Category Archives: Cybercrime

Mitigating the Threat of the World’s Top Hacking Tools

By Bharat Mistry

When it comes to cybersecurity, information is power. So we were pleased recently to see GCHQ’s  National Cyber Security Centre (NCSC) release a new document highlighting the five most common publicly available hacking tools. Although far from exhaustive, it will provide some much-needed guidance for security teams on what to look out for and how to maximise detection and protection.

Those operating VMware environments and looking to follow this best practice advice would do well to consider our flagship Deep Security offering. As we’ll be discussing at VMworld Europe next month, the combination of tight integration and full-featured security is a winner for protecting software-defined datacentres and hybrid cloud environments.

The top hacking tools
Perhaps the most telling thing about the NCSC report is that it had to be produced at all. It’s very much a sign of the times: a reminder of how the cybercrime underground has democratised hacking tools for widespread use. According to the report, produced in concert with cybersecurity specialists from all Five Eyes nations, initial compromise is usually achieved via exploitation of software vulnerabilities or poorly configured systems. After that, hackers may use:

Remote Access Trojans (RATs): like JBiFrost which could be used to install backdoors and key loggers, take screen shots, and exfiltrate data.

Web shells: like China Copper — malicious scripts which offer remote administrative capabilities.

Credential stealers: like Mimikatz which steal user log-ins so an actor can move internally through a target network.

Lateral movement frameworks: like PowerShell Empire which allow attackers to move around once inside a network.

C2 obfuscation tools: like HTran which help to disguise the bad guys’ location when compromising a victim.

There’s a long list of recommendations from NCSC for firms looking to better detect and protect themselves from such threats. But among the key pieces of advice are:

Keep systems patched and up-to-date
Use “modern systems and software”
Employ network monitoring and firewalls
Implement network segmentation
Deploy host-based intrusion detection
Whitelist applications
Use AV from a reputable provider

Partnering on security

These recommendations play very much to Trend Micro’s strengths as a security pioneer and a decade-long partner of VMware’s with our flagship datacentre product Deep Security. We offer:

Anti-malware, firewall, log inspection, web reputation, integrity monitoring, and IDS/IPS and Application Control
Comprehensive security controls automatically deployed as each new VM is spun up
Virtual patching to keep apps/servers shielded from emerging threats until a patch becomes available
Support for NSX for hypervisor-based security, enabling micro-segmentation

All of this comes with an architecture designed to optimise performance in virtual environments, and offer enhanced visibility across physical, virtual and hybrid cloud IT from a single console. Trend Micro on VMware realises the NCSC’s vision of “modern” systems and software designed with security in mind.

We’ll be taking this message to VMworld next month, with two speaking slots slated:

Enabling Hybrid Cloud Security for NSX and VMWare Cloud on AWS [SAI1032BES]
Bryan Webster, Principal Architect, Trend Micro
Jeremiah Cornelius, Security Envisioning Architect – Partner Products – VMware Global Technology Alliance, VMware
Wednesday, Nov 07, 3:30 p.m. – 4:30 p.m.

Mind the Gap: Building a closer relationship between Security and DevOps [DEV1031BES]
Bryan Webster, Principal Architect, Trend Micro
Doug Cahill, Group Director and Senior Analyst , Enterprise Strategy Group
Wednesday, Nov 07, 12:30 p.m. – 1:30 p.m.

We look forward to seeing you at the show.

What: VMworld Europe
Where: Barcelona
When: 5-8 November

Trend Micro at VMworld: driving the cloud-powered enterprise

by Bharat Mistry

As a security leader we understand that forging close industry partnerships is vital to ensuring we continue to offer our customers the best protection and optimal performance. In the new era of cloud and virtual environments, this becomes even more important, which is why we’ve been a close partner of VMware’s for a decade now.

Our appearance at VMworld Europe in November will be a great opportunity to articulate how Trend Micro can help VMware customers extend NSX to the public cloud, and drive a closer relationship between security and DevOps to improve hybrid cloud threat protection. Continue reading

Attackers Go Undercover as CLOUDSEC 2018 Approaches

by Bharat Mistry

One of the biggest factors in Trend Micro’s success over the past three decades has been our commitment to research and development. A global team of over 1,200 TrendLabs threat researchers and a cloud-based Smart Protection Network which analyses 100TB+ of data each day give us a major advantage in offering the best protection possible to our customers and ensuring we’re always anticipating the next evolution of the threat landscape. That’s why we were able to block over 20 billion threats in the first half of 2018. Continue reading

As Cybercrime Prosecutions Fall Again, CLOUDSEC Offers Food for Thought

by Bharat Mistry

Policing the Wild West of the internet has never been an easy job, but as cyber-criminals get more organised and better equipped thanks to the dark web economy, it has become even harder. That’s especially true in the UK where austerity measures have had a major impact on police budgets. So it might not come as a surprise that new figures show a decline in the number of cybercrime prosecutions in the country, the second year in a row.

At Trend Micro’s CLOUDSEC conference next month, experts from law enforcement and industry will come together to discuss what can be done. As we’ve shown in the past, public-private partnerships can produce some impressive results. Continue reading