Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

2/10/2021
10:00 AM
Otavio Freire
Otavio Freire
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Multivector Attacks Demand Security Controls at the Messaging Level

As a Google-identified attack reveals, security teams need to look beyond VPNs and network infrastructure to the channels where social engineering takes place.

In recent days, the cybersecurity community has been abuzz with discussion of the latest announcement from Google's Threat Analysis Group. Google says it has spent the past few months tracking a new campaign orchestrated by "a government-backed entity based in North Korea," thought to be the threat actor known as the Lazarus Group. The campaign targeted a number of security researchers.

There are special lessons to be learned from this campaign. The researchers were attacked in a complex, multivector fashion. To cope with this kind of attack, security and risk teams need to look beyond virtual private networks and network infrastructure to the communication channels where social engineering is taking place.

Related Content:

Fighting the Rapid Rise of Cyber Warfare in a Changing World

Special Report: Special Report: Understanding Your Cyber Attackers

New From The Edge: Fighting Fileless Malware, Part 1: What Is It?

Dissecting a Multivector Attack
Google hopes its announcement will remind people to "remain vigilant when engaging with individuals they have not previously interacted with." Why? Because this campaign was not simply a spoofed email. This was a sophisticated attack, where the threat actors played the long game with social engineering and a multichannel approach:

  • The bad actors set up a fake research blog. Their efforts were considerable, including fake exploits and lengthy write-ups. They also set up multiple fake Twitter and YouTube accounts to amplify their pretend research.
  • Via this online presence, the bad actors established credibility with the online security research community.
  • With this credibility established, the bad actors reached out to real security researchers, suggesting that they collaborate. These communications occurred on multiple platforms: Twitter, LinkedIn, Telegram, Discord, Keybase, and email.
  • Once connected, the bad actors shared with the researchers project files containing hidden malware. The blog URL itself was also a threat, installing a malicious service on visitors' systems.

The uniquely dangerous feature of this campaign is its multivector nature. There is no single point of attack or contact. Instead, the threat surface implicated involves multiple cloud channels and messaging apps.

Stopping Social Engineering Attacks in Their Tracks
This North Korea-backed campaign recruited multiple points of attack. At a minimum: 10 Twitter accounts, five LinkedIn accounts, one Telegram account, nearly 20 malicious URLs.

How can organizations counter such a multipronged assault on their researchers? Google recommends that you "compartmentalize your research activities, using separate physical or virtual machines for general web browsing, interacting with others in the research community, accepting files from third parties, and your own security research."

These standard steps are worth remembering. But also, security teams should look for ways to detect bad actor accounts preventatively, so they can stop social engineering before it can start. For example, security controls at the account and message layers could have flagged the Twitter and LinkedIn accounts making contact with an employee as potentially suspicious.

This bad actor detection, alert to suspicious language, could have flagged the accounts as soon as they attempted to connect. This would have stopped the social engineering in its tracks. Moreover, security controls could also have detected issues at any attacker-owned command-and-control domains shared in messages. Most importantly, they could have unpacked and vetted any files from third parties before an employee could open them.

These powers of detection and visibility would have protected targeted researchers. Finally, there is no need for this oversight to breach employees' data privacy. The right technology can scan communications for threats, even as the actual content of messages remains masked. The best practice is to flag risks while content remains hidden.

A Multivector Approach
A few weeks ago, my business partner, Jim Zuffoletti, predicted that social engineering attacks would become more sophisticated in 2021. They are effective, and many organizations are not equipped to deal with them. Bad actors know social and mobile chat channels are invisible to security teams and are targeting these communication channels. Therefore, he says, "security teams need controls in social and chat apps that provide visibility into risks while respecting employees' data privacy."

With multivector campaigns, the risk lies in the third-party cloud channels that are increasingly central to modern business. This is where social engineering is taking place. This is where bad actors are grooming their targets.

As the President, CTO, and Co-Founder of SafeGuard Cyber, Mr. Freire is responsible for the development and continuous innovation of SafeGuard Cyber's enterprise platform, which enables global enterprise customers to extend cyber protection to social media and digital ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32077
PUBLISHED: 2021-05-06
Primary Source Verification in VerityStream MSOW Solutions before 3.1.1 allows an anonymous internet user to discover Social Security Number (SSN) values via a brute-force attack on a (sometimes hidden) search field, because the last four SSN digits are part of the supported combination of search se...
CVE-2020-23263
PUBLISHED: 2021-05-06
Persistent Cross-site scripting vulnerability on Fork CMS version 5.8.2 allows remote attackers to inject arbitrary Javascript code via the "navigation_title" parameter and the "title" parameter in /private/en/pages/add.
CVE-2020-23264
PUBLISHED: 2021-05-06
Cross-site request forgery (CSRF) in Fork-CMS before 5.8.2 allow remote attackers to hijack the authentication of logged administrators.
CVE-2021-27941
PUBLISHED: 2021-05-06
Unconstrained Web access to the device's private encryption key in the QR code pairing mode in the eWeLink mobile application (through 4.9.2 on Android and through 4.9.1 on iOS) allows a physically proximate attacker to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the...
CVE-2021-29203
PUBLISHED: 2021-05-06
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gai...