Track Common Adversary Tasks Performed Using Bisonal

 





To know more about it, you can go through my detailed document by clicking here







Overview

Bisonal RAT is used by Tonto team to target public as well as private sector organizations of Russia, South Korea, and Japan since 2010. Since few years, it has evolved as well as used various techniques to avoid detection while maintaining the core of its RAT the same.

How Does It Works?

It generally spreads via enticing phishing emails that lures the victims into opening the links or files attached to them. This allows them to create a strong foothold within the victim's networks. They generally attacks a specific target which means that are mainly interested in operational intelligence gathering and espionage. 

Prevention:

  • Training- As humans tend to make mistakes in an IT industry, a regular social engineering awareness training is recommended, so that, they can become the primary firewall to defend against social engineering attacks.

  • Defense in Depth- An in-depth defense strategy can be applied, that instead of preventing the attack, slows down the progression of the attack just enough, so that the defenders can take action in the meantime. 

  • Intrusion Detection systems- They can be used in order to detect various attacks like buffer overflows, CGI attacks, SMB probes, OS fingerprinting, etc.

  • System Integrity Verifiers (SIV)- Any changes in the system components can be detected while also comparing the snapshots of file systems with the pre-existing baseline snapshots in order to secure against any kind of system intrusion.

  • Multihomed Firewalling- This technique can be used in which firewalls having more than one interfaces to further subdivide the network are required, in order to minimize the amount of damage done by an attacker on a private network.

  • Honeypot- This method is used to attract or trap the attackers trying to gain unauthorized access, in order to learn more about their motives and objectives.

  • Patch Management- The defender must have up-to-date software and firmware patches, so that they can be deployed whenever needed.









To know more about it, you can go through my detailed document by clicking here




































Comments

Popular posts from this blog

Deployment (Part 3)

Deployment (Part 1)

Project Resourcing (Part 2)