Skip to content

ESET Research: Android malware Kamran spying via news app on residents of the disputed Kashmir region

  • ESET Research has discovered Android spyware, which ESET researchers named Kamran, that has been distributed via a possible watering-hole attack on the Hunza News website.
  • The malware targets residents using Urdu language in Gilgit-Baltistan, part of the disputed Kashmir region that is administered by Pakistan.
  • The malicious app prompts the user to grant it permissions to access various information. If accepted, it gathers data about contacts, calendar events, call logs, location information, device files, SMS messages, and images.

BRATISLAVA, KOŠICE — November 09, 2023 — ESET researchers have identified what appears to be a watering-hole attack on a regional news website that delivers news about Gilgit-Baltistan, a region administered by Pakistan. Gilgit-Baltistan consists of the northern region of the greater Kashmir territory, embroiled in longstanding disputes involving India and Pakistan (since 1947) as well as between India and China (since 1959). Watering-hole attacks are a type of threat where a commonly visited website is compromised to serve malware. When opened on a mobile device, the Urdu version of the Hunza News website offers readers the possibility to download the Hunza News Android app directly from the website; however, the app has malicious espionage capabilities. Urdu is the official and main language of communication used for inter-ethnic communication within this disputed region. ESET has named this previously unknown spyware Kamran.

The word Kamran was used by ESET to name this spyware due to its package name “com.kamran.hunzanews.” Kamran is a common given name in Pakistan and other Urdu-speaking regions; in Farsi, which is spoken by some minorities in Gilgit-Baltistan, it means fortunate or lucky.

The Hunza News website has both English and Urdu versions; English is the second official language spoken in the region. The English mobile version doesn’t provide any app for download. However, only the Urdu version on mobile offers to download the Android spyware in question. While the English and Urdu desktop versions also offer the Android spyware, it is not compatible with desktop operating systems. ESET Research reached out to Hunza News regarding Kamran, however, the website provided no response prior to the publication of this research.

The Kamran spyware displays the content of the Hunza News website but also contains custom malicious code. Upon launching, the malicious app prompts the user to grant it permissions to access various information. If accepted, it gathers data about contacts, calendar events, call logs, location information, device files, SMS messages, images, etc. If the requested permissions to the app are granted, Kamran automatically gathers this sensitive user data and uploads it to a hardcoded command and control (C&C) server. The C&C server was reported to Google, as the platform misused by the spyware is provided by them. However, the malware lacks remote control capabilities.

This malicious app has never been offered through the Google Play Store but is instead downloaded from a source referred to as Unknown by Google, to install this app, the user is requested to enable the option to install apps from unknown sources. ESET was able to identify at least 22 compromised smartphones, with five of them being located in Pakistan.

The malicious app appeared on the website sometime between January 7, 2023, and March 21, 2023; the developer certificate of the malicious app was issued on January 10, 2023. During that time, protests were being held in Gilgit-Baltistan for various reasons encompassing land rights, taxation concerns, prolonged power outages, and a decline in subsidized wheat provisions.

“With a high degree of confidence, we can affirm that the malicious app specifically targeted Urdu-speaking users, who accessed the website via Android devices. However, since Kamran demonstrates a unique codebase, distinct from other Android spyware, this prevents its attribution to any known advanced persistent threat – APT – group,” says ESET researcher Lukáš Štefanko, who discovered the Kamran spyware. “This spyware shows once again that it is important to reiterate the importance of downloading apps exclusively from trusted and official sources,” he adds.

Hunza News, likely named after the Hunza District or the Hunza Valley, is an online newspaper delivering news related to the Gilgit-Baltistan region. Internet archive data shows that the site has been delivering news since 2013. In 2015, Hunza News started to provide a legitimate Android application that was available on the Google Play Store. Based on available data, ESET Research believes two versions of this app were released on Google Play, with neither containing any malicious functionality.

For more technical information about Kamran spyware, check out the blogpost “Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan.” Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

 



About ESET
ESET develops software solutions that deliver instant, comprehensive protection against evolving computer security threats. ESET pioneered and continues to lead the industry in proactive threat detection. ESET NOD32 Antivirus, its flagship product, consistently achieves the highest accolades in all types of comparative testing and is the foundational product that builds out the ESET product line to include ESET Smart Security. ESET Smart Security is an integrated antivirus, antispyware, antispam and personal firewall solution that combines accuracy, speed and an extremely small system footprint to create the most effective security solution in the industry. Both products have an extremely efficient code base that eliminates the unnecessary large size found in some solutions. This means faster scanning that doesn’t slow down computers or networks. Sold in more than 160 countries, ESET has worldwide production headquarters in Bratislava, SK and worldwide distribution headquarters in San Diego, U.S. ESET also has offices in Bristol, U.K.; Buenos Aires, AR; Prague, CZ; and is globally represented by an extensive partner network. For more information, visit our local office at https://eset.version-2.sg.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The Company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which includes Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities. For more information, please visit https://www.version-2.com.sg/ or call (65) 6296-4268.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

NordLayer Partner Program: TEKRiSQ on how practical solutions help eliminate weak security links

A discussion with Dean Mechlowitz, Co-founder of TEKRiSQ responsible for Technology Operations, about the main challenges organizations face with cybersecurity threats, the benefits of the NordLayer Partner Program, and what perspectives are anticipated for different industries. 

Highlights

  • About the company: TEKRiSQ is a cybersecurity team of up to 10 people aiding small- and medium-sized businesses (SMBs) in the US and Canada and focusing on enhancing cyber resilience against digital threats since 2021.

  • Business case: the MSP tackles the challenges SMBs face in cybersecurity, addressing the lack of internal IT expertise and the misconception of being too insignificant to be targeted.

  • NordLayer adoption: a partner utilizes NordLayer’s simple and efficient remote network access solutions to enhance cybersecurity for clients without overwhelming them.

  • Benefits of NordLayer Partner Program: the program offers MSPs like TEKRiSQ user-friendly solutions, a centralized management portal, and reporting capabilities, emphasizing ease of use for end-users.

  • Future projections. Future cybersecurity challenges will center around remote work risks, the protection of personal data, and the need for basic security measures like multi-factor authentication.

About the company

TEKRiSQ is a team of cybersecurity professionals helping SMBs build cyber resilience against digital threats. Operating as a managed service provider (MSP) in the US and Canada, a team of up to 10 people ensures that their clients transform into fully cyber-insurable companies.

Established in 2021, TEKRiSQ was founded on strong fundamentals of experience and expertise in modern cybersecurity and technology. The company has been advising everyone from small teams to big global players, gaining unique insights into the industry and how SMBs navigate the changing security landscape.

Dean Mechlowitz, Co-founder of TEKRiSQ responsible for Technology Operations, discusses the company’s approach to building cybersecurity culture and technology stack for SMBs, and how NordLayer’s secure remote access solution contributes to their mission.

Business case: bringing in the cyber expertise so clients don’t have to move a finger

According to TEKRiSQ, companies often struggle not due to industry-specific challenges but because of their mindset when it comes to adopting security measures. Small and medium enterprises are convinced that their insignificance will protect them from potential risks.

“Usually, companies with fewer than 200 employees are basically sitting ducks. They believe “I’m too small, and all my data is in the cloud, so I am not at risk,” but truly, they just have no idea how to understand it.”

SMBs who don’t typically have internal IT departments or Chief Information Officers end up outsourcing specialists and services. Without the right knowledge, it’s challenging to determine cyber risks applicable to their businesses and keep up with technological changes. Partner-Case-study-Sequentur web-cover 1400x8002

The lack of expertise makes organization decision-makers immobile and hesitant in taking action because the only thought they have in their minds is, “What do I do?” However, some service providers jump into the multibillion-dollar MSP market with no actual experience in cybersecurity.

“Many MSPs are not cyber experts and fail to introduce basic security measures like multi-factor authentication to their clients, or they aren’t familiar with the latest security issues.”

Qualified MSPs often play a crucial role in guiding organizations lost in the subject. They are responsible not only for bringing knowledge and expertise but also for making sure the clients are aware of the risks. Our speaker Dean highlights that clients tend not to know or simply don’t care about the importance of business cybersecurity.

Guiding the unaware and the naive with a pragmatic approach

TEKRiSQ’s strategy is to use cyber insurance channels to get clients’ attention to security needs.

1 1400x800

Business owners and managers, just like any other person, are looking for a quick and painless solution to their problem—and insurance, at first glance, seems like an easy way out. However, businesses must comply with insurance requirements that usually include the incorporation of network and data security policies.

“People think “I’ve never been attacked before. Therefore, I’m never going to be attacked,” which is incorrect.”

Then, the ignorant, unaware, or careless mindset faces a reality check after hearing three control questions from a TEKRiSQ representative:

  1. If all your data was exposed and published on the dark web, would that be a problem for your business?

  2. If all your data was inaccessible for three or four weeks, would that be a problem for your business?

  3. If your computers were shut down for a month or two, would that be a problem for your business?

According to Dean, everybody uses computers, and everybody has data that’s really sensitive, so the answer is, “Of course, it’d be a problem,” and it doesn’t matter what business you’re in.

“Companies have remote workforces, which is almost everybody today. A lot of companies have consultants sitting all over the country using their own computers. That’s problematic, right? Many people travel to airports and hotels—that’s problematic, too.”

So there are certain businesses that have bigger risks, and some have smaller ones, but it’s the MSPs’ task to identify and mitigate them for the client if they lack internal resources to do it independently.

Close collaboration with insurance providers allows TEKRiSQ to be at full speed with what’s required by the insurer. Many MSPs are unaware of such nuances and cannot offer clients the right solutions.

Close-up on the solution

TEKRiSQ is a unique managed service provider that performs risk assessments in 30 minutes. They also focus on delivering solutions in minutes, not weeks or months. Thus, working with tools that correspond with such objectives is super important.

NordLayer’s onboarding for secure remote network access is about as simple as possible. You put the email into the system, and it sends an activation email. The setup must be super simple so non-tech users can understand it and follow instructions.

“The setup only takes tens of seconds or a minute—it’s pretty simple. It’s for us to find a way to encourage them to consistently use the tool.”

As an MSP, TEKRiSQ must have access to activity reporting to see whether the clients are using the systems. If the activity is low, they must be able to enforce the service, as companies tend to forget to use it after installing the application.

“None of our clients wishes to learn or do anything in terms of managing a solution, so it has to be fully governed by us. They only want not to care about it besides turning the tool off and on.”

Finally, adding extra layers of security, like incorporating dedicated IP into the company’s network protection, is crucial. Whether it’s encrypting connections while working on a public network or adding IP or access control lists for the firewall—the client most likely doesn’t realize the need for such a measure because they don’t know there’s more behind a firewall or generic VPN.

Why join the NordLayer Partner Program?

Our Partner Program provides MSPs with an ecosystem of user-friendly solutions, educational materials, and hands-on support from our experts. The main benefit of NordLayer is in our approach to thinking two steps ahead for our clients and partners.

NordLayer is all about stress-free cybersecurity. Thus, it has to be approachable for the end-user and effective for our partners.

“Unless clients start to care enough to start doing something themselves to protect their business, my only concern is to make it really easy for them—like turning on the app and forgetting about the rest.”

By providing a Service Management Portal, NordLayer gives its partners keys to their organizations’ administration in one place. There they have centralized controls of comprehensive security features and user management.

Interested in collaborating to build a more resilient and aware cybersecurity landscape for businesses and organizations? NordLayer invites Managed Service Providers to seize the opportunity to join our Partner Program.

Thank you, Dean, for sharing your experience with NordLayer in helping your clients overcome network security challenges.

Future projections: threats and challenges to keep an eye on

Experience and daily work in the cybersecurity field help draw some presumptions about what to expect from the industry in the upcoming years. Our story hero, Dean agreed to share his insights on what companies should be cautious about in order to protect their businesses.

Genetic data leak, 23andMe point to credential stuffing

Hackers are selling genetic data stolen from users of the company 23andMe. The company itself says they weren’t breached, although their users’ data was used by what seems to be a single threat actor stealing personal details and genetic data. This data was then published or advertised online. 23andMe suggested that the threat actor(s) gained unauthorized access with “recycled login credentials”, a technique known as credential stuffing.

The logic is simple: Keep trying stolen username/password combinations, and eventually, they’ll work on another site. An easy solution to credential stuffing attacks? You guessed it: Multi-factor authentication (MFA). While 23andMe has offered an MFA feature since 2019, it was not made mandatory for users. With genetic and personal data at stake and up to 7 million users affected by these recent breaches, it might be time for a change in policy.

