Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on September 24, 2020, 06:04:23 PM

Title: US-CERT- AA20-245A: Technical Approaches to Uncovering and Remediating Malicious Activity
Post by: Netwörkheäd on September 24, 2020, 06:04:23 PM
AA20-245A: Technical Approaches to Uncovering and Remediating Malicious Activity

Original release date: September 1, 2020 | Last revised: September 24, 2020

Summary

This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia,[1] Canada,[2] New Zealand,[3][4] the United Kingdom,[5] and the United States.[6] It highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices. The purpose of this report is to enhance incident response among partners and network administrators along with serving as a playbook for incident investigation.



Key Takeaways



When addressing potential incidents and applying best practice incident response procedures:





Click here for a PDF version of this report.


Technical Details

The incident response process requires a variety of technical approaches to uncover malicious activity. Incident responders should consider the following activities.





Recommended Artifact and Information Collection



When hunting and/or investigating a network, it is important to review a broad variety of artifacts to identify any suspicious activity that may be related to the incident. Consider collecting and reviewing the following artifacts throughout the investigation.



Host-Based Artifacts





Information to Review for Host Analysis





Network-Based Artifacts





Information to Review for Network Analysis





Common Mistakes in Incident Handling



After determining that a system or multiple systems may be compromised, system administrators and/or system owners are often tempted to take immediate actions. Although well intentioned to limit the damage of the compromise, some of those actions have the adverse effect of:




  1. Modifying volatile data that could give a sense of what has been done; and

  2. Tipping the threat actor that the victim organization is aware of the compromise and forcing the actor to either hide their tracks or take more damaging actions (like detonating ransomware).



Below—and partially listed in figure 1—are actions to avoid taking and some of the consequence of taking such actions.







Figure 1: Common missteps to be avoided when responding to an incident


Mitigations

The following recommendations and best practices may be helpful during the investigation and remediation process. Note: Although this guidance provides best practices to mitigate common attack vectors, organizations should tailor mitigations to their network.



General Mitigation Guidance



Restrict or Discontinue Use of FTP and Telnet Services


The FTP and Telnet protocols transmit credentials in cleartext, which are susceptible to being intercepted. To mitigate this risk, discontinue FTP and Telnet services by moving to more secure file storage/file transfer and remote access services.





Restrict or Discontinue Use of Non-approved VPN Services




Shut down or Decommission Unused Services and Systems




Quarantine and Reimage Compromised Hosts


Note: proceed with caution to avoid the adverse effects detailed in the Common Mistakes in Incident Handling section above.





Disable Unnecessary Ports, Protocols, and Services




Restrict or Disable Interactive Login for Service Accounts


Service accounts are privileged accounts dedicated to certain services to perform activities related to the service or application without being tied to a single domain user. Given that services tend to be privileged accounts and thereby have administrative privileges, they are often a target for attackers aiming to obtain credentials. Interactive login to a service account not directly tied to an end-user account makes it difficult to identify accountability during cyber incidents.





Disable Unnecessary Remote Network Administration Tools




Manage Unsecure Remote Desktop Services


Allowing unrestricted RDP access can increase opportunities for malicious activity such as on path and Pass-the-Hash (PtH) attacks.





Credential Reset and Access Policy Review


Credential resets need to be done to strategically ensure that all the compromised accounts and devices are included and to reduce the likelihood that the attacker is able to adapt in response to this.





Patch Vulnerabilities


Attackers frequently exploit software or hardware vulnerabilities to gain access to a targeted system.





General Recommendations and Best Practices Prior to an Incident



Properly implemented defensive techniques and programs make it more difficult for a threat actor to gain access to a network and remain persistent yet undetected. When an effective defensive program is in place, attackers should encounter complex defensive barriers. Attacker activity should also trigger detection and prevention mechanisms that enable organizations to identify, contain, and respond to the intrusion quickly. There is no single technique, program, or set of defensive techniques or programs that will completely prevent all attacks. The network administrator should adopt and implement multiple defensive techniques and programs in a layered approach to provide a complex barrier to entry, increase the likelihood of detection, and decrease the likelihood of a successful attack. This layered mitigation approach is known as defense-in-depth.



User Education


End users are the frontline security of the organizations. Educating them in security principles as well as actions to take and not take during an incident will increase the organization's resilience and might prevent easily avoidable compromises.





Allowlisting




Account Control




Backups




Workstation Management




Host-Based Intrusion Detection / Endpoint Detection and Response




Server Management




Server Configuration and Logging




Change Control




Network Security




Network Infrastructure Recommendations




Host Recommendations




User Management




Segregate Networks and Functions


Proper network segmentation is a very effective security mechanism to prevent an intruder from propagating exploits or laterally moving around an internal network. On a poorly segmented network, intruders are able to extend their impact to control critical devices or gain access to sensitive data and intellectual property. Security architects must consider the overall infrastructure layout, segmentation, and segregation. Segregation separates network segments based on role and functionality. A securely segregated network can contain malicious occurrences, reducing the impact from intruders, in the event that they have gained a foothold somewhere inside the network.



Physical Separation of Sensitive Information


Local Area Network (LAN) segments are separated by traditional network devices such as routers. Routers are placed between networks to create boundaries, increase the number of broadcast domains, and effectively filter users' broadcast traffic. These boundaries can be used to contain security breaches by restricting traffic to separate segments and can even shut down segments of the network during an intrusion, restricting adversary access.



Recommendations:





Virtual Separation of Sensitive Information


As technologies change, new strategies are developed to improve IT efficiencies and network security controls. Virtual separation is the logical isolation of networks on the same physical network. The same physical segmentation design principles apply to virtual segmentation but no additional hardware is required. Existing technologies can be used to prevent an intruder from breaching other internal network segments.



Recommendations:





Additional Best Practices





Resources




                   

References


                   

Revisions





           

This product is provided subject to this Notification and this Privacy & Use policy.





Source: AA20-245A: Technical Approaches to Uncovering and Remediating Malicious Activity (https://us-cert.cisa.gov/ncas/alerts/aa20-245a)