Skip to content

The Threat of Filtering Bypass and How SafeDNS Can Keep You Secure

Picture this: you’ve successfully set up your content filter, creating a reassuring shield for your digital realm. Confidence grows as you believe your online world is now safeguarded against unwanted content and potential threats. But here’s the reality check: the digital landscape is a crafty one, and determined individuals can find their way around and easily bypass your barriers. In this situation knowledge is your power. Let’s delve into the realm of filter bypass, uncovering its intricacies and equipping you with insights to fend off potential breaches. 

The Danger of Bypassing Filtering

Content filtering plays a crucial role in maintaining a safe and secure online environment. By preventing access to malicious websites, adult content, and other harmful resources, content filtering tools like SafeDNS shield users from potential harm. Bypassing these various web filters, intentionally or unintentionally, can lead to a range of risks, including:

Exposure to Inappropriate Content:

Bypassing filters may result in users accessing explicit, violent, or inappropriate content, putting individuals, especially children, at risk.

Malware and Phishing Attacks:

Unfiltered access to internet also increases the likelihood of encountering malicious websites that can distribute malware, launch phishing attacks, and have other methods to compromise sensitive data.

Productivity Loss:

Employees bypassing filters might spend work hours on social media sites and non-work-related websites, leading to decreased productivity and potential security vulnerabilities.

Legal and Compliance Issues:

Bypassing filters could lead to legal issues if users access copyrighted materials, engage in cyberbullying, or involve themselves in other illicit activities.

How Bypassing Filtering Works and the Role of VPNs

Bypassing content filtering often involves the use of proxies, anonymizers, and Virtual Private Networks (VPNs). These tools mask users’ true identities and locations, allowing them to quickly access restricted content. VPNs, in particular, create a secure and encrypted tunnel between the user’s computer or device and a remote server, effectively cloaking online activities from prying eyes.

VPN providers and VPN connections can help bypass filtering and access a blocked website by:

  • Masking IP Addresses: VPNs hide users’ IP addresses, making it difficult for content filtering systems to accurately identify and block restricted content.
  • Encryption: Encrypted connections provided by VPNs prevent network administrators from inspecting the content of data packets, further complicating filtering efforts.
  • Geo-Spoofing: VPNs can make it appear as though a user is browsing from a different location, potentially bypassing regional content restrictions.

Accessing Blocked Websites with DNS Servers and Proxy Servers

In addition to VPNs, users may also employ DNS servers and proxy servers to access blocked websites. DNS servers and free proxies, such as Google Public DNS, can be configured to resolve domain names for blocked websites, effectively circumventing content filters. A proxy server and proxy websites act as intermediaries between users and blocked content, making it appear as though the requests are originating from an unrestricted source.

Preventing Bypass with SafeDNS

SafeDNS has taken proactive measures to address bypass concerns. Our intuitive solution empowers you to prevent bypass attempts with ease.

In the SafeDNS dashboard, under the “Illegal Activity” section, you have the option to block the “Proxies & Anonymizers” category. By doing so, you proactively thwart attempts to bypass content filtering through these means.  This simple yet powerful step enhances your defense against content filtering evasion, ensuring that the browsing traffic on your network remains secure and productive.


But what precisely occurs when you make this pivotal move, and how does it contribute to curbing bypass attempts?

When you choose to block the VPN and anonymizer category, you essentially curtail access to all categorized resources that could potentially serve as conduits for traffic circumvention services. In practical terms, this means that users are prevented from downloading such software and initiating any attempts to bypass traffic filtering.

Even in scenarios where such bypass-enabling software has already been downloaded, SafeDNS still offers protection, albeit with certain limitations. If the software communicates with its servers through domains, for example, we can effectively shield your network from bypass attempts. However, if the software relies on IP addresses for communication, our protective measures may not be as effective in this specific scenario.

 

In conclusion, understanding the dangers of bypassing content filtering is crucial for maintaining a safe online environment. Use of protective measures of SafeDNS, such as bypass prevention and blocking category proxies and anonymizers, significantly strengthens your network’s security posture. By staying vigilant and taking proactive steps, you can ensure that your network remains a safe and productive space for all users.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

Minimizing external risks: a step-by-step guide to third-party risk assessment

What is a third-party risk assessment? 

Third-party risk assessments consider supply chain risks associated with third parties. They cut external risks while onboarding third parties to support business processes.

Any third party can introduce supply chain risks. This makes company assets and systems more vulnerable. Integrating third-party risk assessments into your risk management strategy is essential.

This article will explain why third-party risk assessments matter. And we will provide a simple, practical guide to assessing suppliers.

Key takeaways

  • Third-party risk assessment is a critical part of general risk management. Companies should carry out risk assessments for all external partners. Risk assessments protect sensitive data. They cut operational disruption. And they ensure that third-party relationships are compliant.

  • Due diligence is essential when assessing third-party risks. Risk assessments should include comprehensive evaluations of external suppliers. Critical areas include data security, geographical location, compliance history, and incident recovery processes.

  • Assessors should grade third parties. Assessments should focus on operational importance and the ability to access sensitive data. Concentrate on partners with the capacity to compromise security or damage internal systems.

  • Third-party risk management is a continuous process. Companies should update risk assessments and check that they cover relevant risks.

What is a third party?

A third party is an external agent that contracts with another company to supply goods or services. Many companies rely on third parties. External partners support their work and make operational savings. Sometimes, companies rely on thousands of external partners. Common examples include:

  • Professional office services.

  • Marketing partners.

  • Call centers and customer support services.

  • Freelancers like coders, secretarial support staff, technicians, writers, videographers, and corporate trainers.

  • Financial support. Includes accountants and partners for storing financial and customer data.

  • Cloud service providers

  • Security vendors

  • Travel and employee services

  • ISPs.

Importance of third-party risk assessment

Companies should never cut corners when assessing external partners. There are many reasons to implement a comprehensive third-party risk management strategy.

Meeting regulatory requirements

Many data security regulations demand third-party risk assessments. Regulations with third-party requirements include:

  • European Union’s General Data Protection Regulation (GDPR)

  • Payment Credit Industry Data Security Standards (PCI-DSS)

The Health Insurance Portability and Accountability Act (HIPAA) Companies that assess third parties will strengthen compliance. And they will reduce their exposure to regulatory risks.

Certainty about cybersecurity risks

Most third-party vendors introduce cybersecurity risks. Comprehensive third-party risk assessments provide information about the cybersecurity practices of external partners. They allow companies to choose secure partners. Risk assessments also help companies improve general cybersecurity. They can put in place appropriate internal security controls that manage critical risks.

Avoiding reputational damage

Customers trust companies with a commitment to security and transparency. Organizations that lose data or suffer regular downtime due to poor security struggle. A third-party risk assessment filters out partners with poor operational or security records. Screening partners improves the customer experience. It guards against attacks that ruin corporate reputations.

Financial protection

Supply chain attacks are a common source of data breaches and malware infections. And cyber-attacks can have a devastating impact on your corporate bottom line. Data breaches cost money to compensate customers. Companies must pay regulatory fines, and invest in updated security technology. And you can prevent these costs by risk-assessing every third-party relationship.

Strategic efficiency

Robust vendor management allows companies to move forward. With dependable long-term partners in place, organizations can plan their mid-range goals. There should be no need to swap partners every six months.

Solid risk assessment processes lead to long-term relationships. And these relationships are the basis for an effective corporate strategy.

Third-party risk types

Dividing risk allows assessors to generate more precise outcomes. It also gives managers a fuller picture of risks that each third party poses. Critical types of third-party risk include:

Cybersecurity risks

Third-party vendors often have access to internal networks and customer data. Partners with network access could expose your company to cybersecurity risks. A supplier risk assessment must establish which cybersecurity risks apply. It must also suggest appropriate action.

For example, you might use a third-party Customer Relationship Management (CRM) system. This supplier could pose an information security risk. The third party could expose customer data through poor cybersecurity controls.

