CyberWire Daily - Using global events as lures. [Research Saturday]

Episode Date: August 22, 2020

The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry ...improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them. This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events. Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures. The research and blog post can be found here:  Adversarial use of current events as lures The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. of you, I was concerned about my data being sold by data brokers. So I decided to try Delete.me. I have to say, Delete.me is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Delete.me's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life Thank you. JoinDeleteMe.com slash N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.com slash N2K and enter code N2K at checkout. That's JoinDeleteMe.com slash N2K, code N2K. Hello, everyone, and welcome to the CyberWires Research Saturday.
Starting point is 00:01:36 I'm Dave Bittner, and this is our weekly conversation with researchers and analysts tracking down threats and vulnerabilities, solving some of the hard problems of protecting ourselves in a rapidly evolving cyberspace. Thanks for joining us. Well, I think what really prompted us to take this on is the fact that we see certain patterns repeated in this business over and over and over again. That's Craig Williams. He's the head of Talos Outreach at Cisco. The research we're discussing today is titled
Starting point is 00:02:04 Adversarial Use of Current Events as Lures. And now a message from our sponsor Zscaler, the leader in cloud security. Enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public-facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security. Zscaler Zero Trust plus AI stops attackers by hiding your attack surface, making apps and IPs invisible, eliminating lateral movement,
Starting point is 00:02:57 connecting users only to specific apps, not the entire network, continuously verifying every request based on identity and context, simplifying security management with AI-powered automation, and detecting threats using AI to analyze over 500 billion daily transactions. Hackers can't attack what they can't see. Protect your organization
Starting point is 00:03:20 with Zscaler Zero Trust and AI. Learn more at zscaler.com slash security. You know, I mean, at this point, I think I can even say it rounds up to I've been doing this 20 years. And we see different and new malware campaigns every week. There's always someone doing something new, tweaking something, finding a new way to do it.
Starting point is 00:03:51 But in doing so, there are certain patterns that are always habitually followed. And really, when you look at it, probably the most effective one is bad guys trying to find a way to use current events as lures. And I know that sounds really open-ended and people think, well, how could that possibly help me? And that's kind of the reason we wrote this blog,
Starting point is 00:04:14 was to not only highlight what we're seeing, but to help people understand what could be used in the future. So if we sit back right now and take a high-level look over the next six months, we see a lot of social issues at play. We see an election coming up. We see the typical holiday shopping season. And then after that, we start seeing tax season in the US.
Starting point is 00:04:40 I would expect malware campaigns to target each and every one of those in order. And, you know, potentially a couple of them overlapping. Right. Yeah, it's interesting to me that one of the things you highlight here is that there are the ones that sort of run on the calendar, you know, the tried and true, every holiday season we're going to have stuff, every tax season we're going to have stuff. But tax season, we're going to have stuff. But then in addition to that, you know, we've got things like COVID-19. We've got things like Black
Starting point is 00:05:12 Lives Matter, these things that are top of mind and also emotional hot points for a lot of people. Absolutely. And you touched right on the thing that they're trying to exploit, right? and you touched right on the thing that they're trying to exploit. They want you to hear this topic, they want you to read this topic, see it, and your emotion kicks in. When people are thinking with emotion, they don't necessarily have the same thought that, say, an email would go through. And so by putting in these emotionally charged topics, they're trying to find someone who's going to impulsively click on it
Starting point is 00:05:45 and potentially get exploited without really thinking it through. Like, hey, would Steve really send me a link on this Black Friday sale for patio cushions? Right, for example. Let's assume Steve feels strongly about patio cushions, right? Yeah, yeah.
Starting point is 00:06:04 You know, but anything like that, anything that might be coming up, they will try. And the reality is, 1% work. So 99% of people are going to see these and see right through them. They're going to see the email with misspellings. They're going to see, oh, it's a Word doc. I know not to open that, or it's a PDF. They're looking for that 1% that will. So for every single one you see, think about the people that you know in your open that or it's a PDF. They're looking for that 1% that will. So for
Starting point is 00:06:25 every single one you see, think about the people that you know in your life that are the least technical. And then think about them at their worst possible moment, right? Maybe they just saw a piece of news that was incredibly inflammatory. Maybe they just had a relative or someone they care deeply about get diagnosed with COVID-19, right? All of these scenarios are going to influence the way that they click and the speed that they click. And that's really, unfortunately, what the bad guys prey upon. Yeah, you know, it's also interesting to me how it sort of short circuits the rational thinking part of people's brains, as you say,
Starting point is 00:07:08 and tricks them into acting in a way that they probably wouldn't if they were in a better state of mind. Right. And, you know, unfortunately, we see this over and over again. There are regional specific versions. You know, we see a lot of stuff in Asia that's very specific to Asia. It's even been localized in the right languages that would make sense to the people in the regions. It's got social context that are specific to the region. And so it's a business now. It's not someone trying to get lucky.
Starting point is 00:07:42 It's not someone saying, I'm going to really nail that one person. No, they know they're getting 1%. But the thing is, to send out 200,000 emails has a cost that approaches zero. Yeah, and again, to contrast that against some of the other things that we've seen, and I know you and your team track things like some of these ransomware campaigns we've seen that have become highly targeted or some of these business email compromise campaigns that are really specific in who they're after. We still have these sort of spray and pray campaigns that are just running these massive numbers games.
Starting point is 00:08:22 Absolutely. And unfortunately, they're remarkably effective. And I think probably one of the biggest problems we see with this is the fact that we have so many people who were rushed to work from home who end up with these systems that aren't adequately protected, right? So now you have someone on the corporate network with potentially a laptop from their home
Starting point is 00:08:46 and let's say it's a law firm or a bank we hear a lot of reports about those having to make do because of the shortage of computers especially at the beginning of the pandemic they're on these computers that are the same ones that potentially are already compromised that other people in the household use connecting to corporate networks
Starting point is 00:09:04 and what we're seeing is ransomware potentially, are already compromised, that other people in the household use, connecting to corporate networks. And what we're seeing is ransomware just becoming much more pervasive. Now, this is going to sound like good news, but it's not. We're also seeing the business effectiveness of the actual ransomware campaigns evolving and becoming significantly more stable and more savvy in the way that they deal with victims. I mean, it's tempting to say customers because they actually offer levels of support. If you look on Twitter now,
Starting point is 00:09:36 you can see example after example of these chat rooms that are posted where it's a very transactional business service that's provided. And I even saw one the other day that had tips, like security tips from the malware authors. Right. And so that's how evolved this business has become. It's self-sustaining.
Starting point is 00:09:59 It's gone past gang or loose criminal activity into a small business, right? A small illegal business that takes advantage of other businesses. But this is now a professional entity with actual support staff behind it, with developers behind it, with hackers behind it. This isn't a one-person operation anymore. Right, right. It's not that old smash and grab of, you know,
Starting point is 00:10:23 breaking a shop window and running off with as much as you can. Well, let's go through some of the case studies that you all highlight in your research here. You've got a number of examples that you look at. Can you take us through some of them? Actually, I'm not even sure if this one made the write-up, but it was one that popped into my head just from a ransomware perspective. And that was the one that we published, I believe, shortly after this. I don't think it's referenced in it, but Wasted Locker. It's one of the big game hunting pieces of ransomware we saw. And the reason this one jumped out at me,
Starting point is 00:10:59 we were discussing it yesterday on one of our team calls. So this is a fairly sophisticated and successful piece of malware, but the actual interaction done on the victim's machine is done manually. What I mean by that is if you have endpoint defenses installed and you actually have someone auditing the machine, you can see typos in the command line and you can see them go back,
Starting point is 00:11:25 edit and correct those typos. It means that they basically have a team that are, I guess, working almost in shift-like work, waiting for the business day to end in the region that they have victims in. And then slowly but surely, it will become that victim's turn and a support person will go to that system and manually start spreading the malware, putting in the footholds for future compromise, putting in the ransomware, ensuring it gets to the right places on the network. It's gone from, let's try and have a piece of ransomware
Starting point is 00:12:02 that just hits everything, to let's have someone sit down with this network and ensure that this ransomware gets into the most valuable places. And presumably, let's also take the time and figure out what we think is a reasonable amount to pay for these machines. Now, are there still parts of the process that are automated of getting that initial foothold, determining whether a machine is liable to be breached here?
Starting point is 00:12:30 There could be some of it. Obviously, we saw the command line stuff being run, and that jumped out at us. Now, the interesting part about this, and this is why I wanted to make sure we talked about it, is that this is something that you can easily check on your systems. sure we talked about it, is that this is something that you can easily check on your systems. If you go to the Wasted Locker blog on your system, you can actually type in, obviously pick one of the benign commands, like maybe the ping sweep, but you can actually pick out some of the commands that the authors were running to recon the network and see if your
Starting point is 00:13:00 defenses pick it up. See if your client-based logging picks it up. See if your prevention systems pick it up. See if your client-based logging picks it up. See if your prevention systems pick it up. And it's surprising some of the stuff that gets by some systems, especially if they don't have the right defenses in place, which is what we're seeing in a lot of places. And so that's kind of why I wanted to bring this up, right? I mean, we're obviously seeing people using all kinds of lures and we're seeing them tuned to emotionally charged events. But we're also seeing ransomware now that is so sophisticated that while they could deploy it automatically with some success,
Starting point is 00:13:33 instead they will go in manually by hand and ensure that it gets into the right places, into the most damaging places, into things like domain controllers, into the data center. And they're doing this by hand. So it's pretty sophisticated and pretty nefarious stuff, unfortunately. So what are mitigations for this? What sort of specific things should we be on the lookout for?
Starting point is 00:14:00 Well, there's a couple of things you can do, right? The first one, and the one that we always mention, and I know this is right up there with saying patch everything, is make sure you have backups. And the most important part of that is make sure you have backups that are not accessible to the machines that are going to get compromised, right? Have off-site if you need to, or have a segment that only turns on for a specific window, something like that. But more importantly, make sure that it scales. Make sure that you can restore an entire building.
Starting point is 00:14:31 Make sure you can restore an entire department. That's what a lot of people miss, unfortunately. I think the second major one is to make sure you're practicing defense in depth, right? Make sure you have segmentation in place where you can. Make sure you're patching everything you can patch. You know, make sure that if you have anything that is known vulnerable, that it is segmented to the absolute maximum amount.
Starting point is 00:14:59 Make sure that there is some mitigation in place if it is exposed to other machines, right? That could be an intrusion prevention system, that could be a firewall with a very stringent access list. Obviously, the more layers, the better. And then down on the endpoints themselves, make sure you have some things to try and keep malware off of there. Make sure you have the browsers deployed as strictly and tightly as possible.
Starting point is 00:15:24 Make sure that you're not allowing people to use shared passwords across all kinds of machines. Rotate your administrator passwords. Minimize the number of people with administrator credentials. Have endpoint security on the device. There's a ton of stuff you can do. And if you're a business, you should speak to your vendor and find out if you've got enough layers.
Starting point is 00:15:46 You're never going to have something that's 100% hacker-proof, but you can at least make it very difficult for them to cause a large amount of damage. And if you can limit any potential impact to a small number of machines, obviously that's going to be very advantageous and make your recovery process so much easier. What about from the user's point of view of, you know, user awareness training of trying to make them less susceptible to respond to these, you know, emotionally charged things that are coming at them? I view that kind of like the Holy Grail. Like, you know, it's one of those things that obviously would be great if it worked, should work.
Starting point is 00:16:26 But we're kind of in an emotional cat and mouse game of people learning best practices and then adversaries trying to find a way to have people ignore those best practices. We're in unprecedented times. We don't have a global pandemic all the time. We don't have severe civil rights issues come to the surface so suddenly and so severely all the time. We don't have people who haven't been outside in a major way in potentially weeks or have taken a vacation in weeks, right? People are on edge now more so than ever before. So it's easy to say, prepare people and teach them, but I think the reality is right now, no one is operating
Starting point is 00:17:12 at their best. People are going to make mistakes. You need to have your network security posture with that in mind. You need to plan on the users clicking on things they shouldn't. The question you should ask yourself is, when the user does do something wrong, what's the worst thing that could happen? What's our playbook for mitigating that? Think it through. Think about, what if it's a keylogger? What if it's something that exfiltrates all the password hashes in memory? What if it's a piece of ransomware that tries to spread laterally?
Starting point is 00:17:42 Think through those scenarios and have plays for all of those possibilities. Is it possible that you could have some sort of analysis tool that's looking at your incoming email, looking for some of these keywords, and at the very least putting some kind of a flag on them that's saying, hey, we've noticed that they're talking about something that might get your dander up. So just be mindful of that.
Starting point is 00:18:11 Yeah, I'm pretty sure that's possible. I know we do that a lot with things like COVID-19, right? And several other phrases, we do flag stuff. I think you can even have it put into a separate folder as suspicious, because a lot of the time those types of emails should be sent from specific accounts or maybe to specific people. Obviously, you probably shouldn't be getting all your political newsletters at work. So there's a lot of stuff like that that can also happen. I mean, it's a pretty easy decision for the security office to say,
Starting point is 00:18:47 hey, you know what, I don't know that anyone should be reading politically charged emails at work, especially if we know they're being used in a malware campaign. But if we're co-mingling our computers and our home networks and all that kind of stuff, yeah. Well, and it's a whole other problem with COVID-19. You're going to have a significant amount of official emails from your office probably about COVID-19
Starting point is 00:19:09 and about what the company policy is, how to safely enter and exit offices. So it's a really complicated situation and we may never see anything like it again, which is why I think it's so important that people really take a long, hard look at defense in depth and what they've done at every layer, because mistakes will happen, right? We're humans, they're going to happen. So figure out if mistakes are made at each layer,
Starting point is 00:19:34 what are the other gates that will stop an adversary? Our thanks to Craig Williams from Cisco Talos for joining us. The research is titled Adversarial Use of Current Events as Lures. We'll have a link in the show notes. Cyber threats are evolving every second, and staying ahead is more than just a challenge. It's a necessity. That's why we're thrilled to partner with ThreatLocker, a cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely.
Starting point is 00:20:33 Visit ThreatLocker.com today to see how a default-deny approach can keep your company safe and compliant. The Cyber Wire Research Saturday is proudly produced in Maryland out of the startup studios of DataTribe, where they're co-building the next generation of cybersecurity teams and technologies. Our amazing CyberWire team is Elliot Peltzman, Puru Prakash, Stefan Vaziri, Kelsey Bond, Tim Nodar, Joe Kerrigan, Carol Terrio, Ben Yellen, Nick Vilecki, Gina Johnson, Bennett Moe, Chris Russell, John Petrick, Jennifer Iben, Rick Howard, Peter Kilpie, and I'm Dave Bittner. Thanks for listening.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.