{"id":3851,"date":"2015-04-15T08:44:50","date_gmt":"2015-04-15T08:44:50","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3851"},"modified":"2020-12-27T12:55:36","modified_gmt":"2020-12-27T17:55:36","slug":"deny-the-hellsing-apt-by-default","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/deny-the-hellsing-apt-by-default\/3851\/","title":{"rendered":"Deny the Hellsing APT by default"},"content":{"rendered":"<p>Kaspersky Lab experts have discovered a new APT campaign that targets government institutions, mainly in the APAC region. It was named \u201cHellsing\u201d after the string containing the project directory name found within the attack components\u2019 code.<\/p>\n<p>To penetrate the target infrastructure, cybercriminals used a spear phishing attack (targeted e-mails with spoofed sender e-mail address) containing malicious documents. Embedded in the letter file was an exploit targeting vulnerabilities on the targeted user\u2019s software; once opened, it installed a backdoor that allowed attackers take control of a workstation.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Deny the #HellsingAPT by default<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FV4h2&amp;text=Deny+the+%23HellsingAPT+by+default\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>APT attacks based on a thorough preliminary study of targeted systems and real-time operator co-ordination pose a very special level of danger. Governmental agencies handling highly sensitive information (often including huge volumes of citizens\u2019 personal data) are targets of choice for cybercriminals. \u00a0Yet according to Global IT Corporate Security Risks Survey, 73% of organizations do not think they are being specifically targeted by cybercriminals<sup><a href=\"#_edn1\" name=\"_ednref1\" target=\"_blank\" rel=\"noopener\">[i]<\/a><\/sup>. It\u2019s a dangerous delusion; regulatory compliance is an obvious requirement, but it\u2019s also important to pay particular attention to protecting IT infrastructures against this type of attack, preferably by deploying additional proactive defenses.<\/p>\n<p>A well thought-out deployment of Default Deny scenario is vital for a truly comprehensive counter-APT strategy. According to Kaspersky Lab\u2019s vision, such strategy includes both network-based and endpoint-based elements, with allowlist-based technologies playing key roles. Over-cautious as this may seem, the reality is that there are still attack scenarios where typical Anti-APTs are powerless.<\/p>\n<p>Therefore extra endpoint-based multiple security layers are to be considered, which would be efficient against previously unknown malware components.<\/p>\n<p><b>Art of Default Denying an APT<\/b><\/p>\n<p>During <a href=\"https:\/\/securelist.com\/analysis\/publications\/69567\/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back\/\" target=\"_blank\" rel=\"noopener\">the analysis of \u201cHellsing\u201d,<\/a> we highlight common characteristics that are present in the APT scenario.<\/p>\n<div id=\"attachment_3853\" style=\"width: 1676px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/04\/06020313\/hellsing1-1-1024x320.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-3853\" class=\"size-full wp-image-3853\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/04\/06020313\/hellsing1-1.png\" alt=\"Hellsing APT attack scenario\" width=\"1666\" height=\"521\"><\/a><p id=\"caption-attachment-3853\" class=\"wp-caption-text\">Hellsing APT attack scenario<\/p><\/div>\n<p>At the stage of \u201cinfection\u201d attackers use various techniques for delivering malicious code to the victim\u2019s operating system: sending emails containing the exploit; delivery of malicious code through social engineering, etc. The ultimate goal of these attacks: to deliver the backdoor to the victim\u2019s operating system and run it. \u201cPayload\u201d is an executable (.exe) file or library (.dll), containing malicious code. In Hellsing\u2019s case, the attacker uses social engineering to dupe the user into launching an exe-file from RAR-archive. The exe-file extension was replaced with an innocuous one and the victim did not notice the suspicious file.<\/p>\n<p>A\u201dDefault Deny\u201d scenario provides highly effective, proactive protection, even in instances where the cybercriminal somehow (e.g. using social engineering and duping the user into disabling her anti-virus) managed to deliver the malicious payload to their victim\u2019s system.<\/p>\n<p>The concept of \u201cdefault deny\u201d is not new, but it\u2019s still effective against advanced threats with custom-made components \u2013 often the case with APTs. For example, if malicious exe-files or dll-libraries are successfully delivered to the victim, Default Deny would not allow their execution in the operating system environment because such files are not contained in a list of authorized, safe applications. Default Deny excludes all options to start executable code.