Throughout the duration of COVID-19, there have been consistent rumors of increased nation-state espionage. In parallel, many recent ransomware strains have a COVID-19 tie-in.
Now the United Kingdom's National Cyber Security Centre (NCSC), published an advisory report that the threat group APT29 is targeting governmental, diplomatic, think-tank, healthcare and energy targets for intelligence gain which are involved in COVID-19 vaccines development and testing. APT29 is most likely attributed to the Russian intelligence service.
As an organization within those sectors, you should make sure to establish real-time monitoring and appropriate alerting if you see any Indicator of Compromise (IoC) listed in the NCSC report.
You should not just look into realtime information - but also look back and correlate the threat intelligence information available today with the data from yesterday and last week or maybe even months back. Even if the attack group cleaned up their trails today you are able to identify if they have been in your network and where potentially they still are in and are sleeping. Also, you can identify patient zero - the host or service that was compromised first to get initial access. Going forward that host might still be the weak point in your environment (at least as long as the cyber group hasn’t patched it which wouldn’t be uncommon ;-)).
Security teams should look into uplevelling their security monitoring strategy to not just correlate IoCs - as they are too easy to change for an attacker. They should really look into detecting the behavior and scoring it appropriately.
While you shouldn’t stop looking for IoCs, on the next level you should look into behavior which can be more generally adopted and is way harder for a nation-state or coprorate espionage group to stay hidden.
For example, rather than relying on a list of hash values of malware files (IoCs) you can apply simple analytics such as newly seen or first seen executables based on hash values across your environment. Through this you not just detect brand new malware - you will also quickly detect unwanted programs or updates that went outside your routine process. Similar “new seen” concepts you can apply against data of privileged user logons to systems or applications they never logged on before. The Security Teams at Telia as well as Swisscom are disrupting the kill chain with this data-driven approach. From there you can further develop your prioritization strategy and determine what newly seen activity is worth investigating, or worth investigating first.
If Phase 1 and Phase 2 are happening regularly in your environment and are very time consuming - especially in large heterogeneous technology landscapes, you should think about utilizing SOAR Technology such as Splunk Phantom to automate those actions in a playbook across your cloud and on-prem environments.
Hope this helped you to bring this case to your attention and validate if your organization has been affected.
Best
Matthias
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.