Connect with us

Security

Sophos Unveils Rapid Response Service to Neutralise Cyber Attacks

Published

on

, SiliconNigeria

Sophos, a global leader in next-generation cybersecurity, today announced the availability of Sophos Rapid Response, an industry-first, fixed-fee remote incident response service that identifies and neutralizes active cybersecurity attacks throughout its entire 45-day term of engagement.

Sophos Rapid Response provides organizations with a dedicated 24/7 team of incident responders, threat hunters and threat analysts to quickly stop advanced attacks and remove adversaries from their networks, minimizing damage and costs, and reducing recovery time.

Sophos Rapid Response has identified the first known use of the Buer malware dropper to deliver ransomware. In new research published today from Sophos Rapid Response and SophosLabs, “Hacks for sale: Inside the Buer Loader Malware-as-a-Service,” Sophos details how Buer compromises Windows PCs, and enables attackers to deliver a payload. Sophos Rapid Response made the discovery while mitigating a recent Ryuk ransomware attack, which was detected and stopped as part of a wave of Ryuk attacks using new tools, techniques and procedures. In this incident, the relentless attackers used a new variant of Buer in an attempt to launch Ryuk ransomware, before expanding their efforts to mix the use of Buer with other types of loader malware.

“When you’re hit with an attack, time is of the essence. Every minute between initial compromise and neutralization counts as adversaries race through the attack lifecycle,” said Joe Levy, chief technology officer at Sophos.

“Advanced attacks can quickly halt business operations, and IT managers who have experienced ransomware firsthand know this all too well, reporting the need to spend proportionately more time on incident response and less time on threat prevention than those who haven’t been hit. Sophos Rapid Response disrupts active attacks, eliminating the complex and time consuming process of stopping determined attackers, so organizations can get back to their normal operations faster.”

Sophos Rapid Response neutralizes a wide range of security incidents, including ransomware, network breaches, hands-on keyboard adversaries, and more. The Sophos Rapid Response team can be onboarded and activated within hours, and the majority of attacks triaged within 48 hours.

“This year, devastating ransomware attacks have unfortunately been a gold rush for cybercriminals, and it’s unlike anything the cybersecurity industry has ever experienced. Nearly 85% of the attacks that Sophos Rapid Response has been involved in thus far included ransomware – notably RyukREvil and Maze – and I can say with confidence that most of the other attacks that we were called in to stop would have also resulted in ransomware had we not acted so quickly,” said Peter Mackenzie, incident response manager at Sophos.

Readily accessible tools make it possible for attackers to net bigger pay-outs in one week’s worth of work than most people will make in their lifetime. Criminals infiltrate networks and stealthily plan their attacks in the background, before strategically launching ransomware as the final payload – often during the overnight hours when no one is watching in order to execute on as many machines as possible. Sophos Rapid Response takes immediate action to extinguish the fire, which in the case of a hospital that we helped this month after it was hit by Ryuk ransomware and forced to shut down, meant the difference of life or death.”

Sophos Rapid Response is part of Sophos Managed Threat Response (MTR), a global team that provides proactive, fully-managed threat hunting, detection and response services. As one of the industry’s most widely used managed detection and response (MDR) services with more than 1,400 customers, Sophos MTR stands apart with its ability to proactively take action on an organization’s behalf to mitigate threats in real time.

Once immediate threats are neutralized during a Rapid Response engagement, the Sophos Rapid Response program shifts to continuous monitoring with around-the-clock proactive threat hunting, investigation, detection, and response from the Sophos MTR team. A threat investigation report details discoveries made, actions taken and other remediation recommendations, helping organizations understand attack origination as well as what assets were compromised, and data accessed and exfiltrated.

Sophos Rapid Response is available now to both existing and non-Sophos customers. Unlike traditional incident response and forensic services that require complex and protracted deployments with hourly pricing structures, Sophos Rapid Response is a remote offering with a fixed pricing model based on an organization’s number of users and servers. Sophos Rapid Response is also structured to accommodate businesses of all sizes, including smaller organizations, which until now have not been able to easily leverage a service such as this without requiring a retainer.

