Multi-Stage Attacks & How To Detect Them | Splunk (2024)

Cybercriminals and threat actors use multiple vectors to infiltrate your IT network. They employ a series of coordinated steps as they…

  • Identify and exploit vulnerable IT systems.
  • Escalate access privileges.
  • Exfiltrate sensitive business information.

Impactful cyberattacks today are no longer executed as a simple virus with self-mutation capabilities, especially when many organizations rely on AI-enabled threat detection capabilities.

They’re a lot more sophisticated. In fact, attacks today are well-coordinated to the point where every stage of the attack gradually brings the attacker closer to reaching the malicious objectives — and yet their activities remain under the radar, undetected.

So, that begs the question: How do you detect such a multi-stage attack?

What is a multi-stage cyberattack?

Before we can answer this question, let’s understand what a multi-stage attack means. As the name suggests, a multi-stage or multi-vector attack is executed in a series of steps, each with its own objectives as part of the end-to-end cyberattack kill chain.

A multi-stage attack consists of several activities, often summed up in six steps. Below, I’ll describe each step — and then include corresponding detection best practices.

Step 1. Reconnaissance

The stage of intelligence gathering may not involve an explicitly unauthorized activity, but the intent of the perpetrator is to acquire maximal knowledge about the technologies, systems and frameworks operating on the network.

Hackers may engage in active reconnaissance activities such as network scanning and testing. Or, they can use passive reconnaissance measures and tools such as:

  • Network protocol and traffic analyzers
  • Open-source intelligence (OSINT) available on the target systems

Detecting reconnaissance activities

To detect intel gathering activities, unusual traffic activities such as network scanning can be discovered using network monitoring, Web Application Firewalls and threat intelligence tools.

These solutions track activities and their corresponding IP addresses.

Step 2. Initial Access

Based on the intelligence acquired during the reconnaissance stage, cybercriminals can now identify a vulnerable entry point and attempt to exploit it.

This is an initial engagement where the unauthorized network activity takes place and remains undetected. The target may be…:

  • An isolated network endpoint running an outdated and vulnerable firmware.
  • An unaware and unsuspecting user who may have downloaded malicious payload following a social engineering attack. (This user would fall under the category of “insider threat”.)

Detecting initial access activities

You can use email filtering and endpoint protection tools (like XDR) to detect unauthorized attempts to access a user account and network node. You’ll also need to train your users to be aware — how to identify social engineering attempts such as phishing and the more targeted spear phishing.

Step 3. Persistence

Once the attacker obtains initial access, their goal is twofold:

  • To maintain access.
  • To avoid any security measures aimed at discovering the compromise and closing the entry point.

Persistence is achieved by installing a malicious payload into the system. This payload may include a virus that creates a backdoor channel access to cybercriminals, such that even if the compromised entry point is discovered, criminals can find another way in.

Detecting persistence

Behavioral analysis, endpoint and integrity monitoring tools may be used to discover changing patterns in network access and traffic requests. These tools look out for:

  • Unauthorized changes to file and node configurations
  • Data access from different user accounts

Step 4. Lateral Movement

A single entry point is not enough to execute a large-scale attack. Therefore, cybercriminals aim to compromise multiple systems and network nodes. This process involves exploration through lateral movement across the network.

When moving laterally, cybercriminals typically evaluate the network architecture and understand how the traffic and data is routed between different network endpoints. The architecture involving multiple technology layers and deployment models such as virtualized in-house servers, private clouds, public clouds and microservices are discovered.

With this knowledge, cybercriminals target more access and control into the IT environment.

Detecting lateral movement

Intrusion Detection Systems (IDS) use AI models to compare the current traffic patterns with expected behavior of the network. At the lateral movement stage, the change in patterns can be significant — look out for this using network segmentation and behavioral analytics to develop precise and accurate observations around these changing patterns.

Step 5. Privilege Escalation

While cybercriminals can find their way into secure IT networks by compromising vulnerable individual entry points, executing an impactful attack and causing significant damage in the form of data access requires access to the right set of user accounts. These accounts typically belong to team leaders, product owners and business executives — people well versed and knowledgeable of persistent security risks.

To escalate to higher-level access, threat actors typically exploit vulnerabilities in software systems and misconfigurations.

Detecting privilege escalation

Adopt Identity and Access Controls that follow the principle of least privilege access. Continuous monitoring and Security Information and Event Management (SIEM) tools are used to discover activities and locations that might indicate escalating privilege, such as:

  • Changing access patterns
  • Misconfigurations
  • Vulnerabilities

Step 6. Data Exfiltration

Once the right user access privileges are obtained, cybercriminals achieve their primary objective of modifying or exfiltrating sensitive business information. They may transfer this information to external servers where they may engage in espionage or financially motivated malicious activities.

Detecting data exfiltration

To evaluate how information is shared between users and IT systems, use tools including:

  • Data Loss Prevention (DLP) solutions
  • Network traffic analysis
  • Content inspection tools

Any unexpected data transfer, access or modification must trigger an immediate isolation of the compromised network node and revoke access to compromised accounts.

Continuous improvement for security

Regular audits, ongoing security training programs and active penetration testing can help your IT teams to discover potential cyberattack incidents across all phases of the multi-stage attack.

To improve your security posture, a critical capability is to continuously improve the model of your network and traffic behavior, which is used in modern IDS and cybersecurity tools. T

his is achieved through a continuous training mechanism of your cybersecurity AI models using the right data assets — not the false alerts, false positives and false negatives, but actionable network logs that contain extensive information on all types of network and data access activities, across all network nodes and user accounts. And that’s exactly what Splunk can help you do.

Multi-Stage Attacks & How To Detect Them | Splunk (2024)

References

Top Articles
Latest Posts
Article information

Author: Greg Kuvalis

Last Updated:

Views: 6415

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Greg Kuvalis

Birthday: 1996-12-20

Address: 53157 Trantow Inlet, Townemouth, FL 92564-0267

Phone: +68218650356656

Job: IT Representative

Hobby: Knitting, Amateur radio, Skiing, Running, Mountain biking, Slacklining, Electronics

Introduction: My name is Greg Kuvalis, I am a witty, spotless, beautiful, charming, delightful, thankful, beautiful person who loves writing and wants to share my knowledge and understanding with you.