Threat actors can be evasive, clever, and complex — but fortunately for defenders, they are also predictable. There is only a limited number of methods to access an environment, and when an attacker finds a technique that works, they tend to reuse it.
That’s not to say threat actors — especially those in state-sponsored, high- profile ransomware groups — aren’t getting more sophisticated. Adversaries have the same access to endpoint detection software as customers do, and thoroughly test their attacks against them to hone their evasion techniques. More advanced attackers are always attempting to stay ahead of the curve by leveraging new exploit kits, vulnerabilities, or malware loaders.
Another concerning trend is the shortening of ransomware dwell time: the time it takes for an attack to complete, from initial access to exploitation. We’re no longer seeing as many attacks in which adversaries lurk in an environment for weeks or months before exfiltrating data. Attacks happen quickly — and at inopportune moments, like holidays and weekends — and defenders, too, must work quickly to stop an attack in its early stages.
But there’s good news. Although today’s attacks may appear more sophisticated, the techniques, tactics and procedures (TTPs) used to launch those attacks remain the same. Adversaries often take the approach of working harder, not smarter; finding easy, low-cost and relatively simple methods to launch attacks.
By studying patterns in attacker behavior, we can better understand those methods — no matter how advanced — and detect them accordingly.
Behavior-based detection and signaturebased detection are both valid approaches, but monitoring behavior can identify the paths that an adversary takes on the road to an attack — even if those behaviors seem legitimate. Focusing on attacker behavior and what initiated that behavior is a strong indicator of a potential threat or attack in progress.
As defenders, we’re always interested to get inside of a threat actor’s mind. Looking at their patterns in behavior is the closest way to achieve that.
Blumira’s platform incorporates hundreds of different findings that detect suspicious behaviors that may indicate an attack in progress. This report is based on research from 33,911 key findings from a sample including 230 organizations, which took place over the course of 2021.
These 33,911 findings are filtered to exclude outliers and low-priority alerts that we considered less significant, including account lockouts and blocked websites. That’s not to say that these alerts should be ignored, but we decided not to include them for the sake of accurate, relevant data.
To understand how we generate these findings, let’s take a step back. Blumira’s incident detection engineers (IDE) take an intentional approach to rule design to reduce alert fatigue.
First, our IDE team creates rules based on threat-based research, pulling data from various threat intel reports to determine how current threat actors operate.
Once the team emulates attacks in a lab environment, they identify and build detections based on the threat actors’ behavior.
Then the detection is tested again across customer datasets to remove false positives, reducing noisy alerts to help customers focus on priority findings.
Blumira’s platform stacks similar alert data to already-triggered findings until the case is closed, helping to prevent alert fatigue and providing all relevant evidence to assist with investigation.
But it’s not enough to be able to detect and respond to an attack in progress. As attacks happen faster, security and IT teams must be able to both detect and respond quickly before real damage occurs.
Time to detect and respond refers to the time it takes to identify a compromise and contain the threat (sometimes referred to as the “breach lifecycle”). It directly affects the bottom line of an organization, with the longer the breach takes to detect and contain, the higher the overall cost.
In IBM/Ponemon’s 2021 Cost of a Data Breach report, they found that breaches that take longer than 200 days to resolve can result in 35% higher cost, from $3.6 million to $4.9 million on average.
The total average breach lifecycle
(Source: IBM/Ponemon’s 2021 Cost of a
Data Breach)
Blumira's detection engine includes real-time, or instantaneous, individual findings that notify a customer almost immediately of a potential threat, such as detecting a virus on your network – the median time to detect for these types of findings is 50 seconds
Threshold-based findings are based on a certain event happening multiple times over a set period of time. For example, in a password spraying attack, an attacker will attempt to log in by trying a large number of usernames with a single password, which can help evade detection. In this case, notification will happen only after the behavior is observed over a certain period of time.
Downtime and disrupted business operations means a loss in revenue, especially for companies without a disaster recovery plan. Downtime costs related to ransomware are on average nearly 50 times greater than the ransom, according to a Datto study
A ransomware attack can make customers feel uneasy, leading to damaged reputation, and subsequently, customer churn. 86% of people are less likely to deal with companies that experienced a data breach, according to a Semafone stud
Companies must follow up with their affected customers after a ransomware attack, and cover costs related to credit monitoring and identity protection services.
If customer data was breached as a result of the ransomware attack, then companies must incur legal costs related to third-party claims.
Remediation costs include implementing forensics and investigative work, as well as containing the actual breach. Remediation costs grew from an average of $761,106 in 2020 to $1.85 million in 2021, according to Sophos..
Paying a ransom could breach OFAC regulations and result in needing to pay compliance fees on top of that ransom.
So it’s clear that the time to detect and respond has a major impact on your business, and may be devastating for smaller organizations that have less resources to help them recover from lost revenue.
Small and medium-sized businesses (SMBs) that experienced a data breach in 2021 suffered costs of $2.98 million, according to IBM
(Source: Blumira's 2021 dataset)
Average time to detect a breach
(Source: IBM/Ponemon's 2021 Cost of a Data Breach)
Average time to respond, or how quickly a customer closed findings
(Source: Blumira’s 2021 dataset)
(or 1,800 hours) Average time to respond to a threat
(Source: IBM/Ponemon’s 2021 Cost of a Data Breach)
We’ve analyzed and compiled the top findings based on our data. Those top findings highlight a few trends, some of which we’ll delve more deeply into later on in this report.
Here are some trends we’ve witnessed:
Our findings revealed patterns of Microsoft-related activity, including activity associated with password spraying, lateral movement, and business email compromise.
Our findings revealed patterns of Microsoft-related activity, including activity associated with password spraying, lateral movement, and business email compromise.
Our findings revealed patterns of Microsoft-related activity, including activity associated with password spraying, lateral movement, and business email compromise.
MITRE ATT&CK technique: Data Exfiltration
What does it mean? This can indicate a business-related connection or data exfiltration. Depending on the protocol it may be important to consider the security of the connection if this is business related traffic. It is recommended to correlate with the source to determine if this is an expected connection as well.
MITRE ATT&CK technique: Persistence: Account Manipulation
What does it mean? It’s uncommon for a threat actor to add an admin-level account, but it’s important for IT and security teams to audited and validate each creation of an admin-level account when they occur to avoid scope creep or attackers gaining access.
MITRE ATT&CK technique: Execution: System Services
What does it mean? The Windows service control manager (services.exe) can enable threat actors to execute malicious commands or payloads via a temporary Windows service.
MITRE ATT&CK technique: n/a
What does it mean?Okta logs aren't flowing properly to your SIEM, meaning you may have a gap in detection coverage. It's important to be aware of IT operational failures for both compliance and security.
MITRE ATT&CK technique: Credential Access
What does it mean? Someone is actively attempting to access your honeypot and is unaware of its nature.
The most popular cloud collaboration tool is also highly targeted by attackers– so how can small & mid-sized businesses protect themselves?
MITRE ATT&CK technique: Defense Evasion
What does it mean? An insider or threat actor may be
attempting to clear evidence to cover their tracks after
malicious activity.
MITRE ATT&CK technique: Account ManipulationAccount Manipulation
What does it mean? A threat actor using an admin account can modify a Microsoft 365 group to add users or grant additional permissions, resulting in data leakage and access by unauthorized users..
MITRE ATT&CK technique: Lateral Movement: Remote Services
What does it mean? An attacker may be moving laterally within your environment and interacting with remote machines using compromised credentials.
MITRE ATT&CK technique: Lateral Movement
What does it mean? An attacker may be moving laterally throughout your environment and attempting to reset passwords for other accounts.
MITRE ATT&CK technique: Persistence: Account Manipulation
What does it mean? Someone that creates a security group can grant members of that group access to certain things, such as a SharePoint site. This may lead to insider risk or elevation of privileges.
Microsoft is the top three of brands impersonated in BEC attacks, according to
Abnormal Security.
Over the last decade, as organizations moved from on-site email systems to cloud-based, scammers have adapted. Small and medium-sized businesses (SMBs) as the most vulnerable to these types of scams due to lack of resources and being priced out of most defensive security solutions.
In losses from cloud-based BEC scams between 2014 and 2019, according to the FBI.
Business email compromise (BEC) is when a threat actor uses social engineering and impersonation to trick employees into sending payments or sensitive data to their accounts.
One example is the impersonation of an executive, sending an email to an employee asking for gift cards or wire payments. With a legitimate-looking domain name or compromised email account, a recipient may be fooled into fulfilling the request out of a sense of urgency. BEC is basically a form of phishing that involves sending money directly to fraudulent accounts.
If your organization uses Microsoft 365, it’s likely that a lot of data flows in and out of it — making it a prime target for attackers.
Ensure you can detect suspicious activity such as creating inbox rules or external email forwarding rules
Check for MFA misconfigurations or instances of MFA
being disabled
Monitor your Microsoft 365 environment to be able detect threats early enough to stop an attack
Living off the land techniques involve using tools that already exist within a system to conduct attacks. Many of these tools are used by sysadmins for legitimate work, making it difficult for defenders to distinguish between malicious behavior and an admin simply doing his or her job.
of detections were malware-free in 2% Crowdstrike’s 2022 Global Threat report.
Low cost. These attacks take advantage of tools that already exist within an environment, so attackers don’t need to buy or create malware or attack tools, saving money and time. You can’t get better than free.
The Problem With Living off the Land
Living off the land behaviors often take place over a period of days or weeks, and during this time, an attacker can go undetected by endpoint detection tools because the attacker is not using anything that is known to be malicious.
This means that endpoint detection and response (EDR) tools may have a hard time detecting attacker behavior until it is too late — for example, when an attacker introduces malware into the environment.
