Posts: 14,414
Threads: 9,507
Thanks Received: 9,034 in 7,184 posts
Thanks Given: 9,804
Joined: 12 September 18
10 April 19, 16:48
Quote:
Domain fronting — a technique used to shield oneself behind a third-party domain — came into the spotlight after Telegram used it to avoid being blocked by the Russian Internet regulator Roskomnadzor. This time, SANS Institute speakers at the RSA 2019 conference covered the topic. For attackers, the scheme is not an attack vector so much as a way to control an infected computer and exfiltrate stolen data. Ed Skoudis, whose report we already covered, described an action plan typical of cybercriminals seeking to “disappear in clouds.”
Most complex APT attacks are detected when exchanging information with the command server. Sudden exchanges between a computer from inside a corporate network with an unknown external machine are a wakeup call, certain to trigger a response from the IS team — which is exactly why cybercriminals are dead set on concealing these communications. It’s become increasingly common to use various content delivery networks (CDNs) for that.
The algorithm Skoudis described looks like this:
1. There is a malware-infected computer on the corporate network.
2. This machine sends a DNS query to a clean and trusted website from a trusted CDN.
3. The attacker, also a client of the same CDN, hosts its website there.
4. The infected computer establishes an encrypted TLS connection with the trusted website.
5. Inside this connection, the malware forms an HTTP 1.1 query addressing the attacker’s Web server on the same CDN.
6. The website forwards the query to its malware servers.
7. The communication channel is established.
To the IS specialists in charge of the corporate network, it all appears as communication with a safe website from a known CDN via an encrypted channel because they treat the CDN, the client of which is their company, as part of the trusted network. That’s a big mistake.
Continue Reading