当前位置:网站首页>Hongke shares | how to solve blackmail software security vulnerabilities
Hongke shares | how to solve blackmail software security vulnerabilities
2022-07-25 19:24:00 【Hongke network visualization and security】
In recent years , The number and frequency of various network attacks are increasing , Especially ransomware that has experienced rapid evolution . Five years ago , Blackmail software is a relatively remote problem for most organizations . But now , Several attacks and intrusions of extortion software occur every minute . Few executives will despise the threat this malware poses to their organizations , But not many people know how to prevent blackmail attacks .

Typical blackmail software attacks
More dangerous ransomware
In recent years, the number of blackmail software intrusions has increased , The growth of extortion software intrusion as a criminal business activity has also catalysed its profound technological transformation .
It is worth noting that , One side , Today's third-generation blackmail software has become a multi-level threat combining blackmail and denial of access ; Another aspect , Malware developers continue to improve the delivery and deployment methods of ransomware . therefore , Ransomware is becoming more dangerous , And can often completely avoid the control of the security mechanism .
The most worrying development at present may be The transformation of file based blackmail software deployment .
Now? , The attack chain of a payload delivery often starts and ends in the memory of the device runtime . This is an extremely vulnerable attack medium for most organizations . In response to the profound changes in the deployment of such attacks , It is necessary to re evaluate whether the defense measures of the terminal organization are effective .
How to defend against ransomware
01 The dilemma of blackmail software defense ?
When defending against ransomware , Security professionals usually rely on the feedback of threat intelligence to correlate and analyze information , So as to evaluate the security defense measures , And give priority to actions to reduce risks .
Unfortunately , There is a serious gap between the environment monitored by the threat intelligence source and the place where the attack occurred . Because scanning monitoring solutions usually focus on static files and network behavior , These data provide static intrusion indicators (IOC) It often leads to the security team lagging behind the attacker . This means that most organizations do not have equipment memory to defend against a key threat carrier .

Most network security solutions are difficult to cover this vulnerability , The reason is simple : Scanning memory and processes during runtime slows everything down , The use of devices and servers is rarely compatible with facilities that constantly scan the memory of devices . therefore , Most security solutions scan devices only at the beginning and end of the run . They rely on detectable features left by threats , These characteristics are trained , Recognizable . However , Modern ransomware uses memory attack chains , Mercilessly exploited the weakness of this method .
02 How memory attacks are carried out ?
The first stage :
The Downloader is downloaded to the victim's device . At this point , Anything based on static IOC Threat Intelligence Feedback is redundant . for example , Whether the bait is malicious Excel Installed , It is also installed without files through remote code , Highly confused attacks will not appear in Threat Intelligence feedback , Until the attack is understood and classified .
The second stage :
Loader deployment threat . Access to the runtime memory of the device through the process of runtime download or code injection . Up to now , The attack has been completely separated from the monitoring of traditional terminal defense .
The third stage :
Payload deployment . It could be like RAT Or the reverse shell in memory , It also occurs in the device runtime memory . This means that the attack is invisible , It can only be statically detected after damage is caused . From here , Threats can move horizontally in the network , Turn off the control of the solution , And deploy ransomware . When blackmail software attacks attract the attention of defenders , The game is over .

Blackmail software attack chain
We noticed that , Memory attack chains often involve things like Cobalt Strike Such malware or things like Conti Such memory extortion software strains are deployed . In an attack like this , In the use of API Call to download malicious .dll Documents before , One shellcode Dynamic space usually allocated to device memory .
Such threats Highly elusive , It mainly exists in the device memory , So any level NGAV Or the best EDR Can't reliably detect and stop them . The network security community must respond to these types of attacks by upgrading Threat Intelligence and focusing on memory detection .
03 How to resist the attack of blackmail software ?
The answer to how to prevent ransomware attacks is to use Siphonaceae Morphisec Mobile target defense (MTD) technology . It provides active protection against zero sum memory attacks 、 Lightweight protection .
· What is mobile target defense (MTD) technology ?
Mobile target defense (MTD) Technology is the industry-leading solution for advanced attacks . It provides a low impact for every organization facing memory attacks 、 Highly effective defensive solutions .
· Mobile target defense (MTD) How technology can resist blackmail attacks ?
1. By deforming the device memory during operation , Mobile target defense (MTD) Technology increase Strengthen the existing security stack of the enterprise , To prevent and attribute file free attacks , Otherwise, its intrusion cannot be detected .
2. Customers often enhance their existing solutions , Include AV and EDR, With Create defense in depth . And will be MTD Technology and operating system are native Windows Defender pairing , Can create a very cost-effective security stack , Able to defeat advanced threats .
· Siphonaceae Morphisec Mobile target defense (MTD) The advantages of Technology
Unique in the security industry , Siphonaceae Morphisec Of MTD Technology takes advantage of polymorphism , Hide application and operating system goals from rivals in unpredictable ways . This has led to a sharp reduction in the attack surface , Make the target impossible to find . It raises the bait , Spoofing and trapping intrusion threats without affecting availability . Siphonaceae Morphisec Of MTD Rely on dynamic changes in memory to prevent and expose hidden attackers .

边栏推荐
- How many lines of code is appropriate for a function? Clean Code
- Small program completion work wechat campus maintenance application small program graduation design finished product (2) small program function
- [applet development] detailed explanation of host environment
- Pymoo学习 (5):收敛性分析
- 有孚原力超算,为客户提供定制化高性能计算服务
- [server data recovery] a data recovery case of a brand ProLiant server raid paralysis, database file loss, and database file backup damage
- 【DETR用于3D目标检测】3DETR: An End-to-End Transformer Model for 3D Object Detection
- 600000 pieces of data are made from March 1 to March 31. Videodate requires starting time from 00:00 to 24:00 on March 1 to 31, which is only for notes
- 鸿蒙-大喵计算画板-视频
- Selenium运行慢 - 通过设置selenium加载策略加快运行速度
猜你喜欢

Internal network planning and design of Yingcheng hospital

微信小程序 26 播放音乐页的完善②

Talk about 15 tips of SQL optimization

Youth, oh, youth

高效生成接口文档好方法

JS basic type reference type deep / shallow clone copy

Istio exposes applications to the Internet

歌曲转调之后和弦如何转换

SQL Server 2019 安装教程

Leetcode skimming: dynamic programming 07 (different binary search trees)
随机推荐
CRM configuration item command notes
二叉树可视化
Clip can also do segmentation tasks? The University of Gottingen proposed a model clipseg that uses text and image prompt and can do three segmentation tasks at the same time, squeezing out the clip a
小程序毕设作品之微信校园维修报修小程序毕业设计成品(1)开发概要
基于PHP的中非南南合作信息交流平台网站建设
CLIP还能做分割任务?哥廷根大学提出一个使用文本和图像prompt,能同时作三个分割任务的模型CLIPSeg,榨干CLIP能力...
鸿蒙-大喵计算画板-简介
Pymoo学习 (5):收敛性分析
Pymoo学习 (8):Gradients
[Detr for 3D object detection] 3detr: an end to end transformer model for 3D object detection
Dynamic implementation of wechat applet 27 progress bar and static construction of search box and hot search list
[Detr for 3D object detection] detr3d: 3D object detection from multi view images via 3D-to-2D queries
[encryption weekly] has the encryption market recovered? The cold winter has not thawed yet! Check the major events in the encryption market last week!
Improvement of wechat applet 26 playing music page ②
Youfu force supercomputing provides customized high-performance computing services for customers
Huawei switch system software upgrade and security vulnerability repair tutorial
高效生成接口文档好方法
The difference between QT exec and show
新瓶装老酒--近期APT32(海莲花)组织攻击活动样本分析
i3-status 配置