{"id":15066,"date":"2015-05-14T09:32:52","date_gmt":"2015-05-14T09:32:52","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3948"},"modified":"2021-01-06T12:15:26","modified_gmt":"2021-01-06T17:15:26","slug":"your-best-defense-against-one-of-the-most-active-apts-in-asia-whitelisting-heuristics-and-more","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/your-best-defense-against-one-of-the-most-active-apts-in-asia-whitelisting-heuristics-and-more\/15066\/","title":{"rendered":"Beating one of the most active APTs in Asia? Allowlists, heuristics, and more"},"content":{"rendered":"<p>Kaspersky Lab experts have investigated <a href=\"https:\/\/securelist.com\/analysis\/publications\/69953\/the-naikon-apt\/\" target=\"_blank\" rel=\"noopener\">one of the most active APTs (Advanced Persistent Threats) in Asia<\/a>, operating specifically around the South China Sea area. It was named \u201cNaikon\u201d after the \u00a0\u201cnokian\u201d User-Agent substring within an attack components\u2019 code.<\/p>\n<p><em><strong>Why Naikon matters<\/strong><\/em><\/p>\n<p>Naikon attackers appear to be Chinese-speaking, targeting top-level government agencies in the region, as well as civil and military organizations in countries including the Philippines, Malaysia, Cambodia, Indonesia, Vietnam, Myanmar, Singapore, Nepal, Thailand, Laos and China.<\/p>\n<p>At Kaspersky Lab, we see that these high volume, high profile geo-political and geographically focused attacks, featuring dynamic, well-organized infrastructure, lasting at least for the last five years. In some cases, Naikon relies on externally developed modules such as set of a full featured backdoors. Our own introduction to the <a href=\"https:\/\/business.kaspersky.com\/deny-the-hellsing-apt-by-default\/3851\" target=\"_blank\" rel=\"noopener nofollow\">Hellsing APT<\/a>, incidentally, was through an attack from Naikon on a Hellsing-related organization.<\/p>\n<p>To penetrate target networks, the Naikon APT typically relies on \u2018traditional\u2019 spear-phishing, using email attachments containing a CVE-2012-0158 exploit. This APT also spoofs fake file extensions, use RTLO (Right To Left Override, or, embedding a special Unicode character in a filename to make the real file extension reversed), or extra spacing (like \u201cletter to Gov office.doc \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 .exe\u201d including up to 200 spaces). Finally, to increase the probability that the attached executable will be opened, they also modify file icons to look like word documents. While they are simple techniques, they were very effective against target organizations.<\/p>\n<p>Naikon is the type of extremely well-made threat that any enterprise should be alert to when planning a comprehensive information security strategy.<\/p>\n<p><strong><em>KL technologies to fight Naikon successfully<\/em><\/strong><\/p>\n<p>The full list of measures available to mitigate APTs can be found <a href=\"https:\/\/encyclopedia.kaspersky.com\/knowledge\/strategies-for-mitigating-advanced-persistent-threats-apts\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">here<\/a>. Kaspersky Lab implements fully supports these measures and we implement them wherever appropriate in our own products.<\/p>\n<p><strong><em>Allowlists and heuristics<\/em><\/strong><\/p>\n<p>We recommend <strong>allowlists<\/strong> as the first endpoint-based protective measure to be taken against APTs. Along with timely OS and applications updating, effective user rights administration supported by allowlists can <a href=\"https:\/\/securelist.com\/blog\/software\/69887\/how-to-mitigate-85-of-threats-with-only-four-strategies\/\" target=\"_blank\" rel=\"noopener\">mitigate up to 85%<\/a> of Advanced Persistent Threats.<\/p>\n<p>The well thought-out deployment of a Default Deny scenario is vital for a truly comprehensive counter-APT strategy. According to Kaspersky Lab\u2019s vision, such a strategy includes both network-based and endpoint-based elements, with technologies based on allowlists playing key roles. Over-cautious as this may sound, the reality is that there are still attack scenarios where typical Anti-APT solutions are powerless.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/05\/06020327\/mitigation7-1.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3959\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/05\/06020327\/mitigation7-1.jpg\" alt=\"mitigation7\" width=\"649\" height=\"188\"><\/a><\/p>\n<p>Allowlists are very useful at the first drop\/code download stage of an <a href=\"https:\/\/encyclopedia.kaspersky.com\/knowledge\/strategies-for-mitigating-advanced-persistent-threats-apts\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">APT<\/a>, but it is not of course sufficient in itself. Besides allowlists, Kaspersky Lab implements other technologies to halt the APT at different stages. Multiple endpoint-based security layers should be considered when building an efficient defense against previously unknown malware components.<\/p>\n<p>As spear-phishing (along with drive-by infection) is the main method of first drop distribution, enterprises should also take email security into account. Email security techniques including anti-phishing, anti-spam and the attachment control are implemented in Kaspersky Security for Mail Servers.<\/p>\n<p>Kaspersky Lab <a href=\"https:\/\/www.kaspersky.com\/downloads\/pdf\/kaspersky_lab_whitepaper_automatic_exploit_prevention_eng_final.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Automatic Exploit Prevention<\/strong> (<strong>AEP<\/strong>)<\/a> functionality and other technologies is highly effective at detecting Naikon components, the set of exploits it uses. Exploits are spotted using the verdicts \u201cExploit.MSWord.CVE-2012-0158.*\u201d and \u201cExploit.MSWord.Agent.*\u201d, while backdoors are detected as \u201cBackdoor.Win32.MsnMM\u201d. Other backdoors and components are detected under a variety of names, including \u201cTrojan.Win32.Agent\u201d and \u201cBackdoor.Win32.Agent\u201d.<\/p>\n<p><strong>Heuristic detection<\/strong> is also used. For obvious reasons, previously unknown malware samples cannot be detected using reputational databases. But we do know the typical patterns, indications for such malware. Heuristic algorithms are based on this knowledge, allowing security software to detect even 0-days. So heuristics are a crucial part of a multilayered comprehensive defense.<\/p>\n<p><strong><em>Further considerations<\/em><\/strong><\/p>\n<p>Deploying a specialized security solution is a must, but there are many purely administrative measures that can be taken to resist the Naikon APT. Regularly updating to the latest version of Microsoft Office will help get rid of CVE-2012-0158 attacks and others like it. Timely patching like this can most easily be achieved using a Patch Management toolkit, like that offered by Kaspersky Lab, working together with or instead of Microsoft WSUS. <strong>Vulnerability Assessment<\/strong> and Patch Management combined will also update all popular third party software to latest versions.<\/p>\n<p>Microsoft EMET (<a href=\"http:\/\/support.microsoft.com\/en-us\/kb\/2458544\" target=\"_blank\" rel=\"noopener nofollow\">Enhanced Mitigation Experience Toolkit<\/a>) is a useful addition to Kaspersky Lab products with AEP implementation installed. Another recommendation is to disable Java wherever this application is not strictly necessary. Kaspersky Lab Application Control is of particular value here, allowing system administrators to choose which software is prohibited or allowed at any endpoint on the enterprise\u2019s network.<\/p>\n<p>All the mentioned technologies are implemented in security enterprise solution <a href=\"https:\/\/www.kaspersky.com\/business-security\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Endpoint Security for Business<\/a> (KESB)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab experts have investigated one of the most active APTs (Advanced Persistent Threats) in Asia, operating specifically around the South China Sea area. It was named &#8220;Naikon&#8221; after the \u00a0&#8220;nokian&#8221; User-Agent substring within an attack components&#8217; code.<\/p>\n","protected":false},"author":611,"featured_media":15676,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[499,2308],"class_list":{"0":"post-15066","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-naikon"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/your-best-defense-against-one-of-the-most-active-apts-in-asia-whitelisting-heuristics-and-more\/15066\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/your-best-defense-against-one-of-the-most-active-apts-in-asia-whitelisting-heuristics-and-more\/15066\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/your-best-defense-against-one-of-the-most-active-apts-in-asia-whitelisting-heuristics-and-more\/15066\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/611"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15066"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15066\/revisions"}],"predecessor-version":[{"id":38324,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15066\/revisions\/38324"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15676"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}