To break in unnoticed, hackers will use the same tools as administrators. You can catch them regardless Credit: Thinkstock When I see the mainstream press cover the latest bank hack or retailer data breach, I want to laugh. The headlines scream: “10 banks breached!!” They should really say: “Every bank and retailer in the world has been breached — here are 10 we’ll tell you about today!”Yup, nearly every company is either actively compromised or could easily be compromised. That’s a fact and it’s been true for a while.What’s changing is that the bad guys are becoming harder to detect, thanks to a new attack paradigm. It’s important to understand this new paradigm and take it into account as you develop your security defense plans.Sneaky is as sneaky doesIn a nutshell, attackers are spending even more of their efforts using legitimate tools that will not alert antimalware software. This attack method isn’t new, but in a contemporary twist, many malicious hackers are using these tools for most — if not all — of their nefarious activities. Until recently, attackers who dealt in advanced persistent threat (APT) or other complex attack methods gained their first foothold in a company almost exclusively by tricking users into downloading and executing malicious software inside the corporate network. After they get access, they download more attack tools to the first compromised victim’s computer, capture logon credentials, and go to town, moving on to other workstations and servers. Within a short period of time, they usually have privileged access to a domain controller, use a password hash-dumping tool, retrieve all the hashes, then move on to other badness.But currently, attackers are using far less malicious software. If they can work with a built-in tool, script, or programming language to do their misdeeds, they will. I’ve seen a lot of new malicious scripts, including PowerShell, Perl, and PHP, used to copy files, download logon credentials, and even inject malicious code into already running processes (the last one is very difficult to detect). I’ve seen a rash of hackers using built-in Windows Management Instrumentation (WMI) commands. WMI is a lot more powerful than many admins realize. It can be used to query almost everything about a computer, modify operations, and yes, carry out lots of mischief. Some companies that have run into these WMI-toting criminals are turning off whatever legitimate WMI processes they have and detecting any WMI use as an early-warning system.We of course can’t forget Bash and Shellshock. That’s a great example of a legitimate, built-in tool used for malicious purposes, which initially can be hard to detect. In the Windows world, attackers have long been using the shell commands built into Windows and the DOS command-prompt. The only difference is I’m starting to see even more of it.I’m also seeing (and hearing about) scripts that copy malicious code past firewall defenses as ASCII text files, compile the code in the files into an executable, and patch it into memory to be run by another installed, legitimate program. ASCII sneak-by attacks were fairly popular in the 1990s, and it looks like they’re making a comeback.Less often, I see common hacking software programs and customized executables. Don’t get me wrong — I still find plenty of them, and my customers are dealing with them. The big difference is a lot of my customers thought they were safe and clean because they hadn’t detected malicious executables in a while. Sometimes absence shouldn’t be celebrated.Defensive changesWhat can you do?If your main security plan relies on detecting malicious files, you need to supplement it fast. How? I’ve always been a big believer in honeypots as an early-warning system. Take a few computers you’re getting ready to throw away or decommission and turn them into honeypots. It’s the best bang for the buck when you’re detecting the nearly undetectable. Next, on high-value assets, consider enabling detecting methods that will record every keystroke of an attacker’s movement. It’s no longer good enough to detect previously unknown software or use software that detects “newness” by executable file name alone. For example, if the attacker is running JavaScript or PHP, detecting the use of jscript.exe/jscript.dll or php.exe isn’t enough. You want to catch the entire script and the scripting commands executed.Finally, make sure your tools can detect memory-only malware. I blew off memory-only malware as a big threat last year, but now it’s making a huge comeback. Many point-of-sale infections have been memory-only malware, and hackers have been watching their success and creating even more. Can your antimalware software catch memory-only malware or malicious scripts that inject or patch legitimate processes with enough badness to do what they need to do? If not, upgrade.A friend recently said: “Attackers have always been attempting to manage computers the same as administrators. It’s always been a fight over who does it better.” True words, all around. Related content analysis The 5 types of cyber attack you're most likely to face Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront By Roger Grimes Aug 21, 2017 7 mins Phishing Malware Social Engineering analysis 'Jump boxes' and SAWs improve security, if you set them up right Organizations consistently and reliably using one or both of these approaches have far less risk than those that do not. By Roger Grimes Jul 26, 2017 13 mins Authentication Access Control Data and Information Security analysis Attention, 'red team' hackers: Stay on target You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws By Roger Grimes Dec 08, 2015 4 mins Hacking Data and Information Security Network Security analysis 4 do's and don'ts for safer holiday computing It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily By Roger Grimes Dec 01, 2015 4 mins Phishing Malware Patch Management Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe