chris haley - understanding attackers' use of covert communications

32
© Vectra Networks | www.vectranetworks.com The Use of Covert Communications in Modern Cyber Attacks @vectra_networks CHRIS HALEY SECURITY CONSULTANT [email protected]

Upload: centralohioissa

Post on 13-Apr-2017

700 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

The Use of Covert Communications in Modern Cyber Attacks

@vectra_networks

CHRIS HALEY

SECURITY [email protected]

Page 2: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 2

Fundamental aspect of targeted attacks• “Low and slow” doesn’t exist without hidden

coms• Command and Control• Exfiltration

Many ways to hide• Attacker controls both ends of connection• Any application, protocol, encryption is

available

Hidden Communications

Page 3: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Targeted Threats

Opportunistic Threats

A closer look at the phases of an active cyber attack

3

Internal Recon

LateralMovement

Acquire Data

BotnetMonetization

Standard C&C

ExfiltrateData

Custom C&C& RAT

Custom C&C

Initial Infection

Page 4: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Focus on hidden communications

4

Internal Recon

LateralMovement

Acquire Data

BotnetMonetization

Standard C&C

ExfiltrateData

Custom C&C& RAT

Custom C&C

Initial Infection

Page 5: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 5

Targeted attackers don’t reuse C&C servers … typically

Use of Domain Generation Algorithms (DGA)

Protocols: DNS, IRC, HTTP, HTTPS

Dropbox, Google Drive, Gmail

Reuse = Getting Caught

Page 6: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 6

Requirements for detecting covert communications

Look at behavior, not appearance• IP address, URL, protocol can change• Fundamental behavior will not

Direct access to traffic• To find what others miss, you must have

access to the real evidence, not summaries

Expect obfuscation• Hiding is the name of the game

Page 7: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Types of machine learning

Software analyzes local traffic to learn “normal” behaviors

Reveals anomalies that can only be learned in the target network

Requires time to learn

Analyze massive set of samples to find the behaviors common to all

Finds inherent behavior to provide detections with a long shelf-life

Fast, no local learning required

Supervised Learning Unsupervised Learning

Page 8: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Hiding within encryption

Page 9: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 9

Threat hiding within encrypted traffic

More traffic is encrypted by default• Standard for cloud applications• Doubled last year in North America*

Decryption more difficult• Serious performance trade-offs• Increase in certificate pinning

makes decryption less reliable

Simple hiding place for attackers• Owns both sides of the connection• Standard SSL or custom scheme*Source: Sandvine Internet Phenomena Report

Page 10: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Poll Question #1Do you decrypt your network traffic for security inspection today?

A. Yes, all traffic is decryptedB. Some traffic is selectively decrypted by policyC. No traffic is decryptedD. I do not today but am planning to in the future

Page 11: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Summary of Vectra

While the individual man is an insoluble puzzle, in the aggregate he becomes a mathematical certainty

- Sherlock Holmes

Page 12: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 12

Behavioral traffic analysis can find threats without decryption

Data science models applied directly to traffic reveals the underlying behavior• Communication cadence• Which side is in control of the

conversation?• Human or automated? Learn the distinctive

patterns of malicious traffic• Command-and-control

instructions• External remote access• Malware update, tunnels,

anonymizers, etc.

Page 13: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Hidden Tunnels

Page 14: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Hidden tunnels

What are hidden tunnels?• Techniques used by attackers to

hide their malicious communications within commonly allowed traffic and protocols

• Commonly seen in HTTP, HTTPS, DNS

• Example: Data or control messages embedded in optional fields of a packet

Page 15: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Types of hidden tunnels

Hidden messages embedded across many sessions• E.g. data embedded within DNS text field

• Difficult for signatures to detect as placement can constantly move

• Requires intelligence to the larger pattern of communication

Full tunnels over HTTP• e.g. Meterpreter tunnel over HTTPS

• Hard to detect as visibility may be constricted

• Requires in depth knowledge of protocol behavior

Page 16: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Recent Vectra study of hidden tunnels

Large-scale analysis of enterprise and government networks

Data science detects hidden tunnels in HTTP, HTTPS, and DNS without decryption

Attackers prefer the use of HTTPS

16

Page 17: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Hiding within allowed applications

Page 18: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 18

Hiding within allowed applications

Recently observed malware using Gmail as an automated C&C

Used Microsoft COM to send Python commands directly through Internet Explorer

Drafts automatically synced to cloud, so C&C without mail ever being sent

Page 19: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Focus on what threats do, not what they are called

Trying to name all bad things only ensures that you are always behind• Near infinite supply of repackaged malware, IP

addresses, and URLs

Vectra uses machine learning to expose the true purpose and effect of traffic

Malicious behaviors are similar across platforms• Does it really matter if that port scanner is on

laptop or iPhone?

Page 20: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

It’s what it does, not what it is

Command and control via Gmail• Trusted application, trusted URL, trusted IP,

allowed behavior

• No email ever sent

Communication behavior still looks like traditional botnet pulling behavior• Unique pattern of call and response

• Bot completes a task and asks for next instructions

Page 21: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 21

Page 22: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Poll Question #2

Of the allowed applications in your network, which ones do think pose the greatest risk of a cyber attack?

A. Consumer cloud-based applications – Facebook, webmail, dropbox, etc.

B. Enterprise cloud-based applications – File shares, CRM tools.

C. On premise applications and data stores.D. IT and Admin tools.

Page 23: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

External Remote Access

Page 24: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 24

External Remote Access

Critical component of targeted attacks and breachesShift from pure malware to human control and intelligenceCan leverage malware or approved tools• RATs – Remote Access Tools• Administrative tools – RDP, VNC,

TeamViewer

Page 25: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 25

External remote access case study: GlassRAT

Undetected for over 3 years• Discovered by RSA Security• Used a cert of a valid

software company in China• No AV coverage initially• Rare overlaps with C&C

servers used in nation-state attacks

Source: https://blogs.rsa.com/wp-content/uploads/2015/11/GlassRAT-final.pdf

Page 26: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 26

External remote access case study: GlassRAT

Highly successful at avoid signaturesBehavior still looked exactly like a RAT• Similar to Netcat connected

to a command shell over TCP

Page 27: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com

Anonymization

Page 28: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 28

TOR and Peer-to-Peer

Obscures the true source or destination of trafficEncrypted by defaultHeavily customized by attackers• Open-source TOR modified to

create TOR-like networks that don’t use known exit nodes

• P2P heavily used by malware to resist takedown attempts

Page 29: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 29

Finding staged communications

Identify when traffic is bounced through internal hosts• Often used for exfiltration staging• Routing command-and-control through an unsecured device

Page 30: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 30

IoT Devices

Difficult to secure• Typically easy to exploit• Very infrequent updates• Can’t support an end-point

agent

Valuable to attackers• Vectra ThreatLabs recently

turned a DLink webcam into a functioning backdoor

Page 31: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com 31

Summary

Hidden communications are the underlying enabler of modern attacksControl over both ends of a conversation gives attackers a variety of options for hidingSignatures are unsuited for finding these issuesBy focusing on the packet-level behavior, new detection models can reveal the malicious actions within trusted or opaque traffic.

Command & Control

Botnet Activity

Reconnaissance

Lateral Movement

Exfiltration

Page 32: Chris Haley - Understanding Attackers' Use of Covert Communications

© Vectra Networks | www.vectranetworks.com© Vectra Networks | www.vectranetworks.com