<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.brocent.jp/blogs/tag/itsecurity/feed" rel="self" type="application/rss+xml"/><title>Managed IT Services ASIA - China, HK, Singapore, Taiwan, Japan | Break Fix, Remote Support - Blog #Law &amp; IT Security</title><description>Managed IT Services ASIA - China, HK, Singapore, Taiwan, Japan | Break Fix, Remote Support - Blog #Law &amp; IT Security</description><link>https://www.brocent.jp/blogs/tag/itsecurity</link><lastBuildDate>Sat, 18 Oct 2025 15:01:03 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[eCh0raix Ransomware Variant Targets QNAP, Synology NAS Devices]]></title><link>https://www.brocent.jp/blogs/post/ech0raix</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/BLOG_PHOTO/NAS_Storage_Generic.jpg"/>In a report published Tuesday, Palo Alto Network Unit 42 researchers said the new variant of eCh0raix exploits a critical bug, CVE-2021-28799 – an improper authorization vulnerability]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_mqPAtjQ4Q9WPNReMFLB7Kw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xuabfDB3TySM7w0KO5qKtg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_po8Ao24CRpKe9lV86uCAmg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_po8Ao24CRpKe9lV86uCAmg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_PKw96TWvRY-_ENKZccg5jg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PKw96TWvRY-_ENKZccg5jg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-left " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">eCh0raix Ransomware Variant Targets QNAP, Synology NAS Devices</span></span></h2></div>
<div data-element-id="elm_RXMdNytMQJ-D-uKlDEE2IQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_RXMdNytMQJ-D-uKlDEE2IQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">Operators of the nearly-year-old eCh0raix ransomware strain that’s been used to target QNAP and Synology network-attached storage (NAS) devices in past, separate campaigns have, gotten more efficient. According to researchers, both have put out a new variant that can target either vendors’ devices in a single campaign.</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">In a&nbsp;report&nbsp;published Tuesday, Palo Alto Network Unit 42 researchers said the new variant of eCh0raix exploits a critical bug,&nbsp;CVE-2021-28799&nbsp;– an improper authorization vulnerability that gives attackers access to hard-coded credentials so as to plant a backdoor account – in the Hybrid Backup Sync (HBS 3) software on QNAP’s NAS devices.</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">HBS is used for backup, restoration and synchronization between local, remote and cloud storage spaces. On April 21, users of devices marketed by the Taiwanese vendor – Quality Network Appliance Provider (QNAP) –&nbsp;began to report attacks&nbsp;that, it turned out, abused this same flaw. Hundreds of users were extorted, as Bleeping Computer reported at the time.</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:20px;color:rgb(0, 0, 0);font-weight:700;">Timeline</span></p><p><span style="font-size:20px;color:rgb(0, 0, 0);"><br></span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">As far as unit 42 can determine, there’s been no analysis yet of malware samples that would show eCh0raix ransomware targeting Synology devices before this. “Instances of Synology devices infected by eCh0raix have been reported from as far back as&nbsp;2019,&nbsp;but the only&nbsp;previous research&nbsp;connecting the Synology attacks to eCh0raix actors is based on decryptors that were found,” they elaborated.</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">The first time that Unit 42 researchers saw this dual-vendor variant was September 2020. Maybe the combined variant was authored at that time and the attackers had separate code bases to target the vendors’ devices in separate campaigns before that, they suggested: a hypothesis that’s confirmed by the new variant’s project name, as revealed in compilation paths in GoLang binaries: “rct_cryptor_universal” (/home/dev/GoglandProjects/src/rct_cryptor_universal).</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">“Prior samples of eCh0raix use the project name qnap_crypt_worker,” researchers pointed out. Between June and September 2020, they did see other eCh0raix samples using that rct_cryptor_universal project name, but September 2020 was when they first saw a full-blown sample with two separate code flows.</span></p><h2 style="font-weight:700;"><p style="font-size:16px;"><br></p></h2><h2 style="font-weight:700;"><span style="color:rgb(0, 0, 0);font-size:20px;">Cover Your NAS</span></h2><h2 style="font-weight:700;"><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);font-weight:400;">Unit 42 passed along these best practices for protecting home offices from ransomware attacks:</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);font-size:15px;font-weight:400;"><br></span></p><ul><ul><li><span style="color:rgb(0, 0, 0);font-size:14px;font-weight:100;">Update device firmware to keep attacks of this nature at bay. Details about&nbsp;updating QNAP NAS devices&nbsp;against CVE-2021-28799 can be found on the QNAP website</span></li><li><span style="color:rgb(0, 0, 0);font-size:14px;font-weight:100;">Create complex login passwords to make brute-forcing more difficult for attackers.</span></li><li><span style="color:rgb(0, 0, 0);font-size:14px;font-weight:100;">Limit connections to SOHO connected devices from only a hard-coded list of recognized IPs to prevent network attacks that are used to deliver ransomware to devices.</span></li></ul></ul></h2></div>
</div><div data-element-id="elm_Vjg9pCXsitW-0Il28iD9MQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Vjg9pCXsitW-0Il28iD9MQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/BLOG_PHOTO/NAS_Storage_Generic.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 11 Aug 2021 00:08:35 +0000</pubDate></item><item><title><![CDATA[Indonesia Customs has updated new regulations]]></title><link>https://www.brocent.jp/blogs/post/Indonesia_Custom_Rule</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/BLOG_PHOTO/INDONESIA_OFFICE.png"/>The Indonesia Customs has updated new regulations and the changes will be effective from 1 August, 2021. To prevent any shipment delays to and from Indonesia, we have summarized the key points for you to take note of.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_vC72bvLVSCamqI1y55An0g" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_lWTiyQQSSt-rNITmaErWrw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_zrz5BkQ0QsW_-Q3oLhLVeQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_zrz5BkQ0QsW_-Q3oLhLVeQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_VaxBHFyjTo6CpwetbOMdKQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_VaxBHFyjTo6CpwetbOMdKQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-left " data-editor="true"><span style="color:inherit;">Indonesia Customs has updated new regulations</span></h2></div>
<div data-element-id="elm_HS6YjgEGSpWcPWRN7EHfug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HS6YjgEGSpWcPWRN7EHfug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">Dear Valued Customer,</span></div><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span><br></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">The Indonesia Customs has updated new regulations and the changes will be effective from 1 August, 2021.&nbsp; To prevent any shipment delays to and from Indonesia, we have summarized the key points for you to take note of.&nbsp;</span></div><p style="text-align:left;"><br></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">What this means for you</span></div><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">1. The Indonesian tax ID number or NPWP (Nomor Pokok Wajib Pajak) is now mandatory for import and export shipments.&nbsp;</span></div><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">This is mandatory for all transactions and parcel types except documents.</span><br></p><p style="text-align:left;"><br></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">For businesses, companies in Indonesia must provide the Indonesian Tax ID Number or NPWP when importing or exporting shipments.</span></div><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">For personal shipments, you are required to provide the Indonesian Tax ID Number or NPWP as well. If that information is unavailable, these are alternative information you may provide in place of that.</span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">•Indonesian ID Number (NIK - Nomor Induk Kependudukan) for Indonesian Nationals</span></div><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">•Indonesian Driver’s License, for Indonesian Nationals or Foreigners</span></div><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">•Passport Number, only for Foreigners</span></div><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">2. Provide complete and accurate commercial invoice</span></div><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">Ensure that all relevant accompanying documents such as the commercial invoice is complete and accurately filled.&nbsp;</span></div><p style="text-align:left;"><br></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">3. Have the recipient's contact details ready&nbsp; &nbsp; &nbsp;</span></div><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">If you are shipping to Indonesia, please ensure you have the receiver's contact details, such as a valid email address or phone number.&nbsp; This ensures delays can be minimised if the recipient's details are required upon customs clearance by the local DHL team.&nbsp;</span></div><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><div style="text-align:left;"><br></div></div>
</div><div data-element-id="elm_uezp2jPastzkbLj9I12sXQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_uezp2jPastzkbLj9I12sXQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/BLOG_PHOTO/INDONESIA_OFFICE.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 27 Jul 2021 02:01:18 +0000</pubDate></item><item><title><![CDATA[One-Click Mitigation Tool Mitigating Exchange Attacks]]></title><link>https://www.brocent.jp/blogs/post/MS_Exchange_Tool</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/Microsfot/Microsoft-Building-Logo.jpg"/>Microsoft’s scramble to address the fallout from the zero-day attacks against on-prem Exchange Server installations continued this week with the release of a one-click mitigation tool help businesses contain the damage.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_RpVcy3T5RX2lj9udnGX1qA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fF83sLkfQgeH7woEDCl1DA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_dmrwRKTYRN-__2U_ta0XRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_1iecBKuySwuheSZXxDVGAw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_1iecBKuySwuheSZXxDVGAw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">One-Click Mitigation Tool Mitigating Exchange Attacks</span></h2></div>
<div data-element-id="elm_n8CgorsjRIa2yCCmxb4x1g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_n8CgorsjRIa2yCCmxb4x1g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong>Microsoft’s scramble to address the fallout from the zero-day attacks against on-prem Exchange Server installations continued this week with the release of a one-click mitigation tool help businesses contain the damage.</strong></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong><br></strong></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">The new&nbsp;<a href="https://github.com/microsoft/CSS-Exchange/releases/latest/download/EOMT.ps1" target="_blank">Exchange On-premises Mitigation Tool (EOMT)</a>&nbsp;is aimed at companies without dedicated security or IT teams to manage patching and post-incident forensics.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Microsoft said the tool has been tested across Exchange Server 2013, 2016, and 2019 deployments and is meant to be “an interim mitigation for customers who are unfamiliar with the patch/update process or who have not yet applied the on-premises Exchange security update.”</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">The EOMT has been combined with the&nbsp;<a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/safety-scanner-download" target="_blank">Microsoft Safety Scanner</a>&nbsp;to automatically mitigate the dangerous&nbsp;<strong>CVE-2021-26855</strong>&nbsp;vulnerability on any Exchange server on which it is deployed.&nbsp;</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">“This tool is not a replacement for the Exchange security update but is the fastest and easiest way to mitigate the highest risks to internet-connected, on-premises Exchange Servers prior to patching,” Microsoft warned.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Here’s the latest list of Redmond’s recommendations:</span></p><ol><li><span style="color:rgb(0, 0, 0);">Download the&nbsp;<a href="https://aka.ms/eomt" target="_blank">EOMT tool</a>.</span></li><li><span style="color:rgb(0, 0, 0);">Run it on Exchange servers immediately.</span></li><li><span style="color:rgb(0, 0, 0);">Follow the more detailed&nbsp;<a href="https://msrc-blog.microsoft.com/2021/03/02/multiple-security-updates-released-for-exchange-server/" target="_blank">guidance</a>&nbsp;here to ensure that your on-premises Exchange is protected.</span></li><li><span style="color:rgb(0, 0, 0);">If you are already using&nbsp;<a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/safety-scanner-download" target="_blank">Microsoft Safety Scanner</a>, it is still live and Microsoft recommends keeping this running as it can be used to help with additional mitigations.</span></li></ol><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong>SecurityWeek has compiled a list of resources to help incident response teams and IT administrators respond to this global incident:</strong></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong><br></strong></span></p><ol><li><span style="color:rgb(0, 0, 0);"><strong><a href="https://proxylogon.com/" target="_blank">ProxyLogon</a></strong>&nbsp;— the researchers who reported some of the actively exploited vulnerabilities to Microsoft have named the issues ProxyLogon and have set up a dedicated website. They plan on publishing a technical paper in the future.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://us-cert.cisa.gov/ncas/alerts/aa21-062a" target="_blank">CISA advisory</a>&nbsp;with instructions on how organizations can conduct a forensic analysis if they see evidence of compromise.&nbsp;</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://cyber.dhs.gov/ed/21-02/" target="_blank">CISA Emergency Directive</a>&nbsp;with instructions for federal agencies, including for identifying potential compromises, conducting a forensic investigation, and responding to an incident.&nbsp;</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.huntress.com/blog/rapid-response-mass-exploitation-of-on-prem-exchange-servers" target="_blank">Huntress</a>&nbsp;has been tracking attacks and vulnerable servers. The company has shared some recommendations for MSPs and technical information on the attacks.&nbsp;</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.ic3.gov/Media/News/2021/210310.pdf" target="_blank">Joint advisory from CISA and FBI&nbsp;</a>containing information on targeted sectors, attack techniques, mitigations, as well as technical details for detecting exploitation and attacker activities.&nbsp;</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.praetorian.com/blog/reproducing-proxylogon-exploit/" target="_blank">Praetorian</a>&nbsp;has reproduced the Exchange exploit chain and it has shared detailed technical information on the vulnerabilities.&nbsp;</span></li><li><span style="color:rgb(0, 0, 0);">Unit 221B provides an online tool named&nbsp;<a href="https://checkmyowa.unit221b.com/" target="_blank">Check My OWA</a>, which is designed to “aid victim notification based on lists of compromised Exchange servers with Outlook Web Access(OWA) enabled, which were obtained from perpetrators of this mass breach event.”</span></li></ol><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong>Indicators of compromise (IOC) and other threat hunting resources</strong></span></p><ol><li><span style="color:rgb(0, 0, 0);"><a href="https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/" target="_blank">Volexity</a>&nbsp;has shared information on the Exchange exploits, post-exploitation activity observed in attacks, and IOCs.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/" target="_blank">Microsoft</a>&nbsp;provides technical details on the attacks it observed, instructions for checking if a system has been compromised, host IOCs, endpoint and Azure detections, and advanced hunting queries.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.fireeye.com/blog/threat-research/2021/03/detection-response-to-exploitation-of-microsoft-exchange-zero-day-vulnerabilities.html" target="_blank">FireEye</a>&nbsp;has shared information on attacks targeting Exchange servers, investigation tips and technical IOCs.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://github.com/microsoft/CSS-Exchange/tree/main/Security" target="_blank">Scripts from Microsoft</a>&nbsp;for checking IOCs related to the China-linked threat actor HAFNIUM, and for detecting malicious files on Exchange servers.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.pwndefend.com/2021/03/07/checking-for-hafnium-or-other-groups-impact-from-exchange-abuse/" target="_blank">Pwndefend</a>&nbsp;has made available a list of bad IP addresses, as well as an IOC hunting script that should provide a more detailed view in some areas.</span></li><li><span style="color:rgb(0, 0, 0);">Latvia’s CERT-LV has released a&nbsp;<a href="https://github.com/cert-lv/exchange_webshell_detection" target="_blank">script that detects web shells</a>&nbsp;dropped on Exchange servers following successful exploitation of the vulnerabilities.&nbsp;</span></li></ol><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong>Tools and other resources for defenders</strong></span></p><ol><li><span style="color:rgb(0, 0, 0);"><a href="https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange.nse" target="_blank">Nmap script&nbsp;</a>made by researcher Kevin Beaumont can be used to scan a network for potentially vulnerable Microsoft Exchange servers.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.domaintools.com/resources/blog/examining-exchange-exploitation-and-its-lessons-for-defenders">DomainTools</a>&nbsp;has conducted an analysis of the attacks and has shared some recommendations for network detection.&nbsp;</span></li></ol></div>
</div><div data-element-id="elm_3gdC9CpGWK8k8RT268LfXw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_3gdC9CpGWK8k8RT268LfXw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Microsfot/Microsoft-Building-Logo.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 17 Mar 2021 14:44:19 +0000</pubDate></item><item><title><![CDATA[Protect Organization Data against Adrozek]]></title><link>https://www.brocent.jp/blogs/post/adrozek_protection</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/it security/ADROZEK_DISTRIBUTION.png"/>Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020;]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_kG2O2-KwS2--LX0VqLmbxA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_z30tSiQeQfSah0AdBArsDA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_v7PE9fmGSZeI4lg7Oc_ETw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_P9tiKwyBSu2WXLPvPeVIXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_P9tiKwyBSu2WXLPvPeVIXg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">Protect Organization Data against Adrozek</span></span></h2></div>
<div data-element-id="elm_GJ91LFh1T3e6Iy8nWhK2ZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GJ91LFh1T3e6Iy8nWhK2ZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:18px;">Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020; according to Microsoft, it was at its peak in August, when as many as 30,000 computers were affected per day. Although classified as adware, Adrozek is also designed to collect information extracted from browsers by modifying browser settings and extensions. It affects Google Chrome, Microsoft Edge, Mozilla Firefox, and the Yandex browser. Considering the risks Adrozek poses to organizations, IT admins need to take some preemptive measures to ensure security.</span></span><br></p></div>
