100% found this document useful (1 vote)
302 views62 pages

Incident Response Workflows

Uploaded by

yogesh Kasar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
302 views62 pages

Incident Response Workflows

Uploaded by

yogesh Kasar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

INCIDENT

RESPONSE
WORKFLOWS
(SCENARIOS
& EXAMPLES)

BY IZZMIER IZZUDDIN
General
1. Preparation
 List of all assets
o Servers
o Endpoints
o Networks
o Applications
o Employees
o Security products
 Baselines
 Communication plan
 Which security events
 Thresholds
 How to access security tools
o How to provision access
 Create playbooks
 Plan exercises
o Table top
o Hands on

2. Detection and Analysis


 Gathering of information
 Analysing the data
 Building detections
 Root cause analysis
 Depth and breadth of the attack
o Admin rights
o Affected systems
 Techniques used
 Indicators of compromise / indicators of attack
o Tactics Techniques and Procedures (TTP)
o IP address
o Email address
o File hash
o Command line

3. Containment, Eradication, and Recovery


 Isolate affected systems
 Patch threat entry point
 Predefine threshold
o For customers
o For internal systems
o For escalations
 Preauthorized actions
o Per customers
o Per environment
 Prod
 QA
 Internet facing
 How to remove the threat on all affected systems
 Get systems operational
 Rebuilt and resume service

4. Post-Incident Activity
 Lessons learn
 New detection
 New hardening
 New patch management
1. Account Compromised
Scenario: An employee's email account has been compromised, leading to
unauthorized access to sensitive data and potential further infiltration into the network.

Incident Response Analysis


1. Preparation
List of All Assets
Servers
 Web Server: Hostname: web01, IP: 192.168.1.10, OS: Ubuntu 20.04
 Database Server: Hostname: db01, IP: 192.168.1.20, OS: MySQL 8.0
 Email Server: Hostname: mail01, IP: 192.168.1.30, OS: Exchange Server 2019
Endpoints
 Workstations: 50 Windows 10 PCs
 Laptops: 20 MacBook Pros
 Mobile Devices: 10 iPhones, 10 Android devices
Networks
 Corporate Network: 192.168.0.0/16
 Guest Network: 172.16.0.0/16
 DMZ: 10.0.0.0/24
Applications
 CRM: Salesforce
 ERP: SAP
 Office Suite: Microsoft Office 365
 Communication: Slack, Zoom
Employees
 Total Employees: 150
 Key Roles: IT Admins, HR, Finance, Sales, Executives
Security Products
 Antivirus: Symantec Endpoint Protection
 Firewall: Cisco ASA 5500
 SIEM: Splunk
 IDS/IPS: Snort
 MFA: Duo Security
Baselines
 Normal Network Traffic: Defined and documented with Splunk
 System Performance Metrics: Established benchmarks for CPU, memory, and
disk usage
 User Behaviour: Normal login times, locations, and activities
Communication Plan
 Incident Response Team: Defined roles and contact info for all members

 Internal Notifications: Procedures for informing executives, IT staff, and


affected users

 External Notifications: Criteria for informing customers, partners, and


regulatory bodies
Security Events
 Authentication Failures
 Unusual Login Locations
 Unauthorized Access Attempts
 Data Exfiltration Attempts
 Privilege Escalation Attempts
Thresholds
 Login Failures: More than 5 failed logins within 10 minutes
 Unusual Locations: Logins from unrecognized countries
 Data Transfer: Uploads exceeding 1 GB from a single user
Access to Security Tools
 Provision Access: Procedures for granting and revoking access to security tools
like Splunk, Duo, Snort
 Documentation: User guides and training materials for security tools
Create Playbooks
 Account Compromise: Step-by-step actions for detection, containment, and
recovery
 Malware Infection: Procedures for identification and removal
 Data Breach: Steps for notification, containment, and legal compliance
Plan Exercises
 Tabletop Exercises: Quarterly simulations of common incidents
 Hands-On Drills: Annual red team/blue team exercises
2. Detect

Gathering of Information
 Logs: Authentication logs, access logs, and network traffic logs from Splunk
 Alerts: Review alerts from SIEM, IDS/IPS, and antivirus
 User Reports: Analyse reports from users about suspicious activity
Logs
Authentication Log Extracts:
2024-06-01 09:12:34,auth,login,failed,user=jdoe,ip=192.168.1.50
2024-06-01 09:12:37,auth,login,failed,user=jdoe,ip=192.168.1.50
2024-06-01 09:12:40,auth,login,failed,user=jdoe,ip=192.168.1.50
2024-06-01 09:12:43,auth,login,success,user=jdoe,ip=192.168.1.50
2024-06-01 10:05:12,auth,login,success,user=jdoe,ip=203.0.113.25
2024-06-01 10:07:45,auth,login,failed,user=jdoe,ip=203.0.113.25
Email Server Log:
2024-06-01
10:05:14,email,send,success,user=jdoe,to=malicious@example.com,subject=Confide
ntial Data,ip=203.0.113.25

