In the recent SecureWorks APT report, it found that Elirks backdoor connections were involved in many advanced...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
persistent threat (APT) attacks because they look like legitimate traffic. Is there any way to detect and/or thwart APT attacks that hide via Elirks or similar services?
To avoid detection, many attackers attempt to disguise attacks amidst legitimate traffic because analyzing all traffic for APT detection requires more effort than analyzing just the known bad traffic. With the prevalence of encrypted traffic, identifying a backdoor connection as being either part of an attack or a legitimate remote access connection can be very difficult. If the system in question doesn't normally make certain kinds of connections or only makes Windows file sharing connections to approved enterprise file servers and connects outbound to websites, white listing known legitimate traffic and investigating any other traffic might be an easy option. Companies can also use blacklists or reputation services to block known malicious network connections.
According to the Dell SecureWorks APT report, the Elirks backdoor uses the microblogging service Plurk for part of the command-and-control functionality of the botnet, but traffic from Plurk could also emanate from the likes of Flicker, Google Images, YouTube and so on. All of these legitimate websites could be used to create a command-and-control infrastructure, even if it is just to serve as a backup if the peer-to-peer bot loses contact with other peers. Dell SecureWorks sells an appliance that can detect Elirks botnet traffic and other vendors, including FireEye, Damballa and Arbor Networks, offer appliances that can detect or block botnets.
Ask the expert
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Dig Deeper on Real-time network monitoring and forensics
Related Q&A from Nick Lewis
A malvertising campaign by the AdGholas group has been found spreading the Stegano exploit kit. Expert Nick Lewis explains how web advertisements are...continue reading
Rakos malware is attempting to build a botnet by attacking embedded Linux systems. Expert Nick Lewis explains how enterprises can prevent attacks on ...continue reading
The Switcher Trojan spreads to Android devices through the wireless router to which they are connected. Expert Nick Lewis explains how this attack is...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.