Executable Files, Old Exploit Kits Top Most Effective Attack Methods

  /     /     /  
Publicated : 22/11/2024   Category : security


Executable Files, Old Exploit Kits Top Most Effective Attack Methods


Researchers for the new Hackers Playbook analyzed 4 million breach methods from an attackers point of view to gauge the real risks today to enterprises.



No organization is immune to the risk of a data breach. Security leaders who want to assume the strongest protection must analyze their security posture from a hackers point of view to understand risk, validate security controls, and prioritize resources. 
That is the premise behind the SafeBreach Hackers Playbook, which was released in its second edition today. The first edition of the playbook, published in January, details enterprise security threats and risky habits from the point-of-view of an attacker. 
Researchers at SafeBreach play the hacker by deploying simulators that assume the role of a virtual hacker across endpoints, network, and the cloud. The new Hackers Playbook incorporates a total of 3,985,011 breach methods, all executed between January and September 2016.
SafeBreachs research team had two main objectives in compiling this playbook, says CTO and co-founder Itzik Kotler.
The first is to take highly publicized breaches such as those at Sony and Target, and to create artificial models so customers can better understand these attacks and how they happen. Researchers also figure out how to attack; they analyze different methods to create simulation events to give users a better idea of the threats they face.
Theyre [the researchers] pushing the envelope in creating new ideas and experimenting with existing ones, says Kotler. Its all to show customers what kind of malicious ideas exist.
Successful breaches are sorted into three pillars: infiltration, how hackers enter a machine; lateral movement, how they jump from one server to the other, for instance; and exfiltration, how they steal valuable data out of the victim organization.
The top infiltration methods used by attackers, according to the report, involved hiding executable files inside non-executable files. Specifically, executable files embedded within Windows script files, macros, and Visual Basic had great success. 
Old exploit kits, many of which have been around for a year or longer, are still considered effective means of delivering malware. These kits challenge endpoint security and secure web gateway products; top picks include Sweet Orange, Neutrino, and Rig Exploit Kit.
Another finding, consistent with the last Hackers Playbook, is the danger of misconfigured security products. Researchers passed malware between internal and external simulators and found many malware sandboxing solutions were not properly set up to safeguard all protocols, encrypted traffic, ports, and file formats.
In exploring lateral movement, researchers were successful in infiltrating networks via brute-force methods and discovered issues with proxies, which can segment internal networks when deployed correctly. If proxies are misconfigured, hackers can breach new network paths both internally and externally through proxy fuzzing.
Its easy for hackers to pull data outside victim organizations because most have fairly open outbound communication channels to the Internet. Top successful protocols include HTTP, IRC, SIP, and Syslogs, but IT support tools like externally bound syslogs can also be used to steal data.
One thing we are continuously seeing from the previous Hackers Playbook is the exfiltration of information, the ability of the hacker to steal something you care about, is still at 100%, says Kotler. This is a proven problem that will continue to pose a business risk in the future.
The means of mitigating these risks varies depending on the business, as different companies and security programs have different needs, he continues. Knowing where the business is lacking, investing in the right technology, and driving employee awareness are key.
It all begins with an understanding of what is the problem and where are the gaps, and making sure they are validated correctly, he says.
There is a positive finding from this collection of research, however, Kotler notes.
Companies today are being more and more proactive when it comes to understanding their security posture, and the notion of running simulations ahead of the curve so they can mitigate [risk], he says.
Related Content:
Inside A Bug-Hunters Head: 6 Motivators
Data Science & Security: Overcoming The Communication Challenge
PwC Study Finds Greater Trust In Cloud, More Security Spend

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Executable Files, Old Exploit Kits Top Most Effective Attack Methods