Insider threats, supply chains, and IoT: Breaking down a modern-day cyber-attack
It’s ten to five on a Friday afternoon. A technician has come in to perform a routine check on an electronic door. She enters the office with no issues – she works for a trusted third-party vendor, employees see her every week. She opens her laptop and connects to the Door Access Control Unit, a small Internet of Things (IoT) device used to operate the smart lock. Minutes later, trojans have been downloaded onto the company network, a crypto-mining operation has begun, and there is evidence of confidential data being exfiltrated. Where did things go wrong?
Threats in a business: A new dawn surfaces
As organizations keep pace with the demands of digital transformation, the attack surface has become broader than ever before. There are numerous points of entry for a cyber-criminal – from vulnerabilities in IoT ecosystems, to blind spots in supply chains, to insiders misusing their access to the business. Darktrace sees these threats every day. Sometimes, like in the real-world example above, which will be examined in this blog, they can occur in the very same attack.
Insider threats can use their familiarity and level of access to a system as a critical advantage when evading detection and launching an attack. But insiders don’t necessarily have to be malicious. Every employee or contractor is a potential threat: clicking on a phishing link or accidentally releasing data often leads to wide-scale breaches.
At the same time, connectivity in the workspace – with each IoT device communicating with the corporate network and the Internet on its own IP address – is an urgent security issue. Access control systems, for example, add a layer of physical security by tracking who enters the office and when. However, these same control systems imperil digital security by introducing a cluster of sensors, locks, alarm systems, and keypads, which hold sensitive user information and connect to company infrastructure.
Furthermore, a significant proportion of IoT devices are built without security in mind. Vendors prioritize time-to-market and often don’t have the resources to invest in baked-in security measures. Consider the number of start-ups which manufacture IoT – over 60% of home automation companies have fewer than ten employees.
Insider threat detected by Cyber AI
In January 2021, a medium-sized North American company suffered a supply chain attack when a third-party vendor connected to the control unit for a smart door.
The technician from the vendor’s company had come in to perform scheduled maintenance. They had been authorized to connect directly to the Door Access Control Unit, yet were unaware that the laptop they were using, brought in from outside of the organization, had been infected with malware.
As soon as the laptop connected with the control unit, the malware detected an open port, identified the vulnerability, and began moving laterally. Within minutes, the IoT device was seen making highly unusual connections to rare external IP addresses. The connections were made using HTTP and contained suspicious user agents and URIs.
Darktrace then detected that the control unit was attempting to download trojans and other payloads, including upsupx2.exe and 36BB9658.moe. Other connections were used to send base64 encoded strings containing the device name and the organization’s external IP address.
Cryptocurrency mining activity with a Monero (XMR) CPU miner was detected shortly afterwards. The device also utilized an SMB exploit to make external connections on port 445 while searching for vulnerable internal devices using the outdated SMBv1 protocol.
One hour later, the device connected to an endpoint related to the third-party remote access tool TeamViewer. After a few minutes, the device was seen uploading over 15 MB to a 100% rare external IP.
Security threats in the supply chain
Cyber AI flagged the insider threat to the customer as soon as the control unit had been compromised. The attack had managed to bypass the rest of the organization’s security stack, for the simple reason that it was introduced directly from a trusted external laptop, and the IoT device itself was managed by the third-party vendor, so the customer had little visibility over it.
Traditional security tools are ineffective against supply chain attacks such as this. From the SolarWinds hack to Vendor Email Compromise, 2021 has put the nail in the coffin for signature-based security – proving that we cannot rely on yesterday’s attacks to predict tomorrow’s threats.
International supply chains and the sheer number of different partners and suppliers which modern organizations work with thus pose a serious security dilemma: how can we allow external vendors onto our network and keep an airtight system?
The first answer is zero-trust access. This involves treating every device as malicious, inside and outside the corporate network, and demanding verification at all stages. The second answer is visibility and response. Security products must shed a clear light into cloud and IoT infrastructure, and react autonomously as soon as subtle anomalies emerge across the enterprise.
Darktrace’s Cyber AI Analyst reported on every stage of the attack, including the download of the first malicious executable file.
Cyber AI Analyst investigated the C2 connectivity, providing a high-level summary of the activity. The IoT device had accessed suspicious MOE files with randomly generated alphanumeric names.
Not only did the AI detect every stage of the activity, but the customer was also alerted via a Proactive Threat Notification following a high scoring model breach at 16:59, just minutes after the attack had commenced.
Third parties coming in to tweak device settings and adjust the network can have unintended consequences. The hyper-connected world which we’re living in, with the advent of 5G and Industry 4.0, has become a digital playground for cyber-criminals.
In the real-world case study above, the IoT device was unsecured and misconfigured. With rushed creations of IoT ecosystems, intertwining supply chains, and a breadth of individuals and devices connecting to corporate infrastructure, modern-day organizations cannot expect simple security tools which rely on pre-defined rules to stop insider threats and other advanced cyber-attacks.
The organization did not have visibility over the management of the Door Access Control Unit. Despite this, and despite no prior knowledge of the attack type or the vulnerabilities present in the IoT device, Darktrace detected the behavioral anomalies immediately. Without Cyber AI, the infection could have remained on the customer’s environment for weeks or months, escalating privileges, silently crypto-mining, and exfiltrating sensitive company data.
Thanks to Darktrace analyst Grace Carballo for her insights on the above threat find.
|137.175.56[.]104||.rar file download endpoint|
|9b8222887450cb6efeac6d738de5962de9c0e4a3||SHA1 hash of RAR file|
|087ce02c20903ebe83535f95a8ff2919de732fe1||SHA1 hash of RAR file|
|65c328dd4da25babe0c8afbca4a0bebf1919899a||SHA1 hash of RAR file|
|172.106.32[.]32||Possible C2 server|
|45.32.155[.]0||Possible C2 server|
|/36BB9658.moe||URI observed in HTTP connections|
|70.39.123[.]18||.exe file download endpoint|
|104.233.207[.]172||.exe file download endpoint|
Darktrace model detections:
- Anomalous File/Anomalous Octet Stream
- Anomalous Connection/New User Agent to IP Without Hostname
- Unusual Activity/Unusual External Connectivity
- Device/Increased External Connectivity
- Anomalous Server Activity/Outgoing from Server
- Device/New User Agent and New IP
- Compliance/Cryptocurrency Mining Activity
- Compliance/External Windows Connectivity
- Anomalous File/Multiple EXE from Rare External Locations
- Anomalous File/EXE from Rare External Location
- Device/Large Number of Model Breaches
- Anomalous File/Internet Facing System File Download
- Device/Initial Breach Chain Compromise
- Device/SMB Session Bruteforce
- Device/Network Scan- Low Anomaly Score
- Device/Large Number of Connections to New Endpoint
- Anomalous Server Activity/Outgoing from Server
- Compromise/Beacon to Young Endpoint
- Anomalous Server Activity/Rare External from Server
- Device/Multiple C2 Model Breaches
- Compliance/Remote Management Tool on Server
- Anomalous Connection/Data Sent to New External Device