text
stringlengths 4
429
|
---|
In the interest of full disclosure, Triumfant had no direct interaction with the attack either directly on Triumfant |
s own |
endpoints or indirectly through a Triumfant customer. The analysis is based on detailed information collected through a |
variety of publically available research performed by reliable sources that performed hands-on analysis of the attack. |
Based on this research, Triumfant is fully confident that our software would have detected the attack and built a |
remediation that would have restored the machine to its pre-attack condition. |
The Operation Aurora attack falls squarely into one of the classes of attacks that Triumfant excels at detecting: targeted |
attacks engineered to evade traditional network and endpoint protections. While the actual attack vector used was not |
exceptionally sophisticated, the attack was created to have a digital signature that would not be detected by antivirus |
tools. The attack also took steps to protect and obscure itself from detection once it infected a machine. The case study |
steps through the process in four parts: initial detection, diagnosis, the assimilation of data about the attack into the |
Triumfant knowledge base, and remediation of the affected machine. |
Detection |
The malicious code used by Operation Aurora created several service keys during three specific steps: execution of the |
dropper, the first stage of installation, and the second stage of installation. Some of these keys are subsequently deleted |
but at least one was persistent. The appearance of one or more of these keys would be interpreted as a marker of |
potential malicious activity by the Triumfant real-time malware scan and would therefore trigger the detection process. |
The first step in the detection process would be a request by the agent to the server requesting permission for the agent |
to execute a full scan of the machine. The purpose of this scan is to capture all of the changes to that machine since the |
previous scan results were processed as part of the normal agent/server interaction that occurs every 24 hours. The |
Triumfant server would respond within seconds, authorizing the scan and throttling up the agent to complete the scan as |
rapidly as possible, collecting all 200,000 plus attributes in under a minute. The resulting scan would captures the state |
of the machine immediately after infection, providing the raw material for diagnosis so the analytics could verify the |
machine is under attack and identify all of the primary and secondary artifacts of the attack. |
Diagnosis |
The Triumfant server would receive the full scan, recognize that it was executed as a result of suspicious behavior, and |
immediately compare it to the adaptive reference model (the unique context built by our patented analytics). The result |
of this comparison would be a set of anomalous files and registry keys. The fact that the files and keys associated with |
Operation Aurora have random names would guarantee that they would be perceived as anomalous despite the fact that |
humans might tend to confuse them with legitimate Windows services. Further analysis would then be applied to the |
anomaly set to identify important characteristics and functional impacts. In this case the salient characteristics are an |
anomalous service and a number of anomalous system32 files. |
The discovery of an anomalous service would cause the Triumfant server to build a probe to be sent to the agent for |
execution to gather more data to complete the analysis. In this case, the probe would contain a list of all of the |
anomalous attributes found by the server during its analysis. Such probes leverage a series of correlation functions |
designed to partition the anomalous attributes associated with an attack into related groups. For Operation Aurora |
these correlation functions would group all of the anomalous attributes and then perform a risk assessment on this |
group. In this specific case, this analysis would find that the malicious attack is communicating over the internet. |
The cumulative results of the correlation and risk assessment would then be sent back to the Triumfant server. This new |
information is then processed and classified as an |
Anomalous Application |
with a complete analysis of the changes that |
composed the attack. This data would show the full set of changes associated with the attack such as files, registry keys, |
2010 |
Triumfant, Incorporated |
CASE STUDY: OPERATION AURORA |
processes, ports, services, and event logs that were added, changed, or deleted as part of the attack. The data about the |
attacks would be posted at the console and the Triumfant server would alert the appropriate personnel based on the |
established reporting and alert protocols. Personnel could then access the correlated attack information and the |
corresponding risk assessment who could then take appropriate actions including the ability to save the analysis to |
readily share the data with CIRT and forensics teams. |
Knowledge Base |
Triumfant has the ability to save the analysis from any anomalous activity and leverage that data to create what |
Triumfant calls a Recognition Filter that becomes a permanent part of the knowledge base contained in the adaptive |
reference model. These Recognition Filters have a number of benefits. First, they provide a very precise mechanism for |
storing and sharing knowledge about an incident. Second, they allow the system to search for any other instances of |
that particular condition on other machines. Third, they enable the operator to pre-authorize automatic responses such as automatic remediation - should that incident be detected in the future. |
In the case of Operation Aurora, an analyst could save the analysis and build a filter specifically about this attack. Once |
built, the filter could be used to check other endpoint machines (the entire population or specified groups) for |
infection. This mechanism uses acquired knowledge to address broad attacks before they have the chance to spread |
beyond their initial penetration. These filters are also more resilient than digital signatures because they use wildcarding |
to continue to detect the attack even as it morphs its basic signature over time to avoid traditional signature based tools. |
Remediation |
The ability to identify and correlate all of the changes associated with any attack provides a depth of information that |
enables Triumfant to build a contextual and situational remediation that surgically and reliably removes the components |
of that attack without reimaging the machine. This remediation is built to exactly match the attributes of the anomalous |
application, in this case Operation Aurora, on an attribute by attribute basis. |
For Operation Aurora, Triumfant would construct a remediation to address all of the changes associated with the attack, |
restoring the altered attributes to their pre-attack condition. This includes the changes Aurora makes to affected |
machine |
s configuration settings to either execute or hide itself. The files added to the machine would be deleted, and |
any files deleted or corrupted would be remediated using Triumfant |
s patent pending donor technology. |
Summary |
Operation Aurora is illustrative of the targeted and well engineered attacks that characterize the evolving threats |
businesses and government agencies face daily. Based on the available data regarding Operation Aurora, Triumfant can |
say with confidence that Resolution Manager would have detected the attack, identified changes associated with the |
primary and collateral damage done to the affected machines, and used that data to build a remediation to address the |
specific elements of the attack. Within five minutes of the infection Triumfant would have analyzed the attack and |
created a remediation to return the machine to its pre-attack condition pending confirmation by the administrator. This |
ability to detect and remediate the attacks that evade traditional endpoint protections demonstrates the unique |
capabilities of Triumfant |
s technology. |
Triumfant uses two continuous scan cycles. One is a scan for markers of malicious activity that runs approximately |
every thirty seconds. The second is a continuous scan of every attribute on the machine that identifies and collects |
changes to those attributes and communicates them to the server on a 24 hour reporting cycle. |
Triumfant leverages the knowledge contained in the adaptive reference model to find another machine that has the |
proper version of corrupted or missing files |
validated to the specific release number and MD5 hash - and uses that |
machine as a donor to repair the affected machine. This technology is patent pending. |
2010 |
Triumfant, Incorporated |
OPERATION |
AURORA |
February 10, 2010 |
Cyber Espionage is a critical issue. Over 80% of intellectual property is stored online digitally. The computing |
infrastructure in a typical Enterprise is more vulnerable to attack than ever before. Current security solutions are |
proving ineffective at stopping cyber espionage. Malware is the single greatest problem in computer security today. |
Yet, malware represents only the tip of the spear. The true threat is the human being who is operating the malware. |
This human and the organization represented is the true threat that is targeting information for the purposes of |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.