What’s most interesting about the Florida water system hack? That we heard about it at all.

Stories about computer security tend to go viral when they bridge the vast divide between geeks and luddites, and this week’s news about a hacker who tried to poison a Florida town’s water supply was understandably front-page material. But for security nerds who’ve been warning about this sort of thing for ages, the most surprising aspect of the incident seems to be that we learned about it at all.

Spend a few minutes searching Twitter, Reddit or any number of other social media sites and you’ll find countless examples of researchers posting proof of being able to access so-called “human-machine interfaces” — basically web pages designed to interact remotely with various complex systems, such as those that monitor and/or control things like power, water, sewage and manufacturing plants.

And yet, there have been precious few known incidents of malicious hackers abusing this access to disrupt these complex systems. That is, until this past Monday, when Florida county sheriff Bob Gualtieri held a remarkably clear-headed and fact-filled news conference about an attempt to poison the water supply of Oldsmar, a town of around 15,000 not far from Tampa.

Gualtieri told the media that someone (they don’t know who yet) remotely accessed a computer for the city’s water treatment system (using Teamviewer) and briefly increased the amount of sodium hydroxide (a.k.a. lye used to control acidity in the water) to 100 times the normal level.

“The city’s water supply was not affected,” The Tampa Bay Times reported. “A supervisor working remotely saw the concentration being changed on his computer screen and immediately reverted it, Gualtieri said. City officials on Monday emphasized that several other safeguards are in place to prevent contaminated water from entering the water supply and said they’ve disabled the remote-access system used in the attack.”

In short, a likely inexperienced intruder somehow learned the credentials needed to remotely access Oldsmar’s water system, did little to hide his activity, and then tried to change settings by such a wide margin that the alterations would be hard to overlook.

“The system wasn’t capable of doing what the attacker wanted,” said Joe Weiss, managing partner at Applied Control Solutions, a consultancy for the control systems industry. “The system isn’t capable of going up by a factor of 100 because there are certain physics problems involved there. Also, the changes he tried to make wouldn’t happen instantaneously. The operators would have had plenty of time to do something about it.”

Weiss was just one of a half-dozen experts steeped in the cybersecurity aspects of industrial control systems that KrebsOnSecurity spoke with this week. While all of those interviewed echoed Weiss’s conclusion, most also said they were concerned about the prospects of a more advanced adversary.

Here are some of the sobering takeaways from those interviews:

  • There are approximately 54,000 distinct drinking water systems in the United States.
  • The vast majority of those systems serve fewer than 50,000 residents, with many serving just a few hundred or thousand.
  • Virtually all of them rely on some type of remote access to monitor and/or administer these facilities.
  • Many of these facilities are unattended, underfunded, and do not have someone watching the IT operations 24/7.
  • Many facilities have not separated operational technology (the bits that control the switches and levers) from safety systems that might detect and alert on intrusions or potentially dangerous changes.

So, given how easy it is to search the web for and find ways to remotely interact with these HMI systems, why aren’t there more incidents like the one in Oldsmar making the news? One reason may be that these facilities don’t have to disclose such events when they do happen.

NO NEWS IS GOOD NEWS?

The only federal law that applies to the cybersecurity of water treatment facilities in the United States is America’s Water Infrastructure Act of 2018, which requires water systems serving more than 3,300 people “to develop or update risk assessments and emergency response plans.”

There is nothing in the law that requires such facilities to report cybersecurity incidents, such as the one that happened in Oldsmar this past weekend.

“It’s a difficult thing to get organizations to report cybersecurity incidents,” said Michael Arceneaux, managing director of the Water ISAC, an industry group that tries to facilitate information sharing and the adoption of best practices among utilities in the water sector. The Water ISAC’s 450 members serve roughly 200 million Americans, but its membership comprises less than one percent of the overall water utility industry.

“Some utilities are afraid that if their vulnerabilities are shared the hackers will have some inside knowledge on how to hack them,” Arceneaux said. “Utilities are rather hesitant to put that information in a public domain or have it in a database that could become public.”

Weiss said the federal agencies are equally reluctant to discuss such incidents.

“The only reason we knew about this incident in Florida was that the sheriff decided to hold a news conference,” Weiss said. “The FBI, Department of Homeland Security, none of them want to talk about this stuff publicly. Information sharing is broken.”

By way of example, Weiss said that not long ago he was contacted by a federal public defender representing a client who’d been convicted of hacking into a drinking water system. The attorney declined to share his client’s name, or divulge many details about the case. But he wanted to know if Weiss would be willing to serve as an expert witness who could help make the actions of a client sound less scary to a judge at sentencing time.

“He was defending this person who’d hacked into a drinking water system and had gotten all the way to the pumps and control systems,” Weiss recalled. “He said his client had only been in the system for about an hour, and he wanted to know how much damage could his client really could have done in that short a time. He was trying to get a more lenient sentence for the guy.”

Weiss said he’s tried to get more information about the defendant, but suspects the details of the case have been sealed.

Andrew Hildick-Smith is a consultant who served nearly 20 years managing remote access systems for the Massachusetts Water Resources Authority. Hildick-Smith said his experience working with numerous smaller water utilities has driven home the reality that most are severely under-staffed and underfunded.

“A decent portion of small water utilities depend on their community or town’s IT person to help them out with stuff,” he said. “When you’re running a water utility, there are so many things to take care of to keep it all running that there isn’t really enough time to improve what you have. That can spill over into the remote access side, and they may not have a IT person who can look at whether there’s a better way to do things, such as securing remote access and setting up things like two-factor authentication.”

Hildick-Smith said most of the cybersecurity incidents that he’s aware of involving water facilities fall into two categories. The most common are compromises where the systems affected were collateral damage from more opportunistic intrusions.

“There’ve been a bunch of times where water systems have had their control system breached, but it’s most often just sort of by chance, meaning whoever was doing it used the computer for setting up financial transactions, or it was a computer of convenience,” Hildick-Smith siad. “But attacks that involved the step of actually manipulating things is pretty short list.”

The other, increasingly common reason, he said, is of course ransomware attacks on the business side of water utilities.

“Separate from the sort of folks who wander into a SCADA system by mistake on the water side are a bunch of ransomware attacks against the business side of the water systems,” he said. “But even then you generally don’t get to hear the details of the attack.”

Hildick-Smith recalled a recent incident at a fairly large water utility that got hit with the Egregor ransomware strain.

“Things worked out internally for them, and they didn’t need to talk to the outside world or the press about it,” he said. “They made contact with the Water ISAC and the FBI, but it certainly didn’t become a press event, and any lessons they learned haven’t been able to be shared with folks.”

AN INTERNATIONAL CHALLENGE

The situation is no different in Europe and elsewhere, says Marcin Dudek, a control systems security researcher at CERT Polska, the computer emergency response team which handles cyber incident reporting in Poland.

Marcin said if water facilities have not been a major target of profit-minded criminal hackers, it is probably because most of these organizations have very little worth stealing and usually no resources for paying extortionists.

“The access part is quite easy,” he said. “There’s no business case for hacking these types of systems. Quite rarely do they have a proper VPN [virtual private network] for secure remote connection. I think it’s because there is not enough awareness of the problems of cybersecurity, but also because they are not financed enough. This goes not only for the US. It’s very similar here in Poland and different countries as well.”

Many security professionals have sounded off on social media saying public utilities have no business relying on remote access tools like Teamviewer, which by default allows complete control over the host system and is guarded by a simple password.

But Marcin says Teamviewer would actually be an improvement over the types of remote access systems he commonly finds in his own research, which involves HMI systems designed to be used via a publicly-facing website.

“I’ve seen a lot of cases where the HMI was directly available from a web page, where you just log in and are then able to change some parameters,” Marcin said. “This is particularly bad because web pages can have vulnerabilities, and those vulnerabilities can give the attacker full access to the panel.”

According to Marcin, utilities typically have multiple safety systems, and in an ideal environment those are separated from control systems so that a compromise of one will not cascade into the other.

“In reality, it’s not that easy to introduce toxins into the water treatment so that people will get sick, it’s not as easy as some people say,” he said. Still, he worries about more advanced attackers, such as those responsible for multiple incidents last year in which attackers gained access to some of Israel’s water treatment systems and tried to alter water chlorine levels before being detected and stopped.

“Remote access is something we cannot avoid today,” Marcin said. “Most installations are unmanned. If it is a very small water or sewage treatment plant, there will be no people inside and they just login whenever they need to change something.”

SELF EVALUTION TIME

Many smaller water treatment systems may soon be reevaluating their approach to securing remote access. Or at least that’s the hope of the Water Infrastructure Act of 2018, which gives utilities serving fewer than 50,000 residents until the end of June 2021 to complete a cybersecurity risk and resiliency assessment.

“The vast majority of these utilities have yet to really even think about where they stand in terms of cybersecurity,” said Hildick-Smith.

The only problem with this process is there aren’t any consequences for utilities that fail to complete their assessments by that deadline.

Hildick-Smith said while water systems are required to periodically report data about water quality to the U.S. Environmental Protection Agency (EPA), the agency has no real authority to enforce the cybersecurity assessments.

“The EPA has made some kind of vague threats, but they have no enforcement ability here,” he said. “Most water systems are going to wait until close the deadline, and then hire someone to do it for them. Others will probably just self-certify, raise their hands and say, ‘Yeah, we’re good.’”

The Circle Expands Again. Joining SentinelOne to Solve Cybersecurity’s Data Problem.

It’s all about the data. Turns out it always was.

When we started Scalyr, we initially focused on log analytics – providing engineering teams with a detailed, reliable view into their distributed systems. But our core vision was always about data; specifically, event data.

The original Scalyr team previously worked together at Google. Google, of course, has incredible technology for working with data at scale, most famously the contents of the public web. Built on keyword indexes, Google returns high-quality search results in a fraction of a second. And yet, the internal tools used by Google’s engineering teams weren’t remotely up to the task of providing interactive access to logs and other machine event data.

The problem was that event data is fundamentally different than the natural language text that keyword indexes were designed for. The data is different, the structure is different, the usage patterns are different. Solutions designed for text struggle with event data, especially at scale.

That’s where Scalyr came in. Instead of looking for a cleverer set of compromises that would let us jam a slightly better analytics solution onto existing data management architectures, we built a new architecture from scratch, designed for large-scale, high-cardinality, highly dimensional machine data. We made some big bets: aggressive multi-tenancy, columnar layout even for poorly-structured data, a query engine that dispenses with indexes, a closely integrated streaming analytics engine that offloads repetitive queries from the main engine.

Our early offering had gaps. The user interface looked like a couple of backend engineers had built it – because that’s who we were. But it still inspired love. Users came, apparently, for the questionable UI. But they stayed for the scalability and performance. (Actually, they mostly came because they had read about our unusual architecture and wanted to try it out; and later, through word of mouth.)

That early response was everything we had hoped for. What we hadn’t anticipated was how users would keep finding new use cases, stretching far beyond log analytics. It turns out that if you give people a solution that can scale to their event data, new use cases will come out of the woodwork. And many of those use cases had nothing to do with our UI; customers were building new applications directly on our APIs.

And thus was born the Event Data Cloud: the event analytics engine at the heart of Scalyr, now available to power customer applications, analytics services, and dashboards. We found immediate interest from multiple sectors, including cybersecurity. We quickly realized that cybersecurity has much in common with log analytics: large data volumes; a mix of continuous monitoring of complex rules with bursty, ad-hoc analysis; and the ever-present tradeoff between scale, cost, and performance.

SentinelOne Meets Scalyr

Several months back, Scalyr was contacted by several passionate engineers looking to solve an interesting data problem in the realm of XDR. The folks at SentinelOne had aptly recognized that for a security company, data analytics is a strategic core competency, and long-term success requires building that competency in-house rather than relying on third-party solutions. They had been exploring the market, and saw that Scalyr’s Event Data Cloud was a perfect fit for their vision.

One of those “only in Silicon Valley” whirlwind romances ensued. Tests on real-world data showed that Scalyr’s unique architecture delivers groundbreaking cost, performance, and scalability for XDR use cases, just as it has for log analytics. Even more important, the flexibility of our architecture will power the next generation of solutions. Scalyr can ingest, correlate, and search data from any source. SentinelOne has industry-leading AI technology for analyzing and acting on data.

Today, I’m thrilled to celebrate that Scalyr is becoming part of SentinelOne. Together, we are poised to deliver the industry’s most advanced integrated and real time data lake that can ingest structured and unstructured data from any technology product or platform. This is a huge step for us; and yet, it’s precisely aligned with our existing course. The reason Scalyr and SentinelOne are such a good fit is that we share precisely the same vision around the value of event data. We will continue to develop our log analytics and Event Data Cloud solutions; but now, at a whole new level of scale and impact.

The Expanding Circle: A Bright Future

Scalyr started out by merging traditionally distinct circles of data in the log analytics world into a single, larger circle. That circle keeps on growing. What we’ve learned along the way is that the more data you have, the more use cases you find; and the more use cases you find, the more data you add. Our architecture incorporates a network effect – the farther we scale, the better it performs – meaning that as the circle grows, our customer experience only improves. As part of SentinelOne, we’ll be taking another huge step up that curve. I couldn’t be more excited!


Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.

Read more about Cyber Security

My Thoughts: Securing the Enterprise’s Most Valuable Asset – Data – with XDR

2020 exposed the cybersecurity industry’s fundamental data problem – while cybersecurity solutions are put into place to protect data, their own inability to seamlessly ingest and action data from across the enterprise hinders realtime protection and response to damaging cyber attacks.

Organizations accelerated digital transformation plans to support remote workforces, driving the rapid adoption of cloud technologies. The result has been a massive growth in the amount of data organizations generate, process, and collect from myriad data sources. This has created new vulnerabilities and increased opportunity for targeted attacks that exploit security professionals’ limited visibility across complex cloud and distributed environments.

Today’s organizations require the ability to autonomously secure all enterprise data – security related or not. We’re taking a major step forward in allowing this by announcing the acquisition of Scalyr, a leading cloud-native, cloud-scale data analytics platform. The acquisition of Scalyr allows us to unlock the full potential of XDR and solve cybersecurity’s greatest data problems.

The Data Challenges of Fully Integrated XDR

XDR – the next generation of EDR – promises to go beyond endpoint devices, providing enterprises with a holistic, automated approach for securing today’s dynamic threat landscape. However, the promise of XDR has been constrained by the challenges that organizations face in ingesting, indexing, compressing, and performing analytics on data in a cost effective manner. Look at today’s vendors; few are able to effectively operationalize XDR for the enterprise.

According to Gartner, “building an effective XDR is more challenging than it might seem. Lack of data collection, common data formats and APIs, as well as products built on legacy database structures, make it difficult to integrate security tools even within the same vendor’s product portfolio”.1

For many human powered, data schema constrained cybersecurity products on the market, this data challenge is insurmountable. Many of the next-gen EDR offerings that we are often compared against are completely reliant on SIEM integrations or OEMs for point in time data correlation. This requires data to be indexed, introducing pipeline latency issues and limiting the ability to mitigate threats in real time, in addition to exorbitant search and storage costs. Streaming, realtime data, searches, and correlation is but a dream for peer vendors.

SentinelOne Delivers Fully Integrated XDR Through Scalyr

Scalyr’s SaaS platform overcomes these challenges and unlocks the full promise of XDR by allowing organizations to seamlessly ingest any data from any source and automate any action. By providing a realtime data lake and eliminating data schema requirements from the ingestion process and index limitations from querying, Scalyr can:

  • Ingest petabytes of structured, unstructured, and semi-structured data in real time from any technology product or platform
  • Take action against any data in real time
  • Assign policy, mitigate threats, and define action for every rule in an automated fashion
  • Allow organizations to rapidly analyze, query, and action data at an effective cost

All of these factors were integral in selecting Scalyr to advance the unrivaled innovation SentinelOne’s automated response capabilities and AI-powered Storyline technology deliver. Along with diverse XDR data, customers can automatically connect disparate data into rich stories and identify and take action against malicious behaviors, especially techniques exhibited by advanced persistent threats – including APT malware like Sunburst.

Our customers can extend automated response capabilities including threat mitigation, remediation, and ransomware rollback across the entire enterprise technology stack, to services and applications like Okta, ServiceNow, Slack, and more – all without human intervention.

Company Impact

Founded by the creator of Google Docs, Steve Newman, Scalyr created the industry’s first cloud-native, cloud-scale data analytics platform for log management and observability. Global brands including NBC Universal, CareerBuilder, TomTom, Lacework, Zalando, Tokopedia, and Asana use Scalyr to manage their large scale data operations. We are dedicated to continued investment in Scalyr’s solutions post-acquisition, supporting customers and evolving the platform.

Having this level of proprietary technology is a major acceleration of our efforts in bringing the industry’s most advanced AI-powered security to the entire enterprise. It also positions us to shape the ongoing convergence of cybersecurity and big data.

Few companies develop their own data stores and technology such as Scalyr’s cannot be built overnight. We developed the foundation to house and take action against all enterprise data with the Singularity XDR platform and Scalyr provides a rapid and exciting path to realize our vision. The acquisition also allows us to overcome the challenge vendors face in balancing the cost structure of ingesting and storing massive amounts of data. We’re able to deliver greater value to customers while strengthening our business model and increasing shareholder value. And, after surveying the space, we’re able to complete this transformational acquisition with the very best technology and team to align with our vision and with a shared set of values, principles, and integrity.

Today marks a new chapter in our company journey and positions us for continued hypergrowth and long-term success. I invite you to join us on the journey – whether that be replacing antivirus, replacing your next-gen endpoint technology, or looking for a home to take your career to new heights. Our company is a place dedicated to the success of our customers, to innovation, and to creating an environment for our team members to do their life’s best work. Take a few moments to engage with us and see how we’re taking cybersecurity to places not ventured before.

Tomer


Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.

Read more about Cyber Security

Encrypted data handling startup DataFleets acquired by LiveRamp for over $68M

LiveRamp has acquired DataFleets, a fresh young startup that made it possible to take advantage of large volumes of encrypted data without the risk or fuss of decrypting or transferring it. LiveRamp, an enterprise data connectivity platform itself, paid more than $68 million for the company, a huge multiple on DataFleet’s $4.5 million seed announced just last fall.

DataFleets saw the increasing need for sensitive data like medical or financial records to be analyzed or used to train machine learning models. Not only are such databases bulky and complex, making transfers difficult, but allowing them to be decrypted and used elsewhere opens the door to errors, abuse and hacks.

The company’s solution was essentially to have software on both sides of the equation, the data provider (perhaps a hospital or bank) and the client (an analyst or AI developer), and act as a secure go-between. Not for the sensitive data itself, but for the systems of analysis and machine learning models that the client wanted to set loose on the data. This allows the client to perform an automated task on the data, such as harvesting and comparing values or building an ML model, without ever having direct access to it.

Clearly this approach seemed valuable to LiveRamp, which provides a number of data connectivity services to major enterprise customers, household names in fact. They announced in their earnings statement last night that they paid $68 million up front for DataFleets, though that price does not reflect the various other incentives and deferred payments that many such deals involve, and in this case seem likely to remain private.

The deal will probably result in the retiring of the DataFleets brand (young as it was), but their various customers will probably make the trip to LiveRamp. The most recent of those is HCA Healthcare, a major national provider that just announced a COVID-19 data sharing consortium that would be using DataFleets’s services. That’s a pretty powerful validation for an approach just commercialized late last year, and a nice catch for LiveRamp to add to its healthcare client collection.

For its part LiveRamp plans to use its augmented services to expand its operations and offerings in Europe, Asia and Latin America over the coming year. The company has also called for a federal data privacy law, something that hopefully that will be achieved under the new administration.

SentinelOne to acquire high-speed logging startup Scalyr for $155M

SentinelOne, a late-stage security startup that helps customers make sense of security data using AI and machine learning, announced today that it is acquiring high-speed logging startup Scalyr for $155 million in stock and cash.

SentinelOne sorts through oodles of data to help customers understand their security posture, and having a tool that enables engineers to iterate rapidly in the data, and get to the root of the problem, is going to be extremely valuable for them, CEO and co-founder Tomer Weingarten explained. “We thought Scalyr would be just an amazing fit to our continued vision in how we secure data at scale for every enterprise [customer] out there,” he told me.

He said they spent a lot of time shopping for a company that could meet their unique scaling needs and when they came across Scalyr, they saw the potential pretty quickly with a company that has built a real-time data lake. “When we look at the scale of our technology, we obviously scoured the world to find the best data analytics technology out there. We [believe] we found something incredibly special when we found a platform that can ingest data, and make it accessible in real time,” Weingarten explained.

He believes the real time element is a game changer because it enables customers to prevent breaches, rather than just reacting to them. “If you’re thinking about mitigating attacks or reacting to attacks, if you can do that in real time and you can process data in real time, and find the anomalies in real time and then meet them, you’re turning into a system that can actually deflect the attacks and not just see them and react to them,” he explained.

The company sees Scalyr as a product they can integrate into the platform, but also one which will remain a standalone. That means existing customers should be able to continue using Scalyr as before, while benefiting from having a larger company contributing to its R&D.

While SentinelOne is not a public company, it is a pretty substantial private one, having raised over $695 million, according to Crunchbase data. The company’s most recent funding round came last November, a $267 million investment with a $3.1 billion valuation.

As for Scalyr, it was launched in 2011 by Steve Newman, who first built a word processor called Writely and sold it to Google in 2006. It was actually the basis for what became Google Docs. Newman stuck around and started building the infrastructure to scale Google Docs, and he used that experience and knowledge to build Scalyr. The startup raised $27 million along the way, according to Crunchbase data, including a $20 million Series A investment in 2017.

The deal will close this quarter, at which time Scalyr’s 45 employees will join SentinelOne.

Is overseeing cloud operations the new career path to CEO?

When Amazon announced last week that founder and CEO Jeff Bezos planned to step back from overseeing operations and shift into an executive chairman role, it also revealed that AWS CEO Andy Jassy, head of the company’s profitable cloud division, would replace him.

As Bessemer partner Byron Deeter pointed out on Twitter, Jassy’s promotion was similar to Satya Nadella’s ascent at Microsoft: in 2014, he moved from executive VP in charge of Azure to the chief exec’s office. Similarly, Arvind Krishna, who was promoted to replace Ginni Rometti as IBM CEO last year, also was formerly head of the company’s cloud business.

Could Nadella’s successful rise serve as a blueprint for Amazon as it makes a similar transition? While there are major differences in the missions of these companies, it’s inevitable that we will compare these two executives based on their former jobs. It’s true that they have an awful lot in common, but there are some stark differences, too.

Replacing a legend

For starters, Jassy is taking over for someone who founded one of the world’s biggest corporations. Nadella replaced Steve Ballmer, who had taken over for the company’s face, Bill Gates. Holger Mueller, an analyst at Constellation Research, says this notable difference could have a huge impact for Jassy with his founder boss still looking over his shoulder.

“There’s a lot of similarity in the two situations, but Satya was a little removed from the founder Gates. Bezos will always hover and be there, whereas Gates (and Ballmer) had retired for good. [ … ] It was clear [they] would not be coming back. [ … ] For Jassy, the owner could [conceivably] come back anytime,” Mueller said.

But Andrew Bartels, an analyst at Forrester Research, says it’s not a coincidence that both leaders were plucked from the cloud divisions of their respective companies, even if it was seven years apart.

“In both cases, these hyperscale business units of Microsoft and Amazon were the fastest-growing and best-performing units of the companies. [ … ] In both cases, cloud infrastructure was seen as a platform on top of which and around which other cloud offerings could be developed,” Bartels said. The companies both believe that the leaders of these two growth engines were best suited to lead the company into the future.

Microsoft Patch Tuesday, February 2021 Edition

Microsoft today rolled out updates to plug at least 56 security holes in its Windows operating systems and other software. One of the bugs is already being actively exploited, and six of them were publicized prior to today, potentially giving attackers a head start in figuring out how to exploit the flaws.

Nine of the 56 vulnerabilities earned Microsoft’s most urgent “critical” rating, meaning malware or miscreants could use them to seize remote control over unpatched systems with little or no help from users.

The flaw being exploited in the wild already — CVE-2021-1732 — affects Windows 10, Server 2016 and later editions. It received a slightly less dire “important” rating and mainly because it is a vulnerability that lets an attacker increase their authority and control on a device, which means the attacker needs to already have access to the target system.

Two of the other bugs that were disclosed prior to this week are critical and reside in Microsoft’s .NET Framework, a component required by many third-party applications (most Windows users will have some version of .NET installed).

Windows 10 users should note that while the operating system installs all monthly patch roll-ups in one go, that rollup does not typically include .NET updates, which are installed on their own. So when you’ve backed up your system and installed this month’s patches, you may want to check Windows Update again to see if there are any .NET updates pending.

A key concern for enterprises is another critical bug in the DNS server on Windows Server 2008 through 2019 versions that could be used to remotely install software of the attacker’s choice. CVE-2021-24078 earned a CVSS Score of 9.8, which is about as dangerous as they come.

Recorded Future says this vulnerability can be exploited remotely by getting a vulnerable DNS server to query for a domain it has not seen before (e.g. by sending a phishing email with a link to a new domain or even with images embedded that call out to a new domain). Kevin Breen of Immersive Labs notes that CVE-2021-24078 could let an attacker steal loads of data by altering the destination for an organization’s web traffic — such as pointing internal appliances or Outlook email access at a malicious server.

Windows Server users also should be aware that Microsoft this month is enforcing the second round of security improvements as part of a two-phase update to address CVE-2020-1472, a severe vulnerability that first saw active exploitation back in September 2020.

The vulnerability, dubbed “Zerologon,” is a bug in the core “Netlogon” component of Windows Server devices. The flaw lets an unauthenticated attacker gain administrative access to a Windows domain controller and run any application at will. A domain controller is a server that responds to security authentication requests in a Windows environment, and a compromised domain controller can give attackers the keys to the kingdom inside a corporate network.

Microsoft’s initial patch for CVE-2020-1472 fixed the flaw on Windows Server systems, but did nothing to stop unsupported or third-party devices from talking to domain controllers using the insecure Netlogon communications method. Microsoft said it chose this two-step approach “to ensure vendors of non-compliant implementations can provide customers with updates.” With this month’s patches, Microsoft will begin rejecting insecure Netlogon attempts from non-Windows devices.

A couple of other, non-Windows security updates are worth mentioning. Adobe today released updates to fix at least 50 security holes in a range of products, including Photoshop and Reader. The Acrobat/Reader update tackles a critical zero-day flaw that Adobe says is actively being exploited in the wild against Windows users, so if you have Adobe Acrobat or Reader installed, please make sure these programs are kept up to date.

There is also a zero-day flaw in Google’s Chrome Web browser (CVE-2021-21148) that is seeing active attacks. Chrome downloads security updates automatically, but users still need to restart the browser for the updates to fully take effect. If you’re a Chrome user and notice a red “update” prompt to the right of the address bar, it’s time to save your work and restart the browser.

Standard reminder: While staying up-to-date on Windows patches is a must, it’s important to make sure you’re updating only after you’ve backed up your important data and files. A reliable backup means you’re less likely to pull your hair out when the odd buggy patch causes problems booting the system.

So do yourself a favor and backup your files before installing any patches. Windows 10 even has some built-in tools to help you do that, either on a per-file/folder basis or by making a complete and bootable copy of your hard drive all at once.

Keep in mind that Windows 10 by default will automatically download and install updates on its own schedule. If you wish to ensure Windows has been set to pause updating so you can back up your files and/or system before the operating system decides to reboot and install patches, see this guide.

And as always, if you experience glitches or problems installing any of these patches this month, please consider leaving a comment about it below; there’s a better-than-even chance other readers have experienced the same and may chime in here with some helpful tips.

Bringing IoT Out of the Shadows

When it comes to security, what you don’t know can hurt you. For many CISOs and security teams, this is embodied by IoT and connected devices. An estimated 41.6 billion IoT devices will be connected to businesses within the next five years. This explosion of connected devices has created a huge – and often hidden – attack surface for threat actors to exploit. Attack surface reduction is an imperative part of modern cybersecurity programs.

