Skip to content

ESET uncovers EmissarySoldier: LuckyMouse APT group compromised government networks and private companies (telco, media and banks) in Central Asia and the Middle East

The research featured in ESET’s industry report on government works in concert with perspectives from the European Commission, CERN and Europol presented at the ESET European Cybersecurity Day virtual conference on April 28.

BRATISLAVA – The European Union’s cybersecurity strategy, and that of all governments globally, has been challenged not only in its move to “digital by default,” but also by the COVID-19 pandemic, the mass movement to working from home, and threats such as cyberespionage, ransomware and supply-chain attacks. Above all, the most formidable challenge, and foe, shared by all governments is advanced persistent threat (APT) groups.

APT groups leveraging evolved tools
The ESET industry report on government examines the threatscape APT actors are erecting, and underlines its complex nature with an exclusive look at EmissarySoldier, a malicious campaign brought to bear by the LuckyMouse APT group using its SysUpdate toolkit to compromise machines, some of which were running the popular application Microsoft SharePoint.

This dive into LuckyMouse examines its relatively unknown SysUpdate toolkit – the first samples of which were discovered in 2018. Since then, the toolkit has seen various development stages. LuckyMouse’s current modus operandi is to install its implants via a so-called trident model that uses three components: a legitimate application vulnerable to DLL hijacking, a custom DLL that loads the payload and a raw Shikata Ga Nai-encoded binary payload.

Overview of the trident model

Since SysUpdate’s modular architecture enables its operators to limit exposure of malicious artifacts at will, ESET researchers did not retrieve any malicious modules and expect this to be an ongoing challenge in future analyses. Regardless, LuckyMouse increased its activity in 2020, seemingly going through a retooling process where various features were being incrementally integrated into SysUpdate’s toolset.

The evolution of tools leveraged by APT groups like LuckyMouse is of key concern as governments are vested with the responsibility to ensure stability for citizens, the business environment and engagement with other nation-states. These tasks of governance are under threat as LuckyMouse and other APT groups, including state actors and their collaborators, home in on widespread collaboration platforms like Microsoft SharePoint and digital by default service provision.

Government in focus
The years 2020 and 2021 have seen several ESET research collaborations come to maturity, including engagements with the likes of the European Organization for Nuclear Research (CERN, Europol, and the French National Cybersecurity Agency (ANSSI). Many of their perspectives, shared at the virtual event and in the report, stress that governments and their IT infrastructure exist as default targets.

The report highlights the need for technologists to continue supporting governments in closing security gaps and monitoring the tactics, techniques and procedures of APT groups via the various endpoint detection and response technologies at their disposal. To download the report, visit WeLiveSecurity.com and make sure to follow ESET Research on Twitter.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Pharmaceuticals Like Johnson & Johnson Are Experiencing Daily Cyber Attacks From Nation State Attackers

As each day passes, so does the increasing amount of security risks with the cybersecurity attack vector. Every organization can easily fall victim to another cyber threat, but recently, the pharmaceutical industry has become a prime target.

The increasing number of attacks on pharmaceutical organizations is due to the ongoing COVID-19 vaccine development and distribution and this has resulted in the pharmaceutical sector becoming the most attractive industry for cybercriminals. A successful vaccine has become one of the most valuable intellectual properties for cyber attackers. Beyond attacking the pharmaceutical formula, its data on testing the drug trials have become a tempting target for nation-state attackers

A recent example of pharmaceutical companies being attacked is when the Wall Street Journal reported that North Korean state attackers have targeted pharmaceutical companies in the U.S., including Johnson & Johnson. This sparked the Chief Information Security Officer at Johnson & Johnson to say in an interview that they are experiencing attacks from nation-state threat actors “every single minute of every single day.”

This tale isn’t new as in late 2010 North Korean threat actors reportedly targeted UK-based vaccine maker AstraZeneca whose vaccine was co-developed with the University of Oxford. The attack method was spear phishing via social media intending to inject malware by way of offering AstraZeneca employees fake job offers.

The attack surface of pharmaceutical organizations will only continue to grow and the need for better cybersecurity will become more of a priority as more pharma companies will fall victim which could result in disastrous consequences.

Pharma A Prime Cyber Attack Target

The pharma industry is no stranger to being targeted by attackers. Pharmaceutical companies suffer more breaches than any other industry as a result of malicious activity with an average breach resulting in a loss of over 5 million dollars according to the 2020 Cost of a Data Breach Report. Nation-state attackers are induced to target pharmaceutical firms for financial profit, which was one of the main goals for the cybercriminal group who launched the reportedly North Korean government-sponsored attacks.

Cyber espionage is now being recognized as another influential reason for state-sponsored attackers attempting to gain technological advantage for their countries’ economies. The pharmaceutical industry’s key components are based on innovation with comprehensive R&D investments, intellectual property, and patented data. Anytime any data or property is affected or exploited by an attack it can result in devastating losses which can erode patient and consumer trust.

The 2019 attack on German drug conglomerate Bayer is an example of cyber espionage by a state-sponsored attack. Bayer fell victim to a cyberattack from the Chinese threat actor group known as Wicked Panda. The attackers used the Winnti malware, which makes it possible to access a system remotely and then pursue further exploits once in the system.

Pharmaceutical Intellectual Property Attacker’s Favorite Target

Sensitive information and data are not the only attractive targets of pharma companies that hackers are looking to exploit and gain access to. Nation-state hackers have their eyes on a different prize, intellectual property. Protecting intellectual property has always been a priority for the pharmaceutical industry.

Pharmaceutical products are typically only protected by patent for seven years in the United States, and this data could help foreign generic drug manufacturers to be more ready for the expiration of the patent. For example, Chinese nation-state hackers are targeting US pharmaceutical companies to gather information and share it with Chinese companies to offer an advantage against their western competitors.

The years of research and development into developing new pharmaceuticals have attracted hackers to exploit intellectual property somewhat enticing. Recent attacks have targeted intellectual property such as information related to the development of a vaccine or other medical mitigation measures.

Another risk that many pharmaceutical companies experience is that the technology used in their manufacturing systems is much older than the internet, which results in systems being extremely insecure. They were originally designed as ‘air-gapped’, or isolated systems and not built to confront any cybersecurity attacks. For pharmaceutical companies, any size attack by an adversary can result in loss of productivity and availability of physical devices. This can lead to safety issues, reputation, financial losses, and even death.

To fight off different attacks, and the possible exploitation of vulnerabilities, organizations and more specifically enterprises need to address the need to secure the crucial intellectual property while understanding which devices and technologies are at risk. This starts with increasing awareness of nation-state attacks and adopting a more proactive approach to cybersecurity.

What Pharmaceutical Firms Can Do

Pharmaceutical firms need to allocate the right amount of attention and resources to understand what they can do to protect the company’s data and system. The first step is understanding the different risks that come with pharmaceutical manufacturers and systems and what steps are needed to ensure better security.

With the increased attention and awareness of state-sponsored attacks over the past few years, pharmaceutical companies now are understanding the importance of implementing the right security practices when it comes to securing their IT and OT systems. As pharmaceutical manufacturers move forward digitally and continue to modernize their processes with more robotics and IoT technologies, this creates new entry points for attackers to exploit and move laterally within an organization’s system and servers.

In the past, most manufacturers were using stand-alone systems, but with the advancement of technology, they are increasing their connections to the internet to allow third-party contractors and vendors to gain access to work with their equipment. This has forced the security teams at pharmaceutical companies to change their approach to securing their product.

While not every pharmaceutical company has changed its security approach, there has been a massive increase in awareness which has led to changes in the industry. Some companies, like Taro and Rafa, have taken a more proactive approach when securing their connected OT environments with a passive network monitoring solution, specifically designed for OT environments. This has allowed them to have full visibility into their network, reduce the risk of operational downtime, improve their network security and comply with demanding industry regulations.

As pharmaceutical organizations continue to be on the radar for cyberattacks, now is the time to take action and detect and mitigate any risks. Having the right approach and strategy in place with the right blend of awareness and technology, pharmaceutical organizations can now implement the right approach to securing their data, servers, and intellectual property against cyber attacks.


How SCADAfence Discovered Targeted Ransomware In A Pharmaceutical Facility

SCADAfence’s Incident Response team recently assisted a big pharmaceutical company with an industrial cybersecurity emergency. This research has been published with the goal of assist organizations to plan for such events and reduce the impact of targeted industrial ransomware in their networks.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

How are businesses of different sizes using FinTech solutions?

For the purposes of this blog, we have categorized small businesses as comprised of 2-49 people, medium as comprised of 50-499 and large as comprised of 500+.

Small and medium-sized enterprises (SMEs) have long been underserved by traditional financial providers. Yet, over the past few years, we have seen new FinTech offerings come to the marketplace designed specifically for small-scale operations. FinTech is no longer a choice restricted to the big corporations. We have seen innovative ways to make payments, manage money and get financing for businesses of all sizes.

Indeed, FinTech companies are broadening their offerings by designing solutions for small businesses. In return, small businesses are actively investing in new technologies, with 42%, in a recent ESET survey, aiming for better security of their finances. While this may not be quite as high as medium (80%) and large enterprises (81%), it seems that COVID-19 has acted as a catalyst, with the survey also finding that 62% of small businesses believe the pandemic has increased the need for improved security of finances.

The benefits for businesses investing in FinTech include reduction of costs, ease of use and lower barriers to entry. However, as the size of an organization naturally correlates with the budget available to spend on new technologies, here, we take a look at how different-sized enterprises have chosen to prioritize their use of FinTech solutions.

Online payments and accounting take the lead
It is perhaps no surprise that accounting functions like online payments and invoices showed the highest adoption rate for businesses of all sizes. From a list of various FinTech solutions, online payments was the most widely adopted by small (46%), medium (58%) and large (59%) businesses alike. This was closely followed by online accounting (small 41%, medium 57% and large 53%), online invoice financing and discounting (small 31%, medium 49% and large 47%), and online cashflow management (small 28%, medium 48% and large 45%).

Clearly, digital accounting has become a significant tool for small businesses, due to the benefits of streamlined systems, increased speed and productivity, and improved data security. Contrary to the notion that it is unnecessary for SMEs to digitalize due to their small scale, SMEs stand to benefit massively from adopting digital technologies to increase productivity, as well as to secure data and financial processes during recovery from the pandemic.

Big fish go for forward-thinking technologies
Where we see the medium and larger organizations storming ahead with their focus and investment is in the more forward-thinking FinTech solutions. So, while small businesses are dipping their toes in digitizing their accounting functions, medium and large businesses are further ahead in their use of branchless banks, online lending, InsurTech and RegTech.

Of these four forward-thinking technologies, InsurTech was the most adopted by medium (40%) and large (36%) businesses. According to a report by Deloitte, the pandemic shifted priorities toward increased investment in InsurTech because of the technology’s promise of “bolstering virtual customer engagement and operational efficiency.” The report states that “the amount of money invested in InsurTechs during the first half of 2020 remained remarkably robust, at nearly $2.2 billion.”

The COVID-19 pandemic has shifted the focus of all businesses, with many prioritizing plans to reduce costs, increase productivity and secure finances. FinTech solutions can offer a helping hand; it’s reassuring to see that some small businesses are benefiting as well.

For more information on how ESET can help businesses, head to our business solutions page

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Violence and Redemption: SNMP Protocol History

You know what it is, but do you know SNMP protocol history?

There was a dark time, more than dark, sepia or beige, in short, that tone in which we find the photos of our grandparents inside the drawer of the oldest and worst decorated closet in our house. A time that is hardly talked about anymore, but that points us as a weapon so that we continue to keep it in our memories. Those were the times of bank robbers and speakers, old rolls, borsalino hats and cameras with lightbulbs, they smoked more, the police were still called “coppers” and toothpaste brands had not yet produced any flavored toothpaste, not even menthol. We go back that far to get to know more about SNMP protocol history.

In this house, Pandora FMS blog, we had already talked before about the relation of the SNMP protocol with the noir part of life. It was hard, few reported that case, but we got to the media, and they, from Newcastle Tribuna to the smallest local newspaper, have endlessly asked us to come back and delve into the subject. That is why we want to make a little review of SNMP protocol history, a story full of caramel nuances and fish bones, swimming pools on the outskirts and tombs in the desert, long and slender legs and hard knuckles like the piles of prelates or pontiffs.

Naaah, in fact, if we want to find out SNMP protocol history and its evolution throughout the years, we just have to go back a couple of decades, no more. In 1988, we started having some news for the first time about this famous protocol. The 80s, pal, a very hard time too, we don’t want to take away any of its prominence. Leg heaters, carded hair and Mustangs ruled. It was around this time that what we know as the first data networks began their journey. More and more “cooler” and more and more widespread around the world.

