cyber operations and intelligence essentials · 2018-11-02 · 12 cyber pirs what software or...

51
Cyber Operations and Intelligence Essentials LEADERSHIP TRACK Bob Stasio, CISSP Oct 2018 v4 Dreamit Ventures – Managing Director, SecureTech

Upload: others

Post on 26-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

Cyber Operations and Intelligence Essentials LEADERSHIP TRACK

Bob Stasio, CISSP

Oct 2018 v4

Dreamit Ventures – Managing Director, SecureTech

Page 2: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

2

About Me

Bob Stasio:

!! Former US Army Captain

!! Two Iraq deployments, MI Officer

!! Former NSA Cyber Chief

!! Cyber Wargame Consulting

!! Bloomberg Head of Threat Intelligence

!! IBM Threat Hunting Product Dir.

Page 3: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

3

Looking For:

•!Security Startups

•! Immersion Partners

•!Other Investors

Page 4: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

Section 1: Objectives of Threat Hunting

Page 5: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

5

Dwell Time Examples

Page 6: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

6 6

Level of Effort

% o

f Thr

eats

Sto

pped

Implement a Security Framework

Complex Investigation

Non-Linear Relationship Between Effectiveness and Cost

Tier One SOC Analyst

Incident Responders

Cyber Analysts

Personnel Example

Tier Two SOC Analyst

Threat Researchers

Firewall SIEM Analysis

Product Example

INTELLIGENCE TIME HORIZON

Information Security Cyber Analysis

Advanced Security Intelligence

Cyber Analysis and Threat Hunting

HUNTING

Page 7: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

7

The Intelligence Cycle

Page 8: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

8

Commander’s Critical Information Requirements

CCIR

PIR FFIR EEFI

Commander’s Critical Information Requirements

Prioritized Intelligence Requirements

Friendly Force Intelligence Requirements

Essential Elements of Friendly Information

“How I see the enemy”

“How I see myself”

“How I prevent the enemy from

seeing me”

“What I need to make decisions”

Page 9: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

9

How CCIR Impacts Decisions

Page 10: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

10

How to Determine PIRs

Architecture Security Posture

People Threat Intelligence

Page 11: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

11

What is a Prioritized Intelligence Requirement (PIR)

A PIR is a question which drives intelligence collection, whose answer will ultimately drive a decision affecting the success of an organization

Prioritized Intelligence Requirement Indicators Decision

“Are there radical groups planning attacks against landmarks in New York?”

Ø Mention of landmarks by people on a watchlist

Ø Mention purchasing explosive material

A Law Enforcement organization could take action to interview suspect or add protection to a New York City landmark

Ask a question

Derive things to look for

Take action and refine

Example:

The PIR process derives elements for analysts to search for with their limited resources

Page 12: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

12

Cyber PIRs

What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software which has automated updates that can cause system wide infection? Is their any activity on the darkweb indicating a new variant of NonPetya or similar ransomware? Are all the administrators practicing least privilege access in the case of account compromise? Are their indications of a similar nonPetya ransomware attack against similar companies? What new proliferation techniques for ransomware are being discussed on the darkweb? Is there evidence of additional weaponized rasnsomware leveraging Equation Group exploits? Experts believed nonPetya was a politically-motivated attack against Ukraine by Russia, since it occurred on the eve of the Ukrainian holiday Constitution day and was targeted against an Ukrainian software company. Are there global or geopolitical events that may precipitate an additional attack from Russia state actors?

Page 13: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

13

Simple PIR Matrix

Prioritized Intelligence

Requirement (PIR)

Indicator Named Area of Interest (NAI)

Last Time Information of Value (LTIOV)

Reporting

Is there evidence of additional

weaponized rasnsomware

leveraging Equation Group exploits?

External: community discussion, DW

planning, Internal: scanning, related

open ports, creation of certain files

Darkweb intelligence feeds, community forums, NW data,

VM data

N/A CCIR#3, FPCON Bravo

Are their indications of a similar nonPetya ransomware attack

against similar companies?

