STE WILLIAMS

The 5 Challenges of Detecting Fileless Malware Attacks

Simply applying file-based tools and expectations to fileless attacks is a losing strategy. Security teams must also understand the underlying distinctions between the two.

Fileless malware attacks can be seen as the perfect crime of opportunity. The initial vector of an attack appears as a seemingly innocuous business email with a link to a bill or other update. However, hiding within that link could be a page with JavaScript that opens the door to a greater threat. That script could stay fully fileless as it runs behind the scenes, accessing PowerShell and making commands to the user’s machine. In a worse case, it might use that user’s credentials to seek out other places to access.

Given the speed of today’s business networks and the computers on them, this malicious form of attack needs only a few seconds to start the damage and begin to propagate. That damage could be inflicted in many ways, and its results could be deadly for an organization whose data is now at risk of being removed, destroyed, or encrypted. Further complicating the problem, as the IT and security teams comb through their data to see how such an attack began, there’s simply no evidence to find. It’s as if someone has evaded all the layers of security and stolen the crown jewels without leaving a trace.

While fileless attacks present a real danger to organizations, their risks can be mitigated. The first step in protecting your environment is education. Teams need to view file-based and fileless malware as two completely different types of attacks. Simply applying file-based tools and expectations to fileless attacks is a losing strategy. Organizations also need to understand five important distinctions between the two:

1. Analyzing fileless code in an OS-agnostic method: Malicious attacks are often designed to operate on a specific operating system and product patch level configuration. This is known as the “Goldilocks Principal.” For example, a threat might require a specific version of Windows and that Firefox be installed, both at a specific patch level. This specificity is one method by which attackers can target individual systems and avoid detection by sandboxes or other environment-restricted defenses.

2. Identifying and analyzing concealed and obfuscated code: Fileless attacks often make use of techniques that conceal or obfuscate the malware, causing detection tools to incorrectly label the code as benign or even fail to analyze the traffic in the first place. For example, fileless exploits attempt to conceal malware code using obfuscation techniques such as XOR or string encoding. Fileless attack code can also be obfuscated within seemingly harmless PDF or Microsoft Office documents.

3. Detecting a broad spectrum of fileless attacks with no impact on network and host performance: Fileless attacks are hidden within the web-based transactions going on within a network. To isolate them from the majority of benign activity, all web traffic using JavaScript must be analyzed. Why is this a challenge? Almost all web pages employ some form of JavaScript. This represents an enormous challenge for tools performing network-based detection of fileless attacks over the tens, hundreds, or even thousands of transactions occurring per second. When it comes to host-based detection, this challenge can result in significant resource consumption on an end user’s machine, potentially affecting business productivity.

4. Determining if recovered code will execute benign or malicious operations: Many benign applications and processes use scripts for legitimate purposes. These same scripts write cookies and perform other operations that involve making changes to the host. However, fileless attacks often operate in much the same way. Distinguishing these normal operations from malicious ones is the core challenge of fileless detection. Fileless attacks are more difficult for analysts to investigate manually because there are usually fewer samples and artifacts to analyze post-infection than for file-based attacks. Fileless attackers continue to evolve their techniques to make their attacks look more and more like normal daily operations, making it difficult to get ahead of the threat.

5. Detecting threats in real time: Post-processing systems are designed to look for malicious activity after an event has occurred. These systems include tools such as sandboxes and anomaly detection. While these types of tools may eventually detect the threat, they often don’t discover the attack until one or more systems have been compromised and the damage has already been done. Attackers know this and use this lag from detection to remediation to their benefit. In today’s threat environment, the longer any threat stays on any network, the greater the risk.

A Shift in Thinking
While fileless malware isn’t a net-new threat, the complexity and volume of the techniques threat actors employ to attack an organization’s networks are evolving at a rapid place. By addressing the challenges above, security teams can begin to lay the required groundwork for lowering their risk while setting the pillars of their security posture for years to come.

But in order to prepare for the growing threat of fileless malware, security teams must undergo a philosophical shift in thinking, beginning with a comprehensive reexamination of past incidents that lacked a clear initial attack vector. Applying a “was this fileless?” filter on those incidents should help the team prioritize its training and investments. Then, once the team identifies existing problems and begins the process of addressing those issues, root causes, or deficiencies, the team can use the results to investigate tools that can fill those fileless malware detection gaps.

Related Content:

Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Early bird rate ends August 31. Click for more info

With nearly 20 years of experience in the security industry, Travis is a highly accomplished cyber defense leader having led several commercial and U.S. government programs. He is known for developing and executing strategic plans to build the technical capacity … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/the-5-challenges-of-detecting-fileless-malware-attacks/a/d-id/1332557?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Simplifying Endpoint Hardening, Defense & Response

Ziften CEO Mike Hamilton advocates taking complexity, time, and cost out of multi-faceted endpoint protection, with a single-agent solution for laptops, desktops, servers, and cloud VMs.

Article source: https://www.darkreading.com/endpoint/simplifying-endpoint-hardening-defense-and-response/v/d-id/1332580?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Crowd-sourcing Threat Intelligence & Response Guidance


To InformationWeek
Network Computing
Darkreading





Dark Reading | Security | Protect The Business - Enable Access

Search

AlienVault SVP Russ Spitler encourages participation in the large-scale crowdsourced OTX threat intelligence community – as well as the rich expertise of “crowd-curated” response guidance.



‘);
}



‘);
}

Comments

‘);
}

‘);
}

News

Commentary

News

Register for Dark Reading Newsletters

Live Events

Webinars


More UBM Tech
Live Events

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

2 Comments

0 Comments

0 Comments

0 Comments

0 Comments


Cartoon Contest

Write a Caption, Win a Starbucks Card! Click Here

Latest Comment: I’ll need you to first enable Android’s option to install programs from unknown sources.


The Biggest Cybersecurity Breaches of 2018 (So Far)

Reports

The State of IT and Cybersecurity

The State of IT and Cybersecurity

IT and security are often viewed as different disciplines – and different departments. Find out what our survey data revealed, read the report today!

Dark Reading - Bug Report
Bug Report

googletag.display(‘div-gpt-ad-961777897907396673-15’);

Information Week

UBM Tech

How Orchestration, Automation Help SOCs Do More With Less


To InformationWeek
Network Computing
Darkreading





Dark Reading | Security | Protect The Business - Enable Access

Search

Splunk’s Haiyan Song and Oliver Friedrichs – co-founder of recently acquired Phantom – explain how security orchestration, automation, and response (SOAR) can empower SOCs to do more with less.



‘);
}



‘);
}

Comments

‘);
}

‘);
}

News

Commentary

News

Register for Dark Reading Newsletters

Live Events

Webinars


More UBM Tech
Live Events

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

2 Comments

0 Comments

0 Comments

0 Comments

0 Comments


Cartoon Contest

Write a Caption, Win a Starbucks Card! Click Here

Latest Comment: I’ll need you to first enable Android’s option to install programs from unknown sources.


The Biggest Cybersecurity Breaches of 2018 (So Far)

Reports

The State of IT and Cybersecurity

The State of IT and Cybersecurity

IT and security are often viewed as different disciplines – and different departments. Find out what our survey data revealed, read the report today!

Dark Reading - Bug Report
Bug Report

googletag.display(‘div-gpt-ad-961777897907396673-15’);

Information Week

UBM Tech

Leveraging the Power of your End-Users’ Human Cognition


To InformationWeek
Network Computing
Darkreading





Dark Reading | Security | Protect The Business - Enable Access

Search

Cofense CEO Rohyt Belani makes a case for more aggressively leveraging the unique ability of your most perceptive and well-trained end-users to help you more quickly spot and stop email threats.



‘);
}



‘);
}

Comments

‘);
}

‘);
}

News

Commentary

News

Register for Dark Reading Newsletters

Live Events

Webinars


More UBM Tech
Live Events

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

2 Comments

0 Comments

0 Comments

0 Comments

0 Comments


Cartoon Contest

Write a Caption, Win a Starbucks Card! Click Here

Latest Comment: I’ll need you to first enable Android’s option to install programs from unknown sources.


The Biggest Cybersecurity Breaches of 2018 (So Far)

Reports

The State of IT and Cybersecurity

The State of IT and Cybersecurity

IT and security are often viewed as different disciplines – and different departments. Find out what our survey data revealed, read the report today!

Dark Reading - Bug Report
Bug Report

googletag.display(‘div-gpt-ad-961777897907396673-15’);

Information Week

UBM Tech

Australian Teen Hacked Apple Network

The 16-year-old made off with 90 gigs of sensitive data.

An Australian teenager hacked into Apple’s enterprise computer network, making off with 90 gigabytes of data before being discovered. He also accessed an undisclosed number of customer accounts during his year-long intrusion.

According to Australian Federal Police, they raided the teen’s home after being contacted by the FBI. In the raid, they confiscated two laptops, a mobile phone, and a hard drive with a folder named “hacky hack hack” in which the stolen documents were stored.

According to reports, the teen, who said he admired Apple and hoped to find work there, has pled guilty to charges related to the hacking and will be sentenced on September 20, 2018.

More information on the hacker is not available because, at 16, he is not yet an adult and his privacy is protected by the Children’s Court of Victoria. Details of the intrusion have not been made public because the action is the subject of an on-going criminal investigation.

For more, read here.

Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Early bird rate ends August 31. Click for more info

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/australian-teen-hacked-apple-network/d/d-id/1332592?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Assessing & Mitigating Increased Exposure to Third-Party Risk

As we increasingly connect with each other digitally, CyberGRX CRO Scott Schneider believes we need to be much more diligent about sharing validated insight into the infosec maturity of our organizations.

Article source: https://www.darkreading.com/risk/assessing-and-mitigating-increased-exposure-to-third-party-risk/v/d-id/1332576?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Romance scam victim allegedly plotted to kill her mother for cash

Police have arrested a 65-year-old victim of a romance scam for allegedly plotting to murder her mother in order to get more money to send to the conman posing as her beau.

According to North Carolina station CBS 17, police were initially investigating an online dating scam when they discovered that Roxanne Reed was allegedly trying to hire a murderer to rub out her mother. It’s not clear how that would have gotten her the money she was allegedly after.

Reed is facing a felony charge of conspiracy to commit murder against her 88-year-old mother, Emma Maurine Hammontree, who lived with her in a small house in Garner, North Carolina.

Investigators uncovered the plot when Reed reported losing money to someone online. Garner Police Captain Joe Binns told CBS 17 that police found the plot had unfolded in text messages sent between Reed and her alleged co-conspirator:

A romance-type scam, some identity theft, but during the process of that investigation, we were able to get hold of text messages that obviously led to the charge that we’re looking at today.

The text messages themselves kind of laid out the whole specific scenario of how they were going to do it, what was going to happen, when it was going to happen.

Reed’s supposed lover was an online romance scammer who hid behind the name Scott Humpal. Humpal’s a real guy: he owns several physical therapy centers in Corpus Christi, Texas.

Of course, as a business owner, Humpal can’t hide his identity away: his businesses have Facebook profiles, for one thing. Unfortunately, his identity has been swiped multiple times by online scammers. Humpal’s name and photos appear in a scammer profile on sites such as Dating Scams 101 and Watch for Scams.

The Associated Press reports that police arrested Reed on Sunday.

According to the AP, Binns said on Tuesday that Reed is considered a suspect in other financial frauds, though he didn’t go into detail. The main takeaway, Binns said, is that this all revolved around getting money to feed into the yawning maw of the catfishing, identity-thieving conman:

It was related to money. It was all about money, about sending this person money.

It’s about money for sure from the fraudster’s perspective. From the love-struck victim’s perspective, it’s about getting money to feed the fantasy. Friends don’t let friends fall for fakes, so please, do your best to convince naïve friends or family that online, all too often, people aren’t who they claim to be.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/OETMyliNAlY/

What happens to your online accounts when you die?

BSides Manchester What happens to the numerous user logins you’ve accumulated after you die or become too infirm to manipulate a keyboard?

Some people have a plan, the digital equivalent of living will, or have chosen “family” option in a password management package such as LastPass or have entrusted a book of passwords to a family member.

But the consequences of doing nothing are not as neutral as some might expect and were spelled out during an informative presentation by Chris Boyd of Malwarebyes at BSides in Manchester on Thursday. The presentation, cheerily titled “The digital entropy of death”, covered what could happen to your carefully curated online presence after you log off.

Chris Boyd at BSides - Pic by John Leyden

The dormant accounts of the deceased can be abused, warns Malwarebytes’ Chris Boyd. Pic: John Leyden

Miscreants are already targeting obviously abandoned profiles. Boyd explained that in some cases it’s easier for fraudsters to gain hold of these accounts than the account-holders’ relatives, because crooks know the systems better and controls – although present – are often deeply embedded on the sites such as Facebook, Twitter et al.

Alongside regular postings asking for help on Facebook due to compromise of dead people’s logins (examples here and here) there’s also the problem of “cloning”.

“Facebook users have reported receiving friend requests from accounts associated with dead friends and family members,” The Independent reports. “Such requests appear to be the result of cloning or hacking scams that see criminals try [to] add people on the site, and then use that friendship as a way of stealing money from them or running other cons.”

Social media accounts are, of course, just the tip of the iceberg. Most people these days run 100+ accounts, as figures from password management software apps show. These figures are only increasing over time. Some sites are managing the inevitability of their users shuffling off this mortal coil with features designed to deactivate accounts after months of inactivity or other features, Boyd explained in a recent blog post.

Many sites now offer a way for relatives and executors to memorialise, or just delete, an account. In other circumstances, services would rather you ‘self-manage’ and plan ahead for your own demise (cheerful!) by setting a ticking timer. If the account is inactive for the specified length of time, then into the great digital ether it goes.

While a lot of services don’t openly advertise what to do in the event of a death on their website, they will give advice should you contact them, whether social network, email service, or web host. When there’s no option available, though, people will forge their own path and take care of their so-called ‘digital estate planning’ themselves.

Users would be ill-advised to leave everything to their next of kin. “Do some pre-handover diligence, and take some time to ensure everything is locked down tight,” Boyd explained. “If there’s anything hugely important you need them to know, tell them in advance.”

People may have bought digital purchases tied to certain platforms. Games on Steam, or music on iTunes or Spotify.

“Legally, when you go, so do your files (in as much as anything you can’t download and keep locally is gone forever),” Boyd explained. “That’s because you’re buying into a licence to use a thing, as opposed to buying the thing itself.”

There’s nothing stopping someone from passing on a login to a family member so they can continue to make use of all the purchased content, at least for now. Boyd predicted that at some point, all of our digital accounts tied to financial purchases will have some sort of average human lifespan timer attached to them.

Millennials mark the first generation not to know life before an always-on, everywhere internet, which will become the norm from now on. “Younger generations absolutely will demand reforms to the way we think about digital content, ownership, and inheritance,” Boyd concluded. ®

Bootnote

As well as the inevitable rise and fall of social media site (e.g. MySpace), and web 2.0 services there is also the issue of link rot, the phenomenon of more and more URLs not working over time. This issue is covered by Boyd in another recent blog post here.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/08/17/digital_entropy_of_death/

Sextortion and what to do about it [VIDEO]

Sextortion is where someone tries to blackmail you by telling you to pay up or else they’ll reveal something truly personal about your sexuality or your sex life.

Recent sextortion scams have tried to amplify your fear by throwing a genuine password of yours into the email, or quoting your actual phone number.

The crooks want to you believe that they must have hacked your computer, or else they wouldn’t know that sort of personal data.

Here’s what to do…

(Watch directly on YouTube if the video won’t play here.)


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/go_3ES1n28E/