Tag Archive for: DELIVERS

Hillstone Networks Delivers Enterprise Application Security for Cloud Environments | Business


SANTA CLARA, Calif.–(BUSINESS WIRE)–Sep 14, 2021–

Hillstone Networks, a leading provider of infrastructure protection solutions, is pleased to announce the release of Hillstone virtual Web Application Firewall (vWAF) as part of its full breadth of cybersecurity solutions. vWAF addresses and protects against the barrage of vulnerabilities that are regularly reported in Web applications and pose a significant threat to an enterprise’s security posture.

With vWAF, customers can fully secure applications that span multiple data centers or clouds. With proactive Layer-7 security, it detects and defends against attacks at both the network layer (DDoS attacks, flood attacks, scan and spoof, etc.), at the application layer (injection attacks, cross site scripting attacks, SQL injection, etc.), as well as specific files (.docx, .jpg). vWAF protects against OWASP Top 10 threats, including addressing broken authentication (illegal access) with an automated protection process.

vWAF highlights include:

  • Machine-Learning-driven semantic analysis, policy optimization and unknown attack defense together help detect and fix vulnerabilities, and identify and protect against threats.
  • Improved detection accuracy delivered with context and connotation, so that security admins have a clear understanding of the threat and its impact.
  • Advanced API protection secures against excessive data exposure and increased attack surfaces, ensuring the integrity of the app development environment.

“Your network may be secure, but what about the applications running in your virtual environments? Protection doesn’t stop at the network perimeter, and web applications are strife with vulnerabilities,” says Tim Liu, co-founder and CTO, Hillstone Networks, “Our customers are looking to us to secure, maintain and enhance app performance due to the challenges and complexities they face. Hillstone vWAF is built to protect and defend against vulnerabilities with a distributed and scalable solution.”

Click here for more information on Hillstone’s virtual WAF solution.

About Hillstone Networks

Hillstone…

Source…

Multi-payload Gootloader platform stealthily delivers malware and ransomware


The delivery method for the six-year-old Gootkit financial malware has been developed into a complex and stealthy delivery system for a wide range of malware, including ransomware. Sophos researchers have named the platform Gootloader. It is actively delivering malicious payloads through tightly targeted operations in the US, Germany and South Korea. Previous campaigns also targeted internet users in France.

Gootloader

The Gootloader infection chain begins with sophisticated social engineering techniques that involve hacked websites, malicious downloads, and manipulated search engine optimization (SEO). When someone types a question into a search engine such as Google, the hacked websites appear among the top results.

To ensure targets from the right geographies are captured, the adversaries rewrite website code “on the go” so that website visitors who fall outside the desired countries are shown benign web content, while those from the right location are shown a page featuring a fake discussion forum on the topic they’ve queried. The fake websites are visually identical regardless of whether they are in English, German or Korean.

The fake discussion forum includes a post from a “site administrator,” with a link to a download. The download is a malicious Javascript file that initiates the next stage of compromise.

From this point on, the attack proceeds covertly, using a wide range of complicated evasion techniques, multiple layers of obfuscation, and fileless malware that is injected into memory or the registry where conventional security scans cannot reach it. Gootloader is currently delivering Kronos financial malware in Germany, and the post-exploitation tool, Cobalt Strike, in the US and South Korea. It has also delivered REvil ransomware and the Gootkit trojan itself.

“The developers behind Gootkit appear to have shifted resources and energy from delivering just their own financial malware to creating a stealthy, complex delivery platform for all kinds of payloads, including REvil ransomware,” said Gabor Szappanos, threat research director at Sophos. “This shows that criminals tend to reuse their proven solutions instead of developing new delivery…

Source…