Characterizing Advanced Persistent Threats
Characterizing Advanced Persistent Threats
Volume 7 Article 5
Issue 1 HammerCon 2024 Issue
May 2024
Caleb Chang
University of Colorado, Colorado Springs (UCCS), [email protected]
Dr. Shouhuai Xu
University of Colorado, Colorado Springs (UCCS), [email protected]
Part of the Computer and Systems Architecture Commons, Computer Law Commons, Digital
Communications and Networking Commons, Intellectual Property Law Commons, International Relations
Commons, Military, War, and Peace Commons, National Security Law Commons, Other Computer
Engineering Commons, and the Systems Science Commons
Recommended Citation
Zeien, Logan; Chang, Caleb; Ear, LTC Ekzhin; and Xu, Dr. Shouhuai (2024) "Characterizing Advanced
Persistent Threats Through the Lens of Cyber Attack Flows," Military Cyber Affairs: Vol. 7 : Iss. 1 , Article
5.
Available at: https://digitalcommons.usf.edu/mca/vol7/iss1/5
This Article is brought to you for free and open access by the Open Access Journals at Digital Commons @
University of South Florida. It has been accepted for inclusion in Military Cyber Affairs by an authorized editor of
Digital Commons @ University of South Florida. For more information, please contact [email protected].
Characterizing Advanced Persistent Threats Through the Lens of Cyber Attack
Flows
Executive Summary
Effective cyber defense must build upon a deep understanding of real-world
cyberattacks to guide the design and deployment of appropriate defensive measures
against current and future attacks. In this abridged paper (of which the full paper is
available online), we present important concepts for understanding Advanced
Persistent Threats (APTs), our methodology to characterize APTs through the lens
of attack flows, and a detailed case study of APT28 that demonstrates our method’s
viability to draw useful insights. This paper makes three technical contributions.
First, we propose a novel method of constructing attack flows to describe APTs.
This abstraction allows technical audiences, e.g., defensive cyber operators, to
parse and infer valuable details, while allowing management- and business-minded
audiences to holistically visualize the attacks’ progression without being
overwhelmed by technical details. Second, we provide a case study on a real-world
APT to demonstrate the effectiveness of our attack flow methodology that
systematizes cyberattack tactics, techniques, and procedures. This technical
characterization potentially can, for example, train machine learning models to
detect and recognize such cyberattacks automatically. Third, we show that the
attack flow representation also allows us to draw insights into the strengths,
weaknesses, impact, and sophistication of APTs, as well as to identify potential
mitigation approaches. We find that APT28 tends to employ unsophisticated
techniques when possible and the root cause for APT28’s success is social
engineering. The full version of this paper details additional case studies and
comparative analysis of multiple APTs, leading to further insights.
Introduction
Cyberattacks are increasing in sophistication. Advanced Persistent Threats (APTs)
demonstrate this trend, consistently conducting well-prepared and orchestrated
attacks, which often advance nation-state objectives. Consequently, cyber
defenders must understand real-world APT cyber campaigns to derive effective
defensive strategies and technical mechanisms to safeguard their networks and
systems. Cyber threat analysts regularly analyze real-world APTs to produce Cyber
Threat Intelligence (CTI) reports to inform security teams, managers, and
executives. However, such reports often require significant time and domain
expertise to holistically understand the cyber incident (cf. CrowdStrike
Intelligence, 2022). Otherwise, the reports may convey sweepingly generalized
information too shallow to meaningfully derive practical cyber defense
mechanisms (Huntley, 2022; UK Government, 2021). These unsatisfying situations
prompt us to seek a more intuitive method for describing sophisticated APT cyber
activities. In this abridged paper (the full version is available online), we propose
such a method to support both technical audiences (practitioners who implement
cyber defense mechanisms), and management audiences, (cyber defense decision
makers).
