Why This Matters
IN SUMMARY:
Threat actors are hiding their initial intrusion methods and communication tactics, so relying on indicators of compromise alone to detect malicious activity within managed environments is no longer enough to keep organizations secure.
This particular bit of research focuses on the activities of elite advanced persistent threats (APTs) out of China, specifically for spy work on target organizations.
While the vast majority of organizations around the world are not priority targets for such sophisticated tradecraft, it’s only a matter of time until other criminal organizations – from elite ransomware gangs to the average “script kiddy” renting malware as a service off the dark web – begin to use this and similar tactics.
Therefore, to quote Raggi, these new internal communication tactics from threat actors require all defenders – enterprise and not, to the APG’s assessment – to move away from “treating adversary infrastructure like indicators of compromise (IOCs).”
That is, we can’t simply rely on knowing an exact, prescribed IP address that goes to this known enemy architecture, and thus the remediation steps are these and we need to isolate and stop those processes to secure everyone.
Tools that operate solely on IoC detection will be fooled by these ORB networks, until such time as their signatures are tracked by the major detection vendors. Even then, uncertainty on next steps will persist, as multiple threat actors can leverage ORB networks to obfuscate and disguise their activities.
And so, it may be time to consider moving your organization’s alerting to one that detects malicious activity, in addition to known malicious IoCs – before more threat actors begin to use ORB networks and similar innovations to completely scramble your intrusion detections.