Skip to content

Finding OpenSSH servers

The OpenSSH team surfaced a security issue earlier this month that specifically affects OpenSSH server version 9.1p1 (a.k.a. version 9.1). This version contains a memory double-free vulnerability (tracked as CVE-2023-25136) that can be reached pre-authentication by a remote attacker. Researchers, including JFrog and Qualys, have been investigating and providing proof-of-concepts of a denial-of-service scenario and remote code execution for the attacker.

What is the impact?

OpenSSH is a popular open source implementation of the SSH protocol and is available on many operating systems. While the installation base for OpenSSH is quite large (Shodan currently reports ~48k public-facing instances of OpenSSH servers running version 9.1), the potential impacts of this vulnerability are not yet fully understood and are still being investigated.

The denial-of-service attack vector may be successful against a number of operating systems running OpenSSH 9.1. However, it yields limited results because it only crashes the forked daemon instance that was spun up to handle the attacker’s SSH connection (leaving the parent ssh daemon still running to handle other incoming connections).

Exploitation of this vulnerability for remote code execution (RCE) is more complex, with a current proof-of-concept that only targets OpenBSD 7.2 without memory protections in place (such as ASLR, NX, or ROP defenses) and with code execution still contained within the ssh daemon’s sandbox. As researchers continue investigating RCE exploitation, other operating systems with attacker-bypassable memory malloc and double-free protections may be discovered. So, the ability to fully execute attacker-controlled code outside of the ssh daemon sandbox -even with memory protections in place– may be achieved.

Are updates available?

OpenSSH version 9.2p1 (a.k.a version 9.2) was released earlier this month and patches this vulnerability (CVE-2023-25136). For systems currently running OpenSSH 9.1, admins are encouraged to update to OpenSSH 9.2 or later.

How do I find vulnerable OpenSSH services with runZero?

To locate OpenSSH servers running the vulnerable 9.1/9.1p1 version in your network, use the following prebuilt query in your Service Inventory:

_asset.protocol:ssh AND protocol:ssh AND (_service.product:="OpenBSD:OpenSSH:9.1" OR _service.product:="OpenBSD:OpenSSH:9.1p1")
OpenSSH query

To local all OpenSSH servers in your network, use the folloing prebuilt query in your Asset Inventory:

product:”OpenSSH”
OpenSSH query

As always, any prebuilt queries are available from our Queries Library. Check out the library for other useful inventory queries.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

ESET launches ESET Cyber Security for macOS v7.3 with native ARM support

BRATISLAVA, February 14, 2023 ESET, a global leader in cybersecurity, today announces several enhancements to its popular ESET Cyber Security for macOS product line, designed to provide essential protection for Apple users from a variety of modern-day cyber threats. ESET Cyber Security for macOS v7.3 now features native support for ARM and automatic updates to ensure optimal protection at all times.

ARM has become increasingly popular as a chipset in recent years due to its ability to boost performance whilst keeping energy waste to a minimum, so much so that the ARM-based mobile computing market now outperforms the legacy x86-based mobile computing market in both revenue and units1.

“We’ve been working on native support for ARM for some time, to enhance the protection we can provide customers that rely upon Apple devices,” comments Mária Trnková, vice president of ESET’s Consumer and IoT segment. “The changes we have made to the underlying architecture of ESET Cyber Security for macOS bring greater stability and higher performance, making scanning quicker and more efficient than ever before.”

The new underlying ESET Cyber Security for macOS architecture is based on micro-services, meaning components run in a more secure and performance-optimal manner. This provides higher stability and resiliency, and the solution is also more lightweight than ever before. Micro-services are lighter on resources, helping to save battery life. In other words, each component of ESET Cyber Security for macOS starts only when needed and runs for its allotted time, after which it is automatically deactivated, helping to save on device resources.

The new automatic updates component of ESET Cyber Security for macOS ensures that users are provided with optimal protection, allowing the solution to find and download updates as soon as they are released.

The latest version of ESET Cyber Security for macOS also boasts an improved multilanguage installer that contains 24 different support languages. Language is set according to the system language upon installation, and the user can subsequently change it by using the macOS language and region settings. This streamlines installation and provides peace of mind for the user.

There is also a redesigned graphical user interface (GUI) for ESET Cyber Security for macOS v7.3 that fully supports dark mode in HiDPI, thus saving on device resources. Further advanced configuration will become available later in 2023.

ESET Cyber Security for macOS v7.3 includes several other components of ESET’s award-winning functionality that users have come to expect, including:

  • Anti-Phishing – protecting users against malicious HTTP websites attempting to acquire their sensitive information, whether that be usernames, passwords, banking information or credit card details
  • Antivirus and Antispyware – eliminating all types of modern-day threats, including viruses, worms and spyware
  • Cross-platform Protection – stopping malware from spreading from macOS to Windows endpoints and vice versa. This prevents a user‘s macOS from being turned into an attack platform for Windows-targeted threats
  • ESET LiveGrid® technology – whitelisting safe files based on a file reputation database in the cloud
  • Web and Email Scanning – scanning websites during browsing and checking all incoming emails for viruses and other threats

“ESET Cyber Security for macOS v7.3 includes multiple layers of real-time protection, anti-phishing and web and email protection that ensure peace of mind for Apple users when browsing online,” comments Mária Trnková. “Powered by the advanced ESET LiveGrid® technology, the solution combines speed, accuracy and minimal system impact, leaving more system resources for consumer needs.”

Further information can be found here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

AI-Powered Identity Authentication Is Here: What You Need To Know

It should come as no surprise that identity authentication is one of the most critical aspects of doing business in the digital age. Without verifying your users are who they say they are, you leave the doors open for fraud, data breaches, and harmful cyber attacks. But with the advent of AI, identity authentication is going through a transformation. To understand how, let’s dive into everything you need to know about AI authentication.

How Is AI Helping With Identity Verification?

Traditional authentication methods are becoming less effective today due to high levels of password reuse and the increasing number of stolen credentials available on dark web databases from previous data breaches. Luckily, AI can provide better, more secure authentication by going beyond traditional boundaries and incorporating data context, biometrics, and patterns in user behavior.

What Are the Different Types of AI Authentication?

Biometric authentication is especially popular with cyber-defense-minded companies today, and AI plays a huge role here. Some examples include keystroke dynamics (typing pattern), behavioral biometrics (analyzing user behavioral patterns to create cyber fingerprints), facial recognition, and voice recognition.

Behavioral biometrics, in particular, is quickly becoming the favored type of AI verification today. Why? Because behavioral biometrics can provide continuous authentication by tracking and verifying user behavior like typing rhythm, mouse movement, and device usage patterns. In addition, it also provides a more seamless and frictionless authentication experience, as it doesn’t require users to remember or enter passwords.

And critically, these identity authentication tools are only possible with artificial intelligence and machine learning. These technologies rely on highly precise authentication driven by large data sets and advanced algorithms. And as a result, they’re almost impossible for fraudsters to bypass.

How do AI Authentication Systems Mitigate AI Bias?

AI bias” refers to the tendency of artificial intelligence algorithms and systems to perpetuate and amplify existing biases and discrimination in the data they are trained on and in the decisions they make.

There are several ways in which AI authentication systems can mitigate bias:

  1. Diverse training data: Using a diverse and representative dataset for training the AI system can help reduce bias and improve accuracy for underrepresented groups.
  2. Fairness algorithms: These algorithms can help identify and address bias in AI systems by balancing accuracy across different demographic groups.
  3. Human oversight: Having human oversight and review in the development and deployment of AI systems can help ensure that potential biases are identified and addressed.
  4. Regular monitoring and evaluation: Regular monitoring of the AI system’s performance and outcomes can help identify any potential biases that may emerge over time and allow for appropriate corrective actions to be taken.
  5. Transparency and accountability: Making AI systems transparent and accountable can help increase trust in the technology and promote responsible use.

These measures can help mitigate AI bias in authentication systems and ensure that they are fair, unbiased, and effective in protecting the privacy and security of users.

Final Thoughts

The use of AI in cybersecurity is nothing new, but it is becoming increasingly powerful and more widespread. Today, more and more companies are looking to AI authentication to help safeguard their systems from nefarious actors.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

A true partnership for success: The evolving relationship between Kempinski Hotels and CloudM

The Company

Kempinski is a luxury hotel management group celebrating its 125th anniversary this year. Steeped in history, the iconic company dates back to 1897, crowning them Europe’s oldest luxury hotel group.

A growing collection of distinguished properties proudly bears the Kempinski name. Their illustrious portfolio currently boasts 81 of the world’s most breathtaking destinations spread across 35 countries, each possessing their trademark exclusivity and European flair.

Kempinski’s prestigious heritage is equally matched by its ambitious vision for the future. And the group understands that embracing technology is the key to offering a world-class guest experience for another 125 years.

The evolution of the relationship

Kempinski has been a valued CloudM customer since 2010 when they used CloudM Migrate to transition from Novell GroupWise to Google Workspace.

Their relatively early adoption of Google Workspace shows their early commitment to cloud solutions: they could see the value on offer and understood the pivotal role the technology would play in the future.

Moving to the cloud enabled Kempinski to create a flexible, agile platform which allowed them to react to market opportunities faster than their peers and capitalize on innovation opportunities as they’ve presented themselves.

CloudM has played a central role in Kempinski’s tech stack ever since. Kempinski benefits from the CloudM Automate features with our Staff Directory being at the heart of their staff collaboration.

CTS, our partner and sister company (as part of the CTS Group), manages the Onboarding and Offboarding Workflow features on Kempinski’s behalf, setting up automation that work behind the scenes to streamline Kempinski’s day-to-day operations.CloudM’s automated onboarding solutions help new employees integrate seamlessly into the company.

New employees are granted immediate access to the resources they need for their role, including shared documents and calendars.

From company policy and culture training, to team introductions and job benefits, everything is accessible from day one, making new employees’ experience as straightforward and stress-free as possible.

At the opposite end of the employee journey, CloudM’s Offboarding Workflow feature automates Kempinski’s offboarding process, revoking passwords and permissions for employees the moment they leave the company.

Both of these features free up untold labor hours that would otherwise be spent manually onboarding and offboarding members of staff.

Holly Simpson, the Account Manager for Kempinski at CTS, recognises the values of CloudM’s features. She said: “Our fruitful relationship with Kempinski stretches back over a decade now. And only grows stronger with each passing year. The CloudM features form an integral part of the efficient, automated, managed service that CTS delivers to keep the hotels running day-to-day.”

Shaping CloudM’s Archive solution

Kempinski’s more recent uptake of the CloudM Archive module shows a continuing confidence in CloudM (and CTS) to sit at the center of their digital operations.When Google replaced their free Vault Former Employee (VFE) licenses with paid Archive User (AU) licenses, at a cost of ~€50 each per year, Kempinski was potentially looking at an eye-watering bill in the hundreds of thousands.

So they turned to CloudM for help.CloudM rose to the challenge, providing a managed migration of thousands of Kempinski’s archived profiles to cloud storage quickly and automatically, using CloudM Migrate. This slashed their expected expenditure drastically while keeping their offboarded user data secure, easily accessible and compliant.

We used CloudM Migrate to perform this initial transfer because it was the fastest way to move the data. Then, we added the Archive step to Kempinski’s offboarding policies so anyone offboarded in the future would automatically have their data archived to the same storage bucket (or another of their choice).

Archived data can be retrieved in just a couple of clicks and data is automatically purged forever after a set length of time to keep businesses compliant.

“We’re proud to have embraced CloudM solutions for over a decade now. And we believe they are providing solutions geared for the future. They’re an essential part of our strategy going forward.”

Here’s to the future

CloudM simply wouldn’t exist without collaboration with our customers. We’ve consistently grown out of our customers’ requests, needs and feedback.

“Kempinski has been a partner in the truest sense of the word,” says Gary Bennion, CloudM’s Chief Technology and Customer Officer. “They have collaborated closely with us for years to help shape CloudM and they continue to be a key customer.”

We’re currently working with Kempinski to centralize and manage their staff user data across HR, SSO (via a third party application), Google Workspace, People Application, and CloudM. This will undoubtedly further strengthen our relationship and may even lead to the creation of new products.

Our symbiotic relationship with Kempinski has enabled both of us to achieve greater success, and our ongoing dialogue fosters continuous growth and innovation.

So, as Kempinski raises a glass and reflects on 125 years of excellence, CloudM looks forward to supporting their future success.

Want to benefit from the same features that Kempinski, and other industry leading companies such as Spotify, Netflix and Uber, use?

With over 35,000 customers worldwide, CloudM’s user management features have helped companies put office life on auto-pilot by automating time-consuming tasks, allowing them to focus on the big picture, eradicate human error and save both time and money.

For more information on our platform, request a free 15 minute demo call with one of our team.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

ESET 發現針對香港等地區的多個假冒應用程式 附有特洛伊木馬

  • ESET 研究人員發現了一個針對東南亞和東亞地區的惡意軟件。
  • 黑客購買廣告,將假冒網站放置在 Google 搜索結果的「廣告」位置。ESET 向 Google 作出匯報後,這些廣告已被立即刪除。
  • 從這個網站下載的安裝程式大多是中文版本,部分不在中國地區提供下載。
  • 我們觀察到受害者主要在東南亞和東亞(馬來西亞、日本、菲律賓、泰國、新加坡、印度尼西亞、緬甸、中國大陸、香港和台灣)。
  • 今次傳播的惡意軟件是 FatalRAT,是一種遙距存取木馬,可以在受害者的裝置上執行各種惡意活動。

2023 年 2 月 16 日 – ESET 研究人員發現了一個針對東南亞和東亞地區的惡意軟件,通過購買誤導性廣告出現在 Google 搜索結果中,從而誘導用戶下載附有木馬的安裝程式。黑客製作了與 Firefox、WhatsApp、Signal、Skype 和 Telegram 等流行應用程式外觀相似的假冒網站,傳播一種名為 FatalRAT 的惡意軟件,它是一種遙距存取木馬,讓黑客可以控制受害者的裝置。今次的攻擊主要影響中國大陸、香港和台灣用戶。

FatalRAT 可以在受害者的裝置上執行各種惡意活動,包括捕獲按键點擊、竊取或刪除某些瀏覽器儲存的數據,以及下載和執行文件。ESET 研究人員在 2022 年 8 月至 2023 年 1 月期間觀察到今次的攻擊,但根據我們的測量,此波攻擊至少從 2022 年 5 月開始。

黑客註冊了各種域名,這些域名都指向同一個 IP 地址,讓一個伺服器託管多個下載木馬軟件的網站。假冒網站看起來與正版網站相同,黑容更將這些網站翻譯成中文,提供原本在中國地區未能下載的軟件,例如 Telegram。一家中文新聞網站報導說,他們在使用 Firefox 瀏覽器時,會看到一則指向這些惡意網站的 Google 廣告。黑客購買了廣告,將假冒網站放置在 Google 搜索結果的「廣告」位置。ESET 向 Google 作出匯報後,這些廣告已被立即刪除。

ESET 研究員 Matías Porolli 解釋:「雖然我們無法重現此類搜索結果,但我們相信這些廣告只提供給目標地區的用戶。由於攻擊者為其網站註冊的許多域名與合法域非常相似,黑客也有可能依靠 URL 劫持來吸引潛在受害者到訪他們的網站。黑客可能只對竊取網絡憑據等信息感興趣,以便在地下論壇出售它們,或將它們用於另一種類型的犯罪活動。最後,在下載軟件之前,檢查我們正在瀏覽的 URL 是十分重要的。」

ESET 在 2022 年 8 月至 2023 年 1 月期間檢測到攻擊的國家 / 地區

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×