SlideShare a Scribd company logo
Chris Gerritz
Infocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report Webinar
Attack Outcomes
Respond
Hunt
• Block what can be
blocked
• What you detect
through monitoring, you
must respond quickly.
• The rest you must be
proactive: hunt and
assess
:-)
Today’s Cyber Attacks are Chained Events
Stages of a modern malware attack:
1. Emotet = Go-Wide Trojan (easier
to detect)
2. Trickbot = Targeted RAT (harder to
detect)
3. Ransomware
Infocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report Webinar
Infocyte spans the Attack LIfecycle
●
○
○
●
●
●
●
○
●
●
Infocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report Webinar
Earliest
Forensic
Timestamp
Detected on
• Dwell Time calculations require earliest
timestamp from the initial infection:
○ First system compromised (beachhead)
○ Best done with host-based telemetry
Source Details Notes
MAC File System Times File Created Time Earliest Timestamp! Infocyte uses this.
Windows Event Logs Event ID 4688 (Process Creation) Logs executions but poorly formatted and
almost useless for proactive detection
Sysmon (or commercial EDR) Event ID 1 (Process Creation)
Event ID 2 (File Creation Time
Changed)
Same as 4688 but Sysmon and EDR events
are formatted for remote storage & analysis
(e.g. includes hash)
ID 2 can help detect time manipulation but
is noisy
Network IDS/Proxy/FW Event Exploit or C2 events Will indicate some part of the infection chain
Calculating Dwell Time (Sources of Time)
Potential Issues with Time
• Anti-Forensics is a class of techniques used by hackers to dork up forensic analysis
such as timeline creation
Source Potential Issues Mitigations
MAC File System Times
($STANDARD_INFO)
Easy to manipulate these timestamps
from user-space (aka TimeStomping)
1. Compare to $FILE_INFO
2. Check for absence of sub-second
resolution (timestomp doesn’t add this)
MAC File System Times
($FILE_INFO)
Hard to manipulate but not impossible
(i.e. a kernel rootkit)
Verify timestamps make sense (not before
OS release date or in future)
Windows Event Logs Logs can be deleted (modifying event
is extremely difficult in Windows 10)
Remotely store logs
Sysmon (or commercial EDR) Process Start Times are not the
earliest timestamps
Telemetry != Detection
Process start times are good approximations
in many attacks but not all.
Ensure this was actually the earliest
execution
Network IDS/Proxy/FW Event Most early exploit events not
detected/logged (i.e. email vector)
Aggregate ALL network log sources into a
super timeline
Eliminate threat from network.
Example: wipe and reload infected host or delete malware
For every threat or vulnerability finding there are three
choices for remediation that happen in practice:
Don't outright fix but use additional layers of security to reduce the risk/threat.
Example: Block C2 at firewall or DNS blackhole
Problem: Malware “might” be neutered but still on system (sometimes forever)
Fix
Accept
Remediation Concerns
Mitigate
The cost of fixing outweighs the risk: Ignore it… (yes, this happens sometimes)
Longest dwelling
infections found
were in this
category
Infocyte Mid-market Threat and Incident Response Report Webinar
Command
Premium Hunt & IR Support
✓
✓
✓
✓
✓
Confidential
™
™
∙ ∙ ∙ ∙ ∙ ∙ ∙
Quarterly Reports:
- Q3 Report Coming Soon
- Refining our methodology while expanding data volume
Annual Report 2020 (Summer)
- Work with Verizon DBIR
- Provide additional rigor to dataset
Future Reports
Infocyte Mid-market Threat and Incident Response Report Webinar

More Related Content

PPTX
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
PDF
Digital Forensics and Incident Response (DFIR) Training Session - January
Infocyte
 
PPTX
Malware detection how to spot infections early with alien vault usm
AlienVault
 
PDF
The New Pentest? Rise of the Compromise Assessment
Infocyte
 
PDF
Cheatsheet for your cloud project
Petteri Heino
 
PPTX
Improve threat detection with hids and alien vault usm
AlienVault
 
PPTX
Six Steps to SIEM Success
AlienVault
 
PDF
20 Security Controls for the Cloud
NetStandard
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
Digital Forensics and Incident Response (DFIR) Training Session - January
Infocyte
 
Malware detection how to spot infections early with alien vault usm
AlienVault
 
The New Pentest? Rise of the Compromise Assessment
Infocyte
 
Cheatsheet for your cloud project
Petteri Heino
 
Improve threat detection with hids and alien vault usm
AlienVault
 
Six Steps to SIEM Success
AlienVault
 
20 Security Controls for the Cloud
NetStandard
 

What's hot (20)

PPTX
Incident Response: Validation, Containment & Forensics
Priyanka Aash
 
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh
 
PPTX
Incident response live demo slides final
AlienVault
 
PDF
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
PPTX
Alienvault threat alerts in spiceworks
AlienVault
 
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
PDF
The Critical Security Controls and the StealthWatch System
Lancope, Inc.
 
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault
 
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
Mayur Nanotkar
 
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
AlienVault
 
PDF
RSA: Security Analytics Architecture for APT
Lee Wei Yeong
 
PPTX
Extending the 20 critical security controls to gap assessments and security m...
John M. Willis
 
PPT
Info Security - Vulnerability Assessment
Marcelo Silva
 
PPTX
How to Detect SQL Injections & XSS Attacks with AlienVault USM
AlienVault
 
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault
 
PPTX
The CIS Critical Security Controls the International Standard for Defense
EnclaveSecurity
 
PPTX
NextGen Endpoint Security for Dummies
Atif Ghauri
 
PDF
Bulding Soc In Changing Threat Landscapefinal
Mahmoud Yassin
 
PDF
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh
 
PPTX
SOC Architecture Workshop - Part 1
Priyanka Aash
 
Incident Response: Validation, Containment & Forensics
Priyanka Aash
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh
 
Incident response live demo slides final
AlienVault
 
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Alienvault threat alerts in spiceworks
AlienVault
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
The Critical Security Controls and the StealthWatch System
Lancope, Inc.
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault
 
Advanced Persistent Threats (APTs) - Information Security Management
Mayur Nanotkar
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
AlienVault
 
RSA: Security Analytics Architecture for APT
Lee Wei Yeong
 
Extending the 20 critical security controls to gap assessments and security m...
John M. Willis
 
Info Security - Vulnerability Assessment
Marcelo Silva
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
AlienVault
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault
 
The CIS Critical Security Controls the International Standard for Defense
EnclaveSecurity
 
NextGen Endpoint Security for Dummies
Atif Ghauri
 
Bulding Soc In Changing Threat Landscapefinal
Mahmoud Yassin
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh
 
SOC Architecture Workshop - Part 1
Priyanka Aash
 
Ad

Similar to Infocyte Mid-market Threat and Incident Response Report Webinar (20)

PPT
Anton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin
 
PDF
Backtracking king05
Dalton Dalton
 
PDF
Automated defense from rootkit attacks
UltraUploader
 
PPTX
Power of logs: practices for network security
Information Technology Society Nepal
 
PDF
FireSIGHT Management Center (FMC) slides
Amy Gerrie
 
PDF
Compromising windows 8 with metasploit’s exploit
IOSR Journals
 
PPTX
First Responders Course - Session 6 - Detection Systems [2004]
Phil Huggins FBCS CITP
 
PPTX
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte
 
PDF
Checking Windows for signs of compromise
Cal Bryant
 
PPT
Hacking Tutorial in Telugu
Sravani Reddy
 
PPT
Op Sy 03 Ch 61
Google
 
PDF
Incident handling is a clearly defined set of procedures to manage and respon...
Varun Mithran
 
PPT
Chapter 09
Google
 
PPTX
How to create correlation rule for threat detection in RuSIEM
Olesya Shelestova
 
PDF
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
NoNameCon
 
DOCX
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
EstelaJeffery653
 
PDF
Fileless Malware Infections
Ramon
 
PDF
An Effective Spam Protection System
Apollo_n
 
PPT
Basic Introduction to hacking
Sainath Volam
 
PPT
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
ManjuAppukuttan2
 
Anton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin
 
Backtracking king05
Dalton Dalton
 
Automated defense from rootkit attacks
UltraUploader
 
Power of logs: practices for network security
Information Technology Society Nepal
 
FireSIGHT Management Center (FMC) slides
Amy Gerrie
 
Compromising windows 8 with metasploit’s exploit
IOSR Journals
 
First Responders Course - Session 6 - Detection Systems [2004]
Phil Huggins FBCS CITP
 
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte
 
Checking Windows for signs of compromise
Cal Bryant
 
Hacking Tutorial in Telugu
Sravani Reddy
 
Op Sy 03 Ch 61
Google
 
Incident handling is a clearly defined set of procedures to manage and respon...
Varun Mithran
 
Chapter 09
Google
 
How to create correlation rule for threat detection in RuSIEM
Olesya Shelestova
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
NoNameCon
 
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
EstelaJeffery653
 
Fileless Malware Infections
Ramon
 
An Effective Spam Protection System
Apollo_n
 
Basic Introduction to hacking
Sainath Volam
 
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
ManjuAppukuttan2
 
Ad

More from Infocyte (6)

PPTX
Threat Hunting 101: Intro to Threat Detection and Incident Response
Infocyte
 
PPTX
Cyber Incident Response Triage - CPX 360 Presentation
Infocyte
 
PPTX
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Infocyte
 
PDF
Infocyte - Q4 Partner Webinar
Infocyte
 
PDF
Cyber Threat Hunting - Hunting in Memory at Scale
Infocyte
 
PDF
Infocyte - Q3 Partner Update
Infocyte
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Infocyte
 
Cyber Incident Response Triage - CPX 360 Presentation
Infocyte
 
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Infocyte
 
Infocyte - Q4 Partner Webinar
Infocyte
 
Cyber Threat Hunting - Hunting in Memory at Scale
Infocyte
 
Infocyte - Q3 Partner Update
Infocyte
 

Recently uploaded (20)

PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
PDF
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
DOCX
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
DevOps & Developer Experience Summer BBQ
AUGNYC
 
PDF
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
PDF
NewMind AI Monthly Chronicles - July 2025
NewMind AI
 
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
Precisely
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
PDF
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
PDF
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
DevOps & Developer Experience Summer BBQ
AUGNYC
 
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
NewMind AI Monthly Chronicles - July 2025
NewMind AI
 
Enable Enterprise-Ready Security on IBM i Systems.pdf
Precisely
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Software Development Company | KodekX
KodekX
 
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 

Infocyte Mid-market Threat and Incident Response Report Webinar

  • 4. Attack Outcomes Respond Hunt • Block what can be blocked • What you detect through monitoring, you must respond quickly. • The rest you must be proactive: hunt and assess :-)
  • 5. Today’s Cyber Attacks are Chained Events Stages of a modern malware attack: 1. Emotet = Go-Wide Trojan (easier to detect) 2. Trickbot = Targeted RAT (harder to detect) 3. Ransomware
  • 8. Infocyte spans the Attack LIfecycle
  • 14. • Dwell Time calculations require earliest timestamp from the initial infection: ○ First system compromised (beachhead) ○ Best done with host-based telemetry Source Details Notes MAC File System Times File Created Time Earliest Timestamp! Infocyte uses this. Windows Event Logs Event ID 4688 (Process Creation) Logs executions but poorly formatted and almost useless for proactive detection Sysmon (or commercial EDR) Event ID 1 (Process Creation) Event ID 2 (File Creation Time Changed) Same as 4688 but Sysmon and EDR events are formatted for remote storage & analysis (e.g. includes hash) ID 2 can help detect time manipulation but is noisy Network IDS/Proxy/FW Event Exploit or C2 events Will indicate some part of the infection chain Calculating Dwell Time (Sources of Time)
  • 15. Potential Issues with Time • Anti-Forensics is a class of techniques used by hackers to dork up forensic analysis such as timeline creation Source Potential Issues Mitigations MAC File System Times ($STANDARD_INFO) Easy to manipulate these timestamps from user-space (aka TimeStomping) 1. Compare to $FILE_INFO 2. Check for absence of sub-second resolution (timestomp doesn’t add this) MAC File System Times ($FILE_INFO) Hard to manipulate but not impossible (i.e. a kernel rootkit) Verify timestamps make sense (not before OS release date or in future) Windows Event Logs Logs can be deleted (modifying event is extremely difficult in Windows 10) Remotely store logs Sysmon (or commercial EDR) Process Start Times are not the earliest timestamps Telemetry != Detection Process start times are good approximations in many attacks but not all. Ensure this was actually the earliest execution Network IDS/Proxy/FW Event Most early exploit events not detected/logged (i.e. email vector) Aggregate ALL network log sources into a super timeline
  • 16. Eliminate threat from network. Example: wipe and reload infected host or delete malware For every threat or vulnerability finding there are three choices for remediation that happen in practice: Don't outright fix but use additional layers of security to reduce the risk/threat. Example: Block C2 at firewall or DNS blackhole Problem: Malware “might” be neutered but still on system (sometimes forever) Fix Accept Remediation Concerns Mitigate The cost of fixing outweighs the risk: Ignore it… (yes, this happens sometimes) Longest dwelling infections found were in this category
  • 18. Command Premium Hunt & IR Support ✓ ✓ ✓ ✓ ✓ Confidential ™
  • 19. ™ ∙ ∙ ∙ ∙ ∙ ∙ ∙
  • 20. Quarterly Reports: - Q3 Report Coming Soon - Refining our methodology while expanding data volume Annual Report 2020 (Summer) - Work with Verizon DBIR - Provide additional rigor to dataset Future Reports