</div><div data-element-id="elm_Xy8kp3p0ThpCf5Epch7qzw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Xy8kp3p0ThpCf5Epch7qzw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/it%20security/ADROZEK_DISTRIBUTION.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Ak5QMzYKRPJnWsjNX4iMNg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Ak5QMzYKRPJnWsjNX4iMNg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><span style="font-size:18px;font-weight:700;">How does Adrozek affect your organization?</span></span></h2></div>
<div data-element-id="elm_PkVv9qoQ1E50xF8n20tGvg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PkVv9qoQ1E50xF8n20tGvg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:justify;"><span style="color:inherit;"><span style="font-size:18px;">Adrozek is being distributed through drive-by attacks, where users are tricked into installing the malicious software, often bundled with or disguised as legitimate software. Once installed, it makes a number of modifications to browser settings and extensions. Adrozek disables browser updates and turns off Safe Browsing, which is a feature designed to prevent users from landing on malicious websites. It then installs and activates new browser extensions that run in incognito mode; these extensions run without explicit user permissions, and are hard to notice since they aren’t displayed in the toolbar. These modifications help the malware inject users’ search engines with ads. In certain browsers, the malware further steals users’ credentials. When users access enterprise web applications on the infected browsers, the organization’s data security is at risk.</span></span><br></p></div>
</div><div data-element-id="elm_KezIhUphVG5WGWnxbc_ZOg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KezIhUphVG5WGWnxbc_ZOg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><span style="font-size:18px;font-weight:700;">How to protect your organization against Adrozek</span></span><br></h2></div>
<div data-element-id="elm_2fU12Q6mLG0kHU28b4rZxQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2fU12Q6mLG0kHU28b4rZxQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:30px;font-size:18px;">It’s always better to be safe than sorry. IT admins can implement a stringent yet foolproof, three-step preventive mechanism to help secure their organizations against Adrozek.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>1. Restrict users’ access to trusted websites</em></span></p><p style="margin-bottom:30px;font-size:18px;">Implement URL filtering software to prevent users from accessing websites that are unauthorized by the IT teams. This ensures that users don’t land on infected websites, preventing the installation of malware.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>2. Limit downloads to trusted websites</em></span></p><p style="margin-bottom:30px;font-size:18px;">While step one eliminates the chances of users installing the malware, limiting downloads to trusted websites creates an additional layer of security, preventing it from being downloaded in the first place.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>3. Restrict execution of untrusted applications</em></span></p><p style="margin-bottom:30px;font-size:18px;">Restricting the execution of untrusted applications will prevent Adrozek from running if it’s present in the enterprise network. This final step creates a fortified boundary, preventing the execution of the malware.</p><p style="margin-bottom:30px;font-size:18px;"><span style="color:rgb(0, 0, 0);">BROCENT Managed IT Security Service (MSS) to implement these three-fold preventive measures. In case users’ machines are already infected with Adrozek, IT admins can implement a few best practices to limit the damage.</span></p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>1. Deploy browser configurations to users’ browsers</em></span></p><p style="margin-bottom:30px;font-size:18px;">Browser configurations and behavior can be managed from a central location with the managed antivirus console. Configurations deployed&nbsp; cannot be overwritten by users, nor by Adrozek. For example, deploying a configuration to enable browser updates will prevent the malware from modifying the setting. Similarly, BROCENT support center can enable the Safe Browsing configuration, ensuring that Adrozek cannot disable it. This will minimize the impact of the malware.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>2. Restrict installation of new browser extension and add-ons</em></span></p><p><span style="color:inherit;"></span></p><p style="margin-bottom:30px;font-size:18px;">IT admins can restrict the installation of new extensions and add-ons. This will prevent the malware from installing new extensions capable of injecting ads and stealing credentials. To prevent loss of productivity that could arise from lack of extensions, mission-critical extensions and add-ons can be distributed to users’ browsers BROCENT managed network behavior management console.</p></div>
</div><div data-element-id="elm_FErr3wMguDa9CVXOA3y-RQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_FErr3wMguDa9CVXOA3y-RQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/it%20security/adrozek_cn.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 17 Feb 2021 04:00:28 +0000</pubDate></item></channel></rss>