Escalating CyberThreats Associated With Russia/Ukraine Confrontation

As tension escalates between Ukraine and Russia, an increase in domestic cyber-attacks has been identified as a result. Recently, the US-CERT announced a bulletin regarding common malicious tactics and techniques used by those known foreign adversaries, with additional details that have been cited below.

HAWK's automated threat intel platform ensures the latest known threats can be detected. HAWK's existing analytic rules cover all of the threats currently outlined in the US-CERT Alert AA2-011A (see below).

HAWK continues to monitor the ongoing threats against our customers and has not seen any significant increase in cyber-attacks; however, that is subject to change over the next few weeks.

The US-CERT recommends the following detection mechanisms, each being a standard feature in HAWK's service offering:

  • Password spray activity - HAWK provides automated detection for brute force attacks, whether multiple passwords for a single system or a few passwords across multiple accounts. Additionally, authentication from outside the network is also rated with a higher risk score.

  • Impossible travel - HAWK provides automated detection for hosts authenticating from more than one destination outside the customer network. Additional risk is applied when those authentications happen at the same time.

  • Living off the Land Credential Dumping - HAWK's analytic rules detect all known forms of credential dumping, including the dumping of lsass and ntds.dit files from domain controllers.

  • Unusual activity in typically dormant accounts - HAWK's user behavior anomaly detection provides visibility into low traffic accounts in relation to a sudden increase in behavior. This behavior's risk score is increased.

  • Unusual User-Agent - HAWK not only relies on the detection of abnormal User-Agent but also deploys real-time beacon detection using network analysis and statistic anomaly detection methods.

For more information regarding this US-CERT announcement, please visit https://www.cisa.gov/uscert/ncas/alerts/aa22-011a

 

Common Tactics and Techniques Employed by Russian State-Sponsored APT Actors

TacticTechniqueProcedure
ReconnaissanceActive Scanning: Vulnerability Scanning Russian state-sponsored APT actors have performed large-scale scans in an attempt to find vulnerable servers.
ReconnaissancePhishing for InformationRussian state-sponsored APT actors have conducted spearphishing campaigns to gain credentials of target networks.
Resource DevelopmentDevelop Capabilities: MalwareRussian state-sponsored APT actors have developed and deployed malware, including ICS-focused destructive malware.
Initial AccessExploit Public Facing ApplicationsRussian state-sponsored APT actors use publicly known vulnerabilities, as well as zero-days, in internet-facing systems to gain access to networks.
Initial AccessSupply Chain Compromise: Compromise Software Supply ChainRussian state-sponsored APT actors have gained initial access to victim organizations by compromising trusted third-party software. Notable incidents include M.E.Doc accounting software and SolarWinds Orion.
ExecutionCommand and Scripting Interpreter: PowerShell and Windows Command Shell Russian state-sponsored APT actors have used cmd.exe to execute commands on remote machines. They have also used PowerShell to create new tasks on remote machines, identify configuration settings, exfiltrate data, and to execute other commands.
PersistenceValid AccountsRussian state-sponsored APT actors have used credentials of existing accounts to maintain persistent, long-term access to compromised networks.
Credential AccessBrute Force: Password Guessing and Password Spraying.Russian state-sponsored APT actors have conducted brute-force password guessing and password spraying campaigns.
Credential AccessOS Credential Dumping: NTDSRussian state-sponsored APT actors have exfiltrated credentials and exported copies of the Active Directory database ntds.dit.
Credential AccessSteal or Forge Kerberos Tickets: KerberoastingRussian state-sponsored APT actors have performed “Kerberoasting,” whereby they obtained the Ticket Granting Service (TGS) Tickets for Active Directory Service Principal Names (SPN) for offline cracking.
Credential AccessCredentials from Password StoresRussian state-sponsored APT actors have used previously compromised account credentials to attempt to access Group Managed Service Account (gMSA) passwords.
Credential AccessExploitation for Credential AccessRussian state-sponsored APT actors have exploited Windows Netlogon vulnerability CVE-2020-1472 to obtain access to Windows Active Directory servers.
Credential AccessUnsecured Credentials: Private KeysRussian state-sponsored APT actors have obtained private encryption keys from the Active Directory Federation Services (ADFS) container to decrypt corresponding SAML signing certificates.
Command and Control Proxy: Multi-hop ProxyRussian state-sponsored APT actors have used virtual private servers (VPSs) to route traffic to targets. The actors often use VPSs with IP addresses in the home country of the victim to hide activity among legitimate user traffic.

Source: US CISA Alert (AA22-011A)

Next
Next

Detecting Windows PrinterNightmare Bug Exploit Code