IT Brief New Zealand - Technology news for CIOs & IT decision-makers
Story image

Sophos uncovers latest cyber attack trends in Playbook report

Thu, 9th Jun 2022
FYI, this story is more than a year old

New research finds that there has been a 36% increase in cyber attack dwell time, with a median intruder dwell time of 15 days in 2021 versus 11 days in 2020.

The Sophos Active Adversary Playbook 2022 report also reveals the impact of ProxyShell vulnerabilities in Microsoft Exchange, which Sophos believes some Initial Access Brokers (IABs) leveraged to breach networks and then sell that access to other attackers.

Sophos senior security advisor John Shier says, "The world of cyber crime has become incredibly diverse and specialised. IABs have developed a cottage cybercrime industry by breaching a target, doing exploratory reconnaissance or installing a backdoor, and then selling the turn-key access to ransomware gangs for their own attacks.

"In this increasingly dynamic, specialty-based cyber threat landscape, it can be hard for organisations to keep up with the ever-changing tools and approaches attackers use. It is vital that defenders understand what to look for at every stage of the attack chain, so they can detect and neutralise attacks as fast as possible.

Shier continues, "Sophos research also shows that intruder dwell time was longer in smaller organisations environments. Attackers lingered for approximately 51 days in organisations with up to 250 employees, while they typically spent 20 days in organisations with 3,000 to 5,000 employees.

"Attackers consider larger organisations to be more valuable, so they are more motivated to get in, get what they want and get out. Smaller organisations have less perceived value, so attackers can afford to lurk around the network in the background for a longer period.

"It's also possible these attackers were less experienced and needed more time to figure out what to do once they were inside the network. Lastly, smaller organisations typically have less visibility along the attack chain to detect and eject attackers, prolonging their presence."

He says, with opportunities from unpatched ProxyLogon and ProxyShell vulnerabilities and the uprise of IABs, the researchers see more evidence of multiple attackers in a single target. If it's crowded within a network, attackers will want to move fast to beat out their competition.

Additional key findings in the playbook include:

The median attacker dwell time before detection was longer for stealth intrusions that had not unfolded into a major attack such as ransomware, and for smaller organisations and industry sectors with fewer IT security resources. The median dwell time for organisations hit by ransomware was 11 days. For those that had been breached, but not yet affected by a major attack, such as ransomware (23% of all the incidents investigated), the median dwell time was 34 days. Organisations in the education sector or with fewer than 500 employees also had longer dwell times.

Longer dwell times and open entry points leave organisations vulnerable to multiple attackers. Forensic evidence uncovered instances where multiple adversaries, including IABs, ransomware gangs, cryptominers, and occasionally even multiple ransomware operators, were targeting the same organisation simultaneously.

Despite a drop in using Remote Desktop Protocol (RDP) for external access, attackers increased their use of the tool for internal lateral movement. In 2020, attackers used RDP for external activity in 32% of the cases analysed, but this decreased to 13% in 2021. While this shift is a welcome change and suggests organisations have improved their management of external attack surfaces, attackers are still abusing RDP for internal lateral movement. Sophos found that attackers used RDP for internal lateral movement in 82% of cases in 2021, up from 69% in 2020.

Common tool combinations used in attacks provide a powerful warning signal of intruder activity. For example, the incident investigations found that in 2021 PowerShell and malicious non-PowerShell scripts were seen together in 64% of cases; PowerShell and Cobalt Strike combined in 56% of cases; and PowerShell and PsExec were found in 51% of cases. The detection of such correlations can serve as an early warning of an impending attack or confirm the presence of an active attack.

Half of all ransomware incidents involved confirmed data exfiltration and with the available data, the mean gap between data theft and the deployment of ransomware was 4.28 days. 73% of incidents Sophos responded to in 2021 involved ransomware. Of these ransomware incidents, 50% also involved data exfiltration. Data exfiltration is often the last stage of the attack before the release of the ransomware, and the incident investigations revealed the mean gap between them was 4.28 days and the median was 1.84 days.

Conti was the most prolific ransomware group seen in 2021, accounting for 18% of incidents overall. REvil ransomware accounted for one in 10 incidents, while other prevalent ransomware families included DarkSide, the RaaS behind the notorious attack on Colonial Pipeline in the U.S. and Black KingDom, one of the new ransomware families to appear in March 2021 in the wake of the ProxyLogon vulnerability. There were 41 different ransomware adversaries identified across the 144 incidents included in the analysis. Of these, around 28 were new groups first reported during 2021. Eighteen ransomware groups seen in incidents in 2020 had disappeared from the list in 2021.

Shier says, "The red flags that defenders should look out for include the detection of a legitimate tool, combination of tools, or activity in an unexpected place or at an uncommon time.

"It is worth noting that there may also be times of little or no activity, but that doesn't mean an organisation hasn't been breached. There are, for instance, likely to be many more ProxyLogon or ProxyShell breaches that are currently unknown, where web shells and backdoors have been implanted in targets for persistent access and are now sitting silently until that access is used or sold.

"Defenders need to be on the alert for any suspicious signals and investigate immediately. They need to patch critical bugs, especially those in widely used software, and, as a priority, harden the security of remote access services.

"Until exposed entry points are closed and everything that the attackers have done to establish and retain access is completely eradicated, just about anyone can walk in after them, and probably will.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X