As more employees are being asked to work remotely, organizations that are not already fully remote will naturally experience a shift in internal network traffic, which directly impacts the behavioral detections identified by the Vectra AI platform.
Vectra is making the following recommendations for users of the Vectra AI platform to identify and manage the expected increase in behavioral detections related to certain remote worker conditions.
When building a triage filter in the Vectra AI Platform, the configuration of source condition rule suggestions is to use non-datacenter source IP space. If the analyst is unable to differentiate between data center and non-datacenter source IP space in the platform, then Vectra recommends using All Hosts.
As remote workers need to continue to be connected to their peers, clients, and partners without in-person communication, the use of web conferencing and instant messaging software is expected to grow. This usage will encompass not only peer-to-peer video communication but will also be used for sharing information through multiple methods including file sharing, screen sharing, and other related activities. These communications and file-sharing behaviors will likely increase the number of behavioral detections in the Vectra AI Platform. It is recommended that users identify the expected communication services within their organization and create custom filters to mark those as expected behaviors.
For example, Microsoft Teams can be easily identified either by the IP range in use: 52.112.0.0/14 or by the primarily used protocols and ports: UDP 3478 to 3481. By leveraging this information, triage rules can be written with minimum impact to normal operations. By default, several video conferencing providers’ IP ranges are already part of the platform's Groups pages, as shown in Figure 1, that help identify known legitimate behavior.
The expected network behaviors related to the use of web conferencing tools would be the following:
Web conferencing software is a commonly used remote application within most organizations and has the capability of controlling another user’s system. For this reason, there are known attacks that leverage existing web conferencing software for malicious purposes. Common behavioral detections related to the use of web conferencing software include the following:
As exfiltration detections are based upon traffic patterns and the amount of data usually sent to a specific destination, an increase in related exfiltration detections may be seen as users share files or send video.
In addition to configuring custom rules, the Vectra AI Platform has predefined triage templates for known web conferencing software designed to reduce the noise generated by web conferencing activities.
Another expected area of growth will be in the use of remote access tools such as TeamViewer to access internal resources. This will especially be true if the corporate VPN is not able to handle the traffic for the entire company, necessitating alternative means of managing internal resources.
In the same way an administrator would use remote access software to manage a server, an attacker regularly wants to access and manage these internal systems as part of their attack lifecycle. Because there is a sudden and sharp increase in legitimate remote access, this detection model may trigger an immediate increase in previously seen remote access behaviors. Vectra recommends identifying these expected services and creating custom filters to mark as approved.
By design, remote access tools provide the ability to control both other users’ machines and servers, which is also an attacker’s goal. The more popular tools leverage the vendors' external servers as relays (e.g., LogMeIn, TeamViewer) between the user requesting access and the system to be managed. This makes these tools more easily identifiable as they occur from a known address space. For example, TeamViewer servers are explicitly named in the remote access behavior detection description field, which can then be leveraged for a triage filter after an analyst's strict validation that this is authorized remote network traffic.
In addition to third-party remote access tools, Windows natively provides remote access functionality that allows a user to directly access internal devices that would usually be restricted but now require remote access for an administrator to function remotely. For example, a jump server could allow the Microsoft Remote Desktop Protocol to access specific systems to a privileged user. Due to the versatility of these tools, we recommend rule creation be as narrow as possible.
The expected network behaviors related to the use of remote access tools would be the following:
While online file sharing services like OneDrive and Dropbox are already popular in the enterprise and for consumers, we expect to see increased usage and leveraging of file-sharing services as the primary means of document sharing and editing. Understanding how these file-sharing services will be used within the organization is critical. Analysts can investigate if file-sharing services currently in use and seen in the Vectra AI Platform are approved by validating if the external host complies with the company’s security policy.
Exfiltration behavior detections are related to the volume of data sent and the destination. We expect to see a deviation in both attributes, which will trigger the following behaviors during the extended work-at-home time period:
As users work from home, they may be inclined to leverage a personal system in their home environment. In the event that this does occur and a new system is leveraged over VPN access to internal resources, the Vectra AI Platform will identify these devices as new hosts, which may lead to a variety of privilege anomalies and other new behavior detections based upon never-before-seen system-to-user-to-service access patterns. The platform's Host Details page provides details to identify an unknown host by name, accounts, and last seen time and date. This information, along with the identification of the organizational VPN IP pool in the Groups Page, will help an analyst identify unknown user devices efficiently.
Note: Vectra strongly encourages analysts not to write custom filters without initial investigation due to the nature of the behaviors expressed in the above detection models. For hosts that are identified and authorized by an analyst, filters should be written for those specific hosts only.
We expect to see a large increase in VPN use as the bulk of organization users work remotely but still need access to the same internal resources they had when working in the office. This means that VPN availability will be critical for the organization to function and will be required to handle a much larger volume of traffic than usually seen.
Some user behaviors that would normally be innocent and benign when performed inside a network, such as listening to music apps on a PC while working, could be a problem on a full-tunnel VPN. A full-tunnel VPN sends all internet traffic through the organization's internal network, thus consuming large volumes of network bandwidth, which causes VPN resource exhaustion.
Users of Vectra Recall and Stream can track this type of normally benign traffic in order to identify users with large volumes of bandwidth consumption.
If the corporate VPN uses Network Address Translation (NAT) to assign the same IP to multiple concurrent users, Vectra recommends the following procedures:
If NAT functionality is not available and only one user can be assigned an IP from the VPN pool, Vectra recommends the following procedures:
Please note that if the organization's user base is using a split VPN, analysts can expect a reduced number of behavior detections. With a split VPN, some of the user’s traffic will go straight out to the internet without first traversing the organization's internal infrastructure.