Anatomy of A Hack Disrupted Whitepaper 2016

The situation was an obvious case of compromised user credentials. A corporate end user should typically not be logging in simultaneously from two geographically separate locations. In response, the organization’s Security Operations Center (SOC) called the end user (who happened to be a technical security staff member himself) to investigate the matter. The SOC wondered if the user had set up a proxy device from home, was perhaps using his mobile device to initiate a connection, or was even running his own penetration test just to play with his colleagues. The SOC determined that the end user had no malicious intent; he was using the VPN in a legitimate fashion while traveling on a business trip. Because he was boarding a return flight soon and would not need his laptop, the SOC instructed the user to turn it off until he arrived back at the home office and could deliver it to the investigation team. Additionally, the SOC disabled the compromised Active Directory account, and the user’s computer account was removed from the network. THE HACK ISOLATED Once the laptop was received, IT ran a full antivirus scan and found no suspicious files or programs on the system. The IT team then placed the unit in an isolation/test lab for observation before reimaging it, because they wanted to identify the source of the problem and take steps to prevent it in the future. So, the computer was isolated and observed with LogRhythm’s network monitoring probe running. At many organizations, management frequently over-relies on antivirus and assumes the organization is protected from any sort of malware damage. This is a serious misconception. This particular threat was polymorphic in nature and as the name implies, it has the ability to change or “morph” regularly, thereby altering the appearance of its code. This characteristic bypasses detection by traditional antivirus tools and signatures. In our scenario, a more advanced scanner was deployed, and a file related to the threat was indeed found. A proven, reliable antivirus solution is an important network security tool that you need on your network. But in today’s virulent, ever-changing threat landscape, it by no means provides the comprehensive protection you need. There is no substitute for comprehensive monitoring by a SIEM with a wealth of built-in knowledge about cryptic security logs and “My experience with LogRhythm has been extremely intelligent, pre-built rules to catch unusual positive. As an SMB, we appreciate the knowledge activity. Adobe Flash was suspected as the malware’s entry point because Shockwave was found to be improperly patched during a patch-scanning assessment of the computer. (Figure 2) Unusual, irregular browser helper objects were also found; this situation is common when malware wants to hijack and redirect a browser session or send a user to a malicious site. and professionalism that the LogRhythm team was able to bring to the table. We put a lot of effort into selecting a SIEM solution, and we are satisfied that the LogRhythm product meets our needs.” Terry Burke Information Security Officer Central Bank of Barbados Figure 2. A browser plug-in scan reveals an insecure version of Adobe Shockwave THE HACK IDENTIFIED The organization used LogRhythm to initiate a full packet capture and deep packet inspection (DPI) of all traffic initiated during tests on the computer. A common destination IP address was found that did not belong to the organization. Naturally, this address raised suspicions: All traffic from the isolated laptop was going to the same IP address (which did not belong to the organization), “To meet PCI requirements and other data security mandates, organizations indicating a possible must have adequate controls for log management, including collection, hidden proxy review, retention, and destruction. Automated and centralized solutions like mechanism on the LogRhythm are essential for companies to meet key parts of PCI regulation. isolated computer. See Coalfire has validated LogRhythm’s technology as meeting requirements Figure 3. under PCI and industry standards and best practices for this key control area.” Alan Ferguson Vice President and Co-Founder Coalfire
Please complete the form to gain access to this content