anatomy of a government red team assessment
play

ANATOMY OF A GOVERNMENT RED TEAM ASSESSMENT Jason Hill 1 May 20, - PowerPoint PPT Presentation

C I S A | C Y B E R S E C U R I T Y A N D I N F R A S T R U C T U R E S E C U R I T Y A G E N C Y ANATOMY OF A GOVERNMENT RED TEAM ASSESSMENT Jason Hill 1 May 20, 2019 TLP:WHITE AGENDA Who am I CISA Assessments Services and Goals


  1. C I S A | C Y B E R S E C U R I T Y A N D I N F R A S T R U C T U R E S E C U R I T Y A G E N C Y ANATOMY OF A GOVERNMENT RED TEAM ASSESSMENT Jason Hill 1 May 20, 2019

  2. TLP:WHITE AGENDA § Who am I § CISA Assessments Services and Goals § Red Team Assessments (RTA) – Methodology § RTA Walkthrough – Actual Assessment § Questions Jason Hill 2 May 20, 2019

  3. TLP:WHITE WHO AM I § Jason Hill § Branch Chief NCATS § VA National Guard (retired) – Cyber § Red Team Lead Jason Hill 3 May 20, 2019

  4. TLP:WHITE CISA ASSESSMENT SERVICES If vulnerability is the only element of risk that we can eliminate …. Cyber Risk Advanced Hygiene Evaluation Operations • Open Source • Risk and Vulnerability • Critical Product Intelligence Monitoring Assessments Evaluation • Phishing Campaigns • Validated Architecture • Red Team Assessments and Assessments Design Reviews • System & Application Vulnerability Scanning • Remote Penetration Testing .... lets focus on proactive elimination of vulnerability to reduce risk Jason Hill 4 May 20, 2019

  5. TLP:WHITE CISA ASSESSMENT GOALS Jason Hill 5 May 20, 2019

  6. TLP:WHITE RED TEAM ASSESSMENT (RTA) Jason Hill 6 May 20, 2019

  7. TLP:WHITE RTA VS PENTEST Jason Hill 7 May 20, 2019

  8. TLP:WHITE INFRASTRUCTURE Jason Hill 8 May 20, 2019

  9. TLP:WHITE DOMAINS Jason Hill 9 May 20, 2019

  10. TLP:WHITE METHODOLOGY Jason Hill 10 May 20, 2019

  11. TLP:WHITE AGENCY X § Large Government Agency § Multiple sub agencies § Between 1 and 1,000,000 employees § Several Sensitive Business Systems (SBS) § Responsible for ICS systems Jason Hill 11 May 20, 2019

  12. TLP:WHITE TIMELINE OF OPERATIONS Jason Hill 12 May 20, 2019

  13. TLP:WHITE RECON Ø Utilize public information to find anything that would aid in penetrating the network Ø Utilize Cyber Hygiene results due to time constraints Ø Identify Department personnel responsible for public interactions Ø Utilize Department online presence for information leading to network access Ø Utilize public information to create target list of Sensitive Business Systems (SBS) Ø Look for information the Department is responsible for safeguarding Ø Find critical infrastructure maintained by the Department Jason Hill 13 May 20, 2019

  14. TLP:WHITE EXPLOITATION Ø Delivered phishing e-mails containing a malicious link Ø Agency X user clicked the RTA supplied link and executed our payload Ø Initial foothold into the Agency X domain Ø Sub Agency X user clicked the RTA supplied link and executed our payload Ø Initial foothold into the Sub Agency X domain Jason Hill 14 May 20, 2019

  15. TLP:WHITE Phishing Payload Ø Email contained link to HTA file on NCATS controlled Amazon EC2 Server Ø HTA was stageless payload that calls back to Cobalt Strike C2 server over DNS Ø Payload spawns new iexplore.exe and runs Cobalt Strike shellcode Payload converted to Jscript using DotNetToJScript 1 Ø 1 https://github.com/tyranid/DotNetToJScript Jason Hill May 20, 2019

  16. TLP:WHITE PHISHING – BUILD TRUST Jason Hill 16 May 20, 2019

  17. TLP:WHITE PHISHING - BUILD TRUST Jason Hill 17 May 20, 2019

  18. TLP:WHITE PERSISTENCE Jason Hill 18 May 20, 2019

  19. TLP:WHITE USER LEVEL PERSISTENCE Ø Compiled custom DLL to spawn msinfo32.exe process and injects in Cobalt Strike Shellcode Ø Code implemented in “UnRegisterClass” method Ø RegAsm.exe is Microsoft Signed Binary that will execute code in DLL’s UnRegisterClass Ø Created registry run key that calls RegAsm.exe with argument of custom DLL Ø Registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Jason Hill May 20, 2019

  20. TLP:WHITE PRIVILEGE ESCALATION Jason Hill 20 May 20, 2019

  21. TLP:WHITE KERBEROASTING Ø SPN MSSQLSvc/-XXX.XXX.net:1433 is associated with Service Account XXX\XXXXXsql Ø Able to decrypt TGS ticket and ‘crack’ service account password Jason Hill 21 May 20, 2019

  22. TLP:WHITE ADMIN COMPROMISE Ø Administrative user logged into compromised XXXSQL host Ø User is part of XXX-SYSOPS group Ø User has admin access on (most) SUB AGENCY X hosts Jason Hill May 20, 2019

  23. TLP:WHITE POST EXPLOITATION Jason Hill 23 May 20, 2019

  24. TLP:WHITE POST EXPLOITATION Jason Hill 24 May 20, 2019

  25. TLP:WHITE IR EVENTS So did they do anything? Jason Hill 25 May 20, 2019

  26. TLP:WHITE IR Event 1: Domain Enumeration Ø September 11 th Ø 0914 EST – Received initial callback from phished user Ø 0917 EST – Likely triggered anti-virus when trying to execute persistence executable Ø 0945 EST – Uploaded and installed a DLL as a second method of persistence Ø This method of persistence was used in other parts of the network during operations Ø 1025 EST – Requested TGS tickets for all SPNs associated with user accounts throughout the entire forest Ø 1052 EST – Requested AD information for all users and groups within AgencyX.Gov Ø 1625 EST – Last communications received from phished user’s machine Ø 1625 EST – Assumed IR action TGS Ticket DOI Workstation Domain Requests Controller Jason Hill May 20, 2019

  27. TLP:WHITE IR Event 2: Suspicious Account Enumeration Ø NCATS noticed an e-mail suggesting investigation into XXXXXOC.XXX.GOV Ø September 18 th Ø 1025 EST – NCATS observed an e-mail titled “Suspicious Account Enumeration” referencing (COMPUTER NAME) Ø 1037 EST – A list of all installed software on that machine was requested by administrators Ø 1037 EST – An e-mail was drafted to the phished user of (COMPUTER NAME), asking for information on the activities Ø 1040 EST – NCATS removed persistence from the machine Ø 1104 EST – IT Staff requested an ad-hoc anti-virus scan of the host Jason Hill May 20, 2019

  28. TLP:WHITE IR Event 3: Pass-the-Hash Detection Ø FireEye alerts on malicious activity for (COMPUTER NAME) Ø September 13 th 1820 EST – NCATS used a default “Pass-the-Hash” command to impersonate AGENCYX\USER using the user’s NTLM hash Ø 1822 EST – NCATS proceeded to use these credentials to laterally move to (ANOTHER COMPUTER) Ø Ø September 18 th Ø 1502 EST – An e-mail was seen from AGENCYX IT Staff inquiring about an alert from FireEye about a ”BACKDOOR” Jason Hill May 20, 2019

  29. TLP:WHITE MEL Detection Times Ø 4 out of 13 MELs confirmed as detected: Ø Active Directory Account Addition (Domain Administrator): Ø Time To Response (TTR) - 24 Hours Ø Response – 06NOV18 Agencty X PoC reached out about the possible creation of a Domain Admin account by NCATS Ø Agency X was preparing to respond by shutting off internet access to the forest, and ‘rolling’ the krbtgt account password twice on all domains Ø DHS suggested not taking those steps, and NCATS proceeded AS IF those steps were taken Ø DA Logging into a Workstation Ø TTR – 4 Days Ø Response – Received phone call about DA logon events from Agency X PoC Ø No further response was observed by DHS Jason Hill May 20, 2019

  30. TLP:WHITE MEL Detection Times Ø 4 out of 13 MELs confirmed: Ø Intentional A/V triggering on a DC Ø TTR – Instant technology response Ø Response – The malicious file was immediately deleted when it was uploaded Ø No further response was observed by DHS Ø Ransomware Emulation: Ø TTR – 1.5 Hours Ø Response – By 1930 EST on 11/07/2018, 3 users had notified the Agency X team of possible malware on the users’ workstation Ø The team from Agency X contacted NCATS for deconfliction Jason Hill May 20, 2019

  31. TLP:WHITE MEL Conclusions Ø 13 Measurable Events executed Ø MEL activity began 30 October 2018 Ø MEL activity completed 07 November 2018 Ø 4 of 13 Measurable Events were observed to have a detection by Agency X Ø 1 of 4 was a technology based response Ø 3 of 4 were people based responses Ø Internal MELs were not often detected, showing a few common deficiencies Notable events include: Ø People : Once alerted, action was taken to mitigate some compromised accounts Ø Processes : Follow-up to detected events seemed incomplete in some cases Ø Technology : Technologies detected and reacted to a small number of events Jason Hill May 20, 2019

  32. TLP:WHITE QUESTIONS ? Jason Hill 32 May 20, 2019

  33. For more information: cisa.gov Questions? Email: NCATS_INFO@HQ.DHS.GOV Jason Hill 33 May 20, 2019

  34. Jason Hill May 20, 2019

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend