Retail: Fortifying The Cybersecurity Posture Against APT
CovertSwarm strengthens its security posture by acting as an external APT while reporting the findings to mitigate the threats.
CovertSwarm strengthens its security posture by acting as an external APT while reporting the findings to mitigate the threats.
US & Canada | Retail | B2C
Our client is a global business-to-consumer (B2C) retail organization operating a considerable IT function that serves their customers through e-commerce platforms and retail sales, as well as supporting their 250,000+ internal staff.
They maintain a mature cybersecurity posture including their own Security Operations Center (SOC), internal pen testing and red teams.
CovertSwarm was engaged to strengthen their security posture by acting as an external Advanced Persistent Threat (APT). This involved attempting to breach their assets in any way possible to identify and remediate their vulnerabilities before the real bad guys can exploit them.
The client’s main question was “how do you get an outside view if you employ everybody yourself?”
They required CovertSwarm to work in an effective closed-box manner to think about how we could breach their infrastructure without any prior knowledge of the code, architecture, or system design.
Our team had to act as an effective external APT, working autonomously to find and breach unknown gaps using methodologies not employed by their team but that real-world attackers could.
After successfully attacking and breaching previously unknown vulnerabilities, CovertSwarm offered support to their internal team to remediate them.
A new member of staff, still in the onboarding phase, received a CovertSwarm spear phishing email and clicked on the link, mistakenly believing that it was part of the onboarding process. As a result, the CovertSwarm team was able to steal their user credentials and the Multi-Factor Authentication (MFA) tokens. Within approximately 60 seconds, the user realized their error and suspected that they could have been phished.
The employee reported the incident and alerted their security and IT teams. This instigated the accredited ISO 27001 process for phishing breaches, which led to the termination of the user’s access and forced a password and MFA reset. However, the response process failed to terminate the VPN access that the CovertSwarm team had automatically gained as part of that initial attack.
Due to this oversight, CovertSwarm was able to establish persistence and move laterally, undetected, within the estate.
The CovertSwarm team found the Citrix platform, which is used to enable secure remote access to applications and data. Although we were unable to access any authenticated Citrix applications, we could exploit any unauthenticated ones. Then, another Swarm member with a different set of skills, took on this challenge and utilized a weakness within an application exposed through Citrix, enabling Remote Code execution.
Using Remote Code execution, we were then able to install our own Command and Control infrastructure (C2) on that Citrix host. This allowed the team to further move laterally behind that host inside of the client’s critical estate.
Additionally, we were able to exfiltrate data without being detected or blocked by the client’s security systems.
The spear phishing incident exposed critical vulnerabilities in the company’s security, allowing CovertSwarm to breach their systems and lateral move undetected within their network.
This led to impactful changes in a variety of areas, such as updating the ISO 27001 process, improvements to the client’s detection of lateral movement, Citrix, and EDR, as well as the implementation of SOC, SEAM and firewall rules.
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from the CovertSwarm experts.
Cybersecurity Glossary
Read this comprehensive list we’ve compiled to assist experts, C-level executives, and those embarking on a cybersecurity career in navigating the extensive array of terms in…
An In-Depth Guide to Remote Desktop Protocol (RDP)
The continually changing nature of today’s workplace has made remote access technology essential.
Mitigating Credential Stuffing Attacks with IP Rotation: Strategies and Considerations
This article covers effective strategies to fight credential-stuffing attacks using IP rotation. By Ibai Castells
CovertSwarm at DEF CON 32: Insights from the Swarm
This time last week, our Swarm was taking over Las Vegas at DEF CON 32 – one of the biggest and oldest hacker conventions in the…