By David Barton, CTO
Over the weekend, Maze ransomware hit a very large IT services company, according to Bleeping Computer.
In the past, this malware gained entry using different techniques: exploit kits via drive-by downloads, remote desktop connections (RDP) with weak passwords, email impersonation, and email spam. In the majority of cases, when the phishing email is delivered, the user clicks on the link, giving the macro authorization to run, and ultimately installs the malicious file. Once installed, the maze ransomware begins to encrypt critical data on the infected machine. While the encryption process is running, the ransomware also exfiltrates the data to a server on the Internet. When both of those processes are completed, the user is present with a ransom demand and a method to recover their encrypted data.
In 2011, Lockheed Martin was credited with the idea of a cyber security kill-chain. The cyber security kill-chain, as designed, organizes threats into categories as well as security controls that can be deployed in categories to mitigate those risks. If we apply the kill-chain to the Maze ransomware, we see the following:
- The phishing email, in the delivery category, should have been caught by commercial email protection tools.
- The malware files (kepstl32.dll, memes.tmp, and maze.dll), in the delivery category, should have been caught by malware tools as well as other AV tools. Note, the end user in this case had to allow the macros to run. User awareness is still essential to defending against these types of attacks!
- Once the macros have been enabled, the malware reaches out to a file server and downloads additional malware. In this case, this should have been detected in the command and control, as well as the delivery category. These categories usually are defended by threat intel tools, malware tools, and host-based tools.
- New files get created and the file encryption process begins. This file creation and subsequent encryption should be caught in the actions and exfiltration category and protected by tools such as threat intel, process anomaly detection, firewalls, and malware tools.
What isn’t accounted for in the cyber kill-chain was the advance of machine learning and AI. Applying these tools to the data at each category of the kill-chain improves our ability to catch the anomalous behavior at each category, as well as improves the mitigation at each category by correlating the detections.
Overwatch utilizes our Open XDR Platform to detect, alert, and respond to these types of behaviors. Our pervasive data collection, coupled with advanced data handling and machine learning, gives us multiple areas where we can detect these types of attacks across the cyber kill-chain. If the attack is missed in one stage of the kill chain, we will catch it in another stage. Once detected, we have the ability to take automated action against those anomalous behaviors. If we were to apply our technology to the Maze ransomware, we would potentially detect and mitigate in the following ways:
- Our phishing detection would evaluate the malicious URL and mitigate its risk.
- RDP connections would be evaluated, alerted, and automatically mitigated when anomalous logins occur.
- The malware files referenced above would have been evaluated by our malware tool and mitigated.
- Had those files passed the malware test, the server sensor would have caught the behavior change (i.e. new process spawn with a new connection to the internet file server).
- If the malware files passed the malware and server sensor assessment, the call to the Internet file server could have been mitigated at the network level. The Overwatch 24/7 platform would have signaled the network firewalls to implement a block to the target server.
- The new file downloads could have been caught and mitigated at the server sensor or malware assessment.
- The encryption process would be detected by the server sensor and mitigation techniques applied to prevent/stop the process from continuing.
- Finally, the exfiltration process would be detected by the network layer, the host sensor, and the threat intel.
Ransomware is a huge industry. Backups and patching are essential but so is defense-in-depth. If you are not protecting your environment at the various stages of the kill-chain with an OPEN XDR platform, you should consider doing so. If you are struggling to implement these concepts because you have too many tools that don’t interoperate, give us a call. We can help!
Send me an email at: overwatchsales@highwirenetworks.com
Leave a Reply