Our Views:
This month’s theme is “Electronic Incident Control Rooms”.
Successfully managing a cyber incident is crucial to minimising the impact of any compromise. When asking what ‘Good’ looks like, it is reducing recovery costs, avoiding potential liabilities, and recovering to business as usual quickly. In our day-to-day jobs as incident responders and forensic examiners, we cannot stress the importance of having a structured plan to achieve this and manage any crisis effectively. However, we have also witnessed first-hand, both during active events and through our cyber simulations, the collaboration challenges involved when managing a cyber incident. Challenges that we have seen repeatedly rearing their heads for organisations during this process include:
- Selecting appropriate communication and collaboration tools: Do all Cyber Incident Response Team (CIRT) members have access to the chosen tools? Does everyone know we are using X tool? What happens if our systems are down due to a cyber-attack? What happens if we are all working from home or in multiple locations? How do we add all the relevant people to the communication group when time is of the essence?
- Difficulties in securely sharing critical information: How can we ensure everyone has access to the information they need during an incident? How can we review what has already been done? Where can we post files so that partners and third parties can view these? How can we keep track of material up to date?
- Challenges with keeping track of progress through the Incident Management Plan: Do all key stakeholders hold a printed copy of the Incident Response plan? What page are we on now? Where do I find this information?
- Difficulties with managing actions and decisions and providing visibility of information: Who is doing what right now? Was that decision made? When and why did we decide this?
- Lengthy update meetings and stand-ups: How do we spend less time keeping everyone up to date and more time responding?
- Plan updates and playbooks: When was the plan last updated? What actions do we take for this new type of attack?
- Reporting and post-incident review: Did anyone save the whiteboard notes? Who knows when the first notification came through?
Whilst much of the magic involved with a smooth response comes down to knowledge, experience, and strong incident responder skills, we know and endorse the benefits of a pre-prepared cloud-based incident response control room.
Advantages also include:
- The ability to quickly add new playbooks based on new threats: An electronic control room grants the ability to dynamically change and update information in real-time and add new playbooks when required. For example, we recently developed a Microsoft Exchange Server playbook in response to the developing threat. This playbook was invaluable in saving time in responding to these compromises.
- Provides a single source of truth: The electronic control room becomes the location for the plan, playbooks, actions, meetings, minutes, documents and any other information related to the active incident. The whole team can see immediately what actions are assigned to them, what has been completed and what is yet to be done.
- Allows secure collaboration: Secure access can be easily granted to all parties needing to collaborate in an incident regardless of where everyone is located. Various areas can also be locked down where necessary to smaller groups. Hosted out of your network, the electronic control is always available even should your systems be impacted.
- Post-Incident Review: All information captured within the control room can be archived, providing an auditable record of all actions taken throughout the incident.
As managing a complex cyber incident can be daunting, we recommend setting up a pre-configured control room ready to go should the worst happen. With a small amount of preparation, this will aid a smooth and successful response to any cyber incident your business may face.
Critical Advisory:
Overview
Beginning the week of 1st March 2021, Microsoft and others in the security industry have seen an unprecedented number of cyber-attacks on on-premises Microsoft Exchange servers. In the attacks observed, the threat actor used multiple, previously unknown vulnerabilities to access email data allowing the installation of additional malware to facilitate long-term access to victims’ environments. Presently, the vulnerabilities are limited to Microsoft Exchange email servers that are ‘on-premise’, Exchange Online (MS365) is not known to be vulnerable to these attacks.
While researchers initially suggested that this cyber-attack began as a nation-state attack, over recent days there is increasing evidence to suggest that the same vulnerabilities are being exploited by multiple cybercrime groups, including the threat of ransomware attacks along with the potential of other malicious activities. Microsoft consider this to be a “broad attack and the severity of these exploits means protecting your systems is critical”. Such protection includes the use of traditional tools to update software, but with a heightened approach. Accordingly, Microsoft are providing specific updates for older and out-of-support software so you can update your systems more easily and quickly protect your business.
Read more and stay up to date by visiting our Cyber Security and Incident Response Advisory here.
On 25 March, the Microsoft 365 Defender Threat Intelligence Team published detailed guidance on their threat intelligence to help detect and evict threat actors from affected environments. Microsoft note that many of the compromised systems have not yet received a secondary action, such as human-operated ransomware attacks or data exfiltration, indicating attackers could be establishing and keeping their access for potential later actions. These actions might involve performing follow-on attacks via persistence on Exchange servers they have already compromised, or using credentials and data stolen during these attacks to compromise networks through other entry vectors. Specific examples of post-exploitation activity include DoejoCrypt ransomware, Lemon Duck botnet and Pydomer ransomware.
Credential theft, reconnaissance and persistence (For Technical Staff)
- Exchange servers potentially contain highly privileged credentials making them an attractive target
- Built in Windows functionality can be used to harvest credentials such as using the comsvcs.dll to dump the LSASS process
- Built-in Exchange commandlets and dsquery can be used to exfiltrate information about network configurations, users and email assets
- Attackers are using ‘malwareless’ persistence mechanisms such as enabling RDP, installing shadow IT tools and creating local administrator accounts
Defending against exploits and post-exploitation activity (For Technical Staff)
- Investigate internet facing Exchange servers for any evidence of malicious activity regardless of whether or not they have been patched
- Look for the presence of web shells by following Microsoft’s guidance and running the Microsoft Safety Scanner tool to detect and remove malicious applications
- Review Active Directory and local user/group configurations for new account creation and privilege escalation activities. New user creations are represented by Windows Event ID 4720.
- Reset domain user passwords including service accounts and Kerberos
- Reset local administrator passwords and consider using a tool such as LAPS to manage these
- Review RDP, firewall, WMI subscriptions, and Windows Remote Management (WinRM) configuration for changes that may allow an attacker to maintain persistence
- Review the Windows Event log for Event ID 1102 which indicates that logs have been cleared
- Review services, scheduled tasks and startup items for suspicious entries that may serve as persistence mechanisms
- Look for the installation of Shadow IT tools that may be used for persistence such as non-Microsoft remote access tools, e.g. Teamviewer, Anydesk, VNC clients etc
- Review mailbox forwarding, inbox rules and Exchange Transport rules for any suspicious entries
About the Bulletin:
The NZ Incident Response Bulletin is a monthly high-level executive summary containing some of the most important news articles that have been published on Forensic and Cyber Security matters during the last month. Also included are articles written by Incident Response Solutions, covering topical matters. Each article contains a brief summary and if possible, includes a linked reference on the web for detailed information. The purpose of this resource is to assist Executives in keeping up to date from a high-level perspective with a sample of the latest Forensic and Cyber Security news.
To subscribe or to submit a contribution for an upcoming Bulletin, please either visit https://incidentresponse.co.nz/bulletin or send an email to bulletin@incidentresponse.co.nz with the subject line either “Subscribe”, “Unsubscribe”, or if you think there is something worth reporting, “Contribution”, along with the Webpage or URL in the contents. Access our Privacy Policy.
This Bulletin is prepared for general guidance and does not constitute formal advice. This information should not be relied on without obtaining specific formal advice. We do not make any representation as to the accuracy or completeness of the information contained within this Bulletin. Incident Response Solutions Limited does not accept any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, when relying on the information contained in this Bulletin or for any decision based on it.
