Why IDPS?
4 reasons why you need Intrusion Detection and Protection Service (IDPS)
1.
The cold hard truth is that Antivirus can only react. It works by checking your files against a list of known viruses and comparing the two. If a virus is new, re-compiled and still unknown, there is nothing to compare it to, and you will get infected.
2.
The build-in firewalls with the default settings leave a computer wide open to any outgoing communication, even to know malware control servers.
3.
There is no feature or function on a windows pc or server that will trigger a warning if a probe is detected, let alone prevent the malicious actor from successfully using an exploitable vulnerability.
4.
There is no feature on Microsoft Windows that will allow the user to block access to a given domain from applications on a device.
The problem IDPS addresses
Most people and small businesses assume that cybercrime won’t happen to them until it does. If it does, the consequences can be shocking as cyber criminals target private individuals and small businesses in a big way. The FBI’s internet crime report of 2021 states that crime rose by 7% to 847,376 reported cases. However, the financial loss rose not by 7%, but by a mind blowing 64% to $6.9 billion showing how much more effective cyber criminals have gotten.
The reason for the success of cyber criminals is the fact that the skill level needed to operate a safe online environment is even beyond what most sophisticated computer specialists have. In the current environment, any normal computer-literate individual, without IDPS by VESNX doesn’t stand a chance and this chapter will explain why.
Issue 1: An antivirus is not made for detecting malicious activity
Malware can download itself onto your computer through emails, programs, or websites. Once installed, this software can scour your computer for sensitive personal information, including passwords, email addresses, crypto wallets, and banking or credit card information.
Persons install Spyware
Good business antivirus software can catch older versions of spyware. Most consumers, however, save money on software. Therefore software companies needed to adjust their business model from providing clients with a service to one where the clients are increasingly becoming the product. Lines start to blur when transforming a simple application into one that collects and sells user data with or without user consent. When does the "customer-improved experience" transform into spyware? One company has even made a business model out of it where it reads all emails, tracks all travel, and scrubs all data it can find. To do this, the company made a free operating system for phones, tablets, and computers, a free internet browser, and a free email service.
Avoiding this particular company doesn't solve the problem. Figure 1 shows an idle PC that does plenty of talking. Remove the internet cable, and the PC works just fine. So, what is it talking about, one may ask? Well, it's most likely talking about the user as the "product", not the user as the "client".
Persons install Adware
Adware seems innocent enough. This software tracks your internet browsing history and then uses the information to send you relevant advertisements inside the application or game. At best, this software slows your internet connection speed and your device processor. At worst, it can include spyware or keyloggers that could potentially steal your private data or damage your device.
Persons install VPN software
A VPN was used to encrypt plain text communications between persons and non-SSL DNS lookups as well ensure encrypted browsing, in todays day and age most if not all web pages are HTTPS encrypted, adding a VPN only slows down the browsing experience. As for hiding your identity and protecting your privacy, well as it turns out that an overwhelming number of VPNs are actively harvesting and selling your data, capturing passwords / credentials / movements from your web activities.
Using VPN software is the ideal way to distribute a man-in-the-middle spy-ware as it can easily hijack any https communication and users will even pay money to install and use it.
Using a VPN isn’t going to protect you as it doesn’t matter where you say you reside; everyone knows the IP addresses of the VPN servers and can provide or block content accordingly. Also, a VPN connection doesn’t protect your browsing habits from becoming known. The only thing it does is increase your exposure as your data is now stored in 2 additional locations, at the VPN provider as well as the telecoms provider that hosts the data center of the VPN provider.
Generating viruses requires minimal skills
Viruses are typically disguised as email attachments, images, games, and website URLs and can take over your computer and replicate without user interaction. As a result, sensitive files can be uploaded, corrupted, or deleted. As the virus infects your computer, day-to-day tasks can become difficult or impossible. Some viruses can randomly access and manipulate memory, add unintended features to existing software, or fill up disk space, rendering your computer useless. Antivirus software is unlikely to catch new viruses as they typically lag behind a few days or weeks, as antivirus signatures are generated based on known viruses from infected computers.
As the virus infects your computer, day-to-day tasks can become difficult or impossible. Some viruses can randomly access and manipulate memory, add unintended features to existing software, or fill up disk space, rendering your computer useless.
Antivirus software is unlikely to catch new viruses as they typically lag a few days or even weeks behind as anti-virus signatures are generated based on known viruses from infected computers.
