Current: Dragos Adversary Hunter Previous: Los Alamos National - - PowerPoint PPT Presentation

current dragos adversary hunter
SMART_READER_LITE
LIVE PREVIEW

Current: Dragos Adversary Hunter Previous: Los Alamos National - - PowerPoint PPT Presentation

Joe Slowik, Threat Intelligence & Hunter Current: Dragos Adversary Hunter Previous: Los Alamos National Lab: IR Lead US Navy: Information Warfare Officer University of Chicago: Philosophy Drop-Out Typical Attribution


slide-1
SLIDE 1
slide-2
SLIDE 2
slide-3
SLIDE 3
  • Joe Slowik, Threat Intelligence & Hunter
  • Current: Dragos Adversary Hunter
  • Previous:
  • Los Alamos National Lab: IR Lead
  • US Navy: Information Warfare Officer
  • University of Chicago: Philosophy Drop-Out
slide-4
SLIDE 4
  • Typical Attribution
  • Purpose of Attribution
  • Defining Activity Groups
  • Behavior-Focused Attribution
  • Examples
slide-5
SLIDE 5
  • Attribution typically

focuses on ‘who’

  • Identify signifying

details in data

  • Tie these back to a

concrete entity

slide-6
SLIDE 6
  • Satisfies a primal human need
  • Who is responsible
  • Frames matters in a way that is easily

understood

  • Actor X is responsible for Event Y
slide-7
SLIDE 7
  • Attribution is really hard!
  • Typically collection only consists of

technical artifacts

  • Obscures underlying actions and events
  • Leads to cognitive bias
  • Of course Country X performed action Y
slide-8
SLIDE 8
  • Attribution can get ‘just far enough’ to

blame a ‘country’

  • And take the resulting media ‘bump’
  • But not far enough to develop

meaningful breakdown of responsibility

slide-9
SLIDE 9
slide-10
SLIDE 10
  • What does knowing Country X is

responsible for Event Y tell you?

  • From a network defense perspective:
  • Likely nothing
  • Or, potentially damaging due to

assumptions about Country X

slide-11
SLIDE 11
  • Determining who is responsible has

specific value – but not for defense

  • Identifying how an attack took place

informs network defense

slide-12
SLIDE 12
  • Align resources, identify TTPs, focus

defense

  • If it doesn’t inform or benefit defense,

what’s the point?

slide-13
SLIDE 13

Attack Takes Place

  • Capture Data
  • Record Context

Analysis & Production

  • Transition Data

to Information

  • Formulate

Conclusions

Develop Conception

  • f Adversary
  • How Does

Adversary Act?

  • What are Targets,

Intentions, and Infrastructure?

slide-14
SLIDE 14

Intelligence

  • Track how the adversary operates
  • Learn to anticipate activity

Playbooks

  • Based on actions, define responses
  • Create SOPs for defense

Remediation

  • Knowing capabilities informs response
  • Reduce time to remediation
slide-15
SLIDE 15
  • Ultimately:
  • Prepare and enable defenders
  • Improve defenses, anticipate attacks
  • Other items are superfluous
  • Flashy media headlines
  • Provocative stories
slide-16
SLIDE 16
  • Methodology for defining actors by

actions

  • Distinct from traditional attribution:
  • Focus on the how
  • The who is in many ways irrelevant
slide-17
SLIDE 17
  • Focus on observable items from events
  • Avoids speculation, inferring intention
  • Resulting picture is a composite for how

an attack took place

slide-18
SLIDE 18

Command Authority Operations Group A Operations Group B Operations Group C Development Teams

slide-19
SLIDE 19
  • Traditional attribution focuses on

readily observed items:

  • Malware
  • C2
  • As a result, focuses on development

teams

  • Less relevance to operations
slide-20
SLIDE 20
  • Operations teams can mean many

things:

  • Different military units
  • Contractors
  • Etc.
  • Main point: different elements

implementing common capabilities

slide-21
SLIDE 21
  • Different operations teams can use

similar toolset for different operations

  • Behavioral approach enables
  • perations tracking
  • Goal: identify operations teams by

behavior and objective

slide-22
SLIDE 22

http://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf

slide-23
SLIDE 23
slide-24
SLIDE 24

The ‘who’ – just one part of whole

slide-25
SLIDE 25

What enables the attack – relevant to target environment The required connection between adversary and victim

slide-26
SLIDE 26

Purpose and focus for the action

slide-27
SLIDE 27
  • Analysis primarily focuses on technical
  • bservations:
  • Infrastructure
  • Capabilities
  • ‘Adversary’ can be abstracted, ‘victim’

useful for parsing campaigns

slide-28
SLIDE 28
  • The means through which a capability is

executed

  • Provides the link from Adversary to

Victim

  • Can be characterized as atomic or

behavioral

slide-29
SLIDE 29
  • Typical ‘IOCs’:
  • IP addresses
  • Domain names
  • Relevant to an identified event
  • Not helpful for characterizing future

activity

slide-30
SLIDE 30
  • Trends and patterns
  • Less likely to change, longer lasting
  • Examples:
  • SSL certificate creation
  • Infrastructure types and themes
slide-31
SLIDE 31
  • Compromised vs. Owned Infrastructure
  • Hosting and registration patterns
  • SSL certificate re-use
slide-32
SLIDE 32
  • What an adversary utilizes to achieve
  • bjective against victim
  • Primarily behavioral in nature when

properly implemented

  • Can include indications of intent
slide-33
SLIDE 33
  • An ‘atomic capability’ is simply an
  • bservation from a specific

instantiation of that capability

  • Examples:
  • Hash value
  • File name
  • Easily changed, highly mutable
slide-34
SLIDE 34
  • True understanding of capability gained

by analyzing behaviors

  • How does the adversary operate
  • What actions are typically performed
  • Goal is to build a picture of adversary
  • perations
slide-35
SLIDE 35
  • Intrusion techniques – malware vs.

‘living off the land’

  • Coding and deployment consistencies
  • Tendencies for persistence, clearing

artifacts

slide-36
SLIDE 36
  • Characterize adversary activity
  • Identify commonalities and general trends
  • Build a profile based upon observed

behavior

  • Design detections and alerts around
  • bservations
slide-37
SLIDE 37
  • Leverage available evidence to group

and define activities

  • Differentiation: two or more unique

vertices of diamond model

slide-38
SLIDE 38
  • Multiple reporting on Russian

infiltration of US energy companies in summer 2017

  • Eventually combined several distinct

attacks into one campaign

  • Resulting picture muddies situation for

defenders

slide-39
SLIDE 39
slide-40
SLIDE 40
slide-41
SLIDE 41
slide-42
SLIDE 42
slide-43
SLIDE 43

July 2017: ALLANITE October 2017: DYMALLOY October 2017: TA-293A March 2018: TA-074A

slide-44
SLIDE 44

2013-2014: DRAGONFLY Dec 2015 – Mar 2017: DYMALLOY May 2017 - ?: ALLANITE

slide-45
SLIDE 45

Initial Access:

  • Phishing
  • Strategic website compromise

Deploy Implants:

  • RATs: Karagany.B, Heriplor
  • Backdoors: DorShel, Goodor

Information Collection

  • Mimikatz integrated into broader credential capture tool
  • Framework for harvesting documents, intelligence info
slide-46
SLIDE 46
slide-47
SLIDE 47
slide-48
SLIDE 48

Initial Access:

  • Phishing
  • Strategic website compromise

Leverage Scripts and System Commands:

  • Credential capture and re-use
  • Unique LNK icon image to ensure continued credential capture

Information Collection

  • Various publicly-available password cracking frameworks
  • RDP for connectivity and transfer
slide-49
SLIDE 49
slide-50
SLIDE 50

word/_rels/settings.xml.rels: Target="file://5.153.58.45/Normal.dotm" word/_rels/settings.xml.rels: Target="file://62.8.193.206/Normal.dotm" word/_rels/settings.xml.rels: Target=”file://62.8.193.206/Normal.dotm”

slide-51
SLIDE 51
  • DYMALLOY:
  • US, Europe, Turkey
  • Broad ICS targeting
  • ALLANITE:
  • US, UK and possibly Ireland
  • Energy sector
slide-52
SLIDE 52
slide-53
SLIDE 53
  • DYMALLOY and ALLANITE look

substantially different from each other

  • May be related, one may be evolution
  • f the other
  • BUT based on available evidence, they

are not the same

slide-54
SLIDE 54
  • Different targeting and techniques

mean different responses, defense plans

  • Shift in targeting indicates change in

tasking or priorities

  • Combining the two as one potentially

impairs planning

slide-55
SLIDE 55
  • Dragonfly, DYMALLOY, ALLANITE – may

all be the same ‘adversary’ but different teams

  • Different TTPs and targeting over time

requires different defensive measures

  • Tracking OPS teams subordinate to

larger entity

slide-56
SLIDE 56
  • COVELLITE initially discovered

September 2017

  • Targeted phishing of US electric

companies

  • Review of TTPs indicated strong overlap

with LAZARUS Group

slide-57
SLIDE 57
slide-58
SLIDE 58
  • ‘LAZARUS Group’ is increasingly a catch-

all for DPRK-linked activity

  • Ranges from disruption to intelligence

collection to theft

  • Active in many forms since at least 2012
slide-59
SLIDE 59
  • Multiple technical overlaps:
  • Malicious document dropper format
  • Malware code, functionality
  • Infrastructure overlap:
  • Use of compromised, legit systems
  • Re-use of IPs across campaigns
slide-60
SLIDE 60
  • Phishing with malicious document

attachment

  • Embedded EXE built via macros
  • EXE beacons via fake-TLS connection to

compromised C2 servers

slide-61
SLIDE 61
slide-62
SLIDE 62
slide-63
SLIDE 63
  • Overlap in capabilities
  • Some unique aspects in COVELLITE
  • Multiple beacon IPs
  • Unique variant of phishing document
  • Otherwise very similar
slide-64
SLIDE 64
  • ‘LAZARUS’ simply encompasses too

much activity

  • Makes tracking, identifying, and

defending difficult

  • Multiple operations combined as a

single group

slide-65
SLIDE 65
  • Ensure coverage against actionable,

relevant threats

  • Don’t waste resources on unlikely items
  • Focus on threat model
  • LAZARUS approach is too broad in

scope for meaningful defense

slide-66
SLIDE 66
  • COVELLITE is very specific in targeting
  • Focus on electric utilities
  • Overlap in TTPs can be distinguished by

uniqueness in targeting

  • Filter TTPs only related to non-ICS

LAZARUS actions

slide-67
SLIDE 67
slide-68
SLIDE 68
  • Break apart activity into component

parts

  • Track what matters
  • Focus defense on what fits threat

model

slide-69
SLIDE 69
  • Break down entities:
  • Operational groups
  • Specific campaigns
  • TTP variants
  • Not all iterations will follow the same

pattern

slide-70
SLIDE 70
  • Attribution is beneficial when properly

focused

  • Identifying activities provides actionable

information to defenders

  • Focus on observable items avoids

guesswork and assumptions

slide-71
SLIDE 71

Activity

  • Note
  • bservable

items

  • Determine

Operational Purpose

  • Align
  • bservations

to own- network

  • perations

Characterization

  • Group
  • bserved

activities

  • Orient to

targets and perceived interests Definition

  • Define a

group around characteristics

  • Focus on
  • bservable

behavior

  • Build

detection and defenses around result

slide-72
SLIDE 72