Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Move Over, APTs -- The RAM-Based Advanced Volatile Threat Is Spinning Up Fast

By attacking random access memory, AVT creators make their exploits less persistent -- and harder to detect

For security pros, the advanced persistent threat (APT) has become a term as everyday as virus or Trojan horse. But as defenders become increasingly wise to the APT, experts say, attackers are now trying a new approach: the advanced volatile threat (AVT).

An AVT is an attack on random access memory (RAM), rather than stored data or applications, according to John Prisco, CEO of Triumfant, a security vendor that has been studying the trend in recent months and coined the term.

"AVTs are those attacks that target processes running in active memory and therefore are not persistent, as APTs are," Prisco says. "They're attacks on RAM that won't be detected by analyzing stored data or known threats. They are there, and then they're gone when you turn your machine off, sometimes even before you turn your machine off."

There's nothing new about RAM-level hacks -- RAM scraping was flagged by the SANS Institute as one of the industry's most dangerous attacks in 2011 -- but such exploits have been unusual, even rare, in recent years. Triumfant now has data to suggest these attacks are becoming more mainstream.

"We see it mostly in the classified work we do -- government and defense stuff," Prisco says. "But we now see it in as many as 10 percent of the attacks we detect."

Experts attribute the rise in RAM-based attacks to the increasing use of the Web for cyberespionage, where attackers are looking to collect specific data quickly, with a minimum of risk of being caught.

"In-memory attacks, or advanced volatile attacks, are most effective in targeted attacks against a particular organization, where an attacker's goal isn't persistence, but is instead to exfiltrate information from a network," says Joe DeMesy, senior analyst at security consulting firm Stach & Liu.

"The traditional goal of viruses, such as botnets, is to control a system for a long period of time in order to consume a portion of its resources, such as computation or bandwidth. Such a goal requires persistence on disk," DeMesy observes. Such persistent exploits are the hallmark of the APT and characterize sophisticated attacks such as Stuxnet and Flame.

AVTs, on the other hand, are designed to act more like cat burglars, sneaking into the target system for a single theft and escaping without being detected.

"If an attacker only wants to obtain documents from a network drive accessible from a workstation, there is no need to ever write information to disk," DeMesy observes. "I see increasing popularity in advanced volatile attacks related to the rise of corporate espionage."

Mandiant's report earlier this week on the Chinese hacker group APT1 exposed the exploits of sophisticated attackers and backtracked them to their source, Prisco observes. "It showed how lazy the APT developers have become because they didn't think they'd ever get caught. But now, after that report, attackers are going to become a lot more careful and a lot more worried about attribution."

And that concern, Prisco says, could drive more attackers to drop their APT strategies and turn to AVTs instead. "The AVT is going to be attractive to sophisticated attackers because it's there, and it's gone," he says. AVTs take a bit more effort, Prisco observes, because they only work once, but attackers who are highly concerned about attribution will likely be willing to do the extra work.

Using an AVT is no guarantee against detection, DeMesy says. "Detection of advanced volatile attacks is extremely difficult, even when best practices are followed," he says. "However, you may be able to detect what the attackers are trying to do. Internal honeypots are an excellent way to entice attackers to reveal their presence. Attackers employing advanced volatile attacks are looking to get in and out of a network quickly, bringing with them as much information as possible, so seemly vulnerable targets, such as a honeypot, are a prime target."

Prisco says Triumfant's technology has spotted the rise of AVTs because it does active scanning of endpoint devices using onboard agents, rather than scanning networks or stored memory for known malware or suspicious behavior. "Putting an agent on every device is not a trivial task," he concedes, "but in the long run, it's the only way to detect an attack like this while it's still happening."

And you don't have to be a genius to launch an AVT, experts say. DeMesy notes that the industry-standard backdoor Meterpreter, part of the Metasploit framework, operates by default as an in-memory-only backdoor. "There is little to no barrier of entry to perform these types of attacks," he says.

With ready-made templates such as Meterpreter available, will AVTs become a mainstream attack? Prisco thinks so.

"The Mandiant report changes things," he says. "Attackers now know that attribution is possible. They don't want to leave a trail. Today, APTs are the sophisticated exploit of choice, but I think there's a good chance that in the not-too-distant future, things will flip-flop and AVTs will become the norm."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AMoss
50%
50%
AMoss,
User Rank: Guru
3/3/2013 | 7:23:38 PM
re: Move Over, APTs -- The RAM-Based Advanced Volatile Threat Is Spinning Up Fast
Memory monitoring/prevention has been around for quite awhile.- While it's not common for malware to not drop anything to disk...it's still not 'new'.- More than anything, this appears to be a vendor that is attempting to coin a term on which they can then capitalize.- Prisco thinking that the term term 'Persistent' in Advanced Persistent Threat has anything to do with memory or disk is a very accurate indicator of his understanding of the security landscape.
Eirik
50%
50%
Eirik,
User Rank: Apprentice
2/25/2013 | 4:13:12 PM
re: Move Over, APTs -- The RAM-Based Advanced Volatile Threat Is Spinning Up Fast
Another motivator for RAM-only, ever-more AV products are focusing on post-infection detection because malware kits easily alter the signature of an outbound sample. -So, AV products are increasingly looking for files stored on the hard drive. Add to this the community-based mechanisms where a newly detected signature discovered post-infection is reported to the rest of the community. -Bad news for the initial folk infected but the community can benefit. -Enter RAM-only, post-infection detection must adapt.
Larry Seltzer - UBM Tech
50%
50%
Larry Seltzer - UBM Tech,
User Rank: Apprentice
2/23/2013 | 3:01:42 PM
re: Move Over, APTs -- The RAM-Based Advanced Volatile Threat Is Spinning Up Fast
Theoretically, if least-privilege were used aggressively, threats might be limited even in what RAM then access. Alas, this seems to be much harder to do in the real world than in theory, but I'm still tempted to think that this problem is properly attributed, in part, to failure to adhere to best practices.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15596
PUBLISHED: 2020-08-12
The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.
CVE-2020-15868
PUBLISHED: 2020-08-12
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
CVE-2020-17362
PUBLISHED: 2020-08-12
search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.
CVE-2020-17449
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS via the error_log file.
CVE-2020-17450
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS on the preview page.