0% found this document useful (0 votes)
43 views5 pages

Data Exfiltration During Ransomware Attacks

Hackers are increasingly combining ransomware attacks with data exfiltration to pressure victims into paying ransoms. Recent high-profile cases have shown hackers threatening to publicly leak stolen files, like sensitive business documents and encryption keys, to cause embarrassment and brand damage unless ransoms are paid. Hackers tend to selectively steal small amounts of high-impact data rather than large data volumes to avoid detection, using techniques like sending files over email or exploiting network sharing protocols.

Uploaded by

anthony jasso
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views5 pages

Data Exfiltration During Ransomware Attacks

Hackers are increasingly combining ransomware attacks with data exfiltration to pressure victims into paying ransoms. Recent high-profile cases have shown hackers threatening to publicly leak stolen files, like sensitive business documents and encryption keys, to cause embarrassment and brand damage unless ransoms are paid. Hackers tend to selectively steal small amounts of high-impact data rather than large data volumes to avoid detection, using techniques like sending files over email or exploiting network sharing protocols.

Uploaded by

anthony jasso
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Data exfiltration during

ransomware attacks
Data exfiltration by hackers is not new. Neither is ransomware.
According to the Hiscox Cyber Readiness Report 2020, 16%
of the 5,569 companies surveyed paid a ransom; 19% of the
sample had experienced ransomware but restored data through
back-ups. The use of both exfiltration and ransomware together
in a combined attack has also been seen before. But it certainly
seems that cybercriminals are starting to use this combination
with increasing success.

In the last six months, high-profile ransomware cases such


as Toll Group and Allied Universal have brought to light
the effectiveness of this combination. Hackers are using
the threat of publicly leaking and auctioning stolen data
as further leverage to persuade victims to pay the ransom
or face embarrassment and brand damage. It’s a difficult
position for anyone to be put in.

But large-scale data exfiltration is a tricky business to be


in if you are a hacker. It is a very different style of attack
compared to ransomware, and it requires different skills
and tools to be successful. Hackers know this. The recent
cases we have seen using data exfiltration as a means to
further encourage the victim to pay the ransom have not
involved particularly large volumes of data – in fact the attack
against Allied Universal only involved the exfiltration of 5GB
of data, which is small by modern standards.

What we see here is hackers being selective about


the data they are stealing, aiming for low-volume No matter how advanced our security arrangements, it
high-impact data, versus stealing any significant volume. can be very difficult to isolate illegitimate from legitimate
Allied Universal, as an example, had sensitive business communications on a network when there is no obvious
files and cryptographic keys stolen – not reams of change in the network behaviour. And hackers generally
personal data. know this. Large scale smash-and-grab style data exfiltration
is often noisier and easy to detect, which is probably why
How is data exfiltration done? we are seeing ransomware attacks use a more discreet
With the ever increasing interconnected nature of our approach to data exfiltration.
organisational networks, and the proliferation and use
of internet-based cloud services, unauthorised data
exfiltration can now be done in many different ways.

This can be as simple as access to a compromised


corporate email account to send and receive files outside
of the network. The credentials for this could have been
harvested during the initial ransomware attack. Or it could Hiding in background noise
involve hackers building-out their own infrastructure on A watering hole technique. Taking data
the internet for larger-scale operations. little and often which is less likely to be
This is a technique sometimes referred to as ‘hiding in
blocked than a single large transmission.
background noise’ or in dedicated data exfiltration
campaigns this is known as a watering hole technique.
Taking data little and often is less likely to be blocked than
a single large transmission. As such, the value of the data
stolen is maintained. If lots of credit card data is stolen and
reported, these card details will be worthless to a hacker.

If they are not reported as stolen, they can be worth a


great deal and sold on the DarkWeb (see image).
Some common data Large scale data exfiltration
exfiltration techniques If you are running file transfer protocol (FTP)

DGood old-fashioned email network file share (NFS) or server message
Some families of malware are dedicated to data block (SMB) these offer hackers a route for
exfiltration and include the tools necessary to remove
data from a network. This can include the use of
larger scale data exfiltration.
trojans, such as Emotet, which provide a covert
channel in and out of the target organisation. These are
commonly used by hackers to gain entry to a network
so that they can download more of their software on our
network, or in reverse to transmit data being exfiltrated.

Some mail-filtering technologies can also be overcome


by using a dead letter box – that is simply creating a
draft copy of an email with attachments and accessing
the files from the draft folder before filtering technologies
can kick-in. No matter what, it is always a good idea
to block compressed and encrypted files from entering
and leaving your network via email if you cannot inspect D Malware
them first. Of course this will frustrate some business Some families of malware are dedicated to data
users, so offering an exception process for legitimate exfiltration and include the tools necessary to remove
business use might be necessary. data from a network. This can include the use of trojans,
such as Emotet, which provide a covert channel in and

DInstant messaging and team collaboration services out of the target organisation. These are commonly used
Modern instant messaging services such as Skype, by hackers to gain entry to a network so that they can
and collaboration tools such as Slack and Trello, offer download more of their software on our network, or in
organisations the opportunity to work with remote reverse to transmit data being exfiltrated.
teams from their own businesses and with third parties.
Many of which of are typically internet enabled cloud
DMisuse of network sharing protocols
services. Most of these modern tools also offer file Hackers will often look to exploit the victim’s own
sharing services which offer hackers another route for technology where ever possible. So if you are running
shipping data outside of your business, which may not protocols on the network that already offer the ability to
be being monitored. export data to a remote destination on the internet, such
as file transfer protocol (FTP) network file share (NFS) or
Most of these services only offer small file upload sizes,
server message block (SMB); then these offer hackers a
usually on average 1GB per message up to a maximum
route for larger scale data exfiltration. They can also offer
of 10GB of storage per user. This limits the volume of
hackers the opportunity to import their own malicious
data that can exfiltrated at any one time, although
software to your network. As such, many organisations
low-volume high-value data is a good candidate for this
choose to severely limit or prohibit the use of these
method. This is why some businesses restrict instant
protocols across internet boundaries.
messaging services beyond their own corporate users.

DMore advanced techniques such as data pumps
sharing services
Where large-scale data exfiltration is the name of the
DFile
To exfiltrate larger volumes of data out of a network, email
game, hackers will often need to build out their own
is not ideal. It can often be readily detected and blocked.
infrastructure on the internet. This could be as simple
This is when file sharing sites and services come in handy
as their own file transfer website, through to more
if you’re a hacker. Services such as Dropbox, Google
sophisticated techniques, such as data pumps. A data
G-suite and Microsoft OneDrive all offer the ability to
pump allows a hacker to export entire databases using
upload large volumes of data and share them with people
the inbuilt functionality of a database to export data to
outside of your own organisation – often for legitimate
another remote database location. Data pumps can
business reasons. Sites like Pastebin, Github and YouTube
be configured on a timed basis to ship data when the
can also be used. All of these services offer hackers a
network is quietest, or to throttle the transmission of
simple route to move data outside of our business.
data to prevent network performance issues being
Many businesses choose to block these types of internet reported by legitimate users. All of these can be used
service for exactly this reason. And this is typically good to help the data export go undetected.
advice. If there is no legitimate need for users to utilise a
Dropbox-type service, then restricting access to these
services will help minimise data exfiltration routes from
your network and generally make life harder for hackers.
This course-grain approach, however, comes with a
difficult balancing act and may involve blocking services
commonly used for genuine business reasons. This is
where content inspection technologies can come in very
useful to give you a fine grain level of control over the
types of data being transmitted.
What can we do to help prevent Use an internet proxy
Route all of your internet traffic via a proxy, regardless
data exfiltration? of if it originates on or off your domain. Remember that

DBlock file sharing services where ever possible mobile or remote users may not be connected to your
If you don’t need to use third-party file sharing sites corporate network all the time, and ensure that device
such as Dropbox, be sure they are blocked on your configurations are set to send all internet connections
network. This type of site provides an easy way to via your proxy service. This is relatively easy to establish
exfiltrate moderate volumes of data from a network and ensures that all internet traffic goes via one route
with great ease. Dropbox as an example allows for which means you can inspect and control it.
up to 50GB of data to be transferred at a time.
All that is needed is an internet connection. Inspect network traffic where possible to look for
unauthorised data transfers

DEnable email filtering Next generation firewalls, such as Fortinet and
Inspect all email entering and leaving your Barracuda, allow for network traffic to be inspected
organisation. This can be achieved in many ways with a greater degree of granularity than more
including the creation of simple outbound mail conventional firewalls. Ensure that rules exist for
content rules on your Exchange server through to compressed file formats and encrypted content
third-party mail filtering services such as Mimecast. inspection. If you can’t inspect the data leaving, then
Ensure content inspection is enabled and decide what consider blocking it by default and triggering an alert
to do with email that cannot be inspected – such as to systems administrators or security teams. Getting
encrypted or password-protected attachments. In this control right does involve some technical tricky
general, if you cannot inspect it then don’t let it leave and may require some specialist security guidance.
your organisation.
Identify and block unauthorised

DRegularly patch all your technology configuration changes
Hacking usually involves some exploitation of a Hackers routinely change the configuration settings of
technical vulnerability, so make sure that IT systems technology to allow them greater access and mobility
are patched as frequently as practical. This needs to across networks. This could involve changing firewall
include operating systems, all software applications and network routing rules, disabling security software
including browsers, databases, network appliances (such as the use of anti-virus) or disabling the creation
and protocols. Make sure you know exactly what of security event data. Good configuration control and
software is installed on devices and leave nothing change management processes will help ensure that
unpatched for any prolonged period of time. Sign-up only authorised changes can be made to system
for automated vendor notifications on patches so you configurations and help detect attempts to change
can keep a track of any new releases as soon as they configurations without approval. This should also
become available. include attempts to introduce any new software to
a device or server that does not form part of its

DUse a reputable anti-virus product baseline configuration.
Modern anti-virus technologies are often able to analyse
operating system behaviours, such as CPU utilisation Hunt down your dormant, orphaned or duplicate
and file permission changes, ensuring that any unusual accounts and remove them
activity on a device doesn’t go unnoticed. Ensure that People come and go from organisations all the time –
the anti-virus software is routinely updated as these whether permanent staff, contractors or consultants.
vendors frequently release updates in response to Sometimes they leave behind a legacy of credentials
the latest threats. Many operating systems vendors, they were using to access our networks and systems.
including Microsoft and Apple, now incorporate Dormant accounts are those that are no longer
anti-virus technologies in their products by default. required. This could be temporarily dormant due to
maternity leave, or permanently dormant due leaving
our organisation. Orphaned accounts are typically
Next generation firewalls application level accounts, or those not bound to our
Companies including Fortinet and Barracuda main network identity, which get left behind when the
allow for network traffic to be inspected with primary login account is deleted. Duplicate accounts
a greater degree of granularity than more are those where a single user has multiple accounts
for our systems or networks.
conventional firewalls.
All of these offer hackers an opportunity to gain
access to an account that no-one else is currently
using, which means they are less likely to get spotted
using it than with an account that another user
routinely accesses. No matter how good we believe
our joiner/mover/leaver process to be, we should
routinely hunt down these accounts, check for any
signs of unauthorised use and then remove them.

DApply good access controls to data usual network performance, unusually high CPU
Not everybody in your organisation needs access utilisation on a device and users complaining about
to all of your data. This is sometimes referred to as applications and databases running poorly or
the ‘need-to-know’ principle. Whilst generally good becoming unusable.
practice in any business, minimising accessing to
your data to the fewest people possible makes it Enable multi-factor authentication on web enabled
much harder for a hacker to access a wide spectrum services such as email
of data for exfiltration from a single account. If they Where internet enable services are used by your
have compromised a user account, they will initially organisation, ensure that multi-factor authentication is
be limited by the level of access that account has. enabled – preferably using an authentication app on a
This is why administrator credentials are favoured for mobile device. This could include Office365, G-Suite,
compromise as these typically have greater degrees Slack or any other software as a service applications
of access to your systems. Be sure to safeguard you are using. This will help prevent them from being
these accounts carefully, and spread administrator used to exfiltrate data from your network.
permissions across several accounts or minimise
their individual access where ever possible. Try to Pen testing and red team activities
routinely review user access to data, sometimes If you want to see yourself safely through the lens
known as authorisation management, to remove of a hacker, then there is great merit in undertaking
any unnecessary permissions. routine penetration tests or simulated attacks via a
Red Team. Not only will this give you invaluable insight
Security monitoring to how a hacker may compromise your network
In our opinion, security monitoring is the most essential (and in turn how you can prevent it), if you have a
ingredient for protecting an organisation against any security operations team monitoring your network
form of cyber attack – including ransomware and data it will give them useful experience and provide you
exfiltration. If we can’t see it is happening then we with assurance about effectively they can detect and
can’t do anything about it. remediate potential problems.

No matter how robust our security is, or how


‘unhackable’ we might believe we are, all security
controls will eventually fail if left unchecked. This
category of control often requires investment and
ongoing development to be meaningful. It helps us
build an understanding of what normal means on
our network which helps us identify anything
abnormal so that we can respond accordingly.
The most mature security arrangements in any
organisation will typically be centred around this
type of capability. Cyber criminals never stop evolving
Gathering event data from a multitude of different
The tactics are not new, but the increased
sources, such as operating systems, applications, use of data exfiltration in combination with
databases and firewalls provides a holistic picture ransomware requires a shift in strategy.
of what is going on in the network. Using centralised Assess if you’re currently mitigating against
event stores allows for the analysis of this data to
take place in a meaningful time frame. Adopting data exfiltration and exercise as many
security monitoring tools such as Splunk or QRadar preventative measures as possible.
allow for automated alerting of suspicious activity, Cyber criminals never stop evolving,
and even machine learning to help identify patterns
in the data collected. But someone needs to look at
neither should we.
this data and respond, and that’s where continuous
training and rehearsals become essential for security
operations teams.

We recommend paying particular attention to


events generated from any privileged user account,
such as operating systems administrators, database
administrators and network engineers. Signs of
large scale data exfiltration might include new
network routing rules being created, slower than

Hiscox
1 Great St Helen’s T +44 (0)20 7448 6000
London EC3A 6HX E [email protected]
United Kingdom www.hiscoxgroup.com 20816 07/20

You might also like