Track Common Adversary Tasks Performed Using BBSRAT

 









To know more about it, you can go through my detailed document by clicking here













Overview

BBSRAT is a type of malware that allows the attackers remotely access the compromised system and execute remote commands, codes, or deploy additional malware in the system. The threat actors behind it are called 'Roaming Tiger' and they are known to specifically target Russia or Russian speaking countries via phishing emails written exclusively in Russian.

Capabilities

Once it's inside your system, the BBSRAT can perform following task:

  1. Execute remote commands and transfer the response to the control server.
  2. Delete all the files related to its activity.
  3. List running processes and cancel the specific ones. 
  4. Receive directory structure and a list of files.
  5. Read, edit, or delete files.
  6. Upload more files from the control server.   



Defensive Measures:

  • Training- As humans tend to make mistakes in an IT industry, a regular social engineering awareness training is recommended, so that, they can become the primary firewall to defend against social engineering attacks.

  • Defense in Depth- An in-depth defense strategy can be applied, that instead of preventing the attack, slows down the progression of the attack just enough, so that the defenders can take action in the meantime. 

  • Intrusion Detection systems- They can be used in order to detect various attacks like buffer overflows, CGI attacks, SMB probes, OS fingerprinting, etc.

  • System Integrity Verifiers (SIV)- Any changes in the system components can be detected while also comparing the snapshots of file systems with the pre-existing baseline snapshots in order to secure against any kind of system intrusion.

  • Multihomed Firewalling- This technique can be used in which firewalls having more than one interfaces to further subdivide the network are required, in order to minimize the amount of damage done by an attacker on a private network.

  • Honeypot- This method is used to attract or trap the attackers trying to gain unauthorized access, in order to learn more about their motives and objectives.

  • Patch Management- The defender must have up-to-date software and firmware patches, so that they can be deployed whenever needed.









To know more about it, you can go through my detailed document by clicking here












































































Comments

Popular posts from this blog

Deployment (Part 3)

Project Resourcing (Part 2)

Design Planning (Part 3)