Expert To Reveal Data Theft Secrets

A security expert is to warn that just as breaking into a bank is pointless without a getaway plan, so too is breaking into a network without the ability to sneak away with data.

The exfiltration stage of data theft often garners less attention than the methods used to infect computers, but is no less important. At Black Hat DC, Sean Coyne, a security consultant at Mandiant, is offering attendees a look at some of the more advanced ways attackers sneak data out of the digital doors of enterprises.

“We’ll be covering the basics of data exfiltration along with a few examples of more advanced methods and tricks we’ve seen in recent incident investigations that we have performed for clients,” Coyne told eWEEK. “Specifically, we’ll be talking about archiving and compression, selection of file-staging locations, encrypted tunnels, and malware that uses public web mail or chat programs to transmit data. We’ll also highlight how many of the common data-theft techniques are simple, use common tools and protocols, yet are widely utilized because they still work.”

Tricks Of The Trade

Like an autoimmune disease, sophisticated attackers sometimes turn a target’s IT infrastructure against the target itself. For example, Coyne explained, most organisations maintain a relatively “flat” internal Windows network with little-to-no network-layer access controls restricting workstation-to-workstation and workstation-to-server communication.

“The same environments tend to reuse local administrator passwords and allow most of their domain users to log in to their own systems with elevated privileges,” he said. “This makes it trivial for an attacker to start out with a small number of victim users, compromised via something like a spear-phishing email, and leverage administrator privileges for lateral movement and access to servers and other systems housing critical data.”

As a compromise evolves, the attacker may also leverage existing remote access tools such as VPNs after they have obtained the requisite credentials, he added.

Attackers temporarily compile the data they steal in a staging area on the victim’s network before moving it out to their own systems, the researcher said. The staging point is usually a workstation, but could also be a server or other system on the network with outbound access to the Internet.

Staging Process

“Attackers typically choose an existing system directory on the host, such as the parent RECYCLER or System Volume Information (Restore Point) folders, and set attributes so that [victims] won’t come across the files during normal usage,” he said. “Once the data has been sent out of the network from the staging point, the attacker can clean the area by removing the files and any other traces of activity.”

“Host-based detection of in-progress data-theft activity is extremely rare; attackers tend to use and reuse the same staging systems and directories to facilitate consistent processes, minimize their footprint and clean up their tracks,” he continued. “For both victims and investigators, it’s important to be aware of these methods and quickly recognize an attacker’s habits so that they know what to look for throughout a compromised environment.”

Attackers also look to dodge DLP (data-loss-prevention) tools. Most organisations, Coyne said, have not implemented true end-to-end DLP tools to cover both endpoints and the network. Many of these products appear to be designed to detect unsophisticated or unintentional disclosure of protected data by users rather than protecting against a targeted attack, he added.

“A more significant problem is that most organizations still give all of their users Local Administrator privileges to their own systems…Specific to DLP solutions that rely on network traffic inspection – our talk covers a myriad of techniques for compressing, encrypting and otherwise obfuscating stolen data in ways that easily bypass this type of monitoring,” he said.

The best strategies to contain and limit attacks include enforcing strict network-segmentation, privilege-management and fundamental Windows security architecture best practices, he added.

Coyne’s talk is scheduled for 18 January and the conference itself will run from 16 to 19 January at the Hyatt Regency Crystal City hotel in Arlington.

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Open Source Groups Warn Of Ongoing Attacks

Open source groups warn of sophisticated social engineering attacks targeting JavaScript and other critical projects

8 hours ago

Hong Kong Approves Bitcoin, Ether ETFs

Hong Kong financial regulator approves exchange-traded funds for Bitcoin, Ether as it seeks to become…

9 hours ago

Trump Media Shares Buckle Over Secondary Offering Plans

Shares in Donald Trump's social media company Trump Media plummet on Monday after company announces…

9 hours ago

Apple Loses Smartphone Crown To Samsung Amidst China Pressure

Apple cedes top smartphone sales spot back to Samsung in first quarter as China sales…

10 hours ago

Apple’s Tim Cook Visits Vietnam Amidst China Troubles

Apple chief Tim Cook visits Vietnam as company seeks to expand consumer sales, diversify manufacturing…

10 hours ago

US Awards $6.4bn To Samsung For Expanded Texas Chip Production

US awards $6.5bn to Samsung Electronics under Chips Act as it seeks to expand domestic…

18 hours ago