Dragos OSINT Framework
Dragos OSINT Framework
O PE N S OU RCE
I N T E L L I G E N CE
DECEMBER 2020
E X ECU T I V E SUMM A RY
D R AG O S , I n c . 1
OPEN SOURCE INTELLIGENCE
TA B L E OF CON T EN T S
D R AG O S , I n c . 2
OPEN SOURCE INTELLIGENCE
Adversaries and defenders collect OSINT from a variety of sources. This is not an exhaustive list but demonstrates the
types of publicly available information that could facilitate attack planning:
Reconnaissance tools such as Shodan 1 or Censys 2
Onng engines such as VirusTotal 3
Bn portals such as VendorLink 4
UsingSearch
tools like the OSINT Framework 5
engines Government and regulation authority body
» »
websites
Social media websites
»
1
Reconnaissance tools such as Shodan or Censys 2
Job listings »
»
3
Online scanning engines such as VirusTotal
News websites »
»
Business solicitation portals such as VendorLink 4
Company websites »
»
Usernames and passwords in public repositories
»
Vendor websites and documentation including
» dumped by adversaries or stored in GitHub
installation documentation containing default
passwords Using tools like the OSINT Framework 5
»
1 https://www.shodan.io/
2 https://censys.io/
3 https://virustotal.com/
4 https://www.myvendorlink.com/common/default.aspx
5 https://osintframework.com/
D R AG O S , I n c . 3
OPEN SOURCE INTELLIGENCE
K E Y INFORM AT I ON T Y PE S
Adversaries may seek multiple types of information in an Recoverability Information: Gives an adversary insight
attempt to conduct reconnaissance on a target and create a into the ability for a target’s process, system, or network
plan of attack. Identifying this information and educating infrastructure to recover from an attack or compromise.
a highly significant impact in the overall organization and its Safety Instrumented System (SIS);
6 https://en.wikipedia.org/wiki/CARVER_matrix
7 https://dragos.com/blog/industry-news/combating-cyber-attacks-with-conse-
quence-driven-ics-cybersecurity/
D R AG O S , I n c . 4
OPEN SOURCE INTELLIGENCE
TA RGE T ING I C S
When mapped to the ICS Cyber Kill Chain, 8 OSINT largely in downtime. In these cases, an operator may be more willing
represents Stage 1 reconnaissance activity that can support to pay a ransom to unlock computers and limit downtime,
Stage 2 objectives. It can be used to identify potential especially if proper backups are not maintained. For example,
vulnerabilities, identify detections, implement persistence in July 2020, wearables manufacturer and Global Positioning
mechanisms, or reduce the time required to achieve objectives System (GPS) service provider Garmin experienced a
and avoid detection. Details on equipment, vendors, and ransomware attack and opted to pay an undisclosed ransom to
processes can be used for later malware or malicious tool get its operations back online.10
development.
ICS environments may also be more insecure than
Adversaries target industrial entities for a variety of traditional enterprise systems, especially for entities with
reasons. Attacks on ICS entities that serve critical functions immature cybersecurity postures. This can be due to legacy
within society can be used to further political, economic, or operating systems in use across various environments and
national security goals. Depending on an adversary’s objective, inadequate segmentation. It is not uncommon to observe
attacks can be used for messaging purposes or retaliation. The outdated Windows operating systems, such as Windows XP
potential impact may extend to citizens of a target’s community. or Windows 7, within ICS due to interoperability of some ICS
Understanding critical infrastructure can put an adversary at a devices and limitations on patch management. ICS systems are
tactical advantage in times of conflict to establish a foothold as fundamentally complex, and security mechanisms like patching
a contingency option when conflict occurs. are conducted based on weighing the risk of compromise
against the outcome of a potential cyberattack. Practicing
Targeting ICS can provide monetary value to an adversary.
defense in depth, including conducting OSINT risk assessments
ICS entities increasingly experience ransomware attacks that,
to strengthen external security postures and limiting the
in many cases, disrupt operations. 9 For some companies,
ability for adversaries to operationalize public information,
disrupting operations can have significant daily financial
can prevent initial access and movement within an operational
impacts, costing thousands and sometimes millions of dollars
environment.
8 https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-sys-
tem-cyber-kill-chain-36297
9 https://dragos.com/blog/industry-news/assessment-of-ransom- 10 https://www.bleepingcomputer.com/news/security/confirmed-garmin-re-
ware-event-at-u-s-pipeline-operator/ ceived-decryptor-for-wastedlocker-ransomware/
D R AG O S , I n c . 5
OPEN SOURCE INTELLIGENCE
Collaborate Across the Company environment, which could provide adversary insight into
what technologies are used in a target environment.
It is important that OSINT assessments leverage experience
Information collection should focus on publicly available
and data across multiple teams. Security operators and
information that could be used to facilitate reconnaissance
network technicians from Information Technology (IT),
or attack development. This includes information about
incident responders and forensic specialists, security
vendors and partners; documents, schematics, and data
operators and engineers from ICS environments, and
sheets; job advertisements; information about system
physical security specialists should be consulted while
operations and recovery processes; geographic data like
conducting the assessment. These individuals can provide
maps detailing plant locations; ports and services identified
insight on the value of information from an adversary
via Shodan; and credentials in public dumps. Security teams
perspective and how OSINT can enable potential attack
should also identify gaps in security architecture, like remote
scenarios. Additionally, business units including human
login portals that lack strong passwords and multi-factor
resources and legal should also be consulted to identify
authentication including RDP and VPN services.
publicly available information and the requirements or
11 https://dragos.com/wp-content/uploads/ConsequenceDrivenICSCybersecurity-
Scoping_Dragos.pdf
D R AG O S , I n c . 6
OPEN SOURCE INTELLIGENCE
Example: A piece of information (e.g. error logs, system headers, etc.) describes a server running a vulnerable piece
of software, but it is unknown how or if the adversary uses the information. The information is highly accessible
and recognizable, and likely easy for the adversary to use. In combination with other collection by an adversary,
this software vulnerability information has a higher score than just the individual piece of information.
The data is rated from one to three and by color, including green, orange, and red. The higher the number, the greater the value
of the OSINT to an adversary. Green indicates a low value item and red indicates a high value item. The colors help an analyst
determine how to quickly prioritize remediation and defense. This is explained in the Priorities of Defense and Mitigation section
below.
Adversary utilization 2 3 3
requires little to no analyt-
ical effort for operational
integration
Adversary utilization 1 2 3
requires moderate to spe-
cialized analytical effort for
operational integration
Adversary utilization 1 2 2
requires highly technical
analytical effort for opera-
tional integration
Example: An OSINT assessment identified a document containing engineering diagrams of an oil production
facility. The document included device type and implementation information of safety systems and integration of
Enterprise Resource Planning (ERP) software. This document was found in a vendor Request for Proposal (RFP)
repository.
D R AG O S , I n c . 7
OPEN SOURCE INTELLIGENCE
This document is scored as a 3 and is of high value and importance of each piece of information is designated by
relevance to an adversary interested in infiltrating or color, like Figure 1 above. Different characters represent the
disrupting operations. It requires specialized analytical ability for an entity to mitigate the potential risk, and if risk
effort for intelligence value for an adversary. This means mitigation is an issue of policy or prioritization.
to use information from this document, an adversary must
establish knowledge of the ICS environment, devices, and
The table is an example of how an analyst can determine the
software used.
priorities of defense and mitigation based on open source
data collected. The legend icons represent requirements
Example: An OSINT assessment of 10-K and the ability for the company to implement defensive
financial filings identified an automotive measures to prevent exploitation of the data, what actions
manufacturing organization working should take priority, if a network policy configuration is
with Accounting Firm X to facilitate the required to fix, and if data came from threat intelligence
acquisition of an additive manufacturing reporting. The colors represent the value of the intelligence
startup. A LinkedIn search identified the gathered to adversary operations.
name of the accountant at Accounting Firm
X likely working on this acquisition.
Example: An analyst collects three
different types of information: the
This information is scored a 2. The adversary requires location of facilities, names and emails
moderate analytical effort to operationalize this data, and it of engineers, and vendor names and
would be straightforward to create phishing lures based on contract information of companies
the information identified. The adversary requires additional they work with. An adversary
access, like to the accountant’s email directly, to launch a uses this information in different
likely successful phishing attack. This information is also of ways for targeting, exploitation,
low importance for intelligence collection because it is only and infrastructure development
tangentially related to the target organization. operations. An analyst must identify
how it may be used, the importance
of the data based on the Risk Scoring
Priorities of Defense and Mitigation
Matrix above, and if the organization
As information is assessed and scores assigned, defenders has adequate visibility, defensive
can leverage the Priorities of Defense and Mitigation measures, and security policies in
(PODAM) table to visualize how collected data could place to prevent exploitation of the
be operationalized, the value of the information, and if information. The analyst completes
protections and mitigations are in place to address the the table as provided in the example
potential risk. below.
D R AG O S , I n c . 8
OPEN SOURCE INTELLIGENCE
By using this table, an analyst can determine the highest priority items to address. In this case it is publicly available vendor names and contracts. The following are recommended steps
for remediation plans to begin addressing the issues:
• Conduct an assessment of third-party and vendor integrations within the operations environment.
• Ensure third-party connections are properly secure with access restrictions, Multi-Factor Authentication (MFA), segmentation, and defense in depth measures.
• Work with vendors and contractors to identify and acknowledge maintenance and related operations in advance to determine schedules and baseline legitimate activity.
D R AG O S , I n c . 9
OPEN SOURCE INTELLIGENCE
D R AG O S , I n c . 10
OPEN SOURCE INTELLIGENCE
CONCLU SI ON
TO LE ARN MORE
ABOUT DR AGOS AND
OUR TECHNOLOG Y,
SERVICES , AND THRE AT
INTELLIGENCE FOR
THE INDUSTRIAL
COMMUNIT Y, T HA N K YO U
PLE A SE VISIT
W W W. DR AGOS .COM .
D R AG O S , I n c . 11
OPEN SOURCE INTELLIGENCE
A PPENDI X
D R AG O S , I n c . 12
OPEN SOURCE INTELLIGENCE
A PPENDI X
control, but a vulnerability exists in either the technology or performing offensive tasks without automation or
or organizational process for access approval, or a valid user the use of capabilities to achieve information collection,
account was compromised to let an adversary bypass this reconnaissance, persistence, or exfiltration.
authentication gate.
Command and Control - The channels an adversary uses to
Research and Development - A business function that direct its operations, enabling bi-directional communication
generates new information of value for an adversary or of information.
that contains intellectual property that is either not publicly
Persistence - The method of maintaining access and
available or patented.
command and control within a victim environment.
Automation - A process that follows specific steps without
Maneuver - The method used to move within a victim
manual or user interaction.
environment.
Evasion - A capability design, tactic, or technique taken by an
Cyber Key Terrain - Infrastructure, processes (either
adversary for avoiding detection by security infrastructure,
business, technical, or personnel) or technology that is
technology, or defender manipulation.
essential to the operational integrity, confidentiality, and
Obfuscation - A capability design, tactic, or technique taken availability of a network.
by an adversary to avoid scrutiny.
Defense Capability Gap - A gap in organizational structure,
Installation - The process in which an adversary is able network architecture, cybersecurity, or user policies
to load a capability into a victim environment and gain that would be required for defense against adversary
successful execution of the capability to allow for further exploitation.
access or continued interaction operations.
Missing Dependency - A security feature or mechanism
Environment Awareness - The ability for an adversary to that enables a core security function but is not present
determine where in the victim network they are located, within the environment.
identifying infrastructure for pivoting or information
Requires Implementation - A security feature or mechanism
that better enables capability selection in compromise
that is present within in an organization, but is not yet
operations.
implemented, and is required for defense against adversary
Weaponization - The activity performed by an adversary exploitation.
to take a vulnerability or benign software or documents
Intelligence Data - Information gleaned from threat
and turn it into an operational capability that can lead to
intelligence data, either from a third-party or an
satisfying adversary intent.
organization’s internal threat intelligence team.
Interactive Operations - The activity wherein the actor
Policy Issue - An item that requires a change in
accesses the victim environment through manual means
organizational or user policy to address.
D R AG O S , I n c . 13
OPEN SOURCE INTELLIGENCE
D R AG O S , I n c . 14