MSc Cyber Security Facilitator guide: Incident Response Introduction This guide provides: 1. 2. 3. 4. The details of the attack Possible Learning issues Possible solutions Resources How to use this scenario The scenario can be used in several ways. Two proposed approaches are: 1. As a PBL scenario which is a basis for students to learn some (or all) of the concepts of incident management: incident planning, Identifying an incident, Incident response team responsibilities, Incident management team responsibilities, Incident triage, Incident management life cycle, Incident management and response purpose, Incident management processes. It is based around activities for the Incident Management lifecycle: 1. Detect incidents 2. Diagnose incidents 3. Manage incidents 4. Contain, minimize damage & eradicate threat. 5. Restore affected services 6. Determine root causes 7. Implement improvements to prevent recurrence or minimize the impact of future, similar events The scenario is relatively complex, so it is recommended that students are introduced to incident planning through a simpler scenario in preparation for this one. The NIST document (Cichonski et al, 2012) provides several such scenarios. The scenario is divided into 3 stages, to provide opportunity for discussion of the actions taken at each stage, and to introduce the next part of the attack. 2. As a pseudo real-time exercise which provides a series of events to which the team must respond. This is an assessment scenario, where students are already assumed to have appropriate knowledge. 1 The Attack The attack takes the form of a professional cyber-criminal gang using an information stealing Trojan firstly to gain access to the computers of members of the organisation and siphon out as much information as they can before the response process can interrupt or deny them the chance. This Trojan has the ability to download and run further packages. The Cyber Kill Chain (Carr,2008) is a useful model for analysing cyber-attacks. The Kill Chain originated as a military targeting concept defined by linked steps (a chain) for detecting and engaging the enemy. The phases are shown below and can comprise one of the learning goals for the scenario. 1. 2. 3. 4. 5. 6. 7. Reconnaissance Weaponisation Delivery Exploitation Installation Command and Control (C2) Actions on Objectives The Topology is included in the student scenario. An expanded version with named and sequence numbered events, which are as follows: 1. Malware Spam email received and opened by work from home developer. 2. Trojan makes successful command & control connection via Dev's home DSL due to the proxy circumvention around corporate VPN. 3. Adversaries obtain unauthorised access to Edgecoin's dev environment, resulting in the exfiltration of a subset of live customer data used for Live Proving. 4. Customer data used in spear phishing campaign to harvest credentials via a phishing page (first comment in red from FacilitatorGuide.docx). 5. New HIPs policy update alerts Security Team to the developer's compromise. 6. Remote Forensics and clean-up result in Zeus Trojan artefact being retrieved. Running through Cuckoo sandbox gives IOCs in form of checksums of malware and the malware C&C - which resolves back to IP addresses in Russia and Ukraine. 6a. VPN access needs to be revoked, proxy circumvention removed and machine should be sent in for full forensic examination - if not adversaries exploit residual access remains and step 11 happens. 7. Initial DDoS tickle to test responses, gauge size of attack needed. 8. Fraud against customer accounts, being transferred to accounts in multiple banks mostly with eastern European names. 9. UDP Flood - DDoS mitigation should be enacted. 10. Residual layer 7 (https) attacked that cannot be mitigated are identified and blocked at firewall 11. Dependent on 6a - if dev machine not fully contained, then adversaries destroy the dev environment. Any actions after the actual incident students should assume that all systems that have been affected have logged events in a verbose manner and are preserved centrally. 2 3 The timeline for this attack is shown in the table below Stage Events Stage 1 A developer who works remotely has been compromised and not detected, because he used his tech skills to circumvent the VPN policy and direct internet browsing via his local ADSL line to access developer forums that had not been whitelisted by Edgecoin. The gang realise that this is a valuable target and make plans to exploit the foothold by taking over the developer’s computer and exfiltrating Egecoin’s customer data. After infecting the system, the malware gives the attacker control of the infected machine with the help of a Virtual Network Computing (VNC, for remote access) and SOCKS proxy server. Edgecoin’s policies allow live data in testing, so developers have access permission to the production systems. The gang is therefore able to hijack the developer’s machine and use his VPN access to obtain and exfiltrate customer data from the production systems. This data is used to craft spear phishing attacks on Edgecoin’s customers, directing them to a spoof website to harvest authentication details. (Or compromise their machines and install a Zeus variant man in the browser access with injects specifically to gain access to EdgeCoin PLC logon credentials?) There is a high volume of alerts for a Backdoor Trojan traffic block from the HIDS on the computer of a remote developer, reported through the SIEM system. The Trojan is attempting to contact its command and control (C2) parent and exfiltrate data. Facilitator needs to discuss the following prior to stage 2. Initial analysis shows that the developer is circumventing the proxy. 1. Team should seek to contain the malware using remote forensics capability and return the user to browsing via corporate infrastructure. 2. Team should perform analysis of malware to extract Indicators of Compromise (IOC)s. 3. Increase defensive posture by ensuring IOCs are blocked in the gateway and sent to 3rd party to be blocked – this will stop the criminal group being able to tell the malware to download another package so remote access can be re-established to destroy the dev environment 4. IOCs should be shared with malware community – this will result in confirmation that it’s linked to recent malware spam sent to customers 5. If any team did not bring the developer into the corporate infrastructure and block the IOCs as a result of malware analysis then they should be informed that their developer environment has been destroyed. The account used to do so is traced back to the developer who circumvented corporate security policy. 6. Forensic analysis of his/her machine shows that all of the data from the developer environment was first exfiltrated out. This undermines the security of the entire platform. The Security team respond by installing a policy update which means the domain name used for remote access has been stopped, they contact the developer and remove the machine from the network, requiring it to be returned for forensic analysis. At this stage the security team believe the incident has been contained and threat eradicated. 4 Stage 2 With the denial of access to the compromised developer machine the group decide to bring their plans forward and cause as much damage as possible. They decide to perform a large scale attack on the organisation by performing as much fraud as possible in a short space of time, exfiltrating as much data as possible and then DDoS EdgeCoin PLC’s network range as a finale to stop Edgecoin’s fraud team from accessing the production systems and retrieving the cash transfers. As a preliminary test, they previously performed a small DDoS ( known as a “tickle”) a small attack as a preliminary to determine the defences of the victim organisation. There was no response to the tickle so the gang feel confident that their major attack will be successful. Fraud staff report multiple accounts being debited to mule accounts only just created. (At what point does the source – Eastern Europe become apparent?) Not much can be done here, fraud team have to try and claim money back or stop it leaving. Team should treat this as a warning that something larger is happening Network monitoring shows that bandwidth is utilised to full capacity. Team should speak to network team and reach out to 3rd parties, most likely DDoS mitigation provider Within a few minutes firewall provider calls to say they’ve detected UDP attack traffic and suggest going into mitigation Team should looks to go into mitigation – this may take 10 minutes or so Team should request sources of attack traffic Business demands to know what’s happening and when operations will be restored. Customers are calling in to complain as the website was unavailable, but now is very very slow and often keeps failing. Team should speak to 3rd party firewall company and understand if all traffic is being mitigated Facilitator needs to discuss the students’ & recommended responses prior to stage 3 Stage 3 Discussions with network 3rd party show that there are multiple SSL encrypted tunnels consuming large amounts of traffic. This is a layer 7 attack as well, with attackers constantly pulling large documents. Team should seek to block these connections at the firewall. The attack has now been largely carried out; they will now have to weather the DDoS. Containment should prioritise the preservation of evidence, however should not supersede it. Teams should have documentation of information given, actions taken by whom and when. Eradication actions should be considered to transition any short term containment actions into long term solutions restoring operational effectiveness. Actions such as the replacement of developer machine. Forensic analysis of the attack evidence, firewall logs etc. Need to reset customer accounts. CiSP/ other sharing of threat intelligence. 5 Future – policies to prevent live data used in testing (the source of the IDs used in phishing) Mitigation technology against MIB attacks & fraudulent logins – eg anomalous behaviour. Students should consider what they have available to effectively carry out the post incident activity. They should start with a complete review of all available logs to identify the chain of events to identify weaknesses applying all of the standard steps in Incident Response process. ~ Preparation ~ Detection & Analysis ~ Containment, Eradication & Recovery ~ Post Incident Activity This is cyclical - when setting up an Incident Response function all of your work going into Preparation - based on the strategy of the organisation, the risks it faces, the vulnerabilities it's particularily exposed to you'll be able to set up the most effective Detection and aquire the tools you need for Analysis. The central core of Incident Response is Containment, Eradication & Recovery and the speed by which you can achieve this. Once the mess is mopped up, the Post Incident activity is written up and dropped back in at the top with more Preparation. I was thinking that the video could cover the first 3 stages of the kill chain, to set the scene as to a group of miscreants organising an attack? Perhaps discussing selection of target organisation, trawling linkedin and googling. Discussing which malware to use, performing configuration and finally crafting emails to send into the organisation. Prerequisite Knowledge The scenario is adaptable, and the prerequisite knowledge is not essential, some of it may be considered part of the learning outcomes. The following identify concepts/ technologies/ processes that are required for successful completion of the scenario. 1. Information Security concepts / controls including: a. Two factor authentication. b. Virtual Network Computing (VNC) c. Host Intrusion detection systems d. Firewall e. Distributed Denial of Service attack f. Malware: Trojan and Indicator of Compromise g. Security information and event management (SIEM) h. CERT-UK, CiSP 2. Incident management planning/ preparation concepts: a. Prepare/Detect/Analyse/Contain/Eradicate/Restore/Post-Event b. CSIRT composition/ role/ purpose. 3. Teamwork. 6 Possible Learning Outcomes On completion of the scenario, students will be able to: 1. 2. 3. 4. 5. 6. Articulate the Incident management Lifecycle Perform basic diagnosis of types of incident Explain appropriate responses to the attacks Explain the communication strategy. Explain the purpose of, and complete appropriate documentation for an incident. Explain the role of Incident management within a systemic approach to Information Security. Resources There are a number of resources available to you: Edgecoin incident response policy/plan CARR,J (2008) The cyber kill chain CERT-UK: https://www.cert.gov.uk/ Cyber-security Information Sharing Partnership (CiSP) https://www.cert.gov.uk/cisp/ CICHONSKI,P., MILLER,T.,GRANCE, T., SCARFONE, K. 2012. Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and technology, NIST Special Publication 800-61 rev. 2, www.csrc.nist.gov/publications/nistpubs/800-61-rev2/sp80061rev2.pd f ISACA, 2013. CISM Review Manual. Rolling Meadows: ISACA. ISO 22301:2012 Societal security -- Business continuity management systems --- Requirements ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information security controls ISO/IEC 27035:2011 Information technology — Security techniques — Information security incident management British Standards ISO 27001 Overview: http://emea.bsiglobal.com/InformationSecurity/index.xalter [ Last accessed 22-Sep-2014] Context Reference documents which underpin the knowledge/tasks for incident management are summarised below: ISACA CISM Relevant Task statements T4.1 Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents to allow accurate identification of and response to incidents. T4.2 Establish and maintain an incident response plan to ensure an effective and timely response to information security incidents. 7 T4.3 Develop and implement processes to ensure the timely identification of information security incidents T4.4 Establish and maintain processes to investigate and document information security incidents to be able to respond appropriately and determine their causes while adhering to legal, regulatory and organizational requirements. T4.5 Establish and maintain incident escalation and notification processes to ensure that the appropriate stakeholders are involved in incident response management. T4.6 Organize, train and equip teams to effectively respond to information security incidents in a timely manner. T4.7 Test and review the incident response plan periodically to ensure an effective response to information security incidents and to improve response capabilities. T4.8 Establish and maintain communication plans and processes to manage communication with internal and external entities. T4.9 Conduct postincident reviews to determine the root cause of information security incidents, develop corrective actions, reassess risk, evaluate response effectiveness and take appropriate remedial actions. T4.10 Establish and maintain integration among the incident response plan, disaster recovery plan and business continuity plan. ISO/IEC 27001:2013/ 27002:2013 This scenario relates principally to Control categories in Clause A16.1 of ISO27002. It also relates to ISO/IEC 27035:2011 Information technology. Security techniques. Information security incident management. A.16 Information security incident management A.16.1 Management of information security incidents and improvements Control Objective: To ensure a consistent and effective approach to the management of information security incidents, including communication on security events and weaknesses. A.16.1.1 Responsibilities and procedures Control Management responsibilities and procedures shall be established to ensure a quick, effective and orderly response to information security incidents. A.16.1.2 Reporting information security events Control Information security events shall be reported through appropriate management channels as quickly as possible. A.16.1.3 Reporting information security weaknesses Control Employees and contractors using the organization’s information systems and services shall be required to note and report any observed or suspected information security weaknesses in systems or services. A.16.1.4 Assessment of and decision on information security events Control Information security events shall be assessed and it shall be decided if they are to be classified as information security incidents. A.16.1.5 Response to information security incidents Control Information security incidents shall be responded to in accordance with the documented procedures. A.16.1.6 Learning from information security incidents 8 Control Knowledge gained from analysing and resolving information security incidents shall be used to reduce the likelihood or impact of future incidents. A.16.1.7 Collection of evidence Control The organization shall define and apply procedures for the identification, collection, acquisition and preservation of information, which can serve as evidence. 9