Cyber Adversary Characterization. Know thy enemy!



Similar documents
EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

SECURITY. Risk & Compliance Services

Managing IT Security with Penetration Testing

Cybersecurity and internal audit. August 15, 2014

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Understanding SCADA System Security Vulnerabilities

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

What is Really Needed to Secure the Internet of Things?

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Actions and Recommendations (A/R) Summary

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Cyber Watch. Written by Peter Buxbaum

Lessons from Defending Cyberspace

Breakthrough Cyber Security Strategies. Introducing Honeywell Risk Manager

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Enterprise Computing Solutions

Security Defense Strategy Basics

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

September 20, 2013 Senior IT Examiner Gene Lilienthal

Critical Security Controls

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Working with the FBI

White Paper. Information Security -- Network Assessment

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Defending Against Data Beaches: Internal Controls for Cybersecurity

CONSULTING IMAGE PLACEHOLDER

Critical Controls for Cyber Security.

Middle Class Economics: Cybersecurity Updated August 7, 2015

FY 2007 E GOVERNMENT ACT REPORT FINAL SEPTEMBER 2007

NIST National Institute of Standards and Technology

AT A HEARING ENTITLED THREATS TO THE HOMELAND

Firewalls Overview and Best Practices. White Paper

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

The Protection Mission a constant endeavor

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Who Are The Enemies? What Can They Do?

Cybersecurity: What CFO s Need to Know

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

National Cyber Security Policy -2013

Privacy and Security in Healthcare

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Digital Evidence and Threat Intelligence

PENETRATION TESTING GUIDE. 1

Cyber Security for SCADA/ICS Networks

Cryptography and Network Security Chapter 1

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

How To Manage Security On A Networked Computer System

Internet Safety and Security: Strategies for Building an Internet Safety Wall

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Subject: Critical Infrastructure Identification, Prioritization, and Protection

I N T E L L I G E N C E A S S E S S M E N T

Cisco Security Optimization Service

SANS Top 20 Critical Controls for Effective Cyber Defense

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

The Business Case for Security Information Management

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

October 24, Mitigating Legal and Business Risks of Cyber Breaches

INSIDE. Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow

FREQUENTLY ASKED QUESTIONS

Obtaining Enterprise Cybersituational

Cyber Security Metrics Dashboards & Analytics

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Italy. EY s Global Information Security Survey 2013

Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance

TUSKEGEE CYBER SECURITY PATH FORWARD

Information System Security

The Comprehensive National Cybersecurity Initiative

AUTOMATED PENETRATION TESTING PRODUCTS

Cyber R &D Research Roundtable

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.

Transcription:

Cyber Adversary Characterization Know thy enemy!

Brief History of Cyber Adversary Modeling Mostly Government Agencies. Some others internally. Workshops DARPA 2000 Other Adversaries, RAND 1999-2000 Insider Threat, SRI 2002 Cyber Adversary Spectrum Bad Assumptions Defender about attacker Capability, Ability, Skills, Knowledge, Privilege, Access Decision Factors Attacker (risk averse) Model Resources, Complexity, Sophistication, Stealth Defenders assume attackers will attack system as they would. Assume they will use/abuse the system as it was designed to be. Assume systems works as designed. Defenders always behind attackers tools and methods Underestimate likelihood of attack. Threat profile Too busy chasing Top 10 lists (SANS/CERT, etc..)

No, REALLY know your enemy Sun Tzu Art of War Beyond Know your enemy (understand the threat) mission impact, policy dictates security posture and dictates response, policy enforcement mechanisms in place to ensure policy is carried out. Cannot always assume most likely course of action Must take into account the unlikely events and be prepared Kinetic world ideas don t always transition into cyber world Spectrum of adversaries abilities, capabilities and goals Individual or group resource aggregation Given the same tool different adversaries may have very different capability (may also modify it to evade IDS signature detection, etc ) Labeling is therefore dangerous false sense of security Knowledge increase may exceed your expectation once exploit becomes more widely available. Be aware of the win-win situations no apparent mission impact Information aggregation issue Only attacker knows when attack starts and ends

Portraying the CA Red Team must portray credible and consistent adversary to show effect on defenses Do many of the things that are being outlawed vulnerability discovery, exploit creation Not just penetration testing Planned attack(s) with counter moves given responses expected or unexpected with high expectation of success. Artificial time constraints. Real world not as limited Have overall goals and sub goals per step e.g. access confidential data and not leave traces of steps

Why characterize? Theoretical: To gain understanding of and an ability to anticipate an adversary in order to build improved threat models. Practice: Improved profiling of attackers at post attack and forensic levels.

Threat Assessment and Cyberterrorism Matt Devost Terrorism Research Center, Inc. Devost@terrorism.com

Your Adversary is not a 1 or 0! * Differentiation of Adversaries is essential to security planning and incident response Threat Assessment/Adversary Characterization feeds into Risk Management process Without Threat analysis, you are not performing Risk Management Threat analysis allows for concept of acceptable risk - not all Threats can or should be countered *Jason Healey

Calculating Risk Exposure Risks must be managed in context of: What threats/adversaries exist? What tools/capabilities can they use? How attractive is the target (goal/intent/likelihood)? What level of access can be obtained? What impact would attack have? What safeguards can be deployed to minimize exposure?

Threat Agents of Interest Unstructured Hacker Structured Hacker Organized Crime/Industrial Espionage Insider (user/supervisor/admin) Unfunded Terrorist Group/Hacktivist Funded Terrorist Group Nation State

Threat Techniques of Interest Direct Penetration Workstation Direct Penetration Server Direct Penetration Infrastructure Component InDirect Penetration Workstation Indirect Penetration Server Indirect Penetration Infrastructure Component Customized Penetration Tool Insider Placement Insider Recruitment Malicious Code Direct Malicious Code Indirect Denial of Service Distributed Denial of Service Directed Energy Interception/Sniffing Spoofing/Masquerading Substitution/Modification Diversion

Implications for Cyberterrorism Analysis (Which one is correct?) A B And how much are you willing to bet on it?

Characterizing Cyberterrorists Historical analysis won t work as we ve never had a true incident of cyberterror Imagine the threat Red Team the threat Characterize capabilities and intent Assess and fix vulnerabilities Understand your current adversaries (e.g. what is happening now)

Adversary Characterization Key Issues for Cyberterror Nature of terrorism has changed International vs. Single Issue and Calculated Violence vs. Mass Casualty Displaced groups may employ cyberterrorism as a differentiator Lessons are being learned by terrorists What lessons can be drawn from cyberspace or critical infrastructure failures? Long-term planning cycle 5 years of planning for Africa embassy attacks Targets, once identified, will be continually attacked until destroyed (absolute patience and dedication) Convergence Will terrorists converge with Hackers ala Hactivism? Can capability be acquired?

Likely Aspects of Cyberterrorism In Parallel with a Physical or WMD Attack To Decrease Confidence in Critical Infrastructures/ Psychological operations To Cause Physical Damage and/or Loss of Human Life (most attractive/least probable) Nation state as sponsor or using as a tool of strategic influence (don t over-generalize your adversaries!)

Point Scoring: Rating-the-Hacker Toby Miller toby_miller@adelphia.net

Point Scoring: Why? No standard system to help rate the attacker No system to help with the threat level Help management in the decision making process

Point Scoring: The Categories Passive Fingerprinting Intelligence The Attack The Exploit Backdoors Cover up Other

Point Scoring: Past, Present, Future Originally posted on incidents.org Currently on rev2 Soon to release rev 3 www.ratingthehacker.net

Tool characterizations, Disclosure Patterns and Technique scoring. Tom Parker Pentest Limited (UK)

The Hacker Pie Representative of characterization metrics which build the final characterization. Available elements dependant upon scenario. Does not rely solely upon IDS/attack signature data.

Point Scoring Systems (Continued) Attempt to characterize an adversary based on attack information captured from the wild. Attempt to characterize adversary based upon technique classification model Attempt to characterize adversary based upon tool classification model

Tool classification model Availability of application Origins of application Ease of use Requires in-depth knowledge of vulnerability to execute? Other mitigating factors

Disclosure Food Chain Characterization All tools have a story Often years before dissemination into public domain. Social demeanour often key to placing in disclosure disclosure chain. Pyramid metric.

The Disclosure Food Chain Exploit Development Vulnerability Discovery Information shared with fellow researchers (Exploit Development Exploit Trading Type title here Information shared further throughout grey hat communities Exploit Usage In Wild Public Disclosure Disclosure to Security Company Honey Pot Capture Vendor Patch Released Further Research Exploit Reverse Engineered / Vulnerability Research Vendor Coordination Vendor Coordination Public Disclosure Public Disclosure Vendor Fix Released

Marcus Sachs National Cyber Security Division US Department of Homeland Security

The Cyber Threat to the United States US national information networks have become more vulnerable and therefore more attractive as a target Growing connectivity among secure and insecure networks creates new opportunities for unauthorized intrusions into sensitive or proprietary computer systems The complexity of computer networks is growing faster than the ability to understand and protect them The prospects for a cascade of failures across US infrastructures are largely unknown.

Cyber Threats to Critical Infrastructure Hacker/Script Kiddies/Hobbyist Disgruntled Employee Insider aiding others Hacktivist Industrial Espionage Foreign Espionage Terrorist State Sponsored Attack

The Threat is Increasing High State Sponsored 2005 Potential Damage 2004 Terrorist 2003 Low Espionage Criminal Hacker Low Probability of occurrence High Source: 1997 DSB Summer Study

Why are we so Vulnerable? Internet was not built to be secure Secure (i.e., obscure) software being replaced by commercial products in infrastructures Software development focused on Slick, Stable, Simple (not Secure ) System administrators lack training Leaders rarely see computer security as part of the bottom line User awareness is low

Why We re Concerned About Hackers The real threat to Critical Infrastructure is not the hacker, but the structured state-sponsored organization However... Sometimes it s hard to tell the difference - both use the same tools Growing sophistication and availability of tools increases concern We have to assume the worst until proven wrong So... We take seriously all unauthorized activity We will use all technical and law enforcement tools to respond... and deter We will seek legal prosecution where appropriate

New Homeland Security Strategies http://www.whitehouse.gov/homeland/

National Strategy to Secure Cyberspace Nation fully dependent on cyberspace Range of threats: script kiddies to nation states Fix vulnerabilities, don t orient on threats New vulnerabilities require constant vigilance Individual vs. national risk management Government alone cannot secure cyberspace

Priority II A National Cyberspace Security Threat and Vulnerability Reduction Program Enhance law enforcement s capabilities for preemption, prevention, and prosecution Secure the mechanisms of the Internet including improving protocols and routing Foster trusted digital control systems/ supervisory control and data acquisition systems Reduce and remediate software vulnerabilities Improve physical security of cyber and telecommunications systems

Questions? Contact: tom.parker@pentest.co.uk marcus.sachs@dhs.gov toby_miller@adelphia.net devost@terrorism.com