<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Raiders of the Lost ARP]]></title><description><![CDATA[Amateur Security Archaeologists, trying not to break things]]></description><link>https://www.raidersofthelostarp.tech</link><image><url>https://substackcdn.com/image/fetch/$s_!jlkm!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32805939-c3d2-43b9-9a8c-32f85fe60fd1_1024x1024.png</url><title>Raiders of the Lost ARP</title><link>https://www.raidersofthelostarp.tech</link></image><generator>Substack</generator><lastBuildDate>Sat, 04 Apr 2026 03:37:06 GMT</lastBuildDate><atom:link href="https://www.raidersofthelostarp.tech/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Mike]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[RadiersOfTheLostARP@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[RadiersOfTheLostARP@substack.com]]></itunes:email><itunes:name><![CDATA[Mike McPhee]]></itunes:name></itunes:owner><itunes:author><![CDATA[Mike McPhee]]></itunes:author><googleplay:owner><![CDATA[RadiersOfTheLostARP@substack.com]]></googleplay:owner><googleplay:email><![CDATA[RadiersOfTheLostARP@substack.com]]></googleplay:email><googleplay:author><![CDATA[Mike McPhee]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[What's Causing Mike's Indigestion Now? — Special Artemis II Edition (3 April 2026)]]></title><description><![CDATA["Houston, we have a priorities problem."]]></description><link>https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-df8</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-df8</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Fri, 03 Apr 2026 20:06:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Nwi5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Nwi5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Nwi5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Nwi5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Nwi5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Nwi5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Nwi5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg" width="558" height="530.1" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:342,&quot;width&quot;:360,&quot;resizeWidth&quot;:558,&quot;bytes&quot;:34412,&quot;alt&quot;:&quot;Artists conceptual diagram showing all of the planets orbiting the Sun, but Earth is shown as being a flattened square-shaped box. Caption reads \&quot;Well this is awkward\&quot;.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/193106527?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Artists conceptual diagram showing all of the planets orbiting the Sun, but Earth is shown as being a flattened square-shaped box. Caption reads &quot;Well this is awkward&quot;." title="Artists conceptual diagram showing all of the planets orbiting the Sun, but Earth is shown as being a flattened square-shaped box. Caption reads &quot;Well this is awkward&quot;." srcset="https://substackcdn.com/image/fetch/$s_!Nwi5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Nwi5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Nwi5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Nwi5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1257f327-7f8c-420e-ac5c-7d1e2e430106_360x342.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Right now, as you&#8217;re reading this, four human beings are flying through deep space at roughly 25,000 miles per hour in a spacecraft named <em>Integrity.</em> And if that name doesn&#8217;t end up being the most ironic thing about this week, I&#8217;ll eat my hat.</p><p>US astronauts Reid Wiseman, Victor Glover, Christina Koch, and CSA astronaut Jeremy Hansen launched from Kennedy Space Center on April 1st and have now broken Earth orbit for the first time since Apollo 17 in 1972. <a href="https://www.nasa.gov/news-release/nasas-artemis-ii-mission-leaves-earth-orbit-for-flight-around-moon/">NASA</a> Let that sink in. Fifty-three years. The Artemis II crew is currently further from home than any human has been since the Nixon administration, looking back at our little blue marble while making history in real time.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.raidersofthelostarp.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Raiders of the Lost ARP! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>And back here on the ground? The administration just proposed cutting NASA&#8217;s science budget by nearly half. </p><p>Great timing, guys. Maybe they&#8217;re sore about a conspiracy they backed being debunked?</p><h2><strong>The Numbers, Because They Matter</strong></h2><p>The FY2027 White House budget request would cut NASA&#8217;s Science Mission  by 47%, dropping it from $7.25 billion to $3.9 billion, with the overall agency taking a 23% hit. The <a href="https://www.planetary.org/press-releases/the-planetary-society-urges-congress-to-reject-historic-cuts-to-nasa-again">Planetary Society points</a> out that adjusted for inflation, this would be the smallest NASA budget since 1961 -  which, for reference, is before John Glenn had even orbited the Earth.</p><p>The official framing from the White House budget office is that it &#8220;terminates over 40 low-priority missions to transform the Science program into one that is more focused and fiscally responsible.&#8221; (<a href="https://spacenews.com/white-house-again-proposes-steep-nasa-budget-cuts/">SpaceNews</a>) Low priority. We&#8217;re talking about missions studying asteroids that could hit us, Earth&#8217;s climate systems, and decades of planetary science. But sure, low priority. Makes total sense.</p><p>This isn&#8217;t even a new idea. They tried this last year. Those proposed cuts were used to shrink research programs, draw up termination plans for 19 in-flight missions, and push more than 4,000 civil servants out the door. Congress said no - loudly, and with rare bipartisan agreement. So the White House just... submitted the same proposal again this year. &#8220;That&#8217;s a bold strategy, Cotton.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OBy_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OBy_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif 424w, https://substackcdn.com/image/fetch/$s_!OBy_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif 848w, https://substackcdn.com/image/fetch/$s_!OBy_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif 1272w, https://substackcdn.com/image/fetch/$s_!OBy_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OBy_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif" width="498" height="272" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:272,&quot;width&quot;:498,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2722416,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/193106527?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OBy_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif 424w, https://substackcdn.com/image/fetch/$s_!OBy_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif 848w, https://substackcdn.com/image/fetch/$s_!OBy_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif 1272w, https://substackcdn.com/image/fetch/$s_!OBy_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1843f4c-7a8d-44e7-9787-2cbd02dfe973_498x272.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The impact goes well beyond cancelled missions. These cuts would gut space science research programs, cripple university departments and NASA centers, wipe out a generation of the STEM talent pipeline, and trigger widespread layoffs across a highly skilled workforce in both government and industry. (<a href="https://spaceflightnow.com/2025/05/03/proposed-24-percent-cut-to-nasa-budget-eliminates-key-artemis-architecture-climate-research/">Spaceflight Now</a>) California alone could lose nearly 14,000 jobs. JPL, the lab behind the Mars rovers and Voyager, would be looking at an existential crisis. NASA&#8217;s workforce could drop to its lowest level since the Apollo era. (<a href="https://www.astronomy.com/science/government-shutdown-threatens-nasas-future/">Astronomy.com</a>)</p><div><hr></div><h2><strong>Where Have We Seen This Movie Before?</strong></h2><p>Here&#8217;s the thing. This pattern is not unique to space policy. Anyone paying attention to the tech industry over the past few years will recognize the playbook immediately.</p><p>Record profits. Record layoffs. Record executive compensation packages. Rinse and repeat, and blame it on &#8220;restructuring.&#8221; I know plenty of folks personally impacted by this. Some never make it back into the field and switch tracks. Like any one in tech, I am looking over my own shoulder.</p><p>Amazon posted $716.9 billion in revenue in 2025, a record, and still announced 16,000 layoffs, framed as a push to &#8220;flatten management layers.&#8221; Block&#8217;s CEO was at least honest about it: &#8220;This is not driven by financial difficulty, but by the growing capability of AI tools to perform a wider range of tasks.&#8221; (<a href="https://www.ibtimes.co.uk/ai-driven-layoffs-2026-tech-sector-1788111">International Business Times</a>) At least someone said the quiet part out loud.</p><p>And AI is the key word here, because the &#8220;AI will do it better and cheaper&#8221; logic that has been gutting tech workforces is absolutely leaking into government decision-making now. Why fund a generation of planetary scientists when some future model could theoretically analyze the data? Why maintain decades of institutional knowledge when you can just prompt your way to an answer?</p><p>The standard corporate line always includes some version of &#8220;restructuring for AI efficiency&#8221; or &#8220;rightsizing for current market conditions.&#8221; What that actually means is: we can do more with fewer people, and we&#8217;d rather boost margins than maintain headcount. The productivity gains are starting to peak through, finally. But the benefits just flow straight to the top, not to the people who actually built &#8216;the thing&#8217;.</p><p>No offense to my boy Claude.ai, but I am not a substitute for a career NASA scientist. Neither is any other AI. They don&#8217;t land on asteroids. They don&#8217;t look out a capsule window and inspire the next generation of engineers. And they definitely don&#8217;t carry 53 years of hard-won institutional knowledge, instinct, or respect for heat shield erosion and orbital mechanics.</p><div><hr></div><h2><strong>What We&#8217;re Actually Losing</strong></h2><p>The modern playbook, in corporate America and apparently in Washington now too, optimizes for the next quarter, the next earnings call, the next news cycle. Long-horizon investments like space science are at a permanent disadvantage because the returns don&#8217;t show up fast enough to move a stock price or win a midterm.</p><p>NASA was specifically built to do the opposite. It exists for missions that take a decade to plan and another decade to fly, with payoffs that ripple out for generations. You can&#8217;t apply short-term efficiency logic to that without breaking it. GPS, memory foam, water filtration, scratch-resistant lenses: half the technology you used today has a lineage that traces back to someone at NASA who didn&#8217;t know exactly what they were building yet.</p><p>More than 100 members of Congress co-signed a bipartisan letter calling for a $1.75 billion increase to NASA Science. Congress will probably reject these cuts again. But every year this fight has to happen is another year of deferred missions, demoralized researchers, and talented people going somewhere else. And this subset of science has been luckier than many. Just ask the folks who&#8217;ve protected us as part of the CDC, WHO, NOAA, and countless other experts whose work has been deemed &#8220;inefficient&#8221; while we divert funds to prop up egos and unleash chaos on the world.</p><p>The Artemis II crew will fly around the Moon, come home around April 10th, and it will be genuinely awe-inspiring. It deserves every bit of attention it gets.</p><p>Then the awesome and irreplaceable people who made it happen will walk back into their offices and wonder if there&#8217;s still going to be a program next year. But hey, at least we can fund inflicting more pain!</p><p>That&#8217;s the part that should make all of us a little sick to our stomachs.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.raidersofthelostarp.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Raiders of the Lost ARP! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What’s Causing Mike’s Indigestion Now? When the Cloud Goes Boom (March 12, 2026)]]></title><description><![CDATA[There&#8217;s something quietly therapeutic about watching Harrison Ford stumble through grief, bad decisions, and genuine human connection on Shrinking. It&#8217;s a show about people doing the hard work of not running from their problems, and in 2026 that feels both aspirational and instructional. Because looking at the news this week, I&#8217;m watching a lot of institutions that have been running from (or ignoring) their problems for a long time. The bill is coming due, and they are expecting us to float them some money.]]></description><link>https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Thu, 12 Mar 2026 18:10:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!h7eY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h7eY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h7eY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!h7eY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!h7eY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!h7eY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h7eY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2261238,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190750583?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!h7eY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!h7eY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!h7eY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!h7eY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffadf5c72-9380-4143-802e-a01193a1cc09_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There&#8217;s something quietly therapeutic about watching Harrison Ford stumble through grief, bad decisions, and genuine human connection on <em><a href="https://tv.apple.com/us/show/shrinking/umc.cmc.apzybj6eqf6pzccd97kev7bs?ctx_agid=502c9996">Shrinking</a></em>. It&#8217;s a show about people doing the hard work of not running from their problems, and in 2026 that feels both aspirational and instructional. Because looking at the news this week, I&#8217;m watching a lot of institutions that have been running from (or ignoring) their problems for a long time. The bill is coming due, and they are expecting us to float them some money.</p><div><hr></div><h2>The Middle East Was Always a Cyber War. We Just Made It Louder.</h2><p>Here&#8217;s what I think most of us in security already sensed was coming, even if we didn&#8217;t know the specific shape of it: the slow-burn cyber conflict with Iran was always going to get louder when the kinetic fighting started. And it did.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.raidersofthelostarp.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Raiders of the Lost ARP! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>On February 28, U.S. and Israeli forces launched coordinated strikes on Iranian targets. In the days that followed, drone strikes physically hit AWS data centers in the UAE, with a third facility in Bahrain damaged by debris from a nearby strike. The IRGC claimed responsibility, saying the attacks were aimed at identifying the role of those centers in supporting enemy military and intelligence activities. <a href="https://www.euronews.com/next/2026/03/12/data-centres-are-the-new-target-in-modern-warfare-during-iran-war-experts-say">Euronews</a> As of this writing, several Amazon services remain unavailable or disrupted for customers in the UAE and Bahrain. <a href="https://www.euronews.com/next/2026/03/12/data-centres-are-the-new-target-in-modern-warfare-during-iran-war-experts-say">Euronews</a></p><p>I don&#8217;t think any of us had &#8220;cloud data centers as kinetic military targets&#8221; at the top of our 2026 bingo cards. But in hindsight, it shouldn&#8217;t be shocking. Data centers power AI capabilities, they support military logistics, and they&#8217;re physical buildings. They can burn.</p><p>The bigger question this raises for most of us isn&#8217;t &#8220;what happened in the Middle East&#8221; - it&#8217;s &#8220;what did I assume about cloud resilience that this just proved wrong?&#8221; Most business continuity plans were designed around power outages, natural disasters, maybe a ransomware incident. I don&#8217;t think many of them were stress-tested against the scenario where a meaningful chunk of a region&#8217;s cloud infrastructure goes dark because of military action. If a single weekend of conflict can physically destroy cloud infrastructure, trigger hundreds of cyberattacks, and sever an entire country from the internet, the assumptions underneath your organization&#8217;s data retention policies and business continuity plans deserve a hard look. <a href="https://complexdiscovery.com/cybersecurity-implications-of-the-2026-middle-east-escalation-when-cloud-infrastructure-becomes-a-target/">ComplexDiscovery</a> I would say I am shocked that the aggressors didn&#8217;t account for this, but I would be lying. Consequences and the impact to the US&#8217;s reputation, the global economy, energy prices, exacerbated humanitarian plights &amp; loss of life, or world order seem to be complete afterthoughts to the current decision makers.</p><h3>What about the cyber side?</h3><p>Here&#8217;s what the picture looks like right now, with the caveat that things are still moving fast and anyone who sounds totally certain is probably oversimplifying.</p><p>CrowdStrike has not observed large-scale state-sponsored cyber campaigns yet, but is seeing a surge in claimed activity from both pro-West and Iran-aligned hacktivist groups, including assertions of denial-of-service operations, defacements, and alleged interference across targets in the Middle East, the U.S., and parts of Asia. <a href="https://www.securityweek.com/us-israel-and-iran-trade-cyberattacks-pro-west-hacks-cause-disruption-as-tehran-retaliates/">Security Weekly</a> A lot of that activity is loud and claim-driven. Take it with a bucket of salt. Iran has historically had mixed results with disruptive cyberattacks and frequently exaggerates their effects for psychological impact. <a href="https://www.nextgov.com/cybersecurity/2026/03/intelligence-firms-watch-uptick-iran-cyber-activity-after-us-israel-strikes/411802/">Nextgov.com</a></p><p>That said, the degradation of Iranian internet connectivity to 1-4% has likely hindered state-aligned actors in the short term, but may also push tactical autonomy to cells operating outside of Iran. <a href="https://blog.talosintelligence.com/talos-developing-situation-in-the-middle-east/">Cisco Talos</a> That&#8217;s the thing I keep thinking about: when the central command structure gets disrupted, you get less coordination but potentially more unpredictability from independent operators. The first few weeks of a conflict like this tend to be loud and noisy. The moves that actually hurt usually come later.</p><h3>What can defenders actually do?</h3><ul><li><p><strong>Check your cloud geography.</strong> Pull the list of workloads you have pinned to Middle East regions and understand which ones could be migrated versus which ones are stuck due to data sovereignty rules. Don&#8217;t just know the answer in theory -- actually test the migration for something non-critical.</p></li><li><p><strong>Watch for what comes after the noise.</strong> The current DDoS and defacement wave is largely opportunistic. The more concerning pattern to watch for is credential harvesting, identity infrastructure targeting, or any probing of operational technology environments.</p></li><li><p><strong>MFA everywhere that matters.</strong> Iran-linked actors have a long history of leading with credential theft - password spraying, targeted phishing, supply chain access. If you haven&#8217;t enforced phishing-resistant MFA on remote access and privileged accounts, that&#8217;s the highest-return move available right now.</p></li><li><p><strong>Check on your people in affected regions.</strong> If you have employees, contractors, or managed service providers in the UAE, Bahrain, or Jordan, verify they can actually function. Your incident response plan may assume key people can reach their workplaces. That assumption deserves a check.</p></li></ul><p><strong>Learn more:</strong> <a href="https://www.sophos.com/en-us/blog/cyber-advisory-increased-cyber-risk-amid-u-s-israel-iran-escalation">Sophos Cyber Advisory on U.S.-Israel-Iran Escalation</a> | <a href="https://zerodayclock.com">ZeroDayClock (live exploit timeline tracker</a>) | <a href="https://blog.talosintelligence.com/talos-developing-situation-in-the-middle-east/">Cisco Talos advisory on developing situation in the Middle East.</a></p><div><hr></div><h2>Things I&#8217;m Keeping an Eye On</h2><ul><li><p><strong>The White House dropped a new Cyber Strategy last Friday, and offense is front and center.</strong> The seven-page document places offensive cyber operations at the center of U.S. policy, with a push to deregulate industry and use AI to accelerate defense - a significant shift from past approaches. <a href="https://nationaltoday.com/us/dc/washington/news/2026/03/07/white-house-unveils-new-cybersecurity-strategy-emphasizing-offense-and-ai/">National Today</a> I find myself genuinely uncertain how to read the deregulatory piece alongside the &#8220;go on offense&#8221; piece. Those two things can coexist, but they require real discipline to not let one undermine the other. <a href="https://www.darkreading.com/cybersecurity-operations/white-house-cyber-strategy-prioritizes-offense">Dark Reading</a></p></li><li><p><strong>APT36 is now vibe-coding their malware, and it&#8217;s both less scary and more interesting than it sounds.</strong> Bitdefender&#8217;s research on the Pakistan-based group Transparent Tribe shows them using AI to churn out disposable malware in niche languages like Nim and Zig. The code quality is often embarrassing -- one sample shipped with a placeholder where the C2 URL should have been, meaning it could never actually steal anything. But the point isn&#8217;t sophistication. The strategy is to overwhelm defenders through volume rather than bypass security through technical brilliance - a kind of distributed denial of detection. <a href="https://www.bitdefender.com/en-us/blog/businessinsights/apt36-nightmare-vibeware">bitdefender</a> As someone who&#8217;s been experimenting with vibe-coding myself to prototype ideas, I find this one personally thought-provoking. <a href="https://www.bitdefender.com/en-us/blog/businessinsights/apt36-nightmare-vibeware">Bitdefender</a></p></li><li><p><strong>Talos has a good read on agentic AI and the threat models that come with it.</strong> The piece walks through what it looks like when AI agents get deployed offensively -- and the scenario that stuck with me is a fully autonomous agent given a specific objective that uses local inference and only contacts the backend when the task is done, minimizing the network traffic defenders would normally use to detect it. <a href="https://blog.talosintelligence.com/agentic-ai-security-why-you-need-to-know-about-autonomous-agents-now/">Talos Intelligence</a> We&#8217;re early here, but it&#8217;s worth starting to think about. <a href="https://blog.talosintelligence.com/agentic-ai-security-why-you-need-to-know-about-autonomous-agents-now/">Talos Intel</a></p></li><li><p><strong>ZeroDayClock is worth a bookmark.</strong> It&#8217;s a live dashboard tracking how fast the window between a vulnerability being published and it being actively exploited is shrinking. The data has caveats they&#8217;re upfront about, but the direction of the trend is not reassuring. Worth keeping an eye on as a gut-check for your patching timelines. <a href="https://zerodayclock.com">zerodayclock.com</a></p></li></ul><div><hr></div><h2>What I&#8217;m Learning This Week</h2><p>Finishing up <a href="https://www.sans.org/cyber-security-courses/cyber-threat-intelligence">FOR578</a>, and I&#8217;ll just say: Robert Lee and Rebekah Brown built something that genuinely surprised me. I thought I knew CTI. Turns out I knew <em>about</em> CTI the way someone knows about surgery because they&#8217;ve watched a lot of medical dramas. The nuance in what it actually means to produce finished intelligence - with real confidence levels and analytic rigor -- is something I&#8217;m already reworking into how I approach everything. More on this soon.</p><div><hr></div><h2>Closing</h2><p><em>Shrinking</em> works because the characters eventually stop pretending the hard thing isn&#8217;t the hard thing. They sit with what&#8217;s actually in front of them. Looking at this week - missiles hitting cloud infrastructure, a conflict whose shape was visible for a long time, AI tools getting used offensively before we&#8217;ve figured out how to defend against them -- I think that&#8217;s the right posture for all of us right now. Not panic. Just honesty about what we&#8217;re looking at.</p><p>Stay vigilant, folks.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.raidersofthelostarp.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Raiders of the Lost ARP! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[All I want for Christmas is Caldera 5.0]]></title><description><![CDATA[Well it has been some time since I have had an opportunity to log in and capture some thoughts - sorry about that!]]></description><link>https://www.raidersofthelostarp.tech/p/all-i-want-for-christmas-is-caldera-5-0</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/all-i-want-for-christmas-is-caldera-5-0</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Fri, 13 Dec 2024 13:10:08 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/12/running_from_volcano.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kroo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d0b98b-af98-4a62-8c59-aba075619182_600x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kroo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d0b98b-af98-4a62-8c59-aba075619182_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!kroo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d0b98b-af98-4a62-8c59-aba075619182_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!kroo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d0b98b-af98-4a62-8c59-aba075619182_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!kroo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d0b98b-af98-4a62-8c59-aba075619182_600x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kroo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d0b98b-af98-4a62-8c59-aba075619182_600x600.png" width="600" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d8d0b98b-af98-4a62-8c59-aba075619182_600x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:882138,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190625011?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d0b98b-af98-4a62-8c59-aba075619182_600x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kroo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d0b98b-af98-4a62-8c59-aba075619182_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!kroo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d0b98b-af98-4a62-8c59-aba075619182_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!kroo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d0b98b-af98-4a62-8c59-aba075619182_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!kroo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d0b98b-af98-4a62-8c59-aba075619182_600x600.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Well it has been some. time since I have had an opportunity to log in and capture some thoughts - sorry about that! The truth is, it has been a wild few months with work, kids, and the whole 'adulting' thing. I do hope I can start offering something of use more frequently. Something that took a lot of time - and shouldn't have - was getting a working installation of <a href="https://github.com/mitre/caldera">MITRE's Caldera</a> open-source attack simulation tool. I have used prior versions since 2020 - I think it was version 2.7? Well, the new release (Magma or v5.0) is fantastic. If you can get it to install correctly for you.</p><h2>What seemed wrong?</h2><p>Keep in mind, I am an outage waiting to happen, so some of this is most certainly my self-inflicted wounds or ignorance. Call me crazy, but I think the biggest barrier to open source satisfying the masses is just how finicky it can be to set up an application and maintain it. That would seem the case here! Let's start with the general complaints that could apply to any modern open-source solution:</p><h3>Dependencies and the OS</h3><p>Depending on your desired implementation, you may need to <a href="https://caldera.readthedocs.io/en/latest/Installing-Caldera.html">install</a> and troubleshoot a long list of software packages:</p><ul><li><p>python &amp; pip</p></li><li><p>virtual environments</p></li><li><p>vue.js/node.js and NPM</p></li><li><p>Docker</p></li><li><p>upx</p></li><li><p>Go</p></li><li><p>and numerous other dependencies of these packages</p></li></ul><p>Not to mention, you might be working around any new roadblocks your chosen OS throws at you. Ubuntu is continually re-working its complicated relationship with python, as I assume many other Linux distributions are. I get it. It is both essential to apps and the OS, but can be easily broken by the other. But yeah, what a PITA. The flow I will convey here isn't pretty, but it seems to work (thanks Mark for the help and finding the mistake!)</p><h3>Changes to the base platform</h3><p>Application developers have a tough job - how do they keep offering functions the customers need in ways that are appealing and keep pace with user experience trends? The Caldera team <a href="https://medium.com/@mitrecaldera/announcing-mitre-caldera-v5-06798b928adf">dramatically shifted gears</a> with Caldera Magma, moving into a vue.js based UI that is quite amazing once you get to work with it. It has much more visually significant iconography, more useful tables, and a much tighter workflow for setting up and managing an operation. They also needed to bake in capabilities that allow Caldera to be extended for OT/ICS coverage and for the eventual inclusion of AI-driven adversary simulation.</p><p>These major changes and enhancements mean the inclusion of even more dependencies. Earlier versions of Caldera were largely Python focused. Now a much broader set of capabilities are being brought to bear. All of these changes make installation a much more involved task for any script. And when the script fails, well, it becomes a lot of work for the poor end user.</p><h3>A seemingly broken script</h3><p>One of Caldera's awesome superpowers is its ability to install even more fun via <a href="https://caldera.readthedocs.io/en/latest/Plugin-library.html">plugins</a>. In effect, it installs itself even more super powers! Ahh, but like any good superhero, there is always a constraint, limit, or price to be paid. In Caldera's case, these plugins are all developed different ways and some have fallen out of support, are no longer added by default (like <a href="https://github.com/mitre/mock">Mock</a>), are coded differently (<a href="https://github.com/mitre/human">Human</a>), or require additional dependencies (e.g. <a href="https://github.com/mitre/emu">Emu</a>). Some are an easy fix - like cloning Mock in after the main package but before build. In Emu's case, the included script fails to pull all required files and will thus hang the server's startup. This was resolved by installing a fresh copy directly from the Emu plugin's profiles.</p><h2>Overcoming obstacles</h2><p>I am afraid to admit how much time the above took to work through, but I managed with some digging into errors, multiple tries with different flavors of Ubuntu and install types (docker containers vs. directly on the VM) and a boatload of frustrating time on StackOverflow. As much as that site has bailed me out, it is useless to someone without a good clue as to how to outline their query. I even used by good buddy <a href="https://claude.ai/new">Claude.ai</a> to help me get past some really fundamental issues with a botched NPM config. It even found a way to tell me nicely that it was my fault.</p><h2>The working path</h2><p>So without further ado, here is the general idea for how I tackled this and finally got Caldera to cooperate!</p><h3>Prerequisites</h3><ul><li><p><a href="https://ubuntu.com/download/desktop">Ubuntu 22.04 or 24.04 VM</a> or host with sudo privileges</p></li><li><p>&gt;20GB of free space to allow for node.js build, expanded libraries, and room for collected (looted) intel during ops</p></li><li><p>If you plan to use this on a real network, you might want to statically configure or reserve an IP in DHCP for the intended network interface</p></li></ul><h3>Installing dependencies</h3><pre><code>sudo apt update &amp;&amp; sudo apt upgrade -y
sudo apt install python3-dev git curl python3-venv npm

curl -o- https://raw.githubusercontent.com/nvm-sh/nvm/v0.38.0/install.sh | bash

source ~/.bashrc
nvm install stable
sudo snap install go --classic &amp;&amp; sudo snap install upx</code></pre><h3>Clone the main Caldera repo</h3><pre><code>git clone https://github.com/mitre/caldera.git --recursive caldera5</code></pre><h3>Install the Mock plugin</h3><p>I use this no-longer-default plugin purely to help demonstrate how agents work when I am on the road and need to show a simulated environment without spinning up real targets.</p><pre><code>cd caldera5/plugins
git clone https://github.com/mitre/mock.git --recursive</code></pre><h3>Install Emu payloads</h3><p>This is where it gets fun. Emu's directory structure comes through using the top-level clone, but it is missing some stuff further down the tree. Install the payloads as best you can now and we'll clean it up shortly</p><pre><code>cd emu
./download_payloads.sh</code></pre><h3>Fix emu plans directory</h3><p>Because the plans don't make it over completely, if you attempt to start the server the build will stall. In order to fix this, we'll just remove the incomplete emulation plans directory and pull from <a href="https://github.com/center-for-threat-informed-defense/adversary_emulation_library">source</a> to ensure we have them all. You should see that when you re-run the <code>download_payloads.sh</code> script that more installs. Yippee!</p><pre><code>cd data/
rm -rf adversary-emulation-plans/
cd ../../..

git clone --depth 1 https://github.com/center-for-threat-informed-defense/adversary_emulation_library.git plugins/emu/data/adversary-emulation-plans

cd plugins/emu
./download_payloads.sh</code></pre><h3>Finish config!</h3><p>Here is where we finally get to do some customization. I know there is some sed/awk tricks that can make this easy, but I would rather spend 5 minuters making the changes than 2 hours learning how to script the change to save 5 minutes. I am not a role model for DevOps, that is for certain!</p><p>First, we're going to modify the default.conf file so we can ensure our IP addresses are configured and the mock and emu plugins are loaded:</p><pre><code>cd ../..
nano conf/default.yml </code></pre><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GJFH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56603a59-4286-41d6-9363-848d0d38abf4_1024x759.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GJFH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56603a59-4286-41d6-9363-848d0d38abf4_1024x759.png 424w, https://substackcdn.com/image/fetch/$s_!GJFH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56603a59-4286-41d6-9363-848d0d38abf4_1024x759.png 848w, https://substackcdn.com/image/fetch/$s_!GJFH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56603a59-4286-41d6-9363-848d0d38abf4_1024x759.png 1272w, https://substackcdn.com/image/fetch/$s_!GJFH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56603a59-4286-41d6-9363-848d0d38abf4_1024x759.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GJFH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56603a59-4286-41d6-9363-848d0d38abf4_1024x759.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/56603a59-4286-41d6-9363-848d0d38abf4_1024x759.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!GJFH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56603a59-4286-41d6-9363-848d0d38abf4_1024x759.png 424w, https://substackcdn.com/image/fetch/$s_!GJFH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56603a59-4286-41d6-9363-848d0d38abf4_1024x759.png 848w, https://substackcdn.com/image/fetch/$s_!GJFH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56603a59-4286-41d6-9363-848d0d38abf4_1024x759.png 1272w, https://substackcdn.com/image/fetch/$s_!GJFH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56603a59-4286-41d6-9363-848d0d38abf4_1024x759.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Modify IP addresses (0.0.0.0 or localhost by default) and change usernames, passwords, and API keys as needed.</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GrRl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e93894-68e9-48af-8dc9-65fac5d5b274_632x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GrRl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e93894-68e9-48af-8dc9-65fac5d5b274_632x600.png 424w, https://substackcdn.com/image/fetch/$s_!GrRl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e93894-68e9-48af-8dc9-65fac5d5b274_632x600.png 848w, https://substackcdn.com/image/fetch/$s_!GrRl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e93894-68e9-48af-8dc9-65fac5d5b274_632x600.png 1272w, https://substackcdn.com/image/fetch/$s_!GrRl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e93894-68e9-48af-8dc9-65fac5d5b274_632x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GrRl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e93894-68e9-48af-8dc9-65fac5d5b274_632x600.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/33e93894-68e9-48af-8dc9-65fac5d5b274_632x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!GrRl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e93894-68e9-48af-8dc9-65fac5d5b274_632x600.png 424w, https://substackcdn.com/image/fetch/$s_!GrRl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e93894-68e9-48af-8dc9-65fac5d5b274_632x600.png 848w, https://substackcdn.com/image/fetch/$s_!GrRl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e93894-68e9-48af-8dc9-65fac5d5b274_632x600.png 1272w, https://substackcdn.com/image/fetch/$s_!GrRl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e93894-68e9-48af-8dc9-65fac5d5b274_632x600.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Add in mock and emu to ensure they are loaded, as well as any other plugins you desire (like <a href="https://github.com/mitre/caldera-ot">caldera-ot</a>!)</figcaption></figure></div><h3>Breaking the rules for science</h3><p>Now that we have that all knocked out, time to install your python packages. I know this can be done in a virtual environment - and it can also be run out of Docker. At the time I was putting this together, <code>venv</code> wasm't working well for me, so I ran this on a small ubuntu VM dedicated to Caldera anyway and used the --break system packages switch to force the pip install. Feel free to let me know if you have a more elegant path in the comments below!</p><pre><code>pip3 install -r requirements.txt &#8212;break-system-packages</code></pre><p>Now we can start the server. The first run requires more time as vue.js needs to fully inflate, build out the web application, and do its thing. Don't freak out if this takes a while! Also - I am using the <code>--insecure</code> switch for testing here. Whenever I plan to run it for more than a quick run, or unattended, I create a <code>local.yml</code> file that looks like <code>default.yml</code> but includes my salt value and encryption key, and then I drop that switch for subsequent startups.</p><pre><code># For testing
python3 server.py --insecure --build 

# For my more persistent lab box
python3 server.py --build</code></pre><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zD7V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc357fd-6a80-4a79-985e-728bd5985840_1024x402.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zD7V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc357fd-6a80-4a79-985e-728bd5985840_1024x402.png 424w, https://substackcdn.com/image/fetch/$s_!zD7V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc357fd-6a80-4a79-985e-728bd5985840_1024x402.png 848w, https://substackcdn.com/image/fetch/$s_!zD7V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc357fd-6a80-4a79-985e-728bd5985840_1024x402.png 1272w, https://substackcdn.com/image/fetch/$s_!zD7V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc357fd-6a80-4a79-985e-728bd5985840_1024x402.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zD7V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc357fd-6a80-4a79-985e-728bd5985840_1024x402.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7bc357fd-6a80-4a79-985e-728bd5985840_1024x402.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!zD7V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc357fd-6a80-4a79-985e-728bd5985840_1024x402.png 424w, https://substackcdn.com/image/fetch/$s_!zD7V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc357fd-6a80-4a79-985e-728bd5985840_1024x402.png 848w, https://substackcdn.com/image/fetch/$s_!zD7V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc357fd-6a80-4a79-985e-728bd5985840_1024x402.png 1272w, https://substackcdn.com/image/fetch/$s_!zD7V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc357fd-6a80-4a79-985e-728bd5985840_1024x402.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">You may see some warnings, but "All systems ready." is what we're truly after ;)</figcaption></figure></div><p>You are likely to see errors related to payloads. Many of these are not allowed to be distributed to systems, and so you are left to search for them yourselves IF you have the permission and access from your organization to do so. Looking at some of those names, it makes sense that you would want to explicitly download those only if needed. Either way, your instance should build and work ok without those specific executables.</p><h3>Starting up later</h3><p>For subsequent start-ups, you can omit the build switch:</p><pre><code>python3 server.py</code></pre><p>And if all works well, you can log into your Caldera portal and get emulating! If you can get to the following portal but not log in, try a restart. More often than not that clears up any lingering issues :)</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oBBs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F874aa82c-6196-412b-894b-09f8c960d867_1024x598.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oBBs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F874aa82c-6196-412b-894b-09f8c960d867_1024x598.png 424w, https://substackcdn.com/image/fetch/$s_!oBBs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F874aa82c-6196-412b-894b-09f8c960d867_1024x598.png 848w, https://substackcdn.com/image/fetch/$s_!oBBs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F874aa82c-6196-412b-894b-09f8c960d867_1024x598.png 1272w, https://substackcdn.com/image/fetch/$s_!oBBs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F874aa82c-6196-412b-894b-09f8c960d867_1024x598.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oBBs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F874aa82c-6196-412b-894b-09f8c960d867_1024x598.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/874aa82c-6196-412b-894b-09f8c960d867_1024x598.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!oBBs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F874aa82c-6196-412b-894b-09f8c960d867_1024x598.png 424w, https://substackcdn.com/image/fetch/$s_!oBBs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F874aa82c-6196-412b-894b-09f8c960d867_1024x598.png 848w, https://substackcdn.com/image/fetch/$s_!oBBs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F874aa82c-6196-412b-894b-09f8c960d867_1024x598.png 1272w, https://substackcdn.com/image/fetch/$s_!oBBs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F874aa82c-6196-412b-894b-09f8c960d867_1024x598.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">It doesn't take much to get me excited. This simple screen took way too long to get back to with 5.0</figcaption></figure></div><h2>Conclusion</h2><p>Once Caldera is up and running, be sure to try out the training paths - that is the single best way to learn the tool inside and out. As you do see it, you might notice that the newest version is much more polished and extensible. Don't try and do it all at once - take it slow and soak it in. This tool teaches you so much not only about Caldera itself, but about <a href="https://raidersofthelostarp.tech/2023/11/16/check-before-wreck-with-attack-emulation/">ATT&amp;CK</a>, adversaries, and offensive security in general. And with the Blue Team features, it even can assist with enabling defenders.</p><p>Hopefully this run through helps those of you looking for a path to playing with Caldera. I love this tool, and the effort of all involved is just amazing. Knowing what the alternatives cost, this is a fine way to get some familiarity with breach attack simulation and learn what you value most. For those who don't mind the hands-on, it can even be a great long-term platform. We can be certain that Caldera will only get better, and the new Magma platform is worth my personal growing pains. With any luck, you can avoid my errors and be emulating APTs in no time!</p>]]></content:encoded></item><item><title><![CDATA[Impact: When Attackers Just Want to Watch the World Burn]]></title><description><![CDATA[In our journey through the MITRE ATT&CK framework, we've explored how attackers gain access, establish persistence, and steal data. But what happens when adversaries decide to break things, or to show the defenders that they are in charge? This last post covers ATT&CK's Impact tactic - the cyber equivalent of leaving a calling card, often with devastating consequences.]]></description><link>https://www.raidersofthelostarp.tech/p/impact-when-attackers-just-want-to-watch-the-world-burn</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/impact-when-attackers-just-want-to-watch-the-world-burn</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Mon, 08 Jul 2024 19:11:49 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/07/mikey_mac_funny_cartoon_of_a_bearded_man_wearing_a_hawaiian_shi_17a32341-16b8-4eb9-8444-f98da18a944c.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!w8SR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!w8SR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!w8SR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!w8SR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!w8SR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!w8SR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1823552,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190625009?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!w8SR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!w8SR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!w8SR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!w8SR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4101d159-dd1f-4672-8524-5965661df1e6_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In our journey through the <a href="https://raidersofthelostarp.tech/tag/attck/">MITRE ATT&amp;CK framework</a>, we've explored how attackers gain <a href="https://raidersofthelostarp.tech/2024/03/18/initial-access-its-go-time-for-an-adversary-attck/">access</a>, <a href="https://raidersofthelostarp.tech/2024/04/02/persistence-how-uninvited-attackers-avoid-being-bounced-from-the-party-attck/">establish persistence</a>, and <a href="https://raidersofthelostarp.tech/2024/07/01/exfiltration-the-attackers-great-escape-with-your-data/">steal data</a>. But what happens when adversaries decide to break things, or to show the defenders that they are in charge? This last post covers ATT&amp;CK's Impact tactic - the cyber equivalent of leaving a calling card, often with devastating consequences.</p><h2>The Importance of Impact</h2><p>Impact is often times the point of an attack. Attacking leaders stake their reputations on whether a battle was worthwhile or not. How do we know?&nbsp; In the historical warfare realm, we assess whether it changed the outcome of the conflict. Did the battle further the attacker's goals, capture people or territory, or prevent later losses? Even though the answers to these might be 'yes,' we typically talk about the trade-offs. Was it worth it?</p><p>In cyberspace, Impact represents the point where attackers transform their access and privileges into tangible effects on the target organization. These effects can range from subtle data manipulation to bringing entire networks to their knees. The goals vary: some attackers aim for financial gain through ransomware, others seek to cause chaos or embarrassment, and some use Impact techniques to cover their tracks or set the stage for future operations. As we'll see, the way we assess impact differs in some cases, but in the march to present time, that line blurs more and more.</p><h2>Impact on a geopolitical scale</h2><p>If you are familiar with earlier posts in this series, I look for historical analogs to the cyber techniques. As this is the last post in this series, I am finally bringing it together! (Eventually, I do get to the point!) So let's look at one of the most famous examples in cyber history: <a href="https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/">Stuxnet</a>. If you haven't read "<a href="https://www.barnesandnoble.com/w/countdown-to-zero-day-kim-zetter/1116864204">Countdown to Zero Day</a>" by Kim Zetter, you are missing out! Anyway, here we go.</p><p>Discovered in 2010, Stuxnet was a sophisticated computer worm some believe to have been developed by the United States and Israel to target Iran's nuclear program. The thinking was that a well-placed and articulated attack might disrupt Iran's ability to enrich Uranium needed to develop nuclear warheads. Without the fissile material, Iran wouldn't be able to muster enough inventory to make these weapons. What made Stuxnet remarkable was not just its complexity, but its physical impact on the real world.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LImJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dbfa24f-ca77-4bf4-91d1-62e6209bc31e_1024x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LImJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dbfa24f-ca77-4bf4-91d1-62e6209bc31e_1024x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LImJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dbfa24f-ca77-4bf4-91d1-62e6209bc31e_1024x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LImJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dbfa24f-ca77-4bf4-91d1-62e6209bc31e_1024x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LImJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dbfa24f-ca77-4bf4-91d1-62e6209bc31e_1024x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LImJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dbfa24f-ca77-4bf4-91d1-62e6209bc31e_1024x768.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9dbfa24f-ca77-4bf4-91d1-62e6209bc31e_1024x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!LImJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dbfa24f-ca77-4bf4-91d1-62e6209bc31e_1024x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LImJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dbfa24f-ca77-4bf4-91d1-62e6209bc31e_1024x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LImJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dbfa24f-ca77-4bf4-91d1-62e6209bc31e_1024x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LImJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dbfa24f-ca77-4bf4-91d1-62e6209bc31e_1024x768.jpeg 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">Iranian President Mahmoud Ahmadinejad looking over the new centrifuges installed at the Natanz facility in Iran. (from CBS News and sourced by Getty Images)</figcaption></figure></div><p>Stuxnet targeted specific Siemens industrial control systems, particularly those used in Iran's uranium enrichment facilities. The worm manipulated the operation of centrifuges, causing them to spin at incorrect speeds. This led to physical damage and disruption of the enrichment process, all while feeding false information to operators that everything was functioning normally. This effort achieved an assumed primary objective of disrupting the program, and likely added a few years to the timeline for Iran's program.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7kwv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94cc6f3a-9053-4996-a57b-9fbdce0d1888_800x450.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7kwv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94cc6f3a-9053-4996-a57b-9fbdce0d1888_800x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7kwv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94cc6f3a-9053-4996-a57b-9fbdce0d1888_800x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7kwv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94cc6f3a-9053-4996-a57b-9fbdce0d1888_800x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7kwv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94cc6f3a-9053-4996-a57b-9fbdce0d1888_800x450.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7kwv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94cc6f3a-9053-4996-a57b-9fbdce0d1888_800x450.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94cc6f3a-9053-4996-a57b-9fbdce0d1888_800x450.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!7kwv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94cc6f3a-9053-4996-a57b-9fbdce0d1888_800x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7kwv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94cc6f3a-9053-4996-a57b-9fbdce0d1888_800x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7kwv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94cc6f3a-9053-4996-a57b-9fbdce0d1888_800x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7kwv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94cc6f3a-9053-4996-a57b-9fbdce0d1888_800x450.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Stuxnet's ingenuity is instructive, but would have been for naught had it not also delivered the intended impact: a costly disruption of Iranian Uranium enrichment. Mission accomplished (from Wired article and IAEA reports)</figcaption></figure></div><h3>What we learned from Stuxnet</h3><p>This was remarkable for a LOT of reasons, but here are some of the biggest in my mind:</p><ol><li><p><strong>Precise Targeting</strong>: The attackers crafted Stuxnet to affect specific systems, minimizing collateral damage. Even crazier, they targeted both Windows IT devices and very particular Siemens OT controllers.</p></li><li><p><strong>Stealth</strong>: The worm operated for months without detection, slowly causing damage. It did this without a persistent Command &amp; Control link to the attackers themselves, and relied on HUMINT and ELINT to confirm impact was being made. That takes a combination of preparation, patience, and confidence not seen elsewhere.</p></li><li><p><strong>Physical Consequences</strong>: It bridged the gap between cyber and physical worlds. This is perhaps the most impactful to us all - we now see nation-state actors targeting critical infrastructure, fearlessly and pervasively.</p></li><li><p><strong>Persistence</strong>: The impact continued over an extended period - which is impressive given the lack of full-length C2. Again, the patience and craftsmanship were top-notch.</p></li><li><p><strong>Deception</strong>: False information was presented to mask the actual impact. Understanding how the victim's operators would see and respond were critical here, and it shows that Deception or Defense Evasion don't just have to be a gimmick to bypass a control, but may play into the defender's playbooks.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kT1c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b0c7942-dc46-4f96-b753-393c7d45f052_574x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kT1c!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b0c7942-dc46-4f96-b753-393c7d45f052_574x1024.png 424w, https://substackcdn.com/image/fetch/$s_!kT1c!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b0c7942-dc46-4f96-b753-393c7d45f052_574x1024.png 848w, https://substackcdn.com/image/fetch/$s_!kT1c!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b0c7942-dc46-4f96-b753-393c7d45f052_574x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!kT1c!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b0c7942-dc46-4f96-b753-393c7d45f052_574x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kT1c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b0c7942-dc46-4f96-b753-393c7d45f052_574x1024.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b0c7942-dc46-4f96-b753-393c7d45f052_574x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!kT1c!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b0c7942-dc46-4f96-b753-393c7d45f052_574x1024.png 424w, https://substackcdn.com/image/fetch/$s_!kT1c!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b0c7942-dc46-4f96-b753-393c7d45f052_574x1024.png 848w, https://substackcdn.com/image/fetch/$s_!kT1c!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b0c7942-dc46-4f96-b753-393c7d45f052_574x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!kT1c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b0c7942-dc46-4f96-b753-393c7d45f052_574x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">It was a long path from crafting the Stuxnet attack to its making an impact, but the bottom bubble is where the first mark is made. It can be argued the impact was much bigger than that, however. (from ISS Source <a href="https://www.isssource.com/stuxnet-report-v-security-culture-needs-work/">reporting</a> by Eric Byres, Andrew Ginter and Joel Langill)</figcaption></figure></div><p>Consensus has it that Stuxnet also ushered in a whole new era of cyber warfare. Its use set a precedent that now sees cyber attacks accompany or even replace physical warfare with much lower consequences to the threat actor. While the tactical impact was a great success, it is the long tail of geopolitical impact beyond ATT&amp;CK that continues to bring consequences to all of us every day.</p><h2>Impact in Modern Cyberspace</h2><p>As we transition to discussing modern cyber Impact techniques, it's clear that many of these principles and goals might be achieved by either means - physical or cyber. Today's attackers still aim for precision, stealth, and often seek to cause real-world consequences. However, the scale and speed at which Impact techniques can be deployed have increased dramatically. And the risks to the adversary have (so far) appeared to be much lower than those of a physical attack or action. For these reasons, cyber attacks are quickly becoming the preferred tool versus committing forces to a traditional attack.</p><p>Some of this is due to the asymmetric aspects of cyber attacks. In today's global digital world, a single ransomware attack can cripple a multinational corporation in hours. Data manipulation can sway stock markets or elections. And as we become increasingly reliant on technology, the potential for physical impact grows - from disrupting power grids to interfering with medical devices. Time, distance, and resources don't pose the same restrictions in this realm.</p><p>Another aspect here is the risks posed to the threat actor. Adversaries no longer need to fear numbers - they know that they are likely to evade defenses, avoid attribution, and get away with the attacks. And very rarely does the threat actor fear for their lives while carrying out these actions. While history on cyber attacks is much less extensive, precedent shows that - even when caught in the act - state sponsored threat actors rarely see justice served. Cybercriminal organizations have gotten smart quickly and aligned themselves with friendly governments or hidden their locations to complicate prosecution. Even worse, disinformation campaigns may even mislead the court of public opinion into taking opposing sides, doubting attribution, or mischaracterizing the threat.</p><h3>New rules going forward?</h3><p>This is new ground for all of us. We clearly don't have the entire picture and can assume that there are covert operations underway by victim organizations or nation states. But cyber events are testing the lines of an 'act of war' and it remains to be seen how defenders and their host countries will respond. And it seems we might all be wrestling with how to quantify the impact of something as transformational as Stuxnet:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xbs3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feebf0a97-a386-4b72-84bf-47e14d077891_1024x791.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xbs3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feebf0a97-a386-4b72-84bf-47e14d077891_1024x791.png 424w, https://substackcdn.com/image/fetch/$s_!Xbs3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feebf0a97-a386-4b72-84bf-47e14d077891_1024x791.png 848w, https://substackcdn.com/image/fetch/$s_!Xbs3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feebf0a97-a386-4b72-84bf-47e14d077891_1024x791.png 1272w, https://substackcdn.com/image/fetch/$s_!Xbs3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feebf0a97-a386-4b72-84bf-47e14d077891_1024x791.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xbs3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feebf0a97-a386-4b72-84bf-47e14d077891_1024x791.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eebf0a97-a386-4b72-84bf-47e14d077891_1024x791.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Xbs3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feebf0a97-a386-4b72-84bf-47e14d077891_1024x791.png 424w, https://substackcdn.com/image/fetch/$s_!Xbs3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feebf0a97-a386-4b72-84bf-47e14d077891_1024x791.png 848w, https://substackcdn.com/image/fetch/$s_!Xbs3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feebf0a97-a386-4b72-84bf-47e14d077891_1024x791.png 1272w, https://substackcdn.com/image/fetch/$s_!Xbs3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feebf0a97-a386-4b72-84bf-47e14d077891_1024x791.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Its quite the eye chart, but this view of Stuxnet (<a href="https://attack.mitre.org/software/S0603/">S0603</a>) shows that ATT&amp;CK isn't always the end-all, be-all of mapping things. Why was Impact empty here? Maybe because its hard to express in one of the existing techniques. But as we've seen, Impact was the point. And it was made.</figcaption></figure></div><h2>Impact Techniques in action</h2><p>The MITRE ATT&amp;CK framework lists 14 techniques and 13 sub-techniques under the Impact (<a href="https://attack.mitre.org/tactics/TA0040/">TA0040</a>) tactic. What I find interesting is that these are very focused on system impacts, measurable and technical in nature. This seems to defer tagging of Impact based on more nebulous, political, societal, or unique attributed. I totally get that - some of those are hard to quantify even years after an attack, and I wouldn't put that burden on a SOC operator, incident responder, or even CISO. Given what is left, let's break the techniques we do have down based on their primary focus:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!96Px!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c113ed-7d04-4f48-8ddf-f4f676e51ecc_282x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!96Px!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c113ed-7d04-4f48-8ddf-f4f676e51ecc_282x1024.png 424w, https://substackcdn.com/image/fetch/$s_!96Px!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c113ed-7d04-4f48-8ddf-f4f676e51ecc_282x1024.png 848w, https://substackcdn.com/image/fetch/$s_!96Px!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c113ed-7d04-4f48-8ddf-f4f676e51ecc_282x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!96Px!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c113ed-7d04-4f48-8ddf-f4f676e51ecc_282x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!96Px!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c113ed-7d04-4f48-8ddf-f4f676e51ecc_282x1024.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93c113ed-7d04-4f48-8ddf-f4f676e51ecc_282x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!96Px!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c113ed-7d04-4f48-8ddf-f4f676e51ecc_282x1024.png 424w, https://substackcdn.com/image/fetch/$s_!96Px!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c113ed-7d04-4f48-8ddf-f4f676e51ecc_282x1024.png 848w, https://substackcdn.com/image/fetch/$s_!96Px!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c113ed-7d04-4f48-8ddf-f4f676e51ecc_282x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!96Px!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c113ed-7d04-4f48-8ddf-f4f676e51ecc_282x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3>Data Abuse</h3><p>Attackers often target the integrity and availability of data, causing chaos and potentially long-lasting damage. Adversaries use Data Manipulation (<a href="https://attack.mitre.org/techniques/T1565/">T1565</a>) to disrupt operations, spread misinformation, or cover their tracks. Looking for an example? In 2013, the Syrian Electronic Army <a href="https://www.washingtonpost.com/news/worldviews/wp/2013/04/23/syrian-hackers-claim-ap-hack-that-tipped-stock-market-by-136-billion-is-it-terrorism/">hacked the Associated Press Twitter</a> account to post a false tweet about explosions at the White House, briefly causing a $136 billion dip in the S&amp;P 500 index.</p><p>Sometimes Data Destruction (<a href="https://attack.mitre.org/techniques/T1485/">T1485</a>) is more the goal though. The <a href="https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained/">2014 attack on Sony Pictures Entertainment </a>saw terabytes of data wiped from the company's networks using RawDisk, causing massive disruption. Somehow The Interview still managed get released. Kim Jong-Un's cyber goons (thought to be Lazarus) may have failed at preventing its release, but they managed to cause huge damage to Sony Pictures and - by extension - Hollywood's bottom line.</p><p>Ransomware still remains the most popular method of abusing the data, and Data Encrypted for Impact (<a href="https://attack.mitre.org/techniques/T1486/">T1486</a>) is a hallmark for WannaCry or NotPetya operations of yesterday or BlackSuit/ALPHV, Volcano Demon, or DoNex of today. In tales as old as (cyber) time, they data and hold it for ransom, causing both financial and operational impacts. Or maybe depriving everyone of that data is more beneficial? Disk Wipe (<a href="https://attack.mitre.org/techniques/T1561">T1561</a>) (in NotPetya's case) is a common approach when the attacker's goal is to simply deprive everyone of that data.</p><p>The flip side of ransomware is extortion or otherwise profiting from selling the sensitive data. Even more base than that is just stealing the money outright. a lot of business email compromise (BEC) campaigns, spearphishing, and crypto scams faciliate Financial Theft (<a href="https://attack.mitre.org/techniques/T1657">T1657</a>).</p><h3>System Availability Impact</h3><p>These techniques aim to disrupt normal operations, often causing immediate and visible effects. Attackers might overwhelm specific systems with Endpoint Denial of Service (<a href="https://attack.mitre.org/techniques/T1499/">T1499</a>), targeting application servers, to disrupt services. The <a href="https://www.wired.com/2016/10/internet-outage-ddos-dns-dyn/">2016 Mirai botnet attack on DynDNS servers</a>, which disrupted major websites across the US, is a prime example. By flooding environments with traffic and causing a Network Denial of Service (<a href="https://attack.mitre.org/techniques/T1498/">T1498</a>) attackers can bring down entire organizations. The 2007 cyber attacks on Estonia, which crippled government, media, and banking websites, demonstrate the potential scale of such attacks.</p><p>Stopping critical services - Service Stop (<a href="https://attack.mitre.org/techniques/T1489/">T1489</a>) - can halt operations. 2015's <a href="https://www.cisa.gov/news-events/ics-alerts/ir-alert-h-16-056-01">BlackEnergy campaign</a> by Russian APT Sandworm crippled Ukraine's electrical grid, and while ransomware was part of that, they also impeded detection systems, shut down response paths, and more. System Shutdown/Reboot (<a href="https://attack.mitre.org/techniques/T1529/">T1529</a>) and Inhibit System Recovery (<a href="https://attack.mitre.org/techniques/T1490">T1490</a>) are similarly used alternatives.</p><h3>System Hijacking</h3><p>Some Impact techniques set the stage for future attacks or create long-term vulnerabilities. With Firmware Corruption (<a href="https://attack.mitre.org/techniques/T1495/">T1495</a>), attackers can create persistent backdoors or render devices inoperable. The Equation Group's use of this technique, revealed by <a href="https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/">The Shadow Brokers</a> release, showed how this technique can create nearly undetectable, long-term footholds.</p><p>While often seen as a calling card, Defacement (<a href="https://attack.mitre.org/techniques/T1491/">T1491</a>) can also be used to spread disinformation or damage brand reputation. The <a href="https://www.militarytimes.com/2016/03/23/syrians-charged-with-hacking-u-s-marine-corps-website/">2013 hack</a> of the US Marine Corps recruitment website by the Syrian Electronic Army is a notable example.</p><p>By removing access to accounts with Account Access Removal (<a href="https://attack.mitre.org/techniques/T1531/">T1531</a>), attackers can create chaos and even lock out security teams. The <a href="https://www.nytimes.com/2020/07/17/technology/twitter-hackers-interview.html">2020 Twitter hack</a>, where high-profile accounts were compromised, included locking out legitimate users as part of the attack. Interesting to note how much now-owner Elon Musk's account was abused.</p><p>Resource Hijacking (<a href="https://attack.mitre.org/techniques/T1496/">T1496</a>) may appear last, but it is also typically the most covert. Attackers like to keep it that way, and this is the realm of cryptojacking outfits, who look to have others pay the bill for helping pad their crypto wallets.</p><h2>How Can We Mitigate Impact?</h2><p>Impact has some different goals. Assuming that your data or continued operation are important, your focus should be on a quick recovery and the reliable backup of your data. but it doesn't mean we need to cede territory! Plan on interrupting their actions earlier in the attack, and maybe we won't get to this point! Either way, we need to hold the fort, so-to-speak. Like many other tactics before it, preventing and detecting Impact techniques is more effective when enlisting a multi-layered approach:</p><ol><li><p><strong>Robust Backup Strategy</strong>: Regular, secure backups can mitigate the effects of data destruction or encryption attacks. Protecting that backup path and monitoring it as well is super important! Paying the ransom is not a viable alternative. Just ask <a href="https://raidersofthelostarp.tech/2024/06/13/whats-causing-mikes-indigestion-now-change-recall/">Change Healthcare</a>.</p></li><li><p><strong>Network Segmentation</strong>: Limit the spread of attacks by properly segmenting networks. The old adage of "don't put your eggs in one basket" seems to apply here.</p></li><li><p><strong>Endpoint Protection</strong>: Deploy and maintain up-to-date endpoint security solutions. After all, it is your endpoints and servers that house the good stuff!</p></li><li><p><strong>Monitoring and Alerting</strong>: Implement systems to detect unusual activities that might indicate an impending Impact attack. This one is hard - but essential. With valid credentials often used, detecting abuse and monitoring behavior becomes critical.</p></li><li><p><strong>Incident Response Planning</strong>: Develop and regularly test plans for responding to various Impact scenarios. Lots of IR plans are still based on comet impacts or Hurricane Sandy. Is cyber part of yours? And does everyone know their role?</p></li><li><p><strong>Access Control</strong>: Implement strict access controls and multi-factor authentication to prevent unauthorized system changes. This may seem like a broken record, but it pops up a lot because it is fundamental!</p></li><li><p><strong>Firmware Security</strong>: Regularly update firmware and use secure boot processes where possible. A lot of new access methods take advantage of this oft-forgotten part of any system.</p></li><li><p><strong>DDoS Protection</strong>: Employ DDoS mitigation services or appliances to protect against availability attacks. This is very important when uptime and availability are your lifeblood.</p></li></ol><h2>Conclusion</h2><p>Impact techniques are what we all fear happening most. Everything prior is really just a prelude to the damage the attacker plans to cause. By understanding these techniques, we can better prepare our defenses and minimize the damage when attacks occur. Remember, in the world of cybersecurity, it's not just about keeping attackers out - it's about limiting what they can do if they get in. In all of MITRE ATT&amp;CK's 14 tactics, this is the one that our non-technical folks tend to grasp and fear most. Help them see the linkage between mitigations implemented earlier reducing the risk of Impact later.</p><p>As we've seen throughout this series, effective defense benefits from a better understanding of attacker tactics and techniques. Not just how they do it, but why? <a href="https://raidersofthelostarp.tech/2023/11/05/worry-less-and-know-your-enemy-with-mitre-attck/">MITRE ATT&amp;CK</a> isn't going to solve all of your problems, but it can be a very handy tool for better understanding and communicating about threat behaviors amongst stakeholders. Use it, but understand its limits. You'll need other tools too, like those that help structure your organization, or bolster your processes, or deploy solid defensive technology. Throughout that journey, you can use tools like ATT&amp;CK to better characterize what you are up against. Make it your own.</p><p>Thank you for reading this entry in the <a href="https://raidersofthelostarp.tech/tag/attck/">ATT&amp;CK Tactic Series</a>. It's been a long journey, but I feel like I learned a lot putting these together and I hope sharing that journey was helpful to someone. I'll probably take a little breather while deciding what to tackle next, but feel free to share your thoughts and experiences in the comments below!</p>]]></content:encoded></item><item><title><![CDATA[Exfiltration: The Attacker's Great Escape with Your Data]]></title><description><![CDATA[In our Collection post, we examined how attackers collect valuable information within a compromised environment.]]></description><link>https://www.raidersofthelostarp.tech/p/exfiltration-the-attackers-great-escape-with-your-data</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/exfiltration-the-attackers-great-escape-with-your-data</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Mon, 01 Jul 2024 09:37:13 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/06/mikey_mac_funny_cartoon_of_a_man_wearing_a_hawaiian_shirt_and_h_3986d551-6caa-4455-a827-e99fe1b83199.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IbwH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IbwH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!IbwH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!IbwH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!IbwH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IbwH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1981112,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190625008?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IbwH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!IbwH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!IbwH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!IbwH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aab7c70-48c6-472b-b966-de600492e853_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In our <a href="https://raidersofthelostarp.tech/2024/06/18/attck-collection-how-attackers-grab-the-loot-before-being-caught/">Collection</a> post, we examined how attackers collect valuable information within a compromised environment. Once adversaries have gathered their loot, the next crucial step is to smuggle it out. This brings us to the <a href="https://raidersofthelostarp.tech/2023/11/05/worry-less-and-know-your-enemy-with-mitre-attck/">MITRE ATT&amp;CK</a> tactic of Exfiltration. Let's explore how various threat actors, from cyber criminals to nation-state operatives, execute this critical phase of their operations.</p><h2>The Importance of Exfiltration</h2><p>Exfiltration is often the culmination of an attacker's efforts. It's the point where they transform their hard work into tangible gains, whether that's stealing intellectual property, obtaining sensitive personal information, or acquiring valuable intelligence. Maybe they decide to sell the data. The attackers may be interested in seeding their own future operations. They may even be using the stolen information to gain or nullify competitive advantages or exert pressure. No matter the motive, without successful exfiltration, many cyber operations would be fruitless.</p><h3>Exfiltration in Historical Context</h3><p>During World War II and the early Cold War era, one of the most significant exfiltration operations revolved around the United States' top-secret <a href="https://www.history.com/topics/world-war-ii/the-manhattan-project">Manhattan Project</a>. While the US dedicated unprecedented resources to beat Germany to producing atomic weapons, Communist sympathizers were furious that the developments were not being shared with the Soviet allies. Unbeknownst to the US, a high-placed researcher worked to even the field. This operation saw the transfer of critical nuclear weapons research to the Soviet Union, dramatically altering the balance of power in the post-war world.