Threat model: how and why we categorized hackers

or a long time, we have divided cybercriminals into two groups: amateurs and professionals. The first were bombed with affordable malware and indulged in petty hooliganism. The latter developed their own utilities, aiming at big business and government. The approach is clear and simple. The only problem is that the hackers themselves have already gone beyond this pattern. And since you need to know the enemy by sight, then we at JSOC decided to approach the division of hackers and define their tools, methods and goals from the other side. As a result, we got 5 levels of intruders. In this post, we tried to outline how, in our opinion, hacker tools and approaches to attacks have changed and what different types of attackers are capable of, depending on their qualifications. We hope you find it interesting.

Attackers are growing in skill and attacks are becoming more sophisticated. The 2010s passed, when hackers quickly came, took the most valuable things (usually money) and left (if they had time). Now they need to gain access to the victim's infrastructure, to its key nodes and stay there incognito as long as possible. At the same time, targeted attacks are increasing, and attackers are increasingly choosing their specialization: they attack companies of a certain scale from a certain sector of the economy - based on what potential they feel in themselves and what goals they pursue.

What's in a hacker's arsenal

IDP obfuscation

As we said earlier, the attackers' toolbox has become more sophisticated. They began to use obfuscation methods much more often when writing malware. That is, obfuscation of the source code of the malware, which does not affect its performance and functionality, but complicates its analysis during decompilation. This way you can bypass the sandboxes and antivirus on the hosts. 

See how many tiny functional blocks and transitions are there in the code? This web hides the main malware algorithms, which, in turn, makes it almost guaranteed to deliver and run malware on the victim's host.

Hiding C&C through TOR nodes

An interesting approach is the attackers' approach when using TOR nodes (distributed network nodes between which encrypted traffic is transmitted). If earlier they were used only to deliver encryption keys and the very encryption of the victim's infrastructure, today they hide behind them the real addresses of the malware control centers. This approach significantly reduces the effectiveness of classic feeds that contain information about command centers on the network (IP addresses, websites).

If we take into account that the TOR node is more than 10,000, then all you have to do is either monitor the use of TOR networks in the organization and block them along the way, or accept, because no feeds can ever protect computers from the malware control center.

Smart malware

Modern malware is getting smarter. For example, they have learned to identify what they are doing in virtualization or stand environments. They detect the first by checking running processes. If the malware finds running VMware or Hyper-V items, it automatically goes to sleep. And when it gets to the test bench, malware takes a screenshot of the desktop and passes it on to the attacker, who can already conclude whether the infected host will be useful for him or not. It turns out that hackers now require much less time and effort to find a valuable resource.

The malware is sewn into the most ordinary photo, which was located on the well-known, and most importantly, legitimate photo-sharing hosting imgur.com. You see a full-fledged steganography demonstrating how and from where the photo was downloaded to the host, how after that part of the photo was reborn into malware, which did all the dirty work on the infected host.

Available vulnerabilities

The share of critical vulnerabilities is growing every year. The speed of their operation is also growing. Earlier it was Shellshock and EternalBlue, which were discussed and operated for 1.5 - 2 years. Today, it is a Citrix Netscaler vulnerability (allowing access to a company's internal network from the Internet), which knocked down many companies in just six months. Since this solution is very often used both in state corporations and in commercial companies, many have suffered who were not patched in time.

Or another example. The critical vulnerability of Zerologon was discovered recently, and we have not yet observed real cases of cyberattacks using this tool, but, obviously, its exploitation is not far off. At the same time, almost immediately after identifying Zerologon, we found it in Kali Linux.

According to our statistics, closing a vulnerability in an organization takes from 1 month to several years. Moreover, 1 month is in the most progressive banking sector. In government agencies, the process can take several months, or even years. We have seen such dinosaurs as WannaCry or WannaMine in the infrastructures of government customers.

Legitimate utilities

Here, the attackers act on the principle of "hide in the most conspicuous place." For example, American information security researchers have launched a special platform (ceye.io). The resource allows you to test vulnerabilities (conduct test attacks on organizations) and collect summary information. And since this is an open project, both white and gray hackers could register on it. The purpose of the former is to detect a vulnerability and inform the owner of the resource about it, the purpose of the latter is to use the found vulnerabilities for personal gain. The attackers took advantage of this. After registration, they began to "merge" data about companies, first into their personal account on the portal, and then pumped out all the information from there. The organizations themselves saw leaks, but decided that since this is a research portal, then, for sure, someone is conducting a penetration test or something similar, and did not block the resource.

Another option is to use the Nirsoft utility and the Powershell environment, which are legitimate administrative tools. Nirsoft can collect passwords from all browsers on the host, and Powershell, in turn, allows you to discreetly collect internal user data. Recently, cybercriminals have also begun to pay attention to centralized infrastructure management through legitimate services. Capturing a Kaspersky server and connecting to any host through it is a classic, both a pentest and a real cyber attack. The most critical option: if the resources are not being monitored, seize a domain controller and sit quietly on it in the company of admins and do whatever you want.

RDP and everything that is not covered

And how much pain did the pandemic bring us (and their opportunities) !? Many organizations switched to remote control in a quick and simple way, that is, through the RDP sticking out. A similar story with web services for videoconferencing. As a rule, they are not patched and are vulnerable to attacks from outside.

Banal situational phishing remains effective. A letter with statistics on COVID-19? Of course open up! Download the vaccination checklist? Naturally! What can we say about more sophisticated attacks, when the attackers refer to the victim by their full name and change the "o" to "0" in the domain.

In 2020, two new vectors of attacks also appeared (of course, they have always been, but now they have “played with new colors”). These are attacks on remote users (for example, through compromising VPN data or hacking and infecting home devices) and attacks through direct hacking of a contractor or finding a vulnerable entry point into the client's infrastructure.

Attacker levels

All this speaks of the stratification of attackers' approaches to attacks on infrastructure. There used to be two groups of hackers for us. The first used basic tools known to all (for example, exploitation of classic web vulnerabilities, mass phishing mailings, etc.). The second understood how to bypass the information security system, was aimed at fast monetization, but still acted quite straightforwardly and according to the scheme familiar to herself. In fact, there was a third group - government groups, which were distinguished by very high qualifications, but we did not meet with them in our practice. Now we note a clearer stratification of the skills of attackers and distinguish 5 levels of their qualifications:

Intruder category

Typical goals

Intruder Opportunities

Automated systems

Hacking devices and infrastructures with a low level of protection for further resale or use in mass attacks

Automated scanning

Cyber Bully / Lone Enthusiast

Hooliganism, violation of the integrity of infrastructure

Official and Open Source Security Analysis Tools

Cybercriminal / Organized Groups

Priority monetization of the attack: encryption, mining, withdrawal of funds

Customized tools, available malware, available vulnerabilities, social engineering

Cyber mercenaries / Advanced factions

Focus on commissioned work, espionage in the interests of competitors, subsequent large-scale monetization, hacktivism, destructive actions

Self-developed tools, purchased 0-day vulnerabilities

Cyber Troops / Pro-State Groups 

Cyber espionage, full capture of infrastructure for the ability to control and use any actions and approaches, hacktivism

Self-discovered 0-day vulnerabilities, developed and implemented "bookmarks"

From whom the antivirus will save

Automated systems (like automated scanners) try to exploit classic web vulnerabilities. In general, subject to the basic principles of information security and the presence of a standard set of information security systems, they are not terrible. But if the organization has an unprotected RDP with an "admin: admin" account, then most likely an automated system will be able to access such a host.

Cyber bullies (usually loners) are novice hackers who master the basic toolkit. Their arsenal includes various Open Source tools (remember at least Kali Linux). Basic defenses can be countered, provided they are configured correctly and there are no obvious unsecured servers. In a word, everything is the same as with automated systems. That is, they act on the principle of "quickly look at what you have on the perimeter." If your administrators or contractors make a mistake, then these pests will notice it right away. There are a lot of such "mother's hatskers" and some of them will definitely be lucky to stumble upon an open server or service.

WAF and Sandbox won't help anymore

Cybercrime is more complicated. These are organized groups that are primarily aimed at monetizing the attack, whether it be encryption followed by ransom and installation of miners or direct withdrawal of funds, for example, from banks.

Their main goal is to bypass basic defenses (sandboxes, antivirus, firewall, WAF). In addition, they are well aware of how cybersecurity works in organizations, because most often they themselves once worked there (and maybe they still work)... In addition, they have enough money to simply buy access to the organization they are interested in. Why waste time looking for an entry point when everything has already been done by some kind of automated systems? They also often buy well-known malware, but they know how to customize it. In addition, cybercriminals always have a few tricks from social engineering. For example, in 2020, they skillfully used the current topic of COVID-19 to infect computers of corporate users and from there gain access to the infrastructure. And here it becomes impossible to detect intruders without monitoring, because all of their techniques are designed to bypass basic defenses.

In a word, in the case of cybercriminals, basic information security systems are no longer enough. It is required to implement processes for monitoring information security incidents and patch management processes, as well as basic monitoring of information security and infrastructure. We are not talking about something supernatural, because so far such attackers have not learned how to bypass the SOC. It is enough to set up 20-30-40 scenarios to identify typical incidents.

When you need forensics

Cyber mercenaries use the same evasion techniques as previous attackers, but they do it in a much more professional manner. They exploit 0-day vulnerabilities at the stage of penetration and movement in the infrastructure, leave practically no traces on hosts, use malware that is executed in RAM, and use legitimate services, covering up traces after rebooting the equipment. As a result, it is almost impossible to detect signs of their presence without professional forensics.

The most tech-savvy category is the pro-government cyber group. Agree, when your customer is a state, you cannot lose face. Such cybercriminals can afford to spend time on their own searching for vulnerabilities for targeted attacks and developing their own malware.

To resist such hackers, it will not be enough just to collect logs from information security systems, critical servers and systems. You need maximum infrastructure coverage, network segmentation, control of terminal servers, control of privileged users, advanced monitoring with the use of additional components (NTA and EDR to control network traffic and everything that happens on hosts). In a word, a complete set!

Building a Kill Chain from separate, possibly not very significant incidents, as well as Threat Hunting and Silent Detected technologies at the stage of detecting incidents helps to detect villains who carefully cover their tracks and use multi-component attacks.

(с) egoriwe999

要查看或添加评论,请登录

Yehor Salo的更多文章

  • How to receive public ipv4 from AWS ECS via Terraform

    How to receive public ipv4 from AWS ECS via Terraform

    Hello everyone! I want to share with you my Terraform solution which allows to receive public IP address from Elastic…

    4 条评论
  • What is WAF?

    What is WAF?

    WAF (Web Application Firewall) - is a set of filtering conditions designed to detect and block attacks on a web…

  • Open source SAST and SCA analysis

    Open source SAST and SCA analysis

    Hello everyone! I will tell you about a free way for detecting possible or real vulnerabilities. What is SAST(Static…

  • Web 3.0

    Web 3.0

    Hello everyone! In this article, I want to discuss the new flow called Web3. But before we dive into that, let's…

    2 条评论
  • Difference between Terraform and Ansible

    Difference between Terraform and Ansible

    Hello everyone , it this article i will discource about theme "What diffrents between Terraform and Ansible tools for…

    10 条评论
  • How to hack SHA3-256

    How to hack SHA3-256

    Hello. In this article i will tell you few methods how you can hack this cryptographic hash function.

  • Создание отчета о тестировании на проникновение

    Создание отчета о тестировании на проникновение

    Многим доступным в настоящее время ресурсам для тестирования на проникновение не хватает написания отчетов. Методология…

  • Development of security policy

    Development of security policy

    Organizationally, the security policy determines the procedure for submitting and using user access rights, as well as…

  • How fast can hackers check compromised passwords?

    How fast can hackers check compromised passwords?

    Cybersecurity researchers from Agari decided to check how long it will take from the moment the password is leaked to…

  • Introducing Red Hat Advanced Cluster Security for Kubernetes

    Introducing Red Hat Advanced Cluster Security for Kubernetes

    Containers and microservices have triggered a tectonic shift in application infrastructure, and Kubernetes technology…

社区洞察

其他会员也浏览了