target your image.

With the spread of social media, there are many avenues that a motivated hacker can take to cause you harm. For example, if you have a weak password protecting your Facebook account, then it is likely that with minimal effort someone could corrupt your wall and send horrific messages to all of your friends. Since it is coming from your account, it will look like something you did, when in actuality, it was a criminal who was simply posing as you.

This type of attack is not as uncommon as you might think.

Just recently, Burger King’s Twitter account was compromised for a short time with outrageous claims that McDonald’s took them over. There were over 80,000 followers of the burger giant who must have been confused when hackers broke into the account. Burger King apologized to its fans after the attack, and this incident was an unfair public relations nightmare because Burger King was the victim here. Yet they faced ridicule on the Internet because for awhile it looked like they gave up to McDonalds.

I wish this were an isolated incident, but it is becoming a more popular trend in the hacking world. Jeep suffered an attack that mirrors the Burger King incident closely.

In their case, the hackers made it appear that Cadillac had bought the car company, but the concept was the same.

How safe do you think your public presence is right now?

Do you use good password management or use complicated passwords to manage your social media accounts? Hackers are real and some of them are out to ruin the reputation of hard working folks who never meant anyone any harm. It would be in your best interest to manage your on-line accounts with the same diligence that you show your credit card or bank data.

Does Your Call for Help Bring Hackers to Your Door?

As a security company, we often have customers who call into our support center to either allow or disallow some kind of computer traffic.

This is the nature protecting people from the Internet, and there is nothing unusual about it. However, there is a new trend facing people who rely on help desks, like ours.

Hackers have targeted help desks because they know that the people who provide you support have the access into your systems that they want to exploit.

Imagine the following scenario:

You have 5 restaurants with POS systems that help you run your business.

To help you with managing your business, you have hired some outside technology company such as your POS provider or Netsurion to help support you. If a hacker figured out that you have a centralized help desk, what stops them from calling for help and telling whomever answers the phone that they are you.

Furthermore, they explain that there is an emergency situation, and they need full access to all your locations immediately. Would your current help desk know how to verify your identification so that the hacker will not successfully convince someone to by pass your security?

When asked, most owners state that the people who support them know their voice and they will recognize them on the phone.

Well, that might be the case most of the time, but what if it is a new engineer who was just hired? They might be scared of losing their job, so they will do what they can to accommodate an agitated customer who is demanding immediate support.

The nature of a support desk job is to provide help to people who call. Therefore, you should have some kind of safeguard protecting you so that someone cannot simply pretend to be you on the phone and access your sensitive equipment and data.

There are many simple ways that well run businesses use to validate identity every day. You can have a secret word that a technician has to ask you, or you might need to answer a series of personal questions that are stored at your support center.

Here at Netsurion, for example, we have users with different levels of support permission and our help desk sends a one-time password to our approved contacts who call us for technical support. Regardless of the method you use to protect yourself, you need to be aware of the potential risk to your operations.

For more information about help desk vulnerabilities you can check out this article from “Dark Reading”.

Enriching Event Log Monitoring by Correlating Non Event Security Information

Sometimes we get hung up on event monitoring and forget about the “I” in SIEM which stands for information. Not forgetting Information is important because there are many sources of non-event security information that your SIEM should be ingesting and correlating with security events more than ever before. There’s at least 4 categories of security information that you can leverage in your SIEM to provide better analysis of security events:

1. Identify information from your directory (e.g. Active Directory)

Your directory has a wealth of identify information that can help sift the wheat from the chaff in your security logs. For example, let’s say you regularly import a list of all the members of Administrator groups from Active Directory into your SIEM and call the list Privileged Accounts. Now, enhance any rules or reports looking for suspicious user activity by also comparing the user name in the event against the Privileged Accounts list. If there’s a match, then the already suspicious event becomes even more important since it involves a privileged user. In many cases you’re likely to have certain control over privileged user sessions. The Privileged Accounts list helps you identify anyone bypassing those controls whether a malicious inside or outside outside attacker is ignorant of your controls. Perhaps you require all administrators to go through a clean and hardened “jump box”. You can setup a rule to identify logon sessions where the username is in Privileged Accounts but not initiated from the jump box.

2. Environmental information (both internal and global)

A global example of environment information is geocoding. Perhaps there are certain countries that you do not do business with due to their bad reputation for cybercrime and espionage. Another popular way to leverage geocoding is to detect when a given user is apparently in two places at once which can indicate compromised credentials.

3. Threat intelligence feeds available from security organizations

There’s a growing array of threat intelligence feeds ranging from community-based free feeds to those commercially produced and available for a fee. These feeds range from lists of IP addresses linked to command and control networks, botnets and compromised hosts to network indicators of compromise and malware signatures. We recently looked at the free feeds available from emergingthreats.net in our most recent webinar with EventTracker. Correlating event logs from all levels of your network to threat intelligence can help you identify compromised systems and persistent attackers much earlier in the process.

But you can also leverage organization specific (i.e. internal) environment information. For instance, perhaps all of your administrators’ workstations fall within a certain range of IP addresses. Use this information in a rule examining logon attempts to your jump box or other hardened infrastructure systems (such as the management network interface on ESXi and HyperV systems) and alert when you see attempts to access these systems from non-administrators. (As always, the real world may be a little more complicated. Case in point: you may also need to factor in logon attempts through whatever means administrators use for remote access.)

4. Internal threat intelligence
EventTracker CEO, A. N. Ananth coined this term to describe information that you can compile from your own network and systems using similar techniques as outside threat intelligence organizations. There’s no arguing the “crowd-sourced” value of external threat intelligence but such information is missing a key aspect that is addressed by internal threat intelligence. External threat intelligence tend to be “black lists” of “known bad” data. On the other hand, internal threat intelligence usually take the form of “white lists” of “known good” data. White lists tend to be much smaller, more effective and easier to tune and maintain. For instance if your SIEM can determine from past history that server A normally only communicates with 10 other hosts – that is very valuable to know – especially if your SIEM can alert you when it sees that host suddenly start sending gigabytes of data to an entirely new host on an unusual port.

The bottom line is that your SIEM needs as much data (both event and non-event) as possible and it needs to be effective at correlating it into valuable situational intelligence. Don’t stop at logs. Look for other kinds of security information from your directory, the local and global environment, threat intelligence from the security community and from the internal.

Coordinated Ransomware Attacks Hit Resource-Constrained Municipalities

A financially motivated ransomware gang hit 23 local governments in Texas in a coordinated attack. Ransomware is a type of malicious software, often delivered via email or drive-by web downloads, that locks up an organization’s systems until a ransom is paid or files are recovered by other means such as backup restoration. This most recent Texas offensive follows attacks in New York, Louisiana, Maryland, and Florida that resulted in significant financial losses, decreased productivity, and downtime of services to citizens.

Why Municipal Governments are Targeted

Local governments are prime targets due to their decentralized organizational structures, relatively small IT and security teams compared to commercial organizations, and a responsibility to maintain uptime for local services like licensing, zoning, and permitting. Digital transformation and eGovernment initiatives, along with always-on devices, has also expanded the available attack surface for hackers to exploit. Traditional anti-virus tools are insufficient to protect against today’s coordinated and morphing cybersecurity attacks. Many local governments are under the impression that they need to invest heavily in software, staff, and go it alone. Managed security service providers have changed the security landscape by providing SOC-as-a-Service via a co-managed SIEM (Security Information and Event Management) platform with integrated EDR (Endpoint Detection and Response) driven by a 24/7 SOC (Security Operations Center).

How Municipal Attacks Take Hold

While specific tactics, techniques, and procedures (TTPs) are still unfolding, common elements believed present across these statewide cybersecurity attacks include:

Texas prepared for possible large-scale cybersecurity incidents with statewide cybersecurity resources such as the Department of Emergency Management and the implementation of a four-step protocol. State and local agencies within Texas are also assisting with the cyber response that is one step below the highest level of alert or “emergency.” Response and recovery are currently the top priorities for these smaller towns, according to the Texas Department of Information Resources (DIR).

SOC-as-a-Service (SOCaaS) allows any organization, even small cities, to employ powerful ransomware protection without additional staff or expensive capital outlay.

Aaron Branson, Senior Vice President, Marketing
Netsurion

Defend Against Municipal Government Attacks

There are several steps that local, county, and state governments can take to block against ransomware attacks. Sophisticated threats necessitate advanced threat detection and remediation. Ransomware best practices include:

Local, county, and state governments protect sensitive systems and data and augment existing IT teams with managed services such as SIEM, EDR, and a 24/7 SOC. Local governments in Texas and across the U.S. who thus far have escaped attack can utilize proactive threat detection and response efforts to enhance their security toolkit. Our SOC-as-a-Service (SOCaaS) has caught many such attacks on government agencies to keep them out of the headlines and away from ransomware payments. Read case examples from government and enterprise organizations to learn about EventTracker in action.

Top 5 Linux log file groups in/var/log

If you manage any Linux machines, it is essential that you know where the log files are located, and what is contained in them. Such files are usually in /var/log. Logging is controlled by the associated .conf file.

Some log files are distribution specific and this directory can also contain applications such as samba, apache, lighttpd, mail etc.

From a security perspective, here are 5 groups of files which are essential. Many other files are generated and will be important for system administration and troubleshooting.

1. The main log file
a) /var/log/messages – Contains global system messages, including the messages that are logged during system startup. There are several things that are logged in /var/log/messages including mail, cron, daemon, kern, auth, etc.

2. Access and authentication
a) /var/log/auth.log – Contains system authorization information, including user logins and authentication machinsm that were used.
b) /var/log/lastlog – Displays the recent login information for all the users. This is not an ascii file. You should use lastlog command to view the content of this file.
c) /var/log/btmp – This file contains information about failed login attemps. Use the last command to view the btmp file. For example, “last -f /var/log/btmp | more”
d) /var/log/wtmp or /var/log/utmp – Contains login records. Using wtmp you can find out who is logged into the system. who command uses this file to display the information.
e) /var/log/faillog – Contains user failed login attemps. Use faillog command to display the content of this file.
f) /var/log/secure – Contains information related to authentication and authorization privileges. For example, sshd logs all the messages here, including unsuccessful login.

3. Package install/uninstall
a) /var/log/dpkg.log – Contains information that are logged when a package is installed or removed using dpkg command
b) /var/log/yum.log – Contains information that are logged when a package is installed using yum

4. System
a) /var/log/daemon.log – Contains information logged by the various background daemons that runs on the system
b) /var/log/cups – All printer and printing related log messages
c) /var/log/cron – Whenever cron daemon (or anacron) starts a cron job, it logs the information about the cron job in this file

5. Applications
b) /var/log/maillog /var/log/mail.log – Contains the log information from the mail server that is running on the system. For example, sendmail logs information about all the sent items to this file
b) /var/log/Xorg.x.log – Log messages from the XWindows system

Happy Logging!

The Detection Deficit

The gap between the ‘time to compromise’ and the ‘time to discover’ is the detection deficit. According to Verizon DBIR, the trend lines of these have been diverging significantly in the past few years. Worse yet, the data shows that attackers are able to compromise the victim in days but thereafter are able to spend an average of 243 days undetected within the enterprise network before they are exposed. More often than not, this is happening by a third party. This trend points to an ongoing detection deficit disorder. The suggestion is that defenders struggle to uncover the indicators of compromise. While the majority of these attacks are via malware inserted to the victim’s system by a variety of methods, there is also theft of credentials that make it look like an inside job. To overcome the detection deficit, defenders must look for other common evidence of compromise. These include: command and control activity, suspicious network traffic, file access and unauthorized use of valid credentials. EventTracker 8 includes features incorporated into our Windows sensor that provide continuous forensics to look for evidence of compromise. Verizon VBIR, the trend lines of these have been diverging significantly in the past few years.

Worse yet, the data shows that attackers are able to compromise the victim in days but thereafter are able to spend an average of 243 days undetected within the enterprise network before they are exposed. More often than not, this is happening by a third party.

This trend points to an ongoing detection deficit disorder. The suggestion is that defenders struggle to uncover the indicators of compromise.

While the majority of these attacks are via malware inserted to the victim’s system by a variety of methods, there is also theft of credentials that make it look like an inside job.

To overcome the detection deficit, defenders must look for other common evidence of compromise. These include: command and control activity, suspicious network traffic, file access and unauthorized use of valid credentials.

EventTracker 8 includes features incorporated into our Windows sensor that provide continuous forensics to look for evidence of compromise.

Front-Line MSSPs Share 2021 Cybersecurity Predictions

In 2020, we saw digital transformation accelerate along with rising ransomware, threats caused by human error and misconfigurations, and challenges in IT staff retention. While there is no crystal ball, cybersecurity experts share how organizations can optimize finite resources and prioritize security measures.

In a world of uncertainty, six cybersecurity trends stand out for 2021.

1 – Endpoint threats on the rise. With over 70% of threats entering via endpoints, it’s important to be vigilant against evolving threats targeting endpoints and solutions that keep you productive like VPNs and cloud-based SaaS. Reduce the risks associated with a remote workforce by leveraging threat prevention, detection, and response that goes everywhere your people go. According to Guy Cunningham, Netsurion Senior Vice President of Channel Sales,

2 - Remote work continues to expose security gaps. The fast pivot to Work-from-Home (WFH) maintains productivity and business operations but also uncovers new security issues with dispersed devices. Greg Manson, Logically Vice President of Security Audit & Compliance, states that secure remote connections remain critical along with multi-factor authentication (MFA).

3 - New and continuing threats to watch. Businesses are looking for more proactive methods to combat multi-stage attacks like ransomware and devious “low and slow” hackers. “Financially-motivated cyber criminals today use advanced threats to continually morph their techniques to avoid detection,” says Brian A. Engle, vice president of Cybersecurity Services and Operations at CyberDefenses.

4 - Understand risks and threats of cloud use. Protecting data, applications, and infrastructure associated with cloud computing is just as vital as on-premises IT architectures as organizations move business-critical data to the cloud. “Organizations continue to drive more business processes and supporting systems into the cloud”, states Engle, “with reliance on cloud platform controls and management capabilities.” Furthermore, organizations of all sizes must keep up with emerging threats as well as human error such as cloud misconfigurations that could lead to data leakage and negative publicity. As Manson shares, “A cloud-knowledgeable MSSP can help customers choose the right cloud approach for their goals and industry regulations and have sound security up front that avoids problems down the road.” Engle also added that “enhanced cloud monitoring and visibility add preventative controls to keep data safe, detect suspicious behavior, and trace unexpected events and actions.”

5 - Cybersecurity expertise augments technology. A consistent pattern in recent years is an over-reliance on point products and technologies to defend against persistent threat actors; technology alone isn’t the solution. Mid-market businesses continue to evolve their technology needs but often lack dedicated cybersecurity resources. Ransomware attacks targeting mid-size enterprises continue to occur at high rates with devastating business impacts. Security expert Engle says, “I see more trends involving people and processes to keep up with the information technology evolution. Technology advancements can often create more gaps than they narrow.” Cunningham agrees, stating that “the move to a holistic platform with a 24/7 security operations center (SOC) unifies multiple disparate technologies with single-pane-of-glass visibility.

6 – Incorporate frameworks and best practices. As a final thought, NIST’s Cybersecurity Framework (CSF) and MITRE ATT&CK’s real-world tactics, techniques, and procedures (TTPs) offer best practices for government entities and enterprises of all sizes. Frameworks improve collaboration between technical and business stakeholders to understand the current security posture and identify areas for improvement. “When ATT&CK is integrated with a SIEM solution, there’s a huge advantage when it comes to identifying and understanding sophisticated threats sooner and with greater accuracy,” shared Brad Alexander, Immedion Vice President and Chief Technology Officer.

A Look Ahead

From endpoint to cloud to remote work challenges, our experts weighed in regarding cybersecurity trends likely to materialize next year. Mid-sized businesses and the IT service providers that serve them will likely be targeted by cyber criminals, if 2020 is any yardstick. Manson also points out that “MSSPs face the same challenges as their end-customers.”

With preparation and vigilance, you can enhance your cybersecurity maturity, mitigate risk, and better prepare for the ever-changing threat landscape. And Engle adds, “The first step in risk management is knowing what organizations must protect, although this will become increasingly more challenging in 2021. Do you know where your most sensitive data resides?”

If you are looking to augment your cybersecurity portfolio or expand beyond traditional security, we can help you fight through the noise of millions of events to get to what matters most. Netsurion’s managed threat protection platform gives you unmatched flexibility and scalability.

Expanding Work-from-Home Increases Cybersecurity Risk

Maintaining strong cybersecurity is crucial as organizations make impromptu decisions to send more and more employees to work from home to help minimize the spread and impact of COVID-19. Before you expand and extend your remote workforce, it’s critical that you take appropriate steps to ensure that by decreasing a health risk to your business, those same actions don’t conversely increase a cybersecurity risk.

Most cybersecurity incidents start with the endpoint so it’s paramount to have a layered defense as more employees work from home. Organizations will encounter increased cybersecurity vulnerabilities due to laptops and devices typically protected within the corporate IT perimeter are suddenly outside the IT perimeter and:

All of which expose these devices to more threats that can be brought back to the corporate network once connected remotely or upon return to the work environment.

To top it off, hackers are opportunistic. With COVID-19 as a distraction, it would be no surprise to see an increase in malicious cyber attack activity.

Here are some key cybersecurity recommendations to mitigate this risk. We recommend all organizations complement their Work-from-Home policies with these effective and practical cybersecurity measures.

Bolster endpoint security: While anti-virus tools offer some level of protection, layered security defenses are needed to rapidly mitigate threats posed by persistent and well-funded adversaries. Endpoint detection and response (EDR) capabilities such as EventTracker EDR provide an added layer of protection to terminate suspicious activity in real time.

If you are already a Netsurion customer, consider expanding the install base of your EventTracker agents to encompass your most critical employee laptops that are going remote. These light-weight agents monitor and protect devices even when not connected to a corporate network.

Use a virtual private network: When connecting to unsecured networks such as Wi-Fi hotspots, use a virtual private network (VPN). A VPN encrypts your organization’s data to prevent cyber criminals from lurking on the network to intercept login credentials or sensitive data like financial accounts and intellectual property.

Share cybersecurity awareness tips for remote work: Maintain and reinforce security awareness training with the addition of working from home policies. Reinforce topics such as productivity, phishing emails, removable media tips, and protecting sensitive data during team meetings and company updates.

Avoid pandemic scams: The Cybersecurity and Infrastructure Security Agency (CISA) advises organizations to take precautions against opportunistic phishing emails and social engineering attempts to gain access to corporate resources and sensitive data or solicit donations for coronavirus charities. CISA is a U.S. government agency that partners with private industry to defend against today’s threats and collaborating to build a more secure and resilient infrastructure.

Next Steps

COVID-19 concerns are transforming where and how work is performed. Yet, merely shutting an office and sending all employees to work from home can accelerate risk and lead to potential data breaches. Consider EDR and anomaly detection as a practical and effective way to prevent, detect, respond to, and predict cybersecurity attacks. Your Business Continuity Plan (BCP) should address how to mitigate cybersecurity risks such as endpoint security gaps when expanding and extending remote work policies.

Continue to be vigilant regarding emerging and opportunistic threats. COVID-19 is the perfect distraction that could enable cyber criminals to exploit your employees or supply chain partners when there are new processes and technology that could result in increased vulnerability. Only when you adequately prepare for remote work and its related challenges will your organization achieve cyber resiliency to protect sensitive data and assets.

Netsurion ensures that you have comprehensive cybersecurity across your organization, including endpoint protection, even for devices outside the corporate network. Learn more about our proven co-managed SIEM solutions that augment your capabilities.

Attribution of an attack - don’t waste time on empty calories

Empty calories are those derived from food containing no nutrients. When consumed in excess, they contribute to weight gain, especially if you're not burning them off in your daily activities. Why make more work for yourself?
 
When we are attacked, we feel a sense of outrage and the natural tendency is to want to somehow punish the attacker. To do this, you must first identify the attacker, preferably accurately, or else. This is easier said than done, especially online.
 
Threat researchers have built an industry on identifying and profiling hacking groups in order to understand their methods, anticipate future moves, and develop methods for battling them. They often attribute attacks by “clustering” malicious files, IP addresses, and servers that get reused across hacking operations, knowing that threat actors use the same code and infrastructure repeatedly to save time and effort. So, when researchers see the same encryption algorithms and digital certificates reused in various attacks, for example, they tend to assume the attacks were perpetrated by the same group. 
 
The attacks last year on the Democratic National Committee, for example, were attributed to hacking groups associated with Russian intelligence based in part on analysis done by the private security firm CrowdStrike, which found that tools and techniques used in the DNC network matched those used in previous attacks attributed to Russian intelligence groups.
 
This is, of course, is much harder for the average business that cannot (and should not) spend scarce IT security budget on attribution of an attacker. It's a lot harder than it would seem. This Virus Bulletin reviews cases in which they’ve seen hackers acting on behalf of nation-states stealing tools and hijacking infrastructure previously used by hackers of other nation-states. Investigators need to watch out for signs of this or risk tracing attacks to the wrong perpetrators. Which means that attribution of an attack is hard even for those agencies with limitless funds at their disposal.
 
The WannaCry ransomware outbreak is an obvious example of malware theft and reuse. Last year, a mysterious group known as the Shadow Brokers stole a cache of hacking tools that belonged to the National Security Agency and posted them online months later. One of the tools — a so-called zero-day exploit, targeting a previously unknown vulnerability — was repurposed by the hackers behind WannaCry to spread their attack. 
 
Even assuming you were somehow able to absolutely identify the attacker as "Peilin Gu" located at "He Nan Sheng Zheng Zhou Shi Nong Ke Lu 38hao Jin Cheng Guo Ji Guang Chang Wu Hao Lou Xi Dan Yuan 2206", then what? How would you inflict retribution on this attacker? Likely as a private company, without a presence in China.
 
The rational course of action is instead to study the attack method and the target within your infrastructure and use this information to shore up defenses. You can bet that if this attacker uncovered a vulnerability in your defenses and exploited it then others of his “ilk” would follow course imminently.
 
Are you finding it hard to keep up with all the threats? Co-managed SIEM services can help. Give us a chance to show you how you can avoid empty calories and in the process, breathe a little easier.
 
 

When a SIEM is Like an Exercise Machine Stuck Behind the Junk in Your Garage

By Randy Franklin Smith

I’m a big believer in security analytics and detective controls in general.  At least sometimes, bad guys are going to evade your preventive controls, and you need the critical defense-in-depth layers that detective controls provide through monitoring logs and all the other information a modern SIEM consumes. Better yet, going on the offensive with threat hunting approaches the concept of taking the battle to enemy instead of passively waiting.

But a SIEM is like an exercise machine.  If no one’s using it – regularly and intensely – it can be the best exercise machine in the world, but you aren’t going to get stronger or lose weight.

And the exercise machine analogy only gets you so far because doesn’t highlight the need for highly skilled specialists.  Perhaps a better analogy is to compare the myriad sensors, passive and active monitoring systems on an aircraft carrier.  All that technology isn’t much use if there’s no 24/7 team of specialists interpreting the data and funneling the threat situation up to the officer on duty.  It’s just a bunch pretty flashing lights and screens.

Likewise, a SIEM needs a SOC.  But how many small- to medium-sized enterprises really have the team, resources and skills it takes to monitor, analyze and investigate what your SIEM is telling you – when it’s telling you? If you are like me, you may have the skill, but certainly don’t have time to look at a SIEM a few minutes each day, and we aren’t big enough to run a 24/7 SOC either.

So perhaps you settle for turning up the squelch and letting the SIEM only alert you to the most suspicious events and try to take a look at its dashboard every day.  At least you are collecting logs in case something happens – right?

But that approach is unlikely to catch incidents in time to limit the damage.  It’s frustrating because small businesses are just as much at risk to cyber threats as large enterprises, but we can’t leverage the economies of scale to do security right.

Or can we?  The solution for SMBs is the same as large enterprises – leverage economy of scale – but what’s different is the way that scale is achieved.  Large enterprises have the scale in-house.  The organization is large enough to justify funding and running an in-house SOC.

But small businesses can combine to get that economies of scale.  We aren’t talking about some kind of security co-op – although that’s interesting idea.  What we are talking about is security monitoring as a service.  Instead of, or in addition to, implementing an on-prem SIEM, some organizations are working with service providers to get the benefits of a SOC.  It’s almost like a corporate jet fractional ownership plan, but better.  The jet may or may not be available when you need it.

But with SIEM-as-a-Service you still get all the power, flexibility and security of an on-premise SIEM.  You can use and take advantage of the SIEM as much as you have time and resources for – to do your own monitoring and threat-hunting informed by your intimate knowledge of your organization and network.  But in addition to your efforts you are backed up by a 24/7 SOC operation watching your SIEM and providing for its care and feeding.  When you get busy on other projects, incidents and investigation you don’t have to worry that no-ones at the controls.

This is important because security monitoring and your SIEM is only a fraction of everything else small or event 1-person security team needs to be working on.

Event Tracker for example provides this in their SIEM as a Service solution, SIEMphonic. Their offering includes SIEM, intrusion detection, vulnerability scanning, threat intelligence, and HoneyNet deception technology, implemented either on-premises or in the cloud.  Experts at the company’s 24/7 intelligence-driven SOC provide remote administration and analytics.

How SOC-as-a-Service Enhances Security Operations

Faced with rising cybersecurity concerns, MSPs and mid-sized organizations are maturing their security posture beyond a network operations center and help desk. But few have realized a centralized security operations center (SOC) with a formal charter and full-time staff. Whether you are looking to outsource your existing security operations or evaluating how to stand up a SOC for the first time, these insights can shape your decision.

NOC vs. SOC – What’s the Difference

A network operations center (NOC) is focused on IT performance, infrastructure performance, and ensuring uptime and bandwidth availability. A security operations center (SOC) is the command center focused on security and data protection. The NOC and SOC frequently collaborate on real-time visibility and maintaining uptime and incident remediation. The importance of a NOC is foundational in the work IT organizations perform, but we now see tremendous value in a SOC as well. While NOC and SOC processes and technology differ, they both focus on risk management and reliance on technical expertise. Neither a NOC nor SOC is more important than the other; they provide complementary capabilities that ensure day-to-day operational success for business growth and transformation. 

Challenges to Standing Up a SOC

The average data breach costs almost $4 million per organization, and cyber criminals consider every organization large and small to be a target. That’s why Managed Service Providers (MSPs) must continuously monitor, investigate, and respond to cyber threats. There are two primary avenues to stand up a SOC: 

If you are considering building your own SOC, the people, processes, and technology for a 24/7 coverage easily surpasses $700,000/year and takes 6+ months to setup. You’ll need to hire, train, and retain a minimum of seven cybersecurity analysts for around the clock coverage. Use this TCO Calculator to see how SOC-as-a-Service offers faster time-to-value that avoids reinventing the wheel.

TCO

A 24/7 SOC Extends Your Staff and Expertise

A SOC is a crucial capability to manage security analytics, threat expertise, and 24/7 visibility and detection. Developing a SOC function can be expensive and complicated, diluting focus from other areas of your business. SOC-as-a-Service provides a cost-effective way for you to scale up advanced threat detection.  Some organizations attempt a Do-It-Yourself (DIY) approach, only to find that there are too many complex tasks and hidden expenses. Assess the current threat landscape and how a cloud-based SOC-as-a-Service covers threat prediction, prevention, detection, and remediation (PPDR). SOC-as-a-Service can also augment your in-house skills, provide additional cybersecurity expertise and boost the effectiveness of newer security professionals.

Advantage of SOC-as-a-Service

Your security strategy needs to match your risk tolerance, customer focus, and current staffing and expertise. There are numerous benefits of SOCaaS to MSPs and end-customers alike:

Enhance Security

Attackers are evolving and improving their threat tradecraft, and so should you.

Factors to Consider with SOC-as-a-Service

Your team should seek comprehensive SOC-as-a-Service capabilities for around the clock protection while providing SOC functions more effectively and at a lower cost than with a DIY approach. Tailor assessment of SOC-as-a-Service options and providers to your unique requirements and goals.

In our experience, business leaders and technical executives weigh the following capabilities in evaluating SOC services:

Finally, remember you cannot fully outsource cybersecurity responsibilities, so ensure you trust the people, process, and technology you select.  A trusted working relationship and proven outcomes ensure that new services do not overwhelm your existing team and well-earned results. Refer to the Top 250 MSSP list for proven SOC-as-a-Service providers.

Next Steps

Optimize your NOC and SOC functions to stay ahead of today’s cyber criminals. You may find yourself pivoting across dozens of individual tools and standalone software. Advanced threats are also rising faster than the available talent pool. SOC-as-a-Service ensures comprehensive visibility and seamless integration with your existing infrastructure and team and that of your customers. Add hard-to-find cybersecurity analysts that enable you to rapidly expand your portfolio and customer base. With SOC-as-a-Service from Netsurion, you’re backed by a 24/7 SOC that is an extension of your team. Learn how to rapidly respond to customer threats with our SOC-driven managed threat protection platform.

Safeguard Your Business Against Ransomware Threats

As the second iteration of the ransomware strain impacting IT infrastructure around the globe is expected, we want to arm our customers with information to be best prepared.

Networks in many businesses and critical infrastructure like healthcare and finance across 150+ countries have been infected by the WannaCry ransomware worm, aka WanaCrypt, WannaCrypt or Wcry. We are observing this ransomware worm spread rapidly.

If you have not been infected, it is very important that you learn how to defend your systems. Netsurion is continually working to deliver more advanced threat protection for situations just like this.

While anti-virus and managed firewalls are essential, alone they are not enough. Netsurion SIEM was introduced earlier this year for this very reason.

Safeguard Your Business Against Ransomware Threats

Recommended steps for ransomware prevention

Make a cybersecurity list and check it twice this holiday season

As the holidays swiftly approach, many of us are making lists and plans as part of the crescendo of year-end activity. We don’t want to forget anything important, but is ensuring safety from cybercrime at the top of your list?

We know that criminals don’t take time off for the holidays, if anything, they are more active.

Use the chart below to plan out your holiday checklist and steer clear of cybercrime. Jump to the section that interests you the most.

Shopper To-Do List Merchant To-Do List
Enjoy a bargain-filled, hacker-free holiday season. Enjoy a profitable and hacker-free holiday season.
Update software on all devices and phones Update software and patches on all networks
Check anti-virus program; make sure nothing bad is already there Check anti-virus and firewalls; make sure everything is properly configured and up-to-date
Change all passwords and logins; use two-step authentication Make sure all logins and user access are up-to-date, remove past employees, add new employees, and verify access levels per position; use two-factor authentication
Check your favorite online shopping sites; make sure accounts and billing addresses are updated Check your PCI compliance status including your SAQ and vulnerability scans
Use your best judgment when clicking on email and social media ads (it’s better to go directly to the website and avoid the hyperlinks) Remind employees about phishing and online scams; advise to not shop online via the company network and not use external USB drives
Always check for the security certificate info in your browser and secure connection URLs when shopping online Be vigilant with File Integrity Monitoring; run and check daily reports
Try to avoid using debit cards for online shopping or in stores Ensure your Point-to-Point Encryption service is working properly; verify no card data is being stored on site
Don’t shop or bank on public Wi-Fi Secure public and corporate Wi-Fi
Be mindful of QR codes because some may contain malware Make sure credit card processing terminals haven’t been reconfigured to circumvent the firewall
Don’t give more information than is needed (social security numbers, birthdates, etc.) Double check that 4G Failover is working in case of internet interruption
Don’t click on suspicious pop-up windows Make sure corporate, employee, and account data are stored on different servers to avoid ransomware potential
Monitor all accounts throughout the season (check for any unusual purchases or amounts) Monitor all endpoints for unusual activity with advanced threat protection

Hackers never take time off for the holidays. They are always shopping for new information, data, card numbers, and anything else they can find on unprotected systems.

This is why it’s so important for shoppers and merchants to make a cybersecurity list and check it twice this holiday season.

To learn more, download our Practical Guide to Merchant Cybersecurity whitepaper and take less than a minute to fill out this form for a free cybersecurity consultation.

What is privilege escalation and why should you care?

A common hacking method is to steal information by first gaining lower-level access to your network. This can happen in a variety of ways: through a print server, via a phished email, or taking advantage of a remote control program with poor security. Once inside, the hacker will escalate their access rights until they find minimally protected administrative accounts. That is where the real damage and data theft starts. Given the number of Internet-available servers and reused passwords, this rough outline of attack happens more often than anyone wants to admit, and it can be a very big threat. The good news is that fixing this isn’t very difficult, just requiring diligence and vigilance. It also helps if you have the right protective software, such as what you can purchase from EventTracker, to stop these sorts of “privilege escalation” attacks.

The first thing is in understanding how prevalent this really is, and not bury your hand in the virtual sandbox. Consider the Black Hat 2015 Hacker Survey Report, which was done on behalf of Thycotic last December. The results showed 20% of those surveyed were able to steal privileged account credentials “all the time”. Wow. And what is worse is that three fourths of those surveyed during the conference saw no recent improvements in the security of privileged accounts too. Finally, to be more depressing, only six percent of those surveyed could never find any account information when they penetrated a network

Granted, the survey is somewhat self-serving, since Thycotic (like EventTracker) sells security tools to track and prevent privilege escalation events.

Next, you should understand how the hackers work and what methods they use to penetrate your network. A great play-by-play article can be found here in Admin magazine. The author shows you how a typical hacker can move through your network, gathering information and trying to open various files and find unprotected accounts.  In the sample system used for the article, the author “found a very old kernel, 28 ports open for incoming connections, and 441 packages installed and not updated for a while.” This is certainly very typical.

So what can do you to be more pro-active in this arena? First, if you aren’t using one of these tools start checking them out today. You should certainly have one in your arsenal, and I am not just saying this because I am writing this blog here. They are essential security tools for any enterprise.

Second, clean up your server password portfolio. You want to strengthen privileged accounts and shared administrative access to critical local Windows and Linux servers (Lieberman Software has something called Enterprise Random Password Manager that will do this quite nicely). Any product you use should discover and strengthen all server passwords and then encrypt them and store them in an electronic vault, and will change them as often as your password policies dictate. These types of tools will also report on those resources that are still using their default passwords: a definite no-no and one of the easiest ways that a hacker can gain entry to your network.

An alternative, or an addition to the password cleanup is to use a single sign-on tool that can automate sign ons and strengthen passwords at the same time. There are more than a dozen different tools for this purpose: I reviewed a bunch of them for Network World about a year ago here.

Next, regularly audit your account and access logs to see if anyone has recently become a privileged user. Many security tools will provide this information: the trick is to use them on a regular basis, not once when you first purchase them. Send yourself a reminder if you need the added incentive.

Finally, start thinking like a hacker. Become familiar with tools such as Metasploit and BackTrack that can be used to pry your way into a remote network and see any weaknesses. Know thy enemy!

How to control and detect users logging onto unauthorized computers

Windows gives you several ways to control which computers can be logged onto with a given account.  Leveraging these features is a critical way to defend against persistent attackers.  By limiting accounts to appropriate computers you can:

The first place to start using this mitigation technique is with privileged accounts.  And the easiest way to restrict accounts to specified computers is with the allow and deny logon rights.  In Group Policy, under User Rights, you will find an “allow” and “deny” right for each of Windows’ five types of logon sessions:

Of course, if an account has both “Logon locally” and “Deny logon locally,” the deny right will take precedence. By careful architecture of OUs, group policy objects and user groups, you can assign these rights to the desired combinations of computers and users.

But because of the indirect nature of group policy and the many objects involved it, can be complicated to configure the rights correctly.  It’s easy to leave gaps in your controls or inadvertently prevent appropriate logon scenarios.

In Windows Server 2012 R2, Microsoft introduced Authentication Policy Silos.  Whereas logon rights are enforced at the member computer level, silos are enforced centrally by the domain controller.  Basically, you create an Authentication Policy Silo container and assign the desired user accounts and computers to that silo.  Now those user accounts can only be used for logging on to computers in that silo.  Domain controllers only enforce silo restrictions when processing Kerberos authentication requests – not NTLM.  To prevent users accounts from bypassing silo restrictions by authenticating via NTLM, silo’d accounts must also be members of the new Protected Users group.  Membership in Protected Users triggers a number of different controls designed to prevent pass-the-hash and related credential attacks – including disabling NTLM for member accounts.

For what it’s worth, Active Directory has one other way to configure logon restrictions, and that’s with the Logon Workstations setting on domain user accounts.  However, this setting only applies to interactive logons and offers no control over the other logon session types.

Detecting Logon Violation Attempts

You can monitor failed attempts to violate both types of logon restrictions.  When you attempt to logon but fail because you have not been granted or are explicitly denied a given logon right, here’s what to expect in the security log.

Which Security Log Event ID Notes
Local computer being attempted for logon 4625

 

 

Logon Failure

Failure reason: The user has not been granted the requested logon type at this machine.

 

 

Status: 0xC000015B

Domain Controller 4768

 

 

Successful Kerberos TGT Request

Note that this is a successful event.  To the domain controller this was as a successful authentication.

As you can see there is no centralized audit log record of logon failures due to logon right restrictions.  You must collect and monitor the logs of each computer on the network.

On the other hand, here are the events logged when you attempt to violate an authentication silo boundary.

Which Security Log Event ID Notes
Local computer being attempted for logon 4625

 

 

Logon Failure

Failure reason: User not allowed to logon at this computer

 

 

Status: 0xC000006E

Domain Controller 4820 Failure A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions.

 

 

The silo is identified

4768 Failed Kerberos TGT Request Result Code: 0xC

An obvious advantage of Authentication Silos is the central control and monitoring.  Just monitor your domain controllers for event ID 4820 and you’ll know about all attempts to bypass your logon controls across the entire network.  Additionally, event ID 4820 reports the name of the silo which makes policy identification instant.

Restricting privileged accounts is a key control in mitigating the risk of pass-the-hash and fighting modern attackers.  Whether you enforce logon restrictions with user rights on local systems or centrally with Authentication Silos make sure you don’t just use a “fire and forget” approach in which you configure but neglect monitoring these valuable controls.  You need to know when an admin is attempting to circumvent controls or when an attacker is attempting to move laterally across your network using harvested credentials.

How to Justify EDR with Three Top Business Cases

Increasing complexity and frequency of attacks have escalated the need for detection of attacks and incident response. Endpoints are the new battleground as they are a) more pervasive across the network, b) more commonly used by non-IT personnel, and c) less well-defended by IT teams who first move to secure the data center. Endpoint detection and response (EDR) solutions meet the need to rapidly investigate large numbers of systems for evidence of malicious activity, quickly uncover, and then remediate attacks and incidents.

Building the business case for an EDR solution can be easy if the organization has already gone through a lengthy, painful, and expensive incident response (IR) process. This usually involves hundreds of thousands of dollars in consulting fees and months of investigative work. The business case here is for a tool that can shrink the time for the investigation from months to days, or even hours. EDR provides the following top three benefits:

1. Saves on security incident response costs

The assume breach paradigm says that you are penetrated as you read this, but either acknowledge it as a fact, or are in denial. This factor means a security incident response is in your future. What's it going to cost you? In the 2018 ransomware attack on the City of Atlanta, published reports associated with that attack put the cost of recovery at 2.7 million dollars, a figure which did not include the cost of downtime to organization end users. Would you rather pay for the investigation by hiring two experts for six weeks at $600 per hour, almost $300,000, or investigating it yourself with minimal help from said expensive experts? Better yet, how about augmenting your limited team with a 24/7 EDR service that proactively blocks threats up front?

2. Better detection of endpoint threats

EDR boasts superior detection of modern threats over traditional signature-based anti-virus (AV). The business value comes from faster detection of threats, already resident in the network, ideally before they cause substantial damage or steal critical data. EDR is also effective against insider threats that have already bypassed perimeter defenses, such as next-gen firewalls (NGFW) and AV. In such cases, EDR provides defense-in-depth at the endpoint. EDR excels at reducing dwell time, investigation time, and the remediation time, the three big metrics in IR.

3. Reduces endpoint re-imaging costs

In many businesses, once an infection is reported on an endpoint, IT throws up their hands and performs a system re-image. This task wastes $500 in labor costs and lost productivity. Why squander time investigating the suspect systems, correlating events from the security information and event management (SIEM), intrusion prevention system (IPS), endpoint protection platform (EPP), network sandboxing, etc.? EDR can pinpoint the root cause and minimize re-imaging. Don't have a separate security team? Consider a co-managed service like EventTracker EDR that augments your existing security team and allows you to focus on recovery and remediation. It’s perfect for the small-to medium-sized organizations where it’s hard to hire and retain IT security experts.

How to Overcome Three Major Cybersecurity Budget Hurdles

Success starts with a well-planned strategic budget. Face the fear…now’s the time to plan for powerful yet practical cybersecurity.

As the owner of your organization’s cybersecurity operations, you’re facing some major challenges:

  1. Cybersecurity may be perceived as a cost center instead of a revenue enabler.
  2. Cybersecurity is complex and ever-changing.
  3. Cybersecurity vendor fragmentation leads to buyer hesitation and implementation frustration.

Fear, uncertainty, and doubt are all normal experiences for IT pros trying to plan out their cybersecurity budgets, but it doesn’t have to be the norm. Cybersecurity success starts with a comprehensive plan that covers you today, with an eye on flexibility and adaptability for tomorrow.

So, how do you overcome these challenges, get budget approval, and start executing?

Challenge #1: Cybersecurity Vendor Fragmentation

Begin identifying your solution needs by these four components below to give context to the board and management as to what is involved in a comprehensive cybersecurity plan.

At last count, the cybersecurity market is made up of hundreds of technology vendors covering over a dozen categories. In a market where technology hype changes constantly, and mergers and acquisitions are rampant, how do you architect a cybersecurity plan and budget that is focused on outcomes that can also be implemented reliably? We recommend using the Defense-in-Depth approach and planning by these four areas:

Remember, without all four of these “walls” of your cybersecurity operations, the other three are guaranteed to fail at keeping cyber attacks at bay.

Budget Efficiency Tip: Cybersecurity costs are frequently exacerbated by choosing too many separate point-solutions that are costly to integrate and lack economy of scale. Consolidate where you can. Whether that be a platform that delivers on all four core capabilities, or a managed service that delivers the platform and people – or both.

Challenge #2: Completeness and Adaptability

It is crucial that your cybersecurity solutions work in real-world scenarios and aren’t rendered ineffective by A) limitations of your staff, B) business needs of your network, or C) an inability to keep pace with the ever-changing threat landscape. Keep in mind that many cybersecurity technology vendors will tout lab testing results that conflates efficacy (performance in a controlled environment) with effectiveness (performance in real-world conditions).

Review your proposed solutions based on completeness and adaptability. Does the solution require you to provide unrealistic expertise and resources to maintain, tune, and tweak? Can the solution easily deploy new security controls without arduous manual configuration changes or rip-and-replace upgrades?

To be complete and adaptive, identify your solution needs by both platform (technology) and people (in-house staff and augmentation) to show the board and management that there is no “silver bullet” technology, but rather, a required combination of human and machine intelligence.

Challenge #3: Cybersecurity Culture and Perception

Your most difficult challenge may be addressing the misperception of cybersecurity as a cost center and not as investment protection or as  a growth enabler. In an increasing digital world, cybersecurity measures should be commonplace. The “attack surface” is nearly everything today – mobile and IoT devices, plus remote work is exploding. So, the question is, how do you address a culture that would want to know  the least you can do verses how to ensure that customers and revenue are protected while being able to innovate without interruption?

This challenge is certainly one that will require sophisticated communication and presentation skills. The greatest of cybersecurity plans and cost-effective budgets can die with culture and perception challenges. So, how do you get past this last hurdle?

Cybersecurity Budget Matrix

While simple in nature, this view helps illustrate the need for a cybersecurity capability at every stage of the threat lifecycle with both the technology and human resources to operationalize it. It also helps to break down a seemingly large single figure into distinct categories that communicate a tangible value to the board and upper management.

  Predict Prevent Detect Respond TOTAL
Platform Vulnerability Scanning, Threat Intelligence EPP, FIM, Application Control SIEM, UEBA, NTA, IDS XDR, SOAR $
People Vulnerability Management Malware Analysts Threat Hunting Security Analysts $
TOTAL $ $ $ $ $

When you pair this cost with the Risk Impact and Risk Probability a more productive conversation can take place around where, if anywhere, budget allocations may be reduced – by capability (Predict, Prevent, Detect, Respond) or by resource (Platform, People).

Your cybersecurity budget planning efforts must be linked to your unique situation in-house. Seek ways to break down barriers by leading with the most pressing concerns of leadership. This isn’t always a simple process. It may take a year of building relationships, socializing ideas, and planning. But when you stay the course with regard to what’s best for your organization, while carefully making the case based on your organization’s needs, you will fly over hurdles.

Best Practices to Halt Insider Threats

While nation-state threat actors and external hackers often garner the headlines, insider threats are an often-overlooked threat vector. Rockwell-Boeing, Anthem Healthcare, and Capital One are just a few organizations with damaging data breaches caused by insiders. Insiders such as privileged users, contractors and vendor partners, and trusted executives often have access to the “keys to the kingdom” and know system and process weaknesses to exploit.

A 53% majority have confirmed insider threats against their organization in the last 12 months, with 27% stating that insider attacks have become more frequent, according to Cybersecurity Insider’s 2018 Insider Threat Report. Ponemon Institute found that insider threats do more damage for longer than external threats, with an average cost of $8.7 million. Detecting and blocking insider threats and inadvertent insiders are crucial to reduce lost productivity and incident response costs. Enable pragmatic cybersecurity processes to reduce exposure to insider threats and accelerate a rapid response when minutes matter.

Insider Threat Definition

Most information security experts agree that employees and vendors form the weakest link when it comes to organizational information security. A holistic definition of insider threats enables security organizations to better prepare for the largest possible threat vectors that can lead to costly attacks.

“An insider threat is any breach that is caused by or facilitated by an insider, whether it is an accidental insider or malicious insider.”

- Joseph Blankenship, Forrester Research Principal Analyst

These types of internal threats can be particularly challenging to detect, especially if organizations have primarily focused on bolstering external security.

Insider Threat Types

Insider threats often remain undetected for months or years, causing lost revenue, disrupted operations, sagging brand reputation, and public distrust. It is important to understand the types of insiders and their motivations to provide context for prevention. According to Security Insider, there are five fundamental types of insider threats:

  1. Non-responders to awareness training
  2. Inadvertent insiders
  3. Insider collusion such as with vendor partners
  4. Persistent malicious insiders
  5. Disgruntled employees

Nearly two-thirds (64%) of insider threats are caused by users who introduce risk due to careless behavior or human error, according to Dark Reading. Whether intentional or inadvertent, would you even know if someone inside your network compromised or leaked sensitive data?

Align Security Plan to Risk

Traditional approaches such as security awareness training provide a good foundation, but are insufficient given the possible financial motivation and misconfiguration risks by insiders. Some industry sectors pose more internal risk than others, according to the Verizon Data Breach Investigation Report 2019.

Surprisingly, the healthcare industry is the least likely to encrypt its data, according to the Ponemon Institute. As shown below in Figure 1, customize your insider threat program to your industry risk, sensitive assets, and organizational risk appetite.

Inside threat
Figure 1. A pragmatic approach to insider threat security and prevention

Detect and Block Insider Threats

Use a pragmatic approach to cybersecurity to identify avenues to detect and stop insider threats. Some countermeasures against insider threats include:

Protect sensitive data with role-based access controls: in a nutshell, role-based access controls (RBAC) provide rights or computer access to a user or category of user based on their work function, and no more. A well-thought out plan for identity and access management (IAM) can create repeatable processes while limiting access only to those with a need-to-know. Many compliance frameworks such as PCI DSS (Payment Card Industry Data Security Standard) and HIPAA (Healthcare Insurance Portability and Accountability Act) require methods to limit sensitive data access.

Implement data encryption: encrypting or encoding sensitive data can create a barrier to attack while deterring insider access. While encryption of data at rest and in transit is a best practice, the global adoption rate for encryption is 45% - leaving much room for improvement.

Address privileged access management (PAM): privileged users are those such as system admins with elevated access to systems and services. These “super users” are prime targets for attackers looking to gain access to crucial servers or pivot to other internal networks or supply chain partners. Limiting privileged access also reduces damage in the event of a data breach.

Identify anomalous behavior: use machine learning to understand normal operating behavior, then identify anomalous activity that deviates from the baseline, and to prioritize action based on alerts. User and entity behavior analytics (UEBA) from Netsurion can detect an employee or contractor’s suspicious activities, such as logging in at unusual times or attempting to access restricted files or intellectual property.

Link cybersecurity and physical security: cybersecurity insider threats are often intertwined with breaches in physical security. Some indicators of compromise include employees who are suddenly eager for additional after-hours work, volunteer for confidential projects outside their work scope, or use a flash drive when the organization does not permit USBs.

Add comprehensive visibility and monitoring: constant monitoring and alerting with a Security Information and Event Management (SIEM) platform can detect both internal and external threats in near-real-time. Log monitoring and alerting enables employees to go about their work with minimal intrusion and privacy concerns.

Take Action Now

Insider threats occur for numerous reasons, from disgruntled staffers to financially motivated insiders stealing data, to unwitting employee mistakes. Understand your most valuable assets to prioritize insider threat protection that balances security and privacy as you prevent, detect, and respond to internal threats.

Increase security awareness training on insider threats and include an “if you see something, say something” approach. Enhance visibility into user behavior with continuous monitoring, internal threat correlation, and user behavior coupled with SIEM to elevate your security posture and speed up time to detection. While insider threats are costly, compensating solutions need not be expensive or time consuming for you or your supply chain partners. SOC-as-a-Service from Netsurion is one practical avenue to shore up internal gaps that rogue employees and inadvertent insiders can exploit.

Following a User’s Logon Tracks throughout the Windows Domain

What security events get logged when a user logs on to their workstation with a domain account and proceeds to run local applications and access resources on servers in the domain?

When a user logs on at a workstation with their domain account, the workstation contacts domain controller via Kerberos and requests a ticket granting ticket (TGT).  If the user fails authentication, the domain controllers logs event ID 4771 or an audit failure instance 4768.  The result code in either event specifies the reason for why authentication failed.  Bad passwords and time synchronization problems trigger 4771 and other authentication failures such as account expiration trigger a 4768 failure.  These result codes are based on the Kerberos RFC 1510 and in some cases one Kerberos failure reason corresponds to several possible Windows logon failure reasons.  In these cases the only way to know the exact reason for the failure is to check logon event failure reason on the computer where the user is trying to logon from.

If the user’s credentials authentication checks out, the domain controller creates a TGT, sends that ticket back to the workstation, and logs event ID 4768.  Event ID shows the user who authenticated and the IP address of the client (in this case, the workstation). However, there is no logon session identifier because the domain controller handles authentication – not logon sessions.   Authentication events are just events in time; sessions have a beginning and an end.  In Windows, each member computer (workstation and servers) handles its own logon sessions.

When the domain controller fails the authentication request, the local workstation will log 4625 in its local security log noting the user’s domain, logon name and the failure reason.  There is a different failure reason for every reason a Windows logon can failure, in contrast with the more general result codes generated by the Kerberos domain controller events.

If authentication succeeds and the domain controller sends back a TGT, the workstation creates a logon session and logs event ID 4624 to the local security log.  This event identifies the user who just logged on, the logon type and the logon ID.  The logon type specifies whether the logon session is interactive, remote desktop, network-based (i.e. incoming connection to shared folder), a batch job (e.g. Scheduled Task) or a service logon triggered by a service logging on.  The logon ID is a hexadecimal number identifying that particular logon session. All subsequent events associated with activity during that logon session will bear the same logon ID, making it relatively easy to correlate all of a user’s activities while he/she is logged on.  When the user finally logs off, Windows will record a 4634 followed by a 4647.  Event ID 4634 indicates the user initiated the logoff sequence, which may get canceled.  Logon 4647 occurs when the logon session is fully terminated.  If the system is shut down, all logon session get terminated, and since the user didn’t initiate the logoff, event ID 4634 is not logged.

While a user is logged on, they typically access one or more servers on the network.  Their workstation automatically re-uses the domain credentials they entered at logon to connect to other servers.  When a server receives a logon request – (for example, when a user tries to access a shared folder on a file server), the user’s workstation requests a service ticket from the domain controller which authenticates the user to that server.  The domain controller logs 4769,  which is useful because it indicates that user accessed server Y; the computer name of the server accessed is found in the Service Name field of 4769.  When the workstation presents the service ticket to the file server, the server creates a logon session and records event ID 4624 just like the workstation did earlier but this time logon type is 3 (network logon).  However as soon as the user closes all files opened during this network logon session, the server automatically ends the logon session and records 4647.  Therefore, network logon sessions typically last for less than a second while a file is saved, unless the user’s application keeps a file open on the server for extended periods of time.   This results in the constant stream of logon/logoff events that you typically observe on file servers and means that logon/logoff events on servers with logon type 3 are not very useful.  It is probably better to focus on access events to sensitive files using object access auditing.

Additional logon/logoff events on servers and authentication events associated with other types of user activity include:

These events will generate logon/logoff events on the application servers involved and Kerberos events on domain controllers.

Also occurring might be NTLM authentication events on domain controllers from clients and applications that use NTLM instead of Kerberos.  NTLM events fall under the Credential Validation subcategory of the Account Logon audit category in Windows.  There is only event ID logged for both successful and failed NTLM authentication events.

A user leaves tracks on each system he or she accesses, and the combined security logs of domain controllers alone provide a complete list every time a domain account is used, and which workstations and servers were accessed.  Understanding Kerberos and NTLM and how Windows separates the concepts of logon sessions from authentication can help a sys admin to interpret these events and grasp why different events are logged on each system.

See more examples of the events described in this article at the Security Log Encyclopedia.

Target Has A Bullseye On Its Chest

When Target announced that it had suffered a major breach of approximately 40 million credit cards and 70 million customer records, the nation as a whole took a collective gasp in shock.

In the aftermath of the initial disclosure, the public then heard from Neiman Marcus that it too had suffered an electronic breach of data that may include credit cards.

These are major retailers, who unlike mom and pop shops, have security programs in their budgets and departments that are specifically tasked with managing and maintaining a secure environment.

Furthermore, both of these retailers are level one merchants which in the credit card world means that they are required by the credit card companies to bring in 3rd party assessors to validate their security, so the question on everyone’s lips is “what’s wrong with retail in America?”

However, that question is inadequate, because the issue is not limited to one vertical market. Just last year, Visa made a major announcement to the grocery industry that hackers were targeting them with malware (sounds a lot like Target).

The same issues that affected Target, will be the same ones with which every industry must contend.

The media attention to these recent breaches is understandable.

They are household names with a long history of providing goods and services. While neither breach comes close to being the largest breach of credit cards in U.S. history, the average person relates to these companies on a personal level, so the outrage caused by their announcements has captured the interest of the media and government officials alike.

At the time of this writing, Congress is calling for investigations and hearings to better understand where the security of these companies failed.

Since, as of yet, only limited data has been released on the nature of the theft and the mechanisms used to steal the data, it is only possible to describe the most critical elements that all retailers must consider when looking to secure their infrastructure.

In general terms, Target has hinted that malware, most likely a memory scraper, was responsible for intercepting credit card data from their POS system as the memory contains credit card information in clear text so that it is usable by the acquiring bank.

If we assume that a memory scraper was responsible, then there are three areas of focus that should be hardened to make data exfiltration as difficult as possible for hackers.

To begin with, the malware has to be installed onto a critical system. To do this, software has to be added to the network In the past several years, weaknesses in firewalls, or insecure remote access practices have allowed external hackers to penetrate protected systems from the Internet which in turn eventually lead to access to a company’s critical payment environment.

Therefore, knowing that your external facing firewalls limit incoming traffic to the least amount possible (while still enabling business critical functions), is the primary step in securing a network.

Along with this step is the mechanism for remote access. The Payment Card Industry Data Security Standard (PCI) lists several requirements for remote access that when implemented properly can help reduce inadequate security. (For more on PCI or to review the standard click here).

If a hacker makes it through the firewall, then the next step is to install the malicious software that can steal the payment data. This is an area where many retail environments have little in the way of adequate protection.

Some companies try to rely on anti-virus software to help prevent malware that can scrape memory. While modern anti-virus programs can detect all kinds of dangerous software including memory scrapers, the truth of the matter is that hackers are producing malicious software faster than anti-virus companies can create the mechanisms to detect them. It is therefore highly likely that anti-virus software will fail to be effective at stopping a hacker who has developed a custom piece of code to scrape memory from a retailer. Hardening the POS environment has proven to be the most effective technique when trying to prevent unauthorized software from being installed on critical systems.

There are numerous ways to accomplish this, but here is a short list of some of the most effective ones used today:

  1. Managing users correctly (limiting permissions, requiring strong passwords that change frequently, disabling accounts when users leave, educating users about sharing login information).
  2. Keeping administrative privileges to a system to programmatic elements whenever possible.
  3. Reviewing security logs from both the POS system and the OS on a daily basis to determine if unauthorized software has been installed.
  4. Use whitelist software that disallows unauthorized applications from running or being installed.

While this list is not all-inclusive, these are the measures that many companies have found to be helpful when developing a POS hardening plan.

Finally, if we simply assume that the firewall (or remote access) was inadequate to stop a hacker from entering the network and that the hacker also managed to infiltrate the POS environment with malware, there is still one area in the network which can be hardened that can help to prevent a breach of data.

That is the external access the secure environment has to the Internet.

This is the security in place at the firewall that limits what data can be sent from within the network out to the internet. Think of this as the inverse of the first requirement listed in this article which was the Internet into the network. Now we are talking about data traveling to the Internet from the network.

If history of breaches has shown us anything, it is that many organizations minimize the importance of managing data that travels from the network to the Internet. Many IT managers concentrate so much on stopping data from coming into the network, that they forget that how data leaves the network is equally if not more important.

It is clear that many retailers have recently had issues in their security programs, but since we have no inside information about their configurations, we cannot state that anything listed in this post directly reflects the processes or security that any of them had in place. Also, we have not discussed any physical security that may have played a factor in stealing data because we have only been receiving questions about electronic security.

If you are tasked with protecting your environment, think of security like an arms race with your IT departments pitted against hackers. The purpose of this post is to simply list the effective places you can beef up electronically that will pay off the most when trying to prevent a security breach.

Today’s CISO Challenges - The Talent Gap

It continues to be challenging being a Chief Information Security Officer (CISO) today – and 2018 promises no rest. As high-profile data breaches escalate, CISOs, CIOs, and other information security professionals believe their organizations are more likely than ever to fall victim to a data breach or cyber attack. What’s more, they’re most worried about something simple, and it’s not even technology. The top concern among CISOs for 2018 was “lack of competent in-house staff”.   
 
Larry Ponemon, author of the report, says he was also surprised by the finding, adding that typically data breaches, ineffective security tools, or some other technical aspect of guarding security tops the concerns list. “Workforce issues are usually somewhere in the middle,” he says. According to the survey of 612 CIOs and IT security pros, the top five threats that worry them the most in 2018 are:

The majority of respondents expect breaches and attacks to stem from inadequate in-house expertise (65%); inability to guard sensitive and confidential data from unauthorized access (59%); an inability to keep pace with sophisticated attackers (56%); and a failure to control third parties' use of company's sensitive data (51%), according to the survey.
 

Do you have a cyber blind spot?

What's the cost of securing your network from a cyber attack? According to Precision Analytics and The CAP Group, many companies are now spending less than 0.2 percent of their revenue on cybersecurity, at least one-third less than financial institutions. If that's you then you may have a cyber blind spot. Brian Walker, a former head of global information technology for Marathon Oil said , "It’s scary…Executives making funding decisions aren't necessarily millennials who intuitively understand how cyber threats work. It’s guys my age that are the problem,” according to Walker, who said he's in his early 50s. “We've been 30-years-trained in a world that doesn't work this way anymore. This cyber blind spot is a real challenge,” Walker said. “Our fear is that we will play an ostrich and put our head in the sand until something blows up and people get killed, or until the lights go out for a month.”
 
The threat isn't new, but it is escalating.
 
Financial services and retailers have been in the limelight for data breaches. Based on analysis developed over 15 years, energy companies that earn $1 billion in revenue a year generally spend about $1 million for cybersecurity; precision found. In comparison, companies within the financial industry with $1 billion in revenue could spend as much as $3 million.
 
The approach to cybersecurity is also affected by the normal separation of departments within individual companies, the experts said. “At many companies, IT security typically falls under the purview of the chief information officer, while operations security staff report to a different boss,” Walker said. The result, there is a communications gap.
 
It's not that the companies don't care about security. But the threat is growing exponentially, and companies of all types have had a hard time keeping up. For instance, “there's been a dramatic rise in so-called supply-chain attacks where a software update itself has been compromised before it's even introduced into a company system,” Walker said.

Do you have a blind spot? Is it under investment in cybersecurity? Or do you have an overdose of confidence in the shiny security whizzbang, which the vendor promised would be as effective as Iron Dome?
 

Host-based Versus Network-based Security

The argThe argument is an old one; are you better off with a network-based detector, assuming all hosts will eventually communicate, or should you look at each host to determine what they are up to?ument is an old one; are you better off with a network-based detector, assuming all hosts will eventually communicate, or should you look at each host to determine what they are up to?

Over five years ago, the network was far simpler. There was a clear perimeter – us versus them, if you will. You could examine all traffic at the egress point (so-called North/South traffic) for potentially hostile patterns while pretty much ignoring local traffic (so-called called East/West traffic) as usually benign. This is usually done with the help of attack signatures which are updated periodically. In other words, classic network-based, signature-driven detection.

This applied to firewalls. You could be network-based and/or have one for each host. The attraction of the network-based firewall is simplicity; one device to deploy and manage versus the hassle of configuring one firewall per host. Notice that this depends on the traditional (simple) network with a clear us/them perimeter. But that is a pretty simple, traditional model that is vanishing fast. Applications are moving to the cloud and the perimeter is porous. You pretty much need a micro-fortress around a host or location.

So, what arguments are the network-based passive monitoring solutions making for themselves? And how do they stack up against a host-based managed solution? Let me count the ways…
 

Claim Response
Passive network monitoring has no impact on endpoint performance A well-designed, user-space host-based solution has virtually no impact on the endpoint 
A network-based solution is transparent to system users The host-based sensor runs as a service and is also invisible to users
Network monitoring is invisible to attackers Insiders know of its existence because they have access to the network diagram; every external attacker assumes that network traffic is being monitored and seeks to be stealthy
Network-based monitoring can listen to all endpoints, regardless of type; no specific sensor is needed A host-based sensor must be provided for each endpoint type; the common ones are Windows and Linux
Passive network monitoring devices are easy to install When host-based sensors are provided as a managed service, they are also simple to install
When monitoring at the egress point only, endpoints can move or be added with no extra effort Endpoints are usually not added/moved randomly, but through a defined process; extending this process to accommodate sensor deployment is no more work than deploying patches or anti-virus

 
And then here are challenges with network based monitoring…
 

Challenge Problem
Network-based signatures are always out-of-date or lagging Zero-day attacks are not detected, maybe worse; detection is limited to attacks with signatures only
Packet inspection is blind to encrypted traffic North/south network traffic is increasingly encrypted
Packet inspection is hard to scale as network speeds increase OTOH host-based approaches scale neatly both up and down; we're going to need a bigger boat
Network monitors can’t handle switched networks; it requires span ports Now you need span ports, more hardware, and networking skills
Network monitors usually can only see north/south traffic Insider threat, anyone? Remember Nyety? It spread laterally. Here’s an article about how to detect.
Network monitoring is blind to host activity; new processes, removable media Remember Edward Snowden?
 
