Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
eSentire Threat Intelligence has observed an increase in exploitation attempts targeting consumer-grade network devices manufactured by Dasan and D-Link.
Customers are advised to review the below details and apply mitigation actions if applicable. Successful exploitation of vulnerable devices can result in remote code execution and ongoing communication between the threat actor and infected devices.
Observed infrastructure hosting exploit payloads have been added to the eSentire global blacklist.
The identified spike in attacks does not appear to be targeted against a specific client or industry. eSentire Threat Intelligence has identified roughly three thousand unique IP addresses being used to deliver the exploit attempts. The wide number of devices launching these attacks may indicate the use of a botnet.
It is not uncommon for botnet controllers to attempt to increase the number of devices in their botnet by using tactics similar to this. The infected devices can then be used to launch additional attacks such as distributing malicious content or launching DDoS attacks.
 GPON Router Vulnerability Antidote
 D-Link DSL-2750B - OS Command Injection (Metasploit)