Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
UPDATE:
As of July 14th, 2020, proof of concept exploit code for a denial of service attack has been identified in the wild. This release increases the immediate need to apply security patches before exploitation occurs.
THE THREAT:
On Tuesday, July 14, 2020 Microsoft released patches for a critical vulnerability affecting Windows Server versions 2003 to 2019 [1]. The vulnerability (CVE-2020-1350) has been dubbed SigRed and allows for remote code execution. If exploited a remote and unauthenticated attacker could gain Local System privileges on vulnerable servers and exfiltrate information or distribute malicious content. SigRed is highly concerning as the vulnerability is believed to be wormable, meaning that threat actors could automate attacks to spread between vulnerable systems.
Exploitation of SigRed has not been identified in the wild at this time but it is highly recommended that organizations immediately apply security patches due to the high impact of this vulnerability. The criticality of SigRed is likely to attract attacker attention and may result in exploitation in the near future.
What we’re doing about it
What you should do about it
Additional information
CVE-2020-1350 aka SigRed impacts Windows Domain Name System servers version 2003 to 2019. The vulnerability is remotely exploitable and considered “wormable” and received 10/10 rating on the CVSS scale.
The vulnerability can be exploited by sending a specially crafted DNS query to a vulnerable DNS server. The result is arbitrary code execution in the context of the Local System Account and per Microsoft “could lead to significant service interruptions and the compromise of high level domain accounts” as Domain Controllers are often configured to act as DNS servers.
As noted by Microsoft, the DNS Windows Client is not impacted by this vulnerability.
The vulnerability was discovered by a researcher at Check Point. Their report is expected to be released later on July 14 2020 [3]. Disclosure of technical details surrounding the vulnerability would expedite exploit development by other parties.
Organizations are encouraged to apply the security updates or workarounds as soon as possible.
References:
[1] https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350
[3] https://twitter.com/_CPResearch_/status/1283087717174214664