Network monitoring does no log collection; therefore, it can’t meet compliance requirements
 
PCI-DSS, NIST 800-171, and all other compliance standards mandate log collection and retention for 1+ years to be able to perform forensics

 
And now, the advantages of a host-based solution…
 

Advantage of a Host-based Solution
Collect audit trail; meets compliance needs
Develop detailed understanding of user behavior; fight insider attacks
Scales well; no single choke point
Detect subtle patterns of misuse which can’t be seen at a higher layer (first-time-seen, zero day)
Effective for encrypted traffic as well
Sees all actions including east/west
Effective against removable media
Works even in switched networks

 
And to be fair, how to address the challenges…
 

Challenge Response
Sensor deployment to nodes Our solution is a managed service; leave the deployment/configuration to us
Sensor can impact node performance The EventTracker Windows sensor consumes 0.1% of memory/CPU resources and 0.001% network bandwidth
Adding nodes means adding sensors It’s no more complicated than deploying anti-virus
Can’t see all network traffic; only those where a sensor is installed The next-gen firewall you already paid for does see this traffic; we get all of its logs, so why duplicate effort/cost
Sensor must be available for chosen platform An EventTracker endpoint sensor is available for Windows, Linux, AS/400, and IBM iSeries

 
Don't bring a knife to a gunfight. Passive network monitoring may be attractive because of deployment simplicity, and the fit and forget promise, but it is not capable of solving today's network security ad compliance challenges.
 

Avoid Log Monitoring Gaps with Holistic Coverage

A data breach today takes 127 days to detect, according to the Ponemon Institute. Comprehensive visibility and real-time analysis of device and application log data provide an early warning of cybersecurity threats before damage occurs. Log monitoring and Security Information and Event Management (SIEM) decision makers sometimes make short-sighted financial decisions to reduce log sources, only to find that it impacts security decision making and incident response. You can balance advanced threat detection with simplicity and affordability as you protect your infrastructure and assets.

Log Monitoring 101

Logs are a crucial source of insight for security analytics like threat detection, intrusion detection, compliance, network security, insider vulnerabilities, and supply chain risks. Almost all devices and applications produce logs. A mid-sized organization may generate millions of logs daily, too many for manual review and correlation. We are often asked: which logs should I monitor? What are some log management best practices?

A SIEM solution correlates raw log data for crucial security analytics like threat detection, intrusion detection, compliance, network security, insider vulnerabilities, and supply chain risks.

We recommend that you monitor log sources that include infrastructure devices like routers, security devices like firewalls, application logs, web servers, authentication servers, and client devices like laptops. Other log sources include domain controllers, wireless access points (WAPs), and IPS/IDS tools.

Log monitoring is a topic of interest to both hands-on IT and security teams as well as business stakeholders, such as executives interested in risk management.

Log Monitoring Considerations and Best Practices

Here are some critical recommendations regarding log monitoring that provides insight into the health, compliance, and security of your systems, applications, and users:

Getting Started with Log Management and Managed SIEM

Realize that you are not alone as you enhance your cybersecurity posture. There are steps you can take to minimize cybersecurity risks and visibility gaps while expanding your cybersecurity at your own pace. For those looking to evolve their capabilities with a managed security solution, SOC-as-a-Service (SOCaaS) or the more robust and flexible Co-Managed SIEM/SOC can deliver advanced threat protection.

The first step is to collect and archive event logs as an MSP, knowing that adversaries are targeting you and your supply chain. Use a crawl – walk – run approach with EventTracker SIEM from Netsurion to get started and build your understanding and expertise. Continue to enhance your cybersecurity maturity and familiarity with the comprehensive reports and dashboards.

* The original post can be found here: https://www.msspalert.com/cybersecurity-guests/avoid-log-monitoring-gaps-with-holistic-coverage/

Compliance is not a proxy for due care

Regulatory compliance is a necessary step for IT leaders, but it’s not sufficient enough to reduce residual IT security risk to tolerable levels. This is not news. But why is this the case? Here are three reasons:

The key point to understand is that the compliance guidance documents are just that — guidance. Getting certification for the standard, while necessary, is not sufficient. If your network becomes the victim of a security breach and a third party suffers harm, then compliance to the guidelines alone will not be an adequate defense, although it may help mitigate certain regulatory penalties. All reasonable steps to mitigate the potential for harm to others must have been implemented, regardless of whether those steps are listed within the guidance.

A strong security program is based on effective management of the organization’s security risks. A process to do this effectively is what regulators and auditors look for.

Top 4 Security Questions You Can Only Answer with Workstation Logon/Logoff Events

I often encounter a dangerous misconception about the Windows Security Log: the idea that you only need to monitor domain controller logs.  Domain controller security logs are absolutely critical to security but they are only a portion of your overall audit trail.  Member server and workstation logs are really just as important and I’m going to focus this article on the top 4 questions you can only answer with workstation logon/logoff events.

For your workstations to generate these events you need to enable at least the following audit policy.  Remember that XP is configured with the legacy 9 audit categories while Windows 7 and 8 should be configured with audit subcategories under Advanced Audit Policy in group policy objects:

Windows XP Windows 7 and 8
Logon/Logoff for Success & Failure Logon for Success & Failure, Logoff for Success

When Did the User Logoff?

The workstation security log is the only place can answer this question.  Contrary to intuition, Domain Controllers have no idea when you logoff.  When you enter your credentials at your workstation, even though it looks like you are logging into the domain, you are really just logging on to your workstation.  The domain controller authenticates you but the only logon session established is at the workstation.  Windows labels that logon session with a logon ID which is included in both the logon event (528 or 4624) and then in the logoff event (551 or 4647), and that’s how you correlate the 2 events to come up with the duration of the overall logon session.  Remember though that users often remain logged on for days at a time.  So to make the concept of a logon session more meaningful you need to take into account when the workstation console is locked and/or screen saver is in effect.  Thankfully Microsoft has added event IDs to Windows 7 to cover these events.  See events 4800-4803 which are logged if you enable the “Other Logon/Logoff Events” audit sub category.

What Is the Exact Reason for Logon Failure?

Would you believe that Kerberos authentication failure events on domain controllers don’t tell you the exactreason why the request failed?  It’s true though and the reason is because Kerberos authentication ticket request events log use the reason codes specified in RFC 1510.  This Kerberos specification doesn’t contemplate all the different reasons why a logon can fail in Windows, so some Kerberos failure codes logged on the domain controller can mean one of several Windows logon failure reasons. For instance Kerberos failure code 0×12 (Client credentials have been revoked) can mean that the Windows account is disabled, expired or currently locked out.  To get the specific reason the logon failed you need to find the related logon failure event on the workstation where the user attempted logon from.  XP logs a different event ID for each reason (529-537) while Windows 7 logs just one event ID (4625) with the reason stated within the details.

Who Accessed this Laptop While It Was Disconnected from the Network?

Knowing the answer to this question can be important in forensics situations.  When a Windows laptop is disconnected from the network, any domain user out of the last 10 successful interactive logons can logon to the workstation with cached credentials.

Normally, when you logon to your workstation with domain credentials, the workstation checks your credentials with the domain controller and this creates an audit trail on the DC.  But when you logon to a workstation with cached credentials nothing is logged on the DC – after all the whole reason Windows is using cached credentials is because you aren’t connected to the network.

Again, the Logon/Logoff category on XP and the Logon subcategory on Windows 7 save the day.  Just look for logon event 528 or 540 where the Logon Type is 11.  11 stands for an interactive logon with cached credentials.

Is Anyone Trying to Break Into This Computer?

If someone is trying to break into a workstation from over the network by guessing the password of a domainaccount, the authentication failure will show up in the domain controller.  But they are pounding on a local account on that workstation or simply trying random user names the only indication you’ll have are the failed logon events in that workstation’s security log.

As stated earlier, the logon failure events for XP are 529-537 while Windows 7 logs just one event ID (4625) with the reason stated within the details.  How can you tell if the logon attempt involved domain account or not?  Just check the Account Domain under “Account For Which Logon Failed”.  If it matches one of your domains, the logon attempt is likely related to an account on your domain.  If the Account Domain matches the name of the workstation itself, someone is specifically trying to logon to that system using a local account there-in.  If the Account Domain is blank or has some other non-existent domain or user name, someone may be trying to break into that system.

As you can see, workstation logon events are extremely valuable – especially in this era of increased end-point security risks.  Advanced Persistent Threat actors love to start with a compromised workstation and follow a lateral kill chain to the server of their focus.  So, catching intruders at the workstation is a good way to break that kill chain early in the process.

Venom Vulnerability exposes most Data Centers to Cyber Attacks

Just after a new security vulnerability surfaced Wednesday, many tech outlets started comparing it with HeartBleed, the serious security glitch uncovered last year that rendered communications with many well-known web services insecure, potentially exposing millions of plain-text passwords.

But don’t panic. Though the recent vulnerability has a more terrific name than HeartBleed, it is not going to cause as much danger as HeartBleed did.

Dubbed VENOM, standing for Virtualized Environment Neglected Operations Manipulation, is a virtual machine security flaw uncovered by security firm CrowdStrike that could expose most of the data centers to malware attacks, but in theory.

Yes, the risk of Venom vulnerability is theoretical as there is no real-time exploitation seen yet, while, on the other hand, last year’s HeartBleed bug was practically exploited by hackers an unknown number of times, leading to the theft of critical personal information.

Now let’s know more about Venom:

Venom (CVE-2015-3456) resides in the virtual floppy drive code used by a several number of computer virtualization platforms that if exploited…

…could allow an attacker to escape from a guest ‘virtual machine’ (VM) and gain full control of the operating system hosting them, as well as any other guest VMs running on the same host machine.

According to CrowdStrike, this roughly decade-old bug was discovered in the open-source virtualization package QEMU, affecting its Virtual Floppy Disk Controller (FDC) that is being used in many modern virtualization platforms and appliances, including Xen, KVM, Oracle’s VirtualBox, and the native QEMU client.

Jason Geffner, a senior security researcher at CrowdStrike who discovered the flaw, warned that the vulnerability affects all the versions of QEMU dated back to 2004, when the virtual floppy controller was introduced at the very first.

However, Geffner also added that so far, there is no known exploit that could successfully exploit the vulnerability. Venom is critical and disturbing enough to be considered a high-priority bug.

Successful exploitation of Venom required:
For successful exploitation, an attacker sitting on the guest virtual machine would need sufficient permissions to get access to the floppy disk controller I/O ports.

When considering on Linux guest machine, an attacker would need to have either root access or elevated privilege. However on Windows guest, practically anyone would have sufficient permissions to access the FDC.

However, comparing Venom with Heartbleed is something of no comparison. Where HeartBleed allowed hackers to probe millions of systems, Venom bug simply would not be exploitable at the same scale.

Flaws like Venom are typically used in a highly targeted attack such as corporate espionage, cyber warfare or other targeted attacks of these kinds.

Did venom poison Clouds Services?

Potentially more concerning are most of the large cloud providers, including Amazon, Oracle, Citrix, and Rackspace, which rely heavily on QEMU-based virtualization are vulnerable to Venom.

However, the good news is that most of them have resolved the issue, assuring that their customers needn’t worry.
“There is no risk to AWS customer data or instances,” Amazon Web Services said in a statement.
Rackspace also said the flaw does affect a portion of its Cloud Servers, but assured its customers that it has “applied the appropriate patch to our infrastructure and are working with customers to remediate fully this vulnerability.”

Azure cloud service by Microsoft, on the other hand, uses its homemade virtualization hypervisor technology, and, therefore, its customers are not affected by Venom bug.

Meanwhile, Google also assured that its Cloud Service Platform does not use the vulnerable software, thus was never vulnerable to Venom.

Patch Now! Prevent yourself

Both Xen and QEMU have rolled out patches for Venom. If you’re running an earlier version of Xen or QEMU, upgrade and apply the patch.

Note: All versions of Red Hat Enterprise Linux, which includes QEMU, are vulnerable to Venom. Red Hat recommend its users to update their system using the commands, “yum update” or “yum update qemu-kvm.”

Once done, you must “power off” all your guests Virtual Machines for the update to take place, and then restart it to be on the safer side. Remember, only restarting without power off the guest operating system is not enough for the administrators because it would still use the old QEMU binary.

See more at Hacker News.

Cyberattacks on Banks: 5 Growing Threats in 2023

Cyberattacks against banks and financial institutions continue to rise as cybercriminals develop new tactics. 

The global financial sector is one of the biggest cybercrime targets in the world. The volume and sophistication of cyberattacks on banks surged in 2022, spiking considerably at the very end of the year. 

(more…)

The Difference Between a SIEM Solution and SIEM Tool: Features vs. Outcomes

Can you simply buy a “SIEM solution”? Turns out you really cannot, no matter how hard you try nor how passionately the vendor promises. What you can buy at the store is a SIEM tool, which is a completely different thing. SIEM tools are products, while implementing a security or compliance solution involves people, process, and technology. SIEM tools are a critical part of SIEM, but they’re not the whole solution.

Security processes – unlike appliances, software and services – cannot be acquired in exchange for cash. They can only be established by an organization and then mature to an appropriate level. Developing a policy, as well as operational procedures for SIEM, is an important task that has to be handled by the security team.

Over the past decade in working with SIEM technology, this is the one unescapable lesson: People + Process is synonymous with that portion of the iceberg that is under the waterline (not visible and frankly, very large). It has caused very large unsinkable ships to go down (think Titanic).

And it is a problem that our Managed Threat Protection solution was expressly designed to solve. Let us help you strengthen your security defenses, respond effectively, control costs, and optimize your team's capabilities.

Catch more threats. Respond quicker. Simplify compliance.

How to analyze login and pre-authentication failures for Windows Server 2003 R2 and below

Analyzing all the login and pre-authentication failures within your organization can be tedious. There are thousands of login failures generated for several reasons. Here we will discuss the different event IDs and error codes and how you can simplify the login failure review process.

First you need to know the event IDs related to login and pre-authentication failures.

The login failure event IDs are: 529, 530, 531, 532, 533, 534, 535, 536, 537 and 539.

A sample event description for event 529 is:

Logon Failure
Reason: Unknown user name or bad password
User Name: %1
Domain: %2
Logon Type: %3
Logon Process: %4
Authentication Package: %5
Workstation Name: %6

The Windows 2003 server adds some extra fields in the event description:

Caller User Name:-
Caller Domain:-
Caller Logon ID:-
Caller Process ID:-
Transited Services:-
Source Network Address:10.42.42.180
Source Port:0

NOTE: The only difference in event IDs 529, 530, 531, 532, 533, 534, 535, 536, 537 and 539 is the reason for failure. See below:

So how do we analyze these events efficiently and effectively? You need to look within the event description. In the login failure event description we only care about the failure reason, user name, logon type, workstation name and source network address. The rest is all noise.

If you create a flex report with EventTracker, it will only display the required fields instead of the whole report.  It also provides a summary based on the total number of events for each failure type and user name. See the sample below:

Instead of going through hundreds of pages of a lengthy report, the report below provides a quick analysis on login failures based on failure reasons and user name. This allows you to efficiently and effectively analyze login failures in your environment.

Details

Now let’s discuss the pre-authentication failure event.

Pre-authentication failure event id is: 675.
User Name: %1
User ID:  %2
Service Name: %3
Pre-Authentication Type: %4
Failure Code: %5
Client Address: %6

Here it is very important to analyze failure codes. There are tons of failure codes. I would recommend concentrating on the below:

I would recommend using the same flex report format that we did above to get the summary counts based on failure code and user name.

Details

This demonstrates that it is very efficient and effective to analyze pre-authentication failures using this method versus the traditional way, which doesn’t allow you to know how many failures were associated with each username or how many respective failure codes (summary counts, etc.) there were, nor how many failures were associated with one particular workstation, etc.  Analyzing the traditional report for hundreds of events every day becomes nearly impossible.

Five quick wins to reduce exposure to insider threats

Q. What is worse than the attacks at Target, Home Depot, Michael’s, Dairy Queen, Sony, etc?
A. A disgruntled insider (think Edward Snowden)

A data breach has serious consequences both directly and indirectly. Lost revenue and a tarnished brand reputation both inflict harm long after incident resolution and post breach clean-up. Still, many organizations don’t take necessary steps to protect themselves from a potentially detrimental breach.

But, the refrain goes, “We don’t have the budget or the manpower or the buy in from senior management. We’re doing the best we can.”

How about going for some quick wins?
Quick wins provide solid risk reduction without major procedural, architectural or technical changes to an environment. Quick wins also provide such substantial and immediate risk reduction against very common attacks that most security-aware organizations prioritize these key controls.

1) Control the use of Administrator privilege
The misuse of administrative privileges is a primary method for attackers to spread inside a target enterprise. Two very common attacker techniques take advantage of uncontrolled administrative privileges. For example, a workstation user running as a privileged user, is fooled by simply surfing to a website hosting attacker content that can automatically exploit browsers. The file or exploit contains executable code that runs on the victim’s machine. Since the victim user’s account has administrative privileges, the attacker can take over the victim’s machine completely and install malware to find administrative passwords and other sensitive data.

2) Limit access to documents to employees based on the need to know
It’s important to limit permissions so employees only have access to the data necessary to perform their jobs. Steps should also be taken to ensure users with access to sensitive or confidential data are trained to recognize which files require more strict protection.

3) Evaluate your security tools – can they detect insider theft?
Whether it’s intentional or inadvertent, would you even know if someone inside your network compromised or leaked sensitive data?

4) Assess security skills of employees, provide training
The actions of people play a critical part in the success or failure of an enterprise. People fulfill important functions at every stage of the business function. Attackers are very conscious of these issues and use them to plan their exploitations by: carefully crafting phishing messages that look like routine and expected traffic to an unwary user; exploiting the gaps or seams between policy and technology; working within the time window of patching or log review; using nominally non-security-critical systems as jump points or bots….

5) Have an incident response plan
How prepared is your information technology (IT) department or administrator to handle security incidents? Many organizations learn how to respond to security incidents only after suffering attacks. By this time, incidents often become much more costly than needed. Proper incident response should be an integral part of your overall security policy and risk mitigation strategy.

A guiding principle of IT Security is “Prevention is ideal but detection is a must.”

Have you reduced your exposure?

Essential soft skills for cybersecurity success

IT workers in general, but more so IT Security professionals, pride themselves on their technical skills. Keeping abreast of the latest threats and the newest tactics to demonstrate to management and peers that one is “worthy.” The long alphabet soup in the signature, CISSP, CISA, MCSE, CCNA and so on, is all very necessary and impressive. However, cybersecurity puzzles are not solved by technical skills alone. In fact, the case can be made that soft skills are just as important, especially because everyone in the organization needs to cooperate. Security is everyone’s job.

Collaboration

Security is everyone’s job, so a critical success factor for the cybersecurity leader is what you communicate and how you communicate to various stakeholders to gain support, buy-in and behavior change. The soft skills to partner with various individuals and departments throughout your organization will drive the success of any cybersecurity program.

Communication

Too often, IT security leaders speak in the technical jargon of their area of expertise. Not surprisingly, this makes no impact on business leaders nor on others in the organization whose participation is critical to success. After all, a behavior change is only possible if the employee recognizes risk and internalizes the change. This skill, like many others, can be learned and improved with practice. It’s unusual to see a technically capable person want to learn and hone such a skill, but it’s incredibly valuable, and when encountered, its value is readily recognized.

Culture

Culture in this context includes the perceptions, attitudes and beliefs people in the organization have toward cybersecurity. The process of incorporating emotion is often difficult for technical people to comprehend, but plays a central role in communication and collaboration, and therefore success in changing behavior or adoption of new procedures. Old economy companies, such as financial or government organizations, may have a “professional” culture that requires formality and procedure in communication and content. Technology companies with relatively younger employees may react better to communications with humor or animation, and a more informal style. Learning company culture will make collaboration and communication, and therefore cybersecurity, much more effective.

Ultimately, technical skills are necessary for success, but absent these soft skills, a successful cybersecurity program cannot be achieved. As an industry, we tend to emphasize and value technical skills; the same is needed for soft skills.

Protecting Against Ransomware Attacks: What Every Business Needs to Know

Nearly a month ago, threat vectors infected more than 230,000 computers in 150 countries worldwide using ransomware, a type of malware that blocks or limits access to a system until a ransom is paid.

As a result of the WannaCry ransomware attack, a multitude of organizations – including hospitals in England and Scotland – were forced to halt business operations as critical systems were locked up.

The smallest impact of this attack was roughly $50,000 in Bitcoin payments. More severe was the locked down and lost or compromised data.

This type of attack could happen in any industry given how easy it is for hackers to execute. Usually, hackers simply email a link to a victim that, when opened, downloads the malicious software that encrypts files on their network until the hacker receives the ransom. An attack would go beyond credit card theft at the POS portal, to a full ransomware attack where all systems are locked down and millions in revenue could be lost per day.

Not only does a breach hurt the consumer, it can be detrimental to the bottom line and brand reputation. For a small business, it could put the owner out of business altogether, depending on the severity.

“We are not far away from a major breach of a POS system that has nothing to do with stealing credit card data, but instead is intended to hold the business’ ability to conduct transactions hostage for a large ransom. Stealing credit card data takes months, whereas ransomware takes minutes. It will not be long before cybercriminals utilize ransomware that freezes all of a business’ POS systems, and the ransom will not be for the release of data, it will be for the ability to get back in business.”

– Kevin Watson, CEO, Netsurion

Last year, for example, cybercriminals took over a well-known hospital’s internal system, locking medical professionals and staff out. The hackers demanded a $3.7 million ransom forcing the hospital back into the pre-computing era for ten days while they negotiated. Ultimately, they only paid $17,000 to regain access, but the incident caused a major disruption to the hospital’s work flow and put patient care at risk.

Ransomware should be the number one concern for businesses. Attack frequency is at its height as there have been more than 4,000 ransomware attacks happening each day for over a year now.

Attacks on businesses increased from once every two minutes to once every 40 seconds.

Most businesses experienced at least two days without their systems, loss of profits, and the cost of paying the ransom. While firewalls and anti-virus are standard security measures, it is crucial to realize they are not enough.

To help avoid a ransomware breach at your business, consider the following tips.

Practice Constant Vigilance

You should always be on-guard against attacks and have a strong plan of response in place to mitigate them – including use of a managed SIEM – which is key for cybersecurity today. Such measures will deter a compromise of reputation, and employees’ and customers’ sensitive information.

Taking such precautions could help end ransomware attacks altogether because they will cease when they stop being profitable. If fewer people click malicious links and more organizations back up their data, while deploying a proper SIEM and managed network solution, hackers will see far less success.

Contact our sales team for a demo and view our POS Ransomware - Imagine the Impact webcast, where we dive into the ransomware topic and what’s on the horizon.

The Art of Detecting Malicious Activity with Logs

Randy Franklin Smith compares methods for detecting malicious activity from logs including monitoring for high impact changes, setting up tripwires and anomalous changes in activity levels.

Security standards and auditors make much of reviewing logs for malicious activity. I am frequently asked what event signatures are indicative of intrusions: “What are the top Event IDs for intrusion detection?” Ah, if it was only as easy as the movies make it, where the protagonist furiously defends the network while a computer voice stridently calls out “Intruder! Intruder!”

In the real world, a system under attack takes immediate preventive steps instead of simply logging the intrusion. For example: an outsider attacking the system to brute force an account password through repeated logon attempts will find the account locked out by the system. But what about an authentic user accessing authorized data? If a disgruntled employee copies sensitive data to a flash drive, it looks like any other day of normal usage to the operating system. If the system is logging anything at all, there will just be an audit trail of successful access attempts.

It’s not impossible to use logs to detect some intrusions and malicious activity but the first and most important return on investment from logging is an audit trail that can be used to detect high impact changes in security stance, investigate incidents, perform impact analysis, take action against offenders, and to learn how to prevent repeat attacks in the future. Moreover, a properly deployed audit system serves as an effective deterrent control against insider abuse. All of this can be accomplished by enabling logging on monitored systems and implementing a log management solution with high integrity deployment characteristics.

But to get more than change detection and audit trail usage from your logs, you must go upstream from the logging function and get the cooperation from system administrators to configure and operate systems in such a way that certain foreseeable types of malicious activity will recognizable to your log management solution.

Take the security log integrity in Windows: it provides strong protection against tampering with the security log. Unless the operating system is down and you have physical access to the system, you have to be an administrator to erase the security log. (It’s very difficult even with administrator authority to modify event records in the security log – you need a program like the old WinZapper.) Windows logs a specific event ID (517 on Win2003 and 1102 on Win2008) whenever the log is cleared, so it makes sense to generate an alert whenever security logs are cleared as a deterrent to rogue administrators trying to cover their tracks or intruders doing the same. But if your administrators are in the habit of clearing the log when diagnosing system problems, your alert rule will generate false positives. Therefore, in addition to reactive log management you must proactively get administrators to comply with a policy never to clear security logs and allow old events to be deleted as records are naturally purged.

While the previous case demonstrated an example of procedural measures implemented upstream from the log management process, detecting the spread of file-based malware requires you to work with system administrators to set up system objects ahead of time for the purpose of helping the log management solution distinguish between normal file access and malicious activity. Here’s the premise: you want to detect malware that has made it through your preventive controls like antivirus. Most malware either spreads by injecting itself into files of affected file types (i.e. Word documents or image files) or looks for files that it can send back to its nefarious operator.

So, we set up the equivalent of a trip wire for unsuspecting malware or outside intruders to trigger. (In this example I’ll stick with the Windows and Active Directory environment but the concepts would be applicable to other platforms.) To do this, we work with various system administrators to create “honeypot” folders on servers throughout the network. In these folders we put a collection of files with all the common file types including Office documents, image files (e.g. JPG, GIF), PDFs and other files that have been targeted by malware. Ideally we name these honeypot folders with just one or a few easily recognizable folder names. We grant everyone access to these folders and enable file system auditing so no matter what user is the victim, the malware will have access to the folder in order to trigger the tripwire. If we want to detect malware that is spreading itself or simply corrupting data, we limit file system auditing to WriteData and AppendData. On the other hand if we also hope to detect malware that is stealing data we would also enable auditing of ReadData. Then back at our log management solution we would enable alert rules when file system audit events (event ID 560 on Windows 2003 and 4663 on Windows 2008) arrive which identify one of our honeypot folders as having activity. To prevent false positives some training and reminders may be necessary for end-users so that they understand these folders (especially those on file server shares) have nothing useful for them and are there for “system” purposes.

These two examples demonstrate you can take a foreseeable type of malicious activity and implement procedures or system objects to make it possible to detect activity that would normally be ignored because it blends with everyday, legitimate usage. The downside is that cooperation is required from people who are upstream to the log management solution. Depending on the capabilities of your log management solution, you may be able to discover malicious activity without implementing upstream tripwires using a final method: anomalous changes in activity levels.

Some types of malicious activity cause a spike in audit events that can be detected if your log management solution has sufficient real-time analysis capabilities. My favorite example is the disgruntled insider who intends to post thousands of documents to a site like Wikileaks. The user likely already has access to the sensitive documents in question so there may be little or no failed access attempts to alert you to what is happening. Instead, file system auditing, if enabled, will generate successful read attempt events for each file accessed. If the disgruntled employee has been access a handful of documents daily, the sudden access of multiple files will trigger a feature-rich log management solution that keeps a rolling average of normal Read events on sensitive folders for each user and detect a spike in activity. At that point, there is sufficient cause to generate and alert and devote some security staff time to determining the cause. With anomalous activity level detection, some thresholds can be generalized and baked into the log management solution but others would need at least some amount of customization by the organization such defining folders or servers that are considered sensitive.

As you can see, detecting intrusions and abuse with logs is possible but it requires a variety of analysis techniques, the cooperation of system administrators upstream from your log management system, and your log management solution’s ability to analyze large amounts of data to detect sudden changes in activity levels.

Four Ways MSSPs can Boost Security Speed and Readiness

As more service providers explore offering a Managed Detection and Response (MDR) solution, they may face indecision or inertia during startup and optimization. Managed Security Service Providers (MSSPs) know that speed matters in cybersecurity as it improves attack surface coverage, team productivity, and even customer satisfaction. With costs of a U.S. cybersecurity incident now reaching $4.35 Million, it’s crucial that defenders in service provider and customer organizations move fast and with confidence in battling advanced threats.

The Downside of Procrastination

Cyber criminals continue to exploit organizations that they believe to be less prepared or lacking defense-in-depth protection to slow them down. The average time to identify a global data breach is 207 days with an average time to contain of 70 days. Service providers and their end-customers who are slow to implement sufficient cybersecurity and remediate threats face decreased revenue, wounded brand reputation, and dissatisfied or lost customers. Compliance fines may also be a consideration for some industries like financial services firms and healthcare entities. 

Here are some practical recommendations to accelerate incident response and cybersecurity effectiveness.

1. Time Benefit of a Platform Approach

A cybersecurity platform overcomes the disadvantages of siloed point products and tools that add complexity and create blind spots. A unified platform integrates disparate security events to create end-to-end visibility and rapid incident response. An agile, cloud-based platform provides the benefit of sharing insights from one threat with other partners and customers. Watch for security vendors that have grown by acquisition and offer a patchwork of disjointed point products that don’t have a single console. If you are looking for Managed Detection and Response (MDR) insights, view Netsurion’s MDR Buyers Guide covering technology and human-led approaches, managed security options, and advanced threat best practices.

2. Speed of Onboarding and Start Up

Point products and tools can lead to IT complexity and resultant security gaps. The idea of rip-and-replace is a non-starter as it takes too long and adds undesirable risk to the implementation. The average SecOps team manage 40+ cybersecurity products, and consolidating providers means fewer vendors to manage and tools to learn and maintain. It’s painless to adopt Software as a Service (SaaS) solutions that don’t require hardware, capital, or professional services. Rapid ramp-up helps MSPs and end-customers alike as quick onboarding means better protection and faster time to value.

Boost Security

3. Rapid Automation and Proactive Planning   

A 2:00 a.m. phone call is not the time to start thinking about incident response strategies and tactics. Proactive planning is key to finding the proverbial “needle in a haystack” with confidence and the proper people, process, and technology. Automation and machine learning (ML) can streamline response to more well-known threats in advance with defined workflows that document steps as well as roles and responsibilities. As a managed XDR provider, Netsurion increases your efficiency and effectiveness by enabling you to:

Benefits to you include reduced response times, improved remediation consistency, and increased productivity.

4. Accelerate Detection and Incident Response   

Cyber criminals often perform reconnaissance, looking for infrastructure to exploit. Attackers also plan ways to pivot laterally within an organization from innocuous access to sensitive and privileged information. Automated response and guided remediation accelerate threat detection and reduce recovery time when minutes matter. A timid or delayed response by a service provider or end-customer increases the risk of data theft, the likelihood of intruders getting “the keys to the kingdom,” and time for attackers to cover their tracks to evade detection. Security Operations Center (SOC) experts like those at Netsurion augment your staff and can prevent subsequent cyber attacks to avoid re-compromise. Pending U.S. regulations are also likely to reduce the time available for organizations to publicly disclose security incidents.

Benefits of Faster Cybersecurity   

Competing successfully and profitably in today’s fast-paced environment requires a blend of quick onboarding, cybersecurity preparedness, and rapid incident response. Cybersecurity speed is key in the race to detect and respond to dangerous adversaries with agility and confidence. Netsurion’s managed open XDR solution unifies your security telemetry to deliver wider attack surface coverage and deeper threat analytics, resulting in greater threat and risk visibility. We tailor onboarding and management to partner and customer requirements – we go as fast as you need. 

Logs for Insider Abuse Investigations

Introduction

In most previous newsletters, we have discussed the use of logging for various regulatory mandates (such as PCI DSS, HIPAA and FISMA) as well as the use of logs for incident response and malicious software tracking. This log data can also be incredibly useful for detecting and investigating insider abuse and internal attacks.

While comprehensive coverage of insider abuse tracking goes much beyond this article, it was important to note that we will focus mostly on enabling investigations to determine the scope and breadth of insider abuse. Although detecting broad categories of insider attacks in real-time will likely remain elusive for years to come, logs will still play a critical role in detecting and stopping this problem. In fact, according to the 2010 Verizon Data Breach Investigations Report, 86% of those affected by an attack of some sort had evidence of the breach in their log files. However, many other technical and policy safeguards will be required to have a chance of actually thwarting an insider attack “in the act”.