Even when an EDR tool does alert on questionable behavior, it’s very easy for an admin to miss or dismiss an alert that looks like normal behavior without additional questionable behavior identified from other IT and security systems that provide context. A single agent alerting on a single machine often isn’t enough visibility and context to stop savvy attackers.
Top LotL Techniques
Service Execution with Lateral Movement Tools
The Windows service control manager (services.exe) can enable threat actors to execute malicious commands or payloads via a temporary Windows service.
PsExec is a command-line tool in Windows that lets privileged users execute processes on remote systems and redirect console applications’ output to the local system so that these applications appear to be running locally.
Attackers use it for the same reasons, providing a convenient way to move laterally and interact with remote machines using compromised credentials. Only authorized users should be utilizing PsExec on the network.
PsExec Use
Threat actors can use PsExec maliciously to move laterally throughout your network, to execute commands or payloads, or to conduct remote execution.
Potentially malicious PowerShell command
PowerShell is like the swiss-army knife of tools, enabling adversaries and admins alike to perform a variety of tasks.
.NET User: Recon commands
Microsoft’s Net user command utility allows for queries about both local users and domain users. While useful for systems administrators, it is often used by malware, and hands-on threat actors as an unobtrusive way to begin discovery in an environment.
PowerShell is one of the most powerful tools to control a Windows machine from within. Only necessary users should have the ability to use PowerShell. Each additional user opens up another security gap, enabling attackers to have an elevated foothold in your network as soon as they’re able to access one of those users, hosts, or sessions.
increase in PowerShell threats in Q4 of 2020
(Source: McAfee)
Detecting living off the land techniques requires an understanding of what legitimate behavior looks like in your environment.
Pare down access to PowerShell to only the necessary users can help more easily determine your organization’s definition of normal PowerShell activity
Once you establish a baseline, you can more easily identify spikes in activity and abnormalities that may indicate an attack in progress.
Combine EDR tools — that may mis LotL techniques — with a behavior-based detection approach.
IThe pandemic forced many organizations to move to cloud services to support their remote employees. For organizations without a solid understanding of their exposed attack surface, moving to a cloud environment only highlighted that knowledge gap.
In identity-based attacks, threat actors take advantage of those knowledge gaps by exploiting, misusing, or stealing user identities.
of breaches are identity-driven
Identity-Related Findings
We found that identity-driven techniques were common; 3 out of Blumira’s top 5 findings (60%) were identity-related:
Attempts to authenticate into a honeypot was Blumira’s #1 finding of 2021.
What’s a honeypot?
A honeypot lures attackers with a network device that appears to contain valuable data. Once an attacker tries to log in, scan the device, or attempts to access a file on the device – the honeypot will notify your team.
Types of Honeypots
As identity-based threats become more common — especially for cloud services — aim to get more visibility into your environment:
Enable multi-factor authentication to reduce the risk of unauthorized access due to credential compromise.
Limit domain access to small groups to limit exposure and lower your chances of a malicious actor gaining access to domain accounts.
Use honeypots to stay one step ahead of attackers and to be aware of potential intruders
How Blumira Can Help
FOR SMALL & MEDIUM-SIZED BUSINESSES
Lean IT teams struggle to defend against cyberattacks and meet compliance requirements.
TIME-STRAPPED
Managing security tools requires threat hunting, managing rules, parsing data, developing integrations and more.
NO 24/7 TEAM
Lean IT teams struggle due to high costs of enterprise solutions, talent shortage and lack of security expertise..
.
COMPLEXITY
Too many disparate solutions results in redundancies and lack of visibility into remote endpoint risks
EASY
Reduce reliance on humans to complete manual security tasks to save time and refocus efforts
EFFECTIVE
Accelerate breach prevention and ransomware protection with security automation
.
EFFICIENT
All-in-one open platform simplifies workflows with hybrid coverage, satisfying more compliance controls
Blumira’s open XDR platform makes advanced detection and response easy and effective for small and medium-sized businesses, accelerating ransomware and breach prevention.
Time-strapped IT teams can do more with one solution that combines SIEM, endpoint visibility and automated response.
Blumira does the heavy lifting to pare down the overwhelming amount of data from logs into actionable events. That allows us to focus on revenueenhancing activities.
Michael Cross, CIO Greenleaf Hospitality
FEATURES:
BENEFITS:
Reduce complexity by consolidating security tools into one platform
Integrate broadly to provide insight across your entire environment
Use automation to speed up detection and response
I don’t have the staff dedicated to sit and read logs all day or with the skillset to analyze our data. We chose Blumira for its simplicity – I needed a solution that would simplify, consolidate and show me what I really need to see.
Jim Paolicelli, IT Director Atlantic Constructors
Blumira makes security easy and effective for SMBs, helping them detect and respond to cybersecurity threats faster to stop breaches and ransomware.
Contact us to trial Blumira’s XDR platform & get: