Skip to content

ESET Threat Report T2 2021 highlights aggressive ransomware tactics and intensifying password-guessing attacks

BRATISLAVA – ESET released today its T2 2021 Threat Report, summarizing key statistics from ESET detection systems and highlighting notable examples of ESET’s cybersecurity research, including exclusive, previously unpublished updates on current threats. The latest issue of the ESET Threat Report highlights several concerning trends that were recorded by ESET telemetry, including increasingly aggressive ransomware tactics, intensifying brute-force attacks, and deceptive phishing campaigns targeting people working from home who have gotten used to performing many administrative tasks remotely.

Ransomware, showing three major detection spikes during T2, saw the largest ransom demands to date. The attack shutting down the operations of Colonial Pipeline – the largest pipeline company in the US – and the supply-chain attack leveraging a vulnerability in the Kaseya VSA IT management software, sent shockwaves that were felt far beyond the cybersecurity industry. Both cases appeared to pursue financial gain rather than cyberespionage, with the perpetrators of the Kaseya attack setting a USD 70 million ultimatum – the heftiest known ransom demand so far.

“Ransomware gangs may have overdone it this time: the involvement of law enforcement in these high-impact incidents forced several gangs to leave the field. The same can’t be said for TrickBot, which appears to have bounced back from last year’s disruption efforts, doubling in our detections and boasting new features,” explains Roman Kováč, chief research officer at ESET. On the other hand, the final shutdown of Emotet at the end of April 2021 saw downloader detections down by half compared to T1 2021 and a reshuffling of the whole threat landscape.

Password-guessing attacks, which often serve as a gateway for ransomware, saw further growth in T2. Between May and August 2021, ESET detected 55 billion new brute-force attacks (+104% compared to T1 2021) against public-facing Remote Desktop Protocol services. ESET telemetry also saw an impressive increase in the average number of daily attacks per unique client, which doubled from 1,392 attempts per machine per day in T1 2021 to 2,756 in T2 2021.

The exclusive research presented in the T2 2021 Threat Report includes findings about the highly targeted DevilsTongue spyware, which is used to spy on human rights defenders, dissidents, journalists, activists, and politicians; and a new spear phishing campaign by the Dukes APT group, which remains a prime threat to Western diplomats, NGOs, and think tanks. A separate section describes new tools employed by the highly active Gamaredon threat group targeting governmental organizations in Ukraine.

The ESET T2 2021 Threat Report also reviews the most important findings and achievements by ESET researchers: a new cross-platform APT group targeting both Windows and Linux systems; a myriad of security issues in Android stalkerware apps; and a diverse class of malware targeting IIS servers, highlighted in the Featured story section.

Finally, the report offers an overview of several talks given by ESET researchers and experts during the past few months and introduces talks planned for Virus Bulletin, AVAR, SecTor, and many other conferences. It also provides a general outlook of ESET’s participation in the MITRE Engenuity ATT&CK® evaluation, which will focus on tactics, techniques and procedures applied by the Wizard Spider and Sandworm APT groups. ESET’s outstanding visibility into both adversary groups’ behaviors could have a significant positive impact on ESET’s results in this evaluation.

For more information, check out our ESET Threat Report T2 2021 on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Version 2 Singapore – Safetica ONE 10.0: The new generation of DLP integrated with Insider threat protection features


Please do not reply to this email.
If you do not wish to receive any further email message from us, please click here to unsubscribe.
Copyright © 2001 – 2021 https://version-2.com.sg/

Cybersecurity Awareness Month 2021: “Do Your Part. Be #CyberSmart

The steady stream of news about ransomware attacks, phishing emails and identity theft can feel overwhelming. That’s why the goal of October’s Cybersecurity Awareness Month is to empower every American with the tools and knowledge necessary to stay safer online.

This annual event, now in its 18th year, has shifted focus over the years from offering basic internet safety tips—like keeping your software updated—to providing a vast range of educational resources for individuals, families, schools and businesses.

Sponsored by The National Cyber Security Alliance (NCSA) and the Cybersecurity and Infrastructure Security Agency (CISA), the campaign’s stated purpose is to “raise awareness about the importance of cybersecurity across our nation, ensuring that all Americans have the resources they need to be safer and more secure online.”

As the NCSA notes, “In these tech-fueled times, our homes, societal well-being, economic prosperity and nation’s security are impacted by the internet.”

This year’s theme, “Do Your Part. Be #CyberSmart,” emphasizes the role of personal accountability and proactive behavior.

Whether it’s using strong passwords to protect your online data, investing in internet security to block the spread of malware, or simply thinking twice before clicking on a link, your actions make a difference. After all, the Colonial pipeline attack that shut down the biggest fuel pipeline in the U.S.—leading to shortages across the East Coast—was the result of a single compromised password.

By following the security best practices provided by the campaign, as well as sharing them with friends, colleagues and family, you can make our interconnected world a safer place.

Each week in October will focus on a specific area, beginning with newbie basics like creating powerful passwords, using two-factor authentication and backing up your data.

Consecutive weeks will cover how to recognize and avoid phishing attacks; explore the burgeoning field of careers in cybersecurity; and illustrate how the actions we take today can affect the future of IT security.

ESET’s activities during Cybersecurity Awareness Month include a contest with prizes, a ransomware webinar and free cybersecurity awareness training.

You can access free resources like tip sheets, videos and infographics, including materials for K-12, small businesses, and government organizations, from the National Cybersecurity Alliance at https://staysafeonline.org/resources-library/.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Key concepts of systems and networks

Together we check out the key concepts of systems and networks

In the middle of the information century, who has not surfed the Internet or used a computer, be it a desktop or a laptop? But do you really know what a computer is and what it is made of? and what about the Internet?

It is important to know at least the most superficial layer of something as important as computer systems and networks, and therefore, we are going to talk about the key concepts of these two topics.

A computer system is a device made up of the union of hardware and software, which allows the use of this system by a person, whether qualified or not, that depends on the purpose of the system.

But, what does “hardware” and “software” mean? Let’s talk a little more about it.

You can define as hardware the set of physical components that make up a computer system. We are going to define the main components of a computer system, although there are a few more:

  • Processor: It is the component in charge of executing all the system programs. It is in turn made up of one or more CPUs.
  • RAM memory: This component stores the data and instructions executed by the CPUs and other system components.
  • Hard Drives: Information and content are stored here in computer systems.
  • Motherboard: It is the component where the others are located, and works as a bridge for communication between them.

Well, now that we have a basic understanding of what hardware is, we move on to software.

Software are all the programs that run on a computer system, among which you may differentiate three types of software:

  • System Software: It is responsible for the proper functioning of the operating system and hardware in general, such as device drivers.
  • Programming software: They are tools whose sole purpose is the development of new software.
  • Application software: It is any program designed to perform one or more specific tasks, for example video games or applications designed for business or education.

We already know what a computer system is, but without communication with the outside we are not making the most out of the potential that these systems have (which is a lot), so we decided to connect it to that abstract site full of information and services: the ‘Internet’.

Everyone knows the term “Internet”, but do we know what the “Internet” is?
We could say that the Internet is the great global network that unites all existing devices, allowing communication between all of them from anywhere on the planet. In turn, this large network is made up of other smaller networks, such as those of a country, city, neighborhood, etc.
Mainly, we distinguish three types of networks:

  • LAN: It is the smallest network, a local area network, such as the one in work areas or the one you have at home.
  • MAN: It is a somewhat larger network, being able to cover from neighborhoods to cities. They can also be the networks used by large companies for communication between their different offices.
  • WAN: It is a network that connects countries or even continents to each other, not devices. We can say that the Internet is the ultimate WAN network.

Ok, we already know what the Internet is made of. But, how do devices communicate on these networks? There are systems used to identify each computer on the network, known as IP addresses. An IP address is, basically, the ID or identifier of a device, so it is unique and unrepeatable.

At the beginning, when the idea of an IP address was created, there were only a few dozen computers in the whole world, and this, as we already know, has gotten quite out of control since then. As a result of this increase, they decided to come up with a new concept, known as DNS (for its acronym Domain Name System).

What the DNS protocol does is, basically, translate the domain name that we enter, either in the web browser or in any other program, and convert it into an IP address, with which it communicates with the destination. Of course, all domain names are stored on DNS servers, scattered around the world to avoid connection overload, and to avoid slow name resolutions.

There are a large number of protocols, each with a different purpose. These protocols are grouped in layers, such as application, transport, Internet or access to the network, according to the TCP/IP model. But, that’s not all. We still lack another important concept in relation to communications between devices, what we know as “ports” of a computer system.

Imagine a road, if all the traffic that wants to enter a city only had a single road, what would happen? Well, the same thing happens in computing, and that is why these virtual ports exist.

These ports range from 0 to 65535, but the first 1024 are reserved for “important” protocols, such as the DNS protocol, which we have mentioned above, belonging to the application layer and that uses port 53 for both UDP and TCP connections.

TCP and UDP are two protocols belonging to the transport layer, whose main difference is that the TCP protocol is connection-oriented. That is, the TCP protocol makes sure that the data reaches its destination, while the UDP protocol sends the data, faster but less securely. This data may even not arrive or at least not fully arrive.

The protocols for web connections or HTTP/HTTPS, both belong to the application layer. Depending on which one you choose, it uses a different port. That is, for HTTP connections, port 80/TCP is used, although it is deprecated due to its lack of security, so the standard has become HTTPS connections, which use port 443/TCP and include a security layer based on SSL/TLS.

Connections made through safe channels or SSH, also from the application layer, use port 22/TCP, and thus we could continue with lots of other protocols.

Of course, these ports are a standard in the systems that receive the requests, the client that initiates the request can use any port that is not reserved to send the request and receive this data. As you can see, this is much easier to communicate with servers, although they can also modify their default ports, but the normal thing is that they do not do so if they want to provide a public service.

Finally, we are going to talk about a concept that, due to the pandemic, is the order of the day: the VPN.

As its name indicates (Virtual Private Network), we can define a VPN as a network “tunnel” that is created between client and server, where data are fully encrypted and sent through the Internet. The common use of VPNs is anonymity on the network, since the IP that is exposed is that of the VPN server, or, also, to be able to visit pages that cannot be accessed from the source country.
In the business environment, this tunnel allows direct communication between the client device with any other device in the network of that server, which allows access to an environment as if we were physically in the office of our company. It also allows access control and registration, which otherwise could not be done.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

WHAT’S NEW Pandora FMS 757

What’s new in Pandora FMS latest release, Pandora FMS 757

Let’s check out together the features and improvements related to Pandora FMS new release: Pandora FMS 757.

NEW FEATURES AND IMPROVEMENTS

Internal messaging system in the Metaconsole

The messaging system has been implemented in the Metaconsole, which now also allows seeing, similarly to nodes, update notices, messages from other users and system notes.

New documentation in Russian

Although the translation is not yet 100% complete, we’re proud to say that the official Pandora FMS documentation is already in five languages: Spanish, English, French, Japanese and now… Russian!

Collection of new plugins

  • Openstack Plugin

New Open Plugin. It captures data from hypervisors and instances remotely through the openstack api.

  • Pandora MongoDB

New Enterprise plugin. It obtains server stats, the databases and their collections. Remote plugin, with support for Mongo Atlas.

  • Plugin Ldap

New Open plugin, it connects to an ldap account and collects stats related to operations, connections, statistics or waiters.

  • Plugin Nginx

Enterprise plugin update. Updated to python 3.

  • Plugin VMware

Enterprise plugin update. Added a Reject parameter to discard agent IP automatic update.

  • Cisco configuration Inventory Plugin

Enterprise plugin update. Added support for Spanish language systems.

  • Plugin Inventario Cisco configuration

Enterprise inventory plugin update. Added option to define credentials in execution parameters.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Scale Computing Continues to Deliver High-Performing, Scalable Edge Computing and IT Infrastructure to the Government Sector

INDIANAPOLIS – September 222021 – Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced ongoing momentum with customers in the public sector. The company’s HC3 Edge and IT infrastructure solutions continue to enable municipal institutions of all sizes to optimize operations with self-healing, automated infrastructure for all applications while protecting sensitive government data.

“In today’s world, IT management is tasked more than ever with simplifying infrastructure and delivering solutions to employees and citizens that mitigate risks in a whole new way. IT departments need to ensure that hardware and software are reliable, remotely accessible, and protected against cyberthreats,” said Jeff Ready, CEO and co-founder of Scale Computing. “Scale Computing meets the complicated IT infrastructure demands of state and local governments. Our agile, reliable platforms can replace traditional IT infrastructure across any agency, any department, or any system, while driving out the high costs of downtime and system administration.”

Scale Computing brings municipal institutions, including governments, government agencies, and other public institutions, into a new era of computing by revamping IT operations with a solution that simplifies management, protects sensitive government data, and helps deliver smart, digital services.

Kitselas First Nation is a self-funded and self-governing nation, and one of the 14 Tsimshian tribes in British Columbia. After experiencing a flood, Kitselas First Nation needed new servers and a modern solution for simplicity, scalability, availability and disaster recovery. With only one person on the IT staff, they were also in need of powerful systems capable of running workloads with efficiency and speed, as well as an affordable, easy-to-use solution capable of maximizing uptime.

Kitselas First Nation selected Scale Computing’s HC3 platform which provides them with simplified, highly affordable IT infrastructure with improved performance. Since implementation of Scale Computing HC3, Kitselas First Nation saved resources and 15% of time spent managing infrastructure, leading to an increase in time spent working on other projects. Scale Computing’s HC3 solution also provides Kitselas First Nation with disaster recovery and the ability to manage IT infrastructure without the need for local IT staff.

Don Agnew, IT support and asset management officer at Kitselas First Nation, says, “We have an on-site backup and a Google Cloud Platform in Quebec. If another disaster strikes, the hardware component fails or the entire HC3 appliance breaks down, we’re covered. The Scale Computing HC3 cluster is highly available and keeps our systems running with no downtime. HC3 won’t let us down.”

The Summit County Board of Elections in Ohio is responsible for securely managing the records of 370,000 registered voters and over one million citizen records. As Ohio’s fourth most populous county, the Summit County Board of Elections’ entire network infrastructure is managed by a team of just two full-time IT professionals. With an aging server infrastructure and a heavily scrutinized Presidential election fast approaching in 2020, this IT duo needed to modernize their systems, comply with strict new security directives, and do so in an expedited time-frame.

After selecting Scale Computing’s HC3 solution, the Summit County Board of Elections was able to consolidate seven servers to a cluster of three HC3 notes in less than seven months, implement automated snapshots of servers that are backed up to a remote cluster providing full system redundancy, simplify management and operations so their two-person IT team could focus on operational priorities, and comply with new state and Federal security directives.

As Kevin Moreland, Network & Systems Administrator, Summit County Board of Elections says, “Every decision we make comes down to, ‘can you make it through a Presidential election’? We knew we needed something that was intelligent, scalable, had built-in redundancy, and was cost-effective. Scale has delivered on all of these and more. We went from an environment where we had about seven physical servers to a three node cluster. From that three node cluster, then we can spin up as many virtual servers as warranted by demand – this not only simplified our operational workload but it also dramatically shrunk our eco-footprint.”

We wanted something highly available, redundant, scalable, affordable, and easy-to-use. We’re happier than we’ve ever been. Scale Computing has been an awesome product.

Chris Iseral, Chief Information Officer of Madison County, Kentucky, was challenged with upgrading old infrastructure in an affordable way. The infrastructure in Madison Country includes 700 users in 26 different facilities across the country, accounting for 23 different departments or agencies. Chris’ challenges included multiple vendors and an expensive, complicated, and aging infrastructure. Madison County, Kentucky partnered with Scale Computing to deliver high quality, responsive, and budget friendly infrastructure that simplifies management, protects sensitive government data, and helps deliver smart, digital services anywhere, anytime. As Chris Iseral says, “We wanted something highly available, redundant, scalable, affordable, and easy-to-use. We’re happier than we’ve ever been. Scale Computing has been an awesome product.”

CyberLink’s facial recognition engine FaceMe® to power LILIN’s connected devices, providing businesses with contactless access control management and visitor analytics

TAIPEI, TAIWAN – July 28 2020 – CyberLink Corp. (5203.TW), a pioneer in AI and facial recognition technologies, today announced it has formed a partnership with surveillance solution provider LILIN, leveraging new facial recognition technologies to create comprehensive smart security and retail solutions. CyberLink will license its FaceMe® facial recognition engine to LILIN, powering its NAV Facial Recognition Recorder, creating an all-in-one smart security, data analysis and warning solution.

With the combined technologies, LILIN’s connected video devices can provide businesses with a series of contactless solutions, such as granting verified personnel access to restricted areas within offices, factories or residential buildings through an opt-in photo identification system. The new offering can also provide retailers and hospitality operators with anonymized customer demographics to better understand their customer experience, such as identifying trending emotions patrons may feel when engaged in specific activities or visiting certain areas of a venue.

As the coronavirus pandemic continues to develop across the globe, CyberLink’s and LILIN’s joint facial recognition system uniquely provides businesses seeking contactless solutions the underlying technology to reduce the need for people to touch highly shared surfaces by replacing key cards or PIN passwords with biometric data.

“If there was ever a field worthy of continued research and innovation, it’s security,” said Dr. Jau Huang, CEO of CyberLink. “Without a doubt, LILIN is a global leader and manufacturer of IoT devices, and CyberLink is a worldwide pioneer developing facial recognition applications for connected devices. Together, we are setting a new standard for what makes a place secure by bringing to market new technologies that make our customers safer, and our businesses smarter.”

“LILIN has many years of smart security experience, providing insight into the market’s needs for creating a comprehensive intelligent security solution. LILIN is pleased to partner with CyberLink and integrates FaceMe® into our facial recognition system to strengthen smart retail, smart healthcare, smart factory, and smart business applications. Through continued efforts, I believe that LILIN will provide the most advanced total security solution for global customers.” said Mr. C.C. Hsu, LILIN’s President.

CyberLink and LILIN will host a webinar titled “Facial Recognition x Smart Security

Empowering Smart AIoT Applications”” on August 13, 2020 from 14:00-15:00 (GMT+8/Taipei time), further describing the many use cases enabled through the new product offering. For detailed event information and a registration link, please visit: https://is.gd/SfXQ7l

FaceMe’s® edge-based architecture empowers powerful, efficient processing, and higher levels of security compared to Cloud-based solutions. It supports more than 10 operating systems, including Windows, Android, iOS, and various Linux distributions such as Ubuntu x86, Ubuntu ARM, RedHat, CentOS, Yocto, Debian and JetPack. FaceMe’s® high accuracy, flexibility and security makes it the leading facial recognition engine available on the market today, and it is one of the world’s most accurate engines as deemed by the global standard NIST Facial Recognition Vendor Test.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

Understand the Cyberattack that Affected Kaseya

On July 2, a Russian group of hackers exploited a flaw in the Kaseya company’s management software, affecting its systems and causing problems for it and its customers.

The massive cyberattack affected around 1,500 businesses in 17 countries. The attackers promised to return access to the data in exchange for 70 million dollars, equivalent to 364 million reais.

Hackers promised to release a decryptor so that all files could be recovered in at least an hour after paying the ransom.

Known as “REvil”, the organization claimed responsibility for the virtual attack on Kaseya. It was also responsible for the invasion that halted production at JBS, the world’s largest meat processor, in June this year.

Domino Effect

Headquartered in Florida, United States, Kaseya is responsible for the remote monitoring and management program used by more than 40,000 companies. Of these, only 60 were directly affected by the cyberattack.

However, as many of Kaseya’s customers provide services for other businesses, the systems are interconnected in a network.

This connection resulted in a domino effect, as the installed malware quickly spread and encrypted the files it found along the way.

The supermarket chain Coop, in Sweden, had to suspend the operation of its stores because it was unable to use the cash register system, which was managed by one of Kaseya’s client companies.

How Did the Invasion Take Place?

The type of virus was ransomware that can encrypt computer files. Access is only granted upon payment of a ransom to the hacker, that is, it is like a data hijacking in the digital world.

In this type of cyberattack, ransomware infiltrates frequently used software and spreads as systems are updated.

Encryption is the practice of encoding data, causing it to no longer have the original format and, therefore, no longer be readable by its owners.

Files can only be decrypted and returned to their original format through the use of a specific decryption key. It is for this key that Russian hackers ask for the ransom, as without it the data becomes useless.

Measures

This can be considered the biggest cyber-attack with ransomware of all time, as it reached a proportion never seen before in similar cases.

Kaseya asked customers using its system administration platform, VSA, to immediately shut down their servers to try to prevent the possibility of their information being captured by the cyberattack.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Agency (CISA), among other US officials, assisted in the investigations.

US President Joe Biden has warned Russian leader Vladimir Putin to take action against hackers who have been operating in Russia for a long time.

On July 12th, Kaseya has reported that it had fully recovered the servers. These attacks are an increasingly profitable way to take hostages in the virtual universe.

How Does the Russian Group Operate?

REvil, also called Sodinokibi, is one of the best-known hacker gangs today. It operates with dozens of individuals in a “professional” regime with the division of tasks.

While one part of the group invades the systems, the other is responsible for constantly maintaining the ransomware, managing the group’s financials, and negotiating the rescue of the data with the victims.

Hackers drive the attack into double extortion mode, which occurs when Internet hackers take control of the network, extract important and sensitive data, and activate ransomware that encrypts victims’ data.

Then, they ask for a ransom in cash or bitcoins so that they return control of the data and do not disclose the information obtained illegally.

The group explored a series of “zero-days” in the product that allows it to bypass its authentication, arbitrarily upload files, and install pirated software.

With this, they can use a series of tactics and tools to move around the network and have access to all the files that are present.

A tool from Kaseya itself may have been used to take control of the system and activate the malicious software, as it has high-level access privileges on the machines, passing in an authorized way through antivirus.

The exact form used by the group is still unknown, however, the flaws of the American company’s protection to its systems became clear.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

IoT Profiling, Visibility & Classification, Powered by Portnox CLEAR

IoT/OT Blind Spots Across Your Network
At present, hundreds of millions of IoT/OT devices are in use, and that number continues to rise as organizations increasingly adopt such devices to improve productivity, insight and real-time decision making. Unfortunately, IoT/OT devices are particularly at risk to external and internal cyberthreats due to a lack of device patching and overall visibility and contextual understanding across networks. This makes IoT profiling quite difficult.

The healthcare, hospitality and manufacturing sectors are especially vulnerable due to their heavy reliance on ultrasound machines, avionics, building automation, VoIP, medical devices, printers, computers, networking equipment and energy and power infrastructure. To close this IoT/OT device visibility gap, Portnox CLEAR is introducing its IoT/OT Visibility Add-On, which enables organizations to see, profile and classify all IoT/OT devices on the network without an agent.

IoT Profiling in CLEAR: How it Works
Portnox CLEAR utilizes several methods and leverages multiple data points to actively and passively identify, profile and classify IoT/OT devices across enterprise networks, delivering detailed device profile data that takes into account device families, types, models and vendors.

With the IoT/OT Visibility Add-On, Portnox CLEAR can continuously discovers all IP-connected devices without requiring agents, the instant they enter your network. the add-on provides in-depth visibility into those devices using a combination of active and passive discovery, profiling and classification techniques.

IoT Profiling Capabilities with CLEAR

  • Device Discover – Automatically discover IoT/OT devices without needing to install yet another third-party agent across managed devices.
  • Device Profiling – Classify IoT/OT devices based on type, like MRI machines, printers, sensors and beyond.
  • Device Type Enforcement – Continuously monitor IoT/OT devices and enforce network segmentation and access policy based on device type.

IoT Profiling Advantages with CLEAR

  • Cloud Delivery – Portnox CLEAR leverages a central cloud database that utilizes crowdsourcing and machine learning to deliver better device predictability.
  • Microsegmentation – Automatically segment groups and enforce unique policies to reduce the network attack surface, improve breach containment and strengthen regulatory compliance.
  • Access Control – Define and enforce access control policies based on IoT/OT device types.
  • Complete Asset Management – Be able to report on and visualize in real-time the device types, locations and level of access for every IoT/OT on the network.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Free Antivirus Software: 7 Questions To Ask Before You Download

Just like our homes, our digital devices hold invaluable data and private information. And in a time when the threat of cyber-attacks is greater than ever, a computer device without any malware protection is the digital world equivalent of an unlocked front door. Moreover, the digital realm is now hosting the highest number of recorded users ever. Coupled with the fact that new malicious threats are emerging every day, the need to secure your personal and professional devices has reached an all-time high.

However, with a plethora of security options to choose from, it’s enough to give anybody a head spin. But don’t worry, we’re here to make your entry to the vast unknown world of cybersecurity a lot easier. We’ve put together the top 7 questions you need to be asking before you click the download button.

Q1. How well does it perform against malicious threats?
When it comes to picking the right antivirus software for your device it’s crucial that you consider its overall performance against malicious threats saturating the web. Your security suite must be able to give you complete protection against all types of malware. Such threats include trojans, spyware, adware, rootkits, ransomware, and malicious bots that seek to infect your computer for nefarious purposes. And in the process of detecting and eliminating these threats, it’s important you pick a security suite that doesn’t give off false or incorrect detections. This means it has to be 100% effective when blocking any type of malware, known or unknown.

Moreover, with new malware threats emerging every single day, it’s also key that your antivirus stays up-to-date about new viruses and their digital fingerprints. So if you want absolute stress-free protection for your device, choose an antivirus that regularly updates its virus and malware definitions. This applies whether you’re in a home environment or an office setting.

