Last week, I was listening to a presenter discussing the problem of eradicating the compromise while maintaining a "business as usual" posture. Sitting there, I wondered what it would be like to be dealing with a large compromise where you know the attackers have access, but you cannot simply disconnect from the Internet. Talk about an impossible-feeling conundrum.
One of speaker's suggestions was trying to slow the attacker so he was less likely to be able to exfiltrate data. For example, as the attacker is trying to transfer files, start "flipping bits" in the files so they end up corrupted once the attacker has them. The speaker didn't say how it was done, but the first thing to pop into my mind was to use Snort Inline and the "replace" keyword.
For example, you could write a Snort rule looking for the header of a particular file the intruder has been transferring, like a compressed file containing your data. Since files pretty much all have a standard header, and sometimes footers, a Snort rule could be written to replace the header (and footer) with something else entirely so the attacker won't be able to view the files easily.
Another possibility would be to modify the network quality of service or inject TCP Resets and small TCP window sizes into the attackers traffic to slow transfers down to a crawl.
There's a lot of "fun" to be had during a not-so-fun time, and I hope that you never have to experience anything of that sort. Something to keep in mind is that you need to be careful doing something like this as you could end up angering the attacker so they end up retaliating. It doesn't hurt to test these things out and know your capabilities if the need ever should arise.
John H. Sawyer is a senior security engineer on the IT Security Team at the University of Florida. The views and opinions expressed in this blog are his own and do not represent the views and opinions of the UF IT Security Team or the University of Florida. When John's not fighting flaming, malware-infested machines or performing autopsies on blitzed boxes, he can usually be found hanging with his family, bouncing a baby on one knee and balancing a laptop on the other. Special to Dark Reading.