Loading...

Monthly news - February 2024

Image

Microsoft Defender XDR
Monthly news
February 2024 Edition

Hempriggs-Blog-Banner.png

This is our monthly "What's new" blog post, summarizing product updates and various new assets we released over the past month across our Defender products. In this edition, we are looking at all the goodness from January 2023.  

Legend:
Product videos.png Product videos webcast recordings.png Webcast (recordings) Docs on MS.png Docs on Microsoft Blogs on MS.png Blogs on Microsoft
GitHub.png GitHub External.png External Product improvements.png Improvements Public Preview sign-up.png Previews / Announcements
Microsoft Defender XDR
Public Preview sign-up.png

Protect faster with Microsoft Defender XDR’s latest UX enhancements. To help SOC teams protect faster, we are excited to share the general availability (GA) of the most recent user experience (UX) enhancements within Microsoft Defender XDR to improve efficiency and deliver an intuitive, smooth experience throughout the incident triage, investigation, and threat hunting processes for the SOC teams.

 

This includes the following enhancements:

  • New functionality in the incident queue's available filters is now generally available. Prioritize incidents according to your preferred filters by creating filter sets and saving filter queries. Learn more about incident queue filters in Available filters.

  • Defender for Cloud alerts integration with Defender XDR is now generally available. .

  • Activity log is now available within an incident page. Use the activity log to view all audits and comments, and add comments to the log of an incident. For details, see Activity log.

  • (Preview) Query history in advanced hunting is now available. You can now rerun or refine queries you have run recently. Up to 30 queries in the past 28 days can be loaded in the query history pane.

  • (Preview) Additional features you can use to drill down further from your query results in advanced hunting are now available.

Public Preview sign-up.png Effective January 15th, 2024, the integration of multi-cloud alerts, signals, and asset information from Microsoft Defender for Cloud into Microsoft Defender XDR has been made generally available (GA). Learn more about the integration in Microsoft Defender for Cloud in Microsoft Defender XDR
Public Preview sign-up.png

Microsoft Defender Threat Intelligence: Introducing Automatic File and URL (Detonation) Analysis. New enhancements to the file and URL analysis (detonation) capabilities in the threat intelligence blade within the Defender XDR user interface. 

Microsoft Security Experts
Public Preview sign-up.png

Defender Experts for XDR now lets you receive managed response notifications and updates using Teams. You can also chat with Defender Experts regarding incidents where managed response is issued. Fore more information visit our documentation

Blogs on MS.png Experience Defender Experts newest updates. This blog highlights our newest updates that enable you to experience Defender Experts above the fold, giving you more visibility into what our experts are doing on your behalf.
Blogs on MS.png

Security Analyst Profile: Arlette Umuhire SangwaIn our ongoing Defender Experts for XDR blog series, in this post we introduce you to Arlette Umuhire Sangwa, a dedicated and insightful analyst on the Defender Experts for XDR team. Arlette's role involves analyzing and recommending remediations to customers, leveraging the extensive telemetry from various Microsoft Defender suites of products. 

Public Preview sign-up.png

Test your configurations and experience Defender Experts Notifications early

We have released the Sample Defender Experts Notification feature which will enable customers to:

  • Get the Defender Experts Notification experience earlier than when the actual Defender Experts Notification is sent by our experts upon detecting malicious activities in their environment.
  • Test the email notifications configuration done by customers for Defender Experts Notifications.
  • Test the playbooks/rules set up in SIEM/SOC tools for Defender Experts Notifications.
Blogs on MS.png

Defender Experts’ recommendations for impactful security posture management. This blog post discusses some of the security controls and configurations the Defender Experts' find most impactful in the real world.

Microsoft Defender for Endpoint
Public Preview sign-up.png

Dynamic rules for tagging devices is now generally availableThis feature enables security teams to create and manage rules that automatically assign and remove tags from devices based on user-defined criteria directly in the Microsoft Defender portal. 

Product improvements.png

Revised Device Control Documentation and SamplesThis repository contains samples and resources for Defender for Endpoint Device Control for Windows and Defender for Endpoint Device Control for Mac

Microsoft Defender for Identity
Blogs on MS.png

Identity in focus: Exploring the new ITDR experience within Microsoft Defender. This blog discusses some new enhancements to how our customers can find and engage with their Identity security capabilities.  

ITDR DashboardITDR Dashboard

Public Preview sign-up.png Introducing the new PowerShell Module designed to help further simplify the deployment and configuration of Defender for Identity. This tool will make it easier than ever to protect your organization from identity-based cyber-threats. Stay tuned, we will cover this topic in one of the upcoming Ninja Show episodes!
webcast recordings.png

In this video John Savil explores bring signals in from our Active Directory into our complete Identity Threat Detection and Response solution! 

Public Preview sign-up.png

You can now view Active Directory group entity-related activities and alerts from the last 180 days in Microsoft Defender XDR, such as group membership changes, LDAP queries and so on.

To access the group timeline page, select Open timeline on the group details pane.

For more information, see Investigation steps for suspicious groups.

Microsoft Defender for Cloud Apps
Public Preview sign-up.png

Defender for Cloud Apps now supports SaaS security posture management (SSPM) across multiple instances of the same app. For example, if you have multiple instances of AWS, you can configure Secure Score recommendations for each instance individually. Each instance will show up as a separate item on the App Connectors page.
For more information, see our documentation: SaaS security posture management (SSPM).

Public Preview sign-up.png All public preview customers will no longer be able to toggle off the automatic redirection from Defender for Cloud Apps classic portal to Microsoft Defender XDR portal. Learn more here
webcast recordings.png Defender for Cloud Apps Webinar | App Governance in Defender for Cloud Apps: What You Need to Know to Enhance Your Cloud Security Posture
Public Preview sign-up.png

(Preview) Limitation removed for the number of files that can be controlled for uploading in session policies. Session policies now support control over uploading folders with more than 100 files, with no limit to the number of files that can be included in the upload.

For more information, see Protect apps with Defender for Cloud Apps Conditional Access App Control.

Microsoft Defender for Office 365
Public Preview sign-up.png

Train your users to be more resilient against QR code phishingIn partnership with Fortra’s Terranova Security, we have launched two new QR code phishing training modules aimed at educating users against QR code-based phishing attacks.  

Printed QR Codes on a posterPrinted QR Codes on a poster

Public Preview sign-up.png The Attack Simulation Training Write API functionality is now generally available (GA). 
Blogs on MS.png Learn more about LinkedIn Smart Link Phish CampaignsMicrosoft Defender for Office 365 security research team has observed a rise in the LinkedIn Smart Link phishing campaign. LinkedIn Smart Links are used by LinkedIn business accounts to deliver content and track user content engagements through the LinkedIn Sales Navigator. In this post you can learn more about TPT (Tactics, Techniques and Procedure) behind these LinkedIn Smart link phishing campaigns. 
Public Preview sign-up.png

Providing intent while submitting is now generally available: Admins can identify if they're submitting an item to Microsoft for a second opinion or they're submitting the message because it's malicious and was missed by Microsoft. With this change, Microsoft analysis of admin submitted messages (email and Microsoft Teams), URLs, and email attachments is further streamlined and results in a more accurate analysis. Learn more.

Microsoft Defender Vulnerability Management
Public Preview sign-up.png Vulnerable Components Inventory now in public preview. We are introducing a dedicated inventory that lists known vulnerable software components found in the organization. This inventory, along with a new security recommendation, improves visibility of vulnerabilities found within software components, such as open-source libraries. Also more information in our docs.Vulnerable Components InventoryVulnerable Components Inventory
Blogs on Microsoft Security
Blogs on MS.png Midnight Blizzard: Guidance for responders on nation-state attack. The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response process to investigate, disrupt malicious activity, mitigate the attack, and deny the threat actor further access. The Microsoft Threat Intelligence investigation identified the threat actor as Midnight Blizzard, the Russian state-sponsored actor also known as NOBELIUM. 
Blogs on MS.png Join us at InfoSec Jupyterthon 2024We’re inviting the community of analysts and engineers to join us at InfoSec Jupyterthon 2024. This online event, to be held on February 15-16, 2024, serves as an opportunity for infosec analysts and engineers to meet and engage with security practitioners using notebooks in their daily work. It is organized by our friends at Open Threat Research, together with folks from the Microsoft Threat Intelligence community.
Blogs on MS.png New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgsSince November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the United Kingdom, and the United States. In this campaign, Mint Sandstorm used bespoke phishing lures in an attempt to socially engineer targets into downloading malicious files. In a handful of cases, Microsoft observed new post-intrusion tradecraft including the use of a new, custom backdoor called MediaPl.
Microsoft Threat Analytics Reports (access to the Defender XDR portal needed)
 

Activity profile: New TTPs observed in ongoing Mint Sandstorm campaign. In this campaign, Mint Sandstorm used bespoke phishing lures in an attempt to socially engineer targets into downloading malicious files. In a handful of cases, Microsoft observed new post-intrusion tradecraft including the use of a new, custom backdoor called MediaPl.

  Actor profile: Ruby Sleet. The actor that Microsoft tracks as Ruby Sleet (CERIUM) is a nation-state threat actor based out of North Korea. Ruby Sleet is known to primarily target defense-related organizations as well as IT service providers to access downstream targets.
  Technique profile: Malicious scheduled task creation. Threat actors take advantage of living-off-the-land binaries (LOLBins) to manipulate scheduled tasks by using schtasks.exe. While scheduled tasks are most often used to maintain persistence on a compromised device, threat actors also leverage scheduled tasks to elevate privileges and permissions by running a malicious process under a different account.
 

Activity profile: Smoke Sandstorm new lures used to deliver SnailResin and SlugResin. Since January 2024, Microsoft has observed Smoke Sandstorm, an Iranian nation state actor, posing as members of the Bring Them Home Now campaign, a movement advocating for the return of individuals taken hostage by Hamas. In this campaign, Smoke Sandstorm attempted to deliver a SnailResin loader followed by SlugResin, a new variant of the BassBreaker backdoor, to Israelis working for organizations in the global payment systems, oil and energy, IT, and semiconductors sectors.

 

Actor profile: Opal Sleet. The threat actor Microsoft tracks as Opal Sleet (OSMIUM) is based out of North Korea and targets organizations and individuals with an interest in or connection to North Korea since 2014. Opal Sleet is known for using spear phishing attacks against specific individuals affiliated with diplomacy and international relations, non-government organizations, universities, and government partnerships by sending weaponized documents related to Korean Peninsula activities or geopolitical issues.

  Actor profile: Jade Sleet. The threat actor Microsoft tracks as Jade Sleet (formerly Storm-0954) is a threat actor operating on behalf of North Korea that primarily targets organizations and individuals managing cryptocurrency for financial gain. Jade Sleet has also been observed compromising Russian targets for cyberespionage or corporate theft, and conducting social engineering campaigns targeting the personal accounts of employees at blockchain, cryptocurrency, cybersecurity, or online gambling companies.
  Technique profile: Kerberos attacks. Kerberos authentication is a widely used methodology designed to secure access to network resources. However, threat actors often seek to manipulate such protection measures to conduct attacks.
Learn more
Author image

Microsoft 365 Defender Blog articles

Microsoft 365 Defender Blog articles

Share post:

Related

Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!

* Yes, I agree to the privacy policy