Review: Emotet Threat Defense With Sentinel One and Huntress

แชร์
ฝัง
  • เผยแพร่เมื่อ 12 มิ.ย. 2024
  • Connecting With Us
    ---------------------------------------------------
    + Hire Us For A Project: lawrencesystems.com/hire-us/
    + Tom Twitter 🐦 / tomlawrencetech
    + Our Web Site www.lawrencesystems.com/
    + Our Forums forums.lawrencesystems.com/
    + Instagram / lawrencesystems
    + Facebook / lawrencesystems
    + GitHub github.com/lawrencesystems/
    + Discord / discord
    Lawrence Systems Shirts and Swag
    ---------------------------------------------------
    ►👕 lawrence.video/swag
    AFFILIATES & REFERRAL LINKS
    ---------------------------------------------------
    Amazon Affiliate Store
    🛒 www.amazon.com/shop/lawrences...
    All Of Our Affiliates that help us out and can get you discounts!
    🛒 www.lawrencesystems.com/partn...
    Gear we use on Kit
    🛒 kit.co/lawrencesystems
    Use OfferCode LTSERVICES to get 5% off your order at
    🛒 www.techsupplydirect.com?aff=2
    Digital Ocean Offer Code
    🛒 m.do.co/c/85de8d181725
    HostiFi UniFi Cloud Hosting Service
    🛒 hostifi.net/?via=lawrencesystems
    Protect you privacy with a VPN from Private Internet Access
    🛒 www.privateinternetaccess.com...
    Patreon
    💰 / lawrencesystems
    MSP Tool: Why We Use Huntress Labs To Monitor For Threats
    • MSP Tool: Why We Use H...
    Hunting Malware, Cyber Security, and Understanding APT with Kyle Hanslovan of Huntress Labs
    • Hunting Malware, Cyber...
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 45

  • @SFP62
    @SFP62 3 ปีที่แล้ว +6

    Great content as usual keep it up.
    As SentinelOne detected the attack, I'm sure that if you had the S1 policy set to "Protect" on Suspicious, it would have stopped the attack.

    • @Sentinelone-inc
      @Sentinelone-inc 3 ปีที่แล้ว +4

      That's right, Steve. Our policy is setting the automated mitigation action, and we always detect the same

  • @adambrown3918
    @adambrown3918 3 ปีที่แล้ว

    This was a great video! Very informative. Thank you very much for posting. You have a new subscriber. 😊

  • @esra_erimez
    @esra_erimez 3 ปีที่แล้ว +3

    There is no security "solution", security is a process

  • @lance9749
    @lance9749 3 ปีที่แล้ว +6

    Sentinel One has the ability to have a SOC remediate any threats. My guess from the video is that you have the "Complete" version but not the SOC component add on. I'm actully considering if I still need Huntress with Sentinel One in place with a SOC. Also I'm testing Zscaler as a possible solution to getting rid of the firewall alltogether you might want to check it out. Thank you ahead of time... from a fellow MSP in Norther California.

    • @JoaoSilva-gs5jb
      @JoaoSilva-gs5jb 3 ปีที่แล้ว

      what's SOC?

    • @lance9749
      @lance9749 3 ปีที่แล้ว +2

      @@JoaoSilva-gs5jb Security Operations Center en.wikipedia.org/wiki/Security_operations_center

    • @JoaoSilva-gs5jb
      @JoaoSilva-gs5jb 3 ปีที่แล้ว

      @@lance9749 but if you already have Huntress as a SOC, why would you want a SOC team from SO? Rudundancy or just to have one less thing running on the system?

    • @lance9749
      @lance9749 3 ปีที่แล้ว

      So I'm trying to figure out why would you need Huntress if you have Sentinel One with a SOC. What I noticed is that I believe that Lawrence is not using a SOC with Sentinel One... sooo if they did have the Sentinel One SOC would have stopped this malware thus eliminating the need for Huntress. Look I like Huntress a lot and I have both these products... however this stuff starts adding up in cost real quick. Tough call ... do you really need both... of course it's easy to say yes you do but then getting a client to pay for both is another story.

    • @breakingcustombc2925
      @breakingcustombc2925 3 ปีที่แล้ว

      You're seeing more endpoint products have their own MTR offerings. Sophos for example bought two MTR companies and now offers it as an add-on to their software.

  • @colt1596
    @colt1596 3 ปีที่แล้ว +5

    I'm always scared to comment now because I dont want it to seem like I have too much time on my hands lol.
    But good video

  • @comutech
    @comutech 3 ปีที่แล้ว +1

    Hi What spam filter do you use

  • @donaldduck6198
    @donaldduck6198 3 ปีที่แล้ว

    With a static analysis (oledump.py) it is easy to detect Emotet. Could you explain how they create this malformed zip-file? (docx with VBA)

  • @besnico
    @besnico 3 ปีที่แล้ว

    Hi Tom, was this a targetted attack? Can you share any more info on what happened?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  3 ปีที่แล้ว

      Just a phishing email, not really that targeted but the end user thought it was click worthy

  • @JohnSmith-oj3uu
    @JohnSmith-oj3uu 3 ปีที่แล้ว

    What do you think about SentinelOne Vigilance service.

  • @Jussoparkours
    @Jussoparkours 3 ปีที่แล้ว +1

    What about application whitelisting and/or EDR on the endpoint specifically?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  3 ปีที่แล้ว +1

      I am not sold on it. Sounds great in theory but only allowing certain applications to run can be difficult to manage in practice.

    • @jgould30
      @jgould30 3 ปีที่แล้ว +1

      I run Microsoft SRP and AppLocker when available (Windows 10 Enterprise). A whitelist is 100% the most useful thing I've EVER done. Big networks, lots of users, single IT person, and never had a virus to resolve. It's more useful then any huristic reactionary method. Yes you have to tune it correctly since a few apps like to run in users AppData, but most don't. Those that do you can use certificate or hash based rules in SRP to allow the end user to install. AppLocker has even better control like allowing apps with certificates signed by certain orgs (like Microsoft). And always look if the App has a alternative all user installer to deploy using SCCM, PDQ deploy, etc. WebEx and other meeting tools were always a problem, but I've got them allowed specifically using certs or all user installers (c:}program files). Microsoft teams has been a problem but I've found a workaround for the desktop app until they resolve the issue in their installer. And finally doing a whitelist lets me control who and what is installed in the PC and when things get patched with our patch management. I don't WANT end users installing whatever they want. Submit an IT ticket.
      I don't know why Lawrence has such an opinion on whitelisting but I strongly suggest to him to rethink it. I've felt with huge complex Enterprise environments and small SMB. Everyone acts like it's going to be a problem but in reality it's not. People don't typically install software if they have corporate solutions already.

    • @jgould30
      @jgould30 3 ปีที่แล้ว

      @@LAWRENCESYSTEMS it's really not hard to manage. I've spend maybe 2 work days in a calendar year to manage an AppLocker whitelist across a 1000+ user base of Windows 10 Enterprise machines. Once you get the basics in place (WebEx and other meeting tools, MS teams or equivalent, and have a patch management tool/solution) you basically never have to touch it. 99.999% of applications install to;
      c:\program files or program files (x86)
      If your users are just domain users and not admins then they can't write to those folders anyway by default. So you are already pushing most software to the computers that they need (office, photos, Adobe reader, Java, etc). And there is no real overhead there. The issue is the software that tries to install to the users hidden AppData folder in Windows. Which is extremely undesirable to begin with. It's what cryltolocker and other viruses use to run applications under the users context. A whitelist will shut that down so instead of your end users going and installing chrome instances per user account, you just push it to the PC so all users of the PC have it because it runs from program files. And now all your left with is a few random apps to whitelist if you can't find an alternative installer made my the manufacturer for software distribution tools like SCCM, GPO, or PDQ deploy. You whitelist a certificate or hash and let the user run that very specific software. Sometimes the certs will need to be replaced, usually once ever 2 years I find. But with AppLocker you can be even less restrictive and allow users to run software based on the company signing the cert and name of application and even the version. It's incredibly slick. You should seriously setup a test environment and actually try it. It's not hard work at all.

    • @LacyMoore96
      @LacyMoore96 3 ปีที่แล้ว

      @@LAWRENCESYSTEMS I've been "trying" to use ThreatLocker and to say it is difficult to manage in practice is a huge understatement. In a corporate environment, maybe not so much, but when you are dealing with multiple small businesses it definitely takes some time. Throw in a business or two with multiple legacy applications and a business that writes their own software that is constantly updated and you have a huge headache on your hands. I've had to start with AutoElevate because of those legacy applications needing admin privileges. Add to that trying to install software from your RMM scripts. It's just a nightmare.

    • @markalmada9662
      @markalmada9662 2 ปีที่แล้ว

      @@jgould30 probably just the sheer quantity of things you have to look after the complexity of multiple sites, multiple requirements. Lack of understanding by users. To identify and mange things under control is always wise. I don't disagree.

  • @JoaoSilva-gs5jb
    @JoaoSilva-gs5jb 3 ปีที่แล้ว

    amazing video Tom, gotta come up with a way to do user training, we've been targeted on a daily basis with malware via email

    • @noah9341
      @noah9341 3 ปีที่แล้ว

      Check out knowbe4

  • @markalmada9662
    @markalmada9662 2 ปีที่แล้ว

    Has anyone had issues using sentinel one in the Solarwinds RRM dashboard?
    It doesn't seem to present the same way Tom has shown and/or show all options on how to delve into threats?
    I have raised this with Solarwinds but really negligible support. After trial period we just couldn't get access to the sentinel one dash?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  2 ปีที่แล้ว +1

      You can no longer get the dashboard unless you buy directly from sentinel one.

    • @markalmada9662
      @markalmada9662 2 ปีที่แล้ว

      Thanks Guys for the heads up. It sucks really. Took them a year to get our Sentinel one up and running. We paid for year through lockdown and still no credit. Really poor from Solar Winds.

    • @markalmada9662
      @markalmada9662 2 ปีที่แล้ว

      @@LAWRENCESYSTEMS thank you. As always Tom, much appreciated.

    • @marc-andrerenaud1394
      @marc-andrerenaud1394 2 ปีที่แล้ว +1

      I've used S1 with the Solarwinds RMM and AutoTask PSA. It worked well however one thing I can't stress enough is to stay away from the Solarwinds integration. Keep the various panes of glass separate as managing Sentinel One via the SolarWinds panel is a painful process. Keeping them separate also increases your security posture as an attacker would have to break into separate platforms.

    • @marc-andrerenaud1394
      @marc-andrerenaud1394 2 ปีที่แล้ว +1

      @@LAWRENCESYSTEMS Buying through PAX8 gives access to the Sentinel 1 dashboard.

  • @JohnKirk
    @JohnKirk 3 ปีที่แล้ว +2

    I ❤️ S1

  • @BDBD16
    @BDBD16 3 ปีที่แล้ว +1

    If more people ran BeOS we wouldn't have these issues.

    • @garolstipock
      @garolstipock 3 ปีที่แล้ว

      lol.. I still have a copy on a zip-disk somewheres in my pile. But alas, no PowerPC processor system to install it on.