External: pharma reporting issues, LE

alerts, Internal: similar scans,

targeted industry phishing attacks

Darkweb intelligence feeds, community, FBI, DHS, forums, NW data, VM data,

Proofpoint

N/A CCIR#4, FPCON

Bravo

Page 14: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

14

Collection Management

PIR

Indicator

Indicator

A

D E

B

Sources

ü  Timely ü  Actionable ü  Relevant ü  Integration

Information Sources: •  Internal •  Purchased •  Open Source •  Government •  Consortium •  Community

C

Page 15: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

Section 2: Building a Hunting Platform

Page 16: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

16

Tipping, Queuing, and Anomaly Research Example

16

!"#$%%&'$"($)*&+$),-.&/-")!"#"$%&'(%$)*+,-&

.&/&0&&1)2-&

3&/&45&6+"$-&

0&/&73&&1)2-&

7.&8&&1)2-&

9:;9<;:=& '>?@:9<'A:=& B9@:9?C<;&

;"$$%,#&'(-&

25 Phising Attempts Blocked

3 RDP Attempts Blocked Event

Threshold

30 GB of Data Exfiltrated

2 Malicious Emails Opened

Server to Server Admin

Logon

Beaconing Activity

See The Forest Through The Trees!

SIEM

Page 17: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

17

Why abstraction? Data variety demands new thinking Models at this level of abstraction are unlikely to change unless the scope or operating environment changes significantly.

abstract

Models at this level of abstraction are unlikely to change unless the entity of interest itself fundamentally changes.

Models at this level of abstraction are reflect the differences between current and target state design and may support multiple Physical Models.

Logical Model

Contextual Model

Conceptual Model

Physical Model

Male

Person

Michael specific

Company

Org

IBM

Agent

Page 18: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

18

What is an Unknown Unknown Search

Offense

2

Offense Property

b Offense Property

a

Offense Property

f

Offense

1

Offense Property

i Offense Property

c

Offense Property

d

Offense Property

e

Offense Property

h

Offense Property

g Ask the question: “show me which offenses

share the same property” –

you don’t know the subset of offenses, not the subset of properties to search

Page 19: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

19

Question: Why do you model data as an Entity? a Link? or as a Property?

Entity, Link or Attribute: What drives the Data Model?

Page 20: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

20

Answer: 1. Questions (What are you trying to ask?) 2. Type of Analysis (Criminal, Intel, Fraud) 3. Volume of Data (1k, 10k, 10M, 10B, 10T)

Entity, Link or Attribute: What drives the Data Model?

Page 21: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

21

Threat Hunting Concept Flow

Data Sources Graph Data Analysis Analysis

Hunting Data Model

Security Network

Endpoint External Analytics Engine Cognitive Engine Rules Engine

Page 22: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

22

Cyber Analysis Results •!Integrated data feeds •!Enterprise awareness •!Compliance monitoring •!Threat discovery •!Risk management •!Enable decisions

Centralized Data Consumed by All Sources

22

Leveraging an analytical platform and internal and external information feeds, Cyber Analysts can help form a deep understanding of the threats targeting your organization

Community Info

Threat Indicators

Government Alerts

Social Media Hacker Forums

Mostly External Sources

PCAP

System Logs

Alerts

SIEM

Vulnerability Scans

SSO/AD

Mostly IT Sources

Human Enabled

Intel Vendors

Access Logs

Account Creation

Badge Logs

Reviews

Behavioral Data

Non-Traditional Sources

HR Data

Security Intelligence Intelligence

Threat Intelligence

Persona Data

Persona Data

Analysis Platform

Page 23: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

23

What is Needed to Conduct Threat Hunting

SOC & SIEM Threat Intelligence

Intelligence Analysis Tools Statistical Analysis

Foundational Data

Organization + Discovery

Known Indicators

Anomaly Detection

Intelligence Area of Expertise

Page 24: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

24

Anomaly / Behavioral Analytics Categories

24

MATHEMATICS RULES ENGINE CHANGE DETECTION

Page 25: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

25

Key Differentiators of Threat Hunting Platform

For Advanced Users Tier 3, Threat Hunters

We Do Investigations Human in the Loop

Non-Cyber Datasets Physical, HR, Dark Web

Complexity Of Data

Volume Of Data

Start with the Unknown

Complexity Of Data

Volume Of Data

Investigations Hunting Start with the

Known

Page 26: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

26

Use Case Overview

BOOM

APT Threat Detection

Data Breach Detection

Malware Detection

Insider Threat

Alert Triage

Incident Investigations

Threat Intel Analysis

Situational Awareness

Page 27: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

27

Concept Value Description Analogy

Optimizing Decreasing time to know, prioritizing

indicators

•! Seeing obvious issues from different angle •! Creating efficiencies in other tools/domains •! Tuning alerts to appropriate threshold •! Understanding most important alerts •! Connecting multiple events and alerts

Force Multiplier

Understand trends and patterns, indicators

•! Discover patterns and trends over time •! Direct valuable resources for max impact •! Automate ingest, searches, functions •! Tip other collection sources using intel •! Pinpoint problem areas with analytics

Predicting Taking advantage of

anomalies, preempting adversary action

•! Advanced differentiated information •! Using indicators to predict adv. Action •! Discovering anomalies as key indicators •! Stopping adversary before reaching goal •! Understanding trends and how they impact

Intelligence Concepts are a Spectrum of Value

Alert Fatigue

Border Protection

Market Prediction

Page 28: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

Section 3: Building a Team & Products

Page 29: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

29

Building the Team

Reconnaissance

Scanning

Exploitation

Persistence

Internal Data

•! Cyber wargame •! Identify requirements •! Identify critical structures

•! Adversary approach •! Gap assessment •! Social eng. assessment

•! Data source review •! Acquire new tools •! Acquire ext. data sets

•! Define Intel cycle •! Create program SOP •! Complete strategy

External Data

•! Operational training •! System optimization •! Program evaluation

Phase 1: Development of a Team Strategy

Phase 2: Implementation

•! Step 1: Strategy and Requirements •! Step 2: Threat Based Gap Analysis •! Step 3: Tool and Data Assessment •! Step 4: Team Structure Build

•! Step 1: Training Development •! Step 2: Process Development •! Step 3: Evaluation

Page 30: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

30

Strategy and Requirements Gap Analysis Tool and Data

Assessment Team Structure

Build Team

Implementation

Timeline

Execution Timeline and Manning

30

•! 2 x Trainer lv. 2 •! 1 x Technical Writer

Training Dev.

6 weeks

•! 2 x Analyst lv. 1 Process Dev.

5 weeks

•! 2 x Ethical Hacker lv. 1 •! 2 x Analyst lv. 1

Evaluation

6 weeks

PHASE I PHASE II

*Start Date - TBD

Page 31: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

31

Strategy and Requirements: 2 Weeks

OBJECTIVES: • Define Customer’s Knowledge Requirements • Define Highly Sensitive Information • Define Threat Intelligence Requirements

METHODOLOGY: •  Leadership Interviews •  Research •  Cyber Wargame

DELIVERABLES: •  Strategy Report •  Cyber Wargame •  Briefing

Strategy

Requirements

Collection

Analysis

Page 32: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

32

Capability Gap Assessment: 4 Weeks

OBJECTIVES: •! Security Operations Center Objective Creation •! Review Current Security State (People, Process, Technology)

METHODOLOGY: •! Leadership Interviews •! Operator Interviews •! NOC Observation •! Procedure Review

DELIVERABLES: •! Report •! SOC Graphic •! Briefing

Security Operations Center

Monitor Analyze Remediate

Page 33: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

33

Tool and Data Assessment: 4 Weeks

OBJECTIVES: •! Assess Data Feeds •! Assess Security Tools (collecting, sharing, analytic) •! Assess Operator Skillset

METHODOLOGY: •! Leadership Interviews •! Operator Interviews •! NOC Observation •! Procedure Review

DELIVERABLES: •! Report •! Decision Matrix •! Tool Recommendations •! Briefing

Cyber Intelligence

Analysis

External Feeds

Internal Feeds

Analysis

PCAP

Logs

Alerts

SIEM

Community Info

Threat Indicators

News Feed

Social Media

Hacker Forums

Vulnerability Scan

Page 34: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

34

Team Structure Creation: 4 Weeks

OBJECTIVES: •! Define Team Roles •! Define Operations Cycle •! Create Templates

METHODOLOGY: •! Leadership Interviews •! Operator Interviews •! Observation •! Procedure Review

DELIVERABLES: •! Team Plan •! Templates •! Roadmap •! Briefing

•!Prioritizes requirements

•!Secures data feed

Collection Manager

•!Answers RFIs

•!Tactical Reporting

Current Operations

•!Maintains threat groups

•!Produces strategic reports

Cyber Analysts

Reporter Emerging Threats

Enduring Threats

INTELLIGENCE CONSUMERS

LEADERSHIP

HUMINT

Community Info

ThreatIndicators

SIEM Data

SocialMedia

HackerForums

Data Feeds

Requirements

Requirements

AlertsTactical ReportsStrategic Reports

Priorities

3-5 PAX

2-4 PAX

4-6 PAX 2-8 PAX

Page 35: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

35 35

OBJECTIVES: •! Create Training Plans •! Develop Workflows

METHODOLOGY: •! Leadership Interviews •! Operator Interviews •! NOC Observation •! Procedure Review

DELIVERABLES: •! Training Outline •! Workflows •! Briefing

Search Access Logs

Determine Anomalies

Confirm with Other Data

Training Plan Development: 6 Weeks

Page 36: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

36 36

OBJECTIVES: •  Finalize Policy Documents •  Create Maturation Roadmap Objectives

METHODOLOGY: •  Leadership Interviews •  Operator Interviews •  Observation •  Procedure Review

DELIVERABLES: •  SOP Documents •  Playbooks •  Roadmap Objectives •  Transition Briefing

IOC

Confirm Team Roles

Establish External

Data Feeds

Full 24/7 Operations

FOC

Team Process Development: 5 Weeks

Page 37: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

37 37

OBJECTIVES: •! Evaluate SOC Effectiveness •! Conduct Vulnerability Assessment

METHODOLOGY: •! Lab Training •! Table-top Training •! Logical Assessment •! Other Assessments

DELIVERABLES: •! Simulation Exercise •! Assessment Report •! Recommendations •! Briefing

37 37

Evaluation: 6 Weeks (repeated)

Page 38: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

38

Tipping and Queuing

Page 39: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

39

39 CIM

SPOTREP

Travel Incident Social Media Cyber

DarkWeb

Geopolitical

!"#$%%&'$"($)*&+$),-.&/-")!"#!$#"%& '()*"!$'+"%& ,!*"!)-$#&

!"#*)(&

!"#$%%&'$"($)*&+$),-.&/-")!"#$%%&'$"($)*&+$),-.&/-")!"#$%%&'$"($)*&+$),-.&/-")'()*"!$'+"%&

./$#0%''0& $+!)%&),!$1"!)&$+!,/1&

!"#!$#"%&

Intelligence Products

No Cost Product

Current Paid Product

Proposed Paid Product

Sources

Page 40: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

40

Add additional Asia Intelligence subscription package for regional travel alerts. For High Risk travel.

Cost: + $24,000/year

Travel and geopolitical alerts, also allows longitudinal analysis with database of previous incidents.

Cost: + $35,000/year

Real-time cyber risk scoring, breach detection, and reputation awareness. Possible use for VRMA.

Social media, open source aggregation, leak detection and publication of data.

Cost: + $2,500/year

Cost: + $150,000/year + $50,000/year API

$230,000/year

$51,000/year

$800,000/year

SOURCE RECOMMENDATION Buy now to fill Intelligence Gaps:

Recommend POC to Determine Value:

Strategic Considerations:

Source assessment determined intel is slow, incomplete, and difficult to use. Our peers have turned away from these vendors to other industry leaders.

Consider

Consider Quality cyber intelligence reports and IOC feed, but estimating little value in vulnerability feed and underutilizing bespoke analysis/investigations.

Bundle replacement

Reduce iSight investment, supplement

Page 41: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

41

Source Reliability and Accuracy

Page 42: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

42

BLOOMBERG CONFIDENTIAL

THREAT INTELLIGENCE QUICKLOOK

December // 04 // 2014

»  QUICKLOOK Number: 14-0001, v3

»  SUBJECT: Social Engineering Attacks from “FIN4” Hacking Group

»  ATTENTION: Company executives, financial related employees

»  SOURCES: FireEye Report Hacking the Street?, December 1st, 2014

»  ANALYST: Bob Stasio

Page 43: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

43

FIN4 THREAT OVERVIEW 43

SUMMARY: Since mid-2013, a criminal group known as FIN4 have been targeting financial and M&A executives in order to acquire non-public information. FIN4 targets individuals with information about impending market catalysts that will cause stocks to rise. The most commonly used attack vector by FIN4 is a socially engineered email lure (phishing) which focuses on capturing username and passwords, thus giving the attacker sustained access to private communications.

FREQUENT TARGETS Since mid-2013, FIN4 has targeted over 100 organizations such as advisory firms, legal counsel, and investment banking. The following types of individuals are commonly targeted: C-Level executives and senior leadership, legal counsel, regulatory risk, and compliance personnel, researchers, scientists, advisors. FIN4 has a high-level of knowledge of their victims and uses convincing phishing lures to gain access to email accounts.

On multiple occasions, FIN4 has targeted several parties involved in a single business deal, to include law firms, consultants, and the public companies involved in negotiations. They also have mechanisms to organize the data they collect and have taken steps to evade detection.

SECTOR SPECIFIC ATTACKS FIN4 heavily targets healthcare and pharmaceutical companies as stocks in these industries can move dramatically in response to news of clinical trial results, regulatory decisions, or safety and legal issues.

68% PUBLICLY TRADED HEALTH CARE COMPANIES

12% OTHER PUBLIC COMPANIES

20% M&A AND ADVISORY FIRMS

FIN4 VICTIMS

Page 44: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

44

/ / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / /

/ / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / /

Threat indicators and mitigation

What to do The relative simplicity of FIN4’s tactics

(spearphishing, theft of valid credentials, lack of any malware installed on victim machines) makes their intrusion activity difficult to detect. However, there are a few basic security steps to mitigate the threat:

»  Maintain high situational awareness of emails concerning upcoming acquisitions. Even though it may appear to come from a trusted source, if any prompts ask for credentials while reading email or opening documents, report the incident to security immediately. Also see www.xxxxxxx.om

»  The CRCO CIRT team is aware of the risk and actively monitoring Acme, co. domain email technical indicators of threat. Be aware that the attack vector may come through your personal email and then try to obtain corporate credentials. Use extra caution with HTML links, attachments, and prompts associated with personal email.

