Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
Researchers from Microsoft have released both a high-level report and a technical guidance report relating to ongoing supply chain attacks attributed to the NOBELIUM threat actor group (aka. APT29, The Dukes, CozyBear). Law Enforcement and governments have attributed NOBELIUM to Russia's Foreign Intelligence Service (SVR).
Since May 2021, NOBELIUM has attempted to compromise Managed Service Providers (MSPs), Cloud Service Providers (CPSs), and other IT services, in order to breach their customer bases. Attacks have been observed against more than 140 service providers; at least 14 unnamed organizations have been confirmed as compromised.
Organizations are recommended to review the recommendations in this advisory and ensure that proactive defenses are in place.
eSentire is a customer of its own products and services and is already following the recommended mitigation strategies as a part of our ongoing security best practices. As a precaution, eSentire is accelerating our access review cycle, which includes delegated administrative access and will continue to monitor user activity.
Targeted organizations have been identified in the United States and multiple European countries. NOBELIUM is abusing trusted relationships in order to compromise governments, think tanks, and other organizations with information valuable to the Russian state. Initial access to services providers is gained via a variety of methods including spear-phishing emails, password spraying, token theft and API abuse. Microsoft has not shared information on organizations confirmed to be compromised by NOBELIUM. According to the recent reports all impacted organizations have been privately notified by Microsoft.
Indicators of Compromise (IoCs) relating to this activity are not publicly available at this time. NOBELIUM is a sophisticated APT that shifts indicators based on campaigns; as such, detecting techniques employed by the group is critical.
Techniques employed by NOBELIUM in the recent supply chain attacks include:
Get notified when there's a new security advisory, and receive the latest news, intel and helpful tools & assets. You can unsubscribe anytime.