<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-au/blog/authors/james-saturnio/rss" /><link>https://www.ivanti.com/en-au/blog/authors/james-saturnio</link><item><guid isPermaLink="false">064fce58-4e14-408d-bb4d-2a9ed519b26e</guid><link>https://www.ivanti.com/en-au/blog/three-reasons-endpoint-security-can-t-stop-with-just-patching-or-antivirus</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Three Reasons Endpoint Security Can’t Stop With Just Patching</title><description>&lt;p&gt;With remote work now commonplace, having a good cyber hygiene program is crucial for organisations who want to survive in today’s&amp;nbsp;threat&amp;nbsp;landscape. This includes promoting a culture of individual cybersecurity awareness and deploying the right security tools, which are both critical to the program’s success.&amp;nbsp;&lt;br&gt;
&lt;br&gt;
Some of these tools include endpoint patching, endpoint detection and response (EDR) solutions and antivirus software. But considering recent cybersecurity reports,&amp;nbsp;they're&amp;nbsp;no longer enough to reduce your organisation’s external attack surface.&lt;/p&gt;

&lt;p&gt;Here are three solid&amp;nbsp;reasons,&amp;nbsp;and real-world situations, that happened to organisations that&amp;nbsp;didn't&amp;nbsp;take this threat seriously.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;a href="#one"&gt;AI generated polymorphic exploits can bypass leading security tools&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Patching failures and patching fatigue are stifling security teams&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Endpoint patching only works for known devices and apps&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#four"&gt;How can organisations reduce their external attack surface?&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2 id="one"&gt;1. AI generated polymorphic exploits can bypass leading security tools&lt;/h2&gt;

&lt;p&gt;Recently,&amp;nbsp;AI-generated&amp;nbsp;polymorphic malware has been developed to bypass EDR and antivirus, leaving security teams with blind spots into threats and vulnerabilities.&lt;/p&gt;

&lt;h3&gt;Real-world example: ChatGPT Polymorphic Malware Evades “Leading” EDR and Antivirus Solutions&lt;/h3&gt;

&lt;p&gt;In one report, researchers created&amp;nbsp;&lt;a href="https://www.hackread.com" rel="noopener" target="_blank"&gt;polymorphic malware by abusing ChatGPT&lt;/a&gt; prompts&amp;nbsp;that&amp;nbsp;evaded&amp;nbsp;detection by antivirus software. In a similar report, researchers created a&amp;nbsp;&lt;a href="https://www.darkreading.com/endpoint-security/ai-blackmamba-keylogging-edr-security" rel="noopener" target="_blank"&gt;polymorphic keylogging malware that bypassed an industry-leading&amp;nbsp;automated EDR solution&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;These exploits achieved this by mutating its code slightly with every iteration and encrypting its malicious code without a command-and-control (C2) communications channel.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This mutation is not detectable by traditional signature-based and low-level heuristics detection engines. This means that security time gaps are created for a patch to be developed and released, for the patch to be tested for effectiveness, for the security team to prioritise vulnerabilities and&amp;nbsp;for the IT (Information Technology) team to rollout the patches onto affected systems.&lt;/p&gt;

&lt;p&gt;In all, this could mean several weeks or months where an organisation will need to rely on other security tools to help them protect critical assets until the patching process is completed successfully.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;

&lt;h2 id="two"&gt;2. Patching failures and patching fatigue are stifling security teams&lt;/h2&gt;

&lt;p&gt;Unfortunately, updates&amp;nbsp;breaking&amp;nbsp;systems because patches&amp;nbsp;haven't&amp;nbsp;been rigorously tested occur frequently. Also, some updates&amp;nbsp;don't&amp;nbsp;completely fix all weaknesses, leaving systems vulnerable to more attacks and requiring additional patches to completely fix.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Real-world example: Suffolk County’s ransomware attack&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://therecord.media/suffolk-county-new-york-ransomware-investigation" rel="noopener" target="_blank"&gt;The Suffolk County government in New York&lt;/a&gt;&amp;nbsp;recently released their findings from the forensic investigation of the data breach and ransomware&amp;nbsp;attack,&amp;nbsp;where the Log4j vulnerability was the threat actor’s entry point to breach their systems. The attack started back in December&amp;nbsp;2021,&amp;nbsp;which was the same time&amp;nbsp;&lt;a href="https://logging.apache.org/log4j/2.x/security.html" rel="noopener" target="_blank"&gt;Apache released security patches&lt;/a&gt; for these vulnerabilities.&amp;nbsp;&lt;br&gt;
&lt;br&gt;
Even with updates available, patching never took&amp;nbsp;place,&amp;nbsp;resulting in 400 gigabytes of data being stolen including thousands of social security numbers and an initial ransom demand of $2.5 million.&lt;/p&gt;

&lt;p&gt;The ransom was never paid but the loss of personal data and employee productivity and subsequent investigation outweighed the cost of updated cyber hygiene appliances and tools and a final ransom demand of $500,000. The county is still trying to recover and restore all&amp;nbsp;their&amp;nbsp;systems today, having already spent $5.5 million.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Real world example: An errant Windows server update&amp;nbsp;caused me to work 24-hours straight&lt;/p&gt;

&lt;p&gt;From personal experience, I once worked 24 hours straight because one Patch Tuesday, a Microsoft Windows server update was automatically downloaded, installed which promptly broke authentication services between the IoT (Internet of Things) clients and the AAA (authentication, authorisation and accounting) servers grinding production to a screeching halt.&lt;br&gt;
&lt;br&gt;
Our company’s internal customer reference network that was implemented by our largest customers deployed Microsoft servers for Active Directory Certificate Services (ADCS) and Network Policy Servers (NPS) used for 802.1x EAP-TLS authentication for our IoT network devices managed over the air.&lt;/p&gt;

&lt;p&gt;This happened a decade ago, but similar recurrences have also occurred over the next several years, including this&amp;nbsp;update from July 2017, where NPS authentication broke for wireless clients and&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/topic/kb5014986-authentication-failures-occur-after-the-may-10-2022-update-is-installed-on-domain-controllers-running-windows-server-2012-r2-367a686a-f976-4170-9fdb-919a069689bd" rel="noopener" target="_blank"&gt;was repeated in May of last year&lt;/a&gt;.&lt;br&gt;
&lt;br&gt;
At that time, an immediate fix for the errant patch&amp;nbsp;wasn't&amp;nbsp;available, so I spent the next 22 hours rebuilding the Microsoft servers for the company’s enterprise public key infrastructure (PKI) and AAA services to restore normal operations. The&amp;nbsp;saving grace&amp;nbsp;was we took the original root certificate authority offline, and the server&amp;nbsp;wasn't affected by the bad update.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, we ended up having to revoke all the identity certificates issued by the subordinate certificate authorities to thousands of devices including routers, switches, firewalls&amp;nbsp;and&amp;nbsp;access points and re-enroll them back into the AAA service with new identity certificates.&lt;/p&gt;

&lt;p&gt;Learning from this experience, we disabled automatic updates for all Windows servers and took more frequent backups of critical services and data.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;

&lt;h2 id="three"&gt;3. Endpoint patching only works for known devices and apps&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;With the pandemic came the shift to&amp;nbsp;Everywhere Work, where employees worked from&amp;nbsp;home,&amp;nbsp;often connecting their personal devices to their organisation’s network. This left security teams with a blind spot to&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/products/security/what-is-shadow-it.html" rel="noopener" target="_blank"&gt;shadow IT&lt;/a&gt;. With shadow IT, assets go unmanaged, are potentially out-of-date and cause insecure personal devices and leaky applications.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The resurgence of bring your own device (BYOD) policies and the lack of company-sanctioned secure remote access quickly expanded the organisation’s external attack surface, exposing other attack vectors for threat actors to exploit.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Real-world example:&amp;nbsp;LastPass'&amp;nbsp;recent breach&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;LastPass is&amp;nbsp;a very popular&amp;nbsp;password manager that stores your passwords in an online vault. It has more than&amp;nbsp;25 million users&amp;nbsp;and 100,000 businesses. Last year,&amp;nbsp;LastPass &lt;a href="https://blog.lastpass.com/2023/03/security-incident-update-recommended-actions/" rel="noopener" target="_blank"&gt;experienced a massive data breach involving two security incidents&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br&gt;
&lt;br&gt;
The second incident &lt;a href="https://thehackernews.com/2023/03/lastpass-hack-engineers-failure-to.html" rel="noopener" target="_blank"&gt;leveraged data stolen during the first breach&lt;/a&gt;&amp;nbsp;to target four DevOps engineers, specifically, their home computers. One senior software developer used their personal Windows desktop to access the corporate development sandbox. The desktop also had an unpatched version of Plex Media Server (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2020-5741" rel="noopener" target="_blank"&gt;CVE-2020-5741&lt;/a&gt;) installed.&lt;/p&gt;

&lt;p&gt;Plex provided a patch for this vulnerability three years ago. Threat actors used this vulnerability to deliver malware, perform privilege escalation (PE), then a remote code execution (RCE) to access LastPass cloud-based storage and steal DevOps secrets and multi-factor (MFA) and Federation databases.&lt;br&gt;
&lt;br&gt;
"Unfortunately, the LastPass employee never upgraded their software to activate the patch," Plex said in a statement. "For reference, the version that addressed this exploit was roughly 75 versions ago."&lt;/p&gt;

&lt;h2 id="four"&gt;If patching isn’t enough, how can organisations reduce their external attack surface?&lt;/h2&gt;

&lt;h3&gt;Cyber hygiene&lt;/h3&gt;

&lt;p&gt;Employees are the weakest link to an organisation’s cyber hygiene program. Inevitably,&amp;nbsp;they'll&amp;nbsp;forget to update their personal devices, re-use the same weak password to different internet websites, install leaky applications, and click or tap on phishing links contained within an email, attachment, or text message.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Combat this by promoting a company culture of cybersecurity awareness and practice vigilance that includes:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Ensuring the latest software updates are installed on their personal and corporate devices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Recognising social engineering attack techniques including the several types of phishing attacks.&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Using multi-factor authentication whenever possible.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;·&amp;nbsp;Installing and automatically updating the databases on antivirus software for desktops and mobile threat defense for mobile devices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Continuing education is key to promoting great cyber hygiene within your organisation, especially for&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/phishing-in-the-everywhere-workplace"&gt;anti-phishing&lt;/a&gt; campaigns. &amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Cyber hygiene tool recomendations&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;In&amp;nbsp;cybersecurity, the saying goes, “You can’t protect what you can’t see!” Having&amp;nbsp;a complete&amp;nbsp;discovery and accurate inventory of all network-connected hardware, software&amp;nbsp;and&amp;nbsp;data,&amp;nbsp;including shadow IT assets, is the important first step to assessing an organisation’s vulnerability risk profile. The asset data should feed into an enterprise&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-for-patch-management"&gt;endpoint patch management&amp;nbsp;system&lt;/a&gt;.&amp;nbsp;&lt;br&gt;
&lt;br&gt;
Also, consider implementing a&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/en-au/en-au/products/risk-based-vulnerability-management"&gt;risk-based vulnerability management&lt;/a&gt;&amp;nbsp;approach to&amp;nbsp;prioritsse&amp;nbsp;the overwhelming number of vulnerabilities to only those that pose the greatest risk to your organisation.&amp;nbsp;Often included with risk-based vulnerability management solutions is a&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-for-vulnerability-knowledge-base"&gt;threat intelligence&lt;/a&gt;&amp;nbsp;feed into the &lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-for-patch-management"&gt;patch management system&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Threat intelligence is information about known or potential threats to an organisation. These threats can come from a variety of sources, like security researchers, government agencies, infrastructure vulnerability and application security scanners, internal and external penetration testing results and even threat actors themselves.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This information, including specific patch failures and reliability reported from various crowdsourced feeds, can help organisations remove internal patch testing requirements and reduce the time gap to patch deployments to critical assets.&lt;br&gt;
&lt;br&gt;
A&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/en-au/en-au/autonomous-endpoint-management/unified-endpoint-management"&gt;unified endpoint management&lt;/a&gt;&amp;nbsp;(UEM) platform is necessary to remotely manage and provide endpoint security to mobile devices including shadow IT and BYOD assets.&lt;/p&gt;

&lt;p&gt;The solution can enforce patching to the latest mobile operating system (OS) and applications, provision email and secure remote access profiles including identity credentials and multi-factor authentication (MFA) methods like biometrics, smart cards, security keys, certificate-based or token-based authentication.&lt;/p&gt;

&lt;p&gt;The UEM solution should also integrate an AI machine learning-based mobile threat defense (MTD) solution for mobile devices, while desktops require next-generation antivirus (NGAV) with robust heuristics to detect and remediate device, network, and app threats with real-time anti-phishing protection.&lt;br&gt;
&lt;br&gt;
And finally, to level the playing field against AI-generated malware,&amp;nbsp;cyber hygiene tools will have to evolve quickly by leveraging AI guidance to keep up with the more sophisticated polymorphic attacks that are on the horison.&lt;/p&gt;

&lt;p&gt;Adding the solutions described above will help deter cyberattacks by putting impediments in front of threat actors to frustrate them and seek out easier targets to victimise.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Wed, 14 Jun 2023 20:56:25 Z</pubDate></item><item><guid isPermaLink="false">b53fab6a-a46c-4039-b071-5a3c6d38c482</guid><link>https://www.ivanti.com/en-au/blog/fighting-ransomware-using-ivanti-s-platform-to-build-a-resilient-zero-trust-security-defense-part-2</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense – Part 2</title><description>&lt;p&gt;&lt;em&gt;Within the &lt;/em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/fighting-ransomware-using-ivanti-s-platform-to-build-a-resilient-zero-trust-security-defense"&gt;initial blog in this series&lt;/a&gt;&lt;em&gt;, we discussed ransomware attacks and their remediation on Android mobile devices. Part 2 addresses potential ransomware exploits and their remediation on iOS, iPadOS mobile devices and macOS desktops.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;iOS and iPadOS Exploits&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;The quickest method to check for the presence of malware on your iPhone, iPad or macOS devices is to look for the presence of an unknown configuration profile within the Settings &amp;gt; General &amp;gt; VPN &amp;amp; Device Management settings. Malicious third-party apps commonly sideloaded from non-sanctioned internet websites, or from an infected personal computer, or downloaded from package managers like Cydia or Sileo along with unofficial app stores like TweakDoor (formerly TweakBox) or TutuApp, will add their own configuration profile into the Device Management settings. Package managers, commonly installed after performing a jailbreak of your iOS or iPadOS device, and unofficial app stores that do not require a jailbreak, are repositories for alternative apps, tweaks, and software tools to customize your Apple iDevice. Often these third-party apps have not been rigorously tested for vulnerabilities and can contain malware and malicious exploits that can then take complete control of your device without you knowing.&lt;/p&gt;

&lt;p&gt;Apple’s mobile device management (MDM) enables your company’s IT department to remotely enroll and deploy corporate and personally owned iOS, iPadOS or macOS devices over-the-air using a unified endpoint management (UEM) platform like &lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-for-unified-endpoint-management"&gt;Ivanti Neurons for UEM&lt;/a&gt; by deploying a root MDM profile within the same Device Management settings. UEM then fully manages, distributes applications and content, and enforces restrictions and security configurations to these managed devices.&lt;/p&gt;

&lt;p&gt;A configuration profile can contain many payloads that store key value pair settings for MDM, with a partial list below. &lt;a href="https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf" target="_blank" rel="noopener"&gt;The link to the full itemized list is located here&lt;/a&gt;. The good news is as of iOS version 12.2 and later, the profile must be manually installed and then trusted by the user as additional security steps to explicitly approve its installation within the Device Management settings. The partial list includes:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Restrictions on device features&lt;/li&gt;
	&lt;li&gt;Credentials like identity and chain of trust certificates, secrets, and keys&lt;/li&gt;
	&lt;li&gt;Wi-Fi profiles&lt;/li&gt;
	&lt;li&gt;VPN profiles&lt;/li&gt;
	&lt;li&gt;Email server and Exchange settings&lt;/li&gt;
	&lt;li&gt;LDAP directory service settings&lt;/li&gt;
	&lt;li&gt;CalDAV calendar service settings&lt;/li&gt;
	&lt;li&gt;Web clips.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The other good news is these suspicious or untrusted configuration profiles, malware, and other malicious exploits including the Pegasus spyware will be detected by &lt;a href="https://www.ivanti.com/en-au/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense (MTD)&lt;/a&gt; and trigger compliance actions like block access to corporate resources or quarantine actions on the device. Ironically, another indication of the presence of a threat on your mobile device is as part of a quarantine compliance action, UEM provisioned managed apps and their content are removed from an iOS or iPadOS device to prevent data loss. After the threats are removed, the managed apps are restored to allow the user to continue to be productive. (See video below that demonstrates this capability.)&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="601397097"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;macOS Exploits&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Apple macOS desktop devices are also not immune from malicious exploits as evidenced by the list of high severity arbitrary and remote code execution vulnerabilities within the &lt;a href="https://www.cvedetails.com/vulnerability-list/vendor_id-49/product_id-156/Apple-Mac-Os-X.html" target="_blank" rel="noopener"&gt;Common Vulnerabilities and Exposures&lt;/a&gt; details database. Fortunately, &lt;a href="https://support.apple.com/en-us/HT201222" target="_blank" rel="noopener"&gt;security updates&lt;/a&gt; exist for these known and former zero-day vulnerabilities.&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/ios_ipados_exploits1.png"&gt;&lt;/p&gt;

&lt;p&gt;More recently, a new variant of the AdLoad malware has been detected out in the wild and been able to evade Apple’s built-in malware XProtect scanner. Adload is a&amp;nbsp;&lt;a href="https://heimdalsecurity.com/glossary#trojan-horse" target="_blank" rel="noopener"&gt;trojan&lt;/a&gt;, specifically targeting macOS platforms and is currently used to push malicious payloads like adware, bundleware, and&amp;nbsp;&lt;a href="https://heimdalsecurity.com/glossary#potentially-unwanted-application" target="_blank" rel="noopener"&gt;Potentially Unwanted Applications (PUAs)&lt;/a&gt;. It is capable of&amp;nbsp;harvesting system information&amp;nbsp;that can then be deployed to the infected remote web servers under the control of these malicious threat actors. Other macOS malware strains have been able to bypass XProtect as well and infect macOS devices with chained malicious payloads that exploited zero-day vulnerabilities to evade Apple’s File Quarantine, Gatekeeper, and Notarization security checks. Future versions of AdLoad can also evolve into dropping exploit kits that can harvest your personal information, perform lateral movement onto the network, and potentially ransomware.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;iCloud Exploits&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Back in June of 2014, an iCloud ransomware attack succeeded with victims in Australia, New Zealand, and the United States.&lt;/p&gt;

&lt;p&gt;On infected iOS, iPadOS devices and macOS laptops, their lock screens were overlaid with a demand for payment message to unlock them. How did the malicious threat actors pull this off? Personal user account information was harvested using sophisticated phishing tactics and brute-force password cracking techniques from vulnerable iCloud accounts.&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/ios_ipados_exploit2.png"&gt;&lt;/p&gt;

&lt;p&gt;These threat actors used the Find My iPhone, Find My iPad, Find My Mac, or Find My iPod services within iCloud that allow the owner to try to locate their lost device from any web browser. If the lost device were still connected to the internet, the rightful owner could display a message on the screen instructing the person in possession of the device to contact them, remotely set a locking PIN (Personal Identification Number) or wipe the contents of the device.&lt;br&gt;
&lt;br&gt;
Once the threat actors obtained the victim’s iCloud account credentials, they remotely changed the PIN and locked the device from the rightful owner. They could then display a ransom message demanding the $100 payment to unlock the device.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/ios_ipados_exploit3.png"&gt;Other similar exploits include fake antivirus support pop-up messages that inform the user to call a telephone number to remove the malware. Victims would then be coerced to pay money to remove the malware from their devices or laptops. The simple solution was to restore from a Time Machine backup.&lt;/p&gt;

&lt;p&gt;The good news is &lt;a href="https://www.cvedetails.com/product/34308/Apple-Icloud.html?vendor_id=49" target="_blank" rel="noopener"&gt;iCloud exploits&lt;/a&gt; have decreased in severity and total count in recent years. Although, credential theft and ransomware attacks, some leveraging the same machine learning (ML) artificial intelligence tactics and techniques applied by reputable security researchers, are now used by nation-state backed advanced persistent threat (APT) actors to evade detection and cover their tracks after a successful data breach, have gone up dramatically in the Everywhere Workplace. According to the &lt;a href="https://www.verizon.com/business/resources/infographics/2021/2021-msi-executive-summary-infographic.pdf" target="_blank" rel="noopener"&gt;Verizon 2021 Mobile Security Index&lt;/a&gt;, there was an increase of 364% in phishing attempts in 2020 versus 2019. That is mind blowing! What will the outcome for 2021 reveal?&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Additional iOS, iPadOS and macOS Remediation&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;These settings are applicable within the iOS, iPadOS and macOS device:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Apple devices require a 6-digit, 4-digit, or random length alphanumeric passcode as the entropy source to initiate the Data Protection mechanism that leverages file-based encryption on iOS and iPadOS devices, and disk volume encryption for macOS desktops. The stronger the user passcode, the stronger the encryption key and lessening the likelihood of a successful brute force attack by malicious threat actors. Unified endpoint management platforms like Ivanti Neurons for UEM and &lt;a href="https://www.ivanti.com/en-au/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense&lt;/a&gt; (MTD) can enforce strong and complex passcodes onto the managed device.&lt;/p&gt;

&lt;p&gt;Only download apps from the iOS or Mac App Stores.&lt;/p&gt;

