Research Article: 2020 Vol: 21 Issue: 6
Hussin J. Hejase, Senior Researcher, Beirut, Lebanon
Hasan F. Fayyad-Kazan, Al Maaref University, Management Information
Technology, Beirut, Lebanon,
Imad Moukadem, Al Maaref University, Compuetr Science, Beirut, Lebanon
COVID-19 pandemic has become a major threat to all institutions, irrespective of its economic role, private and public, by threatening all the functions capitalizing on the Information and Communications Technology (ICT) infrastructure, networks, systems and Internet-based solutions including Internet of Things and Cloud computing. The field is open to advanced persistent threats (APTs) whereby the outcomes may become very costly to all institutions and governments across the globe. This paper aims to shed light on the premises of APT in order to provide awareness to what it is, understanding its functions and how to mitigate its impact on institutions of all sizes. The approach is based on descriptive analysis based on secondary data reported in books, journals, websites and blogs. The outcomes are presented as an eye opener to the current status-quo of systems and networks and how to remedy the aforementioned threats.
Advanced Persistent Threat, APT, ICT, Life Cycle, Mitigation, Cyberattacks.
An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an unauthorized person (an intruder) gains access to a network and stays there undetected for a long period of time (Rouse, 2020; Gonzalez, 2014). According to Jeun, et al. (2012), APT is an invention by a community involved in cyber-espionage to steal information for monetary gains. It was first coined by the United States Air Force in 2006 to describe sophisticated cyber-attacks against specific targets over long periods (Murray, 2011); (Websense, 2011); (Chen, et al., 2014); (Radzikowski, 2015); (Khan & Khan, 2019).
Accordingly, APTs are a sophisticated (Karthik, 2013); (Drew, 2014); (Radzikowski, 2015); Khan & Khan, 2019) cyberattack that use multi stage techniques (Jeun, et al. 2012); (Gonzalez, 2014); (Khan & Khan, 2019) to target and compromise systems that often go undetected for months (Karthik, 2013; Khan & Khan, 2019). Jeun, et al. (2012), contend that these attacks are sometimes so advanced, that even organizations with cutting edge cyber defenses are vulnerable. Google, Adobe Systems, Juniper Networks, and Symantec were all victims of an APT attack called Operation Aurora (Fortinet, 2014; (Radzikowski, 2015); (Khan & Khan, 2019); (Matthews, 2019).
Khan & Khan (2019) assert that APT attackers aim to gain economic (Karthic, 2013; Rouse, 2020), political, and strategic advantage through stealing information from the critical infrastructure and critical resources. APTs target particular organizations (Karthik, 2013; Virvilis et al., 2013). In fact, Rouse (2020) asserts that APT targets sectors such as national defense, manufacturing and the financial industry, as those companies deal with high-value information, including intellectual property, military plans, and other data from governments and enterprise organizations.
Chen et al. (2014) provide a set of differences between common malware and advanced persistent threat attach as shown in Table 1.
Table 1 Differences Between an Advanced Persistent Threat (APT) Attack and Common Malware Attacks | ||
Feature | APT Attacks | Common Malware Attacks |
Definition | Sophisticated, targeted, highly organized | Malicious software used to attack and disable any system |
Attacker | Government actors and organized criminal groups | A cracker (a hacker in illegal activities) |
Target | Diplomatic organizations, information technology industry and other sectors | Any personal or business computer |
Purpose | Filter confidential data or cause damage to specific target | Personal recognition |
Attack Life Cycle | Maintain persistence as possible using different ways | Ends when detected by the security actions (e.g., anti-virus software) |
In a summary, and according to Quadri & Khan (2019), APT are sophisticated, professional, state-supported and systematic cyber-attack programs that continue for an extended period and in which a group of skilled hackers coordinates to design the attack with a particular motive, targeting specific information in high-profile companies and governments. They seek privilege escalation and perimeter expansion using malware-laden email or malware-infested USB drives and then hide inside the critical systems to collect intellectual property and other asset information for further sabotage or corporate espionage.
APT Life Cycle
Many different researchers, IT groups and IT solution suppliers including government specialized groups have developed an array of anti-APT solution life cycle methodologies in their quest to study, analyze and mitigate the negative impacts of APT, and to develop appropriate security policies across the globe. Nevertheless, it is beneficial here to show as well the array of APT life cycles used to take over the attacked systems. According to Karthik (2013, February 21), finding a proven pattern to find defects early in an organization’s cycle saves not just money but also the time required to patch those defects.
Gonzalez (2014) quoting Cobb, assert that the APT life cycle consists of 6 phases: reconnaissance, spear phishing attacks, establishing presence, exploration and pivoting, data extraction, and maintaining persistence. Also, Bere et al. (2015) assert that APTAs are sophisticated multistep cyberattacks and to successfully infiltrate a network APTs follow a 6-stages attack: Choosing a victim, reconnaissance, delivery, exploitation, operation, data collection and exfiltration (Virvilis et al., 2013).
