Advertisment

The 7 stages of advanced threats & data theft

author-image
DQI Bureau
New Update

 If you are a CIO or CISO struggling to comprehend the ever growing threat landscape the following insights from Websense gives a heads up on the nature and complex manifestations of advanced threats and data thefts.

Advertisment

Stage 1: Reconnaissance

The initial stage is focusing on reconnaissance. Targeted attackers access credentials and research online profiles, email IDs, org. chart information, hobbies and interests from social profiles to gain insight

on their victims. The aim is to gather intelligence to build lures that are very targeted and have a high propensity to succeed.

Stage 2: Lures

Advertisment

Web lures prey on human curiosity. Already common in Search Engine Optimisation (SEO) poisoning, leveraging natural disasters, and using celebrity events as lure, they have now moved into private social

circles between friends within social networking. Email lures are less social and event-based, as they lean towards an expected notification that you

are likely to allow through a spam filter. The top five email lure topics are: order notifications, ticket confirmations, delivery notices, test emails and tax return information.

Targeted attacks come in low volume to specific individuals (often for known upcoming events or expected meetings divined through social profiling), whereas broad attacks will use video, news, or

celebrity lures in social networking.

Advertisment

How comfortable are you with your current defenses' ability to analyse content within private social circles to identify lures and protect users? Is threat intelligence between web and email shared and

correlated? Does it recognise and reflect that 92% of email spam has a URL? Today, a good email defense starts with a great web defense.

 

Advertisment

Stage 3: Redirects

Users are usually directed to a survey, rogue anti virus offer or a fake web page where an exploit kit is

waiting. Mature redirects are SQL injections and iFrame injections that take users blindly down a path to

web services, content, and often to offers that they do not desire. Malvertising (malware advertising) also

blindly redirects users within popular sites. Newer redirects include social networking wall postings, fake

plug-ins, fake certificates, and heavily obfuscated java script.

The goal for a blind or hidden redirect, or from a lure, is to herd users onto a desired path for analysis

by an exploit kit, to a survey, rogue AV offer, or fake web page. As redirects are often dynamic and fast

changing, defenses need to be able to assess web links in real-time.

 

Stage 4: Exploit Kits

Advertisment

One of the more powerful and effective stages of an advanced threat is the exploit kit (e.g.: Blackhole).

In the past, the objective was to lure users, redirect them down a path, and then dump a malware file on

their systems. This led to quick detections by threat labs and gave the attack a very short life. However, in

a few minutes or an hour, many people could still be impacted. The exploit kit objective is more like that

of a sniper: take the shot with a malware dropper file only when an open door for tested vulnerabilities is

found. If no open vulnerability is found, then redirect the user to a clean web page and remain hidden.

Understanding exploit kits is important to advanced threat analysis and developing real-time defenses.

Blackhole uses criminal encryption, which makes it difficult to detect with AV engines and generic

de-obfuscation tools. If your only defense at the web gateway is AV, then the odds of exploit kits

successfully penetrating your systems through vulnerable applications is high.

Stage 5: Dropper Files

This stage is what most people consider the focus of their forward-facing defenses: analyse every file

that comes into the network for malware. The problem today is that dropper files use dynamic packers so

known signatures and patterns are not available, hence very few AV engines detect dropper files at the

time of threat analysis.

Advertisment

What do you have beyond AV for advanced threats and data theft protection? One of the most popular

dropper files is Rogue AV, or the fake scan and offer to clean your system. Traditionally focused at

Windows systems, new versions are now being seen on Apple computers with names like Mac Defender

or Protector.

Stage 6: Call Home

This stage and the next suggest that no set of defenses are 100% effective and that containment is the

new defense for data theft protection. Cybercrime only needs one entry point into a network to start an

infiltration aimed at stealing data.

Advertisment

Calling home for malware downloads and tools, and for sending back information is standard fare for any

successful online attack. The problem is that most defenses are only forward-facing and do not analyse

outbound traffic from infected systems. The use of dynamic DNS is a common attack method to avoid

call-home detection to static addresses. However, it also lends to a new defense for call-home analysis.

Infected systems and bots calling back to command and control servers are blocked from using dynamic

DNS while users can opt to continue on to trusted sites. Geo-location awareness is another call-home

defense, however malware communications, hosting, and phishing are mainly within the United States,

domains that few policies will block. Destination awareness in the context of data loss prevention is

also emerging. Contextual analysis of the data, user, destination, and other variables is an advantage to

policies so that confidential information is not sent to personal web mail, social networking accounts, or

posted within private cloud storage apps. What defenses do you have that analyse outbound traffic for call-home advanced threat

communications?

Stage 7: Data Theft



This is what attackers are after. The ability to contain an attack and stop data theft raise many questions.

Can your defenses detect password files leaving your network or the use of criminal encryption on

outbound files? Data theft where confidential information is exported in low volumes per request (drips)

to avoid detection over a defined period of time should also be considered. Do your data-theft defences provide you with forensic reporting that shows what data was blocked from leaving your organisation?

Advertisment