Skip to content

Finding MOVEit File Transfer Services

Reports of active exploitation of a zero-day vulnerability in the MOVEit file transfer software are making the rounds this week. The vendor, Progress Software, has released an advisory and this issue has now been assigned CVE-2023-34362. Attackers are abusing a SQL injection vulnerability in the web interface of MOVEit to deploy a web shell and gain access to the data stored within the platform. 

What is the MOVEit Managed File Transfer service?

The MOVEit Managed File Transfer is Windows-based application that supports secure file transfers through a web interface, as well as using SSH and SFTP. Progress Software states that “MOVEit provides secure collaboration and automated file transfers of sensitive data and advanced workflow automation capabilities without the need for scripting. Encryption and activity tracking enable compliance with regulations such as PCI, HIPAA and GDPR”. MOVEit is widely used for transferring sensitive information between a regulated organization and outside parties. MOVEit services are exposed to the internet by design, as this is necessary for users outside of the organization to use the service.

What is the impact?

Multiple security service providers, including Rapid7 are reporting active exploitation of this issue, with the attack resulting in the installation of “web shell”, often accessed through the path “/human2.aspx”. Progress Software’s advisory indications that users should look for indicators of compromise (IoCs) going back at least 30 days, indicating that this issue may have been actively exploited for weeks, and is only now coming to light. A compromise of the MOVEit server can lead to full exposure of all files managed by the service, access to the user database of the service, and could provide a foothold into the organization’s network, depending on network segmentation rules.

Are updates available?

On May 31th, Progress posted an advisory, including a download link to a patch. This advisory also describe some of the indicators of compromise and what paths and types of logs to look for to determine if the system was breached.

How do I find potentially vulnerable Progress MOVEit Managed File Transfer services with runZero?

From the Service inventory, use the following prebuilt query to locate all Progress MOVEit Managed File Transfer web services across your network:

_asset.protocol:http protocol:http (http.head.setCookie:"MIDMZLang" OR favicon.ico.image.md5:9dffe2772e6553e2bb480dde2fe0c4a6)

Progress Software MOVEit Managed File Transfer web service query

Results from the above query should be reviewed for indicators of compromise and updated with the latest patch from Progress.

As always, any prebuilt queries are available from your runZero console. Check out the documentation for other useful inventory queries.

Get runZero for free

Don’t have runZero and need help finding MOVEit Managed File Transfer services?

Get started

Learn more about runZero

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

Finding Barracuda Email Security Gateways

Exploitation of Barracuda Email Security Gateway (ESG) appliances has made the news recently, including on-going investigation into the attacks. Leveraging a zero-day vulnerability as far back as October 2022, attackers compromised ESG targets to deploy malware that created persistent backdoor access on victim networks. This unauthorized access could have been used by attackers as a foothold for further network exploration or lateral movement, and evidence does exist that some attackers stole data via these compromised ESG targets. Barracuda identified the exploited vulnerability (known as CVE-2023-2868 with a “critical” CVSS score of 9.8) and has pushed fixes out to ESG devices worldwide, but even with these fixes, unauthorized presence on compromised networks can still exist if attackers already located and leveraged another exploitable target on the victim network. CISA has also added this vulnerability to their KEV catalog, with a BOD 22-01 due date of June 16th, 2023.

What is the Barracuda Email Security Gateway?

The Barracuda Email Security Gateway (ESG) is offered as a complete email management solution. In addition to traditional email service and management, ESGs provide security-focused capabilities such as message encryption and email filtering (for catching threats and data exfiltration). ESGs exist as both physical appliances and virtual appliances.

What is the impact?

Barracuda identified a command injection vulnerability (CVE-2023-2868, CVSS score 9.8) that exists in ESG versions 5.1.3.001 through 9.2.0.006. Due to ineffective input sanitization, a specially crafted tar archive file can be sent to vulnerable ESG targets to trigger unauthorized command execution as the ESG user. While Barracuda has made software updates available, the possibility that attackers used exploited ESG targets to pivot to – and potentially establish persistence on – other systems in a victim network is a real threat.

Are updates available?

On May 20th, Barracuda pushed out a fix to all ESGs worldwide. This was followed by a script pushed out on May 21st to “contain the incident and counter unauthorized access methods.” Barracuda continues to push security patches as part of their containment strategy. Owners or admins of Barracuda Email Security Gateway appliances should verify their ESG instances are accepting and applying current updates being sent out by Barracuda, and can also check for indicators of compromise.

How do I find potentially vulnerable Barracuda Email Security Gateways with runZero?

