Sysmon 12.03, SDelete v2.04, WinObj v2.23 and ARM64 releases

This article is contributed. See the original author and article here.


Sysmon v12.03


This version of Sysmon fixes reporting and a possible crash condition for PipeEvent and RegistryEvent rules.

 

SDelete v2.04


This update to SDelete, a command line utility for secure file deletion, provides a new switch, -f, to to avoid file/directory versus drive ambiguity.

 

WinObj v2.23


This update to WinObj, a utility to explore the Windows NT Object Manager’s namespace, brings bug fixes and is now available for x64 and ARM64.

 

ARM64 ports


New ARM64 releases for ADRestore v1.2, LogonSessions v1.41 and WinObj v2.23. Download all ARM64 tools in a single download with the Sysinternals Suite for ARM64.

Microsoft 365 & SharePoint PnP Weekly – Episode 106

Microsoft 365 & SharePoint PnP Weekly – Episode 106

This article is contributed. See the original author and article here.

pnp-weekly-episode-107-promo.png


 


In this installment of the weekly discussion revolving around the latest news and topics on Microsoft 365, hosts – Vesa Juvonen (Microsoft) | @vesajuvonen, Waldek Mastykarz (Microsoft) | @waldekm, are joined by Business Apps MVP Serge Luca (a.k.a., Dr. Flow) (Power Platform Associates) | @sergeluca. 


 


Discussed in this session – Serge’s interest in Power Platform, growth in the number of available connectors – application integration, and data storage options.  As well, the need for more developer focused patterns and practices was called out.


 


Regarding data storage, the group more-or-less defined a decision tree.   There is product – CDS (free or paid), SQL/Azure, SharePoint, or Hybrid and there are other considerations – licensing, app types, security/permission requirements, data storage costs, and database management.   Finally, Serge gives viewers a quick tour of the workflow companion tool he has been developing called BPM.


 


This episode was recorded on Monday, November 23, 2020.


 



 


Did we miss your article? Please use #PnPWeekly hashtag in the Twitter for letting us know the content which you have created. 


 


As always, if you need help on an issue, want to share a discovery, or just want to say: “Job well done”, please reach out to Vesa, to Waldek or to your PnP Community.


 


Sharing is caring!

Azure Stack Hub Partner Solutions Series – BORDONARO IT

This article is contributed. See the original author and article here.

This week, Tiberiu Radu (Azure Stack Hub PM) and I, had the chance to speak with Microsoft MVP Dino Bordonaro from Azure Stack Hub Partner BORDONARO IT. BORDONARO IT is an Azure Stack Hub partner and Preferred SI that focuses on managed services. They are lead by Dino Bordonaro, who is an Azure Stack Hub MVP, and together with his team, they are delivering value to their customers by creating hybrid solutions on Azure and Azure Stack. BORDONARO IT runs the Center of Excellence where they offer Validation as a Service and PoC environments that partners and customers can use.


 


We created this new Azure Stack Hub Partner solution video series to show how our customers and partners use Azure Stack Hub in their Hybrid Cloud environment.  In this series, as we will meet customers that are deploying Azure Stack Hub for their own internal departments, partners that run managed services on behalf of their customers, and a wide range of in-between as we look at how our various partners are using Azure Stack Hub to bring the power of the cloud on-premises.


 


 


 


Links mentioned through the video:



 


I hope this video was helpful and you enjoyed watching it. If you have any questions, feel free to leave a comment below. If you want to learn more about the Microsoft Azure Stack portfolio, check out my blog post.

Demystifying Ransomware Attack against Microsoft Defender Solution

Demystifying Ransomware Attack against Microsoft Defender Solution

This article is contributed. See the original author and article here.

RS2.gif

Hi IT Pros,

As you knew it, Ransomware is in aggravated assault mode at this time of year 2020, the joint cybersecurity advisory comes from the Cybersecurity Infrastructure and Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) have just given a serious warning about Ransomware Threat as shown in the following announcement:

TanTran_1-1606259880764.png

Debut in August of 2018, the Ransomware Ryuk gained shocking attention in 2019, Ryuk gangs demanded multi-million-dollar ransoms from victims, among them are companies, hospitals, and local governments. The actors be able to pocket over $61 million just in the US alone, according to FBI’s report.