44

/ / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / /

/ / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / /

FIN4 conducts reconnaissance on victims and uses other hijacked email accounts to “spearphish” targets

Email content is sophisticated and relevant to a pending deal which entices user to trust recipient and content

Email displays a dialog box that mimics the Windows Authentication prompt for user domain credentials

Credentials are transmitted to a server controlled by FIN4 which is used to hijack the account, steal information, and infect other victims

Threat Tactics

Page 45: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

THR

EAT

INTE

LLIG

EN

CE

QU

ICK

LOO

K

14-0

001

/ / /

BLOOMBERG CONFIDENTIAL 45

EXAMPLES OF FIN4 ATTACKS

Subject: employee making negative comments about you and the company From: <name>@<compromised company’s domain> I noticed that a user named FinanceBull82 (claiming to be an employee) in an investment discussion forum posted some negative comments about the company in general (executive compensation mainly) and you in specific (overpaid and incompetent). He gave detailed instances of his disagreements, and in doing so, may have unwittingly divulged confidential company information regarding pending transactions. I am a longtime client and I do not think that this will bode well for future business. The post generated quite a few replies, most of them agreeing with the negative statements. While I understand that the employee has the right to his opinion, perhaps he should have vented his frustrations through the appropriate channels before making his post. The link to the post is located here (it is the second one in the thread): http://forum.<domain>/redirect. php?url=http://<domain>%2fforum%2fequities%2f375823902%2farticle. php\par Could you please talk to him? Thank you for the

Fig. 1: Malicious prompt to capture credentials

Fig. 2: Generic lure document

Fig. 3: Phishing email to an executive

BLOOMBERG CONFIDENTIAL

Page 46: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

Section 4: Case Studies

Page 47: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

47

Use Case Mapping Chief Risk & Compliance

Officer

CISO CSO Investigations

•! Threat Hunting Incident Investigations Event Correlation

•! Campaign Tracking Intel Report Production

•! Threat Discovery Watchlists Vetting

SOC Use Cases

Threat Intel Use Cases

Insider Threat Use Cases

•! Political Unrest Assessments Building Threat Assessments Theft Investigations

•! Stakeholder Threat Assessment Reputation Investigation

•! Area Threat Assessment Event Threat Assessment

Physical Security Use Cases

VIP Protection Use Cases

Travel Risk Use Cases

•! Privilege Misuse Money Laundering Insider Trading

•! Account Takeover Organized Crime Investigation

•! Insurance Fraud Complex Fraud Investigation

Internal Fraud Use Cases

External Fraud Use Cases

SIU Use Cases

IBM Internal Use Only

Page 48: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

48

12M posts 1M

4M 14M

12M

20k correlations

500 20

Customer Stakeholder Protection Use Case

Please See Notes

IBM Internal Use Only

Page 49: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

49

Case Study: Insider Threat Example

Security alerted as Intercept tries to verify with another source

Analyst Notes

12-15 May

•! Crease noticed in image, likely a print out

•! Six people printed the document, find commonality

620am 09 May

File Printed

05 May

•! Only one user also emailed the Intercept

"! Print logs

"! Connection Logs

"! Proxy Logs

"! Email Logs

"! Email Content

"! Search Logs

Report Released

"! Badge Logs

•! Consistently coming into work before normal hours

"! HR Records

12 Mar 07 Feb

Relevant SM Post

Relevant SM Post

"! Social Media •! Vicious and proactive social media posts

•! Evidence of profile masking and evasion "! Entity Resolution

Data Sources

03 Jun

Suspect Arrested

06 Jun

Article Published

•! Searched for items outside her normal role

Page 50: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

50

Insider Threat Use Case

(1) - DLP Alert from SOC

(2) – Badge Records Physical Security

(3) – Social Media Search

(4) – HR Records

(6) – Legal Team

(5) – Print Logs

Insider Threat

Team Threat

Team Team

IBM Internal Use Only

SIEM

Page 51: Cyber Operations and Intelligence Essentials · 2018-11-02 · 12 Cyber PIRs What software or updates have the potential of enterprise-wide proliferation like M.E.Doc? What software

51

Looking For:

•!Security Startups

•! Immersion Partners

•!Other Investors