<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/james-saturnio/rss" /><link>https://www.ivanti.com/blog/authors/james-saturnio</link><item><guid isPermaLink="false">62ad4ccd-ad37-44dc-9105-0afe7f5beaa7</guid><link>https://www.ivanti.com/blog/three-reasons-endpoint-security-can-t-stop-with-just-patching-or-antivirus</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Three Reasons Endpoint Security Can’t Stop With Just Patching</title><description>&lt;p&gt;With remote work now commonplace, having a good &lt;a href="https://www.ivanti.com/blog/cyber-hygiene-definition-and-best-practices"&gt;cyber hygiene&lt;/a&gt; program is crucial for organizations who want to survive in today’s&amp;nbsp;threat&amp;nbsp;landscape. This includes promoting a culture of individual cybersecurity awareness and deploying the right security tools, which are both critical to the program’s success.&amp;nbsp;&lt;br&gt;
&lt;br&gt;
Some of these tools include endpoint patching, endpoint detection and response (EDR) solutions and antivirus software. But considering recent cybersecurity reports,&amp;nbsp;they're&amp;nbsp;no longer enough to &lt;a href="https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface"&gt;reduce your organization’s attack surface&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Here are three solid&amp;nbsp;reasons,&amp;nbsp;and real-world situations, that happened to organizations that&amp;nbsp;didn't&amp;nbsp;take this threat seriously.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;a href="#one"&gt;AI generated polymorphic exploits can bypass leading security tools&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Patching failures and patching fatigue are stifling security teams&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Endpoint patching only works for known devices and apps&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2 id="one"&gt;1. AI generated polymorphic exploits can bypass leading security tools&lt;/h2&gt;

&lt;p&gt;Recently,&amp;nbsp;AI-generated&amp;nbsp;polymorphic malware has been developed to bypass EDR and antivirus, leaving security teams with blind spots into threats and vulnerabilities.&lt;/p&gt;

&lt;h3&gt;Real-world example: ChatGPT Polymorphic Malware Evades “Leading” EDR and Antivirus Solutions&lt;/h3&gt;

&lt;p&gt;In one report, researchers created&amp;nbsp;&lt;a href="https://www.hackread.com" rel="noopener" target="_blank"&gt;polymorphic malware by abusing ChatGPT&lt;/a&gt; prompts&amp;nbsp;that&amp;nbsp;evaded&amp;nbsp;detection by antivirus software. In a similar report, researchers created a&amp;nbsp;&lt;a href="https://www.darkreading.com/endpoint-security/ai-blackmamba-keylogging-edr-security" rel="noopener" target="_blank"&gt;polymorphic keylogging malware that bypassed an industry-leading&amp;nbsp;automated EDR solution&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;These exploits achieved this by mutating its code slightly with every iteration and encrypting its malicious code without a command-and-control (C2) communications channel.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This mutation is not detectable by traditional signature-based and low-level heuristics detection engines. This means that security time gaps are created for a patch to be developed and released, for the patch to be tested for effectiveness, for the security team to prioritize vulnerabilities and&amp;nbsp;for the IT (Information Technology) team to rollout the patches onto affected systems.&lt;/p&gt;

&lt;p&gt;In all, this could mean several weeks or months where an organization will need to rely on other security tools to help them protect critical assets until the patching process is completed successfully.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;

&lt;h2 id="two"&gt;2. Patching failures and patching fatigue are stifling security teams&lt;/h2&gt;

&lt;p&gt;Unfortunately, updates&amp;nbsp;breaking&amp;nbsp;systems because patches&amp;nbsp;haven't&amp;nbsp;been rigorously tested occur frequently. Also, some updates&amp;nbsp;don't&amp;nbsp;completely fix all weaknesses, leaving systems vulnerable to more attacks and requiring additional patches to completely fix.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Real-world example: Suffolk County’s ransomware attack&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://therecord.media/suffolk-county-new-york-ransomware-investigation" rel="noopener" target="_blank"&gt;The Suffolk County government in New York&lt;/a&gt;&amp;nbsp;recently released their findings from the forensic investigation of the data breach and ransomware&amp;nbsp;attack,&amp;nbsp;where the Log4j vulnerability was the threat actor’s entry point to breach their systems. The attack started back in December&amp;nbsp;2021,&amp;nbsp;which was the same time&amp;nbsp;&lt;a href="https://logging.apache.org/log4j/2.x/security.html" rel="noopener" target="_blank"&gt;Apache released security patches&lt;/a&gt; for these vulnerabilities.&amp;nbsp;&lt;br&gt;
&lt;br&gt;
Even with updates available, patching never took&amp;nbsp;place,&amp;nbsp;resulting in 400 gigabytes of data being stolen including thousands of social security numbers and an initial ransom demand of $2.5 million.&lt;/p&gt;

&lt;p&gt;The ransom was never paid but the loss of personal data and employee productivity and subsequent investigation outweighed the cost of updated cyber hygiene appliances and tools and a final ransom demand of $500,000. The county is still trying to recover and restore all&amp;nbsp;their&amp;nbsp;systems today, having already spent $5.5 million.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Real world example: An errant Windows server update&amp;nbsp;caused me to work 24-hours straight&lt;/p&gt;

&lt;p&gt;From personal experience, I once worked 24 hours straight because one Patch Tuesday, a Microsoft Windows server update was automatically downloaded, installed which promptly broke authentication services between the IoT (Internet of Things) clients and the AAA (authentication, authorization and accounting) servers grinding production to a screeching halt.&lt;br&gt;
&lt;br&gt;
Our company’s internal customer reference network that was implemented by our largest customers deployed Microsoft servers for Active Directory Certificate Services (ADCS) and Network Policy Servers (NPS) used for 802.1x EAP-TLS authentication for our IoT network devices managed over the air.&lt;/p&gt;

&lt;p&gt;This happened a decade ago, but similar recurrences have also occurred over the next several years, including this&amp;nbsp;update from July 2017, where NPS authentication broke for wireless clients and&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/topic/kb5014986-authentication-failures-occur-after-the-may-10-2022-update-is-installed-on-domain-controllers-running-windows-server-2012-r2-367a686a-f976-4170-9fdb-919a069689bd" rel="noopener" target="_blank"&gt;was repeated in May of last year&lt;/a&gt;.&lt;br&gt;
&lt;br&gt;
At that time, an immediate fix for the errant patch&amp;nbsp;wasn't&amp;nbsp;available, so I spent the next 22 hours rebuilding the Microsoft servers for the company’s enterprise public key infrastructure (PKI) and AAA services to restore normal operations. The&amp;nbsp;saving grace&amp;nbsp;was we took the original root certificate authority offline, and the server&amp;nbsp;wasn't affected by the bad update.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, we ended up having to revoke all the identity certificates issued by the subordinate certificate authorities to thousands of devices including routers, switches, firewalls&amp;nbsp;and&amp;nbsp;access points and re-enroll them back into the AAA service with new identity certificates.&lt;/p&gt;

&lt;p&gt;Learning from this experience, we disabled automatic updates for all Windows servers and took more frequent backups of critical services and data.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;

&lt;h2 id="three"&gt;3. Endpoint patching only works for known devices and apps&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;With the pandemic came the shift to&amp;nbsp;&lt;a href="https://www.ivanti.com"&gt;Everywhere Work&lt;/a&gt;, where employees worked from&amp;nbsp;home,&amp;nbsp;often connecting their personal devices to their organization’s network. This left security teams with a blind spot to&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/products/security/what-is-shadow-it.html" rel="noopener" target="_blank"&gt;shadow IT&lt;/a&gt;. With shadow IT, assets go unmanaged, are potentially out-of-date and cause insecure personal devices and leaky applications.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The resurgence of bring your own device (BYOD) policies and the lack of company-sanctioned secure remote access quickly expanded the organization’s external attack surface, exposing other attack vectors for threat actors to exploit.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Real-world example:&amp;nbsp;LastPass'&amp;nbsp;recent breach&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;LastPass is&amp;nbsp;a very popular&amp;nbsp;password manager that stores your passwords in an online vault. It has more than&amp;nbsp;25 million users&amp;nbsp;and 100,000 businesses. Last year,&amp;nbsp;LastPass &lt;a href="https://blog.lastpass.com/2023/03/security-incident-update-recommended-actions/" rel="noopener" target="_blank"&gt;experienced a massive data breach involving two security incidents&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br&gt;
&lt;br&gt;
The second incident &lt;a href="https://thehackernews.com/2023/03/lastpass-hack-engineers-failure-to.html" rel="noopener" target="_blank"&gt;leveraged data stolen during the first breach&lt;/a&gt;&amp;nbsp;to target four DevOps engineers, specifically, their home computers. One senior software developer used their personal Windows desktop to access the corporate development sandbox. The desktop also had an unpatched version of Plex Media Server (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2020-5741" rel="noopener" target="_blank"&gt;CVE-2020-5741&lt;/a&gt;) installed.&lt;/p&gt;

&lt;p&gt;Plex provided a patch for this vulnerability three years ago. Threat actors used this vulnerability to deliver malware, perform privilege escalation (PE), then a remote code execution (RCE) to access LastPass cloud-based storage and steal DevOps secrets and multi-factor (MFA) and Federation databases.&lt;br&gt;
&lt;br&gt;
"Unfortunately, the LastPass employee never upgraded their software to activate the patch," Plex said in a statement. "For reference, the version that addressed this exploit was roughly 75 versions ago."&lt;/p&gt;

&lt;h2 id="four"&gt;If patching isn’t enough, how can organizations reduce their external attack surface?&lt;/h2&gt;

&lt;h3&gt;Cyber hygiene&lt;/h3&gt;

&lt;p&gt;Employees are the weakest link to an organization’s &lt;a href="https://www.ivanti.com/blog/cyber-hygiene-definition-and-best-practices"&gt;cyber hygiene&lt;/a&gt; program. Inevitably,&amp;nbsp;they'll&amp;nbsp;forget to update their personal devices, re-use the same weak password to different internet websites, install leaky applications, and click or tap on phishing links contained within an email, attachment, or text message.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Combat this by promoting a company culture of cybersecurity awareness and practice vigilance that includes:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Ensuring the latest software updates are installed on their personal and corporate devices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Recognizing social engineering attack techniques including the several types of phishing attacks.&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Using multi-factor authentication whenever possible.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Installing and automatically updating the databases on antivirus software for desktops and mobile threat defense for mobile devices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Continuing education is key to promoting great cyber hygiene within your organization, especially for&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/phishing-in-the-everywhere-workplace"&gt;anti-phishing&lt;/a&gt; campaigns. &amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Cyber hygiene tool recommendations&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;In&amp;nbsp;cybersecurity, the saying goes, “You can’t protect what you can’t see.” Having&amp;nbsp;a complete&amp;nbsp;discovery and accurate inventory of all network-connected hardware, software&amp;nbsp;and&amp;nbsp;data,&amp;nbsp;including shadow IT assets, is the important first step to assessing an organization’s vulnerability risk profile. The asset data should feed into an enterprise&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;endpoint patch management&amp;nbsp;system&lt;/a&gt;.&amp;nbsp;&lt;br&gt;
&lt;br&gt;
Also, consider implementing a&amp;nbsp;&lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;risk-based vulnerability management&lt;/a&gt;&amp;nbsp;approach to&amp;nbsp;prioritize&amp;nbsp;the overwhelming number of vulnerabilities to only those that pose the greatest risk to your organization.&amp;nbsp;Often included with risk-based vulnerability management solutions is a&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-vulnerability-knowledge-base"&gt;threat intelligence&lt;/a&gt;&amp;nbsp;feed into the &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;patch management system&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Threat intelligence is information about known or potential threats to an organization. These threats can come from a variety of sources, like security researchers, government agencies, infrastructure vulnerability and application security scanners, internal and external penetration testing results and even threat actors themselves.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This information, including specific patch failures and reliability reported from various crowdsourced feeds, can help organizations remove internal patch testing requirements and reduce the time gap to patch deployments to critical assets.&lt;br&gt;
&lt;br&gt;
A&amp;nbsp;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management/unified-endpoint-management"&gt;unified endpoint management&lt;/a&gt;&amp;nbsp;(UEM) platform is necessary to remotely manage and provide endpoint security to mobile devices including shadow IT and BYOD assets.&lt;/p&gt;

&lt;p&gt;The solution can enforce patching to the latest mobile operating system (OS) and applications, provision email and secure remote access profiles including identity credentials and multi-factor authentication (MFA) methods like biometrics, smart cards, security keys, certificate-based or token-based authentication.&lt;/p&gt;

&lt;p&gt;The UEM solution should also integrate an AI machine learning-based mobile threat defense (MTD) solution for mobile devices, while desktops require next-generation antivirus (NGAV) with robust heuristics to detect and remediate device, network, and app threats with real-time anti-phishing protection.&lt;br&gt;
&lt;br&gt;
And finally, to level the playing field against AI-generated malware,&amp;nbsp;cyber hygiene tools will have to evolve quickly by leveraging AI guidance to keep up with the more sophisticated polymorphic attacks that are on the horizon.&lt;/p&gt;

&lt;p&gt;Adding the solutions described above will help deter cyberattacks by putting impediments in front of threat actors to frustrate them and seek out easier targets to victimize.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Wed, 14 Jun 2023 20:56:25 Z</pubDate></item><item><guid isPermaLink="false">071677a5-c8b3-4305-afc1-1930aaea5c9f</guid><link>https://www.ivanti.com/blog/phishing-in-the-everywhere-workplace</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>How Ivanti Deters Malicious Threats in the Everywhere Workplace</title><description>&lt;p&gt;&lt;img alt="phishing text message example" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/08/ivanti-blog-phishing-text-message.png"&gt;&lt;/p&gt;

&lt;p&gt;Back in May of this year, Verizon published its 15th annual&amp;nbsp;&lt;a href="https://www.verizon.com/business/resources/reports/2022/dbir/2022-data-breach-investigations-report-dbir.pdf" rel="noopener" target="_blank"&gt;Data Breach Investigation Report (DBIR) for 2022&lt;/a&gt;&amp;nbsp;which states that 82% of breaches involved the human element, whether it is the user of stolen credentials, phishing, misuse, or an error, people are the biggest contributors to security incidents and breaches.&lt;/p&gt;

&lt;p&gt;The past several months has also resulted in numerous phishing attacks via corporate email and SMS text messages. One more notable attack was a very official looking email regarding my work performance and receiving a pay raise with innocuous-looking link to a malicious website.&lt;/p&gt;

&lt;p&gt;Other colleagues have reported receiving text messages from our company CEO, again with a link to a malicious site. It’s very easy to fall victim to this sophisticated social engineering traps especially on our mobile devices we continue to heavily use them while we work in the Everywhere Workplace.&lt;/p&gt;

&lt;p&gt;&lt;img alt="phishing email example" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/08/ivanti-blog-phishing-email-example.png"&gt;&lt;/p&gt;

&lt;p&gt;This short video just serves to remind the hybrid workforce that use their mobile devices for work that Ivanti has a &lt;a href="mobile-threat-defense"&gt; &lt;/a&gt;&lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Mobile Threat Defense&lt;/a&gt; solution that will block new and known malicious domains and websites!&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="727494622"&gt;&lt;/object&gt;&lt;/p&gt;
</description><pubDate>Tue, 23 Aug 2022 21:33:31 Z</pubDate></item><item><guid isPermaLink="false">00540185-1e50-4622-8454-8f84884b0818</guid><link>https://www.ivanti.com/blog/9-types-of-phishing-and-ransomware-attacks-and-how-to-identify-them</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>9 Types of Phishing and Ransomware Attacks—And How to Identify Them</title><description>&lt;p&gt;Cyberattacks have become more pervasive globally, evolving&amp;nbsp;quickly in sophistication and scale, and&amp;nbsp;are now&amp;nbsp;more lucrative&amp;nbsp;than ever&amp;nbsp;for cybercriminals.&amp;nbsp;&amp;nbsp;Not only has The Everywhere Workplace extended the cyber risk and threat landscape—especially for data&amp;nbsp;privacy and its protection—but a lot of Agile software developers, many of whom lack any&amp;nbsp;DevSecOps&amp;nbsp;process, are&amp;nbsp;publishing&amp;nbsp;untested or poorly tested software that can be&amp;nbsp;exploited&amp;nbsp;as zero-days by criminal gangs.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
The most common techniques used by cybercriminals have remained constant over the past several years, with phishing and ransomware continuing to occupy two of the top three spots.&amp;nbsp;According to the&amp;nbsp;&lt;a href="https://www.verizon.com/business/resources/reports/dbir/" rel="noopener" target="_blank"&gt;Verizon 2021 Data Breach Investigations&lt;/a&gt; Report, phishing held the top spot&amp;nbsp;as the data breach tactic&amp;nbsp;used most often,&amp;nbsp;jumping from 25% of all data breaches in 2020 to 36% in 2021.&amp;nbsp; Ransomware, on the other hand, was responsible for most data breaches caused by malware.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Worse&amp;nbsp;yet, these types of attacks continue to evolve and now include the use of machine learning artificial intelligence (AI), automation, chaining exploits against known and zero-day vulnerabilities, zero-click exploit kits developed by the NSO Group, fileless malware&amp;nbsp;and the adoption of the “as-a-service” business model. These evolutions help cybercriminals stay one step ahead of their targets.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What is phishing?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Phishing is a social engineering tactic&amp;nbsp;that uses deception to steal an end user’s credentials and other personal information. The most common phishing delivery tactics are email and attachments, text and multimedia messages, telephone&amp;nbsp;and malicious advertisement networks. These tools persuade the end user to tap onto a hyperlink to a specially crafted counterfeit site or&amp;nbsp;internet&amp;nbsp;domain. End users are easily coaxed into divulging their precious personal information because of attention-grabbing headlines&amp;nbsp;and&amp;nbsp;authentic-looking,&amp;nbsp;obfuscated&amp;nbsp;or shortened hyperlinks. And when the end user lands on&amp;nbsp;the site, a malicious exploit kit or keylogger can be unknowingly downloaded onto the device or desktop to steal personal information, including credentials or credit card numbers, which attackers&amp;nbsp;can&amp;nbsp;then use to compromise devices and steal more high-value information. Phishing continues to be the most common type of cybercrime today,&amp;nbsp;and&amp;nbsp;as remote and hybrid work&amp;nbsp;becomes&amp;nbsp;the norm,&amp;nbsp;companies and employees&amp;nbsp;have&amp;nbsp;become&amp;nbsp;more relaxed with their cybersecurity hygiene. It is human nature.&amp;nbsp;&lt;br&gt;
&amp;nbsp;&lt;br&gt;
Types of phishing techniques:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Phishing-as-a-service&lt;/strong&gt;&amp;nbsp;is a business model that packages&amp;nbsp;the most effective phishing tools and is sold as a commodity to anyone willing to pay.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Cloning&lt;/strong&gt;&amp;nbsp;duplicates legitimate-looking business emails and websites that deceive targets into clicking a hyperlink that is replaced with a link to&amp;nbsp;a&amp;nbsp;malicious site.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Deep fake&lt;/strong&gt;&amp;nbsp;employs&amp;nbsp;artificial intelligence (AI) to propagate deceptive information or influence end users by manipulating an individual’s spoken&amp;nbsp;words,&amp;nbsp;mannerisms&amp;nbsp;and expressions originally recorded as audio or video. &amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Emails&amp;nbsp;and attachments&lt;/strong&gt;&amp;nbsp;can be crafted that&amp;nbsp;look legitimate but trick an individual into clicking a hyperlink where they unknowingly&amp;nbsp;disclose&amp;nbsp;personal information or credentials. &amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Pharming&amp;nbsp;&lt;/strong&gt;employs&amp;nbsp;authentic-looking hyperlinks in phishing emails&amp;nbsp;that&amp;nbsp;redirect&amp;nbsp;end users from a specific, legitimate site to a malicious one by changing the Domain Name System (DNS) table in the host web server. &amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Smishing (SMS phishing)&amp;nbsp;&lt;/strong&gt;leverages text communication that uses link shorteners to conceal malicious links within a text message.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Spear&amp;nbsp;&lt;/strong&gt;phishing&amp;nbsp;usually targets administrative level individuals or groups by using a personalized pretext with the intent for greater success by stealing credentials that are granted greater permissions to access more sensitive company data.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Vishing or voice phishing&lt;/strong&gt;&amp;nbsp;uses&amp;nbsp;traditional telephone voice communication to trick&amp;nbsp;victims&amp;nbsp;into revealing sensitive information or sending money&amp;nbsp;to the cybercriminal. &amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Whaling&lt;/strong&gt;&amp;nbsp;deceives&amp;nbsp;C-suite executives&amp;nbsp;by&amp;nbsp;enticing them&amp;nbsp;to&amp;nbsp;click a hyperlink or attachment that installs an&amp;nbsp;exploit kit or malware&amp;nbsp;on their device&amp;nbsp;to steal sensitive company or personal information.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;What is ransomware?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ransomware&amp;nbsp;is malware whose sole purpose is to extort money from the end user. Once the end user’s credentials are known via phishing attack, cybercriminals can then grab&amp;nbsp;additional&amp;nbsp;valuable data on the user’s mobile device or laptop, then escape the device and move laterally onto connected networks in search of&amp;nbsp;additional&amp;nbsp;valuable data to steal. Cybercriminals can then block access to critical information often by encrypting the data, before sending out a ransom note and expecting payment in untraceable cryptocurrencies&amp;nbsp;like Bitcoin or Monero. If the data is extremely sensitive, ransomware gangs can “double extort” their victims by threatening to reveal the information to the public unless an&amp;nbsp;additional&amp;nbsp;ransom is paid.&amp;nbsp;&amp;nbsp;&lt;br&gt;
&amp;nbsp;&lt;br&gt;
Ransomware is also proliferated using trojans, spam email with malicious attachments, fake software update tools,&amp;nbsp;third-party software app stores&amp;nbsp;and distribution sources that push apps and tools that&amp;nbsp;contain&amp;nbsp;malware, spyware, or exploit kits.&amp;nbsp;&lt;br&gt;
&amp;nbsp;&lt;br&gt;
2021 was a record-setting year for data breaches and ransomware.&amp;nbsp;Successful high-profile ransomware attacks&amp;nbsp;were&amp;nbsp;executed&amp;nbsp;against&amp;nbsp;CNA Financial Corporation in March, Colonial Pipeline in late April, Acer computer manufacturing in May,&amp;nbsp;and, also in May,&amp;nbsp;one of the largest meat packing companies, JBS Foods. Another was Kaseya VSA (Virtual System Administrator) in July, although no ransom was ever paid as the&amp;nbsp;FBI (Federal Bureau of Investigation)&amp;nbsp;was able to obtain the decryption keys from the servers of the ransomware gang to restore the IT (information&amp;nbsp;technology) infrastructure of its clients.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Combating phishing and ransomware&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Cybercriminal gangs have&amp;nbsp;become more sophisticated and well-funded with a&amp;nbsp;potent&amp;nbsp;set of attack tools and tactics at their disposal.&amp;nbsp;&amp;nbsp;It&amp;nbsp;feels like a constant perfect storm keeps hitting the internet, and some organizations believe that a life preserver is sufficient to withstand this Category 5&amp;nbsp;hurricane.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In the Everywhere Workplace, to have a fighting chance to&amp;nbsp;protect&amp;nbsp;your&amp;nbsp;precious&amp;nbsp;data,&amp;nbsp;it&amp;nbsp;is imperative to place as many robust impediments as possible in the path of these cybercriminals.&amp;nbsp;Ivanti &lt;a href="https://www.ivanti.com/"&gt;develops&amp;nbsp;cybersecurity&amp;nbsp;solutions to&amp;nbsp;discover, manage, and secure&amp;nbsp;your data&lt;/a&gt;&amp;nbsp;found in mobile devices, desktops, servers, applications, networks&amp;nbsp;and cloud stores&amp;nbsp;and protect it&amp;nbsp;from being compromised.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Learn more&lt;/h2&gt;

&lt;p&gt;Discover best practices for defending against phishing.&amp;nbsp; &lt;a href="https://www.ivanti.com/webinars/2021/webinar-series-part-one-a-multi-layered-approach-to-anti-phishing"&gt;Watch the on-demand webinar: A Multi-Layered Approach to Anti-Phishing&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Wed, 19 Jan 2022 18:54:07 Z</pubDate></item><item><guid isPermaLink="false">851a7b30-d0d6-4bde-8248-550e3387a6fc</guid><link>https://www.ivanti.com/blog/my-new-year-s-resolution-going-passwordless</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>My New Year’s Resolution: Going Passwordless!</title><description>&lt;p&gt;What is your New Year’s resolution for 2022? Well, it &lt;em&gt;is&lt;/em&gt; that time of year again! My resolutions are not necessarily new, but a continuation of several that I have made in prior years. Eat healthier foods, lose weight, and save money are the ones that immediately come to mind. Another best practice that I started several years ago was to adopt a passwordless authentication initiative for all my internet connected personal devices. Fortunately for me, my company began enforcing zero sign-on authentication along with deploying a multi-layered anti-phishing protection system several years back. Additionally, we made the transition to using stronger authentication factors like inherence – specifically biometrics – and possession, which was a lot easier than I anticipated.&lt;/p&gt;

&lt;p&gt;Eliminating passwords just makes too much sense as it raises your company’s Zero Trust security maturity level by removing the most common root cause of data breaches. This is more important than ever as 2021 has been a record-setting year for data breaches, and according to the &lt;a href="https://www.verizon.com/business/resources/reports/dbir/" rel="noopener" target="_blank"&gt;Verizon 2021 Data Breach Investigation Report (DBIR)&lt;/a&gt;, cybercriminals specifically sought out credentials as the most common data type in 61% of all breaches because it is the gift that keeps on giving. Also, with the resurgence of the Pegasus spyware that now exploits zero-day vulnerabilities in common apps like iMessage, FaceTime, Safari, WhatsApp, and others, stolen data – specifically credentials – allow attackers to gain a foothold onto a compromised device without the end user knowing. This privileged data can then be used for lateral movement onto the corporate network, data center, and cloud systems in search of other high value assets, resulting in a ransomware or an advanced persistent threat (APT) attack.&lt;/p&gt;

&lt;p&gt;How can Ivanti help?&amp;nbsp;&lt;a href="https://www.ivanti.com/products/passwordless-authentication" target="_blank"&gt;Ivanti’s Zero Sign-On (ZSO)&lt;/a&gt; can be added onto your company’s passwordless authentication solution at any time. Contextual conditional access policies can be implemented to grant or deny access not only based on a trusted user, but also the trusted device, app, network (location), and time. For remote desktops, &lt;a href="https://FIDO2 (Fast IDentity Online 2)" rel="noopener" target="_blank"&gt;ZSO’s FIDO2 (Fast IDentity Online 2)&lt;/a&gt; solution can be enabled by using your iOS, iPadOS, or Android mobile device as an analog for &amp;nbsp;the security key to securely access your Windows or Mac laptop, and then seamlessly access your Microsoft 365, Google Workspace, Salesforce, and other cloud-based work resources in a single sign-on (SSO) deployment within the Everywhere Workplace.&lt;/p&gt;

&lt;p&gt;&lt;img alt="salesforce sign in using security key or biometric" src="https://static.ivanti.com/sites/marketing/media/images/blog/ny-resolution-fig.1.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;FIDO2 is the most secure passwordless identity authenticator option available, especially if it is used in a multi-factor authentication (MFA) system to securely access your digital work resources and services. FIDO2 leverages the stronger authentication factors, with biometrics as the inherence factor and your mobile device as the possession factor. Newer ZSO features that are being released in January 2022 include Bluetooth Low Energy (BLE) desktop login to Windows and Mac laptops offline without an internet connection (see Figure 1), and support for FIDO2 compliant security keys from &lt;a href="https://www.yubico.com/products/?utm_source=bing&amp;amp;utm_medium=pd:search&amp;amp;utm_campaign=US_B2C_LeadGen_Bing_SEM_Brand&amp;amp;utm_content=&amp;amp;msclkid=98f3f4affd5914eb0f7d95649a477452" rel="noopener" target="_blank"&gt;Yubico&lt;/a&gt; and &lt;a href="https://gotrustid.com/" rel="noopener" target="_blank"&gt;GoTrust&lt;/a&gt; to access your desktop as well as cloud apps (see Figure 2). &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br&gt;
&lt;img alt="mobileiron go authentication" src="https://static.ivanti.com/sites/marketing/media/images/blog/ny-resolution-fig2.jpg"&gt;&lt;br&gt;
So, why is FIDO2 the most secure option available? The most notable is that a password or PIN (personal identification number) is no longer required with FIDO2, which adds more security. Also, the cryptographic (public key) credentials used to log in to websites and online services across the internet with FIDO2 are unique. This ensures your online privacy and adds confidentiality to your session. Your personal information remains on your mobile device and is never transmitted over the internet or stored on a server. This immediately eliminates the threat of phishing and credential theft. Additionally, your built-in biometric scanner within your mobile device, using either your fingerprint or face to validate your identity, is frictionless and very convenient.&lt;/p&gt;

&lt;p&gt;FIDO2 is a component of the &lt;a href="https://forums.ivanti.com/s/mobileiron-access?language=en_US" target="_blank"&gt;Ivanti Access &lt;/a&gt;platform which requires &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;Neurons for Mobile Device Management&lt;/a&gt; and Zero Sign-On (ZSO). Ivanti recommends a defense in depth zero trust security strategy to combat today’s sophisticated threats with additional solutions that include &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-unified-endpoint-management"&gt;Neurons for Unified Endpoint Management (UEM) &lt;/a&gt;and &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Mobile Threat Defense (MTD).&lt;/a&gt; MTD provides multiple layers of protection against device-, network-, app-level and phishing attacks. &lt;a href="https://www.ivanti.com/products/secure-access-management"&gt;Neurons for Secure Access (nSA)&lt;/a&gt; and &lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;Neurons for Zero-Trust Access (nZTA)&lt;/a&gt;&amp;nbsp;add the next-generation software-defined perimeter (SDP) secure remote access solution, and &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Neurons for Patch Intelligence&lt;/a&gt; that now adds the RiskSense risk-based vulnerability management (RBVM)&lt;br&gt;
solution to the security patching process.&lt;/p&gt;

&lt;p&gt;With credential theft so rampant on the Internet and the invasive Pegasus spyware out in the wild today, it’s no wonder that exploits like ransomware are growing dramatically. The solution is to place as many impediments as possible in front of malicious cybercriminals, increasing the chance that they will give up and seek out other targets which lack the proper security controls. Ivanti provides the robust toolset to help thwart today’s sophisticated cybercriminals. Now that is a New Year’s resolution, we can all get behind and support!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Wed, 29 Dec 2021 19:34:08 Z</pubDate></item><item><guid isPermaLink="false">3d1e38f8-fb06-4309-bd0a-b8914304797b</guid><link>https://www.ivanti.com/blog/quick-demo-mobile-threat-defense-android-12-anti-phishing-protection</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Quick Demo: Android 12 Anti-Phishing Protection</title><description>&lt;p&gt;This month is Cybersecurity Awareness Month and at Ivanti we want you to be #BeCyberSmart. We’re focusing on this week’s theme of phishing. In this short video, James Saturnio, Senior Lead Technical Market Advisor at Ivanti, shows the power of&amp;nbsp;&lt;a href="https://www.ivanti.com/products/mobile-threat-defense" target="_blank"&gt;Ivanti’s Mobile Threat Defense&lt;/a&gt;&amp;nbsp;(MTD) multiple-layered anti-phishing protection to block 10 random phishing URLs from the OpenPhish feed. To learn more about Ivanti MTD&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/not-another-phishing-and-ransomware-blog" target="_blank"&gt;check out this blog post&lt;/a&gt;&amp;nbsp;to see how the Ivanti solution can defend against phishing and ransomware.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="631153776"&gt;&lt;/object&gt;&lt;/p&gt;
</description><pubDate>Wed, 13 Oct 2021 19:21:24 Z</pubDate></item><item><guid isPermaLink="false">8e694495-ae06-46b9-a4f0-6305ed15a9bb</guid><link>https://www.ivanti.com/blog/be-a-cyber-defender-and-protect-your-mobile-devices</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Be a Cyber Defender and Protect Your Mobile Devices!</title><description>&lt;p&gt;Like zero trust security, being a cyber defender is a personal mindset. One can argue that it might be a form of paranoia, but being situationally aware while connected online is a nice behavioral attribute to have given today’s internet climate with the barrage of news regarding ransomware and data breaches. Zero trust states never trust, always verify, act like the network you are connected to and your device are compromised by threat actors, and the applications and content installed on your device are vulnerable to sophisticated chained exploits.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Now, take a deep breath and let’s fight back against these cybercriminals! Follow the list below of cybersecurity hygiene best practices to protect all your mobile devices physically and virtually by applying multiple layers of protection. And a pro tip: &lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;Ivanti Neurons for MDM&lt;/a&gt;, formerly MobileIron Cloud, &lt;a href="https://www.ivanti.com/products/mobile-threat-defense" target="_blank"&gt;Ivanti Mobile Threat Defense&lt;/a&gt;, &lt;a href="https://www.ivanti.com/blog/quick-demo-ivanti-zero-sign-on" target="_blank"&gt;Ivanti Zero Sign-On&lt;/a&gt;, and &lt;a href="https://www.ivanti.com/products/connect-secure-vpn" target="_blank"&gt;Ivanti Connect Secure&lt;/a&gt; can all be configured, deployed over-the-air, and enforce policies to ensure these security controls are enabled on your mobile devices.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Turn on your mobile device’s screen lock with biometric authentication such as iOS’ Face ID or Android’s fingerprint or Face Unlock, or Samsung’s Iris unlock. This is the first impediment for a threat actor to attempt to bypass if your mobile device is lost or stolen. controls are enabled and remain enabled on managed mobile devices.&lt;/li&gt;
	&lt;li&gt;Enable file-based encryption. This is automatically enabled as soon as you create a strong passcode that is used as the entropy source to start the data protection process for file-based encryption. This is the second impediment for a threat actor to solve.&lt;/li&gt;
	&lt;li&gt;Never share your credentials with anyone and enable multi-factor authentication (MFA) for your online accounts and remote access services such as Virtual Private Networks (VPN). Use stronger factors, which use inherence (biometrics), possession, and context (location and time-of-day), not knowledge factors which use passwords or PINs.&lt;/li&gt;
	&lt;li&gt;Refrain from connecting to unsecured Wi-Fi networks. If you must connect to Wi-Fi networks in public spaces, such as the airport or hotel, turn on an always-on VPN.&lt;/li&gt;
	&lt;li&gt;Regularly update your mobile operating system and applications.&lt;/li&gt;
	&lt;li&gt;Install mobile threat defense (MTD) onto all your mobile devices, preferably one that has advanced detection and protection capabilities at the device, app, and network levels including anti-phishing protection for email, attachments, and text messages, like Ivanti Mobile Threat Defense.&lt;/li&gt;
	&lt;li&gt;Only download applications from the iOS App Store or Google Play Store. If your company employs a unified endpoint management (UEM) platform, the IT administrator can deploy the company’s enterprise app store or silently install work applications onto the managed device. If the device is lost or stolen, the UEM can remotely lock, retire, or wipe the managed device to further safeguard your data.&lt;/li&gt;
	&lt;li&gt;Do not jailbreak or root your mobile devices. This removes the native device protections and can install malicious exploits to take control over your device.&lt;/li&gt;
	&lt;li&gt;Backup important data onto your desktop or upload to your trusted cloud storage service.&lt;/li&gt;
	&lt;li&gt;With the ongoing pandemic and the resurgence of the COVID virus, most of us spend our time at home. I employ a home firewall with an intrusion prevention system turned on in front of my wireless router from the internet. There are free open-source firewalls that you can install and run on an older PC with easy-to-follow instructions online.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Apply the same common sense and multiple layered security strategy that you use to safeguard your wallet and personal valuables from thieves to your mobile devices. Take it a step further by implementing the aggressive countermeasures above for protecting all your mobile devices—not so much for the cost of replacement for the device itself, but for all the sensitive data and irreplaceable content that it contains. The additional benefit may include keeping your sanity intact!&lt;/p&gt;

&lt;p&gt;Interested in reading more about mobile device security? &lt;a href="https://www.ivanti.com/blog/authors/james-saturnio" target="_blank"&gt;Check out my other blog posts&lt;/a&gt; to learn how to defend against ransomware, phishing and more!&lt;/p&gt;
</description><pubDate>Tue, 12 Oct 2021 18:37:03 Z</pubDate></item><item><guid isPermaLink="false">96a42bd4-e7e2-470a-b961-8980bdc5248f</guid><link>https://www.ivanti.com/blog/fighting-ransomware-using-ivanti-s-platform-to-build-a-resilient-zero-trust-security-defense-part-2</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense – Part 2</title><description>&lt;p&gt;&lt;em&gt;Within the &lt;/em&gt;&lt;a href="https://www.ivanti.com/blog/fighting-ransomware-using-ivanti-s-platform-to-build-a-resilient-zero-trust-security-defense"&gt;initial blog in this series&lt;/a&gt;&lt;em&gt;, we discussed ransomware attacks and their remediation on Android mobile devices. Part 2 addresses potential ransomware exploits and their remediation on iOS, iPadOS mobile devices and macOS desktops.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;iOS and iPadOS Exploits&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;The quickest method to check for the presence of malware on your iPhone, iPad or macOS devices is to look for the presence of an unknown configuration profile within the Settings &amp;gt; General &amp;gt; VPN &amp;amp; Device Management settings. Malicious third-party apps commonly sideloaded from non-sanctioned internet websites, or from an infected personal computer, or downloaded from package managers like Cydia or Sileo along with unofficial app stores like TweakDoor (formerly TweakBox) or TutuApp, will add their own configuration profile into the Device Management settings. Package managers, commonly installed after performing a jailbreak of your iOS or iPadOS device, and unofficial app stores that do not require a jailbreak, are repositories for alternative apps, tweaks, and software tools to customize your Apple iDevice. Often these third-party apps have not been rigorously tested for vulnerabilities and can contain malware and malicious exploits that can then take complete control of your device without you knowing.&lt;/p&gt;

&lt;p&gt;Apple’s mobile device management (MDM) enables your company’s IT department to remotely enroll and deploy corporate and personally owned iOS, iPadOS or macOS devices over-the-air using a unified endpoint management (UEM) platform like &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-unified-endpoint-management"&gt;Ivanti Neurons for UEM&lt;/a&gt; by deploying a root MDM profile within the same Device Management settings. UEM then fully manages, distributes applications and content, and enforces restrictions and security configurations to these managed devices.&lt;/p&gt;

&lt;p&gt;A configuration profile can contain many payloads that store key value pair settings for MDM, with a partial list below. &lt;a href="https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf" target="_blank" rel="noopener"&gt;The link to the full itemized list is located here&lt;/a&gt;. The good news is as of iOS version 12.2 and later, the profile must be manually installed and then trusted by the user as additional security steps to explicitly approve its installation within the Device Management settings. The partial list includes:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Restrictions on device features&lt;/li&gt;
	&lt;li&gt;Credentials like identity and chain of trust certificates, secrets, and keys&lt;/li&gt;
	&lt;li&gt;Wi-Fi profiles&lt;/li&gt;
	&lt;li&gt;VPN profiles&lt;/li&gt;
	&lt;li&gt;Email server and Exchange settings&lt;/li&gt;
	&lt;li&gt;LDAP directory service settings&lt;/li&gt;
	&lt;li&gt;CalDAV calendar service settings&lt;/li&gt;
	&lt;li&gt;Web clips.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The other good news is these suspicious or untrusted configuration profiles, malware, and other malicious exploits including the Pegasus spyware will be detected by &lt;a href="https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=2ahUKEwiRtpOiqvDyAhXZJTQIHQu6BmgQFnoECAQQAQ&amp;amp;url=https%3A%2F%2Fwww.ivanti.com%2Fproducts%2Fmobile-threat-defense&amp;amp;usg=AOvVaw010ZCcqNd5gC-hYC2HQgLH" target="_blank" rel="noopener"&gt;Ivanti Mobile Threat Defense (MTD)&lt;/a&gt; and trigger compliance actions like block access to corporate resources or quarantine actions on the device. Ironically, another indication of the presence of a threat on your mobile device is as part of a quarantine compliance action, UEM provisioned managed apps and their content are removed from an iOS or iPadOS device to prevent data loss. After the threats are removed, the managed apps are restored to allow the user to continue to be productive. (See video below that demonstrates this capability.)&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="601397097"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;macOS Exploits&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Apple macOS desktop devices are also not immune from malicious exploits as evidenced by the list of high severity arbitrary and remote code execution vulnerabilities within the &lt;a href="https://www.cvedetails.com/vulnerability-list/vendor_id-49/product_id-156/Apple-Mac-Os-X.html" target="_blank" rel="noopener"&gt;Common Vulnerabilities and Exposures&lt;/a&gt; details database. Fortunately, &lt;a href="https://support.apple.com/en-us/HT201222" target="_blank" rel="noopener"&gt;security updates&lt;/a&gt; exist for these known and former zero-day vulnerabilities.&lt;img alt="screenshot of a ransomeware attack" src="https://static.ivanti.com/sites/marketing/media/images/blog/ios_ipados_exploits1.png"&gt;&lt;/p&gt;

&lt;p&gt;More recently, a new variant of the AdLoad malware has been detected out in the wild and been able to evade Apple’s built-in malware XProtect scanner. Adload is a&amp;nbsp;&lt;a href="https://heimdalsecurity.com/glossary#trojan-horse" target="_blank" rel="noopener"&gt;trojan&lt;/a&gt;, specifically targeting macOS platforms and is currently used to push malicious payloads like adware, bundleware, and&amp;nbsp;&lt;a href="https://heimdalsecurity.com/glossary#potentially-unwanted-application" target="_blank" rel="noopener"&gt;Potentially Unwanted Applications (PUAs)&lt;/a&gt;. It is capable of&amp;nbsp;harvesting system information&amp;nbsp;that can then be deployed to the infected remote web servers under the control of these malicious threat actors. Other macOS malware strains have been able to bypass XProtect as well and infect macOS devices with chained malicious payloads that exploited zero-day vulnerabilities to evade Apple’s File Quarantine, Gatekeeper, and Notarization security checks. Future versions of AdLoad can also evolve into dropping exploit kits that can harvest your personal information, perform lateral movement onto the network, and potentially ransomware.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;iCloud Exploits&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Back in June of 2014, an iCloud ransomware attack succeeded with victims in Australia, New Zealand, and the United States.&lt;/p&gt;

&lt;p&gt;On infected iOS, iPadOS devices and macOS laptops, their lock screens were overlaid with a demand for payment message to unlock them. How did the malicious threat actors pull this off? Personal user account information was harvested using sophisticated phishing tactics and brute-force password cracking techniques from vulnerable iCloud accounts.&lt;img alt="ios ipados exploit notification" src="https://static.ivanti.com/sites/marketing/media/images/blog/ios_ipados_exploit2.png"&gt;&lt;/p&gt;

&lt;p&gt;These threat actors used the Find My iPhone, Find My iPad, Find My Mac, or Find My iPod services within iCloud that allow the owner to try to locate their lost device from any web browser. If the lost device were still connected to the internet, the rightful owner could display a message on the screen instructing the person in possession of the device to contact them, remotely set a locking PIN (Personal Identification Number) or wipe the contents of the device.&lt;br&gt;
&lt;br&gt;
Once the threat actors obtained the victim’s iCloud account credentials, they remotely changed the PIN and locked the device from the rightful owner. They could then display a ransom message demanding the $100 payment to unlock the device.&lt;/p&gt;

&lt;p&gt;&lt;img alt="ios ipados exploit notification" src="https://static.ivanti.com/sites/marketing/media/images/blog/ios_ipados_exploit3.png"&gt;Other similar exploits include fake antivirus support pop-up messages that inform the user to call a telephone number to remove the malware. Victims would then be coerced to pay money to remove the malware from their devices or laptops. The simple solution was to restore from a Time Machine backup.&lt;/p&gt;

&lt;p&gt;The good news is &lt;a href="https://www.cvedetails.com/product/34308/Apple-Icloud.html?vendor_id=49" target="_blank" rel="noopener"&gt;iCloud exploits&lt;/a&gt; have decreased in severity and total count in recent years. Although, credential theft and ransomware attacks, some leveraging the same machine learning (ML) artificial intelligence tactics and techniques applied by reputable security researchers, are now used by nation-state backed advanced persistent threat (APT) actors to evade detection and cover their tracks after a successful data breach, have gone up dramatically in the Everywhere Workplace. According to the &lt;a href="https://www.verizon.com/business/resources/infographics/2021/2021-msi-executive-summary-infographic.pdf" target="_blank" rel="noopener"&gt;Verizon 2021 Mobile Security Index&lt;/a&gt;, there was an increase of 364% in phishing attempts in 2020 versus 2019. That is mind blowing! What will the outcome for 2021 reveal?&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Additional iOS, iPadOS and macOS Remediation&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;These settings are applicable within the iOS, iPadOS and macOS device:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Apple devices require a 6-digit, 4-digit, or random length alphanumeric passcode as the entropy source to initiate the Data Protection mechanism that leverages file-based encryption on iOS and iPadOS devices, and disk volume encryption for macOS desktops. The stronger the user passcode, the stronger the encryption key and lessening the likelihood of a successful brute force attack by malicious threat actors. Unified endpoint management platforms like Ivanti Neurons for UEM and &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense&lt;/a&gt; (MTD) can enforce strong and complex passcodes onto the managed device.&lt;/p&gt;

&lt;p&gt;Only download apps from the iOS or Mac App Stores.&lt;/p&gt;

&lt;p&gt;If your company employs a UEM platform and deploys an enterprise app store, download apps from the company app store only, as well.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;These settings are configured within Ivanti UEM Neurons for UEM or MobileIron Core:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Create a Software Updates configuration to automatically update to the latest available iOS, iPadOS or macOS version for the device.&amp;nbsp;For iOS and iPadOS only, Ivanti MTD can also enforce that the latest OS version is running on the device and if not, alert the user and UEM administrator that the device is running a vulnerable OS version and apply compliance actions like block or quarantine until the device is updated.&lt;/li&gt;
	&lt;li&gt;For macOS desktops, create a FileVault 2 configuration to enable volume-based encryption.&lt;/li&gt;
	&lt;li&gt;For iOS and iPadOS devices, enable Ivanti MTD on-device (using MTD Local Actions) and cloud-based to provide multiple layers of protection for phishing (Anti-phishing Protection) and device, network, and app level threats (using the Threat Response Matrix within the MTD management console).&lt;/li&gt;
	&lt;li&gt;For macOS desktops, augment the built-in malware scanner by also installing a reputable antivirus agent that updates its detection signatures and engine regularly.&lt;/li&gt;
	&lt;li&gt;For BYOD (Bring Your Own Device) deployments, create a deny list of disallowed apps on the device. For company-owned devices, create a allow list of allowed apps that can be installed on the device.&lt;/li&gt;
	&lt;li&gt;Backup data automatically onto a cloud storage provider like iCloud, Google Drive, OneDrive, Box or Dropbox. Make secondary and tertiary copies of backups using two or more of these personal storage providers since some offer free storage. Also, backup personal data onto a local hard drive that is encrypted, password-protected and disconnected from the device and network.&lt;/li&gt;
	&lt;li&gt;Create a Wi-Fi configuration that enables WPA3 Enterprise for your wireless connection when you are back in the office. At home, enable WPA3 Personal on your home router to secure your wireless connections from eavesdroppers.&lt;/li&gt;
	&lt;li&gt;Create a Web Content Filter configuration to limit access to adult content and specific websites prescribed by your company’s security and acceptable use policies. Ivanti UEM and MTD also provide a robust and multi-layered anti-phishing protection that updates the on-device engine’s database every 8 hours and is augmented by the cloud-based lookup engine’s database, which is updated every hour.&lt;/li&gt;
	&lt;li&gt;Create an Encrypted DNS (Domain Name System) configuration setting that enables DNS over HTTPS (DoH) or DNS over TLS (Transport Layer Security) (DoT) to encrypt and secure your DNS queries.&lt;/li&gt;
	&lt;li&gt;Configure a VPN client on a device like MobileIron Tunnel,&amp;nbsp;&lt;a href="https://www.ivanti.com/products/connect-secure-vpn"&gt;Ivanti Secure Connect&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;Zero Trust Access&lt;/a&gt;&amp;nbsp;to protect sensitive data-in-motion between the mobile device and MobileIron Sentry or Connect Secure or ZTA gateways.&lt;/li&gt;
	&lt;li&gt;Enable&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/quick-demo-ivanti-zero-sign-on"&gt;Ivanti Zero Sign-On&lt;/a&gt;&amp;nbsp;(ZSO) for conditional access rules like trusted user, trusted device, and trusted app authentication to critical work resources on-premises, at the data center, or up in the cloud. Also, enable MFA (Multi Factor Authentication) using the stronger inherence (biometrics) and possession (device-as-identity or security key) authentication factors. Passwords and PINs can be phished, guessed or brute forced.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;em&gt;In the third blog in this series, we will discuss ransomware attacks and remediation of Windows 10 laptops and desktops. Stay tuned.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 10 Sep 2021 01:24:36 Z</pubDate></item><item><guid isPermaLink="false">95c1b102-8c65-4a42-84b3-d8e60a885dc1</guid><link>https://www.ivanti.com/blog/securing-ios-and-ipados-14-s-hidden-app-code-scanner</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Securing iOS and iPadOS 14’s Hidden App: Code Scanner</title><description>&lt;p&gt;Did you know there is a hidden app in iOS and iPadOS 14? It’s called Code Scanner and yes, it is used specifically for scanning Quick Response (QR) codes. So why does Apple hide this app? The app is already integrated into the iOS and iPadOS Camera app which is why your iPhone or iPad’s camera can scan and decode QR codes. So why have a standalone app that is hidden? There is a slight difference between the two apps. Code Scanner can open links with a unique in-app browser, and it automatically closes when you are done. Using the Camera app to scan a QR code will automatically open Safari browser, where each scan will open more browser windows that can easily clutter your Safari or default browser app. The user must manually close each browser window afterward. Code Scanner does not do this.&lt;/p&gt;

&lt;p&gt;To find the Code Scanner app, go to the search menu by swiping right from the home screen. Search for “Code Scanner” and then simply tap on it to launch the app. So why am I writing a quick blog and recording a short video about this hidden app? Whether you use your Camera app or Code Scanner to scan QR codes, both are protected by &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense’s&lt;/a&gt; (MTD) multilayered mobile anti-phishing protection engines as demonstrated in the video below. QR codes can embed a malicious URL that redirects you to an infected website that can potentially download drive-by malware onto your device, unknowingly. MTD blocks you from landing onto the malicious website by preventing you from circumventing the blocking page.&lt;/p&gt;

&lt;p&gt;MTD can be enabled within &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-unified-endpoint-management"&gt;Ivanti Neurons for Unified Endpoint Management (UEM)&lt;/a&gt; platform that provides discovery and visibility to all your company’s endpoints. Also, Ivanti UEM manages all your mobile devices and laptops and provides self-healing and self-securing capabilities using hyper-automation. Finally, raise your company’s zero trust maturity model by also adding &lt;a href="https://www.ivanti.com/products/passwordless-authentication"&gt;Ivanti’s Zero Sign-On&lt;/a&gt; for passwordless authentication that enables the stronger inherence and possession factors in a multifactor authentication (MFA) system. ZSO also helps prevent phishing and credential theft by eliminating passwords altogether. Stay safe and secure out there!&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="589110279"&gt;&lt;/object&gt;&lt;/p&gt;
</description><pubDate>Thu, 19 Aug 2021 19:16:37 Z</pubDate></item><item><guid isPermaLink="false">d85f394e-70d4-4c6a-ae73-c07cf29b1789</guid><link>https://www.ivanti.com/blog/humans-can-be-hacked-so-stop-using-passwords-already</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Humans Can be Hacked. So Stop Using Passwords, Already!</title><description>&lt;p&gt;Humans are the weakest link in the cybersecurity chain. Where have you heard that before? Humans can be hacked! That too? Yes, I am also one of those weak links in the constant battle against malicious cyber criminals and it can be attributed to just being lazy. It’s human nature and we can easily be socially engineered into giving up our precious online user credentials to the bad guys. Without thinking, I’ll tap onto a link within my email or text message because I think I recognize the sender, and then realizing too late that I had just been phished. Then panic ensues where I start changing my passwords on every online bank, retail, and work account, all in a frenzy. Did I write passwords (as in plural) in the previous line and not the same password that I use amongst all my accounts? Another stupid human weak link move!&lt;br&gt;
&lt;br&gt;
Then when it’s time to change my password for my work account, I try to use something that is easy for me to remember. Inevitably, I initially try using a weak password that can be easily guessed not only by me, but brute forced by bad guys! Fortunately, my company has policies in place that don’t allow me to reuse the same password from before, and once I have come up with a strong new password somehow the very first time I am asked to use it to log back into my work account I’ve already forgotten it because I neglected to write it down (because that is what our company InfoSec training tells us not to do). Then you try to reset the password you just created the day before yesterday! It’s a vicious cycle.&lt;/p&gt;

&lt;p&gt;How do we save us from ourselves? Enter &lt;a href="https://fidoalliance.org/fido2/" target="_blank" rel="noopener"&gt;FIDO2&lt;/a&gt; security keys to kill off the password! In the case of &lt;a href="https://www.ivanti.com/blog/quick-demo-ivanti-zero-sign-on"&gt;Ivanti’s Zero Sign-On&lt;/a&gt;, your company can implement a FIDO2 solution by using your managed iOS or Android mobile device as a replacement for the security key. It’s called device-as-identity. You already carry your mobile phone with you in the Everywhere Workplace and you can use it to unlock your Windows or Mac company-owned laptop, and it seamlessly grants you access into your work accounts in a single sign-on (SSO) workflow. No carrying your security keys everywhere that can get lost or misplaced. How cool is that?&lt;/p&gt;

&lt;p&gt;FIDO2 is the most secure passwordless identity authenticator option out there today especially if it is used in a multi-factor authentication (MFA) system to securely access your digital work resources and services. FIDO2 leverages the stronger inherence factors with biometrics and using your mobile device adds the possession factor. On newer mobile devices you can use Apple Face ID, Android Face Unlock or Iris scan biometrics to access not only your mobile device’s home screen, but also to access the &lt;a href="https://help.ivanti.com/mi/help/en_us/GO/75/rni/Content/MIGoClientiOS/About_MobileIron_Go.htm" target="_blank" rel="noopener"&gt;MobileIron Go authenticator app&lt;/a&gt; that must be tapped via push notification or scan a quick response (QR) code to grant access to these same resources. There is your MFA system right there.&lt;/p&gt;

&lt;p&gt;You want to know a little about the technology behind FIDO2 and why it is the most secure option out there? The most notable is a password or PIN is no longer required which adds more security. The cryptographic (public key) credentials used to login to websites and online services across the internet are unique. This ensures your online privacy and adds confidentiality to your session. Your personal information remains on your mobile device and is never transmitted over the internet or stored on a server. This immediately eliminates the threat of phishing and credential theft right off the bat. Your built-in biometric scanner on your mobile device using either your fingerprint or face to validate your identity is very convenient. FIDO2 can also scale within your enterprise as your company grows by eliminating passwords and implementing one of the mature solutions in the cybersecurity hygiene best practices checklist. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;FIDO2 is part of Zero Sign-On (ZSO) and included in Ivanti’s Secure product portfolio that also includes &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Mobile Threat Defense (MTD)&lt;/a&gt; which provides multiple layers of phishing, device, network and app level protection. &lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;Ivanti Neurons for Zero-Trust Access (nZTA)&lt;/a&gt; adds the next-generation software-defined perimeter (SDP) secure remote access solution as a replacement for VPN, and &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Neurons for Patch Intelligence&lt;/a&gt; that now adds the RiskSense risk-based vulnerability management process to the security patching solution. All these, as well as, implementing Ivanti’s entire product portfolio which also includes &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;Ivanti’s Unified Endpoint Management (UEM)&lt;/a&gt; for Mobile adds to a company’s Zero Trust security maturity model.&lt;/p&gt;

&lt;p&gt;With credential theft and the sophisticated Pegasus spyware out in the wild, it’s no wonder that exploits like ransomware are growing by leaps and bounds. The more security impediments that your company places in front of the malicious cybercriminals, aka the bad guys, the greater chance that they will give up and seek out other targets which lack any controls whatsoever. I call that a winning formula. Learn more in my video below!&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="585061854"&gt;&lt;/object&gt;&lt;/p&gt;</description><pubDate>Mon, 09 Aug 2021 21:43:05 Z</pubDate></item><item><guid isPermaLink="false">255434ad-fdcf-4d3a-a332-28d54708b838</guid><link>https://www.ivanti.com/blog/fighting-ransomware-using-ivanti-s-platform-to-build-a-resilient-zero-trust-security-defense</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense</title><description>&lt;p&gt;Ransomware is a strain of malware that blocks users (or a company) from accessing their personal data or apps on infected iOS, iPadOS, and Android mobile devices, macOS laptops, Windows personal computers and servers, and Linux servers. Then the exploit demands cryptocurrency as payment to unblock the locked or encrypted data and apps. This form of cyber extortion has been increasing in frequency and ferocity over the past several years. Seemingly, a week does not pass without hearing about the latest ransomware exploit attacking government agencies, healthcare providers (including COVID-19 researchers), schools and universities, critical infrastructure, and consumer product supply chains.&lt;br&gt;
&lt;br&gt;
The most common delivery mechanisms are email and text messages that contain a phishing link to a malicious website. By tapping on the link, the user is redirected to an infected website where they unknowingly download drive-by malware onto their device. The malware can contain an exploit kit that automatically executes malicious programmatic code that performs a privilege escalation to the system root device level, where it will grab credentials and attempt to discover unprotected network nodes to infect via lateral movement.&lt;/p&gt;

&lt;p&gt;&lt;img alt="fighting ransomware: fbi investigation lock screen" height="382" src="https://static.ivanti.com/sites/marketing/media/images/blog/fighting-ransomware-1.jpg" width="238"&gt;&lt;/p&gt;

&lt;p&gt;Another common delivery mechanism are email attachments that can also contain malware exploit kits that affix themselves to vulnerable apps, computer systems or networks to elevate their privileges in search of critical data to block.&lt;br&gt;
&lt;br&gt;
There are 4 main types of ransomware. First is the &lt;strong&gt;&lt;em&gt;locker&lt;/em&gt;&lt;/strong&gt; ransomware, where the earliest form on mobile devices was found on Android. It was detected in late 2013 and called &lt;strong&gt;&lt;em&gt;LockDroid&lt;/em&gt;&lt;/strong&gt;. It secretly changed the PIN or password to the user’s lock screen, preventing access to the home screen and to their data and apps.&lt;/p&gt;

&lt;p&gt;The second type are encryptor ransomware that employs encryption of apps and files making them inaccessible without a decryption key. The first exploit using this type of ransomware was found in 2014 and called &lt;strong&gt;&lt;em&gt;SimpLocker&lt;/em&gt;&lt;/strong&gt;. It encrypted the personal data contained within the internal Secure Digital (SD) storage of an Android device. Afterward, an official looking message showing criminal violations based on scanned files found in the device is displayed to the victim. This is followed by a demand for payment message that would allow the victim to resolve the fake violations and receive the decryption key to unlock their blocked data and apps.&lt;/p&gt;

&lt;p&gt;Extortion payments are often made with Monero cryptocurrency because it is digital and often untraceable, ensuring anonymity for the cybercriminals. Bitcoin is still sometimes used, but lately, companies like &lt;a href="https://cipherblade.com/" target="_blank" rel="noopener"&gt;CipherBlade&lt;/a&gt; have been able to track down ransomware gangs using Bitcoin and return the money back to victims. Rarely, mobile payment methods like Apple Pay, Google Pay or Samsung Pay are also used, but cryptocurrency is still the preferred payment for ransomware.&lt;/p&gt;

&lt;p&gt;Just within the past several years, cybercriminal gangs have added several more types of ransomware exploits including &lt;strong&gt;&lt;em&gt;Doxware&lt;/em&gt;&lt;/strong&gt;, which are threats to reveal and publish personal (or confidential company) information onto the public internet unless the ransom is paid. The other is &lt;strong&gt;&lt;em&gt;Ransomware-as-a-Service&lt;/em&gt;&lt;/strong&gt; (RaaS). Cybercriminals leverage already developed and highly successful ransomware tools in a RaaS subscription model, selling to lesser skilled cybercriminals to extort cryptocurrency from their victims and then share the ransom money.&lt;/p&gt;

&lt;p&gt;&lt;img alt="fighting ransomware: diagram depicting how ransomware works" src="https://static.ivanti.com/sites/marketing/media/images/blog/fighting-ransomware-2.png"&gt;&lt;/p&gt;

&lt;h2&gt;Android Exploits: Anatomy of the SimpLocker Attack&lt;/h2&gt;

&lt;p&gt;&lt;img alt="fighting ransomware: diagram depicting how malware works" src="https://static.ivanti.com/sites/marketing/media/images/blog/fighting-ransomware-3.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Installation&lt;/strong&gt;: The victim unknowingly lands on malware compromised or Angler hosted web server and wants to play a video or run an app. The video or app requires a new codec or Adobe Flash Player update. The victim downloads the malicious update software and installs it, requiring device administrator permissions to be activated. The mobile device is infected, and the ransomware payload installs itself onto the device.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Communications&lt;/strong&gt;: The malware scans the contents of the SD card. Then it establishes a secure communications channel with the command and control (C2) server using the anonymous Tor or I2P proxy networks within the darknet. These networks often evade security researchers, law enforcement, and government agencies making it extremely difficult to shut them down.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encrypt Data&lt;/strong&gt;: The symmetric key used to encrypt the personal data on the attached SD card are kept hidden within the infected mobile device’s file system so the encryption can persist after reboots.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Extortion&lt;/strong&gt;: An official looking message from the FBI, Department of Homeland Security, or other government agency is displayed informing the victim that they are in violation of federal laws based on data found on the device after a scan of their personal files.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Demand Payment&lt;/strong&gt;: A demand-for-payment screen with instructions on the method of payment is then displayed. The &lt;em&gt;fine&lt;/em&gt; was normally $300 to $500 and commonly paid in cryptocurrency.&lt;/p&gt;

&lt;p&gt;If the ransom payment is made, the symmetric key is provided and used to decrypt the personal data. If the victim is fortunate, they can retrieve all their personal files intact, although there have been reports that some if not all the data are corrupted and no longer usable after they are decrypted.&lt;br&gt;
&lt;br&gt;
Android devices are especially susceptible to ransomware because of several factors. First is its global adoption with 72% of the worldwide market share and 3 billion devices around the world. Next is the 1,300+ original equipment manufacturers (OEM), along with the fragmentation of the Android operating system. Devices running versions from 2.2 to 11.0, means a very large number of them never receive a critical security update leaving them vulnerable to malware.&lt;/p&gt;

&lt;p&gt;The last factor is Android users routinely root their devices and install apps that are unverified by Google. There are now an estimated three million apps available for download just from the Google Play Store, with potentially a million more that can be downloaded from unknown and many malicious sources. Any one of these apps can be used to host malware that can lead to ransomware exploits.&lt;/p&gt;

&lt;h2&gt;Android Remediation&lt;/h2&gt;

&lt;p&gt;Here are the remediation tasks to help fight ransomware on Android devices.&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;These settings are configured within the Android device:&lt;img alt="google play protection settings" height="263" src="https://static.ivanti.com/sites/marketing/media/images/blog/fighting-ransomware-4.png" width="280"&gt;&lt;/strong&gt;&lt;br&gt;
1. By default, within the Google Settings and Security configuration, the Google Play Protect settings &lt;em&gt;Scan apps with Play Protect&lt;/em&gt; and &lt;em&gt;Improve harmful app detection&lt;/em&gt; are enabled. These settings are the equivalent to a resident antimalware agent on the device and should remain enabled.&lt;br&gt;
&lt;br&gt;
2. Within the Apps &amp;amp; notification and Special app access configuration is &lt;em&gt;Install unknown app settings&lt;/em&gt;. Leave storage, email and browser apps as &lt;em&gt;Not allowed&lt;/em&gt;, which is the default setting.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;These settings are configured within Ivanti UEM for Mobile or MobileIron Core:&lt;/strong&gt;&lt;br&gt;
3. For Android Enterprise devices, the above settings can be configured using the Lockdown &amp;amp; Kiosk configuration. Select &lt;em&gt;Enable Verify Apps&lt;/em&gt; and &lt;em&gt;Disallow unknown sources on Device&lt;/em&gt;&lt;em&gt; or&lt;/em&gt; &lt;em&gt;Disallow Modify Accounts&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;4. Create a System Update configuration to automatically update to the latest available Android OS version for the device. &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense&lt;/a&gt; (MTD) can also enforce that the latest OS version is running on the Android device and if not, alert the user and UEM administrator that the device is running a vulnerable OS version and apply compliance actions like block or quarantine until the device is updated.&lt;/p&gt;

&lt;p&gt;5. Enable Ivanti MTD on-device (using MTD Local Actions) and cloud-based to provide multiple layers of protection for phishing (Anti-phishing Protection) and device, network and app level threats (using the Threat Response Matrix within the MTD management console).&lt;br&gt;
&lt;br&gt;
6. Create a SafetyNet Attestation configuration that checks for device integrity and health every 24 hours via Google APIs.&lt;br&gt;
&lt;br&gt;
7. Create an Advanced Android Passcode and Lock Screen configuration to turn on multi-factor authentication (MFA) for the lock screen and work profile challenge using a biometric fingerprint, face unlock, or iris (eye) scan instead of a passcode or PIN.&lt;br&gt;
&lt;br&gt;
8. Enable Device Encryption. This may sound counter-intuitive but encrypting your personal and work data on the device can prevent the cybercriminals from threatening to publish your work or company information online.&lt;br&gt;
&lt;br&gt;
&lt;img alt="mobile device showing mobileiron no threats found" height="451" src="https://static.ivanti.com/sites/marketing/media/images/blog/fighting-ransomware-5.jpg" width="212"&gt; 9. Backup data automatically onto a cloud storage provider like Google Drive, OneDrive, Box or Dropbox. Make secondary and tertiary copies of backups using two or more of these personal storage providers since some offer free storage. Also, backup personal data onto a local hard drive that is encrypted, password-protected and disconnected from the device and network.&lt;/p&gt;

&lt;p&gt;10. Enable Android Enterprise or Samsung KNOX on the device to containerize, encrypt, and isolate the work profile data from your personal data in BYOD or COPE deployments. Android Enterprise in the various deployment modes and Samsung KNOX can be provisioned by &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/mobile-device-management"&gt;Ivanti UEM for Mobile&lt;/a&gt; or &lt;a href="https://help.ivanti.com/mi/help/en_US/core/10.7.0.0/gsg/Content/CoreGettingStarted/MobileIron_Core_overview.htm" target="_blank" rel="noopener"&gt;MobileIron Core&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;11. For BYOD deployments, create a blacklist of disallowed apps on the device. For company-owned devices, create a whitelist of allowed apps that can be installed on the device. Both settings can be configured within MobileIron Core’s App Control feature and applied to the security policy. For Android Enterprise devices, Restricted Apps and Allowed Apps can be applied to the Lockdown &amp;amp; Kiosk configuration or Create an App Control configuration to whitelist or blacklist apps within the personal profile side of the device. This can also be configured within Ivanti UEM for Mobile’s Allowed App settings and Policies &amp;amp; Compliance.&lt;/p&gt;

&lt;p&gt;12. Configure a VPN client on the device like MobileIron Tunnel, &lt;a href="https://www.ivanti.com/products/connect-secure-vpn"&gt;Ivanti Secure Connect&lt;/a&gt; or &lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;Zero Trust Access&lt;/a&gt; to protect sensitive data-in-motion between the mobile device and MobileIron Sentry or Connect Secure or ZTA gateways.&lt;/p&gt;

&lt;p&gt;13. Enable &lt;a href="https://www.ivanti.com/blog/quick-demo-ivanti-zero-sign-on"&gt;Ivanti Zero Sign-On&lt;/a&gt; (ZSO) for conditional access rules like trusted user, trusted device, and trusted app authentication to critical work resources on-premises, at the data center, or up in the cloud. Also, enable MFA using the stronger inherence (biometrics) and possession (device-as-identity or security key) authentication factors. Passwords and PINs can be phished, guessed or brute forced.&lt;/p&gt;

&lt;p&gt;14. As a last resort, there are anti-malware vendors that provide software to detect and remove ransomware from an infected device. The user can also boot the device into Safe Mode, deactivate the Device Administrator for the malware, and then uninstall it.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;In the next blog in this series, we will discuss ransomware attacks and remediation on iOS and iPadOS mobile devices, and macOS laptops and desktops.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 03 Aug 2021 22:41:56 Z</pubDate></item><item><guid isPermaLink="false">bf04b629-c377-4b7b-97ad-e4d47e81524f</guid><link>https://www.ivanti.com/blog/not-another-phishing-and-ransomware-blog</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Not Another Phishing and Ransomware Blog!</title><description>&lt;p&gt;What can I say further about Ivanti’s &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;mobile threat defense (MTD) solution&lt;/a&gt; for iOS, iPadOS and Android devices that has not already been mentioned in any of my previous &lt;a href="https://www.ivanti.com/blog/authors/james-saturnio"&gt;blogs&lt;/a&gt; and &lt;a href="https://www.ivanti.com/blog/quick-demo-leaky-app-detection-and-remediation"&gt;quick video demos&lt;/a&gt;? If I was to state where Ivanti has a clear advantage over other unified endpoint management competitors, it is with Ivanti’s MTD solution. Ivanti’s UEM competitors often partner with third-party mobile threat defense vendors which means the solution requires a secondary app to install onto the device. Even competitors that have their own MTD solution still require a second app to be installed. With a second app, the user might have to interact with the app to authenticate to their mobile threat defense portal and activate to start protecting the mobile device. There is a greater chance that the user may opt-out of installing the MTD protection, altogether. Even if the app is silently installed onto the mobile device, for iOS and iPadOS devices, the app has to be signed by the company's enterprise code signing certificate with every app update, or every other year when the certificate expires. This is an administrative pain to maintain and upkeep if there are a lot of corporate apps that are deployed to iOS and iPadOS devices.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management/mobile-device-management"&gt;Ivanti UEM Mobile&lt;/a&gt; employs a single agent app for UEM and MTD to manage and secure mobile devices which allows Ivanti’s platform to achieve closer to 100% user adoption, whereas a second app is closer to achieving 30% or less user adoption. The biggest battle for company cybersecurity architects and CISOs is getting threat defense installed onto mobile devices and endpoints, and then activated to start the protection from device, network, app, and phishing threats! Protection is now more important than ever. According to a &lt;a href="https://www.ivanti.com/company/press-releases/2021/fatigued-it-teams-and-ill-prepared-employees-are-losing-the-war-on-phishing-ivanti-study-confirms"&gt;recent Ivanti survey&lt;/a&gt;, 74% of respondents said their organization was a victim of a phishing attack in the last year, with 40% confirming they have experienced an attack in the last month alone.&lt;/p&gt;

&lt;p&gt;The slides below show that for other mobile threat defense solutions, they tout a lightweight agent that is cloud first and device-assisted to save on battery life. The problem there is it would take longer to detect and remediate mobile threats because the heavy lifting is done in the cloud. This could cause multiple round trips between the device and the cloud-based threat detection engine, and then to UEM to enforce a compliance action, and finally back to the mobile device to mitigate the detected threat. And, if the device's internet connection is interrupted the client engine could run in a degraded mode or leave the client brainless on the device making it unable to detect or remediate mobile threats.&lt;/p&gt;

&lt;p&gt;Ivanti’s solution has two layers of protection. An on-device detection and remediation engine that is provisioned by UEM and works even without an internet connection to the cloud-based engine. It can detect and remediate 45 different device, network, and app threats. Even Ivanti’s phishing protection has an on-device engine that blocks the browser from landing on a malicious website. This is augmented by Ivanti’s cloud-based engine that can detect 63 different network, device, and app level threats, and assists Ivanti’s phishing protection with a cloud-based lookup engine that is updated more frequently.&lt;/p&gt;

&lt;p&gt;&lt;img alt="mobile threat defense solution diagram" src="https://static.ivanti.com/sites/marketing/media/images/blog/mtd2.png"&gt;&lt;img alt="digram showing how other mobile threat defense solutions work" src="https://static.ivanti.com/sites/marketing/media/images/blog/other_mtd1.png"&gt;&lt;/p&gt;

&lt;p&gt;According to &lt;a href="https://www.verizon.com/business/resources/reports/dbir/?AID=11365093&amp;amp;SID=oc5A05L8E%2FcFrofF6SHThDYJ37cWn5XmnDZjFNmvw7UTREE0jLCU6n43HhgLGmw%2F&amp;amp;vendorid=CJM&amp;amp;PUBID=100357191&amp;amp;cjevent=56869abde99511eb8320007f0a1c0e14&amp;amp;CMP=afc_m_p_cj_na_ot_21_99_affiliate-100357191_11365093&amp;amp;cjdata=MXxOfDB8WXww" target="_blank" rel="noopener"&gt;Verizon’s 2021 Data Breach Investigations Report (DBIR),&lt;/a&gt; 36% of data breaches involved phishing attacks, last year. That is an increase of 11% from the previous year and it can be directly attributed to COVID-19 related spear phishing campaigns with the stay-at-home Everywhere Workplace paradigm shift that started to take effect at the same time. Sadly, that percentage is still rising and will lead to millions more stolen credentials used in more data breaches and ransomware attacks! &lt;a href="https://securityboulevard.com/2020/12/staggering-phishing-statistics-in-2020/" target="_blank" rel="noopener"&gt;Ninety-five percent of all attacks targeting enterprise networks are caused by successful spear phishing campaigns, and 97% of users are unable to recognize a sophisticated phishing email.&lt;/a&gt; Staggering numbers!&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
How does a cybersecurity architect and CISO counter these ever-growing sophisticated malicious cyber threat actors? They can configure both the on-device URL handler for Android devices and Content Blocker on iOS and iPadOS devices that blocks suspected malicious domains and websites when the user taps them. This is the first layer of protection. The local URL handler and Content Blocker database holds 35 MBs of data for its phishing database and machine learning classifiers. Both databases are updated every 8 hours.&lt;/p&gt;

&lt;p&gt;This is augmented by Ivanti’s cloud-based lookup service that has its database updated every hour. On Android devices, the anti-phishing protection leverages Ivanti’s MobileIron Tunnel service. Within the MobileIron Tunnel app configuration, a UEM administrator can configure it to support anti-phishing only or also connect to an on-premises or datacenter site via MobileIron Sentry, and/or SaaS-based site in the cloud via MobileIron Access.&lt;/p&gt;

&lt;p&gt;&lt;img alt="create anti-phishing protection configuration" src="https://static.ivanti.com/sites/marketing/media/images/blog/mobileiron_cloud.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt="mobileiron tunnel config setup" src="https://static.ivanti.com/sites/marketing/media/images/blog/mobileiron_tunnel.png"&gt;&lt;/p&gt;

&lt;p&gt;This capability is like the multi-layered anti-phishing protection on iOS and iPadOS devices also using Ivanti’s MTD solution.&lt;br&gt;
&lt;br&gt;
Phishing and ransomware are intertwined in a malicious cyber threat actor’s exploit arsenal. Deploying Ivanti’s UEM for Mobile with MTD is a great start to fighting off these threat actors. Throw in &lt;a href="https://www.ivanti.com/blog/quick-demo-ivanti-zero-sign-on"&gt;Ivanti’s Zero Sign-On&lt;/a&gt; (ZSO) solution that can employ the stronger factors like inherence and possession in a multifactor authentication policy, instead of the knowledge factor that often use passwords. Passwords are the weakest link for most companies, so it is time to kill it off! &lt;a href="https://www.ivanti.com/blog/sos-the-summer-of-security-is-here-stay-safe-out-there"&gt;#SummerOfSecurity&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The demo video below highlights the power of our multiple-layered anti-phishing protection on an Android Enterprise device in a bring-your-own-device (BYOD) deployment scenario.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="536078859"&gt;&lt;/object&gt;&lt;/p&gt;</description><pubDate>Wed, 21 Jul 2021 20:03:22 Z</pubDate></item><item><guid isPermaLink="false">99733696-b79a-4265-85f2-ad71c4d33fd3</guid><link>https://www.ivanti.com/blog/soaking-up-the-summer-of-security-sun</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Soaking Up the Summer of Security Sun!</title><description>&lt;p&gt;My wife and I make it a habit of taking a 2-to-3-mile power walk every day around the neighborhood park where we live. With summer upon us and recent heatwave on the west coast, lately these walks take place during the mid-morning hours when it is a lot cooler outside, and sometimes in between meetings. The walks are not only for us to stay fit and lose some (winter and pandemic) weight, but it does wonders for our mental health after being cooped up inside for several months. Personally, this aligns with our credo of always moving forward.&lt;/p&gt;

&lt;p&gt;Since these walks coincide with my normal working hours, I always carry my smartphone with me to remain in contact with my teammates. Often, several of my teammates collaborate with me via chat while I am soaking up the summer sun – the epitome of the Everywhere Workplace! Ironically, it is after one of these power walks that I sat down and did a brain dump to write this blog!&lt;/p&gt;

&lt;p&gt;The cool thing about using my personal smartphone to work, when I'm not tethered to my work laptop back at home, is it is managed by &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;Ivanti Unified Endpoint Management&lt;/a&gt; (UEM) Mobile and protected by &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Mobile Threat Defense&lt;/a&gt; and &lt;a href="https://www.ivanti.com/blog/quick-demo-ivanti-zero-sign-on"&gt;Zero Sign-On&lt;/a&gt;. I am reassured that all my work productivity, collaboration, and email apps are installed, my identity credentials are provisioned automatically, and all my personal and work data are safeguarded, no matter where I’m hanging out.&lt;br /&gt;
&lt;br /&gt;
Also, I don't have to wrack my brain to remember and then enter my username and password onto a small mobile device screen while I'm walking around the park. My company employs multifactor authentication (MFA) that uses my device (possession) and biometrics (inherence) as strong factors to access my critical work resources, always remaining productive while I'm sweating from the physical exercise, not from worrying about my password getting phished or information on my smartphone being stolen. If I happen to lose or misplace my smartphone while on my daily walks, I'm not worried because Ivanti UEM allows me to locate or lock my device and retire or wipe my personal and work data from the device remotely. It definitely is the summer of security (SOS) and fun, so stay safe and secure out there!&lt;/p&gt;</description><pubDate>Thu, 01 Jul 2021 18:11:43 Z</pubDate></item><item><guid isPermaLink="false">af9a45d8-9436-45a3-ba3d-70105f4bda8e</guid><link>https://www.ivanti.com/blog/no-one-likes-passwords-and-they-are-the-leading-cause-of-data-breaches</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>No One Likes Passwords and They are the Leading Cause of Data Breaches</title><description>&lt;p&gt;Did you hear about the latest data breach caused by a stolen password? Technically, it was a &lt;a href="https://api.slack.com/authentication/token-types#user" rel="noopener" target="_blank"&gt;user account security token&lt;/a&gt; used by the malicious cyber threat actors to gain initial access into the company’s chat workspace. Once on the IT chat channel, the threat actors impersonated an employee and then used a simple social engineering tactic to trick an IT support member into providing them with a long-lived login access token onto the corporate network.&lt;br&gt;
&lt;br&gt;
Once on the network, the threat actors moved laterally to discover and gain access to critical company services that allowed them to download valuable source code, potentially the crown jewels. The threat actors began selling the stolen software development kits (SDK) within multiple underground forums, afterward.&lt;/p&gt;

&lt;p&gt;It's difficult to gauge at this early stage what the total cost of this data breach will be for the company, albeit they appear confident that damage will be minimal at this point. I’m also curious to know what security improvements have been made by the company to ensure that this type of data breach and security incident never happens again. It’s easy to be a forensic supersleuth after having all the indicators of compromise (IoC) divulged, but there were several security incidents that ultimately led to the data breach.&lt;br&gt;
&lt;br&gt;
By order of magnitude, the first security incident is the issuance of long-lived access refresh tokens to sensitive workspaces like employee chats. Instead, short-lived tokens that expire with no refresh tokens or rotate access tokens could be deployed to protect users, the company chat app, and workspace. I’m not really convinced that the IT member provided a god-level multifactor authentication (MFA) token to the threat actors that granted them access to the corporate network. Some security feeds have made that claim. It sounds more likely the threat actors initiated and succeeded with a privilege escalation tactic and then was “living off the land” to locate and then break into the company vault.&lt;/p&gt;

&lt;p&gt;For clarification, a token is not a password or hash value, but a random string value generated by a computer and contains some secret information, and static (long-lived) tokens can be abused just like a password. With that logic, the knowledge factor (something you know) used in an MFA implementation, should be replaced with the something you have (possession) factor, like a FIDO2 security key, or your device-as-identity, &lt;em&gt;and&lt;/em&gt; strong biometrics (something you are) factor like liveness facial recognition. Notice the word &lt;strong&gt;and&lt;/strong&gt; in the previous sentence is italicized? No one likes passwords and the worst part is that they are the leading cause of security incidents often ending in data breaches.&lt;/p&gt;

&lt;p&gt;Continuous employee social engineering training including phishing awareness needs to be practiced and enforced. The irony is the IT department at most companies are an extension of the InfoSec team, so handing out administrative level access to someone who is saying that they lost their phone at the party last night, without being visibly challenged, even virtually, for additional identity used for authentication and authorization is a very bad security policy. Last I checked, most chat and collaboration apps have video conferencing capability to do just that.&lt;/p&gt;

&lt;p&gt;You might ask, would having implemented a zero trust security framework thwarted this security incident and data breach? Absolutely! Why? Because of the zero trust mantra, trust no one, verify everyone! The three core tenets help to reduce company risk and reduces the attack surface. The first tenet is securing the user with &lt;a href="https://www.ivanti.com/blog/quick-demo-ivanti-zero-sign-on"&gt;Zero Sign-On (ZSO)&lt;/a&gt; that eliminates user passwords and can enforce the stronger factors like possession and biometrics in a company’s MFA implementation. Additionally, the first tenet provides multiple layers of anti-phishing protection that protects the user’s credentials including access tokens from being harvested.&lt;/p&gt;

&lt;p&gt;The second tenet is securing the device by verifying its health and posture. This ensures the cyber hygiene of the mobile endpoint is good and free from sophisticated morphing device, network, and app level threats before it is allowed to connect to corporate resources. The third tenet is securing the network gateway with strong contextual access rules that can detect bad user behavior on the network. On-demand and per-app VPN also helps in the zero-trust network access (ZTNA) story by only allowing the authenticated user, authorized app and managed device access to the secure access gateway. A software-defined perimeter (SDP) further secures the network and connected resources by cloaking both the control and data planes. All resources behind the gateway are invisible to unauthorized users, apps, and devices.&lt;/p&gt;

&lt;p&gt;In summary, implementing a zero-trust security framework may not have eliminated the published security incident, but would have helped to lessen the effects or may have prevented the data breach, altogether. How? Ivanti has all the components that make up the three core tenets of the zero-trust security framework. Proper deployment of Ivanti’s &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;UEM platform&lt;/a&gt;, &lt;a href="https://www.ivanti.com/products/passwordless-authentication"&gt;ZSO&lt;/a&gt;, &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;MTD&lt;/a&gt;, and Zero Trust Access technologies would limit a threat actor’s ability to get to the data - thereby protecting it.&lt;/p&gt;
</description><pubDate>Tue, 15 Jun 2021 18:11:00 Z</pubDate></item><item><guid isPermaLink="false">397bc9a7-3dec-4438-b72a-aed30979f8ae</guid><link>https://www.ivanti.com/blog/quick-demo-a-day-in-the-life-of-a-remote-knowledge-worker</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Quick Demo: A Day in the Life of a Remote Knowledge Worker</title><description>&lt;p&gt;Do you make it a habit of connecting to the free Wi-Fi network at the coffee shop, restaurant, hotel, airport or even in-flight on the airplane to save on your cellular data minutes? Watch this short 2-minute video to see what happens if you connect to a wireless network with a malicious cyber threat actor performing Man-in-The-Middle (MiTM) attacks to unsuspecting victims.&lt;/p&gt;

&lt;p&gt;Not having a &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;unified endpoint management (UEM)&lt;/a&gt; platform and &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;mobile threat defense (MTD)&lt;/a&gt; solution can lead to your personal and work data, along with your user credentials being stolen and exfiltrated from your mobile device. See how &lt;a href="https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=2ahUKEwiD18XrqobxAhVnJTQIHVgXDZ8QFnoECAcQAA&amp;amp;url=https%3A%2F%2Fwww.ivanti.com%2Fsolutions%2Funified-endpoint-management&amp;amp;usg=AOvVaw3ymppE_Oey_LwxSkJZSt8X" target="_blank" rel="noopener"&gt;Ivanti UEM Mobile&lt;/a&gt; and &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Mobile Threat Defense&lt;/a&gt; protects your iOS, iPadOS, and Android devices from Man-in-The-Middle attacks! Thanks for watching.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="559245026"&gt;&lt;/object&gt;&lt;/p&gt;</description><pubDate>Mon, 07 Jun 2021 21:00:00 Z</pubDate></item><item><guid isPermaLink="false">3f483783-991b-45f3-b6ed-ecf38eec98f6</guid><link>https://www.ivanti.com/blog/quick-demo-leaky-app-detection-and-remediation</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Endpoint Management</category><category>Security</category><title>Quick Demo: Leaky App Detection and Remediation</title><description>&lt;p&gt;Here's a quick two-minute video demonstrating the power of &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/mobile-device-management"&gt;Ivanti's UEM for Mobile&lt;/a&gt; and &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Mobile Threat Defense&lt;/a&gt; and this time detecting a leaky app, specifically the very popular video-sharing TikTok app.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Tiktok has had a history of vulnerabilities where the personal information of users was exposed and could have potentially been harvested and leaked out by malicious cyber threat actors. Fortunately, TikTok has patched these flaws, but there are government and DoD agencies that block its installation on government issued mobile devices. Thanks for watching!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;For more information, check out the quick demo video below of &lt;a href="https://www.ivanti.com/products/endpoint-manager" target="_blank"&gt;Ivanti Unified Endpoint Manager&lt;/a&gt;&amp;nbsp;and &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense&lt;/a&gt; in action, and request a &lt;a href="https://www.ivanti.com/lp/uem/demos/end-point-manager" target="_blank"&gt;full private demo&lt;/a&gt;&amp;nbsp;through our website.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="549485950"&gt;&lt;/object&gt;&lt;/p&gt;</description><pubDate>Mon, 17 May 2021 18:51:19 Z</pubDate></item><item><guid isPermaLink="false">32c60862-9d74-4a44-9892-e24b0b98aced</guid><link>https://www.ivanti.com/blog/avoid-market-pressures-that-compromise-mobile-app-security</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Avoid Market Pressures That Compromise Mobile App Security</title><description>&lt;p&gt;The marketplace for mobile apps is a broad and highly competitive one. There are millions of apps available on Apple’s App store, Google Play, and within private enterprise app stores. Expanding market demands continue to drive the pressure to innovate. New iOS and Android updates and mobile device releases, along with myriad apps from companies vying for their customer’s attention, are creating shorter app release cycles.&lt;/p&gt;

&lt;p&gt;The process of releasing apps quickly to assuage market demands can lead to security issues. Bringing apps to market quickly, while trying to deliver that all-important optimal user experience, often has mixed results that can actually create negative user experiences. Mobile app developers must have the proper balance of delivery with the assurance of security and privacy built- in from the start.&lt;/p&gt;

&lt;p&gt;Cloud-native development with flexible software architectures can meet fast time-to-market goals, but still require proper security testing. Conversely, legacy processes with code written without unit testing can take months, which is unacceptable in today’s digital world. New apps, developed to compete in today’s era of digital transformation, regardless of development process, require rigorous security testing.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When it comes to the user experience, app security is as important as usability. If security is too arduous and time-consuming, users will abandon them. If security testing takes too much time and becomes unmanageable, developers will limit their testing regimen.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Leaky apps put businesses and consumers at risk&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;According to the Verizon &lt;a href="https://www.verizon.com/business/content/dam/resources/reports/2021/2021-msi-report.pdf" target="_blank" rel="noopener"&gt;Mobile Security Index 2021 report&lt;/a&gt;, one in twenty-five apps downloaded from public and private app stores leak sensitive credentials, email addresses, user ID’s, credit card information, and location data. Bad coding and shortcutting on security testing are partially responsible for this. Additionally, over half of the Verizon report respondents said cybersecurity challenges hold back their digital transformation initiatives. Market pressures continue to work against development cycles. For many enterprises, the mounting pressure to continuously deliver new apps and updates has put time-to-market, and security and privacy, at odds. This can mean choosing between time-to-market and security, which often comes down to limiting app security testing.&lt;/p&gt;

&lt;p&gt;For companies to remain competitive, their developers must meet rapid time-to-market requirements, while delivering mobile apps with solid security and privacy. The costs of not fully testing mobile apps can easily outweigh the costs of proper testing. Catching bugs in the earliest stages of the software development life cycle, or SDLC, can save money, brand equity, and user loyalty, compared to implementing security fixes after apps are in the hands of users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The high cost of shortcuts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sacrificing the effort necessary to provide a secure user experience is like "throwing the baby out with the bathwater." Security is one of the most important functions of a mobile app. Shortcuts that can be taken to speed up the process are one of the problem areas within the DevSecOps and the Agile development process. Unfortunately, vulnerability testing is often one of the security testing functions that gets pared down, or eliminated completely. A similar issue can occur with no code and low code development, where companies have little to no visibility into the SDLC or DevSecOps process, because it’s outsourced to third-party software developers.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Processes and solutions for secure app development&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Agile software development methods and continuous integration and delivery, or CICD, help bridge the gaps between development and operational activities, by automating the building, testing and deploying of apps.&lt;/p&gt;

&lt;p&gt;Automation can help developers properly balance time-to-market delivery with effective security testing. The&amp;nbsp;SDLC is the process of planning, creating, testing, and deploying an&amp;nbsp;application.&amp;nbsp;It consists of six stages, including requirement analysis, design, development and testing, implementation, documentation, and evaluation. The idea behind SDLC, and for that matter DevSecOps, is that apps need security built into their development from inception.&lt;/p&gt;

&lt;p&gt;Software development engineers are tasked with using any and all prescribed secure development tools at their disposal to unit test software. For example, penetration testing software can be accomplished by installing the app within customer-duplicated environments, and running tools like Rapid7, Burp Suite, and Nessus visibility scanners, and fuzzer tools like Synopsis Codenomicon, HCL AppScan and others to discover vulnerabilities before apps are released.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Developing secure mobile apps requires a synergistic ecosystem&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Many enterprises develop their own mobile apps inhouse, or use third-party software services. Mobile apps continue to grow unabated, with powerful new capabilities. The need to quickly release them can put development teams in precarious positions. Even with security tools available, they don’t always use them. The gap between developing and testing app security, versus how quickly organizations can get them in front of their users, is a growing divide.&lt;/p&gt;

&lt;p&gt;There is no single product or development process solution. It is a matter of being deeply committed to providing secure apps that protect business assets and user privacy. This is ultimately what is best for all concerned parties. This includes companies that need to protect their systems and data, DevSecOps that need to appropriately manage the product lifecycles, and users that depend on secure apps to protect their data.&lt;/p&gt;

&lt;p&gt;How can Ivanti help? Ivanti incapptic Connect employs the zScan feature that will scan the iOS or Android app for security and privacy vulnerabilities before the app gets distributed for public consumption. &lt;a href="https://www.ivanti.com/products/incapptic-connect"&gt;Learn more about Ivanti incapptic Connect&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Fri, 14 May 2021 22:06:53 Z</pubDate></item><item><guid isPermaLink="false">cafcf389-5efe-45a8-b5bc-b0ea65851cee</guid><link>https://www.ivanti.com/blog/quick-demo-updated-magisk-systemless-root-detection-and-remediation</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Quick Demo: Updated Magisk Systemless Root Detection and Remediation</title><description>&lt;p&gt;Magisk is a very sophisticated systemless rooting technique that can bypass Google's SafetyNet attestation and allow apps like Google Pay, many banking apps, and even Fortnite and Pokémon Go games to be installed on a rooted Android device. Rooting an Android device is popular to allow the user to customize and tweak their device by allowing the installation of third-party apps and tools, removal of bloatware, and speed up the processor and network.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The problem with rooting your device is malware and malicious exploits can also be downloaded and installed onto the device often without the user knowing. These specific apps mentioned previously, check that the device is not rooted and pass Google SafetyNet attestation before the app can run correctly on an Android device.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Magisk using the Magisk Hide feature attempts to evade&amp;nbsp;root&amp;nbsp;detection, but Ivanti UEM for Mobile and Mobile Threat Defense are able to detect and remediate this updated Magisk rooting technique. This helps protect the user’s personal and work data from being harvested by malicious threat actors by providing multiple layers of protection using our device machine learning, and is augmented by our cloud-based threat detection and intelligence engines.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;For more information, check out the quick demo video below of &lt;a href="https://www.ivanti.com/products/endpoint-manager" target="_blank"&gt;Ivanti Unified Endpoint Manager&lt;/a&gt;&amp;nbsp;and &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense&lt;/a&gt; in action, and request a &lt;a href="https://www.ivanti.com/lp/uem/demos/end-point-manager" target="_blank"&gt;full private demo&lt;/a&gt;&amp;nbsp;through our website.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="548463084"&gt;&lt;/object&gt;&lt;/p&gt;</description><pubDate>Wed, 12 May 2021 17:44:31 Z</pubDate></item><item><guid isPermaLink="false">74499ab0-0ed4-4969-9816-e53f7f9bff34</guid><link>https://www.ivanti.com/blog/quick-demo-ivanti-uem-for-mobile-checkra1n-jailbreak-update-for-ios-14-5</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Endpoint Management</category><category>Security</category><title>Quick Demo: Ivanti UEM for Mobile - checkra1n Jailbreak Update for iOS 14.5</title><description>&lt;p&gt;The checkm8 vulnerability and the updated checkra1n jailbreak tool are the gifts that keep on giving for Apple devices. Using Ivanti UEM for Mobile and Mobile Threat Defense, you can protect your iPhone 5S through iPhone X, iPad 5&lt;sup&gt;th&lt;/sup&gt; through 7&lt;sup&gt;th&lt;/sup&gt;&amp;nbsp;generations, and iPad Pro 2&lt;sup&gt;nd&lt;/sup&gt;&amp;nbsp;generation, Apple TV 4 and 4K, and iPods up to 7&lt;sup&gt;th&lt;/sup&gt;&amp;nbsp;generation devices.&lt;/p&gt;

&lt;p&gt;There are also reports that the latest version of checkra1n can jailbreak the latest Apple MacBooks running the M1 chips! In this quick demo video, you can see the power of the Ivanti solution to protect your personal and work data using these devices from threat actors in the Everywhere Workplace.&lt;/p&gt;

&lt;p&gt;You can&amp;nbsp;learn more about &lt;a href="https://www.ivanti.com/products/endpoint-manager" target="_blank"&gt;Ivanti Unified Endpoint Manager&lt;/a&gt;&amp;nbsp;and see how other companies are keeping their business up and running, and&amp;nbsp;request a &lt;a href="https://www.ivanti.com/lp/uem/demos/end-point-manager" target="_blank"&gt;full private demo&lt;/a&gt;&amp;nbsp;through our website.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="544823197"&gt;&lt;/object&gt;&lt;/p&gt;</description><pubDate>Tue, 04 May 2021 21:16:25 Z</pubDate></item><item><guid isPermaLink="false">d3b77f00-3514-4a72-a1ba-5d6f8c66a742</guid><link>https://www.ivanti.com/blog/quick-demo-ivanti-uem-for-clients</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Quick Demo: Ivanti UEM for Clients</title><description>&lt;p&gt;Some of the many ways that malware, including ransomware, is commonly spread is through malicious attachments to business email, unsanctioned apps downloaded from third-party app stores, drive-by downloads via phishing and pharming attacks, employing brute-force tactics using Remote Desktop Protocol (RDP), and network propagation via SMB and CIFS sharing. Email attachments can be zipped, or encrypted files like Microsoft Word documents or Excel spreadsheets that contain malicious scripts or macros can be triggered once the file is unzipped or decrypted.&lt;br&gt;
&lt;br&gt;
In this short two-minute video, we demonstrate the power of Ivanti’s UEM for Clients (formerly Endpoint Manager) that can automatically deploy and install an antivirus and endpoint security agents to the Windows workstation or server. Both agents stop the propagation of malware and ransomware by first detecting the malicious attachment, blocking the script from executing, and then isolating the infected endpoint from the network. Once the threat has been remediated by the company IT administrator, the workstation or server can be restored to normal operation. Thank you for watching!&lt;/p&gt;

&lt;p&gt;You can&amp;nbsp;learn more about &lt;a href="https://www.ivanti.com/products/endpoint-manager" target="_blank"&gt;Ivanti Unified Endpoint Manager&lt;/a&gt;&amp;nbsp;and see how other companies are keeping their business up and running, and&amp;nbsp;&lt;a href="https://www.ivanti.com/lp/uem/demos/end-point-manager" target="_blank"&gt;request a full private demo&lt;/a&gt;&amp;nbsp;through our website.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="542708914"&gt;&lt;/object&gt;&lt;/p&gt;</description><pubDate>Wed, 28 Apr 2021 23:32:19 Z</pubDate></item></channel></rss>