|By Business Wire||
|August 13, 2014 11:00 AM EDT||
Rapid7, a leading provider of security analytics software and services, today announced enhancements to Rapid7 Metasploit Pro and Rapid7 UserInsight to help security professionals detect and investigate compromised user credentials, the number one attack vector on computer systems. Exploiting user credentials to get a foothold in an organization and then move laterally across the network has become increasingly popular among attackers and is very hard to detect. Attackers harvest usernames and passwords through simple guessing, phishing, or by reusing credentials from public password leaks. Metasploit Pro now enables organizations to simulate attacks where credentials are compromised, to efficiently assess security risks, while UserInsight introduces a number of new capabilities for detecting and investigating suspicious user behavior.
“Our latest innovations leverage our deep understanding of the attacker mindset – combining insight from the Metasploit community, Rapid7 Labs research, and our services teams – to enable our customers to detect and contain security incidents quickly and effectively,” said Lee Weiner, senior vice president of products and engineering at Rapid7. “The 2014 Verizon Data Breach Investigations Report identified stolen credentials as the most common attack methodology; it’s critical that our customers are able to detect and respond to this kind of activity rapidly.”
Metasploit introduces simple management and reuse of credentials for penetration tests
Mirroring the increased use of stolen credentials by attackers, 59% of penetration testers focus more than half of their security assessments on credentials versus exploits, according to a 2014 survey1. Penetration testers typically use stolen credentials to compromise machines that in turn contain new credentials, repeating the process until they have extracted key data from the network. The biggest challenge of simulating these attacks often rests in effectively managing the large number of passwords, hashes, and SSH keys.
Metasploit Pro 4.10 increases productivity for penetration testers who leverage credentials to compromise large networks. It keeps track of credentials, including where they were gathered and which systems were compromised. The new features simplify and automate the reuse of credentials, and leverage them to gather more. This exploits the facts that users rarely use unique passwords per application, and that passwords are cached on the systems they use.
Metasploit Pro 4.10 is available immediately. For a free trial, please
UserInsight helps quickly detect and investigate attacks using stolen user credentials
Most organizations have no way to distinguish an authorized user from a malicious attacker using stolen credentials, leaving the entire organization vulnerable to today’s primary attack vector. Rapid7 UserInsight addresses this growing exposure by providing the ability for a security team to detect and investigate breaches and compromised user credentials across the organization. UserInsight integrates and correlates data from numerous native security event sources and other monitoring tools to recognize and prioritize attacks that would previously have escaped detection. Only UserInsight can combine context from users, end points, and cloud services with advanced detection techniques, such as honeypots, to help security teams respond to these types of attacks.
New updates to UserInsight include:
- Agentless monitoring of endpoint activity: Detecting credential-based attacks requires endpoint monitoring, which traditionally requires deploying an agent to each system. UserInsight now detects attacks that can only be seen by monitoring endpoints such as lateral movement and privilege escalation. This is accomplished without an agent, so administrators do not need to deploy or manage software clients. This capability also enables customers to discover malware by reviewing rare and unique processes.
- Spot malicious network scans: Once attackers gain access to the environment, for example by using credentials, they need to map out the network and identify potential targets. Honeypots can detect and alert on these types of scans, but security professionals often find them hard to deploy and maintain. UserInsight can now automatically deploy and maintain honeypots, making it quick and easy to spot attackers planning their next move.
- Visually follow attackers’ footsteps: Once an intruder has been identified, it is important to trace their footsteps through the network to identify which assets and users may have been compromised. UserInsight’s new User Graph enables visual tracking of users accessing assets and automatically highlights attempts to access critical assets or elevate privileges. Armed with this information, teams can accelerate incident response and identify other users who may have been involved.
UserInsight is available immediately. For more information and for a
free trial, please visit:
About Rapid7 Metasploit
Knowing your opponents' moves helps you better prepare your defenses. Metasploit, backed by a community of 200,000 open-source users and contributors, gives you that insight. It's the most popular penetration testing solution on the planet. With an average of 1.2 exploits added each day, Metasploit allows you to find your weaknesses before a malicious attacker does. Rapid7 Metasploit Pro is the only solution that increases productivity of penetration testers by automating repetitive and time-consuming tasks, easily simulating advanced attacks through evading defensive solutions, and producing one-click reports that would otherwise take days to pull together. It also helps prioritize and demonstrate risk through closed-loop vulnerability validation, and measure security awareness through simulated phishing emails. Integration with Rapid7 Nexpose validates vulnerabilities in your environment, demonstrates risk, and prioritizes action plans. End-to-end phishing campaigns allow you to safely test user behavior with analytics to tell you who fell for the bait. Plus, you can view campaign results in Rapid7 UserInsight for a more complete view of user risk.
About Rapid7 UserInsight
Rapid7 UserInsight helps security professionals quickly and easily detect and investigate incidents. Only UserInsight can combine context from users, endpoints, mobile, and cloud services with advanced detection techniques, such as honeypots, to help security teams respond to these types of attacks. UserInsight works by automatically detecting breaches and lateral movement inside the network perimeter. By creating a baseline of “typical” behavior for each user, UserInsight can identify unusual or suspicious behavior. This enables it to detect user account compromises with high accuracy and adds needed user context to any investigation. When a compromise is detected, UserInsight simplifies incident investigation because of its unique capability to easily show the relationship between incidents, users and assets. Security teams get a comprehensive view into user activity before and after any possible incident without the need to manually correlate logs. Incident responders can quickly identify other users who may have been impacted by the same attack.
Rapid7's IT security data and analytics solutions collect, contextualize and analyze the security data you need to fight an increasingly deceptive and pervasive adversary. Unlike traditional vulnerability assessment or incident management, Rapid7 solutions uniquely provide insight into the security state of your assets and users across virtual, mobile, private and public cloud networks. They enable you to fully manage your risk, simplify compliance, and identify, investigate and stop threats faster. Our threat intelligence, informed by members of the Metasploit open source community and the industry-leading Rapid7 Labs, provides relevant context, real-time updates and prioritized risk. Our solutions are used by more than 25% of the Fortune 1000 and nearly 3,000 enterprise, government and small business organizations across 78 countries. To learn more about Rapid7 or get involved in our threat research, visit www.rapid7.com.
1 2014 Metasploit User Survey of 561 security professionals that regularly use Metasploit as part of their job.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal an...
Sep. 5, 2015 10:15 AM EDT Reads: 2,057
Containers are not new, but renewed commitments to performance, flexibility, and agility have propelled them to the top of the agenda today. By working without the need for virtualization and its overhead, containers are seen as the perfect way to deploy apps and services across multiple clouds. Containers can handle anything from file types to operating systems and services, including microservices. What are microservices? Unlike what the name implies, microservices are not necessarily small, but are focused on specific tasks. The ability for developers to deploy multiple containers – thous...
Sep. 5, 2015 10:00 AM EDT Reads: 233
Contrary to mainstream media attention, the multiple possibilities of how consumer IoT will transform our everyday lives aren’t the only angle of this headline-gaining trend. There’s a huge opportunity for “industrial IoT” and “Smart Cities” to impact the world in the same capacity – especially during critical situations. For example, a community water dam that needs to release water can leverage embedded critical communications logic to alert the appropriate individuals, on the right device, as soon as they are needed to take action.
Sep. 5, 2015 09:15 AM EDT Reads: 192
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
Sep. 5, 2015 09:00 AM EDT Reads: 162
Manufacturing connected IoT versions of traditional products requires more than multiple deep technology skills. It also requires a shift in mindset, to realize that connected, sensor-enabled “things” act more like services than what we usually think of as products. In his session at @ThingsExpo, David Friedman, CEO and co-founder of Ayla Networks, will discuss how when sensors start generating detailed real-world data about products and how they’re being used, smart manufacturers can use the data to create additional revenue streams, such as improved warranties or premium features. Or slash...
Sep. 5, 2015 09:00 AM EDT Reads: 131
While many app developers are comfortable building apps for the smartphone, there is a whole new world out there. In his session at @ThingsExpo, Narayan Sainaney, Co-founder and CTO of Mojio, will discuss how the business case for connected car apps is growing and, with open platform companies having already done the heavy lifting, there really is no barrier to entry.
Sep. 5, 2015 08:45 AM EDT Reads: 245
As more intelligent IoT applications shift into gear, they’re merging into the ever-increasing traffic flow of the Internet. It won’t be long before we experience bottlenecks, as IoT traffic peaks during rush hours. Organizations that are unprepared will find themselves by the side of the road unable to cross back into the fast lane. As billions of new devices begin to communicate and exchange data – will your infrastructure be scalable enough to handle this new interconnected world?
Sep. 5, 2015 08:30 AM EDT Reads: 301
Consumer IoT applications provide data about the user that just doesn’t exist in traditional PC or mobile web applications. This rich data, or “context,” enables the highly personalized consumer experiences that characterize many consumer IoT apps. This same data is also providing brands with unprecedented insight into how their connected products are being used, while, at the same time, powering highly targeted engagement and marketing opportunities. In his session at @ThingsExpo, Nathan Treloar, President and COO of Bebaio, will explore examples of brands transforming their businesses by t...
Sep. 5, 2015 08:00 AM EDT Reads: 324
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes about through a Communications Platform as a Service which allows for messaging, screen sharing, video...
Sep. 5, 2015 08:00 AM EDT Reads: 773
The 3rd International WebRTC Summit, to be held Nov. 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 15th International Cloud Expo, 6th International Big Data Expo, 3rd International DevOps Summit and 2nd Internet of @ThingsExpo. WebRTC (Web-based Real-Time Communication) is an open source project supported by Google, Mozilla and Opera that aims to enable bro...
Sep. 5, 2015 07:15 AM EDT Reads: 1,656
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Sep. 5, 2015 07:00 AM EDT Reads: 522
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on demos and comprehensive walkthroughs.
Sep. 5, 2015 07:00 AM EDT Reads: 456
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!
Sep. 5, 2015 06:30 AM EDT Reads: 1,734
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts, GM of Platform at FinancialForce.com, will discuss the value of business applications on wearable ...
Sep. 5, 2015 06:00 AM EDT Reads: 163
In his session at @ThingsExpo, Lee Williams, a producer of the first smartphones and tablets, will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ETwater. He will explain how M2M controllers work through wirelessly connected remote controls; and specifically delve into a retrofit option that reverse-engineers control codes of existing conventional controller systems so they don't have to be replaced and are instantly converted to become smart, connected devices.
Sep. 5, 2015 05:00 AM EDT Reads: 302
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Sep. 5, 2015 01:30 AM EDT Reads: 1,012
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be.
Sep. 5, 2015 01:00 AM EDT Reads: 271
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies leverage disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advanced analytics, and DevOps to advance innovation and increase agility. Specializing in designing, imple...
Sep. 5, 2015 01:00 AM EDT Reads: 425
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Sep. 4, 2015 06:45 PM EDT Reads: 461
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and analyzed? As an area of investment, how might a retail company move towards an innovation methodolo...
Sep. 4, 2015 04:15 PM EDT Reads: 539