{"id":2207,"date":"2018-04-02T17:17:32","date_gmt":"2018-04-03T00:17:32","guid":{"rendered":"https:\/\/www.acalvio.com\/?p=2207"},"modified":"2018-04-02T17:17:32","modified_gmt":"2018-04-03T00:17:32","slug":"detection-of-prevalent-threats-by-distributed-deception","status":"publish","type":"post","link":"https:\/\/acalvio.p2staging.us\/index.php\/2018\/04\/02\/detection-of-prevalent-threats-by-distributed-deception\/","title":{"rendered":"Detection of Prevalent Threats by Distributed Deception"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Todayb\u0000\u0019s breaches are overwhelmingly carried out in a series of sophisticated, multi-stage attacks. <\/span><span style=\"font-weight: 400;\">The stages of such attacks can best be described by a b\u0000\u001cCyber Kill Chain,b\u0000\u001d which as per MITRE ATT&amp;CK Adversary Tactic Model [1] breaks down cyber intrusions into the steps shown in figure 1.0.<\/span><br \/>\n&nbsp;<br \/>\n<img loading=\"lazy\" class=\"alignnone wp-image-2287\" src=\"https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2018\/06\/image1-1024x235-1.png\" alt=\"\" width=\"600\" height=\"138\" \/><\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\"> B B B <\/span><b>B B B B B B Figure 1.0 MITRE ATT&amp;CK Adversary Tactic Model<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In the table 1.0, I have discussed six critical multi-stage attacks. I have precisely listed the breadcrumbs and lures that are required at the endpoint and deceptions on the network to detect and divert these threats. The table further lists the conditions which when triggered will raise the alarm for breach and the stage where the threat will get discovered. This stage is as per the ATT&amp;CK Matrix for Enterprise[1].<\/span><span style=\"font-weight: 400;\"> B Based on the nature of the threat, once an alert for a breach is raised it can trigger appropriate automated responses. Examples of responses include: isolation of the infected endpoint, B SOC Alert for remediation, etc. <\/span><br \/>\n<span style=\"font-weight: 400;\"> The six threat families considered in this blog are::<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ransomware[5]<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Crypto Miner[2]<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Breaches leveraging Web Servers for entry [4]<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Destructive malware (such as Shamoon[3] and Petya[6])<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Information stealers<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Password stealers <\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In our blogs listed in references, we have discussed the exploitation steps of these threats. These threats also have been covered extensively within the research community.<\/span><br \/>\n<img loading=\"lazy\" class=\"alignnone wp-image-2288 size-large\" src=\"https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2018\/06\/Image-2-1024x678-1.gif\" alt=\"\" width=\"1024\" height=\"678\" \/><br \/>\n<span style=\"font-weight: 400;\">By using a distributed deception platform, two of these threat families (ransomware and password stealers) is detected in the execution phase. The other four are identified during the lateral movement phase when the attacker is attempting to spread to other machines.<\/span><br \/>\n<span style=\"font-weight: 400;\">Based on the analysis shown in the table following is the takeaway:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Deception centric architecture detects the second or subsequent stage of payload, and hence the detection of distributed detection becomes independent of the vulnerability which is exploited at the first stage. The first stage can make use of 0-days, or it can make use of the known vulnerability or even socially engineer humans into giving them access via phishing or socially-engineered malware, a deception-centric architecture will raise an alert if the second or subsequent phase touches the deceptions.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">In many of the cases such as breaches involving web server, detection of information stealer, detection of crypto miners, detection of destructive malware presented in the table above, distributed deception architecture is capable of detecting threat actor or worm after it has breached an organization before the final intent is completed. The algorithm or the techniques leveraging deception which is used to identify the threat is generic, i.e., it is independent of the purpose of the worm or the threat actor.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The capability of detecting worm or an adversary independent of the first stage and detecting a breach in a generic manner independent of the final intent makes it a recommended architecture to prevent sophisticated breaches.<\/span><br \/>\n<b>References<\/b><br \/>\n<span style=\"font-weight: 400;\">[1]<\/span><span style=\"font-weight: 400;\"> B ATT&amp;CK Matrix for Enterprise,<\/span><a href=\"https:\/\/attack.mitre.org\/wiki\/Main_Page\"> <span style=\"font-weight: 400;\">https:\/\/attack.mitre.org\/wiki\/Main_Page<\/span><\/a><br \/>\n<span style=\"font-weight: 400;\">[2] B WannMine lateral Movement techniques,<\/span><br \/>\n<a href=\"https:\/\/www.acalvio.com\/wannmine-lateral-movement-techniques\/\"><span style=\"font-weight: 400;\">https:\/\/www.acalvio.com\/wannmine-lateral-movement-techniques\/<\/span><\/a><br \/>\n<span style=\"font-weight: 400;\">[3] How to outfox Shamoon, put deception to work,<\/span><br \/>\n<a href=\"https:\/\/www.acalvio.com\/wannmine-lateral-movement-techniques\/\"><span style=\"font-weight: 400;\">https:\/\/www.acalvio.com\/wannmine-lateral-movement-techniques\/<\/span><\/a><br \/>\n<span style=\"font-weight: 400;\">[4] Deception Centric Architecture to prevent breaches involving Web Server,<\/span><br \/>\n<a href=\"https:\/\/www.acalvio.com\/deception-centric-architecture-to-prevent-breaches-involving-webserver\/\"><span style=\"font-weight: 400;\">https:\/\/blog.acalvio.com\/deception-centric-architecture-to-prevent-breaches-involving-webserver\/<\/span><\/a><br \/>\n<span style=\"font-weight: 400;\">[5] Deception centric defense against the Ransomware<\/span><br \/>\n<span style=\"font-weight: 400;\">. .<\/span><a href=\"https:\/\/www.acalvio.com\/deception-centric-defense-against-ransomware\/\"><span style=\"font-weight: 400;\">https:\/\/www.acalvio.com\/deception-centric-defense-against-ransomware\/<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Todayb\u0019s breaches are overwhelmingly carried out in a series of sophisticated, multi-stage attacks. The stages of such attacks can best be described by a b\u001cCyber Kill Chain,b\u001d which as per MITRE ATT&amp;CK Adversary Tactic Model [1] breaks down cyber intrusions into the steps shown in figure 1.0. &nbsp; B B B B B B B [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4528,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/2207"}],"collection":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/comments?post=2207"}],"version-history":[{"count":0,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/2207\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media\/4528"}],"wp:attachment":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media?parent=2207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/categories?post=2207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/tags?post=2207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}