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GmYc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc19629da-16ec-4a1b-8430-28dbc08afdca_449x612.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GmYc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc19629da-16ec-4a1b-8430-28dbc08afdca_449x612.jpeg 424w, https://substackcdn.com/image/fetch/$s_!GmYc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc19629da-16ec-4a1b-8430-28dbc08afdca_449x612.jpeg 848w, https://substackcdn.com/image/fetch/$s_!GmYc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc19629da-16ec-4a1b-8430-28dbc08afdca_449x612.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!GmYc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc19629da-16ec-4a1b-8430-28dbc08afdca_449x612.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GmYc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc19629da-16ec-4a1b-8430-28dbc08afdca_449x612.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c19629da-16ec-4a1b-8430-28dbc08afdca_449x612.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!GmYc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc19629da-16ec-4a1b-8430-28dbc08afdca_449x612.jpeg 424w, https://substackcdn.com/image/fetch/$s_!GmYc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc19629da-16ec-4a1b-8430-28dbc08afdca_449x612.jpeg 848w, https://substackcdn.com/image/fetch/$s_!GmYc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc19629da-16ec-4a1b-8430-28dbc08afdca_449x612.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!GmYc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc19629da-16ec-4a1b-8430-28dbc08afdca_449x612.jpeg 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">Dr Klaus Fuchs collected the sensitive informaiton for later exfiltration. (Photo by Keystone/Getty Images)</figcaption></figure></div><p>At the heart of this operation were several key figures: <a href="https://en.wikipedia.org/wiki/Klaus_Fuchs">Klaus Fuchs</a>, a German-born British theoretical physicist, <a href="https://en.wikipedia.org/wiki/Ursula_Kuczynski">Ursula Kuczynski</a>, codenamed "Sonya," a German-born Soviet spy, and <a href="https://en.wikipedia.org/wiki/Harry_Gold">Harry Gold</a>, a Swiss-born American chemist. Their collaboration resulted in one of the most consequential information exfiltrations in history.</p><h4>Setting up the caper</h4><p>Klaus Fuchs, who worked on nuclear technologies for years prior to joining the Manhattan Project from 1944 to 1946, had access to crucial information about the design and functionality of the atomic bomb. Ursula Kuczynski, already an experienced Soviet intelligence operative, served as his handler and the critical link to Moscow. While in New Mexico, Fuchs also added Gold as another outlet to provide courier deliveries to the Soviets.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1XuL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e2996c-87ea-4cad-9572-69145991eb6e_640x400.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1XuL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e2996c-87ea-4cad-9572-69145991eb6e_640x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1XuL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e2996c-87ea-4cad-9572-69145991eb6e_640x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1XuL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e2996c-87ea-4cad-9572-69145991eb6e_640x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1XuL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e2996c-87ea-4cad-9572-69145991eb6e_640x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1XuL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e2996c-87ea-4cad-9572-69145991eb6e_640x400.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19e2996c-87ea-4cad-9572-69145991eb6e_640x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!1XuL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e2996c-87ea-4cad-9572-69145991eb6e_640x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1XuL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e2996c-87ea-4cad-9572-69145991eb6e_640x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1XuL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e2996c-87ea-4cad-9572-69145991eb6e_640x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1XuL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e2996c-87ea-4cad-9572-69145991eb6e_640x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">The Trinity Test Site after the infamous test shows the sheer stakes of the atomic race and the reasons for Soviet interest in leveling the field. (AP Photo)</figcaption></figure></div><p>The exfiltration was carried out through a series of clandestine meetings. Fuchs would memorize or prepare notes on the latest developments, which he would then pass to Kuczynski or Gold, depending on the time and his location. Kuczynski would photograph the documents or transcribe the information, then transmit it to Moscow via radio or diplomatic pouch. Gold leveraged more 'batch' like payloads, carrying documents directly to his handlers.</p><h4>Essential aspects of any successful Exfiltration</h4><p>The exfiltration process showcased several key aspects that remain relevant in modern cyber operations:</p><ul><li><p><strong>Insider Access</strong>: Fuchs' position within the Manhattan Project provided him with legitimate access to highly classified information, bypassing many security measures.</p></li><li><p><strong>Stealth and Tradecraft</strong>: Kuczynski, Gold and Fuchs used sophisticated espionage techniques to avoid detection. They employed dead drops, coded messages, and limited face-to-face meetings to exchange information.</p></li><li><p><strong>Persistence</strong>: The operation spanned several years, demonstrating the long-term nature of high-value intelligence gathering and exfiltration.</p></li><li><p><strong>High-Value Targets</strong>: The focus on nuclear secrets represented a strategic prioritization of the most critical information.</p></li><li><p><strong>Diversified Communications Paths</strong>: The success of the operation hinged on multiple paths, methods, and assets.</p></li></ul><h4>The value and impact</h4><p>This operation had profound consequences. The information Fuchs provided significantly accelerated the Soviet nuclear weapons program, leading to their first successful atomic bomb test in 1949, years earlier than Western intelligence had anticipated. The eventual discovery of this breach in 1950 sent shock waves through Western intelligence communities. It highlighted critical vulnerabilities in personnel security and the challenges of safeguarding information in collaborative scientific environments. And it uncovered parallel, redundant Collection and Exfiltration networks like that run by Julius and Ethel Rosenberg.</p><p>This historical example underscores several key points about exfiltration that remain relevant in the digital age:</p><ol><li><p>The critical importance of insider threat mitigation.</p></li><li><p>The need for layered security measures that go beyond access controls.</p></li><li><p>The potential for seemingly small security breaches to have massive geopolitical consequences.</p></li><li><p>The enduring value of human intelligence in facilitating complex exfiltration operations.</p></li></ol><h3>Exfiltration in Modern Cyberspace</h3><p>As we transition to discussing modern cyber exfiltration techniques, it's worth noting how many of these principles remain the same. Today's attackers must find ways to access high-value information, extract it without detection, and transmit it securely to their handlers or command and control servers. While the technical methods have evolved dramatically, the fundamental challenges of exfiltration &#8211; and the high stakes involved &#8211; remain constant.</p><p>In today's digital landscape, exfiltration techniques have evolved to overcome sophisticated defense mechanisms. Attackers employ a variety of methods to sneak data past firewalls, intrusion detection systems, and data loss prevention tools. They might compress and encrypt data to avoid detection, use legitimate cloud services as exfiltration points, or leverage <a href="https://raidersofthelostarp.tech/2024/06/25/command-and-control-this-is-major-tom-to-ground-control/">command and control </a>channels to slowly trickle out information.</p><p>If there is a significant difference between the historical and cyber-based exfiltration, it must be the investment and life stakes. Threat actors may fret over losing a vital exfiltration path, but rarely do they invest the same time and trust in developing that path and rarely do they need to consider losing a human asset.</p><h2>Exfiltration Techniques</h2><p>The MITRE ATT&amp;CK framework lists 9 techniques and 9 sub-techniques under the Exfiltration tactic (<a href="https://attack.mitre.org/tactics/TA0010/">TA0010</a>). Keep in mind - these are wide-open techniques, and adversaries create a lot of opportunities for themselves within these bounds.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gxyw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb996de8-1754-4631-85da-b8adb14af5da_633x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gxyw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb996de8-1754-4631-85da-b8adb14af5da_633x1024.png 424w, https://substackcdn.com/image/fetch/$s_!gxyw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb996de8-1754-4631-85da-b8adb14af5da_633x1024.png 848w, https://substackcdn.com/image/fetch/$s_!gxyw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb996de8-1754-4631-85da-b8adb14af5da_633x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!gxyw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb996de8-1754-4631-85da-b8adb14af5da_633x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gxyw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb996de8-1754-4631-85da-b8adb14af5da_633x1024.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb996de8-1754-4631-85da-b8adb14af5da_633x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!gxyw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb996de8-1754-4631-85da-b8adb14af5da_633x1024.png 424w, https://substackcdn.com/image/fetch/$s_!gxyw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb996de8-1754-4631-85da-b8adb14af5da_633x1024.png 848w, https://substackcdn.com/image/fetch/$s_!gxyw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb996de8-1754-4631-85da-b8adb14af5da_633x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!gxyw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb996de8-1754-4631-85da-b8adb14af5da_633x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Exfiltration may look more compact than other tactics, but its consequences are often the greatest.</figcaption></figure></div><h3>Core techniques</h3><p>Let's break these down logically. The most straight-forward path is likely one the adversary already has, which is the case of Exfiltration Over C2 Channel (<a href="https://attack.mitre.org/techniques/T1041/">T1041</a>) or likely Exfiltration Over Web Service (<a href="https://attack.mitre.org/techniques/T1567/">T1567</a>). The main question here is whether they want to burn that path and risk detection or not. Unlike historical exfiltration, threat actors in the cyber realm can justify high-turnover of paths if they have faith that those or other techniques can be used again with success. We services are a persistent issue: they are hard to do without (Saas-delivered storage and tools) but ripe for abuse. Exfiltration Over Another Network Medium (<a href="https://attack.mitre.org/techniques/T1011/">T1011</a>) is another option, and relies on the fact that things like Bluetooth, Zigbee, cellular, and other alternatives are likely forgotten parts of a SOC's responsibilities.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ONIW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc28a0e8-f7e0-4752-a279-977e88773bd1_1024x334.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ONIW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc28a0e8-f7e0-4752-a279-977e88773bd1_1024x334.png 424w, https://substackcdn.com/image/fetch/$s_!ONIW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc28a0e8-f7e0-4752-a279-977e88773bd1_1024x334.png 848w, https://substackcdn.com/image/fetch/$s_!ONIW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc28a0e8-f7e0-4752-a279-977e88773bd1_1024x334.png 1272w, https://substackcdn.com/image/fetch/$s_!ONIW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc28a0e8-f7e0-4752-a279-977e88773bd1_1024x334.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ONIW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc28a0e8-f7e0-4752-a279-977e88773bd1_1024x334.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fc28a0e8-f7e0-4752-a279-977e88773bd1_1024x334.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!ONIW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc28a0e8-f7e0-4752-a279-977e88773bd1_1024x334.png 424w, https://substackcdn.com/image/fetch/$s_!ONIW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc28a0e8-f7e0-4752-a279-977e88773bd1_1024x334.png 848w, https://substackcdn.com/image/fetch/$s_!ONIW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc28a0e8-f7e0-4752-a279-977e88773bd1_1024x334.png 1272w, https://substackcdn.com/image/fetch/$s_!ONIW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc28a0e8-f7e0-4752-a279-977e88773bd1_1024x334.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">TinyTurlaNG, a campaign run by Russian APT Turla, uses the existing C2 channel to post collected information on the C2's compromised WordPress servers so that the attacker can retrieve them in anonymity. (from our session <a href="https://www.ciscolive.com/on-demand/on-demand-library.html?zid=pp&amp;search=BRKSEC-3026#/session/1717269145389001tZex">BRKSEC-3026</a>)</figcaption></figure></div><p>Threat actors who value their C2 may opt to conduct Exfiltration Over Alternative Protocol (<a href="https://attack.mitre.org/techniques/T1048/">T1048</a>), helping maintain some separation and avoiding having to reestablish lines of communication. At the other extreme, adversaries may have to resort to Exfiltration Over Physical Medium (<a href="https://attack.mitre.org/techniques/T1052/">T1052</a>) like USB or other drive. This risks getting caught. Depending on the stakes, it could mean disciplinary action and the exposure of the operation, but in extremes it can trigger jail time, execution, or diplomatic extremes. Attackers use that one sparingly!</p><h3>Enhancement techniques</h3><p>The last category is a lot like the dead drops and trade craft of old. Using Scheduled Transfer (<a href="https://attack.mitre.org/techniques/T1029/">T1029</a>), and adversary leverages a visibility gap in the defenses or lapse in observation to move the data patiently without arousing suspicion. Data Transfer Size Limits (<a href="https://attack.mitre.org/techniques/T1030/">T1030</a>) improves the odds further. No matter the mechanism of transfer, it helps avoid thresholds for detection and lie under the radar. In any case, hiding what the adversary thinks is of value from the defender is very useful. Data Obfuscation (<a href="https://attack.mitre.org/techniques/T1001/">T1001</a>) does exactly that, usually through encoding, encryption or some other means.</p><p>Automated Exfiltration (<a href="https://attack.mitre.org/techniques/T1020/">T1020</a>) occurs as part of a scripted or automated Collection technique. Data is found, parsed for value, and offloaded in one go. Interestingly, it's lone sub-technique, Traffic Duplication (<a href="https://attack.mitre.org/techniques/T1020/001/">T1020.001</a>) actually sees adversaries use taps, mirrors, or redirection of traffic to an adversary controlled receiver. Most Cloud Service Providers offer these features for legitimate uses, so it is reconfigured without the victim taking note.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YPXZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd616c12-f5d2-4565-9039-13e86aa9f2f0_1024x104.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YPXZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd616c12-f5d2-4565-9039-13e86aa9f2f0_1024x104.png 424w, https://substackcdn.com/image/fetch/$s_!YPXZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd616c12-f5d2-4565-9039-13e86aa9f2f0_1024x104.png 848w, https://substackcdn.com/image/fetch/$s_!YPXZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd616c12-f5d2-4565-9039-13e86aa9f2f0_1024x104.png 1272w, https://substackcdn.com/image/fetch/$s_!YPXZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd616c12-f5d2-4565-9039-13e86aa9f2f0_1024x104.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YPXZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd616c12-f5d2-4565-9039-13e86aa9f2f0_1024x104.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cd616c12-f5d2-4565-9039-13e86aa9f2f0_1024x104.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!YPXZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd616c12-f5d2-4565-9039-13e86aa9f2f0_1024x104.png 424w, https://substackcdn.com/image/fetch/$s_!YPXZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd616c12-f5d2-4565-9039-13e86aa9f2f0_1024x104.png 848w, https://substackcdn.com/image/fetch/$s_!YPXZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd616c12-f5d2-4565-9039-13e86aa9f2f0_1024x104.png 1272w, https://substackcdn.com/image/fetch/$s_!YPXZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd616c12-f5d2-4565-9039-13e86aa9f2f0_1024x104.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">IcedID uses rclone to schedule and manage exfiltration jobs, in effect using several techniques from this Tactic. (from The DFIR Report's <a href="https://thedfirreport.com/2024/06/10/icedid-brings-screenconnect-and-csharp-streamer-to-alphv-ransomware-deployment/#exfiltration">excellent article</a> on IcedID)</figcaption></figure></div><h2>How Can We Mitigate Exfiltration?</h2><p>Preventing and detecting exfiltration requires a multi-layered approach. Here are some key strategies:</p><ul><li><p><strong>Network Segmentation and Monitoring</strong>: Implement strict controls on outbound traffic and monitor for anomalous data flows.</p></li><li><p><strong>Data Loss Prevention (DLP)</strong>: Deploy DLP tools to identify and block unauthorized data transfers.</p></li><li><p><strong>Encryption</strong>: Ensure sensitive data is encrypted at rest and in transit, making it harder for attackers to exfiltrate meaningful information.</p></li><li><p><strong>User Behavior Analytics</strong>: Establish baselines for normal data movement and alert on unusual patterns.</p></li><li><p><strong>Egress Filtering</strong>: Implement strict egress filtering rules to limit the protocols and destinations that can be used for outbound connections.</p></li><li><p><strong>Regular Security Audits</strong>: Conduct frequent audits of your network architecture and data flows to identify potential exfiltration routes.</p></li><li><p><strong>Incident Response Planning</strong>: Develop and regularly test incident response plans that include procedures for detecting and responding to data exfiltration attempts.</p></li></ul><p>As with every other set of detections and mitigations, there is a lot of overlap here. That is good! Use it to your advantage and look for mitigation approaches or detection capabilities that offer the best bang-for-the-buck.</p><h2>Conclusion</h2><p>Exfiltration represents the home stretch for attackers, but it's also a critical point of vulnerability. By understanding the techniques adversaries use to extract data and implementing robust defenses, organizations can significantly reduce the risk of successful data theft. Remember, it's not just about preventing initial compromise &#8211; it's about making sure that even if an attacker gets in, they can't get out with your crown jewels.</p><p>As we've seen throughout this series, the key to effective defense is a comprehensive understanding of attacker tactics and techniques. By aligning our security strategies with frameworks like MITRE ATT&amp;CK, we can build more resilient systems and better protect our valuable data assets. We have one last tactic to tackle, so let's wrap up this series next week!</p><p>Thank you for reading this entry in our ATT&amp;CK series. Feel free to share your thoughts and experiences in the comments below!</p>]]></content:encoded></item><item><title><![CDATA[What's Causing Mike's Indigestion Now? We're obsessed with the wrong snowflakes (28 June 2024)]]></title><description><![CDATA[Good day, folks!]]></description><link>https://www.raidersofthelostarp.tech/p/mikes-indigestion-now-were-obsessed-with-the-wrong-snowflake-identity</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/mikes-indigestion-now-were-obsessed-with-the-wrong-snowflake-identity</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Thu, 27 Jun 2024 22:15:03 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/06/mikey_mac_cartoon_of_a_bearded_indiana_jones_running_from_kids__197f5aaa-178a-4499-900d-fce162a67ba3.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QZ-b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QZ-b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!QZ-b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!QZ-b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!QZ-b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QZ-b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2023501,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190625007?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QZ-b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!QZ-b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!QZ-b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!QZ-b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6795350-2c55-4d98-9d65-687b9884cd19_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Good day, folks! Another week, another headline-grabbing security incident seems to be dominating the discussion. And I am not talking about Tim Weah's testy red card vs. Panama, or whatever comes out of the debate tonight. I am talking about a slow boiling issue that impacts all of us. After the last month's buildup, Snowflake is in the spotlight, but don't be fooled - this isn't just about one company's identity problems, and it has ripples through many. Let's dive into why Snowflake's woes are a wake-up call for all of us, and what else it might mean for how we tackle</p><h2>Snowflake's Slippery Slope</h2><p>Snowflake is a cloud data platform carrying over 20% of the business data out there, folks. It is massive - and the list of customers is equally impressive. Despite protecting most of their environment with multi-factor authentication (MFA), <a href="https://www.wired.com/story/snowflake-breach-advanced-auto-parts-lendingtree/">adversaries got their hands on stolen login credentials</a> and used them to infiltrate customer accounts and pilfer sensitive data. The kicker? The attackers found ecosystem users with access to demo accounts and used an infostealer to cause a bunch of breaches in rapid succession. But here's the thing - Snowflake isn't the real issue. It's just the canary in the coal mine for a much larger shift in the threat landscape.</p><p>We don't yet know the exact mode of compromise here - there is a lot of conflicting information. What we know is that a BreachForums account called Sp1d3r is trying to sell thousands of Snowflake account credentials. And we have Mandiant publishing some insights about a financially-motivated actor called <a href="https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion">UNC5537</a>. It turns out that the leak may have originated in service providers who assist customers with Snowflake, but do not work directly for the company. I think we know that this is concerning, but let's take a look at why this is the focus.</p><h3>Identity might actually matter than we want to admit</h3><p>Over the past few decades, we've seen the criminal threat landscape coalesce into two categories ransomware/data extortion and then everything else. Everyone's trying to grab a piece of that billion-dollar pie. Why? It is easy money. The stakes are very lopsided. What begins as a lark and requires relatively little effort for the adversary cripples and threatens the every extinction of the victim. The adversaries go where the money is. And ransom &amp; extortion in cyberspace are easy money.</p><p>Cisco's Talos is reporting that their Incident Response engagements are showing a disturbing trend. While ransomware still dominates, the initial access methods are diversifying. It used to be broad phishing campaigns or watering hole attacks. Now compromised legitimate credentials are becoming the golden ticket for malicious activities. And where are these credentials coming from? Let's discuss that now.</p><h3>Infostealers take the lead</h3><p>Infostealers have grown into a crucial part of the dark web's economy. They're highly organized, and conduct widely distributed campaigns. Current infostealer groups hang out in Telegram chat rooms, selling credentials by the boatload. For a fee, actors can get timed access to a repository of credentials to search and use freely. It's a small price to pay when a single set of enterprise credentials could lead to a multi-million-dollar ransom.</p><p>How do they do it? Infostealer groups typically deploy malware that automates the collection and exfiltration of anything worthwhile. Credential databases, sensitive information, crypto wallets, customer listings, and the like. Many - like <a href="https://thehackernews.com/2023/01/the-evolving-tactics-of-vidar-stealer.html">Vidar</a>, <a href="https://attack.mitre.org/software/S0038/">Duqu</a> or <a href="https://www.bleepingcomputer.com/news/security/raccoon-stealer-is-back-with-a-new-version-to-steal-your-passwords/">Racoon Stealer</a> - still use <a href="https://attack.mitre.org/techniques/T1056/001/">keyloggers</a>. The goal is to collect anything potentially useful, and then decide later whether it is worthwhile. Or let the market decide.</p><h3>Initial Access Brokers take that next step</h3><p>Initial Access Brokers like <a href="https://cloud.google.com/blog/topics/threat-intelligence/kegtap-and-singlemalt-with-a-ransomware-chaser/">UNC1878</a> and<a href="https://attack.mitre.org/groups/G1011/"> Exotic Lily</a> are also a part of this trend, offering that next step - assured access. IABs might use infostealers of their own or credentials sold on the market to gain access. Either way, they are typically taking it that next step and actively running <a href="https://raidersofthelostarp.tech/2024/06/25/command-and-control-this-is-major-tom-to-ground-control/">Command &amp; Control</a> and have <a href="https://raidersofthelostarp.tech/2024/04/02/persistence-how-uninvited-attackers-avoid-being-bounced-from-the-party-attck/">Persistence</a>. Either way, eager threat actors don't have to go far to get these head starts. They just need some cryptocurrency and a dream.</p><h2>Back to Snowflake's case</h2><p>Many enterprises have deployed MFA, but the application isn't consistent. The focus has largely been on the enterprise domain itself. Snowflake apparently had solid MFA to protect identity almost everywhere, but like many organizations their power to enforce strong policies on 3rd party ecosystem vendors or contractors is limited.</p><p>With the rise of Software as a Service (SaaS), sensitive data is spread across multiple vendors around the globe. This creates many points of entry for attackers who, in 2024, might be more focused on data exfiltration than unauthorized encryption. We need to come up with more secure ways to allow collaboration on data. Snowflake isn't unique here, and may be taking arrows for something that could have happened to any SaaS solution provider. We need to learn from this - so what can defenders do while we rethink our industry's way of handling these cases?</p><ol><li><p>Protect critical data with MFA, wherever it's housed.</p></li><li><p>Conduct audits of all external data houses and ensure MFA is configured.</p></li><li><p>Act on infostealer infections with urgency. Assume all credentials on an infected system have been compromised.</p></li><li><p>Provide users with a vetted and trusted way to store passwords.</p></li><li><p>For instances where MFA can't be deployed, limit account access and increase scrutiny.</p></li></ol><p>I hope this has been a helpful take on the Snowflake situation. Feel for those folks - by all accounts there wasn't neglect or vulnerabilities here. But it illustrates the inter-dependencies across our economy and the information age.</p><h2>Things I'm Keeping an Eye On</h2><ul><li><p>Sometimes cyberattacks are just not enough - we should always remember state-sponsored adversaries will still resort to traditional, kinetic attacks. <a href="https://www.wsj.com/world/europe/russian-saboteurs-behind-arson-attackat-german-factory-c13b4ece">Count on Vlad</a> to remind us.</p></li><li><p>Apparently folks are still using MOVEit for file transfer? Yikes - <a href="https://thecyberexpress.com/vulnerability-progress-moveit-transfer/">another set of issues</a> and critical vulnerabilities recently hit and sparked fears in this tool.</p></li><li><p>We've seen TeamViewer used for years by adversaries as an alternative to RDP or VNC - not due to the company's malfeasance, but the ease with which anyone can deploy it. What happens when the company who makes it is <a href="https://therecord.media/teamviewer-investigating-intrusion-it">compromised</a>?</p></li><li><p>In a bid to re-enter the market with a splash, the threat actor and RaaS group Conti is rebranding itself as <a href="https://www.bleepingcomputer.com/news/security/blacksuit-ransomware-gang-claims-attack-on-kadokawa-corporation/">BlackSuit</a>, and have begun hitting victims with a vengeance.</p></li><li><p>A new threat actor Unfurling Hemlock is dropping the <a href="https://www.bleepingcomputer.com/news/security/new-unfurling-hemlock-threat-actor-floods-systems-with-malware/">kitchen sink equivalent of malware on victims</a>. In what is called a 'malware cluster bomb', a nested doll of badness is certainly offering options. While most threat actors have multiple paths and persistence plans in place, this takes it to an extreme.</p></li></ul><h2>Conclusion</h2><p>The Snowflake predicament and identity exposures are a stark reminder that in 2024, protecting your data means more than just securing your own systems. As attackers continue to shift focus to data theft, it's time for organizations to take an honest look at where their data is housed and what protections are in place. Otherwise, you might find your stolen data being sold to the highest bidder - even if that bidder is you. We as a security and systems industry need to come up with a new way of doing things 0 because this isn't working.</p><p>Stay vigilant, folks, and remember: we're all in this together. Have a great week, and be sure to comment below on the new focused approach!</p>]]></content:encoded></item><item><title><![CDATA[Command and Control: This is Major Tom to Ground Control]]></title><description><![CDATA[In our last post, we explored how attackers gather valuable information through the Collection tactic. Once adversaries have a foothold and have collected data, they need a way to maintain control over compromised systems and coordinate their activities. In military operations, you'll see a mix of overt and covert forms of communications. But we know they are happening. Without them, the various units involved would be uncoordinated and the attack would fail before major objectives could be accomplished. Cyber adversaries need this sustained control as well. Payloads are unable to act autonomously for long. And exfiltrating data without it is futile. This is where the next]]></description><link>https://www.raidersofthelostarp.tech/p/command-and-control-this-is-major-tom-to-ground-control</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/command-and-control-this-is-major-tom-to-ground-control</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Tue, 25 Jun 2024 08:16:49 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/06/mikey_mac_funny_cartoon_of_a_hacker_in_a_Hawaiian_shirt_making__f78c600d-938f-4312-a5c3-955512ff5d1e.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7vv7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7vv7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!7vv7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!7vv7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!7vv7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7vv7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1644556,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190625006?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7vv7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!7vv7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!7vv7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!7vv7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae46cad4-7385-44c0-a007-6d01d9aaf9a6_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In our last post, we explored how attackers gather valuable information through the <a href="https://raidersofthelostarp.tech/2024/06/18/attck-collection-how-attackers-grab-the-loot-before-being-caught/">Collection tactic</a>. Once adversaries have a foothold and have collected data, they need a way to maintain control over compromised systems and coordinate their activities. In military operations, you'll see a mix of overt and covert forms of communications. But we know they are happening. Without them, the various units involved would be uncoordinated and the attack would fail before major objectives could be accomplished. Cyber adversaries need this sustained control as well. Payloads are unable to act autonomously for long. And exfiltrating data without it is futile. This is where the next <a href="https://raidersofthelostarp.tech/2023/11/05/worry-less-and-know-your-enemy-with-mitre-attck/">MITRE ATT&amp;CK</a> Tactic comes into play: Command and Control (C2). Let's dive into how attackers use C2 to orchestrate their operations and why it's a critical component of almost every sophisticated cyber attack.</p><h2>The Importance of Command and Control</h2><p>Command and Control is term for communication and coordination in an attack. Whether orchestrated from an attacker's Kali box or a military command post, C2 allows attackers to issue orders, receive information, and manage their operations from afar. Without effective C2, attackers have to build more into their deployed assets. This isn't impossible - some recent military and cyber attacks have used this strategy, but the preparation is insane, and the possible outcomes limited. Prior to the ubiquity of the internet and satellite communications, covert operators would spends months or years to prepare for a mission. Threat actors may also forego C2 as a last resort, most often limited to fire-and-forget malware or simple scripts. These conditions are dangerous, but lacking the adaptability and persistence that characterize today's most threatening adversaries.</p><p>C2 infrastructure serves several crucial purposes for attackers:</p><ul><li><p>Persistence: It allows malware to maintain a connection with the attacker's systems, ensuring long-term access to the compromised network.</p></li><li><p>Updates: Attackers can push new instructions or malware variants to evade detection.</p></li><li><p>Data Exfiltration: C2 channels are often used to steal sensitive information from the target network.</p></li><li><p>Lateral Movement: Coordinating the spread of an attack across multiple systems often relies on C2.</p></li></ul><h3>Historical Context: The Telegraph of War</h3><p>To understand the significance of C2 in cyber operations, it's helpful to look at its roots in military history. During the American Civil War, both Union and Confederate forces recognized the game-changing potential of the telegraph for military communications. General Ulysses S. Grant, in particular, used telegraph networks extensively to coordinate troop movements and relay intelligence. Leaning into these communications helped him maneuver three armies across great distances while keeping supply chains synchronized.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lQaY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3191d554-b507-4bb1-8b7b-e9cf625670f0_779x600.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lQaY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3191d554-b507-4bb1-8b7b-e9cf625670f0_779x600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lQaY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3191d554-b507-4bb1-8b7b-e9cf625670f0_779x600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lQaY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3191d554-b507-4bb1-8b7b-e9cf625670f0_779x600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lQaY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3191d554-b507-4bb1-8b7b-e9cf625670f0_779x600.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lQaY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3191d554-b507-4bb1-8b7b-e9cf625670f0_779x600.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3191d554-b507-4bb1-8b7b-e9cf625670f0_779x600.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!lQaY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3191d554-b507-4bb1-8b7b-e9cf625670f0_779x600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lQaY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3191d554-b507-4bb1-8b7b-e9cf625670f0_779x600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lQaY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3191d554-b507-4bb1-8b7b-e9cf625670f0_779x600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lQaY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3191d554-b507-4bb1-8b7b-e9cf625670f0_779x600.jpeg 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">In an era before the Internet and radio communications, coordinating actions across such a wide area was near impossible. Grant's use of the telegraph as a C2 workhorse changed warfare forever.</figcaption></figure></div><p>However, this new form of rapid long-distance communication also introduced vulnerabilities. Confederate cavalry raids often targeted Union telegraph lines, disrupting communications and gathering intelligence. In one famous incident, Confederate General John Hunt Morgan's raiders tapped into Union telegraph lines, intercepting messages and sending false orders to confuse enemy forces. If only Grant's operators had cryptography! It should also be noted that horse messengers, ships, semaphore flags, and even messaging via the printed press were used to link up other assets like scouts, spies, and more mobile forces.</p><p>The Union's use of telegraph to provide C2 mirrors modern cyber C2 in several ways:</p><ul><li><p>Rapid communication allows for coordinated, large-scale operations</p></li><li><p>The communication channel itself becomes a critical asset and potential vulnerability</p></li><li><p>Intercepting or disrupting the enemy's communications provides significant tactical advantages</p></li><li><p>The main mode was far from the only mode used - backup communications and redundancy are evergreen needs</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EyNY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F783ef796-c690-40ee-997a-34a4b50d54e6_903x657.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EyNY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F783ef796-c690-40ee-997a-34a4b50d54e6_903x657.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EyNY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F783ef796-c690-40ee-997a-34a4b50d54e6_903x657.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EyNY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F783ef796-c690-40ee-997a-34a4b50d54e6_903x657.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EyNY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F783ef796-c690-40ee-997a-34a4b50d54e6_903x657.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EyNY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F783ef796-c690-40ee-997a-34a4b50d54e6_903x657.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/783ef796-c690-40ee-997a-34a4b50d54e6_903x657.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!EyNY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F783ef796-c690-40ee-997a-34a4b50d54e6_903x657.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EyNY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F783ef796-c690-40ee-997a-34a4b50d54e6_903x657.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EyNY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F783ef796-c690-40ee-997a-34a4b50d54e6_903x657.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EyNY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F783ef796-c690-40ee-997a-34a4b50d54e6_903x657.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Having a C2 of choice is one thing, but what made Union forces so effective with the telegraph was their well-rehearsed use of it and their pragmatic use of backup means to maintain persistent contact.</figcaption></figure></div><h3>Command and Control in Modern Cyberspace</h3><p>In the digital realm, C2 infrastructure has evolved into a sophisticated ecosystem of tools and techniques. Modern attackers use a variety of methods to establish and maintain control over compromised systems, often employing multiple redundant channels to ensure persistence. These channels are not just to hand down orders, but are also used to provide updated <a href="https://raidersofthelostarp.tech/2024/03/04/target-recon-phase-dont-make-it-too-easy/">Recon</a> and <a href="https://raidersofthelostarp.tech/2024/05/16/attcks-discovery-now-what-do-we-have-here/">Discovery</a>, Exfiltrate data, and inform <a href="https://raidersofthelostarp.tech/2024/06/11/lateral-movement-a-ruthless-pivot-from-invasion-to-infection/">Lateral Movement</a>.</p><p>Popular C2 frameworks like <a href="https://www.cobaltstrike.com/">Cobalt Strike</a>, Empire, and <a href="https://www.metasploit.com/">Metasploit</a> provide attackers with powerful, flexible tools for managing their operations. <a href="https://howto.thec2matrix.com/">The C2 Matrix project</a> does a great job getting you familiar with a lot of them. These frameworks offer features like:</p><ul><li><p>Multiple communication protocols and encryption methods</p></li><li><p>Modular payloads for different tasks</p></li><li><p>User-friendly interfaces for managing compromised hosts</p></li><li><p>Evasion techniques to avoid detection</p></li></ul><p>However, the principles remain the same as in General Grant's day: establish reliable communications, coordinate actions across multiple assets, and protect your own command infrastructure while seeking to disrupt the enemy's.</p><h2>C2: the attacker's puppet strings</h2><p>The MITRE ATT&amp;CK framework identifies 16 techniques and 27 sub-techniques under the Command and Control (<a href="https://attack.mitre.org/tactics/TA0011">TA0011</a>) tactic. This diversity reflects the many ways attackers can implement C2, adapting their methods to evade detection and maintain persistence.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8TMx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee857c9e-2742-404b-be0b-761918ec26d0_220x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8TMx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee857c9e-2742-404b-be0b-761918ec26d0_220x1024.png 424w, https://substackcdn.com/image/fetch/$s_!8TMx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee857c9e-2742-404b-be0b-761918ec26d0_220x1024.png 848w, https://substackcdn.com/image/fetch/$s_!8TMx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee857c9e-2742-404b-be0b-761918ec26d0_220x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!8TMx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee857c9e-2742-404b-be0b-761918ec26d0_220x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8TMx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee857c9e-2742-404b-be0b-761918ec26d0_220x1024.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee857c9e-2742-404b-be0b-761918ec26d0_220x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8TMx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee857c9e-2742-404b-be0b-761918ec26d0_220x1024.png 424w, https://substackcdn.com/image/fetch/$s_!8TMx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee857c9e-2742-404b-be0b-761918ec26d0_220x1024.png 848w, https://substackcdn.com/image/fetch/$s_!8TMx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee857c9e-2742-404b-be0b-761918ec26d0_220x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!8TMx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee857c9e-2742-404b-be0b-761918ec26d0_220x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">There are a lot of techniques to chew on. Let's try another view...</figcaption></figure></div><p>Here's an attempt at categorizing those same techniques based on a general focus area:</p><p>As you can see above, there are a ton of ways adversaries may combine techniques to provide unfettered access to an environment. Even worse, they may use multiple combinations in concert to ensure they have redundant access.</p><h3>Examples of Techniques in action</h3><p>Want to see some of the more common C2 scenarios out there?</p><ul><li><p>Application Layer Protocol (<a href="https://attack.mitre.org/techniques/T1071/">T1071</a>) Attackers often use common application layer protocols like HTTP, HTTPS, or DNS to blend their C2 traffic with normal network activity.</p><ul><li><p>Example: The <a href="https://attack.mitre.org/software/S0093/">Havex malware</a>, used in industrial espionage, uses HTTP POST requests to exfiltrate data and receive commands, making it difficult to distinguish from legitimate web traffic.</p></li></ul></li><li><p>Data Encoding (<a href="https://attack.mitre.org/techniques/T1132/">T1132</a>) To further obfuscate their communications, attackers may encode or encrypt their C2 traffic. This can range from simple base64 encoding to sophisticated custom encryption schemes.</p><ul><li><p>Example: The <a href="https://attack.mitre.org/software/S0386/">Ursnif banking trojan</a> uses a custom encryption algorithm over HTTPS to protect its C2 communications, making it challenging for defenders to analyze the traffic.</p></li></ul></li><li><p>Non-Standard Port (<a href="https://attack.mitre.org/techniques/T1571/">T1571</a>) While using common protocols helps hide C2 traffic, using non-standard ports can help evade port-based filtering and monitoring.</p><ul><li><p>Example: The <a href="https://attack.mitre.org/software/S0030/">Carbanak malware</a>, infamous for targeting financial institutions, has been observed using port 443 (typically reserved for HTTPS) for its C2 communications, but with a custom binary protocol instead of actual HTTPS.</p></li></ul></li><li><p>Protocol Tunneling (<a href="https://attack.mitre.org/techniques/T1572/">T1572</a>) Attackers may tunnel their C2 traffic through other protocols, essentially hiding one protocol inside another. This technique can bypass firewalls and other security controls that aren't inspecting traffic deeply enough.</p><ul><li><p>Example: <a href="https://attack.mitre.org/software/S0687">Cyclops Blink</a> has been know to abuse DNS over HTTPS (DoH) in order to evade firewall and other DNS security measures and reach C2 nodes.</p></li></ul></li></ul><h3>How Attackers Establish and Maintain C2</h3><p>Setting up effective C2 infrastructure is a crucial step for attackers. Here's a typical process:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pDaj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1610c74e-cae6-4aa8-adf5-13801db18211_1024x577.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pDaj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1610c74e-cae6-4aa8-adf5-13801db18211_1024x577.png 424w, https://substackcdn.com/image/fetch/$s_!pDaj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1610c74e-cae6-4aa8-adf5-13801db18211_1024x577.png 848w, https://substackcdn.com/image/fetch/$s_!pDaj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1610c74e-cae6-4aa8-adf5-13801db18211_1024x577.png 1272w, https://substackcdn.com/image/fetch/$s_!pDaj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1610c74e-cae6-4aa8-adf5-13801db18211_1024x577.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pDaj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1610c74e-cae6-4aa8-adf5-13801db18211_1024x577.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1610c74e-cae6-4aa8-adf5-13801db18211_1024x577.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!pDaj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1610c74e-cae6-4aa8-adf5-13801db18211_1024x577.png 424w, https://substackcdn.com/image/fetch/$s_!pDaj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1610c74e-cae6-4aa8-adf5-13801db18211_1024x577.png 848w, https://substackcdn.com/image/fetch/$s_!pDaj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1610c74e-cae6-4aa8-adf5-13801db18211_1024x577.png 1272w, https://substackcdn.com/image/fetch/$s_!pDaj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1610c74e-cae6-4aa8-adf5-13801db18211_1024x577.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">TinyTurlaNG had great success against some government targets in the Winter of 2024, and did so by leveraging multiple C2 paths to help facilitate their theft of sensitive materials and credentials. (from our CLUS2024 session <a href="https://www.ciscolive.com/on-demand/on-demand-library.html?search=BRKSEC-3026#/">BRKSEC-3026</a>)</figcaption></figure></div><ol><li><p><strong>Infrastructure Setup</strong>: Attackers often use compromised servers, cloud services, or anonymizing networks like Tor to host their C2 servers. They may employ domain generation algorithms (DGAs) to create a constantly changing list of domain names for their C2 servers.</p></li><li><p><strong>Initial Compromise</strong>: Once a system is compromised, the attacker's malware establishes an initial connection to the C2 server, often using hardcoded addresses or DGA-generated domains.</p></li><li><p><strong>Beacon and Registration</strong>: The compromised system sends a beacon to the C2 server, providing information about the system and potentially receiving initial instructions.</p></li><li><p><strong>Ongoing Communication</strong>: The malware maintains periodic communication with the C2 server, checking for new commands and potentially exfiltrating collected data.</p></li><li><p><strong>Adapting and Evading</strong>: Sophisticated attackers continuously modify their C2 techniques to avoid detection, using tactics like traffic mimicry, domain fronting, or piggybacking on legitimate services.</p></li></ol><p>TinyTurlaNG is a great case study. They not only conduct the steps above, but they do it for two disparate C2 mechanisms (TTNG and Chisel) in addition to a whole host of parallel back doors that they are implementing. Below is just one of those (TTNG), which uses a compromised WordPress server to act as the C2 head end and builds in a custom HTTP parser to coordinate actions. Below is look at some of the logic in that C2, as covered by a <a href="https://blog.talosintelligence.com/tinyturla-ng-tooling-and-c2/">wonderful Cisco Talos post</a>:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!F2-r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b2c0577-10a5-40eb-9750-f58c4fe9e796_1024x911.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F2-r!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b2c0577-10a5-40eb-9750-f58c4fe9e796_1024x911.png 424w, https://substackcdn.com/image/fetch/$s_!F2-r!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b2c0577-10a5-40eb-9750-f58c4fe9e796_1024x911.png 848w, https://substackcdn.com/image/fetch/$s_!F2-r!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b2c0577-10a5-40eb-9750-f58c4fe9e796_1024x911.png 1272w, https://substackcdn.com/image/fetch/$s_!F2-r!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b2c0577-10a5-40eb-9750-f58c4fe9e796_1024x911.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F2-r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b2c0577-10a5-40eb-9750-f58c4fe9e796_1024x911.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b2c0577-10a5-40eb-9750-f58c4fe9e796_1024x911.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!F2-r!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b2c0577-10a5-40eb-9750-f58c4fe9e796_1024x911.png 424w, https://substackcdn.com/image/fetch/$s_!F2-r!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b2c0577-10a5-40eb-9750-f58c4fe9e796_1024x911.png 848w, https://substackcdn.com/image/fetch/$s_!F2-r!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b2c0577-10a5-40eb-9750-f58c4fe9e796_1024x911.png 1272w, https://substackcdn.com/image/fetch/$s_!F2-r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b2c0577-10a5-40eb-9750-f58c4fe9e796_1024x911.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">If you look closely, you can see the sorts of commands Turla is using to conduct their operations via the TTNG C2. (H/T to <a href="https://blog.talosintelligence.com/tinyturla-ng-tooling-and-c2/">Cisco Talos</a>)</figcaption></figure></div><h2>How can we Mitigate Command and Control?</h2><p>Defending against C2 activities requires a multi-layered approach, and if it seems they rhyme well with previous tactics we've covered, you are spot on! The good news? You get a lot of bang for the buck when you do the 'simple' things well. The bad news? Doing the 'simple' things can be hard culturally:</p><ul><li><p><strong>Network Segmentation</strong>: Limit the ability of compromised systems to communicate across the network. This single thing can ensure C2's tentacles are limited in reach and save your bacon!</p></li><li><p><strong>Firewall Rules and Application Whitelisting</strong>: Strictly control what can communicate externally and which applications can run. If you don't know, enlist a network behavior and/or application dependency mapping tool to help!</p></li><li><p><strong>Traffic Analysis and Anomaly Detection</strong>: Use tools to identify unusual patterns in network traffic that could indicate C2 activity. Beacons and long-lived sessions are weird. We need to find the strange and scrutinize it.</p></li><li><p><strong>Regular System Updates and Patch Management</strong>: Keep systems updated to prevent exploitation of known vulnerabilities. A lot of C2 takes advantage of flaws, vulns, and misconfiguration.</p></li><li><p><strong>DNS Monitoring</strong>: Watch for unusual DNS queries that could indicate use of DGAs or DNS tunneling. Firewalls and Secure Web Gateways are particularly helpful here. Also - enforce strict ACLs for what resolvers are trusted!</p></li><li><p><strong>SSL/TLS Inspection</strong>: For environments where it's feasible, inspect encrypted traffic for signs of C2 communications. It is costly and compute intensive, so maybe use it in higher-risk areas?</p></li><li><p><strong>User Education</strong>: Train users to recognize and report suspicious system behavior that could indicate a compromise.</p></li></ul><h2>Conclusion</h2><p>Command and Control is a critical tactic for adversaries, serving as the nervous system of their operations. By understanding C2 techniques and implementing robust defenses, organizations can disrupt attackers' ability to maintain their grip on compromised assets.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-JNi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c4c056-adc1-453c-b0eb-860a86be4a73_819x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-JNi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c4c056-adc1-453c-b0eb-860a86be4a73_819x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-JNi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c4c056-adc1-453c-b0eb-860a86be4a73_819x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-JNi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c4c056-adc1-453c-b0eb-860a86be4a73_819x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-JNi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c4c056-adc1-453c-b0eb-860a86be4a73_819x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-JNi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c4c056-adc1-453c-b0eb-860a86be4a73_819x1024.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5c4c056-adc1-453c-b0eb-860a86be4a73_819x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!-JNi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c4c056-adc1-453c-b0eb-860a86be4a73_819x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-JNi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c4c056-adc1-453c-b0eb-860a86be4a73_819x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-JNi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c4c056-adc1-453c-b0eb-860a86be4a73_819x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-JNi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5c4c056-adc1-453c-b0eb-860a86be4a73_819x1024.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Ulysses S. Grant: Soldier. General. President. And C2 revolutionary.</figcaption></figure></div><p>Just as General Grant's use of the telegraph revolutionized military communications, modern cyber attackers leverage robust C2 infrastructures to coordinate their campaigns. However, unlike Civil War-era telegraph lines, today's C2 channels are often hidden in plain sight, masquerading as normal network traffic. And rather than diversifying with flags, riders on horseback, and smoke, cyber adversaries just add additional channels using different TTP recipes. Can you tell the difference?</p><p>As defenders, our challenge is to spot these disguised communications, sever the attacker's control, and fortify our systems against future intrusions. By focusing on a good mix of C2 detection and prevention, we significantly increase the cost and complexity for attackers and force them to make mistakes. Which is super helpful to our detection efforts!</p><p>I hope this ATT&amp;CK Command and Control entry in the series has been helpful. Whatever you decide to do, think about all the ways you need communications to happen and aim to allow only those to happen. Thank you for reading and feel free to comment below!</p>]]></content:encoded></item><item><title><![CDATA[What’s causing Mike’s Indigestion now? Someone's entered the "find out" stage (20 June 2024)]]></title><description><![CDATA[Good day, folks!]]></description><link>https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-someones-entered-find-out-20-june-2024-scattered-alphv-mfa</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-someones-entered-find-out-20-june-2024-scattered-alphv-mfa</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Thu, 20 Jun 2024 11:31:57 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/06/mikey_mac_cartoon_of_a_bearded_Indiana_Jones_stepping_on_a_big__53aa68ef-1ccd-4255-b7f9-49a4edf38902.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!A20j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!A20j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!A20j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!A20j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!A20j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!A20j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2025873,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190625005?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!A20j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!A20j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!A20j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!A20j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53071eb-1c79-4bf5-a28f-ab7a09c0519d_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Good day, folks! It's been more of the same for security practitioners around the world. Increasing rates of ransom, leaks, and vulnerability announcements continue to climb. That said, interesting new news hit this week, with mixed results for cyber crime outfits. Let's talk about ALPHV and Scattered Spider and look at some good guidance on MFA. We'll also take a look at the other fun developments.</p><h2>Ransomware dynamics continually in flux</h2><p>Cyber crime giveth, cyber crime taketh away!Spanish police arrested Tyler Buchanan, a Scottish SIM-swapper. As one of the alleged ring leaders of Scattered Spider, he's a popular guy. Scattered Spider has been in the news a ton lately, taking ransoms from over 130 organizations in the past couple of years, notably MGM and Caesars casinos, LastPass, DoorDash, and many more.</p><p>Scattered Spider's background in SIM-swapping is particularly troublesome as it prepares them well to tackle enterprises. <a href="https://www.microsoft.com/en-us/microsoft-365-life-hacks/privacy-and-safety/what-is-sim-swapping">SIM-swapping</a> involves fooling the phone company into moving your number to a hacker-controlled SIM card. Cell companies need more than the request - they want personal information to help verify you are the rightful owner. SIM swappers are adept at digging that information up, through stolen information from other breaches certainly, but more commonly we do it to ourselves - they simply check into our over-shared details on social media.</p><p>Scattered Spider applies these same techniques to social engineering focused attacks like those on MGM and Caesars. They do their homework, find weak spots in the process, and confidently pose as someone who belongs in the environment. While law enforcement has arrested Tyler and other collaborators, more are on the loose. And it appears as though this is a very competitive underground, with rivals competing for breaches and even ordering <a href="https://krebsonsecurity.com/2022/09/violence-as-a-service-brickings-firebombings-shootings-for-hire/">Violence-as-a-Service</a> against each other. Nice people!</p><h3>The "how'd they do that?" piece</h3><p>Meanwhile, <a href="https://raidersofthelostarp.tech/2024/04/25/whats-causing-mikes-indigestion-now-double-trouble-healthcare-ransom/">ALPHV</a> Group's more recent TTPs get a <a href="https://thedfirreport.com/2024/06/10/icedid-brings-screenconnect-and-csharp-streamer-to-alphv-ransomware-deployment/">very thorough write-up</a> in The DFIR Report's latest on their IcedID campaign. In one of the most elaborate (by ATT&amp;CK plotting standards) operations, The DFIR Report folks conducted a master-class in understanding how ALPHV conducted this op, which also offers a lot of insights as to how we can stop them. Keep in mind, ALPHV supposedly exited the business after orchestrating both the breach of <a href="https://raidersofthelostarp.tech/2024/06/13/whats-causing-mikes-indigestion-now-change-recall/">Change Healthcare</a> and their 'exit scam' that saw them hosing their accomplices, but we can learn a lot from this operation and certainly expect ALPHV to resurface after reinventing themselves.</p><h2>MFA-related help</h2><p>I think we're all learning that not all MFA is created (or configured) equal. Even Duo, an advanced and capable MFA offering, requires proper configuration to ensure it is delivering phish-resistant and resilient multi-factor authentication. Scattered Spider and many other firms are leveraging phishing in all of its variations (voice, email, text, etc.) to bypass improperly configured or overly lax MFA processes. Cisco's Talos released a <a href="https://blog.talosintelligence.com/how-are-attackers-trying-to-bypass-mfa/">very informative piece</a> that goes a long ways towards helping understand where all of these bypasses come from. Most importantly, they offer guidance on how and where to implement MFA for best results, in a vendor-agnostic way.</p><h2>This week in AI</h2><p>As we race to both harness and counter AI in so many aspects of technology, AI's propensity to hallucinate and susceptibility to poisoning are getting a lot of attention. One thing I hadn't counted on but find both funny and frightening, is that some may be full of it. Wired's report "<a href="https://www.wired.com/story/perplexity-is-a-bullshit-machine/">Perplexity is a Bullshit Machine</a>" makes a good case for not just putting guardrails on the tech, but also calling for ethics in the companies and developers who unleash them on us.</p><p>I think this is a good cautionary tale for security vendors and practitioners. Pay attention to how your security ecosystem protects their AI from malicious influence. Take note of how they mitigate hallucinations. And ensure they are ethical. You'd hate to have an AI engine ignore important aspects of your environment or make recommendations purely based on bullshit.</p><h2>Things I am keeping an eye on</h2><ul><li><p>T-Mobile is <a href="https://www.bleepingcomputer.com/news/security/t-mobile-denies-it-was-hacked-links-leaked-data-to-vendor-breach/">denying claims</a> that they were breached recently, despite IntelBroker claiming they have source code to post. There may be a service provider T-Mobile uses who was hacked, and it could explain the <a href="https://www.bleepingcomputer.com/news/security/europol-confirms-web-portal-breach-says-no-operational-data-stolen/">big uptick in breaches</a> by IntelBroker in recent weeks (Europol, AMD, Apple, and more). There may be some links to Confluence products, but that is not yet confirmed. Odds are, however, that IntelBroker focuses on service providers to their victims, not the victim environments themselves.</p></li><li><p>Another week, another cryptocurrency exchange hitting major bumps. Kraken is <a href="https://thehackernews.com/2024/06/kraken-crypto-exchange-hit-by-3-million.html">blaming a security researcher for the loss of $3M</a> in digital assets, claiming that they are refusing to return them after exploiting an "extremely critical" 0-day flaw while participating in a bug bounty. It seems the researcher shared the flaw with 2 other folks who used it to make off with the loot.</p></li><li><p>The NSO Group - an Israeli firm who for years denied abuse of their Pegasus spyware, finally <a href="https://www.csoonline.com/article/2154092/pegasus-can-target-government-and-military-officials.html">caved in legal proceedings</a> brought by WhatsApp. It turns out Citizen Lab and others were spot on - Pegasus is used all over, and targets include government and military officials. Even worse, NSO seems to let almost anyone willing to pay enough to use this stuff.</p></li><li><p>CISA has released some great new guidance in concert with several partner organizations to help us <a href="https://www.cisa.gov/sites/default/files/2024-06/Modern%20Approaches%20to%20Network%20Access%20Security-508c.pdf">improve network access security</a>. With the glut of VPN-related hacks and CVEs, this is very welcome and informative.</p></li><li><p>The French government appears to be <a href="https://www.darkreading.com/cyber-risk/france-national-interests-bid-atos-cybersec">serious about purchasing Atos' cybersecurity division</a> in an effort to improve their national security posture and to salvage the financially-struggling company's most vital division. This seems weird at first, but I think it is bold and may offer some good lessons learned for the rest of the Western World. Russia and China are certainly not new to this sort of arrangement.</p></li></ul><h2>Good Reads</h2><p>I'm going to cheat here. I am still reading my <a href="https://www.barnesandnoble.com/w/children-of-ash-and-elm-neil-price/1133331876">Children of Ash and Elm</a> history about the Vikings, and it is really insightful - I had no idea that the "Viking Age" was most likely precipitated by a series of massive volcano eruptions in El Salvador and elsewhere (~536-546 AD) that triggered a 3-year winter and obscured the stars for decades.</p><p>I am also revisiting one of the best podcasts out there, <a href="https://www.dancarlin.com/hardcore-history-series/">Hardcore History by Dan Carlin</a>. The episodes come out 1 per every few months, but there is no better storyteller out there. His most recent episode on Alexander the Great is phenomenal, especially the background on Phillip II (his father) and Olympias (his mother. That would have been an 'interesting' family dynamic for sure.</p><h2>Conclusion</h2><p>I hope this was a helpful update. Next week I plan to focus more on a recent threat actor rather than on a massive spread of news, so we'll see how that goes. have a great week, folks!</p>]]></content:encoded></item><item><title><![CDATA[Collection: How Attackers Gather the Loot Before Being Caught]]></title><description><![CDATA[In last week's post, we tool at look at how attackers move laterally. They do this to get to their goals and to better entrench themselves. Whether the adversary is an APT or special forces unit, gathering information is critical to the success of any mission. If there are exceptions, they're probably limited to bombardments (in physical warfare) or Denial of Service (DoS) attacks (in cyber). It's tough to have long-lasting effects without going further than those brute-force attacks. FThe information may be the end goal, or it may be essential to achieving it. The next]]></description><link>https://www.raidersofthelostarp.tech/p/attck-collection-how-attackers-grab-the-loot-before-being-caught</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/attck-collection-how-attackers-grab-the-loot-before-being-caught</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Tue, 18 Jun 2024 22:07:50 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/06/mikey_mac_hacker_in_hawaiian_shirt_working_on_his_workstation_w_a582d3f8-608b-4aef-a3ff-36e999b1cb76.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dqnt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dqnt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Dqnt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Dqnt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqnt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dqnt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2066059,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190625004?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dqnt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Dqnt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Dqnt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqnt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1416440-3c1f-47a1-b466-3481aaa0d034_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In last week's post, we tool at look at how attackers move <a href="https://raidersofthelostarp.tech/2024/06/11/lateral-movement-a-ruthless-pivot-from-invasion-to-infection/">laterally</a>. They do this to get to their goals and to better entrench themselves. Whether the adversary is an APT or special forces unit, gathering information is critical to the success of any mission. If there are exceptions, they're probably limited to bombardments (in physical warfare) or Denial of Service (DoS) attacks (in cyber). It's tough to have long-lasting effects without going further than those brute-force attacks. FThe information may be the end goal, or it may be essential to achieving it. The next <a href="https://attack.mitre.org">MITRE ATT&amp;CK</a> tactic is Collection. Let's look at how almost every adversary on the very diverse spectrum of threats needs it.</p><h2>The Importance of Collection</h2><p>Merriam-Webster's Dictionary primarily defines a <a href="https://www.merriam-webster.com/dictionary/system">system</a> as "a regularly interacting or interdependent group of items forming a unified whole." Further down on the page is one that digs deeper: "an organized set of doctrines, ideas, or principles usually intended to explain the arrangement or working of a <a href="https://www.merriam-webster.com/dictionary/systematic">systematic</a> whole." Information is essential to any system. You name a system, and I will bet that information defines or runs that system. Alliances or nation-states, terrorist organizations or cults, companies or organizations - all are systems, and all leave indelible marks - information that characterizes them, defines them, or keeps them running.</p><p>As we shift to thinking about potential targets in the modern era, it goes beyond even that. In the "Information Age," a vast majority of "shareholder value" is delivered by collecting and processing data. Healthcare or services organizations rely on information to function. Manufacturers use information to guide production and manage logistics. Military organizations leverage information to guide all decisions. Information is the lifeblood of any system. MITRE designed ATT&amp;CK Collection tactic to focus on this key area of any attack chain.</p><h3>Collection at war</h3><p>During conflict, forces continually collect things of value. Sometimes intelligence informs decisions during the operation: intelligence gathering reveals the locations of strengths or weaknesses, prisoners, caches of weapons, or the like. Sometimes, the collection is the point of the entire operation. While information makes up a good part of that, it may also be property that is the focus. In traditional warfare, both sides take whatever they can get.</p><h4>Fighting an Enigma</h4><p>Nazi Germany's early domination in World War II was due in no small part to their mastery of electromechanical cryptography. With a highly centralized command structure, they depended on high-speed communications protected by algorithms provided by devices like the famous Enigma machine. Radio transmissions of the time were easy to intercept, so this layer was essential to keeping the Allies in the dark.</p><p>Allies managed, however, to accumulate enough cryptographic material (cipher sets and plugboard settings), design documentation, and even Polish counterfeit machines. Some of these were turned over by resistance forces, others were captured during the Allied invasion of North Africa. Informed by insights provided by Polish mathematicians, the Allies were able to break Enigma's codes, listen in on German traffic, and make decisions that no doubt altered the course of history.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Eo9T!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd62b83a-cec2-4199-a82a-cf48c24ff29f_1024x731.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Eo9T!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd62b83a-cec2-4199-a82a-cf48c24ff29f_1024x731.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Eo9T!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd62b83a-cec2-4199-a82a-cf48c24ff29f_1024x731.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Eo9T!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd62b83a-cec2-4199-a82a-cf48c24ff29f_1024x731.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Eo9T!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd62b83a-cec2-4199-a82a-cf48c24ff29f_1024x731.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Eo9T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd62b83a-cec2-4199-a82a-cf48c24ff29f_1024x731.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bd62b83a-cec2-4199-a82a-cf48c24ff29f_1024x731.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Picture of German soldiers using a radio and an Enigma Machine&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Picture of German soldiers using a radio and an Enigma Machine" title="Picture of German soldiers using a radio and an Enigma Machine" srcset="https://substackcdn.com/image/fetch/$s_!Eo9T!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd62b83a-cec2-4199-a82a-cf48c24ff29f_1024x731.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Eo9T!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd62b83a-cec2-4199-a82a-cf48c24ff29f_1024x731.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Eo9T!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd62b83a-cec2-4199-a82a-cf48c24ff29f_1024x731.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Eo9T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd62b83a-cec2-4199-a82a-cf48c24ff29f_1024x731.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">German forces depended on Enigma machines to encode and decode secret messages transmitted over the radio during World War II. The Enigma machine is on the left. (Photo courtesy of Helge Fykse, Norway)</figcaption></figure></div><p>Throughout their collection of German cryptographic material, the Allies issued requests with friendly forces seeking these materials. When sympathetic citizens in occupied areas happened upon these valuable assets or forces captured them, every effort was made to protect the loot and prevent its capture from becoming known to German forces. The value in the collection and loss of these cryptographic treasures was at risk. If Germans realized their precious machines were compromised, the value to the Allies would be nullified. Had they found out, they would have switched schemes, obscured their communications, and rendered Allied efforts pointless.</p><h3>Collection in modern cyberspace</h3><p>These same exact principles apply in the cyber realm. Attackers will collect information for many purposes. For the sake of our future dialog, we'll assume a couple of things. If it happens outside of and before the active operation, it is <a href="https://raidersofthelostarp.tech/2024/03/04/target-recon-phase-dont-make-it-too-easy/">Reconnaissance</a>. If it is collected while actively inside victim systems and used to further the attackers operation, it is <a href="https://raidersofthelostarp.tech/2024/05/16/attcks-discovery-now-what-do-we-have-here/">Discovery</a>. Either of those may provide information that can inform <a href="https://raidersofthelostarp.tech/2024/05/06/credential-access-why-make-logging-in-so-easy/">Credential Access</a>. When we talk about the ATT&amp;CK definition of Collection, it is the process of gathering any information during the active phases of an operation that either furthers the op (Discovery &amp; Credential Access) or has intrinsic value to the victim, the market, or both. We've covered how the operationally-significant data impacts victims, but what about the rest?</p><p>That information could be financial (banking information, credit card data, balances). This data is useful in either embarrassing the victim or allowing a malicious actor to abuse them. Healthcare data, intellectual property, diplomatic or legal information - all of these are ripe for harvest and bring value on the dark web's markets. Some data may be useful in both the operation and on the market. Databases storing credentials or PII can help inform following techniques and be sold or marketed by initial access brokers. When targeting individuals for blackmail, attackers gather audio or video recordings or photos of that target in compromising situations.</p><p>The current trend in breaches is in the double extortion game. Early ransomware aimed to encrypt files to render them useless. Recent reports point toward attackers depriving the rightful owners of access while simultaneously holding that data over the victims head. This threatens to release or sell that information should ransom demands not be met.</p><h2>Collection: the art of quietly accumulating anything of value</h2><p>The MITRE ATT&amp;CK entry for Collection (<a href="https://attack.mitre.org/tactics/TA0009/">TA0009</a>) lists 17 techniques and 20 subtechniques. These cover a lot of methods for gleaning information. These many techniques vary most by the types of information they hope to collect.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8hrk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fa06734-c86c-49ec-b2d2-71f13ab9c2df_210x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8hrk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fa06734-c86c-49ec-b2d2-71f13ab9c2df_210x1024.png 424w, https://substackcdn.com/image/fetch/$s_!8hrk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fa06734-c86c-49ec-b2d2-71f13ab9c2df_210x1024.png 848w, https://substackcdn.com/image/fetch/$s_!8hrk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fa06734-c86c-49ec-b2d2-71f13ab9c2df_210x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!8hrk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fa06734-c86c-49ec-b2d2-71f13ab9c2df_210x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8hrk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fa06734-c86c-49ec-b2d2-71f13ab9c2df_210x1024.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7fa06734-c86c-49ec-b2d2-71f13ab9c2df_210x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8hrk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fa06734-c86c-49ec-b2d2-71f13ab9c2df_210x1024.png 424w, https://substackcdn.com/image/fetch/$s_!8hrk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fa06734-c86c-49ec-b2d2-71f13ab9c2df_210x1024.png 848w, https://substackcdn.com/image/fetch/$s_!8hrk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fa06734-c86c-49ec-b2d2-71f13ab9c2df_210x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!8hrk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fa06734-c86c-49ec-b2d2-71f13ab9c2df_210x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3>It's not personal, or maybe it is?</h3><p>These ATT&amp;CK collection techniques lean more toward gaining information that could be used post-breach to embarrass, compromise, or otherwise disadvantage the victim. Due to the very personal nature of these techniques, they tend to be used against individuals and are combined with social engineering to play on fear, stress, and desperation. Extortion or blackmail information may be gathered through many of these methods, but Audio Capture (<a href="https://attack.mitre.org/techniques/T1123/">T1123</a>) and Video Capture (<a href="https://attack.mitre.org/techniques/T1125/">T1125</a>) are primarily focused on this use case.</p><h3>Useful in both furthering objectives and ransom scenarios</h3><p>Screen Capture (<a href="https://attack.mitre.org/techniques/T1113/">T1113</a>) can also be useful in ransom/extorion scenarios, but also offers a means by which to steal credentials, sensitive business data, or other more corporate uses. Input Capture (<a href="https://attack.mitre.org/techniques/T1056/">T1056</a>) and Email Collection (<a href="https://attack.mitre.org/techniques/T1114/">T1114</a>) are likewise multi-use techniques, feeding future operations and generating ransom fodder. Clipboard Data (<a href="https://attack.mitre.org/techniques/T1115">T1115</a>) takes advantage of user habits, where typical behavior sees a lot of cutting and pasting of credentials and PII.</p><p>Further from the users own actions, Data from Cloud Storage (<a href="https://attack.mitre.org/techniques/T1530">T1530</a>), , Removable Media (<a href="https://attack.mitre.org/techniques/T1025">T1025</a>), Local System (<a href="https://attack.mitre.org/techniques/T1005">T1005</a>), and Network Shared Drive (<a href="https://attack.mitre.org/techniques/T1039">T1039</a>) are all potential treasure troves that could offer both operationally significant data and embarrassing or sensitive information. Data from Information Repositories (<a href="https://attack.mitre.org/techniques/T1213">T1213</a>) or Configuration Repositories (<a href="https://attack.mitre.org/techniques/T1602">T1602</a>) tend to be more focused on corporate information, but that data may assist in pushing deeper into the target environment while boosting the value on dark web clearing houses.</p><p>Data in motion is also up for grabs. Adversary-in-the-Middle (<a href="https://attack.mitre.org/techniques/T1557">T1557</a>) sees attackers intercepting data to pull it "off the wire", with hopes that the victim is non-the-wiser. Browser Session Hijacking (<a href="https://attack.mitre.org/techniques/T1185">T1185</a>) goes right to the client and allows not just intercept, but potential poisoning of data or extended access to applications while posing as the legitimate user.</p><h3>Getting organized</h3><p>A number of the techniques in the ATT&amp;CK Collection tactic are focused not on capturing the information, but in processing or moving it for later use. Archived Collected Data (<a href="https://attack.mitre.org/techniques/T1560">T1560</a>) prepares the data for efficient exfiltration, and may involve compression, archival, or encryption as part of performing it. This may happen in concert with staging that information at collection points, as described by the Data Staged (<a href="https://attack.mitre.org/techniques/T1074">1074</a>) technique. Some tools use Automated Collection (<a href="https://attack.mitre.org/techniques/T1119">T1119</a>) - key loggers and CLI parsers can pattern patch to pull useful data for adversaries to look into later.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NPJ2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F999e2d70-6250-43c3-83a9-1d671e2116a4_1024x639.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NPJ2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F999e2d70-6250-43c3-83a9-1d671e2116a4_1024x639.png 424w, https://substackcdn.com/image/fetch/$s_!NPJ2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F999e2d70-6250-43c3-83a9-1d671e2116a4_1024x639.png 848w, https://substackcdn.com/image/fetch/$s_!NPJ2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F999e2d70-6250-43c3-83a9-1d671e2116a4_1024x639.png 1272w, https://substackcdn.com/image/fetch/$s_!NPJ2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F999e2d70-6250-43c3-83a9-1d671e2116a4_1024x639.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NPJ2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F999e2d70-6250-43c3-83a9-1d671e2116a4_1024x639.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/999e2d70-6250-43c3-83a9-1d671e2116a4_1024x639.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!NPJ2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F999e2d70-6250-43c3-83a9-1d671e2116a4_1024x639.png 424w, https://substackcdn.com/image/fetch/$s_!NPJ2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F999e2d70-6250-43c3-83a9-1d671e2116a4_1024x639.png 848w, https://substackcdn.com/image/fetch/$s_!NPJ2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F999e2d70-6250-43c3-83a9-1d671e2116a4_1024x639.png 1272w, https://substackcdn.com/image/fetch/$s_!NPJ2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F999e2d70-6250-43c3-83a9-1d671e2116a4_1024x639.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">IcedID uses a robust attack chain, including very methodical Collection techniques to harvest information. here they are searching paths and looking for useful data to collect for future exfiltration (from The DFIR Report's <a href="https://thedfirreport.com/2024/06/10/icedid-brings-screenconnect-and-csharp-streamer-to-alphv-ransomware-deployment/#collection">awesome reporting</a>)</figcaption></figure></div><h2>How can we mitigate Collection?</h2><p>The ATT&amp;CK Collection techniques often come in groups. Pulling the information in the first place is only part of the tactic. The adversary must also get it somewhere they can exfiltrate it from or access it to assess its value. It may be impossible to prevent some of these techniques due to use of system LOLBins, but detection will be dependent on a mix of behavioral analytics and firm understanding of what 'normal' is for your environments.</p><h3>Suggestions</h3><p>Here are some things to focus on:</p><ul><li><p><strong>User Training and Awareness</strong> - as with many of the prior tactics, your users are the first like of defense. They are very capable detectors - train them to recognize strange behaviors and use common-sense while operating.</p></li><li><p><strong>Segmentation</strong> of all types guards against putting all eggs in one basket. Breaches happen - ensure they do not include all data in one fell swoop. Create friction, and that will improve detectibility as adversaries will make more noise.</p></li><li><p><strong>Harden Systems</strong> and turn off unused or lower-security protocols. Many sniffing and AiTM techniques take advantage of services that have no place in a modern environment. Shut them down!</p></li><li><p><strong>Access Control and Privilege Management</strong> - by ensuring need to know and evaluating posture before allowing access, you reduce risk of all-out compromise tremendously.</p></li><li><p><strong>Encryption</strong> isn't infallible, but done right it renders the stealing of information useless for now. Even better, look for ways to implement quantum resistant methods so as to avoid exposure later, when adversaries can apply quantum computing to your locked secrets.</p></li><li><p><strong>Behavioral analytics </strong>- establishing a baseline and monitoring for strange behaviors addresses future attacks, even when signatures don't yet exist. Data hoarding alerts, collection events, and strange interactions between usually unrelated entities will tip you off.</p></li><li><p><strong>Log and audit</strong> - access to any sensitive data, files, or systems should be readily auditable. It isn't exciting, but it is immense helpful.</p></li></ul><h2>Conclusion</h2><p>Adversaries know that collection only really helps if they can get away with it. Prevention sure would be nice for a defender, but detection can allow disruption and corrective action before the adversary can take advantage of their new found loot. The Allies' efforts to break Enigma only worked because they were able to collect and exfiltrate the needed information without detection. More importantly, Alan Turing was able to lead a team to build a first-of-its-kind computer to break it, feed that information to British and American Intelligence, and impact the war. If Germans had good auditing, segmentation, and access control or PAM, the Allies would have had a different outcome, and we may have been subjected to The Man in the High Castle as an alternate outcome.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xE6J!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f2bf25-938e-4e64-943c-efeec9203f84_1024x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xE6J!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f2bf25-938e-4e64-943c-efeec9203f84_1024x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xE6J!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f2bf25-938e-4e64-943c-efeec9203f84_1024x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xE6J!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f2bf25-938e-4e64-943c-efeec9203f84_1024x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xE6J!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f2bf25-938e-4e64-943c-efeec9203f84_1024x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xE6J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f2bf25-938e-4e64-943c-efeec9203f84_1024x768.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a1f2bf25-938e-4e64-943c-efeec9203f84_1024x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!xE6J!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f2bf25-938e-4e64-943c-efeec9203f84_1024x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xE6J!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f2bf25-938e-4e64-943c-efeec9203f84_1024x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xE6J!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f2bf25-938e-4e64-943c-efeec9203f84_1024x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xE6J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f2bf25-938e-4e64-943c-efeec9203f84_1024x768.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Don't let your adversary have so much time with your data that they can get away with reverse engineering your entire mission critical applications, folks. Alan Turing did exactly that, and it changed everything!</figcaption></figure></div><p>We should strive to detect more, and to do so earlier. That affords us more options and less urgency, and if we buy additional time by encrypting our information, we stand a chance of avoiding real impact.</p><p>I hope this ATT&amp;CK Collection entry in the series has been helpful - thank you for reading and feel free to comment below!</p>]]></content:encoded></item><item><title><![CDATA[What’s causing Mike’s Indigestion now? Do you recall, Central Park in Fall? (13 June 2024)]]></title><description><![CDATA[Good evening, folks!]]></description><link>https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-change-recall</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-change-recall</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Thu, 13 Jun 2024 22:17:16 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/06/mikey_mac_cartoon_of_middle-aged_indiana_jones_with_a_beard_wat_2f2669d9-60dd-476b-85e8-8acd8268479b.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OlZG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OlZG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!OlZG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!OlZG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!OlZG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OlZG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1206524,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190625003?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OlZG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!OlZG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!OlZG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!OlZG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b04791-9d72-4e59-8e33-5d7812924c31_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Good evening, folks! It has been a while since my last news update. You probably recall that these have gotten a lot longer over time, so in an effort to respect our time, I will change my approach and aim for shorter. Lots to unpack lately, but one of the headline grabbers is all about setting bad precedents in ransomware response. Microsoft made one of the most confusing decisions for 'security' that anyone has seen, and we're also going to have a lot more AI-related news, so let's buckle up!</p><h2>Be the Change you want to see...</h2><p>As you probably recall, Change Healthcare (subsidiary of UnitedHealthcare) had a dumpster fire of a response to a major breach. The ransomware event we covered the saga of over the last few months continues to damage everyone. First, it appears that in the time since they paid their $22M ransom, Ransomware-as-a-Service groups have stepped up the pace and <a href="https://www.wired.com/story/change-healthcare-22-million-payment-ransomware-spike/">44 more healthcare related firms</a> were hit in just the month following the payout. Recorded Future, who was quoted by Wired with that stat, said it was the second-biggest single-month jump in ransom events they have ever seen.</p><p>Senator Ron Wyden (D-OR) has taken a <a href="https://www.finance.senate.gov/chairmans-news/wyden-urges-biden-administration-to-investigate-unitedhealth-group-negligent-cybersecurity">pretty clear position</a> in calling for the FTC and SEC to investigate Change UHC's governance and leadership team. He's not wrong - he pointedly called out that it was their decision to hire someone lacking the proper experience as CISO, and their decision not to support him appropriately. Congress rarely grasps how tech-related issues should work, but Senator Wyden is spot on. Let's hope this becomes a template - until larger firms are held accountable for lapses that would sink smaller ones, they will continue to prioritize profits over us.</p><p>I say 'us' because 1/3rd of American's were impacted by the change with breached data and because over 1 million patients were impacted by stalled prescriptions and care for upwards of 2 months, no doubt costing some lives. Add in the impact to clinics, providers, and pharmacies that were unable to pay their bills thanks to Change's costly negligence, and the impact to the economy is still tangible.</p><p>Go get them, Senator.</p><h2>Totally Reluctant Recall</h2><p>If you have been keeping score at home, the past couple of years have been even worse for Microsoft than UHC. After showing huge improvements in core product security efficacy from roughly 2016-2021, someone decided they needed to drive margins with security sales. Talk about a conflict of interest! In the 2 years since, a steady deluge of breaches and missteps resulted in a lot of rightful scrutiny by partners, customers, and even US government investigators and lawmakers. But their market share in the EDR and SIEM space continues to grow - congrats (I guess?)!!! The Cyber Safety Review Board <a href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">lit them up</a>. This culminated with their <a href="https://www.microsoft.com/en-us/security/blog/2024/05/03/security-above-all-else-expanding-microsofts-secure-future-initiative/">Secure Future Initiative</a> in early May - a promise to make security an essential part of what they do. Nice, right?</p><p>Someone should have told the product management folks and marketing team. But change is temporary, and in late May introduced a new AI-driven feature called <a href="https://support.microsoft.com/en-us/windows/retrace-your-steps-with-recall-aa03f8a0-a78b-4b3e-b0a1-2eb8ac48701c">Recall</a>, which would provide a full 3-year look-back over everything done on the machine. Despite <a href="https://doublepulsar.com/how-the-new-microsoft-recall-feature-fundamentally-undermines-windows-security-aa072829f218">early objections</a> to the sheer stupidity of collecting EVERYTHING (credentials, personal information, forms, searches, web history) and applying AI to it, they stuck to their guns and claimed all was well because it would be stored locally. Luckily no one ever managed to compromise a Windows endpoint before and get local privileges. (no sarcasm fonts to change to in this template).</p><p>Well, they finally recanted and <a href="https://www.wired.com/story/microsoft-recall-off-default-security-concerns/">decided not to enable it by default</a>. But Congress hauled the CEO in for <a href="https://thecyberexpress.com/microsoft-security-hearing/">another round</a>, and more promises were made. Should we celebrate? (font limitation again) What is confounding is that this comes hot on the heals of their SFI pledge and huge pressure &amp; congressional testimony. That it never occurred to them that this was a super bad idea is insane.</p><h2>This week in AI...</h2><p>There is going to be a duality of AI use forever. Both sides will need it to get an edge up, and much like the invention of gunpowder, guidance systems, and aircraft, you don't want to be the side without it. While legitimately bad people are <a href="https://thecyberexpress.com/ai-threats-cybersecurity-uses-gartner/">using it to automate and improve their adversarial tactics</a> (like many APTs), it is with some trepidation that one of our frequently featured companies makes headlines in this space. Well, it seems <a href="https://arstechnica.com/information-technology/2024/05/microsoft-launches-ai-chatbot-for-spies/">Microsoft has released a chat bot for spies</a> based on ChatGPT. It is supposed to be hosted on a separate air-gapped tenant, but given the issues they have protecting their own senior leadership email accounts and Azure tenants, there is room for skepticism.</p><p>AI-as-a-Service options are also hitting the market, and a <a href="https://www.darkreading.com/cloud-security/critical-flaw-in-replicate-ai-platform-exposes-customer-models-proprietary-data">recent study</a> by Wiz discovered that the market still has a long way to go to address gaps and leakage issues. I would just be happy if we evaluated AI uses in a more holistic sense. This <a href="https://www.linkedin.com/feed/update/urn:li:activity:7203387778707918848/">LinkedIn post</a> really captures and distills it down very well!</p><h2>Things I am keeping an eye on</h2><ul><li><p><a href="https://raidersofthelostarp.tech/2023/11/17/weekly-threat-update-scattered-spider/">Scattered Spider</a>, a threat we've mentioned in the past, is <a href="https://thecyberexpress.com/unc3944-shifts-focus-to-data-theft-from-saas/">shifting its focus</a> to SaaS platforms. Gotta respect always wanting to get better!</p></li><li><p>Sophos threat researchers uncovered a <a href="https://news.sophos.com/en-us/2024/06/05/operation-crimson-palace-a-technical-deep-dive/">very intricate campaign</a> that involves DLL side-loading and targets virtualized workloads in a VMWare environment. Lots of LOLBins in use there, and it speaks to the fluency of these threat actors!</p></li><li><p>CISA has been doing some amazing work in helping raise awareness and secure everyone. I guess it was only a matter of time before scammers tried to <a href="https://thecyberexpress.com/cisa-warns-of-phone-scammers-impersonating/">impersonate CISA employees</a> and fool victims.</p></li><li><p>Veeam (popular enterprise backup solution) has a <a href="https://www.bleepingcomputer.com/news/security/exploit-for-veeam-recovery-orchestrator-auth-bypass-available-patch-now/">critical RCE</a> that needs to be addressed pronto. We are already seeing adversaries tackle the backup solutions, as they are often relied upon but seldom protected adequately by their users.</p></li><li><p>Ivanti continues to smolder, with yet another <a href="https://www.darkreading.com/application-security/poc-exploit-critical-rce-bug-ivanti-endpoint-manager">high-profile flaw</a> in another security solution. I feel for these poor folks, but there isn't an E for effort in this space :(</p></li></ul><h2>Conclusion</h2><p>Well folks, I haven't read much, but I plan on it now that Cisco Live and a bunch of other high-importance stuff is behind me. I will look for some new wasy to change how I deliver this. Thank you for reading, and as always - please engage in the comments below! Have a great weekend!</p>]]></content:encoded></item><item><title><![CDATA[Lateral Movement:  a ruthless pivot from invasion to infection!]]></title><description><![CDATA[It has been almost a month since my last MITRE ATT&CK Tactic-focused entry, and I apologize!]]></description><link>https://www.raidersofthelostarp.tech/p/lateral-movement-a-ruthless-pivot-from-invasion-to-infection</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/lateral-movement-a-ruthless-pivot-from-invasion-to-infection</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Tue, 11 Jun 2024 08:39:37 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/06/mikey_mac_soldiers_moving_quickly_behind_a_hedgerow_to_flank_th_8c3e29cb-dd57-4ae5-ba7e-bd466e77c408.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ITCE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ITCE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ITCE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ITCE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ITCE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ITCE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1683601,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190625002?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ITCE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ITCE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ITCE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ITCE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9950151-599f-4b18-95bf-51ba298f3c9f_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It has been almost a month since my last <a href="https://raidersofthelostarp.tech/2023/11/05/worry-less-and-know-your-enemy-with-mitre-attck/">MITRE ATT&amp;CK</a> Tactic-focused entry, and I apologize! When we discussed <a href="https://raidersofthelostarp.tech/2024/05/16/attcks-discovery-now-what-do-we-have-here/">Discovery</a>, we saw many ways adversaries explore the target environment after <a href="https://raidersofthelostarp.tech/2024/03/18/initial-access-its-go-time-for-an-adversary-attck/">Initial Access</a>. Depending on the threat, that information might be used for any number of malicious goals. Threat actors locate files and credentials of interest and uncover details of defenses and configurations. They could learn compromising information about a victim. Many aim to gain illicit access into victim's financial or intellectual property. Almost every threat actor plans on expanding their reach and to pivot throughout an environment. This "lateral movement" allows the attacker to spread activities out, impact more systems, and achieve even greater levels of persistence. Whether a cyber adversary or an invading army, lateral movement is essential to many other goals or tactics. So let's take a look at how the ATT&amp;CK tactic of Lateral Movement works!</p><h2>The Importance of Lateral Movement</h2><p>Defenders lack resources and they must react to many adversary behaviors. When an attacker expands their front, it imparts stress and uncertainty to that defender. Some activity may be overt, and that alone may cause strain. With the sophistication of attackers increasing, however, they haunt defenders with the very real possibility that they are missing some activity. What is going on that they don't know about? Where else does evil lurk? While focusing on the known areas of compromise, what does that do to weaken as-of-yet uninvolved areas of the environment?</p><p><a href="https://attack.mitre.org/tactics/TA0008/">Lateral Movement (TA0008)</a> is a group of techniques that an adversary deploys to gain access to and control any additional systems in the target environment. Attackers without Lateral Movement cannot hope to impact their victims. Traditional warfare would see the defenders quickly encircle the invaders and repel them more often. And for cyber warfare it is no different. Adversaries without must compromise any targets remotely, one at a time. This is noisy, cumbersome, and in many cases impossible.</p><h3>"We&#8217;re paratroopers, lieutenant - we're supposed to be surrounded"</h3><p>As I began writing this on the anniversary of D-Day (6 June 1944), I think it is probably fitting to look at how lateral movement was critical to the Allies invasion. As we mentioned in the Discovery piece, the landing of infantry and insertion of airborne troops was far from perfect. Strong currents took Higgins Boats far from their intended landing zones. Excessive flak (anti-aircraft fire) and winds forced frightened pilots to drop paratroopers far from assigned landing zones and at excessive speeds. Despite this, Allied forces managed to think on their feet and take what circumstances handed them. Captain Richard Winters (of 101st Airborne and HBO's "Band of Brothers" fame) delivered the quote in the heading above. Lateral movement is assumed. It was always part of the plan.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6iBP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca4d4220-a22f-45a2-9bc5-72d4bc7a82c7_1024x524.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6iBP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca4d4220-a22f-45a2-9bc5-72d4bc7a82c7_1024x524.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6iBP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca4d4220-a22f-45a2-9bc5-72d4bc7a82c7_1024x524.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6iBP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca4d4220-a22f-45a2-9bc5-72d4bc7a82c7_1024x524.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6iBP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca4d4220-a22f-45a2-9bc5-72d4bc7a82c7_1024x524.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6iBP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca4d4220-a22f-45a2-9bc5-72d4bc7a82c7_1024x524.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ca4d4220-a22f-45a2-9bc5-72d4bc7a82c7_1024x524.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!6iBP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca4d4220-a22f-45a2-9bc5-72d4bc7a82c7_1024x524.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6iBP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca4d4220-a22f-45a2-9bc5-72d4bc7a82c7_1024x524.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6iBP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca4d4220-a22f-45a2-9bc5-72d4bc7a82c7_1024x524.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6iBP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca4d4220-a22f-45a2-9bc5-72d4bc7a82c7_1024x524.jpeg 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">Lateral Movement takes time, but it sure helps the attacker become extremely difficult to unseat.</figcaption></figure></div><p>Even had they been on-target, defeating the German defenses depended on the Allies ability to rapidly pivot and expand the number of control points that they held before defenders could rally. The success of any attack hinges greatly on the momentum and positions carried by either side. As much chaos as the Allies were coping with, the German forces were now beset by the same confusion and ill-prepared to match the dynamic on-the-fly nature of the Allied forces.</p><h3>Improvisation is key in lateral movement</h3><blockquote><p>"<em>We&#8217;ll start the war from right here.</em>"</p><p>Brigadier General Theodore Roosevelt Jr., upon landing at the wrong location on Utah Beach</p></blockquote><p>Each force in the invasion had multiple objectives laid out before them, both ranked by importance but also offering options to ensure room for improvisation. While the forces landing were largely in disarray, the decentralized command structure empowered junior officers and non-commissioned officers (NCOs - a.k.a. corporals, sergeants, and the like) to act on the objectives attainable, rather than be too prescriptive. In doing so, the attackers/invaders were able make inroads and pivoted to secure many objectives deemed vital to holding their beachhead. Because all leaders in the invading force were aware of the major objectives and their relative importance, they were able to piece together forces to take important gun positions, capture strategic crossroads, and eliminate fortifications that threatened the allied positions.</p><h3>Cyberattack Lateral Movement is no different</h3><p>Much as Allied forces relied on lateral movement to achieve their objectives, so must any threat actor. As many a coach or military leader might say, "you have to take what the opponent will give you." In cyber attacks, this usually means that initial access is rarely on the system they desire, but rather that some work and ingenuity is required to pivot and 'earn' their way into those systems. Even less-protected environments rarely see domain controllers or databases directly accessible to the Internet. Without Lateral Movement, ransomware operators like Conti or espionage outfits like Turla would be ineffective and their threat to defenses limited.</p><p>Threat actors seek high ground within the environment much like their traditional forebears. Domain controllers, database servers, web applications, or infrastructure devices all offer control points of interest. Many of these systems provide privileged access that is golden to sustained attacks - much like the capture and use of supply lines in a traditional conflict! Others are the end objective - capture or compromise of these objectives means victory. That may mean different things to different attackers. Stolen information, disrupted services, tainted data, or frustrated users are all end goals for different groups.</p><h2>Lateral Movement: taking what they give you</h2><p>MITRE ATT&amp;CK assigns a relatively succinct list of 9 techniques to Lateral Movement. While direct (and detectable) paths might be tempting, they use many techniques to gain that access. Some of these are more covert than others, and it is rare to see a single technique used exclusively.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Fi5s!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0536c59-e4af-4a4c-8e7d-0c40a5df482d_408x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Fi5s!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0536c59-e4af-4a4c-8e7d-0c40a5df482d_408x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Fi5s!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0536c59-e4af-4a4c-8e7d-0c40a5df482d_408x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Fi5s!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0536c59-e4af-4a4c-8e7d-0c40a5df482d_408x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Fi5s!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0536c59-e4af-4a4c-8e7d-0c40a5df482d_408x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Fi5s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0536c59-e4af-4a4c-8e7d-0c40a5df482d_408x1024.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e0536c59-e4af-4a4c-8e7d-0c40a5df482d_408x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Fi5s!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0536c59-e4af-4a4c-8e7d-0c40a5df482d_408x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Fi5s!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0536c59-e4af-4a4c-8e7d-0c40a5df482d_408x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Fi5s!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0536c59-e4af-4a4c-8e7d-0c40a5df482d_408x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Fi5s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0536c59-e4af-4a4c-8e7d-0c40a5df482d_408x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Lateral Movement may seem limited in Techniques, but there is a lot of room for innovation in each.</figcaption></figure></div><p>Several of these techniques are similar to <a href="https://raidersofthelostarp.tech/2024/03/18/initial-access-its-go-time-for-an-adversary-attck/">Initial Access</a> methods. Looking at you, Remote Service Session Hijacking (<a href="https://attack.mitre.org/techniques/T1563">T1563</a>), Remote Services (<a href="https://attack.mitre.org/techniques/T1021">T1021</a>), and Exploitation of Remote Services (<a href="https://attack.mitre.org/techniques/T1210">T1210</a>)! Why are they here again? Well hopefully defenders closed those ports and protocols to outsiders, blocking them outright with a firewall or limiting their exposure using an ACL. But maybe they have utility inside the environment itself! Once another Initial Access method is successful, the adversary looks just like a legitimate inside user on a trusted system.</p><p>Use Alternate Authentication Material (<a href="https://attack.mitre.org/techniques/T1550">T1550</a>) is hijacking on another level. In this case the adversary is taking advantage of the authentication mechanisms in place to use any domain tools or LAN-level privileges normally limited to authenticated users, administrators, etc. Exploiting remote services is bad, but those are (hopefully) rarely enabled everywhere. The same cannot be said for admin-level PowerShell, wmi, net, and SMB use.</p><p>Any of the above techniques can be fed or enhanced by Internal Spearphishing (<a href="https://attack.mitre.org/techniques/T1534">T1534</a>). This technique can be used to both steal credentials outright or hijack session cookies and tokens.</p><p>Sometimes attackers are happy with just pivoting using LOLBins, but in some cases they bring payloads with them. Lateral Tool Transfer (<a href="https://attack.mitre.org/techniques/T1570">T1570</a>), Software Deployment Tools (<a href="https://attack.mitre.org/techniques/T1072">T1072</a>), Tainting Shared Content (<a href="https://attack.mitre.org/techniques/T1080">T1080</a>) and Replication through Removable Media (<a href="https://attack.mitre.org/techniques/T1091/">T1091</a>) are all ways to deliver that payload on the inside.</p><h2>How can we stymie Lateral Movement?</h2><p>Lateral Movement can be tricky to stop, so the key is to blend strong policy and hardening of systems with a well-monitored detection approach. Some of the most universal mitigations are common sense, but they can be painful without well-bounded scopes and buy in from stakeholders:</p><ul><li><p><strong>Endpoint behavioral and execution prevention</strong> are vital to most effective defenses. These engines detect and prevent the running of scripts with abnormal strings or switches in use.</p></li><li><p><strong>System hardening</strong> nips malicious protocol or service abuse in the bud. Turning off unneeded services and limiting those that remain to very narrow use cases is the single most important measure. While you are at it, consider turning off autoruns and protecting across new hardware (USB devices, NICs) to close those holes as well.</p></li><li><p><strong>Strong authentication and account privilege management</strong> are critical. Add phish-resistant MFA, clamp down on privileges (both by user and location) and continually monitor both user and service accounts.</p></li><li><p><strong>Verify everything</strong> before allowing it to come into your environment. Sandboxing, using threat feeds, scanning for vulnerabilities, and ensuring patches are applied will cut down on the opportunities for an exploit to land on a vulnerable system.</p></li><li><p>S<strong>egment the environment</strong>! Consider not just L2/L3 network segmentation, but division of responsibilities, segmentation of access, the use of bastion hosts, and the prohibition of work &amp; play support from a single browser or system.</p></li></ul><p>Balance these with detection capabilities. Network Detection &amp; Response (NDR) tools, system logs processed in an XDR or SIEM, and adjacent detections of low prevalence executables, odd transfers, and the like will be canaries in the coal mine.</p><h2>Conclusion</h2><p>Where many of the preceding tactics offered a lot of variance, Lateral Movement tends to be more narrowly focused on using whatever is available to hop to another system. This usually means the propagation of a payload or the repeated use of favored LOLBins or remote services. While these may be tough to prevent, we have lots of behavioral means by which to detect them. This may seem easy, but two questions arise: 1) do you have the knowledge necessary to understand that behavior is bad? and 2) once lateral movement is identified, what do you do to remediate it effectively?</p><p>The German High Command struggled with both of those questions in the time following D-Day. The German Army had innovated greatly in the first years of the war, but now found themselves out-hustled and out maneuvered by a more agile and dynamic allied invasion. Their forces were crippled by the loss of important roads and railway exchanges. Even if they did have an accurate picture, they lacked any plan to respond. Their air power was outmatched and their field commands hampered by a reliance on Hitler's direct commands to alter plans.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zBpu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0929eccb-151e-4648-af12-b3d7452f609f_1024x576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zBpu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0929eccb-151e-4648-af12-b3d7452f609f_1024x576.png 424w, https://substackcdn.com/image/fetch/$s_!zBpu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0929eccb-151e-4648-af12-b3d7452f609f_1024x576.png 848w, https://substackcdn.com/image/fetch/$s_!zBpu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0929eccb-151e-4648-af12-b3d7452f609f_1024x576.png 1272w, https://substackcdn.com/image/fetch/$s_!zBpu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0929eccb-151e-4648-af12-b3d7452f609f_1024x576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zBpu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0929eccb-151e-4648-af12-b3d7452f609f_1024x576.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0929eccb-151e-4648-af12-b3d7452f609f_1024x576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Screenshot showing TinyTurla NG's typical operation flow in early 2024.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Screenshot showing TinyTurla NG's typical operation flow in early 2024." title="Screenshot showing TinyTurla NG's typical operation flow in early 2024." srcset="https://substackcdn.com/image/fetch/$s_!zBpu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0929eccb-151e-4648-af12-b3d7452f609f_1024x576.png 424w, https://substackcdn.com/image/fetch/$s_!zBpu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0929eccb-151e-4648-af12-b3d7452f609f_1024x576.png 848w, https://substackcdn.com/image/fetch/$s_!zBpu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0929eccb-151e-4648-af12-b3d7452f609f_1024x576.png 1272w, https://substackcdn.com/image/fetch/$s_!zBpu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0929eccb-151e-4648-af12-b3d7452f609f_1024x576.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">TinyTurlaNG, a lateral movement heavy operation run by a Russian APT, is full of LOLBins and detectable TTPs. We only need to listen!</figcaption></figure></div><p>Cyber defenders don't have to fall victim to this. Look at TinyTurla NG's operational flow above. We're not moving troops or gaining &amp; losing real estate here, we're defending digital environments where the line between success and failure comes down to using what you have. 43 mitigations exist in MITRE's ATT&amp;CK database, and well over half of those are present in your environment's own systems (OS, infrastructure, etc.). Are they dormant? And of the detection or data sources, are you listening to them? Most of what even a major APT is using against us is detectable or preventable (or both). Disrupt them!</p><p>I hope this long-awaited blog post is useful to you - please let me know what you think and feel free to weigh in in the comments! Have a great week!</p>]]></content:encoded></item><item><title><![CDATA[Discovery: Now what do we have here?]]></title><description><![CDATA[The 9th tactic in the MITRE ATT&CK Enterprise Matrix is a fun one.]]></description><link>https://www.raidersofthelostarp.tech/p/attcks-discovery-now-what-do-we-have-here</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/attcks-discovery-now-what-do-we-have-here</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Thu, 16 May 2024 08:16:34 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/05/mikey_mac_world_war_II_paratrooper_landing_in_a_data_center_a08ddf70-dc02-4536-ba75-2d495c13d64b.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T22o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T22o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!T22o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!T22o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!T22o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T22o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1781189,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190625001?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!T22o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!T22o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!T22o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!T22o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5add704b-b8b4-45ff-adbe-dd52cd347bf6_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The 9th tactic in the <a href="https://attack.mitre.org/matrices/enterprise/">MITRE ATT&amp;CK Enterprise Matrix</a> is a fun one. ATT&amp;CK's <a href="https://attack.mitre.org/tactics/TA0007/">Discovery</a> is essential in any operation. No matter how solid the recon efforts are prior, circumstances change. All of the preparation in the world can't replace updated intelligence. To be effective and achieve the end goals, adversaries need to dig deeper and gain knowledge of the environment. Both physical adversaries and cyber adversaries practice this behavior, but with slightly different stakes. In both cases, the discovery efforts not only help refocus the operation and steer towards objectives, but it also offers intel that can help the adversary cover their tracks. Let's take a look at how discovery happens and what it can bring!</p><h2>The importance of Discovery</h2><p><a href="https://raidersofthelostarp.tech/2024/03/04/target-recon-phase-dont-make-it-too-easy/">Reconnaissance (TA0043)</a> equips adversaries with an idea of what they will encounter. This step's value is unquestionable. Much of the operations early stages are influenced by those findings. Traditional invaders might have insight on garrison levels, weapon locations, relative morale, and command structure. Cyber adversaries similarly will use recon to determine the <a href="https://raidersofthelostarp.tech/2024/03/18/initial-access-its-go-time-for-an-adversary-attck/">initial access</a> method, some <a href="https://raidersofthelostarp.tech/2024/05/06/credential-access-why-make-logging-in-so-easy/">starter identities</a>, and systems and defenses they'll likely face. But recon alone has its limits. There is no substitute for being there - for seeing the lay of the land and adjusting accordingly. Recon prior to an incursion can't reveal all conditions, and it will not be able to predict movements and adjustments made my the defenders. Similarly, cyber recon is unable to reveal more technical details, such as paths, locations, registry entries and the like. Once inside an environment, adversaries must gain these insights to inform their next steps.</p><p>Discovery techniques help adversaries uncover lots of useful nuggets. What sorts of defensive tools, policies, and configurations are in place? Where have the defenders hidden their secrets or sensitive information? What tools do the target systems offer that may be of use? With this information, adversaries adjust their plans to more quietly and reliably obtain their end-goals.</p><pre><code>meterpreter &gt; powershell_execute 'Get-Process | Where-Object -Property Name -EQ "lsass"'
[+] Command execution completed:

Handles  NPM(K) PM(K)  WS(K)     CPU(s)     Id  SI ProcessName
-------  ------ -----  -----     ------     --  -- -----------