The Bleach Breach: Clorox revenue and supply chain hit

Clorox, the household cleaning giant, predicts a more than 20% drop in quarterly sales due to a cyberattack (thought to be ransomware) that caused product shortages and operational disruptions. Manufacturing, often kept running by legacy systems and sprawling workforces, suffers more cyberattacks than any other industry.

The Clorox incident is being linked to the same group responsible for the MGM and Caesars Palace hacks, discussed in our previous episode, which occurred around the same time in August 2023. “Scattered Spider” is notorious for using social engineering methods to gain access to internal systems. The Clorox Company’s share price has dropped by over 7 percent in the last month.

Wearable AI: Trendy or just trending?

Tech companies are rushing to secure the lead in wearable AI products. Meta has collaborated with Ray-Ban on a pair of high-tech glasses, enabling wearers to live stream directly from the glasses to Facebook or Instagram and voice activate Meta AI, “an advanced conversational assistant”. Jony Ive, Apple’s legendary former design lead, and OpenAI are reportedly teaming up to design the “iPhone of AI”.

Rewind.ai unveiled a neck-worn pendant that records conversations to your smartphone and creates a searchable database of life moments. Humane, imagining “a world where you can take AI everywhere”, have developed a smart device that resembles a badge or lapel pin.

The common goal here seems to be for technology to rely less on screens, to fade from view, and become all but invisible.

Stay tuned for the next episode of Cyberview.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Scale Computing Recognized with Three 2023 TrustRadius Awards: Best Feature Set, Best Relationship, and Best Value for the Price

INDIANAPOLIS – November 8 2023 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced that the company has been recognized with three TrustRadius Best of Awards in the Hyper-Converged Infrastructure category. Scale Computing received awards for Best Feature Set, Best Relationship, and Best Value for Price.

TrustRadius is a leading independent research and review platform that provides comprehensive, vetted product information and customer-generated reviews, recognizing top technology solutions based on user feedback. To win a Best of Award, nominees must have received at least ten reviews between January and September 2023, ensuring an accurate gauge of recent customer sentiment. The awards honor the few companies that have gone above and beyond in user satisfaction based on key insight statistics related to value, feature set, and customer relationships. To win, vendors must be ranked in the top three per award type in their technology category.

Scale Computing, whose solutions enable IT managers to run applications and process data outside centralized data centers, at the edge of a network closest to where that data is created and utilized, was named the first-place winner in all three Best of Award categories. Earlier this year, the company announced it also earned multiple TrustRadius Top Rated Awards in the categories of Hyperconverged Infrastructure, Server Virtualization, and Edge Computing.

“We are truly honored that Scale Computing is yet again the recipient of the TrustRadius Best of Awards for value, feature set, and customer relationships,” said Jeff Ready, CEO and co-founder, Scale Computing. “We are dedicated to delivering leading IT infrastructure and edge computing solutions that not only meet but exceed the expectations of our customers. The TrustRadius awards are especially meaningful because the recognition has to be earned through genuine positive feedback from users. These awards fuel our passion to continue innovating and providing unparalleled value and service to our partners and customers.”

A TrustRadius review of Scale Computing summarizes a common sentiment: “Scale Computing is our number one recommended hypervisor platform and becomes the backbone of our clients’ IT infrastructure. When selecting Scale Computing for clients we look at overall cost savings, ease of use and scalability. We implement Scale Computing for clients that have as little as 5 users to clients that have over 8000 users! With the ease of use it takes the burden off of the IT department for both the hypervisor and backups. Our clients can sleep better at night and can ‘Set it and forget it.’”

The TrustRadius Best of Awards help customers cut through the sea of products and allow the best to shine through. “Scale Computing Platform has achieved a remarkable feat, securing first place in all three awards in the Hyper-Converged Infrastructure category,” declared Megan Headley, VP of research at TrustRadius. “Scale Computing Platform’s recognition is entirely based on customer feedback. Customers emphasize their satisfaction with the feature set, confirm that the product lives up to sales and marketing promises, and provides outstanding value for the price.”

To learn more about what real users have to say about Scale Computing, visit the TrustRadius Scale Computing Platform review page: https://www.trustradius.com/products/scale-computing-hc3/reviews.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Preventing Automated SaaS Ransomware with Passwordless Authentication

Cybersecurity is no longer about the attacks you can see; it’s about the ones you can’t. In a recent unsettling breach, SaaS ransomware crept into the spotlight, targeting not machines, but the very services that drive our daily work. Attackers didn’t compromise employee computers or infiltrate internal networks; they simply logged in with stolen credentials and discreetly extracted sensitive data from a widely-used service: SharePoint Online.

This bypassing of endpoints marked a departure from the norm and highlighted a glaring vulnerability in password-dependent security protocols. It’s thought to be the first attack of its kind, but it likely won’t be the last.

With this in mind, let’s unravel the specifics of this breach and what organizations can do to prevent automated SaaS ransomware attacks. We’ll look at the transition to passwordless and certificate-based authentication systems as critical defenses in the modern cybersecurity arsenal. By understanding the full scope of the attack and the emerging protective technologies, you’ll be equipped to safeguard your enterprise’s environments against these silent threats. So let’s get into it.

The First Instance of Automated SaaS Ransomware Extortion

Ransomware attacks are nothing new. In 2022 there were around 493.3 million ransomware attacks, a decrease from the year before, but still higher than every other year in the last decade. However, not all ransomware attacks are the same, and threat actors continually adapt their methods for more effective and precise attacks.

The most recent tactic switch, and the first of its kind, is automated SaaS ransomware extortion that entirely bypasses endpoints.

Let’s Break Down This Attack

Cybersecurity researchers at security firm Obsidian have reported a ransomware attack on SharePoint Online, executed via a hijacked Microsoft Global SaaS admin account, sidestepping the typical endpoint compromise. Here’s how it worked:

  • Initial Access: The attackers began by exploiting a weakly secured administrator account that was shockingly accessible from the public internet and lacked multi-factor authentication (MFA), a critical security layer.
  • Elevation of Privilege: They used the stolen credentials to create a new user named “0mega” in the Active Directory and then systematically assigned this account a staggering level of administrative privileges across the SharePoint, Exchange, and Teams environments. They also removed more than 200 existing administrators within 2 hours.
  • Exfiltration of Data: With the illicitly gained permissions, the “0mega” account accessed the company’s SharePoint Online libraries, stealing hundreds of files.
  • The Silent Exit: They transferred the stolen data to a virtual private server (VPS) hosted by a Russian web hosting company, utilizing the “sppull” Node.js module, which facilitates file downloads from SharePoint.
  • The Unveiling: After the heist, the attackers uploaded text files to the victim’s SharePoint site using the “got” Node.js module, brazenly informing the organization of the breach.

Key Insights

Let’s unpack what we’ve learned from a cyber heist that turned the tables on traditional ransomware tactics. This attack didn’t follow the usual script of endpoint compromise—it was a privileged access heist within a SaaS application. What’s the takeaway? A clear signal that attackers are now turning their sights on the SaaS landscape, exploiting softer targets and laying bare the need for tighter security measures. These are the critical takeaways:

  • No Endpoint Compromise: Unlike typical ransomware attacks that rely on endpoint compromise to spread and encrypt files, this attack was purely based on privileged access abuse within the SaaS application.
  • A First of Its Kind: According to security experts, this method of automated SaaS ransomware extortion, bypassing endpoints, has not been publicly recorded before.
  • A Rising Trend: There has been a noticeable increase in attacks targeting enterprise SaaS environments, attributed to the attackers capitalizing on the less fortified security measures in SaaS applications compared to endpoint defenses. One study found a 300% surge in SaaS attacks since March 1, 2023.
  • The Need for Better SaaS Security: The alarming rise in SaaS-focused attacks underlines the urgent need for organizations to enhance their security posture across SaaS platforms.

Why Is This Attack Considered Ransomware?

Although this attack didn’t involve encrypting files – typical of ransomware attacks – it’s still considered a new form of SaaS ransomware. This is because the attackers uploaded thousands of PREVENT-LEAKAGE.txt files to inform the organization of the stolen files and negotiate payment to avoid having the contents leaked online.

Will We See More Attacks Like This?

Yes, we’re likely to see more attacks like this one. Obsidian’s researchers believe the trend will gain traction because the attackers have invested in automation, indicating they’re prepping for future hits. Plus, most companies are stronger in endpoint defense than in SaaS security, leaving a gap ripe for exploitation. The shift to data theft over encryption is also appealing to attackers, minimizing risks and simplifying their operations.

