fidelis professional security maturation services level 2 ......© fidelis cybersecurity threat...

24
Threat Hunting

Upload: others

Post on 29-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

Threat Hunting

Page 2: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

IntroductionJustin Swisher

Threat Hunter – Fidelis

Previous Jobs:

Threat Intelligence

NSM

USAF Intelligence Analyst

Page 3: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Threat Hunting Overview

Hunting with Endpoint

Hunting with Network

Questions

Agenda

Page 4: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

What is Threat Hunting?

Page 5: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Which is Hunting?

DiscoveryDetection

Alerts

Signatures

IOCs

Artifacts

Behaviors

Patterns

TTPs

Anomalies

Outliers

Page 6: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Methodology

3 Fundamental Types of Hunting

Workflows

3 Processes for Hunting within the Types

Implementation

Hunting practices vary between individuals

The blending of "art" and "science"

Fidelis Hunting Strategy

Page 7: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

“Hunting is the discovery of malicious artifacts,

activity, or detection methods not accounted for in

passive monitoring capabilities.”

Page 8: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Getting Started

1. Have a Framework

a) MITRE ATT&CK

b) Pyramid of Pain

2. Internal Intelligence

a) Data Sources

b) Tools

3. External Intelligence

a) Threat Research and Reporting

b) Incident Reports

4. Create a Hypothesis

Open Source

Threat Feeds

ThreatResearch

Internal Intel

Page 9: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Frameworks

Page 10: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Internal Intelligence

Page 11: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Internal Intelligence

Investigative Capabilities

Forensics Capabilities

Deployment

Data Retention

Hunting Abilities

Analytic Support

Tools

Page 12: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

External Intelligence

Threat Intelligence Reports

Leverage TRT blogs and reports

Newly discovered vulnerabilities

CVEs

Proof of Concept code

Incident Response

Newly uncovered artifacts

Potential new patterns of activity

Page 13: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Hunting Workflows

Hypothesis Driven Hunting

Starts with a question

"Are adversaries doing X in my environment?"

Intelligence Driven Hunting

Starts with newly reported intelligence

Indicators, Artifacts, or Behaviors

Continuous Operational Hunting

Based on behavioral triggers

Sometimes an outcome of the other two workflows

Page 14: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Hypothesis Driven Hunting

Brainstorm Session:

▪ Statistical Analysis

▪ Frequency Analysis

▪ Technique/Kill Chain

Align with environment:

▪ Do we have the right tools?

▪ Do we have the visibility?

Pick 1 Hypothesis:

▪ Backlog the rest for future

hunts

Hunt!

▪ Collect data (queries, scripts, etc.)

▪ Analysis: statistical, data science

models, etc.

Malicious Activity

▪ Report findings

▪ Pass IOCs/Behaviors to

Intelligence

No Malicious Activity

▪ Did we get the right data?

▪ Do we need different data? Find a visibility gap?

▪ Can we run this hunt again at a different time and

expect new results?Purple Team Exercise

Page 15: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Benefits of HuntingIdentification of attack methods

Reduced time “Actor” is in environment

Another layer of protection

What was not identified by current security stack

Provides information to build better alert rules and new procedures

Page 16: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Finding the UnexpectedMisconfiguration of servers for protocols/certificates

Passwords in the clear

Self-signed and other certificate situations

Circumvention of corporate DNS, Web Proxy, and Email Servers, etc.

Non-compliance with corporate policy

Illegal activity

Page 17: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Fidelis: The Threat Hunting Tool

Benefits

One Platform

Metrics

Scanning

Forensics

Real-Time Data Collection

Page 18: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Traditional Hunting Network?

Limits visibility only to network traffic

Lack of visibility to identify post-compromised behaviors

Legitimate services controlled by “actor”

Web services

Encrypted communication

This Photo by Unknown Author is licensed under CC BY-SA

Page 19: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Network Always Leads to Endpoint!

Hosts Involved/Compromised

Accounts

Objective

TTPs Used

Page 20: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Two Potential Tracks to Follow

Credential Access Lateral Movement

Page 21: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Credential TheftGolden Ticket

Event ID 4769

Remote Users

Simultaneous Logins

4624

Login type 2,3,9,10 and status success

Deception to enable hunting for credential accessCreate fake admin accounts with no login privileges, alert for login attempts against that user

Page 22: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

Lateral Movement Remote Log-on (Already Executed)

Event ID 5140

Event ID 4697 and 7045

Event 4688

Event ID 5145

PsExec

Commandline

DCOM – ATT&CK T1175

Page 23: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

© Fidelis Cybersecurity

DCOM – ATT&CK T1175Windows Distributed Component Object Model

Uses RPC (Remote Procedure Call) for network communication

Limited to Administrator privileged accounts

Can be used via

Powershell

Office Dynamic Data Exchange

Launch processes or execute shellcodeTarget Machine

cmd used to launch calc

Page 24: Fidelis Professional Security Maturation Services Level 2 ......© Fidelis Cybersecurity Threat Hunting Overview Hunting with Endpoint Hunting with Network Questions Agenda

Thank You