Introducing Microsoft Supply Chain Platform—an open, flexible, collaborative, and secure platform

Introducing Microsoft Supply Chain Platform—an open, flexible, collaborative, and secure platform

This article is contributed. See the original author and article here.

Organizations worldwide seek reliability in their supply chains to meet the demand of their customers. If there is anything that companies have learned from the years past, it’s to plan for the unexpected. Using history to make decisions for the future no longer works. Customer demand is constantly changing, whether it’s influenced by the economic climate or making environmentally conscious purchase decisions.

At the Microsoft Supply Chain Reimagined digital event, you heard how conversations about supply chains have been elevated to the board room as they are pivotal to gain a competitive advantage for any organization today. We heard from supply chain practitioners, both within Microsoft and from our customers, on the need to address the fragmented ecosystems of supply chain technologies. This is critical for enabling end-to-end visibility of supply chains in near real time. Without this visibility, customers are struggling to unify data to proactively predict and mitigate disruptions.

Microsoft Supply Chain Center

Earlier this week, we announced the Microsoft Supply Chain Platform to help address these challenges. An open, extensible, and adaptive platform enables companies to unify experiences across different planning and execution systems. At the core of the Supply Chain Platform is the Microsoft Supply Chain Center, which introduces a ready-made command center for users to manage disparate supply chain data. Microsoft Supply Chain Center is now available in preview.

Watch the video:

This embed requires accepting cookies from the embed’s site to view the embed. Activate the link to accept cookies and view the embedded content.

This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.

Connect your ecosystem

Most organizations rely on legacy systems and one-off “best-in-breed” applications to manage their supply chain rather than a single, integrated platform, which puts them at a competitive disadvantage.

Recent research from Harvard Business Review Analytic Services commissioned by Microsoft shows that 65 percent of executives cite lack of access to real-time supply chain data as a technological obstacle to their supply chain operationsand only 11 percent have a modern, integrated digital solution for their supply chain.*

We are helping companies address this challenge with the Supply Chain Center. Its data manager harmonizes data across existing and new enterprise resource planning (ERP) and supply chain systems in the company. For example, it can unify and harmonize data from Microsoft Dynamics 365, SAP, Oracle, Overhaul, C.H. Robinson, FedEx, FourKites, and many more. An open, flexible platform helps maximize their existing investments without needing to replace them. Now companies can have better data visibility in near real time across their entire supply chain to better assess risks.

This embed requires accepting cookies from the embed’s site to view the embed. Activate the link to accept cookies and view the embedded content.

This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.

Microsoft customers, like Kraft Heinz, joined the discussion during the Supply Chain Reimagined event to share how the Supply Chain Platform will empower them to gain reliability and scalability by identifying trends faster than ever before. Kraft Heinz can not only assess risks faster but also collaborate efficiently across its teams and suppliers to mitigate those risks proactively.

With Supply Chain Center, we want to make it easy for companies to adopt new supply chain solutions in an incremental manner to digitally transform different functional areas of their supply chain while ensuring that those new solutions adopted in the future are interoperable with their existing landscape to achieve faster time to value. It’s all about doing more with less.

Enhance supply chain visibility

Once companies overcome the challenge of data visibility, the Supply Chain Platform enables them to generate actionable insights from this unified data to predict stockouts or shipment delays and prevent overstocking. Companies can track orders all the way until they reach their end consumer and proactively mitigate any constraints along the way to meet customer commitments. This type of end-to-end visibility is only possible with a unified platform approach.

This embed requires accepting cookies from the embed’s site to view the embed. Activate the link to accept cookies and view the embedded content.

This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.

Customers like Daimler Truck North America manage hundreds of thousands of parts across their global supply chain. Using the AI-powered supply and demand insights capabilities of the Supply Chain Center, which harnesses data flowing from the rest of the platform, they predict any parts shortages in their supply chain ahead of time so that they can proactively mitigate them and deliver on their promises to their customers, dealerships, and partners.

Another customer, iFIT, leverages Supply Chain Center to generate intelligent insights that will enable it to place products closer to where its customer demand is rather than just relying on history. It was able to improve efficiency from 30 percent to 75 percent in its forward stocking inventory, which means it can fulfill customer demand in two days versus two weeks, resulting in more satisfied customers.

