Autumn Combs
David Hydorn
Chiamaka Ogbonna

Links:

Project Proposal
Progress Report 1

Project Proposal

Background and Motivation

• Research Problem: How can enterprise environments better protect against cyber espionage through Kernel-mode Rootkits like Demodex, from advanced persistent threats like Salt Typhoon?
• Importance: Explain why the problem is important and relevant to the field. Advanced persistent threat actors like Salt Typhoon are targeting corporate intellectual property by invading telecommunication companies and broadband networks such as Verizon, AT&T, Spectrum, Lumen, and Cisco. To contribute to the knowledge of preventing cyber espionage and to better understand existing attack vectors, mitigations, and Structured Threat Intelligence Graphing (STIG maps) surrounding Kernel-mode Rootkits like Demodex.
• Challenges: It is difficult to replicate an enterprise environment with a home lab. The project will need to be scaled for reference to mimic an enterprise’s size and resources. There are also several steps for creating a successful testing environment including multiple virtual machines, a copy of a malware rootkit, and security tools to record the impact of the attack. Finally, a robust security plan and STIG map must be created to provide a security plan for future attacks.
• Objectives: This project aims to analyze the attack vectors of a Kernel-mode Rootkit like Demodex to produce a security plan and a Structured Threat Intelligence Graph (STIG) based on industry standards like the MITRE ATT&CK Framework. The data for this project will be collected from several security tools within a virtual machine after a simulated rootkit attack. This knowledge will then be applied to the STIG map and security plan.

Proposed Methodology

• Possible Solutions: Recreate a Kernel-mode Rootkit Attack, analyze the attack vectors and vulnerabilities, then create a security plan and STIG map with the findings.
• Evaluation Methods: 
Analysis (theoretical frameworks) – compare the security plan to industry standards such as the MIRE ATT&CK framework & STIG.
Simulation (system models) – Recreate a Kernel-mode Rootkit Attack within a virtual machine and use several security tools to analyze the impact of the attack and its vectors.
Implementation (experimental platform) – the attack will be re-created within a virtual machine to avoid damaging our systems.

Expected Contributions

Outcomes: 
The project aims to develop a validated defense framework that effectively mitigates sophisticated cyberattacks, such as those executed by groups like Salt Typhoon. By integrating compliance standards with dynamic threat models, the framework is expected to enhance detection capabilities, reduce response times, and minimize the attack surface in enterprise environments.

Contributions: 
Advanced Knowledge- Our research endeavors to bridge the existing gap between theoretical cybersecurity models and their practical applications. By harmonizing frameworks like DISA STIGs with real-time threat analysis tools such as MITRE ATTACK, we aim to offer a comprehensive strategy that is both innovative and actionable.
Practical Tools: Beyond theoretical insights, this project is committed to delivering tangible solutions. We plan to develop detailed guidelines and user-friendly tools that enterprises can readily adopt to fortify their security measures against advanced persistent threats.
Framework for Future Research: The methodologies and findings from this project will serve as a foundation for subsequent studies aiming to counter advanced persistent threats.

Impacts:
Academia: The research will contribute to the academic discourse by presenting empirical data and case studies that demonstrate the efficacy of integrated defense strategies.
Industry: Enterprises will benefit from the implementation of the proposed framework, leading to more robust security postures and compliance with evolving regulatory standards.
Society: Enhancing the cybersecurity of enterprise environments will protect sensitive data, maintain public trust, and ensure the resilience of critical infrastructure

.Targeted Conference/Journal

Conferences:

USENIX Security Symposium 2025:
Details: Scheduled for August 13–15, 2025, at the Seattle Convention Center in Seattle, WA, USA. 
Justification: Renowned for its focus on the latest advances in computer systems and network security, this symposium provides an ideal platform to present research that bridges theoretical frameworks and practical implementations.

