Skip to content

What does the recent Microsoft Exchange attack frenzy tell CISOs about their approach to security?

Before ESET shined the light on a slew of APT groups exploiting vulnerabilities in Exchange servers around the world, a smaller number were using zero days in targeted attacks—leading CISOs to reconsider their security approach.

At the front end of 2021, the SolarWinds supply-chain attack was revealed as increasingly worse than initially reported. This served as a reminder of the many dependencies involved in the security of software delivery and integration, and the fact that these factors can lead to unexpected cyberattacks— in this case, an update to the legitimate Orion software was laced with malware.

Now, the recent spate of attacks against Microsoft Exchange perpetrated by at least 10 advanced persistent threat (APT) groups is going to mark our memories with yet another lesson—the importance of reducing the attack surface of business applications such as Exchange or SharePoint. For people in many jobs—including public officials, IT security admins, PR folk and so on—timely communication and response even during off hours is indispensable, with email often being the tool of choice.

While Exchange has made its name as “the corporate choice” for email services, it has also attracted the  interest of APT groups, meaning securing Exchange servers is paramount. But even for IT staff, just getting the on-premises version of Exchange up and running can be a bit of a hurdle because it is a complex application, and maintaining it can be like riding a bucking bronco.

As the mass exploitation of Exchange servers demonstrated, it can be very hard to patch in time to avoid being compromised. At the very least, organizations should raise the level of difficulty against intruders by requiring a virtual private network and multifactor authentication to better secure non-necessary internet access to email servers.

 

A feeding frenzy: APT groups race against time to exploit the recent vulnerabilities in Exchange

In early March, while the vulnerabilities in Exchange were still zero days, at least six APT groups were exploiting those vulnerabilities in targeted attacks. Shortly after Microsoft released patches, ESET saw four additional groups join the fray, with ESET telemetry recording a massive increase in web shells detected on email servers. Clearly, a race had ensued to force entry and establish persistence on unpatched email servers before organizations could close the door by applying the patches.

The European Banking Authority and the Norwegian Parliament both publicly declared they were affected in the attacks, while ESET saw over 5,000 email servers around the world that were affected, including those of:

  • governmental entities in the Middle East, South America, Africa, Asia and Europe;
  • a utility company in Central Asia;
  • an IT services company in South Korea;
  • a procurement company and a consulting company specializing in software development and cybersecurity, both based in Russia;
  • an oil company in Mongolia;
  • a construction equipment company in Taiwan;
  • a software development company based in Japan; and
  • a real estate company based in Israel.

The zero days utilized in the attacks are known as pre-authentication remote code execution (RCE) vulnerabilities, arguably the worst kind: attackers can infiltrate any Exchange server within reach, especially via the internet, without needing any credentials.

 

How do you balance security and usability needs for Exchange?

While it may be more secure to avoid giving your critical applications like Exchange and SharePoint a face to the internet at all, what can you do if that is not possible? In a zero-day attack you are already one step behind the attackers. Even with dedicated IT teams and patches coming out quickly, applying those patches in time to prevent a compromise becomes a race in which attackers with zero-day exploits in their pockets have a head start.

Perhaps what this experience reveals to CISOs is the utility of taking an “assume I am compromised” approach to security. It’s not just about having an expert Exchange administrator and security team, whether in-house or outsourced from a managed service provider, but also about an attitude that soberly admits “it’s only a matter of time.”

Then you put down the investment that you need to get equipped with threat hunting tools, such as endpoint detection and response (EDR) solutions, and get your horse back in the race. Although that itself requires a mature security team, or a managed service provider, that can wield those EDR solutions to best effect.

The added benefit, however, is that you get some of the flexibility and usability back that you would like to have with your applications. You know that your applications and servers are likely to be probed for unknown weaknesses, but you don’t worry as much because you can deal with it right away—which just might be enough to restore the balance between usability and security.

ESET customers are advised to read the following articles for more information:

  1. ESET Customer Advisory: Microsoft Exchange vulnerabilities discovered and exploited in-the-wild
  2. ESET Knowledgebase: Does ESET protect me from the Hafnium zero-day exploit in Microsoft Exchange?
  3. WeLiveSecurity: Exchange servers under siege from at least 10 APT groups

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET 舊版軟件版本將於2021年終止支援服務(End of Life)

  • 什麼是終止支援服務(End of Life)?
    在ESET產品結束其生命週期,將不再提供支援或協助,並無法保證產品之功能,含模組更新(其中包含病毒碼更新)。
  • 該如何確認ESET使用版本號?
    【開啟ESET產品】→【說明及支援】→【技術支援詳細資料:產品版本】
    相關詳細資訊請參閱:【說明文件
  • 若為受影響之版本號,該如何升級?
    若為Windows 7 & Server 2008 R2請先更新Windows KB4474419KB4490628
    若為Windows 10建議移除舊版ESET重啟電腦後,再次下載並安裝;
    若為Windows XP、Server 2003建議系統需更新,若無法更新系統也請安裝ESET符合之產品。
    相關詳細資訊請參閱:
    【Windows 7 & Server 2008 R2-說明文件】【Windows XP、Server 2003-說明文件
  • 受影響之ESET產品 (未提及之系統皆為Windows 系統)

     

    ESET Business 產品名稱版本號停止支援新版載點
    ESET Endpoint Security6.6.x2021/03新版載點
    5.x-6.4.x2021/06
    ESET Endpoint Antivirus7.0.x-7.2-x2021/12新版載點
    ESET File Security for Microsoft Windows Server6.0.x-6.4.x2021/06新版載點
    ESET Mail Security for Microsoft Exchange Server新版載點
    ESET Mail Security for IBM Domino;新版載點
    ESET Security for Microsoft Sharepoint Server新版載點
    ESET Mail Security for Microsoft Exchange Server6.5.x2021/08新版載點
    ESET Mail Security for IBM Domino新版載點
    ESET Security for Microsoft Sharepoint Server新版載點
    ESET Remote Administrator (ERA)All version2020/12ESET PROTECT
    ESET Security Management Center (ESMC)7.0.x2021/11
    ESET File/Mail/Gateway Security for Linux/FreeBSD4.x含以下2021/12不再支援更新
    ESET Endpoint Security for macOS6.8.x含以下2021/06新版載點
    ESET Endpoint Antivirus for macOS新版載點
    ESET 舊版產品版本號停止支援新版載點
    ESET NOD32 Antivirus Business Edition4.x含以下2021/06ESET官網確認您的產品,
    再至下載符合您系統之軟件新版載點
    ESET Smart Security Business Edition
    ESET Home 產品名稱版本號停止支援新版載點
    ESET Smart Security10.x含以下2019/02新版載點
    ESET NOD32 Antivirus13.x含以下2021/10新版載點
    ESET Internet Security新版載點
    ESET Smart Security Premium新版載點

     

    完整詳細資訊,請參閱 https://support-eol.eset.com/tw/trending_eol_products_2021.html
    更多End of Life資訊請參閱:
    ESET End of Life policy (Business products)【相關說明
    ESET End of Life policy (Home products)【相關說明

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

ESET recognized as a Top Player in Radicati APT Protection Market Quadrant 2021 for the second year in a row

BRATISLAVA – ESET, a global cybersecurity leader, has been recognized as a Top Player for the second year in a row in Radicati’s 2021 Advanced Persistent Threat (APT) Protection Market Quadrant. The report evaluates 12 leading security vendors in the market, assessing their functionality and strategic vision, with ESET one of only six vendors to be awarded Top Player status. The Radicati Market Quadrant is a metric used to paint a picture of a specific technology market, with this edition covering APT Protection, defined as “a set of integrated solutions for the detection, prevention and possible remediation of zero-day threats and persistent malicious attacks.” ESET’s enterprise security portfolio includes a wide array of cutting-edge solutions, including ESET Enterprise Inspector (EEI), ESET Threat Intelligence and ESET Dynamic Threat Defense (Cloud Sandbox). The solutions, and EEI in particular, were praised for their strong endpoint detection and response (EDR) capabilities, including monitoring of events such as process and script execution, and extensive remediation and response capabilities. The report further highlighted ESET solutions for ease of deployment and ease of use, as well as offering multi-language support. Radicati positions vendors in a quadrant according to two criteria: functionality and strategic vision. Radicati evaluates key features and capabilities, including, but not limited to, EDR, deployment options, platform support, malware detection, sandboxing and quarantining, forensics, and analysis of zero-day and advanced threats. In Radicati’s 2021 APT Protection Market Quadrant, Top Players are described as “the current market leaders with products that offer both breadth and depth of functionality, as well as possess a solid vision for the future.” ESET’s positioning as a Top Player for the second year in a row demonstrates the company’s tenacity, with the Radicati report stating that “vendors don’t become Top Players overnight…they must fight complacency and continue to innovate.” Juraj Malcho, ESET’s chief technology officer, commented, “We are thrilled to be recognized as a Top Player in Radicati’s 2021 APT Protection Market Quadrant. Being ranked as a Top Player for a second year in a row reflects ESET’s continued drive to innovate and provide a holistic product portfolio to cover even the most advanced persistent threat scenarios. The past year has only reinforced how crucial IT security is for businesses of all shapes and sizes, and we pride ourselves on our real-world-tested solutions, and on our commitment to creating a safer world for all users of technology.” To read more about the 2021 Radicati Market Quadrant: Advanced Persistent Threats Protection, please click here, and to read about ESET’s expansive product portfolio.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

內外防護兼具,X-FORT的監控防護建議

內部威脅爆發,可能造成的危害比外部攻擊帶來的損害還要大。傳統的資訊外洩防護方案,可在資料儲存、使用、傳遞等三方面提供保護。如果存取的資料都可以保留在這些端點、邊境防火牆範圍內,以往這也許是足夠的。但是,安全防護的邊界越來越不明顯,而且一旦使用超出邊界範圍,它的資訊安全政策就無法被落實。這意味著,現在的工作及供應商的合作方式,不再有明顯的界線可以分出信任區域。

 

User Activity monitoring使用者活動控制與監視

X-FORT提供用戶追蹤端作業系統、使用者操作活動記錄,違反安全規定時予以阻擋控制。

使用者活動日誌

  • 軟體執行記錄:記錄使用者執行軟體,或執行軟體視窗標題名稱變動。
  • 網頁瀏覽記錄:使用瀏覽器IE, Chrome, FireFox, Edge時視窗標題變動,記錄視窗標題與網址。
  • 檔案操作記錄:記錄透過檔案總管對檔案的操作細節,範圍包含本機檔案系統的建立、刪除、更名、移動、複製;存取網路芳鄰、外接式儲存裝置、 MTP裝置等。

作業系統相關記錄

  • 作業系統活動記錄包含系統檔案名稱異動,記錄更名前後的相關資訊,系統檔案被刪除的事件記錄與備份被刪除的檔案。

帳號管理

  • 管理用戶端的本機帳號,可新增、修改、刪除本機帳號,可啟用或停用本機帳號。

 

本機裝置控管(Host Device Control and Monitor)

  • 控制本機所有連接裝置的使用
  • 管理信任儲存裝置
  • 管理儲存裝置存取方式,包含外接儲存裝置、燒錄器
  • 控制列印裝置及列印行為,包含禁止列印、強制浮水印、暫時開放印表機;記錄及備份列印內容,備份列印檔案。

 

網路控管(Network Control and Monitor)

記錄與控制用戶端網路存取活動,包括共用資料夾控管、應用程式、網路連線、網站存取、檔案傳輸、電子郵件等。

 

應用程式控管(Application Control and Monitor)

用黑名單與白名單機制管理非授權的應用程式執行;以及保護資料夾被未經授權的程序存取。

軟體執行控管

  • 提供軟體禁用功能外,控制軟體使用時段控管軟體只能在規定的時段內被使用,其他時間禁止使用。
  • 被禁用的軟體,使用者無法自行安裝。使用者嘗試執行被禁止或非允許的軟體,留存記錄。

資料夾存取防護

  • 限制異動副檔名:限制資料夾中特定副檔名的檔案(如*.exe);該資料夾中新增、變更特定副檔名檔案。
  • 應用程式白名單:用戶端特定資料夾允許「信任程式」存取檔案,防止其他程式存取,或檔案加入。保護資料不被惡意程式存取或竄改。
  • 例外處理名單:在限制異動副檔名清單及應用程式白名單中,設定排除控管的例外名單。

 

稽核與分析(Audit and Event investigation)

記錄與資料整合分析

  • 記錄查詢結果根據分權與管轄範圍,依登入的管理者身份,檢視管轄範圍內人員或電腦的記錄;不同管理者顯示不同結果。針對人員、日期等組合篩選條件,可指定欄位(如:記錄時間)順序排列,檢視多種類記錄或資料。

儀表板

  • 自行組合多個小工具(Widget)在同一頁面,一次查看各種相關結果,即時掌握資安狀況。
  • 管理者登入系統主頁,依管理角色的管轄範圍篩選結果,呈現特定儀表板。

 

端點事件偵測與反應(Endpoint Incident Detect and Response (EDR))

  • 監視及偵測違規行為,主動反應控制風險。
  • 用戶端自動反應包含螢幕浮水印、警示、限制網路傳輸、禁用隨身碟、禁用印表機等;管理者處置包含強制關機、遠端命令等。
  • 記錄各種違規事件、反應動作與處置方式。

 

主動適應安全政策(Adaptive Policy )

解決靜態規則無法適當應對變動的環境,主動適應政策根據不同環境條件提前,建立不同對應行動計畫,可簡化團隊管理複雜度,並減低對使用者工作的干擾。安全政策依下列類型自動調整

  • Role based(使用者): 依登入使用者身分生效,在其他裝置上登入也具備相同政策。
  • Location based(地理位置): 所在地理區因基礎建設完善度不一,可能安全性不足等顧慮。
  • Host based(電腦政策):固定政策,不受登入使用者身分影響。
  • Site Based (跨廠區工作):受工作區管轄,配合當地的安全管理政策。
  • Telework(遠距工作):以公司裝置利用VPN 存取公司的服務、以自用裝置RDP 連入公司裝置、以公司裝置RDP 到另一台公司裝置。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於精品科技
精品科技(FineArt Technology) 成立於1989年,由交大實驗室中,一群志同道合的學長學弟所組合而成的團隊,為一家專業的軟體研發公司。從國內第一套中文桌上排版系統開始,到投入手寫辨識領域,憑藉著程式最小、速度最快、辨識最準等優異特性,獲得許多國際大廠的合作與肯定。歷經二十個寒暑,精品科技所推出的產品,無不廣受客戶好評。

A new business offering for a new business world

As the coronavirus pandemic has changed the world around us, organizations have had to adapt to a new, remote way of working, and in response, many have shifted to focus on cloud-first strategies. To streamline this transition, ESET is launching ESET PROTECT, which provides a single pane of glass to gain centralized visibility, management, and insight across the security of your endpoints. The ESET PROTECT platform is available either in the cloud to accommodate businesses looking for affordable and easy deployment, or on-premises for increased control.

Recognizing the move away from standard software and traditional forms of licensing, ESET PROTECT empowers users with the flexibility of a subscription-based service. As an organization grows and changes, so too do its security needs – and with a wide range of subscription bundles, ESET can protect your business throughout its entire journey.

Save, save, save As some businesses find their budgets increasingly squeezed in the face of renewed lockdown restrictions, optimizing the use of your money is even more necessary. It may be tempting to leave security aside but moving to the cloud can provide the much-needed savings on cost.

ESET PROTECT Cloud, for example, takes away the typical cost of server provisioning required for on-premises solutions. Instead, imagine getting rid of hardware – physical servers, backup servers, failover clusters – and not worrying about software updates – server software updates, software component updates, console updates – because that’s all handled by ESET.

Continue to imagine that your business doesn’t need a team of IT administrators to set up and maintain your servers, databases, software and other on-premises infrastructure. Applications that are known to have common vulnerabilities, and which require diligent patching, are no longer your problem.

As a simple, cloud-based subscription, ESET PROTECT Cloud needs just one IT administrator sitting at the console to quickly deploy an entire suite of advanced security solutions that can protect your business from attack.

Seamless, convenient, flexible Aside from financial benefits, ESET PROTECT offers a wealth of other benefits. With an easy and quick setup process, admins can log in the console and start protecting machines in a matter of minutes. ESET PROTECT’s live installers and wide range of deployment methods enable organizations to install endpoint protection seamlessly across all devices in even the largest corporate network.

Adjusting to each customer’s individual needs, the solution is scalable, allowing businesses to enlarge or reduce the coverage according to the size of their workforce, whether this is in-house or remote. Convenient, customizable reports allow IT admins to communicate effectively and can be adapted to fit the dynamically changing needs of large or small organizations. All this is achieved without the need for specialized IT personnel, extensive training, or additional hardware – and ESET specialists are on hand to provide additional support whenever necessary.

Everything you need in the same place Not all businesses are the same, and ESET is offering a selection of business subscriptions that ensure businesses of all sizes are equipped with the right solutions.

Figure 1: ESET business subscriptions

ESET’s business subscriptions all include an endpoint management console – either cloud-based or on-premises – along with endpoint protection by default. ESET PROTECT Mail Plus covers the needs of organizations looking for an advanced mail security solution.

Providing endpoint protection against ransomware and zero-day threats, alongside data protection via full disk encryption, the ESET PROTECT Advanced subscription is perfect for SMBs and MSPs. The solution is designed to detect suspicious encryption-like activity commonly employed by ransomware and can run machine learning analyses on high performance machines in the cloud to more quickly discover novel malicious software aiming to evade detection by endpoint security products.

For large organizations, the ESET PROTECT Enterprise option provides comprehensive visibility right down to the techniques commonly used by advanced persistent threat groups. This is because the subscription offers a highly sophisticated endpoint detection and response solution with rule-based detection, threat hunting and remediation capabilities. By subscribing to ESET PROTECT Enterprise, enterprise customers get all the benefits of ESET PROTECT Advanced plus endpoint detection and response.

For more information on ESET PROTECT, and other security offerings from ESET, visit our website here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×