The research with Harvard Business Review Analytic Services also finds that nearly one third of the companies struggle with poor collaboration between internal supply chain teams and external partners.*

The best part about leveraging the Microsoft ecosystem is that the supply chain team can rapidly act on these recommendations by collaborating internally or with external suppliers with built-in Microsoft Teams capabilities right from within the Supply Chain Center without having to toggle between multiple systems.

Gain agility to meet market demands

The Supply Chain Platform helps companies adapt to changing business needs with ease. Companies like GN Group, which offers brands like Jabra and Resound, are using Microsoft Dynamics 365 Supply Chain Management, a market-leading solution of the Supply Chain Platform, to future-proof its business and gain the flexibility to adapt to changing needs. Other customers like ChemTreat, Inc. are able to improve proactive planning with Dynamics 365 to mitigate part shortages. With Dynamics 365, organizations can shorten delivery lead times by running material resource planning (MRP) frequently throughout the day in a matter of minutes, optimize inventory with a real-time view of inventory across channels, and fulfill order promises by reserving inventory for high priority orders.

Companies can gain flexible capacity by rapidly deploying pop-up warehouses with robotic automation to meet seasonal demand more effectively, and the warehouse employees can gain additional agility using the mobile warehouse app to execute the warehouse processes.

This embed requires accepting cookies from the embed’s site to view the embed. Activate the link to accept cookies and view the embedded content.

This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.

Companies like Barnas Hus, a leading children and baby product retail chain in Norway, worked with KPMG to implement the warehouse management capabilities of Dynamics 365 to power its new state-of-the-art warehouse that utilizes robotics to accurately pick, sustainably pack, and ship products to its stores, giving it the inventory visibility that it always needed.

Another customer, Peet’s Coffee, uses the advanced warehouse management capabilities of Dynamics 365 to serve multiple channels: direct-to-consumer, retail coffee bars, customer warehouses, e-commerce customers, and direct store delivery (DSD) warehouses. Dynamics 365 provides Peets Coffee the flexibility it needs to support a diverse range of channels.

Improve efficiency and productivity

For many manufacturers, the current state of their operations is disconnected and rigid. With the Supply Chain Platform, companies can take advantage of intelligent automation to reduce costs, maximize operating margins, and improve employee experiences. With Dynamics 365, companies can build connected and intelligent manufacturing processes with an intuitive, touch-friendly production floor execution interface. New process advisor capabilities in Microsoft Power Automate provide customers with deep insights to identify bottlenecks in processes to drive optimization and efficiencies with low-code automation.

The Supply Chain Platform has enabled customers like Jansen to extend Dynamics 365 with Power Apps and Power Automate to create bespoke processes on the production floor that get the right information to the right operator with the least amount of manual intervention. The power of unifying all data in Dynamics 365 has enabled production planners at Jansen to provide more efficient production sequences, minimizing materials and equipment changeovers so that they can meet customer orders on time by reducing time and enhancing operator productivity.

This embed requires accepting cookies from the embed’s site to view the embed. Activate the link to accept cookies and view the embedded content.

This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.

Organizations can further enhance the visibility on their production floor with native integration to any manufacturing execution system (MES) without replacing it. They can optimize the use of equipment and resources with AI-driven, capability-matching production scheduling.

Another customer, Alterra Mountain Company, has increased asset utilization and gained complete visibility into asset costs and conditions across its ski resorts in North America. It performs proactive maintenance to decrease unplanned asset downtime and downstream disruptions and optimize maintenance spend and spare parts inventory.

The research with Harvard Business Review Analytic Services also showed that more than 30 percent of the companies struggled with finding the right talent with supply chain skills and expertise.*

The Supply Chain Platform keeps frontline workers safer while accelerating upskilling, reducing errors, and increasing yield with step-by-step holographic work instructions. Use mixed reality and built-in Teams capabilities to collaborate in real-time with experts, improving productivity and reducing environmental impact from unnecessary travel.

