Targeted attacks - going beyond the technicalities

Filed Under: Data loss, Malware, Vulnerability

TargetSecurity Art's Iftach Ian Amit discusses targeted attacks and how you should go beyond just technology to defend against them.

Some people might be surprised to hear that most targeted attacks aren't directed at a specific individual or item of equipment. Although some strive to reach such victims, normally they focus on a small group of individuals or systems in order to carry out their task.

Targeted attacks are also tasked with greater goals than a traditional attack. For instance, they may intend to steal specific documentation, access custom systems, control or modify information, etc.), but they're not actually that technologically different from "traditional" attacks.

In my experience of the clients we have helped at Security Art, some attacks do utilize some of the most ingenious technologies and techniques. But at the end of the day, when you scrape off the "cool cloak" (custom hiding techniques to make the code bypass security technologies), you realize that we are still dealing with the same vulnerabilities, and the same rootkit and Trojan techniques.

Furthermore, we often see "common" (either commercial or private) tools being used to deploy limited scope attacks with only minor customizations that yield highly successful targeted attacks.

For example, in one of the recent jobs we had which involved tracking down a "generic" detection that kept popping up on a few networks we managed to find that:

* One of the websites that were on a specific person's "favorites" list has been compromised.

* The person in question had his Gmail account stolen (probably phished).

* The person in question had his Google web history turned on (which makes figuring out which sites are most likely to be visited by him/her a very easy task. Just check out your Google web history)

* The website that carried the infection hosted a packed and modified version of SpyEye - a Trojan kit that has proven itself pretty effective and customizable.

* The malicious piece of software was only eventually detected by the local anti-virus software as "generic" after some updates were added to the malware by the attacker. Chances are that they forget to include some of the earlier hiding techniques that they had used.

This dizzying array of events and links, from the specific person that was targeted, to the means of getting his work machine infected by infecting one of the sites that she frequents, to the use of a "commercial" Trojan kit to take over the work PC, is just one small example of the level of ingenuity that can be used in a targeted attack.

Armour
So how should we defend against a targeted attack?

As any good consultant will tell you ­ it's not just a technological battlefield.

Just as the attacks usually include a social engineering element, the defense should focus on the weak link: people. Most organizations, however, are still looking for a technical panacea to help them save the day and protect them from attacks.

It's true that a solid layered security approach is an important element in the defense. It should be maintained properly, and most importantly monitored and constantly challenge in order to build a good defensive strategy.

But from my perspective, just as you invest in all the technology and resources to monitor your organization, you should also invest in the business of making your business secure.

This means a true assessment of your business processes, coupled with the right controls, and a bit of proactive intelligence.

J­ust as we always say to "know your enemy" in terms of the technological aspects that are being deployed against you (ask any competent anti-virus lab), we also preach to know what your enemy is up to before they actually launch their attack (ask any incompetent politician/diplomat).

To sum up, the answer is never technological defenses. After all, the attack is never limited to the purely technical factors.

Targeted attacks are still going to be one of the toughest issues that any somewhat successful organization will deal with. Nothing will beat a good strategy that makes attack surfaces less obvious and more controlled.

Of course, this defense-in-depth strategy should not stop at preemptive intelligence and deterrence, but also take into account minimizing the detection and incident handling cycles in order to minimize the impact of successful attacks (because there's no such thing as 100% security).

, , ,

You might like

2 Responses to Targeted attacks - going beyond the technicalities

  1. Is google webhistory turned on for non-logged in users?

    • No it isn't, although you have to define "non-logged in"... In google terms this is somewhat fickle. even if you are logged out of gmail, you are still identified by the services that are lower down the chain of authentication requirements (i.e. google web history and iGoogle).

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Iftach Ian Amit is Vice President of Business Development at security consulting firm Security Art. Ian is a frequent speaker at the leading industry conferences such as BlackHat, DefCon, Infosec, Hacker-Halted, FIRST, BruCon, SOURCE, ph-neutral, and many more. You can follow him on Twitter at @iiamit.