{"id":74491,"date":"2023-12-29T17:43:55","date_gmt":"2023-12-29T09:43:55","guid":{"rendered":"https:\/\/version-2.com\/?p=74491"},"modified":"2023-12-22T12:11:16","modified_gmt":"2023-12-22T04:11:16","slug":"msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/12\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/","title":{"rendered":"MSPs putting a stop to \u201chide and seek\u201d within their environments with ESET Cloud Office Security"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"74491\" class=\"elementor elementor-74491\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"content-c10154650\" class=\"csc-frame csc-frame-default\"><p><em><span lang=\"EN-US\">Amidst increased obfuscation of multistage malware attacks, MSPs need an effective way to secure cloud communication while avoiding the need for multiple unique network connection authorizations.<\/span><\/em><\/p><div><div id=\"content-c10157920\" class=\"csc-frame csc-frame-default\"><p class=\"bodytext\"><span lang=\"EN-US\">The days of simple and easily detectable malware are long gone. Recent campaigns by both <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/oilrig-persistent-attacks-cloud-service-powered-downloaders\/\" target=\"_blank\" rel=\"noopener\">OilRig <\/a>and <a href=\"https:\/\/www.deepinstinct.com\/blog\/muddywater-en-able-spear-phishing-with-new-ttps\" target=\"_blank\" rel=\"noopener\">MuddyWater<\/a> advanced persistent threat (APT) groups show that threat actors are constantly seeking new ways to hide their multistage malware attacks among files of commonly used cloud services.\u00a0<\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">This presents a dilemma for managed service providers (MSPs) that rely heavily on cloud-based solutions. But how should MSPs defend against increasingly sophisticated attacks without the burden of trying to control every single stream of communication within the MSP environment? <\/span><\/p><\/div><div id=\"content-c10157921\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">A growing market and a growing threat<\/h3><p class=\"bodytext\"><span lang=\"EN-US\">With the never-ending hunger for cloud-managed services, it is no surprise that the MSP market is constantly expanding, and business reports, such as <a href=\"https:\/\/www.marketsandmarkets.com\/Market-Reports\/managed-services-market-1141.html\" target=\"_blank\" rel=\"noopener\">MarketsandMarkets<\/a>, expect further growth by around $100 billion U.S. dollars within the next five years. <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">Both MSPs and other outsourced business practices have proven to be the answer for countless companies seeking high-end solutions for reasonable prices. But there are two sides to every coin. Professional communications, services, and shared files all moving to the cloud has created a new breeding ground for sophisticated malware. <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">Threat actors deploying this malware are often profit-driven and\/or state-sponsored APT groups using command-and-control (C&amp;C) servers to communicate with compromised devices over targeted networks. When successful, these servers can issue commands to steal or encrypt data, spread malware, disrupt web services, and more. <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">To enable this approach, APT groups need to establish persistence within the targeted businesses, obfuscating malicious files and processes among legitimate ones. <\/span><\/p><\/div><div id=\"content-c10157922\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">A draft email you\u2019ll never send &#8230; nor ever even wrote<\/h3><p class=\"bodytext\"><span lang=\"EN-US\">ESET researchers have described recent attacks in detail while following the evolution of campaigns run by the <a href=\"https:\/\/www.eset.com\/int\/about\/newsroom\/press-releases\/research\/eset-research-iran-aligned-oilrig-group-deployed-new-malware-to-its-israeli-victims-collecting-crede\/\" target=\"_blank\" rel=\"noopener\">OilRig group<\/a>. <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">To avoid cybersecurity scanning tools, OilRig has not been deploying fully fledged malware but, instead, has scaled its attacks. While the initial attack vector of <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/oilrigs-outer-space-juicy-mix-same-ol-rig-new-drill-pipes\/\" target=\"_blank\" rel=\"noopener\">the recent campaigns<\/a> remains unknown, presumably it was a phishing email. This email would contain a downloader that wouldn\u2019t cause any specific damage but, as the name implies, is designed to secretly download additional malware from the internet. Several versions of these downloaders have been documented by ESET researchers. <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">Studying these downloaders, it is clear that OilRig is keenly focused on identifying new ways to obfuscate malware deployment using legitimate cloud service providers for C&amp;C communication.<\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">The first in the series, SC5k downloader, uses the a shared Microsoft Exchange email account and <a href=\"https:\/\/learn.microsoft.com\/en-us\/exchange\/client-developer\/exchange-web-services\/start-using-web-services-in-exchange\" target=\"_blank\" rel=\"noopener\">Microsoft Office Exchange Web Services<\/a> API for C&amp;C communication. Within this email account, the attackers create draft messages with hidden commands. Once the downloader infests a device, it will log in to the same account to receive both the commands and the payloads to execute. Its successor, OilCheck, works similarly but uses the Outlook mail API in Microsoft Graph.\u00a0 <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">New versions of OilRig downloaders, ODAgent and OilBooster, communicate using the <a href=\"https:\/\/learn.microsoft.com\/en-us\/graph\/onedrive-concept-overview\" target=\"_blank\" rel=\"noopener\">Microsoft Graph OneDrive API<\/a>. They access a OneDrive account controlled by the attackers for C&amp;C communication and exfiltration. <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">The evolution of malware-hiding capabilities was also recently noted in the case of another APT group linked to Iran called <a href=\"https:\/\/www.welivesecurity.com\/2023\/05\/02\/apt-groups-muddying-waters-msps\/\" target=\"_blank\" rel=\"noopener\">MuddyWater<\/a>.\u00a0 <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">In a separate MuddyWater campaign, described by <a href=\"https:\/\/www.deepinstinct.com\/blog\/muddywater-en-able-spear-phishing-with-new-ttps\" target=\"_blank\" rel=\"noopener\">DeepInstinct<\/a>, the APT group reused previously known remote administration tools and hid them in the cloud-based content management system (CMS), called <a href=\"https:\/\/www.storyblok.com\/fs\/enterprise-contact\" target=\"_blank\" rel=\"noopener\">Storyblok<\/a>, to host archives with compromised files.<\/span><\/p><\/div><div id=\"content-c10157994\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">ESET to help deal with the dilemma<\/h3><p class=\"bodytext\"><span lang=\"EN-US\">The hiding capabilities of present-day C&amp;C attacks have pushed businesses toward <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/Understanding-the-new-breed-of-command-and-control-servers\" target=\"_blank\" rel=\"noopener\">higher control over their network traffic<\/a>. From standard network monitoring, it can go as far as individually authorizing any network connection. <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">However, the higher the control, the higher the workload on MSP admins and technicians who are already drained from a never-ending stream of alerts. So what do businesses choose: strict control that comes with alert fatigue or lower security standards that can result in a data breach? <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">With its <a href=\"https:\/\/www.eset.com\/int\/business\/partner\/msp\/#c6904522\" target=\"_blank\" rel=\"noopener\">MSP Program<\/a>, ESET can help businesses deal with this dilemma. The program is based on the <a href=\"https:\/\/www.eset.com\/int\/business\/complete-protection\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT <\/a>solution, which provides multilayered protection, and its higher tiers also integrate <a href=\"https:\/\/www.eset.com\/uk\/business\/solutions\/cloud-security\/\" target=\"_blank\" rel=\"noopener\">ESET Cloud Office Security<\/a> (ECOS), which is designed to protect Microsoft 365 and Google Workspace applications. <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\"><strong>ECOS \u2014 effectiveness in numbers* <\/strong><\/span><\/p><ul><li>750,000 email threats detected<\/li><li>360,000 phishing emails blocked<\/li><li>21 million spam emails captured<\/li><\/ul><p class=\"bodytext\"><em>*7-month period in 2023<\/em><\/p><p class=\"bodytext\"><span lang=\"EN-US\">In fact, these ESET security solutions can disrupt the described C&amp;C processes at several stages, which means that companies don\u2019t have to focus on network control as much. <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\"><strong>Anti-phishing protection<\/strong><\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">Though the initial attack vectors of OilRig and MuddyWater campaigns are unknown, both APT groups have successfully kicked off their campaigns with phishing emails in the past. <a href=\"https:\/\/help.eset.com\/ecos\/en-US\/index.html?key_features.html\" target=\"_blank\" rel=\"noopener\">ECOS prevents<\/a> users from accessing web pages known for phishing once they click on the phishing link in the email. <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\"><strong>Antimalware protection<\/strong><\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">ESET\u2019s <a href=\"https:\/\/help.eset.com\/ecos\/en-US\/index.html?key_features.html\" target=\"_blank\" rel=\"noopener\">defense against malware<\/a> eliminates all types of threats. Moreover, <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/cloud-security\/#benefits\" target=\"_blank\" rel=\"noopener\">ECOS scans <\/a>all new and changed files in OneDrive, Google Drive, Microsoft Teams, and SharePoint Online.<\/span><\/p><p class=\"bodytext\"><strong><span lang=\"EN-US\">ESET LiveGuard Advanced<\/span><\/strong><\/p><p class=\"bodytext\"><span lang=\"EN-US\">If ESET malware detection engines detect a never-before-seen type of threat, they pass the file to the ESET cloud-based sandboxing tool <a href=\"https:\/\/help.eset.com\/elga\/en-US\/overview.html\" target=\"_blank\" rel=\"noopener\">ESET LiveGuard Advanced <\/a>for further assessment.