Breaking The Kill Chain: A Defensive Approach

The CISO Perspective
5 Feb 201913:18

Summary

TLDRThe video script delves into the concept of the 'cybersecurity kill chain,' a model developed by Lockheed Martin to outline the steps an attacker must complete to execute a successful cyber attack. The chain consists of seven stages, starting from reconnaissance to actions on objectives. The video emphasizes the importance of disrupting the chain at any point to prevent a breach. It offers a defensive approach using the NIST cybersecurity framework, discussing tools and strategies to create a multi-layered security plan. The script highlights the need for understanding the attacker's playbook, implementing measures like patch management, user awareness, and technical controls to mitigate risks at each stage. It also stresses the significance of post-infection tools, network segmentation, and the zero trust security model to limit damage and enhance detection capabilities. The video concludes by challenging viewers to evaluate their organization's security posture and dwell time, a critical metric for security directors.

Takeaways

  • πŸ” **Reconnaissance**: The first step in a cyber attack is information gathering about the target, which can be done passively (e.g., from public sources) or actively (e.g., probing networks).
  • πŸ›‘οΈ **Defending Against Reconnaissance**: Limiting public exposure of information, disabling unused ports, and using honeypots and firewalls are key defenses against initial attack stages.
  • πŸ”§ **Weaponization**: Attackers use collected information to select or create an exploit for a discovered vulnerability, often utilizing tools like Metasploit or Exploit DB.
  • πŸ› οΈ **Patch Management**: A fundamental defense against weaponization is regular patching, which eliminates vulnerabilities that could be exploited.
  • βœ‰οΈ **Delivery**: The method of delivering the attack can vary widely, including through websites, social media, email, or physical devices like USBs, highlighting the importance of user awareness.
  • 🚫 **Blocking Delivery**: Implementing email authentication methods like DKIM and SPF, web filtering, and disabling unnecessary services can limit an attacker's delivery options.
  • πŸ’₯ **Exploitation**: Once a weapon is delivered, exploitation occurs, which may involve buffer overflows or other forms of attack that execute the attacker's payload.
  • 🚨 **Detection and Prevention**: Data Execution Prevention (DEP), anti-exploit features, and sandboxing can help detect and prevent exploitation attempts.
  • πŸ“ **Installation**: After exploitation, the attacker installs malware for persistent access, which can involve DLL hijacking, RATs, or PowerShell scripts.
  • πŸ”— **Command and Control**: The compromised system is then used to carry out the attacker's objectives, often under the direction of a command and control server.
  • πŸ›οΈ **Segmentation and Isolation**: Network segmentation and micro-segmentation can limit an attacker's ability to move laterally and can help contain the damage of a breach.
  • πŸ”‘ **Zero Trust Model**: Adopting a zero trust security model treats all users as untrusted until proven otherwise, which can significantly enhance detection and response to breaches.

Q & A

  • What is the Cybersecurity Kill Chain?

    -The Cybersecurity Kill Chain is a model developed by Lockheed Martin that describes the seven sequential steps an attacker must complete to carry out a successful attack. These steps include reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

  • What are the two stages of reconnaissance in the Cybersecurity Kill Chain?

    -The two stages of reconnaissance are passive and active. Passive reconnaissance involves gathering information from publicly available sources without interacting with the target, while active reconnaissance includes probing the target's systems to find vulnerabilities.

  • How can an organization defend against passive reconnaissance?

    -Defending against passive reconnaissance involves limiting the amount of detail exposed publicly. This can be achieved by controlling information on job postings, training materials, social media use, and by removing specific error messages from public servers.

  • What is a honey pot and how does it help in cybersecurity?

    -A honey pot is a decoy tool used in cybersecurity that can mimic attractive targets for attackers. It serves to divert attention away from real systems and can help reveal the attackers' intentions and identities without compromising actual data or systems.

  • Why is patch management important in the weaponization stage of the Cybersecurity Kill Chain?

    -Patch management is crucial in the weaponization stage because it involves keeping systems and applications up to date with the latest security patches. This prevents attackers from exploiting known vulnerabilities, as there would be no vulnerabilities left to exploit.

  • What are some technical controls that can be applied to protect against the delivery stage of an attack?

    -Technical controls for the delivery stage include email security measures such as DKIM and SPF to detect spoofed emails, web filtering to prevent access to malicious sites, disabling auto-run features on USBs, and not granting users admin rights to limit the avenues of attack delivery.

  • What is the role of user awareness in defending against the delivery of an attack?

    -User awareness is critical in defending against the delivery of an attack as it involves educating personnel on good security practices. This includes recognizing phishing attempts, understanding the risks of clicking on unknown links, and knowing how to handle emails and attachments safely.

  • How does the exploitation stage differ from the weaponization stage?

    -The weaponization stage involves finding or creating an attack that exploits a vulnerability, while the exploitation stage is where the attack is actually executed. At this point, the attacker has delivered the weapon and is attempting to use it to gain unauthorized access or control over the target system.

  • What is the purpose of the installation phase in the Cybersecurity Kill Chain?

    -The installation phase is where an attacker gains better access to the victim's system by injecting a payload that allows for future control. This could involve installing malware, making registry changes for persistence, or using other techniques to ensure they can maintain access even after the system is rebooted or patched.

  • What is the significance of network segmentation in limiting the damage of a breach?

    -Network segmentation is significant in limiting the damage of a breach because it restricts the lateral movement of an attacker within the network. By isolating different parts of the network, the potential spread of an infection can be contained, making it easier to detect unusual activity and limiting the attacker's access.

  • How does the Zero Trust security model help in the command-and-control phase of the Cybersecurity Kill Chain?

    -The Zero Trust security model assumes that any user or device within the network could be compromised and treats them as untrusted until proven otherwise. This approach helps in detecting infected machines and limiting the damage an attacker can do by eliminating the concept of an 'internal' network that is automatically trusted.

  • What is the dwell time in cybersecurity and why is it a critical metric?

    -Dwell time refers to the length of time an attacker remains active within a network before being detected. It is a critical metric because it indicates how quickly an organization can identify and respond to a security breach. A longer dwell time suggests a slower response to threats, which can lead to more significant damage or data loss.

Outlines

00:00

πŸ” Understanding the Cybersecurity Kill Chain

The video script introduces the Cybersecurity Kill Chain, a model developed by Lockheed Martin to detail the stages of a successful cyber attack. The model consists of seven sequential steps: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. To disrupt an attack, one must break one or more of these steps. The video uses the NIST Cybersecurity Framework as a reference to examine tools that can lead to a multi-layered security plan. The first step, reconnaissance, involves gathering information about the victim, which can be done passively (using public sources) or actively (probing networks). The video emphasizes the importance of limiting public exposure of information and disabling unused ports and services to defend against these initial stages.

05:02

πŸ›‘οΈ Defensive Measures Against the Kill Chain

The script continues by discussing defensive measures against the Cybersecurity Kill Chain. It covers the importance of patch management to prevent weaponization, as unpatched vulnerabilities are a common target for attackers. The video suggests using antivirus software, Intrusion Prevention Systems (IPS), and email security measures to protect against known malware and exploit attempts. It also addresses the delivery stage, emphasizing the role of user awareness in security training and phishing campaigns. Additional protective measures include email authentication methods like SPF and DKIM, web filtering, and disabling unnecessary services to limit the attack surface. The video also touches on the exploitation stage, where the attack is executed, and the installation stage, where the attacker gains better access to the system, suggesting the use of Data Execution Prevention (DEP) and anti-exploit features as last lines of defense.

10:04

🚨 Responding to the Kill Chain: Post-Infection and Incident Response

The video script concludes with the command-and-control and actions on objectives stages of the Cybersecurity Kill Chain. At this point, the system is compromised, and the attacker can execute their intended actions, which may vary based on their motivation. The video discusses strategies to limit the attacker's control and detect unusual activity, such as network segmentation and the use of next-generation firewalls with known command and control server databases. It also highlights the importance of Indicators of Compromise (IOCs) for post-breach detection. The script emphasizes the need for a solid incident response plan and the implementation of a Zero Trust security model to treat all users as untrusted until proven otherwise. The video ends by encouraging viewers to evaluate their organization's security posture at each phase of the kill chain and to consider the dwell time, which is the time an attacker remains undetected within a network.

Mindmap

Keywords

πŸ’‘Cybersecurity Kill Chain

The Cybersecurity Kill Chain is a model developed by Lockheed Martin that outlines the seven stages an attacker goes through to carry out a successful cyber attack. It includes steps like reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. The video uses this model to discuss how to disrupt an attack by breaking one or more of these steps.

πŸ’‘Reconnaissance

Reconnaissance is the first step in the Cybersecurity Kill Chain where an attacker gathers information about the target. It is divided into passive and active stages. Passive reconnaissance involves collecting public information, while active reconnaissance involves probing systems for vulnerabilities. In the video, it is mentioned that defending against this step involves limiting public exposure of information and using tools like firewalls and honey pots.

πŸ’‘Weaponization

Weaponization is the stage where an attacker uses the information gathered during reconnaissance to find or create an exploit that will take advantage of a vulnerability. Common tools used in this stage include Metasploit and Exploit DB. The video emphasizes the importance of patch management as a defense, as it prevents exploitation of patched vulnerabilities.

πŸ’‘Delivery

Delivery is the stage where an attacker attempts to transmit the weapon (exploit) to the target. This can be done through various means such as infected websites, social media, email attachments, or USB drives. The video suggests user awareness and security training, email authentication methods like DKIM and SPF, and web filtering as defenses against this stage.

πŸ’‘Exploitation

Exploitation occurs when the attacker successfully executes the weapon to take advantage of a vulnerability. This could involve techniques like buffer overflow or SQL injection. The video discusses defensive measures like Data Execution Prevention (DEP) and anti-exploit features on antivirus solutions that can serve as a last line of defense.

πŸ’‘Installation

Installation is the phase where a payload is injected to gain better access to the victim's system. This could involve techniques like DLL hijacking or installing a remote access tool (RAT). The video mentions post-infection tools like system file monitoring and User Behavior Analytics (UBA) or Endpoint Detection and Response (EDR) solutions as defenses.

πŸ’‘Command and Control

Command and Control is the stage where the compromised system is under the control of the attacker, who can issue commands to carry out their objectives. The video discusses limiting the attacker's control through network segmentation and using next-generation firewalls to block known command and control servers.

πŸ’‘Actions on Objectives

Actions on Objectives is the final stage where the attacker performs the intended action to achieve their goal, such as data exfiltration or lateral movement within the network. The video talks about using Data Loss Prevention (DLP) or User and Entity Behavior Analytics (UEBA) solutions to prevent data from leaving the network.

πŸ’‘Patch Management

Patch management is a critical defensive measure against weaponization where vulnerabilities are patched to prevent exploitation. The video emphasizes that many breaches occur due to unpatched systems and recommends keeping servers, office macros, JavaScript, and browser plugins up to date.

πŸ’‘User Awareness

User awareness is a key security measure against the delivery stage of the kill chain. It involves training personnel to recognize and avoid potential threats, such as phishing emails or malicious websites. The video highlights the importance of security training and phishing campaigns to educate users on good security practices.

πŸ’‘Zero Trust Security Model

The Zero Trust Security Model is a security framework that removes the concept of trust within an internal network, treating all users as untrusted until proven otherwise. The video discusses how this model can be effective in detecting infected machines and limiting the damage an attacker can cause by isolating them until they are verified as clean.

πŸ’‘Dwell Time

Dwell time refers to the amount of time an attacker remains undetected within a network. The video mentions that the average dwell time is 191 days, indicating the importance of timely detection and response to a security breach. Reducing dwell time is a critical goal for cybersecurity teams.

Highlights

The Cybersecurity Kill Chain is a model developed by Lockheed Martin to describe the steps an attacker must complete for a successful attack.

The model consists of seven sequential steps: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

To disrupt an attack, one or more steps of the kill chain must be broken.

Passive and active reconnaissance are two stages of gathering information about the victim.

Defending against passive reconnaissance involves limiting public exposure of information.

Active reconnaissance involves probing networks and systems for vulnerabilities.

Honey pots can be used as decoys against attackers, revealing their intentions.

Firewalls with IPS capabilities can help protect against active reconnaissance techniques.

Patch management is crucial for defending against the weaponization stage of attacks.

Antivirus and IPS tuned to detect exploit attempts are important during the weaponization stage.

User awareness and security training are vital against the delivery of attacks.

Technical controls like email authentication methods and web filtering can limit delivery channels.

Data Execution Prevention (DEP) and anti-exploit features serve as last lines of defense against exploits.

Sandboxing can detect and block malicious files post-infection.

Isolation techniques and post-infection monitoring tools can help limit the spread of an attack.

Segmentation and micro-segmentation can limit the damage of a breach and ease detection.

Indicators of Compromise (IoCs) are useful for post-breach detection and response.

The Zero Trust security model treats all users as untrusted until proven otherwise, enhancing network security.

The Cybersecurity Kill Chain serves as a blueprint for building a robust cybersecurity program.

Rating security posture at each phase of the kill chain helps organizations assess their readiness against attacks.

Dwell time, the duration an attacker remains undetected in a network, is a critical metric for security effectiveness.

Transcripts

play00:00

first developed by Lockheed Martin the

play00:02

cybersecurity kill chain is a model for

play00:03

describing the steps an attacker must

play00:05

complete to carry out a successful

play00:06

attack the model is made up of seven

play00:09

sequential steps including

play00:10

reconnaissance weaponization delivery

play00:14

exploitation installation command and

play00:17

control and finally actions on

play00:19

objectives to disrupt the attack one or

play00:22

more of these steps must be broken for

play00:23

the entire chain to fail and in order

play00:25

for us to do that we need to understand

play00:26

their playbook using the NIST

play00:28

cybersecurity framework as a reference

play00:29

well look at tools at every phase that

play00:31

will lead to a multi-layered security

play00:32

plan for our organization I'm Andy with

play00:35

the Cecil perspective and this video is

play00:36

called breaking the kill chain a

play00:38

defensive approach reconnaissance the

play00:42

first step of any cybersecurity attack

play00:44

is to gather information about the

play00:45

victim also known as reconnaissance the

play00:48

two different stages of reconnaissance

play00:49

are passive and active during the

play00:51

passive reconnaissance stage an attacker

play00:53

will use indirect methods to gather

play00:54

information from publicly available

play00:55

sources like who is Aaron registrations

play00:58

google show dan job listings and company

play01:01

websites once an attacker has collected

play01:03

as much public information as possible

play01:04

then move on to active reconnaissance

play01:06

this involves some level of interaction

play01:08

with your organization during this phase

play01:10

the attacker will actively probe your

play01:12

networker system looking for open ports

play01:13

and services this includes technical

play01:15

tools like an map for port scanning and

play01:17

banner grabbing and vulnerability

play01:19

scanners now vulnerability scanners are

play01:21

very loud and obvious so attackers will

play01:22

usually limit their scope or slow scan

play01:24

over a period of time to avoid being

play01:26

caught defending against passive

play01:28

reconnaissance means limiting the level

play01:30

of detail we expose publicly that means

play01:32

limiting the information we put on job

play01:33

postings training personnel and

play01:35

acceptable use of social media sites and

play01:37

removing specific error messages from

play01:39

public servers our first protective

play01:41

measure is ensure that unused ports and

play01:43

services are disabled this limits the

play01:45

number of entry points an attacker can

play01:46

use to get into your system honey pots

play01:49

are a great tool that can be used as a

play01:50

decoy against the would-be attacker not

play01:52

only do they divert attention away from

play01:54

real systems but it also reveals what

play01:56

they're after and who they are a

play01:57

firewall with IPS capabilities on the

play01:59

perimeter will provide filtering and

play02:01

segmentation while also monitoring for

play02:03

port scans and banner grabs most

play02:05

next-generation firewalls can block

play02:06

connections from tor networks and known

play02:08

proxy IP addresses which are commonly

play02:10

used during this phage to obfuscate the

play02:12

real IP from Anna

play02:13

hacker the entire goal the

play02:15

reconnaissance phase is to find a

play02:16

weakness that can be exploited

play02:18

once the attacker has found that

play02:19

weakness they can move on to the next

play02:21

step

play02:21

weaponization once an attacker has found

play02:25

a weakness their next step is to find or

play02:27

create an attack that will exploit that

play02:28

vulnerability the weapon of choice will

play02:30

depend on the information they collected

play02:32

from you during the reconnaissance step

play02:33

some commonly used weapons during this

play02:35

phase are tools like Metasploit or

play02:36

exploit DB these are repositories for

play02:39

known exploits the Beal framework which

play02:41

is commonly used to generate evasion

play02:42

code from malware social engineering

play02:44

toolkit if they decided they will

play02:46

deliver the malware through a social

play02:47

engineering campaign and of course many

play02:49

others since this stage is all about

play02:51

what the attacker uses as a weapon we

play02:53

need to have some of the basics covered

play02:54

and that includes things like patch

play02:56

management patch management continues to

play02:58

be one of the best defensive measures

play03:00

against the weaponization stage because

play03:01

you can't exploit a vulnerability if

play03:03

there's no vulnerability to exploit the

play03:05

vast majority of today's breaches are

play03:06

still due to unpatched

play03:08

servers office macros JavaScript browser

play03:11

plugins are all common avenues for an

play03:13

attacker to exploit so disabling these

play03:15

alone will greatly reduce your exposure

play03:17

as well some technical controls we can

play03:19

apply at the stage or things like

play03:21

antivirus on the endpoint and perimeter

play03:22

to protect against known malware an IPS

play03:25

has specifically tuned to look for

play03:26

exploit attempts and not just port

play03:28

scanning and banner grabbing like in the

play03:30

reconnaissance stage an email security

play03:31

that includes antivirus and anti-spyware

play03:36

features that we can enable during this

play03:39

phase the attacker is selecting which

play03:40

tool to use but they haven't actually

play03:42

delivered yet how they deliver the

play03:44

attack is as critical as what they

play03:46

choose for a weapon and that brings us

play03:48

to the third stage delivery by this

play03:50

point the attacker has selected the

play03:52

weapon based on their earlier

play03:53

reconnaissance now the delivery stage is

play03:55

where they try one or multiple avenues

play03:56

to deliver the weapon the delivery of

play03:59

the attack buries by the kind of attack

play04:00

but some common examples can include

play04:02

things like web sites malicious or clean

play04:04

an attacker can infect a legitimate web

play04:06

site they know your users frequent

play04:08

social media user input this means the

play04:11

attacker has some level of interaction

play04:12

with a public server like a web site or

play04:14

a database email if the attacker has

play04:17

found a partner your company uses during

play04:19

the reconnaissance phase they can embed

play04:20

malware into an order form that your

play04:22

employees are more likely to open if

play04:24

they fish the email to make it look like

play04:26

a

play04:26

coming from a partner USB common attacks

play04:29

are believed infected USBs in public

play04:31

areas and around employees cars hoping

play04:33

the temptation for them to put it into

play04:34

their laptop is too much

play04:35

the single best security measure against

play04:37

the delivery of the attack is user

play04:39

awareness this includes security

play04:40

training and phishing campaigns that

play04:42

teaches personnel the basics of good

play04:43

security practices while all the

play04:45

protective measures we discuss in the

play04:47

weaponization stage still apply there's

play04:49

a few extra measures you can take to

play04:50

limit the delivery channels an attacker

play04:52

can use email security but specifically

play04:55

dkm and SPF DCAM an SPF our email

play04:58

authentication methods to detect spoofed

play04:59

emails SPF make sure that emails are

play05:02

coming from an authorized IP of the

play05:03

domain while DCAM uses digital

play05:05

signatures to verify authenticity both

play05:07

techniques help ensure the emails are

play05:09

coming from legitimate authorized

play05:10

channels web filtering can prevent a

play05:12

user from accessing questionable or

play05:14

known bad websites disabling USPS and

play05:17

not giving users admin rights also

play05:18

prevents a big portion on delivery

play05:20

mechanisms and malware's typically use

play05:22

DNS filtering while websites block web

play05:25

requests destined to malicious sites

play05:27

using a DNS security solution can block

play05:29

any DNS lookup attempt to prevent

play05:31

communications over any protocol I

play05:32

always use this in combination with web

play05:35

filtering remember SSL account for the

play05:37

majority of web and email traffic you

play05:39

see today so if you're not doing SSL

play05:40

inspection in all of your delivery

play05:42

channels you may be completely blind to

play05:44

what's passing through that encrypted

play05:45

tunnel exploitation during the

play05:49

exploitation stage the attacker has

play05:51

effectively delivered the weapon of

play05:53

choice to the victim and the attack has

play05:54

been executed this means we have failed

play05:56

to keep the weapon out of our

play05:57

environment and the only thing left for

play05:59

the attacker to do is pull the trigger

play06:00

the actual exploit could come in the

play06:02

form of a buffer overflow a sequel

play06:04

injection malware that was undetected by

play06:07

our antivirus solution a client-side

play06:09

exploit that was executed on an old

play06:10

version of JavaScript and of course many

play06:12

others protective measures are limited

play06:15

once an attacker has been able to

play06:16

execute the exploit but some do exist

play06:18

DEP or data execution prevention is a

play06:21

software and hardware feature which

play06:23

attempts to prevent execution of code in

play06:24

memory where it doesn't belong anti

play06:26

exploit is a feature on some antivirus

play06:28

solutions and monitor known applications

play06:30

for unusual calls to memory both of

play06:32

these techniques acts as a last line of

play06:34

defense against common exploit attempts

play06:35

the reality is when an attacker gets to

play06:37

this point you're relying on post and

play06:39

tools like a sandbox to detect exploits

play06:41

that have already been executed a

play06:43

sandbox has some preventive capabilities

play06:46

depending on the scenario but for most

play06:47

Network environments you have what's

play06:49

called patient zero patient zero refers

play06:51

to the first time an unknown file is

play06:53

seen on the network the first person to

play06:54

download the file would be infected

play06:56

because the malware analysis can take

play06:57

several minutes to complete however once

play07:00

sandbox determines that the file is

play07:01

malicious it can then block that file

play07:03

and protect all your other users it will

play07:05

alert you that the patient zero is

play07:06

infected and you can move on towards

play07:08

your mediation and recovery steps it's

play07:10

worth noting that an exploit takes

play07:12

advantage of some weakness in an

play07:13

application or operating system but it's

play07:15

not the finish line for the attack the

play07:17

goal of the exploit is to gain better

play07:19

access and that leads us to our next

play07:21

step installation the exploitation and

play07:25

the installation phase go hand-in-hand

play07:26

a successful exploit allows me to inject

play07:28

a payload that will give me a better

play07:29

level of access to accomplish my mission

play07:31

from an attackers perspective gaining

play07:34

better access allows me to control the

play07:35

victim at any point in the future even

play07:37

after a system has been patched or

play07:39

rebooted some common payload and

play07:41

techniques during the stage involve DLL

play07:42

hijacking injecting meterpreter or

play07:45

similar payload installing a remote

play07:47

access tool otherwise known as rat

play07:49

registry changes to make a program

play07:51

automatically startup or persistent and

play07:53

executing PowerShell in file this

play07:55

attacks once an attacker has gotten this

play07:57

far into the system very limited

play07:59

protective tools exist Linux based

play08:01

systems can use chroot jail as a way to

play08:04

isolate processes from the rest of

play08:05

system and in this way limiting the

play08:07

amount of data the malicious file has

play08:08

access to Windows based systems can

play08:10

disable PowerShell altogether on systems

play08:12

that don't require it fortunately we

play08:14

have really good post-infection tools we

play08:16

can use at this stage the monitor system

play08:18

files a registry for unusual activities

play08:20

a good UBA or EDR solution should flag

play08:23

any new unauthorized program that has

play08:25

been installed as well as detect any

play08:27

changes to registry and system processes

play08:29

the unauthorized changes to system

play08:31

processes and registries should cause a

play08:33

log and alert to go off and way before

play08:35

you get to this stage your team should

play08:37

already have an SOP or plan for this

play08:38

type of event this includes things like

play08:40

identifying if the device is

play08:41

mission-critical removing the device

play08:44

from the network changing all

play08:45

credentials for users that were logged

play08:46

in and so on once a system is determined

play08:49

to be infected you can then begin the

play08:51

process of restoring that system to a

play08:52

known

play08:53

State command-and-control at this stage

play08:56

the system has been completely

play08:58

compromised and in control of the

play09:00

attacker if they completed the previous

play09:01

steps correctly their access is

play09:03

persistent even if you reboot or passive

play09:05

vulnerability the infected device could

play09:07

immediately be used to carry out the

play09:09

mission or it could sit back and wait

play09:10

for further instructions from its

play09:12

command and control server or defended

play09:14

tactics are going to be around limiting

play09:15

what they can control and detecting

play09:17

unusual activity limiting the damage of

play09:20

a breach starts with segmentation

play09:21

segmentation will make it harder for the

play09:23

attacker to move laterally and easier to

play09:25

detect using audit logs if you have the

play09:27

ability to do micro segmentation through

play09:29

a zero trust security model even better

play09:31

this would essentially leave the

play09:32

infected user completely isolated on a

play09:34

port until they can verify the machine

play09:36

is clean and have been authenticated as

play09:38

for technical controls most

play09:40

next-generation firewalls have a

play09:41

database of known command and control

play09:42

servers enabling this feature will help

play09:44

lock remote access from known bad actors

play09:46

there are also many free and paid DNS

play09:48

servers that offer botnet and command

play09:50

control protection at the DNS level

play09:52

attackers will often use evasion

play09:53

techniques such as DBA or fast flux to

play09:56

generate a large number of domains that

play09:57

are used as rendevouz blocking access to

play10:00

recently observed domains will stop

play10:01

connections to these common hubs well on

play10:04

the topic of next-generation firewalls

play10:05

make sure you're using layer 7

play10:07

application control to block commonly

play10:08

known remote access tools like telnet

play10:10

SSH netcat PowerShell RDP and various

play10:14

other protocols you really have no

play10:15

business leaving your network if you do

play10:17

have business case for using these tools

play10:19

try to lock it down to specific IP

play10:21

addresses an attacker will almost always

play10:23

use encrypted connections to avoid being

play10:25

caught so if you're not doing full SSL

play10:27

deep packet inspection you're completely

play10:29

blind to any communication attempts

play10:31

going through that tunnel for detection

play10:33

indicators of compromised or I OCS are

play10:36

excellent post detective tools as well

play10:37

an IOC is an observed behavior by a user

play10:40

server that are indicative of a breach

play10:42

io sees can be observed and collected on

play10:44

the endpoint or could be collected by a

play10:46

syn device with an IO C feed actions on

play10:50

objective with the machine now infected

play10:52

and the attacker in full control they

play10:54

can now execute the action to achieve

play10:56

their objective the action is predicated

play10:58

by the motivation of the attacker so

play11:00

understanding the type of attacker that

play11:01

could be targeting your organization is

play11:03

critical attackers could be motivated by

play11:05

financial reasons

play11:06

little nation-state malicious insiders

play11:09

are simply wanting to move laterally to

play11:11

go after a more important system on the

play11:13

network if the goal is data exfiltration

play11:15

we can look into tools that prevent data

play11:17

from moving off of the endpoint or

play11:19

server on endpoint tools like DLP or UVA

play11:22

solutions have complementary features to

play11:24

detect and prevent specific files from

play11:25

moving off the network the problem is if

play11:27

an attacker has already gained access to

play11:29

your system doing something as simple as

play11:31

a screen shot on a protected document

play11:32

would not be detected by most of these

play11:34

tools lateral movement is a common step

play11:36

for an attacker to take once it being

play11:38

access into a system at which point they

play11:40

begin their reconnaissance stage all

play11:41

over again to gain information about the

play11:43

internal network this is why network

play11:45

segmentation between different clearance

play11:46

levels is so important to a network

play11:48

design the zero truss security model is

play11:51

built around the idea that eventually

play11:52

we're all gonna fall victim to this

play11:53

stage of the kill chain by removing the

play11:55

idea of trust on your inside network you

play11:58

can treat all users as untrusted until

play12:00

proven otherwise well we won't go into

play12:02

detail the zero trust security model

play12:03

this model is very effective at

play12:05

detecting infected machines and limiting

play12:07

the damage that can be done by the

play12:08

attacker once a compromised machine is

play12:10

identified you can begin your incident

play12:12

response planning and eventually reimage

play12:14

the system before putting it back on

play12:15

your network the seaso perspective the

play12:19

kill chain is more than just a model for

play12:21

how an attack is executed it's also a

play12:23

blueprint for building a good

play12:24

cybersecurity program by using multiple

play12:26

layers of security throughout each phase

play12:28

we make it more more challenging for the

play12:29

attack to be successful and that by

play12:31

itself may be a victory because so many

play12:33

attacks are just opportunistic in nature

play12:35

the challenge I always give my clients

play12:37

is to rate their security posture from 1

play12:39

to 10 at each phase of the chain

play12:40

how would your organization deal with an

play12:42

attack who got all the way through to

play12:44

the installation phase do you have the

play12:46

processes in place I could detect that

play12:47

if so how long would the attacker sit in

play12:50

that phase before it's remediated

play12:51

minutes hours days dwell time is the

play12:54

length of time an attackers active

play12:56

inside the network before being detected

play12:58

for C cells and security directors this

play13:00

is a critical metric to follow according

play13:02

to a report by the Ponte Motta Institute

play13:04

and IBM the average dwell time is a

play13:06

hundred and ninety-one days now in the

play13:08

video on that scary statistic and I hope

play13:10

you found all of this informative please

play13:12

comment hit like subscribe to stay on

play13:14

top of all of our latest releases here

play13:15

at the seaso perspective

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
CybersecurityKill ChainDefensive StrategyAttack LifecycleReconnaissanceWeaponizationDeliveryExploitationInstallationCommand ControlActions on ObjectivesCyber DefenseSecurity FrameworkThreat MitigationNetwork SecurityVulnerability ManagementSocial EngineeringPatch ManagementUser AwarenessAntivirusIPSEmail SecurityWeb FilteringDNS ProtectionData Execution PreventionMalware AnalysisZero Trust ModelIncident ResponseDwell Time