Advanced Persistent Threats (APT) Sasha Browning Breakdown • Advanced – Combination of attack methods and tools • Persistent – Continuous monitoring and interaction – “Low-and-slow” approach • Threat – Attacker is skilled, motivated, organized and well funded What is an APT? • Definition – Sophisticated attack that tries to access and steal information from computers • Requirement – Remain invisible for as long as possible Why are APTs Important? • Then – Just because – Demonstrate their skills • Now – Attacks have evolved – Specific targets – Intend to maintain a long term presence Problem with APTs • File size is small • File names don’t raise any red flags • Almost always are successful • Undetectable until it's too late • More frequent • No one is immune Targets • .mil and .gov sites • Department of Defense contractors • Infrastructure companies – power and water • CEOs or leaders of powerful enterprise or gov. agencies Stages of an APT Attack 1. 2. 3. 4. 5. 6. 7. Reconnaissance Intrusion into the network Establishing a backdoor Obtaining user credentials Installing multiple utilities Data exfiltration Maintaining persistence Step 1: Reconnaissance • Research and identify targets – Using public search or other methods • Obtain email addresses or IM handles Step 2: Intrusion into the Network • Spear-phishing emails – Target specific people – Spoofed emails – include malicious links or attachments • Infect the employee's machine • Gives the attacker a foot in the door Step 3: Establishing a Backdoor • Try to obtain domain admin credentials – grab password hashes from network DCs • Decrypt credentials to gain elevated user privileges • Move within the network – Install backdoors here and there – Typically install malware Step 4: Obtaining User Credentials • Use valid user credentials • Average of 40 systems accessed using these credentials • Most common type of credentials: – Domain admin Step 5: Installing Multiple Utilities • Utility programs conduct system admin. – Installing backdoors – grabbing passwords – getting emails • Typically found on systems without backdoors Step 6: Data Exfiltration • Grab emails, attachments, and files • Funnel the stolen data to staging servers – Encrypt and compress – Delete the compressed Step 7: Maintaining Persistence • Use any and all methods • Revamp malware if needed Problems with APTs • Self-destructing malware – Erases if it fails to reach its destination • Nobody monitors outbound traffic – Can look legitimate • Sniffers – Dynamically create credentials to mimic communication Disguising Activity • Process injections – introduce malicious code into a trusted process – Conceals malicious activity • Stub malware – Code with only minimal functionality – Remotely add new capabilities – Runs in the network’s virtual memory Stopping APTs • Weakness – Interactive access • Solution – Find the link between you and the attacker – Block it • Afterwards – Attacker will have to re-infect a new host Summary • Targets are carefully selected • Persistent – Will not leave – Changes strategy/attack • Control focused – Not financially driven – Crucial information • It's automated, but on a small scale – Targets a few people Questions Sources • Wired http://www.wired.com/threatlevel/2010/02/apt-hacks/ • Dark Reading http://www.securityweek.com/anatomy-advanced-persistent-threat • Damballa http://www.damballa.com/knowledge/advanced-persistent-threats.php