Concepts
Cyberattack Tactic, Technique, and Procedures (TTP)
The MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK)
framework is commonly used in the industry by cyber threat and digital forensics
analysts to describe real-world cyber incidents in terms of tactics, techniques, and
procedures, which MITRE defines as follows (Strom et al., 2018):
https://digitalcommons.usf.edu/mca/vol7/iss1/5 2
Zeien et al.: Characterizing Advanced Persistent Threats
Using attack flows to analyze cyber incidents is more helpful than using
ATT&CK and Lockheed Martin’s Cyber Kill Chain to list techniques because
attack flows provide the ability to visualize the sequence and progression of cyber
activities. Continuing with the previous example, we can place the Brute Forcing
technique (T1110) against a firewall in the context of an attack flow for the overall
cyber operation to gain Initial Access to a victim’s internal network, Laterally Move
to a data-rich server, and Exfiltrate the sensitive data. Correspondingly, the kinetic
concept of reconnaissance by fire conducted by the cavalry unit may be part of a
kinetic operation where their scheme of maneuver is to penetrate the enemy
assembly area, locate the enemy’s battle plans, and retrieve it.
Methodology
To understand APTs through the lens of attack flows, we introduce the following
three-step methodology: (i) characterizing cyber campaigns in terms of attack
flows, encompassing their associated TTPs; (ii) evaluating the strengths and
weaknesses of an APT; and (iii) analyze the impact, sophistication, and potential
mitigations for an APT to draw insights. These steps are elaborated below.
Background of APT28
APT28, also known as Fancy Bear, is a reportedly a Russia-sponsored threat group
involved in data exfiltration and espionage. The main objective of APT28 is to
disclose sensitive data pertaining to Russia’s political agenda and influence
operations (FireEye, 2017). The damages from APT28 include: (i) the breach of the
Democratic Committees in 2016, that leaked thousands of politics-related files and
caused the mistrust of the 2016 presidential electoral process (CrowdStrike, 2020);
(ii) an attack against the World Anti-Doping Agency (WADA) in 2016, causing the
private health information leak of Olympic athletes (Brady, 2018); and (iii) the
compromise of corporate proprietary and individual private data from 2017 to 2021,
where APT28 directed brute-force techniques against hundreds of government and
private organizations (NSA, 2021).
Case Study: APT28 Attack Flows against U.S. Democratic Committees, 2016
In March 2016, APT28 targeted the Democratic Congressional Campaign
Committee (DCCC) and the Democratic National Committee (DNC) to steal and
expose data potentially damaging to the Clinton presidential campaign (Mueller,
2018). We observe three attack flows APT28 executed, which are highlighted in
Figure 1 and detailed below.
https://digitalcommons.usf.edu/mca/vol7/iss1/5 4
Zeien et al.: Characterizing Advanced Persistent Threats
T 8 T 8 T 8 T 8
T 8 T 8 EP Entry Point
IP Impact Point
Gmail Storage Server T 8 alid Accounts
APT 28 ( ) APT 28 ( )
Figure 1: Three attack flows employed by APT28 against DCCC and DNC.
Accounts, and the impact point, sustained by Exfiltration Over Web Services
(T1567), were both within the Gmail service.
https://digitalcommons.usf.edu/mca/vol7/iss1/5 6
Zeien et al.: Characterizing Advanced Persistent Threats
Insight 2. The root cause of APT28’s success tends to hinge on cyber social
engineering attacks.
Related Work
The importance of understanding offensive cyber operations has motivated many
studies and efforts in industry, academia, and government. First, industry has
proposed many frameworks, such as the Unified Kill Chain (Pols and Berg, 2017),
Lockheed Martin’s (2 5) Cyber Kill Chain, and MITRE’s ATT&CK framework
(Strom et al., 2018). In addition, companies such as Mandiant, Microsoft, and
CrowdStrike also provide CTI pertinent to APTs. The notion of cyberattack flow
we propose goes further by holistically representing real-world cyber incidents.
Conclusion
This study presented a methodology of using attack flows to analyze APT attacks
and demonstrated its usefulness in a case study on APT28. This led to a deepened
understanding of APT28’s strengths, weaknesses, impact, sophistication, and
mitigations. However, more research is required to deeply understand the vast array
of APTs. It would be beneficial to study the cybersecurity dynamics involved in
closely related offensive cyber operations, such as those demonstrated in the real-
world conflict between Russia and Ukraine. An initial study has been made towards
understanding such all-domain operations (Ear et al., 2024b).
https://digitalcommons.usf.edu/mca/vol7/iss1/5 8
Zeien et al.: Characterizing Advanced Persistent Threats
Acknowledgement
This paper was supported in part by a VICEROY grant, a DoD UC2 grant, and
Colorado State Bill 18- 86. The opinions expressed in the paper are the authors’
and do not necessarily reflect the view of the funding agencies or governments.
References
Axinte, Tiberius and Bogdan Botezatu (2017). Dissecting the APT28 Mac OS X
Payload. Tech. rep. url: https://download.bitdefender.com/resources/
files/News/CaseStudies/study/143/Bitdefender-Whitepaper-APT-Mac-A4-en-
EN-web.pdf.
Brady, Scott (2018). Indictment: United States of America vs. Aleksei Sergeyevich
Morenets et. al. url: https://nsarchive.gwu.edu/sites/default/files/documents
/5513708/United-States-v-Alexei-Sergeyevich-Morenets-et.pdf.
CISA (2020). North Korean Advanced Persistent Threat Focus: Kimsuky. url:
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20301a.
CrowdStrike (2020). CrowdStrike’s work with the Democratic National
Committee: Setting the record straight. url: https://www.crowdstrike.com/
blog/bears-midst-intrusion-democratic-national-committee/.
CrowdStrike Intelligence (2022). Early Bird Catches the Wormhole:
Observations from the Stellar Particle Campaign. url:
https://www.crowdstrike.com/ blog/observations-from-the-stellarparticle-
campaign/.
Ear, Ekzhin et al. (2 23). “Characterizing Cyber Attacks against Space Systems
with Missing ata: Framework and Case Study”. In: 2023 IEEE Conference
on Communications and Network Security (CNS). IEEE, pp. 1–9. doi:
10.1109/ CNS59707.2023.10289045.
— (2 24a). “Towards Principled Risk Scores for Space Cyber Risk
Management”. In: arXiv preprint arXiv:24 2. 2635. url: https://arxiv.org/
pdf/2402.02635.pdf.
— (2 24b). “Characterizing Russia’s Cyber Operations in Ukraine through the
Lenses of Cyber Attack Tactics, Techniques, and Procedures”. Manuscript
under review by USCYBERCOM Cyber Recon’2 24.
FireEye (2017). APT28: At The Center of The Storm. url: https://www2.
fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf.
Han, Yujuan et al. (2 2 ). “Preventive and Reactive Cyber Defense Dynamics with
Ergodic Time-dependent Parameters Is Globally Attractive”. In: IEEE TNSE
8.3, pp. 2517–2532.
Huntley, Shane (2022). An update on the threat landscape. url: https://blog.google/
threat-analysis-group/update-threat-landscape-ukraine/.
Lockheed Martin (2015). Gaining the Advantage: Applying Cyber Kill Chain
Methodology to Network Defense. url: https://www.lockheedmartin.com
/content/dam/lockheed-martin/rms/documents/cyber/Gaining_the_Advant
age_Cyber_Kill_Chain.pdf (visited on 02/13/2024).
Mireles, Jose et al. (2 6). “Extracting attack narratives from traffic datasets”. In:
2016 International Conference on Cyber Conflict, CyCon U.S. 2016,
Washington, DC, USA, October 21-23, 2016. Ed. by Aaron F. Brantly and Paul
Maxwell. IEEE Computer Society, pp. 118–123.
Mueller, RS (2018). Indictment: United States of America vs. Viktor Borisovich
Netyksho et. al. url: https://www.justice.gov/file/1080281/download.
NSA (2021). Russian GRU Conducting Global Brute Force Campaign to
Compromise Enterprise and Cloud Environments. url: https://media.
defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_
GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF.
Pols, Paul and Jan van den Berg (2 ). “The Unified Kill Chain”. In: CSA Thesis,
Hague, pp. 1–104. url: https://www.unifiedkillchain.com/assets/The-Unified-
Kill-Chain-Thesis.pdf.
Strom, Blake E et al. (2 8). “Mitre att&ck: esign and philosophy”. In: Technical
report. The MITRE Corporation. url: https://attack.mitre.org/docs/
ATTACK_Design_and_Philosophy_March_2020.pdf.
Tatam, Matt et al. (2 2 ). “A review of threat modelling approaches for APT-style
attacks”. In: Heliyon 7.1, pp. 1–19.
U.S. Army (2016). Army Doctrine Reference Publication 3-0: Operations. url:
https://usacac.army.mil/sites/default/files/publications/ADRP%203-
0%20OPERATIONS%2011NOV16.pdf.
https://digitalcommons.usf.edu/mca/vol7/iss1/5 10
Zeien et al.: Characterizing Advanced Persistent Threats