Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Blog Security operations

Detecting and Combating Advanced Attacks: a Global Not-for-Profit’s Defense Strategy

Cory Bowline
Originally published . Last modified .

Everyone knows advanced threats are extremely difficult to defend against. Nothing earth-shattering there. They leverage sophisticated tactics, techniques, and procedures (TTPs) to covertly harvest sensitive data, and are characterized by their ability to avoid detection. Most organizations say they are concerned about advanced attackers, but also question if they would ever be a target. But what about the organizations that have been breached by an advanced attack and know they can expect more targeted attacks? How do they think about securing their organization, employees, and data?

This was the case for a global not-for-profit organization who is currently a Red Canary customer. The organization’s sensitive work around human rights and other issues often runs contrary to foreign government interests, making it a regular target.

This customer profile will take a closer look at:

  • The organization’s primary security challenges based on their environment
  • Why they selected Red Canary as a key component in their defense strategy
  • A real-world attack that Red Canary detected and helped the organization defend against

Read the full case study to learn more about the not-for-profit organization and how Red Canary helps them stop advanced attacks.

Challenge: Stopping Advanced Attacks and a Second Breach

Before becoming a Red Canary customer, the organization was successfully breached by an advanced attacker looking to collect information about the organization’s work. They knew they would be targeted again, and needed to bolster their security to protect against similar attacks. The organization had a lean, security-conscious IT organization who knew they needed additional security capabilities, not just more security products. They had already invested in advanced technologies like application whitelisting but still felt they had exposure.

Key requirements included:

  • Continuous collection and storage of endpoint telemetry
  • Broad detection coverage that accurately identifies malicious and suspicious behaviors and abnormal endpoint/user activity
  • The ability to quickly respond to a compromised endpoint regardless of its global location
  • Access to knowledgeable security practitioners who could advise the organization on security best practices and provide insight on highly targeted attacks

Developing a Defense Strategy: Managed Endpoint Detection & Response

The organization began looking for a solution that delivered continuous endpoint monitoring, behavioral analysis, and rapid response. Red Canary Managed Endpoint Detection and Response quickly and accurately identifies threats on customers’ endpoints ranging from compromised credentials to lateral movement to crimeware.

Key reasons the organization selected Red Canary:

  • The solution relies primarily on behavioral detection and can detect the behaviors that an attacker exhibits when they compromise an endpoint and move around the organization
  • The Red Canary SOC investigates every potential threat, removing false positives and adding context to legitimate threats
  • The Red Canary Technical Account Management (TAM) Team serves as an extension of the customer’s security organization, helping them tune and support the solution, answering broad security questions, and providing recommendations on incident response plans

Real-World Threat Detection: Stopping a Spear Phishing Attack

Since deployment, Red Canary has helped to stop a number of attacks that could have resulted in a serious breach. The following screenshots are taken directly from a detection notification sent to the customer when it was hit by a highly targeted spear phishing attack. They highlight how Red Canary identified the attack, investigated it, notified the organization, and helped them stop it before it could do significant damage.

Threat Detection Timeline

It was a Thursday afternoon when an employee at the organization’s office in Asia received an email appearing to come from an individual that they were in the midst of working with. The email was actually a well-disguised spear phishing attack containing a weaponized Word document.

Red Canary detected the following activity:

Detecting Advanced Attacks
Next, Word executed a binary via rundll32.exe. While Word spawning rundll32 isn’t necessarily evil, it was suspicious because it was loading a dat file from the user’s temp directory.

Detecting Advanced Attacks
RunDLL32.exe then made a network connection to a domain registered in Austria, which it should not do under normal circumstances.

Detecting Advanced ThreatsRed Canary detected the actor checking to see what their user context was—common activity during the reconnaissance phase of an attack.

Detecting Advanced Attacks

The attacker then executed a secondary script that established more network connections.

Detecting Advanced ThreatsEven after establishing persistence and escalating privileges, the attacker continued looking for a stronger foothold that wouldn’t look as suspicious during lateral movement, such as the “service account” highlighted in the detection below:
Detecting Advanced Threats

Because Red Canary was monitoring the organization’s endpoint activity, our analysts quickly detected the suspicious behavior. They jumped into action, notifying the organization’s team and working alongside them to support response efforts. Without Red Canary, the attack could have lasted for days or weeks. Instead, the attacker’s dwell time was limited and the organization was able to prevent a breach.

Want to learn more about the types of threats Red Canary detects? Download an overview of the behaviors and indicators Red Canary identifies

Key Takeaways

While there is no silver bullet to stop APTs, a mature endpoint detection and response (EDR) capability is one of the best methods of defense. This was an advanced attack, but it still followed a very common playbook. Sadly, spear phishing continues to be a reliable vector into an organization and is frequently employed by advanced attackers. Due to attackers’ levels of sophistication and ability to gather intelligence about targets, it can be extremely difficult for users to identify these attacks. Continuous endpoint monitoring, behavior-based detection, and rapid response enablement can help security teams to detect suspicious behaviors and stop attackers before they accomplish their objectives.

Request a demo with Red Canary

 

Manage your SOC like a product

 

The RSA Conference talks we’re looking forward to most

 

Translating our detection engine: A journey from JRuby to Go

 

Best practices for securing Azure Active Directory

Subscribe to our blog

 
 
Back to Top