How does data theft minimize risks for attackers? Put simply, it’s a quieter form of cyber looting. Encryption attracts immediate attention; it’s noisy, disruptive, and often triggers a swift response from security teams. In contrast, data theft can go undetected for longer, allowing attackers to slip away unnoticed.

Moreover, without the need to provide decryption keys, attackers avoid the complexities and potential technical failures associated with ransomware deployment. This stealthier approach means they can sidestep the spotlight while still holding valuable data for ransom, potentially leading to a lower profile and fewer chances for law enforcement to catch up with them.

Tactics for Preventing Automated SaaS Ransomware

If we’re going to be seeing more of these attacks, we have to take proactive measures to minimize their success. With this in mind, let’s look at some of the ways we safeguard our systems from automated SaaS ransomware attacks.

Multifactor Authentication and Its Limits

Researchers highlight how one of the reasons this attack was possible is due to the lack of MFA on the SaaS account. Having MFA enabled makes using stolen credentials much harder. However, it doesn’t eliminate this type of attack.

Researchers pointed out that even with MFA in place, determined attackers could still bypass it. They could procure the necessary credentials from dark web forums and leverage tactics like MFA push fatigue, where they bombard a user with authentication requests until the user, overwhelmed and frustrated, finally approves one.

And that’s exactly why passwordless authentication is a better solution here – it’s both more secure and more user-friendly.

Passwordless Authentication as a Tool To Prevent SaaS Ransomware Attacks

User credentials were a critical weak point in the SharePoint attack – it wouldn’t have been possible without a stolen username and password. Which is why many security experts are recommending ditching passwords altogether.

Shifting to passwordless authentication addresses the core vulnerabilities associated with traditional passwords. Conventional passwords are often the weakest link, susceptible to being stolen, guessed, or forgotten. By adopting passwordless solutions like biometrics, security keys, and certificate-based authentication, we enhance security through unique personal identifiers that are significantly more difficult for intruders to replicate.

This shift not only enhances security by making unauthorized access considerably more challenging but also simplifies the user experience, eliminating the need for users to create, remember, and manage an array of passwords. It’s a win-win: stronger security with a side of convenience.

Key Benefits of Passwordless Authentication

  • Enhanced Security: Without traditional passwords, attackers can’t leverage stolen credentials, reducing the risk of unauthorized access.
  • Reduced Phishing Risks: Phishing campaigns often target passwords. Passwordless authentication removes this vulnerability.
  • Lower Administrative Burden: It eliminates the need for password resets and management, reducing IT overhead.
  • Improved User Experience: Users no longer need to remember or enter complex passwords, streamlining the login process.

Certificate-Based Authentication: A Step Further in Security

Certificate-based authentication, as part of the passwordless spectrum, involves the use of digital certificates. These certificates are like digital passports, providing a secure and private method of asserting a user’s identity. They work like this:

  • Issuance: A trusted Certificate Authority (CA) issues a digital certificate to a user or device.
  • Storage: The certificate is securely stored on the user’s device or a smart card.
  • Verification: During authentication, the certificate is presented to the server, which verifies it against a list of trusted CAs.

Critically, certificate-based authentication offers robust security. Why? It inherently incorporates two-factor authentication (2FA), as access requires not just the certificate—which acts like a digital ID card (something you have)—but also ties in a device or a PIN, adding a layer of security tied to something you know or are. It also introduces a level of accountability through non-repudiation, ensuring that transactions can’t be readily contested, making it clear who did what.

Plus, for businesses already running on Public Key Infrastructure (PKI), it scales with ease, slotting into the existing setup without a hitch. This dual promise of enhanced security and easy integration makes certificate-based authentication a smart choice for modern organizations.

Why Organizations Should Adopt Passwordless Authentication

With the increase in SaaS ransomware attacks, passwordless authentication, and particularly certificate-based methods, offers a compelling solution. It aligns with zero-trust security models by “never trusting, always verifying,” ensuring that every access request is securely authenticated without relying on vulnerable password systems.