Another vital factor is proactivity. Regardless of what operating system (OS) you use, macOS or Windows, having a proactive security suite is much more beneficial, as compared to having a reactive one. In cases where malware stealthily penetrates your device, your proactive security system will automatically detect, detain, and remove the malware before it even rears its head. This is in stark contrast to reactive antivirus systems, which only start taking action after the malware infection has already started spreading across your device.

Q2. Is it a free or paid antivirus software?
Free and light antivirus software will zap away common viruses and provide your device with basic protection. However, that shouldn’t be your only requirement because it won’t be able to defend your devices against new and ever-growing sophisticated threats. Downloading a light/free version may leave plenty of holes in your defense, and you’ll still be vulnerable to malicious attacks. Moreover, they tend to be much more reactive in nature.

In contrast, a paid antivirus solution plugs these holes and gives you more all-around protection. Paid antivirus software is also more reliable in combating dangerous apps and new malware threats, by shutting them down before they sprout. This is due to their proactive capabilities and updated defense systems. With a paid antivirus, you’ll enjoy advanced protection as compared to the limited security from free options.

There certainly are antivirus software providers that allow you free use of their full versions, albeit for a limited time. This, we think, is a great idea because you get complete access to an uncompromised version of the software and are afforded the ability to try before you commit to a purchase.

Q3. Does it have an impressive reputation?
One of the crucial factors that determine reliable antivirus software is reputation. So it’s essential that you subscribe to one with a proven track record. An anti-malware software that is tried and tested. Take a look at those with the best reviews surrounding your needs. We also suggest looking at test results published by independent and authoritative antivirus labs. These are autonomous quality-testing labs that independently assess antivirus and cybersecurity software in the market to evaluate their overall performance.

Recently, Germany’s reputed AV-TEST institute conducted an independent test on the ESET antivirus software. And the test results were nothing short of remarkable. ESET secured a perfect 100% score across all 3 major categories – Protection, Performance, and Usability. This means that researchers found that ESET’s security suite was able to protect its devices with 100% accuracy.

And although the score is quite impressive, this isn’t the first time ESET has scored so well. ESET has been consistently scoring top scores in independent tests run by some of the top independent labs in the industry for years now. This has established ESET as one of the best providers around when it comes to digital security. And it’s also one of the reasons why ESET has been chosen by more than a hundred and ten million users worldwide, and has become the leading antivirus software in Europe.

Q4. Will it be light on my system?
The best form of security is invisible and discreet. And if you’re somebody who enjoys spending a lot of time browsing the web, you want an antivirus solution that gives your devices full protection without constantly letting you know about its presence. You want a security suite that allows you to sail through the internet smoothly without impeding the overall performance of the computer. Many anti-malware software cause devices to lag since they demand high CPU usage. So it’s best for you to choose an antivirus software that’s very light on system resources, consumes minimal processing power, and doesn’t slow your computer down. This helps shield you from the ever-lurking malicious threats on the internet without compromising on your user experience.

Compared to all the other major security products, ESET’s home products famously have little impact on device usage, with a very light system footprint. This means that the ESET anti-malware scanning is so lightweight that you won’t even notice it running in the background.

Q5. Does it provide practical features?
Who doesn’t like cool features? When you’re thinking about installing a security software, you want it to be as all-encompassing as possible. Therefore, it’s smart to look for vendors that pack their systems with useful additional features that cover your security needs outside malware threats.

For example, ESET offers an anti-theft feature. This allows you to precisely locate your device if it ever gets stolen. It even allows you to send one-way messages and access your laptop’s webcam. Additional features also include a password manager that helps you generate strong, secure passwords and guards your login credentials. It also provides parental control which lets you regulate your children’s internet usage. Although most additional features only come with paid antivirus systems, getting complete security protection at the expense of a few dollars is always worth the spend.

Q6. Is the antivirus software easy to use?
It’s safe to say we all prefer systems and programs that are simple and easy to use. Especially when you’re on the lookout for software that’s going to oversee the entire security of your personal or professional device. It has to have a user-friendly look and feel to it. Everybody has their own set of preferences and tastes. And for many of us, the user interface and design scheme have to be coherent and clear, regardless of how good its malware detection and removal scores are.

Moreover, many users install and accept default installation antivirus software settings without ever optimizing them. This may be due to the visual inaccessibility the user feels. Many security providers seem to struggle with this. Often their complicated interfaces discourage users from disabling and enabling certain functions. This may eventually leave the device susceptible to malware attacks. So looking for an anti-malware system that allows easy navigation with high configurability may prove to be an important factor to consider.

We offer a solution that strikes a fine balance between these two requirements. The options and features in our security suite are all displayed in a way that feels intuitive and effortless to operate. It’s also highly customizable as it allows you to tailor your security level based on your liking and preferences. Overall, this gives you the total control and understanding needed for your to enjoy the highest possible security.

Q7. Does it offer good customer support?
Customer support isn’t on everybody’s priority list, especially if they’re comfortable using computers. But in case you prefer allowing experts to handle your tech issues, comprehensive customer support may be an important factor for you to consider. In which case it’s best that you look for antivirus software that offers top-notch customer support. There are some that provide in-depth assistance when users get stuck in a malware crisis.

With ESET, you get in-depth support from a set of comprehensive online support guides and videos in case you face any technical issues. Moreover, ESET offers immediate assistance by leveraging on AI, via a chatbot and swift email-based support. That way you can ask for all the assistance you require through your most preferred medium.

Final Verdict: Is free antivirus software worth the risks it brings?
Even though a free or light antivirus software might appear appealing, it’s not recommended you opt for one. With its unreliability when it comes to heavy threats, inability to detect sophisticated/unknown malware, lack of features and comprehensive technical support, downloading a free version won’t give you plenty of benefits or protection. Instead, you may want to consider an antivirus that offers a free, full-featured trial.

A free trial provides you with all-round complete threat protection along with all the additional features of the paid version at the expense of absolutely nothing. This allows you to fully experience the antivirus software before you purchase it and make sure that it’s suitable for you. Try to actively seek free trials that give you a full glance of what they’re offering over those with limited features. After all, a high level of transparency is often a clear indicator of a superior product.

ESET is one such award-winning defense system that offers a free trial where you get to enjoy all the features and attributes of the paid version, completely free. And the best part is you’ll receive the free trial without even filling in your credit card details – this is important because you don’t want the software that’s meant to protect you sneaking in a charge on your credit card!

If you’re someone who likes to spend time freely browsing the internet, or someone who enjoys going on online shopping sprees, or have children constantly occupying your devices, spending a few dollars a month will rid you of many troubles and worries. Most importantly, you’ll be getting the comfort and peace of mind that comes with top-notch security.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET Research discovers FamousSparrow APT group spying on hotels, governments and private companies

FamousSparrow exploited the Microsoft Exchange vulnerability chain known from March 2021

BRATISLAVA, MONTREAL — ESET researchers have uncovered a new cyberespionage group attacking mainly hotels worldwide but also governments, international organizations, engineering companies and law firms. ESET has named this group FamousSparrow and believes it has been active since at least 2019. FamousSparrow’s victims are located in Europe (France, Lithuania, the UK), the Middle East (Israel, Saudi Arabia), the Americas (Brazil, Canada, Guatemala), Asia (Taiwan) and Africa (Burkina Faso). The targeting suggests that FamousSparrow’s intent is cyberespionage.

Reviewing telemetry data during its investigation, ESET Research discovered that FamousSparrow leveraged the Microsoft Exchange vulnerabilities known as ProxyLogon that ESET reported on in March 2021. This remote code execution vulnerability chain was used by more than 10 APT groups to take over Exchange email servers worldwide.

According to ESET telemetry, FamousSparrow started to exploit the vulnerabilities on March 3, 2021, the day following the release of the patches, meaning it is yet another APT group that had access to the details of the ProxyLogon vulnerability chain in March 2021. “This is another reminder that it is critical to patch internet-facing applications quickly, or, if quick patching is not possible, to not expose them to the internet at all,” advises Matthieu Faou, ESET researcher who uncovered FamousSparrow along with his colleague Tahseen Bin Taj.

“FamousSparrow is currently the only user of a custom backdoor that we discovered in the investigation and called SparrowDoor. The group also uses two custom versions of Mimikatz. The presence of any of these custom malicious tools could be used to connect incidents to FamousSparrow,” explains ESET researcher Tahseen Bin Taj.

Although ESET Research considers FamousSparrow to be a separate entity, there are some connections to other known APT groups. In one case, the attackers deployed a variant of Motnug, a loader used by SparklingGoblin. In another case, a machine compromised by FamousSparrow was also running Metasploit with cdn.kkxx888666[.]com as its command and control server, a domain related to a group known as DRDControl.

For more technical details about FamousSparrow, read the blogpost “FamousSparrow: A suspicious hotel guest” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

 Geographic distribution of FamousSparrow targets

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.