Skip to content

How we implemented traffic routing in Meshnet for increased security

featured image

How a classical VPN server works

First, we should understand how a classical VPN server operates. Meshnet uses the NordLynx protocol, which is based on WireGuard® – a simple, fast VPN that uses state-of-the-art cryptography. For this article, we’ll refer to WireGuard (wg) in our examples and graphics.

A standard configuration would look like this:

A standard VPN configuration.

To arrive at this setup, a couple of things need to happen.

First, let’s establish a secure tunnel (purple dotted connection):

  1. Virtual network interfaces, labeled as wgC and wgS, (which work like tun adapters) are created on both client and server sides.

  2. The client uses a UDP socket to establish a cryptographic session with the server’s address at 192.0.2.1:51820 (in the diagram above, subnet 192.0.2.0/24 stands for wide area network).

  3. Private IP addresses (100.64.0.2, 100.64.0.1) are assigned to the client and server respectively.

At this point, the client can ping the server using the IP address 100.64.0.1, and the server can ping the client at 100.64.0.2. All IP packets sent through the wgX interface are encrypted and sent via the global internet. The real path of the packet is something like this: wgC –(encapsulate)–> lanC –> lanR –> netR –> netS –(decapsulate)–> wgS

But to the OS, the wgX interface is just another network connection to where IP traffic can be routed, similar to a LAN router.

To the OS, a virtual interface is just like any other network connection.

Now if the client wants to conceal its real IP address, it can configure the routing table to direct all default traffic through the wgA interface (some precautions are needed to avoid routing the encrypted traffic itself, but that’s out of the scope of this article).

Meanwhile, the VPN server needs to be configured to function like a router, accepting incoming packets and forwarding them to their next destination. For this, two features are required:

IP forwarding

In most network stack implementations, if a packet arrives on a network interface, it can only be sent out on the same interface. So when the server receives a packet from the wgS interface that’s directed to an IP address outside the network’s subnet, it is dropped.

Enabling IP forwarding changes this behavior. Now, when a packet arrives at a network interface, it is checked against the network’s entire routing table. If another network interface provides a better match, the packet is forwarded to that interface.

Packet path on the server would look like this:  … -> wgS –(ip_fowarding)–> netS -> …

NATing

IP packets arriving at the VPN server will have a private IP address like 100.64.0.2, assigned to the wgC interface. In most cases, these packets will be directed to a publicly routable IP address. After the packet gets forwarded to the netC interface, it still can’t be sent out, because its source address falls within the private network range. The router uplink only deals with public IP addresses and wouldn’t know which device is sending the packet.

As such, NAT (network address translation) is used. For every packet that has a unique source IP, port, and in some cases destination, a unique mapping is created in the NATing table.

For example, if a TCP packet comes from 100.64.0.2:AAAA, it would be mapped to a 192.0.2.1:BBBB address (here AAAA is the port used by software on the client device, and BBBB is a randomly assigned unused port on the server).

The TCP’s packet’s source IP and port would then be exchanged for NAT mapped values, checksum adjusted, and finally sent out on its merry way to the wider internet.

If another computer responds to this BBBB port, the NATing table is consulted and destination IP and port values revert to the original values before the packet is sent to the wgC interface.

And that’s all for a very rudimentary setup!

Supportable platforms

The main challenge with these two requirements is that they limit the number of devices that can function as routers (apart from implementing a user space transport layer multiplexing/demultiplexing logic).

Typically, if we want to set up IP forwarding and NAT, we need root/administrator permissions. Most platforms with strong sandboxing like macOS App Store, iOS, and Android do not provide official APIs to enable this.

That leaves 3 “platforms” we do support:

Linux

Linux is the easiest one of the bunch because it has everything we need already built in, and our NordVPN service, running as root, can set everything up.

macOS Sideload

Unlike the App Store version (which I count as a separate platform), with macOS Sideload applications it’s possible to create launchd services that run with root permissions. This unlocks features that Darwin (the core Unix operating system of macOS) inherits from BSD like ip_forwarding and pf (packet filter), which are used to set up NATing and filtering.

Windows

Setting up IP forwarding is as trivial as a registry modification. However, even if Windows has an official NAT, we found it difficult to use during testing. It does not properly work with Windows Home editions. Being primarily designed for use with Hyper-V, a lot of undefined behaviors crop up when working with our custom adapter drivers. To work around this, we built and shipped our own implementation for NAT.

How Meshnet traffic routing works

Now that we know how a regular VPN server looks and works, we can compare it to how it operates in Meshnet:

Diagram of Meshnet-enabled VPN configuration.

A Meshnet VPN configuration.

The first interesting difference to observe is that, unlike a VPN server, in general, both Meshnet devices will be located in their local area networks.

And without Meshnet’s NAT traversal capabilities, turning a device into a VPN server for easy connection by other devices would be challenging.

The second difference is that your dedicated VPN server will usually have not one, but two NATing steps.

  1. The client’s (device A) source IP is changed to the server’s IP (device B).

  2. The server’s IP (device B) is then changed to the router’s IP.

This unlocks some interesting behavior: If device A is your phone, and device B is your home PC, routing through B makes it appear to your network that your phone is actually your PC. This allows you to securely access your home network without needing API services hosted on a public server.

And if you use a service that only allows access from your home network, it becomes impossible to tell whether the network messages are coming directly from your home PC or a device routing through it.

At this point, if you are even slightly inclined towards security, some alarm bells may be ringing.

Security considerations

Traffic routing is a very powerful feature:

  • You can take over a local network.

  • The device functioning as a VPN server can inspect all traffic going through it.

  • Other devices can essentially mimic your device.

As such, we want the user to have as much control as possible, so a couple of flags exist to be set on each device per connection.

  • Allow traffic routing: Specifies if a device can route its traffic through the device acting as a VPN server at all

  • Allow local network access: Specifies if the device can communicate with other devices in the server’s local area network

Generally, when using this feature, we want to avoid behaviors that might not be obvious at first glance.

A great example of this is a security issue we found and mitigated during development:

Traffic routing could cause unexpected security issues

Traffic routing could cause unexpected security issues.

Let’s say we have two Meshnet accounts: Mesh X with devices A and B, and Mesh Y with device C. Device C has an external connection to device B, which allows traffic routing for C.

Without any additional network rules, when C is routing through B and pings A’s private IP, it would actually reach A, even though they are not configured to be directly connected. It does not even require NAT to work in this case.

So without any explicit user input, device B has unintentionally exposed device A to device C.

To prevent this, we ensure that all such packets are dropped by B. The only way for C to reach A is to send a Meshnet invite and form a direct connection, making this relationship explicit.

In short, traffic routing is a relatively simple technical solution that unlocks many interesting capabilities in the Meshnet network.

Read more about Meshnet.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How CyberCare integrated Zendesk and NordLayer for the best customer support on the market

CyberCare is a beacon of customer support and stands tall with its roots firmly planted in customer experience excellence. With offices in Lithuania and Ukraine, the company’s workforce of 400 employees embraces a hybrid model. CyberCare succeeds in a culture of quality and flexibility, serving millions worldwide.

Profile of CyberCare

Darius Dagys, Head of Business Development, pilots the organization’s journey of supporting diverse cybersecurity products by leading external partnerships and automation internally. Operating with client data and handling user requests, the company understands the importance of employing the right tools to make work and security effortless and efficient.

The challenge

On a mission to secure client data effectively

Key pain points

For CyberCare, the security of customer data is non-negotiable. As a company that prides itself on providing superior customer support, it became evident that an enhanced security framework was imperative.

The quest wasn’t sparked by a singular incident but by a continuous commitment to uphold the highest standards of data security and privacy.

“Customers trust us with their data when we provide customer support, making the data paramount. To reflect how we value this trust, CyberCare follows best cybersecurity practices.”

Click to tweet

CyberCare combines various technologies and solutions to achieve the best results. However, when they found themselves in need of a network security tool, the team looked for something to ease their daily tasks, maintenance, and configuration to integrate into the existing technology stack smoothly.

“With three years of customer support experience under our belt, our team has provided over 38 million solutions to end-users. At Cybercare, we recognize the criticality of automation, the latest technologies, and top-notch quality in delivering  services.”

Click to tweet

Simple integration and high-security standards led the lookout for a new tool. The challenge was unique as the customer support software vendor secured part of the client data. For complete protection, CyberCare needed to ensure that access to the network is secure from its side as well.

The solution

A simple and effective way to add another security layer

Main criteria choosing the solution

The pivot from previous VPN tools to NordLayer wasn’t a leap in the dark but a calculated step toward fortified security. NordLayer, with its robust VPN services, offered the perfect armor to shield the valuable data entrusted by clients.

“Before NordLayer, we had a short sprint with other VPN tools, which were more complicated. They were managed manually and it was difficult to onboard and offboard new CyberCare employees.”

Click to tweet

Eliminating the complexity and creating shortcuts in user management and network controls streamlined the processes of the CyberCare security team.

“IP allowlisting and creation of other policies are configured automatically, so my team doesn’t have to spend much time setting up the tool.”

Click to tweet

The most important thing is that NordLayer complemented already existing tools in use, such as SSO integration and the customer support solution Zendesk.

Why choose NordLayer?

The choice was clear and devoid of lengthy deliberations. NordLayer promised simplicity, efficacy, and unwavering security.

“NordLayer solution is very simple to use—no effort required.”

Click to tweet

It stood out as CyberCare needed to navigate cyberspace, ensuring data remains inviolable confidently.

“Having a combination of different security layers and solutions, I sleep well knowing that our customers’ data is secure.”

Click to tweet

One of the criteria for selecting NordLayer was its adherence to security standards. Aligning with compliance requirements gives a stronger foundation to a company like CyberCare to be sure all is well on all fronts.

Strategic integration of NordLayer and Zendesk to efficiently protect customer data

Strategic integration of NordLayer and Zendesk to efficiently protect customer data

Who? Dual synergy

CyberCare employs both internal policies and external tools to manage sensitive data. They emphasize selecting partners like Zendesk, known for its commitment to security and ensuring compliance with the latest standards.

Why? Strategic alignment

Zendesk was chosen for its status as a leading CRM platform, ease of use, and significant investment in security. This partnership was based on the need for a CRM that matched CyberCare’s security requirements and business operations.

How? The process

CyberCare leverages NordLayer to ensure that the login process to Zendesk is encrypted and secure. With NordLayer, they assign fixed IPs, meaning Zendesk can be accessed securely via these IPs. This setup guarantees that both the traffic within Zendesk and the access to it are encrypted and safeguarded.

What? The usage

The integration is seamless for employees who log into Zendesk through NordLayer without navigating complex security measures. This not only simplifies the process but also enforces a high level of security by default.

The outcome

An intuitive tool you can forget about

The benefits of implementing NordLayer

The integration of NordLayer into CyberCare’s operations marked a new dawn. With NordLayer’s intuitive design and features like 2FA, SSO, and static IPs, CyberCare not only safeguarded its data but also streamlined access and management processes.

“There are two things about using NordLayer in the team. First, it’s definitely easy, as the app always runs automatically in the background. Second, users must select the correct gateway to connect to Zendesk to do their work, so it’s intuitive by design.”

Click to tweet

As for the tool implementation, NordLayer didn’t require long preparations and complicated setups. Simple, from start to finish, the deployment and solution adoption in the team was as smooth as it gets.

“Onboarding people to NordLayer took one hour. We had to make preparations from the back end, but for the team, it was super easy. You just have an app, click connect, and you can forget about it. There was no trouble at all.”

Click to tweet

The simplicity of NordLayer’s VPN solution meant that employees could focus on their tasks without the distraction of complex security protocols.

Pro cybersecurity tips

Have you ever thought about your top cybersecurity hygiene actions you perform daily? It’s a good question to ask yourself for a self-check because maybe today is the day you start acting a bit more secure than yesterday.

If you don’t know where to start or want to compare your habits with other professionals, here are Darius Dagys, the Head of Business Development and AI at CyberCare, the top favorite tips everyone should consider.

Darius Dagys, Head of Business Development @CyberCare, about cybersecurity

In essence, the collaboration between NordLayer and Zendesk within CyberCare’s operations showcases a forward-thinking approach to data security, emphasizing ease of use without compromising on stringent security measures. This strategic choice not only aligns with their internal policies but also reinforces their commitment to protecting sensitive customer information.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How to unzip files on a Mac quickly

A zipped file is a file that has been reduced in size using a file compression algorithm.  

The primary purpose of zipping files is to make them smaller, sending them via email or other file transfer methods faster and easier.  

By compressing the data, zip files save bandwidth and shorten download and upload times. 

Imagine the difference in size if you mail a box of books that are all jumbled versus a well-organized box where each book is stacked carefully and fitted to the books next to it.  

The books don’t lose pages or physically get smaller, but organizing them means they’ll fit in a smaller box.   

However, once a file has been zipped, it must be unzipped to see the contents. While that sounds complicated, it’s a simple process.  

Switch seamlessly between Mac and Windows with Parallels Desktop. Try it free for 14 days.   

How to unzip files on Mac with Parallels Desktop 

Unzipping files is a skill every modern internet user needs to master.  

Whether you’re sharing photos from a recent trip with friends or downloading anti-virus software, zipped files are part of everyday internet life.  

Luckily, unzipping files on a Mac is relatively simple:  

1. Double-click on the zip file folder 

When a zipped file arrives in your inbox or download folder, double-click the file.  

2. The file will automatically decompress   

The unzipped file will appear in the same folder where the zipped version was stored. You can choose to keep or delete the zipped version to save space.   

3. Click to view your files   

Once the files have been unzipped on your Mac, you can view and read each file as usual. If you need to rezip the file, right-click the folder and choose “Compress <folder name>” from the  

pop-up menu.  

Compressing and Uncompressing Files on a Mac 

While you might tend to think of the terms “zip” and “unzip” when you need to make files smaller, macOS uses the term “Compress”.  

If you have a Parallels Desktop Pro subscription, you have access to Parallels Toolbox, which offers the Archive and Unarchive tools for compressing and uncompressing files.  

FAQ: Having trouble unzipping files on a Mac? 

Zipping and unzipping files on a Mac is a relatively simple process once you get the hang of it. If you run into issues or have additional questions, these frequently asked questions may help.   

Does Mac automatically unzip files?  

No, your Mac will not automatically unzip files — unless you are running Safari. If you click on a zipped file in the Safari browser, the file is downloaded, and you’ll find it uncompressed in the download folder.  

If you are running other browsers (e.g., Chrome or Firefox), you must double-click the file to unzip a zip file. Select Preferences > General > then unselect the Open “safe” files after downloading option.   

Why can’t I unzip a file on my Mac? 

There can be several reasons why a file won’t unzip on your Mac. The most common cause is a lack of space on your computer, which can be fixed by using Finder to locate and delete large, old, and unused files from your computer.  

Another common issue is corrupted files. Try re-downloading the file and unzipping it again. If the issue persists, contact the sender and request a new file.  

Ensure your OS is the latest version (if not, make any necessary updates) and verify your permission to unzip files, especially if you’re using a shared or work device.  

Finally, make sure the zipped file does not require a password. Zipped files that are password protected will not unzip without the correct password.  

How do I unzip a corrupted zip file on a Mac? 

In most cases, you cannot unzip a corrupted file on a Mac. However, there are a few troubleshooting steps that may help:  

  • Try re-downloading the file. Sometimes, the file is corrupted during the download process.  
  • Ask the sender to rezip and resend the file. If corruption occurred during the zipping process, this may resolve the issue.  
  • Use a program like WinZip, which may allow you to extract some of the files.   

Unzip Mac files with ease!  

Learning how to unzip files is essential for accessing a wide range of digital content, from software downloads to large documents. The straightforward steps we shared will ensure you can unzip files in seconds.  

Switch seamlessly between Mac and Windows with Parallels Desktop. Try it free for 14 days.   

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

Empowering MSPs: Enhancing Security, Efficiency, and Assurance for Small Businesses Through Detection and Response

Key Highlights: 

  • Enhanced Security: Automatic detection and response mechanisms are crucial for MSPs to provide robust protection against evolving cyber threats.
  • Operational Efficiency: A unified cybersecurity platform can significantly improve operational efficiency for MSPs, reducing the burden of managing disparate tools.
  • Cyber Insurance: Implementing cyber insurance provides a safety net and peace of mind for both MSPs and their clients, ensuring they are protected against financial losses due to cyber-attacks.

In today’s digital landscape, small businesses are increasingly becoming targets for cyber attacks due to their often limited resources and less sophisticated security measures. MSPs play a critical role in safeguarding these businesses by implementing robust cybersecurity strategies. One of the most effective ways MSPs can enhance their cybersecurity offerings is through automatic detection and response systems.

The Challenge for MSPs

MSPs face unique challenges when managing the cybersecurity needs of multiple small business clients. Each client has different needs, varying levels of security awareness, and often limited budgets for cybersecurity solutions. This makes it essential for MSPs to adopt solutions that are not only effective but also scalable and cost-efficient.

1. Increased Cyber Threats:

Recent reports highlight the surge in cyber attacks targeting small businesses. According to a 2023 article from ZDNet, small businesses have become prime targets for ransomware attacks, phishing schemes, and other cyber threats due to their typically weaker security infrastructures (source: ZDNet). These increasing threats put pressure on MSPs to provide comprehensive and proactive security measures to protect their clients.

2. Resource Constraints:

Managing cybersecurity for multiple clients with limited resources is a significant challenge for MSPs. An article from TechRepublic notes that many MSPs struggle to balance the need for advanced cybersecurity tools with the constraints of small business budgets (source: TechRepublic). This often requires MSPs to find innovative solutions that offer maximum protection without extensive costs.

3. Regulatory Compliance:

Small businesses are subject to various regulatory requirements, such as GDPR, CCPA, and HIPAA, depending on their industry. Ensuring compliance adds another layer of complexity for MSPs. As CSO Online discusses, MSPs must stay updated on these regulations and implement necessary security measures to help their clients remain compliant (source: CSO Online).

The Dire Need for Comprehensive Cybersecurity 

Small businesses are particularly vulnerable to cyber threats due to their limited resources and lack of in-house cybersecurity expertise. A breach can have devastating consequences, including financial losses, reputational damage, and legal liabilities. As highlighted by Forbes, small businesses often underestimate the impact of cyber attacks, making them an easy target for cybercriminals (source: Forbes).

The Importance of Automated  Detection and Response

Enhanced Security:

  1. Automated detection and response (ADR) systems are designed to identify and neutralize threats in real-time. For MSPs, this means providing a higher level of security for their clients by detecting potential threats before they can cause significant harm. ADR systems use advanced algorithms and machine learning to continuously monitor network traffic, identify anomalies, and take immediate action to mitigate risks.

Operational Efficiency:

  1. MSPs benefit greatly from the operational efficiencies provided by ADR systems. Traditional security measures often require continuous manual monitoring, which can be resource-intensive and prone to human error. By automating threat detection and response, MSPs can free up valuable time and resources, allowing their teams to focus on more strategic tasks and improving overall productivity.

Cyber Insurance:

  1. In addition to advanced cybersecurity measures, cyber insurance plays a crucial role in providing a safety net for small businesses. Cyber insurance helps cover the financial losses associated with cyber attacks, such as data breaches and ransomware incidents. For MSPs, offering guidance on cyber insurance policies to their clients can add an extra layer of protection and peace of mind. This ensures that even in the event of a successful attack, the financial impact can be mitigated, helping businesses recover more swiftly.

Simplifying Cybersecurity Management with Guardz

For MSPs looking to simplify and strengthen their cybersecurity offerings, Guardz provides a comprehensive platform designed to meet the unique challenges of managing multiple small business clients. The Guardz platform offers advanced automatic detection and response capabilities tailored to the needs of MSPs. It streamlines the process of threat detection, investigation, and response, ensuring that small businesses receive the highest level of protection with minimal effort from the MSP.

Guardz’s platform integrates seamlessly with existing IT infrastructure, providing MSPs a user-friendly interface and powerful tools to monitor and manage cybersecurity threats effectively. This not only enhances the security posture of their clients but also significantly reduces the operational burden on MSPs, allowing them to scale their services efficiently.

Explore more about how Guardz can revolutionize your cybersecurity management by visiting Guardz’s platform.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

Locked Shields 2024: Ancient inspiration deployed for today’s complex digital battlegrounds

 

Is it strange that cybersecurity companies would be called to share their expertise in a military simulation of today’s digital battlespace? The answer seems to be a resounding no.

However, despite being civilian organizations that don’t drill cyber-military scenarios, full-stack cybersecurity companies consider every day to be the real thing, with malware researchers, threat monitoring analysts, and product R&D teams alternating in various combinations to help set up and test our clients’ IT security and monitor for and deter threats. To be successful, our teams must master an agile phalanx-like approach to protect the collective of online users.

The phalanx, an ancient box-like formation that enabled classical Greek heavy infantry – composed of citizen-soldiers – to rapidly form ranks into a tight defensive structure of overlapping shields, is a well-chosen muse for Locked Shields, the annual cyber-wargaming event organized by the NATO Cooperative Cyber Defense Centre of Excellence. Locked Shields, and the phalanx that inspired it, is the perfect bridge to connect today’s digital present to the analog past, demonstrating that Trojan horses and other ancient battle tactics are still relevant in today’s battlespace.

Our forces and kit

On April 24-25, more than 60 ESET system engineers, security monitoring analysts, malware researchers and analysts, and communications specialists formed ranks with defenders from the Slovak and Hungarian militaries and the private and academic sectors to defend our assigned battlespace, within a virtual nation named Berylia, against massive cyberattacks designed to cripple the country and create public unrest.

Underpinned by this year’s Locked Shields theme “Collaboration is our protection,” our citizen-soldiers used their skills, experience, and tool sets to achieve fourth place out of 18 teams. To give a further sense of scale, the simulation brought together over 4,000 participants from 39 countries to deliver the largest Locked Shields event yet.

Along with our on-loan cyber warriors and their significant professional experience, ESET brought several pieces of critical kit to the simulated battlespace:

Setting up defenses

Team Berylia was given a few windows of time to explore the virtual battlespace and calibrate tools before the hostilities began. This meant establishing the processes of:

  • Deploying ESET endpoint security solutions, the ESET Inspect agent, and other security agents.
  • Setting up and configuring the IT systems Team Berylia would use to manage the power grid, gas distribution, air defense, satellite, 5G, and situational awareness systems, to name a few.
  • Calibrating ESET Inspect detections to Berylia’s network, thus reducing noise and giving our defenders the time to allocate threat monitoring and remediation capacity where the battle dictated.

Based on our experience with providing detection and response services to our customers, we also established other proven processes and tools, deployed across critical areas, that tremendously helped us during the execution phase.

Communication and legal support

The exercise included elements that strongly correlated with a security vendor’s business-as-usual operations. For example, ESET and others supplied communications experts who were tasked with preparing reports, such as the SITREP (situation report), used to help defenders keep track of the cyber situation and the status of all capabilities, and the Cyber Threat Intelligence report (CTIREP), which provides an evidence-based analysis of emerging threats.

In parallel, the legal team managed cooperation agreements between infrastructure operators in Berylia, and their cross-border allies, to share electricity and provided counsel to ensure defensive operations remained adherent to international law.

What we learned about ourselves and our tools

We successfully rebuffed the network attacks on the firewall and against the following systems: air defense, gas distribution, and power grid. In addition, the defenders quickly hunted down most of the pre-planted backdoors, both known and custom, severely limiting the usefulness of this attack vector for the Lock Shields’ (aggressor) red team. Unfortunately, a simulated thunderstorm took down our power grid.

But fortune smiles upon the prepared. Our communications and legal teams, and power grid operators, were able to mitigate the impact in a great demonstration of teamwork and coordinated operations between multiple (defender) blue teams. This was proof that a phalanx can still be deployed, even in the modern hybrid battlespace. Cooperation with the friendly neighboring teams happened in two key ways:

  • First, quick communication, legal analysis, and agreements with neighboring power suppliers allowed electricity supply to be restored.
  • Second, we provided these neighbors with threat intelligence derived from the attacks we had already experienced.

Prevention first

This collaborative defense approach was backed by the sharing of indicators of compromise (IoCs) via the Malware Information Sharing Platform (MISP) server, which provided mutually enriching data points for threat hunting by all blue teams.

In short, this cyber-battle simulation was an intensively immersive experience for all the technologists involved, be it threat analysts trying to understand tactics to anticipate the next stages of an attack or engineers configuring cyber defenses. Locked Shields is proof that our experts, well versed in operations on the digital front lines, could drop the normal constraints of cybersecurity for businesses and partner with both national and European defense structures when called upon.

Looking back on Locked Shields 2024

With collaboration being the focus of the 15th annual exercise under the theme “Collaboratio tutela nostra est,” or ‘Collaboration is our protection’, ESET supplied the Slovak-Hungarian team with defensive capabilities that contributed to the team’s top three placings in:

  • Cyber threat intelligence
  • Client-side protection
  • Forensics
  • Strategic communications

Taking fourth place out of 18 participating teams, made up of similarly composed cross-country units, the Slovak-Hungarian team successfully achieved its strategic objectives, building not only on expertise and state-of-the-art security technologies but, most importantly, on communication and intensive cooperation between the participants.

Likely considered underdogs by many, we punched well above our weight and tested ourselves and our security technologies to the limit. ESET considers this fertile ground for new ideas and further collaboration experience and a great demonstration of the reasons why we’ve been successful at protecting progress for more than 30 years.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×