<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>sophos - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/sophos/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/sophos/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 06 Feb 2023 13:10:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>sophos - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/sophos/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CDT Watch – January 2023</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 31 Jan 2023 15:35:54 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[ProxyNotShell]]></category>
		<category><![CDATA[sophos]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19543</guid>

					<description><![CDATA[<p>FOCUS TECH BLINDSIDE Facing the EDR behavioral supervision, attackers develop techniques for successful attacks by staying under the radars. One of these techniques is called Blindside. This technique works on many EDRs relying on a hook and was revealed by...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/">CDT Watch – January 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: center;">FOCUS TECH</h2>
<h3 style="text-align: center;">BLINDSIDE</h3>
<p style="text-align: justify;"><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">Facing </span><span class="NormalTextRun SCXW224371125 BCX0">the EDR </span><span class="NormalTextRun SCXW224371125 BCX0">behavioral </span><span class="NormalTextRun SCXW224371125 BCX0">supervisio</span><span class="NormalTextRun SCXW224371125 BCX0">n</span><span class="NormalTextRun SCXW224371125 BCX0">, attacker</span><span class="NormalTextRun SCXW224371125 BCX0">s</span><span class="NormalTextRun SCXW224371125 BCX0"> develop techniques </span><span class="NormalTextRun SCXW224371125 BCX0">for successful attacks </span><span class="NormalTextRun SCXW224371125 BCX0">by staying under the radars</span><span class="NormalTextRun SCXW224371125 BCX0">. One of these techniques is </span><span class="NormalTextRun SCXW224371125 BCX0">called </span></span><span style="color: #56008c;"><strong><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">Blindside</span></span></strong></span><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">. This technique works on </span><span class="NormalTextRun SCXW224371125 BCX0">many </span><span class="NormalTextRun SCXW224371125 BCX0">EDRs</span> <span class="NormalTextRun SCXW224371125 BCX0">relying</span><span class="NormalTextRun SCXW224371125 BCX0"> on </span><span class="NormalTextRun SCXW224371125 BCX0">a </span><span class="NormalTextRun SCXW224371125 BCX0">hook</span><span class="NormalTextRun SCXW224371125 BCX0"> and was revealed by </span></span><a class="Hyperlink SCXW224371125 BCX0" href="https://cymulate.com/blog/blindside-a-new-technique-for-edr-evasion-with-hardware-breakpoints" target="_blank" rel="noreferrer noopener"><span class="FieldRange SCXW224371125 BCX0"><span class="TextRun Underlined SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0" data-ccp-charstyle="Hyperlink">Cymulate</span></span></span></a><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">.</span></span><span class="EOP SCXW224371125 BCX0" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:-57,&quot;335559738&quot;:360,&quot;335559739&quot;:40,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-19546 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1.png" alt="" width="1216" height="827" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1.png 1216w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1-281x191.png 281w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1-57x39.png 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1-768x522.png 768w" sizes="(max-width: 1216px) 100vw, 1216px" /></p>
<p style="text-align: justify;">According to <a href="https://cymulate.com/blog/blindside-a-new-technique-for-edr-evasion-with-hardware-breakpoints">Cymulate</a>, the author of Blindside, the technique is not immune to detection. Some mitigations can be implemented such as:</p>
<ul>
<li style="text-align: justify;"><span style="color: #56008c;"><strong>Monitor</strong></span><span style="color: initial;"> the use of the </span><span style="color: #1a7173;"><em>SetThreadContext</em></span><span style="color: initial;"> function: the function context can inform on breakpoint setting (write inside debug address registers)</span></li>
<li><span style="color: #56008c;"><strong>Monitor</strong></span> the presence of suspicious debug functions</li>
<li><span style="color: #56008c;"><strong>Edit EDR settings</strong> </span>for checking debug registers</li>
</ul>
<p style="text-align: justify;">It remains <span style="color: #56008c;"><strong style="font-size: revert; text-align: justify;">difficult to bypass EDR solutions</strong></span><span style="font-size: revert; text-align: justify; color: initial;"> as their detection methods vary between vendors. Nevertheless, it is important to remember that it is possible and </span><strong style="font-size: revert; text-align: justify; color: initial;"><span style="color: #56008c;">that the security should not rely solely on the solution</span>.</strong></p>
<p> </p>
<h2 style="text-align: center;">CERT-W: FROM THE FRONT LINE</h2>
<h3 style="text-align: center;">THE FIRST RESPONDER WORD</h3>
<p><img decoding="async" class="aligncenter size-full wp-image-19548" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2.png" alt="" width="951" height="568" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2.png 951w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2-320x191.png 320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2-768x459.png 768w" sizes="(max-width: 951px) 100vw, 951px" /></p>
<p> </p>
<p> </p>
<h2 style="text-align: center;">READING OF THE MONTH</h2>
<h3 style="text-align: center;">SOPHOS: MATURING CRIMINAL MARKETPLACES PRESENT NEW CHALLENGES TO DEFENDERS</h3>
<p><img decoding="async" class="aligncenter size-full wp-image-19550" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3.png" alt="" width="378" height="236" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3.png 378w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3-306x191.png 306w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3-62x39.png 62w" sizes="(max-width: 378px) 100vw, 378px" /></p>
<p style="text-align: center;"><a href="https://www.sophos.com/en-us/content/security-threat-report"><em>Maturing criminal marketplaces present new challenges to defenders, Sophos 2023 Threat Report</em></a></p>
<p> </p>
<h2 style="text-align: center;">VULNERABILITY OF THE MONTH</h2>
<h3 style="text-align: center;">PROXYNOTSHELL: WHEN APPLYING MITIGATIONS KEEPS YOU VULNERABLE</h3>
<p style="text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41040">CVE-2022-41040</a> &amp; <a href="https://nvd.nist.gov/vuln/detail/cve-2022-41082">CVE-2022-41082</a></p>
<p style="text-align: center;">Published by NVD: 02/10/2022</p>
<p style="text-align: center;"><strong>Products: </strong>Microsoft Exchange server</p>
<p style="text-align: center;"><strong>Versions: </strong>on-site/on premise 2013, 2016 and 2019</p>
<p style="text-align: center;"><strong>Score: 8.8 HIGH</strong></p>
<p style="text-align: center;"><a href="https://www.logpoint.com/fr/blog/proxynotshell-detection-de-lexploitation-des-vulnerabilites-zero-day-dans-le-serveur-exchange/"><strong>Context</strong></a> <strong> </strong><strong> </strong><a href="https://github.com/balki97/OWASSRF-CVE-2022-41082-POC"><strong>PoC</strong></a></p>
<p style="text-align: justify;">Microsoft Exchange is a mailbox <span style="color: #56008c;"><strong>server</strong></span> exclusively running on the Windows operating système.</p>
<p style="text-align: justify;">In September 2022, a vulnerability to <span style="color: #56008c;"><strong>compromise the underlying Exchange server</strong></span> was discovered. It was named <span style="color: #1a7173;"><strong>ProxyNotShell</strong></span> after its similarities with the <span style="color: #1a7173;"><strong>ProxyShell</strong></span> vulnerability. To exploit <span style="color: #1a7173;"><strong>ProxyNotShell</strong></span>, attackers need to have an authentified access to the Microsoft Echange server. The exploitation of the vulnerability allows attacker to deploy a webshell on the targeted server, giving them an initial access.</p>
<p style="text-align: justify;">Around November, <span style="color: #56008c;"><strong>a number of mitigations (Hotfix) were released</strong></span> awaiting for a patch. As a result, some <span style="color: #56008c;"><strong>60 000 servers</strong></span> worldwide still are vulnerables <span style="color: #56008c;"><strong>since the few mitigations rules can be bypassed by attackers</strong></span>.</p>
<p style="text-align: justify;">According to <a href="https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations/">CrowdStrike</a>, <span style="color: #56008c;"><strong>Play ransomware group</strong></span>, which has been active since last June, took advantage of this in using a new exploit to bypass the URL rewrite mitigations for the <span style="color: #1a7173;">Autodiscover</span> endpoint. Early December the managed cloud hosting services company <span style="color: #1a7173;"><strong>Rackspace technology</strong></span> complies to having been attacked after a <span style="color: #56008c;"><strong>successful exploit of the vulnerability in Microsoft Exchange Server</strong></span>.</p>
<p style="text-align: justify;">The Microsoft Exchange server should have at least the <span style="color: #56008c;"><strong>KB5019758 patch</strong></span>. If not, the main action to perform is to <span style="color: #56008c;"><strong>immediately install the updates </strong></span>on the vulnerable servers. If some factors make the installation impossible, it is adviced to disable OWA until it can be applied. In addition, it is strongly recommended to disable remote <span style="color: #1a7173;">PowerShell</span> for non-admin users and use EDR tools to detect if web services are spawning PowerShell processes.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/">CDT Watch – January 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – September 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/09/cdt-watch-september-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/09/cdt-watch-september-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Fri, 30 Sep 2022 15:02:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[maui]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[sophos]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=18819</guid>

					<description><![CDATA[<p>FOCUS TECH MAUI Sources: https://www.cisa.gov/uscert/ncas/alerts/aa22-187a https://stairwell.com/wp-content/uploads/2022/07/Stairwell-Threat-Report-Maui-Ransomware.pdf https://securelist.com/andariel-deploys-dtrack-and-maui-ransomware/107063/   Ransomware Activity Presentation of the figures collected by our tool on the data given by the RaaS platforms about their successful attacks. This graph gives an estimation of the number of victims...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/09/cdt-watch-september-2022/">CDT Watch – September 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">MAUI</h2>
<p><img loading="lazy" decoding="async" class=" wp-image-18821 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/1-1-277x191.png" alt="" width="579" height="399" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/1-1-277x191.png 277w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/1-1-57x39.png 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/1-1-768x530.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/1-1-1536x1060.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/1-1.png 1600w" sizes="auto, (max-width: 579px) 100vw, 579px" /></p>
<h6 style="text-align: left;">Sources:</h6>
<p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-187a">https://www.cisa.gov/uscert/ncas/alerts/aa22-187a</a></p>
<p><a href="https://stairwell.com/wp-content/uploads/2022/07/Stairwell-Threat-Report-Maui-Ransomware.pdf">https://stairwell.com/wp-content/uploads/2022/07/Stairwell-Threat-Report-Maui-Ransomware.pdf</a></p>
<p><a href="https://securelist.com/andariel-deploys-dtrack-and-maui-ransomware/107063/">https://securelist.com/andariel-deploys-dtrack-and-maui-ransomware/107063/</a></p>
<h1> </h1>
<h1 style="text-align: center;"><strong>Ransomware Activity</strong></h1>
<p>Presentation of the figures collected by our tool on the data given by the RaaS platforms about their successful attacks. This graph gives an estimation of the number of victims by the most active RaaS groups, by month.</p>
<p><strong>Number of announced victims by the most active Ransomware-as-a-Service (RaaS) for the past 10 months:</strong></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18827 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/4-1-435x191.png" alt="" width="663" height="291" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/4-1-435x191.png 435w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/4-1-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/4-1-768x338.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/4-1-1536x675.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/4-1.png 1920w" sizes="auto, (max-width: 663px) 100vw, 663px" /></p>
<p><strong>Noticeable change: </strong></p>
<ul>
<li>Lockbit2.0 disappears to make room for Lockbit3.0</li>
<li>Conti’s number of victims is dropping after May 2022. It does not mean that the individuals stopped their activities since the organization could have been divided into several groups after the events related to the Russian situation in April 2022 and come back under other names.</li>
<li>The activity has decreased during the summer of 2022, except for Lockbit 3.0.</li>
</ul>
<p><strong>   Number of announced victims by the 15 most active RaaS groups for the past 10 months:</strong></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18829 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/5-1-324x191.png" alt="" width="576" height="340" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/5-1-324x191.png 324w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/5-1-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/5-1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/5-1-768x453.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/5-1.png 957w" sizes="auto, (max-width: 576px) 100vw, 576px" /></p>
<p>It must be taken into account that the data is based on the RaaS declaration of victims, the graphs are therefore an estimation of the reality.</p>
<p> </p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<p><img loading="lazy" decoding="async" class=" wp-image-18823 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/2-1-330x191.png" alt="" width="637" height="369" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/2-1-330x191.png 330w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/2-1-67x39.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/2-1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/2-1-768x444.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/2-1.png 1488w" sizes="auto, (max-width: 637px) 100vw, 637px" /></p>
<p> </p>
<p> </p>
<h1 style="text-align: center;"><strong>VULNERABILITY OF THE MONTH</strong></h1>
<h2 style="text-align: center;">Sophos Firewall</h2>
<h6 style="text-align: center;"><img loading="lazy" decoding="async" class=" wp-image-18825 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/3-1-288x191.png" alt="" width="557" height="370" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/3-1-288x191.png 288w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/3-1-59x39.png 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/3-1-768x509.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/3-1.png 1524w" sizes="auto, (max-width: 557px) 100vw, 557px" /></h6>
<p> </p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/09/cdt-watch-september-2022/">CDT Watch – September 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/09/cdt-watch-september-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
