Common Cyber Attacks NCSC
Common Cyber Attacks NCSC
Common Cyber Attacks NCSC
January 2016
Contents
Part 1: The Threat Landscape ........................................................................................................................................... 3
Commodity vs bespoke capabilities ..................................................................................................... 3
Un-targeted attacks .............................................................................................................................. 4
Targeted attacks .................................................................................................................................... 4
Every organisation is a potential victim ............................................................................................... 5
Case Studies.....................................................................................................................................................................12
Case study 1: Espionage campaign against the UK energy sector.................................................... 12
Case study 2: Hundreds of computers infected by remote access malware ................................... 13
Case study 3: Spear-phishing attack targets system administrator ................................................. 14
Common Cyber Attacks Reducing The Impact Page 3
3 ‘When Vulnerabilities are Exploited: the Timing of First Known Exploits for Remote Code Execution Vulnerabilities’, Tim Rains, 17
June 2014, http://blogs.microsoft.com/cybertrust/2014/06/17/when-vulnerabilities-are-exploited-the-timing-of-first-known-exploits-
for-remote-code-execution-vulnerabilities
‘Before We Knew It: An Empirical Study of Zero-Day Attacks In The Real World’, Leyla Bilge and Tudor Dumitras, CCS ’12, 16-18
October 2012, http://users.ece.cmu.edu/~tdumitra/public_documents/bilge12_zero_day.pdf
Page 4 Common Cyber Attacks Reducing The Impact
Openly available commodity capabilities are effective because basic cyber security principles, such as those
described in Cyber Essentials and 10 Steps to Cyber Security, are not properly followed. Regardless of their
technical capability and motivation, commodity tools and techniques are frequently what attackers turn to
first.
In part 2 we will look in more detail at the vulnerabilities that THE INSIDER THREAT
attackers exploit using both commodity and bespoke Although this paper is focussed on
capabilities. threats from the Internet, insiders
(anyone who has legitimate access
Un-targeted attacks to your systems as an employee or a
contractor) should also be
In un-targeted attacks, attackers indiscriminately target as many considered as part of a holistic
devices, services or users as possible. They do not care about security regime. They may be
who the victim is as there will be a number of machines or motivated by personal gain or
services with vulnerabilities. To do this, they use techniques that redress against grievances.
take advantage of the openness of the Internet, which include: An insider could simply use their
normal access to compromise your
phishing - sending emails to large numbers of people information, take advantage of
asking for sensitive information (such as bank details) or unlocked computers or guessable
encouraging them to visit a fake website passwords. They could use social
water holing - setting up a fake website or compromising engineering techniques (fooling
a legitimate one in order to exploit visiting users people in to breaking normal
security procedures) to gain further
ransomware - which could include disseminating disk accesses. They may even have the
encrypting extortion malware technical skills to use commodity
scanning - attacking wide swathes of the Internet at tools and techniques to become a
random ‘hacker within the system’, with the
opportunity to cause greater
damage and steal information at
Targeted attacks will. In the worst case scenario, an
In a targeted attack, your organisation is singled out because the
insider could be working for an
adversary who can develop bespoke
attacker has a specific interest in your business, or has been paid
tools, and introduce these deep
to target you. The groundwork for the attack could take months within your organisation. Assessing
so that they can find the best route to deliver their exploit which (if any) of these scenarios is
directly to your systems (or users). A targeted attack is often likely should be a critical part of
more damaging than an un-targeted one because it has been your risk assessment process.
specifically tailored to attack your systems, processes or
personnel, in the office and sometimes at home. Targeted Without appropriate training,
attacks may include: insiders can also accidentally
compromise a system or the
spear-phishing - sending emails to targeted individuals information it holds. So make sure
that could contain an attachment with malicious that particular care is taken when
software, or a link that downloads malicious software evaluating all aspects of the insider
threat as part of your organisation’s
deploying a botnet - to deliver a DDOS (Distributed overall assessment of cyber risks,
Denial of Service) attack referring to external guidance
subverting the supply chain - to attack equipment or where required.
software being delivered to the organisation
In general attackers will, in the first instance, use commodity tools and techniques to probe your systems for
an exploitable vulnerability.
Common Cyber Attacks Reducing The Impact Page 5
4https://nvd.nist.gov/
5Fixes such as applying software patches, removing detected malware and updating device configuration to address issues detected
through vulnerability scanning
Common Cyber Attacks Reducing The Impact Page 7
Stages of an attack
An attack, particularly if it is carried out by a persistent adversary, may consist of repeated stages. The
attacker is effectively probing your defences for weaknesses that, if exploitable, will take them closer to their
ultimate goal. Understanding these stages will help you to better defend yourself.
A number of attack models describe the stages of a cyber attack (the Cyber Kill Chain® produced by
Lockheed Martin is a popular example6). We have adopted a simplified model in this paper that describes the
four main stages present in most cyber attacks:
Attackers will also use social engineering (often via social media) to exploit user naivety and goodwill to elicit
further, less openly available information.
Delivery
During the delivery stage, the attacker will look to get into a position where they can exploit a vulnerability
that they have identified, or they think could potentially exist. Examples include:
attempting to access an organisation’s online services
sending an email containing a link to a malicious website or an attachment which contains malicious
code
giving an infected USB stick away at a trade fair
creating a false website in the hope that a user will visit
The crucial decision for the attacker is to select the best delivery path for the malicious software or
commands that will enable them to breach your defences. In the case of a DDOS attack, it may be sufficient
for them to make multiple connections to a computer in order to prevent others from accessing it.
If your organisation is likely to be targeted by a more technically capable attacker, give yourself greater
confidence by putting in place these additional controls set out in the 10 Steps to Cyber Security:
security monitoring - to identify any unexpected or suspicious activity
user training education and awareness - staff should understand their role in keeping your
organisation secure and report any unusual activity
security incident management - put plans in place to deal with an attack as an effective response will
reduce the impact on your business
The 10 Steps to Cyber Security sets out the features of a complete TECHNICAL FOCUS:
cyber risk management regime. There are many effective and CiSP
comprehensive schemes and open standards that your organisation The Cyber-security Information
can apply to support a defence-in-depth strategy, if this approach Sharing Partnership (CiSP), part
isn’t already implemented. of CERT-UK, is a joint industry-
government initiative to share
Mitigating the stages of an attack cyber threat and vulnerability
information. It does this in order
We’ll look at each stage of an attack in turn, and highlight where the to increase overall situational
basic security controls mitigate the activities that take place. awareness of the cyber threat,
and therefore reduce the impact
of cyber threat on UK businesses.
Mitigating the survey stage
Any information which is published for open consumption should be systematically filtered before it is
released to ensure that anything of value to an attacker (such as software and configuration details, the
names/roles/titles of individuals and any hidden data10) is removed.
User training, education and awareness is important. All your users should understand how published
information about your systems and operation can reveal potential vulnerabilities. They need to be aware of
the risks of discussing work-related topics on social media, and the potential for them to be targeted by
phishing attacks. They should also understand the risks to the business of releasing sensitive information in
general conversations, unsolicited telephone calls and email recipients. The Centre for the Protection of the
National Infrastructure (CPNI) have published a guide to online reconnaissance to help put into place the
most effective social engineering mitigations11.
Secure Configuration can minimise the information that Internet-facing devices disclose about their
configuration and software versions, and ensures they cannot be probed for any vulnerabilities.
10‘Metadata’ many programs automatically add metadata to files, including author, their username and the file save location
11‘Online reconnaissance’, CPNI, May 2013, www.cpni.gov.uk/documents/publications/2013/2013007-
online_reconnaissance.pdf?epslanguage=en-gb
Common Cyber Attacks Reducing The Impact Page 11
Case Studies
On a daily basis, we frequently see computer systems - and the information stored on them - being
compromised by malicious attackers. Although the motivations may vary, they nearly always use commodity
tools and techniques at some point.
The following three case studies demonstrate how effective these attacks can be to gain access to
organisations and, conversely, how widely accepted and cost-effective cyber security controls can disrupt
the different stages in the attack model we discussed earlier.
In the first two case studies, the attackers added malicious code to legitimate websites that staff
from the target companies regularly visited. This code compromised their computers, giving the
attackers access to the companies’ systems.
The final case study is an example of a single-staged attack that compromised the computer of a
system administrator.
All of the mitigations listed in these case studies are covered in detail in the Cyber Essentials Scheme and the
10 Steps to Cyber Security. To reduce the risk of commodity and bespoke attacks on your business, fully
implement a comprehensive suite of cyber security controls.
We believe that these ‘watering hole’ attacks were part of a continuing espionage campaign against the UK
energy sector.
Whilst the compromise was successful, it was detected through network security monitoring, and a well-
defined incident response plan made it possible to investigate the incident using system and network logs,
plus forensic examinations of many computers.
Page 14 Common Cyber Attacks Reducing The Impact
To eradicate the discovered infection it was necessary, at great cost, to return the computers to a known
good state. Further investigation was also required to identify any further malware that could be used to
retain network access. To prevent further attacks through the same route, the contract terms with the
website provider needed to be renegotiated, to ensure they had similar security standards to the targeted
organisation.
After a number of days, the initial malware downloaded a second stage executable (the RAT) and a
configuration file. To discover more about the victim organisation, the attackers configured the malware to
exfiltrate captured screenshots. Data was covertly delivered for nearly a week until the transfers were
detected. The domains were then blocked and the machine was disconnected from the network for forensic
analysis.
The compromise was detected before any significant damage could be done. However, the investigation and
clean-up operation required the assistance of industry experts and disrupted the day-to-day operation of the
organisation.
Disclaimer
This document is not intended to be an exhaustive guide to potential cyber threats, is not tailored to indi-
vidual needs and is not a replacement for specialist advice. Users should ensure they take appropriate spe-
cialist advice where necessary.
This document is provided without any warranty or representation of any kind whether express or implied.
The government departments involved in the production of this document cannot therefore accept any
liability whatsoever for any loss or damage suffered or costs incurred by any person arising from the use of
this document.
Findings and recommendations in this document have not been provided with the intention of avoiding all
risks and following the recommendations will not remove all such risks. Ownership of information risks
remains with the relevant system owner at all times.
Crown Copyright 2016