Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
On January 18th, 2023, eSentire Threat Intelligence identified multiple reports, both externally and internally, containing information on an ongoing increase in Google advertisements being abused to distribute malware.
One notable campaign is leveraging pay-per-click advertising to deliver popular software such as Slack, 7zip, Open Broadcasting Studio (OBS), and VLC media player. Drive by social-engineering attacks remains a popular vector for various malware loaders. Threats such as BATLOADER , IcedID  (See Figure 1 Below), Vidar, and other popular information stealers use several delivery methods, including malvertising and fake software downloads from TRU’s observations. This type of increased risk is likely to continue until Google addresses the lack of regulation in malicious content.
Providing your users with a dedicated software center and maintaining a software inventory to ensure the appropriate versions are being used is a good defence against malicious software downloads of this nature.
In late December 2022, the FBI pushed an advisory  indicating threat actors are using search engine advertisements to promote websites distributing ransomware or stealing login credentials for financial institutions and crypto exchanges. This trend is continuing into 2023 and adapting to distribute information stealers.
Google search engine can be abused in various ways to distribute malware. There are three primary methods: Cracked software ads, SEO Poisoning, and Pay –per- Click ads. The current campaign is leveraging pay-per-click advertising to deliver popular software such as 7zip, Open Broadcasting Studio (OBS), Slack (See Figure 1 below), and VLC media player.
Drive by social-engineering attacks remains a popular vector for various malware loaders. Threats such as BATLOADER, IcedID, Vidar, and other popular stealers use several delivery methods, including malvertising and fake software downloads from TRU’s observations.
eSentire Threat Intelligence team has observed and disrupted two incidents earlier this week that utilized Google ads to deliver malware (Vidar Stealer & IcedID leading to Cobalt Strike). Additionally, public reporting shows that both Aurora Stealer & Rhadamanthys Stealer are utilizing the same technique.
 FBI warns of search engine ads pushing malware, phishing