论文标题
对受损企业帐户中攻击者活动的大规模分析
A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts
论文作者
论文摘要
我们在111个现实世界企业组织中介绍了攻击者活动的大规模表征。我们开发了一种新颖的法医技术,用于区分受损的企业帐户中的攻击者活动和良性活动,该技术产生了很少的误报,使我们能够对攻击者行为进行细粒度分析。将我们的方法应用于一组159个受损的企业帐户,我们量化了时间攻击者在帐户中处于活动状态的持续时间,并检查攻击者如何访问和利用这些被劫持的帐户的主题模式。我们发现,攻击者经常居住数天到几周,这表明延迟(非实时)检测仍然可以提供显着的价值。基于对攻击者的时间计时模式的分析,我们观察到攻击者如何访问损害帐户的两种截然不同的方式,这可以通过存在劫持的企业帐户的专业市场来解释:其中一类攻击者着重于妥协和出售访问其他类别的攻击者,这些攻击者访问了访问此类招聘的访问此类访问的帐户。最终,我们的分析阐明了企业账户劫持状态,并突出了富有成果的方向,以提供更广泛的检测方法,范围从新功能的恶意帐户行为回家到开发非真实的时间检测方法,这些方法在攻击的初始攻击之后,利用恶意活动的非真实时间检测方法,以确定攻击的攻击,以确定攻击。
We present a large-scale characterization of attacker activity across 111 real-world enterprise organizations. We develop a novel forensic technique for distinguishing between attacker activity and benign activity in compromised enterprise accounts that yields few false positives and enables us to perform fine-grained analysis of attacker behavior. Applying our methods to a set of 159 compromised enterprise accounts, we quantify the duration of time attackers are active in accounts and examine thematic patterns in how attackers access and leverage these hijacked accounts. We find that attackers frequently dwell in accounts for multiple days to weeks, suggesting that delayed (non-real-time) detection can still provide significant value. Based on an analysis of the attackers' timing patterns, we observe two distinct modalities in how attackers access compromised accounts, which could be explained by the existence of a specialized market for hijacked enterprise accounts: where one class of attackers focuses on compromising and selling account access to another class of attackers who exploit the access such hijacked accounts provide. Ultimately, our analysis sheds light on the state of enterprise account hijacking and highlights fruitful directions for a broader space of detection methods, ranging from new features that home in on malicious account behavior to the development of non-real-time detection methods that leverage malicious activity after an attack's initial point of compromise to more accurately identify attacks.