{"id":5897,"date":"2016-08-17T09:00:52","date_gmt":"2016-08-17T09:00:52","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5897"},"modified":"2020-02-26T11:10:38","modified_gmt":"2020-02-26T16:10:38","slug":"ghoul","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ghoul\/5897\/","title":{"rendered":"Operation Ghoul: Learning from the targeted attack analysis to protect your business"},"content":{"rendered":"<p>Today Kaspersky Lab\u2019s security experts released a detailed report on Operation Ghoul \u2013 a targeted campaign aimed primarily at businesses in the Middle East, although a notable number of attacked businesses apparently reside in Europe. You can read the detailed investigation report <a href=\"https:\/\/securelist.com\/blog\/research\/75718\/operation-ghoul-targeted-attacks-on-industrial-and-engineering-organizations?utm_medium=blg&amp;utm_source=kb_post_160817&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener\">here at Securelist<\/a>. In this blog post we will evaluate the most notable specifics of the campaign and describe remediation approaches that will help business protect themselves from similar attacks.<\/p>\n<h3>Evaluating the threat level<\/h3>\n<p>Unlike most \u2018newsworthy\u2019 threats such as <a href=\"https:\/\/securelist.com\/blog\/research\/68750\/equation-the-death-star-of-malware-galaxy\/?utm_medium=blg&amp;utm_source=kb_post_160817&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener\">The Equation<\/a> or the recent <a href=\"https:\/\/securelist.com\/analysis\/publications\/75533\/faq-the-projectsauron-apt\/?utm_medium=blg&amp;utm_source=kb_post_160817&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener\">ProjectSauron<\/a>, the Ghoul campaign does not appear to be very sophisticated. For example, this attack used a single command and control server, likely hosted on someone\u2019s compromised machine. This doesn\u2019t mean that the attack is not dangerous. For initial infection it uses spear-phishing \u2013 an e-mail with a malicious attachment that is disguised as regular corporate communications. Untrained employees often fall victim to such tricks. The malicious payload collects a wide range of private information, from passwords via keylogging, to personal and corporate account data. The loss of such information leads to a lot of trouble.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#OperationGhoul: Learning from the targeted attack analysis to protect your business<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F3fXB&amp;text=%23OperationGhoul%3A+Learning+from+the+targeted+attack+analysis+to+protect+your+business\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The good news is attacks like Ghoul can be effectively blocked, and in the case of a breach \u2013 quickly remediated, if a proper security strategy is in place in the company affected. While prevention methods (like an efficient endpoint security solutions) play the most important role here, they are not the only solutions recommended to enhance protection from attacks like Ghoul. In fact, protection should kick in before the poisonous e-mail reaches your employee.<\/p>\n<h3>Mail Security<\/h3>\n<p>Security solutions for protecting e-mail traffic are often associated with anti-spam functionality. Technically however, spear-phishing is not spam: targeted campaigns do not always resort to sending malicious e-mails in bulk. But a proper security solution like <a href=\"https:\/\/www.kaspersky.com\/advert\/business-security\/mail-server??redef=1&amp;THRU&amp;reseller=gl_kbusinesspost\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Mail Server<\/a> is likely to raise a red flag and block an attachment, if it is an archive with unknown and suspicious executable contents. Stopping an attack before it even starts is, thus, worth the investment.<\/p>\n<h3>Endpoint Security<\/h3>\n<p>The Ghoul masterminds use conventional methods of cyberespionage that have been known for years: keylogging, accessing data from web browsers, chat and FTP clients, etc. An efficient endpoint security solution like <a href=\"https:\/\/www.kaspersky.com\/advert\/business-security\/small-to-medium-business?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> is capable of stopping the attack at many stages, using different technologies. Besides the malicious attachment, Ghoul uses the traditional phishing methods \u2013 redirecting employees to web pages that resemble real corporate or public resources. This can be blocked by a Web Security module. Traditional security methods and proactive technologies are capable of stopping the initial infection, and intelligent modules like System Watcher may spot and block attempts to access data from installed software, which is definitely a suspicious activity.<\/p>\n<h3>Security Intelligence <\/h3>\n<p>A new way to reduce the chances of becoming a victim of a targeted operation is to use vendor-sourced security intelligence to block an attack at once or detect an active breach. The report from Kaspersky Lab\u2019s experts features indicators of compromise: information about IP addresses, domains and malicious files used by a particular campaign. Information about many other attacks is shared with our enterprise customers in an actionable form, so it can be fed to a SIEM system. This gives our clients an extra layer of protection from targeted operations. More information on APT Intelligence Reporting can be found <a href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/apt-intelligence-reporting?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<h3>Industry-specific security<\/h3>\n<p>One striking specific of operation Ghoul is that it targets mostly industrial and engineering organisations. Although the attack does not have any modules to attack industrial infrastructure, the information obtained during the espionage phase can be subsequently used for these purposes. This brings us to the topic of specialized security for IT systems used to operate industrial facilities and critical infrastructure. Such solutions should be capable of blocking a traditional attack like Ghoul, but they should also identify attempts to compromise specialized industrial software and hardware. Such a solution has been included in Kaspersky Lab\u2019s portfolio recently. You can read more about Kaspersky Industrial Cybersecurity <a href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/industrial?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#OperationGhoul is that it targets mostly industrial and engineering organisations.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F3fXB&amp;text=%23OperationGhoul+is+that+it+targets+mostly+industrial+and+engineering+organisations.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<h3>Conclusion<\/h3>\n<p>The Ghoul campaign is a dangerous targeted attack, but based on the examples from our portfolio we have shown that it can be blocked using existing technologies. Effective deployment of these technologies is what matters. And the key takeaway from this research is that different security methods have to be implemented in a multi-layered fashion. Then, combined, they significantly reduce the chances of a successful attack. They make it much more expensive for threat actors to reach your data.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab\u2019s security experts released a detailed report on Operation Ghoul \u2013 a targeted campaign aimed primarily at businesses in the Middle East and Europe.<\/p>\n","protected":false},"author":611,"featured_media":15315,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[499,2456,2457,81],"class_list":{"0":"post-5897","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-campaign","11":"tag-ghoul","12":"tag-targeted-attacks"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ghoul\/5897\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ghoul\/5897\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ghoul\/5897\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/611"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5897"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5897\/revisions"}],"predecessor-version":[{"id":33728,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5897\/revisions\/33728"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15315"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}