版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
Malware
ThreatReport2021
BeyondTrustLabsAnalysisofRansomwareandPhishingTrends&HowtoMitigateThem
JamesMaude
LeadCybersecurityResearcher
BeyondTrust
TABLEOFCONTENTS
ExecutiveSummary
3
SecurityChallengesof2020-2021
4
TheIncreasedAttackSurface-BringingThreatsHom
e
4
TheNewPerimeter
7
MorePrivileges,MoreProblems
9
PrivilegedApplicationVulnerabilities
11
SummaryofSecurityChallenges
13
MaturityoftheMalwareEcosystem
14
Human-OperatedRansomware
16
B
eyondTrustMalwareLabs-AnalysisofMalwareThreats
21
OverviewofMalwareStrains
22
CommonDenominators
27
MostCommonTechniquesAfterInitialMalwareExecution
29
Lab-TestingBeyondTrustTrustedApplicationProtectionAgainstTopMalwareStrains
31
DivingIntoMITREATT&CK?FrameworkDefinitions&Mitigation
s
34
T1047WindowsManagementInstrumentation(WMI)
35
T1204.002UserExecution:MaliciousFile
36
T1059.001PowerShellusedforinitialexecution
37
T1059.003WindowsCommandShell(CMD)
38
OtherTechniques
39
The5CriticalStepstoCompleteEndpointSecurity
40
AdditionalResources
43
Appendix:ThreatSamplesTest
ed
44
Note:Thelab-basedresearchinthisreportpertainsonlytoWindowsdesktopsandservers.
2
MalwareThreatReport2021
>
ExecutiveSummary
Thisresearchreportprovidesinsightsandanalysis
intothreatsandprivilegedaccountmisuseon
Windowsdevicesacrosstheglobe.Thisresearchis
fromthesameBeyondTrustLabsteamthatpublishestheannual
MicrosoftVulnerabilitiesReport
.
Thisreportisbasedonreal-worldmonitoringand
analysisofattacksbetweenQ12020andQ12021
discoveredinthewildbytheBeyondTrustLabsteam,
withcollaborationfromcustomersandincident
responseteamsusingBeyondTrust’sproducts.In
additiontogeneralinsightsintothethreatlandscape,thereportalsodivesintoreoccurringthreatthemes
andmapsoutTools,Techniques,andProcedures(TTPs)againstthe
MITREATT&CK?EnterpriseFramework
.
BeyondTrustLabsexploredthe58techniquesinthe
MITREATT&CKFrameworklistsforCobaltStrike
(threatemulationsoftware),and66%ofthetechniqueseitherrecommendusingPrivilegedAccount
Management,UserAccountManagement,and
ApplicationControlasmitigationsorlistAdministrator
/SYSTEMaccountsasbeingaprerequisitefor
thetechniquetosucceed.Therefore,thecontrolof
privilegesandapplicationexecutionisakeydefensivemeasureinmitigatingCobaltStrikeandtools/malwarewithsimilarcapabilities,byreducingtheattacksurfaceanddenyingcodeexecutionandprivilegedrights.
KEYFINDINGS
1Absenttherightprotection,malwarewilldisableendpointsecuritycontrolsand
undermineyoursecurityinvestment.
2Weareobservingagrowing
trendintheuseofnativetoolstoperformfilelessattacksintheinitialstagesuntilastrongfootholdandpersistence
mechanismisestablishedandsecuritycontrolshavebeen
disabled.
3TheMITREATT&CKFrameworkprovidesaneffectivewayto
distillawiderangeofmalwarestrainsandcyberattacksintocomponenttechniques,whichcanthenbemitigated.
4BeyondTrust’sout-of-the-boxpoliciesproactivelydisruptedall150different,common
attackchainstestedinouranalysis.
5Removalofadminrightsandimplementationofpragmaticapplicationcontrolaretwoofthemosteffectivesecuritycontrolsforpreventingandmitigatingthemostcommonmalwarethreats.
3
MalwareThreatReport2021
SecurityChallengesof2020-2021
TheIncreasedAttackSurface:BringingThreatsHome
Securitystaplessuchasnetworkmonitoringandfirewall
technologiesarebecominglesseffectiveastheperimetershiftsfromthecorporateofficetothehomeoffice,or“workfromanywhere”forthatmatter.
Overthepasttwodecades,organizationsinvested
significantlyinshoringuptheircyberdefenses.Someoftheseinvestmentshavebeenrenderedfarlesseffective,evenobsolete,duetothechangesusheredinbythe
pandemic.
Emailfatigueisgreaterthanever.Thedailycommunicationsthatoncehappenedin-person,orovertheofficephone,
haveshiftedincreasinglytoemails,onlinemeetings,andothercommunicationtools.
Thismeansthatusersarenotonlyseeinghighervolumesofemails,butalsoreceivingemailsfromawiderrangeofsources,suchas:
IColleaguestheyhavenevermetIProspectivesuppliers
INewclients
IOtherdepartmentsaboutpolicies,tools,andinformationneededtosupporthomeworking
4
MalwareThreatReport2021
Despitetheriseofmoderncollaborationsoftware,most
officecommunicationstillrevolvesheavilyaroundsendingandreceivingemailswithdocuments,links,orother
attachments.Forexample,anHRteamexpectstoreceiveresumes,andafinancedepartmentexpectsinvoicesorcontracts.
Theexpectationofreceivinglegitimatecommunications
viaemail—oftenfromsourcesunknownorunanticipated—makesiteasyforanattackertotailoranemailphishing
campaignandachieveahighsuccessrate.Departmentswithaccesstothemostdocumentsanddataareoftenthemostlikelytofallvictimtophishingefforts,subsequentlyleadingtoaransomwareorothermalwareattack.
Figure1Exampleof
COVID-19themedphishingemail
linkingtomaliciousWorddocument
5
MalwareThreatReport2021
Consequently,threatactorslaunchedhighlysuccessfulcampaignsthatusetargetedphishingemailstosociallyengineertheoverwhelmedremoteworkerintoenteringtheircredentialsoropeninganinfecteddocument.
>InBeyondTrustLabs,
weobserveda200%increaseinphishingemailswiththemajoritybeingCOVID-19themed.
Thethreatactorssendingemailsimpersonatedavariety
ofgovernmentandnon-governmentorganizations,fromtheWorldHealthorganization(WHO)and
CenterforDiseaseControl(CDC)togovernmentdepartmentsandpharmaceuticalcompanies.
TheseemailcampaignspromptedtheDepartmentof
HomelandSecurity(DSH),Cybersecurity&InfrastructureSecurityAgency(CISA)andtheWorldHealthOrganization(WHO)toissuecommunicationswarningusersofthe
risks.TheUnitedKingdomNationalCyberSecurity
Centrealsolaunchedacampaigntobe“CyberAware”followingthetakedownof2,000scams,including471fakeonlineshopsforCOVID-19relatedservices.
WHOCommunicationWarningUsersof
PhishingTechniques
TheWorldHealth
Organizationwill:
INeveraskforyour
usernameandpasswordtoaccesssafety
information
INeveremailattachmentsyoudidn’taskfor
INeverchargemoneytoapplyforajob,registerforaconference,or
reserveahotel
INeverconductlotteriesorofferprizes,grants,certificatesorfundingthroughemail
6
MalwareThreatReport2021
>
TheNewPerimeter
“JustliketheicewallinGameofThrones,
organizationsspentyearsbuildinga
technologicalperimeterwalltokeepthreats
out.Despitecriesthat“theperimeterisdead,”theyhavecontinuedtoplacealotoffaith(andinvestment)init.Therapidtransitiontoremoteworking,andthesuddendissolutionofthe
perimeter,hasforcedanabruptshifttofocusonsecuringidentitiesandend-userdevices.ITdepartmentsareunderpressuretoupgrade
capacitiesfastandthisresultsinchangingorreplacingexistingsystemswithlittletimetodothoroughsecuritytests.Vulnerabilitiesintheremoteaccessinfrastructureandaccessprotocolsmayremainundetectedandcanbeexploitedincyberattacks.”
InternationalMonetaryFund:
CybersecurityofRemoteWorkDuringthePandemic
Toadapttosocialdistancinginitiativesorwork
fromhomepolicies,businesseswereforcedto
acceptunprecedentedrisksthatwouldhavebeeninconceivableafewmonthsprior,justtocontinueoperatingandkeepusersproductive.
Insomecases,olddesktopmachinesthatnooneever
imaginedleavingthecorporatenetwork,werebeing
loadedintocarsandtakenhometopotentiallyvulnerablenetworksthattheywereneverintendedtojoin.
Awiderangeofremote
accesstoolsandcloud
serviceswerehastilyspunup,sometimesovernightoroveralong,sleepless
weekend.
Inmanycases,duetothe
speedofthedeployments,userswereallgivenbroad
accesstodataandsystemsasbusinesserredonthesideoffreedomandflexibilitytoensurethatuserswereabletoworkremotely.
7
MalwareThreatReport2021
Attackersoverwhelminglyseekouttheeasytargets
thatwillyieldafastpayday.Thus,cybercriminalsquickly
capitalizedonthissuddenshift,rapidlyidentifyingthat
notonlyhadtheattacksurfacevastlyincreased,butso
didtheaccesstodataandsystems.Oneoftheoutcomesofthesefactorswasreflectedinthesurgeofsuccessful
ransomwarecampaigns,asattackerswereabletolandandexpandwithnewfoundease.Sincethepandemic,therehasbeenathirdmoreransomwarefamiliesand560,000new
piecesofmalwaredetectedeveryday(DataProt,2021).
>BeyondTrustLabshasalso
witnessedanincreasedin
specialistRansomware-as-a-Service(RaaS)operators,whichnotonly
provideservicesthatlowerthetechnicalbarriersforwould-becyber-criminalsbutarealsofarmorecapableoftakingdownlargeenterprises.
Inthisenvironment,
it’shardlysurprising
thatmultimillion
dollarransomsarenowcommonplace.These
ransomsarenotjust
quickcashpayouts,
butseedroundsforthe
ransomwareoperators,whocontinuetoinvestinbetterinfrastructureandleveragingzero-
dayexploits.
Manyorganizationswhopreviouslyhadrobustmonitoringinplaceontheinternalnetwork—helpingtoidentifymalwaretrafficandlateralmovement—havebeenblindtothenew
andevolvingattacktechniques.Thisisbecausesomany
endpointsnowoperatepartiallyorfullyoutsideofthe
network.Tocompoundthisproblem,therewasanearly
900%surgeinfilelessmalwareattacks(InternetSecurity
ReportforQ42020,WatchGuardTechnologies)which
ofteninvolveattackersexploitingnativeapplications,like
PowerShell,toperformtasks.Thisreducesthechanceof
detectionasmanysolutionsarelookingfornewapplicationsappearingratherthanexisting,legitimate,toolslaunching.
8
MalwareThreatReport2021
MorePrivileges,MoreProblems
Overthepastfewyears,mostorganizationshavebeenadvancingtowardaleastprivilegeapproach,where
usersareonlyallocatedtheprivileges/privilegeaccesstheyneedtodotheirrole.Inmanyindustries,thisis
nowmandatory(NIST,PCI,HIPAA,etc).Duetothe
effectivenessofthissecuritycontrol,itisexpectedthatcompaniesinotherindustrieswillfollow.
Supportingthenewlyremoteworkforcepresented
organizationswithmanychallengesaroundprivileged
access.Forinstance,seeminglytrivialtasks,like
installingprinterdriversforthedeviceinthehomeoffice,orthesoftwareneededforanewwirelessheadset,or
updatingthelocaltimeonalaptop,requiredlocaladminrightsthatusersdidn’thave.Tocontinuefunctioning
withoutoverwhelmingsupportdeskswithcallsand
tickets,manyorganizationsgaveusersaccesstolocaladminrightsonatemporaryorpermanentbasis,vastlyincreasingthesecurityrisk.
TheInternationalMonetaryFund(IMF)addressedthis
topicinaspecialseriesofnoteswarningofthepotentialcybersecurityrisksbroughtaboutbyremoteworking
duringthepandemic.ThisincreasedpervasivenessoflocaladminrightshasmadeitsignificantlyeasierforcommonmalwarestrainstousesimpleElevationofPrivilege(EoP)techniquestonotonlygainaccesstoprivilegesonthesystem,butalsousetheseprivilegestodisableorbypassexistingsecuritycontrols.
Thus,it’scriticaltoremovelocaladminrightsandapplymoregranularityaroundprivilegedaccesssecuritycontrols.
Wewereupagainstthe
clockonthisoneand
endedupissuingwork
fromhomelaptopswith
localadminrightsfortheolddesktopusergroups.
Wealsohadtoreactto
aninfluxofsupportcalls
bygrantingtemporary
adminprivilegestoour
existinglaptopusergroups.Thiswasallbecausewe
didn’thaveasolutioninplaceatthetime.PrivilegeManagementhasquickly
becomeourtoppriority.
HeadofITOps,EngineeringFirm
9
MalwareThreatReport2021
>“Employeesshouldnothaveadministration
rightsonfirm-ownednotebooks,security
hardenedconfigurationsandup-to-date
endpointsecuritysolutionsshouldbeinplace,
connectionsecurityparametersshouldbesetaccordingtogoodpracticesandshouldbelocked,andthecorporateremoteaccessinfrastructureshouldbetightlycontrolled.”
InternationalMonetaryFund:
CybersecurityofRemoteWorkDuringthePandemi
c
10
MalwareThreatReport2021
PrivilegedApplicationVulnerabilities
Alongsidetheincreaseinuserswithadminrights,wehaveobservedarisingtrendinsoftwarethatdoesnotproperlymanageprivileges.
The2021editionoftheBeyondTrustLabsannual
MicrosoftVulnerabilitiesReport
foundthefollowing:
IElevationofPrivilege(EoP)vulnerabilitiesincreased3xfrom2019to2020
ITheseaccountedfor44%ofthe1,268criticalMicrosoftvulnerabilitiessurveyedin2020
IRemoteCodeExecution(RCE)wasthenexthighestcategory(27%ofthecriticalvulnerabilities)
Theissueofimproperprivilegemanagementhas
beenhighlightedbyMITRE,whoincludedCWE-269–ImproperPrivilegeManagementintheir“2020CWETop25MostDangerousSoftwareWeaknesses.”
3X
INCREASE
EoPvulnerabilitiesYoY2019-2020
44%
EoPYoYincrease2019-2020
CWE-269:
ImproperPrivilegeManagement
Thesoftwaredoesnot
properlyassign,modify,track,orcheckprivilegesforanactor,creatinganunintendedsphereof
controlforthatactor.
MITREATT&CKFramework
11
MalwareThreatReport2021
Asshowninthechartbelowthisweaknesshasbeentrendingupwardsalmostexponentiallysince2016.
Thus,itismoreimportantthanevertocontrolthe
privilegesgranted,notonlyattheuserlevel,butattheapplicationlevel,topreventthatsphereofcontrolbeingcreatedforathreatactor.
VulnerabilityTypeChangebyYear
However,theissuesofimproperprivilegemanagementarenotjustaWindowsproblem,asthedatashown
abovetrackscommonweaknessesagainstavarietyofsoftwareandoperatingsystems.Whileitisnotalwayspossibletocontrolhowthesoftwareitselfhandlesprivileges,theprincipleofleastprivilege(POLP)canbedirectlyappliedtotheapplicationtocontrolrisk.
Fromrestrictedtokens,tocontrollingchildprocess
inheritance,thereareavarietyofwaysarobustendpointprivilegemanagementsolutioncanmitigatetherisk
ofimproperprivilegemanagementbyapplications.
Figure2CWE-269
ImproperPrivilegeManagement
hasbeenvastly
increasingsince2016
Source:
NIST
Thisvisualizationisa
slightlydifferentview
thatemphasizeshowtheassignmentofCWEshaschangedfromyeartoyear.
12
MalwareThreatReport2021
Summaryof
SecurityChallenges
In2020,theattacksurfaceexpandedmassivelydueto:
ITheexpansioninusecasesforgrantingaccesstoprivileges
IAnincreaseinsoftwarebeingvulnerabletodangerousvulnerabilities
IThewidespreaduseofremoteaccessthatresultedfromamassiveshifttoremoteworking
Attackersshrewdlyexploitedthesenewcyberexposures,often
usingelevationofprivilegeattacksandsophisticatedmalware
campaigns,frequentlyplayingontheemotionsandfearsofusers.
Threatactorsworkceaselesslytoevolvetheiroperationsandhavematuredsignificantlyoverthepastyear.Inournextsection,wewillexplorethecontinuingevolutionofthecybercrimeindustry.
13
MalwareThreatReport2021
Maturityofthe
MalwareEcosystem
>Paralleltolegitimatesoftware
companiesandthetrendtowardsSaaS,threatactorsareshiftingtoMalware-as-Service(MaaS)
modelswithspecialistsemergingindifferentareas,including
enterprisecredentialsales,initialaccesstoatargetorganization,lateralmovementcapability,orpayloaddelivery.
Aswithanygrowthindustry,wehaveseenalotofchangesinmalwareecosystemsandtheireconomicmodels.
Today,thereareoftenmanydifferentpiecesofmalware
thatcometogetherinanattack.Amodernransomwareattackcouldbecomprisedofmultiplethreatactors,tools,andplatforms.
14
MalwareThreatReport2021
Forexample:
IThreatactorsrenttheNecursbotnetanduseittodistributemaliciousspam
ISpamcontainsmaliciousdocumentsthatlaunchesTrickbot
ITrickbotisusedtoharvestcredentials,accessemails,andforlateralmovementacross
thenetwork
IWithwidespreadcompromiseofthetarget
network,thethreatactorsellsbackdooraccesstothenetworktothehighestbidder
IThebuyerthendeploysRYUKransomware
viatheTrickbotcommandandcontrolservers
Thisspecializationnotonlydrivesinnovationthroughcompetition,butalsoreducesthethreatactor’srisk.Ifonepartofthechainistakendown,theotherpartscanquicklyshifttoanothersupplier.
Alternatively,ifyou’reathreatactorlookingtoavoidbeingblockedbyantivirus(AV)tools,thenyoucan
justbuyaccesstosystemswhereTrickbothasalreadybreachedthenetworkanddisabledtheAVsoftware.
Thisapproachmakesmodernmalwareconsiderablymoreresilienttotakedownattempts,whilealso
settingthetechnicalbarforillicitentrymuch
lower.Afterall,anattackernolongerhastobean
accomplisheddeveloper,socialengineer,orskilled
hacker.Theycannowbuy,ratherthanbuild,toolsandusetheMaaSplatformstoorchestratesophisticatedmalwarecampaigns.
Inthischainofevents,
wecanseeseveral
malwareplayersandtheirtoolswithintheirown
specialties.Thismodularapproachallowsthe
malwareauthorstofocusonexcellenceinonearea.
15
MalwareThreatReport2021
Human-OperatedRansomware
Asthreatactorsseektomaximizethedisruptionto
organizationsandextractthehighestransompayments,theransomwaremodelisshiftingtowardshuman-driven,enterprise-wideattacks.
Ratherthancreateanautomatedwormthatself-
propagatesacrossthenetwork,thelatestgenerationofransomware-as-a-service(RaaS)willtreadlightly,
establishingafootholdinthenetworkofalargeorganization.
Usingcommonpenetrationtestingtools–suchas
CobaltStrikeorPowerShellEmpire–theythensurveythenetworkandspreadusingprivilegeescalationstogaincontrolofcriticalsystemsanddisablesecurity
controls,beforefinallyencryptingkeysystemsandexfiltratingdata.
Human-operated
ransomwarecampaignsposeasignificant
andgrowingthreat
tobusinessesand
representoneofthemostimpactfultrendsincyberattackstoday.
Inthesehands-on-
keyboardattacks,whicharedifferentfromauto-spreadingransomwarelikeWannaCryor
NotPetya,adversaries
employcredentialtheftandlateralmovement
methodstraditionally
associatedwithtargetedattackslikethosefromnation-stateactors.
Human-operated
RansomwareAttacks:
APreventableDisaster
16
MalwareThreatReport2021
TheEvolutionofRansomware
ArchievusRevetonCryptolockerWannacryREvilDarkside
200520122013201720192021
BasicRansomware:Automated,singleendpoint
BusinessRansomware:Automated,singleendpoint
EnterpriseRansomware:Automated,multipleendpoints
TailoredRansomware:Manuallyorchestrated
2005IndividualTargeting
Archievususesasymetric
encryptiontoencryptfilesin“Documents”folder,forcingusertobuydecryption
throughwebsitepurchases.
2013BusinessTargeting
Cryptolockerstartsusing
professionalemailstotargetbusinesses.Ransomsdataonasingleendpoint.
2017EnterpriseWorm
Wannacryexploits
CVE-2017-0145topropogate
acrossnetworks.Ransoms
dataacrosstheentirenetwork.
2019TailoredOperations
Maximizingbusinessdisruptionsandpressuretopayaransom,attacks
becomemoretailoredandless
automated.Humansusingpen-testingtoolssearchthenetworkfortargets.
Overthepast15years,ransomwareattackshave
shiftedfromtargetingafewfiletypesinasinglefolderononeendpoint,towidespreadencryptionofentirenetworksofsystems.Whiletakingdownabignetworkandmanysystemscanresultinamoredevastating
attackandgreaterbusinessimpact,italsolengthenstheattackchain,providingmoreopportunitiesto
detectandpreventtheattack.
Figure3Howransomwarehasevolvedasitseeksoutmore
criticaldataandsystemsashighervaluetargets
Fromadefensivepointofview,thislatestevolution
ofransomwaremakesitfarmoredifficulttoidentify
attacksbyusingtraditionaldetectiontools,astheyarelesslikelytouseagenericpayload.Instead,human-
operatedransomwareattacksinvolvearealpersonusingprofessionaltools.
17
MalwareThreatReport2021
Thishands-onapproachcanwageahighlytailoredattackonthetargetthatfrequentlyinvolves
obfuscatingcodeandleveragingfilelesstechniquestomaintainalightfootprintandtoavoidtriggeringalarmbellswhiletheyexplorethesystems.
FilelesstechniquesmayexploitnativeapplicationslikePowerShellor.NETdevelopertoolstorunscriptsandlaunchpayloads,avoidingintroducingnewapplicationstodiskthatmaybedetectedorblocked.
Figure4Below,exampleof
ahuman-operated
ransomwarecampaignobservedinthewild
AttackChainPhase
MITREFrameworkExample
>TheRoleof
PrivilegeManagementforWindows
PreventsPowershellfrombeinglaunchedfromaphishing
attachment
Preventsaccesstolocaladminrights,mitigatingcredentialaccess,
privilegeescalation
anddefensiveevasion
Preventsmalwarepayloadexecuting
HumanOperatedAttackChain
Access
Environment
T1566Phishing
InitialAccess
Trickbotviaphishingemail
T1548.002UACBypass
Execution&LocalElevation
CobaltStrikeorPowerShellEmpire
Persist,Recon,Traverse
andSpread
T1134AccessTokenManipulation
T1003&T1003.001CredentialDumping
CredentialAccess
UsingLaZange,Mimikatzorothertools
T1055ProcessInjection
PrivilegeEscalation
ControloverValidAdminAccounts
T1053ScheduledTask/Job
T1078ValidAccounts:DomainAccounts
Persistence
NewDomainAdmin(DA)Accounts
T1087AccountDiscovery
T1033SystemOwner/UserDiscovery
Discovery
ReconandenumerationusingBloodhound
T1035ServiceExecution
LateralMovement
PsExecorothertools
T1562ImpairDefenses
DefenseEvasion
TamperingwithA/V&securityservices
Execute
Objective
T1086DataEncryptforImpactImpact
InvokeRyukransomwarepayload
18
MalwareThreatReport2021
Asshowninthepreviouspageattackchainchart,therearemanystagesinahuman-operated
ransomwarecampaignastheattackerseeksdeeperaccessandcontrolofthenetwork.
>Startingfromthephishing
email,theattackwillexploit
privilegesandtheability
toexecuteapplicationslike
PowerShellto“l(fā)andandexpand,”
eventuallyleadingtototal
compromiselargeenterprises.
Professionaltools,suchasCobaltStrike,offeranattacker
severaltechniquesforexecutingcode,capturingcredentials,andmovinglaterallywithinanetwork.Suchtoolsare
popularwiththreatactors.APT29,WizardSpider,and
ChimeraarejustafewofthecybercrimegroupsthathavebeenobservedusingCobaltStrikeaspartoftheirattacks.
MITREhas
mappedthefunctionality
ofCobaltStrikeandrecommendsPrivilegedAccountManagement
M1026andExecutionPreventionM1038asmitigationsagainstarangeofthetool’stechniques.
Infact,ifwetakeadeeperlookatthe58techniquesMITRElistsforCobaltStrike,66%ofthemeitherrecommend
usingPrivilegedAccountManagement,UserAccountManagement,andApplicationControlasamitigation,orlistAdministrator/Systemaccountsasbeinga
prerequisiteforthetechniquetosucceed.Therefore,
thecontrolofprivilegesandapplicationexecutionisakeydefensivemeasureinmitigatingthisspecifictool,
andonessimilartoit,throughareductionintheattack
surfaceanddenyingcodeexecutionandprivilegedrights.
Trickbot,andthe
Ryukoperators,alsotakeadvantageof
usersrunningaslocaladministratorsin
environmentsandusethesepermissionstodisablesecuritytoolsthatwouldotherwiseimpedetheiractions.
Human-operated
RansomwareAttacks:
APreventableDisaster
19
MalwareThreatReport2021
>Whileransomwarehasclearlyevolved,
thefundamentalneedstoexecutecode
andleverageprivilegeshavelargely
remainedconsistent.Whetheritisthebasicransomwarehittingasingleendpoint,orasophisticated,tailoredattack,thebenefitsofproactivelyreducingtheattacksurfacebyremovingadminaccountsandcontrollingapplicationexecutionareuniversal.
Whenitcomestohuman-operatedransomware,oneoftheattacker’skeyobjectivesistofindaccountswithlocaladminrights.Attackersexploittheseaccountstodisablesecuritycontrolsandstealcredentialsthatallowthemtomovelaterally,deeperanddeeperintoanenvironment.
TheexampleattackchainshowninFigure4couldhavebeenthwartedatanearlystagebysimplypreventingthephishingdocumentfromlaunchingPowerShellandeliminating
thelocaladminrightstopreventcredentialdumping.
Wealsowanttohighlighttheimportanceofmitigatingcredentialdumpingtechniquesastheseareoften
criticalstepsforanattackertoperformdiscovery,lateralmovement,persistence,anddefensiveevasion.
Theattacker’sgoalisto“l(fā)andandexpand”—asimplepathtoprivilegedcredentialsmakesthisfareasier
toachieve.Whenyoumitigatetheattacker’sabilitytoexecuteandperformcredentialdumping,youdon’tjustmitigatethosetechniques,butalsoabroadrangeof
otheronesthathingeoncredentialaccesstosucceed.
20
MalwareThreatReport2021
BeyondTrustMalwareLabs
AnalysisofMalwareThreats
(May20
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 二零二五年度農(nóng)機租賃市場準入合同范本資訊4篇
- 二零二五版拌合料生產(chǎn)技術(shù)改造與升級合同4篇
- 二零二五版建筑工地勞務用工與綠色施工技術(shù)研發(fā)與推廣合同3篇
- 二零二五版舊設(shè)備買賣及拆解回收再利用合同3篇
- 2025年度綠色交通募集資金三方監(jiān)管與執(zhí)行合同4篇
- 二零二五年度少兒興趣班教室租賃及教學用品供應合同4篇
- 二零二五年度科技園區(qū)場地租賃及研發(fā)合作合同4篇
- 關(guān)于2025年度民法典規(guī)定協(xié)議離婚期限及法律支持4篇
- 二零二五年度智慧社區(qū)建設(shè)合同投標單位保密保證
- 二零二五年度外架工程風險評估與控制服務合同
- 物業(yè)民法典知識培訓課件
- 2023年初中畢業(yè)生信息技術(shù)中考知識點詳解
- 2024-2025學年八年級數(shù)學人教版上冊寒假作業(yè)(綜合復習能力提升篇)(含答案)
- 《萬方數(shù)據(jù)資源介紹》課件
- 醫(yī)生定期考核簡易程序述職報告范文(10篇)
- 第一章-地震工程學概論
- 《中國糖尿病防治指南(2024版)》更新要點解讀
- 初級創(chuàng)傷救治課件
- 交通運輸類專業(yè)生涯發(fā)展展示
- 2024年山東省公務員錄用考試《行測》試題及答案解析
- 神經(jīng)重癥氣管切開患者氣道功能康復與管理專家共識(2024)解讀
評論
0/150
提交評論