IEEE Symposium on Security and Privacy (IEEE S&P):
Details: Recognized as a premier platform for groundbreaking cybersecurity research, IEEE S&P is scheduled for May 12–14, 2025, in San Francisco, CA. Its rigorous peer-review process and global reach make it an ideal venue to present our innovative defense framework.
Justification: As a premier venue for cutting-edge cybersecurity research, IEEE S&P is well-known for showcasing innovative defense mechanisms and theoretical advances. The rigorous peer-review process and international audience ensure that the research will be critically examined and widely disseminated.

ACM Conference on Computer and Communications Security (CCS):
Details: Set for October 13–17, 2025, in Taipei, Taiwan, ACM CCS is esteemed for its blend of theoretical insights and practical applications. Presenting at this conference would allow us to showcase our research to an audience keen on real-world cybersecurity solutions.
Justification: ACM CCS is renowned for its blend of theoretical and practical research contributions. Its focus on real-world applicability makes it an ideal venue for presenting a project that combines theoretical modeling with empirical validation through simulations and experimental platforms.

Journals:

Journal of Cybersecurity:
Details: This peer-reviewed journal covers a broad spectrum of cybersecurity topics, appealing to both scholars and industry professionals. Publishing our findings here would ensure they reach a diverse and relevant readership.
Justification: Its readership includes both academic researchers and industry practitioners, ensuring that the project’s findings reach a broad and relevant audience.

IEEE Transactions on Information Forensics and Security:
Details: Known for its high-impact publications, this journal focuses on advanced theoretical models and empirical studies addressing contemporary cybersecurity challenges. Our research aligns well with its mission to disseminate significant scientific contributions.
Justification: This journal is an excellent choice for disseminating detailed empirical results and advanced theoretical models that address modern cybersecurity challenges.

Organization of the Project and Project Management

5.1 Research Team

Autumn- UC MSIT graduating May 2025. Software engineering intern at Idaho National Laboratory and Vice President of UC’s Women in Cyber Security Chapter (WiCyS). Has experience in software, pen-testing, and network analysis.
David- UC MSIT graduating May 2025, Sales Specialist with NVISION. 9 years of professional background in sales and IT. Has experience in logistics, data management & integration flow, and user & IT system process innovation.
Chiamaka- UC MSIT graduating December 2025, provisioning activation center at Spectrum. I handle the port process of telephone lines from other providers, and I ensure customer accounts have the correct codings to function.

The team will conduct individual and group research into theoretical frameworks, such as MITRE ATTACK and STIG, and the threat actor Salt Typhoon. We will then bring our unique experiences together to recreate a simulated representative attack.

5.2 Research Plan

The project will be completed over the rest of the Spring 2025 semester between Weeks 5 and 15. The project has five main stages: 1. Analysis, 2. Simulation, 3. Implementation, 4. Project Presentation, and 5. Final Report. The timeline is depicted below in Table 1.

Table 1.

Project Management

Autumn- Team Leader
As the VP of WiCyS and software engineering intern Autumn is well suited to provide leadership by clearly identifying project objectives and serving as subject matter expert. 
David- Facilitator
David has extensive practice working with clients – exploring various system assets and offering customized opportunities and will serve as a team facilitator to guide group discussion and collaboration.
Chiamaka- Project Coordinator 
Chiamaka will evaluate project outcomes/impact and act as project coordinator to keep us on task.

References

Related CVEs

Industry Response

News

Research Institute

Cybersecurity Company

Government

Academia

Research Articles

 

Progress Report 1: Due 3.10.25

  • Updated the project website 
  • Researched STIG/ MITRE to narrow down the project scope
  • Researched rootkit attacks from salt typhoon to recreate in lab
  • Reached out to uni for CECH sandbox permissions

 

Progress Report Desc: 400 Words

Analysis of Windows Kernel-Mode Rootkit Attacks and Mitigations

STIGs are developed for specific software, hardware, or technologies. Thus, the likelihood a STIG exists for a device or product targeted by Salt Typhoon is very high. In contrast, the MITRE ATTACK matrix – which comes with built-in mitigations – is more suited to our work. Although several matrices for Salt Typhoon have been published over the years, none incorporate the 2024 vulnerability. We propose to review older matrices, update them with recent vulnerabilities (even sampling CVEs if needed), and mark those that match Salt Typhoon’s tactics. For these reasons, we will adopt the MITRE ATTACK matrix to showcase key attack concepts and tailored mitigations.

