lessons from the front line of the cyber zone...slide 4. 1 year of ndb legislation. with the...

26
3 rd May 2019 Lessons From the Front Line of the Cyber Zone

Upload: others

Post on 24-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

3rd May 2019

Lessons From the Front Line of the Cyber Zone

Page 2: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 2

ES2 Capabilities

Page 3: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 3

1 Year of NDB Legislation

OAIC have now produced four quarterly Notifiable Data Breach (NDB) reports providing almost a full year of breach data.

63

242 245262

0

50

100

150

200

250

300

Q1 Q2 Q3 Q4

Number of Breaches Reported

Series 1

Page 4: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 4

1 Year of NDB Legislation

With the exception of the first (incomplete) quarter.

The Health sector (H) has had the most notifiable breaches.

Finance sector (F) is close behind

Then Legal (L), then Education15

4945

54

0

36 3540

10

0 00

10

20

30

40

50

60

Q1 Q2 Q3 Q4

Breaches by Industry Sector

Health Finance Legal

Page 5: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 5

1 Year of NDB Legislation

Across all quarters Malicious attacks (M) and Human Error (E) make up the largest percentage of breach causes.

The highest percentageattributed to system faultsis only 6%.

28

59 57

64

3236 37

33

0

10

20

30

40

50

60

70

Q1 Q2 Q3 Q4

Cause

Malicious Human Error

Page 6: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 6

1 Year of NDB Legislation

The information that is most often breached is:

• Contact Information (C)• Financial Information (F)

78

216 208223

39

102 110123

0

50

100

150

200

250

Q1 Q2 Q3 Q4

Type of information breached

Contact Info Finance Info

Page 7: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 7

24x7 Incident Response Hotline

Open discussions to establish

situationIncident analysed

Logs and malware analysed

Remediation recommendations

Post-incident Reporting

1800 373 732 (1800 ES2 SEC)

ES2 Incident Response Services

Page 8: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 8

Incident Response Types• Advisory (CxO)• Onsite Response• Forensic Analysis

• Malware Analysis• File Analysis• Log Analysis

• System Backups / Restorations• Technology Remediation (Policy / Controls)• Technology Implementation (SIEM / NGFW / EDR / AI)

Page 9: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 9

Threat Intelligence: Indicators and TTPs

Indicator: A set of cyber observables combined with contextual information intended to represent artefacts and/or behaviours of interest within a cyber security context. Commonly referred to as indicators of compromise (IOCs)

TTP: Commonly referred to as Tactics, Techniques and Procedures are the representations of the behaviour or modus operandi of cyber adversaries. It is a term taken from the traditional military sphere and is used to characterise what an adversary does and how they do it in increasing levels of detail.

“patterns of activities or methods associated with a specific threat actor or group of threat actors”

Reference: https://forensicswiki.org/wiki/Cyber_Threat_Intelligence

Page 10: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 10

Example Indicators• Unusual Outbound Network Traffic• Anomalies In Privileged User Account Activity• Geographical Irregularities• Other Log-In Red Flags• Swells In Database Read Volume• HTML Response Sizes• Large Numbers Of Requests For The Same File• Mismatched Port-Application Traffic• Suspicious Registry Or System File Changes• DNS Request Anomalies

Reference: https://www.darkreading.com/attacks-breaches/top-15-indicators-of-compromise/d/d-id/1140647

Page 11: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 11

Example TTPs

Tactics (aka Tools)

• Phishing Attacks

• SQL Injection Attacks (SQLi)

• Cross-Site Scripting (XSS)

• Man-in-the-Middle (MITM)

• Malware

• Denial-of-Service

• Spear Phishing

• Whaling Phishing

• Brute-Force and Dictionary

Techniques

• Espionage and foreign interference

• Theft or Loss of Devices

• PII Breach

• Data Breach

• DDoS (Distributed Denial of Service)

• Ransom / Extortion

• Financial Fraud

• Unauthorised Access

Procedures

• Reconnaissance

• Enumerating exposed systems

• Gather contact details

• Third Party Compromise

• Email Account Takeover

• Identify Vulnerabilities

• Social Data Mining

• Obtain Exploits & Zero Days

• Malware Execution

• Detect and evade sandbox or heuristic analysis

• Deploy persistence

• C&C Communications

Tactics (Tools) Techniques Procedures

Page 12: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 12

Data Breach and Extortion

IncidentA large Western Australia-based organisation was subject to a cyber security breach followed by an extortion attempt.

ResponseEngaged as the first responder to assist the in house IT team as advisors and to conduct the forensic collection of log data and system data.

Page 13: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 13

Data Breach and Extortion

Tactics, Techniques and Procedures

Post-Incident SIEM Implementation, Multi-Factor Authentication, Dark Web monitoring, 24/7 Monitoring

Password brute force Data Breach Extortion Reconnaissance

and enumeration

Page 14: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 14

Data Breach

IncidentA skilled hacker in Asia stole sensitive security details and building plans from a WA organisation after breaking into its computer systems.

ResponseES2 were engaged as a Second responder to assist the IT team as advisors and to conduct the forensic collection of log data and system data.

Page 15: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 15

Data Breach

Tactics, Techniques and Procedures

Post-Incident SIEM Implementation, Network Segmentation, Application Whitelisting, Privilege Access Management, Multi-Factor Authentication, 24/7 Monitoring, Improved third party processes

Password brute force or phishing Data Breach Third Party Compromise

Page 16: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 16

Data Breach & Ransomware

IncidentTeam of cybercriminals launched multiple malware attacks on a Perth based resources company before completing a sophisticated Network Breach, using a combination of Ransomware, Malware and Data Extraction.

ResponseES2 were engaged as a First responder to assist the IT team with advisory, and implementation/ remediation of Technical Controls

Page 17: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 17

Data Breach & Ransomware

Tactics, Techniques and Procedures

Post-Incident Network Segmentation, Application Whitelisting, Privilege Access Management, Multi-Facto, Privileged Access control, Authentication, system restoration in the cloud, data restoration from old back

Malware andPhishing

Data Breach Reconnaissance Reconnaissance and enumeration Zero day exploits Malware

execution

Page 18: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 18

O365 Account Takeover

IncidentNFP organisations Executive spotted unusual email activity on his account and identified spurious purchases being made using corporate credit card.

ResponseES2 were engaged as a First responder to assist the IT team with advisory and forensic collection of log data and system data.

Page 19: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 19

O365 Account Takeover

Tactics, Techniques and Procedures

Post-Incident Multi-Factor Authentication, Improved auditing and logging, Improved password procedures

Use of breached credentials Financial Fraud Unauthorised

AccessEmail Account

Takeover

Page 20: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 20

Impacts

1) Email Account Takeover2) Ransomware3) Data Breach4) Malware Attack5) DDoS

Financial ImpactData LossBrand DamageDowntimeBrand Damage / Downtime

Page 21: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 21

Lessons Learnt

• Maintaining a minimum of 90 days worth of resilient System and/or Data Backups will reduce the impact of a Cyber Attack.

• Implementing Multi-Factor Authentication to avoid Account takeovers and Impersonation attacks.

• Enable Centralised Logging and Alarms to prevent tampering and assist in investigations

• Restricting Outbound Internet Access from Privilege Users and Business Servers makes it harder for Threat Actors to exfiltrate data and download additional tools.

• Start monitoring the Dark Web for exposed Corporate Accounts and company data to provide faster response times.

Page 22: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 22

ES2 Recommended RoadmapC

yber

Sec

urity

Rev

iew

Secu

rity

Stra

tegy

Polic

y Fr

amew

ork,

Po

licie

s &

Stan

dard

s Vulnerability Mgt& Patching

Email Security

Penetration Testing

Security Monitoring

Social Engineering

Incident Response Plan

Network Segmentation

Multi-Factor Authentication

Security Awareness

Application Whitelisting

Application Hardening

Access Mgt

Page 23: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 23

Have I Been Pwned

Page 24: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 24

ES2 Kids is a Not-for-Profit Foundation that assists in bridging the

gap of Cyber Security Awareness for K-12 kids.

ES2 Kids

ES2 Kids focus is to facilitate Cyber

Security Awareness from the Private

and Government sectors to K-12 kids

(and their parents …)

Page 25: Lessons From the Front Line of the Cyber Zone...Slide 4. 1 Year of NDB Legislation. With the exception of the first (incomplete) quarter. The Health sector (H) has had the most notifiable

Slide 25

ES2 Kids Q+ASteve Simpson & Heidi Drouin