Hackers are increasingly adopting the techniques of the Chinese group that successfully infiltrated major telecommunications providers in attacks that made headlines last year by looking for unconventional weak spots, an AT&T executive said Monday.
AT&T was one of the major providers to fall victim to the sweeping campaign from the group, known as Salt Typhoon, but the company has since said it evicted the hackers from its networks.
βWeβre seeing adversaries really change the way theyβre doing things, very similar to what Salt Typhoon did,β Rich Baich, chief information security officer at AT&T, said at the Google Cloud Cyber Defense Summit.
There were three things that stood out about the way Salt Typhoon approached its campaign, he said. One was hunting for weak points in the companyβs ability to find and track malicious activity on physical devices like phones or laptops, known as endpoint detection and response (EDR).
βTraditionally as practitioners, we focused on putting endpoint detection on our devices to help us provide a certain level of protectionβ Baich said. βSalt Typhoonβs approach was a little bit different. They said, βWell, what about all the other platforms that traditionally donβt have an EDR?β And those platforms then can be utilized in many fashions, carrying out different types of actions.β
βWhat we need to think about is this: Do we need to have endpoint protection elsewhere, in different platforms?β Baich added. βSo thatβs one: Theyβre going to the areas of least resistance and not spending time trying to combat traditional security controls.β
Another technique thatβs growing in use since the Salt Typhoon attacks is βlooking for things where we donβt have logs,β he said. Baich said attackers are βre-engineering and thinking of tradecraft techniques that allow them to circumvent known controls, and things that we may do today, but in certain parts of our networks, we may not have those things enabled.β
Lastly, Salt Typhoon and its mimics have been turning to whatβs called βliving off the landβ attacks, where attackers rely on legitimate tools that already exist in a victimβs networks.
βThird thing that they are doing is using the actual administrative tools that we use to perform those functions, so [a lesson for potential victims is] making sure that those are locked down and you understand all the administrative tools that you have in your environment,β Baich said. βAll of that is because theyβre actually trying to be part of your network.β
The combination of those techniques, as well as a dedication to covering and wiping their tracks to avoid digital forensics probes, means that βwe have to be much more efficient operators,β he said. βWe have to think outside the box. Itβs not just about just having the technology; itβs understanding how to use the technology and understanding how your technology can be used against us.β
Ironically, network defenders might be a victim of their own success, said Rob Joyce, the former cybersecurity director of the National Security Agency.
Defenses for the most-used technology in society today β from mobile phones to web browsers β have gotten very good, Joyce said at the same conference. Vulnerability management, patch management, threat intelligence β all have bolstered defenses, he said.
Because of that, βit just takes exploits chained together in multiple paths to get to success,β said Joyce, who now runs his own cybersecurity consulting firm.
βAll of that has advanced us,β he said. βAt the same time, weβve evolved the attackers through that activity. I think by calling out some of the bad behavior, by highlighting the things that have worked or not worked, weβve pushed people into new exploit methodology.β
The post Telecom exec: Salt Typhoon inspiring other hackers to use unconventional techniques appeared first on CyberScoop.