TechBizWebTechBizWeb

    Subscribe to Updates

    Get the latest news about Technology and Business from all around the web..

    What's Hot

    Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

    November 7, 2022

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022
    Facebook Twitter Instagram
    • About Us
    • Privacy Policy
    • Guest Post
    • Terms
    • Contact
    Facebook Twitter Instagram
    TechBizWebTechBizWeb
    Subscribe
    • Home
    • Technology

      Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

      November 7, 2022

      Devialet brings its sci-fi design aesthetics to a $790 portable speaker

      November 7, 2022

      Elon Musk’s response to fake verified Elon Twitter accounts: a new permanent ban policy for impersonation

      November 7, 2022

      The iPhone 14 Pro and Pro Max will come with ‘longer wait times’ due to factory lockdown

      November 6, 2022

      Meta’s reportedly planning to lay off ‘thousands’ of workers this week

      November 6, 2022
    • Business
    • Cyber Security
      National Security News

      List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

      September 24, 2022

      Cybersecurity ranked most serious enterprise risk in 2022

      August 31, 2022

      Registration open for CISA virtual summit on K-12 school safety

      August 31, 2022

      What do the Trickbot leaks reveal about Russian cybercrime?

      August 31, 2022

      What cybersecurity measures do CISOs outsource?

      August 30, 2022
    • Blockchain
    • Vulnerabilities
    • Social Engineering
    • Malware
    • Cyber Security Alerts
    TechBizWebTechBizWeb
    Home»Cyber Security»How the Life of a Security Threat Can Inform Your Defense Strategy
    Cyber Security

    How the Life of a Security Threat Can Inform Your Defense Strategy

    May 7, 2019Updated:May 7, 2019No Comments7 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Despite many improvements to security technology, information sharing, ease-of-use, and reduction in cost over time, we have yet to see a meaningful reduction in breaches. Why? The answer may have something to do with how organizations respond to a breach beyond the moment it’s discovered.

    Incident response dominates much of the security conversation, and for good reason. It’s imperative that organizations act quickly once a single isolated threat has been detected. However, this is just one part of a holistic risk prevention strategy – it’s arguably more critical to have a full view of events and analyze the entire lifespan of an attack. When organizations have visibility into a threat’s entry point and history, it’s possible to uncover what else on the network may have been compromised. To that end, some organizations favor monitoring adversaries within their environment to identify what assets are being targeted. Understanding the motivation behind an attack, and asking the right questions at the start of an investigation, allows security teams to focus their defenses and ultimately improve protections.

    Why You Should Play Detective

    What many organizations don’t realize is that a comprehensive response strategy begins the same way as so many other complex processes: with a plan. Instead, many security teams turn to less effective, knee-jerk reactions that lead to tearing compromised hosts offline…and possibly even destroying evidence as they fumble for a solution. You learn nothing from missing or destroyed evidence, precluding any kind of reliable prevention. Preserving those systems and learning from them is a necessity and requires what I refer to as “the speed of haste.” Decisions should be made quickly, but carefully. A decision made without due consideration – or, made in haste – is almost always the wrong one.

    Instead, organizations should adopt a response process that enables them to gather necessary information before it disappears or is destroyed. More mature organizations will look at the information they’ve gathered and compare it to their attack model, looking for major gaps. By chasing down those gaps as investigative objectives, organizations are better informed about what happened and what to do about it.

    Your incident response plan should also cover more than just an order of operations. It should define the personnel who are doing the investigative work, which means you should be hiring for capability and not just headcount. Additionally, these informed practitioners need access to data and a means of acting on it. Technology naturally play big roles in both areas – improving visibility, force-multiplying your human team members, providing technical capabilities that people lack, and providing assurance of integrity.

    How to Ask the Right Questions

    When sitting down to triage an isolated event, an analyst usually doesn’t know what the scope or nature of the problem is. An alert doesn’t necessarily indicate an intrusion, and an intrusion may not result in a single alert. For these reasons, when an analyst approaches the challenge of scoping and responding to a breach, they need to develop broad investigative questions to pursue in the form of leads. Some will be generic, such as:

    1. How many distinct groups of activity are known?

    2. How is each group of activity being identified?

    3. How many systems in the enterprise are infected as part of this intrusion?

    4. How many systems were accessed but not infected?

    5. Which accounts was the attacker using during the compromise?

    6. What was the most recent activity?

    7. Is the adversary active and, if so, at what cadence?

    Other questions tend to be more specific and often flesh out the details of the investigation. These might be very specific points, such as whether they used a unique fraudulent certificate with each of their malware payloads and which certificate authorities they chose to generate them with. But it’s the combination of answers from both generic and specific questions that enable the investigator to conclude their investigation and provide direction for preventing future intrusions.

    Example: Threat History Detection in Action

    One of the common mistakes I see across immature security organizations is failing to look at the intrusion as a whole entity first, before seeking the missing pieces to their investigative puzzle. Let’s attempt to illustrate this using one of the attack models we’ve mentioned:

    If you subscribe to the FireEye intrusion lifecycle model, there are seven phases that represent major adversary objectives during a breach:

    1. Initial compromise (such as being phished with a macro-enabled document lure)

    2. Establish a foothold (execute a non-persistent script-based backdoor)

    3. Escalate privileges (user happens to be a member of local admins already) which may also involve stealing valid local or domain credentials

    4. Perform internal reconnaissance (adversaries have to learn about the environment and if they show you that they don’t they may have been there before)

    5. Move laterally (Remote Desktop Protocol is one familiar method)

    6. Maintain a presence (deploying additional and usually different backdoors, sometimes a variety of payloads and methods)

    7. Complete the mission (compress data, stage it for theft, steal the data)

    This is an extreme example, but let’s say you’re four weeks into an investigation and you know a few things:

    • You self-detected at the final stage, noting that 2.4GB of legal documents were stolen from a file share where they were also staged in a compressed archive.

    • You were able to identify recently-installed persistent backdoors on three systems, installed within five seconds of a domain administrator logging in via RDP and before the same session was terminated.

    • The adversary used several accounts in the domain admins group and accessed these infected systems from a fourth system in a desktop support business unit.

    • All domain users are in the local administrators group on their own system, so they automatically escalated privileges at the moment of initial infection.

    • You found the phishing lure they used and confirmed that three users downloaded malware and all of these users workstations were also infected.

    If you map those things to the attack model above, the major missing piece is how they conducted reconnaissance. The exercise of going back and specifically trying to fill in that blank is essential to the response process. One reason that IR firms charge so much per hour isn’t just for expertise. It’s the experience of those consultants that recognize the essential questions to ask. An experienced incident responder will see that part of the puzzle is blank and work to fill it in.

    If your breach response process is to delete malware from infected systems and change a few passwords, that’s a missed opportunity. When you’re fighting fire with fire in that way, it’s challenging to understand the life cycle of an intrusion and difficult to value the evidence that’s lost. Organizations should plan beyond initial compromise and invest in technologies, personnel and methods that foster a more complete understanding. Only then can they move from being a spectator to becoming a contender.

    Devon is a principal researcher at Endgame, focusing on detection and response technologies. Formerly a Mandiant incident response and remediation lead, Devon has over 6 years of experience in security professional services where he has worked with clients in a nearly every conceivable industry. He has significant experience helping Fortune 500 organizations with the detection, response, and containment of advanced targeted threat actors and has led large-scale network and application architecture reviews, post-incident strategic planning, and regulatory gap assessments. He has delivered a range of technical presentations for security conferences, industry organizations, and the United States Department of Defense. Prior to his career in information security, Devon spent 15 years in operations roles as a system administrator and network engineer.

    Previous Columns by Devon Kerr:
    Tags:



    Source link

    Digitpol
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    National Security News

    List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

    September 24, 2022 Cyber Security

    Cybersecurity ranked most serious enterprise risk in 2022

    August 31, 2022 Cyber Security

    Registration open for CISA virtual summit on K-12 school safety

    August 31, 2022 Cyber Security

    What do the Trickbot leaks reveal about Russian cybercrime?

    August 31, 2022 Cyber Security

    What cybersecurity measures do CISOs outsource?

    August 30, 2022 Cyber Security

    SIA announces Women in Security Forum scholarship recipients

    August 30, 2022 Cyber Security
    Editors Picks

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022

    Google Cloud Says Running Validator on Solana Blockchain

    November 7, 2022

    European stocks rise as investors boosted by China speculation

    November 7, 2022
    Trending Now

    Evergrande creditors sell ‘Versailles mansion’ plot in Hong Kong

    By techbizweb

    OpenSea Creates Tool for NFT Creators to Enforce Royalties On-Chain

    By techbizweb

    FTSE chairs warn of declining relations with institutional investors

    By techbizweb

    https://www.nationalsportsacademy.com

    slot gacor hari ini

    http://www.inadesfo.org/

    http://www.eueomgbissau.org/

    http://www.congo-mai-mai.net/

    http://www.angelesdelafrontera.org/

    http://fifaworldcup2018schedule.com/

    http://tony4gtrmcr.co.uk/

    http://www.standrewsagreement.org/

    http://www.bob-russell.co.uk/

    http://davidmulholland.co.uk/

    http://railwayhotelenniskillen.com/

    http://www.fantasysportstrades.com/

    http://www.rainleaf-flooring.com

    http://mothersagainstguns.org/

    http://ma-coc.org/

    slot online

    http://www.paradoxmag.com/situs-judi-slot-online-gampang-menang-2021/

    http://www.paradoxmag.com/situs-judi-slot-online-terbaru-2021/

    http://slot-terbaru.net/

    Slot Gacor

    Slot Online

    Situs Slot Gacor

    http://www.appdexterity.com/

    https://cars4kids-deutschland.de/

    https://www.stretchingculture.com/

    https://www.b-123-hp.com/slot-gacor/

    https://denzstaffing.nl/

    https://ezbbqcooking.com/slot-gacor/

    https://www.mbahelp24.com/slot-gacor

    https://minhtanstore.com/slot-jackpot-terbesar/

    https://njbpusupplierdiversity.com/slot-gacor-gampang-menang/

    https://www.floridaspecialtycropfoundation.org/slot-gampang-menang/

    https://childrenscornerpreschool.org/slot-gacor-gampang-menang/

    https://cryptoquoter.com/slot-online-terbaik/

    https://alorkantho24.com/slot-gacor/

    https://ellas.xyz/slot-gacor/

    https://it.dougamatome.xyz/slot-online/

    https://www.daltercume.com/slot-gacor/

    https://josi-ana.dougamatome.xyz/slot88/

    https://josi-ana.dougamatome.xyz/slot-gacor/

    https://fastobserver.com/slot-jackpot-terbesar/

    https://www.planetexperts.com/slot-gacor/

    https://bfsolution.group/slot-bet-kecil/

    https://rustleva.co/slot/

    https://bfsolution.group/slot-bet-kecil/

    https://www.hotelcalimareal.com/togel-online/

    https://anime-game.dougamatome.xyz/slot-gacor-gampang-menang/

    https://anime-game.dougamatome.xyz/togel-online/

    https://bourbonbarrelfoods.com/slot/

    http://suneo39.wp.xdomain.jp/slot/

    https://techbizweb.com/slot-gacor/

    https://www.generalcatalyst.com/18-daftar-slot-gacor-terbaik-gampang-menang-jackpot-hari-ini/

    https://www.hotelcalimareal.com/slot-online/

    https://www.blockgates.io/slot-gacor/

    https://l12.com.br/slot-gacor/

    slot paling gacor

    https://www.donalds-hobby.com/slot-online/

    https://thecryptodirt.com/slot-gacor-hari-ini/

    http://iseta.edu.ar/aulavirtual/app/upload/users/1/1205/my_files/sbobet.html

    http://escuelavirtual.mincit.gov.co/app/upload/users/1/194/my_files/slot.html

    https://www.dev.medecinesfax.org/courses/JUDICASINO/document/slot.html

    http://www.e-archivos.org/cursos/courses/JUDICASINO/document/slot-gacor.html

    http://iesma.com.br/ead/main/upload/users/4/447/my_files/slot.html

    https://www.fundacoop.org/chamilo/app/upload/users/1/1185/my_files/slot.html

    https://fata-aatf.org/eskola/main/upload/users/3/31/my_files/slot.html

    https://uancv.edu.pe/ofinvestigacion/app/upload/users/3/328/my_files/slot-terlengkap.html

    https://micost.edu.my/EL/app/upload/users/2/209/my_files/slot-gacor.html

    https://www.academiacoderdojo.ro/elearningdev/app/upload/users/2/2442/my_files/slot-online.html

    http://campus-cidci.ulg.ac.be/courses/JUDICASINO/document/slot-termurah.html

    https://www.escueladerobotica.misiones.gob.ar/aula-ste/courses/LIVECASINO/document/slot-tergacor.html

    http://ccdipeepccqqfar.usac.edu.gt/chamilo/app/upload/users/3/358/my_files/slot-online.html

    https://cunori.edu.gt/campus/app/upload/users/7/7334/my_files/slot-online.html

    http://u-rus.com.ar/aula/app/upload/users/1/1322/my_files/slot.html

    http://icrodarisoveria.edu.it/chamilo/app/upload/users/1/1855/my_files/slot.html

    https://iestpliliagutierrez.edu.pe/clarolgm/courses/CASINO/document/slot.html

    http://pva.cobach.edu.mx/app/upload/users/7/7379/my_files/slot.html

    http://www.imb-pc-online.edu.gt/PL/app/upload/users/3/373/my_files/slot.html

    http://avcs.upeu.edu.pe/main/upload/users/3333/my_files/slot.html

    https://chamilo.fca.uas.edu.mx/app/upload/users/1/11186/my_files/slot-online/

    TechBizWeb
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Guest Post
    • About Us
    • Privacy Policy
    • Our Authors
    • Terms and Conditions
    • Contact
    © 2023 Tech Biz Web. Developed by Sawah Dev.

    Type above and press Enter to search. Press Esc to cancel.