Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Dan Schiappa
Dan Schiappa
Connect Directly
E-Mail vvv

Threat Awareness: A Critical First Step in Detecting Adversaries

One thing seems certain: Attackers are only getting more devious and lethal. Expect to see more advanced attacks.

We're in an arms race with cybercriminals. Adversaries are becoming stealthier and more dangerous, constantly improving their attack techniques to evade the best security defenses. From malicious mobile apps to exploited cloud misconfigurations and devastating Remote Desktop Protocol (RDP) exploits, there's no shortage of threats we need to protect against. 

As security practitioners, it's our mission not only to build the new tools needed to arrest and detect threats effectively, but to help make sense of the wide-ranging nature of what constitutes security. That starts with threat awareness. After all, you can't defend against what you don't understand.

Here are some of the major threat landscape changes we've seen in the last year and will continue to see this year and beyond.

Evading Security Controls with Automated, Active Attacks
Automated, active attacks are on the rise. These types of attacks involve a mix of automation and human-directed hacking to evade security controls.

Attackers in the recent Snatch ransomware attacks, for example, gained access by abusing remote access services, like RDP, and then used hand-to-keyboard hacking to complete the attack. Recently, attackers have upped the ante by exfiltrating data before beginning encryption and rebooting machines into Safe Mode during the attack in order to circumvent endpoint protection. These changing attack methods are part of the growing trend of defense evasion and highlight the need for protection at every layer of the environment.

On the detection side, the problem is that it's challenging to determine what's a malicious versus legitimate use of those tools. This method has been used successfully by the criminals behind the SamSam and MegaCortex ransomware attacks.

Raising the Stakes with Ransomware
Ransomware creators know that if they can't get past detection systems, their operation has little chance of success. Therefore, they're putting a lot of effort into figuring out ways to evade detection systems altogether. One of the most effective methods is changing their appearance — often by obfuscating their code — to disguise their true intent.

For example, attackers may digitally code-sign ransomware with an Authenticode certificate. Anti-ransomware defenses give code with signatures a less thorough examination, and some endpoint security products may even choose to trust it.

At the same time, attackers exploit vulnerabilities to elevate their privileges to an administrative credential. This way, their privileges will meet or exceed the access permissions necessary to ensure that encrypting files will be successful.

Scamming Through Stealthy, Malicious Apps
Smartphones, tablets, and other mobile devices are rich environments for attacks. Not only can attackers steal user information and cash or cryptocurrency, but they can also use mobile devices to gain access to corporate resources.

Fraudulent banking apps, referred to as bankers, continue to plague users by stealing credentials for financial institutions. Downloaders — apps that appear to be finance-related but are really downloading banker payloads in the background — are increasingly common. Some bankers even steal credentials by abusing accessibility features to virtually monitor keystrokes when a user logs in to legitimate banking apps.

Unscrupulous developers are also finding success exploiting the legitimate in-app advertising model found on mobile devices, creating apps whose sole purpose is to maximize ad revenue. The most nefarious types of adware, known as Hiddad, hide themselves from the app tray and launcher, so they're impossible to find and remove. Hiddad malware often takes the form of a legitimate app, like a QR code reader, but makes money through aggressive advertising.

Fleeceware is another example of how developers take advantage of legal models to scam unwitting consumers. These apps vastly overcharge users for app functionality that's already available for free or at low cost, often relying on free trials that are nearly impossible to cancel to lure users into paying $275 for a simple calculator app. It's an ongoing, widespread issue, with researchers recently uncovering 20 new fleeceware applications that may have nearly 600 million downloads.

Exploiting Misconfiguration in the Cloud
The strengths that make cloud such a valuable platform for computing and business operations — flexibility, speed and ease of use — are also what makes it challenging to secure. With changes happening at the rapid pace of cloud, operator error is a growing risk. All it takes is one misstep in configuration to expose the entire customer database to attack.

Attackers are taking note. Most cloud-based security incidents are a result of misconfiguration of some kind. Attackers know that companies struggle with a general lack of visibility into their cloud environments, so they can sneak in and carry out an attack before anyone notices. That's why they've seen success with Magecart malware, which infected retailers' "shopping cart" pages without their knowledge to steal customer information from businesses like Ticketmaster and Cathay Pacific.

As more and more companies turn to the cloud for backups, these attacks are becoming increasingly common. Businesses need visibility into the consequences of configuration changes, as well as the ability to monitor for malicious and suspicious activity in the cloud.

Abusing Machine Learning
Attacks against machine learning security systems are moving from an academic possibility into the toolkits of attackers. Machine learning systems have their own weaknesses, and it's only a matter of time before attackers figure out how to evade them. Research shows how attackers could trick models, highlighting the need for multiple layers of protection.

With machine learning becoming as a regular part of defense, we're also seeing the first signs of using machine learning models on offense. Imagine using text-to-speech machine learning models to evade security measures like voice authentication. Such technology, like the technology underlying "deepfakes," has already allegedly been used in a CEO vishing (voice phishing) scam. In the future, attackers might also use machine learning to optimize attacks, like phishing email click-through rates.

The Road Ahead
As we look ahead, one thing seems certain: Attackers are only getting more devious and lethal. We expect to see more advanced attacks, like the weaponization of machine learning. In the meantime, awareness of existing threats gives companies the information they need to design effective protection.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "The Perfect Travel Security Policy for a Globe-Trotting Laptop."

Dan Schiappa is Executive Vice President and Chief Product Officer with Sophos. In this role, Dan is responsible for the overall strategy, product management, architecture, research and development, and product quality for the network security, enduser security, and Sophos ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I like the old version of Google assistant much better.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...
PUBLISHED: 2021-01-21
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executi...
PUBLISHED: 2021-01-21
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typicall...