2024-06-01
10:10:22,email,send,failed,user=jdoe,to=malicious@example.com,subject=Further
Info,ip=203.0.113.25
Firewall Log:
2024-06-01
10:05:13,firewall,allow,source_ip=203.0.113.25,dest_ip=192.168.1.30,port=443
2024-06-01
10:07:47,firewall,deny,source_ip=203.0.113.25,dest_ip=192.168.1.20,port=3306
3. Analyse

Analyse Data

 Login Attempts: Multiple failed login attempts followed by a successful login


from an internal IP, then an unusual login from an external IP.
 Geolocation: The external IP (203.0.113.25) is from an unrecognized location.
 Access Patterns: Email account used to send sensitive information to an
external address.
Building Detections
 Custom SIEM Rules: Create rules to flag logins from unusual locations, rapid
login failures followed by success, and large data transfers.

 Behavioural Analysis: Monitor deviations from normal login locations and


times.
Root Cause Analysis
 Initial Point of Compromise: Likely a phishing attack that obtained the user's
credentials.
 Affected Accounts: User jdoe's email account is compromised.
Depth and Breadth of the Attack
 Admin Rights: Check if jdoe has any administrative privileges (confirmed: no
admin rights).
 Affected Systems: Email server primarily affected, attempted access to the
database server.
Techniques Used
 Phishing: Possible credential theft via a phishing email.
 Unauthorized Access: Use of stolen credentials to access email.
Indicators of Compromise / Indicators of Attack

 Tactics, Techniques, and Procedures (TTP): Use of compromised credentials to


access email and send sensitive data.
 IP Addresses: Malicious activity from IP 203.0.113.25.
 Email Addresses: Email sent to malicious@example.com.
4. Contain / Eradicate

Isolate Affected Systems


 Immediate Isolation: Disable user jdoe's email account.
 Quarantine: Block IP 203.0.113.25 at the firewall.
Patch Threat Entry Point
 Update Software: Ensure email server is up to date with the latest security
patches.
 Change Credentials: Force a password reset for user jdoe and all employees as
a precaution.
Predefined Threshold
 For Customers: Notify any customers whose data may have been affected.
 For Internal Systems: Escalate to the IT security team.

 For Escalations: Involve higher management and, if necessary, external


cybersecurity consultants.
Preauthorized Actions
 Per Customers: Execute predefined response actions such as notifying
customers and providing support.
 Per Environment: Differentiate actions for production and other environments.
How to Remove the Threat on All Affected Systems
 Antivirus Scans: Run comprehensive scans on all endpoints.
 Manual Inspection: Conduct manual checks on critical systems.
5. Recover

Get Systems Operational


 Restore Services: Ensure the email server and other systems are free of threats
and restore normal operations.
 Monitoring: Implement heightened monitoring for any signs of residual threats.
Rebuild and Resume Service
 Reimage Systems: Rebuild systems from clean backups if necessary.
 Verification: Verify the integrity and security of all restored systems.
6. Post Incident

Lessons Learned
 Review: Conduct a post-mortem analysis to identify what worked and what
didn’t.
 Documentation: Update incident response documentation with new insights.
New Detection
 Enhance Monitoring: Improve detection rules and monitoring based on the
incident analysis.
 Training: Provide additional training to staff based on lessons learned.
New Hardening
 Security Enhancements: Implement new security measures such as stronger
MFA, improved email filtering.
 Policy Updates: Revise security policies to address gaps identified during the
incident.
New Patch Management

 Regular Updates: Ensure all systems are regularly updated with the latest
patches.

 Automated Deployment: Implement automated patch management solutions


to reduce manual effort and errors.
2. Data Loss
Scenario: Sensitive data from the company's financial database was found to be
exfiltrated by an unauthorized external entity.

Incident Response Analysis


1. Preparation
List of All Assets
Servers
 Web Server: Hostname: web01, IP: 192.168.1.10, OS: Ubuntu 20.04
 Database Server: Hostname: db01, IP: 192.168.1.20, OS: MySQL 8.0
 Email Server: Hostname: mail01, IP: 192.168.1.30, OS: Exchange Server 2019
Endpoints
 Workstations: 50 Windows 10 PCs
 Laptops: 20 MacBook Pros
 Mobile Devices: 10 iPhones, 10 Android devices
Networks
 Corporate Network: 192.168.0.0/16
 Guest Network: 172.16.0.0/16
 DMZ: 10.0.0.0/24
Applications
 CRM: Salesforce
 ERP: SAP
 Office Suite: Microsoft Office 365
 Communication: Slack, Zoom
Employees
 Total Employees: 150
 Key Roles: IT Admins, HR, Finance, Sales, Executives
Security Products
 Antivirus: Symantec Endpoint Protection
 Firewall: Cisco ASA 5500
 SIEM: Splunk
 IDS/IPS: Snort
 MFA: Duo Security
Baselines
 Normal Network Traffic: Defined and documented with Splunk
 System Performance Metrics: Established benchmarks for CPU, memory, and
disk usage
 User Behaviour: Normal login times, locations, and activities
Communication Plan
 Incident Response Team: Defined roles and contact info for all members

 Internal Notifications: Procedures for informing executives, IT staff, and


affected users

 External Notifications: Criteria for informing customers, partners, and


regulatory bodies
Security Events
 Authentication Failures
 Unusual Login Locations
 Unauthorized Access Attempts
 Data Exfiltration Attempts
 Privilege Escalation Attempts
Thresholds
 Login Failures: More than 5 failed logins within 10 minutes
 Unusual Locations: Logins from unrecognized countries
 Data Transfer: Uploads exceeding 1 GB from a single user
Access to Security Tools
 Provision Access: Procedures for granting and revoking access to security tools
like Splunk, Duo, Snort
 Documentation: User guides and training materials for security tools
Create Playbooks
 Account Compromise: Step-by-step actions for detection, containment, and
recovery
 Malware Infection: Procedures for identification and removal
 Data Breach: Steps for notification, containment, and legal compliance
Plan Exercises
 Tabletop Exercises: Quarterly simulations of common incidents
 Hands-On Drills: Annual red team/blue team exercises
2. Detect

Gathering of Information
 Logs: Authentication logs, access logs, and network traffic logs from Splunk
 Alerts: Review alerts from SIEM, IDS/IPS, and antivirus
 User Reports: Analyse reports from users about suspicious activity
Logs
Database Server Access Logs:
2024-06-15 14:35:12,db_access,login,success,user=finance_user,ip=192.168.1.75

2024-06-15
14:45:37,db_access,query,select,table=financial_data,user=finance_user,ip=192.168.1
.75

2024-06-15
14:46:02,db_access,export,success,table=financial_data,rows=1000,user=finance_use
r,ip=192.168.1.75
2024-06-15 15:10:12,db_access,login,failed,user=finance_user,ip=203.0.113.55
2024-06-15 15:12:45,db_access,login,success,user=finance_user,ip=203.0.113.55
2024-06-15
15:20:22,db_access,query,select,table=financial_data,user=finance_user,ip=203.0.113
.55

2024-06-15
15:22:10,db_access,export,success,table=financial_data,rows=5000,user=finance_use
r,ip=203.0.113.55
Firewall Log:
2024-06-15
15:12:46,firewall,allow,source_ip=203.0.113.55,dest_ip=192.168.1.20,port=3306
2024-06-15
15:22:15,firewall,allow,source_ip=203.0.113.55,dest_ip=203.0.113.100,port=443
3. Analyse

Analyse Data
 Login Attempts: Multiple successful logins from an internal IP followed by
successful login from an external IP.
 Data Export: Large volumes of data exported from the financial database.

 Geolocation: External IP (203.0.113.55) is from an unrecognized location,


suggesting unauthorized access.
Building Detections
 Custom SIEM Rules: Create rules to flag large data exports and logins from
unusual locations.
 Behavioural Analysis: Monitor deviations from normal login patterns and data
access behaviours.
Root Cause Analysis

 Initial Point of Compromise: Unauthorized access via a compromised user


account (finance_user).
 Affected Accounts: User finance_user's account is compromised.
Depth and Breadth of the Attack
 Admin Rights: Verify if finance_user has any administrative privileges
(confirmed: no admin rights).

 Affected Systems: Database server primarily affected with unauthorized data


export.
Techniques Used
 Credential Theft: Possible phishing attack or credential stuffing leading to
unauthorized access.
 Unauthorized Data Export: Large-scale export of financial data.
Indicators of Compromise / Indicators of Attack
 Tactics, Techniques, and Procedures (TTP): Use of compromised credentials to
access and export sensitive data.
 IP Addresses: Malicious activity from IP 203.0.113.55.

 Command Line: Unusual command line activity on the database server (if
available).
4. Contain / Eradicate

Isolate Affected Systems


 Immediate Isolation: Disable user finance_user's account.
 Quarantine: Block IP 203.0.113.55 at the firewall.
Patch Threat Entry Point
 Update Software: Ensure the database server and related applications are up to
date with the latest security patches.
 Change Credentials: Force a password reset for user finance_user and all
employees as a precaution.
Predefined Threshold
 For Customers: Notify any customers whose data may have been affected.
 For Internal Systems: Escalate to the IT security team.

 For Escalations: Involve higher management and, if necessary, external


cybersecurity consultants.
Preauthorized Actions
 Per Customers: Execute predefined response actions such as notifying
customers and providing support.
 Per Environment: Differentiate actions for production and other environments.
How to Remove the Threat on All Affected Systems
 Antivirus Scans: Run comprehensive scans on all endpoints.
 Manual Inspection: Conduct manual checks on critical systems.
5. Recover

Get Systems Operational

 Restore Services: Ensure the database server and other systems are free of
threats and restore normal operations.
 Monitoring: Implement heightened monitoring for any signs of residual threats.
Rebuild and Resume Service
 Reimage Systems: Rebuild systems from clean backups if necessary.
 Verification: Verify the integrity and security of all restored systems.
6. Post Incident

Lessons Learned
 Review: Conduct a post-mortem analysis to identify what worked and what
didn’t.
 Documentation: Update incident response documentation with new insights.
New Detection
 Enhance Monitoring: Improve detection rules and monitoring based on the
incident analysis.
 Training: Provide additional training to staff based on lessons learned.
New Hardening
 Security Enhancements: Implement new security measures such as stronger
MFA, improved email filtering.
 Policy Updates: Revise security policies to address gaps identified during the
incident.
New Patch Management
 Regular Updates: Ensure all systems are regularly updated with the latest
patches.
 Automated Deployment: Implement automated patch management solutions
to reduce manual effort and errors.
3. Malware
Scenario: A sophisticated malware infection has been detected on multiple employee
workstations, leading to unauthorized access and potential data exfiltration.

Incident Response Analysis


1. Preparation
List of All Assets
Servers
 Web Server: Hostname: web01, IP: 192.168.1.10, OS: Ubuntu 20.04
 Database Server: Hostname: db01, IP: 192.168.1.20, OS: MySQL 8.0
 Email Server: Hostname: mail01, IP: 192.168.1.30, OS: Exchange Server 2019
Endpoints
 Workstations: 50 Windows 10 PCs
 Laptops: 20 MacBook Pros
 Mobile Devices: 10 iPhones, 10 Android devices
Networks
 Corporate Network: 192.168.0.0/16
 Guest Network: 172.16.0.0/16
 DMZ: 10.0.0.0/24
Applications
 CRM: Salesforce
 ERP: SAP
 Office Suite: Microsoft Office 365
 Communication: Slack, Zoom
Employees
 Total Employees: 150
 Key Roles: IT Admins, HR, Finance, Sales, Executives
Security Products
 Antivirus: Symantec Endpoint Protection
 Firewall: Cisco ASA 5500
 SIEM: Splunk
 IDS/IPS: Snort
 MFA: Duo Security
Baselines
 Normal Network Traffic: Defined and documented with Splunk
 System Performance Metrics: Established benchmarks for CPU, memory, and
disk usage
 User Behavior: Normal login times, locations, and activities
Communication Plan
 Incident Response Team: Defined roles and contact info for all members

 Internal Notifications: Procedures for informing executives, IT staff, and


affected users

 External Notifications: Criteria for informing customers, partners, and


regulatory bodies
Security Events
 Authentication Failures
 Unusual Login Locations
 Unauthorized Access Attempts
 Data Exfiltration Attempts
 Privilege Escalation Attempts
Thresholds
 Login Failures: More than 5 failed logins within 10 minutes
 Unusual Locations: Logins from unrecognized countries
 Data Transfer: Uploads exceeding 1 GB from a single user
Access to Security Tools
 Provision Access: Procedures for granting and revoking access to security tools
like Splunk, Duo, Snort
 Documentation: User guides and training materials for security tools
Create Playbooks
 Account Compromise: Step-by-step actions for detection, containment, and
recovery
 Malware Infection: Procedures for identification and removal
 Data Breach: Steps for notification, containment, and legal compliance
Plan Exercises
 Tabletop Exercises: Quarterly simulations of common incidents
 Hands-On Drills: Annual red team/blue team exercises
2. Detect

Gathering of Information
 Logs: Authentication logs, access logs, and network traffic logs from Splunk
 Alerts: Review alerts from SIEM, IDS/IPS, and antivirus
 User Reports: Analyse reports from users about suspicious activity
Logs
Endpoint Antivirus Logs:
2024-06-22
08:32:10,av,alert,malware_detected,threat=Trojan.Generic,action=quarantine,device=1
92.168.1.50,user=jdoe
2024-06-22
08:35:12,av,alert,malware_detected,threat=Trojan.Generic,action=quarantine,device=1
92.168.1.51,user=asmith
2024-06-22
08:40:15,av,alert,malware_detected,threat=Ransomware.WannaCry,action=remove,de
vice=192.168.1.52,user=bwong
Network Traffic Logs:
2024-06-22
08:32:11,network,connection,allowed,src_ip=192.168.1.50,dst_ip=203.0.113.100,port
=80
2024-06-22
08:35:13,network,connection,blocked,src_ip=192.168.1.51,dst_ip=203.0.113.101,port
=443

2024-06-22
08:40:16,network,connection,allowed,src_ip=192.168.1.52,dst_ip=203.0.113.102,port
=80
3. Analyse

Analyse Data

 Malware Detection: Multiple workstations have detected and quarantined


malware.

 Network Activity: Suspicious outbound connections from infected devices to


external IPs.
Building Detections
 Custom SIEM Rules: Create rules to flag malware alerts from antivirus logs and
unusual outbound traffic.
 Behavioural Analysis: Monitor deviations from normal network activity patterns.
Root Cause Analysis
 Initial Point of Compromise: Malware likely introduced via a phishing email or
malicious download.
 Affected Accounts: Users jdoe, asmith, and bwong are affected.
Depth and Breadth of the Attack
 Admin Rights: Verify if affected users have administrative privileges (confirmed:
no admin rights).
 Affected Systems: Multiple workstations with detected malware infections.
Techniques Used
 Phishing: Possible entry point via phishing email.
 Malware Payload: Trojan.Generic and Ransomware.WannaCry detected.
Indicators of Compromise / Indicators of Attack
 Tactics, Techniques, and Procedures (TTP): Use of phishing emails to deliver
malware payloads.
 IP Addresses: Malicious outbound connections to IPs 203.0.113.100,
203.0.113.101, and 203.0.113.102.
 File Hashes: Identify hashes of detected malware files.
 Command Line: N/A (not available in logs).
4. Contain / Eradicate

Isolate Affected Systems


 Immediate Isolation: Disconnect infected workstations from the network.
 Quarantine: Quarantine affected devices.
Patch Threat Entry Point

 Update Software: Ensure all systems are updated with the latest security
patches.
 Change Credentials: Force a password reset for affected users and all
employees as a precaution.
Predefined Threshold
 For Customers: Notify any customers whose data may have been affected.
 For Internal Systems: Escalate to the IT security team.
 For Escalations: Involve higher management and, if necessary, external
cybersecurity consultants.
Preauthorized Actions
 Per Customers: Execute predefined response actions such as notifying
customers and providing support.
 Per Environment: Differentiate actions for production and other environments.
How to Remove the Threat on All Affected Systems
 Antivirus Scans: Run comprehensive scans on all endpoints to ensure all
malware is removed.
 Manual Inspection: Conduct manual checks on critical systems.
5. Recover

Get Systems Operational

 Restore Services: Ensure all infected workstations and systems are free of
threats and restore normal operations.
 Monitoring: Implement heightened monitoring for any signs of residual threats.
Rebuild and Resume Service
 Reimage Systems: Rebuild systems from clean backups if necessary.
 Verification: Verify the integrity and security of all restored systems.
6. Post Incident

Lessons Learned
 Review: Conduct a post-mortem analysis to identify what worked and what
didn’t.
 Documentation: Update incident response documentation with new insights.
New Detection
 Enhance Monitoring: Improve detection rules and monitoring based on the
incident analysis.
 Training: Provide additional training to staff based on lessons learned.
New Hardening
 Security Enhancements: Implement new security measures such as stronger
MFA, improved email filtering.
 Policy Updates: Revise security policies to address gaps identified during the
incident.
New Patch Management
 Regular Updates: Ensure all systems are regularly updated with the latest
patches.

 Automated Deployment: Implement automated patch management solutions


to reduce manual effort and errors.
4. Phishing
Scenario: Multiple employees received a phishing email that led to compromised
credentials and unauthorized access to the company's internal systems.

Incident Response Analysis


1. Preparation
List of All Assets
Servers
 Web Server: Hostname: web01, IP: 192.168.1.10, OS: Ubuntu 20.04
 Database Server: Hostname: db01, IP: 192.168.1.20, OS: MySQL 8.0
 Email Server: Hostname: mail01, IP: 192.168.1.30, OS: Exchange Server 2019
Endpoints
 Workstations: 50 Windows 10 PCs
 Laptops: 20 MacBook Pros
 Mobile Devices: 10 iPhones, 10 Android devices
Networks
 Corporate Network: 192.168.0.0/16
 Guest Network: 172.16.0.0/16
 DMZ: 10.0.0.0/24
Applications
 CRM: Salesforce
 ERP: SAP
 Office Suite: Microsoft Office 365
 Communication: Slack, Zoom
Employees
 Total Employees: 150
 Key Roles: IT Admins, HR, Finance, Sales, Executives
Security Products
 Antivirus: Symantec Endpoint Protection
 Firewall: Cisco ASA 5500
 SIEM: Splunk
 IDS/IPS: Snort
 MFA: Duo Security
Baselines
 Normal Network Traffic: Defined and documented with Splunk
 System Performance Metrics: Established benchmarks for CPU, memory, and
disk usage
 User Behaviour: Normal login times, locations, and activities
Communication Plan
 Incident Response Team: Defined roles and contact info for all members

 Internal Notifications: Procedures for informing executives, IT staff, and


affected users

 External Notifications: Criteria for informing customers, partners, and


regulatory bodies
Security Events
 Authentication Failures
 Unusual Login Locations
 Unauthorized Access Attempts
 Data Exfiltration Attempts
 Privilege Escalation Attempts
Thresholds
 Login Failures: More than 5 failed logins within 10 minutes
 Unusual Locations: Logins from unrecognized countries
 Data Transfer: Uploads exceeding 1 GB from a single user
Access to Security Tools
 Provision Access: Procedures for granting and revoking access to security tools
like Splunk, Duo, Snort
 Documentation: User guides and training materials for security tools
Create Playbooks
 Account Compromise: Step-by-step actions for detection, containment, and
recovery
 Malware Infection: Procedures for identification and removal

 Phishing Attack: Steps for identifying phishing attempts, removing malicious


emails, and securing compromised accounts
Plan Exercises
 Tabletop Exercises: Quarterly simulations of common incidents
 Hands-On Drills: Annual red team/blue team exercises
2. Detect

Gathering of Information
 Logs: Email logs, authentication logs, and network traffic logs from Splunk
 Alerts: Review alerts from SIEM, IDS/IPS, and antivirus
 User Reports: Analyse reports from users about suspicious emails
Logs
Email Server Logs:

2024-06-25
09:12:32,email,received,sender=attacker@example.com,recipient=jsmith@company.c
om,subject="Urgent: Update Your Password",ip=203.0.113.50
2024-06-25
09:15:47,email,received,sender=attacker@example.com,recipient=adoe@company.co
m,subject="Urgent: Update Your Password",ip=203.0.113.50
2024-06-25
09:17:53,email,received,sender=attacker@example.com,recipient=bwong@company.c
om,subject="Urgent: Update Your Password",ip=203.0.113.50
Authentication Logs:
2024-06-25 09:30:12,auth,login,success,user=jsmith,ip=203.0.113.60
2024-06-25 09:35:15,auth,login,failed,user=adoe,ip=203.0.113.60
2024-06-25 09:40:20,auth,login,success,user=adoe,ip=203.0.113.60
3. Analyse

Analyse Data
 Email Analysis: Multiple phishing emails received from attacker@example.com.
 Login Attempts: Successful logins from an external IP (203.0.113.60) shortly
after phishing emails were received.
Building Detections

 Custom SIEM Rules: Create rules to flag emails from suspicious domains and
detect unusual login attempts.
 Behavioural Analysis: Monitor deviations from normal email and login patterns.
Root Cause Analysis

 Initial Point of Compromise: Phishing emails led to users providing their


credentials to the attacker.
 Affected Accounts: Users jsmith and adoe.
Depth and Breadth of the Attack

 Admin Rights: Verify if affected users have administrative privileges (confirmed:


no admin rights).
 Affected Systems: Email accounts and potentially other internal systems
accessed using compromised credentials.
Techniques Used
 Phishing: Attacker used phishing emails to harvest credentials.

 Unauthorized Access: Attacker used harvested credentials to log into internal


systems.
Indicators of Compromise / Indicators of Attack
 Tactics, Techniques, and Procedures (TTP): Use of phishing emails to steal
credentials.
 IP Addresses: Malicious activity from IP 203.0.113.60 and 203.0.113.50.

 Email Content: Subject line "Urgent: Update Your Password" from


attacker@example.com.
4. Contain / Eradicate

Isolate Affected Systems


 Immediate Isolation: Disable compromised accounts jsmith and adoe.
 Quarantine: Block IPs 203.0.113.60 and 203.0.113.50 at the firewall.
Patch Threat Entry Point

 Update Software: Ensure all systems are updated with the latest security
patches.
 Change Credentials: Force a password reset for compromised users and all
employees as a precaution.
Predefined Threshold
 For Customers: Notify any customers whose data may have been accessed or
affected.
 For Internal Systems: Escalate to the IT security team.
 For Escalations: Involve higher management and, if necessary, external
cybersecurity consultants.
Preauthorized Actions

 Per Customers: Execute predefined response actions such as notifying


customers and providing support.
 Per Environment: Differentiate actions for production and other environments.
How to Remove the Threat on All Affected Systems
 Email Filtering: Implement stronger email filtering rules to block similar phishing
emails.
 Antivirus Scans: Run comprehensive scans on all endpoints to ensure no
malware was introduced.
5. Recover

Get Systems Operational

 Restore Services: Ensure email accounts and other systems are secure and
restore normal operations.
 Monitoring: Implement heightened monitoring for any signs of residual threats.
Rebuild and Resume Service
 Reimage Systems: Rebuild systems from clean backups if necessary.
 Verification: Verify the integrity and security of all restored systems.
6. Post Incident

Lessons Learned
 Review: Conduct a post-mortem analysis to identify what worked and what
didn’t.
 Documentation: Update incident response documentation with new insights.
New Detection
 Enhance Monitoring: Improve detection rules and monitoring based on the
incident analysis.
 Training: Provide additional training to staff based on lessons learned.
New Hardening
 Security Enhancements: Implement new security measures such as stronger
MFA, improved email filtering.
 Policy Updates: Revise security policies to address gaps identified during the
incident.
New Patch Management

 Regular Updates: Ensure all systems are regularly updated with the latest
patches.

 Automated Deployment: Implement automated patch management solutions


to reduce manual effort and errors.
5. Ransomware
Scenario: A ransomware attack has encrypted multiple critical systems within the
organization, demanding payment for the decryption keys.

Incident Response Analysis


1. Preparation
List of All Assets
Servers
 Web Server: Hostname: web01, IP: 192.168.1.10, OS: Ubuntu 20.04
 Database Server: Hostname: db01, IP: 192.168.1.20, OS: MySQL 8.0
 Email Server: Hostname: mail01, IP: 192.168.1.30, OS: Exchange Server 2019
 File Server: Hostname: file01, IP: 192.168.1.40, OS: Windows Server 2019
Endpoints
 Workstations: 50 Windows 10 PCs
 Laptops: 20 MacBook Pros
 Mobile Devices: 10 iPhones, 10 Android devices
Networks
 Corporate Network: 192.168.0.0/16
 Guest Network: 172.16.0.0/16
 DMZ: 10.0.0.0/24
Applications
 CRM: Salesforce
 ERP: SAP
 Office Suite: Microsoft Office 365
 Communication: Slack, Zoom
Employees
 Total Employees: 150
 Key Roles: IT Admins, HR, Finance, Sales, Executives
Security Products
 Antivirus: Symantec Endpoint Protection
 Firewall: Cisco ASA 5500
 SIEM: Splunk
 IDS/IPS: Snort
 MFA: Duo Security
Baselines
 Normal Network Traffic: Defined and documented with Splunk

 System Performance Metrics: Established benchmarks for CPU, memory, and


disk usage
 User Behaviour: Normal login times, locations, and activities
Communication Plan
 Incident Response Team: Defined roles and contact info for all members
 Internal Notifications: Procedures for informing executives, IT staff, and
affected users
 External Notifications: Criteria for informing customers, partners, and
regulatory bodies
Security Events
 Authentication Failures
 Unusual Login Locations
 Unauthorized Access Attempts
 Data Exfiltration Attempts
 Privilege Escalation Attempts
 Mass File Encryption
Thresholds
 Login Failures: More than 5 failed logins within 10 minutes
 Unusual Locations: Logins from unrecognized countries
 Data Transfer: Uploads exceeding 1 GB from a single user
 File Modifications: Sudden spike in file encryption or modifications
Access to Security Tools
 Provision Access: Procedures for granting and revoking access to security tools
like Splunk, Duo, Snort
 Documentation: User guides and training materials for security tools
Create Playbooks

 Account Compromise: Step-by-step actions for detection, containment, and


recovery
 Malware Infection: Procedures for identification and removal
 Phishing Attack: Steps for identifying phishing attempts, removing malicious
emails, and securing compromised accounts
 Ransomware Attack: Comprehensive guide for responding to ransomware,
including isolation, communication, and recovery steps
Plan Exercises
 Tabletop Exercises: Quarterly simulations of common incidents
 Hands-On Drills: Annual red team/blue team exercises
2. Detect

Gathering of Information
 Logs: Authentication logs, access logs, and network traffic logs from Splunk
 Alerts: Review alerts from SIEM, IDS/IPS, and antivirus
 User Reports: Analyse reports from users about unusual system behaviour
Logs
Endpoint Antivirus Logs:
2024-06-26
10:12:10,av,alert,ransomware_detected,threat=Ransomware.LockBit,action=quarantin
e,device=192.168.1.50,user=jdoe
2024-06-26
10:15:12,av,alert,ransomware_detected,threat=Ransomware.LockBit,action=quarantin
e,device=192.168.1.51,user=asmith
2024-06-26
10:20:15,av,alert,ransomware_detected,threat=Ransomware.LockBit,action=quarantin
e,device=192.168.1.52,user=bwong
Network Traffic Logs:
2024-06-26
10:12:11,network,connection,allowed,src_ip=192.168.1.50,dst_ip=203.0.113.200,port
=443

2024-06-26
10:15:13,network,connection,allowed,src_ip=192.168.1.51,dst_ip=203.0.113.200,port
=443

2024-06-26
10:20:16,network,connection,allowed,src_ip=192.168.1.52,dst_ip=203.0.113.200,port
=443
File Server Logs:
2024-06-26 10:12:10,file,modified,path=/share/docs/file1.docx,user=jdoe
2024-06-26 10:15:12,file,modified,path=/share/docs/file2.docx,user=asmith
2024-06-26 10:20:15,file,modified,path=/share/docs/file3.docx,user=bwong
3. Analyse

Analyse Data

 Ransomware Detection: Multiple workstations have detected and quarantined


ransomware.
 Network Activity: Suspicious outbound connections to external IPs
(203.0.113.200).
 File Modifications: Sudden spike in file modifications on the file server.
Building Detections
 Custom SIEM Rules: Create rules to flag ransomware alerts from antivirus logs
and unusual file modifications.
 Behavioural Analysis: Monitor deviations from normal network and file activity
patterns.
Root Cause Analysis

 Initial Point of Compromise: Likely introduced via phishing email or malicious


download.
 Affected Accounts: Users jdoe, asmith, and bwong are affected.
Depth and Breadth of the Attack

 Admin Rights: Verify if affected users have administrative privileges (confirmed:


no admin rights).
 Affected Systems: Multiple workstations and file server with encrypted files.
Techniques Used
 Phishing: Possible entry point via phishing email.
 Ransomware Payload: LockBit ransomware detected.
Indicators of Compromise / Indicators of Attack

 Tactics, Techniques, and Procedures (TTP): Use of phishing emails to deliver


ransomware payloads.
 IP Addresses: Malicious outbound connections to IP 203.0.113.200.
 File Modifications: Unusual file modifications and encryptions.
Contain / Eradicate

Isolate Affected Systems


 Immediate Isolation: Disconnect infected workstations from the network.
 Quarantine: Quarantine affected devices to prevent further spread.
Patch Threat Entry Point

 Update Software: Ensure all systems are updated with the latest security
patches.
 Change Credentials: Force a password reset for affected users and all
employees as a precaution.
Predefined Threshold
 For Customers: Notify any customers whose data may have been affected.
 For Internal Systems: Escalate to the IT security team.
 For Escalations: Involve higher management and, if necessary, external
cybersecurity consultants.
Preauthorized Actions

 Per Customers: Execute predefined response actions such as notifying


customers and providing support.
 Per Environment: Differentiate actions for production and other environments.
How to Remove the Threat on All Affected Systems

 Antivirus Scans: Run comprehensive scans on all endpoints to ensure all


ransomware is removed.
 Manual Inspection: Conduct manual checks on critical systems.
4. Recover

Get Systems Operational


 Restore Services: Ensure all infected workstations and systems are free of
threats and restore normal operations.
 Monitoring: Implement heightened monitoring for any signs of residual threats.
Rebuild and Resume Service
 Reimage Systems: Rebuild systems from clean backups if necessary.
 Verification: Verify the integrity and security of all restored systems.
5. Post Incident

Lessons Learned
 Review: Conduct a post-mortem analysis to identify what worked and what
didn’t.
 Documentation: Update incident response documentation with new insights.
New Detection

 Enhance Monitoring: Improve detection rules and monitoring based on the


incident analysis.
 Training: Provide additional training to staff based on lessons learned.
New Hardening
 Security Enhancements: Implement new security measures such as stronger
MFA, improved email filtering.
 Policy Updates: Revise security policies to address gaps identified during the
incident.
New Patch Management

 Regular Updates: Ensure all systems are regularly updated with the latest
patches.

 Automated Deployment: Implement automated patch management solutions


to reduce manual effort and errors.

You might also like