Page 77 - Cyber Warnings August 2017
P. 77

this isn’t always easy, as some hackers live ‘off the land’ using existing commands, DLLs, and
               executables, or use direct memory injection to avoid detection.


               Another such indicator is persistence — the presence of tasks, auto-run registry settings, browser
               plugins, and even tampering with service settings all demonstrate an endpoint is compromised.

               2. Strange contextual information around logins
               More indicators of compromise can be found by analysing the contextual information around login
               attempts. Logons often are the first step to gaining access to an endpoint with valuable data on it.
               Indicators of a breach include a login on an endpoint that isn’t usually used by the person who owns

               those login credentials, like the CEO logging on from a machine in the accounts department. Another
               indicator might be a logon at a strange time of day, for example a user with a 9–5 job function logging in
               on a Saturday at 3:00am. Abnormal login frequencies are another red flag, especially for those that login
               once at the beginning of the day and log out at the end of the day. Anything more than two logins from
               that kind of person should be enough to alert you to a breach. Finally, login concurrency is a huge
               indicator of a breach. Most users log on to a single endpoint, so seeing a user like that suddenly logged

               onto multiple endpoints simultaneously is sign of something bad.

               3. Lateral movement
               Lateral movement is the process of jumping machines in an attempt to locate and access a system with
               valuable data — something that’s necessary for most attacks because a hacker’s initial foothold is often a
               low-level workstation with no access rights to anything of value. The analysis of the combination of
               connection types (via RDP, SMB, etc.) and authentication (read: logons) can point to indicators of a

               breach. For example, low-level users rarely use IT-related tools, scripting or RDP sessions, so if you find
               someone using those, you’ve possibly had a breach. Abnormal network traffic is yet another indicator of
               compromise — tools like Netcat can direct communications over allowed ports, and any kind of existence
               or excess of traffic not normally seen (for example SMB, RPC, RDP, etc.).

               4. Suspicious data access

               Even access to data is relatively predictable over time, which means that any access at a strange time of
               day or after hours can indicate a compromise. Location is also an important factor — valuable data
               normally accessed by endpoints within the network should be monitored for access by endpoints that are
               either external to the network or on the perimeter. The last indicator of compromise is access to an
               abnormal amount of data. Sudden increases in data being sent out of the network or increases in data
               reads, exports, copies or saves of valuable data is a clear sign that something malicious is going on.





                    77   Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   72   73   74   75   76   77   78   79   80   81   82