At that time, with an administrator it was enough for an “analog” or manual way to understand a whole network infrastructure of a company. You can guess the kind of network infrastructure that could exist in a company at that time… It was made up of scarce resources or equipment because the immeasurable variety of services that are provided today did not exist, nor users, nor anything similar.

It was not until more or less the arrival of the 2000s, time of Nokias with poly tones, the return of the bell bottoms and the consolidation of Britney Spears at the highest levels of the music scene charts, that computers, Big Daddy (Internet) and the rest of the technology reached the necessary parameters to accommodate things as far ahead of their time as the SNMP protocol.

The range of services and possibilities was that expanded thanks to convergent networks that we were finally able to handle all kinds of information and data, including voice and video. Infrastructures were expanded by force, and users began to flock like flies to honey. A failure in the system could no longer be accepted. The stakes were high.

That was the time for the proliferation of monitoring systems, yes, like Pandora FMS, owner and master of this blog and my skin. They were shown as essential gadgets for the tasks of technology departments of any company that wanted to stay safe from possible incidents and even anticipate them by detecting them in advance. Monitoring systems, servers, applications, networks, events and a long list of devices. Collecting information, just what we wanted to monitor, all to collect it and represent it visually, in order to carry out the necessary actions that our systems might require. What a monitoring progress!

Like coffee, a morning shower and the geek figures in the office, it is impossible to remove monitoring systems from the daily lives of network administrators, and most of these systems are based on the Simple Network Management Protocol, also known on the streets as the SNMP Protocol, which makes the exchange of management information between network devices easier and fills our lives with hope and management data.

And this is the thick and outrageous SNMP Protocol history. in fact, it has stayed with us for many years. From that first version to SNMPv3, so focused on security and administration… And for many years more old friend! I personally hope you see my grandchildren grow old and I see you get implemented in a crass, ineluctable and ad infinitum way!

Some of the sources used for this article:

https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol

https://coreun.com/2020/07/08/la-monitorizacion-protocolo-snmp-y-su-evolucio

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Find out which virtual attacks are most common in companies and how to avoid them

We know that the protection and security of business activities and processes are of paramount importance for a company. This is because, in addition to cyber invasions being vastly frequent in the virtual space, they also offer several problems for a company, especially in the case of data leaks – whose action is intolerable by LGPD rules, for example.

For this reason, we understand that virtual attacks are actions provoked by cybercriminals, who seek to steal business and customer data in order to use them for illicit purposes. Therefore, it is important to know how to prevent cyberattacks and how to better protect our systems from cybercriminals.

Do you want to learn more about it? So, keep reading our post and get all your questions answered.

What are the consequences of cyberattacks for companies?

As we all know, the importance of knowing how to prevent virtual attacks in a company is crucial, as we are not only dealing with sensitive internal data, but also with our customers’ data.

Thus, we can predict some negative consequences for an organization as a result of the virtual attacks. Take a look at them:

  1. Unstable systems

In general, one of the issues that we need to take into account as a consequence of virtual attacks is the instability in the entire infrastructure of the company. In other words, this can mean weaker and slower systems, causing processes and activities to be interrupted so that the repair actions themselves can be initiated.

This process complicates the routine of work activities, disfavoring the quality and deadline for products and services to its end customers.

  1. Reduction of customers

As a result of a completely inefficient system, we ended up noticing the loss of customers in the medium term. Customers dissatisfied with products and services offered by a company tend to cancel contracts immediately, generating even more losses for the organization.

That’s because employee and customer data can be exposed, which tarnishes the brand’s reputation and makes it less competitive.

  1. Increasing costs

If computational and technological issues turn out to be frequent, repair and maintenance costs will also be higher.

This is because criminal attacks – when carried out efficiently – generate continuous losses, leading to the contracting of outsourced personnel for performing preventive maintenance and monitoring, in addition to the purchase of new equipment, software, and other items to stabilize internal systems.

The 4 most common virtual attacks on companies

Now that you know the concept and consequences of cyberattacks, check out the ones that occur most often in the business environment:

  1. Phishing

In general, phishing is extremely well-known for being basically a strategy to clone pages, websites, messages, among others. The criminal who uses this practice seeks to win customers by having them send personal data, thinking that they are getting involved with reliable companies.

A practical example of this type of virtual attack is when we regularly see some internet pages – be it from banks, streaming services, e-mail providers – asking for personal data in exchange for benefits and advantages.

  1. Ransomware

When dealing with virtual attacks, one of the most feared is, certainly, ransomware. In case you do not know, this type of attack is nothing more than an intelligent way to hijack sensitive data and information, asking for their release.

In practical terms, it can all start with malicious advertising, a social media trigger, or even a fake message.

After a certain employee of the company downloads a file with ransomware, the malware already begins to work on the computer system.

As soon as it is installed, the ransomware encrypts data and allows criminals to enter the company’s virtual systems and start browsing folders and documents, looking for personal information, data and bank accounts, strategies, among others.

When this occurs, the related processes for preventing virtual attacks become much more difficult.

  1. Spear Phishing

Spear Phishing is nothing more than another type of Phishing, however, it is focused on specific companies and employees who work in the virtual environment.

Thus, we consider that it is an invasion segmented by the criminals themselves, having techniques, devices, and tools of social engineering to elaborate deceptive schemes and share them as a completely harmless email, website, process, or even a downloadable file.

  1. DDoS

Currently, DDoS is considered one of the most powerful virtual attacks. This is because it is simply a “mix of actions” that are directed exclusively to the companies’ servers. In practice, it is totally controlled through a master computer, which in this case, would be the criminal behind the action.

With this, it works as if it were a type of system completely secure for the victims, and from there, it offers space for hackers and cybercriminals to exploit vulnerabilities to invade the virtual environment of companies.

Thus, one of the symptoms that the system itself can show is its poor performance.

How to avoid virtual attacks?

After understanding the seriousness of virtual invasions, we can now think of efficient ways to protect ourselves from these possible attacks:

  1. Using strong passwords

One of the first tips is to have the responsibility and awareness to create increasingly strong passwords, and preferably they should be different between each account. This makes access by cybercriminals much more difficult, since complex passwords end up not being deductible.

The greater the importance of a given systemic process, the more complex the password must be. Examples: bigger passwords for banking processes and applications, less complex passwords for internet login, among others.

  1. Using a good antivirus

There are several efficient antiviruses on the virtual market. So, search for the one that best fits your needs, taking advantage of all its benefits and ensuring that it understands all the fields of protection your business needs.

  1. Relying on specialized security companies

If your company does not know where to start or does not have a more complete idea of the security processes its working activities must have, it can be crucial to have the support of a company specialized in this subject. Therefore, look for a trustworthy brand, which has experience in the subject and an excellent reputation in the market.

In addition to your virtual information being under the care of highly trained specialists, you will have even more time to focus on more important business activities.

Conclusion

As we have seen, virtual attacks are extremely frequent and must be a factor to be taken into account by companies that wish to obtain excellence and quality in the market.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Understanding Microsoft Exchange Server vulnerabilities

Anyone who works with technology has certainly heard of or uses Microsoft Exchange, Microsoft’s server solution for email and calendar. Exchange is used worldwide by companies of all sizes, being preferred for its versatility and ease of use, and billions of electronic messages pass through it daily. However, even with all these advantages, Exchange is not free of flaws.

At the beginning of March this year, the giant creator of Windows released emergency patches for zero-day vulnerabilities that were discovered and were being exploited by malicious attackers to install malicious software through Exchange. Also called ProxyLogon, these vulnerabilities allowed improper access to e-mail accounts and data extraction, in addition to lateral movement in the infrastructure, affecting other critical devices.

The four Exchange Server vulnerabilities discovered were as follows:

  • CVE-2021-26855: CVSS 9.1: it is an SSRF (Server-side Request Spoofing) vulnerability, which results in HTTP requests being created by unauthenticated attackers. For this flaw to be exploited, servers must be able to accept untrusted connections over port 443.
  • CVE-2021-26857: CVSS 7.8: a failure in the Exchange’s Unified Messaging Service, allowing arbitrary codes to be implemented in the server’s SYSTEM. Nevertheless, this vulnerability must be combined with others or the attacker must have stolen credentials.
  • CVE-2021-26858: CVSS 7.8 and CVE-2021-27065: CVSS 7.8: Post-authentication arbitrary file write vulnerabilities in file paths.

These vulnerabilities are being exploited by a group called HAFNIUM, which operated in China and was supported by the Beijing government, and is primarily targeting organizations located in the United States. However, it is estimated that at least 10 other hacking groups are exploiting these same Exchange’s vulnerabilities in the form of ransomware or cryptoware. It is not yet known how the groups discovered the vulnerability and how the information reached the other hacker groups.

Also, automated attack scripts used in proof-of-concept have been found, which makes it possible for unknowing attackers to exploit vulnerabilities and further compromise servers around the world.

The malware developed by these groups allows the creation of a pre-authentication Remote Code Execution (RCE), which allows attackers to take full control of the servers without access to any Exchange credentials. One of the main malware created to exploit these flaws is the DoejoCrypt or DearCry ransomware.

DearCry uses a combination of AES-256 and RSA-2048 encryptions, renaming files with the .CRYPT extension, and includes a readme.txt file with instructions on how the victim can recover their original files.

If the victim has a backup of the files, one action would be to ignore the ransom requests and recover the environment. There are already records of ransom requests accounting for tens of thousands of dollars. However, even if there is no ransom payment and the files are recovered, there is a possibility that copies of the infected files are made by the ransomware, which can result in data leaks by malicious attackers.

At least 30,000 organizations of all types and sizes in the United States alone are believed to have fallen victim to campaigns orchestrated by HAFNIUM and other hacker groups based on flaws discovered by Microsoft. The total number of companies affected can reach hundreds of thousands worldwide though, as many of them are unaware that they may have been impacted by the vulnerabilities.

To try to protect Exchange users, Microsoft has launched an automated vulnerability remediation tool in March. The tool, developed mainly for customers who do not have specific security teams, allowed for a reduction in the risks associated with the exploitation of vulnerabilities while the patches were not properly applied. Microsoft has estimated that 92% of organizations applied security fixes related to the ProxyLogon vulnerabilities by the end of March/2021.

This type of attack further reinforces the need for companies to invest in specific cybersecurity teams, such as red teams, to test security controls, look for flaws and vulnerabilities, and correct them accordingly, causing the least possible impact. By structuring these teams, it is possible to ensure the proper management of assets, including e-mail servers, in addition to their respective owners. Thus, it is possible to guarantee that updates and fixes are installed as soon as they are released by the providers. The result is a reduction in the attack surface and a lower risk of cyberattacks, which can avoid millionaire sanctions provided for by data protection laws, such as LGPD and GDPR, in addition to permanent data loss, which can affect business continuity directly.

If your security team has not installed security patches yet, they must do so as soon as possible. Remember that installing updates may not ensure that your Exchange servers will not be affected by the exploitation of other zero-day vulnerabilities. Therefore, a scan of the infrastructure is recommended to find out if the environment has been affected by the exploitation of other flaws not yet discovered by the manufacturers; and if discovered, security teams should use efforts to identify and respond to any detected security incidents. This can make the difference between a minimum correction effort without major losses and loss of revenue and trust of customers, partners, and employees.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Earth Day: Recognizing the impact of tech on the environment

Every year since its inception in 1970, Earth Day has been celebrated on April 22 with a clear mission: to educate about the environment.

Society has changed dramatically in the past year, let alone in the 51 years since Earth Day began. One huge aspect of this transformation is the increase in technology use. In 1970, for example, there were no mass-produced mobile phones, whereas in 2021, an estimated 3.8 billion people now have a smartphone.

In terms of environmental damage, some is easy to see: landfills chock-full of single-use plastics, factories pumping out volumes of emissions, and inordinately huge areas of deforestation. However, significant harm is also caused by less obvious sources, including the habits we undertake every day with our technology. The harmful impacts of technology on the environment can result from issues such as planned obsolescence by design, unrepairable devices, and energy use – whether that of individuals or of data centers.

It’s easy to forget about the natural world when we go online – the internet and the environment can seem worlds apart – but to tackle the issues affecting the earth’s environment negatively, we must recognize the role of technology.

There is no one figure to sum up the impact of digital technologies on the environment, but estimates suggest that the technology sector represents at least 1.4% of global greenhouse gas emissions, and could potentially be as high as 5.9%. A significant contributor is data centers. While saving files to the cloud may seem like an innocuous activity, this isn’t a magic disappearing act – the information is stored in data centers, which currently account for around 2% of total global electricity consumption. (Some of the methods of reducing the impact of data centers may surprise you; for example, some are now being built underwater to reduce the cost of cooling them.)

