首页> 外文期刊>International Journal of Computer Network and Information Security >Malware-Free Intrusions: Exploitation of Built-in Pre-Authentication Services for APT Attack Vectors
【24h】

Malware-Free Intrusions: Exploitation of Built-in Pre-Authentication Services for APT Attack Vectors

机译:无恶意软件的入侵:利用针对APT攻击向量的内置预身份验证服务

获取原文
           

摘要

Advanced Persistent Threat (APT) actors seek to maintain an undetected presence over a considerable duration and therefore use a myriad of techniques to achieve this requirement. This stealthy presence might be sought on the targeted victim or one of the victims used as pawns for further attacks. However, most of the techniques involve some malicious software leveraging the vulnerability induced by an exploit or leveraging the ignorance of the benign user. But then, malware generates a substantial amount of noise in form of suspicious network traffic or unusual system calls which usually do not go undetected by intrusion detection systems. Therefore, an attack vector that generates as little noise as possible or none at all is especially attractive to ATP threat actors as this perfectly suits the objective thereof. Malware-free intrusions present such attack vectors and indeed are difficult to detect because they mimic the behavior of normal applications and add no extra code for signature detection or anomaly behavior. This paper explores malware-free intrusions via backdoors created by leveraging the available at pre-authentication system tools availed to the common user. We explore two attack vectors used to implant the backdoor and demonstrate how such is accessible over the network via remote access while providing the highest level of system access. We further look at prevention, detection and mitigation measures which can be implemented in the case of compromise.
机译:高级持续威胁(APT)参与者试图在相当长的时间内保持未被检测到的存在,因此使用多种技术来实现这一要求。可能会在目标受害者或用作进一步攻击的典当的受害者中寻求这种隐身状态。但是,大多数技术都涉及一些恶意软件,这些软件利用了利用漏洞所导致的漏洞或利用了良性用户的无知。但是,然后,恶意软件会以可疑的网络流量或异常的系统调用的形式生成大量的噪声,这些噪声通常不会被入侵检测系统发现。因此,产生尽可能少的噪声或根本不产生噪声的攻击媒介对ATP威胁参与者特别有吸引力,因为这完全适合其目标。无恶意软件的入侵会呈现出这种攻击媒介,并且确实难以检测,因为它们模仿了正常应用程序的行为,并且没有为签名检测或异常行为添加任何额外的代码。本文探讨了通过利用普通用户可用的预身份验证系统工具中的可用后门创建的无恶意软件入侵。我们探索了两种用于植入后门的攻击媒介,并演示了如何通过远程访问通过网络访问这种后门,同时提供最高级别的系统访问。我们进一步研究在折衷的情况下可以实施的预防,发现和缓解措施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号