CISO Threat-Perspectives Jacky-Fox Gina-Dollard AppSecEU2018
CISO Threat-Perspectives Jacky-Fox Gina-Dollard AppSecEU2018
cti
Longterm
te
Attacker l
formation on methodologies advice, about an existing or emerging menace or hazard to assets that
use S
changing risk
use Long
and tactics.
can be used to inform decisions regarding the subject's response to that
use
specific specific
incoming malware.
Expectation - Understanding the threat landscape from a dynamic and
Immediate
Op attacks. SOC staff strategic perspective helps an organisation to prepare for and react
l
ica
e ra
Defenders
appropriately to Cyber events
n
tio
ch
na
Te
l
HighLevel
High Level LowLevel
Low Level
High Level Low Level
Threat perspectives
Author name her
• Vulnerability prioritisation
• Brand monitoring
Dissemination Processing
• Fraud detection
Learnings
Additional logs, if only we had blocked file downloads from new Geolocations
Threat Perspectives Sources: Deloitte Threat Intelligence & Analysis
program
gh
Ve
gh
ry
t
hi
en
hi
ry
gh
hi
hi
rr
ry
gh
hi
ry
Cu
Ve
O
gh
Ve
Data breach Phishing cc
ur In
ty
Im Nation state
ng
ct
en te
li
pa
bi
entity
gi
pa ce nt
pa
er
Im
ct
Em
Ca
Social Malware Organized Corporate
engineering Ransomware espionage groups
Malware Ve crime groups
targeting ry Ve
Ve
Disruption of
w
re
lo ry
lo
lo
ry
company devices
tu
Communications w Insider lo
ry
ry
lo
Fu
(DDOS) w
Ve
Ve
or applications to Legacy technology
w
Exploit
reach clients fails to provide Botnets kits Hacktivists
adequate protection Network Devices Physical
and stability in the Misconfiguration actions Lone-wolf cyber
GDPR face of new attacks Web Cyber
criminals
Application espionage
compliance Script Kiddie
Firewall Attacks Data
Misconfiguration breaches
Unaddressed
Software Researcher/
Ransomware Spam journalist
takes Vulnerabilities
applications
hostage
Threat
Intelligence
Who is involved?
• Must be conducted by independent third parties not internal red teams
• A test involves the entity, regulator, external threat intelligence and external red team
• Blue team (who don’t know the test is being conducted)
• White team – internal PM type role
Preparation phase
• Scope determined and signed off by the board and the regulator
• Identification of flags
• Confidentiality protocols
Testing phase
Threats:
• Generic Threat Landscape (TTPs, Actors & Vulnerabilities) – this can be produced by authorities, other agencies or
third party, ISACs etc. and updated annually
• General Threat Landscape of national financial sector threat
• Targeted threat intelligence report to incorporate business overview, threat register & recent attacks
• TTI includes attack surfaces, actors & scenarios
• Estimated effort 5 weeks should be broad and deep input using e.g. OSINT and HUMINT
Closure phase
• Red team preliminary test results report
• Blue team are informed of the test and a 360 view is analysed
• Remediation planning controls, policies, education etc. budgets
• Learnings
TI in practice
Gina Dollard
Threat Perspectives
“Intelligence-led red team tests mimic the tactics, techniques and procedures
(TTPs) of real-life threat actors who, on the basis of threat intelligence, are
perceived as posing a genuine threat to entities. An intelligence-led red team
tests the use of a variety of techniques to simulate an attack on an entities
critical functions (CFs) and underlying systems (i.e. its people, process and
technologies). It helps an entity to assess its protection, detection and response
capabilities”
Threat Perspectives
Insider
Organized Criminals Hacktivists State-Sponsored
Unintentional (Error) or
Phishing Cyber Vandalism ‘APT’-style Attacks
intentional Malicious)
Malicious Insiders DDoS Custom malware/exploits
Data Breach
Commodity Malware Reputational Damage Spear Phishing
Lost/Stolen IP
Threat Perspectives
Security Program
Threat
Strategy & Security Risk & Threat &
Intelligence Identity &
Governance Architecture Compliance Vulnerability
& Incident Access Mgt.
Mgt. Mgt.
Mgt.
Threat Perspectives
Actions &
Recon Weaponise Delivery Exploitation Installation C2
Objectives
Mechanism Technical or
Motivation Configuration Persistence Communication What the adversary
Preparation of Delivery human? Characteristics
Packaging between victim does when they have
Infection Applications of change & adversary control of the system
Vector affected Acquiring
Method & additional
Characteristics components
Threat Perspectives
Actions &
Recon Weaponise Delivery Exploitation Installation C2
Objectives
MITRE ATT&CK: MITRE ATT&CK: MITRE ATT&CK: MITRE ATT&CK: MITRE ATT&CK: MITRE ATT&CK: MITRE ATT&CK:
Active Scanning Malware Spearphishing Local Job Scheduling Application Data Obfuscation Email Collection
Passive Scanning Scripting Attachment/Link Scripting Shimming Domain Fronting Data from Local
Determine Service Execution Exploit Public- Rundll32 Hooking Web Service System/Network
Domain and IP Facing Application Login Items Share
Address Space Supply Chain
Analyze Third- Compromise
Party IT Footprint
Threat Perspectives
Security Controls: Security Controls: Security Controls: Security Controls: Security Controls: Security Controls:
Policies & Threat & Anti-Virus Anti-Virus Anti-Virus IDS
Procedures Vulnerability Web Proxy EDR EDR Web proxy
Firewall Mgt. Mobile Device IDS Policies & Firewalls
Cyber Awareness Mgt. Procedures EDR
Training Directory
Services
Threat Perspectives
Intelligence-led Testing
Should be a nightmare!
Help identify strengths and weaknesses
Used to enrich Threat Intelligence
Threat Perspectives
Get Real!
Informed Stakeholders
IT – fit issues,
Security Teams – improve capabilities
Invested Stakeholders
Lessons learned
Set expectations
Advocate for investment
Threat Perspectives
Where to next?
Automation
Improve speed
Augment capabilities
Orchestration
Eliminate repetitive, mundane tasks
Automate responses
Prioritise security events
Threat Perspectives
Getting it Right