Watching Commodity Malware Get Sold to a Targeted Actor

Presented at Black Hat USA 2016, Aug. 3, 2016, 5:30 p.m. (30 minutes).

Detected breaches are often classified by security operation centers and incident response teams as either "targeted" or "untargeted." This quick classification of a breach as "untargeted," and the following de-prioritization for remediation, often misses a re-classification and upgrade process several attack groups have been conducting. As part of this process, assets compromised as part of broad, untargeted "commodity" malware campaigns are re-classified based on the organizational network they're part of to determine their potential value in the market. The higher value ones are upgraded and taken out of the "commodity" campaign to prepare them for a sale, for buyers planning a targeted attack. Organizations overlooking this often miss the opportunity to eliminate the threat prior to its escalation.

This session will cover the analysis of endpoint and network data captured during these re-classification operations, demonstrating the techniques and procedures used by some of the attack groups as they migrate compromised endpoints from the "commodity" threat platform to the valuable-target's platform. What measures can be taken to detect that a commodity threat is going through a migration process? How can this be leveraged to increase the efficiency of the incident response process?


Presenters:

  • Israel Barak - Cybereason
    Israel Barak has nearly decades of cybersecurity experience, including spending nine years in the Israel Defense Forces where he specialized in developing cyberdefense systems. At Cybereason, he leads the incident response team. Israel has also co-founded two cybersecurity companies, Q.rity, an Israeli company that was acquired by CITI Venture Capital International, and Sentrix.

Links:

Similar Presentations: