Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Trend Micro Targets Advanced Persistent Threat C&C Communication With ‘Custom Defense’ Approach

Trend Micro has enhanced its ability to identify and block command and control (C&C) communications used by advanced persistent threats (APTs) targeting enterprises.

Trend Micro has enhanced its ability to identify and block command and control (C&C) communications used by advanced persistent threats (APTs) targeting enterprises.

According data released by TrendLabs, the company’s research arm, more than 1,500 active C&C sites were found, with the number of victims per site ranging from one to more 25,000. More than two-thirds of these sites had three or fewer active victims, and more than 25 percent of the sites had a lifespan of one day or less. More than half were gone after four days.

The challenge of detecting C&C communications of APTs is different than detecting C&C communications of botnets, said Kevin Faulkner, senior enterprise product marketing manager at Trend Micro. For one, APT C&C traffic is low-volume and intermittent, and attackers often use evasive methods such as masking traffic through redirections and establishing C&C servers inside the compromised network.  

The good news however is that organizations can still identify and analyze the communication according to activity patterns, he said.

“Once you’ve seen that pattern in a targeted attack,” he explained, “if you’ve got the right kind of technology you can look for that pattern – ‘oh, it’s 25 bytes followed by six bytes followed by a series of four-byte exchanges’… and you can look for that.”

Trend Micro’s answer to this challenge is its new Custom Defense approach, which combines global threat intelligence and technology to identify threats. Using its Smart Protection Network, Trend Micro seeks to automatically identify active C&C sites worldwide based on daily processing of 12 Billion IP/URL inquires and the correlation of over six terabytes of data. Using correlation engines, the company focuses on keeping up with constantly changing C&C addresses. The C&C detection is identified on a centralized console, and security efforts are aided by Threat Connect intelligence on the severity, activity, origins and related addresses of the C&C site.

In addition, Trend Micro Deep Discovery uses “fingerprint” detection of cloaked C&C traffic can identify attackers’ use of legitimate applications and websites, as well as other advanced techniques such as the use of internal C&C servers. Deep Discovery also utilizes custom sandbox analysis to discover new C&C destinations of zero-day malware attacks and update the Smart Protection Network and all customer security protection points, the company said.

“We really believe that not only the detection needs to get better, but also this kind of alerting for the customer so that they can react properly,” Faulkner said.

Advertisement. Scroll to continue reading.

Several Trend Micro products – including DeepDiscovery and InterScan Mail Security will include the new Custom Defense C&C functions, with Beta versions available in February 2013 and individual product general availability dates throughout the first half of 2013.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses.

Register

Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support.

Register

People on the Move

SSH Communications Security has appointed Pauli Haikonen as the company’s Chief Information Security Officer (CISO).

Cloud and container security firm Sysdig has tapped William Welch as CEO on its path to an IPO.

Dave Scher has been promoted to Deputy Chief Information Officer at MITRE.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.