{"id":4651,"date":"2016-04-26T09:02:42","date_gmt":"2016-04-26T14:02:42","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4651"},"modified":"2016-04-18T16:47:10","modified_gmt":"2016-04-18T21:47:10","slug":"unmasking-the-imposters-part-2-detection-and-damage-control","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/unmasking-the-imposters-part-2-detection-and-damage-control\/","title":{"rendered":"Unmasking the Imposters, Part 2: Detection and Damage Control"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva,sans-serif;\">In the first of this two-part security report, we discussed the threat presented to individuals and enterprises by malicious outsiders posing as members of an organisation itself, or representatives of a trusted external institution like a bank or popular online resource. We looked at how these imposters are refining their methods of extracting funds or confidential information from victims targeted through phishing campaigns, backed up by malware, and supported by data gleaned from contact databases and social media.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">To conclude, we\u2019ll be considering the various ways that companies and individuals can spot the presence of an imposter, mitigate the damage they potentially cause, and take measures to render an organisation less vulnerable to attack, in the first place.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Detection in Principle<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">The unique slant of an imposter attack which makes this kind of cyber-assault difficult to detect is that the intruder (having gained the relevant information and access permissions from someone within the organisation or closely associated with it, by phishing) now has the freedom to operate within the corporate network, looking to all intents and purposes like a legitimate user. From this position, an imposter can sabotage existing operations, steal vital information and \/ or funds, and compromise the network.<\/span><\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_gathering.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4656 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_gathering.png\" alt=\"imposter2_gathering\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_gathering.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_gathering-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_gathering-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">So the key for network administrators and security officers is to look for activity that originates from within their own system, but which runs counter to the objectives and overall best interests of the organisation.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">A \u201ctypical\u201d imposter assault on a network occurs in <a href=\"http:\/\/www.veriato.com\/blog\/veriato-blog\/2015\/10\/02\/the-barbarians-are-through-the-gate\" target=\"_blank\" rel=\"nofollow\">three distinct phases<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>:<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Phase 1: Infiltration of the Network<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">As we\u2019ve seen, it\u2019s no longer a case of simple \u201cbait and lure\u201d phishing. Targeted campaigns are now conducted based on research taking in contact lists, user profiles, and data gleaned from social media. This may be supplemented by the insertion of malware into the targeted system \u2013 malicious software that can assist the initial phase of attack by scanning for access credentials, cracking passwords, and eating away at network defences.<\/span><\/p>\n<h3><span style=\"font-family: verdana,geneva,sans-serif;\"><b>The Tell-Tale Signs:<\/b><\/span><\/h3>\n<ul>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Authorisation requests or attempts to gain access to resources from a user who would not normally be required to make such attempts in the normal course of business \u2013 especially if their position on the corporate network \/ security hierarchy is low.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u201cNoise\u201d generated in expected flows of network traffic may indicate hacking attempts by malware which has made its way into the system.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Phase 2: Gathering Data<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Having achieved access and gained a foothold, the imposter may then proceed to hoover up as much information from the network as they can: credentials and passwords of authorised users, financial records, contact lists, business intelligence, etc. To the casual observer, this information will appear to be going to a legitimate user \u2013 but there\u2019ll be a lot of it.<\/span><\/p>\n<h3><span style=\"font-family: verdana,geneva,sans-serif;\"><b>The Tell-Tale Signs:<\/b><\/span><\/h3>\n<ul>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Look for an inordinately large number of data requests, file searches, downloads, or file transfers to a particular user\u2019s account.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">These data-gathering attempts will also be very frequent, when compared with the profile of an average user of the network.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_smuggling.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4657 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_smuggling.png\" alt=\"imposter2_smuggling\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_smuggling.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_smuggling-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_smuggling-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a>Phase 3: Smuggling the Data Out<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Unless the imposter has an agent physically in place to ship out flash drives or other removable media (a disgruntled worker or \u201cmole\u201d within the organisation), they\u2019ll have to rely on point to point data transfer, to extract the information they\u2019ve stolen. Typically, this will be to their own remote servers, which are often cloud storage services set up on temporary accounts, using credentials they\u2019ve also stolen or faked.<\/span><\/p>\n<h3><span style=\"font-family: verdana,geneva,sans-serif;\"><b>The Tell-Tale Signs:<\/b><\/span><\/h3>\n<ul>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Creating a link from the imposter\u2019s presence within your network to their dummy cloud storage account may leave an audit trail that can be traced by security monitoring software.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Unless the stolen data is trickled out gradually over time (which is harder to trace, but increases the imposter\u2019s risk of detection) a sudden surge in file transfer activity should also throw up red flags.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">If the attack is prolonged, with data being smuggled out over a long period, it may also be possible to set up tracing algorithms on your security monitoring software to highlight recurring patterns of data transfer from a particular user, which may be worth investigating.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Monitoring Your Users<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">In setting permissions and drawing up policy, your network administrators and security officers should establish \u201cWho\u2019s Who?\u201d, at the outset\u201d:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Which users have the authority to access which network assets, resources, and data<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">What their base and average levels of activity should be under normal operating conditions<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">What their level of activity should look like under any spikes of activity that occur, such as seasonal sales campaigns, or at audit time<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">These can serve as benchmark levels for your network and security monitoring software, in <a href=\"http:\/\/www.veriato.com\/blog\/veriato-blog\/2015\/12\/15\/the-rise-of-user-behavior-analytics\" target=\"_blank\" rel=\"nofollow\">flagging any anomalous activity from your registered users.<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Monitoring Your Network<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">A similar approach should be adopted in setting up administrative and security oversight for your network as a whole.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_analysis.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4655 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_analysis.png\" alt=\"imposter2_analysis\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_analysis.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_analysis-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/04\/imposter2_analysis-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/p>\n<ul>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Establish benchmark levels for network traffic flows during base, average, and peak levels of business operations.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Establish benchmark levels for login attempts, access requests, etc. under these conditions.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Configure your monitoring tools to red-flag anomalies as they occur \u2013 and investigate them, thoroughly.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\"><b>The Human Element<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Your workers can contribute actively to keeping the imposters out \u2013 if they know how to take precautions, and don\u2019t fall victim to identity or credential theft, themselves. So you\u2019ll need to:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Run a formal training programme to educate your staff on the ways of avoiding phishing scams conducted via email or social media.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Set up strong password regimes and multi-part authentication (login password, plus mobile phone number, plus security question, etc.).<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Educate them in the proper configuration and use of network security tools, firewalls, and malware detection software.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">The perpetrators deal in falsehood, but the imposter threat is real. But it\u2019s a threat that can be avoided. We hope this report has been a help to you, in that.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the first of this two-part security report, we discussed the threat presented to individuals and enterprises by malicious outsiders posing as members of an organisation itself, or representatives of a trusted external institution like a bank or popular online resource. We looked at how these imposters are refining their methods of extracting funds or [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":4657,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13],"tags":[],"class_list":["post-4651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4651"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4651\/revisions"}],"predecessor-version":[{"id":4659,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4651\/revisions\/4659"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4657"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}