Indeed, it has been suggested that most sophisticated attackers, regardless of their motives, funding or control, tend to operate in a certain cycle when attacking their targets. Figure 1 shows the evolution of APTs and outlines the APT Life Cycle.
According to Radzikowski (2015), APTs represent a fundamental shift compared to the high-profile hacking events of prior years that commonly targeted networks. Focusing on the weakest links of one’s defense chain, APTs target specific system vulnerabilities and, more importantly, specific people. While the victimized organizations vary in size, type, and industry, the individuals they [APTs] target usually fit the same profile: people with the highest-level access to the most valuable assets and resources (Villeneuve & Bennett, 2012).
Mediating APTs
“Cybersecurity professionals find themselves struggling to keep up with technical innovation as learning resources for would-be hackers have increased and are often freely available online. The Metasploit framework has revolutionized vulnerability testing, making powerful vulnerability scanners freely available to anyone who calls themselves a penetration tester” (ISACA, 2013). According to Holik et al. (2014), Metasploit framework performs a penetration test, that is, it simulates an attacker's malicious activity. However, in order to keep a proactive stance against cyberattacks, simulation of malicious activities is performed as a major function in the development of appropriate solutions. This is where threat modeling comes to close the gaps to the detected vulnerabilities of the existing software and IT systems. Threat modeling is a tested and proven method (Shevchenko, 2018) to meet the aforementioned objective.
Threat Modeling
According to EC-Council (2020), “Threat modeling can be defined as a structured process in which IT professionals and cybersecurity experts can detect likely security vulnerabilities and threats, measure the severity of each potential impact, and prioritize methods to protect IT infrastructure and mitigate attacks” (Para 2). Furthermore, “threat modeling methodologies can be applied to develop:
1. A collection of probable threats that may arise
2. An abstraction of the system
3. The profiles of likely malicious attackers, their goals, and techniques” (ibid).
For example, “threat modeling is a core element of the Microsoft Security Development Lifecycle (SDL). It’s an engineering technique one can use to help identify threats, attacks, vulnerabilities, and countermeasures that could affect one’s application. Threat modeling is used to shape one’s application's design, meet the company's security objectives, and reduce risk” Microsoft (2020). For the aforementioned purpose, there are five major threat modeling steps:
Defining security requirements; creating an application diagram; identifying threats; mitigating threats, and validating that threats have been mitigated.
Threat modeling should be part of one’s routine development lifecycle, enabling the end user to progressively refine one’s threat model and further reduce risk. In Fact according to Microsoft (2020), “the Threat Modeling Tool” enables any developer or software architect to:
1. Communicate about the security design of their systems.
2. Analyze those designs for potential security issues using a proven methodology.
3. Suggest and manage mitigations for security issues.
The Kill Chain
Smart (2011) introduced a United States Department of Defense Joint Staff methodology labeled, “kill chain” as a “guide to cyber targeting in five key areas: (1) positive identification of targets, (2) location of targets, (3) attribution of attack, (4) capability/target pairing, and (5) assessment of potential collateral damage” (p.70).
According to Smart (2011), an updated ‘JP 3-60’ approach should “introduce the concepts of an adversary’s cyber center of gravity and a cyberspace joint operations area. An adversary’s cyber presence consists of computers, information systems, hardware, online personas, and so forth, which may be geographically separated from his physical center of gravity. Once planners identify the cyber center of gravity (a critical point—a source of power for the adversary’s cyber operations), they can target it” (p. 72).
Effective Defense against Intrusion
Hutchins, ET al. (2011) contends that defenders against APTs can generate metrics to build systems’ resiliency by measuring the performance and effectiveness of defensive actions against the cyberattacks and intruders. They provide an example whereby “a series of intrusion attempts from a single APT campaign that occurs over a seven month timeframe Figure 2. For each phase of the kill chain, a white diamond indicates relevant, but passive, detections were in place at the time of that month’s intrusion attempt, a black diamond indicates relevant mitigations were in place, and an empty cell indicates no relevant capabilities were available. After each intrusion, analysts leverage newly revealed indicators to update their defenses, as shown by the gray arrows” (p. 6).
Figure 2 Illustration of the Relative Effectiveness of Defenses Against Subsequent Intrusion Attempts (Hutchins et al., 2011)
Therefore, by framing metrics in the context of the kill chain, defenders had the proper perspective of the relative effect of their defenses against the intrusion attempts and where there were gaps to prioritize remediation (Hutchins et al. 2011).
Examples of Advanced Persistent Threats
Usually, APT intruders use advanced attack methods to gain access to the targeted institution including advanced exploits of zero-day vulnerabilities, highly-targeted spear phishing and other social engineering techniques (Rouse, 2020). To maintain continuous access to the targeted network without being discovered, intruders or cyber-attackers “use advanced methods, including continuously rewriting malicious code to avoid detection and other sophisticated evasion techniques. Some APTs are so complex that they require full-time administrators to maintain the compromised systems and software in the targeted network” (Rouse, 2020).
APTs are usually assigned names by their discoverers, though many advanced persistent threat attacks have been discovered by more than one researcher, so some are known by more than one name. Table 2 depicts a summary of the examples.
