Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Understanding APT Hacking Tools Helps With Defense

Just like a hammer or wrench, hackers have tools in their digital toolboxes to make advanced persistent threat (APTs) campaigns simpler to manage and launch.

Just like a hammer or wrench, hackers have tools in their digital toolboxes to make advanced persistent threat (APTs) campaigns simpler to manage and launch.

Understanding these tools can help administrators identify APTs, argued Roland Dela Paz, threat researcher at Trend Micro. But there is a problem – hacking tools are grayware, and are not always detected by anti-malware products.

“Unfortunately, this means less visibility in APT forensic investigations,” he blogged.

Among the tools researchers often see are: password recovery tools, which are used to extract passwords or password hashes stored by local applications or the operating systems; user account clone tools; file manipulation tools for manipulating files such as copying, deleting and modifying timestamps; and FTP tools that help in FTP transactions like uploading files to a specific FTP site. Other commonly seen tools include data compression tools and scheduled job tools.

A good sign an organizations has been compromised are suspicious instances of command shell processes, Dela Paz explained.

“The tools listed above are either command line tools or runs both in command line and via GUI,” he blogged. “Attackers use these tools through a hidden command prompt instance thus regularly checking your environment for unknown command shell process can help you identify possible infection. Additionally, using process utilities such as Process Explorer will allow you to see the parameters in a command process. This may help you correlate possible components of an APT.”

Presence of the tools of course can also be a sign of compromise, and users should be wary of such software on their systems, he added. Sometimes, the tools are saved by the attackers using odd file names or with fake file extensions, and being able to identify added files on computer systems is important in detecting an attack.

In addition, organizations should pay attention to FTP connections in the network logs.

Advertisement. Scroll to continue reading.

“While it is more common to check for malicious C&C connections, checking for FTP connections gives another opportunity to identify a breach in your network,” he blogged. “In a corporate setting, FTP sites are usually Intranet sites. Thus, it is easier to sort out legitimate FTPs from malicious ones. FTP transactions are significantly smaller than other type communications in the network, which may allow you to identify a breach faster. Furthermore, checking for archive files or files with odd file names being uploaded to a remote site may also suggest compromise.”

Finally, he suggested organizations review scheduled jobs, which he called a common auto-start method for APTs and malware in general.

“By understanding targeted attacks from different perspectives, users, security administrators, as well as security researchers are empowered to better combat these threats,” Dela Paz noted. “Highlighting APT components, in this case, extend our visibility in identifying existing compromise by knowing what and where to look for.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...