Security Risk Advisors Announces Launch of VECTR Enterprise Edition
Philadelphia, United States, 1st August 2024, CyberNewsWire
The post Security Risk Advisors Announces Launch of VECTR Enterprise Edition appeared first on Security Boulevard.
Philadelphia, United States, 1st August 2024, CyberNewsWire
The post Security Risk Advisors Announces Launch of VECTR Enterprise Edition appeared first on Security Boulevard.
Why zero trust is the new gold standard in cybersecurity Why zero trust is the new gold standard in cybersecurity Zero Trust: The Cornerstone of Modern Cybersecurity Zero Trust: The Cornerstone of Modern Cybersecurity The ever-changing digital terrain has rendered the formerly dependable castle-and-moat strategy for cybersecurity—which relied solely on firewalls—obviously insufficient. A more all-encompassing […]
The post Why zero trust is the new gold standard in cybersecurity appeared first on Cyber security services provider, data privacy consultant | Secureflo.
The post Why zero trust is the new gold standard in cybersecurity appeared first on Security Boulevard.
Fraud in the travel industry can cost your business in direct losses, reputational damage, and negative customer experience. It’s more important than ever for businesses in the travel and hospitality industry to protect themselves and their customers from sophisticated fraudsters.
The post Fraud in the Travel Industry & How to Prevent It appeared first on Security Boulevard.
Authors/Presenters:Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, Yuval Yarom
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
The post SENIX Security ’23 – Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs appeared first on Security Boulevard.
As the CEO of HYAS, I am both honored and privileged to announce our partnership with the National Child Protection Task Force (NCPTF), a 501(c)(3) non-profit organization dedicated to assisting law enforcement in their crucial efforts to combat child exploitation, expose predators, and locate missing youths.
HYAS will share our industry-leading threat intelligence and investigation platform to help the organization identify, track and attribute criminal activity more quickly and efficiently. This partnership reflects our unwavering dedication to leveraging our cutting-edge cybersecurity solutions not just to protect organizations and people around the world from ransomware, supply-chain, phishing, and other attacks, but to also protect the most vulnerable members of our society and combat human trafficking and child exploitation.
The NCPTF, with its mission to support law enforcement in matters involving missing and exploited youths, is a beacon of hope for countless families and communities. Their tireless work has made a tangible difference in the lives of many, and at HYAS, we are eager to lend our expertise to advance this noble cause.
Last year we announced our support and collaboration with the Anti-Human Trafficking Initiative (ATII), and in a similar fashion we aim to enhance the investigative capabilities of NCPTF with our expert knowledge of cybercriminal adversary infrastructure, campaigns, and networks as the experts in adversary infrastructure “VRA” or Verdicts, Related Infrastructure, and Attribution. We are proud to help do good in the world, and we’re grateful for the opportunity to be of service to these esteemed organizations.
Enhancing Investigations with HYAS InsightHYAS Insight threat intelligence is a powerful tool designed to deliver unparalleled visibility into cyber threats, enabling not just efficient and effective threat and fraud hunting but actual proactive activities and capabilities. By integrating HYAS Insight into the NCPTF's investigative processes, we are providing them with the ability to:
Identify and Track Cyber Threats: Our platform offers real-time data and analysis on cyber threats, allowing the NCPTF to identify and track malicious activities that may be linked to child exploitation.
Strengthen Investigative Efforts: With comprehensive intelligence on threat actors and their tactics, techniques, and procedures (TTPs), the NCPTF can strengthen their investigative efforts, making it easier to locate and protect missing and exploited youths.
Close Cases Faster: HYAS Insight clients have told us that their use of the solution allowed them to close cybersecurity cases three times faster than without it and our hope is that in a similar vein, the HYAS Insight will accelerate the good work that the NCPTF does across a variety of investigations and scenarios.
A Shared Commitment to Protecting the VulnerableAt HYAS, our core mission is to make the world a safer place by providing innovative cybersecurity solutions, utilizing our expertise, unique data, and resulting intelligence on all aspects of adversary infrastructure. Our partnership with the NCPTF is a natural extension of this mission, as we believe that protecting children from exploitation and harm is one of the most critical responsibilities we can undertake.
As Larry Cameron from the Anti-Human Trafficking Initiative said, “you need the data HYAS has to be able to see what’s not in plain sight” and that’s exactly our goal in helping the NCPTF. Their dedication to assisting law enforcement and helping people is truly inspiring, and their work is a testament to the power of collaboration and the impact that can be achieved when we come together with a shared purpose. By working with the NCPTF, we are not only contributing our technology and expertise but also standing alongside countless individuals and organizations committed to making a difference.
Looking AheadAs we move forward, HYAS will continue to not only protect all aspects of critical infrastructure around the world, but make sure that we support the NCPTF, ATII, and other organizations dedicated to protecting children and society’s most vulnerable. I am proud of the work our team at HYAS is doing to continuously evolve our technologies and expand our efforts to combat cyber threats, and we are looking forward to the positive impact our partnership with the NCPTF will have.
Together, we can make significant strides in the fight against child exploitation and create a safer world for children.
With HYAS Insight integrated into their toolset, the Anti-Human Trafficking Initiative (ATII) was able to drastically cut the average time it took to close cases and move away from a time-consuming manual process that involved using WHOIS lookups on IPs and domains.
Get the details
David Ratner
CEO, HYAS
Ready to step up your defensive game? Learn how HYAS solutions can transform your cybersecurity strategy from reactive to proactive.
The post Partnering With the National Child Protection Task Force appeared first on Security Boulevard.
Google is adding greater encryption capabilities to Chrome to better protect users from information-stealing malware, a move that comes after the company's controversial decision to once again delay getting rid of third-party cookies.
The post Google Using Enhanced Encryption to Protect Cookies appeared first on Security Boulevard.
via the comic & dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Olympic Sports’ appeared first on Security Boulevard.
Even within organizations that have achieved a mature security posture, targeted NTLM relay attacks are still incredibly effective after all these years of abuse. Leveraging several of these NTLM relay primitives, specifically ones that require coercing SMB-based authentication, come with additional challenges to overcome while operating over command and control (C2). This technique will the ease abuse of several popular NTLM relay primitives by allowing attackers to control inbound 445/tcp traffic without loading a driver, loading a module into LSASS, or requiring a reboot of the target Windows machine.
IntroductionWhen conducting a penetration test or red team from a device that can directly route into a target network, there is often a straightforward path to control inbound SMB-based traffic on port 445/tcp. Common scenarios include a Windows laptop plugged directly into ethernet, a deployed Linux virtual machine, VPN accessibility, etc.
In the case of Windows, the `LanmanServer` service can be disabled, followed by a reboot, and the Windows kernel is no longer bound to the target port. In the case of a Linux machine, having escalated privileges on your testing device will allow for binding to the target port.
However, conducting your offensive assessment through a C2 agent includes a few additional hurdles to overcome. A commonly problematic step is gaining is gaining control of inbound SMB-based authentication attempts on port 445/tcp from a compromised Windows host.
If you’re interested in skipping the technical analysis and getting straight to the solution, see the Implementation Summary section.
Existing Solutions WinDivert driverThe WinDivert driver is described as a “a user-mode packet interception library that enables user-mode capturing/modifying/dropping of network packets sent to/from the Windows network stack”. Many popular open-source projects have been created to leverage this driver to redirect inbound SMB-based authentication, such as PortBender, SharpRelay, StreamDivert, DivertTCPconn, hwfwbypass, and more.
LsarelayxThe lsarelayx by @_EthicalChaos_ is a “system wide NTLM relay tool designed to relay incoming NTLM based authentication to the host it is running on” by leveraging “a fake LSA authentication provider to hook the NTLM and Negotiate packages and facilitate redirecting authentication requests”.
Disabling LanmanServer w/ RebootThe LanmanServer service can simply be set to a ‘disabled’ start type. When the Windows machine is rebooted, 445/tcp will no longer be bound by the kernel.
OPSEC ConsiderationsLeveraging a driver for post-exploitation involves several considerations, such as potential for BSOD. This is a risk we cannot afford to take in certain situations. Especially when conducting activities on high-uptime, critical infrastructure. Loading a driver, especially one publicly associated with popular abuse primitives, can also be a single point of failure regarding detection and prevention.
Loading a customer LSA authentication provider can come with similar risks, as it can affect the stability of the LSASS process. You could be one incorrectly handled error away from a forced reboot depending on your code. As a Microsoft-specific limitation of how LSA plugins work, the provider also cannot be unloaded until a reboot occurs (without getting creative).
Disabling the LanmanServer service also requires either forcing, or waiting for, a reboot of the target machine. This often isn’t an option due to time constraints or high-uptime needs of a production environment.
Ideally, we would be able to control traffic inbound on the target port without loading a driver, loading a module into LSASS, or rebooting the target machine.
Technical Analysis Prerequisite NotesAs previously mentioned, configuring the `LanmanServer` service to a start type of `disabled` and rebooting Windows will result in the machine no longer being bound to 445/tcp by default. Another important note — when reconfiguring the `LanmanServer` service back to the default start type of `auto start` and manually starting the service, the Windows machine will again bind to 445/tcp and reloading all the necessary resources to resume normal SMB-based functionality. Remember, the goal here is to do something to release this port without requiring a reboot, loading a driver, or loading a module into LSASS. Being able to repeat and debug the same thing in reverse (i.e., binding to the port) will be helpful for understanding the potential associated code path(s) for our desired result.
Initial Items of InterestTo start, let’s verify what is binding to the port we are interested in. Here’s one way to do this quickly, using PowerShell:
PS C:\> Get-NetTCPConnection -LocalPort 445 | ForEach-Object { Get-Process -Id $_.OwningProcess }So we know the process with a handle to the socket bound on 445/tcp is `System`, and we can begin looking at loaded modules/drivers associated with opening and closing sockets. Using System Informer to obtain a list of loaded modules is a good starting point for this enumeration. After reading through driver names, descriptions, and definitely not using ChatGPT, the initial list for inspection was narrowed down to:
NOTE: Winbindex was used to ensure the same binaries were being analyzed on the remote machine during dynamic analysis and locally during static analysis.
The next objective was to identify function(s) within these drivers used to bind to the SMB-related port. IDA Free was used to conduct initial inspection for potentially related functions, and thanks to Microsoft symbols, several were found. Searching function names for related keywords such as “port”, “socket”, and “bind”, some of the functions initially identified included:
The target Windows VM was configured to enable kernel debugging. To make the action of binding to 445/tcp a repeatable behavior, the VM was also configured with the `LanmanServer` service to a start type of `disabled` and rebooted (mentioned in Prerequisite Notes). Once the machine was no longer listening on the port in question, the VM was snapshotted for easily repeatable behavior. This was coupled with a simple PowerShell one-liner (below) to quickly iterate over the action of rebinding to 445/tcp while using WinDbg.
Set-Service -Name "lanmanserver" -StartupType Automatic; Start-Service -Name "lanmanserver"Breakpoints were set on many of these interesting functions, which eventually led to the inspection of `tcpip!InetAcquirePort`. A breakpoint set for this function was reliably hit when `LanmanServer` was restarted (i.e., when the port was being bound). To ensure this activity was associated with the binding of port 445, I wanted to see the port number passed in function call parameters. Early in the logic of the `tcpip!InetAcquirePort` function, there was a call to another function, `tcpip!IsPortInExclusion`.
