SoylentNews
SoylentNews is people
https://soylentnews.org/

Title    Attackers Evade Detection by Randomizing TLS Handshake Ciphers
Date    Friday May 17 2019, @05:56PM
Author    martyb
Topic   
from the it-works-until-it-doesn't dept.
https://soylentnews.org/article.pl?sid=19/05/16/2330219

Fnord666 writes:

Cybercriminals are using a new method to evade detection to make sure that the traffic generated by their malicious campaigns is not being detected, a technique based on SSL/TLS signature randomization and dubbed cipher stunting.

The vast majority of malicious traffic on the Internet — including attacks against web apps, scraping, credential abuse, and more — is funneled via secure connections over SSL/TLS says Akamai's Threat Research Team in a report published today.

Akamai's report says that "From an attacker's perspective, tweaking SSL/TLS client behavior can be trivial for some aspects of fingerprinting evasion, but the difficulty can ramp up for others depending on the purpose of evasion or the bot in question. In such settings, many packages require deep levels of knowledge and understanding on the attacker's part in order to operate correctly."

This technique is used by attackers to evade detection and run their malicious campaigns undisturbed, with at least a few tens of thousands of TLS fingerprints being used for such purposes before the novel cipher stunting evasion method was observed by the researchers.

Source: BleepingComputer


Original Submission

Links

  1. "Fnord666" - https://soylentnews.org/~Fnord666/
  2. "BleepingComputer" - https://www.bleepingcomputer.com/news/security/attackers-evade-detection-by-randomizing-tls-handshake-ciphers/
  3. "Original Submission" - https://soylentnews.org/submit.pl?op=viewsub&subid=33821

© Copyright 2024 - SoylentNews, All Rights Reserved

printed from SoylentNews, Attackers Evade Detection by Randomizing TLS Handshake Ciphers on 2024-04-18 03:06:24