In the recent SecureWorks APT report, it found that Elirks backdoor connections were involved in many advanced persistent threat (APT) attacks because they look like legitimate traffic. Is there any way to detect and/or thwart APT attacks that hide via Elirks or similar services?
To avoid detection, many attackers attempt to disguise attacks amidst legitimate traffic because analyzing all traffic for APT detection requires more effort than analyzing just the known bad traffic. With the prevalence of encrypted traffic, identifying a backdoor connection as being either part of an attack or a legitimate remote access connection can be very difficult. If the system in question doesn't normally make certain kinds of connections or only makes Windows file sharing connections to approved enterprise file servers and connects outbound to websites, white listing known legitimate traffic and investigating any other traffic might be an easy option. Companies can also use blacklists or reputation services to block known malicious network connections.
According to the Dell SecureWorks APT report, the Elirks backdoor uses the microblogging service Plurk for part of the command-and-control functionality of the botnet, but traffic from Plurk could also emanate from the likes of Flicker, Google Images, YouTube and so on. All of these legitimate websites could be used to create a command-and-control infrastructure, even if it is just to serve as a backup if the peer-to-peer bot loses contact with other peers. Dell SecureWorks sells an appliance that can detect Elirks botnet traffic and other vendors, including FireEye, Damballa and Arbor Networks, offer appliances that can detect or block botnets.
Ask the expert
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Dig Deeper on Real-time network monitoring and forensics
Related Q&A from Nick Lewis
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Island hopping attacks create enterprise risk by threatening their business affiliates. Here's how to create an incident response plan to mitigate ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading