By Talos Group Nick Biasini and Edmund Brumaghin authored this blog post.
Executive summary
Over the past few months, a new malware loader has emerged that targets Italy and other European countries with banking trojans such as Gootkit. We recently released a comprehensive analysis of the functionality associated with JasperLoader. Shortly after the publication of our analysis, the distribution activity associated with these campaigns halted. But after several weeks of relatively low volumes of activity, we discovered a new version of JasperLoader being spread. This new version features several changes and improvements from the initial version we analyzed. JasperLoader is typically used to infect systems with additional malware payloads which can be used to exfiltrate sensitive information, damage systems or otherwise negatively impact organizations.

The attackers behind this specific threat have implemented additional mechanisms to control where the malware can spread and are now taking steps to avoid analysis by sandboxes and antivirus companies. There’s also a new command and control (C2) mechanism to facilitate communications between infected systems and the infrastructure being used to control them. The campaigns that are currently distributing JasperLoader continue to target Italian victims and further demonstrate that while JasperLoader is a relatively new threat, the developers behind it are continuing to actively refine and improve upon this malware at a rapid pace and introduce sophistication that is not commonly seen in financially motivated malware.
Read More >>
The post Sorpresa! JasperLoader targets Italy with a new bag of tricks appeared first on Cisco Blog.

Source:: Cisco Security Notice

By Robert Waitman It’s been an eventful year since the EU’s General Data Protection Regulation, or GDPR, became enforceable one short year ago on May 25, 2018. One of the biggest impacts of the GDPR has been the way in which it has altered the conversation about data privacy. Data privacy has become an increasingly global issue, and the GDPR and other similar regulations have been a forcing factor in getting companies and countries to begin taking customer privacy more seriously and strengthening their risk posture
A new Cisco white paper, Privacy Gains: Business Benefits of Privacy Investment, co-authored with the Beacon Group, looks at the ways privacy is driving value for enterprises worldwide, beyond complying with regulatory standards. The paper analyzes and details the benefits of privacy and contemplates the future state of data privacy.
Based on global survey data from the Cisco 2019 Data Privacy Benchmark Study, and Beacon’s qualitative conversations with select data privacy leaders worldwide, the paper identifies top business benefits realized through privacy investments including better agility and innovation, operational efficiencies, and competitive advantage, and fewer, less costly, data breaches. As one CEO put it, “Good privacy and being compliant can vastly reduce the risk of a data breach.”

The paper also sheds light on the challenges that privacy professionals face across disparate geographies and how they see privacy creating value. Our conversations with business leaders reveal that privacy-related sales delays are frequently caused by issues or misalignment during the vendor contracting process. Specifically, when companies‘ privacy practices or policies are subpar, or they are unwilling to share their current practices, the result can be delays in contract signing or even product redesigns. Furthermore, privacy leaders across the globe clearly articulated the ways in which privacy creates business value for their organizations, and the message is clear: good privacy is good for business.
Our Recommendations
Invest in a comprehensive privacy program and determine the outcomes you want. Then figure out how to curate data to help achieve your business objectives. Untended and uncurated assets can become liabilities. When you actively curate data, you not only achieve compliance, but also efficiency, effectiveness and profitability.
Embed privacy-awareness into your culture using employee training and awareness programs to communicate the value of privacy to all levels of your organization.
Be transparent and accountable. Demonstrate your commitment to protecting and respecting personal data, no matter where it comes from or where it flows.
For a look at Cisco’s eventful privacy journey over the past few years, check out this infographic.

More Information
Cisco and Beacon Privacy Gains White Paper
Cisco 2019 Data Privacy Benchmark Study
Cisco Data Protection and Privacy
The post GDPR One Year On: What Have We Learned? appeared first on Cisco Blog.

Source:: Cisco Security Notice

By Megha Mehta According to Gartner1, “Applying behavioral analysis to network traffic is helping enterprises detect suspicious traffic that other security tools are missing.”
The case for network traffic analysis to uncover hidden threats
You are charged with protecting your organization and have made multiple investments to do so. But you might be under-utilizing one of the biggest investments your organization has already made – the network infrastructure. With 1 in 4 organizations running the risk of a major breach in the next 24 months, it’s not a matter of if but when you will be breached. And you need to be able to detect and respond quickly to incidents.
The network is a rich data source, and by analyzing how the different entities are “behaving” within the network, we can identify malicious activities associated with a breach. This helps detect attacks in near real-time. Today, average time to detect a breach is 197 days2. Can you really afford to wait more than 6 months to know whether you have been compromised? Additionally, network security analytics can expedite investigations to pinpoint the source of the threat so you can take appropriate actions. This considerably cuts down the time to contain a threat from the average 69 days3 to a few hours!

Cisco’s network traffic analysis (NTA) solution, Stealthwatch provides enterprise-wide visibility, from the private network to the public cloud, and applies advanced security analytics to detect and respond to threats in real-time. Using a combination of behavioral modeling, machine learning and global threat intelligence powered by Cisco Talos, Stealthwatch can quickly and with high confidence, detect threats such as command and control attacks, ransomware, DDoS attacks, illicit cryptomining, unknown malware, as well as insider threats. With a single, agentless solution, you get comprehensive threat monitoring across the data center, branch, endpoint and cloud, and even find threats hidden in encrypted traffic.
Stealthwatch has some key attributes that you should demand from your network traffic analysis solution for the following outcomes:
Contextual network-wide visibility
First and foremost, network traffic analysis provides visibility into every device on the network and what it is doing. Legacy servers, IoT, mobile, and remote users – a lot of organizations simply don’t know what’s on their network, let alone be able to protect it. And this visibility extends across all the dynamic environments that are typical of the modern digital enterprise – from the campus, branch and data center to the cloud. And with the rise in encrypted traffic and the internet going dark, you also need visibility into threats hiding in encrypted traffic.
Predictive threat analytics
Secondly, there are some unique threats that can only be detected if you are continuously monitoring network activity. Your traditional security tools will not be able to catch insider threats – caused due to a rogue employee trying to exfiltrate sensitive data or a compromised admin credential that the attackers are now using to swoop the entire organization. Additionally, you have created a lot of security policies to prevent threats, or simply to remain compliant. But how do you know those are being enforced? That the controls you have set up are actually working? Also, as mentioned earlier, network traffic analysis tries to identify malicious behavior and therefore, can help detect threats like unknown malware.
Accelerated response
Lastly, let’s talk about incident response. What do you do if you know that you have been compromised? Where do you begin investigating? With network traffic analysis, you can attribute the malicious behavior to a specific IP and perform forensic analysis to determine how the threat has moved laterally within the organization. What other devices might be infected, where is the communication occurring externally, etc. This leads to faster response in order to prevent any business impact.
Download your complimentary copy of the first ever Gartner 2019 Market Guide for the NTA (Network Traffic Analysis) market here.
To learn more about Cisco Stealthwatch, go to https://cisco.com/go/stealthwatch

Gartner Market Guide for Network Traffic Analysis, Lawrence Orans, Jeremy D’Hoinne, Sanjit Ganguli, 28 February 2019.

Source: Ponemon 2018 Cost of a Data Breach Study

Source: Ponemon 2018 Cost of a Data Breach Study

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

The post Cisco is a Representative Vendor in the first ever Gartner 2019 Market Guide for the NTA (Network Traffic Analysis) market appeared first on Cisco Blog.

Source:: Cisco Security Notice

Der Trend zum flexiblen, modernen und ortsunabhängigen Arbeiten geht weiter. Die Herausforderung dabei besteht darin, Lösungen zu entwickeln, die sich ständig an neue Anforderungen anpassen. Kreativität und Mobilität, das Arbeiten in generations- und länderübergreifenden Teams und das Verschwinden der Grenzen zwischen Arbeit und Freizeit werden Kernpunkte unseres zukünftigen Arbeitslebens sein. innovaphone nimmt diese Herausforderung an und führt mit der neuen Version 13 die innovaphone myApps Gesamtlösung mit dem Communications Client myApps ein.

Highlights der V13

  • Die innovaphone PBX ist weiterhin eine leistungsstarke und durchdachte IP-Telefonanlage. Mit der Version 13r1 wird die Installation und Konfiguration der innovaphone PBX noch schneller, einfacher und bequemer. Zusammen mit den Unified Communications-Funktionalitäten im Rahmen der innovaphone myApps Plattform entfaltet sie ihre volle Leistungsstärke.
  • Die myApps Gesamtlösung besteht aus vielen eigenständigen Komponenten, die einzeln gut funktionieren, aber vor allem zusammen ihre beeindruckende Leistungsfähigkeit entfalten.
  • Mit der innovaphone PBX und der App Platform als Basis können alle Unified Communications-Funktionalitäten ohne Probleme, unabhängig vom Standort und vom verwendeten Gerät angewendet werden.
  • Der Communications Client myApps ist der neue Arbeits- und Kommunikations Client. Er erfüllt alle gewohnten UC- und Telefonie-Funktionalitäten, die in Form von einzelnen Apps gesteuert werden können.
  • Audio- und Videotelefonie, der schnelle Austausch via Messenger-Lösungen oder eine Konferenz mit Application Sharing sind mit den Apps zum Kommunizieren ganz einfach möglich.
  • Die Verwaltung der individuellen Arbeitsumgebung, das Einrichten eines Benutzerkontos oder die übersichtliche Anzeige einzelner Favoriten wird mit Hilfe der Apps zum Arbeiten ein Kinderspiel.
  • Das Anlegen und Einbinden neuer Mitarbeiter sowie eine Vielzahl an Installationen, Wartungen und Konfigurationen lassen sich mit den Apps für Administratoren blitzschnell und einfach durchführen.
  • Auch für die App Entwicklung bietet innovaphone die volle Transparenz.

Oberberg-Online ist seit über 15 Jahren zertifizierter Innovaphone-Partner und hat bereits heute die Zertifizierung für die neue V13 erhalten. Mit dieser Erfahrung stehen wir gerne auch Ihnen als Partner zur Seite.

 

DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net

Marcus Schultes

schultes@oberberg.net

Dirk Zurawski
02261 9155051
zurawski@oberberg.net

Source:: Innovaphone

By Talos Group This blog was authored by Danny Adamitis, David Maynor, and Kendall McKay

Executive summary
Cisco Talos assesses with moderate confidence that a campaign we recently discovered called “BlackWater” is associated with suspected persistent threat actor MuddyWater. Newly associated samples from April 2019 indicate attackers have added three distinct steps to their operations, allowing them to bypass certain security controls and suggesting that MuddyWater’s tactics, techniques and procedures (TTPs) have evolved to evade detection. If successful, this campaign would install a PowerShell-based backdoor onto the victim’s machine, giving the threat actors remote access. While this activity indicates the threat actor is taking steps to improve its operational security and avoid endpoint detection, the underlying code remains unchanged. The findings outlined in this blog should help threat hunting teams identify MuddyWater’s latest TTPs.
Read More
The post Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques appeared first on Cisco Blog.

Source:: Cisco Security Notice

By Neil Patel AV-Comparatives have long been the benchmark of 3rdparty testing in the endpoint security space. This year, for the first time ever, AMP for Endpoints participated in AV-Comparatives malware testing. The Business Main Test Series was broken up into two main sections: the Malware Protection Test and Business Real-World Protection Test.
While the full report will be released in July, AV-Comparatives released a short fact sheet today. Because the test is only partially completed, the results will continue to vary, but Cisco AMP for Endpoints expects to maintain consistently high scores.
Overview
First, let’s give the brief facts behind the Business Main Test Series:
19 products are participating
All products tested on a Windows 10 RS5 64-bit
All vendors were allowed to configure their products
Cloud and PUA detection activated in all products
Given these parameters, the 19 products will participate in a fourth month test culminating in July. At this midpoint, however, the products have participated in the two aforementioned tests.
For more information on specific configurations and a list of all participants, read the full fact sheet here.
Malware Protection Test
In this test, the products were tested with 1,311 different malware samples. Based on criteria defined by AV-Comparatives in their report, the products were given parameters to detect the malware samples.
So far, AMP for Endpoints is one of eight products to have a malware protection rate of 99.8% or higher. In addition to this extremely high detection rate, AMP for Endpoints registered 0 false alarms on common business software.
AV-Comparatives also performed tests on non-business software. This will not affect the final “Approved Business Product” rating they deliver, but the results are notable as it helps to demonstrates how well a product can really delineate between good and bad. Cisco AMP for Endpoints was granted the highest rating of “very low “which denotes 0-5 false positives on non-business software.
Cisco AMP for Endpoints consistently pledges to deliver elite threat detection, investigation, and response. The 99.8% malware protection rate so far highlights Cisco AMP for Endpoint’s ability to deliver on that pledge. At the same time, the low number of false positives shows that Cisco AMP for Endpoints does not need to bog down IT professionals with useless alerts allowing them to focus on what’s really important.
Real-World Protection Test
Over the course of two months, the products encountered 389 test cases. Of the 389 test cases, Cisco AMP For Endpoints has blocked all but three while producing ZERO false alarms. Resulting in a 99.2% protection rate so far. Cisco AMP For Endpoints is only one of three products to have zero false alarms. Others have already flagged up to 18 false alarms.
Conclusion
It is important to note that this test has not concluded. We are, however, very excited for a continued strong showing from Cisco AMP for Endpoints in the second half of the test. So far, Cisco AMP for Endpoints has already shown an elite combination of threat detection, investigation, and response combined with low false positives designed to empower IT professionals to quickly identify and respond to threats.
For more on the report, click here.
To try AMP for Endpoints for free, sign up for the free trial.

