Microsoft announced on its blog a new move that will improve security and can be availed easily. The company has introduced a COVID-19 threat intelligence made available from May 14, sharing feeds for Azure Sentinel customers and publicly available for everyone on GitHub. So, even if you are not a Microsoft customer worry not, you can still protect yourself from these COVID-19 based attacks. This data is only available for a limited period only until the pandemic threat looms over our heads.
“Microsoft processes trillions of signals each day across identities, endpoints, cloud, applications, and email, which provides visibility into a broad range of COVID-19-themed attacks, allowing us to detect, protect, and respond to them across our entire security stack,” Microsoft stated in their blog. “Today, we take our COVID-19 threat intelligence sharing a step further by making some of our own indicators available publicly for those that are not already protected by our solutions.”
Users with Microsoft Threat Protection need not go through this, they are already protected with Microsoft Defender Advanced Threat Protection (ATP) and email with Office 365 ATP.
These COVID-19 threat intelligence indicators are available on the Azure Sentinel GitHub via Microsoft Graph Security API.
Best Protection from COVID-19 Threats
Hackers and Cybercriminals have been using an array of malicious ways from malware to phishing emails for their own gain. This move by Microsoft will shift the balance and go a long way to protect and defend from such threats.
Security researcher Sean Wright says, “Microsoft certainly deserves credit for this. It will be especially useful for those who are struggling at the moment and don’t necessarily have the funds to afford services that organizations would normally have to pay for.”
You may be interested in...
“This information is going to be very useful to enable many volunteers in the community to help organizations and others. It is the correlation of data—especially threat intelligence—that will go a long way to help stop the threat actors out there who are actively targeting organizations and individuals.”
Some are critical of this announcement by the tech giant pointing out that it is “too little, too late”.
“I’m not saying it’s not welcome but where was this support nine weeks ago?” says Ian Thornton-Trump.
Ian Thornton-Trump, CISO at Cyjax points out “It’s clever marketing and has some value—although most, if not all, those indicators of compromise (IOCs) will be available from a multitude of cyber threat intelligence sources, feeds and vendors already.”