Organizations adopting passwordless and certificate-based authentication stand to benefit from:

  • Compliance: Meeting stringent regulatory requirements for data protection.
  • Agility: Adapting quickly to evolving security threats without overhauling the entire access management system.
  • Reduced Attack Surface: Minimizes the risk of phishing and credential stuffing attacks since passwords are no longer the weakest link.
  • Cost-Effectiveness: Lowers the total cost of ownership by reducing the need for password-related support and infrastructure.
  • Future-Proofing: Aligns with emerging technologies and standards, making it a forward-looking investment that anticipates the next wave of cyber threats.
  • User Experience: Streamlines the login process, eliminating password fatigue and reducing help desk calls for password resets.

It’s Time to Harden SaaS Controls

In an era where SaaS platforms are repositories for regulated, confidential, and sensitive information, hardening SaaS controls is no longer optional—it’s essential. Organizations invest substantially in these platforms. However, while companies have advanced significantly in detecting threats, across endpoints, networks, and cloud infrastructures, many are still lacking when it comes to SaaS threat detection. This needs to change.

A robust approach to strengthening SaaS security involves several critical strategies:

  • Privilege Restriction: Tighten access controls by revoking unnecessary privileges. Only the necessary users should have administrative access, and even then, companies should enforce the principle of least privilege.
  • Integration Oversight: Many SaaS applications offer integrations with third-party services. It’s crucial to audit these connections, revoking any that are unsanctioned or pose a high risk.
  • Log Analytics: Consolidate and scrutinize SaaS audit and activity logs. Analytical tools should be employed to sift through this data to identify patterns indicative of a compromise, insider threat, or rogue third-party integration.
  • Continuous Monitoring: Implement real-time monitoring solutions specifically designed for SaaS applications to detect anomalous behaviors and potential security incidents.

Final Thoughts

This alarming automated SaaS ransomware extortion incident reveals a pivotal cybersecurity weakness: reliance on passwords. The assault on SharePoint Online underscores the critical vulnerability passwords pose, especially when multifactor authentication is absent. To thwart such breaches, it is not enough to strengthen passwords; we must redefine access security through passwordless and certificate-based authentication.

Certificate-based authentication introduces a robust framework against this type of exploitation. By leveraging digital certificates, this method validates identities with a precision that passwords simply cannot match. The certificates, issued by trusted Certificate Authorities, provide a much higher level of assurance as they are almost impossible to forge or steal without detection. And their integration with Public Key Infrastructure enables seamless scalability and robust two-factor authentication without the need for passwords.

Embracing passwordless methods not only elevates the security posture but also streamlines user access, effectively shutting down avenues for ransomware attackers. Organizations that adopt these technologies benefit from reduced administrative burden, enhanced compliance, and a fortified defense against the rising tide of SaaS-targeted attacks. They eliminate the weakest link—passwords—from the security chain, drastically narrowing the attack surface.

In short, by adopting certificate-based authentication companies can significantly mitigate the risk of unauthorized access and data breaches, ensuring that their SaaS platforms remain secure in an increasingly hostile digital landscape. As we move forward, the integration of these advanced authentication methods will be paramount in safeguarding against the sophistication of future cyber threats, making it not just a strategic move but a necessary evolution in cyber defense.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Keys to integrate IT support and manage your after-sales service better

We are all aware of the importance of attracting new customers for business growth purposes, but focusing solely on this goal is not actually the best decision. Delivering quality customer service is also key to success. For that reason, many companies that sell their products or services over the Internet have decided to implement an after-sales support service as a fundamental part of their business. 

How to make yourself stand out among your competitors with a good after-sales support service?

More than a century ago, the Japanese businessman and philosopher Konosuke Matsushita, known for being the founder of Panasonic and one of the promoters of the “Japanese economic miracle”, laid the foundations of a revolutionary business philosophy for his time. Matsushita was based on concepts such as social contribution, teamwork, customer focus and technological innovation as differentiating factors. He wrote several works throughout his life, projecting his particular vision on business and society. Regarding after-sales support, he was of the opinion that: “After-sales service is more important than assistance before the sale, because it is through this service that permanent customers are achieved.”

These regular customers can really become your best brand ambassadors, so they should be pampered, so that they feel satisfied and share their positive experiences or make new purchases and hires.

How to offer a customer-centric after-sales service?

One of the biggest difficulties that companies encounter when managing customer service is how to convey closeness and proximity in a service as automated as IT support and offered remotely?

In the past, when there was no Internet, customers had to call a call center to solve their doubts or report any problems. Today, IT support centers use tools like chatbots that save human teams a lot of time. The use of these virtual assistants grew dramatically during the pandemic, allowing companies to respond to very high activity peaks and continue to offer 24/7 services.

However, by returning to normal, users are demanding a more conversational and less transactional customer service. Most of them rate chatbots positively as a way to get quick answers to their questions, but they don’t want machine interactions to completely replace people. For example, McKinsey’s “Next in Personality 2021” report reveals that 71% of customers expect businesses to offer custom interactions and 76% get frustrated when this doesn’t happen.

Finding the perfect balance between automation and human support is vital to offer a fast, efficient after-sales support service based on customer needs. You cannot swim against the tide or try to put a brake on digitization. On the contrary, we must rely on the advantages of technology by integrating it into the company’s IT support to access information in a unified way and know which requests can be automated and which need personalized attention.

How to integrate the IT support center to provide customers with good after-sales service?

IT support center integration needs to be planned carefully to ensure orderly and efficient business workflow.

Some essential steps for a successful integration are as follows.

Implementing a service management system (ITSM)

To manage any type of incident or complaint, it is essential to have a structured framework in which the policies to be followed by the support department are defined.

Professionals in this area are responsible for coordinating IT services with business goals. In addition, they train the team and define which tasks can be automated.

Create an IT support infrastructure

Companies that receive a high volume of requests may be in critical situations if they don’t have the tools that allow them to create dynamic workflows.

In this sense email is a painful management tool since it does not allow you to do things as basic as prioritizing important requests, keeping track of them, or escalating them to a higher level when the frontline support team is not able to solve them.

If you try to offer an after-sales support service through this means, you will soon see that the email inbox becomes saturated until it becomes a catch-all. No employee will know where to start!

Do you already know about Pandora ITSM Ticketing Helpdesk? This tool is all you need to make things easier for the support team and build customer loyalty.

As the name suggests, Ticketing Helpdesk works through a ticketing system. Each time a customer makes a request through the platform, a new ticket is opened with their data, date and subject of the incident.

Tickets are automatically cataloged according to their status: new, pending, solved, etc. You may also prioritize those that require immediate action, define automation rules or transfer complex cases that could not be solved to higher support levels.

Helpdesk Ticketing is a flexible tool and ready to work in an omnichannel environment. It can be easily integrated with other IT infrastructure tools such as project managers or CRM, to avoid process redundancy and take advantage of all the information available to improve the operation of other departments and the after-sales service itself.

Use the information collected to optimize customer service

As already mentioned, Ticketing Helpdesk collects query data, analyzes it and generates custom reports with relevant information such as:

  • Number of tickets closed
  • Number of tickets that remain open
  • Average ticket resolution time
  • Most common incidents
  • Performance of each agent (customer feedback)
  • Tickets that were escalated to higher levels

Keeping track of these metrics is very useful to know the long-term performance of the service and detect possible anomalies that would go unnoticed when analyzing isolated data.

It also ensures compliance with contractual agreements related to the service (SLA) such as downtime and support response capacity (for example, resolution of incidents in 24 hours). Respecting these agreements is important for building customer trust. In addition, non-compliance involves financial compensation that companies must assume. With the Helpdesk tool you may manage this key information and create automatic alerts if the service remains inactive for a long time.

Finally, in addition to automatic reporting, Pandora ITSM Ticketing Helpdesk also collects information from satisfaction surveys that users may answer by email or via a web form. It is a reliable way to know if the service is working as expected and the agents in charge of the support area effectively solve customer problems.

Still unsure whether Pandora ITMS will meet your expectations?

Try it for free for 30 days. You do not need a credit card, only advanced knowledge in the IT area and some free time to become familiar with all its features.

Estudié Filología, pero las circunstancias de la vida me llevaron a trabajar en el sector del Marketing como redactora de contenidos. Me apasiona el mundo del blogging y la oportunidad de aprender que se presenta con cada proyecto nuevo. Te invito a seguir mis publicaciones en el blog de Pandora FMS para descubrir las tendencias tecnológicas que están transformando el mundo de los negocios.=

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×