Expert Comment On New Malware Strain Found In SolarWinds Hack

By   ISBuzz Team
Writer , Information Security Buzz | Jan 20, 2021 03:33 am PST

Please see below for comment from cybersecurity experts on the new strain of malware, Raindrop found in relation to SolarWinds:

Subscribe
Notify of
guest
2 Expert Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Dr. Anton Grashion
Dr. Anton Grashion , EMEA Director
January 22, 2021 5:11 pm

<p>The significance is there is incredible diversity in tools and tactics the attackers will use to create a beachhead. We believe that organizations, in addition to investigation/remediation activities, need to start operating and planning as if beachheads are inevitable and focus more on detecting and preventing the attacker activities after the beachhead has been established. It\’s way too easy for attackers to harvest credentials, move laterally, and escalate privileges once they\’re inside. Developing, and investing in, an Active Defense strategy to preemptively clean up credential and pathway information, reduces the attack surface and forces detections by transforming endpoints into a network of deceptions, necessary to create an environment that is hostile to attacker activities once they\’ve established a beachhead.  </p>

Last edited 3 years ago by Dr. Anton Grashion
Chris Morales
Chris Morales , Head of Security Analytics
January 20, 2021 1:12 pm

<p style=\"font-weight: 400;\">So we are now getting into the semantics of minutia of how different malware worked so they can be named and detected with a signature. This is all great after the fact once we already know the attack occurred, but it did not help when it mattered most.</p> <p style=\"font-weight: 400;\"> </p> <p style=\"font-weight: 400;\">While the malware strains might slightly vary, and I’m sure more will be exposed, the fact is the behaviours related to the malware has been consistent – network reconnaissance for user accounts and passwords (primarily AD) followed by lateral movement to targeted systems with privilege escalation.</p> <p style=\"font-weight: 400;\"> </p> <p style=\"font-weight: 400;\">Attackers can modify code and find different ways to execute the attack lifecycle, but no matter what they do the behaviours stay the same and are surprisingly consistent. During an attack, it does not matter who is responsible or how they are executing commands. It only matters that it is happening right now and what they are doing so that the organisation can mitigate it. This is where behaviours are strong with no prior knowledge of malware.</p>

Last edited 3 years ago by Chris Morales

Recent Posts

2
0
Would love your thoughts, please comment.x
()
x