Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Cyber risk and advisory programs that identify security gaps and build security strategies to address them.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Seamless integration and threat investigation across your existing tech stack.
Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Extend your team capabilities and prevent business disruption with expertise from eSentire.
We balance automated blocks with rapid human-led investigations to manage threats.
Guard endpoints by isolating and remediating threats to prevent lateral spread.
Defend brute force attacks, active intrusions and unauthorized scans.
Investigation and threat detection across multi-cloud or hybrid environments.
Remediate misconfigurations, vulnerabilities and policy violations.
Investigate and respond to compromised identities and insider threats.
Stop ransomware before it spreads.
Meet regulatory compliance mandates.
Detect and respond to zero-day exploits.
End misconfigurations and policy violations.
Defend third-party and supply chain risk.
Prevent disruption by outsourcing MDR.
Adopt a risk-based security approach.
Meet insurability requirements with MDR.
Protect your most sensitive data.
Build a proven security program.
Operationalize timely, accurate, and actionable cyber threat intelligence.
THE THREAT On November 18th, 2024, Palo Alto disclosed a critical actively exploited authentication bypass zero-day vulnerability impacting Palo Alto Networks PAN-OS. The…
Nov 13, 2024THE THREAT Update: eSentire has observed multiple exploitation attempts targeting CVE-2024-8069. In real-world attacks, threat actors successfully achieved RCE and attempted to…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Three MDR package tiers are available based on per-user pricing and level of risk tolerance.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
eSentire has been closely monitoring the Petya/NotPetya malware outbreak this week. Our threat lab has learned more about the behaviors and propagation methods used by this variant. While latest research suggests that this attack may be the result of a geo-political agenda (targeting Ukraine), indications suggest that activity and spread is winding down.
Read on for a summary of the latest from the eSentire Threat Intelligence lab:
There are at least three mechanisms by which the malware is known to spread from one machine to another. The first involves the ETERNALBLUE and ETERNALROMANCE SMB exploits from the Shadow Brokers dump of alleged NSA hacking tools. When the Wannacry worm was released into the wild in May 2017, the ETERNALBLUE exploit allowed it to spread like wildfire due to many organizations not having applied the MS17-010 patch that Microsoft had released a couple of months earlier. It was probably less effective this time around, as many organizations would have deployed the patches by now. Nevertheless, it remains a potent infection vector on networks containing out-of-date (unpatched) Windows hosts.
The other two mechanisms are more interesting. They are examples of well-known techniques that penetration testers and hackers use to move from computer to computer inside a network that they have successfully compromised. The first involves the administration tool PsExec, which is often used for remote deployment of software on enterprise networks. The second leverages a built-in Windows tool called WMIC (Windows Management Instrumentation Command-Line) that can also be used to remotely manage computers on enterprise networks.
Both of these mechanisms require valid administrative credentials in order to work. The Petya malware comes bundled with a credential-stealing tool (based on the well-known Mimikatz) that it uses to extract cached user credentials from the memory of the infected machine, and passes them on to PsExec/WMIC for use in infecting other computers on the network.
In addition to spreading itself from system to system, the Petya malware includes two kinds of encryption functionality. The standard file encryption part scans all fixed drives on the computer for files with “interesting” extensions, and encrypts them with the AES encryption algorithm. It then creates a ransom note file called README.TXT that contains an encrypted version of the AES key. If there are multiple drives, the files on each drive will be encrypted with a different AES key, and will have a separate ransom note file.
The low-level part of the encryption targets two critical data structures on the hard disk, namely the Master Boot Record (MBR) and the Master File Table (MFT). Petya first overwrites the Master Boot Record with its own version that prevents the system from booting its regular operating system and displays a ransom note screen instead. It saves a copy of the original MBR, and creates a scheduled task to restart the system after it has had a chance to complete its network propagation phase. In addition to overwriting the MBR, it also encrypts the Master File Table, which is the main file system data structure that Windows relies on to locate files on disk. Unfortunately, the encryption key is then thrown away by the malware, rendering the MFT unrecoverable. The “installation ID” displayed on the ransom note screen is randomly generated and cannot be used to recover the MFT encryption key. This fact has led some researchers to conclude that Petya/NotPetya was not intended to be for-profit ransomware, and the motivations behind it may have been political.
Petya/NotPetya is a worm (malware that autonomously spreads by copying itself from victim to victim), which means the most likely cause of infection is exposure to a previously infected machine on the same network. However, in order to kick start the spreading process, an initial set of computers must first be infected in a different way. Malware researchers sometimes call this the “initial infection vector”.
Early reports pointed to malicious Microsoft Word documents using the well-known CVE-2017-0199 vulnerability to download and install Petya on victim computers. While this is certainly a possibility, we have not seen any confirmed instances of this infection vector. The purported samples we examined in our lab turned out to be spreading a different strain of malware known as Lokibot.
A more unusual infection vector has now emerged as the prime suspect. According to multiple sources, the Ukrainian tax accounting software maker MeDoc had its software update mechanism co-opted in order to spread the Petya malware to unsuspecting users. MeDoc is one of only two tax software packages approved by the Ukrainian government, so anyone doing business with Ukraine is likely to use it. This could explain how the malware was able to infect some organizations outside of the Ukraine. After initial denials, MeDoc has now confirmed that a breach of its systems has been detected and is currently being investigated.