Use the Count API to estimate Vault API export sizes

Quick launch summary 

We’re adding a Count API to the Vault API. The Count API enables you to see the number of messages, files, or other data items that match a search query. 

You can use the number of items to estimate the size of the export, and then choose to proceed with the export or adjust the query to retrieve fewer items. This can help ensure a successful export by reducing the likelihood of export errors due to size. 

Getting started 

  • Admins: Visit the API documentation to learn more about the Count API and review an example. 
  • End users: No end user impact. 

Rollout pace 

Availability 

  • Available to Business Plus, Enterprise Standard, Enterprise Plus, Enterprise for Education, as well as other customers with the Vault add-on license 
  • Not available to Essentials, Business Starter, Business Standard, Education, and Nonprofits customers  

Resources 

Roadmap 


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Inbox placement through the lens of a marketer

A marketer's gear

When you Google “how do I land my emails in inbox,” you’ll find close to 195,000,000 results.

While this doesn’t come as a surprise considering the longevity of email marketing, it certainly testifies to one thing: Email deliverability (inbox placement) is arguably the most-discussed topic in email marketing. This is because the process equally involves the email marketer, email marketing platform, and the Inbox Service Providers. And the resulting area of intersection is a bit challenging to understand while starting off.

Participants of email marketing process

In our recently concluded webinar, we set out to explain email deliverability in simple terms.

 

Here’s the rundown of the conversations we had during the webinar. For those of you who prefer reading, we decided to summarize the webinar’s key takeaways below.

Key terms 

ESP – Email Service Providers (for example, Zoho Campaigns)

ISP – Inbox Service Providers, aka mailbox providers (for example, Gmail)

Email-sending domain – Your own domain associated with the email marketing platform (for example, zylker.com) 

Lookup site A site that provides crucial information about a domain in an easy-to-understand way

DNS – Domain Name System

User scenario

Alex is a marketer trying to reboot email marketing for his company, Zylker. He’s signed up for an email marketing platform and is going to send his first email campaign as per the user manual.

Your takeaway

Alex’s first email campaign will help you learn three aspects:

  • The role of anti-spam services and Inbox Service Providers in email marketing
  • The whys and hows of configuring your email marketing software
  • The specifics of content creation and mailing list management

In summary, you’ll learn what happens after you hit an email’s send button and how to put the best foot forward to achieve inbox placement.

Step one: Studying the domain’s reputation

Before associating his domain with the email marketing software, Alex wants to ensure that it’s not in the bad books of anti-spam services. To check this, he turns to one of the lookup sites.

Reasoning:

Anti-spam services create and maintain blacklist(s), online registries of domains and IP addresses that were used to send any form of spam. Some of the mailbox providers likely join forces with anti-spam services to strengthen their security system. This way, they accurately prevent an incoming email with blacklisted domains and IPs from reaching the mailboxes.

The image below shows how Spamhaus—one of the prominent anti-spam services—contribute to email security.

Spamhaus and ISPs

Source: Spamhaus

While these services use different under-the-radar techniques to maintain blacklists, the usage of spam traps is widely known.

Step two: Associating the domain

After knowing the domain is in the good books of anti-spam services, Alex creates a subdomain to easily narrow down email-deliverability problems in the future and safeguard the reputation

Difference between domain and subdomain

Reasoning:

When you use your primary (or parent) domain for several purposes, there’s no room for error at all. A non-email-marketing problem hurting your domain’s reputation has a bearing on your email marketing and vice versa. This is where subdomains come into play; they help you identify email-deliverability-based problems with a macroscope instead of a microscope. The best part? It works as a separate domain while still being connected to your primary domain.

Step three: Authenticating the domain

Now Alex has to prove that he’s a safe and authenticated sender in the eyes of mailbox providers (because of rising spam activities). To achieve this, he uses two mechanisms prescribed by his ESP: Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). He copies the SPF and DKIM records exclusively generated by his ESP and pastes them in the TXT record of his domain’s DNS.

Domain authentication

Reasoning:

Since your emails are always bypassed via the servers of your ESP, their domains and IPs also enter the picture. Therefore, the mail servers of your recipients ask a question to your ESP: “How can we ascertain that this email is actually from the concerned sender?” This is when the SPF and DKIM mechanisms come in handy.

With the SPF record, the ESP will hint the domain and IPs assigned for your account. (They also communicate to the mailbox providers the entire set of domains and IPs used by them.) By publishing the SPF record on your DNS, you validate your email’s point of origin.

SPF flowchart

With the DKIM record, a unique alphanumeric key is assigned to your account. So every time you send an email, an encrypted code along with a special header is added to it by the ESP. The code is then decrypted by your recipients’ mail servers using the key present in your DNS, thereby again validating the email’s point of origin and, most importantly, ruling out any possibilities of foul play in transit.

DKIM flowchart

Step four: Crafting content

With the account set up, Alex is now raring to use the creative freedom that ready-made email templates offer. He heads over to the template editor and customizes the template, ensuring that his email is a combination of plain text, image, and, most importantly, (healthy) URLs.

Reasoning:

The ultimate goal of every email marketer is this: creating content that persuades their audience to complete the end action. The scoring system of mailbox providers—which is used to gauge your email-sending domain’s reputation—is also in line with that.

The way your recipients react to your email generates positive and negative scores. If someone clicks your links (preferably and visibly embedded as CTA buttons or hyperlinks), you garner the highest-possible score. However, if your score declines below the cut-off range, your domain gets blacklisted.

Scoring system of ISPs

Now comes a question: What if you’re using a brand-new domain that has a zero reputation? Simple! Warm up your domain. Start off with low-volume emails, build a positive reputation, and go through the gears.

Step four: Selecting the recipients

Since Alex is resuming email marketing for Zylker after a hiatus, he wants to know how healthy the current mailing lists are. For this, he turns to the analytics of the previous campaigns.

Subsequently, he segments the database into three based on receptiveness: inactive contacts, partly active contacts, and highly active contacts. Finally, he overlooks the inactive contacts and associates the other two segments for this campaign.

Reasoning:

Continuously sending emails to (highly) inactive contacts can affect your domain’s reputation in the long run. Furthermore, if a contact doesn’t access their mailbox for a very long time, the ISPs convert the email address into a spam trap. (This is called recycled spam traps, and the cut-off time before the email address is converted into a spam trap varies from one ISP to another.) If an email is sent to such spam traps, it takes a huge toll on your reputation.

Inactivity period set by ISPs

 

Note: Like anti-spam services, the ISPs also generate pure spam traps (fake email addresses) and disseminate them on the internet, presuming spammers will use or sell them in the dark-web marketplaces. From there, it’s only a matter of time before it reaches email marketers who’re looking to purchase mailing lists. Here’s an extensive guide on spam traps and how to avoid them.

 

Alex is set to push the send button now. And, like most email marketers, he can’t wait to come back and check the analytics so he can sharpen his next campaign.

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

New default video playback option in Google Slides

Quick launch summary 

We’re updating the default way videos play when you present in Google Slides. Now, the video will start playing when you click to advance the presentation. Previously, the presenter had to specifically click on the video to start playing. 

With this launch, there are now three options to control playback: 

  • Play (on click) – Video will play when you advance the slide. (This is the new default option.) 
  • Play (automatically) – Video will play without you clicking to advance. 
  • Play (manual) – Video will play when you click specifically on the embedded video in the slide while presenting. (This was previously the default.) 

The new play on click option works the same way as any other animation or slide transition. When you’re presenting a slide with an embedded video, advance the slide by pressing a key, clicking a mouse, or using a remote clicker, and the video will start playing. You can adjust the sequence the video plays in the animations sidebar, so you can coordinate playback with other animations on the slide. 

Note that this change in default behavior will only apply to videos inserted after the launch takes place. Videos already in presentations will not change playback type automatically, but you can change them manually in the format options. 

The new default will help make presentations flow better and reduce distractions, so presenters can focus on content rather than where they have to click. 

Getting started 

  • Admins: There is no admin control for this feature. 
  • End users: This feature will be ON by default and can be turned off for any video in video format options. Visit the Help Center to learn more about videos in Slides. 

Rollout pace 

Availability 

  • Available to Essentials, Business Starter, Business Standard, Business Plus, Enterprise Essentials, Enterprise Standard, Enterprise Plus, Education, Enterprise for Education, and Nonprofits customers and users with personal accounts 

Resources


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Managed Android devices must upgrade to Android Device Policy by October 26, 2021

What’s changing 

To ensure that devices enrolled by users with advanced management will continue to sync and have access to data, users in your organization must switch to Android Device Policy before October 26, 2021. If users still have Google Device Policy on this date, they won’t be able to sync their devices or access data.

 

Devices enrolled by users with basic management must move to Android 6.0 Marshmallow or later before October 26, 2021 to continue enforcing a screen lock. If a user’s device can’t be upgraded to Android 6.0 or later, their device will continue to sync and retain access to data, however it will not be able to enforce a screen lock. 

Who’s impacted 

Admins and end users 

Why it’s important 

The latest Android devices and operating system (OS) versions provide improved security features. Moving to Android 6.0 (Marshmallow) or newer can help ensure all devices are protected by the latest security features, and can take advantage of improvements in the Android enterprise experience. 

Getting started 

Rollout pace 

Availability 

  • Available to Business Starter, Business Standard, Business Plus, Enterprise Essentials, Enterprise Standard, Enterprise Plus, Education, Enterprise for Education, and Nonprofits customers 
  • Not available to G Suite Essentials 

Resources 


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

The Human Challenge – Sophos News

Based on a comprehensive survey of 5,000 IT managers across 26 countries, Cybersecurity: The Human Challenge provides brand new insights into the state of cybersecurity skills and resources across the globe.

It reveals the realities facing IT teams when it comes to the human-led delivery of cybersecurity, and explores how organizations are responding to the skills challenges they face.

The study also exposes unique insights into the relationship between an organization falling victim to ransomware and their day-to-day cybersecurity practices.

Key findings

IT teams are showing progress in many battles

  • IT teams are on top of patching. Three-quarters of IT teams apply patches to desktops, servers, applications, and internet-facing assets within a week of release. Servers and internet-facing assets are patched most quickly, with 39% of respondents patching them within 24 hours.
  • Prevention is prioritized. On average, IT teams dedicate nearly half their time (45%) to prevention. After that, 30% of time is spent on detection and the remaining 25% is spent on response.
  • IT managers are keeping up to date with cybersecurity. The majority (72%) say that they and their teams are up to date with or ahead of cybersecurity threats. Just 11% think they are significantly behind.

Improving cybersecurity requires people – who are in short supply

  • There is an urgent need for human-led threat hunting. Forty-eight percent of respondents have already incorporated human-led threat hunts in their security procedures and a further 48% plan to implement them within a year.
  • The cybersecurity skills shortage is directly implementing protection. Over a quarter (27%) of managers said their ability to find and retain skilled IT security professionals is the single biggest challenge to their ability to deliver IT security, while 54% say it is a major challenge.

Organizations are changing the ways they deliver security

  • Improving operational efficiency is a key priority. Four in ten (39%) respondents said that improving operational efficiency and scalability is one of their biggest priorities for the IT team this year.
  • Outsourcing IT security is rising fast. Currently, 65% outsource some or all of their IT security efforts. This is set to rise to 72% by 2022. The percentage of organizations that exclusively uses in-house staffing will drop from 34% to 26%.

Ransomware victims display different behaviors and attitudes than those who haven’t been hit

  • Ransomware victims are more exposed to infection from third parties. Twenty-nine percent of organizations hit by ransomware in the last year allow five or more suppliers to connect directly to their network – compared to just 13% for those that weren’t hit.
  • Ransomware damages professional confidence. IT managers whose organizations were hit by ransomware are nearly three times as likely to feel “significantly behind” on cyberthreats than those that weren’t (17% vs. 6%).
  • Being hit accelerates implementation of human-led threat hunting. Forty-three percent of ransomware victims plan to implement human-led hunting within six months, compared to 33% for those that didn’t suffer an attack.

  • Victims have learned the importance of skilled security professionals. More than one-third (35%) of ransomware victims said recruiting and retaining skilled IT security professionals is their single biggest challenge when it comes to cybersecurity, compared to just 19% who hadn’t been hit.

 

Download the full PDF report for more findings, including results for each of the 26 countries surveyed.

About the survey

Sophos commissioned specialist research house Vanson Bourne to survey 5,000 IT managers during January and February 2020. Sophos had no role in the selection of respondents and all responses were provided anonymously.

Respondents came from 26 countries across six continents: Australia, Belgium, Brazil, Canada, China, Colombia, Czech Republic, France, Germany, India, Italy, Japan, Malaysia, Mexico, the Netherlands, Nigeria, the Philippines, Poland, Singapore, South Africa, Spain, Sweden, Turkey, UAE, the UK, and the US.

Fifty percent of respondents were from organizations of between 100 and 1,000 employees, and 50% were from organizations of between 1,001 and 5,000 employees. Respondents came from a range of sectors, both public and private.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Sophos Firewall Manager SFM 17.1 MR5 Released – Release Notes & News – XG Firewall

Hi XG Community!

We’ve released Sophos Firewall Manager SFM 17.1 MR5. Initially, the firmware will be available by manual download from the Licensing Portal. We will gradually release the firmware via auto-update to customers.

This MR is solely to allow limited support for XG v18 MR3 firmware. Please note that v18 support in SFM is very limited, and most SFM features are not supported. Please migrate to Sophos Central to fully group manage firewalls running v18 firmware. 

Updates Included

  • NCCC-10106, NCCC-10125 [SFM] Support for XG v18 MR3 compatibility

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

inside a new Ryuk ransomware attack – Sophos News

The operators of Ryuk ransomware are at it again. After a long period of quiet, we identified a new spam campaign linked to the Ryuk actors—part of a new wave of attacks. And in late September, Sophos’ Managed Threat Response team assisted an organization in mitigating a Ryuk attack—providing insight into how the Ryuk actors’ tools, techniques and practices have evolved. The attack is part of a recent wave of Ryuk incidents tied to recent phishing campaigns.

First spotted in August of 2018, the Ryuk gang gained notoriety in 2019, demanding multi-million-dollar ransoms from companies, hospitals, and local governments. In the process, the operators of the ransomware pulled in over $61 million just in the US, according to figures from the Federal Bureau of Investigation. And that’s just what was reported—other estimates place Ryuk’s take in 2019 in the hundreds of millions of dollars.

Starting around the beginning of the worldwide COVID-19 pandemic, we saw a lull in Ryuk activity. There was speculation that the Ryuk actors had moved on to a rebranded version of the ransomware, called Conti. The campaign and attack we investigated was interesting both because it marked the return of Ryuk with some minor modifications, but also showed an evolution of the tools used to compromise targeted networks and deploy the ransomware.

The attack was also notable because of how quickly the attacks can move from initial compromise to ransomware deployment. Within three and a half hours of a target opening a phishing email attachment, attackers were already conducting network reconnaissance. Within a day, they had gained access to a domain controller, and were in the early stages of an attempt to deploy ransomware.

The attackers were persistent as well. As attempts to launch the attack failed, the Ryuk actors attempted multiple times over the next week to install new malware and ransomware, including renewed phishing attempts to re-establish a foothold. Before the attack had concluded, over 90 servers and other systems were involved in the attack, though ransomware was blocked from full execution.

Let the wrong one in

Initial compromise, reconnaissance and lateral movement phase of Ryuk attack

The attack began on the afternoon of Tuesday. September 22. Multiple employees of the targeted company had received highly-targeted phishing emails:

From: Alex Collins [spoofed external email address]

To: [targeted individual]

Subject: Re: [target surname] about debit

Please call me back till 2 PM, i will be in [company name] office till 2 PM.

[Target surname], because of [company name]head office request #96-9/23 [linked to remote file], i will process additional 3,582 from your payroll account.

[Target first name], call me back when you will be available to confirm that all is correct.

Here is a copy of your statement in PDF[linked to remote file].

 

Alex Collins

[Company name] outsource specialist

The link, served up through the mail delivery service Sendgrid, redirected to a malicious document hosted on docs.google.com. The email was tagged with external sender warnings by the company’s mail software. And multiple instances of the malicious attachment were detected and blocked.

But one employee clicked on the link in the email that afternoon. The user opened the document and enabled its content, allowing the document to execute print_document.exe—a malicious executable identified as Buer Loader. Buer Loader is a modular malware-as-a-service downloader, introduced on underground forums for sale in August of 2019. It provides a web panel-managed malware distribution service; each downloader build sold for $350, with add-on modules and download address target changes billed separately.

In this case, upon execution, the Buer Loader malware dropped qoipozincyusury.exe, a Cobalt Strike “beacon,” along with other malware files. Cobalt Strike’s beacon, originally designed for attacker emulation and penetration testing, is a modular attack tool that can perform a wide range of tasks, providing access to operating system features and establishing a covert command and control channel within the compromised network.

Over the next hour and a half, additional Cobalt Strike beacons were detected on the initially compromised system. The attackers were then able to successfully establish a foothold on the targeted workstation for reconnaissance and to hunt for credentials.

A few hours later, the Ryuk actors’ reconnaissance of the network began. The following commands were run on the initially infected system:

  • C:WINDOWSsystem32cmd.exe /C whoami /groups (accessing list of AD groups the local user is in)
  • C:WINDOWSsystem32cmd.exe /C nltest /domain_trusts /all_trusts (returns a list of all trusted domains)
  • C:WINDOWSsystem32cmd.exe /C net group “enterprise admins” /domain  (returns a list of members of the “enterprise admins” group for the domain)
  • C:WINDOWSsystem32net1  group “domain admins” /domain (the same, but a list of the group “domain admins”)
  • C:WINDOWSsystem32cmd.exe /C net localgroup administrators (returns a list of administrators for the local machine)
  • C:WINDOWSsystem32cmd.exe /C ipconfig (returns the network configuration)
  • C:WINDOWSsystem32cmd.exe /C nltest /dclist:[target company domain name] (returns names of the domain controllers for the company domain name)
  • C:WINDOWSsystem32cmd.exe /C nltest /dclist:[target company name] (the same, but checking for domain controllers using the company name as the domain name)

Forward lateral

Using this data, by Wednesday morning the actors had obtained administrative credentials and had connected to a domain controller, where they performed a data dump of Active Directory details. This was most likely accomplished through the use of SharpHound, a Microsoft C#-based data “injestor” tool for BloodHound (an open-source Active Directory analysis tool used to identify attack paths in AD environments). A data dump from the tool was written to a user directory for the compromised domain administrator account on the domain server itself.

Another Cobalt Strike executable was loaded and launched a few hours later. That was followed immediately by the installation of a Cobalt Strike service on the domain controller using the domain administrator credentials obtained earlier. The service was a chained Server Message Block listener, allowing Cobalt Strike commands to be passed to the server and other computers on the network. Using Windows Management Interface, the attackers remotely executed a new Cobalt Strike beacon on the same server.

In short order, other malicious services were created on two other servers using the same admin credentials, using Windows Management Instrumentation from the initially compromised PC. One of the services configured was an encoded PowerShell command creating yet another Cobalt communications pipe.

The actors continued to perform reconnaissance activities from the initially infected desktop, executing commands trying to identify potential targets for further lateral movement. Many of these repeated previous commands. The nltest command was used in an attempt to retrieve data from domain controllers on other domains within the enterprise Active Directory tree. Other commands pinged specific servers, attempting to gain IP addresses. The actors also checked against all mapped network shares connected to the workstation and used WMI to check for active Remote Desktop sessions on another domain controller within the Active Directory tree.

Setting the trap

Late Wednesday afternoon—less than a day after the victim’s click on the phish— the Ryuk actors began preparations to launch their ransomware. Using the beachhead on the  initially compromised PC, the attackers used RDP to connect to the domain controller with the admin credentials obtained the day before.  A folder named C:Perflogsgrub.info.test2 – Copy was dropped on the domain controller— a name consistent with a set of tools deployed  in previous Ryuk attacks.  A few hours later, the attackers ran an encoded PowerShell command that, accessing Active Directory data, generated a dump file called ALLWindows.csv, containing login, domain controller and operating system data for Windows computers on the network.

Next, the SystemBC malicious proxy was deployed on the domain controller. SystemBC is a SOCKS5 proxy used to conceal malware traffic that shares code and forensic markers with other malware from the Trickbot family.  The malware installed itself (as itvs.exe), and created a scheduled job for the malware, using the old Windows task scheduler format in a file named itvs.job—in order to maintain persistence.

A PowerShell script loaded into the grub.info.test folder on the domain controller was executed next. This script, Get.DataInfo.ps1 , scans the network and provides an output of which systems are active. It also checks which AV is running on the system.

The Ryuk actors used a number of methods to attempt to spread files to additional servers, including file shares, WMI, and Remote Desktop Protocol clipboard transfer.  WMI was used to attempt to execute GetDataInfo.ps1 against yet another server.

Failure to launch

Thursday morning, the attackers spread and launched Ryuk. This version of Ryuk had no substantial changes from earlier versions we’ve seen in terms of core functionality, but Ryuk’s developers did add more obfuscation to the code to evade memory-based detections of the malware.

The organizational backup server was among the first targeted. When Ryuk was detected and stopped on the backup server, the attackers used the icacls command to modify access control, giving them full control of all the system folders on the server.

They then deployed GMER, a “rootkit detector” tool:

The GMER process hunting tool.

GMER is frequently used by ransomware actors to find and shut down hidden processes, and to shut down antivirus software protecting the server. The Ryuk attackers did this, and then they tried again. Ryuk ransomware was redeployed and re-launched three more times in short order, attempting to overwhelm remaining defenses on the backup server.

Ransom notes were dropped in the folders hosting the ransomware, but no files were encrypted.

The Ryuk HTML ransom note.

In total, Ryuk was executed in attacks launched from over 40 compromised systems,but was repeatedly blocked by Sophos Intercept X.  By noon on Thursday, the ransomware portion of the attack had been thwarted.  But the attackers weren’t done trying—and weren’t off the network yet.

On Friday, defenders deployed a block across the domains affected by the attack for the SystemBC RAT.  The next day, the attackers attempted to activate another SOCKS proxy on the still-compromised domain controller.  And additional Ryuk deployments were detected over the following week—along with additional phishing attempts and attempts to deploy Cobalt Strike.

 

Lessons learned

The Ryuk attack’s exploitation chain.

 

The tactics exhibited by the Ryuk actors in this attack demonstrate a solid shift away from the malware that had been the basis of most Ryuk attacks last year (Emotet and Trickbot). The Ryuk gang shifted from one malware-as-a-service provider (Emotet) to another (Buer Loader), and has apparently replaced Trickbot with more hands-on-keyboard exploitation tools—Cobalt Strike, Bloodhound, and GMER, among them—and built-in Windows scripting and administrative tools to move laterally within the network. And the attackers are quick to change tactics as opportunities to exploit local network infrastructure emerge—in another recent attack Sophos responded to this month, the Ryuk actors also used Windows Global Policy Objects deployed from the domain controller to spread ransomware. And other recent attacks have used another Trickbot-connected backdoor known as Bazar.

The variety of tools being used, including off-the-shelf and open-source attack tools, and the volume and speed of attacks is indicative of an evolution in the Ryuk gang’s operational skills. Cobalt Strike’s “offensive security” suite is a favorite tool of both state-sponsored and criminal actors, because of its relative ease of use and broad functionality, and its wide availability—“cracked” versions of the  commercially-licensed software are readily purchased in underground forums. And the software provides actors with a ready-made toolkit for exploitation, lateral movement, and many of the other tasks required to steal data, escalate the compromise and launch ransomware attacks without requiring purpose-made malware.

While this attack happened quickly, the persistence of the attacks following the initial failure of Ryuk to encrypt data demonstrate that the Ryuk actors—like many ransomware attackers—are slow to unlatch their jaws, and can persist for long periods of time once they’ve moved laterally within the network and can establish additional backdoors. The attack also shows that Remote Desktop Protocol can be dangerous even when it is inside the firewall.

 

IOCs for this attack will be posted on the SophosLabs GitHub here.

SophosLabs would like to acknowledge the contributions of Peter Mackenzie, Elida Leite, Syed Shahram and Bill Kearney of the MTR team, and Anand Aijan, Sivagnanam Gn, and Suraj Mundalik of SophosLabs to this report.

 

 

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Ping of Death Redux – Sophos News

Microsoft is releasing a substantial number of security fixes again in October’s Patch Tuesday release—with 11 rated “Critical” by Microsoft (including the latest Adobe Flash security update). But two vulnerabilities among those being patched stand out above these others: CVE-2020-16898 and CVE-2020-16899. These vulnerabilities—caused by a bug in Windows’ TCP/IP driver—harken back to the “Ping of Death” vulnerability fixed in Windows in 2013. They make denial of service and potential remote code execution possible with a crafted packet.

The vulnerability in tcpip.sys, a logic error in how the driver parses ICMP messages, can be triggered remotely with a crafted IPv6 router advertisement packet containing a Recursive DNS Server (RDNSS) option. The RDNSS option typically contains a list of the IPv6 addresses of one or more recursive DNS servers. 

The RDNSS option format for IPv6 ICMP packets.

There is a logic flaw in tcpip.sys that can be exploited by crafting a router advertisement packet containing more data than expected, which results in the driver putting more bytes of data on its memory stack than provided for in the driver’s code, resulting in a buffer overflow. In theory, this could be used for both denial of service and remote code execution attacks. But in practice, achieving remote code execution would be extremely difficult.

SophosLabs developed its own proof-of-concept for an attack, based on information provided by Microsoft. It leverages the vulnerability to cause a “blue screen of death” on the targeted computer.  The details of the POC are being withheld to prevent exploitation by attackers.

 

Once we understood the bug, developing a “Blue Screen of Death” proof-of-concept was fairly straightforward. But taking it to the level that Microsoft has warned is possible—remote code execution (RCE)—is not. Modern defensive coding standards and practices would slow down an effort to build a reliable generic RCE exploit, for two reasons.

First, TcpIp.sys is compiled with GS flag— which prevents a typical stack overflow from directly controlling the return address.

The stack cookie, also known as a stack canary, is a random value generate at loading time. Its value is XOR’d with the stack pointer, making it extremely hard to predict reliably—especially in a full remote exploitation.

There are two typical techniques used to bypass stack canaries, neither of which really apply in this case:

  • Using another information leak vulnerability (arbitrary read)—which won’t help much in exploiting tcpdrv.sys, because the canary value is XOR’d with the stack pointer.
  • Overwriting a Structured Exception Handling (SEH) handler, which would be useful only if a structured exception record has been set—which is not the case here.

The second roadblock to an effective RCE exploit is kernel Address Space Layout Randomization (kASLR). Even if it was possible can reliably predict the stack canary (big if) landing back to a system shell in user mode would require to correctly (and again remotely) determine the base address of the Windows kernel.

That means that even when the exact nature of the bug in tcpdrv.sys becomes more widely known, it may be some time before anyone can exploit it in a way that reliably injects code into the Windows kernel space. Even so, the threat of denial of service at will with a relatively easily-crafted packet should be enough by itself to prompt rapid patching—which is the only real fix for this vulnerability.

Sophos is in the process of deploying signatures for attacks based on this vulnerability to XG Firewall and Endpoint IPS (in EAP). The signature IDs are sid:2304055 and sid:2304163, respectively. Other short-term mitigations fir potential denial of service attacks include:

  • Disable IPv6 if not used, or
  • Make Windows discard router advertisement packets using the netsh command (netsh int ipv6 set int *INTERFACENUMBER* rabaseddnsconfig=disable).

The rest of this month’s critical vulnerabilities patched are all potential remote code execution bugs as well:

  • CVE-2020-16891: Windows Hyper-V Remote Code Execution Vulnerability
  • CVE-2020-16911: GDI+ Remote Code Execution Vulnerability
  • CVE-2020-16915: Media Foundation Memory Corruption Vulnerability
  • CVE-2020-16923: Microsoft Graphics Components Remote Code Execution Vulnerability
  • CVE-2020-16947: Microsoft Outlook Remote Code Execution Vulnerability
  • CVE-2020-16951 and CVE-2020-16952: two Microsoft SharePoint Remote Code Execution Vulnerabilities
  • CVE-2020-16966: Open Enclave SDK Remote Code Execution Vulnerability
  • CVE-2020-16967: Windows Camera Codec Pack Remote Code Execution Vulnerability

Windows Spoofing Vulnerability

Another interesting bug fixed in this Patch Tuesday’s release is CVE-2020-16922 , a bug in Windows’ verification of digital signatures of Security Catalog (.CAT) files that could potentially be used to spoof verification of trust for a potentially malicious file.

Normally, any modification done to a digitally signed file should result in the invalidation of its signature.  However, it was discovered that appending arbitrary data of any size onto the end of a signed .CAT file does not invalidate its signature in the eyes of Windows, which fails to account for the extraneous data.

This bug bears a resemblance to the Curveball vulnerability from earlier this year, but is not as critical and poses a lesser threat to users—because unlike with Curveball,  “Man-in-the-Middle” attacks are not of concern. The bug could be exploited in malware deployments, however—for example, in the crafting of a  malicious Java Archive (.JAR) file.

By taking an existing Microsoft-signed .CAT file, appending the contents of a .JAR file to it, and changing the file’s extension to .JAR, a file is produced that looks and runs like a .JAR file, but has a “spoofed”, valid digital signature. This works because the Java Runtime will search a given .JAR file for Java contents to execute, even if they are present in the middle of the file.

Most other file types do not work this way, and cannot be abused for this purpose. Attackers might use this type of vulnerability to circumvent security software around their handling of malware: a file with a spoofed digital signature can fool security software into regarding it as a legitimate Microsoft-made file and therefore increase its “reputation,” potentially to such an extent that a blind eye would be turned to an actual malware file that would have otherwise get detected.

Sophos protection

Here is a list of protection released by SophosLabs in response to this advisory to complement any existing protection and generic exploit mitigation capabilities in our products.

CVE-2020-16898 SID:2304055,2304163
CVE-2020-16899 SID:2304058
CVE-2020-16922 SID:2304140,2304142
CVE-2020-16915 SID:2304212

This and all the other vulnerabilities revealed in October’s Patch Tuesday release—especially the critical ones—offer plenty of reasons to patch as quickly as possible.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Think Twice: Email spam and its types

If there is one thing present on every email user’s wish list, it would be to never receive spam again. It’s like those inserts that fall out of a newspaper when we open it. Nobody asked for them and getting rid of them is more work than they’re worth, yet can’t escape them. Making up almost 70% of total email traffic, spam reaches every corner of the email world. Email service providers go out of their way to protect users from this problem with a wall of filters, still some of them make their way through to end up in your inbox.

One question I commonly notice users asking is, “How did the spammer get my email address?” The answer may come as a surprise. Remember that seemingly harmless form you submitted after your online Christmas shopping? The pop-up you filled out to download the latest episode of a series? A bumper email you forwarded to 100 friends promising you the chance to win a Tesla car? These are some of the sources spammers use to harvest email addresses.

Unfortunately, these social engineering methods are not the only ways they rely on. Spammers use multiple techniques, from simply deploying crawlers to pull contact information from websites and social media platforms to the more difficult method of guessing combinations of email addresses using the brute force method. Once they confirm that your email is receiving messages (using deliverability and click records), you are now forever trapped in the spammer’s database. According to TechRadar, email spammers receive approximately one reply for every 12.5 million emails. And even with a small 0.00001% click rate, the average full-time spammer makes around $7000 a day.

While spammers profiteer by sending unsolicited advertisements and fraudulent emails, the effect on a victim is often quite brutal. The dangers of loss of data, money, and privacy surrounding spam makes it more vital than ever for email users to be aware of spam, and it’s working.

Let’s take a look into some popular types of spam.

Product marketing: The one where everything’s a hoax

Here, spam is used as a marketing tool, like an advertisement to sell a product. Putting aside the fact that you never signed up for these ads, there is also another concern regarding the products spam emails advertise. These products are usually unauthorized and unregulated by any government bodies. Around March 2020, several spam emails started flying around claiming to have found the “cure to the Coronavirus.” Many users believed those spam adverts and paid to buy such items, only to be left with unapproved, ineffective, and misbranded products. So, the next time you see a spam ad you didn’t sign up for but end up feeling tempted, think twice, or even three times.

Scam: The one where bogus offers are the norm

Scam spam uses human psychology and highly engineered catchphrases to manipulate readers into believing something extraordinary can be attained with minimal effort. A few trademark subject lines of these emails would be something like “Once in a lifetime opportunity!” or “Earn $2000 a day with risk-free investment!” among others. One notable thing is that most of these scams are finance-based, usually promoting non-existent ventures, fake job offers, lottery wins, or pyramid schemes. It, more often than not, results in the victim paying lump money as “advance-fee” to enjoy the benefits of the shady scheme. After the victim pays the required money, the spammer would not only disappear without fulfilling their claim but will also steal the victim’s payment details for further exploitation. A golden rule is that when an offer looks “too good to be true,” it most probably is.

Phishing: The one where fake websites deceive you

With phishing, spammers disguise themselves as a legitimate organization, sometimes one the recipient is associated with, intending to extract sensitive personal and financial data from their victims. Phishing uses advanced social engineering techniques that require human interaction, identity theft, fraud, and advanced coding skills to extract your data. It works because most people don’t pay close attention to the little details and skims through emails or websites. So, the next time you receive an email with a link to recover your bank account and you are not sure why, hold on to that thought, look carefully, and don’t skim through the details.

Spoofing: The one where identity theft is common

The premise of spoofing lies in forging a legitimate email address to trick the recipient into believing that the email is from a trusted source. Essentially, the spammer cons you by disguising themselves to be a sender you are familiar with. Wondering how someone can make the displayed email address look legitimate in a forged email? Unfortunately, it’s not a complicated task. The shortcoming of SMTP servers email relies on is that they make it possible for a spammer to disguise the original “from” address.

Business Email Compromise (BEC)—also called man-in-the-email scams—is one of the most prominent attacks that use spoofing techniques to devise fraudulent money or data theft. This is usually done by scrapping publicly available email addresses of prominent people in an organization’s websites. And to add more, spoofing coupled with phishing can result in disastrous financial loss for the victim. So, the next time your boss emails you out of the blue asking for login credentials or an immediate asset transfer, make sure you cross-check before doing so.

Something to note: the types of spam we’ve discussed here don’t have to be confined to emails. Email is only one form of communication. And nowadays, spam happens everywhere, from social media to personal calls and messages. So beware, everywhere.

Spam is an inconvenience at best, and there are many types to be aware of. Although only approximately 2.5% of spam emails are dangerous, this small percentage involves identity theft, compromised financial security, and invaded privacy. While ignoring spam is one solution, it is not always the best. The presence of spam can be distracting and is a waste of time, storage space, and email efficiency.

Fortunately, there are ways to limit the spam you receive. We will talk more about how you can avoid spam attacks in the next blog post. But before that, what’s your take on spam? Let us know in the comments. Until we meet again, stay informed and stay safe!


Yamine Durai


Yamine Durai, a part of Zoho Mail’s marketing team, is a tech enthusiast.
But if you spot her away from office hours, you will probably find her reading a history book while honing her oratory skills.

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Responding to the rising wave of social engineering attacks against remote workers

By now, it’s clear the pandemic has provided perfect conditions for many types of social engineering attacks. We’ve seen plenty of reports and warnings from the FBI, CISA, Interpol, and other reputable organizations about the growth in coronavirus-related attacks, from spear-phishing to vishing, ransomware, and more, as the world adapts to remote working and its associated risks. 

In many ways, social distancing and remote work have created more fertile conditions for hackers, but the types of social engineering attacks we’re seeing today aren’t too different from what we’ve seen in the past. So, why are we still seeing major breaches making news headlines on a regular basis? 

If history has taught us one thing it’s that hackers will always capitalize on the human element. Uncertainty, fear, distraction, isolation, and confusion can all contribute to increased vulnerabilities among users. And as we continue to face a rapidly shifting global news agenda, we can’t possibly anticipate the next twist in the pandemic or major news event that opportunistic hackers will exploit. Look at the rise in phishing attacks related to COVID stimulus and relief for example. 

We expect to see continued social distancing and increased virtual interactions long after the pandemic subsides, which means that enterprises must rely on strong authentication to protect against the rising wave of social engineering attacks. As we lose confidence in the security of systems and information with an increasingly decentralized work environment, it’s critical to re-establish trust with your users. Here’s how:

Employee education and training is not enough.

Educating employees to be on the look-out for COVID-related scams, while essential, is not a comprehensive response. No matter how much user education about phishing or social engineering takes place, some attacks will still succeed. As long as user action is required, and there is a reliance on users to identify phishing and man-in-the-middle attacks, vulnerabilities will continue to be an issue. 

It’s time to overhaul your 2FA strategy.

Organizations cannot afford to continually rely on passwords, recovery questions, or basic two-factor authentication (2FA) to protect against future social engineering attacks. These are methods proven time and time again to fall short in the face of mobile malware, SIM swapping, and phishing attacks. Hackers are getting more savvy, and we must as well. 

User experience is critical to your organization’s safety.

In a world where we are physically remote from coworkers or IT, and juggling home and work life, strong authentication must work at scale on a variety of devices, across business-critical applications, and within different environments. The better the user experience, the easier it is to deploy across and to secure the enterprise — unlike complex point solutions that only protect a niche set of users.

So, yes, the rise in COVID-related attacks is a real and present danger. But we can’t assume this is a temporary threat or unique to COVID. It is simply the latest version of an ongoing rise in social engineering attacks that demands a stronger response. Every day we are helping businesses large and small adapt to their new normal. Are you ready for yours?

Accelerate your digital transformation with hardware-backed strong authentication for your leading cloud-based services. Google Cloud, Microsoft Azure Active Directory, and many other day-to-day business applications offer built-in and seamless integration with the YubiKey.

Net Universe offers all Yubikeys with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/yubikey.
You can visit our Shop Online