text
stringlengths 4
429
|
---|
3 COMMUNICATIONS
|
VPN?
|
NORTHROP GRUMMAN
|
VPN?
|
INTERNATIONAL
|
MONETARY FUND
|
FIGURE 2
|
COMMONALITIES BETWEEN REPORTED ATTACKS
|
PAGE 7 OF 13
|
COPYRIGHT
|
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
|
ANATOMY OF AN ATTACK
|
Figure 2 shows us that the most common attack
|
vector observed is socially engineered emails
|
frequently, but not always, used in combination with
|
zero day exploits. While most victims do not provide
|
many details about the attacks against them, RSA 6 is
|
one of the few that has provided quite detailed
|
information. The attack methodology observed in
|
the case of RSA appears to be quite typical. The
|
distinct attack phases are shown in simplified form
|
in Figure 3. (Rivner, 2011)
|
techniques to target their intended victim. This may
|
include scanning to determine vulnerabilities,
|
writing malicious code or acquiring code, drafting
|
socially engineered emails, determining which email
|
account to send socially engineered emails from,
|
acquiring necessary hardware (such as USB flash
|
drives), determining what infrastructure to use to
|
launch the attack and for command and control
|
communications, registering for and setting up
|
necessary accounts (email addresses, callback
|
domains etc.) and conducting testing.
|
Targeting
|
Reconnaisance
|
Maintenance
|
Preparation
|
Data Gathering
|
Targeting
|
The attacker launches their attack and monitors for
|
signs of compromise or failure. The sender may
|
attempt to connect remotely to a server to exploit a
|
vulnerability, strategically place a USB flash drive or
|
give one to a target, send socially engineered emails
|
and if possible, check for bounce back notifications,
|
monitor command and control infrastructure for
|
beaconing activity from the victim, try to connect
|
inbound to the potentially compromised computer,
|
or await feedback from an insider.
|
Further Access
|
Further Access
|
FIGURE 3
|
BASIC APT ATTACK METHODOLOGY
|
Reconnaissance
|
The attacker passively gathers information about
|
their target to identify the best targeting method.
|
This may include research into the location of the
|
target
|
s offices, the location of their computers,
|
technologies used by the company, how they
|
communicate (between offices, with customers,
|
suppliers and shareholders), their employees, their
|
employees
|
contact details, interests and contacts.
|
Preparation
|
The attacker actively prepares for the attack,
|
developing and testing appropriate tools and
|
Once an attacker has successfully gained access to a
|
computer network they will usually try to identify
|
where in the network they are and move laterally
|
within the network to access data of interest and to
|
install additional backdoors. This will usually
|
require a return to step 2 (Preparation) and step 3
|
(Targeting), the upload of tools and malicious
|
software, privilege escalation, network enumeration
|
and identification of vulnerable hosts on which to
|
install backdoors. It may also involve gaining access
|
to the domain controller to obtain password hashes,
|
covering tracks by altering logs, and accessing mail
|
or file servers to enable data gathering.
|
Data Gathering
|
Once an attacker has identified information of
|
interest they will try to gather this information and
|
exfiltrate it. They may do this using a
|
smash and
|
grab
|
approach, trying to exfiltrate the desired data
|
before it is detected, or they may opt for a
|
low and
|
slow
|
approach in which they exfiltrate the data in
|
small quantities over a longer period.
|
6 The attack on RSA is described in a blog post on the official RSA
|
blog site; see http://blogs.rsa.com/rivner/anatomy
|
attack/
|
PAGE 8 OF 13
|
COPYRIGHT
|
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
|
Maintenance
|
Network Access Restrictions
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.