BreachExchange mailing list archives

Hunting hackers with honeypots


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Fri, 4 Sep 2015 14:09:42 -0600

http://www.itproportal.com/2015/09/04/hunting-hackers-with-honeypots/

What would it take to gain an upper hand in our efforts to thwart attackers
and limit the damage they can cause?

While preventive techniques are necessary, they are not sufficient.
Additionally, with cyber attacks, time is of essence.

In this post, I discuss a strategy that uses “honeypots” – which are
designed to purposely engage and deceive hackers while identifying
malicious activities – to combine effective deterrence, timely detection,
and dynamic deflection to help mitigate and analyse today’s advanced
threats.

Effective deterrence

Cyber criminals look for the easiest available path when determining where
their exploits will succeed. This means organisations that limit their
exposure to exploitable vulnerabilities are less likely to qualify as
targets for these attackers.

The Target data breach from 2013 is a prime example of this behaviour. The
hackers found a very simple way in, by stealing the credentials of
air-conditioning and refrigeration contractors at several of Target’s
stores. From there the hackers tunnelled across into Target and gained
access to the POS terminals. The lack of effective policy governing the
attack surface meant they could lie undetected as they stole millions’ of
peoples’ credit card data. There are clear ways to stop people employing
this tactic.

Reducing the attack surface begins with an adaptive security model where
granular policies tied to individual workloads ensure that those workloads
are only allowed to access resources necessary for the application’s
legitimate purpose. The underlying principle here is to move from a
blacklist model of “blocking the bad and implicitly allowing everything
else” to a whitelist model that “explicitly permits the good and denies
everything else.”

This containment approach applied at a fine-grained level effectively
reduces the attack surface from the entire network behind the perimeter
down to a specific workload.

If we take the OPM breach as an example, inquiries have revealed that the
malicious actors had lain within the network for between 4 and 6 months and
were only discovered after an upgrade of security detection and monitoring
tools. Over these longer periods of time, it would have been possible to
spot the activity earlier and direct it to a honeypot. Had the specialists
employed adaptive security that redirects traffic to honeypots, they could
have had a closer look, to understand whether the activity was legitimate
or if it was something to be concerned about.

As leaked data continued to be uncovered months after the first
announcements, the OPM staff missed a trick by not gathering the right
intelligence when the first breach came about.

Timely detection and dynamic deflection

It takes organisations far too long to detect cyber attacks. In fact, most
companies take more than six months to detect a data breach. A granular,
whitelist approach to enforcing policies on individual workloads means
potential attacks are immediately detected since there is a precise sense
of what a valid transaction is.

Any deviations from prescribed behaviour can immediately trigger a series
of mitigating actions, including dynamically rerouting the connections to
strategically placed honeypots. This can buy an organisation the time it
needs to analyse attacks within a closely monitored environment.

Honeypots can be used to trap hackers and gather intelligence on their
methods. By letting a hacker inside a controlled environment – a small part
of the network that can be compromised, where no useful or valuable data is
stored – an organisation is able to study and analyse the methods they used
to poke around, giving them a head start on what the attackers will try
next time. The honeypot has become a ‘honeytrap’, coaxing hackers into
deploying their sophisticated tools for security teams to document and
dissect. A great source of knowledge – so long as the hacker is unaware
they’re being watched.

Making honeypots more effective with adaptive security

One reason why honeypots aren’t deployed more extensively is that there is
no opportunity for analysis if they are not in the path of an attack. At
the same time, placing them in the open can generate excessive “noise” from
hackers probing anything with connectivity. Rather than passively waiting
for the honeypots to be attacked, an adaptive security strategy can
redirect attacks to the honeypots.

Another major concern for honeypot designers is that once a honeypot is
compromised, it can be used as a platform to attack and infiltrate other
systems or organisations. Adaptive security, which takes security down to
an individual workload level can isolate and safeguard these honeypots.

Now What?

Risk can never be 100 percent removed. While prevention is ideal, timely
detection and mitigation is an absolute must.

Developing effective mitigation controls to minimise the impact while
gaining deep insight is an important step we should consider as an industry
to better prepare us for the sophistication of future attacks.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus 
on the right security.  If you need security help or want to provide real risk reduction for your clients contact us!

Current thread: