Forget malware - once attackers are inside your system, 99% of post-intrusion internal attacks originate from leveraging riskware such as network scanners and legitimate applications, according to a new industry study by LightCyber.
More than 70% of targeted malware is used on one site in the initial compromise, but once in, attackers used IP and port scanners such as Angry IP scanner which accounted for 27.1% of attacks, and network discovery tools such as Nmap, the report states.
The report states that these attacks are "low and slow" and can avoid detection for up to five months. This allows attackers to learn about the network, its nodes, resources and vulnerable areas. The attacks can take three main forms: 'reconnaissance', 'lateral movement' and 'command and control communication'.
“The new Cyber Weapons Report uniquely reveals that malware is not the mechanism that network attackers use once they circumvent preventative security and compromise a network,” says Jason Matlof, executive vice president, LightCyber.
The most common attack tools observed in the study were classified into the following four categories: networking and hacking tools, admin tools, remote desktop tools and malware.
SecureCRT is an admin tool responsible for 28.5% of all incidents. Admin tools use lateral attacks to control new behaviour, remote connection, reverse shell and others.
TeamViewer was responsible for 37.2% of incidents through its remote desktop and web conferencing abilities. Once attacked, it can conduct command and control behaviour as well as other lateral violations.
The report says that attackers can also use web browsers, file transfer clients and other native system tools to extract data and control machines.
“Despite these increasingly well understood realities, our industry still has an unshakable obsession with malware. With the increasing incidence of successful data breaches and theft of company secrets, it’s clear that the conventional malware-focused security infrastructure is insufficient, and we must develop new techniques to find active attackers using their operational activities,” Matlof concludes.
LightCyber, a specialist in behavioural detection solutions, used its Magna platform to scan and analyse results. The study analysed endpoints worldwide in organisations from 1000 up to 50,000 endpoints, in industries such as finance, technology, healthcare and telecommunications.