Sie sind auf Seite 1von 16

How Hackers

Plan Their Attacks


To protect yourself from them, you must understand them
The mind of a hacker
My name is Hacker Jack. That’s not my Some of us work inside your company
real name, but it’s the name I use when and have access to credentials,
I work. I visit enterprise networks all day passwords and confidential data. We
long. Sometimes, in the middle of the might work for one of your competitors
night. I get a big thrill out of defeating and we’re busy looking for your
your cyber defenses. You will never find product and financial data as well as
me. your business plans.
There could be a million of us by now. But I am a soloist. A ransomware
More are joining our ranks every day. wizard. I use my knowledge and the
A lot of us are making money at this extraordinary tools of my trade to
game of attacking your networks and make money – lots of it. By demanding
endpoints, and stealing your data payment in cryptocurrency, I can
or disrupting your operations until keep out of sight while you make me
you pay up. Others simply enjoy the wealthy.
excitement of disrupting your world.
Causing mayhem can be so much fun.

2
I have you in my sights
I am not new at this. It takes me just a What attracts my attention? How do I
little time to prepare my attack. I like to decide when it’s your turn?
check out the territory before I decide
I love easy-to-penetrate endpoints.
where to strike. So little time, so much
They are often connected to the
opportunity.
Internet 24/7, even when nobody
My targets are stagnant. The networks is working on them. I can take my
just sit there waiting to be assaulted. time to see what kinds of security
The so-called state of the art in cyber mechanisms they have installed. Even
defense is really backwards. You wait when somebody is there, I can usually
until I enter your space and only then go about my business without them
do you try to discover me and my knowing. Once I have access to one
“wares”. Hey, I’m already in before you endpoint, it becomes quite easy to
even get started! jump to another.
It’s a cat-and-mouse game. All day, my My favorite activity is tricking users
comrades and I study the latest cyber into helping me penetrate their own
defense methods. Then, we work on endpoints. I love that! It’s easy and very
solutions that defeat them. When you rewarding.
catch onto what we are doing, we catch
onto your new defense and keep a
step ahead.

3
Your data for a ransom
There are all sorts of hackers and we all I can just look around the Dark Web
have our own reasons for doing what and find something innovative, learn
we do. it, work my magic and adapt it to my
needs.
I am a ransomware specialist. One of
the best. Hackers who go for ransom Now, I want to make another bundle of
are the biggest risk-takers in the money. Whom should I target and how
business. We’re not only breaking shall I trick them into helping me?
the law, we’re also disrupting your
Why do people rob banks? Because
operation – and in a big way. But that
that’s where the money is! My ideal
payoff!
targets are people who will pay up.
Alternatively, I could target Organizations have more to lose than
organizations for their sensitive data individuals, so I go after those. I aim
and blackmail them. Or I could write a my weapons far and wide until I find
banker trojan to steal money from bank an unsuspecting innocent user at an
accounts. Either way works for me. I enterprise whom I can sucker into
especially like the thrill of encrypting helping me gain a foothold.
critical data and imagining the look on
their faces when they discover their
sorry situation.
I don’t need to create my attacks from
scratch since there are so many sources
for working code. My colleagues and
I collaborate on the tricks of our trade.

4
An attack like a five-stage rocket
I proceed toward my nefarious goal in discrete stages:

1 4
Planning. I decide what kind of attack I will do
this time and how I will go about it. I am the
wizard of ransomware, so that’s the way I play. C2. I set up a Command & Control (C2) Center,
My colleagues have their own methods and go just a fancy name for my server that I use to
to great lengths to plan the perfect operation. I’ll enable the whole exercise.
describe my plans to you a little later in each of
the stages.

2 5
Dropper. I borrow or create a dropper – a simple
piece of code that I brilliantly disguise, tricking Execution! This is the exciting part. I can’t begin
you to place it on your own computer. When run, to describe the utter ecstasy when the money
the dropper will install the payload onto your comes rolling in and the international media are
computer. It’s usually concealed in an innocent full of stories about my exploit.
looking file so you don’t even know it’s there.

3
Payload. I create or modify a high-precision piece
of innovative malware and hide it somewhere in
cyberspace. It’s poised to cause your company
great damage upon my command.

5
A dropperful of sugar
makes the medicine go down
I am going to start by creating the in several ways by: vulnerabilities are like a big
dropper, the attack element that  Coming up with a new vulnerability, welcome sign. That's how the
penetrates your computer. The a Zero Day, exploiting a bug in Equifax data breach made a slam
dropper lies low until you open the the application (Microsoft Word dunk. Those credit records are still
host file, and then, pow!, it delivers and in this case) that I can manipulate echoing across the Dark Web.
executes the malware payload. to run my own code. This is VERY  Writing a malicious VBA macro, a
I could send you the malware directly, difficult and time-consuming. I can scripting language for MS-Office
so why do I bother with a dropper? purchase such a vulnerability, but files, to hide my true intentions.
that will be very expensive (could
My dropper is lightweight and I like the second option of abusing a
be millions of dollars). It will be
camouflaged in a file that you would known vulnerability. It’s cheap and easy
discovered quickly and the cyber
be intrigued to open. It could look like and will work in enough cases to make
security companies will provide
a calendar invitation, a purchase order me wealthy (many IT departments don’t
patches for it right away. I don’t ever
or a CV from a friend. Click on an email keep up with security patches). I will just
do this.
attachment and, presto!, my dropper get hold of an exploit kit that can be easily
 Using a known vulnerability, an found online, make some modifications
is stealthily sitting on your drive. Your
N-Day, and exploiting the fact to get it ready, and bitcoins, here we
cyber software is unlikely to find it.
that many organizations tend not come!
The dropper’s job is to run the code to deploy patches so often, so it
that fetches the payload. I can do that might still be effective. Unpatched Dropper is ready!

6
I just dropped in
Now, I have to get my dropper onto  Use other collaboration channels  Place my dropper somewhere  Follow the lead of several of my
your computer. I can: like Instant Messaging (IM) and on the web. I’ll give it a name that friends who give your employees
cloud storage. This method is makes you feel comfortable. I’ll bet a free flash disk with some cool
 Use email, by far, the most common
relatively new but becoming hundreds – maybe thousands – of software. Shove that into your
delivery method. Tried and true
popular. Guess what? They are even you will click and, in so doing, will USB port and I’ve got you! But
and frequently successful, this is my
less protected than emails. Nice. download my dropper. that requires physical media and
fave.
financial outlay – not my style.

Cloud
Drives

Email Instant
Messaging

Files
URL/
Web Content

7
You’ve got mail
My usual modus operandi is email. It’s requires validation (e.g., verification of I really like these lists of accounts
ubiquitous. It’s anonymous. I can spoof phone number and behavior analytics because they also let me get into more
my address and send thousands of that validate the veracity of mass email accounts and send to their contacts.
emails from anywhere. In fact, 96% of traffic). I don’t want that. People are more likely to trust emails
attacks are delivered this way. Email that come from someone they know.
If I send the same email to hundreds
isn’t going away, so I will be able to
of thousands of recipients, it will To remain untraceable, I also need to
keep using it again and again.
surely be flagged as spam, reducing be super-careful to use different IPs
I would like to mass-distribute my my conversion rates. So, I need a and hacked routers. Not a big problem.
dropper to hundreds of thousands variety of outgoing mailboxes. I Plenty of those around.
of people. It’s easy to obtain volumes return to the Dark Web and find a
of bona fide email addresses. Lists list of email addresses that my fellow
abound and they’re virtually free to hackers have obtained during their
obtain. I can download 100,000 in a successful careers. Previously hacked
few seconds. email addresses and passwords and
personal identifiers are perfect for
Now, equipped with your email
higher credibility and diversity and they
addresses, I have to implement a
make it harder for spam filters to catch.
method for making sure enough of

96%
you see the emails I am going to send
your way. I just need to overcome a few
obstacles.
of attacks are via email
Anonymity for mass-emailing is not that
easy. Sending attachments from free
email vendors like Gmail and Yahoo

8
We are becoming attached

Because most people trust MS-Word So, here it goes. 100,000 emails on
files without hesitation, I hide my their way. The law of averages means
dropper in a docx file attachment to that some significant number of
my email. I give it a catchy name that recipients are going to click on the
people like to click on. I will call it “CV” attachment. Even if it’s only 1%, that’s
because studies show that people tend 1,000 “conversions” – computers that
to open CVs even from contacts that my dropper can infect.
they don’t know personally. “CV” will Did you get one of my emails? Just
be the attachment to my email. click on the attachment and…

9
Under the radar
Your computer is probably protected The average dwell time – the time
by a goodly number of cybersecurity that exploits remain under the radar
measure like anti-virus software (AVs). – is a full six months. Once my stuff
infects your computer, it can remain
I have to make sure that once the
undetected for a very long time.
dropper shows up in your email, it
won’t be detected by the AVs or other So, I have successfully delivered my
cybersecurity solutions before you dropper onto your computer.
click on the attachment. This part itself
is very challenging as there are many One click and you activate
AVs out there, there are many versions my payload.
of the application that I want to exploit,
and there are many versions of popular
operating systems. I need to check as
many such versions of everything as
possible to make sure my dropper will
not be flagged as malicious.
It’s painstaking work, but I am
experienced and very good at it.

10
Anatomy of malware
What’s this payload all about? It’s the
ransomware, the essence of my attack.
Creating such malware is a true art
form. Effective malware consists
of many parts, each with its own
complexity and sophistication. I have to
take into account many key issues:

 Evading AV Signatures
Regardless of any action the AVs
might take, my malware’s execution
must be undetectable, at least
for a minimum amount of time.
Sometimes, AVs proactively stop
actions that they determine to be
malicious; I must make sure that
no AV stops the execution of my
pretty payload of ransomware
until it completes its task of
encrypting data on the computer.
Therefore, I have to hide all external
communications, file accesses and
other tip-offs from the AVs.

11
Anatomy of malware
 Running in Stealth  Encryption Strategies  Risk Mitigation  Spreading Across the Network
I don’t want the human user to My malware is designed to encrypt Every cybersecurity solution is on I want my malware to reach as
notice anything unusual running on as much data as possible before the lookout for ransomware. It’s many computers in the network
the computer. I must make sure that the user senses that something going to be detected very quickly. as possible. WannaCry spread
the malware doesn’t consume too is wrong. Should it start from There is a very short window of so quickly and widely by using a
much compute. My sophisticated encrypting the most important data time until AVs detect my dropper vulnerability that was published
malware will be injected into a so as to ensure that the user will pay once it goes into execution and my by the NSA. Finding a great
legitimate process. Since injection is the ransom? Or maybe it should malware payload, and they will kill it vulnerability or using one that
the method used by many hackers, start from the least significant data before it can execute. Therefore, to was recently published but for
AVs are built to detect most of the to keep under the radar for as long buy precious seconds, I must create which updates have not yet been
known injection methods. So, this as possible? These are questions numerous variations of the dropper implemented is the holy grail of
is a delicate and intricate task. Kids, that I have to address and decide and payload that will fool the AVs professional hackers like me. I study
I am a professional. Don’t try this at about my strategy. for at least a little while. this day and night.
home!

12
The malware has left the building
When the time comes, I want my more difficult than from a hacked
dropper to be able to fetch the website (one ‘delete’ and it’s gone),
malware without suspicion. I don’t want so I decide to hide it inside an image
the malware on my own computer posted in Twitter. In fact, I might hide it
because people will find me. in several images – whatever it takes to
buy time.
I need to store my malware payload
somewhere in cyberspace: hosted on
a hacked website (the website owner
doesn’t even know that it was hacked),
stored on PasteBin or even hidden in
a Twitter image. The possibilities are
endless, but the selection is critical to
success.
I know that once one company learns
about my malware, the word will
spread and everybody will try to find
and remove my “gift” before people
have a chance to reward my work.
I know that making them delete
something from Twitter will be much

13
The rise of the machines
One more component is needed
before I execute the heist.
I have created a Command and Control
(C2) Center far away from your reach.
My C2 can use cloud-based services,
such as webmail and file-sharing
services, to blend in with normal traffic
and avoid detection.
If my malware payload is designed to
extract data, it delivers it to the C2. But
in this case, my malware is going to
encrypt the files on your computer until
you pay the ransom. So, my C2 stores
the encryption keys.
I practice with my mini-C2 in my own
“lab” many times to make sure I get
everything right. And when I do, a
mischievous smile comes over my face.
I am ready.

14
Plan your execution,
execute your plan
My ransomware is threatened by AVs, When all goes well, you and many
firewalls and Intrusion Prevention others will click on the droppers that
Systems that will eventually detect it. will summon the malware that will
My game is about accomplishing as encrypt your files. Your computer
much encryption on as many machines screens will freeze up with my message
as possible before detection. in very bold red, alerting you to your
sorry situation – your computer files
I have carefully executed all stages:
are encrypted and if you want them
 Planned the attack back, you will have to pay a ransom in
 Created a great dropper and impossible-to-trace cryptocurrency.
placed it on your and thousands of Your screens will display simple-to-
other computers follow instructions so you can do that
quickly. (I like “quickly”.)
 Created a potent malware payload
and found a good place to store it Some hackers leave you in the lurch.
I have my ethics. When you pay, you
 Equipped my C2 with the are delivered the key for file decryption
encryption key and life goes on.
Let the games begin! I thank you for your contribution.

15
BitDam brings a pioneering approach How? See it with your own eyes
to protection against malware. BitDam learns the normal code-level Check - Online PenTest
Its cloud-based Advanced Threat executions of business applications Scan a file - Get BitDam’s verdict
Protection (ATP) blocks content- such as MS-Word and Acrobat Reader.
Based on this whitelist, BitDam Free trial - Office 365 users
borne attacks delivered via email,
cloud storage, and Instant Messaging, determines whether a given file or URL Inquiries - Contact us
empowering organizations to is malicious or not, regardless of the www.bitdam.com
collaborate safely. specific malware it may contain.

While current cybersecurity solutions The proof is in the pudding


are based on knowledge of previous BitDam shows x10 detection rates
attacks, limiting their ability to detect compared to the industry standard
unknown threats, BitDam’s attack- and is used by leading organizations
agnostic technology provides worldwide to block threats that
remarkably higher protection from first otherwise go undetected.
sight. Customer story - The City of Las Vegas

16

Das könnte Ihnen auch gefallen