Sophos Intercept X for Server Blocks Cyber Attackers from Hitting the Business Bullseye
- Predictive deep learning technology looks for suspicious attributes of malicious code and learns as it goes to provide constantly evolving protection for servers
- Advanced exploit protection blocks hackers from breaching servers – even if systems are unpatched
- Active adversary mitigation protects against credential theft and persistent attack techniques used to avoid detection once inside a system
- Server-specific security discovers and protects workloads in the cloud, includingMicrosoft Azure and Amazon Web Services
Sophos today announcedSophos Intercept X for Server, next-generation server protection with predictive deep learning technology that provides constantly evolving security against cyber threats. Sophos’ deep learning neural networks are trained on hundreds of millions of samples to look for suspicious attributes of malicious code and preventnever-before-seen malware attacks. SophosLabs research indicates that 75 percent of malware found in an organization is unique to that organization, indicating the majority of malware ispreviously unknown.
A recent Sophos survey reveals that two-thirds of IT managers worldwide don’t understand what anti-exploit technology is, leaving their organizations vulnerable to data breaches. Once inside a network, cybercriminals can use persistent and lateral moves totarget and takeoverservers to access the high-value data stored there, such as personally-identifiable information (PII), banking, tax, payroll and other financial records, proprietary intellectual properties, shared applications – all of which can be sold on the Dark Web or used for other types of attacks and monetary gain. Servers can also suffer collateral damage fromransomware and run-of-the-mill cyberattacks. Attacks reaching servers can be more devastating toa businessthan attacks on endpoints, due to the critical data they hold.
Sophos demonstrates hacking and advanced exploit techniques that cybercriminals use in this Video of How Active Adversaries Attack in Real-Time (also found on Sophos.com/Servers).
“Servers are the bullseye for cybercriminals because they store valuableinformationand have a broader, system-wide organizational purpose than individual endpoints. An entire company could get potentially wiped out if cybercriminals infiltrate its servers with ransomware or malicious code, or exploit vulnerabilities to gain access. Once breached, attackers can get deep in the network and have the ability to do some serious damage, as well as exfiltrate data,” said Dan Schiappa, senior vice president and general manager of products at Sophos. “Cybercriminals usestolen information fortheir own spear-phishing campaigns and crime sprees, or they could resell it ata premium price on the Dark Web or to a private networkof buyers. Sophos threat experts have seen access to compromised servers for sale on the Dark Web, in addition to the poached data itself – abonus for cybercriminals, but a double whammy for businesses.”
Attackers also use breached servers as proxies to redirect traffic to malicious websites and are now installing cryptominers on server farms and cloud accounts, so they can generatecrypto-currencies by stealing a company’s CPU, RAM, electricity, and other resources.The motives of cybercriminals based on how servers are utilized, what’s stored there and what can be leveraged for multiple crimes underscores the need for predictive, server-designed security with advanced anti-exploit technology that helps protect even unpatched systems.
“Servers arecritical infrastructure, but they are often overlooked in the endpoint strategy of many companies,” said Schiappa. “It’s not enough to simply install traditional endpoint protection on servers because they demand additional tools and features, such as cloud workload discovery, including Microsoft Azure and Amazon Web Services, and protection to mitigate risk from rogue or forgotten IT assets. Server-specific protection is necessary to a successful layered security strategy to reduce the risk of a data breach. Combined with Sophos’ Synchronized Security intelligence sharing and easy management from our Sophos Central dashboard, Intercept X for Server is a powerful addition that helps defend businesses from becoming the next victim.”
The need for server protection exists in organizations of all sizes, with smaller businesses being potentially at more risk than larger, better resourced enterprises as Frank Dickson, research vice president, Security Products with IDC commented, “The small- and mid-sized markets (SMBs) face challenges for server protection as they need the same level of protection as their enterprise counterparts, yet protection must be in an extremely easy to use offering. Additionally, sadly, SMBs are too often tempted to use underpowered, inappropriate PC endpoint offerings to protect servers as a way to save cost, forcing SMB server security vendors to provide compelling, affordable offerings that are also appropriate for a smaller or understaffed IT department.”
Regarding Sophos’ approach directly, Dickson continued, “Sophos addresses the ease-of-use factor by integrating their products on Sophos Central, so there’s one dashboard for Partners and customers to manage each security layer regardless of being on premise or in the cloud. The new Intercept X for Server significantly advances server protection with deep learning, anti-exploit and other key technology elements. The anti-exploit technology has a client right on the server, a necessary requirement based on the manner in which hackers leverage server vulnerabilities to breach systems. Given the readily available and inexpensive exploit kits for sale on the Dark Web, even cybercriminals with little expertise can launch powerful attacks, making sophisticated, server specific protection a fundamental requirement.”
New features in Sophos Intercept X for Serverinclude:
Deep Learning Neural Network
- Leverages the deep neural network from Intercept X to detect new and previously unseen malware and unwanted applications
- Once deployed, the model constantly updates and identifies critical attributes resulting in more accurate decisions between benign and malware payloads
Active Adversary Mitigation
- Blocks determined cybercriminals and persistent techniques commonly used to evade traditional anti-virus protection
- Credential Theft Protection prevents theft of authentication passwords from memory, registries and local storage
- Code Cave Utilization detects the presence of malicious code deployed into legitimate applications
- Prevents an attacker from leveraging known vulnerabilities
- Protects against browser, plugin or java-based exploit kits even if servers are not full patched
Master Boot-Record Protection
- WipeGuard expands upon Intercept X anti-ransomware technology and prevents ransomware variants or malicious code that target the Master Boot-Record
Root Cause Analysis
- Detection and incident response technology provides forensic detail of how the attack got in, where it went, and what it touched
- Provides recommendations on what to do next after an analysis of the attack
Cloud Workload Discovery for Server
- Discovers and protects servers running on the public cloud, including Microsoft Azure and Amazon Web Services
- Prevents risk exposure from rogue IT or forgotten assets