How Red Piranha’s Security Systems & Response Mechanism Worked During the WannaCry Ransomware Attack:
Since the hacker group called Shadow brokers leaked tools used by the NSA, our highly trained team of experts included 117 new rules into the Crystal Eye System to mitigate against future threats based around the Windows SMB Zeroday and other related attack vectors exposed in this leak.
We also were also quick to analyze the threats posed by the Shadow Brokers leaks which were published in our blog article on April 15, 2017.
Read: Recent Shadow brokers dump exposes over 3 million systems and the number is climbing
Just after the NSA hacking tools were made public by the Shadow Brokers our highly trained team of experts included 117 new rules into the Crystal Eye System to mitigate against future threats based around the Windows SMB Zeroday and other related attack vectors exposed in this leak.
However on May 12, 2017, cyber criminals had launched attacks with variants based on the tools released back in Easter in Europe. Our manually added rules already included in the system would have prevented most of the attacks to some extent but our system also would have stopped new attacks by 2 am our time via our threat intelligence feed and automatic updates. On Mid-day Saturday (May 12, 2017) we undertook an audit of our system to track our updates to determine how fast our automated systems would have been protecting our clients and found new IOC's would have made into Crystal Eye by 2 AM WST.
Information-disclosure Vulnerability Allows Attackers to Snoop into Ongoing Cisco WebEx Meetings
Major update to the Microsoft Malware Protection Engine addresses a security vulnerability
The following data states the extent of attacks that have originated from specific host IP address.
Detailed Report on Suspicious Hosts:
Behavior: Scanning hosts
Activity: Continuously using different username password combination existing and non existing usernames.
We have found following different types of events:
SSHD authentication failed.
Multiple SSHD authentication failures.
Multiple failed logins in a small period of time.
SSH insecure connection attempt (scan).
Failed Password
Invalid User
Input user auth request invalid user
Type of attack: Bruteforce
Source IP Addresses:
31.207.47.36
190.85.226.245
91.197.232.103
218.65.30.124
61.177.172.52
91.197.232.107
61.177.172.13
91.197.232.109
61.177.172.17