text
stringlengths
4
429
Once an attacker has gained access to a network for
information gathering purposes they will usually
attempt to maintain their access. This may involve
minimising the amount of malicious activity they
generate on the network to avoid detection,
periodically communicating with backdoors on the
network to ensure they are working as intended,
and making changes as appropriate. If automated
data gathering tools are in use, it may also involve
modifying search terms or the exfiltration path,
volume or frequency. Maintenance also requires
maintaining callback domains and any intermediary
infrastructure used to communicate with the
backdoors. If access is lost, the attacker may return
to step 1 (Reconnaissance) or step 2 (Preparation)
in an attempt to regain access.
Restrict which computers can be placed on the
corporate network via wired, wireless, and remote
access methods.
IMPROVING ORGANISATIONAL RESILIENCE
To improve resilience to APTs organisations should
employ good security practices and policies
including those described below.
Information Centric Security
Adopt an information centric approach to security
by applying multiple layers of security, affording the
most sensitive information the most protection. If
possible store sensitive information offline, or on a
separate restricted access network.
Regular Patching
Regularly patch operating systems and applications
including document viewers (e.g. Microsoft Office,
Adobe Acrobat) and web browser plugins.
Known Network Topology
Ensure system administrators are aware of the
location of all computers, computer equipment and
Internet gateways so they can secure the network
(including wireless access points and 3G USB
modems).
USB Drive Control
Restrict which USB drives can be used on corporate
networks and develop policies on permitted usage
and minimum encryption requirements.
Intrusion Analysis
Conduct intrusion analysis (both host
based and
network based) to detect anomalous activity.
Access Control
Employ two
factor authentication where possible,
particularly on Virtual Private Networks. Restrict
user access using least privilege methodology,
encourage good password control, regularly audit
access logs, and review access levels.
Sender Policy Framework
Employ the Sender Policy Framework 7 to help
protect against spoofed emails.
Computer Administration Restrictions
Minimise administrative access and restrict access
so users do not possess both
write
and
execute
privileges for the same folder.
User Education
Educate users on the threat from socially engineered
emails and other forms of social engineering.
Encourage users to notify IT staff of suspicious
events.
7 The Sender Policy Framework is an open standard specifying a
technical method to prevent sender address forgery. (Mehnle,
2010)
PAGE 9 OF 13
COPYRIGHT
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
REFERENCES
AAP. (2010, April 19). Mining firms hit by China cyber attack. Retrieved June 13, 2011, from The Sydney Morning
Herald: http://www.news.smh.com.au/breaking
news
national/mining
firms
china
cyber
attacks
20100419
spc9.html
AFP. (2011, March 07). French government comes under cyber attack. Retrieved June 13, 2011, from The Age:
http://news.theage.com.au/breaking
news
world/french
government
comes
under
cyber
attack
20110307
1bl8z.html
Anastasio, M. (2007, December 06). Los Alamos also hacked. Retrieved June 13, 2011, from Frank Munger's Atomic
City Underground: http://blogs.knoxnews.com/munger/2007/12/los_alamos_also_hacked.html
Arquila, J. (2003, March 04). Interviews