Researcher Demonstrates How To Counterattack Against A Targeted Attack
Proof-of-concept turns the tables on attackers who wage targeted attacks on enterprises
April 19, 2010
Targeted attacks might be tough to prevent, but what if you could fight back against the attacker once he's infiltrated your network? A researcher has come up with a proof-of-concept (PoC) that does just that by finding vulnerabilities in the attacker's malware and using it against him.
Security consultant Andrzej Dereszowski last week at Black Hat Europe demonstrated how it's possible to wage a counterattack in a targeted attack: His PoC was based on some fuzzing and reverse-engineering he conducted against malware used in an infected PDF that was sent to a pharmaceutical company. Dereszowski found a buffer overflow bug in the malicious toolkit, which was the Poison Ivy tool, and then built an exploit for it.
"I [had been] asking myself, in theory, what if you wanted to counterattack -- provided that it's possible," he says. "You can [actually] hack the hackers and counterattack" as demonstrated by the PoC, he says.
But such an attack in reality would obviously be illegal for a victim company to execute, he says. Instead, the goal of his research is to show there are techniques for fighting back once a targeted attack is already under way, he says. "This is for the purpose of research," he says, although some special government agencies may be able to, or already are, deploying such techniques, he says.
Dereszowski says his research also shows how to quickly analyze malware, which would be useful to a company hit by a targeted attack. "My method of [malware] identification is quite generic and can be applied to any case. I think this could be beneficial to companies," he says.
Not just anyone could pull off the counterattack technique, however: "You have to know reverse-engineering and exploit-development techniques," Dereszowski says. Similar techniques have been used by researchers and investigators in botnet infiltration research, he says.
The recent wave of targeted attacks on Google, Adobe, Intel, and others served as a wake-up call to businesses that stealthy targeted attacks are often tough to detect and basically are a fact of life for many organizations. These attacks, often out of China, gain a foothold inside governments and company networks and remain entrenched in order to steal intellectual property and other data. They are almost always successful and undetectable until it's too late.
Dereszowski's new research sheds light on the possibility of a counteroffensive to the targeted attack, or at least on finding vulnerabilities in the attacks themselves.
He says he began by assuming that the PDF attacker in his research had used a toolkit that was publicly available online, which he found to be the Poison Ivy Trojan toolkit (after doing some reconnaissance). He then broke through the obfuscated code in the infamous Trojan tool in order to run static analysis of the malware. The PoC shows how in a targeted attack using the Poison Ivy Trojan there's a way to fight back against the attacker, he says.
The PoC was running in Dereszowski's virtual machine against its own command-and-control (C&C) server, he says. "If you were to attack a real command-and-control server of an attacker, you could [theoretically] do lots of damage because you would have full permission on their host" with this approach, he says. "But it also depends on the protections they [the attackers] have set up."
The exploit would be invisible to the attacker, and the counterattacker would basically exit the system after he had finished, leaving the exploit behind with a window into the C&C server. Dereszowski ran a standard Metasploit shellcode to open an active connection to the C&C server. This form of counterattack could apply to other Trojans, such as the pervasive Zeus Trojan, he says, as long as you have access to the C&C and can get hold of the malware code.
A copy of Dereszowski's white paper on the counterattack research is available here for download (PDF).
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024