Sunday 28 March 2021

Scantron - A Distributed Nmap Scanner


Scantron is a distributed nmap and masscan scanner comprised of two components. The first is a console node that consists of a web front end used for scheduling scans and storing nmap scan targets and results. The second component is an engine that pulls scan jobs from the console and conducts the actual nmap scanning. A majority of the application's logic is purposely placed on the console to make the engine(s) as "dumb" as possible. All nmap target files and nmap results reside on the console and are shared through a network file share (NFS) leveraging SSH tunnels. The engines call back to the console periodically using a REST API to check for scan tasks and provide scan status updates.


Checkout the Python Scantron API client for interacting with the Scantron API and driving automated workflows.


More details: https://github.com/rackerlabs/scantron

Tuesday 23 March 2021

Microsoft Defender Antivirus and System Center Endpoint Protection to automatically mitigate CVE-2021-26855

Today, Microsoft has taken additional steps to further support their customers who are still vulnerable and have not yet implemented the complete security update. With the latest security intelligence update, Microsoft Defender Antivirus and System Center Endpoint Protection will automatically mitigate CVE-2021-26855 on any vulnerable Exchange Server on which it is deployed. Customers do not need to take action beyond ensuring they have installed the latest security intelligence update (build 1.333.747.0 or newer), if they do not already have automatic updates turned on.

The Exchange security update is still the most comprehensive way to protect your servers from these attacks and others fixed in earlier releases. This interim mitigation is designed to help protect customers while they take the time to implement the latest Exchange Cumulative Update for their version of Exchange.

More details here: https://www.microsoft.com/security/blog/2021/03/18/automatic-on-premises-exchange-server-mitigation-now-in-microsoft-defender-antivirus/

Monday 22 March 2021

A pragmatic approach to improve an Organization’s Security Posture

As the Security threat landscape, these days, changes and evolves on such a frequent basis, it has becomes imperative to stay vigilant of the Cyber criminals and their ever changing tactics and techniques in a continuous manner. Organizations traditionally invest on keeping themselves updated/vigilant about the latest developments in the threat landscape through the adoption of Cyber Threat Intelligence (CTI) capabilities. Various information sources such as Blog posts, Tweets, Research papers, White papers, Vendor reports, Threat reports, Organization’s own Telemetry etc. are processed, analyzed using advance Machine Learning (ML) and Artificial Intelligence (AI) algorithms to generate actionable intelligence such as indicators of compromise (IOC), malware source IP addresses, domain names, email addresses, malicious file hashes etc. for proactive defense against these threat vectors. This traditional CTI approach to stay vigilant, however, is a very daunting task as it definitely has some limitations and challenges, such as –

·         Apart from the ML and AI, it also requires a lot of manual time and effort to read and analyze Research papers, White papers, Vendor reports, Threat reports etc. to understand the context and generate actionable intelligence.

·         Validating the actionable intelligence is also time and effort intensive and monotonous work, which eventually could have significant false positives for Blue Teams and Operations Teams.

·         Actionable intelligence could be susceptible to changes as aspects like indicators of compromise (IOC), malware source IP addresses, domain names, email addresses, malicious file hashes etc. could change, rendering the proactive detection rules useless.

·         A major portion of the CTI generated may not be relevant for the Organization’s technology footprint.

·         A huge contribution towards getting relevant real time threat intelligence is subscription based and eventually it has cost implications.

In light of the above limitations/challenges and David Bianco's Pyramid of Pain, adoption of MITRE ATT&CK Framework provides a structured way to describe adversary Tactics, Techniques and Procedures (TTP) and behavior and allows a more widespread alignment across multiple Cyber Security domains viz. Threat Intelligence & Threat Hunting, Red Teaming, Risk Management, Intrusion Detection & Response, Security Engineering, 3rd Party/Vendor Risk Assessment etc.

The Pyramid of Pain – “shows the relationship between the types of indicators you might use to detect an adversary's activities and how much pain it will cause them when you are able to deny those indicators to them”. This means, it is very easy for an adversary to change the malware source IP addresses, domain names, email addresses, malicious file hashes etc. to make rendering the proactive detection rules useless; however, it is very difficult for an adversary to change the tactics, techniques and procedures.


Hence instead of depending on just the IOCs and actionable intelligence to achieve resilience, adopting a TTP based detection and alerting mechanism is preferred. This is where adoption of MITRE ATT&CK Framework becomes the need of the hour to create a more effective threat-based awareness of Security loopholes that adversaries could exploit. This in turn improves the actionability of CTI for effective defense against these threat vectors.


Additionally, this framework could be leveraged to take strategic and tactical decisions around Vendor Partnership or 3rd Party Security Software/Service investments. Plotting the coverage of these Vendors/Products against the detection/alerting/remediation capabilities against the ATT&CK TTPs and the Organization’s Security loopholes can channelize the Vendor Partnership or 3rd Party Security Software/Service investments in the most pragmatic manner.

Saturday 20 March 2021

A quick snapshot of an Cyber Security Domains

This is a brief & conceptual map of all the major focus areas of Cyber Security. This is more of a quick snapshot of the Cyber Security Domains that requires proper planning and strategies carved out to improve an Organization's overall Security posture.    


Further, to deep dive into each of these sub areas, you may dissect it further to get a more granular picture of what all sub areas require more attention and focus.


Note: In no way this is a limited to or an exhaustive list at all, rather a POV representation.

 


Tuesday 16 March 2021

Exchange On-prem Mitigation Tool For ProxyLogon Exchange Server Cyberattacks

 

Microsoft on Monday released a one-click mitigation software that applies all the necessary countermeasures to secure vulnerable environments against the ongoing widespread ProxyLogon Exchange Server cyberattacks.

Called Exchange On-premises Mitigation Tool (EOMT), the PowerShell-based script serves to mitigate against current known attacks using CVE-2021-26855, scan the Exchange Server using the Microsoft Safety Scanner for any deployed web shells, and attempt to remediate the detected compromises.

"This new tool is designed as an interim mitigation for customers who are unfamiliar with the patch/update process or who have not yet applied the on-premises Exchange security update," Microsoft said.

Detailed info: https://thehackernews.com/2021/03/use-this-one-click-mitigation-tool-from.html 

The 2021 CrowdStrike®️ Global Threat Report

 Get the CrowdStrike® 2021 Global Threat Report -- one of the industry’s most highly anticipated reports on today’s top cyber threats and adversaries.

Top Phishing Email Subjects