TOPIC: The Incident Response Process, - Program, Plan, Policy, Process, Playbooks, and roles
our guest will be:
Lesley Carhart - Principal Threat Hunter at Dragos Inc.
Twitter: @Hacks4Pancakes
Blog: www.tisiphone.net
News-Worthy - City of Atlanta ransomware FOLLOW-Up
Atlanta Working 'Around The Clock' To Fight Off Ransomware Attack
ATLANTA SPENT $2.6M TO RECOVER FROM A $52,000 RANSOMWARE SCARE
Atlanta government was compromised in April 2017 – well before last week’s ransomware attack
Compromised Connected Fish Tank - Comes from a global threat report (2017) from Darktrace - a summary of their case studies for the year
Malware of the Month
Sigma Ransomware - Notable artifact
No text in the body of the message, just an image of text
Breaks any scanning of text for passwords to use in the attached Office documents by sandbox evaluation solutions
Site-Worthy
1. BDIR - ISO 27035 - Information security incident management
2. BDIR - NIST 800-61
Guest - Lesley Carhart
Tool-Worthy
BDIR - Blue Team Handbook: Incident Response Edition: A : by Don Murdoch GSE
BDIR - Blue Team Field Manual (by Alan J White and Ben Clark
Guest - Lesley Carhart
1. Didier writes lots of handy tools useful for forensics and IR. I use his pdf tools
2. A fair bit for inspecting suspicious attachments; rtfdump and oledump seem to do the same for OLE and RTF files.
Other tools Lesley recommends you learn:
Books Lesley recommends everyone read for IR
Blue Team Field Manual (BTFM) - by Alan White (Author), Ben Clark (Author)
Windows Internals, Part 1: System architecture, processes, threads, memory management, and more (7th Edition) 7th Edition - by Pavel Yosifovich (Author), Mark E. Russinovich (Author), David A. Solomon (Author), Alex Ionescu (Author)
Windows Forensic Analysis DVD Toolkit, Second Edition 2nd Edition - by Harlan Carvey (Author)
Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, etc 1st Edition, Kindle Edition - by Cory Altheide (Author), Harlan Carvey (Author)
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory 1st Edition - by Michael Hale Ligh (Author), Andrew Case (Author), Jamie Levy (Author), AAron Walters (Author)
Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious SoftwareFeb 1, 2012 - by Michael Sikorski and Andrew Honig
Topic of the Day
The Incident Response Process, - Program, Plan, Policy, Process, Playbooks, and roles
The Program
ISO 27035 - Information security incident management
NIST 80-61 - Computer Security Incident Handling Guide (August 2012)
Plan
Incident Response Plan (sample) SEI
Model
PICERL - SANS
Prep, Detect/Analysys, Contain/Eradicate/Recovery, Post Incident Activity - NIST
Playbooks: (or “What to do in the event of...”)
Ransomware
Malware infection
Website defacement
Unauthorized Domain Admin Access
Multiple Simultaneous Logins
Media call / report of an incident from external entity
DoS
8. Phishing
9. Credential Stealing phishing
10. Lost or stolen equipment
11. When to use Forensics
12. How to do forensics
IESO - Cyber Security Forum - Playbooks
CERT SOCIETE GENERALE - IRM (Incident Response Methodologies)
(From a list found on Peerlyst)
Phishing
Virus or Worm
Ensure that the host has an updated virus definition file
Traffic Flows
Denial of service (Network Crafted)
Denial of service (spam)
Host Compromise (Trojan)
Network Compromise (Cracking)
Host Compromise (physical Access)
Domain Hijacking
Dns Cache Poisoning
Suspicious User Activity
User Account Compromised
Unauthorized Access (Employee)
Corporate espionage
Internet Hoaxes
IP Telephony denial of service or Outage
Unauthorized remote access protocol
Suspicious website access
Unexpected administrative account / permissions added.
Roles:
What is each person responsible for?
All the people add up to and are a part of your CIRT (NOT CERT)
Incident Responder / IR Manager
Incident Handler
Project Manager
Communication lead
Documentation lead
Security Operations Analysts / Triage Analysts
Forensic Analysts:
Malware Reversers
Security Engineering
Threat Intelligence
Leadership
HR
PR / Corporate Communications
Legal Council
IT (Domain Admin, Help Desk, Server Admins, Client / Patch Admins)
Audit
GRC / Disaster Recovery / Risk Management
Developers / AppSec / Product Engineering
War Room
What is it and when to use it and why
Tabletop Exercises
What should you do here
IR Firm Retainer & Fees can be used for?
What can you use them for?
Breach Notification
Who is involved
What to prepare
Whom to involve
Training:
Carnegie Mellon - SEI - CSIH
https://www.sei.cmu.edu/education-outreach/credentials/credential.cfm?customel_datapageid_14047=14324
SANS
-----------------------------------------------------------------------------------------------