978 3 662 44885 4 - 5 - Chapter
978 3 662 44885 4 - 5 - Chapter
iMinds-DistriNet, KU Leuven
3001 Leuven, Belgium
{firstname.lastname}@cs.kuleuven.be
1 Introduction
Cyber attacks have existed since the adoption of the Internet and have evolved
a lot in the past decades, from viruses and worms in the early days to malware
and botnets nowadays. In recent years, a new class of threat, the “Advanced
Persistent Threat” (APT) has emerged. Originally used to describe cyber in-
trusions against military organizations, the APT has evolved and is no longer
limited to the military domain. As highlighted in several large-scale security
breaches [12,15,1,29], APTs are now targeting a wide range of industries and
governments.
While APT has drawn increasing attention from the industrial security com-
munity, a comprehensive and clear understanding of the APT research problem
is lacking. This paper presents the result of a detailed study of the APT phe-
nomenon, and contributes a taxonomy of phases, mechanisms, and countermeas-
ures. In this paper, we first identify the characteristics of APT, and compare it
to traditional threats in Section 2. In Section 3, we dissect a typical APT attack
into six phases, analyzing the techniques that are commonly used in each stage.
We also enumerate various countermeasure that can be applied to defend against
APT attacks. In Section 3.2, we provide case studies of four APTs, illustrating
the adversaries’ tactics and techniques by applying our presented taxonomy and
technical analysis.
2 Definition: what is APT?
APTs frequently made global headlines in recent years, and many feel that this
term is overloaded, since different people refer to it as different things. Because
so many different opinions of what constitutes an APT exist in the commercial
market [2,14,23], a clear definition is needed. In this paper, we adopt the defini-
tion given by US National Institute of Standards and Technology (NIST), which
states that an APT is [17]:
“An adversary that possesses sophisticated levels of expertise and significant
resources which allow it to create opportunities to achieve its objectives by using
multiple attack vectors (e.g., cyber, physical, and deception). These objectives
typically include establishing and extending footholds within the information
technology infrastructure of the targeted organizations for purposes of exfiltrat-
ing information, undermining or impeding critical aspects of a mission, program,
or organization; or positioning itself to carry out these objectives in the future.
The advanced persistent threat: (i) pursues its objectives repeatedly over an ex-
tended period of time; (ii) adapts to defenders’ efforts to resist it; and (iii) is
determined to maintain the level of interaction needed to execute its objectives”.
This definition provides a good base for distinction between traditional threats
and APTs. The distinguishing characteristics of APTs are: (1) specific targets
and clear objectives; (2) highly organized and well-resourced attackers; (3) a
long-term campaign with repeated attempts; (4) stealthy and evasive attack
techniques. We elaborate on each of these characteristics below.
Specific targets and clear objectives APT attacks are highly targeted at-
tacks, always having a clear goal. The targets are typically governments or organ-
izations possessing substantial intellectual property value. Based on the number
of APT attacks discovered by FireEye in 2013 [11], the top ten industry vertical
targets are education, finance, high-tech, government, consulting, energy, chem-
ical, telecom, healthcare, and aerospace. While traditional attacks propagate as
broadly as possible to improve the chances of success and maximize the harvest,
an APT attack only focuses on its pre-defined targets, limiting its attack range.
As for the attack objectives, APTs typically look for digital assets that bring
competitive advantage or strategic benefits, such as national security data, intel-
lectual property, trade secrets, etc., while traditional threats mostly search for
personal information like credit card data, or generically valuable information
that facilitates financial gain.
Highly organized and well-resourced attackers The actors behind APTs
are typically a group of skilled hackers, working in a coordinated way. They may
work in a government/military cyber unit [15], or be hired as cyber mercenaries
by governments and private companies [9]. They are well-resourced from both
financial and technical perspectives. This provides them with the ability to work
for a long period, and have access (by development or procurement) to zero-day
vulnerabilities and attack tools. When they are state-sponsored, they may even
operate with the support of military or state intelligence.
A long-term campaign with repeated attempts An APT attack is typically
a long-term campaign, which can stay undetected in the target’s network for
several months or years. APT actors persistently attack their targets and they
repeatedly adapt their efforts to complete the job when a previous attempt fails.
This is different from traditional threats, since traditional attackers often target
a wide range of victims, and they will move right on to something less secure if
they cannot penetrate the initial target.
Stealthy and evasive techniques APT attacks are stealthy, possessing the
ability to stay undetected, concealing themselves within enterprise network traffic,
and interacting just enough to achieve the defined objectives. For example, APT
actors may use zero-day exploits to avoid signature-based detection, and encryp-
tion to obfuscate network traffic. This is different from traditional attacks, where
the attackers typically employ “smash and grab” tactics that alert the defenders.
In Table 1, we summarize the differences between traditional threats and
APTs for several attack attributes.
Besides simply grabbing information from the web, attackers may also em-
ploy data mining techniques and big data analytics to automatically process the
gathered data, in order to produce actionable intelligence. Based on the gathered
intelligence, APT actors construct an attacking plan and prepare the necessary
tools. In order to be successful, attackers typically prepare various tools for dif-
ferent attack vectors, so that they can adapt tactics in case of failure.
(2) Delivery In this stage, attackers deliver their exploits to the targets. There
are two types of delivery mechanisms: direct and indirect delivery. For direct
delivery, the attackers send exploits to their targets via various social engineering
techniques, such as spear phishing.
Indirect delivery is stealthy. In this approach the attackers will compromise
a 3rd party that is trusted by the target, and then use the compromised 3rd
party to indirectly serve exploits. A trusted 3rd party can be a supplier of soft-
ware/hardware used in the targeted organization, or a legitimate website that is
frequently visited by the targeted persons (watering hole attack).
(3) Initial Intrusion Initial intrusion happens when the attacker get a first
unauthorized access to the target’s computer/network. While the attackers may
obtain access credentials through social engineering, and simply use them for
“legitimate” access, the typical way for intrusion is executing malicious code
that exploits a vulnerability in the target’s computer. The attackers first deliver
malicious code in the delivery stage, and then in the intrusion stage gain access
to target’s computer when the exploit is successfully executed.
In APT attacks, the attackers often focus on vulnerabilities in Adobe PDF,
Adobe Flash and Microsoft Office as well as Internet Explorer. While several
APT attacks [12,20] have leveraged zero-day exploits for initial intrusion, many
APT attacks also employ older exploits that target unpatched applications.
The initial intrusion is a pivotal phase in an APT attack, since the APT
actors establish a foothold in the target’s network in this stage. A successful
intrusion typically results in the installation of a backdoor malware. From this
point, the threat actors connects to the targets’ network. As a result, network
traffic is generated, and file evidences are left on the victims’ computers, which
gives defenders the chance to detect an APT in an early phase.
(4) Command and Control Upon successfully establishing a backdoor, APT
actors use Command and Control (C2) mechanisms to take control of the com-
promised computers, enabling further exploitation of the network. In order to
evade detection, the attackers increasingly make use of various legitimate services
and publicly available tools.
– Social networking sites. The attackers register accounts on various so-
cial networking sites, and put control information into blog posts or status
messages [16].
– Tor anonymity network. Servers configured to receive inbound connec-
tions only through Tor are called hidden services. Hosting C2 servers in Tor
as hidden services makes them harder to identify, blacklist or eliminate.
– Remote access tools (RATs) Although often used for legitimate remote
administration, RATs are often associated with cyber attacks [3,28]. A RAT
contains two components: a “server” residing on a victim’s endpoint, and a
“client” that is installed on the attackers machine. In order to make it work,
the “server” component needs to be delivered to the target’s machine first,
which is often accomplished via spear-phishing emails.
In order to better understand the APT attack model, we studied four APT
attacks reported in various sources [12,20,29,10], mapping the attackers’ action
into our six-stage model. The results are shown in Table 2.
3.3 Countermeasures
Due to the complexity and stealthiness of APTs, there is no single solution that
offers effective protection. The current best practice is a wide range of security
countermeasures resulting a multi-layered defense. However, due to the specific
nature of APTs, some of the existing defense systems need to be reengineered
to work in the APT context, hereby requiring additional research. For example,
while genetic algorithms have been proved useful for malware detection, their
applicability in a large dataset is subject of further study. We elaborate on some
defense techniques below.
Security Awareness Training Considering the wide use of social engineering
techniques (e.g., spear-phishing emails) in APT campaigns, security awareness
training plays an important role in defense. Besides the general best security
practices, the training should also provide education about APT attacks. Ac-
cording to an APT awareness study [8], more than half of the industries are not
awareness of the differences between APTs and traditional threats, and 67% of
respondents report the lack of awareness training relative to APTs.
Traditional Defense Mechanisms Traditional defense mechanisms are ne-
cessary since they block known attack vectors, and hence increase the difficulty
Name Operation RAS Breach [20] Operation Operation
Aurora [12] Ke3chang [29] SnowMan [10]
Active June 2009 - Unknown - May 2010 - Unknown -
Time December 2009 March 2011 December 2013 February 2014
Recon. and employees’ emails, employees’ emails, officials’ emails, identify weakness
Weaponi- zero-day exploits, zero-day exploits, trojanized docs, in vfw.org, RAT,
zation backdoor, and C2 trojanized docs, backdoor, and C2 backdoor
tools backdoor, RAT tools
Delivery spear phishing spear phishing spear phishing watering hole at-
(malicious links) (malicious xls file) (malicious zip file)tack (compromise
& infect vfw.org)
Initial drive-by download xls vulnerability victims open the drive-by download
Intrusion (CVE-2010-0249) (CVE-2011-0609) executable file (CVE-2014-0322)
Command custom C2 pro- Poison Ivy RAT custom C2 pro- ZxShell,
and Con- tocol, operating tocol, based on Gh0st RAT
trol on TCP port 443 HTTP protocol
Lateral compromise SCM, Perform privilege compromise in- unknown
Movement and obtain source escalation, gather ternal systems,
code SecureID data collect data
Data upload data to C2 compress, encrypt compress, encrypt unknown, could
Exfiltration servers data as RAR files, data as RAR files be US military
use FTP for trans- intelligence
mission
for APT actors. Common countermeasures that must be used are: patch man-
agement, anti-virus software, firewalls, host-based intrusion detection systems
(HIDS), network-based intrusion detection systems (NIDS), intrusion prevention
system (IPS), Security Information and Event Management (SIEM), content fil-
tering software, etc..
Security awareness training and traditional defense mechanisms do not ad-
equately address APTs. Defenders should combine them with the following state-
of-the-art countermeasures that are proposed to mitigate APTs.
4 Related Work
Existing research on APTs are mostly from industrial security community. Tra-
ditional security service providers (e.g., McAfee, Symantec) and emerging APT-
focused companies (e.g., FireEye, Mandiant) regularly publish technical reports
that document cases of APT attacks [18,1,15,11]. In [26], Thonnard et al. con-
ducted an in-depth analysis of of 18,580 email attacks that were identified as
targeted attacks by Symantec, and through the analysis, they showed that a
targeted attack is typically a long-running campaign highly focusing on a lim-
ited number of organizations.
Stages Attack techniques/tools Countermeasures
Reconnaissance and OSINT, Social engineering Security awareness training,
Weaponization Preparing malware Patch management, Firewall
Delivery Spear phishing, Content filtering software,
Watering hole attack NIDS, Anti-virus software
Initial Intrusion Zero-day exploits, Patch management, HIDS,
Remote code execution Advanced malware detection
Command and Exploiting legitimate services, NIDS, SIEM,
Control RAT, Encryption Event Anomaly detection
Lateral Movement Privilege Escalation, Access control, HIDS, NIDS,
Collecting data Event Anomaly detection
Data Exfiltration Compression, Encryption, Data Loss Prevention
Intermediary Staging
There are several articles [24,25] that briefly explained APT attacks and
discussed the detection techniques. However, they are not as comprehensive as
our presented analysis. As for the countermeasures, several academic researchers
proposed the use of big data analytics for APT detection [4,13].
5 Conclusion
APTs are sophisticated, specific and evolving threats, yet certain patterns can be
identified in the their process. In this paper, we focused on the identification of
these commonalities. Traditional countermeasures are needed but not sufficient
for the protection against APTs. In order to mitigate the risks posed by APTs,
defenders have to gain a baseline understanding of the steps and techniques
involved in the attacks, and develop new capabilities that address the specifics
of APT attacks. By studying public APT cases and the offerings of the security
industry, we presented this broad perspective on APT, which should establish
common ground within the security community and provide guidance for further
defensive research.
References