Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

7/21/2020
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Attivo Networks Announces New Capabilities For Its Endpoint Detection Net (EDN) solution

New features prevent attackers from fingerprinting an endpoint to identify security weaknesses and from conducting reconnaissance.

FREMONT, Calif.--(BUSINESS WIRE)--Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, introduced today new capabilities to its Endpoint Detection Net (EDN) solution that prevent attackers from fingerprinting an endpoint to identify security weaknesses and from conducting reconnaissance. Attackers use fingerprinting to identify targets, decide which vulnerabilities to exploit, and determine how to successfully interact with them. Unlike traditional security solutions, these new capabilities proactively redirect suspicious endpoint inbound or outbound traffic to decoys for attacker engagement.

“The EDN Deflect feature increases the resistance in the network by preventing an attacker from moving laterally and fingerprinting network and application services”

The new EDN Deflect functionality provides alerts to unauthorized host and service scanning, which is critical because other security controls typically do not generate an alert for these types of activities. Attempts by attackers to fingerprint an endpoint are regularly missed due to the complexity of tracking, analyzing, and alerting on all of an endpoint’s communications traffic. These new deflection capabilities efficiently and accurately detect network and application fingerprinting as well as lateral movement, closing one more attack vector that threat actors are increasingly leveraging.

When attackers successfully breach an endpoint and get a foothold inside a network (known as “breakout time” and estimated to average just under nine hours), they spread to other systems by probing for open ports and fingerprinting network services. Furthermore, research shows that only 4% of reconnaissance activity generates an alert, and security controls miss 54% of techniques used to test lateral movement detection. The EDN solution, with its new Deflect function, identifies these connection and reconnaissance attempts and isolates the attacker by redirecting them to decoys for engagement, without interfering with production services or ports.

“The EDN Deflect feature increases the resistance in the network by preventing an attacker from moving laterally and fingerprinting network and application services,” said Venu Vissamsetty, vice president of security research, Attivo Networks. “By detecting unauthorized ingress and egress connections both at the source and at the destination, security defenders gain real-time visibility along with conclusive detection alerts.”

Attackers fingerprint target hosts by probing for open ports they can attack (HTTP/HTTPS, remote desktop, SSH, MSSQL, etc.), and then either run exploits against their vulnerabilities or find misconfigurations or weak passwords to compromise them. The Attivo Deflect function gives power back to the defender by:

·         Redirecting attackers scanning closed ports on protected hosts to decoys for engagement

·         Redirecting failed outbound connections from protected endpoints to decoys for engagement

·         Making every endpoint a trap and preventing fingerprinting of network services

·         Providing real-time visibility and conclusive detection into every attack before it moves off an endpoint

·         Providing active detection and prevention capabilities at both the source and destination

·         Isolating and investigating suspicious endpoints without external tools

The EDN solution with the Deflect function is available immediately. For more information, read the data sheet.

About Attivo Networks

Attivo Networks®, the leader in cyber deception and lateral movement attack detection, delivers a superior defense for revealing and preventing unauthorized insider and external threat activity. The customer-proven Attivo ThreatDefend® Platform provides a scalable solution for derailing attackers and reducing the attack surface within user networks, data centers, clouds, remote worksites, and specialized attack surfaces. The portfolio defends at the endpoint, Active Directory and throughout the network with ground-breaking innovations for preventing and misdirecting lateral attack activity. Forensics, automated attack analysis, and third-party native integrations streamline incident response. The company has won over 130 awards for its technology innovation and leadership. For more information, visit www.attivonetworks.com

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27388
PUBLISHED: 2020-10-23
Multiple Stored Cross Site Scripting (XSS) vulnerabilities exist in the YOURLS Admin Panel, Versions 1.5 - 1.7.10. An authenticated user must modify a PHP plugin with a malicious payload and upload it, resulting in multiple stored XSS issues.
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.