&lt;p&gt;If your company employs a UEM platform and deploys an enterprise app store, download apps from the company app store only, as well.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;These settings are configured within Ivanti UEM Neurons for UEM or MobileIron Core:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Create a Software Updates configuration to automatically update to the latest available iOS, iPadOS or macOS version for the device.&amp;nbsp;For iOS and iPadOS only, Ivanti MTD can also enforce that the latest OS version is running on the device and if not, alert the user and UEM administrator that the device is running a vulnerable OS version and apply compliance actions like block or quarantine until the device is updated.&lt;/li&gt;
	&lt;li&gt;For macOS desktops, create a FileVault 2 configuration to enable volume-based encryption.&lt;/li&gt;
	&lt;li&gt;For iOS and iPadOS devices, enable Ivanti MTD on-device (using MTD Local Actions) and cloud-based to provide multiple layers of protection for phishing (Anti-phishing Protection) and device, network, and app level threats (using the Threat Response Matrix within the MTD management console).&lt;/li&gt;
	&lt;li&gt;For macOS desktops, augment the built-in malware scanner by also installing a reputable antivirus agent that updates its detection signatures and engine regularly.&lt;/li&gt;
	&lt;li&gt;For BYOD (Bring Your Own Device) deployments, create a deny list of disallowed apps on the device. For company-owned devices, create a allow list of allowed apps that can be installed on the device.&lt;/li&gt;
	&lt;li&gt;Backup data automatically onto a cloud storage provider like iCloud, Google Drive, OneDrive, Box or Dropbox. Make secondary and tertiary copies of backups using two or more of these personal storage providers since some offer free storage. Also, backup personal data onto a local hard drive that is encrypted, password-protected and disconnected from the device and network.&lt;/li&gt;
	&lt;li&gt;Create a Wi-Fi configuration that enables WPA3 Enterprise for your wireless connection when you are back in the office. At home, enable WPA3 Personal on your home router to secure your wireless connections from eavesdroppers.&lt;/li&gt;
	&lt;li&gt;Create a Web Content Filter configuration to limit access to adult content and specific websites prescribed by your company’s security and acceptable use policies. Ivanti UEM and MTD also provide a robust and multi-layered anti-phishing protection that updates the on-device engine’s database every 8 hours and is augmented by the cloud-based lookup engine’s database, which is updated every hour.&lt;/li&gt;
	&lt;li&gt;Create an Encrypted DNS (Domain Name System) configuration setting that enables DNS over HTTPS (DoH) or DNS over TLS (Transport Layer Security) (DoT) to encrypt and secure your DNS queries.&lt;/li&gt;
	&lt;li&gt;Configure a VPN client on a device like MobileIron Tunnel,&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/connect-secure-vpn"&gt;Ivanti Secure Connect&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-zero-trust-access"&gt;Zero Trust Access&lt;/a&gt;&amp;nbsp;to protect sensitive data-in-motion between the mobile device and MobileIron Sentry or Connect Secure or ZTA gateways.&lt;/li&gt;
	&lt;li&gt;Enable&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/quick-demo-ivanti-zero-sign-on" target="_blank" rel="noopener"&gt;Ivanti Zero Sign-On&lt;/a&gt;&amp;nbsp;(ZSO) for conditional access rules like trusted user, trusted device, and trusted app authentication to critical work resources on-premises, at the data center, or up in the cloud. Also, enable MFA (Multi Factor Authentication) using the stronger inherence (biometrics) and possession (device-as-identity or security key) authentication factors. Passwords and PINs can be phished, guessed or brute forced.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;em&gt;In the third blog in this series, we will discuss ransomware attacks and remediation of Windows 10 laptops and desktops. Stay tuned.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 10 Sep 2021 01:24:36 Z</pubDate></item><item><guid isPermaLink="false">cba1d3ab-e37b-4fb4-84c7-81d735fdc28e</guid><link>https://www.ivanti.com/en-au/blog/fighting-ransomware-using-ivanti-s-platform-to-build-a-resilient-zero-trust-security-defense</link><atom:author><atom:name>James Saturnio</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/james-saturnio</atom:uri></atom:author><category>Security</category><title>Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense</title><description>&lt;p&gt;Ransomware is a strain of malware that blocks users (or a company) from accessing their personal data or apps on infected iOS, iPadOS, and Android mobile devices, macOS laptops, Windows personal computers and servers, and Linux servers. Then the exploit demands cryptocurrency as payment to unblock the locked or encrypted data and apps. This form of cyber extortion has been increasing in frequency and ferocity over the past several years. Seemingly, a week does not pass without hearing about the latest ransomware exploit attacking government agencies, healthcare providers (including COVID-19 researchers), schools and universities, critical infrastructure, and consumer product supply chains.&lt;br&gt;
&lt;br&gt;
The most common delivery mechanisms are email and text messages that contain a phishing link to a malicious website. By tapping on the link, the user is redirected to an infected website where they unknowingly download drive-by malware onto their device. The malware can contain an exploit kit that automatically executes malicious programmatic code that performs a privilege escalation to the system root device level, where it will grab credentials and attempt to discover unprotected network nodes to infect via lateral movement.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" height="382" src="https://static.ivanti.com/sites/marketing/media/images/blog/fighting-ransomware-1.jpg" width="238"&gt;&lt;/p&gt;

&lt;p&gt;Another common delivery mechanism are email attachments that can also contain malware exploit kits that affix themselves to vulnerable apps, computer systems or networks to elevate their privileges in search of critical data to block.&lt;br&gt;
&lt;br&gt;
There are 4 main types of ransomware. First is the &lt;strong&gt;&lt;em&gt;locker&lt;/em&gt;&lt;/strong&gt; ransomware, where the earliest form on mobile devices was found on Android. It was detected in late 2013 and called &lt;strong&gt;&lt;em&gt;LockDroid&lt;/em&gt;&lt;/strong&gt;. It secretly changed the PIN or password to the user’s lock screen, preventing access to the home screen and to their data and apps.&lt;/p&gt;

&lt;p&gt;The second type are encryptor ransomware that employs encryption of apps and files making them inaccessible without a decryption key. The first exploit using this type of ransomware was found in 2014 and called &lt;strong&gt;&lt;em&gt;SimpLocker&lt;/em&gt;&lt;/strong&gt;. It encrypted the personal data contained within the internal Secure Digital (SD) storage of an Android device. Afterward, an official looking message showing criminal violations based on scanned files found in the device is displayed to the victim. This is followed by a demand for payment message that would allow the victim to resolve the fake violations and receive the decryption key to unlock their blocked data and apps.&lt;/p&gt;

&lt;p&gt;Extortion payments are often made with Monero cryptocurrency because it is digital and often untraceable, ensuring anonymity for the cybercriminals. Bitcoin is still sometimes used, but lately, companies like &lt;a href="https://cipherblade.com/" target="_blank" rel="noopener"&gt;CipherBlade&lt;/a&gt; have been able to track down ransomware gangs using Bitcoin and return the money back to victims. Rarely, mobile payment methods like Apple Pay, Google Pay or Samsung Pay are also used, but cryptocurrency is still the preferred payment for ransomware.&lt;/p&gt;

&lt;p&gt;Just within the past several years, cybercriminal gangs have added several more types of ransomware exploits including &lt;strong&gt;&lt;em&gt;Doxware&lt;/em&gt;&lt;/strong&gt;, which are threats to reveal and publish personal (or confidential company) information onto the public internet unless the ransom is paid. The other is &lt;strong&gt;&lt;em&gt;Ransomware-as-a-Service&lt;/em&gt;&lt;/strong&gt; (RaaS). Cybercriminals leverage already developed and highly successful ransomware tools in a RaaS subscription model, selling to lesser skilled cybercriminals to extort cryptocurrency from their victims and then share the ransom money.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/fighting-ransomware-2.png"&gt;&lt;/p&gt;

&lt;h2&gt;Android Exploits: Anatomy of the SimpLocker Attack&lt;/h2&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/fighting-ransomware-3.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Installation&lt;/strong&gt;: The victim unknowingly lands on malware compromised or Angler hosted web server and wants to play a video or run an app. The video or app requires a new codec or Adobe Flash Player update. The victim downloads the malicious update software and installs it, requiring device administrator permissions to be activated. The mobile device is infected, and the ransomware payload installs itself onto the device.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Communications&lt;/strong&gt;: The malware scans the contents of the SD card. Then it establishes a secure communications channel with the command and control (C2) server using the anonymous Tor or I2P proxy networks within the darknet. These networks often evade security researchers, law enforcement, and government agencies making it extremely difficult to shut them down.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encrypt Data&lt;/strong&gt;: The symmetric key used to encrypt the personal data on the attached SD card are kept hidden within the infected mobile device’s file system so the encryption can persist after reboots.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Extortion&lt;/strong&gt;: An official looking message from the FBI, Department of Homeland Security, or other government agency is displayed informing the victim that they are in violation of federal laws based on data found on the device after a scan of their personal files.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Demand Payment&lt;/strong&gt;: A demand-for-payment screen with instructions on the method of payment is then displayed. The &lt;em&gt;fine&lt;/em&gt; was normally $300 to $500 and commonly paid in cryptocurrency.&lt;/p&gt;

&lt;p&gt;If the ransom payment is made, the symmetric key is provided and used to decrypt the personal data. If the victim is fortunate, they can retrieve all their personal files intact, although there have been reports that some if not all the data are corrupted and no longer usable after they are decrypted.&lt;br&gt;
&lt;br&gt;
Android devices are especially susceptible to ransomware because of several factors. First is its global adoption with 72% of the worldwide market share and 3 billion devices around the world. Next is the 1,300+ original equipment manufacturers (OEM), along with the fragmentation of the Android operating system. Devices running versions from 2.2 to 11.0, means a very large number of them never receive a critical security update leaving them vulnerable to malware.&lt;/p&gt;

&lt;p&gt;The last factor is Android users routinely root their devices and install apps that are unverified by Google. There are now an estimated three million apps available for download just from the Google Play Store, with potentially a million more that can be downloaded from unknown and many malicious sources. Any one of these apps can be used to host malware that can lead to ransomware exploits.&lt;/p&gt;

&lt;h2&gt;Android Remediation&lt;/h2&gt;

&lt;p&gt;Here are the remediation tasks to help fight ransomware on Android devices.&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;These settings are configured within the Android device:&lt;img alt="" height="263" src="https://static.ivanti.com/sites/marketing/media/images/blog/fighting-ransomware-4.png" width="280"&gt;&lt;/strong&gt;&lt;br&gt;
1. By default, within the Google Settings and Security configuration, the Google Play Protect settings &lt;em&gt;Scan apps with Play Protect&lt;/em&gt; and &lt;em&gt;Improve harmful app detection&lt;/em&gt; are enabled. These settings are the equivalent to a resident antimalware agent on the device and should remain enabled.&lt;br&gt;
&lt;br&gt;
2. Within the Apps &amp;amp; notification and Special app access configuration is &lt;em&gt;Install unknown app settings&lt;/em&gt;. Leave storage, email and browser apps as &lt;em&gt;Not allowed&lt;/em&gt;, which is the default setting.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;These settings are configured within Ivanti UEM for Mobile or MobileIron Core:&lt;/strong&gt;&lt;br&gt;
3. For Android Enterprise devices, the above settings can be configured using the Lockdown &amp;amp; Kiosk configuration. Select &lt;em&gt;Enable Verify Apps&lt;/em&gt; and &lt;em&gt;Disallow unknown sources on Device&lt;/em&gt;&lt;em&gt; or&lt;/em&gt; &lt;em&gt;Disallow Modify Accounts&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;4. Create a System Update configuration to automatically update to the latest available Android OS version for the device. &lt;a href="https://www.ivanti.com/en-au/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense&lt;/a&gt; (MTD) can also enforce that the latest OS version is running on the Android device and if not, alert the user and UEM administrator that the device is running a vulnerable OS version and apply compliance actions like block or quarantine until the device is updated.&lt;/p&gt;

&lt;p&gt;5. Enable Ivanti MTD on-device (using MTD Local Actions) and cloud-based to provide multiple layers of protection for phishing (Anti-phishing Protection) and device, network and app level threats (using the Threat Response Matrix within the MTD management console).&lt;br&gt;
&lt;br&gt;
6. Create a SafetyNet Attestation configuration that checks for device integrity and health every 24 hours via Google APIs.&lt;br&gt;
&lt;br&gt;
7. Create an Advanced Android Passcode and Lock Screen configuration to turn on multi-factor authentication (MFA) for the lock screen and work profile challenge using a biometric fingerprint, face unlock, or iris (eye) scan instead of a passcode or PIN.&lt;br&gt;
&lt;br&gt;
8. Enable Device Encryption. This may sound counter-intuitive but encrypting your personal and work data on the device can prevent the cybercriminals from threatening to publish your work or company information online.&lt;br&gt;
&lt;br&gt;
&lt;img alt="" height="451" src="https://static.ivanti.com/sites/marketing/media/images/blog/fighting-ransomware-5.jpg" width="212"&gt; 9. Backup data automatically onto a cloud storage provider like Google Drive, OneDrive, Box or Dropbox. Make secondary and tertiary copies of backups using two or more of these personal storage providers since some offer free storage. Also, backup personal data onto a local hard drive that is encrypted, password-protected and disconnected from the device and network.&lt;/p&gt;

&lt;p&gt;10. Enable Android Enterprise or Samsung KNOX on the device to containerize, encrypt, and isolate the work profile data from your personal data in BYOD or COPE deployments. Android Enterprise in the various deployment modes and Samsung KNOX can be provisioned by &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/autonomous-endpoint-management/mobile-device-management"&gt;Ivanti UEM for Mobile&lt;/a&gt; or &lt;a href="https://help.ivanti.com/mi/help/en_US/core/10.7.0.0/gsg/Content/CoreGettingStarted/MobileIron_Core_overview.htm" target="_blank" rel="noopener"&gt;MobileIron Core&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;11. For BYOD deployments, create a blacklist of disallowed apps on the device. For company-owned devices, create a whitelist of allowed apps that can be installed on the device. Both settings can be configured within MobileIron Core’s App Control feature and applied to the security policy. For Android Enterprise devices, Restricted Apps and Allowed Apps can be applied to the Lockdown &amp;amp; Kiosk configuration or Create an App Control configuration to whitelist or blacklist apps within the personal profile side of the device. This can also be configured within Ivanti UEM for Mobile’s Allowed App settings and Policies &amp;amp; Compliance.&lt;/p&gt;

&lt;p&gt;12. Configure a VPN client on the device like MobileIron Tunnel, &lt;a href="https://www.ivanti.com/en-au/products/connect-secure-vpn"&gt;Ivanti Secure Connect&lt;/a&gt; or &lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-zero-trust-access"&gt;Zero Trust Access&lt;/a&gt; to protect sensitive data-in-motion between the mobile device and MobileIron Sentry or Connect Secure or ZTA gateways.&lt;/p&gt;

&lt;p&gt;13. Enable &lt;a href="https://www.ivanti.com/blog/quick-demo-ivanti-zero-sign-on" target="_blank" rel="noopener"&gt;Ivanti Zero Sign-On&lt;/a&gt; (ZSO) for conditional access rules like trusted user, trusted device, and trusted app authentication to critical work resources on-premises, at the data center, or up in the cloud. Also, enable MFA using the stronger inherence (biometrics) and possession (device-as-identity or security key) authentication factors. Passwords and PINs can be phished, guessed or brute forced.&lt;/p&gt;

&lt;p&gt;14. As a last resort, there are anti-malware vendors that provide software to detect and remove ransomware from an infected device. The user can also boot the device into Safe Mode, deactivate the Device Administrator for the malware, and then uninstall it.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;In the next blog in this series, we will discuss ransomware attacks and remediation on iOS and iPadOS mobile devices, and macOS laptops and desktops.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 03 Aug 2021 22:41:56 Z</pubDate></item></channel></rss>