• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
network threats: a step by step attack demonstration

Network Threats: A Step-by-Step Attack Demonstration

You are here: Home / General Cyber Security News / Network Threats: A Step-by-Step Attack Demonstration
April 25, 2024

Stick to this actual-everyday living network attack simulation, covering 6 measures from Initial Obtain to Facts Exfiltration. See how attackers continue being undetected with the simplest resources and why you need to have numerous choke details in your defense technique.

Surprisingly, most network attacks are not extremely advanced, technologically highly developed, or reliant on zero-working day tools that exploit edge-circumstance vulnerabilities. As an alternative, they typically use generally accessible instruments and exploit numerous vulnerability points. By simulating a actual-globe network attack, security groups can examination their detection programs, assure they have a number of choke details in place, and exhibit the benefit of networking security to leadership.

In this report, we show a serious-everyday living attack that could quickly manifest in numerous techniques. The attack simulation was made based on the MITRE ATT&CK framework, Atomic Crimson Workforce, Cato Networks’ knowledge in the field, and general public danger intel. In the close, we clarify why a holistic security solution is crucial for network security.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The Great importance of Simulating a Actual-everyday living Network Attack

There are a few pros to simulating a real attack on your network:

  • You can exam your detections and make confident they determine and thwart attacks. This is important for working with run-of-the-mill attacks, which are the most prevalent types of attacks.
  • Real attacks aid you exhibit that defense depends on a number of choke details. An attack is pretty much never ever the outcome of a single issue of failure, and consequently, a one detection system isn’t plenty of.
  • Authentic attacks help you display the great importance of network monitoring to your leadership. They show how actual visibility into the network presents insights into breaches, enabling for effective mitigation, remediation, and incident reaction.
  • The Attack Circulation

    The attack movement demonstrated down below is based on six measures:

  • First Obtain
  • Ingress Tool Transfer
  • Discovery
  • Credential Dumping
  • Lateral Motion and Persistence
  • Information Exfiltration
  • These steps were selected considering the fact that they exemplify prevalent methods that are ubiquitous in attacks.

    Now, let us dive into each stage.

    1. Initial Entry

    The attack begins with spear-phishing, which establishes initial entry into the network. For instance, with an email despatched to an staff with a profitable career provide. The email has an attached file. In the backend, the malicious attachment in the email runs a macro and exploits a distant code execution vulnerability in Microsoft Business office with a Hoaxshell, which is an open up-source reverse shell.

    In accordance to Dolev Attiya, Employees Security Engineer for Threats at Cato Networks, “A defense-in-depth tactic could have been handy as early as this preliminary entry vector. The phishing email and the Hoaxsheel could have been caught by way of an antivirus engine scanning the email gateway, an antivirus on the endpoint or through visibility into the network and catching command and regulate of the network artifact created by the destructive doc. Multiple controls enhance the likelihood of catching the attack.”

    Network Attack
    Network Attack

    2. Ingress Device Transfer

    Network Attack

    The moment obtain is gained, the attacker transfers numerous tools into the procedure to aid with further more stages of the attack. This incorporates Powershell, Mimikatz, PSX, WMI, and more instruments that live off the land.

    Attiya provides, “Quite a few of these equipment are by now within the Microsoft Windows framework. Typically, they are utilized by admins to handle the system, but attackers can use them as properly for identical, albeit malicious, needs.”

    3. Discovery

    Now, the attacker explores the network to identify precious methods, like solutions, devices, workstations, area controllers, ports, extra qualifications, lively IPs, and far more.

    In accordance to Attiya, “Consider of this step as if the attacker is a vacationer traveling to a significant town for the very first time. They are asking individuals how to get to locations, wanting up buildings, checking road indications, and finding out to orient them selves. This is what the attacker is accomplishing.”

    Network Attack

    4. Credential Dumping

    The moment useful means are recognized the previously included instruments are utilized to extract credentials for numerous buyers to compromised methods. This allows the attacker get ready for lateral movement.

    5. Lateral Movement and Persistence

    With the credentials, the attacker moves laterally across the network, accessing other systems. The attacker’s goal is to extend their foothold by having to as a lot of consumers and equipment as attainable and with as substantial privileges as doable. This permits them to hunt for delicate documents they can exfiltrate. If the attacker obtains the administrator’s credentials, for case in point, they can attain access to massive components of the network. In a lot of scenarios, the attacker could possibly commence slowly but surely and program duties for a afterwards period of time to stay clear of currently being detected. This allows attackers to progress in the network for months without having producing suspicion and staying discovered.

    Network Attack

    Etay Maor, Sr. Director of Security Tactic, states “I can’t emphasize enough how popular Mimikatz is. It really is extremely successful for extracting passwords, and breaking them is simple and can acquire mere seconds. Every person works by using Mimikatz, even nation-state actors.”

    6. Knowledge Exfiltration

    Eventually, valuable knowledge is determined. It can be extracted from the network to a file-sharing procedure in the cloud, encrypted for ransomware, and much more.

    How to Defend From Network Attacks

    Successfully protecting in opposition to attackers demands many layers of detection. Every layer of security in the get rid of chain must be strategically managed and holistically orchestrated to avoid attackers from properly executing their plans. This tactic will help anticipate each attainable go of an attacker for a much better security posture.

    To look at this complete attack and find out additional about a protection-in-depth method, check out the complete masterclass right here.

    Discovered this write-up appealing? This short article is a contributed piece from a person of our valued associates. Comply with us on Twitter  and LinkedIn to go through additional unique content we post.


    Some areas of this report are sourced from:
    thehackernews.com

    Previous Post: «doj arrests founders of crypto mixer samourai for $2 billion DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions
    Next Post: North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures north korea's lazarus group deploys new kaolin rat via fake»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
    • Top 10 Best Practices for Effective Data Protection
    • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
    • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
    • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
    • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
    • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
    • Pen Testing for Compliance Only? It’s Time to Change Your Approach
    • 5 BCDR Essentials for Effective Ransomware Defense
    • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

    Copyright © TheCyberSecurity.News, All Rights Reserved.