SlideShare a Scribd company logo
1 of 28
Download to read offline
SINTEF  ICT
The  Honeynet Project  Workshop  2015
1
Marie  Moe,  Ph.  D.,  Researcher  at  SINTEF
Incident  handling  of  cyber  espionage
SINTEF  ICT
• Threats  and  trends
• Case  studies  with  examples  from  real  incidents
• Incident  handling
2
Agenda
SINTEF  ICT 3
About  me
§ Research  scientist  at  SINTEF
§ Associate  Professor  II  at  HiG (20%)
§ MSc  in  Mathematics  
§ PhD  in  Information  Security
§ GIAC  certified  Incident  Handler
§ Previously  working  for  NSM  NorCERT
PHOTO:  ROBERT  MCPHERSON,  Aftenposten
SINTEF  ICT
Espionage
Sabotage
Financial  crime
Pranks
Crisis /  War
Political protests
4
Society in  general
National  security
Chaotic actors
Advanced  Persistent  Threats
SINTEF  ICT 5
Espionage  trends
• Modern  espionage  is  most  effectively  
conducted  through  network  
operations
• Significant  amounts  of  information  
stolen
• Russia  and  China  are  the  most  active  
nation  states  behind  network  
operations  against  Norway
Source:  
https://forsvaret.no/ForsvaretDocuments/FOKUS2
015-­‐endelig.pdf
SINTEF  ICT
How  do  they  compromise  our  systems?
6
• Spear  phishing
• Often  contains  predictable  elements
• Targeting  information  often  available  online
• Watering  hole/strategic  web  compromise
• User  profiling  and  whitelisting  of  targets
• Harder  to  detect  and  more  difficult  to  handle  than  spear  phishing
• Credentials  harvesting
• Using  compromised  accounts  for  new  spear  phishing
• Direct  access  to  mail  and  systems  without  leaving  traces
• Known  vulnerabilities
• Zero-­‐days  may  be  used  against  high  priority  targets
• Physical  delivery  rarely  used
SINTEF  ICT
How  do  they  compromise  our  systems?
SINTEF  ICTSINTEF  ICT
Case  A:  Industrial  espionage
SINTEF  ICTSINTEF  ICT 9
https://www.fireeye.com/content/dam/legacy/resources/pdfs/fireeye-­‐china-­‐chopper-­‐report.pdf
SINTEF  ICT
• NorCERT was  contacted  by  a  company  that  discovered  that  they  were  compromised
• Detected  at  the  exfiltration  stage
• Data  ready  for  exfil was  filling  up  the  disk  on  the  Exchange  server!
• Large  files  that appeared to  be  image  files  (.jpg),  but these were in  fact password protected
RAR-­‐files
• The  exfiltration was carried out via  HTTP  GET-­‐requests
• NorCERT coordinated incident response with the victim and  performed forensic
analysis
• The  initial  attack vector was found to  be  a  vulnerability in  ColdFusion which gave  the
attackers the ability to  upload a  ”China  chopper”  webshell  
• The  password for  the RAR-­‐files  was eventually found and  the company could get a  clear idea
of the amount of intellectual property that was lost..
SINTEF  ICTSINTEF  ICT
Case  B:  Spear  phishing  against  the  energy  sector
12
http://www.scmagazineuk.com/hundreds-­‐of-­‐norwegian-­‐energy-­‐companies-­‐hit-­‐by-­‐cyber-­‐attacks/article/368539/
SINTEF  ICTSINTEF  ICT
Case  C:  APT  C&C  proxy  server  in  Norway
17
http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
SINTEF  ICT
HTRAN  report  (Aug.  2011)
http://www.secureworks.com/research/threats/htran
SINTEF  ICT 19
SINTEF  ICT
Incident  Handling  of  cyber  espionage
• Know your assets!
• Common reaction to  incidents:
“We  don’t  have  anything  of  value”
“We  don’t  understand  why  this  happened  to  us”
SINTEF  ICT
The  incident  response  lifecycle
NIST SP 800-61, Revision 2
SINTEF  ICT
Preparation
IT  Operations/maintenance
Clear  understanding of network and  systems
Access  control and  segmentation
Quick updating and  patching
What about cloud services?  Are  you in  control?
IT  Security
Control  and  monitor  network  traffic
Detection  team that look for  intruders and  abnormalities
Threat intelligence
Contingency  planning
Clear  areas  of  responsibility
Escalation  routines,  contact  information
Guidelines for  incident  handling
The  contingency plan  should be  rehearsed!
SINTEF  ICT
Detection  and  Analysis
Your  IDS  needs  to  be  constantly  updated  with  the  latest  threat  intel!
Logging  enables  detection  and  scoping  of  an  incident!
• Traffic  logs  
– Web  traffic  logs
– Proxy  logs  w/  SSL-­‐inspection
– Netflow
– DNS  logging  /  Passive  DNS
– Web  access  logs  on  your  own  web  servers
• Authentication  logs
• Administration  logs
• Security  logs
• E-­‐mail  logs
SINTEF  ICT
Containment,  Eradication  and  Recovery
You  detected  or  got  informed  that  you  have  been  a  victim  of  cyber  espionage…
What  to  do  now?
Selection  of  strategy:
• Protect  and  forget
• Watchful  waiting,  possible  honeypot   operation?
SINTEF  ICT
Clean  up  after  compromise
• Plan  and  execute clean ups in  a  controlled fashion!  
– Hire  a  MSSP  if you lack the necessary know-­‐how
• Establish necessary logging   and  monitoring/IDS
• Isolate compromised systems  from  the network
• Secure memory dump  and  disc image  of compromised systems  
• Reinstall clean back  ups
• Change all  passwords!
• Evaluation  of the incident handling
– Identification of lessons learned
– Update  contingency plans
– Case  studies  are very useful for  training
SINTEF  ICT
The  ”Cyber  Kill  Chain”
• Lockheed  Martin:  7  stages/states of an  ”APT-­‐style”  incident
• If  the attacker fails in  one of the stages  the compromise will not  succeed!
• Detection and  response should be  implemented for  each stage
● What can the organization handle  themselves?
● Where is  collaboration or  outsourcing required?
● Risks  and  costs increase for  each stage
● Timeline:  hours or  days from  successful exploitation
http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-­‐White-­‐Paper-­‐Intel-­‐Driven-­‐Defense.pdf
Recon Weaponize Deliver Exploit Install C2 Action
SINTEF  ICT
Guidelines  for  incident  handling
• NSM  has  published  a  guide  for  
incident  handling  of  cyber  
espionage
– Can  be  downloaded  at  
https://www.nsm.stat.no/globalas
sets/dokumenter/temahefter/apt
_2014.pdf (only  in  Norwegian)
• Overview  of  logging  that  
should  be  in  place  
• What  information  to  submit  to  
NorCERT if  you  want  their  
assistance  
SINTEF  ICTSINTEF  ICT
Thank  you!
marie.moe@sintef.no
@MarieGMoe
@SINTEF_Infosec

More Related Content

What's hot

Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
Cyber Threat Simulation
Cyber Threat SimulationCyber Threat Simulation
Cyber Threat SimulationTonex
 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsBryan Len
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Morakinyo Animasaun
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPTRajat Kumar
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of CybersecurityBenoit Callebaut
 
Cyber security
Cyber securityCyber security
Cyber securityEduonix
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017R-Style Lab
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpChinatu Uzuegbu
 

What's hot (20)

Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Cyber Threat Simulation
Cyber Threat SimulationCyber Threat Simulation
Cyber Threat Simulation
 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity laws
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 
Security tools
Security toolsSecurity tools
Security tools
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 

Similar to Incident handling of cyber espionage

Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT UpdatesAPNIC
 
Creating a Culture of Security
Creating a Culture of SecurityCreating a Culture of Security
Creating a Culture of SecurityTechSoup
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkJack Shaffer
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareTzar Umang
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsSecureDocs
 

Similar to Incident handling of cyber espionage (20)

Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
SecurityOperations
SecurityOperationsSecurityOperations
SecurityOperations
 
Creating a Culture of Security
Creating a Culture of SecurityCreating a Culture of Security
Creating a Culture of Security
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
Security Incident Handling for Schools
Security Incident Handling for Schools Security Incident Handling for Schools
Security Incident Handling for Schools
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 

More from Marie Elisabeth Gaup Moe

Med hjertet på Internett - Sikkerhet i min personlige infrastruktur
Med hjertet på Internett - Sikkerhet i min personlige infrastrukturMed hjertet på Internett - Sikkerhet i min personlige infrastruktur
Med hjertet på Internett - Sikkerhet i min personlige infrastrukturMarie Elisabeth Gaup Moe
 
Når cyberangrep får fysiske konsekvenser
Når cyberangrep får fysiske konsekvenserNår cyberangrep får fysiske konsekvenser
Når cyberangrep får fysiske konsekvenserMarie Elisabeth Gaup Moe
 
Software Security: Hvordan bygge sikre systemer?
Software Security: Hvordan bygge sikre systemer?Software Security: Hvordan bygge sikre systemer?
Software Security: Hvordan bygge sikre systemer?Marie Elisabeth Gaup Moe
 
Unpatchable: Living with a vulnerable implanted device
Unpatchable: Living with a vulnerable implanted deviceUnpatchable: Living with a vulnerable implanted device
Unpatchable: Living with a vulnerable implanted deviceMarie Elisabeth Gaup Moe
 
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...Marie Elisabeth Gaup Moe
 
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...Marie Elisabeth Gaup Moe
 

More from Marie Elisabeth Gaup Moe (13)

Cyberforsikring - Når lønner det seg?
Cyberforsikring - Når lønner det seg?Cyberforsikring - Når lønner det seg?
Cyberforsikring - Når lønner det seg?
 
Med hjertet på Internett - Sikkerhet i min personlige infrastruktur
Med hjertet på Internett - Sikkerhet i min personlige infrastrukturMed hjertet på Internett - Sikkerhet i min personlige infrastruktur
Med hjertet på Internett - Sikkerhet i min personlige infrastruktur
 
Does it pay to be cyber-insured
Does it pay to be cyber-insuredDoes it pay to be cyber-insured
Does it pay to be cyber-insured
 
Når cyberangrep får fysiske konsekvenser
Når cyberangrep får fysiske konsekvenserNår cyberangrep får fysiske konsekvenser
Når cyberangrep får fysiske konsekvenser
 
Unpatchable: Troopers 2016 edition
Unpatchable: Troopers 2016 editionUnpatchable: Troopers 2016 edition
Unpatchable: Troopers 2016 edition
 
From Ukraine to Pacemakers!
From Ukraine to Pacemakers!From Ukraine to Pacemakers!
From Ukraine to Pacemakers!
 
Sikkerhet i Internet of Things
Sikkerhet i Internet of ThingsSikkerhet i Internet of Things
Sikkerhet i Internet of Things
 
Unpatchable: 32C3 edition
Unpatchable: 32C3 editionUnpatchable: 32C3 edition
Unpatchable: 32C3 edition
 
Software Security: Hvordan bygge sikre systemer?
Software Security: Hvordan bygge sikre systemer?Software Security: Hvordan bygge sikre systemer?
Software Security: Hvordan bygge sikre systemer?
 
Unpatchable: Living with a vulnerable implanted device
Unpatchable: Living with a vulnerable implanted deviceUnpatchable: Living with a vulnerable implanted device
Unpatchable: Living with a vulnerable implanted device
 
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
Informasjonssikkerhet og personvern: Hva må vi tenke på ved tilgjengeliggjøri...
 
NorCERT - Hva gjør vi når det brenner?
NorCERT - Hva gjør vi når det brenner?NorCERT - Hva gjør vi når det brenner?
NorCERT - Hva gjør vi når det brenner?
 
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
Er smarte systemer dumme på sikkerhet? -Hvordan ITS krever enda mer intellige...
 

Recently uploaded

call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25JSchaus & Associates
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxjennysansano2
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Christina Parmionova
 
Angels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxAngels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxLizelle Coombs
 
call girls in Yamuna Pushta DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Yamuna Pushta DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Yamuna Pushta DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Yamuna Pushta DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Make Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolMake Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolSERUDS INDIA
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner FutureSwachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner FutureAnkitRaj274827
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdfilocosnortegovph
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfKatrina Sriranpong
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...Amil baba
 

Recently uploaded (20)

call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptx
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.
 
Angels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxAngels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptx
 
call girls in Yamuna Pushta DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Yamuna Pushta DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Yamuna Pushta DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Yamuna Pushta DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Make Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolMake Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong Kurnool
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner FutureSwachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
 

Incident handling of cyber espionage

  • 1. SINTEF  ICT The  Honeynet Project  Workshop  2015 1 Marie  Moe,  Ph.  D.,  Researcher  at  SINTEF Incident  handling  of  cyber  espionage
  • 2. SINTEF  ICT • Threats  and  trends • Case  studies  with  examples  from  real  incidents • Incident  handling 2 Agenda
  • 3. SINTEF  ICT 3 About  me § Research  scientist  at  SINTEF § Associate  Professor  II  at  HiG (20%) § MSc  in  Mathematics   § PhD  in  Information  Security § GIAC  certified  Incident  Handler § Previously  working  for  NSM  NorCERT PHOTO:  ROBERT  MCPHERSON,  Aftenposten
  • 4. SINTEF  ICT Espionage Sabotage Financial  crime Pranks Crisis /  War Political protests 4 Society in  general National  security Chaotic actors Advanced  Persistent  Threats
  • 5. SINTEF  ICT 5 Espionage  trends • Modern  espionage  is  most  effectively   conducted  through  network   operations • Significant  amounts  of  information   stolen • Russia  and  China  are  the  most  active   nation  states  behind  network   operations  against  Norway Source:   https://forsvaret.no/ForsvaretDocuments/FOKUS2 015-­‐endelig.pdf
  • 6. SINTEF  ICT How  do  they  compromise  our  systems? 6 • Spear  phishing • Often  contains  predictable  elements • Targeting  information  often  available  online • Watering  hole/strategic  web  compromise • User  profiling  and  whitelisting  of  targets • Harder  to  detect  and  more  difficult  to  handle  than  spear  phishing • Credentials  harvesting • Using  compromised  accounts  for  new  spear  phishing • Direct  access  to  mail  and  systems  without  leaving  traces • Known  vulnerabilities • Zero-­‐days  may  be  used  against  high  priority  targets • Physical  delivery  rarely  used
  • 7. SINTEF  ICT How  do  they  compromise  our  systems?
  • 8. SINTEF  ICTSINTEF  ICT Case  A:  Industrial  espionage
  • 9. SINTEF  ICTSINTEF  ICT 9 https://www.fireeye.com/content/dam/legacy/resources/pdfs/fireeye-­‐china-­‐chopper-­‐report.pdf
  • 10. SINTEF  ICT • NorCERT was  contacted  by  a  company  that  discovered  that  they  were  compromised • Detected  at  the  exfiltration  stage • Data  ready  for  exfil was  filling  up  the  disk  on  the  Exchange  server! • Large  files  that appeared to  be  image  files  (.jpg),  but these were in  fact password protected RAR-­‐files • The  exfiltration was carried out via  HTTP  GET-­‐requests • NorCERT coordinated incident response with the victim and  performed forensic analysis • The  initial  attack vector was found to  be  a  vulnerability in  ColdFusion which gave  the attackers the ability to  upload a  ”China  chopper”  webshell   • The  password for  the RAR-­‐files  was eventually found and  the company could get a  clear idea of the amount of intellectual property that was lost..
  • 11. SINTEF  ICTSINTEF  ICT Case  B:  Spear  phishing  against  the  energy  sector
  • 13.
  • 14.
  • 15.
  • 16. SINTEF  ICTSINTEF  ICT Case  C:  APT  C&C  proxy  server  in  Norway
  • 18. SINTEF  ICT HTRAN  report  (Aug.  2011) http://www.secureworks.com/research/threats/htran
  • 20. SINTEF  ICT Incident  Handling  of  cyber  espionage • Know your assets! • Common reaction to  incidents: “We  don’t  have  anything  of  value” “We  don’t  understand  why  this  happened  to  us”
  • 21. SINTEF  ICT The  incident  response  lifecycle NIST SP 800-61, Revision 2
  • 22. SINTEF  ICT Preparation IT  Operations/maintenance Clear  understanding of network and  systems Access  control and  segmentation Quick updating and  patching What about cloud services?  Are  you in  control? IT  Security Control  and  monitor  network  traffic Detection  team that look for  intruders and  abnormalities Threat intelligence Contingency  planning Clear  areas  of  responsibility Escalation  routines,  contact  information Guidelines for  incident  handling The  contingency plan  should be  rehearsed!
  • 23. SINTEF  ICT Detection  and  Analysis Your  IDS  needs  to  be  constantly  updated  with  the  latest  threat  intel! Logging  enables  detection  and  scoping  of  an  incident! • Traffic  logs   – Web  traffic  logs – Proxy  logs  w/  SSL-­‐inspection – Netflow – DNS  logging  /  Passive  DNS – Web  access  logs  on  your  own  web  servers • Authentication  logs • Administration  logs • Security  logs • E-­‐mail  logs
  • 24. SINTEF  ICT Containment,  Eradication  and  Recovery You  detected  or  got  informed  that  you  have  been  a  victim  of  cyber  espionage… What  to  do  now? Selection  of  strategy: • Protect  and  forget • Watchful  waiting,  possible  honeypot   operation?
  • 25. SINTEF  ICT Clean  up  after  compromise • Plan  and  execute clean ups in  a  controlled fashion!   – Hire  a  MSSP  if you lack the necessary know-­‐how • Establish necessary logging   and  monitoring/IDS • Isolate compromised systems  from  the network • Secure memory dump  and  disc image  of compromised systems   • Reinstall clean back  ups • Change all  passwords! • Evaluation  of the incident handling – Identification of lessons learned – Update  contingency plans – Case  studies  are very useful for  training
  • 26. SINTEF  ICT The  ”Cyber  Kill  Chain” • Lockheed  Martin:  7  stages/states of an  ”APT-­‐style”  incident • If  the attacker fails in  one of the stages  the compromise will not  succeed! • Detection and  response should be  implemented for  each stage ● What can the organization handle  themselves? ● Where is  collaboration or  outsourcing required? ● Risks  and  costs increase for  each stage ● Timeline:  hours or  days from  successful exploitation http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-­‐White-­‐Paper-­‐Intel-­‐Driven-­‐Defense.pdf Recon Weaponize Deliver Exploit Install C2 Action
  • 27. SINTEF  ICT Guidelines  for  incident  handling • NSM  has  published  a  guide  for   incident  handling  of  cyber   espionage – Can  be  downloaded  at   https://www.nsm.stat.no/globalas sets/dokumenter/temahefter/apt _2014.pdf (only  in  Norwegian) • Overview  of  logging  that   should  be  in  place   • What  information  to  submit  to   NorCERT if  you  want  their   assistance  
  • 28. SINTEF  ICTSINTEF  ICT Thank  you! marie.moe@sintef.no @MarieGMoe @SINTEF_Infosec