This week we briefed our clients on Part 2 of our Cybersecurity Awareness Back to Basics series and how threat actors are using EDRSilencer to attack.
KEY TAKEAWAYS
In this second installment of "Back to Basics", we will look at some additional simple yet often overlooked aspects of cybersecurity. These can play a crucial role and preventing or reducing the impact of a cybersecurity incident.
Auditing
As organizations age and grow, user counts grow higher, networks get bigger, and more systems come online. Inevitably, staff with detailed knowledge of the network leave or retire, employees quit, and systems change. Over time, accounts and devices are forgotten, ports are left open, and documentation becomes outdated. Routinely auditing different aspects of the network will help keep documentation up to date and help keep up network hygiene.
Backups
Data backup solutions are one of the most effective ways to reduce the potential damage of a ransomware incident. Critical data should be backed up regularly, and the data should ideally be stored in multiple locations (on-site and off-site). Once a backup solution is in place, it is also important to regularly test the backup solution. It is often the case where after a ransomware incident, the organization will attempt to restore from backup only to discover that the backups don't work or that the data is corrupted. By regularly testing the backup and restore process, this helps ensure that the system is working to the organization's needs and will reduce the time for restoration in the event of a ransomware attack.
Additionally, having a "Gold Image" for endpoint restoration will greatly reduce the time to recovery. These images should also be updated on a regular basis to fit the needs of the organization.
(Mis)configurations
Threat actors will often exploit misconfigurations to achieve their goals. This often includes default passwords on network devices (admin:admin), open ports and services that are unused or unnecessary (RDP exposed to the internet). Misconfigurations also include improper setup of security tools, such not enabling "prevent" on EDR or IDS/IPS solutions. It is often the case where a security tool will identify malicious behavior, but due to improper configurations, the tool will either not alert at all, or just simply send a notification that malicious activity is occurring, but not do anything to block or prevent it. Spending the extra time to properly tune and configure security devices will help the organization get the maximum benefit from their investment.
Trend Micro recently released a report detailing how threat actors are now leveraging a red team tool called EDRSilencer in their attacks. EDRSilencer leverages the Windows Filtering Platform (WFP) to create firewall rules on the target endpoint to block the EDR tool's ability to communicate with its management server. This effectively prevents the EDR tool from being able to send telemetry or alerts to the management console, hiding threat actor activity from the security team.
At the time of this writing, EDRSilencer works against 16 major EDR tools, including Carbon Black, Cisco Secure Endpoint, Microsoft Defender, and SentinelOne. A full list of EDR tools can be found here. Notably, CrowdStrike Falcon is not affected by this tool.
Additional ways to protect your organization:
Resources:
https://www.trendmicro.com/en_us/research/24/j/edrsilencer-disrupting-endpoint-security-solutions.html
https://www.bleepingcomputer.com/news/security/edrsilencer-red-team-tool-used-in-attacks-to-bypass-security/
Vulnerability Roundup
An issue was discovered in virtual machines created with Kubernetes Image Builder version 0.1.37 or earlier, where VMs are assigned default credentials during the image building process. This allows for threat actors to SSH into the VM and gain root access if the credentials were not manually disabled. Per the advisory, VMs built with the Proxmox provider are vulnerable to this issue, whereas VMs built with the Nutanix, OVA, QEMU or raw providers are only vulnerable if the threat actor gains access to the VM during the build process. This issue is tracked as CVE-2024-9486. Administrators are urged to rebuild VMs with Kubernetes Image Builder 0.1.38 or later, or manually disable the "builder" account with the command: 'usermod -L builder'.
https://discuss.kubernetes.io/t/security-advisory-cve-2024-9486-and-cve-2024-9594-vm-images-built-with-kubernetes-image-builder-use-default-credentials/30119
CISA recently added CVE-2024-23113 to its Known Exploited Vulnerabilities (KEV) Catalog. The vulnerability is an unauthenticated remote code execution (RCE) vulnerability in FortiNet's FortOS that affects multiple products. See the FortiGuard advisory for a full listing of products. This vulnerability was initially disclosed in February 2024. Administrators are urged to ensure that vulnerable FortiNet products are fully patched.
https://www.cisa.gov/news-events/alerts/2024/10/09/cisa-adds-three-known-exploited-vulnerabilities-catalog
https://www.securityweek.com/organizations-warned-of-exploited-fortinet-fortios-vulnerability/
A critical vulnerability in Veeam Backup & Replication is now confirmed to be exploited by Fog and Akira ransomware groups. The vulnerability, tracked as CVE-2024-40711, was disclosed in early September, and affects Veeam Backup & Replication builds 12.1.2.172 and earlier. Per a security bulletin from Sophos, in each ransomware case observed, threat actors gained initial access via insecure VPN gateways that did not have multifactor authentication (MFA) enabled. Administrators are urged to update to the latest Veeam version as soon as possible.
This report is provided FREE to the cybersecurity community.
Visit our Cyber Threat Intelligence Blog for additional reports.
Subscribe to be notified of future Reports:
NOTE
We have enhanced our report with data from SOCRadar. You may need to register to view their threat intelligence content.
DISCLAIMER
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.