Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

4/19/2010
01:58 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Researcher Demonstrates How To Counterattack Against A Targeted Attack

Proof-of-concept turns the tables on attackers who wage targeted attacks on enterprises

Targeted attacks might be tough to prevent, but what if you could fight back against the attacker once he's infiltrated your network? A researcher has come up with a proof-of-concept (PoC) that does just that by finding vulnerabilities in the attacker's malware and using it against him.

Security consultant Andrzej Dereszowski last week at Black Hat Europe demonstrated how it's possible to wage a counterattack in a targeted attack: His PoC was based on some fuzzing and reverse-engineering he conducted against malware used in an infected PDF that was sent to a pharmaceutical company. Dereszowski found a buffer overflow bug in the malicious toolkit, which was the Poison Ivy tool, and then built an exploit for it.

"I [had been] asking myself, in theory, what if you wanted to counterattack -- provided that it's possible," he says. "You can [actually] hack the hackers and counterattack" as demonstrated by the PoC, he says.

But such an attack in reality would obviously be illegal for a victim company to execute, he says. Instead, the goal of his research is to show there are techniques for fighting back once a targeted attack is already under way, he says. "This is for the purpose of research," he says, although some special government agencies may be able to, or already are, deploying such techniques, he says.

Dereszowski says his research also shows how to quickly analyze malware, which would be useful to a company hit by a targeted attack. "My method of [malware] identification is quite generic and can be applied to any case. I think this could be beneficial to companies," he says.

Not just anyone could pull off the counterattack technique, however: "You have to know reverse-engineering and exploit-development techniques," Dereszowski says. Similar techniques have been used by researchers and investigators in botnet infiltration research, he says.

The recent wave of targeted attacks on Google, Adobe, Intel, and others served as a wake-up call to businesses that stealthy targeted attacks are often tough to detect and basically are a fact of life for many organizations. These attacks, often out of China, gain a foothold inside governments and company networks and remain entrenched in order to steal intellectual property and other data. They are almost always successful and undetectable until it's too late.

Dereszowski's new research sheds light on the possibility of a counteroffensive to the targeted attack, or at least on finding vulnerabilities in the attacks themselves.

He says he began by assuming that the PDF attacker in his research had used a toolkit that was publicly available online, which he found to be the Poison Ivy Trojan toolkit (after doing some reconnaissance). He then broke through the obfuscated code in the infamous Trojan tool in order to run static analysis of the malware. The PoC shows how in a targeted attack using the Poison Ivy Trojan there's a way to fight back against the attacker, he says.

The PoC was running in Dereszowski's virtual machine against its own command-and-control (C&C) server, he says. "If you were to attack a real command-and-control server of an attacker, you could [theoretically] do lots of damage because you would have full permission on their host" with this approach, he says. "But it also depends on the protections they [the attackers] have set up."

The exploit would be invisible to the attacker, and the counterattacker would basically exit the system after he had finished, leaving the exploit behind with a window into the C&C server. Dereszowski ran a standard Metasploit shellcode to open an active connection to the C&C server. This form of counterattack could apply to other Trojans, such as the pervasive Zeus Trojan, he says, as long as you have access to the C&C and can get hold of the malware code.

A copy of Dereszowski's white paper on the counterattack research is available here for download (PDF).

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Botnet Infects Hundreds of Thousands of Websites
Robert Lemos, Contributing Writer,  10/22/2020
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Kelly Sheridan, Staff Editor, Dark Reading,  10/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27974
PUBLISHED: 2020-10-28
NeoPost Mail Accounting Software Pro 5.0.6 allows php/Commun/FUS_SCM_BlockStart.php?code= XSS.
CVE-2020-27975
PUBLISHED: 2020-10-28
osCommerce Phoenix CE before 1.0.5.4 allows admin/define_language.php CSRF.
CVE-2020-27976
PUBLISHED: 2020-10-28
osCommerce Phoenix CE before 1.0.5.4 allows OS command injection remotely. Within admin/mail.php, a from POST parameter can be passed to the application. This affects the PHP mail function, and the sendmail -f option.
CVE-2020-27978
PUBLISHED: 2020-10-28
Shibboleth Identify Provider 3.x before 3.4.6 has a denial of service flaw. A remote unauthenticated attacker can cause a login flow to trigger Java heap exhaustion due to the creation of objects in the Java Servlet container session.
CVE-2020-22552
PUBLISHED: 2020-10-28
The Snap7 server component in version 1.4.1, when an attacker sends a crafted packet with COTP protocol the last-data-unit flag set to No and S7 writes a var function, the Snap7 server will be crashed.