What We Do
How we do it
Resources
SECURITY ADVISORIES
Jul 26, 2021
PetitPotam NTLM Relay Attack
THE THREAT PetitPotam is a variant of NTLM Relay attacks discovered by security researcher Gilles Lionel. Proof of Concept code released last week [1] relies on the Encrypting File System Remote (EFSRPC) protocol to provoke a Windows host into performing an NTLM authentication request against an attacker-controlled server, exposing NTLM authentication details or authentication certificates.…
Read More
View all Advisories →
Company
ABOUT eSENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Jul 12, 2021
Tecala and eSentire Partner to Protect Enterprises across APAC from Business-Disrupting Cyber Attacks
Sydney, 12 July, 2021 - Tecala, Australia’s award-winning technology services and IT consulting provider, today announced it has chosen eSentire, the global Authority in Managed Detection and Response (MDR) cybersecurity services, as their exclusive MDR solution provider in Australia and New Zealand. This partnership will enable Tecala to augment its cybersecurity practice and offer enterprises…
Read More
Partners
PARTNER PROGRAM
Partners
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
Resources
Blog — Jul 28, 2020

Mitigating risk and navigating the evolving cyber-threat landscape

3 min read

Originally posted in teiss July 21, 2020

In a globally connected world, there are few professions not affected by major world events such as an economic recession or a pandemic. Cyber-criminals, however, see changing circumstances as opportunities to capitalise on crisis. The practices of social or physical distancing are in fact the modus operandi of the modern hacker. All that is needed is a secure internet connection.

Today, cyber-security budgets outpace IT budgets by a factor of 10 to one. Despite this, the global impact of cyber-crime has recently been cited as around 1.6 per cent of GDP, north of a trillion US dollars. Organisations of all sizes continue to be regularly breached, with 46 per cent of UK businesses experiencing “any kind of cyber-security breach or attack in the last 12 months”. Some have come under scrutiny for taking a woefully lackadaisical approach to protecting the interests of their customers. Others – Travelex being the poster child – have fallen prey to a far more sophisticated form of ransomware paired with extortion, which caught the company in the crosshairs because of its inability to clearly respond and communicate to customers. The ransom paid was $2.3 million, and subsequent disruption is said to have cost the firm £25 million.

In eSentire’s recent UK Threat Intelligence Spotlight, we discussed three emerging macro-trends relating to cyber-criminal activity across our customer base. The first, similar to the Travelex example, is the increase in so called “hands on keyboard” attacks. Sophisticated and targeted, these attacks evade traditional defences and take advantage of remote access or mainstream software tools to exploit firms. Attackers play the long game and invest in looking for a higher financial payoff from victims, resulting in extensive operational disruption and reputational damage. A parallel concerning trend is that this seems to be working in some cases, as organisations from various industries would rather pay a ransom than risk further disruption or loss of intellectual property.

The second trend observed is that hacker groups are becoming more organised and operating to maximise profitability. The notorious ransomware syndicate Netwalker significantly ramped its operational activity through the Covid-19 pandemic, increasing recruitment for Ransomware-as-a-Service (RaaS), which includes a network intrusion-focused affiliate programme whereby vetted participants can claim an 80 per cent share of any successful ransom paid. There is also the rise of commodity malware, with adversaries operating through covert networks to leverage best practice. Available for sale through the darkweb, and priced between $50 to $5,000, are a range of a la carte menu items including data stealers, banking trojans and ransomware builders. And don’t worry about training, it’s available in detail via YouTube.

Finally, using existing tools and software to exploit vulnerabilities in system or human error is a common theme. Good examples of this are how cloud applications such as Office365 can be leveraged as a more tailored, efficient distribution outlet for phishing. This is no longer a smash-and-grab tactic.

Although adversaries prevail and the risks are high, the outlook does not need to be apocalyptic. The old cliché that cyber-security requires the right combination of people, process and technology still rings true, especially where the costs of operational disruption and reputational damage are potentially as, or more, damaging to an affected business than fines imposed by a regulatory authority. Approaches for many will be different and specific, but what we do know is that while traditional preventative tools are still essential, they are more easily bypassed. Businesses need to prepare for the reality that an event will occur, identify areas of key business risk, have the right technology and people in place, establish processes to ensure rapid response in order to minimise disruption – and then prepare again.

For further insights and observations read our full UK Threat Intelligence Spotlight here.

Alex Jinivizian
Alex Jinivizian Vice President, Strategy and International Marketing