Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:04 PM
Connect Directly

CSI: Cyberattack

Seven clues to use to ID who's behind a malware attack

The attacker behind the keyboard is human, too: He's a creature of habit, and he sometimes makes mistakes. Identifying telltale patterns used in an attack can provide useful intelligence to help organizations better lock down their information and resources in the bull's-eye.

Malware, phishing emails, and even rigged attachments used in an attack contain some obvious and some hidden clues that can be used to glean intel on who's behind the attack and what they are after -- perhaps an APT looking for intellectual property, or a cybercrime gang trying to pilfer financial information, according to FireEye, which today published a rundown of seven elements of malware that can provide valuable intel and insight on the attackers behind a hack and their motives.

"More and more organizations are under attacks by targeted intrusion groups," says Alex Lanstein, network and systems architect for FireEye. "A lot of people who don't work for malware companies don't know what to look for ... We thought it would be [helpful] for them to understand our workflow."

That doesn't mean that every targeted organization should -- or even can -- conduct CSI-style investigations into malware using clues left behind. Those types of operations are best left to seasoned forensic investigators and researchers, security experts say. But even so, any clues an organization can glean from an attack can help jump-start a more thorough forensics investigation.

The keyboard layout, malware metadata, embedded fonts, DNS registration, written language, remote administration tools (RATs), and behavior patterns all can provide clues to ID attackers, according to FireEye, which built the seven-item checklist from some 1,500 attack campaigns it tracks.

The biggest advantage to gathering this intel is being able to discern whether an attack is targeted or opportunistic, Lanstein says. "It's really about tying together multiple indicators, not just one indicator," he says. And FireEye warns that attack clues can easily be misleading, so it's best to get help from forensic experts and not take any clue at face value.

[How naming names of hackers and pinpointing the beneficiaries of cyberspying and cybercrime attacks translate into a new kind of defense. See Turning Tables: ID'ing The Hacker Behind The Keyboard .]

"Those are the basics you start with," says Dmitri Alperovitch, CTO at CrowdStrike, whose strategy is getting to the bottom of the attacker or group behind an advanced attack rather than on the malware. "We look at the tradecraft, what the attacker is trying to do, [for example]. If you're only looking at malware, everyone is using PoisonIvy, so it's going to be hard to get attribution just on that."

The key is getting beyond concluding the attacker is Chinese, and determining what organization the hacker or hackers belong to and what their strategies are. "Then you can get predictive about what types of victims they are going after," for example, Alperovitch says.

FireEye says the attacker's keyboard layout can reveal where he's from and what language he speaks -- it's easy to spot a Mandarin (GB2312) keyboard used in China -- as can language artifacts found in malware. Even just tracing broken English in a phishing email to a Google translation can pinpoint the attacker's native tongue, FireEye says.

The malware's own metadata can be telling, too: It contains technical information on location and language, and could lead to connections to other attack campaigns. FireEye found source code that it ultimately traced to the Chinese APT1/Comment Group after studying a file in the malware that turned out to be a variant of the WEBC2 malware used by the group.

Even the fonts used in phishing messages can contain clues about the origin of the attack or the attacker's native tongue: In the recently revealed Sanny APT attack, for instance, the rigged document was written in Russian. But it actually used two Korean fonts: "Those font choices reconfirmed existing evidence from other sources that pointed to North Korea, including the author's name and the CnC servers used in the attack. Taken together, the evidence presented a convincing case as to the attacker's origins," FireEye said in its report.

Other elements, such as DNS registration information, can help tie an attacker to a location, and the type of RAT used by the attacker can often help ID him. Then there are the behavioral patterns used by attackers: They often pick the same targets and industries, and employ the same command-and-control servers, according to FireEye. "In the same way, the attacker's exploit toolkits and tactics also help profile the attacker," and can reveal multiple attackers from the same group using the same infrastructure, according to FireEye.

CrowdStrike's Alperovitch notes that while attack indicators can change, the attackers' tradecraft remains mostly the same, such as "how they craft their communications protocols, how they remain stealthy within a company once they hit a company."

"You have to put yourself in the shoes of the attacker. They do hundreds of ops a week. They are not physically able to do everything different for every attack," he says. So there are clues that can be gleaned, he adds.

The full FireEye report, "Digital Bread Crumbs: Seven Clues To Identifying Who's Behind Advanced Cyber Attacks," including screen shots of malware and attack clues, is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.