{"id":49826,"date":"2021-03-05T19:33:17","date_gmt":"2021-03-05T15:33:17","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=49826"},"modified":"2021-03-10T19:45:22","modified_gmt":"2021-03-10T15:45:22","slug":"news-you-mightve-missed-01-04-mar","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-01-04-mar\/","title":{"rendered":"News You Might&#8217;ve Missed.  01 &#8211; 04 Mar"},"content":{"rendered":"<p>What's new this week in the news for MSPs? Microsoft announces new cloud instances and security features; Google launches a cyber-insurance program; Microsoft initiates zero-trust focus for Azure; Exchange servers the target of HAFNIUM 0-day exploits; and DarkSide ransomware hits CompuCom MSP.<!--more--><\/p>\n<p>Let's see what it's all about.<\/p>\n<h2>Microsoft Announces New Cloud Instances and Security Features<\/h2>\n<p>This week <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/improving-agility-performance-and-resilience-with-new-azure-infrastructure-capabilities\/\"target=\"_blank\" rel=\"noopener noreferrer\">Microsoft announced<\/a> memory-optimized instances for Azure public cloud at the Ignite virtual event. The new features will help their customers secure and manage their environments.<br \/>\nMsv2 instances are aimed at businesses running memory-intensive workloads, such as the in-memory databases in SAP SE's Hana.<\/p>\n<p>Besides increasing the number of available Azure instances, they will also be simpler to manage. Although Azure previously supported it only in Windows, Azure Automanage, a management automation service, makes performing specific tasks such as repairing incorrectly defined configuration settings and installing security updates a breeze.<\/p>\n<p>Trusted Launch, another new feature, and encrypted keys will make it easier for Azure instances to keep hackers out. Additionally, Microsoft is offering a setting that it is referred to as auto-key rotation. This setting enables keys to be refreshed automatically after specific periods, reducing the chance of data breaches.<\/p>\n<h2>Google Launches a Cyber-Insurance Program<\/h2>\n<p>Google is <a href=\"https:\/\/siliconangle.com\/2021\/03\/02\/google-rolls-first-kind-cyber-insurance-program-cloud-customers\/\"target=\"_blank\" rel=\"noopener noreferrer\">developing a cybersecurity insurance program<\/a>. According to Google this week, it is the first program of its kind to come from a cloud provider.It includes a risk analysis tool to help companies pinpoint weaknesses in their cloud environment security.<\/p>\n<p id=\"last\">The two firms are expected to provide \"specialized and enhanced cyber insurance.\" The packages will be made exclusively for customers of Google Cloud. According to Google, the insurance pricing is based on how well the customer's information technology environment is secured.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-e6824cd7-ceb3-465a-9f93-4509b71ce559\" data-portal=\"5442029\" data-id=\"e6824cd7-ceb3-465a-9f93-4509b71ce559\"><span class=\"hs-cta-node hs-cta-e6824cd7-ceb3-465a-9f93-4509b71ce559\" id=\"hs-cta-e6824cd7-ceb3-465a-9f93-4509b71ce559\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/e6824cd7-ceb3-465a-9f93-4509b71ce559\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-e6824cd7-ceb3-465a-9f93-4509b71ce559\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/e6824cd7-ceb3-465a-9f93-4509b71ce559.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>Risk Manager is a tool Google that has developed that will be a part of the offering. It analyzes a company's security in their cloud environment and pinpoints any issues. It then produces a report for companies to reduce their cloud's vulnerability to breaches and optimizes pricing on their insurance. Google is currently announcing the collaboration as the first partnership with the insurance industry and a cloud provider.<\/p>\n<h2>Microsoft Initiates Zero-Trust Focus for Azure<\/h2>\n<p>Zero-trust is a concept that Google LLC initially proposed. This week at Ignite 2021, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\"target=\"_blank\" rel=\"noopener noreferrer\">Microsoft announced<\/a> many updates that aim to extend the protection it provides to identities, devices, data, clouds, and platforms based on zero-trust.<\/p>\n<p>The zero-trust concept is centered around shifting access controls from the perimeter to users and individual devices. It will let staff work securely from any location without the need for a traditional VPN (virtual private network).<\/p>\n<p>Once zero-trust is in place, access control assumes any user, whether from inside or outside, is equally untrustworthy. Access request approvals are based on the particular user\u2019s details, such as their job designation and the device's security status.<\/p>\n<p>According to Vassu Jakka, Microsoft Corporate VP of compliance, security, and identity, Microsoft is a passionate proponent of the zero-trust mindset. To ensure that businesses are protected in conformance with the current complex security requirements, he says we must combine the areas of security, identity, compliance, and skilling.<\/p>\n<div class=\"perfect-pullquote vcard pullquote-align-full pullquote-border-placement-left\"><blockquote><p><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-df449e72-fcd7-4b67-9343-88ba68962e08\" data-portal=\"5442029\" data-id=\"df449e72-fcd7-4b67-9343-88ba68962e08\"><span class=\"hs-cta-node hs-cta-df449e72-fcd7-4b67-9343-88ba68962e08\" id=\"hs-cta-df449e72-fcd7-4b67-9343-88ba68962e08\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/df449e72-fcd7-4b67-9343-88ba68962e08\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-df449e72-fcd7-4b67-9343-88ba68962e08\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/df449e72-fcd7-4b67-9343-88ba68962e08.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/p><\/blockquote><\/div>\n<h2>Exchange Servers the Target of HAFNIUM 0-Day Exploits<\/h2>\n<p>Microsoft says it has detected multiple limited and targeted attacks using on-premise versions of Microsoft Exchange Server via 0-day exploits. The threat actor in these attacks used these vulnerabilities to access the on-premise Exchange servers, allowing the installation of additional malware and further access to email accounts, which would facilitate long-term access to its victims' environments.<\/p>\n<p>HAFNIUM is known to target organizations in the United States primarily.\u00a0<a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/02\/multiple-security-updates-released-for-exchange-server\"target=\"_blank\" rel=\"noopener noreferrer\">MSTIC (Microsoft Threat Intelligence Center)<\/a> attributes the campaign to <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\"target=\"_blank\" rel=\"noopener noreferrer\">HAFNIUM<\/a> with a high degree of confidence. They say they are assessed as a state-sponsored group that operates from China. They determined this based on the procedures, tactics, and victimology used in the attacks.<\/p>\n<p>Microsoft is strongly recommending businesses to update their on-premise systems now. Exchange Online is not affected.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 50%; text-align: center;\">\n<p><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/05\/IT-Security-Assessment-1.png\" alt=\"Whitepaper icon\" \/><\/p>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" data-portal=\"5442029\" data-id=\"6cae84c3-fb62-47b1-a1f2-6744125b00e5\"><span class=\"hs-cta-node hs-cta-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" id=\"hs-cta-6cae84c3-fb62-47b1-a1f2-6744125b00e5\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/6cae84c3-fb62-47b1-a1f2-6744125b00e5\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/6cae84c3-fb62-47b1-a1f2-6744125b00e5.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 50%;\">\n<div class=\"call-to-action__title\">IT Security Assessment Checklist<\/div>\n<div class=\"call-to-action__text\">\n<p>Assess vulnerabilities and threats, network security, workspace and equipment security, documentation, and more. The pack includes:<\/p>\n<ul>\n<li>a ready-to-print PDF file<\/li>\n<li>an Excel file to help create a customizable assessment resource<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<h2>DarkSide Ransomware Hits CompuCom MSP<\/h2>\n<p>Compucom, a US-based managed services provider, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/compucom-msp-confirms-ongoing-outage-following-malware-incident\/\"target=\"_blank\" rel=\"noopener noreferrer\">was hit by a DarkSide ransomware attack<\/a>. The attack led to the disruption of their services and customers being disconnected from their network to prevent the malware's further spread.<\/p>\n<p>The problem was first discovered on the customer portal used for creating trouble tickets. Instead of what is usually present, customers were greeted with an error message. CompuCom began contacting customers stating that their site had been compromised by malware, but they gave no other details. Cobalt Strike is leveraged for installation using a variety of trojans that are spread through email phishing campaigns. Some of the trojans include TrickBot, BazarLoader, ZLoader, and QBot.<\/p>\n<p>Since confirmation has been obtained that DarkSide ransomware is behind the attack, it is likely that the cybercriminals encrypted the devices after harvesting unencrypted files. If the ransom is not paid, we will soon see the data appear on <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/list-of-ransomware-that-leaks-victims-stolen-files-if-not-paid\/\"target=\"_blank\" rel=\"noopener noreferrer\">their data leak site<\/a>.<\/p>\n<h2>That's a Wrap for News You Might've Missed<\/h2>\n<p>I hope this update has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back every week for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s new this week in the news for MSPs? Microsoft announces new cloud instances and security features; Google launches a cyber-insurance program; Microsoft initiates zero-trust focus for Azure; Exchange servers the target of HAFNIUM 0-day exploits; and DarkSide ransomware hits CompuCom MSP.<\/p>\n","protected":false},"author":84,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-49826","post","type-post","status-publish","format-standard","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/49826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=49826"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/49826\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=49826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=49826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=49826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}