Automated Moving Target Defense

Next generation, automated cybersecurity for stopping ransomware, supply chain attacks, zero-days, fileless and other undetectable attacks in-memory at runtime. Ideal for augmenting NGAV, EDR and XDR with no additional staff needed and no performance impact on endpoints or servers.

What is it?

What is Automated Moving Target Defense?

Automated Moving Target Defense (AMTD) is a proactive cyber defense strategy that protects systems by making them unpredictable and difficult to attack. AMTD works by changing and moving system resources, such as runtime memory, to create a constantly shifting attack surface. This makes it harder for attackers to find and exploit vulnerabilities.

AMTD, also called Moving Target Defense (MTD), prevents ransomware, supply chain attacks, zero-day attacks, fileless attacks, in-memory attacks, and other advanced threats. It uses system polymorphism in memory to hide operating system and application targets from adversaries in an unpredictable manner. This leads to a dramatically reduced attack surface and lower security operating costs.

Assume an expert thief can pick the lock to any door. The goal of MTD is not
to build a better lock. This is, without doubt, a laudable and necessary goal
for improving the door’s security, but this mission is left to other security
solutions. Instead, the goal of an MTD security strategy is to make the door
and the door’s lock difficult or impossible for the thief to find.

How it works

Moving Target Defense explained

Despite massively expanding investment in cybersecurity, damage from cyberattacks continues to rise at an unprecedented rate, projected to reach over $10 trillion by next year. If existing solutions were working, ransomware and supply chain breaches wouldn’t be happening and inflicting so much financial devastation, brand erosion, and business loss. Today’s solutions are manifestly not countering threat actors’ advanced attacks.

Next generation antivirus (NGAV), endpoint protection platforms (EPP), and endpoint detection and response (EDR and XDR) solutions stop known attacks with recognized signatures and behavioral patterns. But they often do not detect or prevent the more disruptive advanced attacks organizations are experiencing today – the undetectable attacks such as zero-days, malware variants or supply chain attacks that lead to ransomware. A new technology recognized by Gartner is proven to stop advanced threats pre-emptively, making prevention-first security a reality: Moving Target Defense (MTD), also known as Automated Moving Target Defense (AMTD).

As an application loads to the memory space, Morphisec morphs the process structures, making the memory constantly unpredictable to attackers.

Legitimate application code memory is dynamically updated to use the morphed resources; applications load and run as usual. A skeleton of the original structure is left as a trap.

Attacks target the original structure and fail as they cannot find the resources they expect and need. Attacks are immediately prevented, trapped and logged with full forensic details.

Automated Moving Target Defense research guide

Your one-stop-shop for Gartner research to help select Automated Moving Target Defense technology and solutions.

Benefits

What are the benefits of Moving Target Defense?

The mainstream paradigm of cybersecurity has long focused on detection and response. This approach is inherently reactive, and cedes the innovation advantage to threat actors.

AMTD changes the calculus of protecting critical systems. It is a proactive, prevention-first system. It interrupts the progression of cyberattacks and stops threat actors’ ability to gain persistence in target organizations.

“The US Department of Homeland Security defines Moving Target Defense as, “controlled change across multiple network and system dimensions to increase uncertainty and complexity for attackers by reducing their window of opportunity and increasing the costs of their probing and attack efforts.”

Automated Moving Target Defense lowers IT and security team costs and effort by slashing ‘false positive’ security alerts, IT support tickets, and analyst alert triage time.

It protects critical systems through the same kind of polymorphism and evasion that adversaries have used to great effect in the past 10 years. It provides a proactive approach for defenders, rather than waiting for threat actors to breach their systems and find the holes. It empowers organizations to prevent breaches on the endpoint before they can spread and perpetrate ransomware.

Proactive rather than reactive defense doesn’t wait for attackers to breach before working.

Virtual patching protects vulnerabilities until a patch is issued.

Polymorphic defense hides exploits from polymorphic attacks.

Slashes costs, false positive alerts, and required IT resources.

Stops attackers’ ability to gain persistence.

Use cases

Why is Moving Target Defense needed?

Almost all malicious software, or malware, was once executable files on disc or the operating system (OS). These executables leave behind evidence of their existence. Tools like antivirus (AV), NGAV, EPP, EDR, and XDR evolved to spot telltale signs of malware deployment, such as attack patterns and signatures. They would then isolate threats before they could do real damage.

But sophisticated threat actors are wise to traditional cybersecurity tools. Attack chains increasingly hijack legitimate system processes for malicious ends or target device memory at runtime rather than the disc or OS. Hijacked legitimate system processes and in-memory threats offer little, if anything, in the way of signatures to detect or behavior patterns to analyze.

Legitimate system processes must work in memory at runtime, but this environment is mostly invisible to current cybersecurity tools. To catch an attack in progress, they need to scan device memory multiple times while an application is running and listen to the correct triggering operations to find malicious patterns. But in a typical application’s runtime environment, there might be 4GB of virtual memory. Even when dialed to the most aggressive alert settings, it’s impossible to scan this volume of data often enough. At least without slowing down an application so much as to make it barely usable.

To ensure usability, memory scanners can only look for highly specific parameters, at specific memory locations, and at specific timeline triggers. In a best-case scenario, a scanning-focused solution might scan a small fraction of application memory. But threats also now use polymorphism to obfuscate their presence, so catching malicious activity in such a small sample of device memory would be miraculous.

Aggressive alert settings also result in a vast number of false positive alerts that require extra resources to analyze. If a high number of alerts and false positives aren’t an issue for an organization using current cybersecurity tools, their alert setting is probably too low. They are almost certainly missing the most disruptive advanced attacks.

This is why organizations need MTD.

Automated Moving Target Defense technology morphs the runtime memory environment to create a continually changing, unpredictable attack surface. This means that even in the highly unlikely event a threat actor can find their target once, they’re unable to reuse that attack on another device or even later on in the same device. MTD uses an ultra-lightweight agent to block unauthorized processes deterministically, as opposed to probabilistically. This means MTD generates a few false positive alerts and doesn’t noticeably affect system performance. It integrates seamlessly into a tech stack to augment NGAV, EPP, EDR, and XDR with Defense-in-Depth to stop in-memory, fileless, zero-day, supply chain attacks, and other advanced threats.

Summary

Moving Target Defense: innovative and disruptive technology

Moving Target Defense uses techniques similar to those of attackers, such as polymorphism, deception, and evasion. It obfuscates targets by randomizing application memory runtime so a threat actor can’t accurately identify their target.

Imagine a fork in a road with a road sign. In one direction is a mansion full of riches. In the other direction is a dangerous, sheer cliff. MTD switches which way the road sign points.

Threat actors who travel this imaginary road are diverted to the sheer cliff. Meanwhile, legitimate traffic is still sent to the mansion. Employees get work done, while threat actors are refused entry. AMTD, also called Moving Target Defense (MTD), prevents ransomware, supply chain attacks, zero-day attacks, fileless attacks, in-memory attacks, and other advanced threats. It uses system polymorphism in memory to hide operating system and application targets from adversaries in an unpredictable manner. This leads to a dramatically reduced attack surface and lower security operating costs.

FAQs

What is Moving Target Defense?

Moving Target Defense (MTD) is a preemptive cybersecurity strategy that employs system polymorphism to make operating systems and applications unpredictable. By continuously altering the attack surface, MTD complicates efforts by attackers to locate and exploit vulnerabilities, significantly enhancing overall security.

What is the difference between MTD and AMTD?

Moving Target Defense (MTD) is a general strategy that involves changing and moving system resources to create an unpredictable attack surface. Automated Moving Target Defense (AMTD) enhances this by automating these changes, making the system continuously dynamic without manual intervention, thereby increasing the complexity for attackers.

What is the difference between AMTD and ASLR?

Windows ASLR works at system boot-time, then the system is static.  ASLR’s mechanisms are known by attackers and can be bypassed using memory read iterations and other exploits. ASLR doesn’t include traps, so while protecting memory, malicious processes continue to run, and there is no attack visibility.  

AMTD works at process load time, creating a continually changing attack surface. It also creates decoy traps, which provides visibility into malicious processes and triggers their termination. 

What is the Moving Target Defense approach?

The Moving Target Defense approach involves continuously altering system configurations and environments. By doing so, it increases uncertainty and complexity for attackers, reducing their chances of finding and exploiting vulnerabilities. This preemptive method disrupts attack patterns by providing no consistent target.

What are the different types of Moving Target Defense?

Environment and Artifact Deception: Uses deceptive tactics such as bait data and simulated environments to mislead and trap attackers, making cyber attacks self-defeating by exposing the attackers. 

Dynamic Network Defense: Utilizes technologies that alter network configurations and traffic routes dynamically, increasing unpredictability to prevent interception or manipulation by attackers. 

Memory Attack Prevention: Protects servers and workstations by continuously changing memory handling techniques to block exploits. 

Storage Defense: Applies changing strategies in data storage and retrieval within storage networks to thwart data corruption or unauthorized access. 

Deception Across Contexts: Deploys a variety of misleading signals and information across multiple IT layers, confusing attackers and diluting their efforts. 

See Automated Moving Target Defense in action

Schedule a personalized demo to see how AMTD prevents ransomware, zero-day, fileless, and other advanced attacks that other technologies don’t.