Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Cyber risk and advisory programs that identify security gaps and build security strategies to address them.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Seamless integration and threat investigation across your existing tech stack.
Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Extend your team capabilities and prevent business disruption with expertise from eSentire.
We balance automated blocks with rapid human-led investigations to manage threats.
Guard endpoints by isolating and remediating threats to prevent lateral spread.
Defend brute force attacks, active intrusions and unauthorized scans.
Investigation and threat detection across multi-cloud or hybrid environments.
Remediate misconfigurations, vulnerabilities and policy violations.
Investigate and respond to compromised identities and insider threats.
Stop ransomware before it spreads.
Meet regulatory compliance mandates.
Detect and respond to zero-day exploits.
End misconfigurations and policy violations.
Defend third-party and supply chain risk.
Prevent disruption by outsourcing MDR.
Adopt a risk-based security approach.
Meet insurability requirements with MDR.
Protect your most sensitive data.
Build a proven security program.
Operationalize timely, accurate, and actionable cyber threat intelligence.
THE THREAT On November 18th, 2024, Palo Alto disclosed a critical actively exploited authentication bypass zero-day vulnerability impacting Palo Alto Networks PAN-OS. The…
Nov 13, 2024THE THREAT Update: eSentire has observed multiple exploitation attempts targeting CVE-2024-8069. In real-world attacks, threat actors successfully achieved RCE and attempted to…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Three MDR package tiers are available based on per-user pricing and level of risk tolerance.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
The file encryption and MBR infection code of NotPetya has now been carefully scrutinized and found lacking in many respects, sparking debate among researchers as to the true intent of the threat actors.
Here we take a closer look at the network spreading code, and how it finds new victims to infect.
The gathering of potential new infection targets is done in a separate thread that is created by the malware after the MBR is infected and the shutdown task scheduled:
NotPetya maintains a global list of infection targets that it collects from multiple sources. These include command-line parameters, connected subnets, DHCP servers, DHCP clients, ARP table entries, active TCP connections, and servers on the domain found via the network browser service.
IP addresses or hostnames to infect can be passed in via the -h command-line switch:
NotPetya enumerates all local network interfaces and scans the directly connected subnets for hosts that accept TCP connections on port 139 or 445. Any host that answers is added to the target list.
For any DHCP-enabled interface, the address of the DHCP server is added to the target list.
NotPetya uses the NetServerGetInfo API to determine if it is running on a server or domain controller. If so, it will then use the DhcpEnumSubnets, DhcpGetSubnetInfo and DhcpEnumSubnetClients API to enumerate all clients for which this server is acting as a DHCP server. It will then try to make a TCP connection to the SMB ports of each DHCP client. Any host that answers is added to the target list.
Every 3 minutes, NotPetya fetches a list of active TCP connections via the GetExtendedTcpTable API and adds the remote IP addresses of these connections to the target list. This is one way for hosts outside of the victim’s local Windows network can be selected as propagation targets.
IP addresses found in the local ARP cache are also added to the target list. The contents of the ARP cache are fetched every 3 minutes via the GetIpNetTable API.
Finally, NotPetya uses the browser service to list all servers visible in the Active Directory domain (NetServerEnum API). Any that are running on Windows 2000 or later are added to the target list.
Once the list of targets is gathered, the malware creates a network propagation thread that attempts to connect to the admin$ share of each target (using dumped credentials if available) and upload a copy of itself to it:
It will then try to remotely execute its copy, first via PsExec, and failing that, via WMIC:
A separate thread is responsible for SMB exploitation via ETERNALBLUE and ETERNALROMANCE.
As we can see, the network propagation code in NotPetya is optimized to efficiently enumerate and attack targets on a typical Active Directory domain. It is not limited to scanning just the local subnet, and is able to traverse entire enterprise networks with ease, especially when it is able to infect a DHCP server or domain controller. By enumerating active TCP connections present on the victim machine, NotPetya is capable of spreading to external/Internet targets as well, although stolen credentials are unlikely to work there, and SMB exploitation becomes the likelier infection mechanim to be effective against these targets.