XM Cyber Simulates Cyber Threats in a Post-phishing World

XM Cyber Simulates Cyber Threats in a Post-phishing World

 

XM Cyber, an APT (advanced penetration testing) simulation platform provider, has simulated how hackers can breach cybersecurity through e-mail attacks without the affected parties noticing. Attackers convert the user’s account into a tool to invade the network and cause ongoing damage.

 

XM Cyber refers to these as ‘the first threats of a post-phishing world’.

 

Igal Gofman, head of security research for XM Cyber, says he is always looking for new ways to simulate advanced lateral movement, sophisticated Active Directory escalation, persistence, and exfiltration.

 

‘A recent area of focus has been on defeating network and domain boundaries by moving laterally within the network, with a focus on pivoting from unsecured networks to isolated secure networks.’

 

The team simulated how a skilled adversary can easily pivot a compromised network by abusing commonly used email applications. ‘Many email clients are built right into modern operating systems and can potentially help facilitate lateral movement,’ he explained.

 

Post exploitation techniques

 

The techniques he describes are considered as post-exploitation, which means the user account has been breached and the adversary has full control over the user’s workstation.

ALSO READ: What Innocent PC Users Can Do To Fight Cyber Attacks

‘In many cases, adversaries use compromised account credentials to access employees’ emails in order to change their bank account information, sometimes adding a malicious Outlook rule to prevent the user from receiving alerts regarding a deposit or withdraw change. There are many account breach vectors, including phishing and password spraying.’

 

He says CX Cyber has seen adversaries abusing cloud synchronisation options to sync malicious metadata such as email rules back to the user’s workstation. Other techniques that were recently discovered by Black Hills penetration testers involve syncing Outlook Web Add-Ins to the user workstations. Those attacks are relatively easy to initiate and can be performed from the cloud.

 

According to Gofman, by performing a phishing campaign, the attacker can gain system access to a user’s workstation and can control the installed mail client and all related communication. Instead of targeting users outside the organisation by sending phishing emails or using cloud services to sync malicious metadata, the cybercriminal can control all communication.

We think you'd love these too...

Related posts

Leave a Reply

Your email address will not be published. Required fields are marked *