Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:24 PM
Connect Directly

APT-Type Attack A Moving Target

Malware just a small piece of the puzzle in advanced attacks, and traditional cybercriminals are also getting more 'persistent'

Targeted attacks are evolving faster than victims can detect them, and it's not just about cyberespionage anymore, either: Financially driven cybercriminals are also using advanced persistent threat (APT) methods for longer staying power in order to increase their spoils.

The APT attacker traditionally has been associated with Chinese cyberspies, but the types of attacks waged to steal intellectual property are increasingly blurring as new players and regions enter the landscape. Among the newcomers to this attack model are traditional, financially motivated cybercriminals and cyberspy attackers from Russia.

Recent research from Mandiant, HBGary, and Trustwave SpiderLabs demonstrates how the advanced targeted attack is becoming increasingly difficult to pin down.

While most organizations rely on security tools that detect malware, that's only part of the advanced attack equation, security experts say. "There are so many [of these] attacks going on now," says Greg Hoglund, CEO of HBGary, who says his firm is tracking around 18 different APT groups. "You're not looking for just malware -- it's behavior you're looking for. They leave behind forensic evidence, [namely] things your employees don't do."

Mandiant, in its new annual M-Trends report on advanced threats, also says finding the malware from an APT or advanced attack is only the tip of the iceberg. According to data gathered by Mandiant in its investigations for clients, malware-infected machines represent only 54 percent of the systems compromised in the attack. In all cases, the attackers employed stolen, legitimate user credentials to move about the network.

And these attackers aren't always coming up with their own zero-day attacks, either. In 77 percent of the cases Mandiant investigated, the attackers had used publicly available malware.

Mandiant and other security firms are also finding that the persistent, under-the-radar technique traditionally employed by Chinese hackers for stealing intellectual property is now also being adopted by cybercriminals out for financial gain rather than IP.

Researchers at Trustwave SpiderLabs have noticed that trend, as well. Nicholas Percoco, senior vice president and head of Trustwave SpiderLabs, recently noted this shift when discussing the firm's latest Global Security Report for 2011. "Attackers are becoming more sophisticated and without being detected," he said in an interview last month with Dark Reading. "Smash-and-grab attacks are few and far between. It's all about persistency: You hear a lot about espionage and APT attacks. But there's no reason why organized crime groups after financial information would not want to be using the same techniques [APTs] are."

Mandiant's report echoed the same trend. While these financially motivated attackers have often used the "smash-and-grab" approach with simple tools, that's changing, according to Mandiant. "Organized crime groups are adopting persistence mechanisms previously used by the advanced persistent threat. The long-term access these techniques enable allows the attacker to steal more data over a longer period of time to gain access to more lucrative data, and to ensure their data is a fresh as possible," according to Mandiant.

Among their weapons of choice for staying put longer and under the radar that Mandiant has seen are custom backdoors, publicly available backdoors, Web shells, Metasploit Meterpreter, and remote access utility tools.

But it's the attacker's lateral movement within the targeted organization that can go unnoticed and incur the most damage. "A company could have 50,000 nodes, and you may find 100 machines exhibiting [certain behaviors]," some of which appear normal, but then another raises suspicion, such as a user opening up an interprocess communication port, Hoglund says.

Mandiant says that only 6 percent of victim organizations they helped discovered the attacks on their own. Most found out from external sources, including law enforcement. And these attacks typically go on for more than a year before they are found out.

While most of these attacks have ties to China, Russia also increasingly is showing up on the radar screen, as well. Both Mandiant and HBGary's Hoglund report spotting such activity out of Russia. "The two biggest threats to the U.S. are Russia and China," Hoglund says. "We've caught false flags before ... Russian [attackers] trying to insert Chinese language in there" to appear to be Chinese attackers, he says.

The trick is spotting and analyzing the behaviors and not just the malware, security experts say. And don't assume you're immune, because these attacks are spreading across various industry sectors. According to Mandiant's report, 23 percent of the attacks are hitting the communications industry; 18 percent, aerospace and defense; 14 percent, computer hardware and software; 10 percent, electronics; 10 percent energy and oil and gas; and 25 percent in other various industries.

"I'm meeting more CSO's saying, 'All I care about is APT,'" says Bruce Schneier, CTO of BT Counterpane. "It's now all about agile security and detection."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-27
XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even witho...
PUBLISHED: 2020-09-27
An issue was discovered in the FileImporter extension for MediaWiki before 1.34.4. An attacker can import a file even when the target page is protected against "page creation" and the attacker should not be able to create it. This occurs because of a mishandled distinction between an uploa...
PUBLISHED: 2020-09-27
An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users.
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> ...