{"id":23898,"date":"2024-02-09T07:10:25","date_gmt":"2024-02-09T15:10:25","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/02\/09\/news-17628\/"},"modified":"2024-02-09T07:10:25","modified_gmt":"2024-02-09T15:10:25","slug":"news-17628","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/02\/09\/news-17628\/","title":{"rendered":"FBI and CISA publish guide to Living off the Land techniques"},"content":{"rendered":"\n<p>The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), and other authoring agencies have released a <a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2024-02\/Joint-Guidance-Identifying-and-Mitigating-LOTL_V3508c.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">joint guidance<\/a> about common living off the land (LOTL) techniques and common gaps in cyber defense capabilities.<\/p>\n<p>Living Off The Land (LOTL) is a covert cyberattack technique in which criminals carry out malicious activities using legitimate IT administration tools. <\/p>\n<p>This joint guidance comes alongside a <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-038a\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">joint Cybersecurity Advisory<\/a> (CSA) called\u00a0PRC State-Sponsored Actors Compromise and Maintain Persistent Access to US Critical Infrastructure.<\/p>\n<p>These publications are a reaction to recent warnings about attacks on critical infrastructure by groups allegedly connected to the Chinese (PRC) government.<\/p>\n<p>The FBI recently used a court order to <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/fbi-removes-malware-from-hundreds-of-routers-across-the-us\">remove malware from hundreds of routers across the US<\/a> because it believed the attack was the work of an <a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/05\/apt-attacks-exploring-advanced-persistent-threats-and-their-evasive-techniques\">Advanced Persistent Threat (APT) group<\/a>\u00a0known as Volt Typhoon. US officials said the botnet was designed to give Chinese attackers persistent access to critical infrastructure. Routing their traffic through these gateways would hide the actual origin of malicious attempts to reach inside utilities and other targets.<\/p>\n<p>In May of 2023, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/24\/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Microsoft uncovered<\/a> stealthy and targeted malicious activity by Volt Typhoon. The activity focused on post-compromise credential access and network system discovery aimed at critical infrastructure organizations in the United States.<\/p>\n<p>As Jen Easterly, the director of CISA put it in a&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=MJOX3cpHfUI\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">hearing<\/a>&nbsp;before the House Select Committee<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cWe have seen a deeply concerning evolution of Chinese targeting of US critical infrastructure. We have seen them burrowing deep into critical infrastructure to enable destructive attacks. This is a world where a crisis across the world could well endanger the lives of Americans here.\u201d<\/p>\n<\/blockquote>\n<p>And it\u2019s not just the US. The <a href=\"https:\/\/www.defensie.nl\/actueel\/nieuws\/2024\/02\/06\/mivd-onthult-werkwijze-chinese-spionage-in-nederland\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Dutch Military Intelligence Service (MIVD)<\/a> found a Remote Access Trojan (RAT) on one of their networks which they identified as Chinese malware.<\/p>\n<p>The <a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/04\/living-off-the-land-lotl-attacks-detecting-ransomware-gangs-hiding-in-plain-sight\">Living of the Land (LOTL)<\/a> guide does not exclusively focus on Chinese state actors though. It also includes methods deployed by Russian Federation state-sponsored actors, and will likely apply to Ransomware-as-a-Service (RaaS) gangs that leverage legitimate tools to evade detection too.<\/p>\n<p>So, it\u2019s important to be aware of what your cybersecurity team, internal or <a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">managed (MDR)<\/a> should be looking for when it comes to suspicious use of legitimate tools, unusual network connections, and other signs of malicious activities.<\/p>\n<p>The guidance stipulates that LOTL is particularly effective because:<\/p>\n<ul>\n<li>Many organizations lack effective security and network management practices (such as established baselines) that support detection of malicious LOTL activity\u2014this makes it difficult for network defenders to discern legitimate behavior from malicious behavior and conduct behavioral analytics, anomaly detection, and proactive hunting.<\/li>\n<li>There is a general lack of conventional indicators of compromise (IOCs) associated with the activity, complicating network defenders\u2019 efforts to identify, track, and categorize malicious behavior.<\/li>\n<li>It enables cyber threat actors to avoid investing in developing and deploying custom tools.<\/li>\n<\/ul>\n<p>So, it provides some best practices for detecting and hardening that are all explained in detail.<\/p>\n<ul>\n<li>Implement write once, read many detailed logging to avoid the risk of attackers modifying or erasing logs.<\/li>\n<li>Establish and continuously maintain baselines of network, user, administrative, and application activity and least privilege restrictions.<\/li>\n<li>Build or acquire automation to continually review all logs to compare current activities against established behavioral baselines and alert on specified anomalies.<\/li>\n<li>Reduce alert noise by fine-tuning via priority (urgency and severity) and continuously review detections based on trending activity.<\/li>\n<li>Leverage user and entity behavior analytics to identify abnormal and potentially dangerous user and device behavior.<\/li>\n<li>Apply and consult vendor-recommended guidance for security hardening.<\/li>\n<li>Implement <a href=\"https:\/\/www.malwarebytes.com\/business\/app-block\">application allowlisting<\/a> and monitor use of common LOTL binaries (LOLBins).<\/li>\n<li>Enhance IT and OT network segmentation and monitoring.<\/li>\n<li>Implement authentication and authorization controls for all human-to-software and software-to-software interactions regardless of network location.<\/li>\n<\/ul>\n<p>Understanding the context of LOTL activities is crucial for accurate detection and response. Many of the tips that Malwarebytes provides for avoiding ransomware will prove to be useful in state sponsored attacks as well, although the latter can be even more targeted in some situations.<\/p>\n<ul>\n<li><strong>Block common forms of entry.<\/strong>&nbsp;Create a plan for&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">patching vulnerabilities<\/a>&nbsp;in internet-facing systems quickly; and disable or&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/03\/blunting-rdp-brute-force-attacks-with-rate-limiting\">harden remote access<\/a>&nbsp;like RDP and VPNs.<\/li>\n<li><strong>Prevent intrusions.<\/strong>&nbsp;Stop threats early before they can even infiltrate or infect your endpoints. Use&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">endpoint security software<\/a>&nbsp;that can prevent exploits and malware used to deliver ransomware.<\/li>\n<li><strong>Detect intrusions.<\/strong>&nbsp;Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">EDR<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">MDR<\/a>&nbsp;to detect unusual activity before an attack occurs.<\/li>\n<li><strong>Stop malicious encryption.<\/strong>&nbsp;Deploy Endpoint Detection and Response software like&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">ThreatDown EDR<\/a>&nbsp;that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.<\/li>\n<li><strong>Create offsite, offline backups.<\/strong>&nbsp;Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.<\/li>\n<li><strong>Don\u2019t get attacked twice.<\/strong>&nbsp;Once you\u2019ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.<\/li>\n<\/ul>\n<p>Further on, CISA \u00a0urges software manufacturers to implement secure by design rules in their software, to reduce the prevalence of weak default configurations and passwords, recognize the need for low or no-cost enhanced logging, and other exploitable issues identified in the guide. <\/p>\n<p>Insecure software allows threat actors to leverage flaws to enable LOTL techniques and the responsibility should not solely be on the end user. By using secure by design principles, software manufacturers can make their product lines secure out of the box without requiring customers to spend additional resources making configuration changes, purchasing security software and logs, monitoring, and making routine updates.<\/p>\n<p>Living off the Land is one of six cyberthreats that resource-constrained IT teams need to be ready to combat in 2024, covered in our <a href=\"https:\/\/try.threatdown.com\/2024-state-of-malware\/?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2b_ws_global_2024_state_of_malware_170673145305\">2024 State of Malware report<\/a>.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p>Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-371336e6-815b-4134-8818-f944dbc308bb\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">TRY NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/fbi-and-cisa-publish-guide-to-living-off-the-land-techniques\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> FBI and CISA have produced guidance about Chinese APT group Volt Typhoon and other groups that use Living off the Land (LOTL) techniques. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11029,402,30141,32,10438,30817],"class_list":["post-23898","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apt","tag-china","tag-lotl","tag-news","tag-threats","tag-volt-typhoon"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23898"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23898\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23898"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}