ExAcquireResourceExclusiveLite(a1, v16);As seen above, the ‘tcpip!IsPortInExclusion’ function took two parameters. The second parameter was an `unsigned __int16`, which could likely represent a port number between 0–65535. Using the standard fastcall calling convention, this parameter should appear in the RDX register. Stepping through execution of `tcpip!InetAcquirePort` until `tcpip!IsPortInExclusion` was called and obtaining the RDX register value looked like this:
1: kd> pSo we know this function call is associated with the binding of port 445 when starting the `LanmanServer` service. What information can we gather from the call stack (below) and how we got to this function call? Where can we start in terms of attempting to unbind this port while considering our given prerequisites?
[0x0] tcpip!InetAcquirePort+0xbaeWe have several places we can continue on from this point. My first thought was to identify functionality exposed by these drivers, through device I/O control codes (IOCTLs) for example. Something more straightforward was identified first, though.
Starting with the `srvnet.sys` driver, I attempted to identify similar functions to what was previously identified when debugging 445/tcp being bound. Referencing our call stack from before, we see the `srvnet!SrvNetWskOpenListenSocket` function. Stepping back through the cross-references, we see another function call that is comparable to the functions used to bind to the target port. In this case we see `srvnet!SrvNetCloseEndpoint` calling `srvnet!SrvNetWskCloseListenSocket`, similarly to `srvnet!SrvNetAllocateEndpoint` calling `srvnet!SrvNetWskOpenListenSocket` previously observed.
Checking the cross-references for `srvnet!SrvNetAllocateEndpoint` yields several more results. After manual triage, it was identified that one of those several cross-references (`srvnet!SrvNetCleanupDeviceExtensionPreScavengerTermination`) was called by `srvnet!DriverUnload`.
This is the part where I thought to myself… “no way it’ll be this easy”. If we can use the Service Control Manager (SCM) to stop the service associated with the srvnet.sys driver, would the target code path leading to the release of port 445 be reached?
Service Dependents and ConfigurationThe `LanmanServer` service is configured with a start type of `auto start` by default. We will first configure this to `disabled` to prevent it from restarting, for testing purposes.
Stopping the `srvnet` service, responsible for loading the `srvnet.sys` driver should make use of the Service Control Manager (SCM) to ultimately call `srvnet!DriverUnload`. However, using System Informer we can quickly determine that `srvnet` has two dependent services:
So both of these services must first be stopped before attempting to stop the target service. The `srv2` service also has a dependency of `LanmanServer`. Stopping these services in the following order (based on the previously mentioned dependencies) should allow for all three of the services in question to be stopped:
We now see the first major indicator that our assumption might be correct. The port 445/tcp is no longer locally bound.
PS C:\Windows\system32> Get-NetTCPConnection -LocalPort 445To further validate our assumptions, we can return to the kernel debugger. When we were previously getting a better understanding of the binding process, we set a breakpoint on `tcpip!InetAcquirePort`. Similarly, there is a function in the same driver that will likely reveal what we are looking for when unbinding, `tcpip!InetReleasePort`. We can reconfigure the services to their original state (or just revert the VM) and set the appropriate breakpoint using WinDbg.
Upon repeating reconfiguring and disabling of target services, the breakpoint is hit:
0: kd> gWe don’t immediately see “445” as an argument passed to the function, so to make sure this is our activity that cause the breakpoint let’s take a quick look at the function’s pseudocode in IDA free.
__int64 __fastcall InetReleasePort(__int64 a1, __int64 a2, __int64 a3, __int64 a4)The variable of `v4` is declared as an `__int16`, which helped us previously identify the port being used in the `tcpip!InetAcquirePort` call during the binding process. This variable is used shortly thereafter when calling the `tcpip!IsPortInExclusion` function, where it should appear in the `rdx` register (as the second parameter for that function). We set another breakpoint for `tcpip!IsPortInExclusion`, hit the additional breakpoint, and see that port 445 is the target of this activity.
0: kd> gNow we have our validation that the following behavior, from simply interacting with the Service Control Manager (SCM), is achieved:
Implementation SummaryI’ve published two tools (Python and BOF format) to automate abuse of this technique, and the code can be found on Github. They both include simple commands of “check”, “stop”, and “start” to automate the Service Control Manager interactions discussed in the previous section.
Operational Usage NotesYou don’t need to use my PoCs, as you can just use your favorite tool to manage services remotely or locally. Below I’ve included some example commands of using ‘sc.exe’ proxied into a network from remote Windows machine, as well as ‘wmiexec-Pro’:
sc.exe
wmiexec-Pro
NOTE: Disabling these services effectively hinders the target machine’s ability to facilitate named pipe / SMB communication. This is important to know for two reasons:
1. If the target machine is a server that is, let’s say, a large file share server, it will no longer be able to serve its function.
2. If you disable these services on a remote machine, and the tools you’re using rely on RPC over named pipes (ncacn_np) for Service Control Manager interactions, you will not be able to re-enable them remotely. The examples I’ve given above, as well as my PoCs, make use of RPC over TCP (ncacn_ip_tcp), which should not be affected.
A big perk of this technique is that re-enabling SMB functionality to its default state is a straightforward task and takes effect immediately. You can just set the LanmanServer service to a start-type of “auto-start” again, and a service trigger will soon reenable the service itself which will reload all the necessary drivers and resources to resume normal functionality. If you don’t want to wait, you can just manually start the LanmanServer service again.
Demohttps://medium.com/media/3bf3f58ae1a7ba15ba1b1d38d95b6d4e/href
ConclusionMy hope is that this technique provides a “lower-touch” alternative to existing solutions for taking control of port 445/tcp on compromised Windows hosts while operating over C2. My code to automate this can be found on GitHub and if you’re using other tools, be sure to determine if they use ‘ncacn_np’ vs ‘ncacn_ip_tcp’ to avoid issues with re-enabling remotely.
Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover was originally published in Posts By SpecterOps Team Members on Medium, where people are continuing the conversation by highlighting and responding to this story.
The post Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover appeared first on Security Boulevard.
Data breaches are on the rise. In the US, last year broke new records in terms of breach volumes. The bad news is that costs are also increasing. The latest IBM study reveals that they surged 10% annually to reach nearly $4.9m on average in 2024. Although there are several mooted causes of this rise, one of the most critical appears to be the growing challenge of shadow data.
The post As Breach Costs Surge, Companies Need a Better Way to Find Shadow Data appeared first on Security Boulevard.
It may feel like beating a dead horse to say it, but the threat of software supply chain attacks is increasing at an alarming rate. And, in fact, it can’t be said too often.
Two recent reports illustrate this point: The "2024 Verizon Data Breach Investigation Report" (DBIR) found that breaches stemming from third-party software development skyrocketed by 68% from what was reported in Verizon’s 2023 report. And ReversingLabs’ "State of Software Supply Chain Security 2024" report chronicled the dramatic rise in threats from open-source repositories (1300%), as well as a string of high-profile attacks on commercial software — from SolarWinds' Orion update that was released to thousands of firms and federal agencies in 2020 to the exposure of CircleCI users’ software secrets and the hack of VoIP vendor 3CX in 2023.
As software producers, enterprise buyers, and other key stakeholders prepare their cybersecurity and risk management efforts for 2025, they should be looking for ways to prevent and quickly mitigate any and all software supply chain attacks. But modern enterprise security programs suffer from a sprawl of uncoordinated tools and continually fail at achieving software supply chain security (SSCS). This calls for a new era of SSCS management, one in which universal controls can prioritize the mitigation of these threats.
ReversingLabs is now introducing the Software Assurance Foundational Evaluation (SAFE) report as a part of RL Spectra Assure. This report is much more than the simple list of components that a software bill of materials (SBOM) provides, offering much-needed visibility into the risks and threats in the entire application or software binary, in context.
Here’s how Spectra Assure’s new SAFE Report works — and why the time for SAFE is now.
The post Why SAFE. Why Now. appeared first on Security Boulevard.
Authors/Presenters:Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoyang Huang, Shoumeng Yan, Zhengyu He
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
The post USENIX Security ’23 – SHELTER: Extending Arm CCA with Isolation in User Space appeared first on Security Boulevard.
2 min read Journey with us through the identity cosmos, where understanding and safeguarding both humans and non-humans is mission-critical.
The post The Enterprise Identity Universe: Users, Non-Humans, and Consumers [Infographic] appeared first on Aembit.
The post The Enterprise Identity Universe: Users, Non-Humans, and Consumers [Infographic] appeared first on Security Boulevard.
A primer on how to best prepare for the migration to PQC The United Nations has proclaimed 2025 the International Year of Quantum Science and Technology—and for good reason. Across the globe, the quantum community is making monumental strides toward building stable, commercially viable quantum computers. As the vision of quantum technology entering mainstream applications […]
The post 8 Essential Considerations for Post-Quantum Cryptography Migration appeared first on Security Boulevard.
MEDIA ADVISORY Presenters at Microsoft Booth 1240 will also show how Strata’s Maverics “Disconnected Mode” enables identity continuity and maintains uninterrupted access to apps when internet connectivity is unavailable BOULDER, Colo., Aug. 1, 2024 — Strata Identity, the Identity Orchestration company, today announced that as a member of the Microsoft Intelligent Security Association (MISA) it...
The post Strata Identity to Demonstrate How to Modernize Legacy Identity Systems to Microsoft Entra ID at Black Hat 2024 appeared first on Strata.io.
The post Strata Identity to Demonstrate How to Modernize Legacy Identity Systems to Microsoft Entra ID at Black Hat 2024 appeared first on Security Boulevard.
This article is the fifth in a series of five covering key API security topics and provides some answers to common questions we often get when talking to potential customers. The series will cover the following topics: API Discovery API Posture Management Attack Protection API Security Testing Attack Detection and Threat Hunting (this article) API […]
The post Attack Detection and Threat Hunting – Common Topics We’re Asked About appeared first on Cequence Security.
The post Attack Detection and Threat Hunting – Common Topics We’re Asked About appeared first on Security Boulevard.
The post The Cyber Fallout: Navigating the Aftermath of a Credit Union Breach appeared first on Votiro.
The post The Cyber Fallout: Navigating the Aftermath of a Credit Union Breach appeared first on Security Boulevard.
Where to Begin With thousands of unfilled positions reported year over year, why is it so hard to get a […]
The post One Does Not Simply … Get a Cybersecurity Job appeared first on Security Boulevard.
Nisos
Building Trustworthy AI: Contending with Data Poisoning
As Artificial Intelligence (AI) and Machine Learning (ML) systems are adopted and integrated globally, the threat of data poisoning attacks remains...
The post Building Trustworthy AI: Contending with Data Poisoning appeared first on Nisos by Nisos
The post Building Trustworthy AI: Contending with Data Poisoning appeared first on Security Boulevard.
Revolutionizing security testing with continuous security validation.
The post Democratizing Defense: AttackIQ Flex 2.0 Empowers Every Organization appeared first on AttackIQ.
The post Democratizing Defense: AttackIQ Flex 2.0 Empowers Every Organization appeared first on Security Boulevard.
In the ultramodern, mercurial sphere of cybersecurity, somehow a 1700-year-old quote from Helena of Constantinople still deeply resonates. Even with seemingly robust defenses, the smallest vulnerability can be an open invitation for threats like AsyncRAT to infiltrate your system, underscoring the importance of continuous testing to ensure that your existing controls - your rat traps - are functioning effectively.
The post Rat Traps: Emulating AsyncRAT with AttackIQ Flex appeared first on AttackIQ.
The post Rat Traps: Emulating AsyncRAT with AttackIQ Flex appeared first on Security Boulevard.