<\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\"><strong>Multi-tenant<\/strong><\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\"><a href=\"https:\/\/help.eset.com\/ecos\/en-US\/index.html?settings.html\" target=\"_blank\" rel=\"noopener\">ECOS multi-tenant functionality<\/a> allows you to protect and manage multiple Microsoft 365 and Google Workspace tenants from one ESET Cloud Office Security console. <\/span><\/p><\/div><div id=\"content-c10158221\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">Conclusion<\/h3><p class=\"bodytext\"><span lang=\"EN-US\">The growth of cloud-based business practices has ushered in cloud-based cyberattack tactics that MSPs need to deal with. And the results can be dire. With their privileged access to business networks, compromised MSPs can also be dangerous for their clients by triggering a <a href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/recovering-from-a-supply-chain-attack-what-are-the-lessons-to-learn-from-the-3cx-hack\/\" target=\"_blank\" rel=\"noopener\">supply chain attack<\/a>. <\/span><\/p><p class=\"bodytext\"><span lang=\"EN-US\">The good news is that you don\u2019t need to face those threats alone. Since its foundation in 1992, ESET has developed a robust multilayered defense system capable of stopping C&amp;C attacks at different stages and much more. ESET solutions are also available for MSPs as a part of the <a href=\"https:\/\/www.eset.com\/int\/business\/partner\/msp\/\" target=\"_blank\" rel=\"noopener\">ESET MSP Program<\/a>. Don\u2019t be the weak link in supplier relationships. Be the strongest.\u00a0 <\/span><\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Amidst increased obfuscation of multistage malware atta [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1075,40,61],"tags":[41,1076],"class_list":["post-74491","post","type-post","status-publish","format-standard","hentry","category-year2023","category-eset","category-press-release","tag-eset","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MSPs putting a stop to \u201chide and seek\u201d within their environments with ESET Cloud Office Security - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/business\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MSPs putting a stop to \u201chide and seek\u201d within their environments with ESET Cloud Office Security - Version 2\" \/>\n<meta property=\"og:description\" content=\"Amidst increased obfuscation of multistage malware atta [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/business\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-29T09:43:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/12\\\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"MSPs putting a stop to \u201chide and seek\u201d within their environments with ESET Cloud Office Security\",\"datePublished\":\"2023-12-29T09:43:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/12\\\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\\\/\"},\"wordCount\":1019,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"ESET\",\"2023\"],\"articleSection\":[\"2023\",\"ESET\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/12\\\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\\\/\",\"name\":\"MSPs putting a stop to \u201chide and seek\u201d within their environments with ESET Cloud Office Security - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2023-12-29T09:43:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MSPs putting a stop to \u201chide and seek\u201d within their environments with ESET Cloud Office Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MSPs putting a stop to \u201chide and seek\u201d within their environments with ESET Cloud Office Security - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/business\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/","og_locale":"en_US","og_type":"article","og_title":"MSPs putting a stop to \u201chide and seek\u201d within their environments with ESET Cloud Office Security - Version 2","og_description":"Amidst increased obfuscation of multistage malware atta [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/business\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/","og_site_name":"Version 2","article_published_time":"2023-12-29T09:43:55+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/business\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/12\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"MSPs putting a stop to \u201chide and seek\u201d within their environments with ESET Cloud Office Security","datePublished":"2023-12-29T09:43:55+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/12\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/"},"wordCount":1019,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["ESET","2023"],"articleSection":["2023","ESET","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/business\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/12\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/","url":"https:\/\/www.eset.com\/blog\/business\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/","name":"MSPs putting a stop to \u201chide and seek\u201d within their environments with ESET Cloud Office Security - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2023-12-29T09:43:55+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/business\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/business\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/business\/msps-putting-a-stop-to-hide-and-seek-within-their-environments-with-eset-cloud-office-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"MSPs putting a stop to \u201chide and seek\u201d within their environments with ESET Cloud Office Security"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jnt","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/74491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=74491"}],"version-history":[{"count":8,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/74491\/revisions"}],"predecessor-version":[{"id":74528,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/74491\/revisions\/74528"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=74491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=74491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=74491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}