In a previous article we discussed a bit about how Advanced Persistent Threats (APT) were making network defense more challenging for cybersecurity professionals. A recent article on TechRepbulic takes a look at how Advanced Evasion Techniques (AET) are being used by cyber attackers to make APTs harder to discover.
The illustration shows how AETs work, by cutting the exploit code into smaller pieces (fragmentation) and sending them on unexpected ports (obfuscation) in order to pass through perimeter defenses, and then reassemble once inside the victim network to begin the exploit. The Tech republic article references another PDF download from McAfee that goes into deeper detail. Both articles are a great read if you are tasked with managing network security for your organization.
The McAfee article states:
“There are millions of working combinations and permutations of AETs that may alter form during
attacks,” said Pat Calhoun, senior vice president of network security for McAfee. “This is why traditional
signature or pattern-match detection, the methods used by the majority of today’s network security
solutions, cannot effectively combat AETs.”
McAfee has a free tool called Evader which can be used by organizations to uncover evidence of AETs on their network.Share