Virus-generating tools understand how antiviruses work and can compile a brand-new virus at the push of a button. These virus packaging tools are offered "strictly for educational and illustrative purposes", of course.
Bad actors lease ransomware at an industrial scale
The newest fashion in computer crime is special software known as crypto-lockers. This software data-mines and encrypts your system and holds your data hostage until you pay a ransom. Typically, victims have to pay to get their files decrypted. Attackers will typically start to blackmail their victims by threatening them in that they will share and sell their private and confidential data if they fail or refuse to do so. Any proceeds made using the ransomware by the attackers will generate a commission for the developers of the malware using the Software as a Service business model.
Like with viruses, these malware developers are not just sitting idle; they constantly update the software to evade detection and are quite successful in doing so. In 2021 IBM claims that 53% of all companies never find out that security has been breached, and it takes an average of 287 days for those companies that do.
You need more than just an antivirus today; prevention is key, as in 2021 the ransomware industry is worth 14 billion US dollars. The average household paying anywhere between 500 to 2000 US dollars to get their files back where corporations typically are charged on average over 110 thousand US dollars. Those who claim that crime doesn't pay probably haven't studied cross-border cybercrime.
Issue 2: Malicious activity is not blocked
Think about it this way, last week’s viruses will make it into next week’s antivirus definitions. Cybercriminals work daily to create new viruses and threats and are not bothered with release cycles. On the other hand, antivirus companies also have to work daily to write new software to protect against those threats, test them against the new threads, package, and deploy them.
If an antivirus tool does find a thread, it usually does this when the malware has already been executed. Most antivirus will give a small pop-up warning; some remove or rename the file on disk. This is too little, too late, as the device is infected.
Malicious activity, even if detected, does not escalate into a defensive response
First, antivirus software is not an intrusion detection tool. Many users think that Windows protects them; however, previous paragraphs have shown that it doesn't; second, Windows is extremely "user friendly" because it allows attackers to attack endlessly and never takes defensive measures. Figure 4 shows how an automated attack can continue until it eventually succeeds in guessing a valid user/password combination.
Out of the box, Windows comes with a lot of software that enables remote management in one way or another like the known set like Remote Desktop, PowerShell or more exotics like Secure Shell, and Windows Management Instrumentation Command.
Microsoft will just “take note” of successful or failed attempts to connect or execute remote code. It is up to the user to map failed attempts to successful attempts to see if a system was actually successfully compromised.
Outgoing activity is unprotected, this activity or communication isn’t logged anywhere
Any software on your computer can send any data you have to any location that can be reached via the internet. This is quite handy until a user is presented with a link that generates what the industry calls an “Exploitation for Client Execution”. Victims are easily duped as these exploits use software already installed on the client’s machine to execute arbitrary binary code. The most common exploits are:
- Browser- based exploits Web browsers are a common target through what is known as Drive-by Compromise and Spear phishing link. Computers are compromised through normal web browsing or from certain users being targeted by links in spear-phishing emails to adversary-controlled sites used to exploit vulnerabilities in the web browser. These sites often do not require an action by the user for the exploit to be executed; simply visiting a compromised site will suffice.
- Targeting Office Applications Common office and productivity applications such as Microsoft Office are also targeted through Phishing. Malicious files will be transmitted directly as attachments in email or via links to download them. These require the application to preview such a file or for the user to open the document or file for the exploit to run.
- Targeting Common Third-party Applications Applications such as Adobe Reader and Flash, Teams, Skype and Zoom are common in enterprise environments, have been routinely targeted using these techniques in an attempt to gain access to a system. If the user can click any type of link, that can execute any type of action, based on arbitrary data an exploit should be considered possible.
Issue 3: More and more individuals try to improve their lives by getting started in cybercrime
Going after those involved in cybercrime is not very likely, as cross-continent prosecution for crimes involving multiple jurisdictions for a 3-figure amount is just not done. This inability of law enforcement agencies to act is leaving the risk versus reward scale skewed towards the reward side of the equation.
Cybercrime is more profitable than dealing drugs and getting hold of the product is easy
Most are surprised by how little it takes to get started in cybercrime, as you only need a few inexpensive items to get going. At the time of writing this document, awesome, an open-source host, provides access to over 200 ransomware projects for “educational purposes” that will help you get started.
Targeting private individuals and small businesses with impunity
The fact that most police agencies are il equipped, and poorly resourced, forces these agencies to select only more prominent and high-profile cases. This, combined with the fact that private individuals and small businesses do not know and lack the tools to protect themselves, makes them ideal targets for cybercrime.
Issue 4: Nowhere is safe
Cyberattacks are coming at you from all places, and at all times, it’s relentless, it’s automated. Here are a few ways:
- Infrastructure gets attacked from the world wide webby individuals that attack routers via their default username and password as well as remote management configurations. If they really want to get in, then they will get in, and they will use software like RouterSploit or MetaSploit to join your network;
- Your Wi-Fi network is easily targetedby individuals that attack router via its default username and password as well as remote management configurations. If they really want to get in, then they will get in, and they will use software like RouterSploit or MetaSploit to join your network;
- Infrastructure gets attacked by its own edge devices like routers and firewalls sounds bizarre right, well it’s the most common exploit used by attackers. A hacker will take over an edge device like a router and use the router to attack the owner of the network from within;
- You get attacked via your local network using compromised hardware like other computers on the network. The network can be your home or office network but also that cool VPN network;
- Users get attacked by your IoT devices like a smart thermostat, smart TV’s, smart light bulbs, Air conditioning, even their own phone via that cool app/ game. All these devices have software that is not designed with security in mind and has no anti-virus or firewall on it;
- Large organizations get attacked all the time via an employee bringing compromised hardware to the workplace or, the user gets compromised themselves when he/she connects to the office.
Any and all devices can be assimilated into a botnet; these botnets then are used to attack better-protected infrastructure.
The solution
Our solution in addressing the problems of cybercrime is to bring a powerful easy to use tool that addresses a below average skilled computer literate user. This chapter describes how we extend the windows operating system security features with our own as well as fill the gaps that are left by windows build in antivirus and anti-malware features.
IDPS REQUIRES NO INTERACTION, SPECIAL SKILLS, TRAINING, OR CERTIFICATION.
SYSTEMS AND USERS ARE ALWAYS PROTECTED
Maintain effective and updated malware strategies
Our exploit database contains tactics and techniques used by cybercriminals based on current attacks. We observe these probes on our honey pot servers, workstations, mobile devices, emails, IoT devices, programmable logic controllers, routers, switches and firewalls that we have distributed for this purpose on the world wide web.
We have also partnered up with external resources that provide us with near-real-time data of endpoints that have been compromised or are used for illicit purposes.
All this data is then bundled, packaged and distributed to our clients that use this near real-time data in our proprietary intrusion detection AI models as well as in the intrusion prevention database.
Malware signature updates
It may be important to note that signature updates flow one way, from VESNX to the IDPS licensed devices. There are several good reasons for it, the 3 most important are:
- Economics: the investment needed to process the data send by the clients is going to outweigh the benefit of having a larger dataset of mostly duplicate data slowing down the process.
- Trust: the data coming from a 3rd party needs to be isolated sanitized and classified, the last thing one would like is for a malicious actor to pollute the dataset with false positives.
- Independence by design:the intrusion detection and prevention modules are designed “to be enriched” and “to be improved on” with data generated by the IDPS client software. All IDPS modules improve their detections in real-time independently of the server infrastructure.
Having low dependency on infrastructure & data dramatically improves the TCO as the infrastructure can easily be taken off-line. If need be, for days, without impacting the quality of the product or reputation of VESNX.
Looking at the unique features of IDPS in a ransomware kill chain
Perhaps, one of the best features of IDPS is the ability to replicate intrusion prevention over the entirety of licensed devices when a malicious actor is detected. It doesn’t mean malware will not be used against our clients’ systems. IDPS will share detected malicious intent with the entire infrastructure sharing a license, effectively halting attacks on other parts of the network.
This feature prevents malicious actors to continually probe the infrastructure as the first failed attempt will trigger a reaction at the operating system level preventing access. This feature isn't offered by any other product on the market.
We will use, what is known in the industry as “the ransomware kill chain”, to explain how VESNX developed IDPS to allow low skill users to be protected from cybercrime.
Cybercriminals
IDPS
Develop PEN-Test software that can be used to automate penetration testing as well as automate exploit exposure.
- Use the IDPS honey-pot systems to detect patterns that help identify the software that is used to attack the clients’ system.
- Provide developers with a software developer kit (SDK) that can be used in their own development to detect probes and automatically block and report probes to authorities.
- Aided with Machine Learning, deployed software will continue to learn new attack vectors from "hindsight" of recorded activity independent of the IDPS subscription.
- Allow honey-pots (dedicated computers made extra vulnerable) to get infected. This way one can study the changes malware makes when it infects a system and update signatures.
-
We will study
- whom the malware contacts when infects a system;
- whom it gets its instructions from;
- and what additional software gets downloaded as well as what that does;
- Study in what ways malware tries to infect other systems in order to recognize infected systems so IDPS can isolate these systems and prevent the spreading in your home or office.
Scan domain names & IP addresses to see what systems are publicly accessible and store this data
- Ensure IDPS blocks the PC replying to BotNets scanning the internet.
- Alter the devices "fingerprint" so that a probe assumes fails to correctly classify the device.
- Alert other devices that share the same license to update the definitions in regards to the connections reputation and block it.
- Communicate to other licensed VESNX software of the intentions of the domains involved in the phising attack.
- Log the attempted scan and notify the internet service provider of the access broker using the IDPS automated abuse report.
- Detect discovery process and replicate the detection to other licensed IDPS software.
- Answer with a perceived flaw by the IDPS HoneyPot Services and wait for a response.
- Log the attempted scan and notify the internet service provider of the access broker using the IDPS automated abuse report.
- Monitor system for failed password attempts on operating system and application level.
- Answer with IDPS HoneyPot Service.
- Communicate to other licensed IDPS software of the intentions of the domains involved in the password attempts ensuring any attempts to communicate will fail.
- Log the attempted scan and notify the internet service provider of the access broker using the IDPS automated abuse report.
- Ensure IDPS blocks PC from opening links from, or connect to IP addresses and domains associated with malware.
- Provide a safe environment to users to open attachments in a SandBoxed IDPS applications like IPS. ExcelGuard, IPS. WordGuard, and the IPS. PdfGuard.
- Log the attempted scan and notify the internet service provider of the access broker using the IDPS automated abuse report.
The primary objective of access brokers is to collect system data and to sell the data to hackers. They might have the skills and the tools to be hackers themselves, however, as they are not seen as the once causing harm, law enforcement typically doesn’t prosecute them making being an access broker a relatively safe job.
Access brokers typically use specialized software that they run on servers leased in data centers or on a large pool of infected computers (botnets) that they buy or rent in the dark web. Reporting the abuse with the internet service provider normally results in the access broker losing access to the infrastructure that’s being used to attack the infrastructure. While this is the only way to stop attacks, we know of no other product that does automated abuse reporting with documented proof of the malicious activity to an internet service provider.
In order for the affiliate model to work with ransomware developers, the developers generate specific code within the ransomware to their affiliates, with a unique identifier embedded within it. This causes the ransom payout to get directed to the affiliate that infected t
These individuals are responsible for entering your systems. They will pay the access broker for the login details and exploit data that enabled them to enter. The prices for the credentials and exposed services will vary. For individuals it is as little as twenty dollars, for larger organizations it could be several thousand.
IDPS will monitor attempts for activity to gain elevated access rights like administrator accounts and look for inter process, local network, and software installation that doesn’t fit the base-line of a given computer.
If a hacker uses a persevered flaw send to a (initial) access broker then the broker is linked to the attacker.
Login to a service using compromised user credentials like user name and password or two factor authentication (2FA).
- Make use of IDPS HoneyPot Service to detect unlawful access attempts via previous fake credentials matching the broker to the hacker.
- Prevent, detect, and flag login from location and data-centers that are not pre-approved, normal, or have associated with malicious activity in the past.
- Communicate to other licensed IDPS software of the intentions of the endpoints involved ensuring any attempts to communicate will fail.
- Isolate possible compromised computers if access was obtained.
- Notify the user in regards to the compromised service and device.
- Log the attempted scan and notify the internet service provider of the access broker using the IDPS automated abuse report.
- Block access to a IDPS guarded system by always blocking incoming TOR and commercial VPN connections.
- Log the attempted scan and notify the internet service provider of the access broker using the IDPS automated abuse report.
- Detect WPS cracking attempts using a physical IDPS router.
- Detect man-in-the-middle attacks and ARP poisoning by monitoring network topology.
- Place infected systems in a Penalty Box avoiding getting infected or breached.
- Notify the user and inform that a security breach was detected as well as make recommendations on how to react.
- Power down the system after communicating to other licensed IDPS devices and software ensuring any attempts to encrypt drives and infect other devices will fail.
- IDPS will detect the change in gateway service generated by ARP poisoning and block the “poisoned” computer.
- Notify the user and inform that a security breach was detected as well as make recommendations on how to react.
- IDPS detects the additional IP address generated by the VPN and notify the user.
- IDPS can disable the network adapter disconnecting the VPN.
- IDPS will notify other licensed devices and isolate itself preventing it from infecting or compromising other devices.
- IDPS will verify that the challenge came from the same device as the device last recorded.
- IDPS will notify the user and inform that a security breach was detected as well as make recommendations on how to react.
- DE_AUTHENTICATION_ATTACK_c
- IDPS detect software that is talking and compare this with the normal software and endpoints.
- IDPS will notify the user and inform that a security breach was detected as well as make recommendations on how to react.
- IDPS will notify other licensed devices and isolate itself preventing it from infecting or compromising other devices.
In a perfect scenario, a hacker would try to obtain administrator credentials or even create an administrator account. Once the hacker has an account with enough rights to connect to other devices and install software on them, the network becomes under the hacker's control. Hackers usually wait until off-site and on-site backups contain the exploits and backdoors before they proceed.
Here, the hacker passes the login credentials and ways to access the systems to a group of data managers in order to steal data, install malware, and encrypt data with ransomware.
Use the hacker’s data to upload small amounts of sample data to proof to the victim that the hack is real.
- Use IDPS to catalog the effective file permission on a user’s account.
- Isolate computers and accounts that look to have been compromised.
- IDPS will notify the user and inform that a security breach was detected as well as make recommendations on how to react..
- IDPS will notify other licensed devices and isolate itself preventing it from infecting or compromising other devices.
- Use the IDPS LDAP SandBox to host a fake and easy to crack user management to detect tampering
- Use IDPS to log changed permissions on live systems.
- Shutdown/kill processes of an affected system if bulk changes are detected IDPS will notify the user and inform that a security breach was detected as well as make recommendations on how to react.
- IDPS will notify other licensed devices and isolate itself preventing it from infecting or compromising other devices.
- Use the IDPS LDAP sandbox to host a fake and easy to crack user management to detect tampering.
- IDPS will disable the account on the network preventing the compromised user to exploit the other systems.
- IDPS will notify the user and inform that a security breach was detected as well as make recommendations on how to react.
- IDPS will notify other licensed devices and isolate itself preventing it from infecting or compromising other devices.
- Use IDPS reports to generate exposure reports so you can see what they might have.
- Use IDPS file access auditing to monitor erratic file access by a process and alert or shutdown the process if detected.
Data managers will obtain the systems as well as the credentials to access these systems from hackers/ affiliates. They then use this software to get paid. These cybercriminals are after the money, if the victims do not pay within a certain time they typically sell the data on to the group called Negotiators and Chasers.
It is important for IDPS to detect attackers early, if data is ex-filtrated the only option is to minimize harm. Please note that some incident managers will, in coordination with the owners, allow the incident to continue for forensics reasons. Please contact support@vesnx.com if you are compromised
When it comes to ransomware, a negotiator is someone who is specialized in getting the victims to pay a ransom in order to unlock locked systems. In order to offer the victims a round-the-clock service by getting them to pay, the negotiators are probably working in shifts.
Chasers perform the same as the negotiators. They are usually less accommodating and will start threatening that if you do not pay and restore your system, they will keep attacking you and continue taking your systems down.
We do not negotiate with ransomware teams. There are services that specialize in negotiating a lower ransom. We feel that these services do not deliver what they claim, especially when you consider the fee charged. These companies can't negotiate on your behalf without you getting involved (sometimes paying ransom is illegal) and can't guarantee the payment will be lower than what you can negotiate yourself, or that the stolen data won't get sold on the dark web.
Negotiators & chasers will try and buy or take-over an active ransom exploit and ensure everyone in the kill chain gets paid.
CHASERS__ACTIVITIES_A
A summary on the ransomware kill chain
The strategy of an antivirus is to protect the user from opening documents that contain malicious code, in this section, we demonstrated that detection and prevention is key. Any attempt should be made to stop malicious activity before bad actors have gained a physical presence on a system.
Any attempt to remotely control a system, when detected, should isolate the source as it is the only viable option to halt or minimize the effects that such activity will have. Antiviruses do not do that.