Kernel-mode rootkits are a type of malware that effectively evade detection by hiding within the operating system. Once deployed, attackers hide their presence while retaining high privileges, enabling them to modify kernel structures (kernel drivers). This type of attack falls under the defense evasion group of the MITRE ATTACK matrix, though it lacks detailed subtechniques. Identifying these subtechniques would add valuable depth. Salt Typhoon employs a rootkit called Demodex, which gains persistence by creating fake file headers (PNG, JPEG, or WAV) to establish covert command-and-control communications. Therefore, our focus will be on recreating a Demodex-style attack on a Windows operating system and then crafting new subtechniques for the defenseevasion group.

Research shows that attackers can implement Windows kernel rootkits via various vectors. For instance, phishing emails can deliver malicious payloads that drop the rootkit without the user’s knowledge (AVG AntiVirus, 2020). In addition, compromised USB devices, exploitation of software vulnerabilities, and even malicious firmware implants serve as channels for injecting kernel-level code (BleepingComputer, 2024; di Pietro, Franzoni and Lombardi, 2016).

Companies counter these threats by employing robust in-built defenses such as Secure Boot, Kernel Patch Protection, and Virtualization-Based Security, which restrict unauthorized kernel modifications (Microsoft Learn, 2024). Moreover, advanced endpoint solutions leverage memory introspection and hypervisor-based monitoring to detect subtle kernel alterations. Initiatives like Microsoft’s Windows Resiliency Initiative are also driving a shift to enable antivirus processing outside kernel mode—reducing crash risks—and encouraging the use of memory-safe languages like Rust to minimize vulnerabilities (The Verge, 2024b).

By integrating the MITRE ATTACK framework with these insights on diverse attack vectors and comprehensive prevention measures, our study aims to create an updated matrix that reflects both historical and emerging vulnerabilities, enhancing detection and mitigation of sophisticated kernel-mode rootkit attacks.

 

References

AVG AntiVirus, 2020. Everything You Need to Know About Rootkits https://www.avg.com/en/signal/what-is-rootkit

BleepingComputer, 2024. New Windows Driver Signature bypass allows kernel rootkit installs. https://www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/

di Pietro, R., Franzoni, F. and Lombardi, F., 2016. HyBIS: Windows Guest Protection through Advanced Memory Introspection https://arxiv.org/abs/1601.05851

Microsoft Learn, 2024. Secure the Windows Boot Processhttps://learn.microsoft.com/en-us/windows/security/operating-system-security/system-security/secure-the-windows-10-boot-process

The Verge, 2024b. Microsoft’s new Windows Resiliency Initiative aims to avoid another CrowdStrike incident. https://www.theverge.com/2024/11/19/24299873/microsoft-windows-resiliency-initiative-crowdstrike-incident

https://github.com/magna25/Attack-Lab 

https://www.fortinet.com/resources/cyberglossary/rootkit 

https://medium.com/@sebastienwebdev/arm-x86-rootkit-0dd7f498b36b 

https://khale.github.io/iit-csp544-s22-site/labs/sys-sec/rootkits/ 

https://www.darkreading.com/application-security/salt-typhoon-malware-arsenal-ghostspider 

https://www.broadcom.com/support/security-center/protection-bulletin/demodex-targeting-american-telecommunications 

https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1 

https://www.jaiminton.com/Tutorials/PracticalMalwareAnalysis/Chapter10/# 

https://augustomalnalysis.home.blog/2019/05/03/32-bit-windows-kernel-mode-rootkit-lab-setup-with-inetsim/ 

https://malwarepenguin.com/practical-malware-analysis-lab-10/ 

https://www.picussecurity.com/resource/blog/salt-typhoon-telecommunications-threat

https://www.spiceworks.com/it-security/cyber-risk-management/articles/what-is-a-disa-security-technical-implementation-guide/

https://public.cyber.mil/stigs/downloads/

https://attack.mitre.org/resources/

https://attack.mitre.org/mitigations/enterprise/