feeding my own misguided insanity

CyberSecurity: Expanded Look at the APT Life Cycle and Mitigation

Cybersecurity attacks will continue to increase in both frequency and sophistication over time – mostly due to the blasé attitudes within the industry about what should be done. While APT tactics, techniques and procedures (TTPs) continue to be refined on a global scale, the targeted organizations either bury their heads in the sand pretending that there is nothing that can be done, or throw their arms up into the air with frustration and despair.

This is the third of a series of articles on CyberSecurity and Advanced Persistent Threats (APTs).  Read Part 1 and Part 2.

Frustration and Despair

Those who are frustrated and desperate have at least tried something but perhaps failed – usually as a result of the ever-growing complexity of security offerings. One must wonder why, given so much investment into cybersecurity, it still takes a PhD to deploy and configure enterprise-grade security solutions?  And even then a teenager armed with a few scripts could still bring an enterprise to its knees.

It’s true, the security ecosystem is growing in complexity and is beginning to fragment into specialized domains.  A lot more diligence, effort and research is required to stay abreast of the latest threats and developments. These days, deploying anti-malware and enabling firewalls across an organization doesn’t make you a security professional. This barely scratches the surface and is completely useless in a world where APTs and Government-sponsored 300+ Gpbs DDoS attacks are just a smokescreen for the real hack data exfiltration.[1]

Expanded Look at APT Lifecycle

Earlier in the series I gave some background information on the work done by ISACA and McAfee in outlining the APT Lifecycle. These aren’t the only examples of APT life cycles, but they all seem to draw similar conclusions. The important fact to note is that in addition to the APT threats we have heard about, there is a growing number of new players who have adopted APT methodologies simply because they have proved to be successful.

This new breed of APT-like attacker is being defined as:

“One who specifically targets a person or enterprise for attack to achieve a specific purpose.”

— McAfee (Intel Security)

APT Life Cycle Expanded

Figure 1:   APT Life Cycle Expanded            Src: Intel Security

The expanded descriptions below go into a bit more detail and form a fairly accurate overview of the life cycle being employed by sophisticated attackers.[2]   APTs are committed to infiltrating their target systems, irrespective of how long it takes to achieve that goal.

  • Conduct background research. APTs conduct detailed research on their targets to identify very specific avenues of attack.  These scenarios represent the kind of detailed research the APT do to maximize the chances that their target will act as desired.
  • Execute initial attack. Typically, the initial attack targets one or more specific individuals through some form of social engineering: embedding a link to malicious content into an email message, an instant message, a social media posting or another attack vector, and enticing the target to act by opening an attachment or clicking on a link to infect one or more devices with malicious software.
  • Establish foothold. Once a user acts, the APT establish an initial foothold into the target environment using some version of customized malicious software. In almost every case, that custom software does not trigger any antivirus alert, but it does beacon to the APT to inform them of the successful attack. The initial infection tool, sometimes called first-stage malware, may have very little malicious functionality, but it generally is able to beacon home and download additional functionality, sometimes called second-stage malware.
  • Enable persistence. One of the primary objectives of the APT is to establish persistent command and control over compromised computers in the target environment—meaning control and access that will survive a reboot of the targeted device and provide the APT with regular connectivity to the target environment. In most cases, this persistence is established simply by installing new services (including the attacker’s command-and-control software) on the target computer that automatically start when the computer boots.
  • Conduct enterprise reconnaissance. After establishing persistent access to the target environment, the APT generally conduct enterprise reconnaissance in an effort to find the computers, servers or storage areas holding the information they have been instructed to steal. In most cases, they conduct the reconnaissance using the tools available to them on the compromised computers. In some cases, they upload scanning tools to search for specific types of systems (e.g., identity and access management, authentication, virtual private network (VPN), database or email servers).
  • Move laterally to new systems. Part of enterprise reconnaissance necessarily includes moving laterally to new systems to explore their contents and understand to what new parts of the enterprise they might gain access from the new systems. They also directly install their command-and-control software on new systems to expand their persistent access to the environment.
  • Escalate privileges. As the attackers conduct reconnaissance and move around the network using the compromised credentials of their first few targets, they inevitably seek to escalate from local user to local administrator to higher levels of privilege in the environment so that they are not constrained to any specific part of the environment. In enterprises where access to information is tightly controlled, compromising all the credentials in the environment allows the attackers to masquerade as anyone in the environment and access any resource they desire.
  • Gather and encrypt data of interest. Having found the data of interest to them, the APT generally gather the data into an archive and then compress and encrypt the archive. This enables them to hide the contents of the archive from technologies that include deep packet inspection capabilities and from data loss prevention (DLP) at the enterprise boundary.
  • Exfiltrate data from victim systems. The ultimate objective of an APT attack is to steal something of value. The APT may use traditional means of transferring files, such as file transfer protocol (FTP) applications or even HTTP Post if the enterprise allows outbound communication. They might also use custom data transfer technologies operating via covert channels.
    nonstandard ports if FTP is not allowed.
  • Maintain persistent presence. Lastly, the APTs seek to attain what they have been tasked by their controllers to do: maintain access to the target environment. It is not uncommon for the APT to sit undetected in an enterprise network for lengthy periods of time, waiting to complete their directive.

What Are Othes Doing?

APTs are well-skilled in adapting to an ever-changing environment.  In many cases, the target organization may be aware of a breach, but not know where or what to look for because the attacker is laying dormant. But even in such extreme cases of infiltration, organizations can still respond and defend themselves in a variety of ways.  Figure 2 summarizes some common approaches to improving security.

APT Complexity of Countermeasure

Figure 2:  Complexity of Countermeasures            Src: Intel Security

It’s unlikely that every organization will implement the Advanced mitigations.  Some of these mitigations are rather drastic, like disconnecting from the internet.  Nevertheless, some organizations will go to any lengths to protect their security.  At the very least it is advised that every organization implement the Basic mitigations and seriously look at deploying the Intermediate technologies.

Conclusion

It is clear that APT threats or APT-like threats will increase over time.  As a result, organizations need to educate themselves and update their defensive postures in order to defend against these advanced threats.  While there are many countermeasures that can be employed to improve security, there may be barriers, both technical and financial, why such defenses remain underemployed.

The key takeaways from this post are (1) understand how APTs operate to gain a foothold within an enterprise, (2) implement all of the Basic countermeasures mentioned in Figure 2 and deploying the Intermediate mitigations. And (3), any organization which is serious about security, should start implementing at least some of the countermeasures listed in the Advanced section.

Footnotes
  1. DDoS attacks are on the rise and are now starting to be seen as a smokescreen for the “real” or “secondary” attack and ultimate exfiltration of data, according to Akamai researchers. http://drshem.com/2015/11/27/notes-from-the-cloud-security-alliance-csa-congress-emea-2015/ ^
  2. Responding to Targeted Cyberattacks – Google Books Preview ^

Bibliography

1.
Advanced persistent threat [Internet]. Wikipedia, the free encyclopedia. 2015 [cited 2015 Oct 7]. Available from: https://en.wikipedia.org/w/index.php?title=Advanced_persistent_threat&oldid=668868277
2.
A Quick Guide to the Worst Corporate Hack Attacks – Business, Financial & Economic News, Stock Quotes [Internet]. Bloomberg.com. [cited 2015 Oct 9]. Available from: http://www.bloomberg.com/graphics/2014-data-breaches/
3.
Connecting the APT Dots | Security Intelligence | TrendLabs – Trend Micro [Internet]. [cited 2015 Oct 8]. Available from: http://blog.trendmicro.com/trendlabs-security-intelligence/connecting-the-apt-dots-infographic/
4.
Cybersecurity: Defending Against Advanced Persistent Threats. The MITRE Corporation [Internet]. [cited 2015 Oct 8]; Available from: https://www.mitre.org/publications/project-stories/cybersecurity-defending-against-advanced-persistent-threats
5.
Detecting APT Activity with Network Traffic Analysis – wp-detecting-apt-activity-with-network-traffic-analysis.pdf [Internet]. [cited 2015 Oct 8]. Available from: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-detecting-apt-activity-with-network-traffic-analysis.pdf
6.
Five Things Every Organization Should Know about Detecting and Responding to Targeted Cyberattacks [Internet]. [cited 2015 Oct 7]. Available from: https://webforms.ey.com/US/en/Newsroom/News-releases/News_Five-Things-Every-Organization-Should-Know-about-Detecting-and-Responding-to-Targeted-Cyberattacks
7.
Cha AE, Nakashima E. Google China cyberattack part of vast espionage campaign, experts say. The Washington Post [Internet]. 2010 Jan 14 [cited 2015 Oct 7]; Available from: https://www.washingtonpost.com/wp-dyn/content/article/2010/01/13/AR2010011300359.html
8.
IEEE Brings Together Top Security Specialists to Thwart Hackers – IEEE – The Institute [Internet]. [cited 2015 Oct 7]. Available from: http://theinstitute.ieee.org/technology-focus/technology-topic/ieee-brings-together-top-security-specialists-to-thwart-hackers
9.
[Infographic] APT Myths and Challenges | Malware Blog | Trend Micro [Internet]. [cited 2015 Oct 8]. Available from: http://blog.trendmicro.com/trendlabs-security-intelligence/infographic-apt-myths-and-challenges/
10.
Penetration Testing Software, Pen Testing Security [Internet]. Metasploit. [cited 2015 Oct 23]. Available from: http://www.metasploit.com/
11.
Practice of Network Security Monitoring | No Starch Press [Internet]. [cited 2015 Oct 7]. Available from: https://www.nostarch.com/nsm
12.
ISACA. Responding to Targeted Cyberattacks [Internet]. 2013 [cited 2015 Oct 7]. Available from: http://www.infosecurityeurope.com/__novadocuments/68602?v=635526169065300000
13.
ISACA. Responding to Targeted Cyberattacks – Google Books Preview [Internet]. ISACA; 2013. 88 p. Available from: https://books.google.se/books?id=trumJJrkZcwC
14.
Seculert_Report_on_Perimeter_Security_Defenses.pdf [Internet]. [cited 2015 Oct 7]. Available from: http://info.seculert.com/hubfs/Project_Kiwi/Seculert_Report_on_Perimeter_Security_Defenses.pdf
15.
TaoSecurity: What Is APT and What Does It Want? [Internet]. [cited 2015 Oct 7]. Available from: http://taosecurity.blogspot.se/2010/01/what-is-apt-and-what-does-it-want.html
16.
The APT Lifecycle [Internet]. Seculert. [cited 2015 Oct 7]. Available from: http://www.seculert.com/the-apt-lifecycle/
17.
The Cuckoo’s Egg [Internet]. Wikipedia, the free encyclopedia. 2015 [cited 2015 Oct 23]. Available from: https://en.wikipedia.org/w/index.php?title=The_Cuckoo%27s_Egg&oldid=677807113
18.
What APT Is (and what it isn’t) [Internet]. [cited 2015 Oct 7]. Available from: https://www.academia.edu/6842130/What_APT_Is
19.
Home, About, Blog, Data, Books, Workshops, et al. World’s Biggest Data Breaches & Hacks | Information is Beautiful [Internet]. [cited 2015 Oct 9]. Available from: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

GD Star Rating
a WordPress rating system
CyberSecurity: Expanded Look at the APT Life Cycle and Mitigation, 10.0 out of 10 based on 2 ratings

, , , , , , , , , Security

Leave a Reply