What analysts and channel partners say: “Cyberattacks are getting worse and more sophisticated. As we’ve seen this year, no one is off limits, even in a time of crisis. Organizations need to ready themselves as more than 85 percent of security professional survey respondents typically tell IDC that they have experienced at least one security breach in the past two years that involved the spending of significant extra resources to rectify,” said Frank Dickson, program vice president at IDC.

“Sophos Rapid Response is an offering that no one wants until they need it. Many organizations are simply either not prepared to fight an active attack or want to respond more quickly and aggressively than internal resources alone allow. With predictable, fixed-fee pricing and the ability for same-day activation, Sophos Rapid Response provides certainty when customers want it most.”

“A charitable organization providing housing and support services to thousands of vulnerable adults was hit by ransomware, taking down operations at all of its more than 40 facilities. The organization called us for help, and we immediately deployed Sophos Rapid Response. Working together with Sophos Rapid Response, we were able to get them back up and running quickly so they could continue serving those in need,” said Steve Weeks, president at Netcetera.

“Netcetera clients already running Sophos’ next-generation security suite are well protected, and we haven’t seen a ransomware incident in our managed client base in many years. When we get a call for help from new clients, however, I’ll always bring in Sophos Rapid Response. The highly responsive team is rock solid in its ability to work with us and get compromised organizations out of the danger zone, and ultimately, help us to close new business opportunities.”

“Sophos Rapid Response perfectly complements our existing in-house incident response services, advancing our ability to provide proactive preparedness plans and immediate support in worst-case scenarios. We’re not just selling a transactional service – with Sophos Rapid Response, we’re fixing long-term problems and preventing them from happening again,” said Jeremy Weiss, cybersecurity practice lead at CDW. “I’ve seen firsthand how the Sophos Rapid Response team is able to cut through all of the noise to quickly remediate security incidents within hours, and the feedback from customers has been nothing but exceptional. Sophos Rapid Response is an instrumental offering that elevates our customers’ security posture to the next level.”

Continue Reading
Advertisement Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Digital Economy

Championing An Inclusive Digital Identity Approach In Africa – At Scale

Published

on

, SiliconNigeria

As digitisation accelerates across Africa, the demand for liveness detection and online identity authentication services has become critical. The act of identifying ourselves is under rapid transformation, especially when it comes to using biometrics to access financial and governmental services. If executed correctly, this offers an opportunity for greater inclusivity than ever before.

Gur Geva, Founder and CEO of iiDENTIFii, says, “Face biometrics offers a ground-breaking solution to identity verification (IDV) on the continent in that it is secure and simple to use. Yet this solution will only truly work if the algorithm that underpins face biometrics is trained on the full scope of African faces and can be executed at scale.”

Historically, proof of identity was only available to those who could fulfil a rigid set of criteria. One of the main barriers to a person opening a bank account, for example, would be the inability for them to prove their identity without any formal identity document or proof of formal address. According to the World Bank, 57% of Africans still do not have any kind of bank account, including mobile money accounts. This translates to about 360 million adults in the region and approximately 17% of the total global unbanked population without access to formal financial services, a recent study by BPC and Fincog found.

Sustainable Development Goal 16:9 aims “to provide legal identity for all, including birth registration by the year 2030”. Digital identity plays an active role in meeting several other SDGs, including universal health and education access and financial inclusion.

Remote face authentication is a crucial step in bridging the digital divide in Africa.

Geva explains, “The digitally excluded are missing out on access to social and financial inclusion. Those who do not have access to newer technologies are disadvantaged in healthcare, education and financial support. The mere ability to confirm one’s identity digitally is a key that opens the doors to essential financial and civic services without the risk of impersonation or fraud.”

Diversity in face recognition is the key factor for success in Africa. Yet historically, a large-scale database of African faces has been lacking. Thanks to new developments in technology, this barrier is no longer in place. Geva adds, “Respecting diversity in biometric authentication is a core consideration in our business. For this reason, we have trained our algorithm on over 50 million African faces. This translates into identity for all, but specifically identity for all Africans.”

Through a triangulated authentication process, iiDENTIFii’s technology establishes that the person on the other end of the screen is real, live and transacting at that moment. This multi-faceted facial scan is further verified with key data from the person’s ID document and information from the relevant government databases. “Identity fraud has historically been difficult to detect. Our technology can authenticate and automatically onboard a person in under 30 seconds. Our algorithm vastly reduces false accept and reject rates, fully protecting consumers and businesses,” says Geva.

A focus on verifying a living person, in other words establishing ‘liveness’, ensures that correctly mapping and verifying a diverse range of faces is possible. Geva explains, “With our technology, we are able to establish 3D passive and 4D biometric liveness. Our 4D Liveness is resilient to deepfake and replay attacks. It comprises different colour lights that reflect in a certain sequence off the user’s face which helps determine true biometric liveness.”

Inclusivity in technology extends beyond diversity. It also raises the issue of accessibility. “We have created a technology platform that can be used by very low-end through to very high-end smartphones,” says Geva, “Users can also access the platform via a mobile Software Development Kit (SDK), as well as web-based/browser SDK – which allows them to just click on a link to authenticate themselves, as opposed to downloading a large SDK onto their phones.”

With a simple, fast and secure approach that takes the full scope of African faces into account, biometrics becomes a compelling catalyst for financial and social inclusion. Geva concludes, “We believe that, with the right technology, all Africans can claim their identity and use it to their safety and benefit.”

Continue Reading

Security

NCC Washes Hands Off Obi Audio Conversation With Oyedepo

Published

on

, SiliconNigeria

Nigerian Communications Commission (NCC) has refuted reports of alleged complicity of the commission in the leaked audio conversation between presidential candidate of Labour Party (LP) Mr. Peter Obi and founder of the Living Faith Church, Bishop David Oyedepo.

In the audio conversation that went viral on social media, Obi was heard telling Oyedepo that the 2023 election was a “religious war,” and urged the pastor to mobilize Christians in parts of the country to vote for him.

Although Obi in the conversation did not appear to have incited religious violence, some politicians condemned the said statement, insinuating he plotted to divide the people on religious lines, a very sensitive issue in a polarised country after the February 25 presidential election.

In a statement, the director of public affairs at NCC, Reuben Mouka, debunked the allegations that the commission got the audio via phone intercepts and leaked it to Obi’s political opponents, an accusation it strongly denied.

Part of the statement read: “The Nigerian Communications Commission (NCC) has been inundated with enquiries by the media on allegations of telephone tracking and leakage made against the commission by some individuals and groups in the social and alternative media.

“The commission wishes to make the following clarifications: The commission denies the allegations in their entirety. By the provisions of the Nigerian Communication Act (NCA) 2003 and other extant Laws of the federation, the commission does not and cannot track nor leak telephone conversations of anyone.

“The commission has reported the allegations, which we take seriously, to relevant security agencies for proper investigation and necessary action.

“The commission restates its commitment to discharge its responsibilities to the Nigerian people in accordance with the provisions of the Constitution of the Federal Republic of Nigeria; the NCA 2003; and other extant Laws of the Federation; and global best practices.

“For the avoidance of doubt, the commission denies these allegations and advises the public to disregard them.”

Continue Reading

Security

NCC Recommends 2-Factor Authentication For WhatsApp Users

Published

on

, SiliconNigeria

The Nigerian Communications Commission’s Computer Security Incident Response Team (NCC-CSIRT) has recommended that users of the popular messaging app, WhatsApp, set up Two-Factor Authentication (2FA) to avoid falling victim to account takeover by hackers.

In an advisory, NCC-CSIRT noted that WhatsApp, which is a Meta-owned service, is increasingly becoming a prime target for hackers and scammers who are always looking for ways to gain unauthorized access to users’ accounts.

The CSIRT described two-factor authentication (2FA) as an identity and access management security method that requires two forms of identification to access resources and data.  

According to the advisory, “In the world of messaging apps, one of the most popular and recognizable is WhatsApp. WhatsApp is 100 per cent free to use, has a great mobile app, and supports audio and video calls. Whether you rely on WhatsApp for all your messaging needs or just use it from time to time, it is recommended to set it up with two-factor authentication (2FA). With this enabled, you will need to enter a custom PIN every time you log in to WhatsApp from a new device, adding an extra layer of security to your account.”  

The Team said, “2FA gives businesses or people the ability to monitor and help safeguard their most vulnerable information and networks. The 2FA is important because it prevents cybercriminals from stealing, destroying, or accessing your internal data records for their own use”. The advisory stated.

Continue Reading

Popular News