Skip to content

端點控管必須內外防護兼具

根據Verizon發布資料外洩事件調查報告 (DBIR),內部攻擊或威脅肯定是重要的因素之一,實際上,大約有30%的外洩是內部威脅。到目前為止,對組織的最大威脅仍然來自外部參與者。據去年的數據顯示,有70%的違規行為來自外部參與者。其中有1%涉及多方人馬,而且也有1%涉及第三方合作夥伴。

人們普遍認為內部人員是組織安全的最大威脅,這可能有點偏誤。誤以為來自特定來源威脅的「數量」,相等於這些威脅所帶來的安全衝擊「嚴重度」。因為一次內部威脅爆發,可能造成的危害是外部攻擊的十倍,還是要取決於事件的性質。

 

攻擊及威脅動機是什麼? 

在絕大多數情況下的攻擊事件最大的動機是經濟利益,資訊安全從業人員並不會感到驚訝。除了對金錢報酬的需求外,還具有另一個有趣特點:攻擊者進行的攻擊,大多不會超過兩到三個步驟。如果需要更複雜的手法才能成功,可能會放棄尋找下一個目標;除非是為了更具規模或針對性的攻擊。

挑軟的柿子下手總比在堅固的目標上,投入過多時間和精神的成本要好得多。快速大規模的操作並使用自動瞄準和開發工具是一個正常的ROI選擇。身為捍衛者的策略是非常直接的,如果您保護好了城堡,並讓壞人努力成為白工,那麼絕大多數攻擊者會轉移到其他的目標上。

儘管財物可能是攻擊者最終真正想要的東西,但他們往往會想獲得更多其他收益。用戶憑據也是攻擊者的主要目標,除了直接存取寶藏之外;組織還可能被突破淪陷之後,成為通往另一個更有價值目標的墊腳石。對攻擊威脅者而言,真正有價值的可能是你的客戶,而不是你的組織。

 

邊境界線逐漸消失中 

傳統的資訊外洩防護方案,可在資料儲存、使用、傳遞等三方面提供保護。如果存取的資料都可以保留在這些端點、邊境防火牆範圍內,以往這也許是足夠的。但是,安全防護的邊界越來越不明顯,而且一旦使用超出邊界範圍,它的資訊安全政策就無法被落實。這意味著,現在的工作及供應商的合作方式,不再有明顯的界線可以分出信任區域。

 

COVID-19下遠距工作的安全疑慮

在疫情之下,各種規模的公司都受到一定程度打擊。對於期望維持業務連續性的現代組織來說,遠端工作已成為必需。遠端工作對資訊安全形成了獨特的挑戰,因為遠端工作環境通常沒辦法提供與辦公室相匹敵的保護措施。當員工在辦公室時,他們在預防性的安全控制層後面工作。雖然不完美,但在辦公室環境工作時不容易違反安全性規定。但是當設備離開組織IT邊境外圍,在遠程工作時將帶來新的風險,因此必須採取附加的安全保護策略。

轉移雲端平臺不是一個有沒有必要的問題,而是一個”什麼時候開始”的問題。遠端工作員工、供應商、客戶服務和策略夥伴合作的需求,只會加快推動雲端的使用。例如公司依賴於員工從其個人智慧手機,存取行動業務相關應用程式 (稱為自有設備或 BYOD)。此外,近四分之一的千禧代員工表示,他們會將公司檔案下載到這些設備上,並安裝了第三方雲端應用程式(私有雲或 BYOC),但沒有知會 IT 或資安人員;這代表企業並非能夠有效控制使用雲端的時間和方式。

但無論速度如何,傳統固定的安全政策都難以與跟上這工作需求。原因之一是雲應用程式供應商傾向於優先考慮方便性、可存取性和易用性,資料使用的安全性就不一定周密。他們專注於共同開發合作模式,用傳統方式保護基礎設施的安全,但讓用戶確保在基礎設施中共享的數據。這意味著,鑒於當今工作內容的變化、移動性,無論您的人員在哪裡,都有責任構建資料保護。

 

端點資料活動監控保護方案

長久以來資料安全與業務績效之間,在某些需求面存在矛盾。畢竟保持競爭優勢的最簡單方法,就是企業保有其”秘密配方”的能力。將內部重要資料無論是專有工序流程、關鍵智慧財產權,甚至是專利配方文件等,通通都保護在城牆之內,遠離街頭。

但這個問題要複雜得多。據估計世界上90%的數位資料是在短短兩年之內創造的;存取方式幾乎都是透過網路。跨組織合作使保護資料安全更加複雜,行動裝置、遠距工作的用戶端、供應商、承包商、內部遠端服務和漫遊員工等的激增,資料外洩事件可能性增高,對公司的品牌形象和客戶的信任感造成嚴重損害。長期以來,醫療和金融服務等受到嚴格監督的行業,一直受到主管機關當局法律規範,以確保機敏資料的安全。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於精品科技
精品科技(FineArt Technology) 成立於1989年,由交大實驗室中,一群志同道合的學長學弟所組合而成的團隊,為一家專業的軟體研發公司。從國內第一套中文桌上排版系統開始,到投入手寫辨識領域,憑藉著程式最小、速度最快、辨識最準等優異特性,獲得許多國際大廠的合作與肯定。歷經二十個寒暑,精品科技所推出的產品,無不廣受客戶好評。

Windows 10 二月份 Hotfix 干擾 X-FORT MBR 硬碟防護

微軟在今年二月中發布針對 Windows 10 1903、1909、20H1、20H2 的 Hotfix 緊急更新( KB5001028、KB4601319),此 Hotfix 的更新會干擾 X-FORT 的 MBR 硬碟防護功能,造成電腦開機後發生 BSOD 的情況。

X-FORT 為釐清問題發生原因,已全力投入調查。


影響範圍:

1. Windows 7、Windows 8、Windows 8.1 及 Windows 10 1809(含)以前的 OS,不會安裝 Hotfix KB5001028、KB4601319,因此不會發生此問題。

2. Windows LTSC 2019 版本不會發生此問題(原因同上)。

3. Windows 10 1903、1909、20H1、20H2 的 OS 加上 X-FORT 開啟 MBR 硬碟防護,才會發
生 BSOD 問題。


強烈建議客戶採取以下方法迴避:

1. 請將 X-FORT MBR 硬碟防護控管關閉,可避開此問題。

2. 在 Windows 10 1903、1909、20H1、20H2 請不要安裝 Hotfix(KB5001028、KB4601319)即可避開此問題。
(已安裝請移除 KB500D1028、KB4601319 HotFix)


使用 X-FORT MBR 硬碟防護客戶,請與 Version 2 技術人員或客服中心聯繫,我們將提供工具遠端協助進行上述預防步驟。如果發生以上事件,請與 Version 2 技術人員或客服中心聯繫,將提供救援 SOP。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於精品科技
精品科技(FineArt Technology) 成立於1989年,由交大實驗室中,一群志同道合的學長學弟所組合而成的團隊,為一家專業的軟體研發公司。從國內第一套中文桌上排版系統開始,到投入手寫辨識領域,憑藉著程式最小、速度最快、辨識最準等優異特性,獲得許多國際大廠的合作與肯定。歷經二十個寒暑,精品科技所推出的產品,無不廣受客戶好評。

How PAM can help against insider threats

 

Insider threats take many forms. Some are malicious agents looking for financial gain. Others are simply careless or unaware employees who click on suspicious links.

An insider threat can be defined as someone close to an organization, with authorized access, improperly using that access to negatively impact the organization’s critical information or systems.

Insider threats have the potential to do major damage to a company’s cybersecurity. One way to defend it against insider threats is by focusing on controlling privileged access.

In this article, we talk about some ways that PAM (Privileged Access Management) assists companies against cyber risks associated with insider threats.

Keep reading and learn about the possibilities of reducing the impacts of insider threats with Privileged Access Management.

Cyber risks associated with insider threats

Insider threats are not always exclusively people who work directly for your organization. We can include consultants, outsourced contractors, suppliers, and anyone who has legitimate access to some of your resources.

To understand more about the subject, we have selected five possible scenarios in which insider threats can arise.

  • An employee or third party who performs inappropriate actions that are not intentionally malicious, they are just careless. Often, these people look for ways to do their jobs, but they misuse the assets, do not follow acceptable usage policies, and install unauthorized or dubious applications.
  • A partner or third party that compromises security through negligence, misuse, or malicious access or use of an asset. For example, a system administrator may incorrectly configure a server or database, making it open to the public instead of private and with controlled access, inadvertently exposing confidential information.
  • An agent bribed or requested by a third party to extract information and data. People under financial stress are often the main targets.
  • A rejected or dissatisfied employee is motivated to bring down an organization from the inside, disrupting business and destroying or altering data.
  • A person with legitimate privileged access to corporate assets, who seeks to exploit them for personal gain, usually stealing and redirecting information.

Whether the damage is caused intentionally or accidentally, the consequences of insider attacks are very real.

One of the ways to mitigate the risks of the scenarios above is to implement monitoring tools to track who accessed which files and alert administrators about unusual activities.

In addition to these actions, the management of privileged accounts also helps to reduce damage caused by insider threats and contributes to proactive cybersecurity behavior.

PAM and Privileged Accounts

Privileged accounts are those with elevated access permission that allow account holders to access critical systems and perform administrative or privileged tasks. Like ordinary user accounts, privileged accounts also require a password to access systems and perform tasks.

Privileged accounts can be used by people or be non-human when used by applications or systems. The latter are also called service accounts. Privileged accounts, such as administrative accounts, are often used by system administrators to manage applications and hardware, such as network assets, and databases.

The problem with these accounts is that they are often shared, used on many systems, and can use weak or standard passwords, making it easier for insider agents to work.

Thus, when these accounts are not properly managed, they give insider agents the ability to access and download the organization’s most sensitive data, distribute malicious software, bypass existing security controls, and delete trails to hide their activities in audits.

One of the most secure ways to manage privileged accounts is through PAM (Privileged Access Management) solutions. This solution consists of cybersecurity strategies and technologies to exercise control over privileged access and permissions for users, accounts, processes, and systems in a corporate environment.

Check below how PAM solutions are important allies to reduce cyber risks associated with insider threats.

PAM and Insider Threats

As mentioned, privileged accounts represent high-value targets for insider agents.

Organizations need to adopt a Privileged Access Management (PAM) solution and also provide data on access to privileged accounts for this solution in their monitoring systems.

Therefore, we selected 7 resources present in the PAM solutions that are strategic for those companies that seek to reduce the possibilities of insider threats.

  • Use of effective policies for all employees, whether remote, service providers or third parties.
  • Protection for the credentials of your most confidential assets (confidential applications, databases, privileged accounts, and other critical systems) in a central and secure repository.
  • Limitation of privileged access to confidential information, such as customer data, personally identifiable information, trade secrets, intellectual property, and confidential financial data.
  • Least privilege procedures and resources to provide employees with just the access they need. This is what we call need-to-know.
  • Limitation of local administrator rights for all employees’ workstations; and implementation of permission, restriction, and denial policies to block malicious applications.
  • Implementation of workflows for the creation and governance of privileged accounts.
  • Monitoring and recording of privileged access to confidential information, data, and systems.

That is, the first steps to better protect yourself and your customers from insider threats consist of applying at least some privileged access management best practices.

Start by learning more about how the principle of least privilege works, then it is important to establish and apply the best password management practices and, finally, invest in a comprehensive PAM solution that has all these resources at your disposal.

senhasegura is a PAM solution that has granular access controls, credential management, detailed logging and session recording, and the ability to analyze user behavior.

Request a demo now and discover hands-on the benefits of senhasegura to limit the damage caused by insider threats.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

World Consumer Rights Day: Protecting consumers’ rights online

On March 15, 1962, President John F. Kennedy called on Congress to enact legislation to protect consumer rights – he was the first world leader to formally address the issue. Since 1983 this date has been marked as World Consumer Rights Day. The consumer movement uses this day every year to mobilize action on important issues and campaigns, including digital marketplaces, plastic pollution, and fair mobile phone services. Simply put, celebrating World Consumer Rights Day is an opportunity to demand that the rights of all consumers be respected and protected, and to protest against market abuse and social injustice that undermine those rights.

As the world becomes increasingly digitalized and consumption moves online – with 61% of consumers worldwide shopping online, more often now than they were before the pandemic – the digital aspect of consumer rights is more important than ever. Tech development, from IoT devices to financial technology (FinTech) to new online marketplaces, has a huge impact on consumer rights. As Consumers International notes, digital has become the default way of working for the majority of businesses – and with it comes consumer rights issues, including data protection, privacy, and online scams.

