Skip to content

Introducing ESET NetProtect: Fighting threats at the DNS level

The DNS, the address book of the internet, has long been plagued by malicious domains with little hope for effective recourse against this abuse by its bookkeepers: the registrars. ESET brings its protective technology to bear on this pestilence.

Since the early 1980s, the Domain Name System (DNS) has been used for looking up the Internet Protocol (IP) addresses of domain names, now probably best known entered into browser address bars, but widely queried by applications. For most internet users, the work that the DNS performs likely goes completely unnoticed, yet nearly all our activities on the internet begin with a DNS lookup. Monitoring DNS lookups can provide a comprehensive view into the traffic flowing through devices and is a critical point of security control.

Filtering out malicious and suspicious domains is a constant battle to stay protected. Ideally, malicious domains would never be registered in the first place or at least quickly detected and dealt with by delisting, blocking access to, or redirecting traffic away from them (aka sinkholing them). However, registering a new or recycled domain name under a false identity is a fast, simple, and cheap process that has allowed various threats to scale up quickly.

For more information on the background of the DNS, click here.

Malicious domains: a growth industry

The dangers range much further than mistyping domain names and accidentally navigating to a malicious site “typosquatting” a well-known domain name. Threat actors can register new malicious domains en masse for widespread phishing campaigns, possibly using homoglyphs to bamboozle all but the most vigilant. Compromised devices can reach out to command and control servers overseeing their botnets for the next malicious command. Data can be stolen by malware and sent off to a malicious domain.

A particular challenge arises when legitimate domains are compromised and entered into blocklists as malicious. The operators of such domains have the burden of rooting out the source of the compromise and requesting removal from any blocklists. This scenario often arises when hosting providers that detect malicious activity automatically suspend clients’ accounts. On the other hand, there are some bulletproof hosting providers that publicly wash their hands of the potential malicious or illicit use of their services, providing a safe harbor for both would-be and career criminals.

According to Verisign, which manages the infrastructure of the .com and .net top-level domains (TLDs), 341.7 million new domain names were registered in Q4 2021 across all TLDs, excluding the .tk (Tokelau), .cf (Central African Republic), .ga (Gabon), .gq (Equatorial Guinea), and .ml (Mali) TLDs operated by Freenom due to lack of verifiable data. Considering that, on average, over 3.7 million new domain names are being registered every day that need to be analyzed for malicious behavior, in addition to existing domains that can become compromised or only show their malicious intent later, the need for robust technological solutions to handle this threat vector is paramount.

The economics of domain names

According to several analyses made over the years – [1], [2], and [3] – the five TLDs run by Freenom typically feature highly among the top TLDs used for phishing and malware because no fee is charged to register a new domain. This reveals how favorable the economics of domain names is to malicious actors.

Domain names can be created and thrown away every day by the millions because there is little to no accountability or cost for the people who register them. Each registrar makes its own rules and it is an easy matter to find those that do not use stringent methods to verify the identities and addresses of registrants, and that charge little to nothing for registering domain names, sometimes even making an API available to allow for the automated registration of domain names at scale.

Although the WHOIS protocol was developed to allow easy querying of registrar databases for the identities and addresses of registrants, there are several hurdles to identify malicious registrants. Some registrars offer privacy services to hide registrant information and some local privacy laws even mandate this. Even worse, when dealing with overtly malicious domains, any personally identifiable information that might be available via a WHOIS query is likely false. Indeed, even the credit card used to pay for such domain registrations is probably a stolen one. Contacting a registrar to take down a malicious domain can take days while criminals can carry on their malicious campaigns with new domain names in minutes.

Filtering network traffic for security

The response from the security industry to the abuse of the DNS has been to build automated systems that continually analyze domains for malicious behavior and to create domain blocklists. These lists are then fed into various security products and threat intelligence data feeds to better inform security decisions about allowing connections to specific domains. For example, the anti-phishing database maintained for ESET security products is updated every 20 minutes so that customers can receive protection against the latest phishing websites.

Filtering network traffic against blocklists is no stranger among the security practices of internet service providers (ISPs) and network administrators. Indeed, this is the very task that firewalls have been put to since the mid-1980’s: decapsulate the packets that reach the firewall, look at the IP addresses, the domain names, the protocols, and the port numbers, and if anything is on a blocklist, appears suspicious, or is a communication forbidden by the firewall’s administrators, then block it or raise a warning flag.

With the right fine-tuning, network and endpoint firewalls can be effective as they work in both directions, hindering both external and internal actors from sending packets either into or out of networks and devices. This helps limit the spread of malicious packets and the leak of confidential data no matter the direction or source. A DNS firewall works a little differently as it allows DNS lookups and overrides answers identified as malicious or otherwise undesirable with “not found” or “access denied” messages.

DNS filtering requires partnership
In one sense the use of firewalls and blocklists to deny access to malicious domains can create a false sense of security. With persistent effort there is almost always some loophole to bypass firewall filters, typically via a Virtual Private Network (VPN) or the Tor Browser.

Since a DNS firewall is tied to a DNS server, to bypass its filters it is possible to change the DNS server you are using. While it is possible to run your own DNS server and filters at home or locally, many internet users are likely using the default DNS server and filters provided by their ISP. A simple search for “public DNS servers” in a search engine reveals a host of popular free and paid alternatives, some offering varying levels of protection against phishing sites and malware.

This means that the successful application of a DNS filtering solution depends critically on the willingness of internet users to enter into a partnership with their selected DNS provider and to choose not to circumvent the offered protection.

Protective DNS with ESET NetProtect

The need for improved security of the DNS has led in some places to mandating PDNS (Protective DNS), an acronym referring to DNS filtering. For instance, since 2020, US Department of Defense (DoD) contractors have been required to earn Cybersecurity Maturity Model Certification (CMMC), which, among other requirements, stipulates DNS filtering to achieve Level 3 out of the five levels. Moreover, at the end of 2021, the DoD set in motion CMMC 2.0, with the repositioning of DNS filtering yet to be seen.

The PDNS market features many vendors offering DNS filtering with different levels of domain feed quality and accompanying security services. ESET offers a unique contribution, one sourced from threat data shared by millions of customers around the world using ESET security products. With 35 years of providing security and developing and fine-tuning internal systems to provide high-quality domain feeds for DNS filtering, ESET is positioned to provide ISPs and home admins a distinctive source of protection.

Perhaps you are an ISP looking to bid for government contracts, or to provide unique protection for your own network or as a security service to your customers? Or perhaps you are a home user looking for better security than is provided by your ISP that can be easily extended to all users and guests of your home network? Whatever your case might be, inquiring about the filtering in place for a DNS server and which entity you are entrusting your DNS security to is no small step toward deflecting the tide of malicious domains proliferating on the internet.

ESET NetProtect is the DNS filtering solution available for home users at ISPs that have partnered with ESET. The solution is capable of detecting and blocking domains that deliver malware, are used for phishing, have a suspicious reputation, or serve potentially unwanted content. ESET NetProtect also offers a configurable web content filter with 35 categories that customers can select from to block content by age group.

For more information about ESET NetProtect and ISP partnerships, visit our product page here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET launches new Telco and ISP product offering

BRATISLAVA – May 31, 2022 – ESET, a global leader in cybersecurity, has announced a new suite of products for the Telecommunications and Internet Service Provider (Telco and ISP) industry, with the aim of offering extensive protection to consumers. Cybercrime is a borderless problem and ESET telemetry shows that the volume of cyberattacks is increasing, with a trend toward attacks against smartphones. ESET has decided to leverage its leading technologies to create industry-specific solutions to help combat these threats.

“Imagine internet security accessible through one click. At ESET, we always develop products with our customers in mind, and with our ESET NetProtect offering we have created an easy-to-use and elegant solution not only for the industry leaders in the Telco and ISP sector, but for the consumers who are the actual end users of our products,” said Mária Trnková, ESET’s VP for the consumer and IoT segment. “We see ourselves and our technologies as the guardians of progress that digital technology enables and our objective is to provide effective digital security that keeps consumers safe in every moment and in any eventuality.”

About the new ESET NetProtect products
The new offering includes ESET NetProtect for Mobile and ESET NetProtect for Mobile Advanced, which offer security via mobile networks, and ESET NetProtect for Home Advanced, which helps secure fixed network connections. These protect customer devices connected to Telco and ISP networks (fixed or mobile) against malicious web domains or domain categories such as malware, phishing, and potentially unwanted content. With ESET NetProtect Advanced (fixed or mobile), parents also have full control of their children’s filters through Web Content Filter. The management portal for end users allows them to manage the ESET NetProtect settings of their connected devices, manage their domain whitelists and blacklists, and generate security reports. The security reports give users an insight into how ESET protects their devices and summary information about detected threats, blocked webpages and more.

Thanks to easy integration into Telco and ISP network services and existing activation processes, network-level solutions do not require any software installation on end user devices, which are compatible with both Android and iOS. The solutions are provided as a one-click service activation from the users’ trusted internet provider and automatically provide protection to any connected device. Security tailored to customers’ needs is ensured by offering robust local customer and partner support coverage along with comprehensive protection that is a step ahead of online threats via ESET’s first access to a unique set of malware detected and pooled at a worldwide network of research and development centers.

ESET is owned by cybersecurity experts, the architects of its award-winning, science-based technology. With a presence in over 200 countries worldwide and 13 research and development centers around the world, ESET offers its over 400,000 business customers peace of mind that their interests are protected at all times. ESET also helps protect the Google Play store and is trusted by millions of consumers around the world. To read more about the new offering for Telcos and ISPs or to contact the ESET team for more information, please click here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Update Released For ActiveImage Protector™ 2022

Wildomar, CA — Actiphy Inc., a leading publisher of backup, disaster recovery, and virtualization software announces an release update of ActiveImage Protector 2022, that places an emphasis on minimizing Recovery Time Objectives (RTO).

Background

Businesses are required to prepare and implement disaster recovery, and business continuity plans. Natural disasters have become more impactful, and as global uncertainty increases, the threats of cyber-attacks are becoming more common. Corporate systems are becoming exposed and exploited. When disaster strikes, RTO is the most important benchmark for defining the quantity of time allowed for a system, app, or a process to be down and recovered before effecting significant damage to the business.

Reduce RTO using Actiphy’s HyperRecovery LIVE!™ to boot up a system from a backup image as a VM in a cloud or on-premise hypervisor and recover it simultaneously. With In-Cloud Standby™, keep an up-to-date instance of the system ready to start up and succeed the failed system.

Updated Features

  • HyperRecovery LIVE!
    Directly boot a virtual machine from a backup while migrating the virtual machine to a restored target, eliminating a separate restore process.

  • In-Cloud Standby
    Maintains the most current backup images as bootable standby machines in the cloud ready to succeed a failed system.

  • In-Cloud Recovery from On-premise or In-Cloud Storages
    Supports recovery of sources on cloud-bridged virtual networks (VLAN) and SFTP resources outside the cloud, or access cloud storage from outside the cloud environment.

  • RescueBoot and Remote Maintenance
    RescueBoot boots into Windows RE mode to perform cold backups, system recovery, or to remotely perform maintenance or diagnostics from the operating system.

  • File Backup Enhancements
    Newly added, exclusion of specific files or folders and supports the backup of Network Shared Folders.

  • Enhanced LTO Tape Management
    With newly enhanced management of LTO tape pools and libraries, tapes can now be moved within the library to be isolated from potential ransomware attacks.

ActiveImage Protector 2022 is a backup and recovery solution that protects physical and virtual, Windows and Linux environments. ActiveImage Protector includes all the tools necessary for enterprise-level deployment and management of backup, recovery, standby switch-over, and migration.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.

Sum-up of compliances

Being compliant with standards means being a quality product. That’s exactly what we are about to discuss in the article below.

SafeDNS helps organizations become compliant with CIPA, IWF, BpjM, HIPAA and other regulations, but for the users new to web filtering, these abbreviations might mean nothing. Whether you are an experienced user or a newbie, the below will clear out any questions you have on various compliances.

Why is CIPA important?

Since the Children Internet Protection Act was passed in 2000, a lot of the online environment had changed. Global digital population is now 5 billion users and counting, but back then in the beginning of the digital era it was about 300 million.

Access to the internet for a lot of teenagers and kids was only available in a school or a public library. Being interested in everything on the global web, students did more than just their homework – the whole internet was opening up for them as the school years were going by. Respectively, the government had to introduce some guidelines for schools & libraries on how to protect the kids from the content they should not see.

That is how and what for CIPA, a document that regulates the exposure of inappropriate content to children, was created back in 2000.

To be CIPA compliant means to guarantee cybersecurity of the schoolkids from obscenity, child pornography & harmful content.

Here is a CIPA compliance checklist.

IWF & Project Arachnid

Being IWF compliant means being against child pornography and blocking all child abuse content online. Internet Watch Foundation has formed a list of URLs to be blocked, and it is constantly updating.
Project Arachnid is also a charity against child sexual abuse based in Canada. The Canadian Centre for Child Protection has already processed 141 billion+ images of child abuse.Those also form the list of prohibited resources that web filtering restricts access to.

BPjM

Similar to the previous regulations, this one comes from Germany. The Federal Review Board for Media Harmful to Minors (German: Bundesprüfstelle für jugendgefährdende Medien or BPjM) is a German federal agency that is responsible for censoring media that is suspected to be harmful to the younger generation. The results of such works are formed in The List of Media Harmful to Young People which includes movies, games, printed resources and audio recordings. Once a piece enters the List, it stays there for 25 years. After this period, it might be left out and thought to be no longer harmful or left in.

Here is a BpjM compliance checklist.

HIPAA

Health Insurance Portability and Accountability Act is aimed to safeguard PHI, protected health information. Such information may include names, addresses, phone numbers, medical records, or even photos. What web filtering can do in this regard is to prevent a data breach by simply not gaining access to malicious websites at the corporate network level.

Here is a HIPAA compliance checklist.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

SCADAfence named as finalist for 2022 SC Media award in Category “Best SCADA Security Solution”

Tel Aviv, Israel, May 17, 2022SCADAfence, the global leader in cybersecurity for Operational Technology (OT) & Internet of Things (IoT) environments, today announced that the SCADAfence Platform has been named a Trust Award finalist in the category “Best SCADA Security Solution“ as part of the 2022 SC Awards. SCADAfence previously won the award in 2021.

In including SCADAfence as a finalist, SC Media recognized the contributions the SCADAfence platform makes in addressing the need for critical infrastructure to be safeguarded from attacks.

Finalists in this category were chosen by an expert panel of judges with extensive knowledge and experience in the cybersecurity industry. The announcement was made online Monday, May 17 as part of SC Media’s 2022 SC Awards coverage.

SCADAfence currently protects some of the largest industrial facilities in the world. Notable customers include the largest manufacturing plant in Europe, a Fortune 100 oil and gas enterprise in the United States, the world’s largest automotive manufacturer, the world’s largest aluminum producer, multiple power plants, water & wastewater facilities, and the largest building management system (BMS) operator in Japan.

“To be recognized again as a category leader in SCADA security is a true honor, “ said Elad Ben-Meir CEO of SCADAfence. “Since winning this prestigious award in 2021, SCADAfence has continued to achieve astonishing success, including growing the number of facilities we protect, forming strategic partnerships with several industry leaders, and growing and improving the SCADAfence platform. Being named a finalist by SC Media is a true testament to the phenomenal work being done by our engineers and security experts.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

OSINT – Pt.2 – Intelligence Cycle and OSINT Framework

Intro

Now that we’ve covered some basics of what OSINT is, why we use it, and how it might benefit us, let us look at the core of what makes up our collective intelligence effort. Do note that even though we should be familiar with this, every analyst should develop their own techniques, methods, and even tools, depending on the case they’re investigating. Think of what we’re describing below as a loose guideline that can be used in your investigations.

Also, please note that the Intelligence Cycle, as described below, is of a broader scope, and doesn’t necessarily pertain to OSINT investigations exclusively. However, from our perspective it is vital to be at least familiar with it, which is why we chose to dedicate that much space to it.

Intelligence Cycle

The Intelligence Cycle is the process of compiling raw data into intelligence that can be used to make decisions, be it for LE use, or for business driven purposes. In its nature, the Intelligence Cycle is cyclical (hence Intelligence Cycle) – meaning that what we’ve discovered previously can influence the following routes of our investigation. The goal here is to remain open to new information, and understand that it can impact the current state of affairs in our investigation.

The Intelligence Cycle consists of five parts: 

  1. Planning and Direction
  2. Collection
  3. Processing
  4. Analysis and Production
  5. Dissemination

Planning and Direction

This part involves the management of the whole investigation, from identification of our intelligence needs, to delivering of the said intel. It is both the beginning and the end of the cycle, because it involves defining our needs (planning), the end, because once finished our new intel can produce new informational needs. This is due to the fact that our intel needs to work hand-in-hand with our decision making, which might change once we reach the end – thus leaving us at the beginning of the cycle once more.

Collection

To collect intel effectively, we need to have a good plan that we’ll stick to, as well as some sort of direction. Since in this phase we’re collecting raw data, open sources can be a treasure trove for us here; also, in the context of a pure OSINT investigation, here we would implore the analyst to pay most of their attention, and deploy their critical thinking ability as much as possible. Data can be extremely volatile, and we need to understand not only the data points itself, rather we should visualize the broader picture. (Once more, the Intelligence Cycle is a bit more broader, and goes beyond only open source data)

Processing

In this step, we convert the raw data that we’ve gathered into a format an analyst can work with. This entails managing our information, through whatever techniques we may deem necessary for our particular investigation. We reduce the data, arrange, and process it in such a way that it can be of use to the one who would be consuming it.

It follows that this step will differ greatly if we are, for example, processing our data for a LEA, or if its an investigation where we would be the consumer of the said information – if we are maybe gathering intel for a penetration test; at least before compiling the report for our client.

Analysis and Production

Analysis and production pertains to us converting all of the information that we’ve processed, into a finished product. This intel is evaluated, integrated, and further analyzed. The data is integrated into one coherent whole, what was evaluated is put in context, and then produced into a finished piece of intelligence – which includes assessments, and implications of the intel, in that particular context.

Dissemination

In this final phase, we distribute our intel to the consumer, the same ones who initiated the process with their intelligence needs and requirements. Then, based on the information, the consumer would make their decisions, which may trigger the Intelligence Cycle again.

Thoughts, conclusions

It is apparent that this type of approach is generally more geared toward LEA’s, or some businesses, but, as an aspiring OSINT analyst, we should be aware of how these things are usually done. There’s a lot of things for us to unpack here, and even though we might not use or need to follow the exact same steps, we will, however, still act somewhat in convergence with the model above.

The main takeaway, for us, is the fact that this kind of approach has a great impact on how we can further use our own critical thinking and deductive skills, since critical thinking is the most important skill an OSINT analyst needs to possess – in our opinion. That is, the ability to think rationally about the topic, in an organized way, so that we can best understand the connection of the facts that are presented to us.

For example, we should always look to define our problems and/or questions as precisely as we can. We also need to find different sources – in order to understand different points of view. Further, we should evaluate the reliability of said sources, understand if they’re biased, and if that’s the case, then we would be interested in how’s and why’s.

Once we’ve weeded out some of those crucial questions, and further crystallized our picture, we would try and understand what’s most important of the facts that we’ve gathered. Finally, once we do all of that successfully, we need to know how to present this coherently, to whomever might be the party to which our investigation refers to.

With all this in mind, of course every analyst’s process will differ, but the way in which we go on about our investigation, should be grounded around some of the same core principles. Remember, your greatest and most important tool is your ability to rationalize, analyze, connect the dots, and make good deductions based on all of that – your critical thinking ability.

OSINT Framework

Before concluding our article, we would like to mention one more thing – the OSINT Framework.

This is a web-based platform, which bundles a lot of different OSINT tools – on many different themes, such as: IP address, Images, Social Networks, People Search Engines, Public Records, Metadata, Dark Web, and many more.

Most of them are free to use, but there’s a number of tools that are subscription-based. Nevertheless, this can be a great starting point for your investigation, and is something every OSINT analyst should be well aware of, in our opinion.

OSINT Framework Homepage

Conclusion

To conclude, we’d just like to mention that the idea behind ‘teasing’ with the OSINT Framework in this article is due to the fact that our next article will focus on some of the tools one might use in their investigation, so we felt it was a good inclusion and a natural transition; at least now that we’ve laid some groundwork, and explained, albeit briefly, some of the core intelligence gathering ideas.

As we will see, there’s a myriad of tools out there, and everybody has their own preferences, but the ideas behind them are generally nested around their theme/functionality.

Lastly, here’s another teaser for you, before we go delving into the tools in our next article!

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Topia
TOPIA is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

Why You Should be Leveraging Nmap for Network Endpoint Security

We have all been there. We are at a new place with new devices and the previous person did not keep good records. Now we’re being asked to secure the network without losing current functionality. Allow the good devices and block the bad, or at least put the bad on the guest network. So, what are all the devices on the network?

Some of the devices will be easy to identify and others not so much. An invaluable free tool to help you get started is Nmap (https://nmap.org/) . This tool helps you do a quick scan of your network to help find out how much you know and how much you don’t know.

How Nmap Enables Endpoint Visibility

You can run Nmap from the shell prompt, among the myriad of other command line options, but an easier way to get started is to use the Zenmap tool that has a UI to help you navigate your initial discovery.

One helpful feature of both the Nmap command line tool and Zenmap is the ability to output the results as XML. This output then allows you to use additional data parsing techniques to dig further into your data and look for patterns that can help you identify various devices with some detective work.

Nmap does a great job at identifying certain devices, but it’s not a comprehensive resource for all IoT devices in the market. Most of the time, you can identify the laptops, servers, and networking devices in your network, but not the mass of IoT devices people carry around or use in modern offices. TVs, projectors, lightbulbs, phones, and other harder to identify devices need to be properly identified especially as you strive to not interrupt business as usual.

Getting Started With Nmap

Let’s work through a small example on how to use the results from Nmap to help identify groups of devices on your network to help you determine network security rules for applications like your Network Access Control (NAC) software.

First, we will install Zenmap to help us through our process. The latest instructions can be found here: https://nmap.org/zenmap/

Running a Scan on Your Network

After installation, we select to run an intense scan on a subnet of our network. In this case the 192.168.1.X part of our network by specifying the proper CIDR notation.

The UI shows you the resulting command line from your profile selection should you choose to use the command line in future scripts. Look here for formatting your output to your desired format. For this example, we will be using the -oX option from Zenmap which allows us to look at and search the XML.

Examining Your Scan Results

Running this scan on a network you have access to might yield a typical IoT set of results.

As you can see there are many devices that are identified as Linux OS and unknown OS. Also, there is the easily identified Windows OS which is one of the laptops on the network, and many MacOS devices which include the Macbooks, iPhones, Apple watches, and other devices that attach to the network.

Classifying Unknown IoT Devices

Since many IoT devices use a base Linux OS, let’s see if we can find a pattern to help classify a larger subset of these unknown devices.

By selecting a device from our list, we can find some good details about what the device might be. Selecting the “Port/Hosts” and “Host Details” tabs we get some insightful data into the identity of this device.

Host Details (Enlarge)

Ports/Hosts (Enlarge)

Already we see that one of the ports is associated with Amazon devices. There is one more hint in the XML output which can be obtained from the menu selection Scan -> Save Scan and opening the XML in Visual Studio Code.

Here we can see that the MAC vendor (the manufacturer of the network access card) is also Amazon Technologies. MAC vendors are identifiable from the first three bytes of the MAC address and searchable from such online sources as https://standardsoui.ieee.org/oui/oui.txt

Filtering Out Devices From Results

With these hints we can start to look at our network with the lens of filtering out all Amazon devices like Alexa Echo Dots and Fire TV sticks.

A short PowerShell script run on the XML output yields the results that follow:

Or even better, you can use this script to get the IP addresses of those same devices, although you will still want the MAC addresses for NAC and other purposes.

This tells us that we likely have 8 devices on our network from Amazon and I could start to scan our larger network looking for IP addresses for MAC addresses belonging to Amazon and classifying those devices. Our network is one step closer to being secure.

Use Nmap to kickstart your network detective work and get your network more secure by knowing what devices are out there.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Why Wind Farms’ OT Networks Could Be Ransomware’s Next Big Target

A Change In The Air

The past several decades have seen a seismic shift in how the world thinks about energy. Concerns about climate change and global geopolitics have caused many nations to declare a goal of moving on from dependency on fossil fuels toward more renewable energy sources, such as wind power.

Continue reading

New AppBlocker feature

As you might have already noticed, our dashboard has a “new” flag – it means AppBlocker is now added to the SafeDNS infrastructure.

AppBlocker is a feature that blocks access to various groups of apps. It helps users keep the business infrastructure safe with a more granular filtering & easily block all domains related to certain applications, such as file sharing, system monitoring, VPNs etc. Basically, any apps that might bring any cybersecurity risks upon your business or data theft to your system.

The apps form groups for blockage:

  • ecosystems (Apple, Google, WeChat and more),
  • file sharing services (Dropbox, uTorrent, 4shared and more)
  • messaging apps (Slack, Snapchat, Viber and more),
  • portals (Baidu, Yahoo etc),
  • technology services (GitLab, GitHub),
  • VoIP (RingCentral, Zoom, LogmeIn and more),
  • VPN services (NordVPN, CyberGhost VPN and more),
  • cybersecurity services (Shodan, Zscaler),
  • financial services (Ethermine, Flypool and more),
  • mail services (ProtonMail, Thunderbird, Hushmail and more),
  • remote desktop services (RemotePC, AnyDesk, TeamViewer).

To see the full list of apps to block, check out the Categories tab in the dashboard, and then choose AppBlocker.

The user is free to choose any app or app group to block, as the list is fully customizable.

Try it out and see for yourself!

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.