APT Or Not APT? Discovering Who Is Attacking The Network

  /     /     /  
Publicated : 22/11/2024   Category : security


APT Or Not APT? Discovering Who Is Attacking The Network


Corporate networks face a variety of attacks every day, yet pinpointing the most serious attacks are no easy matter



Oil companies, Internet technology firms, defense contractors, and even computer-security firms have all been targeted by persistent adversaries bent on stealing intellectual property and sensitive business information.
Advanced persistent threats -- a term thats become much maligned since the media locked onto it -- describes attackers that are targeting specific companies and data, rather than searching for vulnerable targets of opportunity. Persistent attackers stole oil field exploration data from ExxonMobil, information on the Joint Strike Fighter from Lockheed Martin and Northrup Grumman, and sensitive data on SecurID tokens from RSA. For many in the industry, the question is no longer if they have been breached, but how deeply, says Richard Bejtlich, chief security officer of Mandiant.
No one has been able to stop these guys, no one, he says. They remain a problem for every company with valuable intellectual property.
Separating persistent threats from more opportunistic cybercrime-focused attacks is not easy, but can help inform defense, according to security experts. Block an opportunistic attack and the crisis is averted; block a persistent attacker and they will come back tomorrow, says Toralv Dirro, security strategist for McAfees Labs in the Europe, Middle Eeast and Africa region.
If someone is a victim of a targeted attack, there are patterns, Dirro says. They should really follow up on identifying those patterns.
In many cases, the patterns are not clear. Even advanced attackers will only use, for example, the minimum force necessary to compromise a network. In some cases, attackers have rented botnets; in others, theyve used standard cybercrime tools.
It is never a case of, oh, they are using Poison Ivy, so its APT -- everyone is using Poison Ivy, Mandiants Bejtlich says. It really comes down to a lot of analysis to figure out what is going on.
Attacks that link back to specific nations, especially China, could indicate the attack qualifies as an advanced persistent threat, but tracking the origin of attacks is notoriously unreliable. While the United States hosts the lions share of command-and-control servers used for malicious attack -- both cybercrime and espionage -- most of the attacks are coming from China, says Bejtlich. The company tracks 12 Chinese groups responsible for much of the advanced persistent threat (APT) related attacks.
The amount of activity you get from all the other people out there is swamped by the stuff coming out of China, he says.
Generally, however, there are some common components, say other security professionals. Advanced persistent threats typically are attacks that use an employee as a beachhead into the network, and then move laterally from computer to computer. Malicious programs that infiltrate a network are likely a sign that the attack is more than mere crimeware, says Anup Ghosh, CEO of browser security firm Invincea.
They will move laterally, and that is a distinguishing feature, says Ghosh. They will do internal recon of machines, where a typical banking Trojan will not.
Identifying the entry point -- where an attacker got into a companys network -- is a key aspect of identifying and responding to an advanced attack, says Sean Brady, director in RSAs identity and data protection group. Watching for the telltale signs of reconnaissance is almost impossible, because so much reconnaissance is done on social networks, Internet databases and other sources outside the control of company.
Think about information that LinkedIn supplies, he says. You can map a company just by information gained from LinkedIn, and that is not a knock against LinkedIn, thats just the information they provide as a social network.
Instead, companies should focus on employees, Brady says.
The attack against security giant RSA earlier this year, for example, started with two e-mail messages that appeared to carry an attached recruitment plan and ended by reportedly compromising the companys database of cryptographic seeds for its SecurID tokens. The targets of the e-mails were not executives but low-level employees, a tactic that shows that companies have to worry about protecting all potential entry points into their network, RSA stated in a report from an advanced threats working group that convened in July.
The advanced threat is aimed at a specific targeted point of entry, says Brady.And targeting a specific individual, and the person is almost never the ultimate target.
Educating users and focusing on securing the end user can help both detect and mitigate persistent attacks. An industry confab held by RSA and TechAmerica created a roadmap for dealing with advanced persistent threats. Industry has to get used to a state of compromise, concluded the group in
a report released in September
. Because attacks have moved away from technology and moved to targeting people, companies that have a good awareness of the security situation will be able to counter advanced threats best.
Remember, an advance threats always starts with an individual, with people, says Brady. The best approach is to narrow the impact, and then work on a response plan to keep out the attacks.
Have a comment on this story? Please click Discuss below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
APT Or Not APT? Discovering Who Is Attacking The Network