Attacker Behavior Industry Report - 2018 Black Hat Edition - Vectra AI

Page created by Edwin Butler
 
CONTINUE READING
Attacker Behavior Industry Report - 2018 Black Hat Edition - Vectra AI
Attacker Behavior
Industry Report
2018 Black Hat Edition
Attacker Behavior Industry Report - 2018 Black Hat Edition - Vectra AI
I am artificial intelligence.
The driving force behind the hunt for cyberattackers.
I am Cognito.
Attacker Behavior Industry Report - 2018 Black Hat Edition - Vectra AI
TABLE OF CONTENTS

Background and methodology.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Operational efficiency and ROI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Threat and certainty scores.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Overall detection trends. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Threats by type per 10,000 host devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Threats by industry per 10,000 host devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

                                                                                      Vectra | Attacker Behavior Industry Report | 3
Attacker Behavior Industry Report - 2018 Black Hat Edition - Vectra AI
The Black Hat Edition of the Vectra® Attacker Behavior Industry Report provides a first-hand analysis of active and
persistent attacker behaviors inside cloud, data center and enterprise environments of Vectra customers from
January through June 2018.

The report examines a wide range of cyberattack detections and trends from a sample of more than 250 Vectra
customers with over 4 million devices per month and workloads from nine different industries.

The research in this report takes a multidisciplinary approach that spans all strategic phases of the attack lifecycle.
By using the AI-based Cognito™ platform to detect attacker behaviors, Vectra can identify exposure and risk within
organizations as well as indicators of damaging breaches.

Key findings                                                          Background and methodology
• Across all industries, there was an average of 2,354 attacker       The information in this report is based on anonymized metadata
 behavior detections per 10,000 host devices. Attacker behaviors      from Vectra customers who have opted to share detection metrics.
 from January-June 2018 showed a sharp increase over the same         Vectra identifies behaviors that indicate attacks in progress by
 period in 2017.                                                      directly monitoring all traffic and relevant logs, including traffic
• Overall, education had the most attacker behaviors at 3,958         to and from the internet, internal traffic between network host
 detections per 10,000 host devices.                                  devices, and virtualized workloads in private data centers and
• Energy (3,740 detections per 10,000 host devices) and               public clouds.
 manufacturing (3,306 detections per 10,000 host devices)
                                                                      This analysis provides important visibility into advanced phases
 showed a large amount of detections due to high levels of lateral
                                                                      of attacks. The Cognito platform from Vectra detects threats that
 movement. Energy and manufacturing are also large adopters of
                                                                      evade perimeter security controls and observes the progression of
 industrial IoT (IIoT) devices and have IT/OT system integration.
                                                                      attacks after the initial compromise.
• Command-and-control (C&C) activity in higher education
 continues to persist three-times above the industry average of 725   The 2018 Black Hat Edition of the Vectra Attacker Behavior
 per 10,000 host devices and exceeds every industry with 2,143        Industry Report also presents data by specific industries and
 detections per 10,000 host devices. These early attack indicators    highlights relevant differences between industries.
 usually precede other phases of attacks and are often associated
 with opportunistic botnet behaviors in higher education.             From January through June 2018, Vectra collected data on more
• The retail and healthcare industries have the lowest cyberattack-   than 4 million devices and workloads per month. On these
 detection rates, with 1,190 and 1,361 detections per 10,000 host     devices and workloads, Vectra detected over 10 million different
 devices, respectively.                                               attacker behaviors that were condensed to 668,000 detections.
• Botnet activity occurs most often in higher education, with 183
                                                                      These detections were then triaged down to 420,000 host
 detections per 10,000 host devices, which is three-times the
                                                                      devices and workloads. Across all participating organizations,
 industry average of 53 detections per 10,000 host devices. These
                                                                      for the six-month period, over 32,000 devices and workloads were
 opportunistic attack behaviors leverage host devices for external
                                                                      tagged as critical in risk and over 63,000 were tagged as high
 gain, such as bitcoin mining or outbound spam.
                                                                      in risk, enabling security analysts to respond quickly to mitigate
• Vectra customers achieved a 36X workload reduction for Tier-1
                                                                      these threats. On average, in a single month, 5,343 devices
 analysts in detection, triage, correlation and prioritization of
                                                                      and workloads were tagged as critical and 10,438 devices and
 security incidents, enabling them to focus on mitigating the
                                                                      workloads were tagged as high.
 highest-risk threats.
• When normalizing attacker detections per 10,000 host devices
                                                                      Operational efficiency and ROI
 compared to the previous year, there is a sharp increase in every
 industry for C&C, internal reconnaissance, lateral movement and      Cybersecurity is an ongoing exercise in operational efficiency.
 data exfiltration detections.                                        Organizations have limited resources to address unlimited risks,
                                                                      threats and attackers. This means that security products must
                                                                      always be evaluated in terms of their efficiency and impact on the
                                                                      operational fitness of the organization.

                                                                                                        Vectra | Attacker Behavior Industry Report | 4
Time is the most important factor in detecting hidden cyberattacks.        It is important to note that attacker behaviors are still only indicators
To mitigate damage, attacks must be detected in real time before           of compromise. Security analysts must take final action to validate
key assets are stolen or damaged. However, detecting and                   whether an attack is real. Cognito provides security analysts with
responding to targeted attacks is a very time-consuming process            the most important information in context, which can be used to
and requires security teams to manually sort through mountains             decide how to respond before an attack causes damage.
of alerts.
                                                                           There was a wide variance in the sizes of the networks analyzed,
Using artificial intelligence (AI), the Cognito platform from Vectra       with the smallest consisting of a few hundred host devices and
performs nonstop automated detection of threat behaviors in                workloads to the largest networks with more than 500,000.
real time. These behaviors are correlated with compromised host
                                                                           To account for this variance, the data has been normalized to a
devices, which are in turn correlated with common attack vectors
                                                                           network with 10,000 host devices and workloads, making it easier
and larger attack campaigns. Thousands of threat indicators are
                                                                           to compare the prevalence of threats in a network on a per capita
reduced to hundreds of attacker behaviors on dozens of host
                                                                           basis. Any host device with an IP address – including IoT devices,
devices that can be part of broader attack campaigns.
                                                                           smartphones, tablets and laptops – are monitored in addition to
                                                                           servers and virtualized workloads.

Reduction in workload for Tier-1 security analysts

                                                                                                                              1,601
                                                                                              2,354                           devices with

       10,000                                          44,017
                                                                                                                               detections
                                                                                               detections

                                                          events flagged
             devices observed

                                                                                                                         36x workload
                                                                                                                           reduction

Overall, Vectra reduced the investigation workload of security analysts by 36X compared to manually investigating all attacker behaviors
and compromised host devices. There is a significant uptick in the total number of events flagged and nearly twice the number of
detections per 10,000 host devices observed.

                                                                                                            Vectra | Attacker Behavior Industry Report | 5
Threat and certainty scores                                                                  Other factors that influence host device scores include repetition of
                                                                                             an observed detection or a combination of detections that indicate
The Cognito platform from Vectra monitors individual devices
                                                                                             a cyberattack is progressing toward its objective.
and workloads for extended periods of time and attributes
detections to any device or workload that behaves suspiciously.                              Every detection type has a maximum lifespan, ranging from a few
The detection scores and times they occurred are key inputs for                              days to a month. When a detection has no recurring activity, its
the host device threat-severity and certainty scores.                                        effect on a host device score slowly declines to zero. A detection
                                                                                             past its maximum lifespan becomes inactive and has no impact on
Cognito scoring is comprised of two dynamic metrics – threat and
                                                                                             the host device score.
certainty scores – applied to individual detections and the host
devices against which they are reported.
                                                                                                             HIGH                                                 CRITICAL
The threat score of a detection expresses the potential for harm

                                                                                                                         43                                       22
if the security event is true (e.g. if spamming behavior or data
exfiltration was occurring). Because a threat is a measure of the                                                                  Hosts                                Hosts

potential for harm, it reflects worst-case scenarios.

The certainty score of a detection reflects the probability that a
given security event occurred (e.g. the probability of spamming
behavior occurring, or the probability of data exfiltration occurring),
given all the evidence observed so far.                                                                             185            Hosts                          25    Hosts

Certainty is based on the degree of difference between the threat
                                                                                                             LOW                                                  MEDIUM
behavior that caused the detection and normal behavior. As such,
the certainty score of an individual detection changes over time.
                                                                                             On average, for every 10,000 host devices and workloads
Since detections are dynamic, changes in their scores cause                                  monitored in a one-month period, 22 were marked critical and
changes to attributed host device threat-severity and certainty                              43 were marked high. These devices and workloads present the
scores. Critical and high scores help security analysts prioritize                           greatest threat to the organization and require a security analyst’s
their investigation efforts because they represent behaviors with the                        immediate attention.
highest certainty and greatest potential to cause significant damage.

             Threat-severity and certainty scores per 10,000 host devices and workloads
                                                                                                            227

                                                                                                                                    210

             200
                                                                                                                                                            190
                                                                                     183
                                                              177

             150

                                       131

             100

                                                                                                  53
              50                                                                                                         46                       48
                                                    42                     43

                             28                                                 26           28        29                     28
                                                                      24                                            23                                 25
                                  22                     23                                                                                  21
                        17                    20

               0
                             January               February                March                  April                  May                      June

                                                                                                                                           Vectra | Attacker Behavior Industry Report | 6
                   Critical severity per 10,000          High severity per 10,000          Medium severity per 10,000              Low severity per 10,000
When breaking down host device statistics across vertical industries, Vectra benchmarked the volume of host devices and workloads
prioritized for each threat-severity and certainty level, both in relation to each vertical and as compared to the combined industry threat-
severity and certainty scores.

     400
                                                                                                                                                                                                                                              377

     350

     300
                                                                                                                                                                                                                     281

     250
                                                                                                                     221
                                                                                                                                                                                                203
     200                                           196

                               156
     150
                                                                                                                                               119                       121
                                                                         102                   103
     100
                                                                                                                                                                                                                                    83
                                                                                                           63                                                                                              62
                                                                                                                                                                                      48                                                 50
      50             43                    40 34                                                                                                                                                                36            37
                                                                                     35               31                                                                                   30         30
                23        26          27                      24                                                28                   23                        25                26
                                                         16                     19        18                                                              18        17
                                                                    12                                                           9        12
       0
                          y                  s                     il                     r
                                                                                                             ing                     are                        nt                     re                   y                            n
                 log                       ce               ta                       he                                                                    me                      isu                  erg                        tio
             no                        rvi               Re                     Ot                     tur                     lthc                                               e                   En                       ca
           ch                        Se                                                           ufa
                                                                                                      c
                                                                                                                            ea                         ern                     &L                                          Ed
                                                                                                                                                                                                                              u
        Te                                                                                      an                         H                    G    ov                   nt
                                                                                              M
                                                                                                                                                                in   me
                                                                                                                                                           r ta
                                                                                                                                                      Ente

           Critical severity per 10,000                                 High severity per 10,000                       Medium severity per 10,000                                     Low severity per 10,000

For example, the number of low alerts in higher education is                                                                   Threats by type per 10,000 host devices
almost twice the normal rate, which indicates attacker behaviors
                                                                                                                               To dig deeper, Vectra provides a breakdown of detection statistics
that are opportunistic.
                                                                                                                               by industry. The charts below show threat behaviors across the
Inversely, the healthcare industry has a low volume of host devices                                                            attack lifecycle. These behaviors are strong indicators of exposure
prioritized as high or critical, which indicates that cyberattacks in                                                          and risk in an organization and enable security analysts to focus
healthcare do not often progress deep into the attack lifecycle.                                                               their time and effort on what matters most.

                                                                                                                               While not every stage is necessary in an attack, each is
Overall detection trends
                                                                                                                               interrelated, and we often see an attack progress through the
• Detection rates: Organizations had an average of 1,707 host                                                                  lifecycle with the ultimate outcome of financial gain, data exfiltration
 devices with threat detections for every 10,000 host devices                                                                  or data destruction.
 in a one-month period. This represents a 36X reduction in the
 number of events requiring investigation and triage.                                                                          The data in this report represents in-progress attacker behaviors.

• C&C represented the highest percentage of detections:                                                                        Activity like C&C and reconnaissance occur in the earlier stages

 C&C traffic is a key component of a botnet attack and is an                                                                   of an attack, enabling organizations to quickly mitigate the

 enabler for later phases of a targeted attack. It is often the first                                                          threat before it can spread. These are the most common

 sign of an attack in targeted and opportunistic activity.                                                                     detected behaviors.

• Cognito from Vectra provides security teams with new
 efficiencies: While the symptoms of targeted attacks remain
 common, there are encouraging signs that security teams are
 finding and stopping attacks before damage is done.
• Cryptocurrency mining continues to be the most
 popular form of opportunistic attacks: While considered
 opportunistic, cryptocurrency mining continues to experience
 a surge in activity. These behaviors are seen predominantly in
 higher education, where student systems are cryptojacked or
 students perform the mining.
                                                                                                                                                                                            Vectra | Attacker Behavior Industry Report | 7
Behaviors like lateral movement occur later in the attack lifecycle as cybercriminals strengthen their foothold in an organization by stealing
administrative credentials to access servers. These types of detections warrant high-priority action from incident response teams to prevent
irreversible damage from a data exfiltration.

                  800

                  700

                  600

                  500
                                                                        55                98

                                                       53
                  400
                                                                       120
                                                                                         126
                                                       122
                  300                22
                                                                                                            30
                                     96                                143                                                   33
                                                                                         118               101
                  200                                  137                                                                   88
                                     91
                                                                                                            70
                                                                                                                             62
                  100                                                  170               165
                                     99                121                                                  96               84

                     0
                                  January           February          March             April              May              June

                         Botnet per 10,000         C&C per 10,000           Recon per 10,000

                         Lateral per 10,000        Exfil per 10,000

Botnets
Botnets are opportunistic attack behaviors in which a device makes money for its bot herder. The ways in which an infected host device can
be used to produce value can range from cryptomining to sending spam emails to producing fake ad clicks. To turn a profit, bot herders utilize
devices, their network connections and, most of all, the unsullied reputation of their assigned IP addresses.

                   10                1
                                                                                          0                 0
                                                                                          1                 1                 0
                                     1                                  0                                                     0
                                     0                                  0                 1                 1
                                     1                                                                                        1
                    8                                  0                1
                                                       0                                                    2
                                                       0                                                                      2
                                                                                          2
                                                       1
                                     3                                  2
                    6
                                                                                                            2
                                                       2                                                                      2
                                                                                          2
                                     2                                  2
                    4
                                                       2

                                                                                                            5
                                                                                                                              4
                    2                4                                                    4
                                                                        3
                                                       3

                    0
                                 January           February           March             April              May             June

                         Abnormal ad activity        Abnormal web activity         Cryptocurrency mining         Brute-force attack

                         Outbound DoS           Outbound port sweep          Outbound spam       Relay Communication

                                                                                                                  Vectra | Attacker Behavior Industry Report | 8
Command and control
C&C traffic occurs when a device appears to be under the control of an external malicious entity. Most often, the control is automated
because the device is part of a botnet or has adware or spyware installed.

Rarely, but most importantly, a device can be manually controlled by a nefarious outsider. This is the most threatening case, and it often
means the attack is targeted at a specific organization.

                       100

                                                                                                            15
                                                                           5                3
                        80                                                 2
                                                                                            6                                       3
                                                                                                             5
                                                                                                                                    2
                                                                                            3                3                      3

                                                                          25
                        60                                                                 21               24
                                                                                                                                 25

                                                         2                17
                        40                2                                                15
                                                                                                            14
                                          5              5                                                                       14
                                          2              2

                                          6              8
                                          3              3
                        20
                                                                          34               32
                                                                                                            31                   29
                                          22
                                                         21

                         0
                                     January          February          March             April            May                  June

                             External Remote Access           Hidden DNS CnC Tunnel        Hidden HTTP CnC Tunnel

                             Hidden HTTPS CnC Tunnel            Malware Update        Peer-to-Peer       Pulling Instructions

                             Stealth HTTP Post        TOR Activity       Threat Intelligence Match CnC           Suspicious Relay

Reconnaissance
Reconnaissance attacker behaviors occur when a device is used to map-out the enterprise infrastructure. This activity is often part of a
targeted attack, although it might indicate that botnets are attempting to spread internally to other devices. Detection types cover fast
scans and slow scans of systems, network ports and user accounts.

                       350

                                                         10

                       120                6
                                                                          11                               10
                                                                                          12
                                                         35                                                                     8
                                          23
                       100
                                                                                                           30
                                          3
                                                         4                40                                                    30
                                                                                          35
                        80
                                                                                                            4
                                          38                                                                                    6
                                                         39               4                3               15
                        60                                                                                                      14
                                                                                          15
                                                                          18                                8

                                                                                           7                                    11
                        40                13             9                7

                                                                                                           39
                                                                                          34                                    28
                                                         25               28
                        20                27

                                          8              9                8                7                9                   9
                         0
                                     January          February          March            April            May               June

                             File Share Enumeration        Internal Darknet Scan      Kerberos Account Scan           Port Scan

                             Port Sweep        RDP Recon          SMB Account Scan        Suspicious LDAP Query

                                                                                                                        Vectra | Attacker Behavior Industry Report | 9
Lateral movement
Lateral movement covers scenarios of lateral action meant to further a targeted attack. These can involve attempts to steal account
credentials or to steal data from another device.

It can also involve compromising another device to make the attacker’s foothold more durable or to get closer to target data. This stage of
the attack lifecycle is the precursor to moving into private data centers and public clouds.

                     120
                                                                             5                                 6

                     100                                                                                                         6
                                                                            21
                                                          6                                     6
                                                                                                               32
                                        6
                                                                                                                                 21
                                                          22                 5                19
                      80
                                        24                                  10                                                   4
                                                                                                               5
                                                                                                5                                6
                                                          5                                                    7
                                                                                                8
                                                          8
                      60                5
                                                                            34                                                   27
                                        9                                                                      26
                                                          23                                  25
                      40                18

                                                                             7                                 6                 7
                                                          6                                     6
                                        5
                      20

                                                          22                23                22               25                24
                                        20

                        0
                                     January           February           March              April           May                June

                            Automated Replication         Brute-Force Attack (internal)         Kerberos Brute Force         Kerberos Server Access

                            Ransomware File Activity           Shell Knocker Client        Shell Knocker Server         SMB Brute-Force Attack

                            SQL Injection Activity       Suspicious Admin             Suspicious Remote Desktop         Threat Intelligence Match Lateral

                            Suspicious Kerberos Account            Suspicious Kerberos Client

Data exfiltration
Data exfiltration behaviors occur when data is sent to the outside in a way that is meant to hide the transfer. Normally, legitimate data transfers do not
involve the use of techniques meant to hide the transfer. Indicators of exfiltration include the device transmitting the data, the location data is being sent
to, the amount of data being sent, and the method used to send it, such as a cloud file share.

                            60

                            50
                                                                                                                                        17
                                                                                                      16
                                                                                      13
                            40                                    22
                                                                                                                       15
                                                                                                                                        2
                                                                                      1
                                                                                                                        1
                            30

                                               22

                            20
                                                                                                      34                                35
                                                                                      33
                                                                                                                       30
                                                                  28

                            10
                                               13

                              0
                                             January           February           March              April             May             June

                                  Data Smuggler          Hidden HTTP Exfil Tunnel           Hidden HTTPS Exfil Tunnel          Smash and Grab

                                                                                                                               Vectra | Attacker Behavior Industry Report | 10
Threats by industry per 10,000 host devices
The bar chart below shows the volume of threat detections that were triggered in each industry. This view shows how each industry fared
per capita as well as which industries generated the most detections by volume.

Higher education and engineering represent the highest percentages of detections across all industries, primarily due to a high volume of
C&C (higher education) and reconnaissance (engineering).