Table 2 Examples of APTS | ||
Name/Identification | Functionality | Country of Origin |
Moonlight Maze 1999 |
Penetrated systems at the Pentagon, NASA and U.S. Department of Energy, as well as universities and research labs involved in military research | Not definite |
Several APTs 2003 |
Against U.S. government targets in an attempt to steal sensitive state secrets, military data from high-end systems of government agencies, including NASA and the FBI | China: Titan Rain campaign |
The Sykipot APT malware family 2006 |
Collecting and stealing secrets and intellectual property, including design, financial, manufacturing and strategic planning information. The attacks employ spear-phishing emails containing a malicious attachment or a link to an infected website, as well as zero-day exploits. [Attack on UK & USA] | China |
GhostNet cyberespionage operation 2009 |
Used spear phishing emails containing malicious attachments. Gaining access to the network devices of government ministries and embassies. | China |
Stuxnet worm 2010 |
Used to attack Iran's nuclear program. The malware targeted SCADA (supervisory control and data acquisition) systems and was spread with infected USB devices | USA & Israel |
Duqu 2011 |
Captured information such as keystrokes and system information, most likely for the purpose of enabling a future APT attack on industrial control systems. | Server addresses scattered across many countries, including Germany, Belgium, the Philippines, India and China |
Flame: Sophisticated cyber espionage 2012 |
Attacks on governmental ministries, educational institutions and individuals in Middle Eastern countries, infecting around 1,000 machines in Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia and Egypt. | U.S. National Security Agency, CIA and Israel’s military |
Eurograbber | Via phishing attemps. Stolen an estimated 36 million euro from more than 30,000 customers in over 30 banks across Europe. The attacks began in Italy and quickly spread to Spain, Germany and Holland. | Customized variants of the Zeus, SpyEye, and CarBerp Trojans |
APT-28 | Attacks against military and government targets in Eastern Europe, including Ukraine and Georgia, as well as campaigns targeting NATO organizations and U.S. defense contractors | Russian groups: Fancy Bear, Pawn Storm, Sofacy Group and Sednit |
APT-29 2015 & 2016 |
Spear phishing attack on the Pentagon, as well as the 2016 attacks on the Democratic National Committee | Russian Cozy Bear |
APT-34 2017 |
Targeted companies in the Middle East with attacks against financial, government, energy, chemical and telecommunications companies. | Iran Group: FireEye |
APT-37 2017 |
Spear phishing attacks exploiting an Adobe Flash zero-day vulnerability | North Korea: Reaper, StarCruft and Group 123 |
Ransomware 2007 Ongoing |
200 cyber incidents targeting financial institutions since 2007 | Multiple countries |
Detecting APTs
Advanced persistent threats have certain warning signs despite typically being very hard to detect. An organization may notice certain symptoms after it has been targeted by an APT, including (Rouse, 2020):
1. Unusual activity on user accounts
2. Extensive use of backdoor Trojan horse malware, a method that enables APTs to maintain access; odd or uncharacteristic database activity, such as a sudden increase in database operations involving massive quantities of data; and
3. Presence of unusual data files, which may indicate data that has been bundled into files to assist in the exfiltration process.
4. Detecting anomalies in outbound data is perhaps the best way for cybersecurity professionals to determine if a network has been the target of an APT attack. Collected from Rouse (2020); IT Business Edge (2020); (Hejase & Hejase, 2011); (Paganini, 2012); (Lyles, 2017); (Carnegie Endowment, 2020).
Organizational awareness and having top management with technology and information literacy presiding over an institution are the first building blocks to proactively mitigate threats against the organizational cybersecurity. In fact, “administrators must learn how to use emerging technology effectively so that it actually provides additional protection” (Cobb, 2013). Moreover, Quintero-Bonilla & del Rey (2020) warn that “the increasing development of sophisticated tools used by cybercriminals, such as zero-day vulnerabilities and denial of service (DoS) attacks, conventional solutions cannot cope with the current complexity of these types of threats” (Quintero & Martin 2020). Furthermore, they assert that “cybersecurity is responsible for establishing security policies; these policies set out the steps to follow for data to be managed within the technological infrastructure in an organization. However, some security flaws and vulnerabilities (e.g., the use of outdated equipment, use of policies that are not reviewed continuously, failing to install updates at time, awareness deficiency) allow attackers to realize an intrusion in an organization” (Quintero & Martin 2020).
Radzikowski (2015) recommends that “advance incident response planning can significantly improve organizational chances of early detection and more effective remediation. The key to effective APT protection, detection, and response is rigorous implementation of security best practices and ongoing education with your most highly targeted users. On the other hand, Hejase & Hejase (2015) stress that fact that government, businesses and educational institutions should join efforts to at least start an awareness campaign that may reach all ears in order to get the terms cyberwarfare, cyber-attacks, cybersecurity and cyber-weapons into the dictionary of every day words, simply because “the threat of a cyber-attack is ever present and will not go away” (p. 87).