Operational risks

Operational risks threaten everyday company operations. This category includes business continuity threats to network infrastructure and applications. But operational risks also cover the physical integrity of office spaces. And they include the ability of remote workers to connect. Third parties can also pose operational risks when their systems or products fail.

Compliance risks

Third parties pose a compliance or regulatory risk. This happens when their products or services breach regulatory rules. For example, HIPAA demands tight information security and privacy for patient records. But an email filtering service with poor security controls could put this data at risk. Risk assessors should consider every relevant regulation when analyzing potential suppliers.

Financial risks

Financial risk or organizational risk affects revenues and profits. Third-party relationships often help companies become more efficient. But the failure of vendor-supplied solutions can harm your finances. Vendor failure may immobilize payment portals. Or it could leave employees without access to critical resources. Vendors can also go out of business, leaving partners in limbo.

Strategic risks

Strategic risks refer to long-term effects on how a company operates. Third-party relationships should be durable. But supplier quality can decrease. Security practices can lapse, or partners may stop operations. Companies must consider business strategy 2 or 3 years into the future. Will third parties still be reliable partners?

Consequences of neglecting third-party risk assessment

What happens if you fail to assess third-party risks properly? In reality, the consequences can be damaging. Common results include:

  • Regulatory breaches and penalties

  • Lost customer trust and market share

  • Increased downtime and network integrity

  • Escalating cyber-attacks and security costs

  • Loss of strategic control with constant changes in supplier arrangements

  • Poor relationships with third parties as disagreements mount

  • Inflexible supplier management if risk assessments are not updated

Case-Study Board-of-innovation

Steps to conduct a third-party risk assessment1 steps for risk assessment 1400x915

Assessments must be comprehensive. And they should focus on risks that matter. Vendor risk assessments that consider outdated or irrelevant issues are useless. So how can you carry out effective supplier assessments?

1. Decide the scope of the risk assessment

Start by creating a risk assessment team. Bring in expertise from different areas of the company. Broader expertise will help identify relevant risks that compliance teams might miss. Executive support is also critical to managing third-party risk across the enterprise.

Determine what forms an acceptable level of risk. Some third-party risk is unavoidable. Assessment teams should be clear about identifying risks that need action and monitoring.

2. Document third parties and identify critical risks

The second step in the assessment process is inventorying current third parties. Document all partners and create separate vendor risk assessments for each one.

Next, decide which risks apply to each supplier. The following questions are helpful when understanding vendor risk levels:

  • Does the supplier have access to internal networks and company data?

  • Are there specific regulatory risks associated with the supplier? For example, HIPAA compliance.

  • What security controls against cybersecurity threats does the third party operate?

  • Does the supplier have an incident response plan and a risk management program?

  • What certifications does the supplier have?

  • What is the security record of the third party? Have they been subject to regulatory intervention?

  • Where is the third party located? Does location matter?

  • Are business partners likely to subcontract operations to other vendors?

At this stage, you may need to request information from third parties. Create a risk assessment form for suppliers that covers relevant areas. Or request information about security certifications if this is available.

3. Classify risks on a third-party risk matrix

The next stage involves assessing the severity of each vendor risk. The best way to do this is by using a matrix to generate risk scores.

A risk matrix generally includes two axes with five entries on each axis:

  • The X-axis grades the “impact” of an event and runs from “negligible” to “catastrophic”. Scores double from left to right.

  • The Y-axis assesses the likelihood of the event occurring. It runs from “extremely unlikely” to “extremely likely.” Again, scores double from bottom to top.

Scores rise as events become more likely and severe. For example, a CRM provider might steal customer data to sell on the Dark Web. We would classs this risk as “unlikely”. But the consequences would be “severe” giving it a score of eight.

In another scenario a supplier fails to meet GDPR privacy standards. This would have a different score. In that case, the likelihood might be “likely” and the impact “major.” This results in a score of 12.

This system makes it easy to focus on the most urgent risks. And it also makes it easier to revisit risk assessments during risk audits.

4. Select third-party suppliers

Use risk classifications to grade potential or existing suppliers. Choose third parties that provide services according to your company strategy. But only pick partners with solid risk management practices.

With a robust risk assessment in place, you should be able to choose reliable and secure partners. Security teams will also know how to put in place controls to mitigate third-party risks.

5. Put in place continuous risk assessment

Risk assessment does not end when controls and smooth relationships are in place. Third-party risk assessment is a continuous process.

Revisit each third-party assessment on at least an annual basis. Check that the initial process identified critical risks. And make adjustments to reflect changes in the risk environment. For example, a supplier may have suffered a data breach. Or they may have started subcontracting services. Both changes could affect the supplier’s risk score.

Best practices for third-party risk assessment

2 best practices for risk assessment 1400x930

1. Standardize risk assessments with a consistent template

Third-party risk assessments should be comparable. Companies must assess many suppliers. And they need the ability to pick a partner that meets their risk requirements.

Create standard risk assessment and questionnaire templates for each supplier. Document risk assessments. Create a risk framework that enables informed decision-making when onboarding external partners.

2. Understand the core risks your business faces

Not all risks are equal. Focus on critical risks. These risks can damage your company’s operational, compliance, and security posture.

Risks vary between sectors. Healthcare companies must follow HIPAA guidelines. Merchants need a robust PCI-DSS compliance framework. Select the risks that suit your business profile.

3. Classify vendors according to their importance

Vendors carry different amounts of risk. For instance, food delivery services are less critical than partners hosting financial data. Clarify the most important external relationships. Make them a priority when carrying out third-party risk management.

4. Assign resources for third-party research

Third-party risk assessments should identify the strengths and weaknesses of suppliers. Research vendor security processes, compliance histories, and client support services.

5. Build risk into watertight vendor contracts

Risk assessments should feed into third-party contracts or Business Associate agreements. Make sure contracts include core compliance requirements. State areas of responsibility for external partners. Track contracts as part of ongoing vendor risk assessment.

6. Schedule risk audits for all suppliers

Risk assessments should be dynamic. Revisit each supplier assessment annually and check that previous risk classifications remain relevant. Assess data security issues, including any data breaches. Ensure suppliers are compliant with any new regulations. And assess new risks that arise as regulations change.

7. Focus on disaster recovery

When assessing third parties, always request information about their incident recovery processes. Find partners that cut downtime and restore services without compromising security.

8. Always have a vendor exit strategy

Onboarding vendors is only half the challenge. Companies should always change suppliers that fail to meet risk-based requirements. Set a minimum service level and include this in vendor contracts. And enforce this policy to avoid using non-compliant partners.

How can NordLayer help?

NordLayer’s security products will help you manage supply chain risk. IP allowlisting enables access for legitimate partners but blocks unknown identities. Users can apply multi-factor authentication (MFA). This ensures that internal employees and third parties verify their identities.

Network segmentation also allows organizations to protect confidential data and critical applications. Attackers targeting your supply chain may manage to gain network access. But NordLayer’s micro-segmentation tools restrict their ability to move between assets. As a result, the scope to extract data and damage systems is much lower.

Create a risk management program that minimizes external risks. Contact us today. Explore how NordLayer’s solutions can supplement your vendor risk management strategy.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

NordLayer features in review: Always On VPN

A stable internet connection is imperative in a digital world setup. More important is to keep those connections secure.

In a proactive move towards fortifying cybersecurity, NordLayer’s Always On VPN helps achieve this goal easily. This security feature ensures a VPN-only connection to company resources connection to company resources, online browsing, IP masking, and traffic encryption. 

The purpose of Always On VPN is straightforward: to guarantee continuous, secure internet access by disallowing unencrypted user connections.

Always On VPN reassures IT managers that the company’s cybersecurity tools are consistently and effectively utilized. When centrally activated via the Control Panel, end users can no longer disable it.

always on VPN screenshot 1The functionality enables effective security policy enforcement that is critical to ensuring adherence to internal company procedures. It helps maximize the efficiency of the deployed cybersecurity strategy.

How does Always On VPN work on NordLayer?