The impact of physical structures is not the only environmental cost of technology. Software also plays an important role, for better or worse. When your device runs slowly, it is annoying – you’re trying to get things done and we have become used to instant responses. Beyond the personal, programs that slow down technology or have a high system impact contribute to environmental damage in multiple ways. Devices require more energy to run when software is slowing them down, meaning shorter charge cycles and greater electricity usage. Additionally, the “replace, not repair” mentality leads many people to dispose of slow devices, which often end up in a landfill.

While it may seem like all bad news, this is certainly not true. Software with low system impact helps devices run quickly, reduces energy usage, and minimizes environmental damage. New technological advancements such as solar glass and the use of environmental sensors can benefit the environment. The presence of technology in our lives is not going away anytime soon, nor should it, but we can pay attention to improving existing tools and minimizing harmful impacts.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Everything you need to know about Office 365 Monitoring

Do you know everything about Office 365 Monitoring?

Microsoft Office 365 Monitoring (Known as Office 365)

Pandora FMS is a proactive, advanced and flexible monitoring tool which is also easy-to-configure according to each business and their needs. It can be integrated into all the needs of servers, network computers and terminals. Besides, in a world where the cloud has taken more prominence, it can also monitor its services or computers.

In this article, we will focus on Office 365 monitoring from Pandora FMS using the module available in the Enterprise library.

https://pandorafms.com/library/pandora-office-365-monitoring/

What is Office 365?

Microsoft 365, also known as Office 365, is the tool conceived by the giant Microsoft that allows you to create, access and share documents online with different users in Word, Excel, PowerPoint and OneNote, among others. To that end, you only need to have access to the Internet and have OneDrive of course.

Microsoft 365 offers different packages, depending on the size of your company or the number of users who will make use of these services. In addition, users may choose between three types of packages: for private use, for businesses or for students or teachers. Each one has its own features (number of users, integrated programs, space…) and it is offered at different prices accordingly.

Microsoft 365 Health

Microsoft 365 provides a page to see the health of cloud services. You may take a look at the following url:

https://status.office365.com

Office-365-monitoring

You may observe the health status of the services in Microsoft 365

Office-365-monitoring

What we can see is that, on demand, we can find out in what state the services are, but by having Pandora FMS, we will be able to improve this overview and also have all of this information and generate alerts about the services that may be essential for the daily work or tasks of our company.

Microsoft 365 in Pandora FMS

In order to carry out Office 365 monitoring, what we need is to be able to see the services in our Pandora FMS WEB console, as exemplified in the following image:

Office-365-monitoring

To get that result, we are going to use the Enterprise library module . But first, let’s take a look at the requirements you need to meet to achieve our goal:

  • In Pandora FMS Environment: The plugin server must be enabled, Python 3.8.
  • In Microsoft 365: Read permissions are required for the o365 API.

Office-365-monitoring

  • Know the following Authentication data: TenantID, ClientID, Secret

The plugin is designed to run as a server plugin but can be run on an agent using module_plugin with no issues at all.

Script Running

So that you can notice, very simply, how the script is executed, we are going to see an example of that, where we will execute its binary version with the following command:

pandora_o365 -c xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx -t xxxxxxxx-xxxxx-xxxx-xxxxx-xxxxxxxxx -s xxxxxxxxxxxxxx~xxxxxxxxxx~xx~xxxxx

Office-365-monitoring

When executing the script, if the ClientIT, TenantID and Secret values are correct, we will get the following response:

Office-365-monitoring

Finding out the status of the services from Pandora FMS

We already have Microsoft 365 service agents, to finish up this idea let’s look at a service on Microsoft 365 health page and what it looks like in Pandora FMS.

Microsoft 365 Health Page:

Office-365-monitoring

Office-365-monitoring

We clearly see that there is a service degradation.

Health in Pandora FMS:

Office-365-monitoring

Office-365-monitoring

We check and verify that, indeed, we have the same information and that with these texts it is very easy to define alerts on the status of the different services.

Log collection

If we have Pandora FMS Syslog Server feature enabled, we can save all the issues that take place in Microsoft 365. For this, just add the parameter -l in the execution of pandora_o365 module -c xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx -t xxxxxxxx-xxxxx-xxxx-xxxxx-xxxxxxxxx -s xxxxxxxxxxxxxx ~ xxxxxxxxxx ~ xx ~ xxxxx -l

That way you can save, very easily and with no issues at all, Microsoft 365 incidences in Pandora FMS.

Office-365-monitoring

Office-365-monitoring

That way, you may now proactively monitor all Microsoft 365 services. And we achieved our goal, Office 635 monitoring is ready to work!

Would you like to find out more about what Pandora FMS can offer you? Find out clicking here .

If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise mode, you choose!! Get it here !

Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here .

Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!

And if you want to keep up with all our news and you like IT, releases and, of course, monitoring, we are waiting for you in our blog and in our different social media, from Linkedin to Twitter not forgetting of course Facebook . We even have a YouTube channel, and with the best storytellers.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

5 ideas on how to use a Wireless Document Camera to improve your lecture

The IPEVO VZ-X , a wireless document camera, is revolutionizing how lectures are taken. The VZ-X features three connection modes, namely Wi-Fi, HDMI, and USB. You can also use it with a computer, iOS/ Android devices, or directly with a projector or TV.

Now, let’s look at five ways you can use the IPEVO VZ-X to improve your lecture.

  1. Interactively in a small classroom

Say you are teaching a small classroom and you fancy showing each student’s work to the members of the class. All you need is the Wireless Document Camera, VZ-X, and a big screen. You can hold the VZ-X in your hand, walk around the class while showcasing it on the big screen.

Thanks to the Wi-Fi connectivity, you won’t have to deal with wire, and with a battery life of up to 12 hours, you can have a productive and interactive class or session without interruption.

  1. For a bigger setting

When in a bigger setting, the VZ-X can also be utilized. Thanks to the Wi-Fi mode, speakers can connect their device to the VZ-X and move around freely without having to worry about cables. So, that way, speakers can have their work displayed on bigger screens in the auditorium for all to see.

  1. Online learning

You can also use the VZ-X as a webcam for video conferencing or remote learning/teaching via third-party communication software like Zoom, teams, and skype. You are not restrained by cable as you can connect the VZ-X to your device through Wi-Fi without interrupting your internet connectivity.

To stay connected to your network while using VZ-X in Wi-Fi mode, see the step-by-step guide here.

  1. Connect wirelessly to your iPad and make annotations with the help of the IPEVO WHITEBOARD

With both the VZ-X and the  IPEVO WHITEBOARD App, you can take learning and presentations to the next level. With IPEVO Whiteboard, you can expand your wireless freedom to the maximum. It is a software that lets you make and share annotations, pictures, objects, text, and screens even as you present them.

All you have to do is connect the VZ-X via Wi-Fi to an iPad using the IPEVO Whiteboard, and then you can begin to annotate. But that is not all; you can also record both audio and video as well as take snapshots. It is also possible to display through a large audience when you present on a big screen — of course, with no wire to deal with.

Features and tools that make the IPEVO Whiteboard PRO an interesting software include 20 background templates, disappearing ink, browser window, add a map, picture-in-picture, laser pointer, and many more.

  1. Pair the VZ-X with the IPEVO Visualizer

The IPEVO Visualizer lets you display, record, and modify the video feed from a computer camera. When you pair it with the VZ-X, you can begin to visualize things in a new way. You can add additional value to your lecture with features like reading aids, split-screen, picture-in-picture, slow-motion, and many more.

With the reading aid feature, you have access to additional tools like the line marker, highlight strip, magnifier, and masking.

The split-screen feature lets you use more than one camera in presentations for side-by-side comparisons of different materials.

Picture-in-picture is another feature of the Visualizer you will find interesting. For video recording or live presentation, you can use the main window to show your presentation and the pinned overlay window to show yourself talking it through. Slow-motion recording lets you record in slow motion.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About IPEVO
IPEVO makes versatile teaching tools instead of specialized “classroom equipment”.
We go beyond the usual conventions of classroom technology—large, expensive, specialized and complex—to rethink simple and flexible solutions for interactive teaching in today’s classrooms.
IPEVO’s interactive teaching tools empower educators and teachers with radically affordable and compact technology that is simple, intuitive and flexible, so that precious time and resources can be wholly dedicated to teaching. We intend to make educational technology accessible and available to all.