In the recent SecureWorks APT report, it found that Elirks backdoor connections were involved in many advanced...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
persistent threat (APT) attacks because they look like legitimate traffic. Is there any way to detect and/or thwart APT attacks that hide via Elirks or similar services?
To avoid detection, many attackers attempt to disguise attacks amidst legitimate traffic because analyzing all traffic for APT detection requires more effort than analyzing just the known bad traffic. With the prevalence of encrypted traffic, identifying a backdoor connection as being either part of an attack or a legitimate remote access connection can be very difficult. If the system in question doesn't normally make certain kinds of connections or only makes Windows file sharing connections to approved enterprise file servers and connects outbound to websites, white listing known legitimate traffic and investigating any other traffic might be an easy option. Companies can also use blacklists or reputation services to block known malicious network connections.
According to the Dell SecureWorks APT report, the Elirks backdoor uses the microblogging service Plurk for part of the command-and-control functionality of the botnet, but traffic from Plurk could also emanate from the likes of Flicker, Google Images, YouTube and so on. All of these legitimate websites could be used to create a command-and-control infrastructure, even if it is just to serve as a backup if the peer-to-peer bot loses contact with other peers. Dell SecureWorks sells an appliance that can detect Elirks botnet traffic and other vendors, including FireEye, Damballa and Arbor Networks, offer appliances that can detect or block botnets.
Ask the expert
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Dig Deeper on Real-time network monitoring and forensics
Related Q&A from Nick Lewis
The CIA Vault 7 cache exposed the Brutal Kangaroo USB malware, which can be spread to computers without an internet connection. Learn how this is ...continue reading
Kaspersky Lab recently accused Windows 10 of acting as an antivirus block to third-party antimalware software. Discover how your software is being ...continue reading
QakBot malware triggered hundreds of thousands of Microsoft Active Directory account lockouts. Discover the malware's target and how these attacks ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.