Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In July, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) updates, and SOC engineering insights.
The Principal Digital Forensics and Incident Response (DFIR) Consultant discussed attacker-in-the-middle (AiTM) phishing and what the incident response team usually sees when responding to these threats, specifically those involving emails.
AiTM attacks are when an attacker covertly intercepts and modifies emails between two parties and uses these communications for malicious gain. These attacks have become more popular over the last several years, mostly due to the widespread implementation of multifactor authentication (MFA) for email. Years ago, threat actors used phishing kits, but MFA has reduced the window of opportunity for success, forcing threat actors to migrate to AiTM attacks to access the network.
Launching an AiTM attack requires four steps:
The Principal DFIR Consultant also discussed the difference between token interception and token theft. In token interception, the token never makes it to the user, which is what happens in AiTM attacks. The user simply logs in, and the threat actor intercepts the communication and compromises the user’s credentials to gain access. In token theft, the threat actor actually steals the authentication token from the user’s browser, which is much more difficult than token interception.
To prevent an AiTM attack, user training can help employees identify suspicious emails and web pages and know when to report an incident to the security or IT department. The team suggests that a branded login page can help an employee identify whether an email is legitimate. Also, a password manager, especially one tied to a URL, is beneficial because it can autofill a user’s credentials in most instances but not on a phishing site.
The Vulnerability Management Program (VMP) Team Lead reviewed notable vulnerabilities from June and July. As many as 3,400 vulnerabilities were disclosed, and 15 of those vulnerabilities were high risk. Of those 15, four of the vulnerabilities had publicly available proof-of-concept codes on the internet, and six were known to be exploited in the wild on products including Google, Microsoft Windows, Linux, Check Point, Veeam, SolarWinds, MOVEit, and Zyxel. The VMP Team Lead talked in detail about a few of these vulnerabilities:
This SSH vulnerability attack is difficult for threat actors to execute for a few reasons. It’s a time-intensive attack that can require up to 10,000 attempts and can take days to complete. In addition, the attack is more difficult on a 64-bit system due to the larger memory, the attack is harder to execute on a system that has denial-of-service and brute-force protections operating on it, and the attack can only occur when Open SSH is running on a Linux system that’s used in a specific C library. For these reasons, the team expects that this vulnerability will be exploited only in targeted attacks rather than as a mass exploitation event.
The SOC Analyst talked about recent trends that the SOC team observed in June and July. He started by discussing activity from Storm 1811, an advanced persistence group that uses Quick Assist with social engineering to leverage its victims’ systems. The attack initiates by getting the victim to install the Quick Assist application and furthers as the threat actors establish persistence and command and control. The team has seen a huge uptick in these types of cases and has diligently addressed these incidents on a case-by-case basis. Typically, the team blocks Quick Assist as a best security practice.
In addition, the SOC Analyst discussed the top three alert drivers that the SOC observed in the 30 days prior to the webinar.
The Technical Advisor of SOC Engineering discussed a few ways the SOC is addressing phishing, AiTM, and business email compromise (BEC) attacks.
As an important new way to prioritize threats, the SOC has developed a composite scoring rule by creating multiple queries within an alert rule that pivot off of known bad tactics, techniques, and procedures (TTPs). These known bad TTPs are gathered from threat intel sources, the DFIR team, and the SOC’s own logs. As the intel sources and DFIR team encounter phishing, AiTM, and BEC cases, they provide the SOC with specific indicators of compromise, such as specific user agents, and other indicators that can be flagged as malicious.
Once the SOC has a good grouping of known bad TTPs, the team assesses them and rates the severity of the alerts based on multiple indicators. That way, the SOC can identify the priority level of each event and properly address the most severe threats first. For example, if a single alert comes in with a score of 20, it may not reach a threshold that requires action. But if a single alert reaches a score of 50, the team may mark it as a priority 3 event, and analysts will address it at that priority level. If an alert has a score of 175, the team will mark it as a priority 1 event to be addressed immediately because an account has likely been compromised. This new composite scoring rule allows the team to efficiently address threats in the order of importance to keep clients protected.
Another way the SOC can hone in on attacker activity is the use of Axios, a user agent employed in AiTM campaigns that can be used to identify an indicator of an attack. In particular, the team uses KMSI or “keep me signed in” as an indicator that an attacker is attempting to maintain persistence on a system. Also, a session ID — or any compromised session — is a good way to detect malicious AiTM activity using Axios. When the team sees KMSI or a session ID appear in Axios, it factors that into the composite score to prioritize the threat.
As always, the team asks clients to share their important hosts, significant IP addresses, VIP lists, honey tokens, and anything distinct to the network that can help it protect against threats.
The Pondurance team will host another webinar in August to discuss new cybersecurity activity. Check back next month to read the summary.