账号妥协

账号妥协指攻击者通过非法手段获取合法用户凭证以渗透目标系统的行为,传统手段包括钓鱼邮件、暴力破解等。防御措施通常依赖多因素认证、异常登录检测(如地理异常、设备指纹突变)以及凭证泄露监控。然而,随着攻击者匿迹技术的演进,传统基于规则匹配与单点日志分析的防御体系面临严峻挑战。
为规避账号异常行为检测,攻击者发展出多维度的匿迹技术,通过身份伪造、攻击链解耦、行为模式伪装等策略,将凭证窃取与滥用过程深度融入正常业务交互,显著降低了攻击行为的可观测性。
当前账号妥协匿迹技术的共性在于"身份可信化"与"攻击去特征化"。攻击者通过构建虚拟身份的社会资本降低防御警惕性,利用分布式架构与低频策略稀释行为异常性,并依托地下数据生态实现非接触式攻击:凭证钓鱼隐蔽投递将恶意负载嵌入合法业务流程,利用通信加密与链路混淆规避内容审查;分布式低频爆破通过全球节点协同与节奏控制,使单次登录尝试在时空维度呈现随机分布特征;第三方凭证库接入技术完全剥离攻击者与目标的直接交互,利用暗网数据流通的匿名性切断溯源路径;社交工程仿冒则通过数字身份克隆构建信任背书,使得恶意行为获得合法交互的外在表征。这些技术共同实现了攻击链的"表面合法化"与"意图模糊化",使得传统基于已知IOC或单维度行为规则的检测机制失效。
匿迹技术的普及迫使防御体系向身份行为基线建模、跨域关联分析方向演进,需整合UEBA、暗网情报监测与社交图谱分析能力,构建覆盖凭证全生命周期的动态防护机制。

ID: T1586
Sub-techniques:  T1586.001, T1586.002, T1586.003, T1586.004
Tactic: 攻击准备
Platforms: PRE
Version: 1.2
Created: 01 October 2020
Last Modified: 11 April 2023

匿迹效应

效应类型 是否存在
特征伪装
行为透明
数据遮蔽
时空释痕

特征伪装

攻击者通过伪造数字身份特征与通信协议特征实现账号渗透行为的表面合法化。例如在社交工程仿冒中构建高仿真虚拟身份,匹配目标组织的职位架构与沟通模式;在凭证爆破中模拟真实用户的登录失败模式,使得恶意尝试与常规操作在行为指纹层面无法区分。

数据遮蔽

采用端到端加密通信传输窃取的凭证数据(如通过HTTPS回传钓鱼结果),利用Tor网络或区块链匿名协议访问第三方凭证库,确保攻击链中的数据交换过程不可见。加密通道与匿名网络切断了关键攻击证据的获取路径。

时空释痕

通过分布式节点实施低频次、长周期的凭证试探,将集中式攻击稀释为全球多源点的稀疏事件。例如分布式爆破技术使单IP的登录尝试频率低于检测阈值,同时动态切换的地理位置破坏行为模式的空间关联性,导致攻击特征在时间与空间维度被充分稀释。

Mitigations

ID Mitigation Description
M1056 Pre-compromise

This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.

Detection

ID Data Source Data Component Detects
DS0029 Network Traffic Network Traffic Content

Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)).

DS0021 Persona Social Media

Consider monitoring social media activity related to your organization. Suspicious activity may include personas claiming to work for your organization or recently modified accounts making numerous connection requests to accounts affiliated with your organization.Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access (ex: Phishing).