identify and select a target Weaponization Pair remote access malware with exploitation into a deliverable payload (such as a PDF file or Word doc) Delivery Transmit weapon to target (email, attachment, website or external media) Exploitation Once delivered, trigger the weapons code, exploiting vulnerable applications or systems Installation Weapon now installs a back door on target system allowing persistent or repeated access Command & Control An outside server communicates with weapons already deployed providing ‘hands-on’ keyboard access inside the target network Actions on Objective The attacker works to achieve the objective of their intrusion, which can include exfiltration or destruction of data, or intrusion of another target
Intelligence (AI) • Ability to take seemingly disparate pieces of information or related information and: − Synthesize ideas or conclusions − Make decisions − Do these in the absence of information in making conclusions • AI can take other information, such as environmental data, into account when making decisions or conclusions Machine Learning • A narrowly defined set of taught and learned attributes
Responsive Orchestration Social Networks Blogs ISAOs Threat Intelligence Network Traffic Support Tickets Behaviors of endpoints and network Firewalls and other network devices Malware and C&C on endpoints Insider Threats Dark Web Intelligence
Cyber Threat Intelligence • Monitoring team escalates potential incidents to the response team • Response team handles the incident • Intelligence is produced to improve detection and response 7
after? • Brand and reputational damage • Intellectual property • Cyber extortion • Employee productivity disruption • Operational disruption • Compliance violations What tactics might they use? • Academic solicitation • Account compromise • Data extraction / destruction • Denial of service • Espionage • Intellectual property theft • Malware • Network Intrusion • Phishing • Reconnaissance • Stolen credentials • Unauthorized access • Unpatched vulnerabilities Who might attack? Higher Education Insider Threat Organized Crime Hacktivist Individual Hacker Third Party Nation State Higher Education is consistently one of the most targeted sectors due to its access to highly sensitive research, student personal information and openness of information sharing
is little visibility into the environment, we may only know what a device is doing or how much traffic is flowing across a network using endpoint solutions • Tools are not connected to any other tool or information source • Our vision is narrow, to the point of not being useful • This opens up opportunities for the bad guys to take advantage of us from multiple points in the organization, often undetected
data on our networks - too much data too fast − Ingested huge amounts of data − Created a large storage infrastructure to store the data for future analysis − Storage is cheap, but continuing to buy more and more storage isn’t the answer • Focus only on data that is important, allowing machine learning to capture and keep data that is truly useful • Knowing the structure of our environments was key to securing them • CONTEXT BECAME CRITICAL
our environments, knowing ‘good’ and ‘bad’, ‘high-risk’ vs ‘low-risk’ behaviors • Focuses alerts to those that manage the noise and address security concerns • Drives down dwell-time inside our environments • Reduces the success of bad guys achieving their objective • Orchestration can assist in not only detecting possible incidents but also remediating − Automatic port closures − Affecting dynamic network segmentation by isolating segments or even creating new segments on the fly − Auto-launch EDR agents on potentially infected endpoints
- the highest risk and highest number of events − Automate low-level events, such as malware infections, if you can • Test your incident response plans regularly and fold them into your business continuity plan • Reporting and data sharing (if you can’t measure it or prove it, it never happened)
do not eliminate all risk − Help you focus on the most relevant risk and manage it • Ensure you know where your most valuable assets are in any environment you are monitoring • Know what type of machine learning is being used! − Structured vs unstructured • Know the structure of the monitored environment - who owns which piece, including endpoints • Machine learning does not fully replace 'eyes on glass'
6 Months 8 Hours Time to Mitigate 1 Week 1 Hour Time to Remediate 6 Weeks 30 Minutes Detection Third Party SOC & CRT Affected 30 Endpoints, 2 Members 6 Endpoints, 2 Members Downtime 336 Hours Member 1: 0 Hrs, Member 2: 24+ Hrs. Attacker Objectives Achieved Not Achieved 15