From the Asset inventory, use the following prebuilt query to locate all Barracuda Email Security Gateway instances in your network:

hw:"Barracuda Email Security Gateway"

Barracuda Email Security Gateway query

Results from the above query should be triaged to verify they are running Barracuda’s latest patches.

As always, any prebuilt queries are available from your runZero console. Check out the documentation for other useful inventory queries.

Get runZero for free

Don’t have runZero and need help finding potentially vulnerable Barracuda devices?

Get started

Learn more about runZero

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

Top 5 AI Cyber-Attacks & Threats

Artificial Intelligence (AI) has enabled impressive progress in many fields, but as our reliance on it grows, so does its abuse. As remarkable advancements like ChatGPT, Dall-E, Vall-E, and other AI models reshape our digital landscape, there’s a pressing concern—AI cyber-attacks. Cybersecurity, as we know it, is being challenged, and we need to respond effectively.

AI Cyber-Attacks: A New Battlefield

AI’s potential to revolutionize cyber threats is immense. With AI, hackers can craft human-like text, generate phishing emails, and automate the creation of malicious content. For example, an AI model trained on known vulnerabilities can generate new malware, making it a potent weapon in the hands of cybercriminals.

The threat is not hypothetical; AI’s impact on cybersecurity is here. Hackers can quickly create sophisticated, hard-to-detect attacks. Take, for instance, a phishing email; an AI model can generate convincing emails that can easily dupe the untrained eye. The old telltale signs of a phishing email – poor grammar, awkward language, and misuse of overly formal language – no longer apply. And Vall-E’s ability to imitate someone’s voice adds another layer of deception to phone-based social engineering attacks.

The Rise of AI Ransomware

Recent reports underscore AI’s increasing use in conceptualizing and executing cyberattacks. According to the report, here are the different ways hackers are leveraging AI today:

  • Dataset creation and validation: Assembling and refining data that the AI model learns from, ensuring it’s relevant and high quality.
  • Potency assessment of malware: Evaluating the effectiveness and potential impact of malware, optimizing it for maximum harm.
  • Exploit mapping and malware modification: Using AI to identify system vulnerabilities and tailor malware to target these points.
  • Sandbox evasion testing: Using AI to enhance malware’s ability to evade detection within isolated, controlled environments (sandboxes).
  • Release of AI-modified malware: Unleashing optimized, AI-modified malware to its intended targets, leading to potentially more adaptive and damaging threats.

One notable instance was a variant of Lockbit 3.0 ransomware that was modified using AI. Evidently, hackers are leveraging AI to devise and deploy more sophisticated malware.

The rise of AI cyber-attacks is still nascent, but experts anticipate a surge. Bad actors can deploy AI to identify potential targets, create new malware variants, identify security gaps, schedule automated attacks, and even manage the operation of bot farms.

Top 5 AI Cyber-Attacks & Threats

While hackers can leverage AI for a wide range of cyber-attacks, these are the areas they’re laser-focused on today:

  1. Advanced Persistent Threats (APTs): These long-term attacks use AI to avoid detection and target specific entities.
  2. Deepfake Attacks: AI-generated synthetic media is used to impersonate individuals for fraud or disinformation.
  3. AI-Powered Malware: Self-evolving malware using AI to avoid detection and adapt to changing environments.
  4. Phishing: Using natural language processing and machine learning, attackers craft convincing phishing emails to trick individuals.
  5. DDoS Attacks: Employing AI to identify and exploit network vulnerabilities, magnifying the scale and impact of attacks.

Responding to AI Cyber-Attacks

ChatGPT and other generative AI tools may have simplified cybercrime, but we can counter this rise. It’s crucial to:

  • Understand that malware can now be more sophisticated and harder to detect, thanks to AI.
  • Be vigilant about personalized phishing emails that lack the usual scam signs.
  • Recognize the potential of deep fakes in fraudulent activities.
  • Acknowledge that CAPTCHAs and passwords are no longer impenetrable shields.
  • Be aware of the potential sabotage in ML-based cyber threat detection.

AI cyber-attacks are a stark reality in our digital age. As AI shapes the future of cyber threats, we must adapt and fortify our defenses. Our digital world’s safety hinges on a proactive and informed approach to cybersecurity. It’s a battle, but one we cannot afford to lose.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

How to Prevent IoT from Ruining Your Life

One of the worst things you can go through as a company is a data breach. It costs a small fortune (average of $4.35 million as of 2022), destroys your reputation, often leads to bankruptcy, and takes a massive toll on your employee’s well-being. Thus, preventing a data breach should be top of your to-do list. Today, that means taking a hard look at your connected endpoints – starting with IoT – and making sure you have the necessary tools to keep them from putting you at risk. 

Safety Third for IoT 

IoT (Internet of Things) is loosely defined as devices other than computers and networking equipment that connect to the internet, and these days that is just about everything. There are currently over 13 billion IoT things connected around the globe, with that number projected to grow two-fold to 25.4 billion by 2030.  

The unfortunate reality of these billions of devices is that they are not designed with security at the top of the list…if it’s even on the list. Default administrator passwords, security patches that are slow to be released if at all, and impossible to update firmware are some of the many ways IoT devices make your network vulnerable.  

Behold, IoT Fingerprinting! 

One of the trickiest things about IoT devices is just figuring out that they’re there. IoT devices prioritize ease of setup and use (most of them just connect to the internet and away you go) over best security practices, which makes them an attractive target for hackers. They don’t respond to SNMP, WMI, or other common monitoring protocols, and they typically run locked-down operating systems that don’t allow for additional software like agents. It’s easy for them to hide in plain sight, just waiting to be exploited.

This is where IoT fingerprinting comes in – a good option here is a NAC solution that has the ability to pull information from IoT devices to give you critical information like operating system, manufacturer, and firmware version. There are several ways to get this information with various levels of accuracy – Nmap scanning, DHCP, NetFlow, MAC address look up, etc. Many of these options require additional configurations or features in your network, so it’s important to pick one that will work with what you already have without creating any network latency. 

Staying in Your IoT Lane 

In 2017, a casino was hacked using a fish tank as an entry point. Two buildings in Finland had their heat turned off in November through a DDoS attack on the internet-connected thermostats (and with the average temperature just a bit above freezing, that put some lives at risk.). When security startup Verkada was breached, hackers got access to not only the live camera feeds, but archived security camera footage from Tesla, Equinox, Cloudflare, and others. 

One of the most important ways to protect your networks is making sure they are segmented – the practice of separating your network into different VLANs with limited access to specific resources. This is particularly important for your IoT devices because if they are breached, you don’t want the hackers to be able to move through your network and cause further damage. Ideally you would create a special IoT VLAN that had internet access only, and then use a security tool like a NAC to automatically move all of your IoT devices to that specific VLAN.   

After all, your fish tank probably does not need access to your customer database.  

Spoof Proof IoT 

When it walks like a duck, but barks like a dog…. 

One challenge in adding IoT devices onto your network is the fact they don’t support 802.1x authentication. That means they need to bypass your usual safeguards and get on some other way.  

MAC Authentication Bypass (MAB) is a way for a device to authenticate based on its MAC address, rather than any kind of certificate or identity provider. Essentially, a device connects to a switch or wireless access point and then does not respond to requests for 802.1x authentication (because it can’t). The device then sends a packet containing its MAC address to the switch, which forwards it onto the RADIUS server and determines if it gets access or not.

MAB

Obviously, the issue here is that there is no real authentication happening, so you need something to ensure you’re not just letting every device onto your network. The most common way to do this is to set up a MAC address filter, which your RADIUS server will then use to validate that the device asking for access is allowed, but that’s still not a great solution because MAC addresses can be spoofed. 

Spoofing is, in fact, laughably easy – a quick Google search yields over 6 million how-to results! To prevent a potential bad actor from gaining access, you want to make sure you have a solution that can do some kind of comparison between a device’s past behavior and present behavior so that if a security camera suddenly starts behaving like a laptop, you can remove it from the network. 

If all this seems a bit overwhelming, well, securing IoT can definitely be a big undertaking.  

IoT Device Trust 

Thankfully, there are tools in the zero trust security space that have recognized how important it is to keep these devices secure and can do most of the heavy lifting for you. Portnox combines all of these features – fingerprinting, access control, and secure MAB, into a collection called IoT Device Trust.  These features are key to keeping your network secure no matter how many things live on your internet.  

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Why AI is Key to Ensuring IoT Security in the Digital Age

The Internet of Things (IoT) has become an integral part of our daily lives, from smart homes to connected cars and beyond. However, with the increasing number of connected devices, the risk of security breaches has also grown.

That’s where Artificial Intelligence (AI) comes in, providing a powerful tool for enhancing IoT security. By allowing networks and devices to learn from past decisions, predict future activity, and continuously improve performance and decision-making capabilities, AI unlocks the true potential of IoT. With this in mind, let’s explore the crucial role of AI in securing the IoT landscape and how this convergence of technologies is shaping the future of our connected world.

The Cybersecurity Skills Shortage

According to a 2022 workforce study, the global shortage of skilled cybersecurity professionals has more than doubled since 2019, leaving a gap of 3.4 million professionals. It’s a dire situation and one that’s impacting IoT security significantly.

The shortfall in qualified cybersecurity personnel means that many organizations are struggling to keep pace with the evolving cyber threat landscape and implement adequate security measures to protect their IoT devices. The consequences of this skills gap are profound, with potential security breaches and data theft leaving organizations and individuals exposed to significant risks.

But by converging AI and IoT security, we can reduce the impact of this skills gap. AI can help automate security processes and reduce the burden on human experts, while IoT devices can generate valuable data to train AI models. Over time, these models will become skilled at detecting threats and anomalies and shutting down cyber attacks swiftly.

How Attackers Target IoT Devices

Attackers use various methods to target IoT devices, and understanding these methods is crucial for developing effective cybersecurity strategies. Some common methods include:

  • Initial reconnaissance: Attackers scan the network to identify vulnerable devices they can target.
  • Physical attacks: Attackers can use a variety of physical attacks to disrupt the functionality of IoT devices, like outage attacks which involve shutting off the network that the devices are connected to. Attackers can also damage devices or their components to prevent proper functionality.
  • Man-in-the-middle attacks: Attackers intercept and manipulate data as it is transmitted between devices on a network, giving them access to sensitive information and the ability to control the devices themselves.
  • False data injection attacks: Attackers send malicious data to IoT devices, which can cause them to behave in unexpected ways or compromise their security.
  • Botnets: Attackers can take control of many IoT devices, turning them into powerful tools for launching attacks such as distributed denial of service (DDoS) attacks.

Why IoT Needs AI: Artificial Intelligence and Machine Learning In Cloud Computing

The sheer scale and complexity of the IoT landscape make it challenging to secure, manage, and analyze. Enter AI. AI and the Internet of Things (AIoT) represent a powerful combination that can unlock new levels of performance and efficiency while also addressing some of the most pressing challenges facing IoT.

Cloud computing, as the backbone of IoT, also faces significant challenges in ensuring security. Here are some ways AI/ML can combat emerging cyber threats in cloud computing:

  • Anomaly detection: We can train AI/ML to recognize unusual or unexpected behavior in IoT devices and cloud networks. This helps to detect cyber attacks and breaches before they cause significant damage. For instance, AI/ML can detect unusual network traffic patterns or attempts to access data from unauthorized sources.
  • Malware detection: AI/ML can be trained to identify and classify malware using features such as file size, code structure, and behavior. This can help organizations swiftly detect and remove malware from their cloud computing systems.
  • User behavior analysis: AI/ML can analyze user behavior and detect anomalous activities such as excessive data access, unusual login times, and unusual data transfers. This capability can help organizations identify potential insider threats and prevent data exfiltration.
  • Network segmentation: We can use AI/ML to identify and segment IoT devices based on their level of risk. This approach can help organizations isolate vulnerable devices and limit the spread of malware or cyber-attacks.
  • Automated threat hunting: AI/ML can automatically scan cloud computing systems and identify potential threats, such as new vulnerabilities or suspicious activities. This approach can help organizations stay ahead of emerging threats and prevent them from causing significant damage.
  • Predictive analysis: AI/ML can analyze data from various sources to identify trends and patterns that could indicate a potential attack. Predictive analysis can also help organizations to anticipate threats and develop proactive strategies to prevent them. For example, AI/ML can analyze log files to detect changes in system behavior that may indicate a potential attack.
  • Real-time monitoring: AI/ML can also monitor cloud computing systems in real-time and provide alerts when suspicious activities are detected. This capability allows organizations to respond to cyber threats quickly. For example, AI/ML can monitor login attempts to detect brute-force attacks or attempts to bypass authentication.
  • Automated response: AI/ML can automate the response to cyber threats, such as isolating affected systems or blocking malicious traffic. Automated response enables organizations to respond quickly to cyber threats and limit the damage caused by them. For example, AI/ML can automatically block IP addresses associated with malicious activity.
  • Adaptive security: AI/ML can be used to adapt cloud computing security policies and configurations based on real-time threat intelligence data. This approach can help organizations respond quickly to emerging threats and prevent them from causing significant damage.

The AI/ML Problem

While rapid advancements in AI/ML have led to a new era of highly efficient AIoT devices and bolstered IoT security, they’ve ushered in a new problem. Cybercriminals are also capitalizing on this technology, using it to develop more sophisticated cyberattacks. And this is especially worrying for IoT security, where millions of devices are interconnected, and vulnerabilities in one can compromise the entire system.

Final Thoughts on AI and IoT

AI is an invaluable tool in enhancing cybersecurity in an increasingly hostile IoT cyber threat landscape. By leveraging AI and IoT together, we can identify threats, detect anomalies, and respond to attacks in real-time. This allows us to stay one step ahead of the cybercriminals.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×