Archive for Palo Alto

Authentication Coercion Attacks Abuse Windows to Force Systems into Sending Credentials

Posted in Commentary with tags on November 12, 2025 by itnerd

Researchers have uncovered an upsurge in authentication coercion cyber-attacks that abuse Windows Remote Procedure Call (RPC) mechanisms that force systems into sending their credentials to an attacker-controlled system.

You can find out more via this Palo Alto Unit 42 Blog post:  https://unit42.paloaltonetworks.com/authentication-coercion/  

Jim Routh, Chief Trust Officer at Saviynt, commented:

Authentication coercion attacks represent a particularly challenging attack vector for enterprises that rely on extensive use of Microsoft architecture and products. These attacks enable lateral movement with limited visibility for the enterprise. There are several remediation steps recommended that generally require strict adherence to limits in how RPC (remote procedure call) is used within the enterprise. The larger and more complex the enterprise, the more difficult it is to enforce the limitations of RPC. 

“Enterprises should consider more maturity in how privileged access management (PAM) works, including the use of continuous validation techniques that compare attributes from data streams to established patterns.  These techniques measure the deviation from the established pattern mathematically. The deviation threshold (number or score) can trigger automated workflows that restrict access (lateral movement) within milliseconds of an attack attempt. This type of capability is not dependent on humans to detect the threats. It is similar to the way our body’s immune system operates when exposed to bacteria or a virus. Our body’s immune system automatically produces white blood cells and antibodies to attack the bacterial infection. Continuous validation techniques represent a digital immune system response that can take action in milliseconds when lateral movement is automatically identified.” 

This is another big hint that organizations need to look at making sure that users are only able to do what they need to do and nothing more. That would make attacks like these way less effective.

Palo Alto Makes A Number Of Announcements At RSA

Posted in Commentary with tags on April 28, 2025 by itnerd

Earlier today to kick off the start of RSA, Palo Alto Networks released multiple announcements:

  • Palo Alto Networks Bolsters SASE Capabilities for Modern Workplace. Palo Alto Networks announced its latest advancements in Prisma® SASE, the industry’s most comprehensive secure access service edge (SASE) solution, unveiling Prisma Access Browser 2.0, the world’s only SASE-native secure browser. Prisma Access Browser 2.0, along with Endpoint Data Loss Prevention (DLP) and expanded cloud presence with Oracle Cloud Infrastructure (OCI), are new Prisma SASE capabilities designed to secure generative AI (GenAI) usage, improve user experience and enhance operational resilience in the modern workplace.

RansomHub Has A Ransmware ExploitThat Leverages Microsoft And Palo Alto Vulnerabilities To Pwn You

Posted in Commentary with tags , on February 13, 2025 by itnerd

Researchers have uncovered a major ZeroLogon ransomware exploit that targets a critical vulnerability in Microsoft’s Active Directory that allows attackers to gain access to domain controllers without needing any credentials. It also targets a vulnerability in Palo Alto Networks firewall appliances running an outdated PAN-OS software. This exploit allowed attackers to execute arbitrary code with root privileges, bypassing authentication and gaining a foothold inside the network. Finally, the group behind this is RansomHub who are well known ransomware actors.

You can read details here.

Martin Jartelius, CISO at Outpost24, provided the following comments specifically related to the Microsoft part of this:

“The ZeroLogon vulnerability (CVE-2020-1472) continues to be a major concern, especially in Active Directory (AD) environments, which are often seen as a platform that “just works.” The vulnerability was patched by Microsoft in August 2020, but for the exploit to be effective, organizations must have either failed to patch or deliberately re-enabled insecure protocols in their Group Policy Objects (GPO). Enforcement of secure channels by AD controllers didn’t begin until Q1 2021, but since then, it has been actively enforced.

“It’s difficult to victim-blame when it comes to zero-day exploits or supply chain breaches, but when an organization is hit by a vulnerability that has been patched for over four years, it’s clear that someone within the team has knowingly taken on a significant risk. The kill chain doesn’t begin with this exploit—it starts with initial access. Organizations must focus on hardening their external attack surface and training staff to reduce the likelihood of breaches. Leaving systems unpatched or intentionally vulnerable is a serious security misstep.

“A critical point: if your domain controllers (DCs) are still running Windows Server 2008 R2 SP1 or earlier, this vulnerability remains unpatched unless you have an Extended Security Update (ESU) license, which only applies when running in Azure, not on-prem. While rare, we still encounter customers running unsupported versions of Windows. Active Directory, being the “keys to the kingdom,” must be regularly maintained and patched to avoid exposure to preventable exploits.

Finally, Windows Server 2012 and 2012 R2 will reach the final year of their ESU coverage in October 2026. Organizations should start planning upgrades now to ensure continued protection.

“The broader lesson is the importance of proactive patching, secure configurations, and ongoing risk management to avoid unnecessary exposure.”

Along with Martin’s advice, I would have a look at this if you are a Palo Alto customer and take immediate action if required. That way you limit your exposure.

Palo Alto Networks Prepares Organizations for Quantum Security with QRNG Open API

Posted in Commentary with tags on January 22, 2025 by itnerd

 Palo Alto Networks, the global cybersecurity leader, today announced the release of a Quantum Random Number Generator (QRNG) Open API framework, empowering organizations to prepare for future quantum security threats. The framework, developed in partnership with six innovators across the QRNG field, addresses the need for multi-vendor interoperability across the industry and enables organizations to invest in and build QRNG-based systems that are resilient regardless of the underlying technology or company.

The future convergence of AI, ML, deep learning and classical supercomputing with quantum computing necessitates securing today’s systems against quantum-enabled attacks. QRNG is a technology that uses the principles of quantum mechanics to generate truly random numbers, which are essential for creating secure cryptographic keys. Experts recommend the use of recently released NIST post-quantum cryptography (PQC) standards in combination with QRNG to give organizations the best chance to protect against future threats. The QRNG Open API framework eliminates barriers to QRNG adoption, helping global organizations access the highest quality cryptographic operations possible as they prepare for quantum computing technology.

Available through the Palo Alto Networks GitHub portal, the QRNG Open API can be embedded into any application. Later this year, Palo Alto Networks Next Generation Firewalls (NGFWs) will support the QRNG Open API, enabling the network security platform to bring in entropy for cryptographic functions.

Developed by Palo Alto Networks and leading QRNG technology partners, Anametric, ID Quantique, Qrypt, Quantinuum, Quantropi and Quside, the QRNG Open API will:

  • Simplify QRNG integration by removing proprietary silos.
  • Maximize interoperability in multi-vendor networks and promote freedom of choice, allowing customers to select the best technologies and systems for their needs, including both cloud-based and on-prem solutions.
  • Accelerate QRNG adoption by removing barriers with a collaborative, open approach.
  • Provide a common mechanism for obtaining high-quality entropy from an external QRNG platform.

Bell and Palo Alto Networks Form Strategic Partnership 

Posted in Commentary with tags , on December 12, 2024 by itnerd

Bell Canada, Canada’s largest communications company, and Palo Alto Networks, the global cybersecurity leader, announced today a strategic partnership that brings together Bell’s expertise in Managed and Professional services with Palo Alto Networks industry-leading, AI-powered cybersecurity platforms. Building upon customer success and service development initiatives launched in 2023, Bell will now offer a full suite of services across Palo Alto Networks three platforms, delivering comprehensive protection against evolving cyber threats for customers in Canada.

Palo Alto Networks platformization approach unifies diverse security solutions into scalable platforms across network, cloud, and security operations. These platforms leverage automation and AI to deliver robust protection against cyber threats. Bell’s deep bench of Managed and Professional Services experts, combined with Palo Alto Networks platforms enables 24/7 protection and secure connectivity through dedicated threat alerts and mitigation to stop and prevent malicious attacks. Businesses are empowered to achieve a unified security posture, enhance threat prevention, optimize operational efficiency, and accelerate digital transformation initiatives.

Bell’s Managed Services team will support the following Palo Alto Networks solutions:

  • Prisma Access – The industry’s only security services edge (SSE) solution offering the most cutting-edge Zero Trust Network Access, (ZTNA 2.0), to protect the future of work with an easy-to-use, unified security product. Prisma Access delivers industry-leading security to dramatically reduce the risk of a data breach while offering an exceptional user experience.
  • Palo Alto Networks NGFW – The first Next-Generation Firewalls with real-time inline security that help stop the most complex threats with AI-powered, cloud-based network security.
  • Prisma Cloud (CNAPP) – The Code to Cloud platform powered by Precision AI secures cloud-native applications and infrastructure, accelerating cloud adoption and helping to ensure security policy compliance.
  • Cortex XSIAM – The leading AI-powered SOC platform that centralizes data and SOC capabilities — XDR, SOAR, ASM, SIEM to streamline security operations and accelerate      and automate incident response and remediation.

The partnership underscores Bell’s objective to provide innovative and comprehensive security solutions to businesses across Canada. Earlier this year, Bell announced the acquisition of Stratejm, leading provider of Security-as-a-Service and enhanced Managed Detection and Response services. The expanded partnership with Palo Alto Networks further augments Bell’s cybersecurity capabilities and is another step toward becoming the largest and most trusted Managed Security Services Provider in Canada.

Palo Alto Networks Cyber Outlook for 2025: AI, Quantum, Security & More

Posted in Commentary with tags on November 14, 2024 by itnerd

Palo Alto Networks has posted their cybersecurity insights and outlook of what to expect in 2025. In their annual forecast, the company reveals what’s next on the horizon – from AI-driven cyber warfare to energy-efficient data centers and new roles for today’s business leaders. 

Key 2025 Predictions Include: 

  • Unified Cybersecurity Platforms through Platformization: Expect cloud security and Security Operations Center to merge into a single infrastructure that fuels AI-driven insights across every attack vector. This will enable organizations to centralize security data, empowering rapid detection and response at scale. 
  • Data as a Competitive Advantage: Organizations with vast, integrated data will hold a distinct advantage over startups due to the data-hungry nature of AI models. For the first time, incumbents will leverage their data stores to enhance AI performance, securing a lead in both innovation and cyber defense.
  • Adoption of Secure Enterprise Browsers: Adoption of secure enterprise browsers for work, so organizations may implement stronger security measures to protect against rising threats. 
  • Energy-Efficient AI: AI’s soaring energy demands have created a pressing need for sustainability. In 2025, we’ll see new techniques for reducing data center energy consumption while still supporting the essential growth of AI-powered cybersecurity.
  • Rethinking Quantum Security: As “harvest now, decrypt later” tactics rise, Palo Alto Networks urges organizations to fortify systems today against the anticipated power of quantum decryption technology—a measure essential for securing valuable IP and government data from future exploitation.
  • The New Power Duo: CIO & CMO: In an era of real-time, personalized engagement, customer expectations are soaring. Palo Alto Networks predicts that marketing and IT leaders will work in tandem to merge customer insights with robust IT strategies, meeting demand across all channels.

Palo Alto Networks has a news release on this here, and their annual forecast here.

Unit 42 Research: Novel Jailbreaking Technique ‘Deceptive Delight’

Posted in Commentary with tags on October 23, 2024 by itnerd

Today, Palo Alto Networks Unit 42 shares that it has identified a new jailbreaking technique, ‘Deceptive Delight,’ which can bypass the safety guardrails of state-of-the-art LLMs to generate unsafe content. The findings highlight significant vulnerabilities in AI systems, revealing the urgent need for enhanced security measures to prevent the misuse of Gen AI technologies.

Key findings detail that Deceptive Delight:

  • Achieves a 65% attack success rate against open-source and proprietary AI models, significantly outperforming the 5.8% attack success rate achieved when sending unsafe topics directly to these models without using any jailbreak techniques.
  • Embeds unsafe topics within benign narratives, cleverly tricking LLMs into producing harmful content while focusing on seemingly harmless details.
  • Employs a multi-turn approach, where the model is prompted progressively across multiple interactions, enhancing both the relevance and severity of the unsafe output generated and increasing the likelihood of harmful content creation.

You can find the full blog here.

North Korean Hackers Target Tech Job Seekers in New Malware Campaign

Posted in Commentary with tags on October 9, 2024 by itnerd

Unit 42’s latest research was published today on a North Korean cyber campaign targeting tech job seekers. The campaign, known as CL-STA-240 Contagious Interview, involves fake recruiters on platforms like LinkedIn, tricking users into malware infections that steal sensitive data such as, browser passwords and cryptocurrency wallets. Since its initial report in November 2023, Unit 42 has continued to monitor new online activity and code updates to two pieces of malware tied to the campaign. 

Highlights include: 

  • New malware variant, BeaverTail, targets both macOS and Windows, capable of stealing data and cryptocurrency from 13 different wallets
  • Social Engineering: Attackers pose as recruiters on platforms like LinkedIn and set up fake interviews, convincing victims to download malware disguised as legitimate software like MiroTalk and FreeConference 
  • InvisibleFerret Backdoor: Written in Python, this malware now includes new features like downloading additional remote-control software (AnyDesk) and stealing browser credentials and credit card information 
  • Financial Motive: North Korea threat actors likely have a financial motive given the malware’s focus on stealing cryptocurrency from a growing number of wallets

You can read the research here.

New Unit 42 Repellent Scorpius/Cicada3301 Research Report Is Live

Posted in Commentary with tags on September 11, 2024 by itnerd

As ransomware incidents continue to grow, Palo Alto Networks Unit 42 has discovered a new ransomware-as-a-service (RaaS) group.  Unit 42 has released research on the group, Repellent Scorpius, and how they’re distributing Cicada3301 ransomware.

Highlights include:

  • Based on the timeline from a Unit 42 IR engagement, it’s estimated that the ransomware group began their operations in May 2024
  • Despite its recent inception, the group is quickly picking up pace by setting up an affiliate program and recruiting partners. This has increased its number of victims
  • Repellent Scorpius employs a double extortion scheme of encrypting systems. This entails stealing data and threatening to publish it if the victim doesn’t pay the ransom

You can find the full report here which provides more insights into the new attack group and attack strategy.

Deepfake scams are on the rise in Canada and globally: Palo Alto

Posted in Commentary with tags on August 29, 2024 by itnerd

Today, Palo Alto Networks Unit 42 released research on dozens of scam campaigns using deepfake videos featuring the likeness of various public figures, including CEOs, news anchors and top government officials.

The research found that these campaigns appear in a variety of languages, with each typically targeting victims in a single country, including Canada, Mexico, France, Italy, Turkey, and more. While 2024 is predicted to be the largest voting year in history, the impact of deepfakes is not limited to the political domain. 

Highlights include:

  • As of June 2024, Unit 42 discovered hundreds of domains being used to promote these campaigns, with each having been accessed an average of 114,000 times since going live
  • Unlike typical phishing or malware domains, these domains are relatively long-lived, with an average active time of 142 days
  • These campaigns appear in English, Spanish, French, Italian, Turkish, Czech and Russian
  • Due to their infrastructural and tactical similarities, it’s believed these campaigns likely stem from a single threat actor group
  • The campaigns leverage numerous prominent figures, including Elon Musk and Tucker Carlson

You can find the full research report here: https://unit42.paloaltonetworks.com/dynamics-of-deepfake-scams/

In addition to today’s research, Palo Alto Networks most recent Canadian Ransomware Barometer which found that Canadian IT decision-makers are concerned with the potential threat artificial intelligence (AI) poses to their organizations.  More than two-thirds of respondents (69%) believe the emergence of more AI technologies has increased the threat level to their organizations.