RSAC 2019: Why attackers need domain fronting
#1
Bug 
Quote:
[Image: domain-fronting-rsa2019-featured.jpg]

Domain fronting — a technique used to shield oneself behind a third-party domain — came into the spotlight after Telegram used it to avoid being blocked by the Russian Internet regulator Roskomnadzor. This time, SANS Institute speakers at the RSA 2019 conference covered the topic. For attackers, the scheme is not an attack vector so much as a way to control an infected computer and exfiltrate stolen data. Ed Skoudis, whose report we already covered, described an action plan typical of cybercriminals seeking to “disappear in clouds.”

Most complex APT attacks are detected when exchanging information with the command server. Sudden exchanges between a computer from inside a corporate network with an unknown external machine are a wakeup call, certain to trigger a response from the IS team — which is exactly why cybercriminals are dead set on concealing these communications. It’s become increasingly common to use various content delivery networks (CDNs) for that.

The algorithm Skoudis described looks like this:

1. There is a malware-infected computer on the corporate network.

2. This machine sends a DNS query to a clean and trusted website from a trusted CDN.

3. The attacker, also a client of the same CDN, hosts its website there.

4. The infected computer establishes an encrypted TLS connection with the trusted website.

5. Inside this connection, the malware forms an HTTP 1.1 query addressing the attacker’s Web server on the same CDN.

6. The website forwards the query to its malware servers.

7. The communication channel is established.

To the IS specialists in charge of the corporate network, it all appears as communication with a safe website from a known CDN via an encrypted channel because they treat the CDN, the client of which is their company, as part of the trusted network. That’s a big mistake.
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
XYplorer
What's new in Rele...Kool — 15:58
Sandboxie Plus (open source fork of San...
Release v1.15.10...Kool — 15:54
Mozilla Firefox Browser 137.0.2
Mozilla Firefox Br...harlan4096 — 08:17
Manjaro Linux 25.0.0 Build 250414
Manjaro Linux 25.0...harlan4096 — 08:16
K-Lite Codec Pack 18.8.5 / 18.8.8 Update
Changes in 18.8.8 ...harlan4096 — 08:15

[-]
Birthdays
Today's Birthdays
avatar (49)fuspeukChark
avatar (43)werriewWaiNg
avatar (37)Freemanleo
Upcoming Birthdays
avatar (44)wapedDow
avatar (48)oapedDow
avatar (41)Sanchowogy
avatar (43)techlignub
avatar (42)Stevenmam
avatar (49)onlinbah
avatar (50)steakelask
avatar (44)Termoplenka
avatar (42)bycoPaist
avatar (48)pieloKat
avatar (42)ilyagNeexy
avatar (50)donitascene
avatar (50)Toligo
avatar (37)RobertUtelt

[-]
Online Staff
There are no staff members currently online.

>