Check Point, a security software vendor also noted that the gang was attacking on an average of 20 companies every week in the third quarter of 2020.

Sean Gallagher from Sophos Lab, gave us the story about a typical Ryuk and Conti Ransomeware attack.

  • The attack began on the afternoon of Tuesday. September 22,2020 when multiple employees of the targeted company had received highly targeted phishing emails.
  • The email was tagged with external sender warnings by the company’s mail software. The link, served up through the mail delivery service Sendgrid, redirected to a malicious document hosted on docs.google.com.

Multiple instances of the malicious attachment were detected and blocked. But there was one employee who clicked on the link in the email that afternoon, allowing the document to execute print_document.exe—a malicious executable identified as Buer Loader.

  • The Buer Loader malware dropped qoipozincyusury.exe, a Cobalt Strike “beacon,” along with other malware files.
  • Cobalt Strike’s beacon makes a covert connection to the command and control of hackers.

By Wednesday morning the actors had obtained administrative credentials and had connected to a domain controller, where they performed a data dump of Active Directory details.

Data dump to an Admin User directory was most likely accomplished using SharpHound, a Microsoft C#-based data “injestor” tool for BloodHound (an open-source Active Directory analysis tool used to identify attack paths in AD environments).

  • Ransomware attack is now ready to remotely deploy to other servers using WMI, Powershell and Remote Desktop RDP
  • Next, the SystemBC malicious proxy was deployed on the domain controller. SystemBC is a SOCKS5 proxy used to conceal malware traffic that shares code and forensic markers with other malware from the Trickbot family.
  • The malware installed itself (as itvs.exe), and created a scheduled job for the malware, using the old Windows task scheduler format in a file named itvs.job—in order to maintain persistence.

TanTran_2-1606259880776.png

  • The organizational backup server was among the first targeted. The attackers used the icacls command to modify access control, giving them full control of all the system folders on the server. GMER is frequently used by ransomware actors to find and shut down hidden processes, and to shut down antivirus software protecting the server.

Ryuk ransomware was redeployed and re-launched three more times in short order after each failed attempt, no files were encrypted.

TanTran_3-1606259880784.png

Lesson Learn

  •  The actor could repeat the attack multiple times with different variants of Ryuk, the attack period could be prolonged for days or weeks with multiple backdoors been used.
  • Response time is critical to prevent damage from further steps down the path of attacking sequence, from reconnaissance, credential compromise to later movement, domain dominance and exfiltration, data encryption, data deletion.
  • Team effort should be fully utilized during the attacking period.
  • If more resources are needed, Security Team could consult with online security support experts ASAP to form an united front against hackers .
  • We need to stop the attack at the Cobalt Strike Beacon level (step 2 in the above Chart) when compromised system starts connecting to outside command and control center of actor.
  • The attack also shows that Remote Desktop Protocol can be dangerous even when it is inside the firewall.
  • Proactive prevention with ASR rules for Office documents’ macros could be an important factor to avoid the ransomware attack right at step 0, by giving no attack opportunity . We should consider it as the best option. (see MD for Endpoint Mitigation Plan)

How good is Microsoft Defender for Endpoint and Identity against ransomware attack? 

You may be worried and wonder how good the MD for Endpoint and MD for Identity could protect your systems from ransomware.

Well, let us bring MD to the test. The most trusted industry test could be AV-Test from the Independent IT-Security Institute, who has been known as the owner of the largest malware database in the world.

  • For Windows Systems Antivirus Products.  AV-Test conduct monthly tests against widespread and prevalent malware discovered in the last 4 weeks, for example, the test-set of August 2020 included 21,851 (virus) samples. AV-TEST creates identical and reproducible conditions for all the antivirus products from all big AV vendors who join the test program.
  • MD for Endpoint continue getting AV-TEST top score monthly as shown in the following image, it scores 100% compared to the Industry at 97.6% protection level:

rs1.png

The test result table for all products based on protection, performance, usability scores is shown here, value of 6 is the highest score:

rs2.png

https://www.av-test.org/en/antivirus/business-windows-client/windows-10/june-2020/

Now, let us conduct our own test using the MD for Endpoint – Evaluation Lab feature:

  • we will create at least 3 test devices run windows 10 and windows server 2019 as shown here:

Rs04.png

  • We run the ” known ransomware infection” simulation by Safe breach for testmachine1
  • You may also want to run different attack simulations provided by Safebreach and AttackIQ for different devices

Rs05.png

with ” known ransomware infection” attack simulation , the following ransomware names are detected and alerted on test machine1:

Rs3.png

Click on WannaCrypt ransomware to show the details about malicious file named Llac.exe and how long it stayed before being quarantined (3 minutes and 15 seconds):

Rs4.png

Click on Petya ransomware to show detail of malicious file named bdata.bin, it was existed within only 5 seconds and been quarantined:

Rs5.png

The ransomware attack overview and its entities are shown in the incident named “Multi-stage incident involving Initial access & Discovery including Ransomware on multiple Endpoints” tree graph,

  • The Wanacry Ransomware file, llac.exe was blocked at source on testmachine1 with a total of 6 failed attempts.
  • The Wanacry Ransomware file, llac.exe was blocked at source on testserver3.

Picture6.png

  • The Petya ransomware file, bdata.bin had been laterally spread out to testserver2 before it was stopped.

Rs7.png

 

Ransomware Action

 

MD for Endpoint and MD for Identity Alert
Malicious services were created on remote servers using the same admin credentials, using WMI Event to drop command payload. MD for Endpoint Alert: WMI suspicious Event

Rs8.png

PowerShell is used to download more malicious payloads.

 

MD for Endpoint Alert
Credential theft activity MD for Identity Alert about overpass the hash attack:

Rs10.png

Rs11.png

Impersonate action on privilege account and privilege group membership by PowerShell script. Alert by MD for Identity and displayed in Cloud App Security Portal:

Rs12.png

Keyboard hijack activity Alert by Defender for Endpoint:

Rs13.png

Fileless attacks with memory payload. These activities could be detected by AMSI, Microsoft’s Anti-Malware Scanning Interface, when it inspects the in-memory process. MD for Endpoint raised the alert, details as follow:

Rs14.png

Mimikatz was used as a credential theft tool, It was detected and blocked from installation.

Mimikatz files were quarantined.

Alert by MD for Endpoint

Rs15.png

Backdoor activity detected Alerted by MD for Endpoint:

Rs16.png

Ransomware Payload and encryption activities are prevented beforehand. There is no domain dominant – alert event.

There is no encryption – alert event.

 

 Ryuk Ransomware Prevention and Protection strategy provided by MD for Endpoint – Threat Analytics.

Microsoft Defender for Endpoint Analytics proposed an analyst report and mitigation (plan) against the Ryuk ransomware. Each of the attack step in Ryuk’s killing chain is mapped to the protection measures which include Antivirus-EDR (MD for Endpoint), Azure ATP (MD for Identity), Multi Factors Authentication MFA, Attack Surface Reduction rules for Office Macro, Windows Host Firewall, and Tamper Protection Security Policy.

The detail of Ryuk attack based on MITRE ATT&CK process is shown in the following image, each Ransomware action step of the attack sequence was mapped to one or multiple counter attack measure:

Rs01.png

Mitigations provided by MD for Endpoint – Threat Analytics

  1. Apply these mitigations to reduce the impact of this threat:
  • Utilize the Microsoft Defender Firewall and your network firewall to prevent RPC and SMB communication among endpoints whenever possible. This limits lateral movement as well as other attack activities.
  • Turn on tamper protection features to prevent attackers from stopping security services.
  • Enforce strong, randomized local administrator passwords. Use tools like LAPS.
  • Monitor for clearing of event logs. Windows generates a security event ID 1102 when this occurs.
  • Ensure internet-facing assets have the latest security updates. Audit these assets regularly for suspicious activity.
  • Determine where highly privileged accounts are logging on and exposing credentials. Monitor and investigate logon events (event ID 4624) for logon type attributes. Highly privileged accounts should not be present on workstations.
  • Turn on cloud-delivered protection and automatic sample submission on Microsoft Defender Antivirus. These capabilities use artificial intelligence and machine learning to quickly identify and stop new and unknown threats.
  • Turn on attack surface reduction rules, including rules that block credential theft, ransomware activity, and suspicious use of PsExec and WMI.
  1. Check the recommendations card for the deployment status of monitored mitigations in “Threat & Vulnerability Management” under “Remediation”.

Rs02.png

If Security Administrators enable EDR and all features of Defender, setup alert notification and completely finish all of the Defender Endpoint and Defender Identity’s remediation plans against each ransomware and malware, then, I guess, our colleagues may have a much better sleep at night, knowing that their systems are safe and well protected from ransomware and other malware threats.

To get to the 100% level of protection your defender strategy should always include Windows 10 Defender Guard (Application Guard, Credential Guard, Exploit Guard with Attack Surface Reduction rules, System Guard, …) together with MD for Endpoint deployed on workstations and servers and MD for Identity applied to all domain controllers.

I hope the info is useful,

Have a valuable time with your Defender!

___________________________________

Reference:

Service Fabric Clusters secured with certificates issued by DigiCert – at risk of undergoing outage

This article is contributed. See the original author and article here.

What is the Certificate Validation Issue? 


DigiCert introduced a new CA which reuses the signing key of an existing and still-valid CA. This means there are 2 different CA certificates in circulation, and either can be included in the chain built for a certificate signed by this shared key. Existing certificates declared in Service Fabric clusters by subject with issuer pinning are at risk of spontaneously failing validation.  


 


How to identify if your cluster is susceptible to the Certificate Validation Issue? 


This issue affects any SF cluster that uses a Cluster certificate that is a DigiCert-issued X509 certificate(s), declared by common name with issuer pinning with the following configuration: 



  • Certificate’s Authority Key Identifier Extension matches  



  • OId: 2.5.29.35 

  • KeyID=0f80611c823161d52f28e78d4638b42ce1c6d9e2 




  • SHA1 thumbprint 1F:B8:6B:11:68:EC:74:31:54:06:2E:8C:9C:C5:B1:71:A4:B7:CC:B4 



  • valid until 08/Mar/2023 

  • serial # 01:FD:A3:EB:6E:CA:75:C8:88:43:8B:72:4B:CF:BC:91 
     



  • SHA1 thumbprint 62:6D:44:E7:04:D1:CE:AB:E3:BF:0D:53:39:74:64:AC:80:80:14:2C 



  • valid until 22/Sep/2030 

  • serial #02:74:2e:aa:17:ca:8e:21:c7:17:bb:1f:fc:fd:0c:a0 () 



  • Pinned-issuer list for cluster configuration includes 1fb86b1168ec743154062e8c9cc5b171a4b7ccb4 but does not include 626D44E704D1CEABE3BF0D53397464AC8080142C 


If your cluster is not configured using the above properties, you may disregard the rest of this post.  


 


Symptoms in impacted environments 



  • One or more cluster nodes appear down/unhealthy. 

  • Cluster is unreachable, whether from the Azure portal or directly (SFX/other clients). 

  • Event logs show errors like: “authorization failure: CertificateNotMatched”. 

  • Pending upgrades are not progressing/appear to be stuck.



Required Action 



  • Follow the Trouble Shooting guide with Mitigation steps: Troubleshooting Guide  

  • Mitigation specified in the TSG must be applied by you.  


 


If you have any questions or concerns, please contact us by opening a support request. In addition, here are your general support options for Service Fabric: Learn about Azure Service Fabric Support options – Azure Service Fabric | Microsoft Docs