{"id":2108,"date":"2017-11-22T21:01:02","date_gmt":"2017-11-23T05:01:02","guid":{"rendered":"https:\/\/new.acalvio.com\/?p=2108"},"modified":"2017-11-22T21:01:02","modified_gmt":"2017-11-23T05:01:02","slug":"technical-white-paper-using-deception-to-detect-spreading-techniques","status":"publish","type":"post","link":"https:\/\/acalvio.p2staging.us\/index.php\/2017\/11\/22\/technical-white-paper-using-deception-to-detect-spreading-techniques\/","title":{"rendered":"Technical White Paper : Using Deception to Detect Spreading Techniques"},"content":{"rendered":"<p>The severity of any infection will get multiplied when it employs spreading technique. Ransomware which has been one of the critical threat for quite some time have been able to increase its effect by spreading to the mapped and unmapped drive. In the recent past threat actors have made use of remote code execution (such asB <a href=\"https:\/\/www.acalvio.com\/wannacry-ransomware-analysis-lateral-movement-propagation\">WannCry<\/a>), harvesting credentials from memory (such asB <a href=\"https:\/\/www.acalvio.com\/technical-analysis-of-petya\">Petya<\/a>B ,<a href=\"https:\/\/www.acalvio.com\/how-to-outfox-shamoon-put-deception-to-work\">Shamoon<\/a>), harvesting email addresses from the address book to spread inside the network.<br \/>\nTraditional defenses are aimed to detect and stop an attack.B <a href=\"https:\/\/www.acalvio.com\/product\">Deception-centric architecture<\/a>B differs from the traditional architecture; it is not only used to identify an ongoing threat, but also to divert the threat to an engagement platform to gather every malicious indicator of a multistage of attack. Once every malicious indicator of attack is captured then it can be used for many purposes such as to attribute a multi-stage attack to a threat actor, quarantine the infected computers, protect against theB <a href=\"https:\/\/www.acalvio.com\/looking-deeper-into-a-multi-stage-attack\">variation of an attack.<\/a><br \/>\n<img loading=\"lazy\" class=\"aligncenter size-full wp-image-1768\" src=\"https:\/\/new.acalvio.com\/wp-content\/uploads\/2018\/03\/worms.png\" alt=\"\" width=\"658\" height=\"363\" srcset=\"https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2018\/03\/worms.png 658w, https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2018\/03\/worms-300x166.png 300w\" sizes=\"(max-width: 658px) 100vw, 658px\" \/><\/p>\n<div class=\"section post-body\">\nIn the technical white paper, we first dive deep at the source code level to share the details of the spreading techniques which has actively been used by the worms. B The paper then discusses the static breadcrumbs or lures which is used to detect and divert these multi-stage attack to the deception platform. The technical paper also introduces dynamic breadcrumbs. Dynamic breadcrumbs are the values which get projected in real time when a process is declared to be malicious. It is a definite manner of diverting a multistage threat to a deception platform.<br \/>\nIn future, we expect to see more and more threats which will be multistage and will make of spreading techniques. Deception centric architecture is a powerful architecture to not only detect an attack but also gather every malicious indicator of an attack. Identification of every malicious indicator of attack will then aid to identify the threat actors, and the IoCb\u0000\u0019s can be used to quarantine the infected machines.<br \/>\nDownload technical white paper here: <a href=\"https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2018\/07\/Spreading-Techniques-and-Deception-based-Detection-Acalvio-Technical-White-Paper.pdf\">Spreading Techniques and Deception-based Detection &#8211; Acalvio Technical White Paper<\/a>.<br \/>\n<strong>References:<\/strong><br \/>\n[1] Shamoon,B <a href=\"https:\/\/securelist.com\/from-shamoon-to-stonedrill\/77725\/\">https:\/\/securelist.com\/from-shamoon-to-stonedrill\/77725\/<\/a><br \/>\n[2] WannaCry,B <a href=\"https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/security-center\/white-papers\/istr-ransomware-2017-en.pdf\">https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/security-center\/white-papers\/istr-ransomware-2017-en.pdf<\/a><br \/>\n[3] Recent Resurgence in Shamoon,<a href=\"https:\/\/community.rsa.com\/community\/products\/netwitness\/blog\/2017\/02\/08\/recent-resurgence-in-shamoon\">https:\/\/community.rsa.com\/community\/products\/netwitness\/blog\/2017\/02\/08\/recent-resurgence-in-shamoon<\/a><br \/>\n[4]B New ransomware, old techniques: Petya adds worm capabilities,<br \/>\n<a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2017\/06\/27\/new-ransomware-old-techniques-petya-adds-worm-capabilities\/\">https:\/\/blogs.technet.microsoft.com\/mmpc\/2017\/06\/27\/new-ransomware-old-techniques-petya-adds-worm-capabilities\/<\/a><br \/>\n[5]B Google says the fake Google Doc worm that went viral affected fewer than 0.1% of Gmail users,<br \/>\n<a href=\"http:\/\/www.businessinsider.com\/google-doc-phishing-worm-affected-fewer-than-01-of-gmail-users-2017-5\">http:\/\/www.businessinsider.com\/google-doc-phishing-worm-affected-fewer-than-01-of-gmail-users-2017-5<\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The severity of any infection will get multiplied when it employs spreading technique. Ransomware which has been one of the critical threat for quite some time have been able to increase its effect by spreading to the mapped and unmapped drive. In the recent past threat actors have made use of remote code execution (such [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1768,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[87,116,140],"_links":{"self":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/2108"}],"collection":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/comments?post=2108"}],"version-history":[{"count":0,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/2108\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media\/1768"}],"wp:attachment":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media?parent=2108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/categories?post=2108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/tags?post=2108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}