Cyber
Polygon
International online training
for raising global cyber resilience
cyberpolygon.com 2020
Contents
Introduction 3
Executive
Summary 7
Participants
and Partners 16
Live Stream 20
Technical
Training 32
2
Cyber Polygon Report
Mikhail Mishustin, Prime Minister
2020
of the Russian Federation
‘I am pleased to see at this event
Introduction
the leaders of large international
organisations and CEOs of global
corporations from a wide range of
industries and countries. The training
is another step in creating a trusted
digital environment and fostering an
open dialogue to discuss even the most
challenging cybersecurity issues. Today,
the participants of Cyber Polygon are
making a contribution to building a
more secure digital world and a safer
future for all of us’.
3
Cyber Polygon Report
Klaus Schwab, Founder and Executive
2020
Chairman, World Economic Forum
‘Technology and cybersecurity are
Introduction
of crucial importance in this COVID era.
One of the most striking and exciting
transformations caused by the pandemic
has been our transition to the digital
‘everything’, both in our professional
and also in our personal lives.
I am glad that Cyber Polygon has
proved itself as one of those brilliant
initiatives that address the need
for developing and enhancing global
cyber resilience in the fight against
cybercrime and cyberattacks’.
4
The 2020 pandemic has further accelerated digital
Cyber Polygon Report
transformation. With electronic services gaining
traction and the adoption of disruptive telecom
technologies, many businesses that have switched
to remote operations might not return to their
former work patterns.
The global digital transformation is opening
truly unlimited opportunities for humanity, but,
likewise, cybercriminals benefit from technology
and universal interconnectivity. They coalesce
in gangs on the Darknet, exchange data and
2020
create large-scale attacks, taking full advantage
of people′s curiosity and fear.
According to the World Economic Forum,
cyberattacks and data theft are the 9th most
likely fallout to the world. The damage caused
Introduction
by these factors continues to increase and,
in 2030, is projected to reach $90 trillion.
Cybercriminals are using the global instability
to their advantage — the number of cyberattacks
rose dramatically because of the pandemic,
with most of them exploiting the coronavirus
turmoil. In Q1 2020, Palo Alto Networks detected
a 569% growth in COVID-19-themed malicious
registrations, including malware and phishing.
5
This year has demonstrated that a crisis can occur
Cyber Polygon Report
unexpectedly. Our research reveals that 83%
of companies have no recovery plans in place.
In times of crisis, they find it most challenging
to restore business operations and maintain
their efficiency. A robust response plan and
effective teamwork help to avoid such scenarios
and minimise losses. Therefore, the increasing
importance of regular training and education
across all levels must not be overlooked.
This is the reason behind Cyber Polygon —
2020
an annual international exercise aimed at
strengthening global cyber resilience through
raising public awareness in cybersecurity and
developing the competencies of technical
specialists.
Introduction
In addition to the technical training, where teams
practise their skills in repelling cyberattacks,
Cyber Polygon also features an online conference.
The key topics for discussion this year covered
the emerging technologies that will shape the
digital future, the role of cybersecurity given
the fast-paced digitalisation, and measures that
organisations and the international community as
a whole need to take to protect the digital space.
This report summarises the key takeaways
from the lectures and interviews as well as the
results of the technical training and practical
recommendations based on these results.
6
Executive
Summary
7
About
Cyber Polygon Report
Cyber Polygon
Cyber Polygon is a unique event that combines
the world's largest cybersecurity exercise
for corporate technical teams and an online
conference featuring high-profile speakers.
Goals:
2020
x develop the teams′ competencies in repelling
cyberattacks
x engage global organisations and corporations,
namely management, in a cybersecurity dialogue
x raise public awareness in cybersecurity
Executive Summary
Hence, the exercise is aimed at enhancing
cybersecurity on all levels.
The ultimate idea behind Cyber Polygon
is to ensure global cyber resilience and active
intersectoral cooperation.
In 2020, it was the second time the event took place,
again with the support of the World Economic Forum
and INTERPOL.
The partners and participants involved in Cyber
Polygon were tech companies, international
organisations as well as state and law enforcement
agencies coming from all corners of the globe.
8
Concept 2020
Cyber Polygon Report
With the digital world being as interconnected
as it is, all its participants expose themselves
to a number of safety risks. A single data breach
across the ocean could trigger a chain reaction
and spark a ‘digital pandemic’ across the globe.
People, organisations and entire states may fall
victim to the catastrophe.
2020
The central theme for the Cyber Polygon 2020
online stream was the prevention of a ‘digital
pandemic’. The year has demonstrated that
a crisis may hit unexpectedly and we must be
prepared for an emergency — to protect ourselves
and entire corporations.
Executive Summary
Information and money remain the main target
of cybercriminals. In 2019–2020, the world
witnessed a wave of massive data leaks — even
technologically advanced companies were not
always immune. This is why, for the technical part
of our training, we developed an attack scenario
which in real life would jeopardise company
reputation and data. The teams could hone their
skills in countering this type of attack in real time
and investigate the incident.
9
Structure
Cyber Polygon Report
Cyber Polygon featured two parallel tracks:
1. online stream for a wide audience
2. technical exercise for cybersecurity teams
from organisations
Live Stream
2020
The live stream featured top officials from
international organisations and tech corporations
who met online to analyse the current
cybersecurity trends and risks, and discuss how
Executive Summary
to avoid a ‘digital pandemic’.
The event was launched with opening statements
from the honorary guests: Mikhail Mishustin,
Prime Minister of the Russian Federation,
and Klaus Schwab, Founder and Executive
Chairman, World Economic Forum.
10
The live stream also featured Herman Gref, CEO,
Cyber Polygon Report
Chairman of the Executive Board, Sberbank; the
Rt. Hon. Tony Blair, Prime Minister, Great Britain
and Northern Ireland (1997–2007); Jürgen
Stock, Secretary General, INTERPOL; Troels
Oerting, Chairman of the Advisory Board, the
World Economic Forum Centre for Cybersecurity;
Nik Gowing, BBC World News main presenter
(1996–2014); Founder and Director, Thinking
the Unthinkable; Vladimir Pozner, Journalist
and broadcaster; as well as senior officials from
ICANN, Visa, IBM and other global corporations.
2020
The broadcast at Cyber Polygon 2020 gathered
5 million viewers from 57 states. Such a broad
outreach is indicative of the global community
beginning to recognise cybersecurity as a global
issue that can only be combated through joint efforts.
Executive Summary
5 million spectators
from 57 countries
11
Technical Training
Cyber Polygon Report
The technical exercise attracted 120 of the largest
Russian and international organisations from
29 countries. These included banks, telecom
companies, energy suppliers, healthcare
institutions, universities as well as state and law
enforcement agencies.
The teams practised response actions at the
moment of a targeted attack that aimed to steal
confidential data and undermine the company
2020
reputation.
The participants took the side of the Blue Team
and worked on protecting their segments of
the training infrastructure. The organisers from
BI.ZONE represented the Red Team and simulated
Executive Summary
the attacks.
120 organisations
from 29 countries
12
The exercise included two scenarios:
Cyber Polygon Report
1. Defence
In the first scenario, the participants practised
repelling a massive cyberattack in real time.
They had to manage the attack as fast as possible
and minimise the amount of information stolen
while maintaining availability of the infrastructure.
2. Response
2020
The second scenario involved investigating
the identified incident by applying traditional
forensics as well as Threat Hunting — a method
whereby specialists continuously hunt for threats
by manually analysing security events from
Executive Summary
various sources, rather than waiting for security
alerts to go off.
The teams also practised collaboration with law
enforcement agencies: based on the information
gathered, they composed a dossier for INTERPOL
that in real life would help law enforcement
to locate the criminals.
Cyber Polygon became the first international event
for corporate teams of such format and scale.
13
How Did It Go
Cyber Polygon Report
This year, we made our technical training scenarios
as close to real-life situations as possible.
To achieve this, we implemented a complex
technical infrastructure, with over 400 virtual
machines rolled out. Further, preliminary load testing
was conducted to ensure smooth operation of all
systems during the event.
2020
In the run-up to the exercise, we released a series
of technical articles. The publications helped
the participants improve their knowledge of the
topics covered in the scenarios and prepare better
for the training. This laid the foundation of our
public knowledge library, which is being enriched
Executive Summary
on a continuous basis.
The event featured the world′s first public exercise
for corporate teams where the Threat Hunting
method was applied. We are especially pleased
to realise that for many teams Cyber Polygon
became the first opportunity to master this
technique and thereby gain new practical
experience. We strongly believe that such
initiatives are an effective tool in enhancing
cyber resilience through knowledge sharing.
14
What Is Next?
Cyber Polygon Report
With the accelerated rate of digitalisation,
the level of cybercrime will also continue to rise.
In order to withstand a large-scale cyber threat,
the global community needs to unite its efforts
and establish collaboration at all levels: practise
joint mitigation of cyberattacks, expand technical
skills, and engage in open dialogue on key global
cybersecurity issues.
2020
Such events as Cyber Polygon are instrumental
in achieving these goals, as they already allow
experts from participating organisations
to increase their skills and draw the attention
of a wider audience to the issues of cybersecurity.
Executive Summary
We continue to develop training opportunities
to strengthen global cybersecurity and ensure
a secure digital world and we invite you to join
the next Cyber Polygon in 2021.
We hope that the results and conclusions of this
year's training presented in the report as well
as the knowledge of invited experts, will benefit
the entire community and enable us to develop
practical measures to improve global interaction
in the fight against cybercrime.
15
Participants
and Partners
16
Cyber Polygon 2020 attracted a variety of organisations
Cyber Polygon Report
from a range of industries: global corporations, small
and medium businesses, international organisations
and government structures, law enforcement agencies
and healthcare institutions.
This diversity has further highlighted the global scale
of cybersecurity issues and the importance of such
exercises across the board.
Partners
2020
IBM
A global technology and innovation company and the
largest technology employer in the world, delivering
services in 170 countries. IBM’s cognitive solutions and
cloud platforms help transform institutions, communities
Participants and Partners
and the quality of life. It is a leading provider of high-value
solutions and services to clients in a variety of industries,
including government, telecommunications, healthcare,
finance, retail, oil and gas.
ICANN
A not-for-profit public-benefit corporation and a global
community. ICANN’s mission is to ensure a stable,
secure, and unified global Internet. The company
oversees unique identifiers that allow computers on the
Internet to locate one another. ICANN ensures universal
resolvability — users receive the same predictable results
when they access the network from anywhere in the world.
17
Participants
Cyber Polygon Report
Cyber Polygon brought together participants from
all continents, except Antarctica. The technical
training attracted 120 organisations from 29 countries,
and the live stream gathered 5 million spectators
from 57 states.
2020
Latvia
Austria
Germany
Russia
Belgium
Ireland
Kazakhstan
Switzerland
Croatia
USA Uzbekistan
Spain
Azerbaijan
Participants and Partners
Bosnia and Herzegovina
Turkey
Serbia Mongolia
Bahrain
Qatar India
UAE
Oman
Columbia
Malaysia
Nigeria
Mozambique Singapore
Teams distribution Philippines
more than 10
Australia
6–10
3–5
less than 3
18
The teams represented organisations
Cyber Polygon Report
from both the public and private sectors.
Financial institutions 26 %
IT 15%
Government agencies 14%
Healthcare 6%
Education 6%
Telecom 5%
2020
Energy 5%
Media 3%
Metal 3%
Law enforcement 3%
Retail 3%
NPO 2%
Participants and Partners
Construction 2%
Chemical industry 2%
Audit and consulting 1%
Transportation 1%
International organisations 1%
Aerospace engineering 1%
Robotics 1%
19
Live
Stream
20
Technology
Cyber Polygon Report
and New Reality
The world won't
be the same again
The pandemic has spurred digitalisation: many people
have transitioned to remote work and are more and
more reliant on electronic services. Effective interaction
2020
demands new communication methods and faster data
transmission. Such changes pose not only additional
risks and challenges to businesses, but affect people’s
way of life. In a dynamic technological environment and
an increasingly interconnected world, cybersecurity has
become and will continue to be the main focus.
Live Stream
‘COVID-19 has accelerated various processes. Before
the pandemic, we had been rather critical of digitalisation
because of all the problems brought about by the new
technologies. Now, everybody is beginning to understand
that this process is inevitable, we need to move forward
and cybersecurity plays a great role in tech innovation’.
Herman Gref, CEO, Chairman of the Executive Board, Sberbank
21
Cyber Polygon Report
‘We will probably never go back to the times we had before —
we will not go back to the offices. I think that more people will
work from home, we will have a more flexible work relationship,
which also means that the challenges we are dealing with
now will remain, and we need to be ready to face them’.
Troels Oerting, Chairman of the Advisory Board,
the World Economic Forum Centre for Cybersecurity
‘5G will be the platform for the society, for hospitals, for public
transport, for everything that is to be connected. You need
2020
to have absolute trust in the underlying infrastructure, hence
there is a high demand for security. Today, we cannot even
imagine what capabilities the new 5G network will enable,
and artificial intelligence will obviously be one of the key
features of our technologies and tools in the development
of new application services. AI can be used for predictive
analytics to improve performance, maintenance and security
of the network’.
Sebastian Tolstoy, Head of Eastern Europe & Central Asia
Live Stream
and General Director Ericsson Russia, Ericsson
‘I believe the Internet of Things will be one of the biggest game
changers. Industrial automation will bring the most added
value globally over the next 10 years and that will be based
very much on the Internet of Things’.
Alexey Kornya, President, CEO,
Chairman of the Management Board, MTS
22
State structures
Cyber Polygon Report
to embrace technological
revolution
Governments need to adapt more quickly
to the ongoing changes: not only to search
for new tools and ways of interacting with people
and businesses, but also to ensure the safety
of such interaction. A digital identity can become
one of the effective ways of communication
between the state and individual citizens. However,
2020
this is only possible provided that privacy and data
protection is properly regulated.
‘If Clement Attlee, who served as Prime Minister in the UK
Live Stream
from 1945 to 1951, came back to Britain today, he would
see a country completely transformed in the way we
work, in the way we live, in technology, in living standards,
in its class structure. But then, when he went back into
government, he would find himself completely at home,
as everything would be familiar. The government is always
the last to change, and the problem with cyber threats is that
we cannot afford the government to take 10 years to catch
up because at that time the damage will be too great’.
The Rt. Hon. Tony Blair, Prime Minister,
Great Britain and Northern Ireland (1997–2007)
23
Threats and Risks
Cyber Polygon Report
Cybercriminals taking
advantage of new digital reality
Since early 2020, the number of data breaches,
phishing attacks and registrations of malicious
sources has increased, and the trend is predicted to grow.
2020
‘Cybercriminals are developing and boosting their attacks
at an alarming pace, exploiting the fear and uncertainty
caused by the unstable social and economic situation
created by COVID-19. We have seen a steep increase of new
narratives in online scams, phishing approaches and targeting
of critical infrastructures: health service ransomware, attacks
on hospitals, exploiting the need for personal protective
material and medical research’.
Live Stream
Jürgen Stock, Secretary General, INTERPOL
‘Whenever there is a global crisis or an event of public
significance, there is always an uptick in criminal activity
related to such events. Therefore, it is understandable that
people out there are clicking on emails or website links or
report downloads that promise to provide updates on such
events and thereby being lured into certain situations, and
COVID-19 is no exception’.
Dhanya Thakkar, Vice President AMEA, Trend Micro
6,000% — global growth in COVID-19
related spam in March–May 20201
24 1
W. Whitmore, source: IBM X-Force
Critical infrastructure
Cyber Polygon Report
companies exposed
to highest risk
Healthcare, the financial industry, government agencies,
manufacturing, IT and telecom are at greatest risk. Being
the most frequent targets of attacks, such organisations incur
enormous losses. However, healthcare and manufacturing
are the least protected due to the use of outdated equipment.
Further, their IT infrastructure is often unable to quickly detect
an intrusion as well as manage its consequences.
2020
‘What we are seeing now is cases of attackers squatting within
organisations undetected for months, if not longer, and they
have really taken their time and patience to understand the lay
of the land and determine when and where they can wage
a ransomware attack, how to deploy the software, and then
demand money. In some recent cases, we have seen as much
as $25 million being sought as ransom’.
Live Stream
Wendi Whitmore, Vice President of IBM X-Force Threat Intelligence, IBM
‘Calculation shows that a six-hour blackout in mainland France
could cost $1.5 billion. The electrical utilities, the hospital systems
were not designed for the era that we are in today, so we
need direct collaborations with industry leaders in different
sectors — electricity, energy, healthcare, aviation — to help them
strengthen their cyber posture, to increase awareness of the
underlying threats’.
Jeremy Jurgens, Chief Business Officer and Member of the Managing
Board, World Economic Forum
260% — increase in malicious
COVID-related URLs in February–March 20202
25 2
D. Thakkar, source: Trend Micro
Fake news poses a major
Cyber Polygon Report
challenge for society
Information spreads through digital communication
channels at record speeds. However, data on the web
is not always trustworthy. In the era of digitisation,
fake news has become a dangerous weapon
being used by cybercriminals to attack people
and organisations.
2020
‘The speed with which the digital reality is changing is
far faster than any regulations can ever be constructive’.
Nik Gowing, BBC World News main presenter (1996–2014);
Founder and Director, Thinking the Unthinkable
‘We should rely on ourselves when trying to protect
Live Stream
against fake news: we need a good education, critical
outlook, we need to compare the facts and analyse
the incoming information’.
Vladimir Pozner, Journalist and broadcaster
26
How to Prepare
Cyber Polygon Report
for a Cyber Crisis?
Having an emergency
plan is essential
A crisis does not care for time or place. An emergency
can befall any industry or company, whether now
or in the future – cyber space being no exception.
2020
One of the effective ways for organisations and the entire
global community to be prepared for such situations
is to develop and implement an emergency plan.
‘A cyber incident or attack can turn into a crisis
Live Stream
if you have little capability or capacity to deal with it.
If you are well-prepared, you can be more resilient
and effective in responding and mitigating such events’.
Craig Jones, Cybercrime Director, INTERPOL
27
Training and awareness
Cyber Polygon Report
across all levels
Businesses should take measures to enhance their cyber
resilience: implement best practices in risk management
and conduct regular security audits of their systems.
They need to create strong teams to ensure secure
operations as well as develop, test and implement crisis
management and business continuity plans.
‘Risk management is everyone’s responsibility. Every person within
2020
an organisation is responsible for identifying and reporting risks
and/or breaches to security protocol. This, of course, must be
supplemented by a resilient security infrastructure and robust tools
and capabilities to spot and mitigate accidental incidents, which
can be caused by only one click on the wrong link’.
Hector Rodriguez, Senior Vice President, Regional Risk Officer
for Central and Eastern Europe, Middle East and Africa, Visa
Live Stream
‘I do not believe that we can put the expectation for security
on each individual. I think we need to make them aware of what
the risks and the challenges are, but we actually also have to move
towards models that are not dependent on single individuals who
can be manipulated or perhaps fail to understand the implications
and therefore put entire organisations and institutions at risk’.
Jeremy Jurgens, Chief Business Officer and Member of the Managing
Board, World Economic Forum
‘In this negative picture of the increase in attacks there is a good
thing: we have rarely seen anything so new and so novel that we
are not really ready to defend against them. Many organisations
are doing that very successfully and, in particular, those that have
threat intelligence tailored towards their industry. They have a good
understanding of what their particular attack surface looks like’.
Wendi Whitmore, Vice President of IBM X-Force Threat Intelligence, IBM
28
Training, education and preparation of every
Cyber Polygon Report
employee, regardless of their competencies
and roles, should be recognised by businesses
as a strategic priority. Each staff member at their
respective level must understand security policies
and procedures and know in advance how to act
in an emergency.
‘Regular phishing and awareness training is really
2020
important, as is analysing the results of the training to help
understand how many employees click through. However,
it is really easy to run the same old phishing simulations
week-on-week, so it is important to think of new ways
to test employees and make them think. There does not
have to be a penalty around it that makes everybody
upset or worried about the training, but you do need
to think about how to challenge the organisation’.
Live Stream
Jacqueline Kernot, Partner in Cybersecurity, Ernst & Young
‘We need to continue with the pace of introducing cyber
hygiene rules as criminals do not want to invest 1 dollar
to steal 50 cents, they want it automated, so if it is too
difficult, they will move on to somebody else’.
Troels Oerting, Chairman of the Advisory Board,
the World Economic Forum Centre for Cybersecurity
29
Effective protection builds
Cyber Polygon Report
on trust and collaboration
A critical situation cannot be tackled
by an organisation or a lone individual.
In a highly interconnected world, a single cyber
attack can spread exponentially across the global
community. This situation can be prevented
by promoting collaboration between the public
and private sectors and law enforcement agencies.
Furthermore, efficient interaction requires
2020
the implementation and regulation of a range
of standards, the exchange of information
and establishing trustworthy relationships.
‘As for a global community, awareness, education
Live Stream
and prevention are vital. As the head of an organisation
that unites law enforcement worldwide, I can say that
we need even greater cooperation and information
exchange in tackling the threat of cybercrime’.
Jürgen Stock, Secretary General, INTERPOL
‘We should find new mechanisms for cooperation
to combat cybercrime — this could be international
conventions or international treaties’.
Petr Gorodov, Head of the General Directorate
for International Relations and Legal Assistance
of the Prosecutor General’s Office of the Russian Federation
30
Cyber Polygon Report
‘Regulatory frameworks and government intervention
in the cybersecurity space are important. I have
certainly had clients tell me that it is government
intervention or regulation that has made them change
the way that they operate’.
Jacqueline Kernot, Partner in Cybersecurity, Ernst & Young
‘We at ICANN understand the domain name system
and the DNS industry probably as much or better than
anybody else out there. So one of the things we can do,
is to work with those who combat criminality to help
2020
them understand the effects of their actions and to
make sure that they get the results they intend’.
John Crain, Chief Security, Stability & Resiliency Officer, ICANN
60% — share of cloud attacks that used
Live Stream
previously exploited data and vulnerabilities3
3
W. Whitmore, source: IBM X-Force
‘We want to have a world that is collaborative, so we
are now building a network of cyber volunteers out of
the capable and the willing in order to work collectively
to achieve cyber peace’.
Stéphane Duguin, CEO, CyberPeace Institute
31
Technical
Training
32
Scenarios
Cyber Polygon Report
The training was essentially a challenge between
two opposing sides: the Red Team (the attacker)
vs the Blue Team (defence teams).
The participants acted as the Blue Team. They had
to perform a variety of tasks: assess infrastructure
security of a fictional organisation CyberCorp,
search for and remediate potential vulnerabilities
2020
as well as identify and respond to security
incidents.
The organisers (BI.ZONE) assumed the role of the
Red Team seeking to compromise the secured
systems by identifying and exploiting weaknesses
in CyberCorp's infrastructure.
Technical Training
Each participating team was given access to their
own dedicated IT infrastructure under the guise
of CyberCorp. The infrastructure was created
specifically for the training and was deployed
on an IBM cloud.
33
The training had a range of distinctive features:
Cyber Polygon Report
x It was targeted at corporate teams, rather
than individuals, for the participants
to practise collaborative teamwork.
x Given that the attack was carried out
by the organisers themselves, all the teams
were on an equal playing field and had
the opportunity to objectively assess their
capabilities.
x The companies did not risk their reputation:
the teams were assigned numbers to disguise
2020
the real names of their organisations.
x The participants' own business IT
infrastructure was not involved.
Scenario 1. Defence — the teams developed
their skills in repelling a large-scale attack
in real time.
Technical Training
Scenario 2: Response — the participants
investigated the incident using traditional
computer forensics and Threat Hunting
techniques.
34
Scenario 1. Defence
Cyber Polygon Report
According to the first scenario, Flag — a string with
a strictly defined
CyberCorp’s infrastructure included format, which is used
in CTF (Capture
a public service, which processed the Flag) cybersecurity
confidential client information. competitions. The players’
main goal is to locate
This service became the subject the hidden string,
of interest to an APT group. i.e. ‘capture the flag’.
Cybercriminals were going to steal
confidential user data in order to receive
financial benefits and cause damage
to company reputation. The APT group
2020
studied the target system in advance,
discovered a number of critical
vulnerabilities and carried out an attack.
The participants had to confront
the actions of cybercriminals at the
moment of the attack. They were
Technical Training
expected to find and eliminate the
vulnerabilities in the service as fast as
possible and thus minimise the amount
of stolen information while maintaining
service availability.
The amount of leaked data was assessed
by the number of flags that the APT
group was able to steal. The teams had
to analyse the service code, the attackers'
network activity and determine which
vectors were used to conduct the attack
and seize the flags.
35
They were allowed to apply any methods Attack-Defence CTF —
Cyber Polygon Report
a CTF competition where
to defend their infrastructure, provided teams are required to
defend their services
that they did not disrupt service (i.e. prevent them
operations. from being attacked
by other participants)
and, at the same time,
The first scenario accumulated some attack opposing teams'
of the best ideas found in modern services by taking
advantage of their
training activities (Attack-Defence CTF, vulnerabilities. To win
points, players must
Red Teaming) as well as cybersecurity ‘capture’ the opponent’s
courses. flag, which proves that
the vulnerability has been
exploited successfully.
Selecting the data breach attack
scenario, where a web application
2020
Red Teaming —
vulnerability is exploited, was done a cybersecurity exercise
for good reason: web applications that simulates an attack
on the existing corporate
remain one of the most popular attack infrastructure by imitating
vectors. According to the Verizon Data real-life conditions
and methods applied
Breach Investigations Report 2020, they by hacker groups.
account for 43% of attacks against
organisations.
Technical Training
43% of data leaks
in 2020 featured attacks
on web applications
36
Scenario 2. Response
Cyber Polygon Report
The second scenario consisted of two rounds,
each of which included tasks aimed at
practising response actions to the identified
cybersecurity incident, though, with different
approaches applied.
According to the first-round legend, CyberCorp
discovered that its infrastructure had been
compromised given the number of anomalies
in the outbound traffic. The character of those
2020
anomalies suggested that the attack might
be associated with a widely known APT1337
group. CyberCorp’s cybersecurity team
isolated one of the suspicious hosts from
the corporate network and collected artifacts
for investigation.
The participants had to analyse the artifacts
Technical Training
and solve the tasks by applying any tools
available.
During the first round, the participants were
encouraged to apply and develop classic
forensics skills, when all the necessary artifacts
are collected after the attack and the response
team is trying to trace the incident. This is what
is known as the reactive approach.
37
According to the second-round legend, Endpoint Detection
Cyber Polygon Report
and Response (EDR) —
following a cybersecurity incident, a solution designed
to detect and respond
CyberCorp purchased and rolled out an to cybersecurity
EDR (Endpoint Detection and Response) incidents at endpoints
(workstations and
solution in its infrastructure, with servers). EDR collects,
agents installed on all the workstations processes and analyses
extended telemetry
and servers. The extended telemetry from endpoints with
the purpose of detecting
gathered by such endpoints was sent abnormal activity;
to the centralised Threat Hunting and provides a variety
of tools to respond
platform for proactive threat detection. to such activity (both
automatically and upon
The company also invited a team of expert request).
analysts to build a detection process
2020
based on the Threat Hunting approach.
Technical Training
38
There was some information published on the
Cyber Polygon Report
web about a new technique used by attackers
to gain a foothold in the system — better known
as Persistence. One of the experts decided
to check whether this method was employed
in the CyberCorp attack. The hypothesis
proved true: one host in the infrastructure
was found affected by this technique.
This discovery became the starting point
of the investigation. By analysing the telemetry
collected on the Threat Hunting platform,
2020
the teams had to understand how the threat
actor had infiltrated the infrastructure and
piece together the sequence of their actions.
While Threat Hunting is not an alternative
to traditional forensics, proactive collection
of security events as well as the ability
to quickly obtain artifacts from the EDR agents,
Technical Training
can speed up, simplify and improve incident
response and investigation.
According to the SANS 2019 Threat Hunting
survey, many organisations have not yet
realised the essence of proactive detection
of vulnerabilities and what benefits they
get with this technology. Therefore, when
developing the second scenario, we hoped
that practising Threat Hunting and applying
the hypothesis-based method will help
the participants gain the required experience
and enhance their trust in this approach.
39
We believe that the application of this Dwell Time — the median time
Cyber Polygon Report
between the compromise of an
technique in real life will help security environment and its detection.
specialists reduce the Dwell Time.
According to the FireEye M-Trends
annual reports, the Dwell Time has been
reducing in the last 3 years. In 2017 this
metric stood at 101 days, in 2018 —
78 days and in 2019 it dropped
to 56 days. FireEye attributes the
reduction to two major factors: the
continuous improvement of monitoring
2020
procedures and tools, and the growth
in the number of incidents involving
ransomware and cryptocurrency
miners which are, by their destructive
nature, easily detectable. There is
no doubt that the evolution of such
disciplines as Threat Intelligence
Technical Training
and Threat Hunting, and the increased
focus on endpoint monitoring have also
contributed to the improvement. Thus,
around 70% of the SANS respondents
ascribe the decrease in Dwell Time to
the implementation of Threat Hunting
at their organisations.
101 to 56 days
Dwell Time reduced
during 2017–2019
40
Results
Cyber Polygon Report
We intentionally avoided using real names of the
organisations so as not to set off a competition between
the participants and keep their results confidential.
However, the teams could compare their progress with
the others using the scoreboard. The table below shows
10 teams (out of a total of 120) with the highest score.
Rating Team Industry Total Score Scenario 1. Scenario 2. Scenario 2.
Defence Response Response
(Round 1) (Round 2)
2020
max: 2700 max: 900 max: 900 max: 900
Financial
1 Team 29
institutions
1329 207 552 570
2 Team 67 IT 1261 331 750 180
Technical Training
3 Team 53 IT 1213 223 600 390
4 Team 14 Education 1158 480 303 375
Financial
5 Team 41
institutions
857 227 495 135
Financial
6 Team 33
institutions
753 243 480 30
7 Team 6 IT 677 95 252 330
Audit and
8 Team 3
consulting
633 0 351 282
9 Team 11 Robotics 620 200 330 90
41 10 Team 16 IT 595 205 300 90
Conclusions
Cyber Polygon Report
The following conclusions can be drawn based
on the final results achieved by the participants:
Participants could assess
their capabilities
It was not clear until the end of the exercise who
would take the first place. Different teams were
2020
leading at different stages, which means that none
of them could fully utilise the techniques at their
disposal.
The exercise allowed the participants to identify
their strengths and weaknesses. We hope that the
received information will help them create plans
for developing the necessary competencies and
Technical Training
improve their results in the future.
Financial institutions and IT
delivered the best results
Banks and companies from the IT industry
demonstrated the highest resilience. Security
assessment expertise in these sectors is quite
well developed, with classic forensics
and Threat Hunting widely applied.
42
Specialists are better prepared
Cyber Polygon Report
for investigation than defence
27% of the teams had difficulties earning points for the
first scenario, which allows us to conclude that some of
the team members lack or have insufficient expertise in
security assessment and protection of web applications.
At the same time, all the participants were awarded
points for the first round of the second scenario, which
is indicative of each team having at least one expert
who is competent in traditional forensics.
2020
The Threat Hunting approach
is uncharted for most organisations
21% of the teams could not earn a single point
for the second round of the second scenario. We
attribute this to Threat Hunting being a relatively novel
approach and the majority of organisations lacking
Technical Training
experience of applying its techniques in practice. This
creates the potential for developing teams and tools
within the companies. Threat Hunting is not an alternative
to classic forensics and cannot replace it, but we showed
how this approach can supplement conventional methods.
More effort in preparation — better result
The best results were predictably achieved by the teams
who had asked many questions during the preparation
and familiarised themselves with the new techniques
and defences beforehand. We hope that our Cyber
Polygon publications as well as other hosted events, will
increase future participants' chances of succeeding and
43 effectively countering cyberattacks.
cyberpolygon.com