Q1. You were recently quoted as saying that threat actors are pushing the limits of attack vectors. How exactly are they doing that? What are the implications of that trend for enterprise security defenders?
The geopolitical changes and tensions in the last year have led to a surge of disruptive attacks linked to the conflict zone and spillovers and given rise to cyber espionage campaigns aimed at gauging the political viewpoints of the West. A result of a divide between East and West is also noticeable in the ransomware space, where certain larger groups like Conti Ransomware have dissolved into fragmented splinter groups after issuing a political statement. The increase in splinter ransomware groups using similar attack vectors is forcing certain groups to push the limits and explore more unknown software vulnerabilities in data-sharing platforms to steal sensitive data.
[Also noteworthy is] the rise of hacktivism, as groups of loosely organized individuals fueled by propaganda align for a common cause. They use cyber tools to voice their anger and cause disruption, presenting a new and unpredictable threat to many organizations. Lastly, at the end of 2023, we witnessed generative AI take center stage. As security companies implement some of the powerful capabilities, we have observed threat actors leverage some of the basic GPT functions to create very convincing spear phishing and CEO fraud campaigns. The era of emails full of spelling errors has now passed.
The implications for enterprise security defenders are that the attack vectors are pushed to the limit, and they must now deal with a new group of attackers that they previously did not account for. Unfortunately for the defenders, the threats do not remain static, and due to the interconnection and globalization, organizations might face new threats with the next global event. Having the right threat intelligence and tools to detect and respond effectively will be crucial in facing these threats going forward.
Q2. How has APT threat activity—particularly from China—evolved in recent years? What do security leaders need to understand about APT-related risks?
Threat groups linked to the Chinese government have been active for many years. However, we have seen a slight shift in their potential objectives. In the past we have observed cyber espionage campaigns aimed at predominantly intellectual property. We now see that threat groups, like Mustang Panda, are showing an increased interest in uncovering the western political views on China as well as obtaining insider knowledge when it comes to the deployment and removal of Chinese manufactured core communication technology in western society.
The general rule of thumb that increased global tensions will lead to more cyber espionage activity is also applicable in this situation. From a Tactics, Techniques and Procedures (TTP) point of view, we continue to observe the usage of some highly deterministic Chinese linked APT malware, as well as an increased usage of Living off the Land Binaries and Scripts, which make it harder to detect malicious actions as they are performed by non-malicious tools.
When we talk to security leaders, they often do not realize the value their organization holds for APT groups. From a security point of view, they need to understand the “crown jewels” they possess, and which nation-states might be interested. Having security controls that assist security leaders and practitioners to understand, detect, and respond to state sponsored TTPs is a must. Nation-state threats are often multi-vectored, where cyber is only one tool in their espionage toolkit. If a cyber espionage campaign fails, a nation-state might use more conventional espionage methods. Understanding your organization is at risk is half the battle, as this allows security leaders to put the right security controls and procedures in place to minimize the impact of a potential attack.
Q3. How does Trellix plan on engaging with customers and attendees at Black Hat USA 2023? What services and technologies do you plan on highlighting at the event?
We have many compelling demos and speaking sessions lined up for Black Hat this year that will engage customers and attendees. At Trellix's Booth 1932 we'll be showcasing:
Trellix Endpoint Security
Keeps organizations safer and more resilient with comprehensive visibility, and control to secure endpoints before, during, and after attacks.
- Manage and Protect Endpoints at enterprise-scale
- Respond faster with AI-Guided Investigations and Advanced Forensics
- A Foundational Pillar for XDR
Trellix XDR
Quickly reveal the alerts and threats that matter, cross correlate across vectors and easily determine the critical steps to stop the attack.
- Close the Gaps with the Most Comprehensive XDR
- Prioritize with Actionable Threat Intelligence
- Empower with Exceptional Analyst Experience
Trellix Data Protection
Discovers, classifies, and protects data at rest, in use, and in motion across the organization while also providing context to Trellix XDR, to help SOC analysts quickly identify high-priority threats to the organization.
- Provide comprehensive Data Security across network, endpoint, and cloud
- Stop insider threats and outside attackers
- Be compliant with a growing number of regulatory and industry requirements
Trellix Collaboration Security
As organizations strive to innovate and grow, they create highly complex interconnected networks of external partners, suppliers, vendors, contractors, and customers introducing a largely unprotected attack vector. Trellix Collaboration Security ensures people can work together securely across the extended enterprise emerging threats.
- Seamlessly Inspect Files Shared via Collaboration Platforms
- Close Gaps from Third-Party Risks
- Extend Security Across All Enterprise Applications
We encourage attendees to check out our phenomenal speakers, many who are part of Trellix's Advanced Research Team. Their sessions span:
Apple's Predicament: NSPredicate Exploits on iOS and macOS
Austin Emmitt, Vulnerability Researcher, Trellix Advanced Research Center
Learn about the predicaments posed by NSPredicate exploits on Apple's iOS and macOS platforms. Austin Emmit, an esteemed Vulnerability Researcher from our Advanced Research Center, will delve into the intricacies of these exploits and share valuable insights on mitigating their impact.
SHAREM: Advanced Windows Shellcode Analysis Framework with Ghidra Plugin
Max Kersten, Information Security Specialist, Trellix
Co-speakers: Bramwell Brizendine and Jake Hince
Discover the power of SHAREM, an advanced Windows shellcode analysis framework integrated with the Ghidra plugin. Our experts will showcase how this tool enhances your ability to analyze and combat sophisticated Windows-based attacks.
Unveiling the Shadows: Understanding Information Stealers and the Genesis Market Takedown for Enhanced Cyber Defenses
Taylor, Consulting Solutions Engineer, Trellix
In this session, we delve into the world of information stealers, examining their methods, motivations, and the impact of their activities on victims. We explore the Genesis market takedown as a case study, shedding light on the inner workings of a major underground cybercrime marketplace that facilitated the sale of stolen credentials. By the end of this session, participants will gain a comprehensive understanding of information stealers, the Genesis market takedown, and practical steps to enhance their organization's defenses against these sophisticated attack vectors.