Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Visibility and response across your entire Microsoft security ecosystem.
XDR with Machine Learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert threat hunting, original research, and proactive threat intelligence.
TRU is foundational to our MDR service. No add-ons or additional costs required.
Stop ransomware attacks before they disrupt your business.
Detect and respond to zero-day exploits.
Protect against third-party and supply chain risk.
Adopt a risk-based approach to cybersecurity.
Protect your most sensitive data.
Meet cybersecurity regulatory compliance mandates.
Eliminate misconfigurations and policy violations.
Prevent business disruption by outsourcing MDR.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and mediating threats to prevent lateral spread.
Enhance investigation and threat detection across multi-cloud or hybrid environments.
Remediate critical misconfigurations, security vulnerabilities and policy violations across cloud and containerized environments.
Detect malicious insider and identity-based behavior leveraging machine learning models.
Our Threat Response Unit (TRU) publishes security advisories, blogs, reports, industry publications and webinars based on its original research and the insights driven through proactive threat hunts.
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company's mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
We believe a multi-signal approach is paramount to protecting your complete attack surface. See why eSentire MDR means multi-signal telemetry and complete response.
See how our 24/7 SOC Cyber Analysts and Elite Threat Hunters stop even the most advanced cyberattacks before they disrupt your business.
Choose the right mix of Managed Detection and Response, Exposure Management, and Incident Response services to strengthen your cyber resilience.
Try our interactive tools including the MITRE ATT&CK Tool, the SOC Pricing Calculator, the Cybersecurity Maturity Assessment, and our MDR ROI Calculator.
Read the latest security advisories, blogs, reports, industry publications and webinars published by eSentire's Threat Response Unit (TRU).
See why 2000+ organizations count on eSentire to build resilience and prevent business disruption.
Like most New Year’s resolutions, most go off the rails by February. The hackers behind the Travelex attack didn’t wait that long to sound the GDPR and privacy alarms, and bring into light, new implications around transparency and timely notifications of data breaches. Plagued by a sophisticated ‘hands on keyboard’ ransomware attack, Travelex initially declared their global system outage as maintenance downtime via message on their website. One week later, they replaced the initial message with a press release announcing a cyberattack as of December 31, 2019.
The company’s press release on January 7, 2020 explains that their ongoing investigation confirmed that the ransomware attack was Sodinokibi (also referred to as REvil) which appeared in the wild back in April 2019. While the press release suggests that the attack occurred one week prior to public notification, the BBC news suggests the firm was compromised for up to six months, and hackers were demanding £4.6 million GBP ($6 million USD) to recover and preserve the data from further exposure and resale on the dark web.
Various sources have suggested that Travelex failed to patch its Pulse Secure VPN servers until early November 2019 despite repeated warnings flagged by the U.S. CISA, the U.S. National Security Agency and the UK's National Cybersecurity Centre in October 2019 that the vulnerabilities were being targeted and exploited by REvil.
This event confirms that ransomware attacks have transitioned from opportunistic nuisance, to something more sinister. This event demonstrates the destructive capability of systemic ransomware designed to cripple large organizations, rather than exploit small sums of cryptocurrency from individuals. We’ve left the age of transactional crime, and now live in one of targeted strikes seeking large sums of money (in this case, seven figures large).
Money is not the only thing at risk. The firm’s reputation is in jeopardy as well as having a major impact on its clients’ operations. In the UK, Travelex often acts as the ‘silent partner’ for many banks and finance organizations that provide foreign currency exchange. Since the incident took place, more than a dozen UK highstreet banks are unable to provide online travel money services, and some customers that ordered currency prior to the incident have been left out of pocket (and the Travelex website still remains down today - January 15, 2020).
The hackers also threatened Travelex with the exposure and wholesale dumping of stolen data if the firm fails to pay the extortion fee. And maybe that’s the point. It’s no longer simplistic ransomware, but bigfish extortion. It’s a new game and one that is no longer about returning files, but rather about preventing exposure of information that compromises the reputation of the victim.
As the company resorted to pen and paper to operate, critical PII (personal financial information like credit card numbers, date of birth and other sensitive information) are at risk of exposure. The criminals have the company in a terminal grip. Often healthcare organizations are subjected to aggressive ransoms, but not in this amount, and not with such a venom. Like Travelex, attacks on healthcare organizations rely on the fact that patient care is predicated on timely treatment, and hospitals cannot afford downtime and therefore pay up. One report even goes as far as to correlate loss of life to ransomware attacks.
With the Information Commissioner's Office (ICO) engaged and GDPR alarms ringing, it will be interesting to see how both Travelex and the data protection agencies proceed in this case. It seems criminals have been honing and socializing their tactics, and now it’s about paying extortion fees, and heading down the oft avoided slippery slope of negotiating with terrorists. The criminals have them in check. Your move ICO and Travelex.
The system outage at Travelex was masked with a ‘planned maintenance’ message which is understandable on the part of Travelex, but brings into light the ethics of such a choice. By masking the real event, stealing any opportunity from consumers and customers to take protective actions like putting holds are credit cards, setting up credit monitoring with financial institutions, and changing passwords. Time is of the essence, and knowledge is power. It’s another factor that should be reviewed with the ICO and law enforcement (and the courts) weighing in on this potential deceit.
This New Year’s event exposes evolved issues brought on by targeted ransomware attacks. Should firms pay the ransom to avoid the exposure of personal consumer data? Is it acceptable for firms to mask attacks with system outages notices rather than breach notifications? How will the ICO enforce decisions around timely notification, obfuscation, and preservation of data privacy through extortion fees? We shall see over the coming year. Perhaps 2020 will play to its visual acuity reference and provide clear vision on how companies must proceed in the event of such extortion attacks.
eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit: www.esentire.com and follow @eSentire.