Skip to content

What’s New? Quarterly Release 24.2 Mimas

This article covers what’s new our latest Quarterly release series from December 2023 to February 2024. Read the release notes here

Comet 24.2.0 Mimas

We’re very pleased to announce our latest Quarterly release series – Comet 24.2 Mimas. This is the the latest entry in our quarterly rollup series, that branches off from our main rolling Voyager development into a fixed target for you to qualify and build your service offering upon.

Mimas is named after a moon of Saturn, which in turn takes its name from an ancient Greek mythological giant. Mimas is relatively small compared to Earth’s moon, with a diameter of about 396 kilometers (246 miles). Its composition is primarily made up of water ice with a small amount of rocky material. Its most distinguishing feature is a giant impact crater which stretches a third of the way across the face of the moon, making it look like the Death Star from “Star Wars.”

For users coming from the previous 23.11 Saturn quarterly release series, Mimas adds 3 features and 15 enhancements, including Dark Mode for the Comet Server web interface and a Debian installer for the Comet Backup desktop app as mentioned below.

The full set of changes can be found in the release notes.

Webinar announcement

If you’d prefer to watch rather than read, we’re hosting a webinar to discuss this new quarterly release and all the new changes. Please register before we go live on Tuesday 12 March (4pm ET / 1pm PT) to catch up on all the latest Comet news with Comet’s CTO, Mason – and as usual, there will be time for a live question-and-answer session at the end of the presentation.

As well as that, we have many more videos available on our YouTube channel, including guides on getting started with Comet, individual features, demonstrations with our technology partners, and webinars for previous quarterly software releases.

Dark Mode for the Comet Server

To continue our visual improvements to the Comet Server web interface we have added Dark Mode support. This completely overhauls the look and feel of the Comet Server and automatically applies based on the theme you have chosen for your system. Next time you have a chance check it out by logging into your Comet Server and clicking the new toggle button in the top right corner.

Light Mode:

Dark Mode:

Debian Installer for the Comet Backup desktop app

To make it easier to install Comet on your Debian Linux installs, we are pleased to announce our new Debian Installer. Our new installer will walk you through all of the required steps to install Comet. Comet is installed as a systemd service meaning it will now automatically start when your device boots.

Once installed you can still upgrade Comet remotely using the Comet Server web interface meaning you now have multiple options for managing, installing and upgrading Comet on your Linux devices.

Improved S3-compatible Object Lock Performance

Object Lock is a great way to add additional security to your data stored in an S3-compatible Storage Vault. This month we’ve been hard at work finding ways to optimize Comet’s performance when backing up to an S3-compatible Storage Vaults. We have found a way to significantly decrease the time taken to extend the object lock duration on objects stored in the vault. As a result, backup jobs to an S3-compatible Storage Vault now complete up to 16 times faster than before.

Custom Headers added for Custom Remote Buckets

Comet has a great list of S3-compatible storage providers that we have storage templates for. To add better support for other S3-compatible storage providers you can now add Customer Headers to a Custom Remote Bucket in the Comet Server web interface. This greatly expands your options for which provider you would like to use as you can now add additional data such as long lived authentication tokens as part of the request Comet makes when connecting to the storage provider.

Faster Logins between the Comet Account Portal and Comet Hosted

Once Comet Hosted is running our new 24.2.0 Mimas release, we will enable the overhauled login button for Comet Hosted servers from the Comet Account Portal.

The new login button shares credentials between the Comet Account Portal and Comet Hosted meaning you no longer need to remember two sets of passwords. Because of this we have been able to solve all of the failing cases and can provide you with a reliable login experience for your Comet Hosted servers.

Once you’ve logged in with the new system for the first time, when you log out of your Comet Hosted Server you will see a new Login with Comet Account Portal appear on the login page. This allows you to jump straight back into your Comet Hosted server faster than ever before. This button will only appear on web browser sessions that remember you’ve clicked the login button from the Comet Account Portal first to ensure we don’t show Comet branding to unexpected users of your Comet Hosted Servers.

VM Pricing Adjustments

At Comet, we are committed to continuously improving our products and services to meet your evolving data protection needs. In order to do this, occasionally we find it necessary to make adjustments to our product offerings. We are updating our pricing structure in order to further standardize our virtual machine protected item types – VMware and Hyper-V.

Effective February 28th 2024, we are introducing a new unlimited guest license option for VMware, priced at $39. If you have 8 or more VMware guests backing up, you will automatically get the unlimited pricing; no action needed on your part. This change supports your business growth as you scale and add VM deployments.

Also as of February 28th 2024, we are dropping the $2 base charge for Hyper-V. You will only pay the booster charge for all virtual environment backups (both VMware and Hyper-V) going forward.

To bring our virtual machine licensing into alignment, starting February 28th 2024, Hyper-V licensing will be charged at $3 per guest or $24 for unlimited guests per host.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

How to use dark web monitoring: a talk with Mary D’Angelo

Today is just like any other day at the office. You are going through emails and laying out plans for your company’s upcoming big project when suddenly, your screen freezes. None of the troubleshooting steps work. Quickly, your IT team becomes anxious; the company’s network has stopped working. The reason is a security breach tied to stolen credentials from RIPE, an organization that assigns IP addresses across numerous countries.

This situation is similar to what Orange Spain experienced, suffering an outage due to a hacker who improperly accessed their RIPE account. Researchers at Resecurity have noticed a troubling trend: the dark web now houses millions of stolen network operator credentials, which cybercriminals are poised to misuse.

The dark web serves as a hidden space where these stolen credentials remain unseen. It is also where attackers coordinate their plans and recruit accomplices for future breaches. 

For businesses, keeping an eye on the dark web is vital. It helps uncover new threats and trends as they arise. 

Equally important are cybersecurity practices. They shield businesses from an increasing array of cyber threats. 

By combining dark web monitoring with solid cybersecurity, businesses can establish a protective strategy to remain secure.

That’s why we talked with Mary D’Angelo, a leading Cyber Threat Intelligence and Dark Web Advisor. We discussed how the dark web works and explored why businesses might need dark web monitoring.

The interview’s highlights

  • The deep web makes up 80% of the internet, while the dark web and clear web each make up 10%.

  • The US Navy originally created the Tor network for good reasons, but now less than 1% is for whistleblowers and journalists.

  • Dark web monitoring lets businesses see planned attacks, indicating the immediate need for protection.

  • Ransomware groups are growing, and threat actors are switching to platforms like Telegram.

  • Companies should combine dark web monitoring and cybersecurity practices for early threat detection.

Key insight #1: the clear web makes up only 10% of the internet

NordLayer: To start, what is the dark web?

Mary D’Angelo: When I discuss the dark web, I refer broadly to its distinction from the deep web and the clear web. The dark web is a segment of the internet accessible only through specialized software, typically Tor, which I’ll mostly reference. It’s because Tor is the most commonly used. The deep web and clear web are other internet segments. The clear web includes anything findable via Google and other search engines. The deep web, while still accessible through search engines, comprises sites that are very hard to enter. Statistics indicate that the deep web constitutes 80% of the internet, with the dark web and the clear web each accounting for only 10%.

Dark web takes up to 10% of the internet

NordLayer: The dark web ensures anonymity and is technically limitless. How does the Onion Router contribute to this anonymity?

Mary D’Angelo: The Onion Router, a type of software made to connect to the dark web, encrypts messages in multiple layers, similar to an onion. These messages, when sent, pass through various relays or nodes, mixing up communications. Upon receiving a message, each relay cannot trace its origin, making it extremely difficult to track the messages and users’ activities.

Key insight #2: the original purpose of the dark web, initiated by the U.S. Navy, now makes up just 1% of its current content

NordLayer: Could you explain the legal and illegal aspects of the dark web?

Mary D’Angelo: It’s a common misconception that the dark web is entirely illegal. Initially, the Tor network was developed by the US Navy research team to enable secure communications. 

The primary purpose of the dark web was to assist journalists and whistleblowers in remaining anonymous and using encrypted messaging on a privatized platform. Over time, it has evolved to host a significant amount of illegal activity. 

It’s estimated that 40% of the dark web is comprised of child sexual exploitation material, with less than 1% now dedicated to whistleblower and journalism activities. The majority involves illegal marketplaces, threat actor forums, ransomware groups, and similar entities.

NordLayer: But the dark web also has positive uses for privacy and free speech. Can you discuss them?

Mary D’Angelo: The dark web is valuable for media organizations and individuals in censored countries, providing a secure communication channel. Organizations like ProPublica use the dark web for secure communications, offering a platform for whistleblowers and those reporting from repressive regimes.

NordLayer: Considering its origins, does the dark web offer more security than platforms like Amazon?

Mary D’Angelo: The comparison depends on what you mean by security. The dark web provides anonymity, encrypted messaging, and privacy, even for websites. Users on the dark web enjoy encrypted and anonymized communication unseen by others. Conversely, Amazon tracks all user information, making the dark web, in some respects, more secure. However, this anonymity also contributes to the prevalence of illegal activities.

NordLayer: Is regulation of the dark web a significant challenge?

Mary D’Angelo: Yes, law enforcement faces considerable difficulties in tracking down illegal activities due to the dark web’s structure. Although recent efforts have improved, the process is complex and time-consuming.

NordLayer: Can dark web marketplaces be shut down successfully?

Mary D’Angelo: Marketplaces like Silk Road and Alpha Bay have been taken down by law enforcement, involving extensive international investigations. Often, the downfall of these sites is due to the carelessness of threat actors. However, new marketplaces frequently emerge, creating a continuous cat-and-mouse game between law enforcement and dark web users.

NordLayer: How does law enforcement investigate the dark web?

Mary D’Angelo: Investigations involve collaboration with various agencies and platforms like ours that can index and search the dark web efficiently. Law enforcement builds cases on threat actors, tracking their movements and communications, often capitalizing on their mistakes to dismantle operations.

Key insight #3: dark web monitoring helps to detect the threat on its planning stage

NordLayer: How did your interest in the dark web begin?

Mary D’Angelo: My journey into the dark web began with my background in cybersecurity and network detection. Joining Searchlight Cyber, I deepened my understanding of threat intelligence and the significance of dark web monitoring to identify potential security threats to organizations.

Dark web is a hub for threat actors to plan attacks

NordLayer: Why is it important for businesses to monitor the dark web?

Mary D’Angelo: The dark web is a hub for threat actors to plan attacks. Dark web monitoring allows businesses to detect potential threats early in the planning stage, giving them more time to prevent attacks.

“You can also try NordLayer’s ThreatBlock to prevent threats. It automatically blocks access to harmful websites, making it easier to avoid entering a malicious site. You won’t see harmful ads and pop-ups, and you will be prevented from accessing websites linked to illegal activities or those marked as unsafe in trusted databases. This tool makes life easier.”

Martyna Gaidelė, Product Marketing Manager at NordLayer

Click to tweet

NordLayer: So how can organizations monitor the dark web effectively?

Mary D’Angelo: Companies like Searchlight Cyber provide services to monitor the dark web safely and efficiently, helping businesses to protect themselves without risking exposure to malicious content.

7 stages of cyber-attacks

NordLayer: Can you share a success story related to dark web monitoring?

Mary D’Angelo: Our human intelligence team does a lot of the undercover work. Accessing some dark web sites is tough; it requires specific permissions. Our team managed to enter these sites and found someone selling domain access control credentials for a large US airline. They didn’t name the airline to avoid detection but shared details like the revenue size, location, and access type. High pricing often indicates legitimacy. Upon discovering this, I contacted the airline’s security team to alert them, despite them not being our client. We then discussed the intelligence, which was new to them, and together, we devised a plan to enhance their security.

NordLayer: That’s impressive. What security measures do you generally recommend to introduce? 

Mary D’Angelo: We generally suggest enforcing multi-factor authentication (MFA) across all platforms. The approach depends on the attack type, but ensuring MFA is in place is crucial so that only authorized individuals have access.

“Multi-factor authentication (MFA) is an essential part of NordLayer. However, we advocate for a broader range of multi-layered authentication solutions and encourage our customers to implement more comprehensive Zero Trust Network Access (ZTNA) strategies.

Multi-layered network access control minimizes the risks of data breaches and aids in achieving compliance certificates, contributing to business credibility as well.

My favorite NordLayer features for network access control are the Cloud Firewall and Device Posture Security. They are easy to use and powerful solutions, ensuring advanced network access control.”

Martyna Gaidelė, Product Marketing Manager

Click to tweet

Key insight #4: Ransomware groups are hiring, which means even more attacks in 2024

NordLayer: Have you observed any trends in the dark web, such as an increase in ransomware groups?

Mary D’Angelo: Last year, we saw ransomware groups increase their recruitment. This means that they only plan to increase their attacks. They now have larger budgets because they were so successful last year in terms of the ransom payments. And so now they have more purchasing power, they can buy better exploits and better credentials. Bad actors also have their AI tool, called fraud GPT, which can just more easily and quickly make very sophisticated attacks.

Related articles

 

In Depth

NordLayer insights: the making of a Black Friday cyber scam

14 Nov 20238 min read

NordLayer insights: the making of a Black Friday cyber scam

 

Partner Program

Capitalizing on threats & opportunities – now is the time to venture into cybersecurity

17 Aug 20236 min read

Taking advantage of threats and opportunities web cover 1400x800

 

NordLayer: How can businesses and law enforcement adapt to the evolving threat landscape on the dark web?

Mary D’Angelo: Understanding the tactics, techniques, and procedures (TTPs) of threat actors allows organizations to build more effective defenses. Monitoring threat actor movements helps in developing predictive security measures.

NordLayer: There is also a kind of “Robin Hood” mentality among some ransomware groups. Can you elaborate on this?

Mary D’Angelo: Interestingly, some ransomware groups adhere to a moral code, avoiding attacks on hospitals and focusing on other targets. This nuanced behavior among threat actors highlights the complex ethical landscape of the dark web.

Ransomware groups have been increasing their recruitment and budgets

NordLayer: Despite some groups avoiding healthcare targets, the sector remains highly vulnerable. Why is that?

Mary D’Angelo: The healthcare sector often faces the highest ransom demands, with many hospitals lacking the security infrastructure to defend against sophisticated attacks. The sale of access credentials to healthcare institutions is alarmingly common.

NordLayer: There’s also a trend where threat actors are shifting from dark web forums to encrypted messaging platforms like Telegram. Why do you think threat actors are choosing these platforms?

Mary D’Angelo: The shift to encrypted platforms like Telegram reflects threat actors’ increasing paranoia and desire to evade detection. As law enforcement and security firms improve their monitoring capabilities, actors seek new ways to communicate securely.

Healthcare sector and ransomware

NordLayer: How do you conduct research on the deep web and platforms like Telegram?

Mary D’Angelo: Our team utilizes a combination of human intelligence and proprietary automated technologies to gather intelligence from various platforms. This allows us to monitor threat actor activities across the deep web and dark web comprehensively.

NordLayer: What future research directions do you see for dark web intelligence?

Mary D’Angelo: Collaborating with security practitioners and academic researchers can lead to innovative strategies for mitigating risks and combating cyber threats. Future research will likely focus on predictive analysis and the development of more sophisticated defense mechanisms.

Encrypted platforms need increase

Key insight #5: for businesses to stay safe, they need all employees to be aware of possible attacks

NordLayer: What general advice would you give businesses to enhance their security?

Mary D’Angelo: Businesses should prioritize early detection of threats by monitoring for reconnaissance activities. Leveraging threat intelligence to understand the landscape and adopting a proactive security posture can significantly reduce the risk of attacks.

NordLayer: How important is cybersecurity awareness?

Mary D’Angelo: Cultivating a culture of security throughout an organization is crucial. Integrating cyber threat intelligence across all levels can inform strategic decisions and prioritize security measures, ultimately making it more difficult for threat actors to succeed.

Proactive security costs less

NordLayer: In conclusion, investing in cybersecurity is more cost-effective than facing the consequences of a ransomware attack.

Mary D’Angelo: Absolutely. The cost of proactive security measures is significantly lower than the potential losses from a successful cyber attack.

How NordLayer can help

NordLayer offers a comprehensive security approach, protecting your team with Threat Prevention from harmful sites, securing online activities with VPN, and ensuring appropriate access with Cloud Firewall. Beyond these tools, we advocate for adopting Zero Trust Network Access (ZTNA), Security Service Edge (SSE), and other cybersecurity frameworks to strengthen your defense. Our sales team is always here if you need any help along the way. 

Beyond NordLayer’s offerings, it’s essential to create a culture of cybersecurity, maintain up-to-date software, and use secure communication tools. Additionally, assessing your vendors through a Third-Party Risk Management Plan and restricting their access can significantly mitigate risks.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×