<\/p>\n<p>The next phase of the attack involves collecting information from the operating system, which may result in an escalation of privileges, the installation of a backdoor or additional modules. As a rule in such instances, executable files and dynamic libraries are being used. But if they are not a part of the trusted environment, Default Deny will not allow them to run.<\/p>\n<p><b>Powerful yet cost-effective<\/b><\/p>\n<p>Besides additional benefits including greater IT network stability, and lower maintenance time, consider this: deployment of an allowlist-based solution is considered one of the TOP4 strategies that can mitigate 85% of existing APT-related risks. The Default Deny scenario is the safest known variant of such an approach.<\/p>\n<p>Compared with many standalone solutions for Default Deny implementation, even greater cost and operative efficiency can be achieved through the deployment of a truly integrated endpoint protection system that includes Default Deny capability.<\/p>\n<div id=\"attachment_3854\" style=\"width: 304px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/04\/06020312\/hellsing2-1.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-3854\" class=\"size-medium wp-image-3854\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/04\/06020312\/hellsing2-1.png\" alt=\"Efficiency Default Deny on the initialization stage of Hellsing lifecycle\" width=\"294\" height=\"300\"><\/a><p id=\"caption-attachment-3854\" class=\"wp-caption-text\">Efficiency Default Deny on the initialization stage of Hellsing lifecycle<\/p><\/div>\n<p><b>It\u2019s worth the effort<\/b><\/p>\n<p>While the implementation of a Default Deny scenario is often considered too complicated for an \u00a0average business, for government institutions dealing with extremely sensitive data, the effort is likely to reap rewards \u2013 not least because of the already \u00a0highly regulated nature of government work processes. Kaspersky Lab\u2019s convenient implementation tools (including pre-implementation test mode for compiled policies and our dynamic allowlists system), mean the process doesn\u2019t have to be too taxing.<\/p>\n<p>Default Deny mode and dynamic allowlists are parts of Application Control technologies, which are available in <a href=\"https:\/\/www.kaspersky.com\/business-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> (\u201c<a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-select\" target=\"_blank\" rel=\"noopener nofollow\">Select<\/a>\u201d and \u201c<a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-advanced\" target=\"_blank\" rel=\"noopener nofollow\">Advanced<\/a>\u201d tiers), <a href=\"https:\/\/www.kaspersky.com\/business-security\/total\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Total Security for Business<\/a> and <a href=\"https:\/\/www.kaspersky.com\/business-security\/virtualization\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Virtualization<\/a>.<\/p>\n<p>The organization and maintenance of a trusted environment in which the executable components of an APT would have no chance, is invaluable. In most cases, it would prevent attackers from achieving their goals.<\/p>\n<p>Currently all components of \u201cHellsing\u201d APT are blocked by all <a href=\"https:\/\/www.kaspersky.com\/business-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Lab solutions<\/a>. To check your system for malicious software components we recommend start full scan of your systems. You can also use our free solution \u2013 <a href=\"https:\/\/www.kaspersky.com\/antivirus-removal-tool\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Virus Removal Tool<\/a>.<\/p>\n<p><sup><a href=\"#_ednref1\" name=\"_edn1\" target=\"_blank\" rel=\"noopener\">[i]<\/a><\/sup> <em>Conducted in 2014 by Kaspersky Lab in conjunction with B2B International<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab experts have discovered a new APT campaign that targets government institutions, mainly in the APAC region. It was named &#8220;Hellsing&#8221; after the string containing the project directory name found within the attack components&#8217; code.<\/p>\n","protected":false},"author":345,"featured_media":15702,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[499,2303],"class_list":{"0":"post-3851","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-hellsing"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/deny-the-hellsing-apt-by-default\/3851\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/deny-the-hellsing-apt-by-default\/3851\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/deny-the-hellsing-apt-by-default\/3851\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/345"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3851"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3851\/revisions"}],"predecessor-version":[{"id":38276,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3851\/revisions\/38276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15702"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}