Network Incident Report

Similar documents
Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Common Cyber Threats. Common cyber threats include:

Data Security Incident Response Plan. [Insert Organization Name]

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

The Law. Computer Hacking & Cybercrime. Hacking Tools. Hacking Tools. Group 4 - Troester, van Winkle, Wickless, & Wilson

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

E-BUSINESS THREATS AND SOLUTIONS

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Defending Against Data Beaches: Internal Controls for Cybersecurity

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

License for Use Information

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems


10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

ANTIVIRUS BEST PRACTICES

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Security in DSL Networks. Issues and Solutions for Small-to-Medium Sized Enterprises

Network Security and the Small Business

Penetration Testing Service. By Comsec Information Security Consulting

Computer Security DD2395

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Global Partner Management Notice

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Norton Personal Firewall for Macintosh

Firewalls, Tunnels, and Network Intrusion Detection

USM IT Security Council Guide for Security Event Logging. Version 1.1

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

How To Protect Your Network From Attack From A Hacker On A University Server

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

E-commerce Production Firewalls

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

What are Viruses, Trojans, Worms & Spyware:

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CS549: Cryptography and Network Security

CRYPTUS DIPLOMA IN IT SECURITY

How To Protect A Network From Attack From A Hacker (Hbss)

IPS Anti-Virus Configuration Example

Denial of Service (DoS)

Network Security Policy

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

The Leading Provider of Endpoint Security Solutions

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Best Practices For Department Server and Enterprise System Checklist

The Evolution of Information Security at Wayne State University

COB 302 Management Information System (Lesson 8)

HoneyBOT User Guide A Windows based honeypot solution

Description: Objective: Attending students will learn:

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Ovation Security Center Data Sheet

The Essentials Series. PCI Compliance. sponsored by. by Rebecca Herold

Section 12 MUST BE COMPLETED BY: 4/22

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

IDS / IPS. James E. Thiel S.W.A.T.

Network Security Foundations

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Security Policy for External Customers

Certified Ethical Hacker (CEH)

Course: Information Security Management in e-governance. Day 3. Session 1: Information Security Audits

Managed Security Services

Securing the University Network

Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Computer Networks & Computer Security

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Ovation Security Center Data Sheet

AASTMT Acceptable Use Policy

Security Type of attacks Firewalls Protocols Packet filter

Network/Internet Forensic and Intrusion Log Analysis

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Firewalls, IDS and IPS

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Protect your personal data while engaging in IT related activities

About Botnet, and the influence that Botnet gives to broadband ISP

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Networking for Caribbean Development

Network Attacks and Defenses

GFI White Paper PCI-DSS compliance and GFI Software products

Transcription:

To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850 FAX: 202-406-9233 e-mail: ecb@secretservice.gov Subject: Site under attack What assistance do you require: Immediate call None needed at this time Follow-up on all affected sites Contact the ''hacking'' site(s) Incident investigation in progress Incident closed Site involved (name & acronym): POC for incident: Name / Title Organization E-mail Alternate POC for incident: Name / Title Organization E-mail 7 x 24 contact information Type of Incident: Malicious code: virus, Trojan horse, worm Probes/scans (non-malicious data gathering--recurring, massive, unusual) Attack (successful/unsuccessful intrusions including scanning with attack packets) Denial-of-service event High embarrassment factor Deemed significant by site Date and time incident occurred (specify time zone): A summary of what happened: 7 x 24 contact information Type of service, information, or project compromised (please provide specifics): Sensitive unclassified such as privacy, proprietary, or source selection unclassified Damage done: Numbers of systems affected Nature of loss, if any System downtime Cost of incident: unknown none <$10K $10K - $50K >$50K Name other sites contacted Law Enforcement : Page 1

Details for Malicious Code Diskette, CD, etc. E-mail attachment Software download Primary system or network involved: IP addresses or sub-net addresses affected systems or networks (IPs and OSs): Type of malicious code (include name if known): Virus Trojan horse Worm Joke program Copy sent to Method of Operation (for new malicious code): Type: macro, boot, memory resident, polymorphic, self encrypting, stealth Payload Software infected Files erased, modified, deleted, encrypted (any special significance to these files) Self propagating via e-mail Detectable changes features How detected: Remediation (what was done to return the system(s) to trusted operation): Anti-virus product gotten, updated, or installed for automatic operation New policy instituted on attachments Firewall or routers or e-mail servers updated to detect and scan attachments Page 2

Details for Probes and Scans IP address Host name Location of attacking host: Domestic Foreign Insider Primary system(s) / network(s) involved: IP addresses or sub-net addresses affected systems or networks (IPs and OSs): Method of Operation: Ports probed/scanned Order of ports or IP addresses scanned Probing tool Anything that makes this probe unique How detected: Another site Incident response team Log files Packet sniffer Intrusion detection system Anomalous behavior User Log file excerpts: Page 3

Details for Unauthorized Access IP address Host name Location of attacking host: Domestic Foreign Insider Primary system(s) involved: IP addresses or sub-net addresses affected systems or networks (IPs and OSs): Avenue of attack: Sniffed/guessed/cracked password Trusted host access Vulnerability exploited Hacker tool used Utility or port targeted Social engineering Level of access gained-root/administrator, user Method of operation of the attack (more detailed description of what was done): Port(s) or protocol(s) attacked Attack tool(s) used, if known Installed hacker tools such as rootkit, sniffers, 10phtcrack, zap Site(s) hacker used to download tools Where hacker tools were installed Established a service such as IRC Looked around at who is logged on Trojanned, listed, examined, deleted, modified, created, or copied files Left a backdoor Names of accounts created and passwords used Left unusual or unauthorized processes running Launched attacks on other systems or sites Page 4

Details for Unauthorized Access (continued) How detected: Another site Incident response team Log files Packet sniffer/intrusion detection software Intrusion detection software Anomalous behavior User Alarm tripped TCP Wrappers TRIPWIRED Log file excerpts: Remediation (what was done to return the system(s) to trusted operation): Patches applied Scanners run Security software installed: Unneeded services and applications removed OS reloaded Restored from backup Application moved to another system Memory or disk space increased Moved behind a filtering router or firewall Hidden files detected and removed Trojan software detected and removed Left unchanged to monitor hacker Page 5

Details for Denial-of-Service Incident IP address Location of host: Domestic Foreign Insider Primary system(s) involved: IP addresses or sub-net address affected systems or networks (IPs and OSs): Method of Operation: Tool used Packet flood Malicious packet IP Spoofing Ports attacked Anything that makes this event unique Remediation (what was done to protect the system(s)): Application moved to another system Memory or disk space increased Shadow server installed Moved behind a filtering router or firewall Log file excerpts: Page 6