Hunting in the Age of Cyber Warfare
Disclaimer: The sole purpose of this article is to share my own thoughts about cybersecurity detection approaches with my LinkedIn cyber community. There is no political or business motivation behind it whatsoever.
These past few days we have witnessed unprecedented statements from World leaders about how cyber attacks are being strategically used in military campaigns. Now more than ever, the world is in the grip of a new age of conflict, cyber warfare. In order to gain superiority, these nations are using cyber attacks to target critical infrastructure, financial markets, and governmental systems of their rivals, all with potential digital and physical impact. And we cannot dismiss the fact that, while the conflict might directly involve specific nations (e.g. Russia - Ukraine), organizations in other countries should also be prepared for cyber collateral damage provoked via proxies/diplomacy or even accidentally due to the ubiquitous nature of the internet connectivity.
Since Nation-sponsored threats are highly sophisticated and prevention is not always "achievable", preparation should heavily rely in advanced detection and threat huntingmechanisms
The Mindset of a Threat Hunter
Practically speaking, threat hunting usually involves the generation of hypothesis and leveraging specific security datasets (e.g. endpoint telemetry) within a network in order to find related evidences.
SANS defines threat hunting as?"a process using new information on previously collected data to find signs of compromise evading detection"
The Threat Hunter takes a more proactive approach to detection, which is based on adversary techniques rather than signatures. This convinces me that it is a suitable role within an organization's Cyber Operating Model to positively contribute to its own Nation Cyber Warfare maturity.
While threat hunting professionals are passionately driven by understanding and detecting specific techniques
Sometimes Threat Hunters tend to “lose the forest to the trees”
Adversary-Driven Threat Detection Approach
Thankfully, with all the incredible R&D that cyber professionals have been doing for the past few years, the community has access to remarkable frameworks that can help in leveraging that approach, my favorite being the MITRE ATT&CK. How?
After a quick research about the Russian-Ukraine conflict, I easily found out that sophisticated tactics, techniques and procedures (TTPs) have been used such as data-wiper malware (aka "HermeticWipper"), web shells or even actors using the DarkWeb for reconnaissance / data sharing. I also found out that apparently some known State-sponsored Threat Groups are involved in these activities such as Wizard Spider and Sandworm Team. This information by itself is enough to start building Adversary-driven hunting hypothesis and increase the chances of staying "ahead of the game". The reason being that that MITRE ATT&CK already contains actionable information about the TTPs that these Threat Groups typically use.
To be more specific, that information will enable you to start answering important questions while generating the hunting hypothesis
[Q1]. What Industry / Geolocation does my organization belong to? This will help you in narrowing down and focus on threats specifically targeted to your industry or geolocation (not necessarily to your org)
[Q2]. What Threat Groups are targeting my organization and/or the Industry and/or Geolocation we belong to? MITRE ATT&CK helps you answer that together with other sources of information in your constituency such as a National CIRT
[Q3]. What kind of TTPs is the Threat Group usually leveraging? Prioritize the MITRE TTPs and select a specific technique considering what you actually believe it might be harmful to your operations. Organizational context and critical thinking is paramount to be successful in this stage !
领英推荐
[Q4]. Based on that selected technique, what digital assets desirable from an attacker's perspective? Here is where you really need to understand your network, your assets and put yourself in the attackers' shoes to define the specific asset that might be vulnerable to the selected technique. This will be your vantage point for detection
[Q5]. Last but not least, considering the specific technique and digital asset combination, what is the telemetry source(s) that will help you collect potentially malicious activity evidences? This is where it gets granular and interesting since it opens the door to many more planning questions such as "where should I centralize and correlate all my telemetry? What kind of events should I be looking for? How do I operationalize my hypothesis (e.g. alerting logic, dashboarding) ..."
Let's look at the example below that represents one of the Threat Groups involved in the Russian-Ukraine conflict. If we apply the above-mentioned methodology at the "Organization Level", our hypothesis could be something like:
[A1]. Industry: Government, Geolocation: Ukraine
[A2]. According to MITRE ATT&CK, one of the well-known Threat Groups that apparently targeted Ukrainian governmental institutions is the Russian "Sandworm Team"
[A3]. "Sandworm Team" Threat Group is known for using Web Shell as one of the techniques to maintain access to victim network (Tactic: Persistence)
[A4]. For the Web Shell technique, the digital assets of concern could be Web Servers. The reason being that Web Shells are used to allow adversaries to backdoor Web Servers. Since I am in the realm of imagination, I will assume that the well-known Microsoft IIS is our vantage point
[A5]. Employing Microsoft IIS behavior-based detection could provide us with some insights related with scenarios where attackers are running commands via Web Shells. Once attackers gain access to a web server, one of their initial goals is to understand the privilege and the environment they have access to by using built-in reconnaissance commands that are not usually used by web apps. For example, an IIS instance (w3wp.exe) running commands like?‘net’,?‘whoami’,?‘dir’,?‘cmd.exe’, or?‘query’, to name a few, is usually a compelling indicator of web shell activity. Using Microsoft Sysmon Event ID 1 we can capture the telemetry of full command line related with both current and parent processes, which in turn gives us the chance to find the suspicious behavior. (I am planning to do a Part 2 of this article where I explain in deep technical / practical detail how you could operationalize similar hunts. e.g. leveraging a SIEM platform like Splunk. Stay tuned)
Last but not least, in case you find something suspicious, make sure you share your hunting results / feeds with your Incident Response team (for containment & eradication) and, consequently, with your National CIRT - therefore contributing to an increased National Cyber Defense maturity.
Some Final Remarks...
The time where organizations invest in cybersecurity people, processes and technology just for Compliance is gone! Not only organizations have to protect their own business with advanced detection mechanisms, but also they have a very important role to play in Cyber Warfare. Having Individual responsibility is key these days!
Thanks for reading and please share your thoughts via DM :)
?
Internal Control Manager at Euronext | MSc in Cybersecurity
3 年Very clear and insightful article Luís! Hope to see more in the future ??
Strategic Account Manager at Pamafe IT
3 年Proud proud proud … the only word I can say! The goat
@centroinovacaomedica
3 年Congrats Luis on this amazing piece. Thank you for making it available. As someone outside the cybersecurity industry, like me, it is very clear to get a “grip” on the current and future outlook.
Director, Presales and Solution Architecture (Cyber & AI Security)
3 年It’s superb piece of writing from the experience and knowledge of an enthusiast.
Sales Manager | Senior Solutions Engineer | Trusted Advisor ????
3 年Well Luis, I couldn't resists and I had to read it before the weekend. Great work and I loved when you tied the theory into the practice with the examples. As last part I am adding this very useful link that can help all the people dealing with TH to find more information, tools and take it one step further challenging their teams and keeping track with Splunk. https://github.com/0x4D31/awesome-threat-detection