                4000

                                                                                                                                                                                              290              604
                3500

                                                                                                                287
                                                                                                                                                                                                               540
                3000                                                                                                                                                                         1002

                                                   391                                                                                                                                                         488
                2500                                                                                            992                                                           215
                                    265

                2000                                                                                                                                                                          933
                                                   930                                                                                                                        999
                                    848                                              345

                1500
                                                                                                               1318                                    145
                                                                                     570
                                                                                                                                    187                                                                        2143
                                    659            731              182                                                                                490
                1000                                                                                                                371                                       839
                                                                    342              401
                                                                                                                                                                                             1499
                                                                                                                                    452                399
                 500                                                275
                                    734            664                               618                        674
                                                                                                                                                       342                    526
                                                                    366                                                             335
                                                                                                                                                       83                                                       183
                   0
                                     y              e                   il               r                       g                 re                  n    t                   re              y                    n
                              olo
                                  g            ic                  ta             he                        in                  ca                  me                      isu             erg             ati
                                                                                                                                                                                                                o
                           n              Serv                  Re             Ot                      ctur                  lth               rn                       Le              En             u   c
                         ch                                                                        ufa                He
                                                                                                                         a                  ve                       t&                             Ed
                      Te                                                                         an                                       Go                    en
                                                                                             M
                                                                                                                                                         inm
                                                                                                                                                     r ta
                                                                                                                                              E  nte

                           Botnet per 10,000                C&C per 10,000                   Recon per 10,000

                           Lateral per 10,000               Exfil per 10,000

Botnets by industry
The Cognito platform from Vectra observed an ongoing trend in cryptocurrency mining in higher education. Cryptocurrency mining has
experienced a surge in popularity among students who leverage free electricity in their dorms and cyberattackers who target student
systems with cryptojacking. Students do not have the same level of security controls as those found in enterprise organizations, making
them lucrative targets for botnet herders.

                200

                180                                                                                                                                                                                            4
                                                                                                                                                                                                               10
                                                                                                                                                                                                                5
                160

                140
                                                                                                                                                                                                               73

                100
                                                                                                                                                                              839
                 80
                                                                                                                                                      18                                                       15

                 60
                                                                                                                                                       8
                                                   7
                 40                                14
                                                                                                                6                                                              6                               71
                                                                                     5                                                                56
                 20                 5
                                                                    7                                                                                                         14
                                                   34                                                           16
                                    9                               6               12                                              6
                                                                    6                                           9                                                             14             10
                                    6                                                7                                              9
                  0
                                                                      l             er                                                                 nt
                               logy             ice               tai            h                         r   ing                 are            me                         ure          erg
                                                                                                                                                                                              y
                                                                                                                                                                                                               tio
                                                                                                                                                                                                                    n
                          no              Se
                                              rv               Re              Ot                     ctu                 lth
                                                                                                                               c
                                                                                                                                               rn                    L  eis            En              uca
                      ch                                                                        ufa                   He
                                                                                                                         a                  ve                    t&                                Ed
                   Te                                                                         an                                          Go                    en
                                                                                             M
                                                                                                                                                       inm
                                                                                                                                                  r ta
                                                                                                                                             Ente

                         Abnormal ad activity                 Abnormal web activity                    Cryptocurrency mining                        Brute-force attack

                         Outbound DoS                    Outbound port sweep                  Outbound spam                        Relay communication
                                                                                                                                                                                     Vectra | Attacker Behavior Industry Report | 11
C&C by industry
Due to the association between botnet and C&C traffic, the Cognito platform from Vectra found that higher education has the largest
volume of C&C behaviors, primarily related to external remote access and stealth HTTP posts.

Student systems often lack security controls that would normally detect and stop C&C behavior. Students are also more likely to visit
suspicious websites that harbor malware. Consequently, C&C attacks are much easier to execute in student environments.

    900
                                                                                                                                                                           55

    800
                                                                                                                                                                           146

    700
                                                                                                                                                                           34
                                                                                                                                                                           23
                    50
    600                                                                                                                                                   44
                    28
                    23                                                                                                                                                     141
                    24
    500
                 137                                                                                                                                      181              54
                                20                                                                                                       839
    400
                                             154
                                175
    300          137                                                                                                                     21
                                                              27                  96                                                                      171
                                             84                                                                                          92
                                                              25                                                                                                           437
    200                         70
                                                                                   74
                                             50               67
                                                                                                    79              126
                                                              34                                                                         119
                 240                                                                                35
    100                         173                                                                                                                       194
                                             150                                  159                               35
                                                              110                                   92
                                                                                                                    62                   83
      0
                                                l               r                                                    nt
               logy           ice           tai             the                   ing             are             me                  isu
                                                                                                                                         re
                                                                                                                                                        erg
                                                                                                                                                           y
                                                                                                                                                                         tio
                                                                                                                                                                             n
            no           Se
                           rv            Re               O                 tur              lthc                                    e               En               ca
          ch                                                           ufa
                                                                           c
                                                                                          ea                 ern                  &L                              Ed
                                                                                                                                                                     u
       Te                                                            an                  H                 ov                 t
                                                                    M                                    G                 en
                                                                                                                        inm
                                                                                                                te r ta
                                                                                                             En

           External Remote Access            Hidden DNS CnC Tunnel                      Hidden HTTP CnC Tunnel

           Hidden HTTPS CnC Tunnel                  Malware Update             Peer-to-Peer              Pulling Instructions

           Stealth HTTP Post          TOR Activity            Threat Intelligence Match CnC                      Suspicious Relay

                                                                                                                                            Vectra | Attacker Behavior Industry Report | 12
Reconnaissance by industry
Across the board, the Cognito platform from Vectra detected a large volume of darknet scans, which are scans of nonexistent IP addresses
on the network. This is quite common for attackers as the first form of reconnaissance behavior. It occurs after C&C communications are
established as the attacker looks for targets deeper in the network.

The Cognito platform also detected large volumes of suspicious LDAP in the manufacturing industry. A scan of information in an Active
Directory server is an effective way for an attacker to determine what accounts are privileged inside an organization’s network and the
names of servers and infrastructure components.

Cyberattackers prefer to use this form of reconnaissance because the risk of detection is relatively low, especially compared to a port
sweep or a port scan.

   1600

                                                                          243
   1400

   1200

   1000                                                                   643

                                                                                                                                                  133
    800            37                                                                                                              90             54

                  166                                                                                                              186
                                                                          45                                                                      253
    600            51         188                                         98                 223
                                                                                                                                   50
                                                                          41
                                                                                                              86
                  223         88                                                                                                   172            133
    400                                                                                                       47                                                   56
                                                                                                              41                                                   80
                              153                                                            238              54                   60
                   60                      53           48                411                                 52                                  272
                                                        62
    200                                    95
                                                                                             42                                    138
                  206         153          46                                                                 165                                                  247
                                                        130                                  116
                                           94                                                                                      132            93
                   39         56                                          65                 37               53
       0
                    y           e           il            r                 g                 re              n t                  re              y                 n
               olo
                   g          ic         ta             he                in               ca              me                   isu            erg               tio
                          erv         Re             Ot               tur             lth                                      e             En               ca
           ch
              n          S
                                                                 ufa
                                                                     c
                                                                                   ea                 ern                   &L                            Ed
                                                                                                                                                             u
       Te                                                      an                 H                 ov                  t
                                                              M                                    G                 en
                                                                                                                  inm
                                                                                                          te r ta
                                                                                                       En

            File Share Enumeration        Internal Darknet Scan           Kerberos Account Scan                     Port Scan

            Port Sweep        RDP Recon          SMB Account Scan               Suspicious LDAP Query

                                                                                                                                   Vectra | Attacker Behavior Industry Report | 13
Lateral movement by industry
In technology, services, manufacturing, financial and energy industries, the Cognito platform observed a large spike in Kerberos client
anomalous behaviors.

This indicates that a Kerberos account is being used differently than its learned baseline in several ways: Connecting to unusual domain
controllers using unusual devices; accessing unusual services; or generating unusual volumes of Kerberos requests using normal domain
controllers, usual devices and usual services.

In the technology, manufacturing and education industries, the Cognito platform detected a large volume of SMB brute-force behaviors,
which indicates that a device is making multiple login attempts with the same accounts to access a file server.

   1200

                     56
   1000                                                                                                                                     96

                  289            121

                                 29
    800                                                                            77                                                       282

                     59                                                                                                                                   244
                                 260                                               157
                                                                                                                                            33
    600           152
                                                                                   51                                                                     37
                                 83
                                                                                                                                            254           73
                                                               91
                                                                                                                                                          29
    400           252                                                              288
                                                                                                                     71                                   28               93
                                                               45                                                                                         29
                                                                                                                     44                                   27
                                                               44
                                 242
                                                               79                                    87
                                            92                                                                       90
    200              38
                                            37
                                                                                                                                                                           211
                                                               25
                                            46                                                       86                                                   303
                                                                                                                                            235
                  183            178                           162                 181
                                                                                                                     133
                                            94                                                       80                                                                    59
       0
                                               l               er                                                     nt
                  gy           ice         tai              h                      ing             are            me                      ure           erg
                                                                                                                                                            y
                                                                                                                                                                         tio
                                                                                                                                                                             n
               olo        Se
                            rv          Re                Ot                 tur              lthc                                    eis
                                                                                                                                                     En               ca
           ch
              n
                                                                        ufa
                                                                            c
                                                                                           ea                ern                   &L                             Ed
                                                                                                                                                                     u
       Te                                                             an                  H                ov                  t
                                                                     M                                    G                 en
                                                                                                                         inm
                                                                                                                 te r ta
                                                                                                              En

            Automated Replication       Brute-Force Attack (internal)                    Kerberos Brute Force                  Kerberos Server Access

            Ransomware File Activity        Shell Knocker Client                    Shell Knocker Server               SMB Brute-Force Attack

            SQL Injection Activity     Suspicious Admin                  Suspicious Kerberos Account                    Suspicious Kerberos Client

            Suspicious Remote Desktop              Threat Intelligence Match Lateral

                                                                                                                                            Vectra | Attacker Behavior Industry Report | 14
Exfiltration by industry
The most common exfiltration behavior is data smuggling, which was commonly observed across all industry verticals. It is detected
when an internal host device acquires a large amount of data from one or more servers and sends significant volumes of data to an
external system.

Smash-and-grab is the second most common exfiltration behavior across all industries. It is triggered when a host device transmits
unusually large volumes of data to destinations that are not considered normal for the environment within a short amount of time.

    500

    400                            79
                                                                                                                                                                           194

                                                                                                                                                          22

                     82                                                                                                                                   37
    300
                                                                                    34

    200                                                         69
                               344
                                                 58                                                  203                                 27               293
                  260                                                               263                                                  11                                267
                                                                                                                      35
     100
                                                                155
                                                 123                                                                                     123
                                                                                                                      93
                                                                                                     46
       0
                  gy            ce                 il            r
                                                                                    ing            are              en
                                                                                                                       t                 re                y                on
               olo           rvi                 ta          he                                                                       isu               erg             ati
              n           Se                  Re           Ot                ctur             lthc              rnm                  e               En                c
           ch                                                            ufa               ea                ve                   &L                              E du
        Te                                                             an                 H                Go              en
                                                                                                                              t
                                                                      M
                                                                                                                        inm
                                                                                                                   r ta
                                                                                                              Ente

             Data Smuggler              Hidden HTTP Exfil Tunnel           Hidden HTTPS Exfil Tunnel                     Smash and Grab

Conclusion
This edition of the Vectra Attacker Behavior Industry Report consisted of more than 4 million devices and workloads per month monitored over a
six-month period. Vectra would like to thank the organizations who opted-in to share metadata that was analyzed for this report. Overall, the trends
represent an increase in detections and attacker behaviors, which is cause for concern.

As sophisticated cybercriminals automate and increase the efficiencies of their own technology, there is an urgent need to automate attacker-
detection and response tools to stop threats faster.

At the same time, there remains a global shortage of highly skilled cybersecurity professionals to handle detection and response at a reasonable
speed. As a result, the use of AI is essential to augment existing cybersecurity teams so they can stay well ahead of attackers.

                                                                                                                                            Vectra | Attacker Behavior Industry Report | 15
Emailinfo@vectra.ai Phone +1 408-326-2020
vectra.ai
© 2018 All rights reserved. No part of the Vectra Attacker Behavior Industry Report may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording,
or other electronic or mechanical methods, except in the case of brief quotations embodied in certain noncommercial uses permitted by copyright law.

Vectra, the Vectra Networks logo and Security that thinks are registered trademarks and Cognito, Cognito Detect, Cognito Recall, the Vectra Threat Labs and the Threat Certainty Index are
trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.
You can also read