   1213      25  5643  18200       1.17    231   0 lsass</code></pre><p>Tracking down hashes for credential access is a super popular goal in ATT&amp;CK's Discovery techniques. Here the adversary is using a meterpreter session but abusing Powershell to glean the information.</p><h3>Discovery's role in correcting assumptions: June 6th, 1044</h3><p>For almost two years of World War II, several of the Allies (US, UK, Canada, the Free French Forces, and units from Poland, Belgium, Netherlands, and Norway) planned the invasion at Normandy. Veterans of the campaign recall the extensive use of sand tables and the selection of English countryside environments that best mimicked the eventual access paths through Omaha, Utah, Juno, Gold, and Sword Beaches. The paratroopers and glider infantry were similarly drilled. The planners chose these locations and tactics based on the best reconnaissance available over that time. They selected these initial access vectors for the invasion based on an assessment of the German "Atlantic Wall" fortifications and perceived troop strengths.</p><blockquote><p>"Do not try to make circumstances fir your plans. Make plans that fit the circumstances."</p><p>General George S. Patton (who was not at D-Day and instead used as the commander of a Deception plan, Operation Bodyguard)</p></blockquote><p>This recon and intelligence was perishable and incomplete. Weather, tides, and misinterpreted aerial photographs saw most beach landings and airborne drops miss their marks, encounter unforeseen obstacles, or heavier German resistance. By the end of the first day, not a single Allied objective had been accomplished. Had the Allies placed too much importance on their recon, the invasion would have failed. Luckily, Eisenhower and his staff understood the importance of improvisation. Soldiers landing in Normandy quickly assessed their surroundings, discovered the resources and paths available to them, and coordinated attacks and movements no amount of pre-invasion planning could have anticipated.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v8IU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F398a704f-67d3-441a-b309-36fa5d14b884_1024x865.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v8IU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F398a704f-67d3-441a-b309-36fa5d14b884_1024x865.jpeg 424w, https://substackcdn.com/image/fetch/$s_!v8IU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F398a704f-67d3-441a-b309-36fa5d14b884_1024x865.jpeg 848w, https://substackcdn.com/image/fetch/$s_!v8IU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F398a704f-67d3-441a-b309-36fa5d14b884_1024x865.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!v8IU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F398a704f-67d3-441a-b309-36fa5d14b884_1024x865.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v8IU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F398a704f-67d3-441a-b309-36fa5d14b884_1024x865.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/398a704f-67d3-441a-b309-36fa5d14b884_1024x865.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!v8IU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F398a704f-67d3-441a-b309-36fa5d14b884_1024x865.jpeg 424w, https://substackcdn.com/image/fetch/$s_!v8IU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F398a704f-67d3-441a-b309-36fa5d14b884_1024x865.jpeg 848w, https://substackcdn.com/image/fetch/$s_!v8IU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F398a704f-67d3-441a-b309-36fa5d14b884_1024x865.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!v8IU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F398a704f-67d3-441a-b309-36fa5d14b884_1024x865.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Needless to say, everyone from Eisenhower on down hoped for better news after their initial access, but they did not let their less-than-graceful start hold them up for long. (from the Montgomery account "Normandy to the Baltic" as shown <a href="https://alondoninheritance.com/out-of-london/the-6th-june-1944-d-day-in-maps/">here</a>.)</figcaption></figure></div><h3>Adversarial Agility: Discovery's role in cyber attacks</h3><p>Any Red Teams or adversaries worth their salt use discovery as an essential element to their operations. Unless the target environment was freshly breached or already accessed by the adversary or their friends, it will be impossible to account for all of the detailed on-system information that they'll need. Information hogs the spotlight, but in recent years savvy attackers also look for tools in target systems that they can abuse - the so called Living-off-the-Land binaries (LOLBins). The new orientation with respect to objectives and an assessment of available tools dramatically influence the plans of a sophisticated threat actor. Some threat actors, like <a href="https://attack.mitre.org/groups/G0018/">Admin@338</a> focus a great deal of their time exploring after their initial access, as seen below.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4njF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55820b1-7ba1-4ef8-8a97-9aecb0367847_896x978.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4njF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55820b1-7ba1-4ef8-8a97-9aecb0367847_896x978.png 424w, https://substackcdn.com/image/fetch/$s_!4njF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55820b1-7ba1-4ef8-8a97-9aecb0367847_896x978.png 848w, https://substackcdn.com/image/fetch/$s_!4njF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55820b1-7ba1-4ef8-8a97-9aecb0367847_896x978.png 1272w, https://substackcdn.com/image/fetch/$s_!4njF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55820b1-7ba1-4ef8-8a97-9aecb0367847_896x978.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4njF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55820b1-7ba1-4ef8-8a97-9aecb0367847_896x978.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c55820b1-7ba1-4ef8-8a97-9aecb0367847_896x978.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!4njF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55820b1-7ba1-4ef8-8a97-9aecb0367847_896x978.png 424w, https://substackcdn.com/image/fetch/$s_!4njF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55820b1-7ba1-4ef8-8a97-9aecb0367847_896x978.png 848w, https://substackcdn.com/image/fetch/$s_!4njF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55820b1-7ba1-4ef8-8a97-9aecb0367847_896x978.png 1272w, https://substackcdn.com/image/fetch/$s_!4njF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55820b1-7ba1-4ef8-8a97-9aecb0367847_896x978.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">ADMIN@338 seems to have no qualms about sneaking a peek once inside the target environment, using 'advanced' Windows tools like dir, netstat, ipconfig, and systeminfo (from <a href="https://ma-insights.vercel.app/adversaries">https://ma-insights.vercel.app/adversaries</a>)</figcaption></figure></div><p>Looking at some more notable campaigns in cybersecurity lore, <a href="https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/">STUXNET</a> stands out here. In the 2007-2010 time frame, a state-sponsored adversary delivered multiple surgically tailored malware payloads to an air-gapped environment with the objective of disrupting the Iranian regime's ability to enrich Uranium for weapons. Iran's antagonists went so far as to uncover specific model numbers and versions of firmware running on Iranian centrifuges. They also spent considerable time after initial access making small tweaks to their actions and measuring the impact. The cryptic messaging and reactions of the Iranian scientists were in effect feedback from discovery activities, and allowed the attackers to adjust their work for greater impact. For what it is worth, Kim Zetter's book "<a href="https://www.barnesandnoble.com/w/countdown-to-zero-day-kim-zetter/1116864204">Countdown to Zero Day</a>" is a fantastic look at this modern caper, and shows what extremes an APT may take ATT&amp;CK's Discovery to!</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r6bh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff287df08-82b6-4ed3-bb0a-b32d4be18241_800x450.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r6bh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff287df08-82b6-4ed3-bb0a-b32d4be18241_800x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!r6bh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff287df08-82b6-4ed3-bb0a-b32d4be18241_800x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!r6bh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff287df08-82b6-4ed3-bb0a-b32d4be18241_800x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!r6bh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff287df08-82b6-4ed3-bb0a-b32d4be18241_800x450.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r6bh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff287df08-82b6-4ed3-bb0a-b32d4be18241_800x450.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f287df08-82b6-4ed3-bb0a-b32d4be18241_800x450.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!r6bh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff287df08-82b6-4ed3-bb0a-b32d4be18241_800x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!r6bh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff287df08-82b6-4ed3-bb0a-b32d4be18241_800x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!r6bh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff287df08-82b6-4ed3-bb0a-b32d4be18241_800x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!r6bh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff287df08-82b6-4ed3-bb0a-b32d4be18241_800x450.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Stuxnet's more detailed attack chains are a lesson in patience and surgical precision, but even in this FT rendering, Stage 3 shows the importance of the malware-driven discovery to proceed.</figcaption></figure></div><h2>Discovery: if you're not cheating, you're not trying (apparently)</h2><p>ATT&amp;CK's <a href="https://attack.mitre.org/tactics/TA0007/">Discovery (TA0007)</a> Tactic offers a ton of variety in the 32 techniques it covers. Some of the techniques have a very distinct focus, and I have tried to sort them based on the primary use case. While Local System discovery used to be all the rage, cloud discovery has become a discipline all its own. Likewise, adversaries who run custom tools but fear capture spend considerable effort in evading detection techniques like sandboxes or honeypots. Network discovery is a classic with tons of variety for acquiring useful intel.</p><p>What should stand out is that there are some overlapping techniques, some of which deliver similar outcomes. I am curious from folks who work in both on-premises environments and in Azure just how much discovery in both leverages similar strategies, especially around accounts and services. Adversaries have a lot of choices in how they implement their procedures and ATT&amp;CK's Discovery pages provide a lot of insight into how adversaries carry out their ops. As an ATT&amp;CK hobbyist, these style points look like an area for significant differentiation from APT to APT.</p><h2>How to we avoid the glare of Adversary Discovery?</h2><p>Some amount of discovery activity is inevitable. And a few of the techniques should never see legitimate use, but what do we do about the rest? Most organizations should look to detect abnormal use of these techniques. The patterns of odd users in strange places reveal a lot and can even point to other behaviors that spawned them. Sometimes forgotten is that while we may not want to disable the tools used in discovery, we may be able to restrict what they have access to. The less a particular procedure discloses, the more difficult the attacker's job, and the less enticing the target environment is. After all, if we give up just because a direct mitigation isn't available, what fun is that?</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Shw9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72e50c14-4287-4a33-b2ab-6fc4bb1ccfbc_1024x110.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Shw9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72e50c14-4287-4a33-b2ab-6fc4bb1ccfbc_1024x110.png 424w, https://substackcdn.com/image/fetch/$s_!Shw9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72e50c14-4287-4a33-b2ab-6fc4bb1ccfbc_1024x110.png 848w, https://substackcdn.com/image/fetch/$s_!Shw9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72e50c14-4287-4a33-b2ab-6fc4bb1ccfbc_1024x110.png 1272w, https://substackcdn.com/image/fetch/$s_!Shw9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72e50c14-4287-4a33-b2ab-6fc4bb1ccfbc_1024x110.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Shw9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72e50c14-4287-4a33-b2ab-6fc4bb1ccfbc_1024x110.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/72e50c14-4287-4a33-b2ab-6fc4bb1ccfbc_1024x110.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Shw9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72e50c14-4287-4a33-b2ab-6fc4bb1ccfbc_1024x110.png 424w, https://substackcdn.com/image/fetch/$s_!Shw9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72e50c14-4287-4a33-b2ab-6fc4bb1ccfbc_1024x110.png 848w, https://substackcdn.com/image/fetch/$s_!Shw9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72e50c14-4287-4a33-b2ab-6fc4bb1ccfbc_1024x110.png 1272w, https://substackcdn.com/image/fetch/$s_!Shw9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72e50c14-4287-4a33-b2ab-6fc4bb1ccfbc_1024x110.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Don't give up, folks! You can still detect and take a higher level action!</figcaption></figure></div><p>So what are those potential mitigations?</p><ul><li><p><strong>Harden the environment:</strong> operating system and infrastructure device configurations should include restrictions on who can enumerate information.</p></li><li><p><strong>User Account Management: </strong>strict permissions and privilege account management are essential to reducing the danger posed by an incursion. Add MFA in there too while you are at it!</p></li><li><p><strong>Log Collection &amp; Monitoring: </strong>the abuse of LOLBins in an environment is most easily seen in logs, whether from the OS itself or from an EDR agent protecting it. Looking for command execution, process creation, or API calls (which may call for other API-focused detection solutions) is invaluable.</p></li><li><p><strong>Access Restrictions &amp; Segmentation:</strong> along with User Account Management, this bucket of mitigations ensures that the span of what an adversary can see is severly restricted. Think of this as obfuscation - like a smoke screen or the use of hedgerows in your environment.</p></li><li><p><strong>Audit:</strong> in domains, trust relationships tie closely with roles and services. Make sure those are configured properly and track any changes.</p></li><li><p><strong>Encryption:</strong> at rest or in motion, it is harder for adversaries to harvest sensitive information if you make it unreadable. Not perfect, but it can reduce the impact of a leak!</p></li></ul><h2>Conclusion</h2><p>Discovery is where a lot of adversaries end up developing habits, and those habits become behaviors we can detect. As you explore MITRE ATT&amp;CK's database, it is amazing how so many of the techniques in ATT&amp;CK's Discovery tactic lack a reasonable mitigation. Every one of these techniques, however has a data source listed (previously known as detections). These are key to reacting in time to the inevitable discovery activities of your adversary.</p><p>The German High Command missed some of those opportunities, or downplayed them altogether. It may be that they were still convinced that a larger landing may hit Calais, or that they were thrown off by the same chaos the Allies were when so many paratroopers and glider infantry were dropped way off course. One side improvised heavily, supported by the trust and preparation offered them by their command structure. The other was highly centralized, and inflexible. One shudders to think what would have happened if Hitler had not kept 3 Panzer divisions in reserve by his orders alone. Or if he had instilled more autonomy into his field generals to improvise and respond.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xOsJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd59fe79a-2574-4e11-9b1d-34d6a9993374_1024x524.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xOsJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd59fe79a-2574-4e11-9b1d-34d6a9993374_1024x524.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xOsJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd59fe79a-2574-4e11-9b1d-34d6a9993374_1024x524.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xOsJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd59fe79a-2574-4e11-9b1d-34d6a9993374_1024x524.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xOsJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd59fe79a-2574-4e11-9b1d-34d6a9993374_1024x524.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xOsJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd59fe79a-2574-4e11-9b1d-34d6a9993374_1024x524.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d59fe79a-2574-4e11-9b1d-34d6a9993374_1024x524.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!xOsJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd59fe79a-2574-4e11-9b1d-34d6a9993374_1024x524.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xOsJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd59fe79a-2574-4e11-9b1d-34d6a9993374_1024x524.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xOsJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd59fe79a-2574-4e11-9b1d-34d6a9993374_1024x524.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xOsJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd59fe79a-2574-4e11-9b1d-34d6a9993374_1024x524.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Discovery and improvisation allowed the allies to reevaluate and make progress in the days that followed. Recon alone would have been disastrous. (from the Montgomery account "Normandy to the Baltic" as shown <a href="https://alondoninheritance.com/out-of-london/the-6th-june-1944-d-day-in-maps/">here</a>.)</figcaption></figure></div><p>In our discussion of the stakes in last <a href="https://raidersofthelostarp.tech/2024/05/06/credential-access-why-make-logging-in-so-easy/">week's post</a>, we saw that the relative insulation of operating digitally offered cover and reduced tangible risk to the aggressors. They could stand to burn credential sets in their efforts, and had plenty to spare. The same can be said in ATT&amp;CK's Discovery tactic. With the exception of highly sensitive intelligence operations, or nation-state positioning inside of critical infrastructure, there is almost always room to make some mistakes or try new things. This says as much about the versatility and boldness of attackers as it does about our inability to stand in the way, or to even see it happening. So get your detection house in order, folks!</p><p>I hope this post on the MITRE ATT&amp;CK's Discovery tactic has been worth the wait, and that you find it helpful! please reach out if you would like to continue the conversation!</p>]]></content:encoded></item><item><title><![CDATA[Credential Access: Why make logging in so easy?]]></title><description><![CDATA[When we look at the sheer number of vectors an adversary uses to compromise or breach their target, credential compromise is right up there with phishing as the two leading sources of compromise.]]></description><link>https://www.raidersofthelostarp.tech/p/credential-access-why-make-logging-in-so-easy</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/credential-access-why-make-logging-in-so-easy</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Mon, 06 May 2024 07:45:00 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/05/mikey_mac_2_russian_spies_changing_their_disguises_while_escapi_4b94bf4c-8101-4296-b3d4-f81e096fc351.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vDpQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vDpQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!vDpQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!vDpQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!vDpQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vDpQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1884863,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190624998?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vDpQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!vDpQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!vDpQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!vDpQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdea542e-1777-47d0-ab8c-9520e75cc415_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When we look at the sheer number of vectors an adversary uses to compromise or breach their target, credential compromise is right up there with phishing as the two leading sources of compromise. In fact, phishing's primary objective is to obtain credentials. Threat actors get a lot of press for creating new exploits, but isn't it easier to just log in? Stats show that detecting a breach that leveraged stolen credentials takes ~50% longer over other primary methods (exploits, misconfiguration, etc.). Why is that? And what can we do to make it harder? Let's talk about <a href="https://raidersofthelostarp.tech/2023/11/05/worry-less-and-know-your-enemy-with-mitre-attck/">MITRE ATT&amp;CK</a>'s 8th tactic, Credential Access!</p><h2>The importance of Credential Access</h2><p>Credential access is simply obtaining (stealing) usernames and passwords to use in other steps of an operation. While other TTPs might help an adversary create their own or bypass these creds, stolen credentials are the Holy Grail. Governments spend significant funds, time, and resources securing their own communications and safeguarding access. Sure, they spend resources protecting them from other attacks too. They'll prepare for nuclear, biological, chemical (NBC) attacks, bomb/blast resistance, and more. The White House is rumored to have anti-aircraft missiles and a huge underground bunker! All of the kinetic protection in the world cannot protect a critical asset from someone using legitimate credentials from walking in the front door. Information system resources are no different - no firewall, IDS/IPS, proxy, or other protective measure expects to block legitimate credentials.</p><h3>Ghost Stories - real world credential access!</h3><p>In 2010, the FBI uncovered a network of Russian sleeper agents operating in the United States, known as the "Illegals Program." These agents assumed false identities and lived for years as ordinary American citizens while secretly working for the Russian government. If you haven't seen the FX television series "<a href="https://abc.com/show/ef360ec7-6874-4989-a830-66b34ea9b212">The Americans</a>", you are missing out. There are lots of similarities there!</p><p>One of the most notorious figures in the real Illegals Program network was Anna Chapman, whose real name is Anna Kushchenko. Chapman and her fellow operatives had stolen the identities of deceased individuals to obtain forged passports and other documents, allowing them to blend seamlessly into American society. This access enabled them to gather intelligence on American political figures and policymakers. They also moved laterally to cultivate contacts with influential individuals who could provide valuable information to the Russian government. It is no wonder why this made for good TV!</p><h3>Ghosts in the wires: how stakes change the game</h3><p>The truth is, stealing and abusing identities is much easier and more common in information systems. The concepts might seem similar, but the circumstances lead in very different directions:</p><ul><li><p>Reduced workload: threat actors don't need artists, forgers, disguise experts, or the time to use them.</p></li><li><p>Simpler on-mission logistics: cyber adversaries don't need a physical logistics chain of handlers, safe houses, or dead drop locations.</p></li><li><p>Abundant and Easily Accessible identities: threat actors have the luxury of continually mining or acquiring new credentials without draining resources.</p></li><li><p>Much lower stakes: While more traditional agents find themselves in continual danger, threat actors act with relative impunity.</p></li></ul><p>This completely different spectrum of concerns and worries makes credential access both lower risk and more critical to a threat actor's operation. Traditional espionage efforts were used sparingly and with great care. The dark web's bountiful repositories of leaked information and accounts and the work of initial access brokers equips adversaries with thousands of identities across their specified target. And if one is caught by the defenders, the adversary feels no remorse - there are plenty of other identities at hand that can be applied in no time.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x-45!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66879cf1-14cd-4998-9e80-1bdda8c03dea_1024x932.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x-45!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66879cf1-14cd-4998-9e80-1bdda8c03dea_1024x932.png 424w, https://substackcdn.com/image/fetch/$s_!x-45!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66879cf1-14cd-4998-9e80-1bdda8c03dea_1024x932.png 848w, https://substackcdn.com/image/fetch/$s_!x-45!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66879cf1-14cd-4998-9e80-1bdda8c03dea_1024x932.png 1272w, https://substackcdn.com/image/fetch/$s_!x-45!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66879cf1-14cd-4998-9e80-1bdda8c03dea_1024x932.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x-45!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66879cf1-14cd-4998-9e80-1bdda8c03dea_1024x932.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66879cf1-14cd-4998-9e80-1bdda8c03dea_1024x932.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!x-45!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66879cf1-14cd-4998-9e80-1bdda8c03dea_1024x932.png 424w, https://substackcdn.com/image/fetch/$s_!x-45!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66879cf1-14cd-4998-9e80-1bdda8c03dea_1024x932.png 848w, https://substackcdn.com/image/fetch/$s_!x-45!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66879cf1-14cd-4998-9e80-1bdda8c03dea_1024x932.png 1272w, https://substackcdn.com/image/fetch/$s_!x-45!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66879cf1-14cd-4998-9e80-1bdda8c03dea_1024x932.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Carbanak bucks the trend of bigger APTs farming out their Credential Access, and puts a huge focus on it. Must be the focus on financials? (from <a href="https://ma-insights.vercel.app/adversaries">https://ma-insights.vercel.app/adversaries</a>)</figcaption></figure></div><h2>Credential Access: gaming the system &amp; abusing its rules</h2><p>After last week's post on Defense Evasion (43 techniques and 155 sub-techniques!) this should seem more manageable. Credential Access (TA0006) comes in with a fairly modest 17 techniques and 49 sub-techniques. If we take a queue from last week and attempt to categorize them, it would seem that we could group them in 4 categories: theft, intercept, forgery, or bypass:</p><p>This categorization was again up to me and my Sunday state-of-mind, but you get the gist! <a href="https://raidersofthelostarp.tech/2024/03/25/execution-ruthless-attackers-run-malicious-code-on-your-systems/">Execution</a>, <a href="https://raidersofthelostarp.tech/2024/04/29/defense-evasion-popping-flares-spraying-chaff-and-launching-decoys/">Defense Evasion</a>, <a href="https://raidersofthelostarp.tech/2024/04/21/privilege-escalation-pretending-to-be-something-better/">Privilege Escalation</a>, and <a href="https://raidersofthelostarp.tech/2024/03/18/initial-access-its-go-time-for-an-adversary-attck/">Initial Access</a> are often combined together in a single operational step. Credential Access techniques are likely separate. Heck, for most identities, odds are they don't even get acquired in the same operation! Why is that?</p><h3>Credential Access as a Service? Or at least as a side-hustle</h3><p>The harvesting of identities for malicious activity can be detected by an attentive defender. Linking that activity to the operational end-goals is certain to spook the defender. Even the most notorious of state-sponsored threat actors subcontracts out the gathering of credentials whenever possible. There are a lot of good reasons for that. Many of the techniques may involve password cracking, which is a time and resource intensive effort, so it is best to take that offline. Some of the credentials used tomorrow came from yesterday's breaches - indeed it is often a primary objective of a breach to reveal caches of identities for future use!</p><p>This doesn't mean that an in-progress adversarial operation ignores these techniques altogether. Some of the techniques in this tactic aren't that easy. <a href="https://attack.mitre.org/techniques/T1528/">Stealing Application Access Tokens (T1528)</a>, <a href="https://attack.mitre.org/techniques/T1539/">Stealing Web Session Cookies (T1539)</a>, and those techniques and sub-techniques manipulating MFA will necessarily occur as-needed. They are very time-sensitive and required for lateral movement and escalation. Credentials obtained prior to an operation may also be limited to a subset of user groups. Most adversaries will augment during the operation when they need to access a service account or administrator's access.</p><h2>How can we protect these identities?</h2><p>If you are reading this and saying "don't we have a LOT of solutions that claim to protect these identities and the credential access?" than you are spot on. The mitigations offered by ATT&amp;CK should sound very familiar:</p><ul><li><p><strong>Least Privilege Access:</strong> limit access to only those who 1) need it and 2) demonstrate they can be trusted.</p></li><li><p><strong>Segmentation:</strong> network segmentation gets all of the love, but consider segmenting at every layer of the OSI model, and in other places. Files and folders, application services, and even the separation of work and private use should be on the table. Even Privilege Access Management fits in here!</p></li><li><p><strong>Restrict access:</strong> don't let folks do the same things from afar as they can in the DC or on the campus.</p></li><li><p><strong>Harden and patch systems:</strong> OSes are configured by default to do certain things for compatibility. Turn those off (NTLMv1, LANMAN, LLMNR, etc.). And follow <a href="https://www.cisecurity.org/cis-benchmarks">CIS hardening guides</a> as much as practical.</p></li><li><p><strong>Use hardened MFA:</strong> don't make it optional, and take measures to ensure only strong methods are used. Don't allow weaker SMS or 1-click options, but rather use <a href="https://www.nist.gov/blogs/cybersecurity-insights/phishing-resistance-protecting-keys-your-kingdom">phish-resistant methods</a>, non-default configurations, and throttling to harden.</p></li><li><p><strong>Log and Audit:</strong> watch for login events, monitoring for spraying and brute-force attacks, and even leveraging canary accounts. This goes a long way towards catching abuse before harm is done.</p></li><li><p><strong>Account Policies:</strong> combine whatever is available to make it harder on imposters. Got geo location? Use it! Cert-based auth an option? YES PLEASE! No matter what, make it hard for folks to guess, spoof, or hijack an identity.</p></li><li><p><strong>User Training: </strong>MFA and restrictions can be seen as friction. Help users understand the why and turn them into proactive sensors for you!</p></li></ul><p>At the risk of sounding like a broken record, the above measures are critical! These steps seem simple but can be a bear - pick a couple and see them through before trying to tackle more!</p><h2>Conclusion</h2><p>We unfortunately don't see Credential Access being abused in real time very often. Inadequately trained and supported defenders lacking context and deprived of logs fail to detect legitimate credential access being abused by adversaries. Organizations all start out thinking they have a handle on it, but something happens along the way, and they end up completely missing their own credentials either being stolen or being misused. This applies to both traditional espionage and to cybersecurity.</p><p>Well-trained operators with sufficient telemetry and time can provide counter-espionage or blue team coverage and radically reduce this threat. The main characters in The Americans hung in there for almost 17 years! In the real world, the FBI's investigation into the Illegals Program, code-named <a href="https://en.wikipedia.org/wiki/Illegals_Program">Operation Ghost Stories</a>, eventually led to the 2010 arrest and deportation of ten Russian agents, including Chapman. This happened within a year of Chapman landing in the US, and before significant national security damage could occur.</p><p>We only hear of the failures in the cyber realm, but you can bet that success is attainable and has happened. Success here doesn't mean deportation or any diplomatic leverage, but does it need to? Show the hackers the door, and get ready for the next wave. Because it is coming.</p><p>I hope this post was informative! please send any feedback my way :)</p>]]></content:encoded></item><item><title><![CDATA[What’s causing Mike’s Indigestion now? Drop it like it's hot (2 May 2024)]]></title><description><![CDATA[Good morning, folks!]]></description><link>https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-drop-it-like-its-hot-2-may-2024</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-drop-it-like-its-hot-2-may-2024</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Fri, 03 May 2024 07:30:00 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/05/mikey_mac_snoop_dog_hacking_a_computer_6b504ddf-5d47-4c2c-a1e0-c465d18e178d.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9jZ-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9jZ-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9jZ-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9jZ-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9jZ-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9jZ-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1537394,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190624997?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9jZ-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9jZ-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9jZ-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9jZ-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4308a9b6-7a7b-4448-a94e-f57dfa26845a_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Good morning, folks! Another week, another threat surface gets its turn in the press! While I have been working hard to prepare for the upcoming <a href="https://www.ciscolive.com/global/learn/session-catalog.html?search=%22Mike%20McPhee%22#/">Cisco Live</a> (2-6 June in Las Vegas!) news seems to be picking up before RSA Conference next week. This week we saw a lot of continued fallout from breaches past, variations of perimeter defense vulns, and more. We even see yet another tool essential to many get hacked - is nothing sacred! Let's get into it!</p><h2>Playing the hits: Mobile gets some 'love'</h2><p>Please don't misunderstand this section - the <a href="https://raidersofthelostarp.tech/2024/04/25/whats-causing-mikes-indigestion-now-double-trouble-healthcare-ransom/">perimeter and infrastructure device</a> focus is still a massive concern and soaking up a lot of oxygen (Cisco, PAN, Ivanti, etc.). But it has been some time since we've seen such a rash of endpoint and mobile-related vulnerability news. That pent-up demand burst this week.</p><p>First up was macOS. Apple just <a href="https://www.sentinelone.com/labs/massive-new-adload-campaign-goes-entirely-undetected-by-apples-xprotect/">released a massive update</a> to its built-in malware protection engine, <a href="https://support.apple.com/guide/security/protecting-against-malware-sec469d47bd8/web">XProtect</a>, to counter the explosion in Adload malware's use across its user base. XProtect uses <a href="https://yara.readthedocs.io/en/stable/index.html">Yara</a> rules, which makes it very transparent. The recent updates on April 30th show that Apple went pretty extensively into shutting down Adload's code base.</p><p>Next up was the Android ecosystem, within which Microsoft researchers found a <a href="https://www.bleepingcomputer.com/news/security/microsoft-warns-of-dirty-stream-attack-impacting-android-apps/">new "Dirty Stream" attack path</a> that allows a malicious app to overwrite files in another apps home directory by abusing content sharing meant to help apps work together. <a href="https://www.microsoft.com/en-us/security/blog/2024/05/01/dirty-stream-attack-discovering-and-mitigating-a-common-vulnerability-pattern-in-android-apps/">Their report</a> is in-depth and very informative. I haven't been able to locate any mitigation or protection steps, but things move fast!</p><p>In both cases, we're seeing new novel paths to allow user devices to fall victim. These devices may not be as critical or desirable as a perimeter firewall, but they can often provide credentials or a toehold that adversaries can pivot from. Keep your stuff up-to-date, only download apps from trusted vendors, scrutinize any permissions you grant, and think about separating work and personal use on different devices, or at least with some isolation.</p><h2>Another popular SaaS family hit!</h2><p>It is pretty tough to find a company or household that doesn't use Dropbox to some degree. Dropbox Sign, from their HelloSign acquisition, is similar to DocuSign and allows official documentation to be passed for legal signatures and delivery. On April 24th, Dropbox discovered an intrusion into those systems that compromised names and email addresses. They have since added authentication information to the list of at-risk data. No word yet on who the threat actor is, but it is early, and as more <a href="https://raidersofthelostarp.tech/2023/11/08/mitre-attck-for-threat-intelligence/">TTPs</a> become known we'll certainly learn more.</p><p>Some of the company's new acquisitions not as widely known or used. Given most software companies are in a continual state of integration, a breach of one tool often raises questions about the integrity of others. That is certainly the case here, and we'll have to see how this plays out in the investigation.</p><ul><li><p>Want to read more? This article provides background on the service and some <a href="https://www.securityweek.com/dropbox-data-breach-impacts-customer-information/">initial messaging</a>.</p></li><li><p>Want to get nerdy? The <a href="https://www.sec.gov/Archives/edgar/data/1467623/000146762324000024/dbx-20240429.htm">SEC filings</a> are something we all need to get familiar with. Reporting requirements and the scrutiny help clear away the spin and BS. This is where the additional PII stuff was revealed.</p></li></ul><h2>Where are they now? Change Healthcare keeps getting worse news</h2><p>UnitedHealthcare (parent company of Change Healthcare, the recently breached pharmaceutical claims processing arm) <a href="https://www.darkreading.com/cyberattacks-data-breaches/unitedhealth-congressional-testimony-rampant-security-fails">sent their CEO in front of Congress</a>, and it did not go well for him. Root causes have been slow to be shared, but now we know a stolen set of non-MFA protected Citrix credentials played a big part. Oh, and 1/3rd of Americans were likely impacted. But knowing would require Change actually had good processes, tools, and a clue. That was not the case :(</p><p>Stay tuned on this one, folks. We'll see how the US medical quagmire handles all of this. One of the first things I encourage customers to think about is reducing complexity. Simpler systems offer less to protect, less quirks to secure. Eventually, it may occur to us all that shirking healthcare reform and eliminating the <a href="https://www.health.harvard.edu/blog/is-our-healthcare-system-broken-202107132542">massive profit-driven complexity</a> is starting to cost all of us way more than a tax bump. It is impacting patient outcomes, fair access, and staffing. Lives and our personal sovereignty are at stake.</p><h2>This week in AI</h2><p>We've briefly discussed the dual-use nature of <a href="https://raidersofthelostarp.tech/2023/12/08/whats-causing-mikes-indigestion-now-election-ai-cyber-threat/">AI in past entries</a>. The US Department of State and Department of Commerce use that classification for things like export control. Maybe a material or component is useful in making fine wristwatches? If that same component is also vital to the manufacture of weapons, they call it "dual use" and control who can buy it outside of the US. I think software should get more scrutiny than it does - certainly breach automation frameworks like Cobalt Strike would fit the bill.</p><p>I also happen to think that a similar consideration is needed for AI. Heck, ATT&amp;CK version 15 even <a href="https://attack.mitre.org/techniques/T1588/007/">gave it its own Technique and sub-techniques</a>! I know the regulation cat is out of the bag, but the same tech can offer both good and bad outcomes. Take for instance the <a href="https://openai.com/index/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors">threat actor use of OpenAI</a> accounts for bad. A <a href="https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/">joint effort by Microsoft</a> and their close pals Open AI focused on a who's who of state-sponsored APTs:</p><ul><li><p>Chinese threat actors Salmon Typhoon (SODIUM/APT4/Maverick Panda - purveyors of <a href="https://attack.mitre.org/software/S0018/">Sykipot Malware</a>) and Charcoal Typhoon (<a href="https://attack.mitre.org/groups/G0143/">CHROMIUM/RedHotel/Aquatic Panda</a>)</p></li><li><p>Iranian APT Crimson Sandstorm (<a href="https://attack.mitre.org/groups/G1012/">CURIUM/Imperial Kitten</a>)</p></li><li><p>North Korean actor Emerald Sleet (<a href="https://attack.mitre.org/groups/G0094/">THALLIUM/Kimsuky/Velvet Chollima</a>)</p></li><li><p>Russian APT Forrest Blizzard (<a href="https://attack.mitre.org/groups/G0007/">STRONTIUM/APT28/Fancy Bear</a>)</p></li></ul><p>When you read Microsoft and OpenAI's posts, you get a sobering lesson in creative AI LLM use. Each had their own unique ways of leveraging and abusing OpenAI prior to their accounts being <a href="https://openai.com/index/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors">terminated</a>. some focused on open source intelligence gathering and recon, others in researching scripts, payloads and vulns. The <a href="https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/">Microsoft appendix</a> in particular gives you both inspiration and fear.</p><p>My point? It is probably too late, but government and society inability to wrangle the dual-use character of these tools will make watch components and metal alloys seem trivial by comparison.</p><h2>Things I am keeping an eye on</h2><ul><li><p>MITRE's CTID folks <a href="https://medium.com/mitre-attack/attack-v15-26685f300acc">released a new version of ATT&amp;CK (version 15)</a> and it includes a lot of cool stuff! AI gets a lot of attention (7 sub-techniques!) and they expanded Cloud and Infrastructure as Code (IaC) concepts too. CTI, mobile devices, ICS, TAXII updates, and even a Splunk-friendly revision to <a href="https://car.mitre.org/">CAR</a> round it all out!</p></li><li><p>Verizon released their popular and informative <a href="https://www.verizon.com/business/resources/T674/reports/2024-dbir-data-breach-investigations-report.pdf">Data Breach Investigations Report</a> (DBIR) this week. Vuln exploitation surged, and it still takes 55 days to address these holes after disclosure. It's no wonder 14% of breaches start now with a vuln being exploited. Prefer the <a href="https://www.securityweek.com/verizon-dbir-2024-shows-surge-in-vulnerability-exploitation-confirmed-data-breaches/">Cliff's Notes</a>?</p></li><li><p>The <a href="https://www.ncsc.gov.uk/news/ncsc-us-partners-promote-understanding-mitigation-russian-state-sponsored-cyber-threats">UK's NCSC joined the chorus</a> (again) <a href="https://cybersecuritynews.com/ncsc-warns-russian-hackers/">warning of Russian APTs attacking critical infrastructure</a>.</p></li><li><p>Hacktivists "Anonymous Arabia" <a href="https://thecyberexpress.com/cyberattack-on-columbia-university/">claimed credit for an attack on Columbia University</a> for retaliation against police crackdowns on the pro-Palestinian protestors. A couple of notes - no one seems to think it happened, and aren't some Anon efforts just influence campaigns sloppily waged by other threat actors? Hmmmm.</p></li><li><p>A vulnerability-mitigation consultant was <a href="https://www.bleepingcomputer.com/news/legal/cybersecurity-consultant-arrested-after-allegedly-extorting-it-firm/">arrested for trying to extort $1.5M</a> from his former client when they let him go for being a putz.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CR2a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fc20ba3-c430-43e4-b6fa-804a3c564485_400x170.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CR2a!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fc20ba3-c430-43e4-b6fa-804a3c564485_400x170.gif 424w, https://substackcdn.com/image/fetch/$s_!CR2a!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fc20ba3-c430-43e4-b6fa-804a3c564485_400x170.gif 848w, https://substackcdn.com/image/fetch/$s_!CR2a!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fc20ba3-c430-43e4-b6fa-804a3c564485_400x170.gif 1272w, https://substackcdn.com/image/fetch/$s_!CR2a!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fc20ba3-c430-43e4-b6fa-804a3c564485_400x170.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CR2a!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fc20ba3-c430-43e4-b6fa-804a3c564485_400x170.gif" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5fc20ba3-c430-43e4-b6fa-804a3c564485_400x170.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!CR2a!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fc20ba3-c430-43e4-b6fa-804a3c564485_400x170.gif 424w, https://substackcdn.com/image/fetch/$s_!CR2a!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fc20ba3-c430-43e4-b6fa-804a3c564485_400x170.gif 848w, https://substackcdn.com/image/fetch/$s_!CR2a!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fc20ba3-c430-43e4-b6fa-804a3c564485_400x170.gif 1272w, https://substackcdn.com/image/fetch/$s_!CR2a!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5fc20ba3-c430-43e4-b6fa-804a3c564485_400x170.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2>Good Reads</h2><ul><li><p>I am reading a lot of good threat reports in preparation for a new session of content for this Cisco Live, but I don't want to spoil the surprise. That being said, I continue to enjoy the works of my colleagues at Talos, who do a bang-up job of protecting us and <a href="https://blog.talosintelligence.com/">informing us</a>. They are unable to share a lot of the details on current stuff, but once in a while a good story gets out. Joe Marshall is as good as they come, and <a href="https://blog.talosintelligence.com/how-joe-marshall-helps-defend-everything-from-electrical-grids-to-grain/">this blog post</a> about his efforts to help the Ukrainian power grid defend itself is just inspiring. Check it out!</p></li></ul><p>I hope you all have a great weekend, and I look forward to engaging with you all here or in person. Hit me up if you want to chat about any of the above!</p>]]></content:encoded></item><item><title><![CDATA[Defense Evasion: Popping flares, spraying chaff, and launching decoys]]></title><description><![CDATA[This, friends, is the Big Kahuna of tactics we're talking about now!]]></description><link>https://www.raidersofthelostarp.tech/p/defense-evasion-popping-flares-spraying-chaff-and-launching-decoys</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/defense-evasion-popping-flares-spraying-chaff-and-launching-decoys</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Mon, 29 Apr 2024 15:41:23 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/04/mikey_mac_bearded_indiana_jones_flying_in_a_biplane_and_shootin_fcd7accf-c253-460b-8cca-bed3139b9c76.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!soEt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!soEt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!soEt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!soEt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!soEt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!soEt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2044182,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190624996?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!soEt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!soEt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!soEt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!soEt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c293ae-9bc0-4e81-8470-a39509bc6c69_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This, friends, is the Big Kahuna of tactics we're talking about now! When I started writing this series of posts to discuss tactics, I feared the 7th tactic from the left. Why? Because we're talking about the diverse and expansive <a href="https://raidersofthelostarp.tech/2023/11/05/worry-less-and-know-your-enemy-with-mitre-attck/">ATT&amp;CK</a> Tactic of Defense Evasion. This brute contains a whopping 43 techniques and 155 sub-techniques. It is almost as if our adversaries really want to avoid detection or prevention and need options! Well, as this is so massive, we're going to take a more holistic approach to this entry.</p><h2>The importance of Defense Evasion</h2><p>Defense evasion in any context is a group of techniques that allow one to hide, mask, or escape detection, capture, or confrontation. It can also include deception techniques. Both traditional warfare and cyberspace have their equivalents, but the goals are the same: live to fight another day. In cyberspace, these techniques are almost always associated with the attacker alone, but in traditional warfare all sides may need to enlist these TTPs to prevent becoming a casualty.</p><h3>Run silent, run deep</h3><p>If you haven't seen the classic movie "<a href="https://www.imdb.com/title/tt0052151/">Run Silent, Run Deep</a>" you are missing out! Clarke Gable and Burt Lancaster were solid, but the secret weapon was Don Rickles ;). While the era was different than the one I served in, the TTPs were pretty similar. When I was stationed on submarines, we always wanted options evade. Our best course of action was to avoid detection in the first place. For a submariner, evading detection came down to being quiet and hiding "under the noise floor", outside of the range and threshold of sonar arrays and buoys. We used a lot of different methods to stay quiet:</p><ul><li><p>Propellers were specially designed to avoid making noises that might give the boat away.</p></li><li><p>Our hulls designed for minimal turbulence.</p></li><li><p>We had special mounts for everything</p></li><li><p>Some submarines used special tiles</p></li><li><p>Submariners wear sneakers underway, and take precautions to avoid slamming doors or dropping tools.</p></li><li><p>We used the quietest propulsion around (for us, nuclear, although new non-nuke boats have made huge leaps here!)</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TsoM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe07790a2-c3ee-445f-8508-320b4cd0c8b5_1024x576.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TsoM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe07790a2-c3ee-445f-8508-320b4cd0c8b5_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TsoM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe07790a2-c3ee-445f-8508-320b4cd0c8b5_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TsoM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe07790a2-c3ee-445f-8508-320b4cd0c8b5_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TsoM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe07790a2-c3ee-445f-8508-320b4cd0c8b5_1024x576.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TsoM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe07790a2-c3ee-445f-8508-320b4cd0c8b5_1024x576.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e07790a2-c3ee-445f-8508-320b4cd0c8b5_1024x576.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!TsoM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe07790a2-c3ee-445f-8508-320b4cd0c8b5_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TsoM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe07790a2-c3ee-445f-8508-320b4cd0c8b5_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TsoM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe07790a2-c3ee-445f-8508-320b4cd0c8b5_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TsoM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe07790a2-c3ee-445f-8508-320b4cd0c8b5_1024x576.jpeg 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">"Hey guys, did anyone figure out how to turn on Windows Event Logging? I could just ask the adversary to turn it on while they are in there..."</figcaption></figure></div><p>Now if we failed at that and were detected, our only options were to either hide better quickly or run like hell. And if they launched a torpedo, we had two options. We could launch a noisemaker and/or go all-ahead flank cavitate, making turns and depth changes in an effort to outrun our doom. Needless to say, we didn't like the words "torpedo evasion" a whole lot.</p><p>While I was a member of the "senior stealth service" I believe combatant aircraft have similar approaches. A lot of effort and resources go into reducing the detectability of a particular aircraft. Radar cross-section is a huge focus, but minimizing heat signatures, reducing emissions, and allowing these aircraft to operate either above or below defenses is critical. Once detected, these aircraft have the ability to maneuver and attempt to outrun their opponents. They also have jamming capabilities, flares, and chaff to distract or blind the sensors.</p><h3>Threat Actors have their own flares, decoys, and chaff</h3><p>Threat actors need to evade detection to ensure their attacks survive beyond initial access. The impact of an attack or breach is realized when the adversary has time to access the critical data, services, or devices and impact operations. Some of the techniques hide the activity altogether, others mask or disguise the activity. Obviously the gold standard is to lay low. But sometimes visibility is too pervasive to overcome. Threat actors pretend to be legitimate users and pose their payloads, scripts, or other tools as benign. Sort of like locking onto a star destroyer and pretending to be trash prior to their jump to hyperspace.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!41fZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff65624b-c9fa-4c2c-b66c-6bb73105bf9d_1024x930.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!41fZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff65624b-c9fa-4c2c-b66c-6bb73105bf9d_1024x930.png 424w, https://substackcdn.com/image/fetch/$s_!41fZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff65624b-c9fa-4c2c-b66c-6bb73105bf9d_1024x930.png 848w, https://substackcdn.com/image/fetch/$s_!41fZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff65624b-c9fa-4c2c-b66c-6bb73105bf9d_1024x930.png 1272w, https://substackcdn.com/image/fetch/$s_!41fZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff65624b-c9fa-4c2c-b66c-6bb73105bf9d_1024x930.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!41fZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff65624b-c9fa-4c2c-b66c-6bb73105bf9d_1024x930.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ff65624b-c9fa-4c2c-b66c-6bb73105bf9d_1024x930.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!41fZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff65624b-c9fa-4c2c-b66c-6bb73105bf9d_1024x930.png 424w, https://substackcdn.com/image/fetch/$s_!41fZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff65624b-c9fa-4c2c-b66c-6bb73105bf9d_1024x930.png 848w, https://substackcdn.com/image/fetch/$s_!41fZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff65624b-c9fa-4c2c-b66c-6bb73105bf9d_1024x930.png 1272w, https://substackcdn.com/image/fetch/$s_!41fZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff65624b-c9fa-4c2c-b66c-6bb73105bf9d_1024x930.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">APT28, like many venerable state-sponsored APTs spends a lot of time on Defense Evasion. It must be worthwhile! (from <a href="https://ma-insights.vercel.app/adversaries">https://ma-insights.vercel.app/adversaries</a>)</figcaption></figure></div><p>At the extreme, these same adversaries launch their attacks knowing full well that they will be seen. A subset of the TTPs in Defense Evasion allow them to completely neutralize the protective action. In a harrowing scene The Hunt for Red October, the Red October turns into the torpedoes launched by the Soviet submarine, the Konovalov. Knowing that the Konovalov had safeties set to prevent the torpedo from acquiring their own ship, the torpedo breaks up on impact. Cyber adversaries exploit the configuration of tools, startup scripts, or registries, or even turn those tools against other processes in similar fashion, exploiting the use of exclusions, which act as a form of safety. Increasingly we see threat actors disable the detection and prevention tools altogether.</p><h2>Defense Evasion: throwing the defenders of the scent</h2><p>The 43 techniques and 155 sub-techniques in <a href="https://attack.mitre.org/tactics/TA0005/">Defense Evasion (TA0005)</a> are focused on three main areas: impacting security tools, obfuscating actions, and hijacking or piggybacking on legitimate processes. I took a crack at sorting them into those three categories here.</p><p>This categorization is somewhat subjective and the techniques can overlap categories depending on their specific use case. In any case, look for these to be blended with other Tactics, as they go hand in hand. You don't just rob a bank and disguise yoursellf separately, you disguise yourself while robbing a bank. So I am told. Below is an example of Carbanak using UAC bypass to evade detection and execute mimikatz.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8hGl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F559411c0-1042-43d5-a74e-80ad9d1bbe2a_1024x554.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8hGl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F559411c0-1042-43d5-a74e-80ad9d1bbe2a_1024x554.png 424w, https://substackcdn.com/image/fetch/$s_!8hGl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F559411c0-1042-43d5-a74e-80ad9d1bbe2a_1024x554.png 848w, https://substackcdn.com/image/fetch/$s_!8hGl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F559411c0-1042-43d5-a74e-80ad9d1bbe2a_1024x554.png 1272w, https://substackcdn.com/image/fetch/$s_!8hGl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F559411c0-1042-43d5-a74e-80ad9d1bbe2a_1024x554.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8hGl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F559411c0-1042-43d5-a74e-80ad9d1bbe2a_1024x554.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/559411c0-1042-43d5-a74e-80ad9d1bbe2a_1024x554.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8hGl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F559411c0-1042-43d5-a74e-80ad9d1bbe2a_1024x554.png 424w, https://substackcdn.com/image/fetch/$s_!8hGl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F559411c0-1042-43d5-a74e-80ad9d1bbe2a_1024x554.png 848w, https://substackcdn.com/image/fetch/$s_!8hGl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F559411c0-1042-43d5-a74e-80ad9d1bbe2a_1024x554.png 1272w, https://substackcdn.com/image/fetch/$s_!8hGl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F559411c0-1042-43d5-a74e-80ad9d1bbe2a_1024x554.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Think of Defense Evasion as a super important add-on to almost any step an adversary takes inside a target environment. Carbanak uses UAC in multiple steps to ensure the action is taken.</figcaption></figure></div><h2>How do defenders avoid being duped?</h2><p>The sheer number of techniques and procedures in the Defense Evasion tactic make a short discussion of <a href="https://attack.mitre.org/datasources/">detection</a> (a.k.a. Data Sources) and <a href="https://attack.mitre.org/mitigations/enterprise/">mitigations</a> impossible. But it doesn't mean we cannot try! Here are some of the top recurring mitigation themes in ATT&amp;CK for these TTPs:</p><ol><li><p><strong>Privileged Account Management</strong>: Least Privilege is super helpful here, folks!</p></li><li><p><strong>Execution Prevention</strong>: Allowlisting or ExPrev engines a must - any EDR/EPP needs to have those enabled.</p></li><li><p><strong>Software Restriction Policies</strong>: code-signing, approved packages, file integrity, and user/executable policy mapping prevents a wide variety of the obfuscation and hijacking TTPs.</p></li><li><p><strong>User Account Control</strong>: UAC gets a bad rap, but the frustration is a small hassle compared to the reduced risk.</p></li><li><p><strong>Log and Audit</strong>: Collect and monitor logs, folks! The OS is talking - are you listening?</p></li><li><p><strong>Behavior Prevention on Endpoint</strong>: Much like ExPrev above, but with more fuzzy math to anticipate new things.</p></li><li><p><strong>Restrict File and Directory Permissions</strong>: It gets much harder on bad guys when we keep them hemmed into tight spots.</p></li><li><p><strong>Multi-factor Authentication</strong>: Most of the TTPs in this realm can be interrupted or curtailed with MFA in the mix. Balance is key, but it is worth some friction in the experience to ensure only legitimate users are involved.</p></li><li><p><strong>Update Software</strong>: Keep all software up to date, including operating systems and applications, to mitigate the exploitation of known vulnerabilities.</p></li></ol><p>It is worth looking, once you build a threat picture, at the resultant recommendations from your tailored analysis. Most folks will find the above gives them a really good start!</p><h2>Conclusion</h2><p>Defense Evasion is dirty pool, as my old bartending colleagues used to call it. It doesn't just rely on gaming the system, but on breaking it. During postmortems, defense evasion is often the tactic that causes the most embarrassment. When military units pull it off, historians write about the sheer skill of the adversary and the gullible nature of the duped, but the truth is that there are a lot of factors in play. Defense Evasion, much like Persistence and Execution, happens together with other things. It is the smokescreen under which the adversary moves through the system, disrupts a service, or exfiltrates critical data.</p><p>While evasion occurs on both the defensive and offensive side of a traditional engagement, cyberspace sees the adversary more often using these techniques. In either case, mitigation of that risk depends on vigilant use of multiple detection methods. Bringing multiple sensors to bear on the same vector makes it much harder for an adversary to hide, evade or dupe us. The parallels are uncanny - submarines fear one adversary, but having an entire carrier battle group chase you down is downright mortifying. The spread and complimentary diversity of sensors make it so much harder to hide.</p><p>Hopefully this post has been helpful, and I look forward to any feedback or conversation this might spark!</p>]]></content:encoded></item><item><title><![CDATA[What’s causing Mike’s Indigestion now? Double Trouble (26 April 2024)]]></title><description><![CDATA[Hello folks!]]></description><link>https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-double-trouble-healthcare-ransom</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-double-trouble-healthcare-ransom</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Thu, 25 Apr 2024 22:11:15 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/04/mikey_mac_double_trouble_ransom_threat_83e3444b-a39a-4a7c-a9cf-da04742cb917.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0DMp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0DMp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!0DMp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!0DMp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!0DMp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0DMp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2155156,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190624993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0DMp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!0DMp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!0DMp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!0DMp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78b374da-6811-47d7-bb30-6d4589a3826c_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Hello folks! It seems that there is never a dull week. To almost make that point abundantly clear, we have a large number of newly announced firewall vulns, some more ransomware hitting critical targets, and more state sponsored mayhem. So let's get started and see what is going on!</p><h2>Healthcare under perpetual attack</h2><p>We tend to think of critical infrastructure in terms of energy, water, sewer, communications, etc. It should be noted that healthcare and financial sector folks are part of that too. Healthcare in particular is seeing a massive uptick in ransomware attacks, and this might be for a few reasons:</p><ul><li><p>Nothing creates more urgency than patient lives being impacted</p></li><li><p>Healthcare is extremely visible to the community</p></li><li><p>Hospital systems are either doing well financially or backed by governments to ensure continued operation</p></li><li><p>IT and security teams are understaffed, overworked, and overwhelmed</p></li></ul><p>This potent combination makes them an easy sector to rob, as there is a strong likelihood that the cyber-criminal will be paid and not caught. These threat actors can also take credit for exposing just how fragile the entire ecosystem is. They have targeted adjacent industries, like Change Healthcare's pharmaceutical processing arm.</p><h3>Catching up with Change Healthcare's ordeal</h3><p>After a couple of months of pretending that they had not paid a ransom, Change recently disclosed that they did indeed <a href="https://www.theregister.com/2024/04/16/change_healthcares_ransomware_attack_has/">spend $22M to recover their data</a>. Wired's Andy Greenberg was <a href="https://www.wired.com/story/change-healthcare-admits-it-paid-ransomware-hackers/">all over it</a>. The overall cost of this event is clicking in at over $1B, which should show that cutting corners on security (people, process, and technology) is yet again a poor move. The worst part? The ALPHV/BlackCat folks pulled an <a href="https://www.theregister.com/2024/04/08/change_healthcare_ransomware/">exit scam</a> that would make Bernie Madoff proud, and due to infighting between the RaaS vendor (<a href="https://www.securityweek.com/second-ransomware-group-extorting-change-healthcare/">RansomHub</a>) and their customer (ALPHV), Change is being extorted by the RansomHub for the SAME INFORMATION because ALPHV stiffed RansomHub.</p><p>Paying the ransom is a very serious choice that each company must make, but more and more data shows that it does not save the victims. The only thing it reduces is available budget for other things, like effective recovery and preventing re-infection. Just this week, several other healthcare and adjacent businesses were hit, like <a href="https://www.theregister.com/2024/04/18/ransomware_octapharma_plasma/">Octapharma Plasma</a> (by BlackSuit group, HHS notice <a href="https://www.hhs.gov/sites/default/files/blacksuit-ransomware-analyst-note-tlpclear.pdf">here</a>), and LA County Health Services <a href="https://www.bleepingcomputer.com/news/security/la-county-health-services-patients-data-exposed-in-phishing-attack/">via a phishing attack</a>.</p><p>Meanwhile, a substantial number of Americans' <a href="https://www.securityweek.com/unitedhealth-says-patient-data-exposed-in-change-healthcare-cyberattack/">personal information was likely part of this breach</a>, and no amount of ransom paid can negate the danger that presents.</p><ul><li><p>Want to know more? Read about Change Healthcare's view <a href="https://www.unitedhealthgroup.com/newsroom/2024/2024-04-22-uhg-updates-on-change-healthcare-cyberattack.html">here</a>.</p></li><li><p>Want to get nerdy? The FBI's flash report on ALPHV/BlackCat is <a href="https://www.ic3.gov/Media/News/2022/220420.pdf">here</a>. It will be interesting to see if this was truly their pig payoff before going away.</p></li></ul><h2>Nation-state threat actors pulling out all of the stops</h2><p>This week Cisco Talos disclosed the actions of a <a href="https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/">new threat actor UAT4356</a> against Cisco ASA devices, and it seems that this is a state sponsored threat. Much of the press on state-sponsored activity centers on endpoints. Perimeter devices have seen a glut of new attention, however. <a href="https://www.darkreading.com/vulnerabilities-threats/ivanti-releases-fixes-for-more-than-2-dozen-vulnerabilities">Ivanti's VPN solution</a>, <a href="https://www.securityweek.com/palo-alto-networks-shares-remediation-advice-for-hacked-firewalls/">Palo Alto firewalls</a>, and now Cisco ASAs sit in critical parts of every network. For reasons obvious to most readers, I will not comment much further on this latest news.</p><p>State sponsored actors have a knack of finding new ways to attack critical parts of any environment, and they love to hit places they know are bottlenecks. Assets that cannot be removed. If the environment depends on them, all the better!</p><p>As with any vulnerability, immediate actions as advised by the vendor (including patching) are critical. But adversaries also know that it is hard to incur downtime in these mission critical environments, especially in a perimeter firewall. But we must. We need as an industry to allow for time to recover. Either we choose a small window for planned maintenance and updates or let attackers choose a much larger and more disruptive window for us. I can guarantee that window will cost more, disrupt more, and potentially put us out of work.</p><h2>This week in AI</h2><p>It's going to be a long wait for the US Congress and other legislative bodies worldwide to become smart enough to wrestle with AI policies. Meanwhile, agencies like the NSA are starting to <a href="https://www.infosecurity-magazine.com/news/nsa-launches-guidance-secure-ai/">put forward guidance</a> that can help. In this case, they <a href="https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF">recommend 3 phases of best practices</a>, and this should be very helpful in crafting your own private AI deployment's security strategy. Regardless of whether you trust the messenger or not, the advice is pretty solid and a good start.</p><h2>Things I am keeping an eye on</h2><ul><li><p>Threat actors are <a href="https://www.darkreading.com/threat-intelligence/biggest-threat-2024-elections-kitchen-sink-attack-chains">getting ready for their</a> Christmas. We call it Election Season. Kitchen sink attack chains don't sound like a good thing.</p></li><li><p>Researchers had to <a href="https://www.bleepingcomputer.com/news/security/researchers-sinkhole-plugx-malware-server-with-25-million-unique-ips/">sinkhole over 2.5 million IP addresses</a> to neuter C2 in the PlugX malware's botnet. Holy moly.</p></li><li><p>Google Ads seem to have an issue screening their clients. A MadMxShell campaign is <a href="https://cybersecuritynews.com/google-ads-to-spread-ip-scanner/">embedding a malicious scanner</a> into the Google Ad service and tricking users into downloading the backdoor.</p></li><li><p>Software keyboards are all the rage, but 8 of 9 <a href="https://www.darkreading.com/endpoint-security/most-chinese-keyboard-apps-vulnerable-to-eavesdropping">Chinese app versions act as keyloggers</a>. Mass surveillance is a feature!</p></li><li><p>US DoJ teamed with Iceland to take <a href="https://www.infosecurity-magazine.com/news/us-takes-down-crypto-samourai/">down a crypto-mixing operation</a> called Samourai Wallet. This removes yet another player in the market for hiding illicit activities. Cryptocurrency is proving to be anything but safe for criminals to hide behind.</p></li><li><p>Some nation-state threat actors are advancing quickly to rival China and Russia in their efficacy. <a href="https://www.darkreading.com/cyberattacks-data-breaches/iran-dupes-military-contractors-govt-agencies-cybercampaign">Iran's IRGC apparently conducted a multi-year campaign</a> impacting hundreds of thousands of accounts across USG and US company employees.</p></li></ul><h2>Good Reads</h2><p>This week has been all about slides for CLUS for me, but these <a href="https://csrc.nist.gov/Projects/crypto-reading-club">NIST-curated talks </a>look like something I should start digging into! Tons of interesting technical content, and it might make a cool compliment to the steady diet of YouTube conference recordings I tend to favor.</p><p>I hope this update finds you well and that you have a good weekend. Please feel free to reach out and continue the discussion!</p>]]></content:encoded></item><item><title><![CDATA[Privilege Escalation: Pretending to be something better!]]></title><description><![CDATA[It has been a little bit since we dove into the MITRE ATT&CK Tactics.]]></description><link>https://www.raidersofthelostarp.tech/p/privilege-escalation-pretending-to-be-something-better</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/privilege-escalation-pretending-to-be-something-better</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Sun, 21 Apr 2024 19:54:40 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/04/DALL·E-2024-04-21-16.23.04-A-cartoon-depicting-Benedict-Arnold-dressed-in-18th-century-American-military-attire-handing-over-a-modern-laptop-to-British-soldiers-in-period-unif.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZJzm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZJzm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!ZJzm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!ZJzm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!ZJzm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZJzm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:277652,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190624991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZJzm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!ZJzm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!ZJzm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!ZJzm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94fb455f-421d-4153-9490-1128d8fb188a_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It has been a little bit since we dove into the <a href="https://raidersofthelostarp.tech/2023/11/05/worry-less-and-know-your-enemy-with-mitre-attck/">MITRE ATT&amp;CK</a> Tactics. When we left off with <a href="https://raidersofthelostarp.tech/2024/04/02/persistence-how-uninvited-attackers-avoid-being-bounced-from-the-party-attck/">Persistence</a>, we talked about how attackers maintain their leverage by opening as many ways in as possible. All use multiple vectors to cover their bases, but it is really hard to stay a step ahead and have impact if they don't get heightened permissions. History shows that attackers who can either disrupt, discredit, or even hijack the command structure can cause a whole new level of pain. The pinnacle of many adversaries' tactics is to be able to issue commands as if they were a highly placed commander within their target organization. It not only grants an amplifying effect, but can also hide their activity as they exploit trust. So let's take a look at ATT&amp;CK's Privilege Escalation tactic and what it means to the attacker &amp; defender.</p><h2>The importance of ATT&amp;CK's Privilege Escalation</h2><p>Defenders have it rough! They face adversaries who have nothing to lose, copious resources, and plenty of time. Their targets, however, are on exactly the opposite side of that spectrum. The folks in the trenches are desperately and valiantly defending something they value greatly. In traditional warfare, they fight to preserve their lands, avoid persecution, protect their families, or uphold their honor. More often than not, they are suffering from a lack of resources - either through attrition, embargo or blockade, or sabotage. Most importantly, defensive forces rarely choose timing - attackers tend to initiate their invasions when it best suits them, and conversely hurts the targeted forces.</p><h3>A modern study in asymmetry</h3><p>The current war in the Ukraine, for instance, shows the impact of this asymmetric equation. Despite poorly trained forces, antique equipment, and crushing international pressure, Russian forces have dictated terms. The initial invasion was timed to best suit their plans. They have brought a near inexhaustible pipeline of new soldiers to bear, drawing from a mandatory draft pool that far exceeds that of Ukraine's. And they have mitigated their inventory issues despite sanctions through arms deals with Syria, China, and other sympathizers. Almost as important - they are led by a regime with a disregard for humanitarian or diplomatic norms.</p><p>The result to this point? Ukrainian forces have been vastly outnumbered and forced to react, valiantly standing to prevent their own collapse. Their military - while well trained and respected - has had to rely on a very sporadic flow of foreign aid to stand a chance. Because they are on the defensive and dependent on so many forces outside of their control, they have been much more sensitive to the norms their attackers disregard. These circumstances cause a significant asymmetry.</p><p>Ukraine has outperformed any expectations or predictions, and that is in large part due to the impressive strength of their people and the integrity of the command structure. Imagine if they couldn't count on that?</p><h3>Traitors in the midst</h3><p>The American Revolution saw a similar asymmetry play out between British and Continental Army forces. In fact, without the injection of proficient leadership from abroad and the diplomatic efforts of several founding fathers, it could have gone another way altogether. General Washington's army absolutely needed the infusion of discipline and rigor that Prussian general Baron Von Steuben brought in 1777. And with a lack of experienced leadership in the field, the addition of personalities like Marquis de Lafayette and later General Rochambeau, Admiral de Grasse and Admiral/General d'Estaine were critical. In hindsight, it is amazing that these outside personalities were so entrusted.</p><p>A change of heart could have been disastrous, as it proved with one of America's own. We can look back at the betrayal by General Benedict Arnold with great contempt now. But as it was happening, it seemed unfathomable that a man so critical in earlier battles and so heroically known could be swayed to serve his enemy.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!moEB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba1ac379-4b46-441b-acd5-6becd234ab82_835x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!moEB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba1ac379-4b46-441b-acd5-6becd234ab82_835x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!moEB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba1ac379-4b46-441b-acd5-6becd234ab82_835x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!moEB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba1ac379-4b46-441b-acd5-6becd234ab82_835x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!moEB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba1ac379-4b46-441b-acd5-6becd234ab82_835x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!moEB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba1ac379-4b46-441b-acd5-6becd234ab82_835x1024.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba1ac379-4b46-441b-acd5-6becd234ab82_835x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!moEB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba1ac379-4b46-441b-acd5-6becd234ab82_835x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!moEB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba1ac379-4b46-441b-acd5-6becd234ab82_835x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!moEB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba1ac379-4b46-441b-acd5-6becd234ab82_835x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!moEB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba1ac379-4b46-441b-acd5-6becd234ab82_835x1024.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Benedict Arnold never quite got what he wanted after betraying the Revolutionary cause.</figcaption></figure></div><p>Here is a quick recap: Arnold was a critical leader in the taking of Fort Ticonderoga, the bottling of British forces in Lake Champlain, and most famously turned the tide at the Battle of Saratoga. But the adversary (British intelligence) worked a long time to turn him to their side, leveraging his key vulnerabilities (his British loyalist wife Peggy, indebtedness, and his vanity) and eventually gaining use of his station. Were it not for the timely capture of his British handler, Arnold was prepared to surrender the garrison at West Point, which would have been disastrous to the Americans. They almost succeeded in leveraging their escalated privileges to take over a major control point and cause harm to the cause.</p><h3>Do we see traitors in cybersecurity too?</h3><p>I think that we have all heard of insider threats, and it is tempting to draw the equivalence. But unlike traditional warfare, cyberspace has a much greater separation of the user from their identity. It is a double-edged sword. Pros: it means we aren't too bogged down by such vulnerable ties. Cons: it is trivial for a well-equipped adversary to leverage an identity or even create one of their own to serve their purposes. Imagine if the British could just pretend to be Arnold and order the troops to vacate? Imagine if Russians could credibly convince Ukrainian forces to abandon their posts by impersonating President Zelensky or one of their generals? They don't even have to assume the identity, they can merely intercept communications or forge an order. Those have direct parallels in an IT environment.</p><p>A big difference here is that in IT environments, systems allows for new identities to be created quite easily. Additionally, those same systems need ways to allow for those identities to gain elevated access or execute more sensitive commands from time to time. To top it off, people aren't the only identities of consequence - services, assets, and more can have an identity and associated privileges. All of these things are much more prevalent in IT than on a traditional battlefield, and these areas are ripe for abuse. So let's take a look at how adversaries may do so!</p><h2>Privilege Escalation: dirty deeds done dirt cheap</h2><p>The MITRE ATT&amp;CK <a href="https://attack.mitre.org/tactics/TA0004/">Privilege Escalation (TA0004)</a> tactic is comprised of 14 techniques and 97 sub-techniques. Almost as expansive as <a href="https://raidersofthelostarp.tech/2024/04/02/persistence-how-uninvited-attackers-avoid-being-bounced-from-the-party-attck/">Persistence</a>! All of them seek to gain higher level permissions. So we're going to group them logically based on the area each focuses in on.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hctd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897f2a79-dd0e-4d3e-9d86-b438b88c4f98_166x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hctd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897f2a79-dd0e-4d3e-9d86-b438b88c4f98_166x1024.png 424w, https://substackcdn.com/image/fetch/$s_!hctd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897f2a79-dd0e-4d3e-9d86-b438b88c4f98_166x1024.png 848w, https://substackcdn.com/image/fetch/$s_!hctd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897f2a79-dd0e-4d3e-9d86-b438b88c4f98_166x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!hctd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897f2a79-dd0e-4d3e-9d86-b438b88c4f98_166x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hctd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897f2a79-dd0e-4d3e-9d86-b438b88c4f98_166x1024.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/897f2a79-dd0e-4d3e-9d86-b438b88c4f98_166x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!hctd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897f2a79-dd0e-4d3e-9d86-b438b88c4f98_166x1024.png 424w, https://substackcdn.com/image/fetch/$s_!hctd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897f2a79-dd0e-4d3e-9d86-b438b88c4f98_166x1024.png 848w, https://substackcdn.com/image/fetch/$s_!hctd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897f2a79-dd0e-4d3e-9d86-b438b88c4f98_166x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!hctd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897f2a79-dd0e-4d3e-9d86-b438b88c4f98_166x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Lots of ways to fake it till you make it!</figcaption></figure></div><p>If some of them are looking eerily familiar, good! It goes to show that some techniques can be used in multiple places to achieve different goals (Tactics). It also hints at the fact that sometimes multiple Tactics can be achieved in a single stroke. We'll see how that works below :)</p><h3>Privilege Escalation via Impersonation</h3><p>We've seen how advantageous having an insider can be. Whether they are willing accomplices or not, almost doesn't matter. The sheer amount of dumps available on the dark web is a testament to the power of <a href="https://attack.mitre.org/techniques/T1078">Valid Accounts (T1078)</a>. Using these is doubly concerning - the user or service is real and has a need to operate, which means they are really hard to detect and hard to lock down if detected. Another path to looking legitimate isn't to hijack the identity but the communications from that identity - and this is where <a href="https://attack.mitre.org/techniques/T1134/">Access Token Manipulation (T1134)</a> comes into play. By stealing tokens associated with a legitimate process, they can pass of their malicious activities as benign. Like a real admin user launched it.</p><p>Adversaries may have some valid accounts, but what if those identities didn't have the access they needed to do the job? Through <a href="https://attack.mitre.org/techniques/T1098">Account Manipulation (T1098)</a> they elevate privileges, alter permissions, or assigned roles. They can even attempt <a href="https://attack.mitre.org/techniques/T1484/">Domain Policy Modification (T1484)</a> to entitle their accounts with more access. These are both tricky with proper logging in place. But who does proper logging?</p><h3>Privilege Escalation via OS process trickery</h3><p>As we have mentioned before, operating systems are complex beasts! In that complexity are many opportunities to exploit gaps or issues. An attacker may want to wedge themselves a legitimate OS process for executing a program and <a href="https://attack.mitre.org/techniques/T1574">Hijack Execution Flow (T1574)</a> to escalate privileges, like ShimRAT does to bypass Windows User Access Controls. With 13 sub-techniques, this Technique covers a lot of interesting ground!</p><p>Somewhat related, an attacker may decide it is easier to just take their aggression out via a <a href="https://attack.mitre.org/techniques/T1055/">Process Injection (T1055)</a>. The legitimate code was going to run anyway, so they inject their malformed libraries into a process already working at a higher level and let their payloads tag along! Here the OS is still intact, the adversary is simply embedding their code into something normally okay.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!klZd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8559b9c-330b-4be6-80eb-8fab8d8be7ae_1024x796.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!klZd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8559b9c-330b-4be6-80eb-8fab8d8be7ae_1024x796.png 424w, https://substackcdn.com/image/fetch/$s_!klZd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8559b9c-330b-4be6-80eb-8fab8d8be7ae_1024x796.png 848w, https://substackcdn.com/image/fetch/$s_!klZd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8559b9c-330b-4be6-80eb-8fab8d8be7ae_1024x796.png 1272w, https://substackcdn.com/image/fetch/$s_!klZd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8559b9c-330b-4be6-80eb-8fab8d8be7ae_1024x796.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!klZd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8559b9c-330b-4be6-80eb-8fab8d8be7ae_1024x796.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e8559b9c-330b-4be6-80eb-8fab8d8be7ae_1024x796.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!klZd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8559b9c-330b-4be6-80eb-8fab8d8be7ae_1024x796.png 424w, https://substackcdn.com/image/fetch/$s_!klZd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8559b9c-330b-4be6-80eb-8fab8d8be7ae_1024x796.png 848w, https://substackcdn.com/image/fetch/$s_!klZd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8559b9c-330b-4be6-80eb-8fab8d8be7ae_1024x796.png 1272w, https://substackcdn.com/image/fetch/$s_!klZd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8559b9c-330b-4be6-80eb-8fab8d8be7ae_1024x796.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Really cool example of APT Blind Eagle's obfuscated Powershell Script that bypassed UAC (H/T Threatmon.io)</figcaption></figure></div><p>Maybe the adversary prefers to <a href="https://attack.mitre.org/techniques/T1548/">Abuse Elevation Control Mechanisms (T1548)</a> that allow escalation on a case-by-case basis? In Linux or macOS, this is where the Setuid and Setgid bits come in super handy - the adversary can set these flags using chmod to allow their malicious executable to run at the levels of the owning group. In Windows, UAC is again a popular spot to target. the Linux/macOS sudo command, APIs, and cloud role manipulation are also important vectors to be on the lookout for.</p><h3>Privilege Escalation via Boot and Schedule (revisited)</h3><p>Lastly, bad actors love to <a href="https://attack.mitre.org/techniques/T1543/">Create or Modify System Process (T1543)</a>, leverage <a href="https://attack.mitre.org/techniques/T1547">Boot or Logon Autostart Execution (T1547)</a> or modify <a href="https://attack.mitre.org/techniques/T1037">Boot or Logon Initialization Scripts (T1037)</a> to make sure that their malicious code executes at high privilege but also persists through reboots or faults. Some of these TTPs happen before protection is in place, while others take advantage of system-level privileges to avoid detection. These same principles explain the use of a <a href="https://attack.mitre.org/techniques/T1053">Scheduled Task/Job (T1053)</a>, which sometimes achieves the same results. Adversaries need to weigh detection risk vs. effort here, and will often combine 2 or more techniques to ensure access long-term.</p><h3>Privilege Escalation via other means</h3><p>While obtaining persistence, a threat actor often escalates privileges. <a href="https://attack.mitre.org/techniques/T1546/">Event Triggered Execution (T1546)</a> is a handy way to invoke long-term access, and if done properly can ensure that access is at Admin or system-level privileges.</p><p>With most workloads and applications now running in some sort of abstraction, a new attack surface arises! Both container and virtual machine environments must consider the possibility of <a href="https://attack.mitre.org/techniques/T1611/">Escape to Host (T1611)</a> as a vector. Adversaries may create images that map to host resources and allow unforeseen access. They may even abuse hypervisor, Kubernetes or Docker processes and APIs to cause damage to the underlying layers. This relates closely with <a href="https://attack.mitre.org/techniques/T1068/">Exploitation for Privilege Escalation (T1068)</a>, which tackles **any** vulnerability in software (host, app, and everything in between) to execute controlled code. Many Metasploit scripts, for instance, achieve privilege escalation by finding known vulns and capitalizing on them.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5T21!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cd26fe9-0440-4300-af60-943dec62a4dd_658x312.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5T21!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cd26fe9-0440-4300-af60-943dec62a4dd_658x312.png 424w, https://substackcdn.com/image/fetch/$s_!5T21!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cd26fe9-0440-4300-af60-943dec62a4dd_658x312.png 848w, https://substackcdn.com/image/fetch/$s_!5T21!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cd26fe9-0440-4300-af60-943dec62a4dd_658x312.png 1272w, https://substackcdn.com/image/fetch/$s_!5T21!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cd26fe9-0440-4300-af60-943dec62a4dd_658x312.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5T21!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cd26fe9-0440-4300-af60-943dec62a4dd_658x312.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1cd26fe9-0440-4300-af60-943dec62a4dd_658x312.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!5T21!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cd26fe9-0440-4300-af60-943dec62a4dd_658x312.png 424w, https://substackcdn.com/image/fetch/$s_!5T21!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cd26fe9-0440-4300-af60-943dec62a4dd_658x312.png 848w, https://substackcdn.com/image/fetch/$s_!5T21!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cd26fe9-0440-4300-af60-943dec62a4dd_658x312.png 1272w, https://substackcdn.com/image/fetch/$s_!5T21!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cd26fe9-0440-4300-af60-943dec62a4dd_658x312.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Metasploit and other frameworks make identifying and exploiting vulnerable software easy!</figcaption></figure></div><h2>How can we mitigate or prevent Privilege Escalation?</h2><p>As attackers gain access to higher authorization and privileges, they are empowered to do more. Not only do they have more access and deeper impact, but they also have access to commands that can obfuscate their presence, or cover their tracks! Had Benedict Arnold not been implicated in correspondence carried by his British handler, he likely would have doomed the Revolution. One can surmise that the Ukrainian government is continually monitoring for similar activity, and protecting the integrity of their command &amp; control networks to avoid this same outcome.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C3aV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51993add-8c67-4269-b263-7f4f6dbd4983_720x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C3aV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51993add-8c67-4269-b263-7f4f6dbd4983_720x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!C3aV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51993add-8c67-4269-b263-7f4f6dbd4983_720x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!C3aV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51993add-8c67-4269-b263-7f4f6dbd4983_720x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!C3aV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51993add-8c67-4269-b263-7f4f6dbd4983_720x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C3aV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51993add-8c67-4269-b263-7f4f6dbd4983_720x1000.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/51993add-8c67-4269-b263-7f4f6dbd4983_720x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!C3aV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51993add-8c67-4269-b263-7f4f6dbd4983_720x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!C3aV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51993add-8c67-4269-b263-7f4f6dbd4983_720x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!C3aV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51993add-8c67-4269-b263-7f4f6dbd4983_720x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!C3aV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51993add-8c67-4269-b263-7f4f6dbd4983_720x1000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">West Point (now the US Military Academy) controlled the Hudson River - its fall would have allowed British forces to divide the colonies in two.</figcaption></figure></div><h3>So what now?</h3><p>So how can defenders in the cyber battlefield mitigate or eliminate this threat?</p><ul><li><p>Log and audit, folks! We all can do a better job monitoring the OS logs for our devices and infrastructure. Yes, they are chatty. Take advantage of things like Microsoft's <a href="https://learn.microsoft.com/en-us/sysinternals/">Sysinterals</a> and <a href="https://github.com/SwiftOnSecurity/sysmon-config">SwiftOnSecurity's Sysmon template</a>, or <a href="https://github.com/trimstray/the-practical-linux-hardening-guide/wiki/Auditd">Auditd</a> if you're using Linux. This step will allow you to see when something fishy is going on.</p></li><li><p>Ensure that many of the OS mechanisms in place are disabled or properly hardened. The Center for Internet Security's <a href="https://www.cisecurity.org/cis-benchmarks">benchmarks &amp; hardening guides</a> spend a lot of time ensuring that any work-around is harder to take advantage of.</p></li><li><p>Use privilege account management features and privileged access management (PAM) tools. Sounds simple, but that additional process overhead can prevent a lot of pain.</p></li><li><p>Monitor and restrict file and registry access. Many of the TTPs we discussed above take advantage of injecting into scripts, libraries, or executables, or accessing them for cover. Use signed code whenever possible! Limit software installs and downloads as much as possible and retrain users to understand why.</p></li><li><p>Ratchet down on user, group and local admin privileges. The lower the adversary must start, the harder it will be for them to climb the ladder. Don't forget service accounts too! And local accounts are the bane of any security program's existence.</p></li><li><p>Sandbox and isolate properly, especially for containers and VMs. Some supply chain security is a huge help here - validate upstream repositories and vendors are clean before going to production.</p></li><li><p>Patch your code!</p></li></ul><h2>Conclusion</h2><p>Privilege Escalation is nasty stuff, folks! And the more we prevent it, the more we interrupt adversary plans for causing damage, moving laterally, stealing information, or operating long term in our environments. The Continental Army learned the game of espionage quickly, but their efforts in counter-espionage were what saved their revolution from a disastrous end. The Ukrainians have also learned that quickly, and in a few years we may see it was vital to their survival. That same vigilance is necessary in cyberspace. Success can mean the entire game - for both sides. Don't make it easy on the adversary to win! Make their loss embarrassing!</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!00mo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F668827d5-16f8-4227-8985-a68be90cf21c_1024x802.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!00mo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F668827d5-16f8-4227-8985-a68be90cf21c_1024x802.jpeg 424w, https://substackcdn.com/image/fetch/$s_!00mo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F668827d5-16f8-4227-8985-a68be90cf21c_1024x802.jpeg 848w, https://substackcdn.com/image/fetch/$s_!00mo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F668827d5-16f8-4227-8985-a68be90cf21c_1024x802.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!00mo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F668827d5-16f8-4227-8985-a68be90cf21c_1024x802.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!00mo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F668827d5-16f8-4227-8985-a68be90cf21c_1024x802.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/668827d5-16f8-4227-8985-a68be90cf21c_1024x802.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!00mo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F668827d5-16f8-4227-8985-a68be90cf21c_1024x802.jpeg 424w, https://substackcdn.com/image/fetch/$s_!00mo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F668827d5-16f8-4227-8985-a68be90cf21c_1024x802.jpeg 848w, https://substackcdn.com/image/fetch/$s_!00mo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F668827d5-16f8-4227-8985-a68be90cf21c_1024x802.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!00mo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F668827d5-16f8-4227-8985-a68be90cf21c_1024x802.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">The British never made Benedict and Peggy rich, but at least he got a plaque for his treachery.</figcaption></figure></div><p>I hope that this post was helpful in understanding the role privileges play in cyberspace. Much of what an attacker wants to accomplish hinges on the Privilege Escalation tactic being successful. In subsequent posts, we'll take a look at the possibilities that unlocking privileges can grant. As always, let me know if this is helpful, and have a great week folks!</p>]]></content:encoded></item><item><title><![CDATA[What’s causing Mike’s Indigestion now? Everybody Hurts (19 April 2024)]]></title><description><![CDATA[I was on the road until yesterday, but I wanted to get back on the blog and update horse.]]></description><link>https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-everybody-hurts-ransomware-mitre-ai</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-now-everybody-hurts-ransomware-mitre-ai</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Sat, 20 Apr 2024 16:09:58 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/04/mikey_mac_cartoon_of_a_bearded_indiana_jones_bruised_and_batter_5e8220db-599b-497d-8682-eada7c02a066.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QJtK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QJtK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!QJtK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!QJtK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!QJtK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QJtK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1788651,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190624990?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QJtK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!QJtK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!QJtK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!QJtK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9fc0579-539b-4749-92ab-b24b8c0d058e_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I was on the road until yesterday, but I wanted to get back on the blog and update horse. So here we are! After learning about and supporting the launch of a new solution, I got sucked into some saved news articles and blogs on the trip home that convinced me we need to rethink a lot of things to get caught up with adversaries. Ransomware operators are constantly evolving, we should too! And no one has it figured out, as we'll see in a couple of paragraphs. So let's think outside of the magic quadrants and waves about new ways to solve our problems.</p><h2>Ransomware re-spins show resilience where we don't need it</h2><p>The sheer number of ransomware operations is growing exponentially. Ransomware-as-a-Service (RaaS) certainly drives this, but the options attackers can use is also growing. While Lockbit and Emotet garner a lot of law enforcement attention, other ransomware operators are evolving to fill the void and capture market share. Yep, RaaS is a market all its own - stand by for an evil version of Gartner to pop up and start ranking them!</p><p>It seems that HelloKitty - the folks who attempted to <a href="https://blog.talosintelligence.com/recent-cyber-attack/">ransom/extort Cisco in 2022</a> - have <a href="https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-rebrands-releases-cd-projekt-and-cisco-data/">relaunched as HelloGookie</a>. As part of this "news release" they released source code from previous hacks of CD Projekt (a game developer) and information they claim was related to that Cisco breach. Tracked since 2020 and covering hypervisors like ESXi, both Windows and Linux OSes, and using other tactics, it seems they are looking to branch out.</p><p>And then there is Akira, who is <a href="https://thehackernews.com/2024/04/akira-ransomware-gang-extorts-42.html">now extorting Linux</a> and racked up $42M in total proceeds as of January.</p><p>One of the O.G. criminal actors, FIN7, has even <a href="https://thehackernews.com/2024/04/fin7-cybercrime-group-targeting-us-auto.html">revived Carbanak</a> to offer a backdoor auto industry players through a new "free IP scanner" ruse. Stay vigilant, and for goodness sake don't use free tools you don't understand!</p><h2>Even thought leaders have bad days</h2><p>MITRE, the non-profit organization that brings us awesome projects like the Common Vulnerabilities and Exposures (CVE) Database, or the Adversarial Tactics, Techniques, and Common Knowledge (<a href="https://raidersofthelostarp.tech/2023/11/05/worry-less-and-know-your-enemy-with-mitre-attck/">ATT&amp;CK</a>) Database was recently hit by a <a href="https://cybersecuritynews.com/mitre-hacked/">supply chain attack</a>. Lest we think they only operate in these tools, keep in mind that they do a ton of research and policy development for the US Government. Lots of sensitive stuff! So when we find out that the <a href="https://www.mitre.org/news-insights/news-release/mitre-response-cyber-attack-one-its-rd-networks">notorious Ivanti VPN issues impacted them</a> as well, it raises some alarms.</p><p>So far, they have only announced this breach impacting the Networked Experimentation, Research, and Virtualization Environment (NERVE), which is a shared R&amp;D network. This is good - MITRE also contributes heavily to energy, transportation, telecommunications, and other critical areas.</p><ul><li><p>Want to read more? MITRE's <a href="https://www.mitre.org/news-insights/news-release/mitre-response-cyber-attack-one-its-rd-networks">official release</a> of the breach notification is here. It openly affirms that they plan to disclose more as time goes on. Openness is key, folks!</p></li><li><p>Want to get nerdy? MITRE CTID's <a href="https://medium.com/mitre-engenuity/advanced-cyber-threats-impact-even-the-most-prepared-56444e980dc8">own post</a> sharing the process is fascinating and well-written, and is firmly in the "well done" category of honest disclosure! And it is very instructive to see CTID using their own creation (ATT&amp;CK) to detail the entire picture, including the under-utilized Data Sources and Mitigations categories, as well as related efforts like <a href="https://engage.mitre.org">Engage</a>. Not to be too self-possessed, they also point to great resources from <a href="https://www.cisa.gov/">CISA</a>, the US Executive Branch, and multiple 3rd party intelligence sources. Nicely done folks!</p></li></ul><h2>This week in AI</h2><p>AI continues to advance at a rapid clip, and it feels like we're well past controlling its evolution. A couple of interesting, fascinating, and deeply concerning articles hit me this week while I was on the road. Meta <a href="https://arstechnica.com/information-technology/2024/04/meta-releases-chatgpt-like-ai-site-and-open-weights-llama-3-model/">announced the newest version</a> (3) of its Llama LLM this week. Almost buried in the story? The LLM continued to learn even after Meta stopped training it. I am no AI guru, but it would seem we need fail-safes in LLMs. This is to ensure that they abide by boundaries. Especially when <a href="https://www.darkreading.com/threat-intelligence/gpt-4-can-exploit-most-vulns-just-by-reading-threat-advisories">a sobering report by the folks at UIUC</a> show that adversaries are quickly weaponizing LLMs like GPT-4. Armed with only threat advisories, threat actors enlisted GPT-4 to automatically carry out exploits against the posted vulnerabilities.</p><p>And if you're worried about influence campaigns leveraging AI, it is <a href="https://arstechnica.com/information-technology/2024/04/microsofts-vasa-1-can-deepfake-a-person-with-one-photo-and-one-audio-track/">only getting easier</a>. China's APTs are scary enough, but their <a href="https://therecord.media/china-ai-influence-operations">branching into AI </a>scares the crap out of me. And this just compliments <a href="https://www.darkreading.com/ics-ot-security/fbi-director-wray-issues-dire-warning-on-chinas-cybersecurity-threat">their adjacent activity</a> in compromising critical infrastructure.</p><p>Thank goodness we have regulations and laws coming to help contain the risk, right? Think of all the gaps we discuss around cybersecurity. Open positions, pay vs. responsibility, lack of entry level, poor budgets, insufficient or non-existent processes. One we need to address pronto? The knowledge gap in government policy makers. Governments of all sizes and levels are <a href="https://www.securityweek.com/first-major-attempts-to-regulate-ai-face-headwinds-from-all-sides/">proving woefully inadequate</a> in addressing these critical questions. I fear they're too far behind to ever have a meaningful impact. The toothpaste is already out of the tube.</p><h2>Things I am keeping an eye on</h2><ul><li><p>Cisco announced <a href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html">best practices for preventing password spraying</a> attacks on VPNs. This was immediately followed by a <a href="https://www.darkreading.com/remote-workforce/cisco-warns-of-massive-surge-in-password-spraying-attacks-on-vpns">massive uptick</a> in those attacks.</p></li><li><p>CISA has been stepping up its proactive alerts on ICS and critical infrastructure. This week, they <a href="https://www.darkreading.com/ics-ot-security/ics-network-controllers-open-to-remote-exploit-no-patches-available">warned of swaths of ICS controllers being vulnerable</a> and without patches available. Step up your compensating controls, folks!</p></li><li><p>LastPass continues to suffer a lot of setbacks, including <a href="https://www.darkreading.com/cyberattacks-data-breaches/lastpass-users-lose-master-passwords-ultra-convincing-scam">this report of users being scammed</a> out of their master passwords.</p></li><li><p>Jim Clausing from SANS ISC released a pretty slick tool that helps to pull down an SBOM from a Linux image. There a lot of paid tools that do this, but this <a href="https://isc.sans.edu/diary/New%20tool%3A%20linux-pkgs.sh/30774">freebee</a> is a really cool idea.</p></li><li><p>We get myopically focused on the endpoint as the predominant entry objective for an adversary. <a href="https://thehackernews.com/2024/04/showcasing-networkless-identity-attacks.html">This article</a> makes a great case for how the new identity-driven attacks on SaaS apps. This makes it easy to do damage without ever touching endpoints.</p></li><li><p>BlackHat Asia really started up the conference season with a bang. One of the very concerning reports was of adversaries using PAN's Cortex XDR agent (an EDR agent with more SaaS-supported features) as an <a href="https://www.blackhat.com/asia-24/briefings/schedule/index.html#the-dark-side-of-edr-repurpose-edr-as-an-offensive-tool-37846">Evil XDR offensive tool</a>.</p></li><li><p>I plan to stand up MISP again soon - its been a few years. <a href="https://www.youtube.com/watch?v=4870zcDL9Ek">This tutorial</a> is looking promising for helping me out with that!</p></li><li><p>This <a href="https://www.cyberseek.org/certifications.html">certification graph tool</a> seems interesting - going to see what it says and what I think about it.</p></li></ul><h2>Good Reads</h2><ul><li><p>Folks know by now I love talking about MITRE ATT&amp;CK and its associated projects. I learn so much more when the story of an adversary is broken down into consumable steps. The new <a href="https://kubenomicon.com/">Kubenomicon Threat Matrix</a> takes the concept into a really cool direction. It not only shows how adversaries might hit a ccontainer-based application, but reinforces the learning I am doing on that front from a cloud and container fundamentals perspective. This is awesome!</p></li><li><p>In trying to continue on this CTI learning path, I came across a <a href="https://pylos.co/2024/04/17/the-cti-mindset-the-cti-function/">great post by Joe Slowik</a>. Here he is covering CTI as a mindset and function. It is an eye-opening look at where CTI fits and why we're (mostly) doing it wrong. Take a look, it'll make you reevaluate how we treat the need!</p></li></ul><p>I hope this entry - late as it was, was helpful and engaging. If you have any inputs, recommendations, or criticism, please send them my way! Have a great rest of the weekend!</p>]]></content:encoded></item><item><title><![CDATA[What’s causing Mike’s Indigestion now? Stormy Nights (12 April 2024)]]></title><description><![CDATA[Hey folks!]]></description><link>https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-volt-typhoon-microsoft-midnight-blizzard</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-volt-typhoon-microsoft-midnight-blizzard</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Thu, 11 Apr 2024 21:18:42 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/04/mikey_mac_cartoon_of_cartoon_of_a_middle-aged__bearded_indiana__bd76eb4a-7640-428c-bddc-a627838e84d0.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LVI-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LVI-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!LVI-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!LVI-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!LVI-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LVI-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2108122,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190624989?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LVI-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!LVI-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!LVI-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!LVI-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2292ccfd-5890-48d2-b476-9520c9f721ef_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Hey folks! After a busy week, I am finally sitting down to see what is new in the world of threat actors and trends. We're barrelling into Friday with a lot of attention on probably THE key software vendor in the world (Microsoft), and more attention on Volt Typhoon. Yet even hardware vulnerabilities are a thing, and it just goes to show how our supply chain is riddled with dependencies. And those dependencies open doors to vulnerabilities. So let's check in and see some of the more interesting threads!</p><h2>Microsoft Email breach becomes more concerning by the day</h2><p>As we've discussed in multiple prior updates, Microsoft has had a very difficult time with a breach of its ubiquitous Exchange Online email service by multiple threat actors, most notably Midnight Blizzard and Storm-0558. Well, it seems that the former's efforts <a href="https://msrc.microsoft.com/blog/2024/03/update-on-microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/">detected in January</a> have been riling CISA and the US Government. <a href="https://www.cisa.gov/news-events/directives/ed-24-02-mitigating-significant-risk-nation-state-compromise-microsoft-corporate-email-system">CISA's Emergency Directive</a> is a pretty bad sign that this impacted serious government business.</p><p>It seems that emails between Microsoft and their customer (the Federal Civilian Executive Branch) were snooped on, and included authentication details. Whoops! ED-24-2 directs all agencies to take action, review emails, reset credentials, and more.</p><ul><li><p>Want to read more? <a href="https://www.darkreading.com/threat-intelligence/midnight-blizzard-breached-hpe-email-before-microsoft-hack">HPE looks like they were hit</a> before MS, which goes to show how prolific this APT is.</p></li><li><p>Want to get nerdy? Wiz.io has a very interesting <a href="https://www.wiz.io/blog/midnight-blizzard-microsoft-breach-analysis-and-best-practices">write-up</a> on the "how" of the breach, based on publicly available information.</p></li></ul><h2>Chinese persistence in Critical Infrastructure</h2><p>CISA created a <a href="https://www.cisa.gov/audiences/high-risk-communities">High Risk Communities</a> center on their website, and it is full of awesome guidance and resources. Maybe you're tempted to ignore that - maybe that is out of scope? Adversaries certainly aren't passing up opportunities to cross-train and reuse techniques, neither should you!</p><p>Chinese threat actors in particular have been honing their skills on western infrastructure for some time. In that spirit, CISA has <a href="https://www.cisa.gov/resources-tools/resources/prc-state-sponsored-cyber-activity-actions-critical-infrastructure-leaders">released a fact sheet</a> to help decision makers prepare for PRC-backed threats like Volt Typhoon. What is inside? Advice we should all heed: patch your stuff, harden OSes, monitor for LOLBins, train continuously, and update/rehearse IR and DR plans. These are all good advice we keep getting, but maybe your organization needs a name for the fear - well here you go! Volt Typhoon it is!</p><p>Diversity of skills and operations are a Chinese hallmark. Look at recent research by folks like Trend Micro, who have done a lot of work on malware families they call <a href="https://www.trendmicro.com/en_us/research/24/c/earth-krahang.html">Earth Lusca</a> and Earth Krahang, leveraged by an APT known as <a href="https://attack.mitre.org/groups/G1006/">TAG-22</a>. These threat actors are perfecting their skills in leveraging cross-organizational trust to pivot between victim organizations. Right now, the research is focused on operations in Southeast Asia. It is probably an objective to start replicating this in western governments and infrastructure soon, if they are not already.</p><h2>This week in AI</h2><p>I think we're seeing so much AI painted on pretty much everything these days that it can desensitize us to a great use case. Toothbrushes with AI? Seriously? But I think we can all see some positive uses in helping get through more tedious tasks. One of the things that slows a lot of organizations down in cybersecurity is the collection and processing of intel. This <a href="https://blog.securitybreak.io/applying-llms-to-threat-intelligence-f3b8ba4463a4">write-up</a> by Thomas Roccia offers a slick look at how LLMs might really help. And another wonderful person to follow, Roberto Rodriguez from Microsoft has done some <a href="https://github.com/OTRF/GenAI-Security-Adventures/tree/main">awesome open experimentation</a> with GenAI and Jupyter Notebooks. I think it is worth following along and potentially trying myself!</p><h2>Things I am keeping an eye on</h2><ul><li><p>Software supply chains are rightfully a big focus, but don't sleep on the hardware! Binarly <a href="https://arstechnica.com/security/2024/04/supply-chain-snafu-causes-intel-and-others-to-ship-hackable-hardware-for-5-years/">released a research paper</a> showing how server firmware for Intel, Lenovo, and Supermicro included vulns that bypass security controls. Patch it, you say? The Intel and Lenovo hardware in question is no longer supported - so it is eternally vulnerable.</p></li><li><p>DPRK threat actors have been <a href="https://www.darkreading.com/vulnerabilities-threats/dprk-exploits-mitre-sub-techniques-phantom-dll-hijacking-tcc-abuse">actively using two new sub-techniques</a> from the upcoming MITRE ATT&amp;CK matrix. I think we all love innovation, but not by the bad guys.</p></li><li><p>Even security companies get hit once in a while. Lastpass admitted an employee <a href="https://www.bleepingcomputer.com/news/security/lastpass-hackers-targeted-employee-in-failed-deepfake-ceo-call/">fell victim to a voice phishing attack</a> that used a deepfake of their CEO.</p></li><li><p>Apple <a href="https://www.darkreading.com/vulnerabilities-threats/apple-warns-users-targeted-by-mercenary-spyware">warned a LOT of people</a> from over 150 countries that mercenary spyware from folks like NSO Group is targeting them. If you are an NSO Group customer, we are not friends.</p></li><li><p>This <a href="https://cispa.de/en/loop-dos">research on alternate app-level protocols</a> for carrying out DDoS attacks has my head spinning. Very insightful, and very concerning!</p></li><li><p>A bipartisan effort in Congress sees a serious attempt at <a href="https://www.wired.com/story/apra-congress-online-privacy-proposal/">tackling online privacy</a>! This is a huge effort - the current state is rife with fractures, inconsistencies, and a lack of cohesion. Who knew Congress had it in them???</p></li></ul><h2>Good Reads</h2><ul><li><p>The folks at Active Countermeasures (who also count Black Hills Information Security and Antisiphon as sister companies) run an awesome blog chock-full of info, and <a href="https://www.activecountermeasures.com/malware-of-the-day-tunneled-c2-beaconing/">this blog on tunneling C2 beacons</a> by Fann Rossouw is very informative. They also have a slick place to see their upcoming training <a href="https://events.zoom.us/eo/AqZceUFfoY13HGSXujLymbABWGRslgy_uYu4TrJHbsmiQm-uPw9R~AggLXsr32QYFjq8BlYLZ5I06Dg">here</a>.</p></li><li><p>Last week we touched a lot on the XZ supply chain open source attack, and <a href="https://research.swtch.com/xz-timeline">this timeline</a> looks like the outline for a multi-part mini-series. I think that Nick Offerman might make a good protagonist. Maybe vs. Amy Poeler? Parxz &amp; Wreck folks! (it is late).</p></li></ul><p>I hope that this week's summary of things I found interesting is helpful. As always, please have a good and safe weekend and feel free to reach out and chat!</p>]]></content:encoded></item><item><title><![CDATA[What’s causing Mike’s Indigestion now? Supply Chain Heist (5 April 2024)]]></title><description><![CDATA[Happy weekend, folks!]]></description><link>https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-xz-supply-chain</link><guid isPermaLink="false">https://www.raidersofthelostarp.tech/p/whats-causing-mikes-indigestion-xz-supply-chain</guid><dc:creator><![CDATA[Mike McPhee]]></dc:creator><pubDate>Thu, 04 Apr 2024 14:30:54 GMT</pubDate><enclosure url="https://images.raidersofthelostarp.tech/2024/04/mikey_mac_cartoon_showing_a_software_supply_chain_being_stretch_fe0d7474-3e26-4654-bb5f-bd82f9de1269.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6_r-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6_r-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6_r-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6_r-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6_r-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6_r-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2347128,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.raidersofthelostarp.tech/i/190624987?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6_r-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6_r-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6_r-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6_r-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb89e2530-cd39-4721-9aa3-b875fc8f15b7_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Happy weekend, folks! Loads of cool stuff going on in the day job, but lots chatter focused on 2 areas on opposite sides of the software ecosystem. The resourcefulness of adversaries never ceases to amaze me. Both stories offer a lot of intricate technical details, but the big takeaway is that we're in serious trouble unless we tackle best-practices, hygiene, and find support for the massive base of open source projects. So let's get going!</p><h2>Open Source projects need our help</h2><p>Since the beginning of the Internet Age, applications and operating systems have been dependent on open source. Despite the riches raked in by for-profit companies for their software, all of them stand on the shoulders of open source software libraries and packages. I think we all get it - using open source accelerates innovation. Why reinvent the wheel, right? But it is high time that we all consider how we support those open source projects. The maintainers of those efforts are usually coding these as a passion project or hobby. And they are all overwhelmed and outmatched. Need proof? Heartbleed, Log4j, Java and NPM vulnerabilities, Shellshock, and multiple Apache Struts CVEs can jog your memory.</p><p>Last week an attentive Microsoft engineer Andres Freund <a href="https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/">luckily stumbled on a performance issue</a>, and <a href="https://www.openwall.com/lists/oss-security/2024/03/29/4">traced it back to a hijacked open source compression library</a> used in most modern Linux flavors known as XZ Utils. An <a href="https://www.wired.com/story/jia-tan-xz-backdoor/">adversary</a> made a 2+ year effort to gain trust as a contributor and eventually gain commit-level privileges. They then disabled testing of their contributions and slowly nudged the code base to support their efforts to embed a <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094">malicious backdoor flaw</a> into the package. This interferes with authentication in SSH and injects code to open up a backdoor. Holy cow!</p><p>Lucky for us, Andres caught it - before the code could be promoted to released versions of Linux. But we have a big problem. Expecting these projects to operate with no funding, 1 to a few contributors, and zero support in testing and validation is supply chain suicide. It is time for the many prosperous companies that benefit from these heroic efforts give back and assist in securing these projects for the greater good.</p><ul><li><p>Want to learn more? Kevin Beaumont does a <a href="https://doublepulsar.com/inside-the-failed-attempt-to-backdoor-ssh-globally-that-got-caught-by-chance-bbfe628fafdd">great job</a> talking about this entire caper holistically.</p></li><li><p>Want to get nerdy? The SANS ISC does a splendid job of <a href="https://isc.sans.edu/diary/30802">explaining the technical</a> how of this backdoor here.</p></li></ul><h2>Microsoft struggles to use their own tools securely</h2><p>Lest we think that Open Source cannot be relied on and that professionals and closed source are the safest bet, Microsoft shows that no one is infallible. If you recall, APT Storm-0588 compromised Microsoft's Exchange Online email service through information from a developers laptops and a stolen Azure signing key. Despite happening 10 months ago, Microsoft is still not publicly aware of what happened, and <a href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CISA and the US Department of Homeland Security</a> called them out for their handling of the matter. Don't confuse with the breach of their own senior leadership team's email accounts, which it appears they are still struggling with months later - talk about <a href="https://raidersofthelostarp.tech/2024/04/02/persistence-how-uninvited-attackers-avoid-being-bounced-from-the-party-attck/">persistence</a>!</p><ul><li><p>Want to learn more? Bleeping Computer's <a href="https://www.bleepingcomputer.com/news/security/microsoft-still-unsure-how-hackers-stole-msa-key-in-2023-exchange-attack/">synopsis</a> boils it down for us. Ars Technica goes into <a href="https://arstechnica.com/information-technology/2024/04/microsoft-blamed-for-a-cascade-of-security-failures-in-exchange-breach-report/">more details</a> about how the breach was made.</p></li><li><p>Want to get nerdy? You can read Microsoft's own analysis of the situation <a href="https://msrc.microsoft.com/blog/2023/07/microsoft-mitigates-china-based-threat-actor-storm-0558-targeting-of-customer-email/">here</a>.</p></li></ul><h2>This week in AI</h2><p>Seeing the confluence of massive AI adoption and the emergence of so many open-ended concerns, what is obvious is that we've already lost control of AI's propogation. Talking to my good friend Mark Stephens, he clued me in on a book by Nick Bostrom called "<a href="https://www.barnesandnoble.com/w/superintelligence-nick-bostrom/1117941299">Superintelligence: Paths, Dangers, Strategies</a>". Amongst other things, he discusses how AI - given a simple goal of making the best paper clip - would make decisions that eventually threaten human life. Needless to say, that book is on order!</p><h2>Things I am keeping an eye on</h2><ul><li><p>Ivanti has finally <a href="https://www.bleepingcomputer.com/news/security/ivanti-fixes-vpn-gateway-vulnerability-allowing-rce-dos-attacks/">released a version</a> of their VPN head-end software that addresses currently known CVEs.</p></li><li><p>VMware vulnerabilities let to the <a href="https://www.bleepingcomputer.com/news/security/hosting-firms-vmware-esxi-servers-hit-by-new-sexi-ransomware/">compromise of a hosting firm's compute</a> resources. Adversaries must be bummed that folks are looking elsewhere - APTs invested heavily in VMware-related exploits.</p></li><li><p>A contractor for the US DoD was <a href="https://www.hackread.com/intelbroker-us-national-security-data-contractor-acuity/">breached by IntelBroker</a>, driving home that we also need to find a way to secure our partners.</p></li><li><p>Sophos is warning of a <a href="https://www.hackread.com/sophos-ransomware-attacks-target-backups/">trend toward compromising backups</a> - don't forget to protect those fallback plans, folks!</p></li><li><p>Omni Hotels are the latest multi-national to <a href="https://www.bleepingcomputer.com/news/security/omni-hotels-confirms-cyberattack-behind-ongoing-it-outage/">fall victim to an attack</a>. Hoping they can return to full operations soon!</p></li><li><p>The inspirational and awesome Rachel Tobac has <a href="https://darknetdiaries.com/episode/144/">her own episode</a> on DarkNet Diaries! Be sure to check it out - she is a leading voice on the perils of social engineering.</p></li><li><p>It seems LockBit's <a href="https://www.darkreading.com/threat-intelligence/lockbit-ransomware-takedown-strikes-brand-viability">reputation continues to struggle</a> after recent take-downs.</p></li></ul><h2>Good Reads</h2><ul><li><p>Nothing too new - I am about 1/4th of the way into <a href="https://www.barnesandnoble.com/w/children-of-ash-and-elm-neil-price/1133331876">Children of Ash and Elm</a> (the Viking history book). It's amazing how misunderstood they are. The many languages and transitions of knowledge between groups and regions contributed to that confusion. Seems like history certainly rhymes!</p></li><li><p>I am also reading the latest S<a href="https://www.splunk.com/en_us/resources/sans-2024-threat-hunting-survey.html">ANS Threat Hunting Survey</a> results, and as explained in David Bianco's<a href="https://www.linkedin.com/posts/davidjbianco_threathunting-activity-7181277643965636609-idDZ?utm_source=share&amp;utm_medium=member_desktop"> video highlights</a>, it is concerning that more than a third of customers Threat Hunt without a formal process, and the same percentage find that it impairs security, rather than improves it!</p></li></ul><p>I hope that this update unravels a little of the many mysteries we are all being impacted by in cyberspace. If you have any feedback please send it along!</p>]]></content:encoded></item></channel></rss>