photo lineviral_1.png

Using Rigorous Credential Command To Mitigate Trusted Network Exploitation

Recommended best practices for mitigating this threat include rigorous credential as well as privileged-access management, equally good equally remote-access control, as well as audits of legitimate remote-access logs. While these measures aim to foreclose the initial assault vectors as well as the spread of malicious activity, in that location is no unmarried proven threat response.


Using a defense-in-depth strategy is probable to increment the odds of successfully disrupting adversarial objectives long plenty to allow network defenders to unwrap as well as response earlier the successful completion of a threat actor’s objectives.


Any scheme that uses an MSP to furnish services should monitor the MSP’s interactions inside their organization’s corporation networks, such equally occupation concern human relationship use, privileges, as well as access to confidential or proprietary information. Organizations should also ensure that they receive got the might to review their safety as well as monitor their information hosted on MSP networks.


APT TTPs as well as Corresponding Mitigations


The next tabular array displays the TTPs employed past times APT actors as well as pairs them amongst mitigations that network defenders tin implement.


Table 1: APT TTPs as well as Mitigations





















































APT TTPsMitigations
Preparation


  • Allocate operational infrastructure, such equally Internet Protocol addresses (IPs).

  • Gather target credentials to work for legitimate access.


Protect:



  • Educate users to never click unsolicited links or opened upwards unsolicited attachments inwards emails.

  • Implement an awareness as well as grooming program.


Detect:



  • Leverage multi-sourced threat-reputation services for files, Domain Name System (DNS), Uniform Resource Locators (URLs), IPs, as well as e-mail addresses.


Engagement


  • Use legitimate remote access, such equally virtual individual networks (VPNs) as well as Remote Desktop Protocol (RDP).

  • Leverage a trusted human relationship betwixt networks.


Protect:



  • Enable strong spam filters to foreclose phishing emails from reaching halt users.

  • Authenticate inbound e-mail using Sender Policy Framework; Domain-Based Message Authentication, Reporting as well as Conformance; as well as DomainKeys Identified Mail to foreclose e-mail spoofing.

  • Prevent external access via RDP sessions as well as require VPN access.

  • Enforce multi-factor authentication as well as account-lockout policies to defend against beast forcefulness attacks.


Detect:



  • Leverage multi-sourced threat-reputation services for files, DNS, URLs, IPs, as well as e-mail addresses.

  • Scan all incoming as well as outgoing emails to unwrap threats as well as filter out executables.

  • Audit all remote authentications from trusted networks or service providers for anomalous activity.


Respond as well as Recover:



  • Reset credentials, including scheme accounts.

  • Transition to multifactor authentication as well as cut work of password-based systems, which are susceptible to credential theft, forgery, as well as reuse across multiple systems.


Presence
Execution as well as Internal Reconnaissance:



  • Write to disk as well as execute malware as well as tools on hosts.

  • Use interpreted scripts as well as run commands inwards rhythm to enumerate accounts, local network, operating system, software, as well as processes for internal reconnaissance.

  • Map accessible networks as well as scan connected targets.


Lateral Movement:



  • Use remote services as well as log on remotely.

  • Use legitimate credentials to displace laterally onto hosts, domain controllers, as well as servers.

  • Write to remote file shares, such equally Windows administrative shares.


Credential Access:



  • Locate credentials, dump credentials, as well as fissure passwords.


Protect:



  • Deploy an anti-malware solution, which also aims to foreclose spyware as well as adware.

  • Prevent the execution of unauthorized software, such equally Mimikatz, past times using application whitelisting.

  • Deploy PowerShell mitigations and, inwards the to a greater extent than electrical current versions of PowerShell, enable monitoring as well as safety features.

  • Prevent unauthorized external access via RDP sessions. Restrict workstations from communicating guide amongst other workstations.

  • Separate administrative privileges betwixt internal administrator accounts as well as accounts used past times trusted service providers.

  • Enable detailed session-auditing as well as session-logging.


Detect:



  • Audit all remote authentications from trusted networks or service providers.

  • Detect mismatches past times correlating credentials used inside internal networks amongst those employed on external-facing systems.

  • Log work of scheme administrator commands, such equally net, ipconfig, as well as ping.

  • Audit logs for suspicious behavior.

  • Use whitelist or baseline comparing to monitor Windows trial logs as well as network traffic to unwrap when a user maps a privileged administrative portion on a Windows system.

  • Leverage multi-sourced threat-reputation services for files, DNS, URLs, IPs, as well as e-mail addresses.


Respond as well as Recover:



  • Reset credentials.

  • Monitor accounts associated amongst a compromise for abnormal behaviors, including odd connections to nonstandard resources or attempts to get upwards privileges, enumerate, or execute unexpected programs or applications.


Effect


  • Maintain access to trusted networks spell gathering information from victim networks.

  • Compress as well as seat information for futurity exfiltration inwards archives or inwards unconventional locations to avoid detection.

  • Send over command as well as command channel using data-transfer tools (e.g., PuTTY secure re-create customer [PSCP], Robocopy).


Protect:



  • Prevent the execution of unauthorized software, such equally PSCP as well as Robocopy.


Detect:



  • Monitor for work of archive as well as compression tools.

  • Monitor egress traffic for anomalous behaviors, such equally irregular outbound connections, malformed or abnormally large packets, or bursts of information to unwrap beaconing as well as exfiltration.



Detailed Mitigation Guidance


Manage Credentials as well as Control Privileged Access


Compromising the credentials of legitimate users automatically provides a threat histrion access to the network resources available to those users as well as helps that threat histrion displace to a greater extent than covertly through the network. Adopting as well as enforcing a strong-password policy tin cut a threat actor’s might to compromise legitimate accounts; transitioning to multifactor authentication solutions increases the difficulty fifty-fifty further. Additionally, monitoring user occupation concern human relationship logins—whether failed or successful—and deploying tools as well as services to unwrap illicit work of credentials tin assist network defenders seat potentially malicious activity.


Threat actors regularly target privileged accounts because they non entirely grant increased access to high-value assets inwards the network, exactly also to a greater extent than easily enable lateral movement, as well as oft furnish mechanisms for the actors to shroud their activities. Privileged access tin endure controlled past times ensuring that entirely those users requiring elevated privileges are granted those accesses and, inwards accordance amongst the regulation of to the lowest degree privilege, past times restricting the work of those privileged accounts to instances where elevated privileges are required for specific tasks. It is also of import to carefully care as well as monitor local-administrator as well as MSP accounts because they inherently component amongst elevated privileges as well as are oft ignored after initial configuration.


A fundamental way to command privileged accounts is to segregate as well as command administrator (admin) privileges. All administrative credentials should endure tightly controlled, restricted to a function, or fifty-fifty express to a specific sum of time. For example, entirely dedicated workstation administrator accounts should endure able to administer workstations. Server accounts, such equally general, Structured Query Language, or e-mail admins, should non receive got administrative access to workstations. The entirely house domain administrator (DA) or corporation administrator (EA) credentials should always endure used is on a domain controller. Both EA as well as DA accounts should endure removed from the local-administrators grouping on all other devices. On UNIX devices, sudo (or root) access should endure tightly restricted inwards the same manner. Employing a multifactor authentication solution for admin accounts adds or thus other layer of safety as well as tin significantly cut the touching of a password compromise because the threat histrion needs the other factor—that is, a smartcard or a token—for authentication.


Additionally, administrators should disable unencrypted remote-administrative protocols as well as services, which are oft enabled past times default. Protocols required for operations must endure authorized, as well as the close secure version must endure implemented. All other protocols must endure disabled, especially unencrypted remote-administrative protocols used to care network infrastructure devices, such equally Telnet, Hypertext Transfer Protocol, File Transfer Protocol, Trivial File Transfer Protocol, as well as Simple Network Management Protocol versions 1 as well as 2.


Control Remote Access as well as Audit Remote Logins



  • Control legitimate remote access past times trusted service providers. Similar to other administrative accounts, MSP accounts should endure given the to the lowest degree privileges needed to operate. In addition, it is recommended that MSP accounts either endure express to piece of work hours, when they tin endure monitored, or disabled until piece of work needs to endure done. MSP accounts should also endure held to the same or higher levels of safety for credential use, such equally multifactor authentication or to a greater extent than complex passwords dependent area to shorter expiration timeframes.

  • Establish a baseline on the network. Network administrators should piece of work amongst network owners or MSPs to constitute what normal baseline deportment as well as traffic facial expression similar on the network. It is also advisable to utter over what accesses are needed when the network is non beingness actively managed. This volition allow local network personnel to know what acceptable cross-network or MSP traffic looks similar inwards price of ports, protocols, as well as credential use.

  • Monitor scheme trial logs for anomalous activity. Network logs should endure captured to assist unwrap as well as seat anomalous as well as potentially malicious activity. In add-on to the application whitelisting logs, administrators should ensure that other critical trial logs are beingness captured as well as stored, such equally service installation, occupation concern human relationship usage, pass-the-hash detection, as well as RDP detection logs. Event logs tin assist seat the work of tools similar Mimikatz as well as the anomalous work of legitimate credentials or hashes. Baselining is critical for effective trial log analysis, especially inwards the cases of MSP occupation concern human relationship behavior.

  • Control Microsoft RDP. Adversaries amongst valid credentials tin work RDP to displace laterally as well as access information on other, to a greater extent than sensitive systems. These techniques tin assist protect against the malicious work of RDP:

    • Assess the demand to receive got RDP enabled on systems and, if required, boundary connections to specific, trusted hosts.

    • Verify that cloud environments adhere to best practices, equally defined past times the cloud service provider. After the cloud environs setup is complete, ensure that RDP ports are non enabled unless required for a occupation concern purpose.

    • Place whatever scheme amongst an opened upwards RDP port behind a firewall as well as require users to communicate via a VPN through a firewall.

    • Perform regular checks to ensure RDP port 3389 is non opened upwards to the populace internet. Enforce strong-password as well as account-lockout policies to defend against beast forcefulness attacks.

    • Enable the restricted-administrator alternative available inwards Windows 8.1 as well as Server 2012 R2 to ensure that reusable credentials are neither sent inwards plaintext during authentication nor cached.



  • Restrict Secure Shell (SSH) trusts. It is of import that SSH trusts endure carefully managed as well as secured because improperly configured as well as overly permissive trusts tin furnish adversaries amongst initial access opportunities as well as the way for lateral displace inside a network. Access lists should endure configured to boundary which users are able to log inwards via SSH, as well as rootage login via SSH should endure disabled. Additionally, the scheme should endure configured to entirely allow connections from specific workstations, preferably administrative workstations used entirely for the purpose of administering systems.


Report Unauthorized Network Access


Contact DHS or your local FBI business office immediately. To study an intrusion as well as asking resources for incident response or technical assistance, contact NCCIC at (NCCICCustomerService@hq.dhs.gov or 888-282-0870), FBI through a local land office, or the FBI’s Cyber Division (CyWatch@fbi.gov or 855-292-3937).


Buat lebih berguna, kongsi:
close