Friday, November 24, 2023
HomeIoTLearn how to make menace looking possible, Half I: Detection

Learn how to make menace looking possible, Half I: Detection


I’ve two tales to let you know. The primary is a few software program developer at an enormous monetary company. The second is concerning the safety group on the identical firm. We’ll undergo the identical cyber incident, from these two views, to get a great perceive of how a malicious actor may attempt to infiltrate a banking software by way of an admin person, and how the corporate can detect this malicious habits – utilizing automation as a lot as potential.

The incorrect hyperlink

Let’s begin by taking a look at how an attacker may attempt to infiltrate a banking software from the within. What’s the simplest way? Sadly, the reply is sort of all the time by way of a person that has entry to the infrastructure and code repositories: an administrator or a developer.

Normally, an assault consists of a few phases, popularly often known as the “kill chain” mannequin:

  1. Reconnaissance: An attacker selects a goal, for instance our financial institution, and particularly a developer who’s engaged on a selected part of the banking software that’s of curiosity. The attacker may discover out that he’s utilizing Gmail as private e mail (by way of a LinkedIn put up). Additionally, he is aware of that GitHub is getting used to commit code, and AWS EKS is used to deploy the code in manufacturing.
  2. Weaponization: The attacker designs a malware file, which is able to take over the laptop computer of the developer.
  3. Supply: Everybody has a weak spot. The attacker designs an e mail, with a selected attachment, which is able to trick the developer into opening the file.
  4. Exploitation: The malware executes upon the developer opening the attachment.
  5. Set up: The malware installs a backdoor, usable by the attacker.
  6. Command and Management: The malware allows attacker to have “arms on the keyboard” persistent entry to focus on community.
  7. Actions on Goal: The attacker will get entry to the backend of the banking software, because the developer has admin privileges.

Part 7 is clearly the payoff. Earlier than that calamity, there are a number of defenses that must be in place:

  1. Detect: Decide whether or not an attacker is current.
  2. Deny: Forestall info disclosure and unauthorized entry.
  3. Disrupt: Cease or change outbound site visitors (to attacker).
  4. Degrade: Counter-attack command and management.
  5. Deceive: Intervene with command and management.
  6. Comprise: Community segmentation adjustments

Now wanting on the above, you may in all probability think about that we need to detect whether or not an attacker is current as quickly as potential. If we don’t know the attacker is there, that’s after we are most susceptible. There are a lot of prevention and detection options on the market that you need to use to guard your customers and purposes, nevertheless none might be 100% efficient. That is largely why the pc safety trade exists. And this is the reason it is very important use good sources of menace intelligence and expert menace hunters. Let’s dive a bit deeper.

What’s menace intelligence?

Cyber menace intelligence is what cyber menace info turns into as soon as it has been collected, evaluated within the context of its supply and reliability, and analyzed by way of rigorous and structured tradecraft methods by these with substantive experience and entry to all-source info. Mainly, any info can develop into menace intelligence, and there are various methods to mannequin this info as knowledge construction. One of many extra well-known strategies is STIX (Structured Risk Info Expression), which is a structured language for describing cyber menace info so it may be shared, saved, and analyzed in a constant method. Why is all of this necessary? We’ll cowl that subsequent!

What’s menace looking?

Risk looking is the method of proactively and iteratively looking out by way of environments to detect and isolate superior threats that evaded present safety options. Risk Looking is a steady course of, not a one-off activity that you just do now and again. The method principally entails making a speculation over a possible cyber incident, investigating this, uncovering patterns, and eventually enriching your investigation. The speculation may be both confirmed or denied, and the method begins over once more with a brand new or comparable speculation.

There are three various kinds of menace looking: Intelligence-Pushed, TTP-Pushed (Ways, Methods and Procedures), and Anomaly-driven (during which you search for outlier habits on networks and hosts). The primary relies on atomic indicators (additionally known as observables), like an IP deal with, area identify, file hash, and many others. These are comparatively easy to hunt for, since all you must search is your logging and inside monitoring methods for a selected indicator. TTP- or anomaly-driven are harder, since you might be attempting to find a selected or outlying sample of habits. That is clearly extra advanced than simply looking out your logging for a selected indicator. Let’s concentrate on intelligence-driven menace hunts for now.


Since Risk Looking is all about gathering knowledge from native/inside monitoring methods and cross-referencing this with international menace intelligence, it’s of upmost significance you can mix totally different units of knowledge sources, whether or not you might be looking out for an SHA256 file hash or a habits sample. There are a lot of instruments, like Cisco SecureX, that may assist with this. For instance, SecureX integrates with many Cisco and third-party safety instruments, and interprets returned knowledge right into a coherent knowledge mannequin known as Cisco Risk Intelligence Mannequin (CTIM). CTIM is a simplified model of the earlier-mentioned STIX (there’s additionally a CTIM-STIX converter obtainable). This translation part is essential within the fast investigation of incidents, or when menace looking. SecureX gives a built-in instrument, Risk Response, to do that in a graphical means, nevertheless it additionally gives wealthy APIs which might automate components of the menace looking course of.

Discovering recent indicators of compromise to your hypotheses

The web incorporates many free sources of menace intelligence that can be utilized, along with Cisco’s menace intelligence analysis group, Talos. There’s a large neighborhood on the market that shares new indicators associated to new cyber assaults and malware campaigns. There’s rather a lot on the market, and it’s necessary to maintain updated with this intelligence. However how?

A technique is to make use of the SecureX API (Examine and Enrichment). It may “harvest” recent indicators, and likewise uncover inside safety occasions from many sources – like Twitter. Over on Twitter, the #opendir Twitter hashtag is utilized by many menace intelligence researchers to put up their findings on new threats. This can be a good instance of a kind of free sources of menace intelligence that may be discovered on the web.

Since nobody has the time to learn all of those Tweets, test all of their safety instruments for hits, and take motion on them, I need to present you an automatic means of doing this, utilizing SecureX Orchestration. However first, let’s get again to our story of the developer on the banking company.

Suppose that our developer certainly fell for the e-mail that was crafted by the attacker, and by accident executed malware on his laptop computer. The file appeared to be innocent, and the developer didn’t see this as something malicious and continues together with his day. In the meantime, the attacker is now inside, and is ready for the fitting second to leap over from the laptop computer into the applying infrastructure of the banking software. When the developer connects to their AWS EKS cluster, that is the place the an infection occurs. The attacker connects to his command and management server and begins to exfiltrate knowledge, or different malicious actions. Now since his command and management server isn’t identified but as being a malicious vacation spot, no safety controls are blocking this connection. Fortunately a safety researcher simply discovered about this by way of an investigation and tweets about it. That is the place our automations kick in!

Automating your menace hunts

Utilizing the Twitter Search API we are able to truly retrieve the newest tweets that use the #opendir hashtag. Utilizing this, together with the SecureX API to extract and enrich observables, we are able to discover out if we now have sightings of this in our environments. Beneath is an summary of this automation workflow in a circulation diagram:

As you may see, we are actually fully automating our menace looking, by robotically ingesting fascinating tweets, parsing them and checking the environment. Based mostly on this, the safety group of the monetary company will get an alert that one among their companies made a connection to an observable which is talked about in a tweet. What to do subsequent to nip this within the bud, although? That we’ll discover out in Half 2 of this story, coming quickly!

 


We’d love to listen to what you assume. Ask a query or depart a remark beneath.
And keep related with Cisco DevNet on social!

LinkedIn | Twitter @CiscoDevNet | Fb Developer Video Channel

Share:



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments