Move Over, APTs -- The RAM-Based Advanced Volatile Threat Is Spinning Up Fast

  /     /     /  
Publicated : 22/11/2024   Category : security


Move Over, APTs -- The RAM-Based Advanced Volatile Threat Is Spinning Up Fast


By attacking random access memory, AVT creators make their exploits less persistent -- and harder to detect



For security pros, the advanced persistent threat (APT) has become a term as everyday as virus or Trojan horse. But as defenders become increasingly wise to the APT, experts say, attackers are now trying a new approach: the advanced volatile threat (AVT).
An AVT is an attack on random access memory (RAM), rather than stored data or applications, according to John Prisco, CEO of Triumfant, a security vendor that has been studying the trend in recent months and coined the term.
AVTs are those attacks that target processes running in active memory and therefore are not persistent, as APTs are, Prisco says. Theyre attacks on RAM that wont be detected by analyzing stored data or known threats. They are there, and then theyre gone when you turn your machine off, sometimes even before you turn your machine off.
Theres nothing new about RAM-level hacks -- RAM scraping was flagged by the SANS Institute as one of the industrys most dangerous attacks in 2011 -- but such exploits have been unusual, even rare, in recent years. Triumfant now has data to suggest these attacks are becoming more mainstream.
We see it mostly in the classified work we do -- government and defense stuff, Prisco says. But we now see it in as many as 10 percent of the attacks we detect.
Experts attribute the rise in RAM-based attacks to the increasing use of the Web for cyberespionage, where attackers are looking to collect specific data quickly, with a minimum of risk of being caught.
In-memory attacks, or advanced volatile attacks, are most effective in targeted attacks against a particular organization, where an attackers goal isnt persistence, but is instead to exfiltrate information from a network, says Joe DeMesy, senior analyst at security consulting firm Stach & Liu.
The traditional goal of viruses, such as botnets, is to control a system for a long period of time in order to consume a portion of its resources, such as computation or bandwidth. Such a goal requires persistence on disk, DeMesy observes. Such persistent exploits are the hallmark of the APT and characterize sophisticated attacks such as Stuxnet and Flame.
AVTs, on the other hand, are designed to act more like cat burglars, sneaking into the target system for a single theft and escaping without being detected.
If an attacker only wants to obtain documents from a network drive accessible from a workstation, there is no need to ever write information to disk, DeMesy observes. I see increasing popularity in advanced volatile attacks related to the rise of corporate espionage.
Mandiants report earlier this week on the Chinese hacker group APT1 exposed the exploits of sophisticated attackers and backtracked them to their source, Prisco observes. It showed how lazy the APT developers have become because they didnt think theyd ever get caught. But now, after that report, attackers are going to become a lot more careful and a lot more worried about attribution.
And that concern, Prisco says, could drive more attackers to drop their APT strategies and turn to AVTs instead. The AVT is going to be attractive to sophisticated attackers because its there, and its gone, he says. AVTs take a bit more effort, Prisco observes, because they only work once, but attackers who are highly concerned about attribution will likely be willing to do the extra work.
Using an AVT is no guarantee against detection, DeMesy says. Detection of advanced volatile attacks is extremely difficult, even when best practices are followed, he says. However, you may be able to detect what the attackers are trying to do. Internal honeypots are an excellent way to entice attackers to reveal their presence. Attackers employing advanced volatile attacks are looking to get in and out of a network quickly, bringing with them as much information as possible, so seemly vulnerable targets, such as a honeypot, are a prime target.
Prisco says Triumfants technology has spotted the rise of AVTs because it does active scanning of endpoint devices using onboard agents, rather than scanning networks or stored memory for known malware or suspicious behavior. Putting an agent on every device is not a trivial task, he concedes, but in the long run, its the only way to detect an attack like this while its still happening.
And you dont have to be a genius to launch an AVT, experts say. DeMesy notes that the industry-standard backdoor Meterpreter, part of the Metasploit framework, operates by default as an in-memory-only backdoor. There is little to no barrier of entry to perform these types of attacks, he says.
With ready-made templates such as Meterpreter available, will AVTs become a mainstream attack? Prisco thinks so.
The Mandiant report changes things, he says. Attackers now know that attribution is possible. They dont want to leave a trail. Today, APTs are the sophisticated exploit of choice, but I think theres a good chance that in the not-too-distant future, things will flip-flop and AVTs will become the norm.
Have a comment on this story? Please click Add a Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Veritabile Defecte de Proiectare a Securitatii in Software -> Top 10 Software Security Design Flaws ◂
Discovered: 23/12/2024
Category: security

▸ Sony, XBox Targeted by DDoS Attacks, Hacktivist Threats ◂
Discovered: 23/12/2024
Category: security

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Move Over, APTs -- The RAM-Based Advanced Volatile Threat Is Spinning Up Fast