Enhance security and sustainability

Organizations are encountering increased volumes and more sophisticated threats to their environments than ever before. Unmanaged Internet of Things (IoT), industrial control system (ICS), and operational technology (OT) devices are a force driving new advances in the industry but have also tripled the size of the attack surface area. Securing these devices is a mission-critical objective for any organization. The Microsoft Supply Chain Platform helps organizations create a secure supply chain by detecting and preventing any cyber threat by improving cyber security, physical management, and endpoint security across their entire supply chain network with multiple levels of security and continuous updates and patches.

The Supply Chain Platform also helps accelerate sustainability initiatives all the way from sustainable design, to sourcing, to manufacturing, and fulfillment. With Supply Chain Center order management capabilities, retailers can streamline returns sustainably with out-of-the-box connectors to FedEx. They can implement boxless returns with supporting carriers for less packaging waste and fewer consolidated trips instead of individual customer returns.

This embed requires accepting cookies from the embed’s site to view the embed. Activate the link to accept cookies and view the embedded content.

This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.

The rules-based fulfillment orchestration engine in Supply Chain Center enables organizations to fulfill orders sustainably while meeting their customer’s order promise. For instance, rules-based setup allows companies to balance miles travelled from fulfillment center to customers to minimize their emissions with service-level agreements (SLAs) to ensure on-time delivery.

Companies can establish ethical and sustainable sourcing practices with Dynamics 365. Sustainability scoreboards help them make data-driven decisions about supply chain changes to improve their metrics and further their sustainability goals.

Another way to operate sustainably is to drive circularity. Essentiallyinstead of throwing away goods at the end of their life, finding ways to reuse or recycle them to reduce carbon emissions. This could also be a new revenue stream for companies.

Our own Microsoft Circular Centers have a unique process to optimize warehouse routing and management systems to process decommissioned servers from Microsoft datacenters. By leveraging the low-code Microsoft Power Platform solutions, Dynamics 365 Supply Chain Management was extended to build a reverse logistics solution that helped reuse, resale, and recycle the decommissioned data center assets. This is helping to put Microsoft on the path to achieving its sustainability goals by 2030.

To further support organizations to achieve their sustainability goals, last month at Microsoft Ignite we introduced new capabilities in Sustainability Manager, a Microsoft Cloud for Sustainability solution that enables organizations to store and reduce indirect value chain emissions (also known as “Scope 3” emissionsthe supply chain of your suppliers), which account for a disproportionate share of most organizations’ carbon footprints. The solution includes prebuilt calculation methodologies for more than half of the 15 categories of Scope 3.

Partner to empower customers in supply chain transformation

With the Supply Chain Platform, partners can bring their industry and domain expertise to create integrated solutions leveraging Microsoft Supply Chain Center, Dynamics 365 Supply Chain Management, Microsoft Azure, Teams, and Microsoft Power Platform. We will continue to support our customers with a rich partner ecosystem, including advisors and implementers like Accenture, Avanade, EY, KPMG, PwC, and TCS. In addition, to help customers find the best solution for their supply chain needs, we’ll continue working with solution providers such as Blue Yonder, Cosmo Tech, Experlogix, Flintfox, inVia Robotics, K3, o9 Solutions, SAS, Sonata Software, To-Increase software, and many more.

This embed requires accepting cookies from the embed’s site to view the embed. Activate the link to accept cookies and view the embedded content.

This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.

Ready to take action?

Take a free trial of Microsoft Supply Chain Center, which is now in preview.

Watch the Supply Chain Reimagined Event.

Learn more about the Microsoft Supply Chain Platform.


*Harvard Business Review Analytic Services research, “A supply chain built for a competitive advantage” commissioned by Microsoft.

The post Introducing Microsoft Supply Chain Platform—an open, flexible, collaborative, and secure platform appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Samba Releases Security Updates

This article is contributed. See the original author and article here.

The Samba Team has released security updates to address vulnerabilities in multiple versions of Samba. An attacker could exploit some of these vulnerabilities to take control of an affected system.

CISA encourages users and administrators to review Samba security announcement CVE-2022-42898 and apply the necessary updates.

Mozilla Releases Security Updates for Multiple Products

This article is contributed. See the original author and article here.

Mozilla has released security updates to address vulnerabilities in Thunderbird, Firefox ESR, and Firefox. An attacker could exploit these vulnerabilities to cause user confusion or conduct spoofing attacks.

CISA encourages users and administrators to review Mozilla’s security advisories for Thunderbird 102.5, Firefox ESR 102.5, and Firefox 107 for mitigations and updates.

Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester

This article is contributed. See the original author and article here.

From mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) activity. In the course of incident response activities, CISA determined that cyber threat actors exploited the Log4Shell vulnerability in an unpatched VMware Horizon server, installed XMRig crypto mining software, moved laterally to the domain controller (DC), compromised credentials, and then implanted Ngrok reverse proxies on several hosts to maintain persistence. CISA and the Federal Bureau of Investigation (FBI) assess that the FCEB network was compromised by Iranian government-sponsored APT actors.

CISA and FBI are releasing this Cybersecurity Advisory (CSA) providing the suspected Iranian government-sponsored actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help network defenders detect and protect against related compromises.

CISA and FBI encourage all organizations with affected VMware systems that did not immediately apply available patches or workarounds to assume compromise and initiate threat hunting activities. If suspected initial access or compromise is detected based on IOCs or TTPs described in this CSA, CISA and FBI encourage organizations to assume lateral movement by threat actors, investigate connected systems (including the DC), and audit privileged accounts. All organizations, regardless of identified evidence of compromise, should apply the recommendations in the Mitigations section of this CSA to protect against similar malicious cyber activity.

For more information on Iranian government-sponsored Iranian malicious cyber activity, see CISA’s Iran Cyber Threat Overview and Advisories webpage and FBI’s Iran Threats webpage.

Download the PDF version of this report: pdf, 528 kb.

For a downloadable copy of the Malware Analysis Report (MAR) accompanying this report, see: MAR 10387061-1.v1.

Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 11. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques with corresponding mitigation and/or detection recommendations.

Overview

In April 2022, CISA conducted retrospective analysis using EINSTEIN—an FCEB-wide intrusion detection system (IDS) operated and monitored by CISA—and identified suspected APT activity on an FCEB organization’s network. CISA observed bi-directional traffic between the network and a known malicious IP address associated with exploitation of the Log4Shell vulnerability (CVE-2021-44228) in VMware Horizon servers. In coordination with the FCEB organization, CISA initiated threat hunting incident response activities; however, prior to deploying an incident response team, CISA observed additional suspected APT activity. Specifically, CISA observed HTTPS activity from IP address 51.89.181[.]64 to the organization’s VMware server. Based on trusted third-party reporting, 51.89.181[.]64 is a Lightweight Directory Access Protocol (LDAP) server associated with threat actors exploiting Log4Shell. Following HTTPS activity, CISA observed a suspected LDAP callback on port 443 to this IP address. CISA also observed a DNS query for us‐nation‐ny[.]cf that resolved back to 51.89.181[.]64 when the victim server was returning this Log4Shell LDAP callback to the actors’ server.

CISA assessed that this traffic indicated a confirmed compromise based on the successful callback to the indicator and informed the organization of these findings; the organization investigated the activity and found signs of compromise. As trusted-third party reporting associated Log4Shell activity from 51.89.181[.]64 with lateral movement and targeting of DCs, CISA suspected the threat actors had moved laterally and compromised the organization’s DC.

From mid-June through mid-July 2022, CISA conducted an onsite incident response engagement and determined that the organization was compromised as early as February 2022, by likely Iranian government-sponsored APT actors who installed XMRig crypto mining software. The threat actors also moved laterally to the domain controller, compromised credentials, and implanted Ngrok reverse proxies.

Threat Actor Activity

In February 2022, the threat actors exploited Log4Shell [T1190] for initial access [TA0001] to the organization’s unpatched VMware Horizon server. As part of their initial exploitation, CISA observed a connection to known malicious IP address 182.54.217[.]2 lasting 17.6 seconds.

The actors’ exploit payload ran the following PowerShell command [T1059.001] that added an exclusion tool to Windows Defender [T1562.001]:

powershell try{Add-MpPreference -ExclusionPath ‘C:’; Write-Host ‘added-exclusion’} catch {Write-Host ‘adding-exclusion-failed’ }; powershell -enc “$BASE64 encoded payload to download next stage and execute it”

The exclusion tool allowlisted the entire c:drive, enabling threat actors to download tools to the c:drive without virus scans. The exploit payload then downloaded mdeploy.text from 182.54.217[.]2/mdepoy.txt to C:userspublicmde.ps1 [T1105]. When executed, mde.ps1 downloaded file.zip from 182.54.217[.]2 and removed mde.ps1 from the disk [T1070.004].

file.zip contained XMRig cryptocurrency mining software and associated configuration files.

  • WinRing0x64.sys – XMRig Miner driver
  • wuacltservice.exe – XMRig Miner
  • config.json – XMRig miner configuration
  • RuntimeBroker.exe – Associated file. This file can create a local user account [T1136.001] and tests for internet connectivity by pinging 8.8.8.8 [T1016.001]. The exploit payload created a Scheduled Task [T1053.005] that executed RuntimeBroker.exe daily as SYSTEM. Note: By exploiting Log4Shell, the actors gained access to a VMware service account with administrator and system level access. The Scheduled Task was named RuntimeBrokerService.exe to masquerade as a legitimate Windows task.

See MAR 10387061-1.v1 for additional information, including IOCs, on these four files.

After obtaining initial access and installing XMRig on the VMWare Horizon server, the actors used RDP [T1021.001] and the built-in Windows user account DefaultAccount [T1078.001] to move laterally [TA0008] to a VMware VDI-KMS host. Once the threat actor established themselves on the VDI-KMS host, CISA observed the actors download around 30 megabytes of files from transfer[.]sh server associated with 144.76.136[.]153. The actors downloaded the following tools:

  • PsExec – a Microsoft signed tool for system administrators.
  • Mimikatz – a credential theft tool.
  • Ngrok – a reverse proxy tool for proxying an internal service out onto an Ngrok domain, which the user can then access at a randomly generated subdomain at *.ngrok[.]io. CISA has observed this tool in use by some commercial products for benign purposes; however, this process bypasses typical firewall controls and may be a potentially unwanted application in production environments. Ngrok is known to be used for malicious purposes.[1]

The threat actors then executed Mimikatz on VDI-KMS to harvest credentials and created a rogue domain administrator account [T1136.002]. Using the newly created account, the actors leveraged RDP to propagate to several hosts within the network. Upon logging into each host, the actors manually disabled Windows Defender via the Graphical User Interface (GUI) and implanted Ngrok executables and configuration files. The threat actors were able to implant Ngrok on multiple hosts to ensure Ngrok’s persistence should they lose access to a machine during a routine reboot. The actors were able to proxy [T1090] RDP sessions, which were only observable on the local network as outgoing HTTPS port 443 connections to tunnel.us.ngrok[.]com and korgn.su.lennut[.]com (the prior domain in reverse). It is possible, but was not observed, that the threat actors configured a custom domain, or used other Ngrok tunnel domains, wildcarded here as *.ngrok[.]com, *.ngrok[.]io, ngrok.*.tunnel[.]com, or korgn.*.lennut[.]com.

Once the threat actors established a deep foothold in the network and moved laterally to the domain controller, they executed the following PowerShell command on the Active Directory to obtain a list of all machines attached to the domain [T1018]:

Powershell.exe get-adcomputer -filter * -properties * | select name,operatingsystem,ipv4address >

The threat actors also changed the password for the local administrator account [T1098] on several hosts as a backup should the rogue domain administrator account get detected and terminated. Additionally, the threat actor was observed attempting to dump the Local Security Authority Subsystem Service (LSASS) process [T1003.001] with task manager but this was stopped by additional anti-virus the FCEB organization had installed.

MITRE ATT&CK TACTICS AND TECHNIQUES

See table 1 for all referenced threat actor tactics and techniques in this advisory, as well as corresponding detection and/or mitigation recommendations. For additional mitigations, see the Mitigations section.

Table 1: Cyber Threat Actors ATT&CK Techniques for Enterprise

Initial Access

Technique Title

ID

Use

Recommendations

Exploit Public-Facing Application

T1190

The actors exploited Log4Shell for initial access to the organization’s VMware Horizon server.

Mitigation/Detection: Use a firewall or web-application firewall and enable logging to prevent and detect potential Log4Shell exploitation attempts [M1050].

Mitigation: Perform regular vulnerability scanning to detect Log4J vulnerabilities and update Log4J software using vendor provided patches [M1016],[M1051].

Execution

Technique Title

ID

Use

Recommendation

Command and Scripting Interpreter: PowerShell

T1059.001

The actors ran PowerShell commands that added an exclusion tool to Windows Defender.

The actors executed PowerShell on the AD to obtain a list of machines on the domain.

Mitigation: Disable or remove PowerShell for non-administrative users [M1042],[M1026] or enable code-signing to execute only signed scripts [M1045].

Mitigation: Employ anti-malware to automatically detect and quarantine malicious scripts [M1049].

Persistence

Technique Title

ID

Use

Recommendations

Account Manipulation

T1098

The actors changed the password for the local administrator account on several hosts.

Mitigation: Use multifactor authentication for user and privileged accounts [M1032].

Detection: Monitor events for changes to account objects and/or permissions on systems and the domain, such as event IDs 4738, 4728, and 4670. Monitor for modification of accounts in correlation with other suspicious activity [DS0002].

Create Account: Local Account

T1136.001

The actors’ malware can create local user accounts.

Mitigation: Configure access controls and firewalls to limit access to domain controllers and systems used to create and manage accounts.

Detection: Monitor executed commands and arguments for actions that are associated with local account creation, such as net user /add , useradd, and dscl -create [DS0017].

Detection: Enable logging for new user creation [DS0002].

Create Account: Domain Account

T1136.002

The actors used Mimikatz to create a rogue domain administrator account.

Mitigation: Configure access controls and firewalls to limit access to domain controllers and systems used to create and manage accounts.

Detection: Enable logging for new user creation, especially domain administrator accounts [DS0002].

Scheduled Task/Job: Scheduled Task

T1053.005

The actors’ exploit payload created Scheduled Task RuntimeBrokerService.exe, which executed RuntimeBroker.exe daily as SYSTEM.

Mitigation: Configure settings for scheduled tasks to force tasks to run under the context of the authenticated account instead of allowing them to run as SYSTEM [M1028].

Detection: Monitor for newly constructed processes and/or command-lines that execute from the svchost.exe in Windows 10 and the Windows Task Scheduler taskeng.exe for older versions of Windows [DS0009]

Detection: Monitor for newly constructed scheduled jobs by enabling the Microsoft-Windows-TaskScheduler/Operational setting within the event logging service [DS0003].

Valid Accounts: Default Accounts

T1078.001

The actors used built-in Windows user account DefaultAccount.

Mitigation: Change default usernames and passwords immediately after the installation and before deployment to a production environment [M1027].

Detection: Develop rules to monitor logon behavior across default accounts that have been activated or logged into [DS0028].

Defense Evasion

Technique Title

ID

Use

Recommendations

Impair Defenses: Disable or Modify Tools

           

T1562.001

The actors added an exclusion tool to Windows Defender. The tool allowlisted the entire c:drive, enabling the actors to bypass virus scans for tools they downloaded to the c:drive.

The actors manually disabled Windows Defender via the GUI.

Mitigation: Ensure proper user permissions are in place to prevent adversaries from disabling or interfering with security services. [M1018].

Detection: Monitor for changes made to Windows Registry keys and/or values related to services and startup programs that correspond to security tools such as HKLM:SOFTWAREPoliciesMicrosoftWindows Defender [DS0024].

Detection: Monitor for telemetry that provides context for modification or deletion of information related to security software processes or services such as Windows Defender definition files in Windows and System log files in Linux [DS0013].

Detection: Monitor processes for unexpected termination related to security tools/services [DS0009].

Indicator Removal on Host: File Deletion

T1070.004

The actors removed malicious file mde.ps1 from the dis.

Detection: Monitor executed commands and arguments for actions that could be utilized to unlink, rename, or delete files [DS0017].

Detection: Monitor for unexpected deletion of files from the system [DS0022].

Credential Access

Technique Title

ID

Use

Recommendations

OS Credential Dumping: LSASS Memory

T1003.001

The actors were observed trying to dump LSASS process.

Mitigation: With Windows 10, Microsoft implemented new protections called Credential Guard to protect the LSA secrets that can be used to obtain credentials through forms of credential dumping [M1043]

Mitigation: On Windows 10, enable Attack Surface Reduction (ASR) rules to secure LSASS and prevent credential stealing [M1040].

Mitigation: Ensure that local administrator accounts have complex, unique passwords across all systems on the network [M1027].

Detection: Monitor for unexpected processes interacting with LSASS.exe. Common credential dumpers such as Mimikatz access LSASS.exe by opening the process, locating the LSA secrets key, and decrypting the sections in memory where credential details are stored. [DS0009].

Detection: Monitor executed commands and arguments that may attempt to access credential material stored in the process memory of the LSASS [DS0017].

Credentials from Password Stores

T1555

The actors used Mimikatz to harvest credentials.

Mitigation: Organizations may consider weighing the risk of storing credentials in password stores and web browsers. If system, software, or web browser credential disclosure is a significant concern, technical controls, policy, and user training may be used to prevent storage of credentials in improper locations [M1027].

Detection: Monitor for processes being accessed that may search for common password storage locations to obtain user credentials [DS0009].

Detection: Monitor executed commands and arguments that may search for common password storage locations to obtain user credentials [DS0017].

Discovery

Technique Title

ID

Use

Recommendations

Remote System Discovery

T1018

The actors executed a PowerShell command on the AD to obtain a list of all machines attached to the domain.

Detection: Monitor executed commands and arguments that may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for lateral movement [DS0017].

Detection: Monitor for newly constructed network connections associated with pings/scans that may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for lateral movement [DS0029].

Detection: Monitor for newly executed processes that can be used to discover remote systems, such as ping.exe and tracert.exe, especially when executed in quick succession [DS0009].

System Network Configuration Discovery: Internet Connection Discovery

T1016.001

The actors’ malware tests for internet connectivity by pinging 8.8.8.8.

Mitigation: Monitor executed commands, arguments [DS0017] and executed processes (e.g., tracert or ping) [DS0009] that may check for internet connectivity on compromised systems.

Lateral Movement

Technique Title

ID

Use

Recommendations

Remote Services: Remote Desktop Protocol

T1021.001

The actors used RDP to move laterally to multiple hosts on the network.

Mitigation: Use MFA for remote logins [M1032].

Mitigation: Disable the RDP service if it is unnecessary [M1042].

Mitigation: Do not leave RDP accessible from the internet. Enable firewall rules to block RDP traffic between network security zones within a network [M1030].

Mitigation: Consider removing the local Administrators group from the list of groups allowed to log in through RDP [M1026].

Detection: Monitor for user accounts logged into systems associated with RDP (ex: Windows EID 4624 Logon Type 10). Other factors, such as access patterns (ex: multiple systems over a relatively short period of time) and activity that occurs after a remote login, may indicate suspicious or malicious behavior with RDP [DS0028].

Command and Control

Technique Title

ID

Use

Recommendations

Proxy

T1090

The actors used Ngrok to proxy RDP connections and to perform command and control.

Mitigation: Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of network allow and block lists [M1037].

Detection: Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g., extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure) [DS0029].

Ingress Tool Transfer

T1105

The actors downloaded malware and multiple tools to the network, including PsExec, Mimikatz, and Ngrok.

Mitigation: Employ anti-malware to automatically detect and quarantine malicious scripts [M1049].

INCIDENT RESPONSE

If suspected initial access or compromise is detected based on IOCs or TTPs in this CSA, CISA encourages organizations to assume lateral movement by threat actors and investigate connected systems and the DC.

CISA recommends organizations apply the following steps before applying any mitigations, including patching.

  1. Immediately isolate affected systems.
  2. Collect and review relevant logs, data, and artifacts. Take a memory capture of the device(s) and a forensic image capture for detailed analysis.
  3. Consider soliciting support from a third-party incident response organization that can provide subject matter expertise to ensure the actor is eradicated from the network and to avoid residual issues that could enable follow-on exploitation.
  4. Report incidents to CISA via CISA’s 24/7 Operations Center (report@cisa.gov or 888-282-0870) or your local FBI field office, or FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by e-mail at CyWatch@fbi.gov.
     

CISA and FBI recommend implementing the mitigations below and in Table 1 to improve your organization’s cybersecurity posture on the basis of threat actor behaviors.

  • Install updated builds to ensure affected VMware Horizon and UAG systems are updated to the latest version.
    • If updates or workarounds were not promptly applied following VMware’s release of updates for Log4Shell in December 2021, treat those VMware Horizon systems as compromised. Follow the pro-active incident response procedures outlined above prior to applying updates. If no compromise is detected, apply these updates as soon as possible.
      • See VMware Security Advisory VMSA-2021-0028.13 and VMware Knowledge Base (KB) 87073 to determine which VMware Horizon components are vulnerable.
      • Note: Until the update is fully implemented, consider removing vulnerable components from the internet to limit the scope of traffic. While installing the updates, ensure network perimeter access controls are as restrictive as possible.
      • If upgrading is not immediately feasible, see KB87073 and KB87092 for vendor-provided temporary workarounds. Implement temporary solutions using an account with administrative privileges. Note that these temporary solutions should not be treated as permanent fixes; vulnerable components should be upgraded to the latest build as soon as possible.
      • Prior to implementing any temporary solution, ensure appropriate backups have been completed.
      • Verify successful implementation of mitigations by executing the vendor supplied script Horizon_Windows_Log4j_Mitigations.zip without parameters to ensure that no vulnerabilities remain. See KB87073 for details.
  • Keep all software up to date and prioritize patching known exploited vulnerabilities (KEVs).
  • Minimize the internet-facing attack surface by hosting essential services on a segregated DMZ, ensuring strict network perimeter access controls, and not hosting internet-facing services that are not essential to business operations. Where possible, implement regularly updated web application firewalls (WAF) in front of public-facing services. WAFs can protect against web-based exploitation using signatures and heuristics that are likely to block or alert on malicious traffic.
  • Use best practices for identity and access management (IAM) by implementing phishing resistant multifactor authentication (MFA), enforcing use of strong passwords, regularly auditing administrator accounts and permissions, and limiting user access through the principle of least privilege. Disable inactive accounts uniformly across the AD, MFA systems, etc.
    • If using Windows 10 version 1607 or Windows Server 2016 or later, monitor or disable Windows DefaultAccount, also known as the Default System Managed Account (DSMA).
  • Audit domain controllers to log successful Kerberos Ticket Granting Service (TGS) requests and ensure the events are monitored for anomalous activity.  
    • Secure accounts.
    • Enforce the principle of least privilege. Administrator accounts should have the minimum permission necessary to complete their tasks.
    • Ensure there are unique and distinct administrative accounts for each set of administrative tasks.
    • Create non-privileged accounts for privileged users and ensure they use the non-privileged accounts for all non-privileged access (e.g., web browsing, email access).
  • Create a deny list of known compromised credentials and prevent users from using known-compromised passwords.
  • Secure credentials by restricting where accounts and credentials can be used and by using local device credential protection features. 
    • Use virtualizing solutions on modern hardware and software to ensure credentials are securely stored.
    • Ensure storage of clear text passwords in LSASS memory is disabled. Note: For Windows 8, this is enabled by default. For more information see Microsoft Security Advisory Update to Improve Credentials Protection and Management.
    • Consider disabling or limiting NTLM and WDigest Authentication.
    • Implement Credential Guard for Windows 10 and Server 2016 (refer to Microsoft: Manage Windows Defender Credential Guard for more information). For Windows Server 2012R2, enable Protected Process Light for Local Security Authority (LSA).
    • Minimize the AD attack surface to reduce malicious ticket-granting activity. Malicious activity such as “Kerberoasting” takes advantage of Kerberos’ TGS and can be used to obtain hashed credentials that threat actors attempt to crack.
       

VALIDATE SECURITY CONTROLS

In addition to applying mitigations, CISA and FBI recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and FBI recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

To get started:

  1. Select an ATT&CK technique described in this advisory (see table 1).
  2. Align your security technologies against the technique.
  3. Test your technologies against the technique.
  4. Analyze your detection and prevention technologies performance.
  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

CISA and FBI recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

Build connections with Games for Work, a new Microsoft Teams app

Build connections with Games for Work, a new Microsoft Teams app

This article is contributed. See the original author and article here.

Managers everywhere are struggling to find solutions to building trust, teamwork, and improving morale within their organization. Many are turning to games for help.

The post Build connections with Games for Work, a new Microsoft Teams app appeared first on Microsoft 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.