Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
On Thursday June 18th, 2020, the Australian Cyber Security Center (ACSC) released a report related to ongoing attacks targeting government entities and private organizations located in Australia . The attacks observed make heavy use of publicly available tools and exploits; proof-of-concept exploit code and web shells. The goal of this campaign is not clear at this time, but there are no indications of ransomware or destructive malware based on the contents of the report.
ACSC states this campaign is likely being carried out by a Nation State APT group but does not attempt to attribute the attacks to any specific nation state-group. Organizations with a presence in Australia should be on high alert for unusual activity and phishing emails.
What we’re doing about it
What you should do about it
In order to gain initial access into organizations, threat actors attempt to exploit four separate vulnerabilities, CVE-2019-18935 (Telerik), CVE-2019-19781 (Citrix), CVE-2019-0604 (Sharepoint) and the exploitation of VIEWSTATE handling in Microsoft IIS Servers. If these systems are not present or are up to date on security patches, the threat actors shift to using spear phishing emails for initial access.
Once initial access is gained, the threat actors deploy additional tools for persistence on and interaction with victim networks. In order to minimize the likelihood of detection, the threat actors employed stolen credentials for persistence.
Details relating to this campaign are still limited and additional details are expected in the near future.