P. Charan, P. Anand, S. Shukla, N. Selvan, Hrushikesh Chunduri
{"title":"DOTMUG: A Threat Model for Target Specific APT Attacks–Misusing Google Teachable Machine","authors":"P. Charan, P. Anand, S. Shukla, N. Selvan, Hrushikesh Chunduri","doi":"10.1109/ISDFS55398.2022.9800780","DOIUrl":null,"url":null,"abstract":"Target specific malware is one of the major concerns for many global IT firms and government organizations. In recent times, state-sponsored Advanced Persistent Threat (APT) groups have evolved in developing more intelligent and targeted malware by misusing various legitimate services. This work sheds light on modeling a threat scenario to emphasize how targeted attacks are performed by misusing legitimate services (Google Teachable Machine in our scenario) for malicious purposes in establishing foothold, lateral movement, and data exfiltration phases of APT life cycle. As a proof of concept, we validate our threat model with five different experiments highlighting how an attacker can execute a personalized boot sector ransomware and fileless malware on a targeted individual in corporate networks. Furthermore, assuming the attacker has limited information regarding the target, we use sinGAN to generate synthetic image samples to train a model for identifying the targets. In addition, we present a correlation study between target prediction confidence and effective payload deployment for all experiments. In our observation, targeted file-less malware turned out to be quicker and pestilent, averaging 25.11 seconds to encrypt the whole disk with 80% target prediction confidence.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS55398.2022.9800780","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Target specific malware is one of the major concerns for many global IT firms and government organizations. In recent times, state-sponsored Advanced Persistent Threat (APT) groups have evolved in developing more intelligent and targeted malware by misusing various legitimate services. This work sheds light on modeling a threat scenario to emphasize how targeted attacks are performed by misusing legitimate services (Google Teachable Machine in our scenario) for malicious purposes in establishing foothold, lateral movement, and data exfiltration phases of APT life cycle. As a proof of concept, we validate our threat model with five different experiments highlighting how an attacker can execute a personalized boot sector ransomware and fileless malware on a targeted individual in corporate networks. Furthermore, assuming the attacker has limited information regarding the target, we use sinGAN to generate synthetic image samples to train a model for identifying the targets. In addition, we present a correlation study between target prediction confidence and effective payload deployment for all experiments. In our observation, targeted file-less malware turned out to be quicker and pestilent, averaging 25.11 seconds to encrypt the whole disk with 80% target prediction confidence.