Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Join Tim Segato, Director, Product Management and Ryan Westman, Manager,…
Join us for a live security brefing with (ISC)2 members.
Ask questions and hear from Cybersecurity experts from eSentire,…
Threat actors have long relied on the use of macros to create malicious documents that are emailed to unknowing victims as part of an overall phishing campaign. Once the document is opened, the malicious macros are executed, providing an initial access point for threat actors to leverage.
In Verizon’s 2020 Data Breach report, researchers state that 94% of malware is delivered through email and in 45% of the cases, the malware is hidden in Microsoft Office documents. If organizations have a strong security awareness training program in place, they can train their employees to spot common signs (e.g., spelling errors and complicated instructions for the attached Microsoft Office documents) that an email may be malicious.
Additionally, if the organization has engaged a security provider with a security operations center (SOC), the SOC analysts may leverage machine learning (ML) to detect malicious files proactively.
However, adversaries have begun to use sophisticated anti-detection techniques such as Macro stomping, wherein the original Visual Basic application (VBA) code is removed but the compiled payload is left untouched.
To curb this rising threat, eSentire partnered with the University of Guelph’s Cyber Science Lab for a research project on the “Detection of malicious documents by extracting and interpreting macros in Microsoft Office files”.
This partnership brings together large volumes of unlabeled customer data and compute resources, along with mentorship from University of Guelph faculty to provide students with the opportunity to perform security research and develop world-class machine learning algorithms to provide solutions to reduce business risk.
“Collaboration between companies and universities play a significant role in transferring knowledge and creating jobs for Canadians. Cyber Science Lab at the University of Guelph and eSenitre enjoy a long-lasting collaboration resulting in many interesting projects in cyber threat intelligence and threat hunting,” Ali Dehghantanha, Director of the Cyber Science Lab, says.
Edward Crowder, a student enrolled in the Master of Cyber Security and Threat Intelligence program, has been working with eSentire’s Threat Response Unit (TRU) team to use artificial intelligence (AI) as a solution to extract and analyze macros and determine their indent and potential for malicious code execution.
“Edward's project stands out as one of the best examples of using accurate machine learning models to hunt for macro-based malware - a technique that is commonly used during delivery of attack payloads by advanced adversaries,” Deghantanha explains.
The objectives of the project are twofold:
Determine how to reliably extract macro code, even if threat actors have used macro stomping
Build, train, and validate machine learning threat models to classify macro codes and separate the malicious documents from safe ones
Overall, the project was a resounding success. Edward, along with eSentire’s security researchers, were able to achieve high 90% average accuracy on the deep learning models, showing high confidence and correlation like human-level static analysis.
“Edward's technical achievement is impressive. He has created a highly accurate machine learning model to detect malicious office macros used in real-world attacks,” Rob McLeod, Vice President, Threat Response Unit (TRU), says. “This model provides differentiated threat detection capabilities to provide additional protection and detection capabilities to eSentire's customers.”
To learn more about the partnership between University of Guelph and eSentire, click here.
eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.