标题 | 简介 | 类型 | 公开时间 | ||||||||||
|
|||||||||||||
|
|||||||||||||
详情 | |||||||||||||
[SAFE-ID: JIWO-2024-797] 作者: ecawen 发表于: [2017-10-09]
本文共 [789] 位读者顶过
Skyhigh Networks的安全专家发现针对Office 365的僵尸网络攻击活动KnockKnock。此次攻击活动的关键区别是主要的攻击目标是具有高访问权限和较差保护的系统账户。 [出自:jiwo.org]
Skyhigh has detected an ingenious new botnet attack against Office 365 accounts, dubbed ‘KnockKnock’ because attackers are attempting to knock on backdoor system accounts to infiltrate entire O365 environments. One of the key distinctions of this new attack is the nature of the accounts that are being targeted. KnockKnock was designed to primarily attack system accounts that are not assigned to any one individual user, making them particularly vulnerable, as we’ll describe later.
First, it should be noted that KnockKnock is not a brute force attack for two reasons. First, it targets a very small proportion (typically <2%) of the O365 account base. Second, it is devoid of any bursts in hacking activity, and averages only 3-5 attempts per account in order to try and fly under the radar of traditional defenses.
KnockKnock has been operational since May 2017 and is currently active. The attack is launched using a relatively small network of 83 confirmed IPs distributed across 63 networks. The smaller size of the botnet is likely designed to keep the attacker low key (i.e. the attack focuses on a handful of users at a time, before moving on to the next set).
In an attempt to further obfuscate the attack, enterprises are targeted in a staggered manner. When the attacks against one enterprise seem to be ramping up, they are slowing down for a different enterprise. While a majority of the activity stems from IPs registered to service providers in China, there is activity originating out of 15 other countries including Russia, Brazil, US, Argentina, Gabon, Azerbaijan, Malaysia.
The attack is particularly clever in that it distinctively and slowly targets system accounts. The system accounts that Skyhigh identified as targets included service accounts (like the ones used for user provisioning in larger enterprises), automation accounts (like the ones used to automate data and system backups), machine accounts (like the ones used for applications within data centers), marketing automation accounts (like the ones used for marketing and customer communication), internal tools accounts (like the ones used with JIRA, Jenkins, GitHub etc.), in addition to accounts set up for distribution lists and shared and delegated mailboxes.
The reason this is so clever is that system accounts, given their purpose, tend to have higher access and privileges than an average account. And, most importantly, such accounts do not yield well to authentication frameworks like Single-Sign-On (SSO) or Multi-Factor Authentication (MFA) and are also subject to lax password policies. These two aspects help reveal the motivation behind KnockKnock, (i.e. attack a weak-link with the potential for elevated exploits).
Once KnockKnock gains access to an enterprise system account, the attack is designed to exfiltrate any data in the inbox and then create a new inbox rule intended to hide and divert incoming messages. The attack will then typically attempt to initiate a phishing attack, and propagate infection across the enterprise using this controlled inbox. Since this is a persistent attack that may go unnoticed, it is possible that the attackers may tailor the payload based on the organization they have infiltrated for a larger takeover over time.
Download the ebook to learn how a CASB helps detect and remediate attacks like KnockKnock in Office 365.
Based on Skyhigh’s Lightning Link integration to Office365 that provides real-time and high-fidelity activity monitoring of all activities including login attempts, soon after KnockKnock became operational, Skyhigh’s Threat Lab detected a pattern of Anomalous Access Locations (AAL) across multiple customers, Skyhigh’s ML automatically that takes into account behavioral patterns for the user, activity, and access-points to pinpoint anomalies played a key part in reducing the time to respond to this threat. As the number of these anomalous accesses increased, Skyhigh’s threat funnel correlated multiple of these access attempt anomalies into threats. By leveraging the network effect of analyzing billions of O365 events across hundreds of Skyhigh’s O365 customers, Skyhigh is uniquely capable of detecting attacks across multiple enterprises with high fidelity and much quicker than traditional approaches.
This attack focused on attempting to exploit the vulnerability of system accounts, which are not usually protected by SSO or MFA. Further, system account activity is often not scrutinized for malicious behavior at the same level as user or admin accounts. Employing a CASB to monitor activity and perform UEBA across all O365 accounts is instrumental in detecting and remediating this type attack before it can cause substantive damage, and uses following techniques:
As attackers increase their attacks on enterprise SaaS and IaaS deployments, CASBs offer a new line of defense, allowing companies to adopt and benefit from cloud, while protecting their most valuable asset – data.
|