What We Do
How we do it
Nov 22, 2021
Microsoft Exchange Vulnerability - CVE-2021-42321
THE THREAT eSentire has identified publicly available Proof-of-Concept (PoC) exploit code, for the critical Microsoft Exchange vulnerability CVE-2021-42321. CVE-2021-42321 was announced as part of Microsoft’s November Patch Tuesday release. Exploitation would allow a remote threat actor, with previous authentication, to execute code on vulnerable servers. Prior to the patch release, Microsoft…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Oct 28, 2021
Telarus and eSentire Expand Partnership to Safeguard Enterprises Globally Against Business Disrupting Ransomware and Zero-Day Attacks
London, UK and Sydney, Australia– Oct. 28, 2021 - eSentire, recognized globally as the Authority in Managed Detection and Response (MDR), today announces the expansion of its partnership with Telarus, the largest privately-held distributor of business cloud infrastructure and contact centre services. Building on their mutual success across North America, Telarus will bring eSentire’s Managed…
Read More
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
Apply today to partner with the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Blog — Jun 28, 2017

Everything you need to know about GoldenEye

Speak With A Security Expert Now

eSentire is closely monitoring the Petya (AKA GoldenEye) ransomware outbreak currently impacting businesses and critical infrastructure across Europe and the United States. GoldenEye is a particularly nasty strain of Petya ransomware that leverages the bones of Petya, but course-corrects weak spots in the original Petya strain. Like its predecessor, the GoldenEye variant makes the chance of successful decryption without a key is very low. Attackers improved the effectiveness of the malware by leveraging exploits associated with a the tools leaked by the “shadow brokers” earlier this Spring. Early indicators suggest that companies with out-of-date system patches are most susceptible.

Businesses relying solely on antivirus will also face increased risk, as most AV systems will be incapable of detecting GoldenEye - new hashes are likely to emerge quickly, which means that traditional AV will have difficulty keeping up.

How it works:

Similar to WannaCry, this attack spreads via Microsoft’s SMBv1 vulnerability. When Petya (a known ransomware), is introduced to a compromised machine it leverages a credential extraction mechanism like MimiKatz, a tool used to extract plaintext passwords. Once inside the network, the malware launches an account escalation attack; it steals credentials from the compromised system to facilitate user account hijacking while simultaneously encrypting the entire hard drive. Based on our lab analysis, we have confirmed that the ETERNALBLUE exploit is one of the propagation vectors. There are also indications of other propagation network mechanisms, among them WEbDAv on admin $ shares and possibly WMIC.

Unlike WannaCry, researchers have yet to discover a kill switch, however there is a possible “vaccine” functionality within the malware. Some claim that Petya checks for a read-only file, C:\\Windows\perfc.dat, and if it finds it, encryption will not run. The vaccine mechanism does not remediate the threat or stop the infection though, as the malware will likely use other functionalities in its attempt to spread across an infected organization.

This attack is evolving by the hour and while researchers have yet to definitively pinpoint malware delivery, most cases indicate that phishing, waterhole attacks and/or a weaponized USB may have served as the entry point to impacted organizations.

Worth the hype?

Since 2016, ransomware attacks have gradually ramped up. Attackers have refined malware delivery, spread mechanisms and even the customer-centric ransom payment process. What’s troubling is that the time between attacks is shortening, and that attacks themselves are becoming more sophisticated. WannaCry shocked the world with its complexity and rapid spread. Its fileless delivery was a successful test of a relatively new technique. The fact that a researcher discovered the WannaCry kill switch was a lucky break. Odds are we won’t be so lucky this time. Unlike WannaCry, Petya/GoldenEye doesn’t appear to have a kill switch. Within a 24-hour period, the attack has crawled westward, paralyzing businesses, utilities, transportation systems and law firms from eastern Europe to the United States. Clearly, this attack is in its infancy. Companies lacking patch rigor and advanced detection and response capabilities will find themselves at greatest risk in the coming days as preventing and blocking GoldenEye requires more than standard AV.

What’s next?

The eSentire threat intelligence team has confirmed one variant associated with this attack, however broadly there are more than 50 different flavors of ransomware variants in the wild. Of those flavors, behaviors prompt the rapid deletion of files and exfiltration of data. Recently we’ve tracked a new variant which works to lock down passwords before encryption, making backup restoration particularly tricky. This attack amplifies the rapid evolution of ransomware; attacks are becoming more widespread, are moving faster, and are harder to kill. While this attack is hitting Europe harder than other countries (at the moment), it is moving quickly and businesses worldwide should treat this as the warning siren. Take this as an opportunity to ensure that offline backups and system patches are up-to-date, and tested.

While you’re at it, consider implementing these preventative measures, too:

View Most Recent Blogs
Eldon Sprickerhoff
Eldon Sprickerhoff Founder and Chief Innovation Officer

In founding eSentire, Eldon Sprickerhoff responded to the incipient yet rapidly growing demand for a more proactive approach to preventing and investigating information security breaches. Now with over twenty years of tactical experience, he is acknowledged as a subject matter expert in information security analysis.