Operations
4/21/2016
07:30 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

How Hackers Have Honed Their Attacks

More organizations are getting breached, but data exfiltration is becoming harder for attackers, new data shows.

A triad of vendor reports released this week contained some mixed news for enterprises on the evolving threat landscape and how organizations are responding to the resulting challenges.

On the one hand the reports showed that attackers are getting better at bypassing enterprise defenses and breaching networks. But their ability to do damage after breaking in appears to be getting limited as the result of increasingly better detection and response capabilities.

Here in no particular order are five high-level takeaways from the reports by Vectra Networks based on a post-intrusion analysis at 120 organizations in 2016; by Trustwave based on data from hundreds of breach investigations; and Cytegic from data gathered from its DyTA intelligence platform.

More Breaches, Less Data Exfiltration

Vectra’s report showed that attackers increasingly managed to get through corporate defenses in 2015. But data exfiltration itself was fairly small in comparison. Of the 120 organizations that shared metadata with Vectra, the security firm detected at least one in-process malicious activity instance on their networks such as lateral movement, internal reconnaissance and command and control traffic. Trustwave’s found 97% of the applications that it tested to contain at least one security flaw.

At the same time though, only 3.1% of the incidents involved actual data exfiltration. The evidence suggest that organizations did a relatively good job detecting and blocking threats before significant damage in a vast majority of cases, says Wade Williamson, director of threat analytics at Vectra. “On the front end pretty much every network let an attacker get inside,” Williamson says. “But the good news is that people who are paying attention are keeping data from getting out. There is scary news on the front end, but it is manageable.”

Shifting Focus

Attackers shifted their focus away from e-commerce and point-of-sale environments to corporate and internal network breaches. In 2015, e-commerce compromises represented 38% of the incidents that Trustwave was called in to remediate compared to 42% in 2014, The proportion of PoS incidents meanwhile dropped from 40% in 2014 to 22% in 2015. 

The broadening adoption in the US of smartcards based on EMV technology may have had a role in that shift, according to Trustwave. “I would also say that, especially after the major PoS breaches of 2013 and 2014, that companies have gotten better at protecting their PoS assets,” says Karl Sigler, threat intelligence manager at Trustwave.

Still, payment cards remain an attractive target for attackers according to Cytegic’s intelligence report. About 42% of targeted data in the Dark Web was comprised of payment card data in March 2016, Cytegic said.

Improved Breach Detection

Trustwave’s data showed that North American organizations are getting better at detecting breaches on their own instead of having it reported to them by a third-party. Self-detection of breaches increased from 19% in 2014 to 41% in 2015.  That still meant that a majority of organizations did not detect breaches on their own last year. Even so, the fact that so many did is encouraging, Sigler says. That’s because organization that self-detect breaches generally tend to do a better job containing them as well.

For instance, for breaches reported by third parties, it took organizations a median of 168 days from intrusion to contain it. In contrast, self-detected breaches had a median of 15 days between intrusion and containment. “Organizations are finally starting to prioritize security rather than making it a small earmark under the general IT department,” Sigler says. “These organizations have also discovered that security doesn’t just come from buying technology and tools, but from putting properly skilled people in place and empowering them.”

Stealthier Attackers

The evidence showed that attackers are getting stealthier inside the network, Vectra’s Williamson says. Until relatively recently, for instance, noisy brute force attacks were the most commonly employed tactic by attackers attempting to move laterally inside a network after breaking into it.  That shifted in 2015 with brute force attacks dropping to third place behind quieter and subtle Kerberos and internal replication techniques. That suggests, among other things, that attackers are getting better at using stolen credentials to move quietly inside a breached network, Williamson says.

Last year also saw a troubling increase in the use of hidden tunnels in HTTP and HTTPS as a way to conceal command and control traffic and to send stolen data out of a compromised network. The increase in the use of such techniques compared to a year ago was surprising, Williamson says.

More Geographically Widespread Attacks

A vast majority of victims continue to be in North America, but attackers are beginning to spread the pain. In March this year, Cytegic counted an overall 17% increase in the number of cyberattacks worldwide. North American organizations as usual bore more attacks than any other region and accounted for more than 30% of all attacks.

But for the first time, the Middle East emerged as a major target by registering what Cytegic reports as a staggering 64% percent increase in cyber activity in the last month. That increase made the Middle East the second most active region for cyber attacks in March.

“This may be attributed to the rising cyber activity regarding Iran, Israel and especially Syria this month and the ricochets from the Brussels attacks,” Cytegic said in its report. Western Europe was the next most cyber active region with over 16% of attacks, while the East Asian region accounted for about 12% of all attacks in March.

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/20/2017
To Be Ready for the Security Future, Pay Attention to the Security Past
Liz Maida, Co-founder, CEO & CTO, Uplevel Security,  9/18/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Jan, check this out! I found an unhackable PC.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The Dark Reading Security Spending Survey
The Dark Reading Security Spending Survey
Enterprises are spending an unprecedented amount of money on IT security where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download the report and find out what they had to say.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.