Cyber Crime & ForensicDevice & IoTPress ReleaseThreat Detection & Defense

New Adversary Methods for Hijacking Corporate Email Systems Described in CardinalOps’ Updated Techniques for MITRE ATT&CK v13

CardinalOps, the detection posture management company, today announced it contributed updates to the latest version of MITRE ATT&CK describing new ways in which adversary groups like LAPSUS$ hijack corporate email systems such as Office 365, Microsoft Exchange, and Google Workspace.
As the industry-standard framework for understanding adversary playbooks and behavior, MITRE ATT&CK now contains over 600 techniques and sub-techniques employed by both cybercriminal and nation-state threat groups. The latest version, MITRE ATT&CK v13, was released on April 25th.

The updated methods contributed by CardinalOps are used by adversaries to abuse email transport rules. These are the administrative rules that control how messages flow through corporate email systems. Adversaries employ these methods to:

  • Perform reconnaissance by automatically forwarding sensitive emails to mailboxes controlled by attackers.
  • Launch internal spear phishing attacks in order to steal privileged credentials for ransomware campaigns.
  • Send spam emails from compromised Exchange domains while removing headers that would flag them as suspicious.
  • Evade detection by hiding critical emails such as internal security alerts and command-and-control communication (C2) from mailboxes.

Defending Against Email Transport Abuse Attacks

Organizations can protect themselves by ensuring they have the right detections in the SOC to quickly detect and respond to these types of email system compromises.

To support the defender community, CardinalOps has published a technical blog post providing native detection rules covering these ATT&CK techniques for popular SIEM platforms including Splunk, Microsoft Sentinel, IBM QRadar, and Sumo Logic. Detecting attacks in the SIEM is critical because the SIEM is the last line of defense for detecting attacks missed by other security tools.

CardinalOps’ security research team is constantly working on new ways to detect attacks based on threat actor activity, vulnerabilities, and malware found in the wild. Here are the techniques and sub-techniques that were updated in MITRE ATT&CK v13 based on research performed by Liran Ravich, cybersecurity architect at CardinalOps:

Examples of Email Transport Abuse Campaigns
In March 2022, Microsoft published a report describing attacks by DEV-0537, also known as LAPSUS$. In these attacks, the adversary gained access to global admin accounts and later configured a tenant-level transport rule to send all mail in and out of the organization to a newly-created account controlled by the attackers. And in September 2022, Microsoft published a blog post describing how malicious OAuth applications abuse cloud email services to spread spam.

Phishing Attacks Double Year-Over-Year
Phishing attacks have seen rapid growth in popularity and have increased year over year. According to recent Kaspersky research, in 2022 phishing attacks doubled in comparison to the previous year, reaching over 500 million attempts. Phishing is an important tool in the adversary’s arsenal because it’s often used to steal corporate credentials or perform reconnaissance that can be used in later stages of an attack.

“Preventing breaches starts with having the right detections,” said Yair Manor, CTO and co-founder of CardinalOps. “We’re honored to be collaborating with MITRE to strengthen ATT&CK in new ways that help the defender community. Our security research team benefits from the nation-state expertise that its members have developed during their careers. We’ll continue to leverage their insights to help organizations continuously assess and improve their detection posture using MITRE ATT&CK as the underlying framework.”

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *