setting up csirt

79
Issue Date: Revision: Setting up Computer Security Incident Response Teams (CSIRTS) Adli Wahid Security Specialist [email protected] 05 June 2014 V 1.1

Upload: apnic

Post on 23-Aug-2014

487 views

Category:

Internet


1 download

DESCRIPTION

Comprehensive slide pack on how to set up Computer Security Incident Response Teams to help combat cybercrime.

TRANSCRIPT

Page 1: Setting up CSIRT

Issue Date:

Revision:

Setting up Computer Security Incident Response Teams (CSIRTS) Adli Wahid

Security Specialist

[email protected]

05 June 2014

V 1.1

Page 2: Setting up CSIRT

About Me •  Adli Wahid

•  Current Role –  Security Specialist, APNIC

•  Previous Roles –  Cyber Security Manager, Bank of Tokyo-Mitsubishi UFJ –  VP Cyber Security Response Services, CyberSecurity Malaysia &

Head of Malaysia CERT (MYCERT) –  Lecturer, International Islamic University Malaysia

•  Follow APNIC and me on Twitter! –  @apnic && @adliwahid

3

Page 3: Setting up CSIRT

Agenda

•  Cyber Threats Landscape

•  Setting up Computer / Cyber Security Response Team

•  Tools for incident handling and analysis

•  Exercises

4

Page 4: Setting up CSIRT

1.0 Cybersecurity & the Threat Landscape

5

Page 5: Setting up CSIRT

So you do ‘Security’?

6

Page 6: Setting up CSIRT

7

Page 7: Setting up CSIRT

Cyber Security Frame Work •  How do we think about security?

•  Ensuring the CIA –  Confidentiality, Integrity, Availability

•  Collection of activities to address Risk –  Risk = Threats x Vulnerabilities –  Dealing with the Known & and Unknown

•  People, Process, Technology

•  Dynamic & Continuous Approach –  Including Learning from Incidents –  Applying Best Current Practices

8

C

I

A

Page 8: Setting up CSIRT

NIST Cyber Security Framework

9

RESPOND

Page 9: Setting up CSIRT

The Threat Landscape

•  Highlights of cyber security incidents

•  What they mean for a CERT / CSIRT?

•  Understanding risk and impact associated with the threats or incidents

•  Thinking about actions required for dealing with the incidents

10

Page 10: Setting up CSIRT

Cyber Threats

•  Malware Related

•  Data Breaches

•  Distributed Denial of Service Attacks

•  Web Defacement

•  Spam

•  Phishing

•  Scanning / Attempts

•  Content Related

11

Page 11: Setting up CSIRT

Malware-Related

•  The Problem –  Malicious software have different infection

vectors and ‘payloads’ –  Different consequences once a computer is

infected –  Millions of infected Computers –  Complex ‘infrastructure’ for spreading malware

and controlling infected computers

12

Page 12: Setting up CSIRT

Malware-Related

•  Different Types of Malware –  Bots & Botnets –  Ransomware –  ExploitKits

•  What do CSIRTs have to Handle? –  Infected computers –  Infection points

•  Command & Controls •  Web Sites

–  Organise Take-Downs Efforts (Conficker, DNSChanger) –  Write Advisory (for removal) –  Work with Law Enforcement Agencies

13

Page 13: Setting up CSIRT

14

Page 14: Setting up CSIRT

15

DNS Changer Working Group http://www.dnwg.org

Page 15: Setting up CSIRT

Botnet Mitigation Techniques

16

Source: www.enisa.europa.eu

Page 16: Setting up CSIRT

DoS and DDoS •  DoS:

–  source of attack small # of nodes –  source IP typically spoofed

•  DDoS –  From thousands of nodes –  IP addresses often not spoofed

•  What you need to Handle –  Source of DDoS attack

•  What if IP is spoofed?

–  Victim of DDoS attack –  Services/Sites facilitating DDoS attacks

•  Help promote BCP38 / Source Address Validation too!

17

Page 17: Setting up CSIRT

Distributed DoS: DDos

18

Internet attacker

victim

bot

bot

bot

bot

Attacker takes over many machines, called “bots”. Potential bots are machines with vulnerabilities.

bot processes wait for command from attacker to flood a target

Page 18: Setting up CSIRT

DDoS: Reflection attack

19

attacker

victim

DNS server

DNS server

DNS server

DNS server

request request

request

request

reply

reply

reply

reply

Source IP = victim’s IP

Page 19: Setting up CSIRT

DDoS: Reflection attack

•  Spoof source IP address = victim’s IP

•  Goal: generate lengthy or numerous replies for short requests: amplification –  Without amplification: would it make sense?

•  January 2001 attack: –  requests for large DNS record –  generated 60-90 Mbps of traffic

•  Reflection attack can be also be done with Web and other services

20

Page 20: Setting up CSIRT

21

Source: https://dnsscan.shadowserver.org/index.html

Shadow Server - Open Resolver Scanning Project

Page 21: Setting up CSIRT

Data Breaches •  The Problem

–  Thousands and Hundreds of Credentials (username and passwords) being exposed and shared publicly •  By accident or or purpose •  i.e. on scribd

•  CSIRTs/CERTs are contacted to handle / co-ordinate so that accounts are not further abused

•  Handling –  Contacting the owners of credentials –  Contacting owner of system where credentials are being dumped

•  SQL injection vulnerability, Misconfiguration –  Improving authentication mechanism (2FA?) –  Removing the credentials

22

Page 22: Setting up CSIRT

Phishing

•  The Problem –  Active attempt to trick users to give credentials –  Use a combination of email, social media and fake websites

•  What needs to be handled –  Source of Phishing Email –  Fake website –  Credentials stolen –  Accounts or sites collecting phishing credentials (drop sites)

23

Page 23: Setting up CSIRT

Dear Intelligent User, We have introduced a new security feature on our website. Please reactivate your account here: http://www.bla.com.my p.s This is NOT a Phish Email

Login

Password

din:1234567 joey:cherry2148 boss:abcdefgh123 finance:wky8767 admin:testtest123

<? $mailto=‘[email protected]’; mail($mailto,$subject,$message); ?>

Phishing Example

24

1 2

3 4

Page 24: Setting up CSIRT

Spam •  The Problem

–  Unsolicited Emails –  Waste of bandwith, cost money –  Leads to other problems

•  What you need to handle –  Source of email

25

Page 25: Setting up CSIRT

Spam with Malware

26

Page 26: Setting up CSIRT

Only 5 out of 42 AVs Detect This

27

Page 27: Setting up CSIRT

Compromised Web Sites

•  The Problem –  Web sites compromised leading to defacement or abused for other

types of attacks –  Possibly caused by

https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

–  Mass Defacements –  Pre-Announced Attacks

•  What you need to handle / co-ordinate –  Contacting owner of the website –  Handling the source of attack

28

Page 28: Setting up CSIRT

Recap on Cyber Threats

•  Understanding the different types of cyber threats is the first step before you start handling or responding to the incidents

•  Abuse or IRT contacts could be the first to be contacted •  Questions to ask

–  How does it work? –  What are the impact? –  What do we have to ‘handle’? –  Who should I contact / escalate? –  What should be prioritized?

•  CSIRTS/CERTS can be contacted at the different stages of the attacks or incidents

29

Page 29: Setting up CSIRT

2.0 Incident handling & Response Framework

30

Page 30: Setting up CSIRT

Outcomes of this Module

1.  Understand the importance of responding and handling security incidents

2.  Familiar with the requirements for setting up a CERT / CSIRT

3.  Identify organisations to connect with for collaboration & cooperation

31

Page 31: Setting up CSIRT

32

Page 32: Setting up CSIRT

Incidents Happens!

•  Despite your best efforts keep the internet safe, secure and reliable – things happens

•  What we have seen –  Malware, Botnets, Exploit Kits, Ramsomware,

DDoS Attacks, Anonymous, 0-days, Web Defacement

–  Data Breaches and Disclosures –  And Many more!

•  What is the worst that can happen to you?

33

Page 33: Setting up CSIRT

Incident Happens! (2)

•  Incident may affect –  Your Organisation –  Your Customers –  Your country (think Critical Infrastructure)

•  Must be managed in order to –  Limit Damage –  Recover (Fix/Patch) –  Prevent recurrence –  Prevent Further Abuse

34

Page 34: Setting up CSIRT

Exercise-1

•  You might have an incident already

•  Visit www.zone-h.com/archive

•  Enable filters –  Insert domain

•  Let’s Discuss –  What can we learn from this? –  What is the risk for publication of defaced websites? –  Going back to our formula: Risk = Threats + Vulnerabilities

35

Page 35: Setting up CSIRT

Exercise-1: Discussion •  Detection

–  How do I know about incidents affecting me

•  Analysis –  How ‘bad’ is the situation –  Google for ZeusTracker, MalwareDomainList

•  Recover –  How do I fix this

•  Lessons Learned –  How can we prevent this happening in the future –  Think PPT! –  Can series of action be co-ordinated?

36

Page 36: Setting up CSIRT

Whois Database IRT Object

•  IRT - Incident Response Team

•  Reporting of network abuse can be directed to specialized teams such as Incident Response Teams (IRTs)

•  Implemented in AP region by policy Prop-079 in November 2010. –  Mandatory for inetnum, inet6num and aut-num, objects created and

updated in whois database

•  In essence, the contact information must be reachable and can do something about an incident!

37

Page 37: Setting up CSIRT

inetnum: 1.1.1.0 - 1.1.1.255 netname: APNIC-LABS descr: Research prefix for APNIC Labs descr: APNIC country: AU admin-c: AR302-AP tech-c: AR302-AP mnt-by: APNIC-HM mnt-routes: MAINT-AU-APNIC-GM85-AP mnt-irt: IRT-APNICRANDNET-AU status: ASSIGNED PORTABLE changed: [email protected] 20140507 changed: [email protected] 20140512 source: APNIC irt: IRT-APNICRANDNET-AU address: PO Box 3646 address: South Brisbane, QLD 4101 address: Australia e-mail: [email protected] abuse-mailbox: [email protected] admin-c: AR302-AP tech-c: AR302-AP auth: # Filtered mnt-by: MAINT-AU-APNIC-GM85-AP changed: [email protected] 20110922 source: APNIC

Whois Database Incident Response Team Object

38

Page 38: Setting up CSIRT

What is incident?

•  ITIL terminology defines an incident as: –  Any event which is not part of the standard operation of a service and

which causes, or may cause, an interruption to, or a reduction in, the quality of that service

•  ISO27001 defines an incident as: –  any event which is not part of the standard operation of a service and

which causes or may cause an interruption to, or a reduction in, the quality of that service.

39

Page 39: Setting up CSIRT

Incident Response vs. Incident Handling?

•  Incident Response is all of the technical components required in order to analyze and contain an incident. –  Skills: requires strong networking, log analysis, and forensics skills.

•  Incident Handling is the logistics, communications, coordination, and planning functions needed in order to resolve an incident in a calm and efficient manner.

[isc.sans.org]

40

Page 40: Setting up CSIRT

What is Event?

•  An “event” is any observable occurrence in a system and/or network

•  Not all events are incidents but all incidents are events

41

Page 41: Setting up CSIRT

Objective of Incident Response •  To mitigate or reduce risks associated to an incident •  To respond to all incidents and suspected incidents

based on pre-determined process •  Provide unbiased investigations on all incidents •  Establish a 24x7 hotline/contact – to enable

effective reporting of incidents. •  Control and contain an incident

–  Affected systems return to normal operation –  Recommend solutions – short term and long term solutions

42

Page 42: Setting up CSIRT

Dealing with Incidents – Bottom Line •  What happens if you don’t deal with incidents?

–  Become Tomorrow’s Headline (Image) –  I or Domain Blacklisted (Availability & Financial Loss)

•  Linked to Criminals

•  The World needs you! –  Trusted point of contact (information on infected or compromised hosts –  Doing your bit to keep the Internet a safe and secure place for

everyone!

43

Page 43: Setting up CSIRT

The CSIRT Organisation

•  Defining the CSIRT Organisation

•  Mission Statement –  High level definition of what the team will do

•  Constituency –  Whose incidents are we going to be handling or responsible for –  And to what extent

•  CSIRT position / location in the Organisation

•  Relation to other teams (or organisations)

44

Page 44: Setting up CSIRT

Possible Activities of CSIRTs

•  Incident Handling

•  Alerts & Warnings

•  Vulnerability Handling

•  Artefact Handling

•  Announcements

•  Technology Watch

•  Audits/Assessments

•  Configure and Maintain Tools/Applications/Infrastructure

•  Security Tool Development

•  Intrusion Detection

•  Information Dissemination

•  Risk Analysis

•  Business Continuity Planning

•  Security Consulting

•  Awareness Building

•  Education/Training

•  Product Evaluation List from CERT-CC (www.cert.org/csirts/)

45

Page 45: Setting up CSIRT

Operations & Availability •  Incidents don’t happen on a particular day or time

•  How to ensure 24 x7 reachability? –  IRT Object In WHOIS Database –  Email (Mailing List) –  Phone, SMSes –  Information on the Website –  Relationship with National CSIRTs and Others Relevant

Organisations •  ISPS, Vendors, Law Enforcement Agencies

46

Page 46: Setting up CSIRT

Different kinds of CSIRTs

•  The type of activities, focus and capabilities may be different

•  Some examples –  National CSIRTs –  Vendor CSIRTs –  (Network & Content) Providers Teams

47

Page 47: Setting up CSIRT

Resources Consideration (1)

•  People, Process and Technology Requirements

•  People –  Resources for:

•  Handling Incidents Reports (Dedicated?) •  Technical Analysis & Investigation

–  What kinds of skills are required ? •  Familiarity with technology •  Familiarity with different types of security incidents •  Non Technical skills – Communication, Writing •  Trustworthiness

48

Page 48: Setting up CSIRT

Resources Requirements (2)

•  Process & Procedures –  Generally from the beginning of incident till when we resolve the

incident –  Including lessons learned & improvement of current policies or

procedures –  Must be clear so that people know what do to –  Importance

•  Specific Procedures for Handling Specific types of Incidents –  Malware Related –  DDoS –  Web Defacement –  Fraud –  Data Breach

49

Page 49: Setting up CSIRT

Source: Special Publication 800-61* Computer Security Incident Handling Guide page 3-1 * http://csrc.nist.gov/publications/nistpubs/800-61-rev1/SP800-61rev1.pdf

Incident Response/ & Handling

50

Page 50: Setting up CSIRT

Applying the Framework - Responding to a DDOS Incident 1.  Preparation

2.  Identification

3.  Containment

4.  Remediation

5.  Recovery

6.  Aftermath/Lessons Learned

51

Reference: cert.societegenerale.com/resources/files/IRM-4-DDoS.pdf

Page 51: Setting up CSIRT

Example Team Structure

•  First Level –  Helpdesk, Perform Triage

•  2nd Level –  Specialists

•  Network Forensics •  Malware Specialists •  Web Security Specialists

•  Overall Co-ordination

52

Page 52: Setting up CSIRT

Understanding Role of Others in the Organisation •  Different roles in the organisations

–  CEO: to maximise shareholder value –  PR officer: to present a good image to the press –  Corporate Risk: to care about liabilities, good accounting, etc. –  CSIRT: to prevent and resolve incidents

•  Don’t assume these interests automatically coincide - but with your help, they can !

53

Page 53: Setting up CSIRT

Technical Non-Technical

Incident Response/Handling – Skills / Activities Overview

54

Logistics

Coordination

Communication

Planning

Log Analysis

Forensics

Network

Reversing

Page 54: Setting up CSIRT

Resources Requirements •  Technology / Tools

•  Essentially 2 parts –  For handling Incidents & Incidents Related Artifacts

•  Managing tickets, secure communications, etc •  RTIR, OTRS, AIRT are some good examples

–  Tools & Resources for Analysis & Investigation •  Depending on the type of work that is required •  For performing:

– Hosts Analysis, Log Analysis, Traffic Analysis, Network Monitoring, Forensics, Malware Analysis

–  Tools that support standards for exchanging Threat Intels with other teams (STIX & TAXII)

55

Page 55: Setting up CSIRT

OTRS

Fax server

Email

Phone

Web form

SMS

IDS alerts

Other Sources

56

Example: Incident Reporting Channels Integration with OTRS

Page 56: Setting up CSIRT

Phish Response Checklist 1.  Analyse / Report of Spam

2.  Phishing Site Take Down –  Removal / Suspension –  Browser Notification

3.  Phishing Site Analysis –  Phishkits ?

4.  Credentials ‘Stolen’ –  Notify Users

5.  Report / Escalation

6.  Lessons Learned

57

Page 57: Setting up CSIRT

Advisories and Alerts •  Scenarios that potentially require Advisory or Alert

–  Incident that could potential have a wide-scale impact –  Examples

•  Declaration by attacker to launch attack •  Critical vulnerability of ‘popular’ software in the constituency

•  Some types of Incidents Require action by those in your consituencies –  They have to apply the patch themselves –  Their network or systems are not reachable to you –  They must perform additional risk assessment –  Perform check so that to ensure that they are not vulnerable

58

Page 58: Setting up CSIRT

Advisories and Alerts (2) •  Content

–  Should be clear & concise •  What is impacted •  If fix available or workaround

–  Shouldn’t be confusing –  Guide on how to determine or apply fix could be useful

•  Distribution of advisory and alerts –  Preparation of targeted list based on industry, common systems,

groups –  Using suitable platforms to reach out (including media) –  Goal is to reach out as quick as possible the right

•  Special Programs with Vendors –  Early alert – i.e. Microsoft

59

Page 59: Setting up CSIRT

Working with Law Enforcement Agencies & Judiciary Sector •  Some incidents have elements of crime

–  ‘Cyber’ or non-cyber laws –  Regulatory framework

•  Implication –  Must work with Law Enforcement Agency (must notify) –  Preservation of digital evidence (logs, images, etc)

•  Proper configuration of systems, time etc

–  Working together with LEAs to investigate •  Monitoring, recording and tracking •  Responding to requests

•  Training and Cyber Security Exercises can help to create awareness

60

Page 60: Setting up CSIRT

Collaboration & Information Sharing •  Bad guys work together, Good guys should too! •  Make yourself known, establish trust, collaborate and learn from

others •  Association of CSIRTS

–  National CSIRTs groups (in some countries) –  Regional – APCERT, OIC-CERT, TF-CSIRT –  Global – FIRST.org

•  Closed & Trusted Security Groups –  NSP-SEC –  OPS-TRUST

•  Getting Feeds about your constituencies (and sharing with them) –  ShadowServer Foundation –  Team Cymru –  Honeynet Project

61

Page 61: Setting up CSIRT

Getting Involved •  Global Take Downs / Co-ordinated Response

–  DNSChanger Working Group –  Conficker Working Group

•  Cyber Security Exercises –  Multiple Teams & Multiple Scenarios activities –  Getting to know your peers and improving internal processes as

capabilities –  Example: APCERT Drill, ASEAN Drill, etc

•  Helping Promote Best Practices & Awareness –  Source Address Validation (BCP 38) –  APWG Stop – Think – Connect (APWG.org)

62

Page 62: Setting up CSIRT

Collaboration & Co-operation

•  Check out some of the security organisations mentioned earlier –  APCERT – http://www.apcert.org –  FIRST – http://www.first.org –  ShadowServer Foundation http://www.shadowserver.org –  Team Cymru - https://www.team-cymru.org/Services/ –  Honeynet Project – http://www.honeynet.org

63

Page 63: Setting up CSIRT

Managing CSIRT

•  Having sufficient resources is critical to maintain cert / csirt operation

•  Consider having funds for traveling to participate in workshops, training and meetings

64

Page 64: Setting up CSIRT

3.0 Free / Open Source Tools

65

Page 65: Setting up CSIRT

About this Module

•  This module covers some publicly available tools that can be used for managing incident reports and performing (initial) analysis

•  Depending on the nature of the incident, different sets of tools will have to be used by the incident responder

•  It is by no means comprehensive but useful to gain initial insights when handling an incident

66

Page 66: Setting up CSIRT

Managing Incident Reports

•  There may be multiple ways to contact a CERT / CSIRT –  Email, Web Form, Fax, Security Systems –  Should ensure that reports (tickets) are attended to

•  Workflow System for managing abuse reports and artifacts –  Web-based system –  Reflect policies for incident response / handling activities –  Artifacts: Logs, executables –  Generate reports for review and lessons learned

•  Some Solutions: –  RTIR: RT for Incident Response http://bestpractical.com/rtir/ –  OTRS: https://www.otrs.com/software/open-source/

67

Page 67: Setting up CSIRT

Malicious software, files, URLs analysis service 1.  Malwr Sandbox

–  http://www.malwr.com –  Based on Cuckoo Sandbox (Open Source)

2.  Anubis –  http://anubis.iseclab.org/

3.  VirusTotal –  http://www.virustotal.com

4.  Wepawet –  http://wepawet.iseclab.org/

68

Page 68: Setting up CSIRT

Spam and Web Defacement

•  Spam Header Analysis –  http://mxtoolbox.com/Public/Tools/EmailHeaders.aspx

•  Zone-H Defacement Archive –  http://www.zone-h.com

69

Page 69: Setting up CSIRT

Whois Database & Passive DNS

•  The whois database is an indispensable tool for incident handling.

•  RIR’s whois database gives information about a network i.e. who is the point contact

•  But we need historical data on who use to own it –  May show something suspicious

•  Passive DNS: –  http://www.bfk.de/bfk_dnslogger.html

70

Page 70: Setting up CSIRT

Abuse Information about your Network

•  There are multiple initiatives on the Internet that could be of use to gain information about abuses or potential abuses on your network

1.  Abuse.ch – Zeus, SpyEye, Palevo, Feodo malware Tracker i.e. http://zeustracker.abuse.ch

2.  Malware Domain List –  http://www.malwaredomainlist.com/ –  http://www.malwaredomains.com/

3.  Open DNS Resolvers –  http://openresolverproject.org/

71

Page 71: Setting up CSIRT

Secure Communication Tools

•  Best Practice to have use GnuPG/PGP for communication –  For signing and/or encrypting messages –  Extremely useful for information sharing (especially on need to know

basis)

•  Keys that belong to others (teams or individuals) are published on public PGP key servers –  http://pgp.mit.edu

•  ‘Key-signing’ parties are common at CSIRT meetings or gathering

72

Page 72: Setting up CSIRT

4.0 Exercises (Discussion)

73

Page 73: Setting up CSIRT

Exercise – 1

•  Defining your CERT/CSIRT based on RFC2350 –  RFC2350 - Expectations for Computer Security Incident Response –  https://www.rfc-editor.org/rfc/rfc2350.txt

74

Page 74: Setting up CSIRT

Exercise 2 – From .RU (or somewhere) with Love

75

Date: Day, Month 2011 Subject: Partnership From: Attacker To: Victim Your site does not work because We attack your site. When your company will pay to us we will stop attack. Contact the director. Do not lose clients.

Page 75: Setting up CSIRT

Exercise 3 – Writing a Security Advisory •  Information about critical vulnerability affecting a popular

application.

•  Write a security advisory to your constituent explaining the situation and action required of them

76

Page 76: Setting up CSIRT

Recap •  We have covered

–  The bigger picture – Managing Risks and Cyber Security –  The need to respond to incidents –  Setting up Security Response Teams

•  Defining the Team & Team Structure •  Resources required •  Policies, SOPs, SLAs •  Tools for incident handlers •  Making yourself known and working with others

•  Keep Calm & Incident Response!

77

Page 77: Setting up CSIRT

Questions ?

Keep in touch!

Adli Wahid

[email protected]

Check out:

http://training.apnic.net

78

Page 78: Setting up CSIRT

APNIC Survey 2014 •  11 -22 June 2014

•  Opportunity to provide input on APNIC’s performance, development, and future direction

•  Contributes to APNIC’s future planning processes

•  Run by an impartial, independent research organization

•  Confidentiality of respondents guaranteed

79

survey.apnic.net

Page 79: Setting up CSIRT

You’re Invited!

•  APRICOT 2015: Fukuoka, Japan, 24 Feb-6 Mar 2015

80