Managed Detection & Response
Always On – we ensure our customers’ resilience, 24x7x365
Read moreCyber Threat Intelligence
Word-class data, analysis and insights on threat actors and the evolving threat landscape.
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedEmergency Response Retainers
Get a fast response from world-class experts and rapidly reinstate business continuity.
Read moreConsulting
Highly specialized services to identify and remediate complex risks and threats.
AD Health Check Compromise Assessment Emergency Response Penetration TestingWhat’s New?
Emergency Response
Read moreManaged Detection and Response (MDR)
Read moreBrand Protection
Anti-PhishingCyber Threat Intelligence
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedCyber Threat Intelligence
Threat MonitorsManaged Detection and Response (MDR)
Read moreEmergency Response Retainers
Read moreConsulting
Emergency ResponseManaged Detection and Response (MDR)
Read moreCyber Threat Intelligence (CTI)
Threat MonitorsEmergency Response
Read moreManaged Detection and Response (MDR)
Read moreBrand Protection
Anti-PhishingCyber Threat Intelligence
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedCyber Threat Intelligence
Threat MonitorsManaged Detection and Response (MDR)
Read moreEmergency Response Retainers
Read moreConsulting
Emergency ResponseManaged Detection and Response (MDR)
Read moreCyber Threat Intelligence (CTI)
Threat MonitorsApril 26, 2023
Introduction
In today’s rapidly evolving cybersecurity landscape, organisations rely on robust security solutions such as Endpoint Detection and Response (EDR) tools to protect their systems and data from cyber threats. However, even these advanced tools can have weaknesses.
In a recent Incident Response case, CSIS Security Group (CSIS) discovered a bypass technique that exploited a weakness in Microsoft Defender for Endpoint (MDE), one of the leading EDR products in the market. This weakness allowed the malicious activity to continue undetected, posing a significant risk to organisations.
In this blog post, we will discuss the details of the cyber incident, its implications, and recommendations for mitigating the risk.
Background
CSIS was contacted by a company, which was not a Managed Detection and Response (MDR) customer of CSIS, that had fallen victim to a cyber incident. CSIS was tasked with leading the Incident Response investigation, conducting an in-depth root cause analysis, and providing remediations and security recommendations.
The analysis revealed that the attackers had compromised five servers and obtained domain administrator privileges.
The attackers managed to exploit a weakness in MDE’s threat detection and response mechanisms. To verify the potential tactic, a test lab was set up and the steps of the attacker were replicated, documenting that a weakness in MDE indeed existed. CSIS has reported the issue to Microsoft, and full disclosure of the bypass technique will be revealed once the issue has been addressed by Microsoft. Read more about what we can reveal at this stage, in our anonymized Incident Response case report.
Implications and Recommendations
This weakness in Microsoft Defender for Endpoint mechanisms poses a significant risk to organisations, as it allows attackers to bypass the EDR and carry out malicious activities without being stopped by the tool itself.
To mitigate this risk, organisations are advised to take the following actions:
Conclusion
This incident highlights the importance of staying vigilant and adapting to the rapidly evolving threat landscape. While Microsoft Defender for Endpoint is a valuable tool in protecting organisations against cyber threats, this bypass technique exposes a risk in relying on security tools alone.
It emphasizes the need for a comprehensive approach, encompassing technology, skilled personnel, and effective processes, to protect organisations from emerging cyber risks effectively. By sharing this information, CSIS aims to raise awareness of this issue and prompt both organisations and vendors to take appropriate action to safeguard their systems and data.
As the saying goes, “a chain is only as strong as its weakest link”, and the same applies to cybersecurity. It is crucial to continually assess and strengthen every aspect of an organisation’s security posture to defend against advanced and persistent threats effectively.
Customers of CSIS’s MDR service using MDE are protected against this threat.
CSIS - REST ASSURED
Contact: Jan Kaastrup jka(a)csis.com
Stay informed.
Get our Cyber Bytes!