Security teams have long struggled to gain and maintain visibility into the devices that are being connected to corporate networks. In many organizations, it’s relatively easy for employees to connect devices to the network without notifying IT teams. Personal assistants, like Alexa and Google Home, wearables, mobile phones, and even novelty items, like fish tanks, are being added to networks every day, without security teams being notified.

When combined with a multitude of office devices that are now Internet connected – printers, cameras, thermostats, and more – the result is a dramatic expansion of “endpoints” that increase the attackable surface of an organization and create backdoors into enterprise networks.

Compounding the problem is the fundamental lack of industry standards and government regulations for IoT security – few IoT devices are developed with security in mind. Attackers have and will continue to exploit this – industry data shows that roughly 25% of attacks on enterprises involve IoT devices.

This is why gaining visibility into everything on a network, and having the means to control every device, is a foundational aspect of a strong security posture. Historically, one approach to gaining visibility into IoT devices on the network was for security teams to install software agents on the devices themselves as they were discovered. But this approach fails to address the underlying problem of hidden devices and is incredibly hard to scale in organizations with multiple network types.

The solution to the growing IoT security problem is centered on the power of AI to gain full visibility of the network, continuously monitor devices, and enforce security and privacy policies across all connected devices to reduce, monitor, and control the attack surface.

Network Visibility: Bringing IoT Out of the Shadows

The first step towards IoT security is visibility and understanding exactly what’s connected to the network. Organizations not only need to accurately map the network and fingerprint devices to see what’s connected, but they also need to understand what’s unprotected and open to attack. Trying to accomplish this through manual practices sets security teams up for failure. Additional hardware and software are not acceptable or scalable solutions either.

This is where AI can automate the process. By using AI on approved endpoint devices to serve as a type of sonar, these approved devices can ‘ping,’ identify, and detect every additional device connected to the network. This provides deep visibility into the hidden devices that may be connected to a network. The ‘approved’ machines can also provide autonomous protection and notification for any device that has vulnerabilities or demonstrates anomalous behavior.

Ranger® IoT
Network Visibility & Control. A cloud
delivered, software-defined network discovery solution designed to add global network visibility and control with minimal friction.

Monitor All Devices with Vigilance MDR

As connected devices are brought out of the shadows and detected, security teams can now ensure that the organizational security and privacy policies that are used to provide network access are fully enforced on each device.

This can range from simple policies, such as making sure devices are patched or isolated from the network to identifying devices that require deeper analysis. More complex policies enforce device segmentation from networks based on trust and activities.

Monitoring all devices enables security teams to ensure that every device on the network has an owner, business function, or broader impact associated. This is critical information that can be used in the decision-making process around risk reduction and incident response. As each device is assigned an owner and function, security teams can continuously monitor the devices to identify suspicious behavior, while putting the organization in a better position to respond if such activity is detected.

Focus on Attack Surface Management – Not Merely Compliance

The historical lack of security on IoT devices has led many states and regulators to start taking action into their own hands. States like California recently passed legislation to establish new security requirements that address the risks of using IoT devices in the enterprise.

It’s critical to remember that the end goal of gaining full visibility and continuous monitoring of all devices connected to networks should be strengthening security and privacy – not just achieving compliance. Many organizations that have certified compliance with regulations have suffered a ransomware attack or data breach at some point.

Focusing on compliance is a common pitfall for many organizations – checked boxes do not always equate to better security. Compliance is generally met over time, as a lesson-learned mechanism from other failed organizations. The benchmark for compliance is not typically overly ambitious, instead focusing on common failures.

In addition, compliance metrics can quickly become outdated. A good example of this is found in the payment card industry standard that requires companies to have scheduled AV scans. The problem is that this reinforces an antiquated approach that many security conscious organizations have moved away from. Modern security technologies operate with continuous scanning at their core. Attackers can exploit vulnerabilities and weaknesses in an instant – scheduled scans belie the speed at which today’s attacks occur. Machine speed attacks require a machine speed response.

Ebook: Understanding Ransomware in the Enterprise
This Guide will help you understand, plan for, respond to and protect against this now-prevalent threat. This guide offers examples, recommendations and advice to ensure you stay unaffected by the constantly evolving ransomware menace.

Attack Surface Management – An Extension of Your Endpoint Security Strategy

Endpoint security can be challenging for any organization – but the problem becomes more complex with the introduction of billions of connected devices. Threats continue to evolve to exploit the growth mechanisms of business, targeting these machines with increasing alacrity.

Equipping security teams with complete visibility, categorization, and automated alerting regarding rogue devices and vulnerabilities is the best way to ensure that enterprises proactively prepare themselves to the imminent threat presented by IoT devices.

Learn more about how endpoint protection can help protect your company, network, and sensitive information. Contact us for more information or request a free demo.


Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.

Read more about Cyber Security

Nexthink nabs $180M Series D on $1.1B valuation

We often hear about companies working to improve the customer experience, but for IT their customers are the company’s employees. Nexthink, a late-stage startup that wants to help IT serve its internal constituents better, announced a $180 million Series D today on a healthy $1.1 billion valuation.

The firm, which was founded in Lausanne, Switzerland and has offices outside of Boston, received funding from Permira with help from Highland Europe and Index Ventures. The company has now raised more than $336 million, according to Crunchbase data.

As you might imagine, understanding how folks are using a company’s technology choices internally is always going to be useful, but when the pandemic hit and offices closed, having access to this type of data became even more important.

Nexthink CEO and co-founder Pedro Bados says that most monitoring tools are focused on figuring out if the systems are working correctly and finding ways to fix them. Nexthink takes a different approach, looking at how employees are adopting the tools a company is offering.

“What we do at Nexthink is to take the [monitoring] problem from a completely different perspective. We say that we’re going to give your IT department a real-time understanding of how employees are experiencing IT [at your company],” Bados told me.

He says they do this by looking at the problem from the employees’ perspective. “At the end of the day we’re giving all the insights to IT departments to make sure they can improve the digital experience of their employees,” he said.

This could involve querying the user base in the same way that HR and marketing survey tools allow companies to check the pulse of employees or customers. By gathering this type of data, it helps IT understand how employees are using the company’s technology choices.

This software is aimed at larger organizations with at least 5,000 employees. Today, the company has more than 1,000 of these customers, including Best Buy, Fidelity, Liberty Mutual and 3M. What’s more, the company has surpassed $100 million in annual recurring revenue, a success benchmark for SaaS companies like Nexthink.

Nexthink currently has 700 employees with plans to reach 900 by the end of this year, and as a maturing startup, Bados has given a lot of thought on how to build a diverse workforce. Just being spread out in two countries gives an element of geographic diversity, but he says it takes more than that, and it all starts with recruitment.

“The way to make sure we get more diversity is we look at recruitment and make sure that we have a balanced pipeline. That’s something we measure as a company,” he said. They also have a diversity committee, which is charged with delivering diversity training and figuring out ways to hire a more diverse and inclusive workforce.

While the company has a healthy valuation and a good amount of money in the bank, Bados doesn’t see an IPO for at least a couple of years. He says he wants to double or triple the business before taking that step. For now, though, with $180 million in additional runway and a $100 million in ARR, the company is well-positioned for whatever future moves it chooses to make.

Automattic acquires analytics company Parse.ly

Automattic, the for-profit company tied to open-source web publishing platform WordPress, is announcing that it has acquired analytics provider Parse.ly.

Specifically, Parse.ly is now part of WPVIP, the organization within Automattic that offers enterprise hosting and support to publishers, including TechCrunch. (We use Parse.ly, too.)

WPVIP CEO Nick Gernert described this as the organization’s first large enterprise software acquisition, reflecting a strategy that has expanded beyond news and media organizations — businesses like Salesforce (whose venture arm invested $300 million in Automattic back in 2019), the NBA, Condé Nast, Facebook and Microsoft now use WPVIP for their content and marketing needs.

Both companies, Gernert said, come from similar backgrounds, with “roots” in digital publishing and a “heavy focus on understanding the impact of content.”

“We’ve really started to shift more towards content marketing and starting to think more deeply beyond just what traditional page analytics provide,” he continued. That means doing more than measuring pageviews and time on site and “really starting to look more deeply at things like conversation, attribution, areas … that from a marketer’s perspective are impactful.”

WordPress and Parse.ly already work well together, but the plan is to make WPVIP features available to Parse.ly customers while also making more Parse.ly data available to WPVIP publishers. And Gernert said there are also opportunities to add more commerce-related data to Parse.ly, since Automattic also owns WooCommerce.

The goal, he said, is to “make Parse.ly better for WordPress and best for WPVIP.”

At the same time, he added, “There’s no plans here to make Parse.ly the only analytics solution that runs on our platform. We want to preserve the flexibility and interoperability [of WordPress], and we want to make sure from a Parse.ly perspective that it still exists as a standalone product. That’s key to its future and we will continue to invest in it.”

Parse.ly was founded in 2009 and has raised $12.9 million in funding from investors including Grotech Ventures and Blumberg Capital, according to Crunchbase. Parse.ly founders Sachin Kamdar and Andrew Montalenti are joining WPVIP, with Kamdar leading go-to-market strategy for Parse.ly and Montalenti leading product.

“We’ve always had deep admiration for WPVIP’s market position as the gold standard for enterprise content teams, and we’re thrilled to be able to join together,” Kamdar said in a statement. “From the culture and people, to the product, market and vision, we’re in lockstep to create more value for our customers. This powerful combination of content and intelligence will push the industry forward at an accelerated pace.”

The financial terms of the acquisition were not disclosed.