How to use cyber kill chain model to build cybersecurity?
Keywords
#cybersecurity, #network, #defense, #killchain, #incident, #response, #threat, #detection
1. Introduction
Conventional network defense tools, such as IDS, firewalls and antivirus software, use static knowledge of existing system threats and vulnerabilities. Such approach lets us observe more and more successful computer attacks, which result in spectacular data leaks. The evolution of cybercriminals goals and the use of sophisticated tools means that traditional approaches are no longer sufficient. Network defense techniques using knowledge of opponents, threat modeling, and attack scenarios can significantly reduce the probability of each attempted attack. Using the kill chain model helps to understand the purpose and methods of attack so that the computer incident response team (CERT / CSIRT) can more easily identify participants in the anti-organization campaign and determine the directions and methods of defense. The evolution of current attacks requires changing the defense model to a model built on threat information, focusing not only on vulnerabilities but also on threats. It is important to defend not only the weak elements of the system or the system as one entity, but to defend itself against threats - those known and unknown, in a comprehensive manner, independent of the weakness of the system.
2. How does computer attack look like
In order to understand how a computer attack is conducted and thus be able to react appropriately to each attack, it is necessary to analyze the attack process at every stage of its existence. Each phase of the computer attack is a causal chain, the so-called "Kill chain". The term as well as the names of chain phases are derived from military terminology. An effective attack (which can result in system compromise or data theft) is a chain of events: from the initial identification phase, which aims to get to know the victim, by hacking, the two-way data flow in the computer network, the use of vulnerability, and the infection of the system. control. We can analyze each of these events, gain knowledge and use it to break this chain as early as possible. The deeper we analyze these events, the more we learn from the attackers. Proper detection of the attack becomes the key to defense.
In the computer assault model, the following phases were distinguished:
Reconnaissance
Finding, identifying and choosing a destination, often carried out by scanning the internet, web sites, newsgroups, social media or information (white intelligence).
Weaponization
Preparation of attack tools, such as Trojan horses, explosions and data. This is usually a collection of tools that automate the arming. Place prepared tools in infected files that the victim will use (such as PDFs or Microsoft Office files) when they are delivered.
Delivery
Upload of prepared "attack tools" to the attacked environment, through a pre-prepared attack vector (such as email attachments, web pages, or USB media).
Intrusion, Exploitation
After delivering the "attack tools" to the victim machine, the code is executed in the attacked environment. Most often exploits are vulnerabilities in applications or the operating system of an attacked computer. There are much simpler burglaries that use configuration errors or user unawareness.
Installation
Installing a Trojan horse or so called “backdoor” in the victim's system allows the permanent existence in the attacked environment.
Command and Control
Take control of the infected device. Typically, the compromised computer connects to the Control and Control (C2) computer through a specially created communication channel.
Actions on Objective
It is only at this point that the right action is taken to achieve the objectives. Typically this is a penetration, analysis, collection and copying of data. Alternatively, a burglar may use the compromised computer only as a starting point for further attacks and the location from which the trusted victim network is penetrated.
Each cyber-attack phase should be analyzed so that the defender team can determine what action should be taken. They may take different character. First of all, the attack may be detected and it's not that it's going to take place very early in terms of model phases, but rather such a detection can occur in each phase of the attack starting from the run by an attacking reconnaissance activities, ending with the implementation of what was labeled "action". This means that the attacker's target has the most destructive impact on the attacked organization. Steps taken by incident response teams depend on the moment of detection and recognition of the attack.
Unfortunately, the scheme shown in the chain of attack, misleads the potential defender. The problem is the correct presentation of time scale. Now the whole attack can be divided into the preparation phase (Stage 1 Reconnaissance and Stage 2 Weaponization), Incident Phase (Stage 3 Delivery, Stage 4 Exploitation, Stage 5 Installation) and Active Intrusion Phase (Stage 6 Command and Control and Stage 7 Action on Objective). Time to prepare for the attack lasts hours of reconnaissance, and sometimes even months. Then there is an intrusion, understood as the entrance to the attacked infrastructure. It may take up to a few seconds. This stage is the best coordinated and conducted element of the whole attack. The better the preparation, the faster and more effective is the incursion. After successful penetration of the attacked infrastructure, if the attack is not noticed, it is hidden and the intruder's intrusion into the infrastructure of the victim. This stage extends as long as possible, even several months. If the attack goes through all phases, it means that the victim was unable to notice in any way that she was the subject of the attack. This may be due to the very good preparation of the attacker, but often the reason for not detecting the attack is poor preparation of the victim (lack of appropriate monitoring, lack of tools, lack of protective procedures, poor security policy).
At present, more than 90% of attacks start with a random search for a victim (performing a victim search phase). In random attacks, there are also those on a large scale that skip the reconnaissance phase and immediately attempt to break the security of the potential victim, counting on the mistakes he made (wrong configurations, lack of software updates, human factor). These attacks usually start with mass phishing or more sophisticated spear phishing. Attackers "go short," often omitting costly preparation for the attack, they just ask their victim to install malware, hoping that they will succeed. The effectiveness of this method is shocking.
3. Preparation of the defense system
Understanding how a computer attack can give advantage a security team in our organization. First, you can deliberately plan a security architecture to detect attacks and identify where the "site" of your plan is attacking. This will greatly facilitate the selection of defense measures (tools and procedures). The main goal is to break the chain of attack ("kill chain") at any stage, except for the last one, where system compromise and data theft occur.
In order to be able to interrupt or significantly impede the attack, it is necessary to prepare the infrastructure to take into account security needs already at the design stage. Here you can use the methods of designing security by design and Defense in Depth.
Using knowledge of the aggressor's tactics, you should prepare your infrastructure to counter attacks in the broadest possible range of types and the means that our organization uses. When preparing a defense infrastructure architecture, it is important to set goals for the performance of equipment, procedures, policies and people.
These tasks are:
Detect - Detect an attack. Detecting an attack and correctly diagnosing a scenario is the basis for taking steps to neutralize it. It can be assumed that this is the most important functionality of the security system for defense purposes. HIDS, NIDS, firewalls, antivirus software, log analyzers, network traffic analyzers, integrated event correlation (SIEM) systems, file integrity control, and even well-trained or vigilant computer system user.
Prevention - counteracting attacks. This sentence is intended to prevent an attack. Intrusion Prevention (IPS), scan lock, firewalls, access control lists (ACLs), penetration tests, code obfuscation, custom configurations, vulnerability and availability updates, application whitelist, "sandboxing" and, above all, a well-implemented information security policy.
Disrupt - disrupt the attack. By using some technical solutions you can significantly impede a computer attack, you can technically make the attack less effective or the time to prepare and carry it long enough for the entire operation to become unprofitable for the attacker. Among technical interference methods, the "hardening" of the system should be applied in accordance with the recommendations for the type of system. In addition, you can use computers and network traps (honeypots, honeynets), you can also specify well-matched connection limits (application sessions as well as lower layers of the model - TCP session) or data limits.
Degrade - Degradation of attack. It consists in weakening the power of attack, and consequently its effectiveness. The attack itself is conducted (e.g., denial-of-access attack - DdoS), but by degrading the results to our organization are insignificant. The tools and techniques that can be used to accomplish this task are tarpit, configuration changes to shorten session times (short lead times), policies that impede the inclusion of services (time limitation, limitation for different users).
Deceive - hindering the attack. The deception effect is achieved by introducing the attacker and by forcing the wrong assumptions about the system, which will result in selecting an ineffective attack vector. Deceptive tools include honeypots, obfuscation of application code, or returning incorrect application, server, or configuration information.
The list of methods and tools for each task is not closed. The most popular were only listed. Depending on the specifics of the environment, other tools can be implemented, that are important to be effective. For purely technical tools, organizational solutions need to be added, where the most important are trained personnel, procedures and policies, and any knowledge building solution for attackers. Use Threat Intelligences should be taken into action, understood as a study of attack scenarios (techniques and tactics), intelligence and acquisition of information on upcoming and ongoing attacks. This knowledge allows organizations to prepare for attacks, implement security mechanisms by developing new attack scenarios.
Using all these tools, you should model the way they are used to perform tasks in the various phases of the attack. Table 1 provides an overview of the possibilities for implementing various solutions to detect, prevent, disrupt, degrade, or deceive a computer attack in various phases of a computer attack.
4. Detecting an incident and interrupting an attack chain
Depending on the moment of the incident, appropriate steps are taken. Most computer attacks are carried out according to a well-known scenario. At present, 133 scenarios of attacks (TT & CK - Tactics, Techniques & Common Knowledge) have been defined. A security analysis based on information from the defense systems (all implemented mechanisms) determines the occurrence of the incident and defines immediately the attack phase in which the incident was detected. If it is one of the late phases of attack (e.g., Command and Control, fig. 3), then beyond the steps of the incident handling procedure (e.g., stopping, limiting, recovering), it analyzes how far the attack has taken place. The analysis must answer the questions:
- why the attacker reached such a remote place,
- what elements (devices, procedures) of our infrastructure participated in the attack,
- which element should work and protect us in this attack, but that did not happen.
Detecting the incident and analyzing it at a late stage that will assess the effectiveness of the cybernetic defense line. It is very important to understand how malware passed the defense line. Most often it will be information about the weaknesses of our system. These places were noticed (mostly during the Reconnaissance) by the aggressor who decided to use them. It is worth strengthening these places (e.g. changing security policy to some extent, improving device configuration, updating or manually writing signatures for devices that detect or seal network access). Looking at the event in the context of the motive and purpose of the attacker will help us to look at our organization from the aggressor's point of view. We will see what we have valuable resources and we will assess whether we protect them properly. Often it turns out that we do not see potential targets of attacks. For each incident it is necessary to answer the question "How close was the break-in?", "How close was the attacker to achieve the goal?"
When an attack is detected at an early stage (the most common and easiest thing to do in the Delivering phase), it is necessary to analyze what happened as well as to detect it at a later stage, but additionally to do the synthesis. This is to know the next steps of the aggressor and the methods that he wants to use for hacking and installing in the system. Such synthesis after build knowledge of the tactics and tools of the opponent. This knowledge will allow us to provide security protection to defend us from this attack if malicious software is effectively delivered in another, undetected way. During analysis and synthesis, you should determine the attack vector, find vulnerabilities that undermine our infrastructure, and gather the maximum amount of information about the attacker. Often, low level malware analysis is required. This information is used to define the Indicator of Compromise (IoC), which can improve your defense line.
5. Implementation
The way of realization
All resources processed in the Data Center are protected against cyber-attacks. For this purpose, a cluster of high availability and high performance appliances has been implemented, which apply the Application Firewall along with anti-virus protection modules (which include functions of the AV anti-virus system and protection against DLP data leakage). Security policies have been implemented where, apart from the traditional division into security zones (division of networks into segments and regulation of the flow of information between these zones), policies have been implemented that directly address the task of detecting and interrupting an attack. A number of extended policies related to the "Death Chain" have been developed and implemented. These are:
1. Reconnaissance
- inspection of network traffic, detection and prevention of port scanning,
- policy to detect redirects to banned sites (URL filtering).
2. Weaponization
3. Delivery
- inspection of network traffic (including SSL) and blocking of applications that are considered risky,
- protection policy for all endpoints included in the infrastructure (VPN),
- blocking of communication with suspicious and risky URLs (URL filtering);
- blocking the ability to send known exploits and malware, using a variety of protection mechanisms such as IPS, antimalware, antiCnC, sinkholing, DNS traffic monitoring, files blockade.
- policy to block known and unknown threats through online analysis (WildFire).
4. Intrusion, Exploitation
- policy to block known and unknown threats through online analysis (WildFire),
- application control policy for accessing unknown applications and tools (Application Whitelisting).
5. Installation
- protection against local escalation of permissions on endpoint devices connected to the central firewall, protection against theft of sensitive data (e.g. passwords),
- policy of creating safety zones with strictly controlled access rights and monitoring traffic between zones and inside the zone (realization of the Zero-Trust model),
- application control policy for accessing unknown applications and tools (Application Whitelisting).
6. Command and Control
- blocking of send communications to the server Command and Control (C2),
- blocking of communication with suspicious and risky URLs ( URL filtering),
- blocking new attack techniques, by detecting application types independently of the port,
- redirecting suspicious network traffic to local traps and analysis of systems malware (honeypots),
- building a database of dangerous addresses and domains to protect other devices by controlling DNS queries.
7. Actions on Objective
- blocking of send communications to the server Comand and Control (C2),
- policy aimed at reducing data leaks (detection of unusual transmission directions),
- blocking of communication with suspicious and risky URLs ( URL filtering),
- defining policies and rights to transfer files to known and controlled channels (elimination of attempts to transferring data secretly)
Results
Implementing Data Protection System has made it possible to constantly detect numerous attacks on the IT infrastructure. Security administrators have acquired a tool for continuous threat monitoring throughout the unit. This solution integrated the tools and techniques used so far and allowed proactive actions (most of the actions were reactive and preventive).
In recent years, across cyberspace, the number of attacks and their complexity have increased exponentially. Currently, it cannot be said that thanks to the implemented system, the number of attacks has been reduced. This number is constantly increasing. But we are now aware of the scale of threats and see how many attacks have been stopped. Certainly the detection and blocking of attacks has increased significantly.
6. Conclusions
To be able to prepare for defense against attacks, an integrated cyber protection system must be implemented. In order to do this properly and above all effectively, apart from buying a technical solution, one should approach the construction of cyber security as a continuous process. It is necessary to use all available knowledge, tools and organizational solutions. During design of the solution, attention should be paid to several important elements:
- Knowing the organization's information and technology resources (classification, value for the company, and intruder).
- Modeling threats.
- Influencing the architecture of IT and organizational solutions in the organization.
- Collecting event information to the central point.
- Using tools for deep event analysis.
- Using a preventive solutions (increases effectiveness).
- Creating a dedicated team to monitor and respond to incidents.
- Implementing a process to remove known vulnerabilities (change management and updates).
- Sharing the acquired knowledge (including the use of Thread Intelligence)
- Extracting conclusions from security incidents.
Various types of security incidents will occur more and more often. Every organization (public administration, small businesses, large corporations, or industries) is a potential victim of a computer attack. The use of any method of prevention is extremely important and in a significant number of attacks effective. Prevention, however, is always one step behind the attacker, and on the prevention itself you cannot really rely on cybernetic security.
If the prevention fails, it will be necessary to detect and neutralize the computer attack. It is good to be prepared for computer attacks, learn the tactics of the aggressors, build knowledge and exchange information. One cannot forget that cyber security is not a state, but it is a process. In response to cyber security in an organization, you need to be aware that an attacker can make many attempts and can make many mistakes. On the other hand, the cyber-security team cannot go wrong even once, because the consequences of the mistake of "blue team" are always expensive.
Intelligence-driven computer network defense is a necessity in light of advanced persistent threats. As conventional, vulnerability-focused processes are insufficient, understanding the threat itself, its intent, capability, doctrine, and patterns of operation is required to establish resilience. The intrusion kill chain provides a structure to analyze intrusions, extract indicators and drive defensive courses of actions. Furthermore, this model prioritizes investment for capability gaps, and serves as a framework to measure the effectiveness of the defenders’ actions.
Senior Manager of Controls Standards w Dürr
6 年Worth to read!
GCTI, GREM, GCFA - a Senior CTI Manager
6 年Nice kill-chain related article! Could you elaborate your thought about answers on crucial questions? Especially how you want to find out an answer for question: "How close was the attacker to achieve the goal?"? How you want to predict the goal?