The post Cisco AMP for Endpoints excelling in AV Comparatives Business Main Test Series appeared first on Cisco Blog.

Source:: Cisco Security Notice

Herzlichen Glückwunsch unseren Kollegen von Oberberg-Aktuell zum Start der neuen Version.

Nach monatelanger Arbeit startete heute Nachmittag die neue Seite unseres seit Anfang 2000 bestehenden oberbergischen Nachrichtenportals. Viele Stunden paralleler Pflege im Alt- und Neusystem liegen hinter der Redaktion. Probeläufe unserer Technischen Kollegen auf der neuen Infrastruktur, Sonderschichten der Programmierer unserer Freunde von Kiwis & Brownies, sowie zahlreiche Gestaltungsstunden unseres Partners Remus + Rachel liegen nun hinter uns und wir freuen uns, ein moderneres, aufgeräumteres und technisch zukunftsfähiges OA zu präsentieren. Was heute mit Schritt 1 startet, bedeutet jedoch nicht das Ende der Entwicklung, sondern wird uns mit zyklischen Neuerungen erfreuen.

Danke an alle Helfer für den Einsatz, danke an die treuen Werbepartner für Ihre Geduld und viel Freude unseren Lesern mit Oberberg-Aktuell 3.0.

By Pierre Cadieux During the past year, Cisco Security Incident Response Services has provided emergency incident response services for many customers dealing with incidents that sometimes become a ransomware event. In many cases, we were engaged by the company at the first sign of trouble and were able to help contain the initial incident and reduce the ability of the attacker to shift to a ransomware phase. In other incidents, we were asked to help long after the attackers were in the environment and the systems were already encrypted.
In this blog post, I will share some practical tips that our team use with our customers to help mitigate the risk of ransomware causing a significant business outage.
Figure 1: Phases of an attack.
If we follow the standard attack lifecycle (Figure 1), the first step that we need to consider is how we would address the initial attack vector. For this blog post, let us assume the initial access vector is email (which we have observed is often the case).
Initial Attack
The first thing to consider is intelligence-based email monitoring and filtering. An example of this would be the Cisco Email Security Appliance (ESA) product which integrates Cisco Talos threat intelligence into an active email inspection platform.

ESA should be deployed to examine email, both inbound and outbound, from the organization. This filtering should be tied to an intelligence feed that dynamically adds new known malicious domains, IP addresses, behavioral indicators, signatures, etc.
By itself, this will not fully protect an organization but without this, you expose your users and your environment to preventable email-based attacks. This control should create log events into the security monitoring system. These events should be reviewed regularly by a member of the monitoring team and if possible correlated with other events (involving the same time, internal hosts, external IP/Domain, and any malware detected). The capability of being able to also review email historically for suspicious attachments or previously unidentified malicious files is helpful for scoping and understanding the scale of the incident and can be used for hunting if the initial detection somehow fails.
User Actions
Subsequent to the initial malicious email entering an environment, the next obvious question is “did the user open it” or “did the user click the link”? To answer these questions, we require some specific log telemetry from within the environment.

DNS logs such as those available by using Cisco Umbrella, can be invaluable to identify if a user/IP address/device made a request that is related to a known suspicious domain or IP address. If there is an active incident, these logs should be examined for any requests associated with the incident. These DNS logs should be part of the overall logging environment and the events should also be used to block and track requests to known malicious domains. Again, this should be correlated into events of interest for the monitoring team to consider. This helps us understand if the domain was requested, but does not by itself indicate what the interaction was between the user and the destination.
To gather information on the interaction between the user and the destination, we require logs from a deployed web proxy system that captures the outbound web requests and the responses. Cisco Web Security Appliance (WSA) is an example of an active web proxy/filtering system, powered by Cisco Talos threat intelligence. These systems can often block or filter known malicious sites (based again on intelligence) and also retain the http transaction between the user’s web browser and the destination. This can help us to answer the question of what was done on the site, or what the site sent as a response.
To address the question of “did the user open the file” we recommend the implementation of the Windows SysInternals System Monitor (Sysmon) which can help to answer the question of user behavior and activity. Alternatively, many endpoint security tools may also be able to answer this question. Be sure to test your tools before an incident, so you know what normal activity looks like before you get into an incident and have to try to parse the alerts.
Account Compromise
Following the attack life-cycle, the next phase is account compromise: did the user either provide their credentials (e.g., if they were prompted to enter their password to access what appeared to be a legitimate company web page) or did the malware gather local cached account data from the system? This is where we recommend multi-factor authentication (MFA) as the standard for all environments.

We frequently recommended multi-factor for “high risk” accounts, or for “all externally facing services”, but with the current attack patterns we recommend multi-factor for all Active Directory environments. There can be technical limitations on implementing MFA for some legacy systems, legacy access types, etc. Those exceptions should be identified and very closely monitored for unexpected activity, or isolated into separate Organizational Units or Groups. This may allow early detection of misuse and may limit the impact of these systems or credentials, should they become compromised.
Another key consideration is to monitor the system used to manage the multi-factor authentication. We have seen attackers attempt to bring these systems offline, to attempt to access these systems, or to successfully access these systems and either create one-time use passcodes or create a new account that was allowed to bypass the multi-factor requirement. These systems must be closely monitored for all access and modifications to the users, groups, or creation of one-time use codes.
Privilege Escalation
The next phase is privilege escalation. In this phase, we recommend a multi-pronged approach as there are multiple risks to address. The first risk is if the environment has a shared local administrator password across multiple devices. This is still a very common practice in many environments due to a number of factors.

A solution that can assist with this is implementing the Microsoft Local Administrator Password Solution (LAPS). This provides a better method to manage local accounts. The second risk is an attacker compromising one of the privileged accounts in the environment. If multi-factor authentication is required on these accounts, this should be unlikely, but these accounts must still be monitored for mis-use. Additionally these privileged groups should be monitored for modification (adding/deleting or users, or change to the group roles). These are also events that should trigger alerts that are evaluated by the monitoring team.
Lateral Movement
Lateral movement occurs next. To detect and thwart this, we need to reduce the ability for a user account to move freely within the environment without being validated or having authorization.

This can be started by reducing the internal network access from the standard user segments and VPN devices. Network segmentation can be complex to implement across the entire environment, but it is often achievable to make some small restrictions using virtual LANs (VLANs) to reduce which networks can access critical segments. Privileged activity or Administrator activity should always originate from an approved “jump box” that is hardened and monitored, and has specific access restrictions for only users that require this access. Role-based access should also be enforced, not everyone should have access to production, not everyone should have access to the code base, or sensitive data. Access (successful and failed) should be logged and correlated. Reducing the number and type of ports and protocols within the environment may also help to reduce the spread of malware or lateral movement that is expecting specific capabilities, such as the Server Message Block (SMB) protocol, for example.
Encryption of Data
The ultimate risk of a ransomware attack is in the final phase. This is when the attacker is able to encrypt critical business systems or services, causing a business outage. The impact of this outage varies based on the function of your business, your tolerance (or your customers‘ tolerance) for downtime, and many other factors.

For environments that have critical services that impact life and safety of people, we strongly recommend partnering with the disaster recovery and business continuity teams to test existing plans and update them accordingly with steps that cover full data center loss via ransomware. Other questions that should be considered: Are your backups offline and secure from the possible ransomware? Does your online backup system use the same credentials as your Active Directory environment? Has your organization practiced what a data restore would look like and how long it would take? Is the necessary hardware (or virtual space) available to be able to restore your environment? Is there an understanding of dependencies and other tactical considerations?
Take Action Today
These recommendations will help you improve your ability to detect attacks in the earlier (pre-ransomware) stages and will reduce the overall impact of a ransomware incident. You must take key preventative steps, while also readying your team to act when it strikes. Educate yourself with more information on Cisco Ransomware Defense solutions. If you feel you need hands-on, expert assistance, consider contacting our team – our incident responders can help you prepare your own team with proactive services and we can work alongside your team during active incidents.
The post Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today appeared first on Cisco Blog.

Source:: Cisco Security Notice

Als Neuzugang  im Team begrüßen wir Martin Krause.

Martin beschäftigt sich seit seiner Teenagerzeit mit Computern und Programmierung, entschied sich jedoch seinerzeit zunächst für eine kaufmännische Ausbildung in einem oberbergischen Mittelstandsbetrieb. Der Wechsel in den dortigen IT-Bereich war die logische Konsequenz und die Themen reichten bis hin zum Wechsel von der Mainframe-Architektur zur Microsoft basierten Client-Server-Lösung.

Mit verschiedenen Microsoft-Zertifizierungen gerüstet, verantwortete er bei seinem vorigen Arbeitgeber die komplette Netzwerk-Infrastruktur über 30 Standorte hinweg. Bei uns kümmert sich Martin in erster Linie um den Bereich Schulen und öffentliche Auftraggeber.

Martin ist verheiratet, hat zwei Kinder und zwei Enkel und wohnt mit seiner Frau im Nordkreis. Wenn er nicht für unsere Kunden im Einsatz ist, stehen das Eigenheim und Reisen an wärmere Orte ganz oben auf der to-do-Liste.

Willkommen bei uns im Team, Martin.