Howdy, folks!
A new month, so a new list of security picks! Splunk security nerds (employees and customers) like to make things. They like to make LOTS of things. But sometimes... they get lost! So as we promised in January, we are bringing you some golden security nuggets you might not have seen before. These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read.
If you would like to read other months, check out our monthly staff security picks and our all-time best picks for security books and articles. Enjoy!
XlBCW0BFU15mW0BGX | First Round of MITRE ATT&CK™ Evaluations by Frank Duff MITRE’s ATT&CK Framework just keeps getting better and better. The most recent addition comes in the form of the First Round of MITRE ATT&CK™ Evaluations which were released in late November. The results of the product evaluations are fascinating to read; however I'm just as impressed by the methodology the team employed throughout the process. First off, kudos to MITRE for emphasizing transparency and carefully explaining the challenges inherent in performing such evaluations. I also like how the team took it as an opportunity to show how to use a single adversary group as a mechanism for selecting tactics to use in the test. That approach makes sense both for these evaluations and for organizations looking to put the ATT&CK Framework to use in their own security programs. |
NLXV1MW0BLXV1CW2 | This Is the Fastest Way to Hunt Windows Endpoints by Michael Gough September is a crazy time of year between the start of the school year, the boy’s hockey and prepping for .conf, and so it wasn’t realistic for me to head to New Orleans for the SANS Threat Hunting Summit as much as I would have loved to go. Fortunately, the good folks at SANS posted the summit presentations, and there is quite a treasure trove of goodness. While there is a lot of phenomenal content, I wanted to highlight Michael Gough's talk "This Is the Fastest Way to Hunt Windows Endpoints.” Michael has done a tremendous amount of work around Windows logging and maintains a great set of cheat sheets that should be used as references for those working with Windows events. During his talk, he introduces his latest cheat sheet that maps the MITRE ATT&CK framework, all 11 tactics, and 187 techniques, to Windows Event codes, Microsoft Sysmon and LOG-MD for Windows 7/8/10 and Server 2008R2/2012! Michael provides guidance around hunting using event logs as well as specific event codes to start with, which is great for folks just getting started or as a refresher for those who have been hunting Windows events and want to make sure they have the most important events covered. He also discusses the importance of looking for malicious auto-runs and other badness in the registry, files, and directories to eliminate the known bad to help focus your hunt. As we have talked previously, Windows events provide great insights, and Michael's presentation is definitely one you should check out! |
UBGXV1CWE5GXV1CVU | Internet Vulnerability Takes Down Google by Ameet Naik On November 12, a misconfiguration at a Nigerian ISP that resulted in US traffic to G-Suite being routed to China once again revealed the fragility of Border Gateway Protocol (BGP), one of the Internet's core routing protocols. BGP hijacks fascinate me for three reasons—the ease with which they seem to (continually) happen, the potential scale of impact, and the often utter ambiguity as to why they occur. While this incident appears to be non-malicious, Thousand Eyes cites previous route hijacks that resulted in cryptocurrency theft and targeted financial-sector traffic inspection (for what reason, nobody knows…). The complexity and dynamism of Enterprise environments inevitably lead to challenging problems for security operations teams to solve. Would your security and network team know if your organization's traffic was hijacked? What if, in the case of the financial-sector interception, your traffic ultimately ended-up at it's intended destination, albeit via a different (potentially malicious) route? How would you detect similar routing anomalies and—possibly more importantly—how would you respond were you to be impacted by one? |
WEBhXV1CW0NFU15Cf0BFXl | On the 6th of September, British Airways reported a breach of approximately 380,000 stolen (or skimmed) credit card details and personal information. Looking at some of the evidence the attack appears to be consistent with the threat group Magecart according to Yonathan Klijnsma at RiskIQ. I'm choosing this report for a number of reasons; firstly, British Airways are the biggest provider of flights here in the UK, so it's prevalent domestically. Secondly, because Yonathan does a great job of outlining the details of the attack including code snippets, staged infrastructure details, and other tactics used. Lastly because whilst any breach isn't good for consumers, I think BA actually did a great job of noticing the attack in 15 days. While we could argue they might have been sleeping for 14 of them, if we compare it against the median dwell time reported in the 2018 M-Trends report of 101 days then I think the security community should praise some of the quality of the team. |
WEBFXl5mWENFU15MWE5FX | Throughout the start of 2018, The Citizen Lab uncovered many malicious uses of deep packet inspection tools to inject redirects into HTTP traffic, pointing users to malicious downloads or to revenue-generating ads and browser-based cryptocurrency mining scripts. Their report on the finding is a great read, not only because it reads like the plot of a best-selling spy novel, but also because it gives us insight into the use of DPI tools, the importance of HTTPS, and brings up the interesting moral implications of interacting with users traffic. For those of you who work for organizations that deliver products or services to customers, the report helps to emphasize the importance of implementing encryption and security measures to limit the impact external malicious actors can have on our content. For the rest of us, it's a great reminder of how the work we do in security on a daily basis has essential implications on a broader scale. The Citizen Lab continues to do a top-tier job, and this content is no exception. Definitely take the time to read this one, and check out https://citizenlab.ca/about/ for more information about the lab and its work. |
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.