Targeted Attacks: A Defender's PlaybookCyberthreat actors are increasingly going after a single victim. Here are some tips to help your organization get ready.
Most cyber attacks today are random, automatically generated exploits that prey on vulnerable systems. But security experts now say there's a small but growing percentage of online attacks that are carefully targeted to compromise a single victim.
Advanced attackers are picking targets deliberately in order to steal very specific intellectual property, collect trade secrets, and scoop up troves of customer data.
To achieve these goals, these criminals are not only homing in on certain industries but also specific organizations and even particular individuals whom they hope to trick into helping them infect company machines.
When these crooks choose a target, they persist until they get in -- changing tactics or targeting different individuals if they don't succeed the first time. And when the criminals achieve success with these attacks, they aren't content to infect PCs; they try to dig deep into the network and find ways to gain administrative access to the organization's most sensitive systems and data.
These targeted attacks often rely on human nature and simple online research as much as technical hacking ability. And because most enterprises still model their security practices around generic malware and automated exploits, they're easy prey for these sophisticated, targeted attacks. Clearly, some new defenses are needed.
Who's doing the targeting?
Understanding the kinds of attackers doing the targeting offers an important first step in diagnosing targeted attacks. By coming to terms with the motivations these bad guys have for stealing specific data or gathering certain technical information, security teams can do a better job assessing risk and developing a stronger defense.
Most attackers fall into one of three buckets: hacktivists, nation-state-sponsored hackers, and organized cyber criminals.
Hacktivists are seeking to harm an organization or an industry because its operations conflict with the hacktivists' beliefs.
"Hacktivists are a real fear for organizations, especially in the energy sector or companies that do work overseas and might have practices that are not well received," says Jeff Horne, VP of emerging solutions for security consulting firm Accuvant. Hacktivists just want to disrupt a business. "They're the ones trying to do things like release email spools and cause havoc on the network."
State-sponsored attackers are usually employed by or associated with foreign spy agencies. They're trying to advance their country's military or economic interests by stealing intellectual property or gathering intelligence about an organization's operations. This could mean breaking into a defense contractor to steal blueprints, or into a government contractor to pilfer information about employees that could be used for future spy operations. These cyber-espionage operators often extend their operations beyond defense and other government targets and into commercial suppliers and contractors. In some cases, they seek intellectual property to help their country's commercial interests.
"It may not be how it works here, but other countries use their intelligence apparatus to benefit their domestic companies against US companies," says Anup Ghosh, CEO and founder of Invincea, an advanced malware detection and response vendor. "The spy agencies work hand in hand with their industry to get that kind of competitive intel."
Meanwhile, organized cyber criminals may also be on the hunt for specific intellectual property or information on how a company operates. They're hired to steal information for a company's competitor, or they look to profit by selling information on the black market or even engaging in insider trading.
For example, a go-to-market plan for a technology company or information on drilling sites scouted by an oil-and-gas company may be sellable insights. Cyber criminals will also target companies if they think they can steal valuable customer information for identity theft and credit card fraud. Over the past year, Home Depot and Target were among many companies specifically targeted by attackers to steal details about customers.
"These are organized groups, well funded, well resourced," says Michael Sutton, VP of security research for Zscaler. "The ultimate goal is almost always financial gain."
Keeping these three targeted attack motivations in mind can help a company assess which assets a persistent attacker may want to steal. "For instance, if you are in a retail organization, and you have customer information -- that's a value to certain Eastern European groups," says Ghosh.
Types of targeted attacks
While different attack groups may target different types of data and information, the overall operational framework for their attacks tend to look alike.
The majority of targeted attacks start with a spear-phishing campaign. These are not the poorly spelled, mass-emailed phishing attempts of yesteryear. Instead, advanced attackers do online research to find out email naming conventions and then find people they can email with a phony, but convincing, message.
"As an attacker, I'm able to do research about the company to find things like, 'Hey, I know this particular person is speaking at this particular conference at this particular time,'" says Alex Cox, senior manager of RSA FirstWatch. By guessing at that person's email address using the company naming convention and using the knowledge that someone
Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading. View Full Bio
1 of 3