Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer...

28
Anatomy of an Attack Chris Hankin

Transcript of Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer...

Page 1: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Anatomy of an Attack

Chris Hankin

Page 2: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,
Page 3: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,
Page 4: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Lockheed Martin Cyber Kill Chain™

• Atomic, Computed and Behavioural indicators

• Military doctrine: F2T2EA – find, fix, track, target, engage, assess

Page 5: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Courses of Action

From: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and

Intrusion Kill Chains, by Hutchins et al, Lockheed Martin Corporation

Page 6: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Reconnaissance

• Research, identification and selection of

targets

• Physical surveillance

• Internet presence

• Social media

• Family and close acquaintances of potential

targets

Page 7: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Weaponization

• Embedding of malware into delivery

mechanism

• Typically a remote access trojan (RAT)

• Adobe PDF

• Microsoft Office Document

Page 8: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Delivery

• Removable Media (USB)

• E-mail attachment

• Website

Page 9: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Exploitation

• Exploit Vulnerability in application software or operating system

• Exploit user behavior

• Exploit auto-execution facility

Page 10: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Installation

• RAT or backdoor installed on the target system

to allow persistent access.

Page 11: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Command and Control (C2)

• F-Secure found that the HAVEX RAT used

compromised web-sites as C2 servers:

Page 12: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Action on Objectives

• Data exfiltration

• Data integrity

• Data availability

• Hopping off point

Page 13: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Courses of Action

From: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and

Intrusion Kill Chains, by Hutchins et al, Lockheed Martin Corporation

Page 14: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

The Purdue Model

Page 15: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

The ICS Kill Chain

ICS Attack

Page 16: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Validation

• Testing on target system

• Construction of testbed facilities

Page 17: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Cyber Attack on the Ukrainian Power

Grid

Page 18: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Triton/Trisis

Source: Trisis Malware, Dragos

Page 20: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Other Attacks

• Shamoon – wiper attack in Middle East; 2012

to 2018 (ongoing)

• Petya – ransomware using same EternalBlue

exploit as WannaCry; 2016

• NOTPetya – masquerading as ransomware;

2017

• Mirai – IoT devices; 2016

Page 21: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

Mirai Botnet

Understanding the Mirai Botnet,

Antonakakis et al

Page 22: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

CWE

Page 23: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,
Page 24: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

CVE

Page 25: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

CVSS

Page 26: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

CVSS continued

Page 27: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,

CAPEC

Page 28: Anatomy of an Attack - msccis.ucy.ac.cy · Courses of Action From: Intelligence-Driven Computer Network Defense In formed by Analysis of Adversary Campaigns and Intrusion Kill Chains,