Sophos Firewall Manager SFM 17.1 MR5 Released – Release Notes & News – XG Firewall

Hi XG Community!

We’ve released Sophos Firewall Manager SFM 17.1 MR5. Initially, the firmware will be available by manual download from the Licensing Portal. We will gradually release the firmware via auto-update to customers.

This MR is solely to allow limited support for XG v18 MR3 firmware. Please note that v18 support in SFM is very limited, and most SFM features are not supported. Please migrate to Sophos Central to fully group manage firewalls running v18 firmware. 

Updates Included

  • NCCC-10106, NCCC-10125 [SFM] Support for XG v18 MR3 compatibility

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

inside a new Ryuk ransomware attack – Sophos News

The operators of Ryuk ransomware are at it again. After a long period of quiet, we identified a new spam campaign linked to the Ryuk actors—part of a new wave of attacks. And in late September, Sophos’ Managed Threat Response team assisted an organization in mitigating a Ryuk attack—providing insight into how the Ryuk actors’ tools, techniques and practices have evolved. The attack is part of a recent wave of Ryuk incidents tied to recent phishing campaigns.

First spotted in August of 2018, the Ryuk gang gained notoriety in 2019, demanding multi-million-dollar ransoms from companies, hospitals, and local governments. In the process, the operators of the ransomware pulled in over $61 million just in the US, according to figures from the Federal Bureau of Investigation. And that’s just what was reported—other estimates place Ryuk’s take in 2019 in the hundreds of millions of dollars.

Starting around the beginning of the worldwide COVID-19 pandemic, we saw a lull in Ryuk activity. There was speculation that the Ryuk actors had moved on to a rebranded version of the ransomware, called Conti. The campaign and attack we investigated was interesting both because it marked the return of Ryuk with some minor modifications, but also showed an evolution of the tools used to compromise targeted networks and deploy the ransomware.

The attack was also notable because of how quickly the attacks can move from initial compromise to ransomware deployment. Within three and a half hours of a target opening a phishing email attachment, attackers were already conducting network reconnaissance. Within a day, they had gained access to a domain controller, and were in the early stages of an attempt to deploy ransomware.

The attackers were persistent as well. As attempts to launch the attack failed, the Ryuk actors attempted multiple times over the next week to install new malware and ransomware, including renewed phishing attempts to re-establish a foothold. Before the attack had concluded, over 90 servers and other systems were involved in the attack, though ransomware was blocked from full execution.

Let the wrong one in

Initial compromise, reconnaissance and lateral movement phase of Ryuk attack

The attack began on the afternoon of Tuesday. September 22. Multiple employees of the targeted company had received highly-targeted phishing emails:

From: Alex Collins [spoofed external email address]

To: [targeted individual]

Subject: Re: [target surname] about debit

Please call me back till 2 PM, i will be in [company name] office till 2 PM.

[Target surname], because of [company name]head office request #96-9/23 [linked to remote file], i will process additional 3,582 from your payroll account.

[Target first name], call me back when you will be available to confirm that all is correct.

Here is a copy of your statement in PDF[linked to remote file].

 

Alex Collins

[Company name] outsource specialist

The link, served up through the mail delivery service Sendgrid, redirected to a malicious document hosted on docs.google.com. The email was tagged with external sender warnings by the company’s mail software. And multiple instances of the malicious attachment were detected and blocked.

But one employee clicked on the link in the email that afternoon. The user opened the document and enabled its content, allowing the document to execute print_document.exe—a malicious executable identified as Buer Loader. Buer Loader is a modular malware-as-a-service downloader, introduced on underground forums for sale in August of 2019. It provides a web panel-managed malware distribution service; each downloader build sold for $350, with add-on modules and download address target changes billed separately.

In this case, upon execution, the Buer Loader malware dropped qoipozincyusury.exe, a Cobalt Strike “beacon,” along with other malware files. Cobalt Strike’s beacon, originally designed for attacker emulation and penetration testing, is a modular attack tool that can perform a wide range of tasks, providing access to operating system features and establishing a covert command and control channel within the compromised network.

Over the next hour and a half, additional Cobalt Strike beacons were detected on the initially compromised system. The attackers were then able to successfully establish a foothold on the targeted workstation for reconnaissance and to hunt for credentials.

A few hours later, the Ryuk actors’ reconnaissance of the network began. The following commands were run on the initially infected system:

  • C:WINDOWSsystem32cmd.exe /C whoami /groups (accessing list of AD groups the local user is in)
  • C:WINDOWSsystem32cmd.exe /C nltest /domain_trusts /all_trusts (returns a list of all trusted domains)
  • C:WINDOWSsystem32cmd.exe /C net group “enterprise admins” /domain  (returns a list of members of the “enterprise admins” group for the domain)
  • C:WINDOWSsystem32net1  group “domain admins” /domain (the same, but a list of the group “domain admins”)
  • C:WINDOWSsystem32cmd.exe /C net localgroup administrators (returns a list of administrators for the local machine)
  • C:WINDOWSsystem32cmd.exe /C ipconfig (returns the network configuration)
  • C:WINDOWSsystem32cmd.exe /C nltest /dclist:[target company domain name] (returns names of the domain controllers for the company domain name)
  • C:WINDOWSsystem32cmd.exe /C nltest /dclist:[target company name] (the same, but checking for domain controllers using the company name as the domain name)

Forward lateral

Using this data, by Wednesday morning the actors had obtained administrative credentials and had connected to a domain controller, where they performed a data dump of Active Directory details. This was most likely accomplished through the use of SharpHound, a Microsoft C#-based data “injestor” tool for BloodHound (an open-source Active Directory analysis tool used to identify attack paths in AD environments). A data dump from the tool was written to a user directory for the compromised domain administrator account on the domain server itself.

Another Cobalt Strike executable was loaded and launched a few hours later. That was followed immediately by the installation of a Cobalt Strike service on the domain controller using the domain administrator credentials obtained earlier. The service was a chained Server Message Block listener, allowing Cobalt Strike commands to be passed to the server and other computers on the network. Using Windows Management Interface, the attackers remotely executed a new Cobalt Strike beacon on the same server.

In short order, other malicious services were created on two other servers using the same admin credentials, using Windows Management Instrumentation from the initially compromised PC. One of the services configured was an encoded PowerShell command creating yet another Cobalt communications pipe.

The actors continued to perform reconnaissance activities from the initially infected desktop, executing commands trying to identify potential targets for further lateral movement. Many of these repeated previous commands. The nltest command was used in an attempt to retrieve data from domain controllers on other domains within the enterprise Active Directory tree. Other commands pinged specific servers, attempting to gain IP addresses. The actors also checked against all mapped network shares connected to the workstation and used WMI to check for active Remote Desktop sessions on another domain controller within the Active Directory tree.

Setting the trap

Late Wednesday afternoon—less than a day after the victim’s click on the phish— the Ryuk actors began preparations to launch their ransomware. Using the beachhead on the  initially compromised PC, the attackers used RDP to connect to the domain controller with the admin credentials obtained the day before.  A folder named C:Perflogsgrub.info.test2 – Copy was dropped on the domain controller— a name consistent with a set of tools deployed  in previous Ryuk attacks.  A few hours later, the attackers ran an encoded PowerShell command that, accessing Active Directory data, generated a dump file called ALLWindows.csv, containing login, domain controller and operating system data for Windows computers on the network.

Next, the SystemBC malicious proxy was deployed on the domain controller. SystemBC is a SOCKS5 proxy used to conceal malware traffic that shares code and forensic markers with other malware from the Trickbot family.  The malware installed itself (as itvs.exe), and created a scheduled job for the malware, using the old Windows task scheduler format in a file named itvs.job—in order to maintain persistence.

A PowerShell script loaded into the grub.info.test folder on the domain controller was executed next. This script, Get.DataInfo.ps1 , scans the network and provides an output of which systems are active. It also checks which AV is running on the system.

The Ryuk actors used a number of methods to attempt to spread files to additional servers, including file shares, WMI, and Remote Desktop Protocol clipboard transfer.  WMI was used to attempt to execute GetDataInfo.ps1 against yet another server.

Failure to launch

Thursday morning, the attackers spread and launched Ryuk. This version of Ryuk had no substantial changes from earlier versions we’ve seen in terms of core functionality, but Ryuk’s developers did add more obfuscation to the code to evade memory-based detections of the malware.

The organizational backup server was among the first targeted. When Ryuk was detected and stopped on the backup server, the attackers used the icacls command to modify access control, giving them full control of all the system folders on the server.

They then deployed GMER, a “rootkit detector” tool:

The GMER process hunting tool.

GMER is frequently used by ransomware actors to find and shut down hidden processes, and to shut down antivirus software protecting the server. The Ryuk attackers did this, and then they tried again. Ryuk ransomware was redeployed and re-launched three more times in short order, attempting to overwhelm remaining defenses on the backup server.

Ransom notes were dropped in the folders hosting the ransomware, but no files were encrypted.

The Ryuk HTML ransom note.

In total, Ryuk was executed in attacks launched from over 40 compromised systems,but was repeatedly blocked by Sophos Intercept X.  By noon on Thursday, the ransomware portion of the attack had been thwarted.  But the attackers weren’t done trying—and weren’t off the network yet.

On Friday, defenders deployed a block across the domains affected by the attack for the SystemBC RAT.  The next day, the attackers attempted to activate another SOCKS proxy on the still-compromised domain controller.  And additional Ryuk deployments were detected over the following week—along with additional phishing attempts and attempts to deploy Cobalt Strike.

 

Lessons learned

The Ryuk attack’s exploitation chain.

 

The tactics exhibited by the Ryuk actors in this attack demonstrate a solid shift away from the malware that had been the basis of most Ryuk attacks last year (Emotet and Trickbot). The Ryuk gang shifted from one malware-as-a-service provider (Emotet) to another (Buer Loader), and has apparently replaced Trickbot with more hands-on-keyboard exploitation tools—Cobalt Strike, Bloodhound, and GMER, among them—and built-in Windows scripting and administrative tools to move laterally within the network. And the attackers are quick to change tactics as opportunities to exploit local network infrastructure emerge—in another recent attack Sophos responded to this month, the Ryuk actors also used Windows Global Policy Objects deployed from the domain controller to spread ransomware. And other recent attacks have used another Trickbot-connected backdoor known as Bazar.

The variety of tools being used, including off-the-shelf and open-source attack tools, and the volume and speed of attacks is indicative of an evolution in the Ryuk gang’s operational skills. Cobalt Strike’s “offensive security” suite is a favorite tool of both state-sponsored and criminal actors, because of its relative ease of use and broad functionality, and its wide availability—“cracked” versions of the  commercially-licensed software are readily purchased in underground forums. And the software provides actors with a ready-made toolkit for exploitation, lateral movement, and many of the other tasks required to steal data, escalate the compromise and launch ransomware attacks without requiring purpose-made malware.

While this attack happened quickly, the persistence of the attacks following the initial failure of Ryuk to encrypt data demonstrate that the Ryuk actors—like many ransomware attackers—are slow to unlatch their jaws, and can persist for long periods of time once they’ve moved laterally within the network and can establish additional backdoors. The attack also shows that Remote Desktop Protocol can be dangerous even when it is inside the firewall.

 

IOCs for this attack will be posted on the SophosLabs GitHub here.

SophosLabs would like to acknowledge the contributions of Peter Mackenzie, Elida Leite, Syed Shahram and Bill Kearney of the MTR team, and Anand Aijan, Sivagnanam Gn, and Suraj Mundalik of SophosLabs to this report.

 

 

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Fortinet Awarded CyberSecurity Breakthrough 2020 “Professional Certification Program of the Year”

Fortinet is proud to announce that, for the second year running, the Network Security Expert (NSE) Training Institute’s Certification Program has been named the winner of the “Professional Certification Program of the Year” award in the fourth annual CyberSecurity Breakthrough Awards program. This award comes from CyberSecurity Breakthrough, a leading independent market intelligence organization that honors excellence and recognizes innovation, hard work, and success in a range of information security categories, including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, and Email Security, among others. 

“For the second year in a row, we are thrilled to recognize Fortinet for winning our ‘Professional Certification Program of the Year’ award,” said James Johnson, managing director, CyberSecurity Breakthrough. “Fortinet’s training and certification program stands out as it continues to innovate and expand, including the introduction of free cybersecurity training courses earlier this year. Creating and maintaining a vigilant cybersecurity mindset is key for all organizations and their employees – and cybersecurity awareness is a vital component for everyone.”

Fortinet NSE Certification Program’s Growing Momentum

The Fortinet Network Security Expert (NSE) Certification Program is an eight-level certification program that has issued more than half a million certifications to date. The first set of levels (1-3) assess a user’s knowledge of the threat landscape and can be helpful for anyone who wants to become more cyber aware. Moving up, NSE levels 4-6 are courses designed for a technical audience. These focus on one’s ability to install, configure, and troubleshoot comprehensive, integrated network security controls in live environments. Lastly, levels 7-8 hone in on the expertise needed to fully leverage Fortinet solutions. To become NSE 8 certified, an elite distinction, candidates must have related industry experience and should have completed the appropriate Professional, Analyst, Specialist, and Architect designation training. To date, there are 381 individuals worldwide who have earned their NSE 8 certification. 

Additionally, earlier this year, Fortinet opened its entire catalog of self-paced NSE training courses to the public for free for anyone looking to learn new cybersecurity skills or upskill helping to close the skills gap. The free training includes access to pre-recorded labs and advanced training. More recently, Fortinet extended its free training offerings and introduced the Information Security Awareness and Training service available for organizations to implement as part of their employee cybersecurity training program. The new service includes training to ensure all employees can identify and avoid threats, awareness components to keep security top-of-mind and an administrative dashboard to track training completion. 

Closing the Skills Gap through the NSE Training Institute 

For the second year in a row, the Fortinet NSE Training Institute’s Certification Program has been recognized by CyberSecurity Breakthrough for its role in helping technical professionals not only validate their existing knowledge but also expand on their understanding of various concepts related to network security. Fortinet is committed to closing the skills gap through initiatives like the NSE Training Institute as we recognize the need for security professionals and non-technical employees alike to be cyber aware of the latest threats and solutions to keep their organizations safe.  

Find out more about Fortinet’s NSE Training Institute programs, including the Certification ProgramSecurity Academy Program and Veterans Program, which provide critical cybersecurity training and education to help solve the cyber skills gap and prepare the cybersecurity workforce of tomorrow.

As Fortinet partners, Net Universe offers all Fortinet devices and subscriptions with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/fortinet.
You can visit our Shop Online

Ping of Death Redux – Sophos News

Microsoft is releasing a substantial number of security fixes again in October’s Patch Tuesday release—with 11 rated “Critical” by Microsoft (including the latest Adobe Flash security update). But two vulnerabilities among those being patched stand out above these others: CVE-2020-16898 and CVE-2020-16899. These vulnerabilities—caused by a bug in Windows’ TCP/IP driver—harken back to the “Ping of Death” vulnerability fixed in Windows in 2013. They make denial of service and potential remote code execution possible with a crafted packet.

The vulnerability in tcpip.sys, a logic error in how the driver parses ICMP messages, can be triggered remotely with a crafted IPv6 router advertisement packet containing a Recursive DNS Server (RDNSS) option. The RDNSS option typically contains a list of the IPv6 addresses of one or more recursive DNS servers. 

The RDNSS option format for IPv6 ICMP packets.

There is a logic flaw in tcpip.sys that can be exploited by crafting a router advertisement packet containing more data than expected, which results in the driver putting more bytes of data on its memory stack than provided for in the driver’s code, resulting in a buffer overflow. In theory, this could be used for both denial of service and remote code execution attacks. But in practice, achieving remote code execution would be extremely difficult.

SophosLabs developed its own proof-of-concept for an attack, based on information provided by Microsoft. It leverages the vulnerability to cause a “blue screen of death” on the targeted computer.  The details of the POC are being withheld to prevent exploitation by attackers.

 

Once we understood the bug, developing a “Blue Screen of Death” proof-of-concept was fairly straightforward. But taking it to the level that Microsoft has warned is possible—remote code execution (RCE)—is not. Modern defensive coding standards and practices would slow down an effort to build a reliable generic RCE exploit, for two reasons.

First, TcpIp.sys is compiled with GS flag— which prevents a typical stack overflow from directly controlling the return address.

The stack cookie, also known as a stack canary, is a random value generate at loading time. Its value is XOR’d with the stack pointer, making it extremely hard to predict reliably—especially in a full remote exploitation.

There are two typical techniques used to bypass stack canaries, neither of which really apply in this case:

  • Using another information leak vulnerability (arbitrary read)—which won’t help much in exploiting tcpdrv.sys, because the canary value is XOR’d with the stack pointer.
  • Overwriting a Structured Exception Handling (SEH) handler, which would be useful only if a structured exception record has been set—which is not the case here.

The second roadblock to an effective RCE exploit is kernel Address Space Layout Randomization (kASLR). Even if it was possible can reliably predict the stack canary (big if) landing back to a system shell in user mode would require to correctly (and again remotely) determine the base address of the Windows kernel.

That means that even when the exact nature of the bug in tcpdrv.sys becomes more widely known, it may be some time before anyone can exploit it in a way that reliably injects code into the Windows kernel space. Even so, the threat of denial of service at will with a relatively easily-crafted packet should be enough by itself to prompt rapid patching—which is the only real fix for this vulnerability.

Sophos is in the process of deploying signatures for attacks based on this vulnerability to XG Firewall and Endpoint IPS (in EAP). The signature IDs are sid:2304055 and sid:2304163, respectively. Other short-term mitigations fir potential denial of service attacks include:

  • Disable IPv6 if not used, or
  • Make Windows discard router advertisement packets using the netsh command (netsh int ipv6 set int *INTERFACENUMBER* rabaseddnsconfig=disable).

The rest of this month’s critical vulnerabilities patched are all potential remote code execution bugs as well:

  • CVE-2020-16891: Windows Hyper-V Remote Code Execution Vulnerability
  • CVE-2020-16911: GDI+ Remote Code Execution Vulnerability
  • CVE-2020-16915: Media Foundation Memory Corruption Vulnerability
  • CVE-2020-16923: Microsoft Graphics Components Remote Code Execution Vulnerability
  • CVE-2020-16947: Microsoft Outlook Remote Code Execution Vulnerability
  • CVE-2020-16951 and CVE-2020-16952: two Microsoft SharePoint Remote Code Execution Vulnerabilities
  • CVE-2020-16966: Open Enclave SDK Remote Code Execution Vulnerability
  • CVE-2020-16967: Windows Camera Codec Pack Remote Code Execution Vulnerability

Windows Spoofing Vulnerability

Another interesting bug fixed in this Patch Tuesday’s release is CVE-2020-16922 , a bug in Windows’ verification of digital signatures of Security Catalog (.CAT) files that could potentially be used to spoof verification of trust for a potentially malicious file.

Normally, any modification done to a digitally signed file should result in the invalidation of its signature.  However, it was discovered that appending arbitrary data of any size onto the end of a signed .CAT file does not invalidate its signature in the eyes of Windows, which fails to account for the extraneous data.

This bug bears a resemblance to the Curveball vulnerability from earlier this year, but is not as critical and poses a lesser threat to users—because unlike with Curveball,  “Man-in-the-Middle” attacks are not of concern. The bug could be exploited in malware deployments, however—for example, in the crafting of a  malicious Java Archive (.JAR) file.

By taking an existing Microsoft-signed .CAT file, appending the contents of a .JAR file to it, and changing the file’s extension to .JAR, a file is produced that looks and runs like a .JAR file, but has a “spoofed”, valid digital signature. This works because the Java Runtime will search a given .JAR file for Java contents to execute, even if they are present in the middle of the file.

Most other file types do not work this way, and cannot be abused for this purpose. Attackers might use this type of vulnerability to circumvent security software around their handling of malware: a file with a spoofed digital signature can fool security software into regarding it as a legitimate Microsoft-made file and therefore increase its “reputation,” potentially to such an extent that a blind eye would be turned to an actual malware file that would have otherwise get detected.

Sophos protection

Here is a list of protection released by SophosLabs in response to this advisory to complement any existing protection and generic exploit mitigation capabilities in our products.

CVE-2020-16898 SID:2304055,2304163
CVE-2020-16899 SID:2304058
CVE-2020-16922 SID:2304140,2304142
CVE-2020-16915 SID:2304212

This and all the other vulnerabilities revealed in October’s Patch Tuesday release—especially the critical ones—offer plenty of reasons to patch as quickly as possible.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Responding to the rising wave of social engineering attacks against remote workers

By now, it’s clear the pandemic has provided perfect conditions for many types of social engineering attacks. We’ve seen plenty of reports and warnings from the FBI, CISA, Interpol, and other reputable organizations about the growth in coronavirus-related attacks, from spear-phishing to vishing, ransomware, and more, as the world adapts to remote working and its associated risks. 

In many ways, social distancing and remote work have created more fertile conditions for hackers, but the types of social engineering attacks we’re seeing today aren’t too different from what we’ve seen in the past. So, why are we still seeing major breaches making news headlines on a regular basis? 

If history has taught us one thing it’s that hackers will always capitalize on the human element. Uncertainty, fear, distraction, isolation, and confusion can all contribute to increased vulnerabilities among users. And as we continue to face a rapidly shifting global news agenda, we can’t possibly anticipate the next twist in the pandemic or major news event that opportunistic hackers will exploit. Look at the rise in phishing attacks related to COVID stimulus and relief for example. 

We expect to see continued social distancing and increased virtual interactions long after the pandemic subsides, which means that enterprises must rely on strong authentication to protect against the rising wave of social engineering attacks. As we lose confidence in the security of systems and information with an increasingly decentralized work environment, it’s critical to re-establish trust with your users. Here’s how:

Employee education and training is not enough.

Educating employees to be on the look-out for COVID-related scams, while essential, is not a comprehensive response. No matter how much user education about phishing or social engineering takes place, some attacks will still succeed. As long as user action is required, and there is a reliance on users to identify phishing and man-in-the-middle attacks, vulnerabilities will continue to be an issue. 

It’s time to overhaul your 2FA strategy.

Organizations cannot afford to continually rely on passwords, recovery questions, or basic two-factor authentication (2FA) to protect against future social engineering attacks. These are methods proven time and time again to fall short in the face of mobile malware, SIM swapping, and phishing attacks. Hackers are getting more savvy, and we must as well. 

User experience is critical to your organization’s safety.

In a world where we are physically remote from coworkers or IT, and juggling home and work life, strong authentication must work at scale on a variety of devices, across business-critical applications, and within different environments. The better the user experience, the easier it is to deploy across and to secure the enterprise — unlike complex point solutions that only protect a niche set of users.

So, yes, the rise in COVID-related attacks is a real and present danger. But we can’t assume this is a temporary threat or unique to COVID. It is simply the latest version of an ongoing rise in social engineering attacks that demands a stronger response. Every day we are helping businesses large and small adapt to their new normal. Are you ready for yours?

Accelerate your digital transformation with hardware-backed strong authentication for your leading cloud-based services. Google Cloud, Microsoft Azure Active Directory, and many other day-to-day business applications offer built-in and seamless integration with the YubiKey.

Net Universe offers all Yubikeys with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/yubikey.
You can visit our Shop Online

 

XG Firewall v18 MR3 is now available – Sophos News

The product team is pleased to announce a major new update for XG Firewall v18 with several great new enhancements.

Security emphasis

Given how much working environments have changed this year, we have accelerated our product security investments, taking a more proactive approach.  As a result, this new maintenance release for XG Firewall v18 includes several security and hardening enhancements to better protect your firewall and your data stored within, including SSMK (Secure Storage Master Key) for the encryption of your sensitive data.

There’s also a new CLI option to disable Captcha authentication that was previously introduced as a security hardening measure:

console> system captcha-authentication-global enable/disable/show for userportal/webadminconsole

Remote access VPN

Working from home and makes remote access VPN a vital tool for all organizations these days, and there are important enhancements to remote access VPN in this release:

Sophos Connect v2 makes SSL remote access VPN easy to deploy and use
  • Increased SSL VPN connection capacity across our entire firewall lineup. The capacity increase depends on your Firewall model: desktop models can expect a modest increase, while rack mount units will see a 3-6x improvement in SSL VPN connection capacity. Check the latest numbers for your XG Series model.  Remember that Sophos XG Firewall is the only firewall that provides remote access VPN up to the capacity of your device – at no extra charge.
  • Group support for our Sophos Connect VPN client, which now enables group imports from AD/LDAP/etc. for easy setup of group access policy.

Cloud (AWS/Nutanix) enhancements

Cloud and hybrid network infrastructure continues to grow in importance, and we’re also investing heavily in public cloud support:

  • Support for newer AWS instances – C5/ M5 and T3 (#)
  • Support for CloudFormation Templates, removing the need to run the installation wizard in some cases (#)
  • Virtual WAN Zone support on custom gateways for post deployment single arm usage
  • Single-arm deployments are now possible on AWS deployments thanks to an option to assign a zone to your custom gateway objects. This allows you to create access and security rules for traffic going into those zones.
  • XG Firewall is now Nutanix AHV and Nutanix Flow Ready. XG Firewall has been validated to provide two modes of operation within Nutanix AHV infrastructure. Learn more.
  • Also be sure to check out Sophos Cloud Optix to enhance your security and optimize costs for your cloud environments

Central management and reporting

We are seeing rapid adoption of Sophos Central management and reporting for XG Firewall thanks to rich features that make managing all your XG Firewalls easy.  It’s important to note that legacy central management and reporting platforms including CFM/SFM and iView are coming to end of life soon.

Now is the time to move to Sophos Central for your central management and reporting needs, as it offers a modern, scalable, secure platform with a great feature set and an aggressive roadmap.

What’s new:

  • XG Firewalls running in an HA configuration (either A-A or A-P) can now be fully managed within Firewall Group Management
  • An Audit Trail feature is now available within the Task Queue
  • Central Firewall Reporting has recently added the option to save, schedule, and export reports. Learn more.

Coming soon: Next month, a couple of other great enhancements are coming to Sophos Central, including group firewall management from the Partner Dashboard that greatly simplifies multi-customer firewall management, and cross-firewall reporting for better insights into activity across your entire multi-firewall protected network.

sophos central firewall reporting
Central Firewall Reporting now includes the option to save, schedule, and export reports

HA and other enhancements

XG Firewall v18 MR3 also addresses a number of reported issues with high-availability deployments, SD-RED devices support, and other areas.  See the release notes for a full list of fixes.

Upgrade as soon as possible

While we always encourage you to keep your firewalls up to date with the latest firmware, over the next few months we are recommending you rapidly apply maintenance releases to ensure you have all the important security, performance, and feature enhancements applied as soon as possible.

Also ensure you have automatic pattern updates enabled so that you can be assured you have the latest protection updates.

XG Firewall v18 MR3 is an easy upgrade from XG Firewall v17 (MR6+), but be sure to check supported platforms.

How to get it

As usual, this firmware update is no charge for all licensed XG Firewall customers. The firmware will be rolled out automatically to all systems over the coming weeks, but you can access the firmware anytime to do a manual update through the Licensing Portal. You can refer to this article for more information.

Learning more about upgrading to XG Firewall v18

And if you still haven’t upgraded to v18, or are still exploring many of the new features, be sure to take advantage of all the resources available, including the recent “Making the Most of XG Firewall v18” article series that covers all the great new capabilities in XG Firewall v18:

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

SE Labs names Intercept X Best Small Business Endpoint Product – Sophos News

intercept x

We are thrilled to announce that for the second year in a row, SE Labs has named Sophos Intercept X the 2020 Best Small Business Endpoint product.

SE Labs makes use of multiple techniques to put endpoint solutions through rigorous testing regimes.

In their own words:

“If you want to see how well security products work, you need to test them like you’re the bad guy. This is what we at SE Labs specialise in. Realistic and accurate copycatting cyber criminals and spies to see what happens to anti-malware, endpoint protection and other security products.”

This award complements the performance of Intercept X in other SE Labs tests for small business, enterprise, and home endpoint protection – where Intercept X recently achieved 100% Total Accuracy Rating in all three tests.

For more information read the SE Labs blog, head straight to the report, and take a look at Sophos Intercept X.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Sophos announces new sales leadership for Americas and EMEA – Sophos News

Today, we’re excited to announce two new appointments to our senior sales leadership team. Erin Malone has been promoted to senior vice president of sales for Americas, and Kevin Isaac has joined Sophos as senior vice president of sales for Europe, Middle East and Africa (EMEA).

“Erin and Kevin are strategic additions to the Sophos senior leadership team, and their decades of expertise will be pivotal in helping partners evolve their security strategies to defend against today’s persistent attackers,” said Michael Valentine, chief revenue officer at Sophos. “There is tremendous opportunity for partners worldwide to leverage our strong portfolio of next-generation cybersecurity solutions and managed threat hunting and response services to protect their customers as they adapt to the constantly changing threat landscape and needs of remote and onsite workers. Both Erin and Kevin recognize this and are dedicated to supporting partners in their respective regions.”

Malone is an accomplished, award-winning sales executive with more than 20 years’ experience leading high-achieving sales teams and developing strategic partner relationships in the cybersecurity industry. She has risen the ranks at Sophos following a successful position as vice president of sales for North America, where she created and led Sophos’ Partner Advisory Council (PAC). She joined Sophos in 2015, and is based in the U.S.

“Erin has already made great impact on our Americas region, is well-respected in the industry, and has strong relationships within the Sophos partner community. We are excited for Sophos’ future under Erin’s executive leadership,” said Valentine.

Isaac brings more than 25 years of cybersecurity sales leadership to Sophos, and most recently served as chief revenue officer at Forcepoint. He is known for inspiring and managing high-performing teams, and has considerable experience in driving business growth, operational excellence and year-over-year results, particularly in EMEA. Isaac is based in the U.K.

“We are thrilled Kevin has joined Sophos to expand our already strong growth path in the EMEA market. He is a well-respected international sales executive within cybersecurity, and his wealth of experience will benefit partners and customers as Sophos continues to innovate and lead the industry,” said Valentine.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Looking for a free cloud security tool? – Sophos News

The use of cloud services has soared this year, with 97% of business decision-makers saying that COVID-19 has sped up digital transformation and the use of cloud services at their companies. Organizations that haven’t embraced cloud already are likely to have it on their roadmap.

Speaking with over 3,500 IT Pros in the Sophos State of Cloud Security report, 70% of organizations already hosting data and workloads in the public cloud have reported security incidents in the last 12 months.

At Sophos, we want to help organizations identify and respond to these cloud threats faster, wipe out potential breach points, and optimize cloud spend. You can now do that for free with Cloud Optix on AWS Marketplace.

The free cloud security posture management tool

Cloud Optix, the Sophos cloud security posture management tool, protects Amazon Web Services, Microsoft Azure, and Google Cloud Platform environments. It continually monitors cloud service configurations, and detects suspicious activity, insecure deployments, and over-privileged IAM roles – all while helping optimize your cloud costs. Simply put: it stops potential cloud environment breach points before they are detected and compromised.

Monitor 25 cloud assets for free via AWS Marketplace

Sophos now provides customers with the ability to monitor 25 cloud assets absolutely free. To activate, sign up via the Cloud Optix AWS Marketplace listing, then once logged into your Cloud Optix account, simply activate the free tier from the top right corner of the Cloud Optix dashboard.

How the Cloud Optix free tier works:

  • Customers are able to monitor 25 cloud assets for free (see how Cloud Optix counts assets)
  • This is an optional free usage tier. To activate, customers should sign up via the Cloud Optix AWS Marketplace listing, then once logged into their Cloud Optix accounts, simply activate the free tier from the top right corner of the Cloud Optix dashboard as shown above.
  • Once activated, customers will only be billed for usage that exceeds this limit.

Start protecting your public cloud environments today

Risk-free setup

No downloads are required. Cloud Optix is an agentless, SaaS-based service that’s simple to set up, with read-only access to cloud environments. For help configuring the service, visit the Cloud Optix online help guide.

For more information about our cloud security posture management solution, visit the Cloud Optix page on the Sophos website.

Note: Customers signing up for Cloud Optix via AWS Marketplace will manage the product from a standalone console, providing all the functionality available for Cloud Optix via Sophos Central.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

How two customers halved their day-to-day admin time using Sophos Central – Sophos News

Managing all your cybersecurity products through the Sophos Central platform has proven to be a real time-saver when it comes to day-to-day admin tasks.

I recently spoke with two customers based in Eastern Europe who are both running Sophos next-gen cybersecurity systems managed through Sophos Central.

They explained how this approach has reduced their day-to-day security management workloads and allowed their small teams to maximize their impact.


Long-time Sophos customer makes the leap to Sophos Central

The first customer, a public sector organization in Slovenia, has been a Sophos customer for many years. A team of three people manage security for the organization’s 150 employees.

They recently switched from Sophos’ on-premises solutions, including endpoint protection managed through Sophos Enterprise Console (SEC), to next-gen products managed through the Sophos Central platform.

They now run a full next-gen cybersecurity system, including Sophos Intercept X endpoint and server protection, device encryption, and a Sophos XG Firewall.

Day-to-day security management cut in half

The team has seen a 50% reduction in time spent on day-to-day security management since moving to Sophos Central-managed solutions.

They now spend only 15-30 minutes each day on security admin – checking the firewall, looking at alerts, and cleaning up the email quarantine. All of this took twice as long before moving to Central.

“Previously we would send at least twice as much time on admin each day.”

They attribute the time saving to the admin-friendly platform. They can see and manage their entire environment in one place and no longer need to switch between applications and servers.

Protection remains strong and they haven’t had a single major incident since using Sophos products.


Evolving threats requires evolved protection

The second customer I spoke with is also a public sector organization – this time in Belgrade, Serbia. Within the IT team of 10, four people focus on cybersecurity, protecting the organization and its 300 staff from the latest threats.

They’ve been a satisfied Sophos customer for a long time, using multiple Sophos products without a single major security incident in the past eight years.

As threats and technologies have continued to evolve, so has their protection. The team recently made the switch to Sophos next-gen products.

They now run a full next-gen cybersecurity system, including Sophos Intercept X endpoint, server, and mobile protection, Sophos email security, and Sophos XG Firewalls – all managed through the Sophos Central platform.

Next-gen solutions cut IT admin time to 30 minutes

Previous Sophos products were still far ahead of the competition – day-to-day security admin would take this customer just an hour compared to what they estimate would be a whole day’s work with other vendors.

Switching to Sophos Central-managed solutions cut that admin time by a further 50%.  Now, they spend only 30 minutes a day keeping on top of their security.

Meanwhile, their end users remain unaware of the security solutions that are protecting them while they work. Intercept X runs quietly in the background, keeping users from unsafe websites, unobtrusively and automatically.


See it in action

Both organizations had found success with Sophos for many years. Upgrading to a unified, cloud-based management system has further increased efficiency and enabled them to dedicate more time to other projects – all while continuing to provide the same reliable protection they had come to expect.

Check out this demo video to see just how easy day-to-day security management is with a Sophos system.

Want to try the system for yourself? The easiest way is to start a free trial of one of our products.

And for anything else, or to discuss your own challenges, the Sophos team is here to help.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.