In June 2015, an incident of personal information leakage due to a targeted attack on a public institution was widely reported. A year has passed since then, but targeted attacks (cyber espionage activities) against organizations in Japan continue to be observed, both before and after the reports at the time. Many targeted attacks are more stealthy than general cyberattacks (indiscriminate attacks), so the victim organization often does not notice the intrusion or hiding of the attacker for a long time, and even after it is noticed, the information is disclosed. The cases reported are only the tip of the iceberg, as they often go unreported.

Therefore, Macnica has decided to take this opportunity to publish an analysis report so that the incident from a year ago will not be forgotten and the lessons learned will be utilized in the company's own cybersecurity measures.

In this report, Macnica analyzes attack campaigns using a RAT (Remote Access Trojan) called Emdivi that was frequently observed between 2014 and 2015, and describes the methods (TTPs = Tactics, Techniques, and Procedures) used by attackers. , explains TTPs, which have traditionally been commonly seen in targeted attacks, and the concept of countermeasures depending on the maturity level of the company.

table of contents

1. executive summary

2. Fact-finding Survey of Targeted Attack Campaigns - Threat Groups Using Emdivi -

  • 2.1 Overview of Attacker Activities
  • 2.2 Attack vectors
  • 2.3 RATs
  • 2.4 Decoy files
  • 2.5 C&C
  • 2.6 Expansion of Intrusion
  • 2.6.1 Windows commands
  • 2.6.2 Tools
  • 2.6.2 Identity of Attacker

3. TTPs in targeted attacks

  • 3.1 Reconnaissance
  • 3.2 Weaponization
  • 3.3 Shipping
  • 3.4 Attack
  • 3.5 Installation
  • 3.6 C&C
  • 3.7 Expansion of Intrusion
  • 3.8 Objective Execution

Four. Concept of measures

  • 4.1 Introduction
  • 4.2 Concept of multi-layered defense -Cyber Kill Chain-
  • 4.3 Necessity of countermeasures assuming intrusion
  • 4.4 Unstoppable security

Appendix

Emdivi RAT hash value

Download the report "Actual state of targeted attacks and countermeasure approaches 1st edition"

(10.1MB/38P)