9 - DCO Flashcards
(130 cards)
Insider Threat
– Definition
- Current or former employee, contractor, or business partner who has or had authorized access to an organization’s network, system, or data and used that access to affect CIA of data or information systems
Insider Threat
– Negative Impacts
- Financial losses
- Negative publicity
- Loss of man-hours
- Disruption of ops
- Disruption of critical services
- Mission downtime
- Mission failure
Insider Threat
– Methods
– Prevention/Detection Challenges
- Methods
– Logic bombs
– Backdoors
– Steal sensitive data
– Attack internal resources - Prevention/Detection Challenges
– Human behaviour/action is unpredictable
– Not detected by traditional security measures
Insider Threat
– Warning Signs
– Behavioural Indicators
- Warning Signs
– Greed
– Abnormal introversion
– Financial hardship
– Vulnerability to blackmail
– Reduced loyalty to US
– Destructive, narcissistic, or passive aggressive behaviour - Behavioural Indicators
– Workers coming in at unusual times w/o authorization/need
– Accessing network at odd times
– Unnecessarily copying classified materials
– Signs of vulnerability to blackmail (drug abuse, excessive gambling, other illegal activities)
Insider Threat
– Detection and prevention techniques
- Encryption
- Data Loss Prevention
– Provides information about how sensitive data is used/transferred - Data Access Monitoring
– ID who is accessing what
– Correlate network activity to certain user
– ID user trends/software usage - Log Analysis
- Data Redaction
- Data Access Control
Data Access Control Types
- Discretionary (DAC) - Owner specifies who has read/write/execute rights
- Mandatory (MAC) - Access control policy determined by central authority; owner cannot change access rights
- Role-Based (RBAC) - Access rights determined by user’s roles within an organization
External Threats
– Definition
– Examples
- Attack originating from outside the organization’s network
Examples
- Ransomware
– One of the fastest growing malware threats - E-mail/Spear-phishing
– Focused attack on specific, usually high-interest person
– Requires minimal cost/skill to execute - Unauthorized Media
– CDs, DVDs, USB, etc. - Unauthorized Physical Access
- Direct Remote Attacks
– Attacks delivered via WiFi, Ethernet, RF, Bluetooth - Botnets
- Web-Based Threats
– Drive-By Attack - attack delivered through seemingly legitimate website; attack of opportunity targeting vulnerabilities in browser/device
– Watering Hole Attack - Focused drive-by attack w/ specific target
– IFrame Redirect - Malicious content embedded in a webpage
– Fake Login Pages
– Browser Plug-in and Script-Based exploits
– SQL Injection - OS/Application based exploits
- DNS Cache Poisoning
- Pass-the-Hash
- Remote Access Tools (RAT)
- Zero-Day Exploits
- N-Day Exploits
China (State Sponsored Threat)
- Noisiest threat actor
- Large attack volume
- Lack sophistication/creativity, but effective
North Korea (State Sponsored Threat)
- Cyber attacks are means to “level the playing ground” against more advanced forces
- Common attacks
– Spear-phishing
– Watering hole
– Intel gathering
Russia (State Sponsored Threat)
- Home to many advanced researchers
- TTPs:
– Weaponized email attachments
– Varied attack patterns, exploits, exfil methods
– Extremely effective detection evasion
– HUMINT - Attributed malware
– Zeus
– Gozi
– SpyEye
– SpyZeus
– Ligats Trojans
Middle East (State Sponsored Threats)
- Often creative, deceptive, or novel attack methods due to lack of sophistication/brute force capes
Iran (State Sponsored Threats)
- Cutting Sword of Justice used “Shamoon” virus to attack Saudi oil company Aramco
- Operation Ababil - DDoS attacks against US financial institutions, including NY Stock Exchange
Syria (State Sponsored Threats)
- Syrian Electronic Army (SEA)
- Loyal to Syrian President
- Conducts DDoS, phishing, pro-Assad defacements, and spamming campaigns
- Hacked AP, BBC, Financial Times, Guardian, NY Times, Twitter, etc.
Advanced Persistent Threat
– Definition
- Anyone conducting cyber ops on behalf of a government body
- Among the most dangerous cyber threats
- Often large scale hacking campaigns
- Receive funding/resources from gov
APT29
– Description
– Associated Malware
– Targets
- Russia
- Hides activity on victim’s network, communicating infrequently and resembling network traffic
- Monitors network defender activity
- Uses compromised servers for C2
- Counters attack remediation attempts
- Fast malware dev cycle to hinder detection
- Associated Malware
– Hammertoss
– Uploader
– tDiscoverer - Targets
– Western European governments
– Foreign policy groups
– Orgs w/ valuable info for Russia
APT28
– Description
– Associated Malware
– Targets
- Russia
- Tsar Team (FireEye)
- Skilled devs/operators collecting intel on defense/geopolitical issues
- Gain insider info related to governments, military, and security orgs
- Associated Malware
– Chopstick
– Sourface - Targets
– Georgia and eastern European countries
– NATO
Ordinary Citizens
- Most common threat
– “Layer 8 Issue” - Weakest link
- Home end-users, employees, etc.
- Mostly passive
Script Kiddies
- Vandals/graffiti artists of the internet
- Inferior knowledge of programming/security
- Motivated by short-term ego-gratification
- Uses existing, well-known exploits/pre-made scripts
- Little thought/concern about consequences
Hackers
- Deeper knowledge/understanding of computer tech
- Concerned w/ subtle details of OSs, algorithms, config files
- Few in number, highly ambitious
Patriot Hackers
- Motive - aid or support own nation-state in ongoing conflict
- Common among Chinese hackers
Cyber Terrorists
- Use computer/network technologies to carry out attacks and cause public fear
Ex: Islamic State Hacking Division
Malware Authors
- Specialized black-hat
- Dev original malware
- Highly skilled in computer programming/detection evasion
- Uses malware “creation kits” for custom malware
Cyber Militia
- Group of volunteers using cyber attacks to achieve political goal
- Uses common comm channels (social media, forums, etc.)
- No monetary rewards for service
Cyber Hacktivists
- Cyber militias that can, in some sense, be seen as cyberspace equivalent to Greenpeace activists or other groups carrying out acts of civil disobedience
- Ex: Anonymous
- Methods:
– Web site defacement
– Internet resource redirect
– DoS
– Info theft
– Web site parodies
– Virtual sit-ins
– Cyber sabotage