Designed with user convenience in mind, Always On VPN automates the VPN connection, liberating users from the task of manually connecting to the VPN.

enabled always on VPN screenshotThe feature is activated as soon as a user signs into their endpoint using the NordLayer Application with the Always On VPN feature enforced.

Always On VPN guarantees that any disruption to the VPN connection will automatically disconnect from the internet until the VPN connectivity is reestablished. Without any exceptions, every employee can only access the internet via a VPN connection, regardless of their global location.

Always on VPN is easily implemented and configured on NordLayer via the Control Panel to enforce this to all employees or specific users.

How does NordLayer’s Always On VPN feature work?

Always On VPN interweaves with other NordLayer features to offer a comprehensive security package.

enabling threat block screenshot

  • The feature ensures the effective operation of DNS Filtering and Deep Packet Inspection features per their respective settings.

  • It complements the ThreatBlock feature, which filters potentially harmful websites that users may access while connected to the company gateway.

The NordLayer application settings allow employees to toggle the Always On VPN feature on or off, given that the administrator hasn’t centrally activated it.

If the IT administrator wishes to implement the Always On VPN feature across the organization, the end users won’t be able to deactivate it once it has been centrally configured through NordLayer’s Control Panel.

How is NordLayer’s Always On VPN different?

Suppose an organization needs to meet strict security requirements imposed by stakeholders or internal policies and wants to ensure that remote users always maintain an encrypted connection. In this case, the Always On VPN feature is turned on for all users.

On NordLayer, Always On VPN can be disabled for 3 minutes. It’s useful for those needing temporary internet access to log in to the NordLayer app, handle captive portals when connecting to Wi-Fi in places like hotels and airports, and troubleshoot. Although, when the given timelapse is over, the feature restores the VPN connection for the end user.

A team that travels extensively and frequently uses public Wi-Fi would benefit from enabling the Always On VPN. This reduces risks associated with insecure network connections in an airport or while working on a train.

Organizations that deal with highly sensitive information, such as e-commerce service providers, security agencies, or certain governmental bodies, may require stringent measures to prevent data leaks. Enforcing the use of the Always On VPN ensures that internet access only occurs via a secure VPN connection.

Benefits of Always On VPN

The feature has a positive impact on different stakeholders of the organization. From streamlined internet performance for staff wherever the location they work to a larger picture of implementing organizational cybersecurity strategy.

End users (employees)

NordLayer’s Always On VPN ensures that the application connects to the VPN automatically, eliminating the need for users to verify their VPN connection status. This offers peace of mind, as working without a VPN could significantly breach a company’s security policy, resulting in a data leak.

Organizations

Implementing the Always On VPN feature allows companies to bolster their security levels. Moreover, it could potentially lower cyber insurance payments due to heightened security measures.

network organization scheme screenshot

IT administrators

Ensuring users fully utilize their organization’s cybersecurity tools can be a significant challenge for system admins. With NordLayer’s Always On VPN, admins can enforce feature usage policies and configurations, streamlining compliance and reducing risks with one button click.

Importantly, the Always On VPN feature can be enabled or disabled by admins in a few seconds using the Control Panel. This adds another layer of convenience and control to the system admin’s role.

Should you use NordLayer’s Always On VPN?

The Always On VPN feature perfectly aligns with NordLayer’s vision, providing a significant internet access security upgrade. It’s perfect for organizations with a hybrid work model and whose employees frequently travel to other countries. Manual switching of the VPN may introduce security risks, and this feature mitigates such vulnerabilities.

Without Always On VPN, ensuring a secure internet connection can become challenging. This feature enhances security and helps achieve compliance with the organization’s regulatory requirements.

FAQ

What is an Always On VPN?

An Always On VPN keeps your connection secure all the time. Once enabled, it automatically connects to the best server, ensuring continuous encryption and protection without manual intervention.

Is Always On VPN a good idea?

Absolutely! Always On VPN ensures constant security, privacy, and protection. It’s like a vigilant guardian for your internet connection, always working in the background to keep your data safe.

What is the difference between a VPN and Always On VPN?

A standard VPN requires a manual connection and may sometimes disconnect, while an always-on VPN maintains a constant secure connection. Think of it as the next level of convenience and protection – with Always On VPN, your security never takes a break.

For more information on secure and seamless connectivity, visit NordLayer.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

ESET Research analyzes Spacecolon toolset, which spreads ransomware across the world and steals sensitive data

  • Spacecolon is a small toolset used to deploy variants of Scarab ransomware to victims all over the world, and ESET Research believes it is of Turkish origin.
  • Spacecolon’s operators, named CosmicBeetle by ESET, have no clear targeting, with highest detections in European countries, Turkey, and Mexico.
  • Spacecolon can serve as a remote access trojan with the ability to extract sensitive information and/or deploy Scarab ransomware.
  • CosmicBeetle probably compromises web servers vulnerable to the ZeroLogon or those with RDP credentials that it is able to brute force.
  • CosmicBeetle appears to be preparing the distribution of new ransomware that we have named ScRansom.

BRATISLAVA, PRAGUE — August 22, 2023 — ESET Research has released its analysis of Spacecolon, a small toolset used to deploy variants of Scarab ransomware to victims all over the world. It likely penetrates victim organizations through operators compromising vulnerable web servers or via brute forcing RDP credentials. Several Spacecolon builds contain many Turkish strings; therefore, ESET believes it is written by a Turkish-speaking developer. ESET was able to track the origins of Spacecolon back to at least May 2020, and its campaigns are ongoing. ESET named Spacecolon’s operators CosmicBeetle to represent the link to “space” and “scarab.”

Spacecolon incidents identified by ESET telemetry encompass the globe, with high prevalence in European Union countries, such as Spain, France, Belgium, Poland, and Hungary; elsewhere, ESET has detected high prevalence in Turkey and Mexico. CosmicBeetle appears to be preparing the distribution of new ransomware — ScRansom. Post-compromise, along with installing ransomware, Spacecolon offers a large variety of third-party tools that allow the attackers to disable security products, extract sensitive information, and gain further access.

“We have not observed any pattern to Spacecolon’s victims besides them being vulnerable to the initial access methods employed by CosmicBeetle. Neither have we found any pattern among the targets’ areas of focus or size. However, to name a few (by type and geography), we have observed Spacecolon at a hospital and tourist resort in Thailand, an insurance company in Israel, a local governmental institution in Poland, an entertainment provider in Brazil, an environmental company in Turkey, and a school in Mexico,” says ESET researcher Jakub Souček, author of the analysis.

CosmicBeetle probably compromises web servers vulnerable to the ZeroLogon vulnerability or those with RDP credentials that it is able to brute force. Additionally, Spacecolon can provide backdoor access for its operators. CosmicBeetle doesn’t make any considerable effort to hide its malware and leaves plenty of artifacts on compromised systems.

After CosmicBeetle compromises a vulnerable web server, it deploys ScHackTool, the main Spacecolon component that CosmicBeetle uses. It relies heavily on its GUI and active participation of its operators; it allows them to orchestrate the attack, downloading and executing additional tools to the compromised machine on demand as they see fit. If the target is deemed valuable, CosmicBeetle can deploy ScInstaller and use it, e.g., to install ScService, which provides further remote access.

The final payload CosmicBeetle deploys is a variant of the Scarab ransomware. This variant internally deploys a ClipBanker, a type of malware that monitors the content of the clipboard and changes content that it deems likely to be a cryptocurrency wallet address to an attacker-controlled address.

Furthermore, a new ransomware family is being developed, with samples being uploaded to VirusTotal from Turkey. ESET Research believes with high confidence that it is written by the same developers as Spacecolon, and ESET has named it ScRansom. ScRansom attempts to encrypt all hard, removable, and remote drives. ESET has not observed this ransomware being deployed in the wild, and it appears to still be in a development stage.

For more technical information about Spacecolon and CosmicBeetle, check out the blogpost “Scarabs colon-izing vulnerable servers” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

Distribution of Spacecolon victims

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×