Critical Vulnerabilities - What's your approach?

Critical Vulnerabilities - What's your approach?

How does your team deal with critical vulnerabilities? For Alert Logic it's all part of the day job. Here's a great example of how we responded to the latest Microsoft vulnerability (https://www.theregister.co.uk/2020/03/12/smb_patch_microsoft/).

What happened?

During the Microsoft 'Patch Tuesday' March Updates, Microsoft accidentally leaked information about a critical remote code execution vulnerability (CVE-2020-0796) in Windows 10 and Windows Server OSs (v1903/v1909). Another “WannaCry” kind of a bug that could be exploited over a network without any authentication. BIG Deal!

How did Microsoft react?

Given the critical nature of the vulnerability, Microsoft got into out-of-band patching mode and released a patch on March 12th 2020 (afternoon US Time).

Alert Logic Threat Intelligence Into Action

As soon as the news of leak came out, our team started work on 2 parallel tracks:

  1. Scanner Detection Check: This is to ensure we can scan any and all vulnerable systems across our customer base to inform them of the issue and any workarounds.
  2. Network IDS Signatures: For detecting active exploits on the network

However, before creating IDS signatures, it was required to find the technical detail on the vulnerability i.e. Reverse Engineering the Vulnerability Details

When there is scant technical information out there on a Windows vulnerability, security researchers really dig into the bits and bytes of the Windows patches, this is where our experts come into play.

What is Reverse Engineering?

Amongst many areas of cybersecurity, this is an area that is complex and requires good expertise & regular practice. Reverse Engineers are able to take Windows patches or malware binaries apart and analyze what a piece of compiled code can do. In this case, our team went through the process of looking in detail at the Microsoft patch – to find out what was changed. The team mapped that information to how the vulnerability would be exploited on the network and suggested IDS Telemetry Signatures for network detection.

We updated our Network IDS signatures across our customers Globally, and our Threat Intelligence teams and SOC are now monitoring for any active exploitation attempts across customers via our internal Threat Hunting portal.

Alert Logic Next Steps

Due to the danger of this vulnerability, we are actively informing any customer that have this vulnerability, and for any customers that are attacked via this route will be called by our SOC 24/7 with our 15 minute SLA.

It’s great to be part of a global team that works tirelessly to secure our customers.

William Morrish

Continuous offensive security - Breaking into the world's most progressive enterprises. Every day.

4 年

Rohit Dhamankar - Massive thanks to your team!

要查看或添加评论,请登录

William Morrish的更多文章

  • Phishing Training Solves Nothing – Let’s Stop Pretending Otherwise

    Phishing Training Solves Nothing – Let’s Stop Pretending Otherwise

    Everyone’s done the training. “Check the URL, don’t click the link, verify the sender.

    11 条评论
  • So, Garmin.. what happened?

    So, Garmin.. what happened?

    Yet another global brand has had its systems impacted to the point where they're unable to work, at all. This isn't the…

    1 条评论
  • Running your business like it's the 90's

    Running your business like it's the 90's

    How well would your business operate if you came into the office to find the most high tech device still running was…

    1 条评论
  • Digital Transformation - It's far more than the cloud

    Digital Transformation - It's far more than the cloud

    I was in the US a few weeks ago at Cloud Expo New York where all of the talk was (as you'd expect) about cloud, but…

  • Data location, location, location

    Data location, location, location

    The recent ruling from the European Commission regarding Safe Harbour has raised significant questions not only about…

  • Go Digital or die? - Nope, react & adapt

    Go Digital or die? - Nope, react & adapt

    We're all being told that in todays world of ICT its all about 'going Digital', changing businesses from the ground up…

    8 条评论
  • Does the top right matter to you?

    Does the top right matter to you?

    Analysts, you either love them or ignore them, but either way their job is to be truly independent and provide third…

    1 条评论
  • Whose got the fastest cloud?

    Whose got the fastest cloud?

    Building your enterprise cloud platform on the right infrastructure means you need high performance. We (Interoute…

社区洞察

其他会员也浏览了