From Malware To Breach

  /     /     /  
Publicated : 22/11/2024   Category : security


From Malware To Breach


New report maps attack behavior after the initial exploit gets dropped on a machine in a victim organization.



Got malware? More than likely you do, but dont panic: The bulk of infections can be traced to standard botnet activity like spamming and click-fraud rather than data theft, a new study of real-world breaches has found.
Targeted attacks that go after a company itself from the get-go actually remain relatively rare: Most malware infections are bulk attacks that cast a wide net, the report says. Some 85% of the attacks that hit the victim organizations in the study were opportunistic, and 15% were targeted. Two percent of the machines hit in opportunistic attacks were spreading bot malware to other machines in the victim organization.
The good news is that in some sense, this reduces the race-against-the-clock kind of panic. If every infected machine inside your network could potentially lead to 40 million credit card numbers exfiltrated, you have to treat everyone with a kind of panic mode. [Organizations] quickly become exhausted with that approach, says Oliver Tavakoli, CTO of Vectra Networks, which yesterday published the
Post Breach Industry Report
examining what happens once the bad guys infect a machine.
Were realizing that the majority of what we run into is stuff thats part of a botnet. If you dont catch it in the next hour [or so], it will send another [round] of spam, coin and other bitcoin, or ad-click, but its not the end of the world, he says.
This also gives incident response teams a little breathing room to dig deeper into other malware infections, specifically ones that involve critical business processes or systems, Tavakoli says.
Vectra studied some 100,000 machines over five months at companies of various sizes and industries, such as financial services, legal, education, and technology, for the study. More than 11,000 of those machines suffered from one or more attack, and 10% of those experienced two or more phases of attack, meaning the malware went to the next level of botnet monetization, command and control communications, reconnaissance, or data exfiltration, according to the report.
TK Keanini, CTO at Lancope, says the report findings reflect the shift in todays cybercrime and cyber espionage worlds to more modularized attacks. An attacker doesnt need to scan the Internet anymore. They can do a lookup on Shodan to find vulnerable systems on the public Internet, Keanini says. And they dont have to compromise credentials. They can buy them on the black market.
Those things change the dynamic of the attack a bit to a less labor-intensive and streamlined approach, he says.
But even solely bot-infected machines often eventually get hit with more malware and graduate to a more pressing problem to the organization. So triaging entails prioritizing infected machines, experts say.
How we prioritize depends on many factors... the criticality of the business, and where the [infected] machine sits in the business, all those things would come into the assessment, Keanini says.
Malware sneaking past perimeter and other defenses has become inevitable today. We know stuff gets into enterprises all the time, Vectras Tavakoli says, and botnet-type platforms and command and control are at the root of attacks.
The base of the pyramid is the botnet and the tip is the targeted stuff, he says.
Seven percent of the infected machines in the study had both botnet and data-exfiltration capabilities, which could signal stolen credentials being used laterally across the infected organization, or other organizations, the report says.
When the first malware comes on and phones home, it says heres the actual software it wants to install. So if you catch it really early, you can tell what it intends to do, he says. In general, you want to catch things as fast as possible.
Brute-force password attacks were the most common way attackers moved laterally in the victimized companies. This also often can indicate an early stage of a targeted attack.
I can infect with an exploit or steal credentials and let the user essentially log in, Tavakoli says, which is a stealthier way for the attacker to make his move.
Tom Bain, a senior vice president with CounterTack, says the report shows how brute-force password cracking and SQL injection are still the most popular attack methods for initial exploits. They are the two most common attacks to be able to establish a beachhead in the organization or to open a door and to find that one host that might be susceptible, Bain says.
And lateral movement is the scary part of the attack phase, he says.

Last News

▸ Security Problem Growing for Dairy Queen, UPS & Retailers, Back off ◂
Discovered: 23/12/2024
Category: security

▸ Veritabile Defecte de Proiectare a Securitatii in Software -> Top 10 Software Security Design Flaws ◂
Discovered: 23/12/2024
Category: security

▸ Sony, XBox Targeted by DDoS Attacks, Hacktivist Threats ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
From Malware To Breach