When consumers are online, businesses collect and store data about their purchases and behaviors. This can be convenient, with companies recommending what you’re interested in, sharing discounts, and even reminding you when you need to buy a birthday present. Unfortunately, the downsides can be far more troubling. Organizations may have access to information that helps to influence your decisions, removing some of your free choice without you even realizing. Also, big caches of data – including personally identifiable information (PII) – are attractive to cybercriminals. If breached by hackers, the information stored by online outlets can put you at risk of identity theft, phishing attacks, and scams. This may to contribute to the fact that less than one-third of global consumers (29%) feel very secure when shopping online.

Knowing who has access to information about you is an important step in protecting your data. Mark this World Consumer Rights Day by checking where your information is stored – and what you can do to limit it. According to ESET’s new research into data security and financial technology, consumers around the world are not always aware of how their data is treated. Of those consumers who use free FinTech apps around the world, 50% do not know if these apps sell their data. Seemingly, consumers in different countries have vastly different attitudes to this. Brazil and the UK have the lowest levels of awareness, with over 60% of consumers in both countries not knowing if FinTech apps are selling their data (Brazil 62%, UK 63%). In contrast, far more FinTech users in the US are in the know about how free apps use their data – less than a third (31%) do not know if their data is being sold.

Knowing who has access to your data and how it is being used is a key aspect of protecting your consumer rights online. In President Kennedy’s words, consumers – both online and in store – deserve “the right to safety, the right to be informed, the right to choose, and the right to be heard.” To find out more about World Consumer Rights Day, visit the Consumers International website. For more information on ESET, how to keep your data safe online, and our global FinTech research, click here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

A Microsoft Exchange saga: How is ESET technology protecting business customers post-exploitation?

The global scale of the recent Exchange server attacks deserves the designation “saga.” The fallout, resulting in data theft and further malware deployment, has likely led to intensive changes in security protocols at thousands of institutions, and will surely be felt for a long time.

In an update to ESET’s original research piece detailing the global impact of the attacks, ESET’s telemetry picked up almost 27,000 attack attempts via web shells against around 5,500 unique servers:

Along with our well-received research into advanced persistent threat groups leveraging the Exchange vulnerabilities, ESET has set out to provide proactive advice via its Knowledgebase and a Customer Advisory. As the saga moves forward and we continue to compile and analyze data from the networks we protect, we would like to share how our cloud sandbox technology, ESET Dynamic Threat Defense (EDTD), and our endpoint detection and response solution, ESET Enterprise Inspector (EEI), offer protection to our clients.

With respect to malicious files, EDTD not only handles executables (as is the case with ESET LiveGrid®) but also documents, scripts, installers and other file types commonly used to deliver threats. As such, the technology gives greater visibility into, and protection against, various threat types. Leveraging EDTD in combination with endpoint security—both of which are backed by our core detection technologies—brings a multilayered approach to the table that significantly increases the likelihood an attack is automatically detected.

Looking closely at the samples related to the exploitation of Exchange servers, ESET has seen that some of the post-compromise attack components, for example, the loaders for the PlugX RAT (also known as Korplug), are being detected by EDTD when the most sensitive detection threshold – Suspicious – is applied. The same applies to the CobaltStrike-related components.

These kinds of detections also trigger alerts in the ESET Lab, where our researchers are actively monitoring EDTD detection data. The knowledge gained from malware analysis of these samples can then be applied further as we investigate possible intrusion vectors and remediation. With respect to post-compromise investigation and monitoring of servers, security operations center teams can use ESET Enterprise Inspector to address what amounts to a global challenge.

From the point of view of EEI’s rule set, the current modus operandi of the attackers can be fairly generic, meaning that creating a rule that detects such generic activity—even though possibly malicious—might cause a high number of false positives. For example, it is quite normal for w3wp.exe, the IIS worker process, to execute cmd.exe and powershell.exe, meaning that a rule monitoring this event would flood EEI’s dashboard with false positives.

However, ESET security teams have investigated how EEI faces up against malicious activity following the exploitation of Exchange. Our findings suggest that EEI deployed on exploited servers can cut investigation time by at least 80%.

EEI can not only shorten the time for investigation, but also show the path of attack. Critically, the security admin at EEI’s dashboard would have data at hand to see what was happening, when and where, which is a significant help in identifying and cleaning up malware, as well as providing for the overall security of compromised email servers.

Please follow our blog where ESET will share additional information to help customers return to normal operations following the extensive global exploitation of Exchange.

Partnership Will Drive Increased Adoption of Portnox’s Cutting-Edge NAC Solution Purpose-Built for Large Distributed Organizations in the Region

LONDON — Portnox, which supplies network access control (NAC), visibility and device risk management to organizations of all sizes, today announced that it has partnered with Distology for the sole distribution and resell of its cloud-delivered NAC-as-a-Service solution in the United Kingdom and Ireland.

We chose to partner with Distology because of their successful history of IT security solution distribution in the UK and Irish markets, said Portnox CEO, Ofer Amitai. Were confident this collaboration will yield tremendous growth for both parties, as Portnox has a unique value proposition and Distology has the market enablement expertise to effectively evangelize our network security offering.

We have a long-established relationship with Portnox and it speaks volumes that the team have decided to choose Distology as their sole UK&I distributor. The technology Portnox brings to the market is incredibly exciting and complements our existing vendor stack effortlessly, said Stephen Rowlands, Head of Sales for Distology. Were especially looking forward to representing and promoting Portnox Clear to our growing partner base, as this brand-new cloud-based technology has potential to completely disrupt the market and we foresee masses of growth potential in this innovative product.

Portnox introduced its cloud-delivered NAC-as-a-Service solution to the UK & Irish markets less than two years go. As the first to bring NAC to the cloud, Portnox has quickly gained a foothold in the region, particularly among large distributed enterprises in the retail, construction and utilities industries.

The adoption of our NAC-as-a-Service product in the UK has been very strong to date, said VP of Products, Tomer Shemer. This is a testament to the fact that the UK is one of the markets leading the trend of cloud security adoption. We expect to see continued growth in the coming years in this area of Europe.

Portnox is set to exhibit at this week’s RSA 2020 Conference (booth #4234) in San Francisco, February 24-28. Additionally, Portnox (booth #G108) and Distology (booth #C40) will both be exhibiting at InfoSec Europe 2020, Europes largest event for information and cyber security, in London, June 2-4.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Distology
Distology is a Market Enabler and offers true value for the distribution of disruptive IT Security solutions. The vendors we work with represent innovative and exciting technology that continues to excite and inspire their reseller network. Our ethos is based on trust, relationships, energy and drive and offers end to end support in the full sales cycle providing vendor quality technical and commercial resource.

BRATISLAVA, MONTREAL – ESET researchers have recently discovered websites distributing trojanized cryptocurrency trading applications for Mac computers. These were legitimate apps wrapped with GMERA malware, whose operators used them to steal information, such as browser cookies, cryptocurrency wallets and screen captures. In this campaign, the legitimate Kattana trading application was rebranded – including setting up copycat websites – and the malware was bundled into its installer. ESET researchers saw four names used for the trojanized app in this campaign: Cointrazer, Cupatrade, Licatrade and Trezarus.

“As in previous campaigns, the malware reports to a Command & Control server over HTTP and connects remote terminal sessions to another C&C server using a hardcoded IP address,” says ESET researcher Marc-Etienne M.Léveillé, who led the investigation into GMERA.

ESET researchers have not yet been able to find exactly where these trojanized applications are promoted. However, in March 2020, the legitimate Kattana site posted a warning suggesting that victims are approached individually to lure them to download a trojanized app, thus pointing to social engineering. Copycat websites are set up to make the bogus application download look legitimate. The download button on the bogus sites is a link to a ZIP archive containing the trojanized application bundle.

In addition to the analysis of the malware code, ESET researchers have also set up honeypots (research computers) and lured GMERA malware operators to remotely control the honeypots. The researchers’ aim was to reveal the motivations behind this group of criminals. “Based on the activity we have witnessed, we can confirm that the attackers have been collecting browser information, such as cookies and browsing history, cryptocurrency wallets and screen captures,” concludes M.Léveillé.

For more technical details on the latest GMERA malicious campaign, read the full blogpost, “Mac cryptocurrency trading application rebranded, bundled with malware,” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.


About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×