There is no need to provide motivation for insider attack investigation and tracking. While malicious hackers from remote countries may damage your business and incur losses, trusted employee “going rogue” have a better chance of actually destroying your business and causing irreparable losses. Moreover, this trend will continue as more critical business information is created and utilized in digital form. Costs of insider investigations, especially when abuse has been ongoing for months or years, are known to cost much more than malware or other external attacks.

On top of this, there is no single piece of technology or policy that can reliably detect insider attacks as they are happening. Technical controls, access controls based on a well-written security policy, employee monitoring—these all have met with varying degrees of success yet none of them on their own create airtight insider security within an organization, or even guarantee detection of all insider attacks in time. Thus, insider defenses will fail, and accountability in the form of logging will be the only effective weapon, remaining in your arsenal.

There is a way to track insider activity— authorized or not—to provide a continuous fingerprint of everything that happens within the security perimeter. All users, whether trusted and non-malicious or malicious, leave traces of their activity in logs. If an employee opens a file that they need to use to finish a report during the workday, there is a log of this activity. Likewise, if someone accesses a database and downloads data after business hours, there is a log of that activity as well.

So, let’s review how various types of logs can be used for detecting and investigating insider attacks, as defined above.

We will go through a few common types and illustrate how they can help in the discovery and investigation of insider-related incidents.

Firewall logs are often considered to external threats and not “insider-focused.”

Still, these logs are often extremely helpful as a proof of network connectivity by systems under control of malicious insiders. They directly help answer the questions such as “Where did the data go?”, “Who connected to the target system and who didn’t?”, “How many bytes were transferred out?” etc. These are critical during any insider investigation. Of course, the usual assumption is that logging of accepted connections through the firewall needs to be enabled. Overall, firewall logs, while extremely voluminous, provide a useful way to track insider activities on the network in the absence of more robust network monitoring tools.

Next is the favorite of security personnel: network IDS and IPS logs. IDS’s are supposed to be detecting intrusions, but they certainly won’t accomplish that for most cases of insider attacks. However, IDS’s will likely record various suspicious things that might be occurring during the incident. For example, IDS/IPS logs may contain the records of access to administrator accounts of systems and applications, outbound malware connectivity (for cases where insiders use malware to do their bidding) and other events of note. Overall, IDS logs are much less useful for insider attacks compared to regular hacker or external attacks. Still, IDS logging should not be discounted and can be used as a set of mildly suspicious indicators to be correlated with other data sources, such as system and application logs that record activities, not attacks.

Server logs, such as those from Unix, Linux, or Windows truly shine in cases of insider incident investigations. Given that an attack or abuse might not involve ANY network access and happen purely on the same system (with attackers using the console to use the system), server and application logs shed the most light on the situation. However, just as with firewall logs, these don’t talk of “attacks” and “exploits” but of activities, which are not inherently good or bad. As we mentioned before in our compliance newsletters, relevant logged activities on a server include login success/failure, account creation, account deletion, account settings and password changes, various group policy and registry changes as well as file access (read/change/delete). While these logs maybe also be created in bulk, having this data allows one to recreate the “insider path” within your environment.

Overall, server logs provide a key piece of the puzzle for investigating insider attacks. File access logs are probably more insightful than the rest of the log types above since they give granular information on information accessed by the computer users (in many cases, inside attackers will be after valuable data), but such logs are usually created in much larger volume than other server or desktop logs.

Another enlightening source of log data for insider abuse is VPN logs. In a few known cases, an employee or an ex-employee was engaging in nefarious activities from home after work hours, thereby creating a detailed and incriminating trail of their activity — if only the target organization would care to look at remote access logs! VPN logs might also contain references to resources accessed within the company as well as evidence of application use over the VPN. As with system logs, network logins and logouts are also useful during insider-related investigations. Some of the useful VPN log messages are remote login success/failure, session logout, as well as connection session length and the number of bytes moved from the corporate environment to the outside. Overall, VPN logs are indispensable for cases where a trusted insider committed his misdeed while “working” from home.

Somewhat unusual for insider investigation, web proxy logs are also useful for cases where the information was stolen or leaked over the web. Proxy logs can reveal the activities such as connection to a specific website (including file uploads), webmail access (including attachments), several types of HTTP tunneling for data theft and various malware activities. Overall, web proxy logs are extremely useful when the suspected insider was using the company connection for data theft or other network abuse, including e-mailing the confidential information out, or using tunneling over HTTP protocol. However, as with network IDS’s, the use of encryption decreases the utility of such network logs.

As we move higher up the stack, database logs and audit trails begin to come into play. These logs are less frequently collected and analyzed, but usually prove very enlightening in cases related to data theft and unauthorized access. Databases can log a dizzying array of different messages such as database data access (SELECT and other SQL queries), data changes, database structure and configuration change, and database starts, stops, and other administration tasks.

Overall, database logs are useful for investigating attacks where database data theft, access, change, or destruction were involved. Such logs are very detailed and can help piece together what information was gathered. They can also be used for various types of anomaly detection to find “out of character” behavior (sometimes associated with insider abuse). In addition, database logs are the sole source of information on Database Administrator (DBA) activities– and DBA’s can never “go rogue,” now, can they…?

Conclusions

Insider threat will remain a primary information security risk for the foreseeable future. A number of diverse factors (technical, administrative, psychological) contributing to the problem makes it one of toughest challenges in information security. In addition, combined with a high potential financial and reputation loss, it deserves more attention than it is currently given. Analysis of log data from a variety of sources (firewalls, routers, servers, applications, operating systems, network devices, etc.) is essential to tracking insider activity as well as investigating, detecting, or even predicting and preventing insider attacks. Centralized log collection and subsequent analysis (via pattern matching, correlation, or anomaly detection) of all logs and audit trails is of crucial importance.

About Author

Dr. Anton Chuvakin (http://www.chuvakin.org) is a recognized security expert in the field of log management and PCI DSS compliance. He is an author of books “Security Warrior” and “PCI Compliance” and a contributor to “Know Your Enemy II”, “Information Security Management Handbook”; he is now working on a book about computer logs. Anton has published dozens of papers on log management, correlation, data analysis, PCI DSS, security management (see list www.info-secure.org) . His blog http://www.securitywarrior.org is one of the most popular in the industry.

In addition, Anton teaches classes (including his own SANS class on log management) and presents at many security conferences across the world; he recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries. He works on emerging security standards and serves on the advisory boards of several security start-ups.

Currently, Anton is building his security consulting practice www.securitywarriorconsulting.com, focusing on logging and PCI DSS compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging Evangelist, tasked with educating the world about the importance of logging for security, compliance and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook University.

Using Dynamic Audit Policy to Detect Unauthorized File Access

One thing I always wished you could do in Windows auditing was mandate that access to an object be audited if the user was NOT a member of a specified group.  Why?  Well sometimes you have data that you know a given group of people will be accessing and for that activity you have no need of an audit trail.

Let’s just say you know that members of the Engineering group will be accessing your Transmogrifier project folder and you do NOT need an audit trail for when they do.  But this is very sensitive data and you DO need to know if anyone else looks at Transmogrifier.

In the old days there was no way to configure Windows audit policy with that kind of negative Boolean or exclusive criteria.  With Windows 2008/7 and before you could only enable auditing based on if someone was in a group not the opposite.

Windows Server 2012 gives you a new way to control audit policy on files.  You can create a dynamic policies based on attributes of the file and user.  (By the way, you get the same new dynamic capabilities for permissions, too).

Here’s a screen shot of audit policy for a file in Windows 7.

Now compare that to Windows Server 2012.Unauthorized File Access

The same audit policy is defined but look at the “Add a condition” section.  This allows you to add further criteria that must be met before the audit policy takes effect.  Each time you click “Add a condition” Windows adds another criteria row where you can add Boolean expressions related to the User, the Resource (file) being accessed or the Device (computer) where the file is accessed.  In the screen shot below I’ve added a policy which accomplishes what we described at the beginning of the article.Unauthorized File Access

So we start out by saying that Everyone is audited when they successfully read data in this file.  But then we limit that to users who do not belong to the Engineering group.  Pretty cool, but we are only scratching the surface.  You can add more conditions and you can join them by Boolean operators OR and AND.  You can even group expressions the way you would with parenthesis in programming code.  The example below shows all of these features so that the audit policy is effective if the user is either a member of certain group or department is Accounting and the file has been classified as relevant to GLBA or HIPAA compliance.Unauthorized File Access

You’ll also notice that you can base auditing and access decision on much more that the user’s identity and group membership.  In the example above we are also referencing the department specified on the Organization tab of the user’s account in Active Directory.  But with dynamic access control we can choose any other attribute on AD user accounts by going to Dynamic Access Control in the Active Directory Administrative Center and selecting Claim Types as shown here.Unauthorized File Access

You can create claim types for about any attribute of computer and user objects.  After creating a new claim type for a given attribute, it’s available in access control lists and audit policies of files and folders throughout the domain.

But dynamic access control and audit policy doesn’t stop with sophisticated Boolean logic and leveraging user and computer attributes from AD.  You can now classify resources (folders and files) according to any number of properties you’d like.  Below is a list of the default Resource Properties that come out of the box.

Img6_ResourceProperties

Before you can begin using a given Resource Property in a dynamic access control list or audit policy you need to enable it and then add it to a Resource Property List which is shown here.Unauthorized File Access

After that you are almost ready to define dynamic permissions and audit policies.  The last setup step is to identity file servers where you want to use classify files and folders with Resource Properties.  On those file servers you need to add the File Server Resource Manager subrole.  After that when you open the properties of a file or folder you’ll find a new tab called Classification.

Unauthorized File Access

Above you’ll notice that I’ve classified this folder as being related to the Transmogrifier project.  Be aware that you can define dynamic access control and audit policies without referencing Resource Properties or adding the File Server Resource Manager subrole; you’ll just be limited to Claim Types and the enhanced Boolean logic already discussed.

The only change to the file system access events Windows sends to the Security Log is the addition of a new Resource Attributes to event ID 4663 which I’ve highlighted below.

Unauthorized File Access

This field is potentially useful in SIEM solutions because it embeds in the audit trail a record of how the file was classified when it was accessed.  This would allow us to classify important folders all over our network as “ACME-CONFIDENTIAL” and then include that string in alerts and correlation rules in a SIEM like EventTracker to alert or escalate on events where the information being accessed has been classified as such.

The other big change to auditing and access control in Windows Server 2012 is Central Access Policies which allows you to define a single access control list or audit policy in AD and apply it to any set of computers.  That policy is now evaluated in addition to the local security descriptor on each object.

While Microsoft and press are concentrating on the access control aspect of these new dynamic and central security features, I think the greatest immediate value may come from the audit policy side that we’ve just explored.  If you’d like to learn more about dynamic and central access control and audit policy check out the deep dive session I did with A.N. Ananth of EventTracker: File Access Auditing in Windows Server 2012.

Detect Persistent Threats on a Budget

Detect Persistent Threats on a Budget

Detect Persistent Threats on a Budget

There’s a wealth of intelligence available in your DNS logs that can help you detect persistent threats.

So how can you use them to see if your network has been hacked, or check for unauthorized access to sensitive intellectual property after business hours?

All intruders in your network must re-connect with their “central command” in order to manage or update the malware they’ve installed on your system. As a result, your infected network devices will repeatedly resolve to the domain names that the attackers use. By mining your DNS logs, you can determine if known bad domain names and/or IP addresses have affected your systems. Depending on the most current “blacklist” of criminal domains is, and how rigid your network rules are regarding IP destinations that the domain names resolve to, DNS logs can help you spot these anomalies.

It’s not a a comprehensive technique for detecting persistent threats, but a good, budget friendly start.

Here is recent webinar we did on the subject of mining DNS logs.

5 Smart Ways to Thwart Login Attacks

Just like locking your front door is crucial to protect your house, monitoring account logins to organizational servers and workstations is crucial to detect password cracking attempts. Cybersecurity attackers are motivated to gain access to sensitive data and systems, or to use entry to pivot to other valuable targets like supply chain partners. An astonishing 80% of hacking-related breaches involve compromised or weak credentials, according to the 2019 Verizon Data Breach Investigation Report (DBIR).

Attack Background

Login attacks occur when hackers impersonate a valid user, such as a system administrator (sysadmin), by stealing login credentials to gain access to critical systems and steal sensitive data, or for corporate espionage. Small and mid-sized businesses (SMBs) with their finite IT staff and expertise can become the path of least resistance for hackers. There are three primary types of authentication threats to watch for:

It is important that you know these types of attacks so that you can identify foul play on your network. The ultimate login target for hackers is compromising privileged accounts to access systems in the data center or pivot to databases that can be monetized such as credit cards or gift card inventory.

Impacts of Anomalous Login Attacks

There are direct and indirect costs associated with credential-based attacks, especially those that result in information loss and a public data breach. Organizational and customer impacts may have far reaching affects far beyond an actual compromise or security event. Supply chain partners or customers may lose confidence in you and defect for one of your competitors.

Detect Credential-Based Attacks

Monitoring by security experts can detect unusual traffic volumes or geolocations that are worth investigation. Multiple logins over a short period of time are another telltale sign of suspicious activity. A Security Information and Event Management (SIEM) platform with 24/7 monitoring from a Security Operations Center (SOC) and Endpoint Detection and Response (EDR) offers real-time visibility and early threat detection by reducing the attack surface and pinpointing attacks before data exfiltration occurs. Data breaches are often uncovered after the fact when account logins, loyalty points, or credit card numbers are posted for sale in criminal forums.

Defend Against Login Attacks

Updated password practices and login hygiene are some crucial methods for attack surface reduction. Avoid reusing passwords, known as password recycling, across various accounts such as entertainment and business accounts. Some countermeasures to combat account takeover include:

1. Implement behavior analytics:

User and Entity Behavior Analytics (UEBA) capabilities are the baseline of typical user performance and identify suspicious activity such as logins from different or unusual devices, geolocations, or time zones. Behavior analytics can rapidly detect insider anomalies and external threats. Hackers might be able to rob your identity, but they can’t steal your user behavior.

2. Protect privileged account logins:

Implement two-factor authentication for privileged account users like sysadmins that have “VIP” access to Active Directory and Domain Controllers. Policies of least privilege and role-based access control (RBAC) capabilities limit the exposure and reduce the tendency to make every executive a “super user” which increases organizational risk.

3. Enhance security awareness training:

Reinforce the importance of login best practices and effective password hygiene. Since users are the weakest link, include tips about minimizing over-sharing on social media that can disclose weak password information such as birthdate, hometown, and names of children, for instance.

4. Adopt updated password guidelines from NIST:

The National Institute of Standards and Technology (NIST) has issued NIST 800-63 with long-overdue changes and recommendations regarding digital identity and passwords. The guidelines recommend the removal of periodic password changes that merely cause users to write them down or forget them, the elimination of certain complex combinations of letters and numbers in passwords, and comparing new user passwords against lists of both frequently used passwords as well as compromised passwords already exposed publicly and presumably on criminal forums for sale.

5. Reduce your attack surface:

Adopt ways to reduce legacy infrastructure and outdated practices that can weaken your cybersecurity. Implementing segmentation to separate critical applications on your network into subsections can enhance control, performance, and cybersecurity by limiting the “blast radius” for hackers. It’s also important to continuously inventory your infrastructure to minimize drift over time and identify unmanaged devices such as those from rogue employees or visiting vendors.

Bottom Line

Enhance your security operations to continuously improve visibility and defenses. Anomalous login detection uncovers stealthy cyber criminals intent on gaining the “keys to your kingdom” to access VIP accounts in order to pivot to other sensitive data. Employ countermeasures such as UEBA, SIEM, and EDR built into Netsurion’s EventTracker platform to detect and block account takeover before damage occurs. Comprehensive SOC monitoring enables you to predict, prevent, detect, and respond (PPDR) to advanced threats and interrupt numerous steps in the cyber kill chain. 

7 ways you can prevent credit card fraud when shopping!

We know how tempting those summer sales are!

You can’t help buying another bathing suit or those pair of sunglasses just because they are 30% off this weekend only. I don’t blame you!

But are you being careful on where you are swiping your card? How are you protecting your credit card and personal information?

According to the Javelin Identity Fraud report, 13.1 million people were affected by fraud in 2015 alone, which totaled $15 billion in total fraud.

7 ways you can prevent credit card fraud when shopping

Be sure to take these tips with you on your next shopping spree! Shopping is fun but credit card fraud is not.

Be aware of your surroundings and your credit card activity. It is always better to prevent these incidents than have to deal with the bank and credit card companies. Check out similar tips on topics about Anti-virus protection and remote access.

Attention Business Owners:

Protecting credit card information is even a bigger responsibility for business owners than it is for consumers. If you accept credit cards in your business, please make sure your network is protected and that you are PCI compliant. If you are not certain about it, we can help you.

Remote Work: Hidden Evils Revealed

Remote work is seemingly here to stay, with many workers forgoing their commute to work for a nice stroll to their in-home office. The WFH movement provides great flexibility but comes with even greater challenges for cybersecurity.

 

A 200% increase in cyberattacks has been witnessed following the remote working surge, leading to a greater emergency than most experts expected. Prying eyes understand the immense vulnerability working from home represents as we log into unprotected Wifi networks, access servers away from the safety net of the office, and even take our private data with us on the go. This ability for greater work flexibility works to expand and increase the attack surface for cybercriminals, enabling easier access to potential private data through a multitude of unprotected endpoints. Gartner called this expanded attack surface and increase in public cloud use, a major threat in 2022.

 

Remote Work's Impact

Remote work can dramatically increase the potential attack surface and according to Gartner, “These changes in the way we work, together with greater use of public cloud, highly connected supply chains and use of cyber-physical systems," Gartner warned, "have exposed new and challenging attack 'surfaces.'“

 

Working from home increases the use of new technology which may not be detected or equipped with proper security solutions. Many workers now rely on their emails for primary communication, resulting in private information potentially being sent via mobile devices, unsanctioned laptops, etc. Moving this equipment away from the in-office defense can leave unsuspecting users helpless in the event of a cyberattack.

 

"Those had been protecting the castle, but now, people aren't working inside the castle," said Ed Skoudis, president of SANS Technology Institute. "They're out in the field, so those defenses don't protect them there. We've been saying for years that the network perimeters we built were dissolving because of things like wireless and cloud, but then, COVID came and blew it all up."

 

Cybercriminals understand the increased opportunity for hacking that WFH brings, as many users are under the impression it won’t or can’t happen to them, even though they had been under an umbrella of security protocols, firewalls, and other solutions to block attacks and thwart criminals for years while in-office.

 

Most Common WFH Risks

 

1. Expanded attack surfaces

Security teams are already stretched incredibly thin these days, and the expanded attack surface of remote work can make it impossible to secure each endpoint.

 

2. Less oversight

Workers are more in the dark than ever before when it comes to remote work, as they don’t have security teams or experts on their home network, to keep an eye on anything suspicious.

 

3. Poor data practices

Sending unencrypted emails containing sensitive files can be a recipe for disaster and most remote workers aren’t thinking about this layer of protection when they are downloading or sharing private data.

 

4. Phishing attacks

Phishing continues to see stratospheric growth as sophisticated threat actors become more creative with their attempts at garnering link clicks. Remote workers rely heavily on their emails potentially increasing the likelihood of accidentally clicking on a phishing email disguised as a pertinent request from your boss, for example.

 

5. Unprotected Networks

The use of unprotected networks for work purposes can be a costly mistake, as unprotected networks, to a skilled threat actor, can be like putting all of your information out for the world to see. The U.S. Cybersecurity and Infrastructure Security Agency (CISA), highlighted the risk of nation-states attacking home routers in 2022, proving that some attacks may very well be out of your control if you do not possess the technical know-how. VPNs are critical, especially if you choose to use public wifi.

 

6. Cloud misconfigurations

As we all know, the cloud is an essential component to our lives and especially remote work, but still does not go without challenges. Misconfigurations present massive liability on the grounds of failed access controls and accidental provision of too much access to certain users. The “2022 Cloud Security Report” highlighted more than one-fourth of all security professionals experienced cloud security incidents within the past year.

 

7. Webcam hacking 

At one point, the odds are you have used Zoom or Microsoft Teams for a video conference, interview, chat with friends, etc. but even these platforms can be hacked. Cybercriminals have reportedly sabotaged and disrupted online video chats, some even undetected enough to crawl around, stealing data and corporate emails for future use.

 

First-Line Defense

 

1. Keep Your Devices Updated

Any device that connects to the internet is vulnerable to risks. The best defense is to keep device security software, web browsers, and operating systems up to date.

 

2. Use an Antivirus

Antivirus software acts a shield for your computer against incoming threats such as viruses, ransomware, spyware, and other malware.

 

3. Separate Work and Personal Devices

The more devices containing private, company specific information, leads to greater vulnerabilities and gaps in protection.  Limit your personal devices for just as it sounds, your personal life. It may be tempting to take work "on-the-go" but refrain from this mentality when you can.

 

4. Enable Multi-Factor Authentication

No matter how strong your password is, a breach is always possible. Make it harder for cybercriminals to access your account by enabling multi-factor authentication which adds another step for access.

 

Adding MFA to an account greatly increases your security. It may include:

 

Closing Thoughts

Working from home has been a life-saver for countless individuals across the country, but understanding the risks that lie beneath the surface could be the difference between you becoming a victim of cybercrime.  Your organization retains a great deal of responsibility for providing adequate training and implementing security protocols across all sanctioned equipment and servers, but the weakest link can break the chain.  Be vigilant and be smart.

Phishing: The World's Top Cyber Threat

What is Phishing?

Phishing is a type of online fraud which aims to steal personal and financial information by impersonating reputable companies.

Phishing can be done through email, websites, and social media. One of the most common ways phishers try to get your information is by sending you an email from a company you do business with or from someone you know.

The email may ask for your account number or other personal information. It might even say that there's a problem with your account and that you need to update your personal information immediately.

How to Spot a Phish

The best way to spot a phish is by looking for red flags such as typos, spammy subject lines, poor grammar and spelling mistakes. If you are unsure about something, it is always best to contact the company directly via phone or email rather than click on any links provided.

How to Protect Yourself from Phishing Attacks

Phishing scams are becoming more sophisticated and harder to spot every day. It’s not always easy to tell if an email is legitimate or not, which is why it’s important for everyone to know how to protect themselves against these attacks.

The first thing you should do when you get an email from your bank, credit card company or any other service provider is to make sure it’s actually them by looking at the sender’s address in your inbox. A phishing email will often have the name of a well-known company such as “Bank of America,” but the sender's address may be “[email protected]” or “BbccoDc3H6sLfI8MCJpAAABXyh43. A golden rule is to simply use common sense, and truly think of the motive behind the email. It’s better to be speculative than to be gullible.

The Current State of Phishing

Cybercriminals are becoming more skilled and cunning with phishing methods every year, while using tried-and-true strategies to trick their victims and steal from them. The COVID-19 epidemic allowed hackers to increase the frequency in which fraudulent emails were distributed as part of cyberattacks, according to data from Verizon.  As our world shifted predominately online, phishing attempts rose drastically as many of us rely on email to communicate within the online work place.

It might be challenging to discern a phishing attempt from a legitimate email, sms, or information request since phishing attempts can take many various forms. As a result, phishing simulations are a great approach to gauge user knowledge and raise phishing awareness across the board in your business.

Examples of Different Types of Phishing Attacks

Phishing has developed over the years to become increasingly complex, alluring, and difficult to detect. This means there is not a one-size-fits-all approach to identifying spam.

Phishing Email

The annual list of catastrophic data breaches in the globe still includes a sizable percentage of phishing emails. Phishing emails are made to look like they are from a reputable source, such as PayPal, a bank, Amazon customer service, or another well-known company. Cybercriminals conceal their presence in minute details like an email link or the URL of the sender.

Spear Phishing

The information that a cybercriminal has previously gathered about the victim or the victim's company is the foundation of this more focused phishing email assault. Spear phishing emails frequently utilize urgent and well-known language to persuade its victims to take rapid action.

Link Manipulation

This assault uses carefully crafted phishing emails and contains a link to a well-known website. This link directs users to a fake version of the well-known website that is made to resemble the genuine one and requests that they confirm or change their account credentials.

Fake Websites

Phishing emails are sent by online criminals that contain links to bogus webpages, such as the registration login screen for a well-known mail provider, and urge the target to input their login details or other details into the false website's interface. In order to fool consumers, malicious websites frequently employ a small alteration to a well-known URL, such as using mail.update.gmail.com rather than mail.gmail.com.

CEO Fraud

An email address that the victim is acquainted with, such as the CEO's, the HR manager's, or the IT support department's, is used in this illustration of a phishing assault. The email begs the recipient to take immediate action and provide money, change employee information, or download a new program on their computer.

Content Injection

A cunning cybercriminal will hack a well-known website and add a phony authentication server or pop-up that drives users to a false website.

Session Hijacking

With the help of this sophisticated phishing operation, thieves are able to enter a firm's web server and steal the sensitive data that is kept there.

Malware

Clicking an unsolicited email is all it requires to download dangerous malware on a PC or corporate network. These files may even be presented as humorous cat videos, Ebooks, or animated images while still appearing to be legitimate.

OpenSSL 3.0.7 Released: Everything You Need to Know About the High-Severity Vulnerability

OpenSSL originally warned this patch would fix a critical vulnerability impacting all OpenSSL 3.0 installations.

OpenSSL has released a patch fixing the headline-making vulnerability it first announced on October 27th, 2022.  

(more…)

OpenSSL Critical Vulnerability: Everyone Must Update to Version 3.0.7

The open-source cryptographic library is an industry-standard found in an enormous range of applications.

In late October, the OpenSSL Project announced it would release a patch for a critical security vulnerability on November 1st, 2022. The organization did not share any details about the vulnerability itself, other than the fact that it impacts all OpenSSL versions 3.0 and above.  

(more…)

Ransomware Attacks and How to Protect Yourself

What is Ransomware?

An organization or user's access to data on their computer is restricted by malware known as "ransomware." Cybercriminals put businesses in a situation wherein paying the ransom is the quickest and least expensive option to recover access to their data by encoding these files and requesting a ransom demand for the decryption key. For increased motivation for ransomware sufferers to pay the ransom, several variations have included other capabilities, such as data stealing.

 

The first known ransomware attack was called "AIDS" or "PC Cyborg", which surfaced in 1989. Today, there are many different types of ransomware including Cryptolocker, CryptoWall, CTB-Locker, Locky, and TeslaCrypt. Some ransomware variants even go so far as to disable anti-malware software on infected systems so they cannot be removed by other means.

 

 

Emergence of Ransomware

The 2017 WannaCry attack marked the start of the current ransomware mania. This widespread and well reported assault proved that ransomware was both feasible and possibly lucrative. Numerous ransomware variations have since been created and utilized in numerous assaults.

 

The recent rise in ransomware was also influenced by the COVID-19 epidemic. Gaps in firms' cyber security emerged when they quickly shifted to remote labor. These flaws were taken advantage of by cybercriminals to spread ransomware, which led to an increase in ransomware assaults. When compared to the first half of 2020, ransomware assaults climbed by 50% in the third quarter.

 

 

Popular Ransomware Variants

There are several ransomware variants, each with specific features. However, certain ransomware organizations have been more active and profitable than others, setting them apart from the competition.

 

1. Ryuk

A very targeted ransomware variant is Ryuk. It is frequently sent by spear phishing emails or by utilizing stolen user credentials to access business systems over the Remote Desktop Protocol (RDP). After infecting a system, Ryuk encrypts some file types (but ignoring those that are essential to a computer's functionality), then demands a ransom.

 

One of the most costly ransomware variants in use is known as Ryuk. The average ransom demanded by Ryuk is above $1 million. As a result, Ryuk's cybercriminals mostly target businesses who have the means to satisfy their demands.

 

2. Maze

Because it was the first ransomware strain to combine file encryption and data theft, the Maze ransomware is well-known. When victims started declining ransom demands, Maze started gathering private information from their PCs and encrypting it. This data would either be made publicly available or sold to the highest bidder if the ransom demands were not satisfied. A further inducement to pay up was the prospect for a costly data leak.

 

The organization that created the Maze ransomware has formally ceased operations. This does not, however, imply that ransomware is any less of a concern. The Egregor, Maze, and Sekhmet varieties are said to share a same origin, and some Maze associates have switched to utilizing it.

 

3. REvil (Sodinokibi)

REvil started out as a conventional ransomware strain, but it has since developed. Now, it uses the Double Extortion method to steal data from organizations while also securing the files. This implies that attackers may threaten to reveal the hacked information if a second payment isn't received in conjunction with demanding a fee to unlock the data.

 

4. Lockbit

The ransomware-as-a-service LockBit has been active since September 2019 and encrypts data (RaaS). This ransomware was created to swiftly encrypt huge enterprises in order to avoid being immediately discovered by intrusion detection systems and IT/SOC teams.

 

5. DearCry

Microsoft issued remedies for four Microsoft Exchange server vulnerabilities in March 2021. A new ransomware version called DearCry is intended to exploit four previously discovered vulnerabilities in Microsoft Exchange.

 

Some file formats are encrypted by the DearCry ransomware. After the encryption process is complete, DearCry will display a ransom notice telling users to email the ransomware's operators to request instructions on how to unlock their data.

 

6. Lapsus$

A South American ransomware group known as Lapsus$ has been connected to cyberattacks on prominent targets. The cyber gang is well-known for extortion, threatening the publication of private data if its victims don't comply with its demands. The organization has claimed of getting into companies including Nvidia, Samsung, and Ubisoft. The gang masks malware files as legitimate ones by using stolen source code.

 

 

How to Protect Against Ransomware

 

Utilize Best Practices

An effective plan may significantly reduce the cost and effects of a ransomware attack. Adopting the recommended practices listed below can lessen an organization's vulnerability to ransomware and lessen its effects:

 

Cyber Awareness Training and Education: Phishing emails are a common method for spreading ransomware. It is essential to educate people on how to recognize and prevent possible ransomware attacks. User education is frequently seen as one of the most crucial defenses a company can employ, since many modern cyber-attacks begin with a focused email that does not even include malware but merely a socially engineered communication that tempts the user to click on a harmful link.

 

Continuous data backups: According to the definition of ransomware, it is software created so that decrypting encrypted data requires paying a ransom. A company may recover from an assault with little to no data loss and without having to pay a ransom thanks to automated, secured data backups. A crucial procedure for preventing data loss and ensuring data recovery in the case of contamination or disk hardware failure is maintaining frequent backups of data. Organizations may recuperate from ransomware attacks with the assistance of functional backups.

 

Patching: In order to guard against ransomware attacks, patching is essential since hackers frequently search the patches for the most recently discovered exploits before launching assaults on unpatched systems. Because fewer possible vulnerabilities exist within the company for an attacker to exploit, it is crucial that firms make sure all systems have the most recent fixes deployed to them.

 

User Authentication: Attackers using ransomware frequently exploit stolen user credentials to access services like RDP. A strong authentication process can make it more difficult for an adversary to utilize a password that has been guessed or stolen.

How NDR Is Revolutionizing Cybersecurity

Network Detection and Response (NDR) is an exploding field of cybersecurity, providing network-wide monitoring and advanced detection of potential malicious threat actors and suspicious activity, that other tools may miss. An NDR solution continuously scans all entities of network traffic while creating a baseline of normal network activity, creating an incredibly difficult environment for attackers to hide within.

NDR stands out in the market due to its advanced suite of technologies used for detecting suspicious and malicious traffic, such as deep learning, AI, heuristic analysis, and machine learning.

Gartner created the NDR category in 2020, changing the name from its previous, “Network Traffic Analysis” due to the ever-increasing size and scope of data expansion across the cloud. The larger the networks, the longer threat actors can remain hidden without triggering alerts. NDR can detect and contextualize these problems via analytical techniques such as machine learning for threat detection, from the collection of telemetry data. NDR solutions create a resilient shield against zero-day attacks while utilizing sophisticated software to spot and anticipate potential threats before they surface, by analyzing all traffic flows at once.

The Beginning

Network traffic has been monitored for quite some time, but as the sheer amount of data dramatically increased, many organizations could not quite reel in the same insight they once relied on, leading to a new set of issues.

As technology evolved and systems began to manage the seemingly never-ending waterfall of data, Network Traffic Analysis (NTA) was utilized to provide analysis and behavioral tracking of network traffic for computer security. While NTA is still in-use within Security Operations Centers (SOCs), the market has evolved to open up to more advanced necessities and capabilities, such as those that NDR provides.

Advanced behavioral analytics, machine learning, and AI all form the primary backbone of NDR solutions enabling improved detection abilities, accurately determining threat risk levels, and automating manual tasks routinely performed by analysts, allowing them to focus on triage and rapid response maneuvers. Machine learning gives way to sophisticated detection of “known unknown” cyber threats and new zero-day threats “unknown unknown”

known-unknown: dangers that the company is aware of but whose extent and impact are unknown.

unknown-unknown: threats that the business is not even aware it is unaware of.

Why do I need Network Detection and Response?

Security Information & Event Management (SIEM) and Endpoint Detection and Response (EDR) are crucial tools, but not the end-all-be-all to protecting your organization. NDR fills the gaps to augment and help provide a fully comprehensive security monitoring platform, especially with IoT and cloud computing enticing threat actors to make their move now more than ever.

More traditional detection-focused solutions are using signature-based detection methodologies, which work to identify a threat while a security analyst is alerted. Next, incident response is performed, but only after the attack is successful, which could leave your network compromised by quick-moving, seasoned threat actors. These solutions alone, place your organization at major risk, relying on reactive measures rather than proactive approaches. NDR uses machine learning and automated response to accurately predict and remediate incoming intrusions before an attack has been fully launched, potentially saving your data.

According to ExtraHop, “What's more, while attackers may be able to fool firewalls and traditional IDS by masquerading as legitimate users and services and avoiding signature-based detection, they can't escape NDR. That's because it's almost impossible for them to avoid certain key activities on the network, which NDR can detect. It enhances rules-based detection with machine learning technology to model the behaviors of entities on the network and contextually identify anything that resembles known attack techniques. That means even legitimate-seeming processes may be flagged if their appearance seems unusual.”

Proactive Approach

Cybercriminals have more advanced tools at their disposal than ever before, even accessing nation-state-level tools.

“Tools developed by nation-states have made their way onto the black market many times. An infamous example is the Eternal Blue exploit, which was used by the WannaCry hackers,” comments Ian Pratt, Global Head of Security, Personal Systems, HP Inc. “Now, the return on investment is strong enough to enable cybercriminal gangs to increase their level of sophistication so that they can start mimicking some of the techniques deployed by nation-states too.

NDR provides a safety net against highly pervasive and sophisticated threat actors, providing a deeper level of security than EDR & SIEM together.

Logs and Endpoint Security Aren’t Enough

SIEMs and other endpoint tools are showing glaring weaknesses in detecting threats that are not simply malware-oriented, leaving lateral movements, such as stolen credentials, potentially undetected.

Furthermore, SIEM reporting can be unbelievably frustrating and complex, leaving only trained SIEM specialists with the ability to accurately determine actionable insights. Non-tech-savvy members of your organization would have immense trouble understanding reports which make for confusing strategies and communication gaps.

According to a NetWrix national survey, 63 percent of survey respondents said that they had difficulty understanding the reports output by their SIEM and a further 53 percent reported that they had to manually tweak their SIEM reporting so that non-tech stakeholders could understand.

IoT Needs Sophisticated Protection

IoT devices do not possess the computing ability or just are too small, like your Nest Thermostat, to run security protocols. Cyberattacks on these devices could lead to critical losses because of immediate physical concerns, such as the loss of front-door lock access or home-security take-over. Many of these devices are used in healthcare for patient vital monitoring and other high-risk situations. IoT devices are generally used throughout a large, interconnected network, with many also being portable, leading to the potential exposure of multiple networks.

Many users possess 10 or more interconnected IoT devices, challenging analysts and professionals in managing the complex web of connected features and configurations. NDR empowers organizations to manage these devices by overseeing their network activity, rather than focusing on each individual device’s software.

Context Matters

NDR solutions provide context-rich insights into your network, painting a full picture of all activity, including important questions:

NDR forms a powerful team when used in conjunction with a SIEM to provide rich context and validation to detections made within each tool.

Final Thoughts

NDR can be a lighthouse to organizations struggling to maintain a coherent, complete picture of their cyber environment, due to its state-of-the-art ability to detect incoming threats and anomalies that other tools inevitably miss. From behavioral analytics and machine learning to threat response automation, with the addition of NDR, your organization is better protected from evolving threats.

How Do Biometrics Affect Cybersecurity? 

Biometrics 101 

Biometrics utilize your physical characteristics to assess identification matters such as fingerprint scans, facial recognition, retina scans, etc. as a more advanced sector of security. Biometrics is simply defined as a biological measurement or a unique physical characteristic that not even your twin would share. Think of it as you, yourself, being the password. 

 

The biometrics industry has experienced massive growth and momentum over the last decade as more and more cyber-attacks have placed companies in a position to think through more advanced, alternative security measures such as biometric identification. Totaling upwards of $68 Billion in just five years, this industry doesn’t show signs of slowing. 

 

Let’s dive deeper into the benefits but also the potential hidden dangers of biometrics in cybersecurity. 

 

Three Types of Biometric Security 

Biometric security can be grouped into three main subcategories such as: 

 

Biological biometrics are exactly what they sound; using your biological makeup to use as identifiers for security purposes such as your DNA, tested through fluid samples. 

 

Morphological biometrics are most commonly used via your laptops, phones, tablets, etc. which include your physical traits like fingerprints and eye/facial shape, which are mapped through different types of security scanners. 

 

Behavioral biometrics include your walk, speech, and other purely behavioral traits exhibited on a daily basis that give way to succinct patterns. Similar to how interrogators use small microaggressions such as the twitch of a nose, or the quiver of a lip for hints of false testimony. 

 

Examples of Biometric Security 

While there are many different forms, here are some more common examples: 

 

Odds are, you have run into many, if not all these biometrics at one point or another, whether that be at the hospital or just using an electronic device. Biometric security can be used in a plethora of different applications from a simple fingerprint scan to access a phone, to the protection of nuclear systems via multiple advanced biometrics such as retina/iris scans. 

 

Biometrics has seen a stratospheric rise in adoption over many different industries recently, such as:  

 

While the adoption rates rise, the costs begin to drop for biometrics as to allow mid to small business use and even individual applications are being seen in the market. In days past, only the most high-end phones were equipped with fingerprint scanners but now even the $75 models come fully equipped with this setup. Biometrics are becoming an integral part of everyday life and it seems only inevitable that most businesses will adopt this ideology as well, even on the smallest scale.  

 

biometrics

 

But, Are They Safe? 

Passwords are forgotten every day, subsequently, they are changed just as often, but biometrics stay with you for your lifetime and are unable to be “changed”, so does this mean they are foolproof? Well, not exactly, but extremely close. 

 

A biometric such as your handwriting or signature can not be stolen, but it can be learned by someone willing to take the time. Similarly, a physiological biometric like face mapping can be stolen through a photograph or some other illegally obtained means of duplication, while this is just a copy, it could still pose potential issues. Even though these biometrics can, in theory, be “stolen”, that does not mean instant access for your attacker since most systems use what’s called “liveness tests”. These tests help prevent and reject any samples of duplicated information such as fingerprints obtained on a piece of tape, or using a photograph of your target to gain entry.  

 

Many devices and systems have taken extra precautions against the examples listed above; take LG for example. They combine facial and voice recognition along with a heartbeat sensor to ensure a copy of a fingerprint can not be used in the same manner as a live person. The real challenges lie in solely facial scanners which have been successfully tricked by researchers and attackers alike. 

 

Researchers at the University of North Carolina set up an experiment to hack into facial recognition systems by downloading social media images of the volunteers and using them to construct 3D models of their faces, ultimately breaking into 4 out of 5 systems; a 90% success rate. 

 

Cloning fingerprints can be done reliably, cost-effectively, and rather quick as a demonstration at the Black Hat Cybersecurity conference showed duplicating a fingerprint using molding plastic or wax in as little as 10 minutes. Biometrics may be the way of the future, but that certainly does not expel risk. 

 

One more example of that aforementioned risk presented itself after the release of the Iphone 5, when members of the group, Chaos Computer Club, successfully bypassed the new fingerprint scanner by simply photographing the target fingerprint on a glass surface and then using it to unlock the phone. Obviously, technology has well evolved since the Iphone 5’s release, but with that comes the evolution of hackers and attackers hoping to create new ways to slip by these biometric systems. 

 

Biometric Data Security Concerns 

The more mainstream adoption of biometrics comes with a few data security concerns attached to it. Cybercriminals aim to get their hands on as much personal data as possible and these biometric systems host exactly the kind of information that attackers seek. In 2015, the US Office of Personnel Management was hacked, exposing upwards of 5.6 million fingerprints of official government employees, essentially leaving their identities unlocked for anyone to steal. 

 

Best practices for storing this type of data result in housing this information on a single device rather than a database no matter the level of encryption, as hackers can breach a system and take any and all data that is not properly secured, whereas breaching a single devices information is much more difficult. 

 

Ways to Protect Biometric Identity 

Biometric authentication should not be your sole means of protection as multiple means can dramatically increase the safety of your information, such as “liveness tests” like blinking that aren’t able to be duplicated or machined. 

 

Even more advanced systems have begun implementing add-on features for enhanced security such as age, gender, and height to increase the difficulty of obtaining all of this information legally.  

 

Two-factor authentication layered with biometric initial access can be a powerful combination and one that is recommended for secured internet devices as to lessen vulnerability.  

 

Takeaways on Biometrics 

Overall, biometrics continue to dominate the market and look to drastically increase security of systems through combinations of physical/behavioral scans along with other authentication. Utilizing simple, character-based passwords, are becoming a thing of the past as biometric technology continues to evolve. 

 

Do you trust biometrics and the new realm of biometric tech? Let me know in the comments. 

Cybersecurity Awareness Month | October 2022

 

Starting 18 years ago, cybersecurity awareness month has magnified into a global effort to educate, inform, and empower everyone to protect themselves online as cyberthreats continue to see dramatic increases over the past decade. As our livelihoods shift predominately online, we become more vulnerable to prying eyes and malicious threat actors. This collaboration between the National Cybersecurity Alliance (NCA) and The Cybersecurity and Infrastructure Security Agency (CISA) helps to limelight crucial tips and steps to remain vigilant wherever you go online.

 

 

Here is an excerpt from CISA on this year’s CAM theme:

 

“This year’s campaign theme — “See Yourself in Cyber” — demonstrates that while cybersecurity may seem like a complex subject, ultimately, it’s really all about people . This October will focus on the “people” part of cybersecurity, providing information and resources to help educate CISA partners and the public, and ensure all individuals and organizations make smart decisions whether on the job, at home or at school – now and in the future. We encourage each of you to engage in this year’s efforts by creating your own cyber awareness campaigns and sharing this messaging with your peers.”

 

This year’s theme centers on the individual rather than just large companies and organizations to place importance on the role we all play in creating safer online environments. Here are 4 steps that EVERYONE can take, no matter your expertise in cybersecurity:

 

1. Enable Multi-Factor Authentication
2. Use Strong, UNIQUE passwords
3. Report Suspicious Emails and Activity
4. Keep Your Software Updated

 

 

What YOU CAN Do

 

“When we say See Yourself in Cyber, we mean to see yourself in cyber no matter what role you play.” - CISA

 

You may not have a role in IT or cybersecurity whatsoever, and you may be the least technologically savvy person in your family, but you still have the ability to safeguard your personal and private data!

 

Here are some tips from the U.S Securities & Exchange Commission:

 

Be Careful What You Download. When you download a program or file from an unknown source, you risk loading malicious software programs on your computer. Fraudsters often hide these programs within seemingly benign applications. Think twice before you click on a pop-up advertisement or download a "free" game or gadget.

 

Use Your Own Computer If You Can. It's generally safer to access your online brokerage account from your own computer than from other computers. If you need to use a computer other than your own, you won't know if it contains viruses or spyware. If you do use another computer, be sure to delete all of the your "Temporary Internet Files" and clear all of your "History" after you log off your account.

 

Don't Respond to Emails Requesting Personal Information. Legitimate entities will not ask you to provide or verify sensitive information through a non-secure means, such as email. If you have reason to believe that your financial institution actually does need personal information from you, pick up the phone and call the company yourself - using the number in your rolodex, not the one the email provides!

 

Security Tip: Even though a web address in an email may look legitimate, fraudsters can mask the true destination. Rather than merely clicking on a link provided in an email, type the web address into your browser yourself (or use a bookmark you previously created).

 

Be Smart About Your Password. The best passwords are ones that are difficult to guess. Try using a password that consists of a combination of numbers, letters (both upper case and lower case), punctuation, and special characters. You should change your password regularly and use a different password for each of your accounts. Don't share your password with others and never reply to "phishing" emails with your password or other sensitive information. You also shouldn't store your password on your computer. If you need to write down your password, store it in a secure, private place.

 

Use Extra Caution with Wireless Connections. Wireless networks may not provide as much security as wired Internet connections. In fact, many "hotspots" reduce their security so it's easier for individuals to access and use these wireless networks. Unless you use a security token, you may decide that accessing your online brokerage account through a wireless connection isn't worth the security risk.

 

Log Out Completely. Closing or minimizing your browser or typing in a new web address when you're done using your online account may not be enough to prevent others from gaining access to your account information. Instead, click on the "log out" button to terminate your online session. In addition, you shouldn't permit your browser to "remember" your username and password information.

 

Use your voice this October to advocate for a better understanding of safe, online practices, whether that be to your family, via social media, co-workers, etc. YOU can make a difference in the safety of others online.

 

More on how you can help: Click HERE

 

 

Machine Learning and AI in Cybersecurity

Artificial intelligence (AI) and machine learning are positioned to assist today's enterprises as they fight to defend themselves against the rising number of cyber attacks. 

 

Real-time learning and analysis of potential cyber risks is made feasible by AI and machine learning. Additionally, they use computers to create behavioral models, employing these models to forecast cyberattacks as new information becomes available. By accelerating and improving cybersecurity responses, these technologies work together to help businesses strengthen their security defense. 

 

An Effective Tool for Combating Cyber Attacks 

Cyberattacks have increased as more firms adopt digital transformation strategies. According to the Identity Theft Research Center, 2021 has been a record-breaking year in the U.S., with the number of data breaches at the end of the third quarter surpassing all of 2020 by 17 percent. Likewise, ransomware assaults have been rising alarmingly, with the typical incidence costing businesses over $700,000. Today, a ransomware assault occurs every 11 seconds, causing a 21-day company outage average. 

 

AI and machine learning can guard against these advanced threats, which hackers are using to shut down business networks. In fact, these technologies are rapidly advancing into commonplace tools for cybersecurity experts in their continuing battle with malicious actors. 

 

61 percent of firms said they won't be able to recognize major risks without AI, and 69 percent think it would be vital to counteract cyberattacks, according to a survey by Capgemini Research Institute. In fact, it is predicted that the market for AI in cybersecurity would reach $46.3 billion by 2027. 

 

 

Benefits of AI and Machine Learning 

AI and machine learning are having a significant positive impact on cybersecurity programs at organizations. These consist of: 

 

 

Potential Uses 

Although there are risks associated with AI and machine learning, their usage is only anticipated to grow in the future. These technologies have already shown themselves to be quite successful in a variety of application scenarios. The following are some typical use cases where businesses are effectively utilizing AI and machine learning: 

 

 

Planning Your Implementation 

It may be tough to know where to begin when integrating AI and machine learning into one's cybersecurity strategy, which is why many firms find it problematic. As you start implementing your implementation strategy, keep the following advice in mind to get the greatest results: 

 

 

Powerful Tools for An Escalating Problem. 

AI and machine learning are potent tools that may aid firms in becoming more prepared as the volume and sophistication of cyberattacks rise. Your firm can identify and respond to cyberattacks in real-time with the correct technologies in place, while also resolving potential risks before they become major problems. As a consequence, you can better manage the pace and scope of today's risks and discover threats sooner, for less money, and with a security posture that is stronger. 

 

How Lumifi Can Help 

We not only utilize the industry’s leading threat intelligence platforms, but also deliver personalized security recommendations through scheduled calls with a dedicated Engagement Manager. Our suite of services allows you peace of mind knowing your organization is being monitored around the clock by an industry leading SOC which takes pride in its customers' security.   

 

NetWitness Announces New Managed Detection and Response Service

Small to mid-size enterprises can now leverage more comprehensive threat detection & response technology delivered remotely.

September 21, 2022 09:00 AM Eastern Daylight Time

BEDFORD, Mass.--(BUSINESS WIRE)--NetWitness, a globally trusted provider of threat detection and response technology and incident response services, today announced the availability of a new Managed Detection and Response (MDR) service to enable companies to leverage NetWitness for expanded cybersecurity in a fully outsourced model. The new NetWitness MDR Service helps customers address the ongoing cyber skills shortage while keeping their organizations well-protected from attacks by combining technology, planning, training, and managed detection into a single, complete offering.

“It’s a natural evolution to offer an MDR service that assures effective detection and response 24/7, so customers receive the maximum benefit of the NetWitness Platform XDR solution, all the time.”

Ultimately, the success of cybersecurity depends on the availability of skilled security analysts and threat hunters, a major challenge due to an ongoing skills shortage. According to the (ISC)2 Cybersecurity Workforce Study, 2021, there’s a worldwide gap of over 2.7 million cybersecurity professionals.

“NetWitness delivers outstanding security visibility, threat detection and response,” said Tod Ewasko, Chief Product Officer at NetWitness. “Yet, cybersecurity also requires experienced and skilled professionals, especially for powerful tools like NetWitness XDR. As customers struggle with the current staffing and skills shortages, trusted services like NetWitness Managed Detection and Response and Incident Response offer a winning strategy.”

“We’ve worked shoulder-to-shoulder with NetWitness customers for decades, helping them respond to ever-more-dangerous incidents,” said David Gaik, Senior Director, NetWitness Professional Services. “It’s a natural evolution to offer an MDR service that assures effective detection and response 24/7, so customers receive the maximum benefit of the NetWitness Platform XDR solution, all the time.”

Customers increasingly request an MDR service that works closely with NetWitness XDR. In this focused model, NetWitness provides customized offerings that deliver whatever organizations need: skilled security analysts who connect directly to a NetWitness Platform XDR infrastructure to perform critical functions including threat hunting, incident management, even system administration and upgrades. Internal staff are freed to do strategic activities like planning and systems hardening.

The NetWitness MDR service is an ideal solution for mid-size or smaller enterprises that seek to partner with trusted analysts and threat hunters that deliver world-class cybersecurity on a proven XDR platform. It is initially available in the U.S. and Canada in conjunction with Lumifi Cyber, a premier provider of managed detection, located in Scottsdale, Arizona. Clients outside North America may be serviced by a different NetWitness certified partner.

To learn more about the new NetWitness MDR service, visit netwitness.com.

About NetWitness

NetWitness, an RSA® Group Business, provides comprehensive and highly scalable threat detection and response capabilities for organizations around the world. The NetWitness Platform delivers complete visibility combined with applied threat intelligence and user behavior analytics to detect, prioritize, investigate threats, and automate response. This empowers security analysts to be more efficient and stay ahead of business-impacting threats. For more information, visit netwitness.com.

 

About Lumifi

Lumifi is a managed detection and response (MDR) services provider of enterprise-grade security for companies of all sizes. They use NetWitness Platform XDR to deliver continuous end-to-end protection against ransomware and the latest security threats. Their state-of-the-art Security Operations Center is staffed by a team of US-based analysts, ex-military and former DoD security experts to continuously monitor and manage customer environments. For more information, visit lumificyber.com.

 

©2022 RSA Security LLC or its affiliates. All rights reserved. RSA and the RSA logo are trademarks of RSA Security LLC or its affiliates. For a list of RSA trademarks visit https://www.rsa.com/en-us/company/rsa-trademarks. Other trademarks are trademarks of their respective owners. RSA believes the information in this document is accurate. The information is subject to change without notice.

Cloud Attacks: Are You Still Safe?

Cloud Attacks: Are You Still Safe? 

95% of respondents are using the cloud, according to the 2016 State of the Cloud Survey. The nature of cloud-based computing offers the prospect of severe cloud security breaches despite its fast expansion, which can significantly harm an enterprise. One of the top worries is data security.

 

How can IT administrators maintain flexibility, data access, and innovation while still protecting themselves (and their companies)?

 

Let's look at 7 recommendations to protect your company against cloud security concerns.

 

1. Educate your employees.

There is a simple reason for the security concerns in the majority of organizations: unaware staff. You may reduce risk and stop cloud security risks by educating your personnel on suitable protection techniques:

 

Include the entire organization. Employees are more inclined to own up to their responsibilities regarding security measures when they actively participate in safeguarding corporate assets. Engage the whole staff in security training and inform them of future best practices.

Make a plan. Establish a reaction plan in case staff members believe their privacy has been violated. To ensure that users are always ready, create a document that outlines the actions they should do in various circumstances.

Conduct ad hoc security testing. It's crucial to educate your staff, but only if they remember the knowledge.

 

2. Secure a data backup plan.

The risk of irreversible data loss is increasing as the cloud develops. A secure backup of such data should be prepared for anything.

 

For enhanced security, IT administrators should spread data and applications over several zones and follow industry best practices for disaster recovery, offsite storage, and regular data backup.

 

3. Encryption Is Critical

For protection, cloud encryption is essential. It enables the encryption of text and data before it is uploaded to a cloud storage system.

 

Find out from your provider how data is managed. You may encrypt at the network's edge to guarantee the security of your data before it leaves your company, guaranteeing the transit of data in the cloud is safeguarded. Keep the encryption and decryption keys after the data has been encrypted. If you have both of these, any demands for information will require the owner's involvement even if the data is kept by a third-party supplier. Avoid storing encryption keys in the program that houses your data. IT departments must maintain physical control over encryption.

 

4. Passwords Matter

Considering that passwords are used to encrypt and compressed data, selecting one carefully is crucial. 90% of passwords can be broken in a matter of seconds.

 

According to Duncan Stewart, director of technology for Deloitte Canada, "passwords having at least eight characters, one number, mixed-case letters, and non-alphanumeric symbols were originally regarded to be strong." However, with the development of advanced technology and software, these may be readily hacked.

 

Despite the propensity for password reuse caused by our limited capacity to recall complicated credentials, avoid taking that risk. Create unique, distinctive passwords to fend against hackers.

 

5. Test, Repeat, Test Again

Think like a criminal while putting safeguards in place to secure your cloud. Penetration testing, a process in IT security intended to find and fix vulnerabilities as well as reduce cloud security risks, is one of the best ways to do this.

 

Here are some things to remember:

 

Be careful to alert your cloud provider before starting a penetration test because it resembles an actual assault.

Make a list of the things you need to test, such as servers and apps, and assess your weaknesses.

 

Keep in mind that internal dangers are just as likely as external ones when you develop your cloud penetration testing strategy.

Cyber Corruption: LAPSUS$

What do Microsoft, Okta, T-Mobile, Nvidia, and LG all have in common? Well, for starters, they have all been extorted by one of the most prolific and unpredictable hacking groups of 2022.

 

The group coined, LAPSUS$, remarkably infiltrated and extorted a handful of the largest, pre-imminent tech giants in the world through a unique approach of SIM-swapping, social engineering, malware, and other means to enact their financially-driven motives, such as threatening the public release of proprietary data or simply dumping private data on their digital channels for all to see which certainly separates them from other “successful” hackers and groups of the last several years, not to mention they may all be between 16-21 yrs. old.

 

Let’s take a deep dive into the psyche of LAPSUS$ and what exactly makes them so dangerous, yet so bewildering.

 

Who Is Truly Behind LAPSUS$? 

Uncovering the leader or “brains of an operation” can culminate in immense understanding and ultimately dismantling of a criminal organization, but unfortunately, this cohort seems to work in a decentralized manner, closer to chaos than order. Some of the infamies certainly arise from their childish antics, leading to assumptions of inexperience.

 

The list of high-profile attacks would be enough for most cyber criminals to “hang it up” and relinquish to the dark recesses of the internet to preserve earnings and evade detection, but LAPSUS$ touts these victories via a public “Telegram” channel as well as polling viewers on their next “hit”. The social community seems to be the bread and butter of this group, alluding even further into their adolescent composition.

 

 

The LAPSUS$ group hit headlines in December of 2021, with a barrage of attacks against South American companies, including Brazil’s Ministry of Health and other government agencies in the area, before expanding their scopes onto larger, multinational companies to truly catapult into the limelight. At this point, the group had the full attention of the cybersecurity community and didn’t intend to squander it.

 

Fame and fortune stood around the corner as the group shifted to the pillars of international tech giants as their next prey, hoping to utilize their immense influence and coverage to the group’s advantage.

 

As stated via their Telegram channel, LAPSUS$ negates any state or political motives for their extortion attacks, leading some to question the seemingly randomized actions of the group. Is there a collective goal beyond notoriety and wealth?

 

 

How Does LAPSUS$ Operate? 

Microsoft released a ground-breaking report in March of 2022, outlining LAPSUS$’s operational inner workings with speculation on how they were able to extort the largest tech giants in the world. The report did not divulge the members of the group, but rather their model of pure destruction and social engineering methodologies used to extract data from even the most secure of systems.

 

While the group may be comprised of juvenile counterparts, Microsoft repeatedly spoke on the intricate, elaborate, and downright cunning methods used, similar to the most mature threat actors.

 

Let’s take a look at their strategies.

 

Telegram Channel 

LAPSUS$ proved time and time again, that they are to be taken seriously regardless of the make-up of their group, forcing C-suite cybersecurity executives to take notice swiftly. Microsoft stated they tend to gain seemingly impossible access via “social engineering” involving the bribing of employees at targeted locations within customer support call centers and/or various help desks.

 

Microsoft wrote, “Microsoft found instances where the group successfully gained access to target organizations through recruited employees (or employees of their suppliers or business partners)”

 

LAPSUS$ recruits “insiders” via social media channels since the beginning of their attacks, using nicknames such as “Oklaqq” and “WhiteDoxbin” to name a couple. These recruitment posts offered upwards of $20k/week to informants employed within companies like AT&T, Verizon, and T-Mobile. Their message was simple, just get us in the door and we will do the rest.

 

 

SIM-Swapping Method 

SIM swapping is most simply described as transferring one’s mobile phone number (the target) to another device owned by the hacker. This opens the doors for attackers to receive those unique one-time codes & passwords for easy access to protected systems, while potentially gaining the ability to reset passwords for total control.

 

“Their tactics include phone-based social engineering; SIM-swapping to facilitate account takeover; accessing personal email accounts of employees at target organizations; paying employees, suppliers, or business partners of target organizations for access to credentials and multifactor authentication (MFA) approval; and intruding in the ongoing crisis-communication calls of their targets,” Microsoft explained.

 

Unit 221B, an advanced cybersecurity consultancy from New York, shadows cybercriminals performing SIM-swapping as well as keeping tabs on members of LAPSUS$ before their group ever formed (and still does). The group’s techniques, while wildly effective, are not unique, as this form of SIM-swapping has been heavily focused on within major phone companies for many years. Allison Nixon, Chief Research Officer of Unit 221B, exclaimed, “LAPSUS$ may be the first to make it extremely obvious to the rest of the world that there are a lot of soft targets that are not telcos,” Nixon said. “The world is full of targets that are not used to being targeted this way.”

 

The group also employs a malicious malware program called, “RedLine Stealer” or simply “RedLine”, which can be found on hacker forums for purchase and is commonly used for theft of information and infection of entire systems. Logins, passcodes, autofill data, and even stored payment info can be uncovered and extracted to access a plethora of personal accounts such as:

 

RedLine Stealer was once again put into action by LAPSUS$ against Electronic Arts (EA), threatening to reveal 780 GB of proprietary source code, unless a hefty payment was received. The hackers revealed they gained control of EA’s data via authentication cookies purchased from the dark web in a marketplace called, Genesis.

 

“The existence of this leak was initially disclosed on June 10, when the hackers posted a thread on an underground hacking forum claiming to have EA data, which they were willing to sell for $28 million. The hackers said they used the authentication cookies to mimic an already-logged-in EA employee’s account and access EA’s Slack channel and then trick an EA IT support staffer into granting them access to the company’s internal network,” wrote Catalin Cimpanu for The Record.

 

 

Social Engineering & Corporate Extortion 

Social engineering attacks work by stealing credentials that allow for data theft and other debilitating means via psychological manipulation of individuals to release critical data to attackers. Microsoft stated LAPSUS$ received “intimate knowledge” of various companies through these tactics allowing them unbelievable front-door access to systems.

 

LAPSUS$ was known to frequently dial help desks, sometimes bribing or tricking employees into resetting critical account information, and then learning how they handled these security invasions by listening in on comm channels like Teams and Slack. The group used this “training session” to truly understand the methods and protocol these organizations went through to deter the very attack the group planned to carry out. This insider knowledge allowed them to circumnavigate all security points and remain hidden within the system while formulating further plots for extortion.

 

Microsoft released a statement, “The group used the previously gathered information (for example, profile pictures) and had a native-English-sounding caller speak with the help desk personnel to enhance their social engineering lure. Observed actions have included DEV-0537 answering common recovery prompts such as “first street you lived on” or “mother’s maiden name” to convince help desk personnel of authenticity.”

 

Initial access is granted through various methods, such as using RedLine, searching public code repositories, and even purchasing remote access credentials via the dark web. Of course, more straightforward approaches such as directly paying employees for access also proved worthwhile.

 

Multi-factor authentication seems like a safeguard with minuscule security lapse but LAPSUS$ manages to override these systems through session token replay and even repeatedly spamming account holders with MFA prompts after they successfully gained the password. The hacker group stated in their Telegram chatroom, that upon targeting users during the middle of the night with MFA prompts, their success rates were much higher, since people tend to simply select, “Accept” rather than be interrupted during their precious hours.

 

Data Harvesting and VPNs 

Virtual private networks, also known as VPNs, are another key on the keychain of LAPSUS$, which utilized them in a way that prevented any “impossible travel alerts” from being triggered within the system. These alerts, connected to cloud monitoring services, detect any suspicious activity of all users and logins, making notes on any consecutive login attempts from let’s say Colorado and then another from New York, 5 minutes apart. Hence, the “impossible” nature since one person could not possibly access a system quickly from these locations. Bypassing this feature is a critical step to remain hidden long enough to exfiltrate target data.

 

Microsoft reported, “DEV-0537 has been observed leveraging access to cloud assets to create new virtual machines within the target’s cloud environment, which they use as actor-controlled infrastructure to perform further attacks across the target organization.”

 

Once inside, LAPSUS$ had the power to knock out the business from its cloud platform, giving it absolute control. Next, all inbound and outbound email was to be directed to its infrastructure where data would be harvested before the total deletion of systems. Finally, the group would either publicly unveil the stolen data or use their many extortion tactics to prevent data release.

 

All good things must come to an end…right?

 

Arrests 

Bloomberg releases a breaking report stating the entire operation is being driven by a 16-year-old teenager from Oxfordshire, UK with seven arrests following on March 24th.

 

The 16 yr. old boy's father told the BBC: "I had never heard about any of this until recently. He's never talked about any hacking, but he is very good at computers and spends a lot of time on the computer. I always thought he was playing games."

 

All arrested were immediately released, pending a deeper investigation, with confirmation coming on April 2nd that two individuals were charged with connection to LAPSUS$ and the attacks of numerous tech giants.

 

Offenses included: 

3x counts of unauthorized access w/ intent to impair the operation of or hinder access to a computer.
2x counts of fraud by false representation
1x count of causing a computer to perform a function to secure unauthorized access to a program

 

Both individuals are reportedly on bail with limited details available due to their status as minors.

 

As a cybercriminal group, letting your voice be heard can be an opportunity for increased notoriety, but also lead to increased investigation and scrutiny by law enforcement agencies around the world. The above arrests of a 16 & 17 yr. old came just days after the public unveiling of source code for mobile apps belonging to these companies on March 30th:

 

LAPSUS$’s Payday 

You might be wondering, with the insane prestige included on their “hit list”, how lined is the group’s wallet? Well, speculation has risen that LAPSUS$ has amassed upwards of $160 Million in revenue.

