Attackers’ new way to outsmart traditional defenses is by weaponizing legitimate software

attackers’ new way to outsmart traditional defenses is by weaponizing legitimate software

Attackers’ new way to outsmart traditional defenses is by weaponizing legitimate software

As businesses navigate the digital landscape, the threat of ransomware is rising. Every day brings innovative techniques for cyber criminals to perform more advanced and complex attacks. So, it has become quite clear that traditional defense strategies are no longer sufficient to effectively safeguard the business, improve identity security and combat attackers’ evolving tactics. In fact, 66% of companies were affected by ransomware in 2023, and this number is only expected to increase.

Ransomware is no longer just about creating sophisticated malicious software to infect people’s computers – cyberattackers have now started using and exploiting organizations’ legitimate software to conduct malicious activities and steal people’s identity without creating their own custom malware.

Cybercriminals capitalize on vulnerabilities in Open Source Software (OSS), seamlessly integrating their malicious elements into OSS framework. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently warned that this trend is only getting more common, highlighting instances like the Lockbit operation. This is an example of cyber attackers using legitimate, free software for various malicious activities, such as exploring networks, accessing remotely, tunnelling, stealing credentials and taking files.

Unfortunately, conventional endpoint security solutions often lack the behavior analytics capabilities necessary to detect subtle indicators of compromise such as unusual logins, privilege escalation, program execution or other risky activities. As such, by utilizing the tools already employed by organizations, attackers can acquire admin privileges more easily, while evading detection. Organizations must be aware of these evolving techniques and adapt their defense strategies accordingly.

Six tactics employed throughout the ransomware attack lifecycle

Ransomware actors increasingly use legitimate software to their advantage at various stages of the attack lifecycle. They employ many different tactics, techniques and procedures to advance their missions, including the examples highlighted below.

Initial Infection: Securing initial access presents a diverse range of options for attackers. Some opt for exploiting vulnerabilities, utilising common vulnerability exploitations (CVEs) against susceptible targets. Others resort to stealing, forging, altering or manipulating cookies from users’ web sessions. Alternatively, they employ phishing emails to deceive users into downloading genuine applications.

Persistence: Attackers leverage legitimate software to establish backdoors, ensuring persistence and command and control. This involves manipulating these tools to bypass Multi-Factor Authentication (MFA), modify, or disable existing security tools to avoid detection, from terminating endpoint detection and response (EDR)- protected processes to modifying/deleting registry keys or configuration measures. In instances like the RMM ransomware attacks mentioned earlier, threat actors utilized portable executables within the software to gain access without requiring local admin privileges or a complete software installation.

Many default software programs on a machine become potential targets for hijacking, guaranteeing the execution of malicious programs. Application features such as task schedulers are also abused for maintaining persistence, launching programs or scripts at specified times.

Privilege Escalation: User Account Control (UAC) protects Windows operating systems, prompting admin credentials for any attempt to run a program as an administrator. While most ransomware today doesn’t demand admin rights, attackers often focus on bypassing UAC to elevate access and establish persistence.

Lateral Movement: Certain tools inadvertently facilitate malicious privilege escalation and lateral movement. Examples include AdFind, a command-line query tool for Active Directory, and AdvancedRun, enabling privilege escalation by altering settings before running software. Additionally, various Windows features functioning as remote procedural call (RPC) servers become vulnerable points for lateral movement when abused by attackers.

Encryption: Encryption serves both as a protective tool and a weapon. Encryption tools hide data from unauthorized users, but attackers can also weaponize them as ransomware. Legitimate access to encrypted data can be compromised to bypass encryption controls.

Data Exfiltration: Ransomware operators employing double-extortion techniques often utilize legitimate backup software tools or similar programs for data exfiltration. Recent research by CyberArk Labs noted the use of Discord, a popular collaboration app, for data exfiltration via webhooks.

Malicious actors are also adapting their tools to target multiple platforms and operating systems. For instance, they employ the cross-platform language Rust to target Linux. macOS is not exempt, with attackers exploiting Find My iPhone to infect Apple devices.

Enhancing defense strategies to block ransomware

As ransomware actors are increasingly exploiting legitimate software to perpetrate their attacks, organizations must remain vigilant and proactive in strengthening their identity management security strategies. In particular, embracing an identity-centric defense-in-depth approach is key. This approach includes important security controls such as endpoint detection and response (EDR), anti-virus (AV)/next-generation antivirus (NGAV), content disarm and reconstruction (CDR) email security and patch management – putting least privilege and behavior analytics at the core of the defense strategy.

So, by recognizing and addressing the tactics employed throughout the ransomware attack lifecycle – from initial infection to data exfiltration – companies can bolster their defenses, enhance identity security, mitigate the risk posed by cyber criminals, and safeguard the business against the ever-evolving threat of ransomware.

We’ve listed the best online cybersecurity courses.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

News Related

OTHER NEWS

Lawsuit seeks $16 million against Maryland county over death of pet dog shot by police

A department investigator accused two of the officers of “conduct unbecoming an officer” for entering the apartment without a warrant, but the third officer was cleared of wrongdoing, the suit says. Read more »

Heidi Klum shares rare photo of all 4 of her and Seal's kids

Heidi Klum posted a rare picture with husband Tom Kaulitz and her four kids: Leni, 19, Henry, 18, Johan, 17, and Lou, 14, having some quality family time. Read more »

European stocks head for flat open as markets struggle to find momentum

This is CNBC’s live blog covering European markets. European markets are heading for a flat open Tuesday, continuing lackluster sentiment seen at the start of the week in the region ... Read more »

Linda C. Black Horoscopes: November 28

Nancy Black Today’s Birthday (11/28/23). This year energizes your work and health. Faithful domestic routines provide central support. Shift directions to balance your work and health, before adapting around team ... Read more »

Michigan Democrats poised to test ambitious environmental goals in the industrial Midwest

FILE – One of more than 4,000 solar panels constructed by DTE Energy lines a 9.37-acre swath of land in Ann Arbor Township, Mich., Sept. 15, 2015. Michigan will join ... Read more »

Gaza Is Falling Into ‘Absolute Chaos,’ Aid Groups Say

A shaky cease-fire between Israel and Hamas has allowed a surge of aid to reach Palestinians in Gaza, but humanitarian groups and civilians in the enclave say the convoys aren’t ... Read more »

Bereaved Israeli and Palestinian families to march together in anti-hate vigil

Demonstrators march against the rise of antisemitism in the UK on Sunday – SUSANNAH IRELAND/REUTERS Bereaved Israeli and Palestinian families will march together as part of an anti-hate vigil on ... Read more »
Top List in the World