Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

8/1/2016
08:00 AM
Simon Crosby
Simon Crosby
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Crypto Malware: Responding To Machine-Timescale Breaches

The game has changed again with hackers' ability to steal your data at record speeds and cripple your organization before the first alert.

The thousand-fold increase in crypto-malware highlights a profound change in the cyber-landscape: Previously, an attacker seeking to steal intellectual property, personal identifiable information or payment card information would need to successfully breach and persist on one or more endpoints, carefully research the network, stealthily exfiltrate data, and finally process it in order to sell it on the dark web – a lot of effort for an uncertain payout. But crypto-malware is a clear signal that hackers have changed the game. 

With crypto-malware – ransomware that encrypts files until a ransom is paid – every compromised device, whether company or personally owned, can be quickly monetized. If money isn’t the goal, attackers can use it to cripple a target for political or military advantage because it’s quick, precise and lethal, and much simpler and more effective than a messy kinetic weapon.  For organizations whose missions depend on availability of computer systems, including hospitals, law enforcement and military targets, this new form of attack is a nightmare.

A crypto-malware attacker avoids the risk of post-breach detection or interrupted exfiltration by leaving data in place, but encrypting it without being detected. The attacker also maximizes fear and impact in a shocking way: via the ransom notice. That is, a personalized victim ransom page usually containing the initial ransom amount, instructions for how to purchase Bitcoins, and a countdown clock, which adds pressure to the victim by letting them know how much time they have to pay up before the ransom doubles or the data is deleted.

The attacker doesn’t even have to decide what data is valuable. Encrypting all data forces the victim to decide. Being both fearful and unsure, the victim is very likely to pay the ransom. Likewise, rather than having to sell stolen data at a discounted black-market price, encrypting it in place allows the attacker to directly demand top dollar from the victim, who values the data most.

Most importantly, crypto-malware breaches occur at machine speed, meaning there is no need for a remote human attacker to carefully dig deeper searching for valuable data. As soon as the endpoint is compromised the attack inflicts maximum damage.  And since most such malware is undetectable by design, legacy AV suites offer scant assurance that you will be protected.  Enterprise security teams have no opportunity to detect and respond to a breach as they do with traditional attacks. 

Lest you think that crypto-malware is consumer focused, or that paying to decrypt your files is a simple way out, think again:

● Attacks have rapidly evolved to incorporate traditional breach techniques. Enterprise variants can propagate through the network to other devices and encrypt file shares and cloud storage to maximize impact.

● Following the classic approach of extortionists, attackers can charge different amounts to decrypt different parts of your data, or demand regular payments to keep data from being re-encrypted.

● It won’t be long before encrypted data is exfiltrated so the bad guys get to keep a copy too. 

“Sorry, you’re going to be pwned”
Sadly, the security industry was already failing to protect its customers from traditional manual adversaries before attackers realized the benefits of machine-speed breaches.  Vendors continue to peddle “maybe” technologies, like “next-gen antivirus” (NG-AV), that try to “detect to protect.” They tout their unbelievable ability to detect yesterday’s attacks – when in fact 99 percent of today’s malware morphs into new, undetectable variants in under a minute, according to the latest Verizon Data Breach Investigations Report. And they fail to protect against threats at the time of infection, instead offering remediation instead of prevention. Once the damage is done it’s too late.

Security vendors dodge responsibility for their failures, glibly encouraging their customers to continually look for signs of a breach they missed. But if you try to secure your organization assuming you will be breached by an adversary who operates on a human timescale, whose stealthy theft of data you must detect post-breach, you will undoubtedly be devastated by a machine-speed attack that cripples your organization before the first alert, then drains your bank account to “help” you back on your feet.

Protection at Machine-Speed
Today’s NG-AV tries to detect attacks and protect each endpoint individually, using signatures and heuristics updated by vendors on a human timescale. With absolute certainty this approach will fail, giving an attacker the foothold he needs to breach the enterprise at machine-speed. 

To protect the entire enterprise at machine speed, you cannot rely on detection. The only solution is to protect “by design” -- architecting your environment to be resilient to attack.  For a start, you ought to segment your network according to privilege or “need to know:” PCs that only access web applications need never be fully trusted on the enterprise network. Instead isolate them on their own VLAN or network subnet, and make users jump through authentication “gates” to get to high value applications or back-end services.  

Don’t give users access to file shares that are not necessary, and keep database access limited to database applications. This concept of micro-segmentation of the enterprise network is being promoted by vendors of private and public cloud infrastructure, and the concepts apply on end user PCs through micro-virtualization.  Ensure that users that need administrative access to corporate infrastructure are only able to elevate their privileges on a separately managed, VDI-based backend that can only be accessed from the enterprise intranet. Prohibit privilege escalation without forcing the user to log in under a different identity.

Rigorous separation of duties, with enforcement using tools from virtualization -- VDI, micro-segmentation and micro-virtualization -- are fundamental to building an enterprise infrastructure that is inherently more resilient to machine timescale attacks. Rigorous infrastructure-based enforcement of the principle of least privilege is a fundamental requirement for a resilient enterprise infrastructure architecture.

It is time to move beyond a model where we bet the security of the enterprise on the security of a single endpoint and human-timescale detection tools. The only way to defeat machine-timescale attacks is to embrace virtualization-enforced isolation to help enterprises protect themselves by reducing the enterprise attack surface.

Related Content:

 

Simon Crosby is co-founder and CTO at Bromium. He was founder and CTO of XenSource prior to the acquisition of XenSource by Citrix, and then served as CTO of the Virtualization & Management Division at Citrix. Previously, Simon was a principal engineer at Intel where he led ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DotComCTO
50%
50%
DotComCTO,
User Rank: Apprentice
8/3/2016 | 4:08:26 PM
Re: In my humble opinion
You're presuming that crypto-malware gets onto your machine and starts its nasty business of encryption. What do you do if it simple lies dormant for a day, a week, or a month and then proceeds to destroy your machine?

And yes, for an Enterprise these are the types of attacks that keep people like me awake at night. Even if you have backups (on-site, off-site, cloud, etc), something there might have been compromised beforehand.

Don't get lulled into a false sense of security.
Olaf Barheine
50%
50%
Olaf Barheine,
User Rank: Apprentice
8/1/2016 | 8:49:07 AM
In my humble opinion
Crypto malware is not really a problem for me. My solution is quite simple: I have always a copy of my hard disk in my desk. And every day I make a backup of my data. Thus, after a successful attack it would take perhaps 10 minutes and I could continue with my work. But sure, in bigger companies it could be more complicated.

 
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
How Attackers Infiltrate the Supply Chain & What to Do About It
Shay Nahari, Head of Red-Team Services at CyberArk,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7843
PUBLISHED: 2019-07-18
Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Insufficient input validation vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
CVE-2019-7846
PUBLISHED: 2019-07-18
Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Improper error handling vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
CVE-2019-7847
PUBLISHED: 2019-07-18
Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Improper Restriction of XML External Entity Reference ('XXE') vulnerability. Successful exploitation could lead to Arbitrary read access to the file system in the context of the current user.
CVE-2019-7848
PUBLISHED: 2019-07-18
Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Inadequate access control vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
CVE-2019-7850
PUBLISHED: 2019-07-18
Adobe Campaign Classic version 18.10.5-8984 and earlier versions have a Command injection vulnerability. Successful exploitation could lead to Arbitrary Code Execution in the context of the current user.