Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/21/2011
06:25 PM
50%
50%

APT Or Not APT? Discovering Who Is Attacking The Network

Corporate networks face a variety of attacks every day, yet pinpointing the most serious attacks are no easy matter

Oil companies, Internet technology firms, defense contractors, and even computer-security firms have all been targeted by persistent adversaries bent on stealing intellectual property and sensitive business information.

Advanced persistent threats -- a term that's become much maligned since the media locked onto it -- describes attackers that are targeting specific companies and data, rather than searching for vulnerable targets of opportunity. Persistent attackers stole oil field exploration data from ExxonMobil, information on the Joint Strike Fighter from Lockheed Martin and Northrup Grumman, and sensitive data on SecurID tokens from RSA. For many in the industry, the question is no longer if they have been breached, but how deeply, says Richard Bejtlich, chief security officer of Mandiant.

"No one has been able to stop these guys, no one," he says. "They remain a problem for every company with valuable intellectual property."

Separating persistent threats from more opportunistic cybercrime-focused attacks is not easy, but can help inform defense, according to security experts. Block an opportunistic attack and the crisis is averted; block a persistent attacker and they will come back tomorrow, says Toralv Dirro, security strategist for McAfee's Labs in the Europe, Middle Eeast and Africa region.

"If someone is a victim of a targeted attack, there are patterns," Dirro says. "They should really follow up on identifying those patterns."

In many cases, the patterns are not clear. Even "advanced" attackers will only use, for example, the minimum force necessary to compromise a network. In some cases, attackers have rented botnets; in others, they've used standard cybercrime tools.

"It is never a case of, oh, they are using Poison Ivy, so it's APT -- everyone is using Poison Ivy," Mandiant's Bejtlich says. "It really comes down to a lot of analysis to figure out what is going on."

Attacks that link back to specific nations, especially China, could indicate the attack qualifies as an advanced persistent threat, but tracking the origin of attacks is notoriously unreliable. While the United States hosts the lion's share of command-and-control servers used for malicious attack -- both cybercrime and espionage -- most of the attacks are coming from China, says Bejtlich. The company tracks 12 Chinese groups responsible for much of the advanced persistent threat (APT) related attacks.

"The amount of activity you get from all the other people out there is swamped by the stuff coming out of China," he says.

Generally, however, there are some common components, say other security professionals. Advanced persistent threats typically are attacks that use an employee as a beachhead into the network, and then move laterally from computer to computer. Malicious programs that infiltrate a network are likely a sign that the attack is more than mere crimeware, says Anup Ghosh, CEO of browser security firm Invincea.

"They will move laterally, and that is a distinguishing feature," says Ghosh. "They will do internal recon of machines, where a typical banking Trojan will not."

Identifying the entry point -- where an attacker got into a company's network -- is a key aspect of identifying and responding to an advanced attack, says Sean Brady, director in RSA's identity and data protection group. Watching for the telltale signs of reconnaissance is almost impossible, because so much reconnaissance is done on social networks, Internet databases and other sources outside the control of company.

"Think about information that LinkedIn supplies," he says. "You can map a company just by information gained from LinkedIn, and that is not a knock against LinkedIn, that's just the information they provide as a social network."

Instead, companies should focus on employees, Brady says.

The attack against security giant RSA earlier this year, for example, started with two e-mail messages that appeared to carry an attached recruitment plan and ended by reportedly compromising the company's database of cryptographic seeds for its SecurID tokens. The targets of the e-mails were not executives but low-level employees, a tactic that shows that companies have to worry about protecting all potential entry points into their network, RSA stated in a report from an advanced threats working group that convened in July.

"The advanced threat is aimed at a specific targeted point of entry," says Brady."And targeting a specific individual, and the person is almost never the ultimate target."

Educating users and focusing on securing the end user can help both detect and mitigate persistent attacks. An industry confab held by RSA and TechAmerica created a roadmap for dealing with advanced persistent threats. Industry has to get used to a state of compromise, concluded the group in a report released in September. Because attacks have moved away from technology and moved to targeting people, companies that have a good awareness of the security situation will be able to counter advanced threats best.

"Remember, an advance threats always starts with an individual, with people," says Brady. "The best approach is to narrow the impact, and then work on a response plan to keep out the attacks."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5243
PUBLISHED: 2020-02-21
uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent hea...
CVE-2019-14688
PUBLISHED: 2020-02-20
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial produc...
CVE-2019-19694
PUBLISHED: 2020-02-20
The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the ...
CVE-2020-5242
PUBLISHED: 2020-02-20
openHAB before 2.5.2 allow a remote attacker to use REST calls to install the EXEC binding or EXEC transformation service and execute arbitrary commands on the system with the privileges of the user running openHAB. Starting with version 2.5.2 all commands need to be whitelisted in a local file whic...
CVE-2020-8601
PUBLISHED: 2020-02-20
Trend Micro Vulnerability Protection 2.0 is affected by a vulnerability that could allow an attack to use the product installer to load other DLL files located in the same directory.