How Defender ATP Thwarts Emerging Attacks
I’ve had the good fortune recently to do a few Proof Of Concepts on different security software with some clients who’ve recovered from ransomeware. Though they had sophisticed Intrusion Prevetion systems in place and ACLs locked down like Fort Knox, these were grueling events that passed through all sorts of web filters and AI-powered and deep packet checks that were delivered to a user who unknowlingly opened the payload.
Most of these Ransomeware attacks don’t enact their encryption protocol right away. As other security professionals can tell you, they tend to live off the land a bit and move latterally.
There’s a whole range of products and services that exists specifically to combat this scenario, but the one I’d like to show off a bit is Microsoft’s own Endpoint Detection and Response solution. You can rightfully think of it as a host-based intrusion prevention/detection system. Below is how Microsoft envisions all their services tie together to combat the lifecycle of a typical web-based attack
Anyway, one of the core copetencies it brings to the table and distiguishes itself from other major players in the field like Carbon Black, CrowdStrike, Cylance, and PaloAlto is Microsoft’s device hardening measures - Attack Surface Reduction. Another major advantage is that it’s Agentless. Sneaky Microsoft built the sensor right into the Operating System inexorably.
What is Attack Surface Reduction?
Microsoft’s Attack Surface Reduction rules (reproduced below) are efforts to overcome the common vulnerabilities sophisticated attacks use to compromise a individual computer. These rules though are only a subset of the Attack Surface Reduction capabilities Defender ATP offers and are the most compelling proactive feature of the service.
What Are These Emerging Threats?
Why are these rules compelling and cumulatively, how do they coalesce to thwart emerging threats? According to Symantec’s last Internet Security Threat Report, 48% of Malicious email attachments are office files. This is up from 5% in 2017.
As the report goes on to note:
Use of malicious PowerShell scripts increased by 1,000 percent in 2018, as attackers continued the movement towards living off the land techniques. A common attack scenario uses Office macros to call a PowerShell script, which in turn downloads the malicious payload. Office macro downloaders accounted for the majority of downloader detections, while VBS.Downloader and JS.Downloader threats declined.
Looking back at our Attack Surface Reduction Rules, can you spot which ones would go into effect with these attacks?
How Can I Test My Defenses?
As part of a POC, we run a series of tests against the newly established environment and Microsoft has a site to run evaluation scenarios to put Defender ATP through its paces. This means running scenarios to test each ASR rule.