Download presentation
Presentation is loading. Please wait.
Published byAshley Chapman Modified over 9 years ago
1
Advanced Persistent Threats (APT) Sasha Browning
2
Breakdown Advanced – Combination of attack methods and tools Persistent – Continuous monitoring and interaction – “Low-and-slow” approach Threat – Attacker is skilled, motivated, organized and well funded
3
What is an APT? Definition – Sophisticated attack that tries to access and steal information from computers Requirement – Remain invisible for as long as possible
4
Why are APTs Important? Then – Just because – Demonstrate their skills Now – Attacks have evolved – Specific targets – Intend to maintain a long term presence
5
Problem with APTs File size is small File names don’t raise any red flags Almost always are successful Undetectable until it's too late More frequent No one is immune
6
Targets.mil and.gov sites Department of Defense contractors Infrastructure companies – power and water CEOs or leaders of powerful enterprise or gov. agencies
7
Stages of an APT Attack 1. Reconnaissance 2. Intrusion into the network 3.Establishing a backdoor 4.Obtaining user credentials 5.Installing multiple utilities 6. Data exfiltration 7.Maintaining persistence
8
Step 1: Reconnaissance Research and identify targets – Using public search or other methods Obtain email addresses or IM handles
9
Step 2: Intrusion into the Network Spear-phishing emails – Target specific people – Spoofed emails – include malicious links or attachments Infect the employee's machine Gives the attacker a foot in the door
10
Step 3: Establishing a Backdoor Try to obtain domain admin credentials – grab password hashes from network DCs Decrypt credentials to gain elevated user privileges Move within the network – Install backdoors here and there – Typically install malware
11
Step 4: Obtaining User Credentials Use valid user credentials Average of 40 systems accessed using these credentials Most common type of credentials: – Domain admin
12
Step 5: Installing Multiple Utilities Utility programs conduct system admin. – Installing backdoors – grabbing passwords – getting emails Typically found on systems without backdoors
13
Step 6: Data Exfiltration Grab emails, attachments, and files Funnel the stolen data to staging servers – Encrypt and compress – Delete the compressed
14
Step 7: Maintaining Persistence Use any and all methods Revamp malware if needed
15
Problems with APTs Self-destructing malware – Erases if it fails to reach its destination Nobody monitors outbound traffic – Can look legitimate Sniffers – Dynamically create credentials to mimic communication
16
Disguising Activity Process injections – introduce malicious code into a trusted process – Conceals malicious activity Stub malware – Code with only minimal functionality – Remotely add new capabilities – Runs in the network’s virtual memory
17
Stopping APTs Weakness – Interactive access Solution – Find the link between you and the attacker – Block it Afterwards – Attacker will have to re-infect a new host
18
Summary Targets are carefully selected Persistent – Will not leave – Changes strategy/attack Control focused – Not financially driven – Crucial information It's automated, but on a small scale – Targets a few people
19
Questions
20
Sources Wired http://www.wired.com/threatlevel/2010/02/apt-hacks/ Dark Reading http://www.securityweek.com/anatomy-advanced-persistent-threat Damballa http://www.damballa.com/knowledge/advanced-persistent-threats.php
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.