Connect with us

Hi, what are you looking for?


Incident Response

The Intruder’s Kill Chain – Detecting a Subtle Presence

Hackers are Using Increasingly Sophisticated Methods of Cloaking Their Behavior When Breaching Networks

Hackers are Using Increasingly Sophisticated Methods of Cloaking Their Behavior When Breaching Networks

Vectra Network’s recently released Post Intrusion Report provides some good news and bad news for enterprise security teams. The good news shows evidence that companies are often detecting successful intrusions before intruders manage to exfiltrate data. The bad news is that intruders are developing new and more professional ways of hiding their presence.

Vectra Networks provides intrusion detection based on analysis of both “north-south traffic to and from the Internet as well as east-west internal traffic between network hosts.” It looks for and detects anomalous traffic behavior that indicates the presence of an intruder. This report is an analysis of metadata provided by participating customers – approximately 130 companies comprising 1.3 million hosts.

The good news stems from an initial bad start: all of the organizations showed signs of an existing and active intrusion. Vectra’s strength is in detecting the different stages in an intrusion kill chain: reconnaissance, lateral movement, and finally date exfiltration. It does this by applying scientific data analysis to traffic headers and traffic behavior.

Hacker Intrusion Report“Of the 120 participating organizations,” notes the report, “117, or 97.5%, detected at least one of these behaviors during each month of the study.” But despite the volume of active intrusions, “The good news is exfiltration behaviors are far and away the most rarely detected phase of attack in this report. The evidence means most attacks are detected and stopped before significant damage occurs.”

The bad news, however, is that cybercriminals are responding with increasingly sophisticated methods of cloaking their behavior. “They are aware that people are starting to watch the inside of the network so they’re getting much quieter about how they’re moving laterally,” Vectra’s Wade Williamson told SecurityWeek.

Williamson highlighted two particular examples. The first is that intruders are becoming less likely to attempt brute force against privileged credentials. A good example can be found in Phineas Fisher’s hack of the Hacking Team. Once inside the network he used common and tailored tools that would not show up as a traditional anomaly (but, Williamson told SecurityWeek, probably would have been detected by internal traffic analysis) to navigate the network until he ‘found’ the credentials he needed. Brute forcing would have been detected. Stealth and patience are keywords in modern intrusions.

“Once inside the network, attackers often attempt to steal passwords or Kerberos tickets from valid users. This gives attackers access to privileged resources without additional malware or exploits and avoids attracting the attention of security teams,” warns the report. Wiiliamson told SecurityWeek that “last year, brute force was the most commonly detected lateral movement, with Kerberos attacks third. This year the results have flipped.”

Advertisement. Scroll to continue reading.

The second example of increasing professionalism comes in the growing use of ‘hidden tunnels’. “We look for hidden tunnels inside of HTTP and HTTPS,” Williamson said. “In our previous report this was the 7th most detected exfiltration method; now it’s jumped to third. The intruder’s strategy is to embed small amounts of data within allowed normal conversations and protocols – he will embed some communication within an optional text field of an http packet. It doesn’t break the packet, it doesn’t make the normal web connection any different – but the destination server knows where to go to pick up the data. It’s like packet-level staganography,” he added. “This is a significant finding. It was rare in our last report, but it’s starting to move up to mainstream now. And it’s really difficult to detect this with traditional perimeter security.”

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Incident Response

Meta has developed a ten-phase cyber kill chain model that it believes will be more inclusive and more effective than the existing range of...

Artificial Intelligence

Two new surveys stress the need for automation and AI – but one survey raises the additional specter of the growing use of bring...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...