 

This finding is not concrete and has yet to be confirmed by members of LAPSUS$, but their public Telegram channel released details on their crypto wallet containing (3,790.62159317 bitcoin).

 

Where Are They Now? 

LAPSUS$ announced via its Telegram channel, “We created a Element/Matrix chat in the case this Telegram is deleted!

We advise everyone to join it!”

 

This is the last known message of the group, leading to speculation of potential regrouping while finding new paths of attacks after cutting it close with law enforcement. All of these intrusions mentioned in the blog occurred during a 3-month span, so potentially the master plan was to strike hard, and strike fast while jumping out before everything came crashing down.

 

Let us know what you think, have we heard the last of LAPSUS$, or is this just the dawn of a new era of cybercrime?

 

Cyber Corruption

 

Attack Timeline

Cyber Corruption

 

 

Public WiFi: Top Dangers for Remote Work

Public Wifi & Working From Home

By 2025, upwards of 36 million Americans will have entirely remote or flexible occupations, an 87 percent post-pandemic rise, according to some analysts. One might infer that having the opportunity to work outside of the office has led many employees to select open areas like cafés, diners, railway stations, terminals, and other public locations to do their tasks, increasing the vulnerability of organizations and people to cyberattacks via the dangers of public wifi.

 

Cyber Attacks Are On the Rise

You may believe, "I always use public wifi, and I've never had an issue!" Yes, at least not that you are aware of. The worrying reality is that cyberattacks are increasing along with the number of remote workers, putting everyone who uses public wi-fi in danger. Cyberattacks were ranked as the fifth top risk for businesses in the public and private sectors in a Global Risk Report that was issued in 2020, and it is anticipated that they will soon move up the list. The FBI assessed the financial cost at more than $4.2 billion and recorded 791,790 complaints of suspected cyber crime in 2020, which is 300,000 higher than reported in 2019. The need to safeguard oneself against the dangers of public wifi has never been greater.

 

What Are the Top Dangers of Public Wi-Fi for Businesses?

Most individuals who use public wi-fi networks while working are blissfully oblivious to the danger they run of unintentionally disclosing sensitive, secret, or essential information, which might pose a serious threat in the hands of an experienced hacker. You have probably used the convenience of free public wifi. The top seven risks of using public wifi for business, nevertheless, should be taken into consideration because this is not without significant risk.

 

Malware, Viruses, and Worms

The forced installation of malware, commonly referred to as malicious software, on user devices is one of the main hazards you may encounter when using public wi-fi. All programming and applications developed to damage devices or intercept information fall under this general heading. Hackers can infect the public wifi network, which subsequently spreads to the connected devices. Malware may cause havoc and spy on the systems it infects and comes in a variety of ways. In contrast to worms, which may multiply independently and do much more damage, viruses are a sort of malware that propagates through a host file and are activated and duplicated by a person.

Unencrypted Connections

Hackers may track all file sharing and data transferred between the individual and the server on a public wi-fi network when there is no encryption in place. In an unprotected network, a well-positioned attacker may simply follow the network users who are logged into the router and introduce malicious JavaScript onto their equipment.

Network Snooping

Network spying, which occurs when a hacker employs malicious software on an open wi-fi network to remotely observe the behavior on a third party's laptop, is another popular attack technique. Hackers can use this method to monitor any information transmitted, including passwords, credit card numbers, and other sensitive information.

Log-in Credential Vulnerability

Weak and obvious passwords lead to log-in credential vulnerability. Ensure all of your passwords for websites, applications, and wifi networks are strong and distinctive to avoid this kind of security issue.

System Update Alerts

Hackers are continuously coming up with new techniques to take control of smartphones. False system update alerts with the ability to exfiltrate data are one cunning kind of information theft that targets Android devices.

Session Hijacking

Public wifi networks provide a platform for a practice known as session hijacking, which involves abusing a valid online surfing experience. This is another way that hackers may access a network user's device's data without authorization, making any data about your company incredibly exposed.

 

How Can Businesses Stay Safe on Public Networks?

You must create a solid cybersecurity plan for your web presence and apps to ensure the protection of corporate communications, sensitive data, and other assets.

Here are some strategies for protecting your company from the dangers of open WiFi:

A Guide to Cybercrimes and How They are Disrupting Our Lives 

What is Cybercrime? 

Cybercrime is a term that refers to all criminal activity perpetrated using computers and the internet. It includes crimes like hacking, phishing, identity theft, and more. 

 

 

The term cybercrime was first coined in the late 1980s by William Gibson in his novel “Neuromancer”. He used it to refer to crimes committed by people who used computers and networks for their activities. 

 

 

In today’s world, cybercriminals are becoming more sophisticated than ever before, and they are becoming harder to catch. Cybercrimes are an ever-present threat to the public. They can be committed by anyone, anywhere, and at any time. To protect ourselves from cyberattacks, we need to have a good understanding of the different types of cybercrimes that exist and how to prevent them. 

 

 

What are the Most Common Types of Cybercrime? 

The most common types of cybercrimes are phishing, ransomware, and data breaches.

 

 

Phishing is a type of online fraud in which the perpetrator tries to steal personal information from unsuspecting users by masquerading as a trustworthy entity in an email or a text message. 

Ransomware is malicious software that encrypts data on a computer and demands ransom payments in order to decrypt it. 

A data breach is when confidential customer information such as passwords, financial information, or other sensitive documents are stolen by hackers. 

 

 

 

Motives of Cybercrime 

Some types of cybercrimes are conducted against particular devices or systems in order to injure or disable them, whereas the bulk of cybercrimes is performed in order to generate income for the offenders. Others use computers and networks to disseminate viruses, sensitive information, photos, or other types of data. Some cybercrimes carry out both of these actions; they target computers in order to contaminate them with a virus, which is subsequently transferred to more machines and, occasionally, whole networks.  

 

 

Financial loss is one of cybercrime's main effects. Ransomware assaults, email and internet fraud, identity fraud, as well as efforts to acquire bank assets, credit cards, or other payment information, are just a few examples of the numerous profit-driven criminal activities that can be classified as cybercrime. 

 

 

Private information about a person or company data may be targeted by cybercriminals for theft and sales.  

 

Due to the pandemic's widespread remote work practices, it will be more crucial than ever to preserve backup data in 2022 as cybercrimes are predicted to increase in regularity. 

 

 

 

Distinct Forms of Cybercrime

There are many distinct kinds of cybercrime, as was already explained. Although the means by which cybercriminals want to be compensated might vary, the majority of cybercrimes are committed with the purpose of earning benefits from the attackers. The following are some distinct forms of cybercrimes:  

 

How Lumifi Can Help

A proactive approach is the best defense, and that's where Lumifi shines. Lumifi runs thousands of simulated attacks on your network and endpoint environment to identify actual security vulnerabilities before cybercriminals can compromise your system. Utilizing our next-gen MDR services, we always stay on top of your cybersecurity, so you can focus on what matters most.

 

Palo Alto Networks PAN-OS Vulnerability: What Users Need to Know

The flaw has been exploited in real-world attacks, but most Palo Alto customers will remain unaffected. 

In the second week of August, Palo Alto Networks issued a security warning for a high-severity vulnerability in its PAN-OS operating system. Many of the company' networking hardware products use this operating system, but not all of them are susceptible. 

(more…)

How to Set Up Robust Log Management in Linux with AuditD

Find out how to configure Linux to generate comprehensive log feeds for SIEM, UEBA, and SOAR technologies. 

Linux is an attractive solution for enterprises in search of a flexible, powerful operating system. Many different operating systems use the Linux kernel, such as Ubuntu, Debian, and Red Hat Enterprise Linux (RHEL), which itself is an enterprise-ready extension of CentOS. 

Open-source Linux distributions have a slightly different security profile than proprietary technologies like Windows. Some enterprise IT leaders choose Linux specifically for its security capabilities and low implementation costs. However, making the most of those security capabilities requires utilizing sophisticated information security technologies like SIEM, UEBA, and SOAR. 

Most Linux distributions automatically collect log data on user, application, and kernel activities. Logins, file modifications, and account modifications are stored in a chronological timeline so that security analysts can review them and investigate suspicious activities when necessary. 

Boost Security Performance by Configuring Log Data 

SIEM, UEBA, and SOAR technologies rely on these logs to categorize and prioritize suspicious activities and automate some of the most time-consuming tasks security analysts must perform. The better and more comprehensive those logs are, the more accurate these technologies’ insights can be. 

One of the best ways to access log data in Linux is through the Linux Audit System, better known through its command line name Auditd. It provides comprehensive visibility into system calls, file access, and pre-configured auditable events throughout the Linux environment. 

Configuring Linux’s log collection policies will let you send better, more accurate data to your SIEM, UEBA, or SOAR platform. This significantly boosts the quality of its security performance output in turn. 

How to Configure Log Management Policies in Linux with Auditd 

The example we have written is for RHEL but works the same way in Ubuntu. Most Linux-based operating systems will provide for a similar process. 

The goal of this configuration is to push comprehensive system logs onto the syslog directory and move them from there to a remote log management solution. This configuration does not remove any existing rules, so you can use it as a starting point for changing the default configuration. However, if you already have a robust, custom configuration, some of these rules may overwrite yours. 

This is the directory you’ll be placing the configuration in...

Get our custom AuditD ruleset for your use!

Make Sure Your SIEM, UEBA, or SOAR Platform Can Parse These Logs 

In our example, we’re using syslog to access the logs our policies generate. You may use syslogd or syslog-ng for the same purpose – our team would be happy to provide you with the appropriate configurations. 

Instead of using a simple *.* in the master rsyslog.conf file, we prefer creating a custom file in /etc/rsyslog.d. Consider creating a file called auditd.conf and populating it like this: 

if $programname contains 'audisp' then

@@SIEM_COLLECTION_IP:514 & stop

Notice that we’re using @@ to send data via TCP and specifying TCP 514 as the port. The default port for syslog is usually 601, but most systems still use UDP and TCP 514 for logs. Feel free to edit this code to fit the needs of your environment and restart rsyslog when you’re ready to effectuate the changes. 

That’s it! Now, almost every SIEM, UEBA, and SOAR system on the market can natively parse the logs generated by your Linux distribution. You may now review and analyze accurate log data describing unwanted access, changes, and installations on your Linux systems. 

Craft Custom Rules to Improve Exabeam Performance: Part 2

Enriched data enables analysts to conduct faster, more accurate investigations in Exabeam. 

The first part of this series covered some of the ways analysts can use context to build custom rules in Exabeam. Teaching Exabeam to recognize network zones and asset groups enables security professionals to cluster similar behaviors together, making it easier to investigate suspicious activity. 

(more…)

Manufacturing Case Study

Description of Pain or Challenge: Manufacturing professionals often have a disproportionately large data environment in contrast to their in-house staff. Risks affecting supply chain and business operations pose a serious threat to manufacturers, as they can be exposed through any number of the IT systems critical to maintaining effective supply and distribution of materials. Implementing a solution that fills the time/resource gap of the security team and provides detection and response capabilities across critical assets is imperative to a successful MDR program.  

Solution Overview: Competing with nearly 8 other MDR providers, Lumifi was able to offer the most comprehensive solution to address the requirements for this organization.  Lumifi was able to couple their client-centric services with an ecosystem of industry leading technologies to address the primary needs of the customer. 

Services Description:

Technology Description:

Legal Organization Case Study

Challenge:

The success of a legal practice requires a focus on reputation management and nurturing the relationships that exist between the firm and their clients. Compared to other industries, the legal sector has an elevated risk of cyber threats primarily due to the confidential data and sensitive client information available to an attacker. Cybersecurity is not often at the top of the priority list because offices are filled with lawyers, and not IT teams. Considering this, the challenge becomes protecting sensitive data with limited skills and resources.

Solution Overview: 

For this organization with limited resources, partnering with a Managed Detection and Response (MDR) team became critical in protecting Corporate IP. The client in this study also wanted to consolidate technologies and re-platform in the cloud. Lumifi worked with the client on moving them from RSA SIEM to Palo Alto Cortex XDR with the Data Lake. Content from the de-commissioned system was ported to the new cloud-based environment. Lumifi continued working with the client as it’s MDR provider, successfully maintaining the firms security posture.

Services Description:

MDR Service for 24×7 Alert Monitoring and Threat Validation Incident Remediation and Forensic Analysis Migration of existing content package to Cortex platform Tuning/Filtering of Alerts Custom development of parsers, rules, alerts, API integrations, reports Full management of supported technology Automated Threat Response (SOARaaS) – complimentary to Palo Alto XSOAR functionality Advisory/consulting support for detection and response strategy

Technology: Palo Alto Cortex XDR with Data Lake

Financial Organization Case Study

Description of Pain or Challenge: The financial services industry is one of the more mature markets requiring cybersecurity.  Smaller financial services firms typically have a limited team coupled with an advanced environment.  In this case this customer was looking for an MDR provider that could be a true partner and function as an extension of their team.  The Lumifi team took the time and effort to diligently evaluate and invest in the best security products for this organization.  They needed an MDR provider to not only fill the time and resource gap of threat management, but also create an operationally effective security ecosystem.

Solution Overview: Lumifi was able to offer the most comprehensive solution to address this customer’s requirements through their expertise and client-centric delivery model. Delivering the MDR service through a transparent and shared environment allowed Lumifi to work with this customer’s security team to develop and execute a vision of an integrated security platform.  This customer experienced a reduced time to detect, reduced time to respond, avoided false positives, and was able to save critical time and assets for their business endeavors. 

Services Description: 24×7 Alert Monitoring and Threat Validation Incident Remediation and Forensic Analysis Tuning/Filtering of Alerts Custom development of parsers, rules, alerts, API integrations, runbooks/playbooks, reports Full management of supported technology Automated Threat Response (SOARaaS) – complimentary to Sentinel SOAR functionality Advisory/consulting support for detection and response strategy

Technology Description: Microsoft Sentinel for log visibility into Microsoft services and critical applications/systems Microsoft Defender for Endpoint

Security Posture Priorities

Solution Evaluation

An integral step in creating a resilient cybersecurity platform is to perform an audit of your organizations existing policies and procedures. Lumifi can help with this endeavor during our Asset Criticality Assessment, during client onboarding process, and periodically on a structured timeline.

Here are components we consider when looking at the entire security infrastructure:

Tool Implementation

Once the proper solution or suite of solutions is determined, we help source, install, configure, tune and customize each solution to our customer’s needs. If a solution is already in place, we step in and begin management of the existing tool.

The following are just a few of the services we offer in this step of the process:

Managed Detection & Response (MDR)

Lumifi is a leader in MDR services, recognized on Gartner’s Managed Detection and Response Market Guide and by third-party service provider lists. Often, the least considered factor in the security provider selection process in the human element. While technology is an important factor in first-class MDR, Lumifi’s biggest differentiator is its expertise. Lumifi provides the experience needed to stand out from the saturated MDR market with leadership and management having decades of experience, stretching back to before MDR was even a term.

Vulnerability Management (VM)

Discovering where you are most vulnerable is a security priority and likely already part of your overall program. The ability to continuously identify threats and monitor unexpected changes in your network before they turn into breaches is common practice.

Security programs often have the challenge of finding and retaining talent along with time restraints for proper cybersecurity processes. Lumifi can help fill those gaps. Our security staff will manage the process and help ensure your security program is successful while saving you time and money.

Email Security

Ransomware, impersonation, spear phishing; standard email-defense systems can’t protect against it all. Lumifi deploys leading email security tools to defend against routine spam and targeted threats.
Email security tools combine internally developed and third-party technologies with dozens of internal and external threat-intelligence sources. These tools simplify and automate the process of recovering email and other data within your email environment while ensuring that email systems remain 100% operational, and data is secured within. In addition to L1 and L2 support, Lumifi provides back-end integration into its MDR services to enhance visibility and reporting.

Endpoint Detection & Response (EDR)

EDR solutions take traditional antivirus tools to the next level by allowing security teams to continuously collect, track and store endpoint data. This level of detail provides analysts with the forensic granularity necessary for active threat hunting and proper incident response. Lumifi partners with leading EDR tools such as SentinelOne, Defender for Endpoint and CarbonBlack to provide comprehensive security solutions that secure customer endpoints end-to-end.

Incident Response & Threat Remediation

Cyber resilience includes recovering quickly from an attack. When Lumifi reports a verified incident, our ASOC provides recommended steps for remediation, including step-by-step instructions with procedures and escalation paths to remediate the incident.

Compliance & Reporting Support

Cybersecurity compliance is a key factor in many industries and producing the proper reports and logging protocols necessary can be cumbersome and time consuming for many organizations.
Lumifi helps companies in various industries cover compliance mandates such as HIPPA, HITECH, PCI DSS, Sarbanes-Oxley, EU GDPR, CCPA and more. Our Security Operations Center is certified SSAE 18 SOC 2 Type II and prepared to help clients of all industries meet their cybersecurity compliance requirements.

Breaking-Down Managed Detection and Response

Cybersecurity is a very important issue for any organization, and events can lead to a variety of negative outcomes; incidents often result in data theft, financial loss, and even damaged reputation. The cost of an attack is very high, which is why it's important to be prepared for the worst-case scenario. Managed Detection and Response is an outsourced array of services delivered by a Security Operations Center (SOC). These services include the detection of threats and a structured plan for mitigation and/or containment correlated over multiple cybersecurity products.

 

What Is Threat Hunting?

Threat hunting is the proactive approach cybersecurity organizations use to identify threats before they happen. The process includes proactively searching for adversarial activity within an organization’s computer network. A threat hunting and incident response team is responsible for finding and analyzing cybersecurity breaches and are also responsible for mitigating the risk of future breaches. Threat hunting teams work to identify potential threats before they become actual incidents which can be done through deep packet inspection, network forensics, and other techniques. They can find out what type of malware is being used or where a vulnerability exists on customers networks by proactively monitoring those networks with tools like PaloAlto Cortex, Carbon Black, Azure Sentinel to name just a few. As soon as they have identified an issue, they can take appropriate measures to resolve it before it becomes a full-fledged cybersecurity incident. Lumifi Cyber utilizes its home-grown automated threat hunting platform, ShieldVision which allows our SOC to be tool agnostic and provide proactive threat hunting to stay ahead of today cybersecurity threats.

 

What Is Incident Response?

Incident response (IR) is a process of responding to and containing an incident. It includes preparation, detection, containment, eradication, recovery and documentation of lessons learned. The purpose of incident response is to minimize the impact on the organization's business operations while reducing the risk of future incidents. Incident response teams should be prepared for all types of cyber threats which could include malware infections or ransomware attacks. These incidents disrupt systems and or steal sensitive data such as credit card numbers or personal information throughout the network. The goal of IR is to ensure that the data has not been compromised or exfiltrated and to mitigate the damage of future incidents.

 

Why Choose Lumifi?

Companies looking into MDR need to take a holistic view of their providers and their teams. Often, the least considered factor in the security provider selection process in the human element. While technology is an important factor in first-class MDR, Lumifi’s biggest differentiator is expertise. Lumifi provides the experience needed to stand out from the

saturated MDR market with leadership and management have decades of experience, stretching back to before MDR was even a term. Our approach to security is focused on a balance of custom solutions, client-centric partnerships, and proactive approaches. Lumifi has its own team of threat Content Developers, Web Developers, experienced Engineers, and seasoned Analysts to provide unparalleled proficiency. We not only utilize the industry’s leading threat intelligence platforms but also deliver personalized security recommendations through scheduled calls with a dedicated Engagement Manager. Lumifi leverages a proprietary platform called to provide leading AI Orchestration capabilities. This tool allows us to discover malicious activity within a client’s environment and then utilize that information to detect and respond across our client base who may be experiencing the same malicious activity. Our suite of services allows you peace of mind knowing your organization is being monitored around the clock by an industry-leading SOC which takes pride in its customer's security.

 

Simplifying SOAR

Security Orchestration, Automation and Response (SOAR) is an integrated, automated, and orchestrated set of services that provide a response to cyber incidents. It enables the rapid identification of cyber incidents and prevents them from escalating into major disasters.

 

SOAR was developed as a response to the need for automating incident responses and remediating security incidents. SOAR utilizes a framework that can be used by myriad organizations from small business owners to large enterprises. The process helps organizations automate security operations and enhance their security stance, integrating with tools such as SIEM, to provide a holistic view of the organization’s cybersecurity posture. It also provides a platform for Security Operations Centers (SOCs) to orchestrate the response to cyber-attacks in real time.

 

The Benefits of Implementing SOAR

Automating Repetitive Tasks

Human error in the workplace is the initial entry point for 95% of security incidents which inevitably leads to cloud environment compromises, according to Gartner. The high failure rate is due to repetitive manual tasks, which increase the likelihood of an oversight or mistake. Threat investigations and responses are performed faster and at scale across complex or expansive IT infrastructures with SOAR capabilities.

 

AI Enables New Security Initiatives to Protect Digital Infrastructure

The integration of machine learning in SOAR solutions enables the technology to dive deeperinto threats, analyze them, and gain contextual knowledge of their capabilities. The insight SOAR provides sets the foundation for fine-tuning incident response strategies to improve overall IT security.

 

Orchestrate Security Incidents Sent to The Expert

SOAR technology automates the orchestration process and routes security incidents to an analyst or expert with the best credentials to handle a particular incident. SOAR ensures teams get only the essential information needed to act, increasing the fidelity of threats and reducing the number of alerts. 

 

SOAR in a Nutshell

In short, the best cybersecurity orchestration and automation solutions provide the following:

At Lumifi, you can be certain that your organization is in capable and experienced hands, implementing the most modern SOAR techniques. Forward-moving and ever-evolving, we exist to help improve your security posture.

Contact Us Today to Learn More

Lumifi Cyber Acquires Datashield to Deliver Next-Generation Managed Detection and Response

Combines AI and Machine Learning-Based Software with MDR Services to Provide Fortune 500-Grade Security to Companies of All Sizes

Palm Desert, CA and Scottsdale, AZ — May 3, 2022 — Lumifi Cyber, Inc., a next-generation managed detection and response (MDR) cybersecurity software provider, today announced its acquisition of Datashield, Inc., an end-to-end cybersecurity resilience services provider, to deliver Fortune 500-grade security to companies of all sizes for an affordable monthly price.

Although terms of the deal were not disclosed, Lumifi’s joint offering will integrate their cutting- edge attack simulation, automated endpoint remediation and continuous threat monitoring software with Datashield’s industry-recognized MDR services, state-of-the-art security operations center and team of ex-military and former DoD cybersecurity professionals.

“Too many companies lack the security staff, tools and expertise to defend against the rise of ransomware attacks,” said Michael Malone, CEO of Lumifi. “Datashield is the perfect acquisition partner for us to deploy our recent growth capital to execute on our vision of combining always- on attack simulation with automated remediation to alleviate the cybersecurity skills gap.”

Together, Lumifi’s advanced MDR platform leverages AI, machine learning and automation to proactively identify security gaps before cybercriminals can exploit them, automatically remediate endpoint vulnerabilities to reduce the available attack surface and continuously monitor network and endpoint environments 24/7/365 to detect, contain and remediate threats.

“The threat landscape is constantly evolving, which requires continuous investments in people, process and technology to stay one step ahead of attackers,” said Jimmy Treuting, former President and General Manager of Datashield and incoming COO of Lumifi. “Our customers will only benefit from our new company’s shared culture of innovation, speed and agility.”

In order to provide peace of mind against the latest cyber threats, Lumifi will provide a turn-key cybersecurity monitoring and management solution for an affordable monthly price that delivers advanced levels of security to businesses of all sizes across regulated industries, such as energy, manufacturing, healthcare, finance and more.

About Lumifi

Lumifi is the only next-generation managed detection and response (MDR) services provider that provides Fortune 500-grade security for companies of all sizes at an affordable monthly price. Our cutting-edge platform combines attack simulation, automated remediation and continuous threat monitoring software with a proactive managed cybersecurity service that delivers continuous end-to-end protection for businesses nationwide against ransomware and the latest security threats. Our state-of-the-art Security Operations Center is staffed by our team of US-based analysts, ex-military and former DoD security experts with dozens of security certifications to continuously monitor and manage customer environments. For more information, please visit www.lumificyber.com.

About Datashield

Datashield provides end-to-end cyber security resilience solutions with a specialty in managed detection and response (MDR) services. Founded in 2009, Datashield is one of the few companies in our space that can provide true MDR to the mid-market and small-to-medium enterprises. We leverage our proprietary security automation, orchestration and response software, SHIELDVision, along with threat intelligence and core processes to generate actionable insight into advanced security threats for analysis and response. Known for our tool-agnostic, truly consultative approach, Datashield services clients across all industries, including healthcare, financial services, manufacturing, energy, government and more.

###

Everything You Need to Know About the Spring4shell Vulnerability

A newly discovered Spring vulnerability enables remote code execution on enterprise Java applications.

In late March, a developer publicly posted exploit code describing a zero-day vulnerability in the popular Spring Framework, a popular solution for building enterprise applications in Java. Spring is part of VMWare's suite of enterprise products, designed to let developers quickly and easily develop enterprise-level applications. 

(more…)

Virtualization Security What are the Real World Risks

There’s been a lot of recent hype about security risks with the rise of virtualization, but much of it is vague and short on specifics.  There is also an assumption that all the security available on a physical server simply disappears when it migrates to being a virtual machine.  This is not true.  A virtual server is the same server it was before it was P2V’d from a physical server. IS authentication, access control, audit, and network controls remain as active as before.  The virtual server sits on hosts and SANs in the same datacenter as did the physical server .  So what has changed?  What are the new risks?

The risks are in the virtualization infrastructure layer…

Some questions to consider:  how secure are the host, the storage and the host control server? How secure are the ESX/ESXi hosts, the SANS and the vCenter servers?  Those are the real concerns.  Now that a new layer has been inserted between the guest operating system and the hardware, that layer’s immediate components and other components upon which it depends (the Active Directory forest to which the vCenter servers belong) need the same security controls. Virtualization security is even more critical in some respects because a low level access is equivalent to physical access to every guest server and its data, and may compromise the system.

Recent audits show that some areas of security and control of virtualization components can be immature and do reflect concern about how critical the virtualization layer is to security.

Much is made about network security risks associated with virtualization but this concern may be unfounded.  Most servers are not behind internal firewalls or on heavily restricted network segments in the first place, so moving them to an ESX/i host on a virtual switch doesn’t expose the server to new network risks. Physical servers with such controls can be set up exactly the same with virtual switches and firewalls. There are more advanced attack scenarios involving a compromised VM where the attacker can break out of that VM, into the host and possibly back up into other VMs, but at this point, most security teams are vigilant enough to deter such an attack.

The other area of network security is the protection of the visualization infrastructure itself

Unless IT shops totally ignore virtualization best practices, they will implement multiple network cards on ESX/i hosts that allow for completely separate guest, live migration (aka vMotion), storage and management (connections from VMWare vCenter and clients to the host) traffic.  In audits I’ve performed, SANs and the management interfaces on hosts are isolated from rest of the organization’s internal LAN.

There are areas of virtualization where serious risks do exist: privileged access, Active Directory and auditing.  Allowing administrators (especially multiple administrators!) to use the built-in root or admin account on operating system is bad practice and risky. Everyone needs his or her own account.  The principle is emphatically true for virtualization hosts.  However prior audits reveal that many hosts are managed by the built-in root account which is shared among multiple administrators.  With a virtualization host, the risk of shared and insecure root accounts is multiplied by number and criticality of all the guest VMs on that host.  The best practice is to lock down ESX/i hosts so that even admins don’t directly access them and are required to go through the central management server (called vCenter in the case of the VMware environment).  vCenter doesn’t share the same prevalence of insecure root access because vCenter integrates with Active Directory and allows an organization to leverage the AD accounts admins already possess.

Another prevalent risk associated with the dependence of virtualization infrastructures is situated with the Active Directory

Directory integration and unified authentication is definitely the way to go, but there are risk factors to consider as well.  First, virtualization management servers like vCenter tend to be members of the main AD.  For example: a Windows server belonging to a domain is exposed to any and all risks in Active Directory and all domain controllers within that forest (remember the security boundary in AD is the forest not the domain).  A vCenter server is the “boss” of all the ESX/i hosts connected to it.  Thus, everyone with domain admin authority anywhere in the AD forest and anyone who compromises a domain controller in the AD forest can take the vCenter server and compromise the virtualization infrastructure (and ultimately any guest VM and its data.  Any outstanding risks from previous AD audits must be carried forward to the virtualization infrastructure audit too.

For example, at one financial institution, an excessive number of IT folks had domain admin authority to the main AD forest.  That was problem enough as a risk to AD and the Windows systems within that forest.  But with the virtualization management server as a member of that forest, now every virtual machine – even those running Linux and Windows servers in other forests are now accessible to that same excessively large group of AD admins.  Worse, in this organization remote access was widely available with no strong authentication, so the entire virtualization infrastructure and the countless servers were vulnerable to compromise by a successful password based attack against any one of many AD admins.

The solution?  First, think about the AD forest(s) that hold either your virtualization management servers (e.g. vCenter) or those user accounts with privileged access to the virtualization infrastructure (i.e. users with the Administrator role in vCenter).  Those forests, including each domain and domain controller within them, must be locked down and secure to a level appropriate for the virtualization infrastructure itself. Organizations with outstanding AD security issues with no resolution in site should really look at implementing a small, separate AD forest for providing directory and authentication services to their infrastructure including virtualization, storage and network components.  This small AD forest would be much more locked down and protected and careful thought should be given before implementing synchronization or trust relationships between it and other forests.  This may be at the price of maintaining additional user accounts for infrastructure admins but that is the price of security in this instance.  If trust is implemented it should such that the infrastructure forest is trusted by the other forests not vice versa.   If synchronization is implemented, password changes or other authentication data should not flow from other forests or directories into the infrastructure forest.

The final risk area in newly virtualized organizations is a lack of auditing and log management for virtualization infrastructure components

Virtualization management servers (e.g. vCenter) and hosts (e.g. ESX/i) can generate audit logs.  It is crucial to enable this feature and subsequently collect, archive alert and report on this log data the same as is necessary with any other security critical components on your network.  Virtualization hosts like ESX/i are simple to accommodate since they can send events via syslog, but  management servers like vCenter are more problematic.  vCenter creates a number of text log files named vpxd-1 through 9 but my research has proven them to omit very important data and fail to resolve other key ID codes.  This is not to say the audit trails aren’t there.  They are but they are trapped inside database tables.  In the case of vCenter the audit trail is stored in VPX_EVENT and VPX_EVENT_ARG tables within the vCenter SQL database. Incomprehensibly command line interfaces like Get-VIEvent that pull data from these leave out critical event arguments as well as the name or ID of the event itself!  So the final option seems to be direct query of the SQL tables themselves with the necessary resolution of foreign keys to rows in related tables.  This presents an opportunity to log management and SIEM vendors to distinguish themselves with enhanced support for collecting enriched audit trails from virtualization infrastructures.

Are there risks in the typical virtualized data center?

Absolutely.  But it’s important to identify the real risks.  In most environments, the risk is less among the virtual machines and more with the basic security controls of the infrastructure itself as well as risks resulting from poorly understood security dependencies between the virtualization infrastructure and the directory used for identity and authentication.  Make sure virtualization infrastructure components are properly isolated.  Follow the same best practices for securing root access on hosts as we’ve had to apply to normal servers for decades.  And include audits trails from virtualization infrastructure in all log management efforts.

Upgrade Your Audit Policies: What Should You Be Logging?

Your security response depends heavily on what data you log, and how you log it.

Your security information and event management (SIEM) solution uses logs to build an accurate picture of your organization's security profile.  

(more…)

What Is Managed Detection and Response and Why Do You Need It?

The security of data and systems is one of the most important concerns in today' business world. If your data is at risk or compromised, it can cripple your operations along with the trust others have in your business.

(more…)

Is SOAR A Must For Your Tech Stack?

Security Orchestration, Automation, and Response (SOAR) tools enable analysts to establish efficient workflows for handling both common and highly sophisticated threats. 

Even the best enterprise cybersecurity workflows suffer from scalability issues. 

(more…)

The Necessity of Threat Hunting

Press play to get an inside look at how Lumifi works with Anomali ThreatStream. (more…)

How Fortune 200 Enterprises Select MDR Vendors

For large organizations, managed detection and response is just one of many cybersecurity solutions that must work together seamlessly.

Enterprise cybersecurity professionals have to choose their tech stack wisely.  

(more…)

Tony Simone Named Exabeam's "Techical Person of the Year" for 2021

Castra Managed Services is excited to announce that its company co-founder, Tony Simone, has been named Exabeam' "Technical Person of the Year" for 2021.

Exabeam, the Gartner Magic Quadrant leader in security information event management (SIEM), held its annual Spotlight Partner Summit early last week, where various partners met to discuss industry trends and new developments in SIEM technology.  

(more…)

How Data Lake and Cloud Archive Can Improve Your Security Posture

Is your business weighing out the pros and cons of data lake and cloud archive?

We can help with that.

What we need to establish first is how does your organization handle the compliance regarding your company' and customer' data? Where does that data reside? Is it secure, and if you needed to recall aging data from your system, could you do so with ease? 

(more…)

The Difference Between Cybersecurity & Network Security

Today’s threat landscape is more diverse and expansive compared to any period since the beginning of the information age. Recent security trends such as the increase in malicious activities rising by 358% from July 2019 to July 2020 and 90% of healthcare organizations reporting security breaches to highlight the increased dangers enterprises face.

To effectively detect and mitigate threat factors to IT infrastructure, understanding the different features associated with delivering cybersecurity and network security is required…and yes there are differences between both. Here, the differences will be outlined including the diverse security tools that can be used to secure cyber infrastructure and enterprise networks.

What is Cybersecurity?

Cybersecurity is the processes you deploy to defend your organization’s IT architecture which includes the network, computers, and the data it produces from unauthorized access and attacks. Implementing cybersecurity measures involves the use of security tools to ensure the aforementioned assets are protected.

Enterprises that produce or store a large amount of data are more likely to experience cybersecurity incidents. Security operations centers designed to tackle cybersecurity incidents make use of tools that fall into the security orchestration, automation, and response tools and/or security information and event management solutions.

To effectively deal with cybersecurity threats, security tools are deployed to predict threat events, analyze them, and employ the right responses to mitigate threats.  Enterprises with functioning IT architecture are expected to invest in cybersecurity solutions to deal with related security incidents.

What is Network Security?

Network security is a subset of cybersecurity because it focuses on protecting the data that is sent and received through your IT architecture or networks. Implementing network security to respond to incidents involves the use of both hardware and software security solutions to secure devices with access to your networks.

The security tools used to deliver network security includes anti-viruses, firewalls, intrusion detection and prevention solutions, and virtual private networks. These tools work together to limit unauthorized access to your enterprise networks and when successful breaches occur, they work to get the attacker out of your networks as quickly as possible.

Cybersecurity vs. Network Security

The definition of both security processes highlights the most important distinction between cybersecurity and network security. Using the above definition, network security is a subset of cybersecurity that focuses on securing computer networks, the data sent through them, and the devices that have access to these data.

Other important distinguishing factors that help when struggling with differentiating between cybersecurity vs. network security include:

Conclusion

Cybersecurity vs. network security is hardly a battle outside the need to understand the differentiating factors because enterprises are expected to deploy cybersecurity and network security tools to protect IT infrastructure. The solutions used to secure both cyber and network assets must be integrated into SOCs if you intend to be prepared to handle the different risks attackers throw your way.

For more information about the differences between network and cybersecurity contact us to reach one of our team members.

Strong Showing For Lumifi Partners In 2021 Gartner Magic Quadrant

With a clear separation in the market among the considered vendors, the newest Gartner Magic Quadrant for EPP, showcases 4 Lumifi partners who are leading in this space.

Recently, Gartner released their Magic Quadrant for EPP and we saw a clear separation in the market among the considered vendors. As an industry we have witnessed a rapid evolution in this space as the requirement for visibility into the endpoint has quickly expanded with the constant threat of ransomware and malware threatening to cripple organizations. Most recently, we have seen a literal arms race with a spur of recent technology acquisitions most notably by Crowdstrike (Preempt Security and Humio) and SentinelOne (Scalyr) as this space spins into the XDR realm.

At Lumifi, our primary goals are to provide quality and expert level service to our customers. As such we have been very strategic in the selection of EPP partners. We understand that not all products are created equal, and we needed partners that was forward thinking and innovative, has a customer first approach, and wanted to partner with us to provide better overall protection.

 

Who are Lumifi's top partners from the Gartner Magic Quadrant (GMQ)?

We are pleased to see that each of our chosen partners in the EPP space made a strong showing in this most recent iteration of the Gartner Magic Quadrant.

Conclusion

With so much movement in the first half of 2021 in the EPP space, it will be fascinating to watch the rest of the year unfold. Lumifi is well positioned for our customers with these strategic partnerships as outlined above.

What is Cyber Insurance?

Statistics show that the fallout from successful cybersecurity incidents has both financial and business-related consequences. A data breach costs the average enterprises approximately $60,000, and in extreme situations, small and medium-sized businesses may go out of business within 6 months from the date the incident occurred. Thus, to determine whether the financial cost of successful hacking attempts, businesses have turned to insurance to deal with extensive losses.

Today, cyber insurance or cyber-liability insurance is popular among enterprises with online operations. Cyber insurance is defined as insurance policies a business takes to protect itself from the fallout of a successful hacking or cybersecurity incident. The policy is a contract between the enterprise and an insurer providing financial security against cyber-related incidents. The insurance policy ensures a business receives the financial support it requires to successfully apply mitigation techniques to deal with network and IT infrastructure security incidents.

"Organizations should also consider having a third-party Security Operations Center (SOC) like Lumifi Cyber, as it often qualifies them for a discount on their policy," said Director of Product Management Mike Heller. "Many insurance companies will consider the use of a qualified outsourced SOC as means to transfer risk and provide a discount for those services."

What Does Cyber Insurance Cover?

Insurance coverage and what it covers are determined by the contract signed between the insurer and the business owner. The average cyber insurance policy is designed to provide cover for cybersecurity failures. Cybersecurity failures in this context would refer to data recovery initiatives, IT forensics, and the cost of the legal fallout from security incidents regardless of an in-house error that led to a successful system breach.

The mitigation process needed to deal with breaches differs according to the severity of the incident. In many cases, where Ransomware or business email compromise hacking techniques are used, a team of external experts may be required to handle the mitigation task to regain stolen data. In terms of BEC, security agencies may be involved with tracking the hackers behind a successful incident. The mitigation process for the above examples is expensive. Thus, insurers generally provide added paperwork for more complicated security breaches.

Cyber insurance policies sometimes cover the amount lost from a BEC hacking attempt depending on the amount lost. Coverage for BEC fraud is generally provided as a specific policy outside the standard cybersecurity insurance coverage framework. The need for exclusivity where BEC fraud is involved is once again due to the large sums, which can run onto six figures, associated with BEC scams.

Insurance companies also take diverse approaches to deal with successful Ransomware attacks. After evaluating the effect of the Ransomware attack, the insurer may determine that paying the requested ransom fee may be a more effective method of getting back sensitive data. Insurers may also choose to involve law enforcement, which comes at a cost, or bring in experts they have worked with in previous cases to deal with the situation.

What Isn’t Covered by Cybersecurity Insurance?

Cybersecurity incidents can be broad and far-reaching as they can affect both online and offline business operations. Thus, in some cases, cybersecurity insurances provide limited coverage compared to the amount of risk an enterprise’s IT infrastructure and business has been exposed to. For example, a successful Ransomware attack that becomes public can affect the finances, reputation, and intellectual property of an enterprise. Standard cybersecurity insurance policies may cover the financial cost of dealing with the attack but not the reputational damage or intellectual property is stolen or distributed on the dark web.

The limited nature of cybersecurity insurance means an enterprise that never recovers its goodwill may still go out of business despite deploying mitigation techniques to limit the damage. Losing customers is a fallout no insurance can cover as customers feel safer taking their business elsewhere.

Another grey area to be considered is cybersecurity incidents that are perpetrated by hacking farms backed by other nations. For example, the NotPetya malware attack, linked to the Russian military and similar attempts from North Korea, can be classified as acts of war by insurers. This grey area must be analyzed, and a coverage decision was taken before any insurance policy is signed. Using the NotPetya incident as an example, some insurers paid damages to mitigate risks while others stuck to the ‘act of war’ narrative, leaving the payment decision to the courts.

The grey areas within cybersecurity insurance are reasons why enterprises must thoroughly evaluate cyber insurance policies before choosing to go with an insurer.

What Does Cybersecurity Insurance Cost?

Statistics put the average cost of cybersecurity insurance in the US at approximately $1,485 per annum. This average cost does not apply to every enterprise because more comprehensive cybersecurity insurance which focuses on peculiar security incidents costs more. Insurance enterprises also evaluate the cybersecurity threat levels of a business to determine the cost of purchasing an insurance plan. Thus, enterprises susceptible to cybersecurity incidents due to the nature of the business they run are subject to more expensive insurance coverage.

The choice of purchasing insurance policies against successful Ransomware attacks or BEC fraud also comes at a cost. The value of data a company stores within its IT systems plays an essential role in deciding how much an insurer will be willing to charge for providing a policy plan against such security incidents.

Conclusion

Although cybersecurity insurance provides some help against hacking attempts, it is not a substitute for maintaining a functional security operation center and implementing compliance policies. As stated earlier, insurance may cover financial losses, but an insurance plan cannot repair hits to an enterprise’s reputation.

Top 5 Most Popular Cybersecurity Certifications

The cybersecurity analyst has become the third most valuable job description in the technology industry. The increasing security incidents to IT infrastructure, the demand for accountability from end-users, and the financial cost of successful breaches are significant reasons enterprises and startups are taking cybersecurity seriously. Ambitious professionals who choose a career in IT security are reaping the benefits of securing operating systems and deployed IT infrastructure.

Cybersecurity experts are handsomely rewarded for their efforts and are in high demand. But in an industry where standardization of skills is often proven, job candidates often must have specific certifications to obtain high-value jobs. Today, cybersecurity certifications play essential roles in highlighting a professional’s critical competencies alongside provable work experiences.

The top five popular certifications include CISSP, CISM, CRISC, AWS Certified Security, and CompTIA Security+ according to the 2020 IT Skills and Salary Report.

The Importance of Certifications in Cybersecurity

A few decades ago, anyone with a bit of understanding of computers and IT systems could label themselves as cybersecurity experts to gain access to jobs. The lack of regulation and little or no means to determine an expert’s core competencies except through informal referrals led to chaos within the industry. The rapid introduction of new threat actors and hacking tools exposed most ‘cybersecurity experts’ as under-qualified individuals with limited hands-on knowledge in dealing with threats.

To eliminate the chaos caused by inadequate validation processes, diverse organizations developed testing criteria to determine an individual’s ability to deal with all kinds of cybersecurity incidents. The testing procedure, which also awarded certifications, has become the top validation tools for enterprises hiring cybersecurity experts or firms.

Today, a cybersecurity certification is essential for different aspects of a professional’s career growth; at the entry-level where individuals with non-existent work experience intend to join the workforce, certifications highlight that the certified individual has the technical knowledge to handle cybersecurity issues. Attaining certifications gives entry-level professionals a foot into the door of a very competitive industry.

Experts who have spent years perfecting the art of identifying and mitigating cyber risks also have a lot to gain with a certification attached to their names. First, a certified expert takes professional development activities seriously. With the validation cybersecurity certifications provide, statistics show that professionals with multiple certifications earn approximately $10,000 more than those with fewer certifications.

The Top 5 Most Popular Cybersecurity Certifications

The International Information System Security Certification Consortium (ISC)²: CISSP Information Systems Security Management Professional – The CISSP is a certification provided by ISC², and it accesses an individual’s ability to design, implement, and manage best-in-class cybersecurity operations for an enterprise. The certification examination process also expects you to have completed some prerequisite courses before taking the exam.

CISSP was developed to validate the skill sets of high-level cybersecurity experts such as Chief information officers and Chief Technical Officers tasked with running the operations of a security center. Certified professionals are expected to recertify in a couple of years, and the certification provides access to leading journals, resources, and tools about cybersecurity.

ISACA Certified Information Security Manager (CISM) – ISACA is another international non-profit organization that provides certification training and examinations for the IT community. The CISM is a management-focused certification that evaluates a candidate’s understanding of both the technical and business aspects of managing a security operations center or system.

Earning a CISM validates your skill sets in setting up an operations center and managing it, thus supporting your application for management roles within the IT industry. CISM-certified professionals are granted access to cutting-edge security materials and are expected to recertify after a couple of years.

ISACA Certified in Risk and Information Systems Control (CRISC) –Properly managing a company’s exposure to risks from cybersecurity incidents ensures the affected company retains its brand reputation despite security threats. The CRISC certification validates a professional’s ability to manage IT enterprise risks and design risk-based information systems controls.

The CRISC certification is designed for risk and security managers, information control managers, and CIOs interested in validating their risk management abilities. The certification comes with an expiry date, and certified professionals are expected to renew their certifications periodically.

AWS Certified Security – Specialty: The leading provider of cloud-based services offers security certifications targeted at professionals building a career in managing AWS-built infrastructure. The AWS Certified Security certification is designed to evaluate and validate your ability to secure AWS cloud from cyber threat actors. The certification is targeted at risk and security managers, security analysts, and CIOs who intend to secure cloud infrastructure.

The certification program requires a prerequisite qualification, and certified professionals are expected to recertify in a few years. AWS-certified security professionals are in high demand due to Amazon’s dominance of the cloud infrastructure industry.

CompTIA Security+ – The CompTIA examination body is respected globally for designing programs to test the efficiency levels of IT professionals. Its Security+ certification program is designed for entry-level individuals looking to validate their understanding of IT security terminologies, tools, and operations. Thus, a CompTIA Security+ certificate should be viewed as the starting point for anyone interested in a career in IT security.

Prospective candidates do not require any prerequisite certifications to participate in the Security+ certification exam. It is also important to note that this certification fulfills the prerequisite conditions for more advanced certifications.

Conclusion

A cybersecurity certification is an excellent validation tool that confirms your technical and applicable knowledge of cybersecurity tools—getting certified increases your chances of building a career as a cybersecurity professional across every industry where IT infrastructure is deployed.

What is Ransomware?

Ransomware is a form of malware cybercriminals use to encrypt data stored in computers or online servers. Cybercriminals demand payment to release the encryption key blocking the user from accessing the encrypted data. Payment is typically made through diverse mediums, including digital currency like Bitcoin. Once payment has been made, the victim is generally provided with instructions on decrypting their data.

The Evolution of Ransomware

Ransomware has been a threat to businesses since the 1980s and has gained increasing popularity.

A significant historical event of its use was the infiltration of participants' computer systems at the 1989 World Health Organization (WHO) Conference. A Harvard-trained doctor distributed a malware tagged the AIDs Trojan, which infiltrated computers and encrypted the data of participants at the WHO event.

Statistics show a 585% increase in the use of ransomware between 2008 and 2009. The dramatic increase can be traced to hackers discovering new ways to cover the financial trail and proceeds from every successful incident. Between 2000 and 2015, transactions moved from making payments through online drugstores and shady websites to cryptocurrency.

The success of blockchain and Bitcoin led to the increase in ransomware as a primary hacking tool. By 2015 there were approximately four million samples of ransomware floating around the dark web. As ransomware usage grew, the term Ransomware as a Service (RaaS) was coined. RaaS meant that anyone with criminal intent could purchase a different strain of ransomware for about $40. The ease of accessing and using ransomware led to a 172% increase in its use as a hacking tool by 2016.

How Does Ransomware Work?

Ransomware is delivered through either an online medium of communication, hard drive, or malicious websites. Online mediums of communication refer to e-mails, instant messaging applications, or video chat rooms. Cybercriminals deceive victims by introducing ransomware in communications that appear authentic with links that install the executable files that encrypt its host system.

Unlike brute force hacking attempts where specific systems or IT infrastructures are targeted, ransomware attacks are rarely targeted at specific systems. Cybercriminals apply a generic mailing approach by blasting out Ransomware-integrated information with the hope that something sticks. Thus, employee negligence plays a vital role in successful ransomware attacks.

A successful attack doesn't always have to lead to a ransom payment; hackers view undetected access through ransomware as successful due to the ability to continuously capture important personal or enterprise-related data from the host.

The most important thing to know is that an encrypted host must be decrypted using a mathematical key native to the ransomware used. Other strains of ransomware such as leakware or doxware exist. In scenarios where both strains are used, the hacker includes threats to publish encrypted data on the dark web or social media platforms to pressure the victim to pay the specified ransom.

Effects of Successful Attacks on Organizations

The effects of successful cyber-attacks including ransomware on business enterprises have been documented and the statistics are worrying. Successful breaches to small and medium-sized business lead to an average pay-out of approximately $83,000. Although law enforcement advice against making payments, approximately 40% of business owners take the payment step with the hope of limiting the damage to their brand and finances before the breach becomes public knowledge.

Ransomware encryptions also mean enforced downtime as businesses no longer have access to business operations. According to statistics, small to medium businesses lose approximately $8,500 per hour to the unplanned downtime caused by successful ransomware attacks. Downtime may also be the least of an SMBs worry, as approximately 60% of enterprises go out of business months after successful breaches to their IT infrastructure. The fear of losing entire business units is another reason why executives are willing to pay $20,000 to $50,000 to receive a decryption key after an attack.

How to Combat Ransomware

Successfully combating ransomware requires two major approaches; an enterprise-wide approach and an individual approach. The enterprise-wide approach involves developing a security strategy that ensures every software application and operating system used for business purposes stays updated. The application of security tools such as security information and event management (SIEM) or SOAR alongside internet security software ensures system health can always be tracked in real-time.

Enterprises can also limit access to suspicious websites from computer assets. This ensures that employees do not stray or mistakenly click links that redirect to compromised platforms. Creating a dedicated backup system ensures that in the event of a successful breach, a business does not have to function at the mercy of a cyber-criminal.

The individual approach to combating ransomware starts with educating employees about the dangers associated with ransomware. Cybersecurity training introduces employees to the risks of going through informal channels when using a company's IT resources. Extensive cybersecurity training prepares everyone within an enterprise to follow company-wide policies when utilizing IT resources.

Additional solutions include email protection that can help filter out spam and phishing email as well as encrypt communications.

Beyond a managed SIEM solution, endpoint detection and response is a frontline defense for organizations. Companies like SentinelOne provide an endpoint solution that focuses on ransomware and offers a ransomware warranty.

Conclusion

Preventing Ransomware attacks is the preferable option for dealing with a successful data breach because wrong decisions can be made in the heat of the moment. Taking advantage of cybersecurity solutions such as integrating a SIEM tool with an existing security operations center ensures an enterprise keeps track of its infrastructure in real-time. In the event a successful ransomware attack occurs, the last rule is never to pay the specified ransom but to contact your security service providers and the required authorities to deal with the incident.

Microsoft Exchange Vulnerability

As you may know, a zero-day vulnerability in Microsoft Exchange Server was published last week that is garnering a lot of attention.

Microsoft has attributed this to a known threat actor that has now compromised thousands or even tens of thousands of systems with these attacks, though it's important to understand that other attackers are now leveraging these vulnerabilities for their own campaigns.

Most critically: It is possible for an attacker, once authenticated to the Exchange server, to gain access to the Active Directory environment and download the Active Directory Database.

This cannot be emphasized enough - compromise of an Exchange server could lead to a much wider compromise that will require extensive efforts to contain and remediate.

Lumifi is seeing active exploitation of this vulnerability already.

If you have Microsoft Exchange in your environment, please patch immediately and scan all Exchange servers with the latest IOCs.

We have included additional IOCs below that may not be included in your current scanning tools.  Please let us know if you do have Exchange so that we can work with you for a deeper review.

(more…)

5 Do's and Don'ts to Qualify Your Next MDR

(Updated April 2022)

The success of your managed detection and response deployment hinges on asking the right questions. 

Managed detection and response is a valuable element of your enterprise' security posture. With the right technologies in the hands of competent, highly trained analysts, you can significantly reduce security risks while paying a fraction of what an in-house team would cost. 

(more…)

What is Penetration Testing?

A penetration test or pen test is a simulated cyber-attack against computer systems, application systems, and IT infrastructure to discover loopholes. These simulated cyber-attacks come in diverse forms with the intent of breaching a system through its servers, web or mobile applications, and other endpoints. The purpose of pen testing is to discover exploitable vulnerabilities in a controlled setting before cybercriminals take advantage of them.

Penetration testing is an IT security niche with diverse testing methods and requires a skilled tester to execute. Why attempt to penetrate your cyber systems, you may ask? The short answer is that the insight it provides can be used to patch detected loopholes, while the longer answer is what this article covers.

How Does Penetration Testing Work?

Penetration testing is a process that follows a defined pathway to gain insight into vulnerabilities. The process consists of five stages: planning, scanning, gaining access, maintaining access, and result analysis. The first four stages simulate the actions of a cybercriminal's attempt to gain a foothold within computer systems, while the last stage focuses on how IT security teams can prevent and respond to similar security incidents. The importance of these five stages includes:

Penetration Testing Methods

Five methods can be applied to test for system and firewall vulnerabilities within an IT infrastructure. These methods can be applied as singular processes or meshed together depending on the planning stage's stated goals. The five methods include:

  1. External Testing – External testing methods target the most visible online assets of an enterprise. This includes web applications, emails, and other online platforms. The testing process involves using phishing attacks to glean data from these visible assets.
  2. Internal Testing – The internal test method is conducted behind an application's firewall which means the attacker has either gained access to an employee's credentials or made some lucky guesses. The internal test simulates scenarios where an employee has been compromised or gone rogue. Approximately 90% of successful data breaches are due to human error, highlighting the importance of the internal testing method.
  3. Blind Testing – The blind test method involves using brute force to gain access into an enterprise network without any inside information or employee credentials. The blind test provides security teams with insight into how cybercriminals work and how an application or system assault occurs.
  4. Double-Blind Testing – The double-blind test simulates real-world scenarios where the cybercriminal has no inside knowledge, and security teams have no prior knowledge of when the attack will come and what type of attack will be used. Thus, security teams respond in real-time as the attacker adapts to changing security situations.
  5. Targeted Testing – Targeted testing is the opposite of the double-blind test method and in this case, both the attacker and the security personnel are in sync as the test occurs. Targeted test is more or less a training process to get security teams up to speed with new attack methodologies and understand the behavioral patterns of hackers.

Who Does Pen Testing?

An authorized penetration tester handles penetration testing, and pen testers are also broadly classified as information security analysts. The penetration tester actively searches for the vulnerabilities and flaws in exiting cyber systems using the methods outlined above. The tester uses existing hacking tools to simulate actual attacks, thus assisting security teams with patching flaws and developing high-performing incidence response strategies.

Professional penetration testers are expected to be skilled security analysts with excellent knowledge of scripting and coding. The tester is expected to have gained knowledge of the particular operating system to be tested and understand the tools hackers use to target that system. Finally, knowledge of network protocols like DNS is required to understand how cybercriminals target vulnerabilities and breach systems.

Why Does Penetration Testing Matter?

The evolving security threats IT infrastructure face and the regular additions of new applications mean constant vigilance is needed to forestall breaches. Penetration testing provides a means to continuously test your enterprise's security posture to detect vulnerabilities and craft remediation strategies to eliminate vulnerabilities. It also serves as a training and validation tool for cybersecurity teams tasked with developing mitigation strategies to respond to cybersecurity incidents.

Penetration testing is also done to ensure cyber systems stay updated to regulatory compliance standards such as the European Union Cybersecurity Act. An annual penetration test keeps your business on the right side of the law while protecting your data from cybercriminals.

Conclusion

The fallout from successful cyber-attacks is why comprehensive penetration tests must be done if optimal security is the goal. Statistics show that approximately 60% of SMBs go out of business within 6 months of a data breach. Penetration testing provides a means to secure your business applications and reputation from criminal intent.

What is the MITRE ATT&CK Framework?

Learn about the MITRE ATT&CK® Framework and how cybersecurity teams leverage its matrix of tactics and techniques to assess risk and vulnerabilities within an organization.

Definition 

The MITRE ATT&CK Framework is a knowledge base of tactics and techniques that can be used as a foundation for classifying adversary behaviors and assessing an organization’s vulnerabilities. 

Created in 2013 by the MITRE Corporation, a non-profit supporting U.S. government agencies, it is one of the most comprehensive sources for classifying threats and developing models. 

The ATT&CK portion of the name stands for Adversarial Tactics, Techniques, and Common Knowledge. 

Simply put, you can imagine the MITRE ATT&CK knowledge base a “Wikipedia” of cyber threats and tactics. 

Who is MITRE? 

MITRE is a government-funded research organization. The company was born out of MIT in 1958. MITRE started ATT&CK in 2013 to document common tactics, techniques, and procedures (TTPs) that advanced persistent threats use against Windows enterprise networks. It was created out of a need to document adversary behaviors for use within a MITRE research project. 

MITRE ATT&CK Matrices 

The MITRE ATT&CK Matrices are tactics and techniques laid out in a “periodic table” of tactics and techniques used by threat hunters, defenders, and other cybersecurity professionals to classify attacks and assess an organization’s risk. 

The most popular framework used is the MITRE ATT&CK® Matrix for Enterprise. 

The matrix contains information for the following platforms: Windows, macOS, Linux, PRE, AWS, GCP, Azure, Azure AD, Office 365, SaaS, Network.

Tactics 

The MITRE ATT&CK Tactics represent the “why” of a technique. What is the adversary’s objective when performing an action? Tactics give important context to the offensive action. 

Techniques 

Techniques are the “how” component of the action, how an adversary achieves the tactic. They may also represent the “what” an adversary gains by performing an action.  

Use Cases 

There are a number of ways an organization can utilize the MITRE ATT&CK framework, here are just a few: 

How Lumifi Utilizes the MITRE ATT&CK Framework 

When choosing a Managed Security Service Provider (MSSP) for outsourced threat detection and response services, the MITRE ATT&CK Framework proves its value in a Security Operations Center (SOC)

Lumifi uses the MITRE ATT&CK framework in several ways. 

First, our content team maps each of our alerts to a technique, which allows us to see where our detections are heaviest and where we need to expand our ruleset. 

When our analysts are threat hunting, they use MITRE techniques as guides for Tools, Techniques, and Procedures (TTPs) that they should be on the lookout for. Doing so allows us to find gaps in customer visibility. 

One use case is if a customer gets all their alerts in the Reconnaissance phase, but not much else, we can assume they are not receiving all relevant data. This would start a process where we take another look at their environment and see if their critical logging source has changed their logging format. 

Another added benefit is trend data. Lumifi receives alerts across our clients’ environments collectively, where they can be categorized using the MITRE framework. For example, if there is a spike in Initial Access through phishing, like the initial onset of COVID-19, or an influx in Supply Chain attacks in the SolarWinds fiasco. 

Our customers receive more information so they can become more granular with their defense strategies and focus on weak areas. For example, if we see a customer with a large amount of phishing emails, they may need to step up their email filtering. Or if we see an increase in privilege escalation, defense evasion, or credential access, we should figure out the origin of these attacks and ensure the customer has a solid Endpoint Detection and Response platform. 

MITRE allows Lumifi to identify gaps in security and give a broad picture of where our SOC should focus and how to better assist our clients. 

Every level of our security operations team uses the MITRE ATT&CK framework, from reporting to tasking the threat content team to see if customers need specialized assistance or guidance. 

SHIELDVision 

Lumifi's proprietary orchestration tool, SHIELDVision, utilizes the MITRE ATT&CK framework in order to provide concise identification and feedback. 

We utilize the framework in our automated scans, hunting scans, and investigations. Analysts make sure to list the Access and Technique according to the framework. 

Customers can rest easier knowing we are mapping their networks to the MITRE framework and receive additional insight in their quarterly calls with our engagement team. 

Conclusion 

The MITRE ATT&CK Framework is an important tool for red and blue teams alike. Whether it’s emulating an attack or using the framework to inform security decisions, the MITRE ATT&CK framework is a useful piece of the cybersecurity landscape. 

Leading MSSPs utilize the framework in order to provide in-depth investigations, threat hunt, and create clear communication with their customers. 

To learn more about how Lumifi uses the MITRE ATT&CK Framework and how we can protect your network, contact us today

SolarWinds vs. Splunk: Comparing Two Leading SIEM Solutions

SolarWinds Log Event Manager and Splunk Enterprise Security are two of the top security information and event management tools. Both SIEM solutions differ but offer high-performing features that simplify threat detection and response within expansive networks.

Here, we look at key differentiators between both options. To effectively compare both options, the following criteria were chosen for their importance to the threat detection and response process, will apply:

Threat Intelligence

SolarWinds is more than a SIEM tool as it offers other services across the database management, network performance monitoring space, among other services, but our focus is on its SIEM capabilities.

SolarWinds relies on data centralization to collect logs and data lists and to monitor threats with results displayed using an interactive dashboard. It is important to note that SolarWinds is only available as a virtual appliance, which means it is pre-configured to a large extent and can efficiently run through an IT infrastructure.

SolarWinds takes a proactive approach to threat intelligence through intelligence feeds that are updated continuously to showcase real-time incidents, thus simplifying response. According to its website, it leverages 700 built-in correlation rules and hundreds of admin responses to automate threat detection and response. SolarWinds is a reliable option for small to medium-sized businesses.

Splunk bills itself as a security operations suite that business organizations can apply to optimize cybersecurity defenses through accurate data analysis. This means, like SolarWinds, it offers more comprehensive security services include SIEM. Splunk SEIM threat intelligent features deliver end-to-end visibility into expansive IT networks through a visualization dashboard, simplifying the detection and response process.

Splunk applies machine learning and predictive analysis to deliver a proactive threat intelligence solution that ensures security incidents are accurately detected in real-time. According to Splunk, its advanced use of predictive analytics alongside automated playbooks can discover threats 30 minutes in advance, thus ensuring that end-users can react quickly. Splunk isn’t a virtual appliance, and it provides its services to both SMBs and larger organizations.

Both Splunk and SolarWinds are recognized for their ability to provide high-performing threat intelligence solutions. According to Gartner Peer Reviews, Splunk gets a rating of 4.4 with more reviews, while SolarWinds is rated 3.8 for by much fewer users.

Behavioral Analysis

SolarWinds rely on behavioral analysis when sifting through large data sets to discover patterns and gain insight into specific threat profiles and bad agents. Its application of behavioral analysis is backed by its cyber threat intelligence product and machine learning.

The extensive behavioral analytics capabilities Splunk provides ensures end-users can prepare to quickly identify hacking attempts through well-known actors such as DDoS or phishing attacks, as well as more complex hacking technologies.

Splunk once again relies on machine learning to detect anomalous behavioral patterns and analyze the intent behind them. The application of machine learning ensures Splunk can trace anomalous behavior from diverse endpoints to discover any common determine factor behind specific security incidents. The insight this provides ensures threats are dealt with from the root source with high accuracy.

Splunk also offers a dedicated product, the Splunk User Behavior Analytics, to complement its SIEM tool’s behavioral analytical capabilities.

Reviewers on Gartner Peer Review show an average rating of 4.7 for Splunk’s behavioral profiling and analytics solution, while SolarWinds gets a rating of 3.5 with fewer reviewers.

Application Monitoring

SolarWinds offer robust application monitoring and management tools that ensure security teams and non-technical individuals can troubleshoot both complex and simplistic issues through its information dashboard. SolarWinds offers “Pingdom and Web Performance Monitor,” two features for analyzing both on-premise and cloud-based applications for web applications monitoring and management.

Other solutions SolarWinds offer include “AppOptics and Loggly” for monitoring SaaS-based applications, cloud applications, and hybrid applications running through multiple environments.

Splunk takes app monitoring to the next level through its suite of products aptly named Splunk Application Performance Monitoring (APM). Splunk APM is explicitly built for cloud-based applications and applies an open standard approach to collecting data from libraries and diverse app platforms to ensure every application within an enterprise network can be monitored.

Splunk leverage AI to simplify errant troubleshooting applications to find root causes and continuously monitor app performances. Gartner Peer Review on both solutions application monitoring and management capabilities show a rating of 4.8 for Splunk and 3.3 for SolarWinds.

Ease of Use and Support

As a virtual appliance, SolarWinds is easily deployed and used within expansive IT infrastructure, unlike Splunk, which requires some manual configuration activities. Both solution providers also provide extensive after-sales support to ensure customers get started with using the SIEM tools they offer quickly.

SMBs who make use of SolarWinds appreciate its ease of use features, and this can be seen from its rating of 4.6 compared to Splunk’s 4.2 ratings on Gartner Peer Review. SolarWinds also scores a high rating of 4.7 for its support, while Splunk is rated at 4.6.

Conclusion

Choosing the right SIEM for your organization can be challenging. Depending on your specific organization’s needs, existing architecture, and preferred software and vendors, there is a lot to consider. Lumifi provides essential consultation and engineering when implementing a SIEM solution within a client environment. Contact us today to take your security to the next level.

What is SOAR?

SOAR is an acronym thrown around a lot within the cybersecurity industry, but what does it really mean? SOAR stands for Security Orchestration, Automation and Response.

SOAR tools are the technologies used to orchestrate responses to security incidents and assign responsibilities between various tools and individuals within a security team or enterprise.

The working principles of a best-in-class SOAR technology include:

The Benefits of Implementing SOAR

The upsides of utilizing SOAR capabilities are:

Automating Repetitive Tasks

Human error in the workplace is responsible for 95% of security incidents in cloud environments, according to Gartner. The high failure rate is due to repetitive manual tasks, which increase the likelihood of an oversight or mistake. Threat investigations and responses are performed faster and at scale across complex or expansive IT infrastructures with SOAR capabilities.

AI Enables New Security Initiatives to Protect Digital Infrastructure

The integration of machine learning in SOAR solutions enables the technology to dive deep into threats, analyze them, and gain contextual knowledge of their capabilities. The insight SOAR provides the foundation for fine-tuning incident response strategies to improve overall IT security.

Orchestrate Security Incidents to Capable Hands

SOAR technology automates the orchestration process and routes security incidents to the analyst or expert within a team with the best credentials to handle a particular incident. SOAR ensures teams get only the essential information needed to take action.

SOAR Use Cases

Managing Security Operations

As a security operations manager, SOAR technologies handle multiple tasks such as vulnerability management, security certificate management, endpoint diagnostics, and reporting activities. The broad range of management services SOAR offers means enterprises with varying security capacities can deploy SOAR for security management operations.

For example, an enterprise with a dedicated, experienced security team can rely on SOAR to send timely reminders on expiring security certificates so the appropriate individual can handle that task. In other enterprises with limited security operations, SOAR can serve as an additional tool for managing vulnerabilities and dealing with security incidents through automation.

Threat Hunting and Incident Response

The process of threat hunting is more than simply discovering threats, it involves gaining insight into threat complexities using machine learning and other pattern recognition solutions. SOAR provides the tools for automating the threat hunting, analysis, and response processes for enterprises regardless of their security team’s experience levels.

Use cases for experienced security teams revolve around gaining contextual insight into indicators of compromise captured across diverse threat hunting technologies. Security teams also rely on SOAR technology to analyze big data sets from expansive enterprise infrastructures as they can extract and analyze data from both cloud-based and on-premise IT assets.

Use cases for enterprises with limited security capacity to take advantage of the orchestration and automation capabilities of a SOAR technology or solution. Under this category, enterprises rely on automation to discover threats and determine the response required to mitigate discovered threats. These enterprises also rely heavily on comprehensive dashboards and playbooks to understand the nature of threats, their targets, and the severity of a security incident.

Automating Security

Automation and the option to rely on superior analytical powers SOAR provides are a major reason why enterprises choose to use a SOAR solution. Due to the always-changing nature of IT security and the threats cybercriminals deploy, relying on the automated support SOAR provides to discover new threats are the reasons why security teams deploy SOAR technology.

Conclusion

SOAR tools continue to be adopted by enterprises looking to increase efficiency and provide greater threat hunting capabilities. Gartner mentions SOAR capabilities as a top feature for Managed Security Service Providers. If your organization is looking to implement SOAR capabilities or needs an outsourced provider with these competencies, reach out for a no-cost consultation with a Lumifi professional today.

5 Questions to Ask an MSSP

An organization’s choice to seek a managed security services provider (MSSP) to guard over its IT infrastructure is usually based on three major reasons.

According to Gartner’s 2020 Market Guide for Managed Detection and Response Services, they are:

To simplify the decision-making process while ensuring the final choice leads to a long-lasting business relationship, here are questions you should ask potential MSSPs:

How do you adapt your service to your clients’ needs?

“Business context” is talked about a lot by providers, but not all can provide a truly tailored experience.

Ask potential MSSPs how they have adapted their services and approach to a client’s unique business environment and operations. A qualified MSSP will work with you to understand your security infrastructure, day-to-day operations, and future goals.

Lumifi's foundations are built upon our consultative approach. We have clients ranging from small to mid-market organizations to large multi-national operations across all industries. We understand the intricacies of compliance reporting and regulations across industries.

Can you use our current security stack, or will we need to implement new technology?

Depending on the service provider, MSSPs can work with existing infrastructure or require their clients to adopt their “package” of security tools.

Depending on your current security stack, keeping your current system may be more complex and expensive than transitioning or migrating to a different platform.

Lumifi provides the best of both worlds. We partner with the best in class security tools and integrate with most of them with our security orchestration tool. Depending on your current security stack, you may not have to add or deploy new tools. Additionally, Lumifi may be able to help you cut cost with exclusive partnership licensing fees.

Can you configure and customize my logs?

Your organization generates millions of data points for every event that passes through its IT infrastructure every day, recorded in logs. Marketing efforts, sales, client services, and financial transactions passing through a network generate a ton of events and alerts.

Auditing and analyzing logs is a key component for protecting an IT infrastructure from security incidents, meeting government regulations, and responding to threats.

Security information and event management (SIEM) tools audit and analyze logs. Most MSSPs rely on SIEMs to handle the task of managing the logs of a customer.

A well-configured, customized, and installed SIEM can make a world of difference for your IT team.

Any MSSP worth their salt will work with your organization to implement and tune your log ingestion and SIEM tool to deliver rich contextual alerts.

Lumifi works with the industry’s top SIEM solutions, including on-premise, hybrid, and cloud architectures. Our engineers and threat content team provide a premier SIEM installation and tuning experience.

Do the logs and alerts have the right type of data and level of detail to support threat hunting activities and compliance reporting?

SIEM tools allow for full packet capture, which provides necessary event data to actively threat hunt and generate detailed reports.

MSSPs can implement a SIEM tool on your network while tuning alerts to reduce the volume and increase efficiency.

Make sure your MSSP goes beyond the out-of-the-box rules and alerts, customizing them to your specific needs.

Lumifi provides a consultative approach to logs and alerts. We work with best-in-breed SIEMs, and our security engineers can help you architect and deploy your ideal security stack. Additionally, our Managed Detection and Response service comes with active threat hunting and a dedicated account manager who facilitates progress and status calls.

Will your MSSP support our organization’s incident response activities?

Detecting threats and capturing security incidents is the first part of the process of mitigating threats to your organization’s IT infrastructure.

Your organization should ask potential MSSPs how they currently handle incident response and how they work in co-managed or fully outsourced environments. Understanding the ownership for threat response will determine your budget and resource spend.

Lumifi offers a spectrum of incident response services and tools that interface with the MITRE ATT&CK framework; contact us today to see how we can best collaborate.

Other Considerations

Most MDR providers lack the vetting and decades of competition that MSSPs have faced. Due diligence must be paid before signing a contract. Make sure to:

Add Lumifi to your shortlist

Lumifi has been providing Managed Detection and Response services for over a decade. We use our proprietary software SHIELDVision and core processes to focus on generating valuable and actionable insight into advanced security threats for analysis and response, allowing us to beat the competition. Additionally, we have the experience and resources to set up, configure and manage virtually any SIEM appliance, email security tool, or endpoint software.

Contact us today for a no-cost consultation with one of our security experts.

Top 5 Takeaways for NIST 800-53 Rev 5

Recapping a highlight from Cybersecurity Awareness Month, the National Institute of Standards and Technology (NIST) has released an update to its master IT security guidance document, Special Publication 800-53. This update, "Rev 5," is the first major change to SP 800-53 in seven years, and a lot has changed in cybersecurity since 2013. The new guidelines will eventually form the foundation for the compliance programs – and requirements– in nearly every major US corporation with a security, privacy, and risk management focus.

Over the past few weeks, we've had the opportunity to fully review this 483-page document and its supplemental materials. NIST has referenced nearly 200 applicable laws, policies, directives, regulations, standards, and guidelines to bring together over 1,100 discrete controls. Read on to find out our top five observations on Rev 5, including a striking shift in its guidance on privacy.

1. Supply chain risks have finally been recognized

Supply Chain Risk Management is one of the two new control families included in this latest revision – a long overdue development. Nearly all organizations require external partners and components to carry out critical functions and are themselves part of the supply chains of other organizations. Having controls that recognize this coordinated and collaborative reality, and the inherent risks that come with this, is a major improvement from prior publications.

Previously, NIST did not provide sufficient guidance on how to control and verify these external dependencies. There are now comprehensive controls that can be more readily applied to external system services. These cover cloud-delivered services, 3rd party software developers, and anything that might be outsourced. Twelve new second-level controls (all with a short "SR-" prefix) address areas such as creating a risk management plan, the process around critical supply chains, and matters like performing regular assessments and reviews of suppliers. Factors like provenance, detecting tampering, component authenticity, and inspections are entirely new concepts within the SP800-53 framework.

2. A focus on results

Prior versions of SP 800-53 focused on assigning responsibility for each control. Organizations implementing these controls in a strict fashion would be obligated to place the full burden of addressing a given control on a narrowly defined implementer (a person or team). In reality, good controls require broad cooperation and collaboration to achieve. Rev 5 shifts the focus of controls to desired outcomes – part of a broader recognition that SP 800-53 is used by non-government organizations that may not have the strict delineation of roles that government entities often do. The emphasis on achieved results aligns with a broad shift occurring across the landscape of IT. Governments and businesses alike have increased their demands on IT systems to deliver demonstrable outcomes.

3. Compliance assessment tools will show new gaps

Every new revision of SP 800-53 results in new machine-readable files following the Open Security Control Assessment Language (OSCAL)framework. These XML, JSON, or YAML files will be incorporated into various third-party tools, often translated into another open standard like SCAP or OVAL, to automate security and governance testing within organizations. These tools are crucial for demonstrating to stakeholders that best practices controls are in place or the implementation of controls is trending in a good direction. All organizations should consider revisiting their assessment tools in the near future and ensure that the new framework files are incorporated.

4. Privacy objectives have been integrated into all control sections

In Rev 4, privacy controls appeared to be "bolted on" via a separate control section devoted to the topic. In Rev 5, privacy controls are fully incorporated into the overall control guidance, with personal privacy controls taking on greater prominence. Personally Identifiable Information Processing and Transparency is one of two new Control Families. This likely represents the influence of both GDPR and CCPA, both of which increased legal protections and regulations for individual privacy.

More broadly, the relationship between security and privacy is very strong, and our frameworks need to recognize this. Eight new second-level controls (all with a short "PT-" prefix) address matters such as determining authorization to process or store personal information, obtaining consent, giving sufficient privacy notice, and defining a purpose within the organization for handling this information.

5. More controls

Organizations face an ever-growing list of threats and attack vectors. The number of defined concepts/objectives that require controls grows along with these threats. When Rev 1 of SP 800-53 was released in 2005, it had close to 300 controls. Less than 10 years later, when Rev 4 was released, the number of controls had tripled to 965. Rev 5 appears to have more than 1,100 controls. Each control represents a business impact to identify, consider, implement, and iterate on.

Overall, we are left with a positive impression of the changes made in SP 800-53 rev 5. Beyond the significant content changes, the document is easier for security professionals to use. Controls now link to each other, and the document has become more compact and well-organized.

We understand the challenge organizations would have in attempting to respond to these changes without leveraging the expertise of 3rd parties who specialize in compliance, regulation, and governance frameworks. Most organizations will have no choice but to continue to rely on (or increase their reliance on) a blend of tools and professional service consultations to effectively adjust their security posture. This increased dependence on 3rd party tools and talent is not NIST' fault. The complexity of Rev 5, and similar guidance from other authorities, is a reflection of the increased complexity of the cybersecurity challenges all organizations face today.

 

 

John Snyder vCEO - Lumifi

Read more from John

https://www.netfriends.com/blog-authors/john-snyder

Detecting Zerologon - more than event 5829

 Zerologon basics

(more…)

Yet Another Ransomware That Can be Immediately Detected with Process Tracking on Workstations

By Randy Franklin Smith

As I write this, yet another ransomware attack is underway. This time it’s called Petya, and it again uses SMB to spread. But here’s the thing — it uses an EXE to get its work done. That’s important because there are countless ways to infect systems, with old ones being patched and new ones being discovered all the time. You definitely want to reduce your attack surface by disabling/uninstalling unneeded features.  Plus, you want to patch systems as soon as possible.

Those are preventive controls and they are irreplaceable in terms of defense in depth. But no layer of defense is ever a silver bullet. Patching and surface area management will never stop everything.

So, we need an effective detective control that tells us as soon as something like Petya gets past our frontline preventive layers of defense. The cool thing is that you can do that using nothing more than the Windows security log – or even better – Sysmon. Event ID 4688, activated by enabling Audit Process Creation for success, is a Security log event produced every time an EXE loads as a new process.

If we simply keep a running baseline of known EXE names and compare each 4688 against that list, BAM!, you’ll know as soon as something new, like Petya’s EXEs, run on your network. Of course you need to be collecting 4688s from your workstations, and your SIEM needs to be able to do this kind of constant learning whitelist analysis. You are going to get events when you install new software or patch old software, but only when new EXE names show up.

The only problem with using 4688 is it’s based on EXE name (including path). Bad guys can – but don’t usually bother to use replace known EXEs to stay below the radar. That would defeat the above scheme.  So what can you do? Implement Sysmon, which logs the hash of each EXE. Sysmon is a free element of Microsoft Sysinternals written by Mark Russonovich and friends. Sysmon event ID 1 (shown below) is logged the same time as 4688 (if you have both process creation auditing and Sysmon configured) but it also proves the hash of the EXE. So even if the attacker does replace a known EXE, the hash will difference, and your comparison against known hashes will fail – thus detecting a new EXE executing for the first time in your environment.

Log Name: Microsoft-Windows-Sysmon/Operational
Source: Microsoft-Windows-Sysmon
Date: 4/28/2017 3:08:22 PM
Event ID: 1
Task Category: Process Create (rule: ProcessCreate)
Level: Information
Keywords:
User: SYSTEM
Computer: rfsH.lab.local
Description:
Process Create:
UtcTime: 2017-04-28 22:08:22.025
ProcessGuid: {a23eae89-bd56-5903-0000-0010e9d95e00}
ProcessId: 6228
Image: C:Program Files (x86)GoogleChromeApplicationchrome.exe
CommandLine: “C:Program Files (x86)GoogleChromeApplicationchrome.exe” –type=utility –lang=en-US –no-sandbox –service-request-channel-token=F47498BBA884E523FA93E623C4569B94 –mojo-platform-channel-handle=3432 /prefetch:8
CurrentDirectory: C:Program Files (x86)GoogleChromeApplication58.0.3029.81
User: LABrsmith
LogonGuid: {a23eae89-b357-5903-0000-002005eb0700}
LogonId: 0x7EB05
TerminalSessionId: 1
IntegrityLevel: Medium
Hashes: SHA256=6055A20CF7EC81843310AD37700FF67B2CF8CDE3DCE68D54BA42934177C10B57
ParentProcessGuid: {a23eae89-bd28-5903-0000-00102f345d00}
ParentProcessId: 13220
ParentImage: C:Program Files (x86)GoogleChromeApplicationchrome.exe
ParentCommandLine: “C:Program Files (x86)GoogleChromeApplicationchrome.exe”

Tracking by hash will generate more false positives because anytime a known EXE is updated by the vendor, the first time the new version runs, a new hash will be generated and trip a new alarm or entry on your dashboard. But this tells you that patches are rolling out and confirms that your detection is working. And you are only notified the first time the EXE runs provided, you automatically add new hashes to your whitelist.

Whether you track new EXEs in your environment by name using the Security Log or by hash using Sysmon – do it!  New process tracking is one of those highly effective, reliable and long lived, strategic controls that will alert you against other attacks that rely on EXE still beyond the horizon.

Modern malware, including ransomware, copies itself with different names and hashes to various folders, so that if the original is identified and removed, the clones remain ready to attack at a later time. The Dormant Malware Hunter identifies hidden EXE and DLL files that have never executed, while exempting those found on a known safe files list. As a result, copies of malware can be removed from the network, preventing re-infection or propagation.

Phishing on the Rise During the Pandemic – Here' How to Fight It

Cybersecurity threats based on major disasters or world events are nothing new. During the coronavirus pandemic, one threat in particular has increased much more quickly than others: phishing for sensitive information in disguised emails. During March 2020 alone, phishing attacks were up 667 percent! Protecting your system from the malicious intrusion of phishing emails is critical, and Lumifi

wants to help. Read on to learn about how COVID-19 is changing the face of cybersecurity and how you can protect your business.

(more…)

Leveraging the Power of Exabeam

Organizations of all sizes are dealing with more data than ever before, and as Lumifi learns about increasingly complex attack vectors, it is worth noting that traditional SIEM may no longer fit the purpose of the modern security program.

Traditional SIEMs are based on correlation rules, with no machine learning and no behavioral monitoring. Security teams, and especially SOC Analysts, are under enormous pressure to protect an organization.

While Lumifi does have a reputation within the industry for generating meaningful value using traditional SIEMs, we invite you to see what we can do with even better tools!

Our Take

If you speak with the likes of Gartner, they will tell you that logging, UEBA, and SOAR are now the three key components of a modern-day SIEM.

Lumifi believes that logging is a commodity and that the value of SIEM is in automation and analytics. As such, Exabeam was the first Gartner MQ SIEM leader to disrupt the pricing model of this market.

They did this by launching their SIEM/UEBA/SOAR with a user-based pricing model, as opposed to the volume-based pricing models imposed by the large majority of the industry.

Since Exabeam introduced this model, some traditional SIEM vendors have been forced to respond by introducing their own user-pricing model.

Today, data lakes are popping up everywhere, and organizations need a SIEM that can pull data from many locations – SIEM differentiation will no longer be in the collection and storing of logs, but in the application layer.

In parallel, IoT and OT devices are raising the level of importance of Information Security. As well as monitoring users, laptops, and servers, security teams need to monitor everything IoT that accesses company data or can access company systems, including customers, partners, or vendors (supply chain).

What makes up a "modern SIEM"?

Lumifi’s unique approach as a transparent, integrated, and affordable service provider will ensure all organizations (no matter their size or industry) have a robust and flexible approach to their Security Program.

The Exabeam Security Management Platform is a modern SIEM that helps security teams work smarter. Organizations can take advantage of the big data architecture, advanced analytics, and automation capabilities. Exabeam delivery consists of three simple constructs: objects, insights, and actions.

And critically, not only will objects, insights, and actions be available within Exabeam’s platform, but they can also be shared with other applications in orchestrated responses.

The platform will include tools to allow Lumifi engineers to create custom content: parsers to ingest data, IR integrations, and even machine learning (ML) models to improve detection, and playbooks with near-limitless outputs.

Lumifi will have the ability to add additional applications to the Exabeam platform – playbooks executing on-demand vulnerability scanning or managing cloud security configurations, just to name two.

Exabeam and Lumifi can create custom application actions relevant to any organization’s security program needs.

Each application on the platform can share objects, insights, and actions with Exabeam, and with each other.

Of course, analysts will be able to source data from any repository, be it on-premises or in the cloud. And it is built with the needs of an organization’s future in mind: multi-region cloud, scale, automation, reporting, RBAC, HA/DR, archiving, and more.


Read Our Exabeam Data Sheet

View Now


Better Outcomes

This new platform will allow hybrid security operations teams to help reduce risk, time, and exposure:

AI & Machine Learning

Exabeam is a leader and visionary in the use of AI and machine learning in its platform, which enables Lumifi to better detect and respond to all cyber incidents.

Since its inception, Exabeam applied AI and ML to create various techniques to identify adversaries in the customers’ environment, looking at behavior amongst peer groups and organizational commonalities.

With AI and ML in Exabeam’s Advanced Analytics, the other Exabeam tools, Case Management and Incident Response yields, alert mitigation for analysts that would make their work more efficient by leveraging learned data models and new detection technique attacks spanning multiple MITRE TTPs.

Lastly, Exabeam’s strategy is to continue to invest in and foster innovations that would be incorporated into the platform to simplify workflows and provide excellent and automated visibility into customers’ technology environments. Below are some specific capabilities in Exabeam to consider:

ExambeamChart

 

Why Exabeam?

Cyberattacks continue to infiltrate companies at an alarming rate. In just one recent example, we saw Cognizant, a supplier hit by MAZE.

Cybercriminals steal valid credentials to impersonate legitimate users, span IT environments, and conduct malicious activities along the way. Exabeam and Lumifi can detect the subtle anomalies and correlate them across the complete attack chain, leveraging the existing log repositories to search and scan when detecting malicious behaviors.

Exabeam adds security intelligence to existing log management or data repositories to understand a complete picture of the user’s session, allowing the technology to detect and assemble the full attack chain.

The Exabeam User Behavior Intelligence solution uses a powerful combination of session assembly and Stateful User Tracking™, behavior analysis, and risk-scoring to automatically determine the likelihood of an attack and prioritize responses. Its revolutionary technology focuses on user behavior and minimizes the mundane steps in detecting cyberattacks.

Key Proposed Platform Components

Advanced Analytics

Exabeam Advanced Analytics (or UEBA) is the behavior analysis component of the offering in which Exabeam detects anomalies. Exabeam continuously maintains a baseline of normal behaviors for each user, entity, and each group (e.g., department) within the environment. New activities are then compared to the baseline and reported as anomalies if they are deemed inconsistent.

Exabeam analyzes discrete events to build user sessions from the time a user logs in until the user logs out or the session ends. Exabeam then compares the behavior of each new user session to all previous sessions.

Comparing an entire session’s behavior, as opposed to a single event, drastically reduces false positives and dramatically improves the accuracy of threat detection.

As hosts change IP addresses or users switch credentials, Exabeam is able to intelligently track these changes and attribute these activities to the correct user session.

Incident Responder and Case Management

The Exabeam Security Intelligence platform includes Exabeam Incident Responder (EIR), an incident response automation product. EIR includes a fully customizable incident response management system that can be used to track the status of incidents, gather artifacts and entities, assign ownership of the incident to analysts, and perform investigations.

All fields within this system are fully customizable, allowing security teams to create a response management system that matches their desired workflows and processes. EIR’s incident management system is context-aware, and the UI automatically displays different information to users based on the specific type of incident being viewed. For example, phishing incidents will show information about senders, recipients, and subject lines, whereas malware incidents would show fields related to hosts, malware names, attacker URLs, and so forth.

Ready to see how Exabeam can benefit your security program? The experts at Lumifi are here to answer your questions. Contact us!

Leveraging the Power of Exabeam

Organizations of all sizes are dealing with more data than ever before, and as Castra learns about increasingly complex attack vectors, it is worth noting that traditional SIEM may no longer fit the purpose of the modern security program.

(more…)

Ensuring the Cybersecurity of a Remote Workforce

As the COVID-19 pandemic continues to grip the globe, many companies are finding it necessary to transition from on-site to remote work – and experts warn this could be the new normal for the foreseeable future. Is your company ready to make the switch securely? Lumifi has some tips on making the transition with cybersecurity in mind.

(more…)

FBI Warns ICS Cybersecurity Under Attack by Kwampirs

The ICS sector is under attack.

According to the Federal Bureau of Investigation (FBI), a new security threat is on the horizon for those in the Industrial Control System (ICS) sector. While the Kwampirs remote access Trojan (or RAT) is not new, it is now targeting ICS companies and especially the energy sector. The FBI alert urges companies to take action against this dangerous malware, and Lumifi is here to help.

(more…)

5 Ways to Protect Your Business' Data During Tax Season

If you're an accountant or tax professional, you know that tax season is also scam season and that you're a prime target.

Cybercriminals are using new, sophisticated scams that can compromise your website or infiltrate your systems with remote desktop software. These join the more traditional email-based attacks that trick you into installing malware that steals your credentials or takes charge of your systems. There are, however, precautionary measures you can take to protect your business and clients during this important time.

(more…)

The Four Pillars of Network Security

Every organization works hard to attain a healthy security posture.

But what does that mean? It involves a properly resourced team of network security experts working to leverage the latest information security tools. The job of the security team is to prevent attacks before they happen, protect the organization in the case of an attack, detect attacks that would otherwise go unnoticed, and respond accordingly.

(more…)

Beginners Guide to IDS, IPS & UTM

There is often a lingering and general confusion over the acronyms IDS and IPS, and how they are like or unlike UTM software modules. Everyone likes primers and simple descriptive definitions; so let's take a look at IDS, IPS, and UTM through that lens.

IDS
An Intrusion Detection Sensor (IDS) is a tool that most obviously detects things, but what things? Ultimately it could be anything, but thankfully most vendors include a large array of 'signatures' and or methods for detecting stuff. What do I want to detect? For each network, this answer will vary, though generally, it is looking for unusual traffic. What's unusual? In the simplest terms, it's traffic you don't want on your network, whether that is policy/misuse (IM, games, etc.) or the latest malware.

Just as they say in real estate: its location, location, location. Not the location in the rack, but the segment of your network the IDS will monitor. Monitoring traffic at the ingress/egress point will show you what comes and goes (after the firewall policy approves of course), but may not allow you to see remote offices connecting to core components.

One thing you don't want to do is inspect traffic on the public side of the firewall. Monitoring all of the traffic on an internal switch, like your LAN or a DMZ, will allow the IDS to monitor user activity or key servers, but it won't see things happening on other parts of the network. Unless you have unlimited resources, you may not be able to monitor everything on the network, so a key decision will be which traffic matters the most and which segment provides the best vantage point.

IDS_inspect & Unified Threat Management (UTM)

IDS can passively monitor more than one segment and can monitor traffic that an IPS or UTM would never see, such as the traffic staying entirely within a LAN or DMZ. An IDS, therefore, could alert on a desktop machine attacking other desktop machines on the LAN, something the IPS or UTM would miss due to being inline.

IPS
An IPS (Intrusion Prevention Sensor) is an IDS in most regards, save for the fact it can take action inline on current traffic. This sounds amazing right?...well almost. IPS and UTM, by their nature, must be inline and therefore can only see traffic entering and leaving an area. A huge concern is that an IPS can prevent business legitimate or revenue-generating traffic from occurring (an IPS, remember, can alter traffic flow). IPS actions include drop, reset, shun, or custom-scripted actions and all of this occurs immediately upon signature match. This potentially negative action makes the person responsible for security now responsible for loss in revenue should the IPS drop legitimate traffic. In my experience, IPS devices make great tools as long as you also leverage the key components that differentiate the IPS.

IPS_Reject_traffic

Make sure your IPS devices are capable of "failing open"; this means if any part of the application fails or even the chassis fails (power loss anyone?) the unit continues to pass traffic. No one wants a brick impeding the flow of data.

Also realize that only a small portion of the signatures that fire should actually be allowed to take action on traffic. To help reduce false positive rates, one should have very well defined home net or protected ranges allowing direction oriented signatures to be more effective. You will also need to spend quite a bit of time reviewing alarm and event output to ensure the signatures allowed to take action are working as intended. You can expect to spend more time upfront and more time at each signature update looking at which signatures the vendor has chosen to take action and considering how that can impact your traffic. This often works best in settings where firewalls are not very favorably looked upon between "open" network segments.

Software Based Modules in UTM Devices
This brings us to software-based modules in Unified Threat Management (UTM) devices. Key items to point out about these devices happen to be drawbacks, though this does not reduce their efficacy. Obviously, they can only be located where the UTM itself is located. Typically this is a junction point like your Internet gateway or an access control point between your LAN and DMZ. In this case, a UTM would not be able to see all of the system-to-system traffic on the DMZ or LAN, rather only traffic coming and going from that segment.

egress_drop

In addition, UTMs are not purpose-built platforms, thus tending to have higher false-positive rates (though this is getting better). In the case of high CPU or memory utilization, they will turn off software modules to preserve the primary function of the device, as a firewall. This is an important point related to not being a purpose-built platform and helps justify requests for dedicated devices. If all you have is a device like this, we say go for it! It is much better to have visibility in traffic coming and going from your network than to not have any IDS at all. Ask your vendor to validate that they logically inspect traffic after the firewall policy and make sure to notify yourself immediately should your device move in to conserve mode or consistently seeing high resource utilization.

UTM_flow

So, in Summary, Comparing IDS, IPS, and UTM
None of the three are "set it and forget it" devices. New malware and vectors for exploit and detection emerge daily. Regardless of your choice, you will have often recurring maintenance in signature event/alarm output and a need to update and manage your policies, especially in the case of IPS. Updates can be automatically applied in any of the devices discussed, but that does not absolve the need for human review. Set aside some time daily to check in on your device and consider turning off groups of signatures that have no role in your environment (think "policy-based") and tuning out other noise granularly.

Hopefully, all the cautionary statements penned here don't scare you off. Getting traffic inspection in your environment is a great way to get visibility into traffic on your network.

(more…)

Why Set-and-Forget SIEM Deployments Often Fail

(Updated April 2022)

There are many ways to optimize and automate your SIEM workflow, but you can't replace the human element. 

(more…)

Network segmentation

Network segmentation is the practice of dividing a formerly 'flat' network [where every device can contact every other device] into a series of segments that have restricted communication between them.

What's this mean in real terms, though? And why would you want it - and is it useful outside of making PCI compliance easier?

In real terms, this means that you will end up working with your network hardware to create a set of 'zones' or enclaves, populated with a given group of assets. Then, you'll put some kind of barrier between each of these zones - either by assigning each of them to a VLAN and restricting routes between VLANs, or setting up a firewall to partition off various subnets and restrict communications - or a combination of the two.

As an example, consider a small sandwich shop that accepts credit cards. It has some POS terminals at the registers, a back office for management, and offers wifi for the customers.

In this case, you would want a segment for guest wifi - a separate VLAN that only routes out to the internet - to keep guest devices outside of the card processing environment. Similarly, you would want a segment for the POS terminals that can route to the network gateway - for credit card authorization - and for traffic from the registers to the management network - so that management can keep track of inventory sold.

By restricting the kinds of communication that are possible to the kinds that are specifically allowed, you've made your network more secure - the disallowed kinds of communication are either not possible, or require changing the setup in a way that would be very obvious to the SIEM.

Likewise, if you restrict the kind of traffic that can transit between zones to the minimum necessary traffic, any attempts by an attacker who has managed to infiltrate one segment to attack other resources will be restricted, or possibly prevented - and activities taken by the attacker to discern the kinds of assets on the network will be much more obvious.

A side effect of segmentation is that in some instances network performance may be improved. Several different protocols - like NetBIOS - generate broadcast traffic; if this traffic is forbidden from crossing segment boundaries into areas where it is not needed, then the overall amount of traffic on the network can be reduced. With modern networks this is usually not a significant concern, but it can be mildly beneficial in some instances.

Network segmentation also has benefits for compliance - in many cases, if the kinds of traffic that need compliance certification are isolated on a specific segment, that restricts the scope of the audits required to maintain certification to that specific segment. Smaller scopes are easier to audit, and it is easier to prove compliant configurations - you won't need to account for every single asset.

Segmentation is a very worthwhile means of adding to the security posture of your network. Talk to us here at Lumifi about whether your organization would benefit from this kind of defense in depth, and how it can be integrated into your existing security posture; we'd be happy to help.