non political security learnings from the mueller report
play

Non-Political Security Learnings from the Mueller Report Arkadiy - PowerPoint PPT Presentation

Non-Political Security Learnings from the Mueller Report Arkadiy Tetelman (@arkadiyt) GLOBAL APPSEC DC TM Agenda Background Blue Team Learnings Personal Security Learnings Questions GLOBAL APPSEC DC TM About me Arkadiy


  1. Non-Political Security Learnings from the Mueller Report Arkadiy Tetelman (@arkadiyt) GLOBAL APPSEC DC TM

  2. Agenda ● Background ● Blue Team Learnings ● Personal Security Learnings ● Questions GLOBAL APPSEC DC TM

  3. About me ● Arkadiy Tetelman (@arkadiyt) ● Head of Security at Lob ● Previously appsec at Airbnb, Twitter ● Fun fact GLOBAL APPSEC DC TM

  4. Background GLOBAL APPSEC DC TM

  5. Background ● 2 years 8 months ● Employed: ○ ~22 attorneys & paralegals ○ ~9 support staff ● Worked alongside: ○ ~40 FBI staff (agents, analysts, accountants, etc) GLOBAL APPSEC DC TM

  6. Background ● Volume 1: Russian interference in 2016 election ○ II. “Active Measures” social media campaign ○ III. Hacking/dumping campaign ● Volume 2: Administration obstruction of justice GLOBAL APPSEC DC TM

  7. Blue Team Learnings GLOBAL APPSEC DC TM

  8. Timeline GLOBAL APPSEC DC TM

  9. GLOBAL APPSEC DC TM

  10. GLOBAL APPSEC DC TM

  11. GLOBAL APPSEC DC TM

  12. GLOBAL APPSEC DC TM

  13. GLOBAL APPSEC DC TM

  14. Mr. Delavan ... said that his bad advice was a result of a typo: He knew this was a phishing attack, as the campaign was getting dozens of them. He said he had meant to type that it was an “illegitimate” email, an error that he said has plagued him ever since. * https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html GLOBAL APPSEC DC TM

  15. Phished accounts ● numerous email accounts of Clinton Campaign employees and volunteers ● junior volunteers assigned to the Clinton Campaign's advance team ● informal Clinton Campaign advisors ● a DNC employee ● 118 GRU officers stole tens of thousands of emails GLOBAL APPSEC DC TM

  16. Recommendations ● Password manager / hardware (U2F, WebAuthn) 2fa tokens ● Ingest & alert on DNS ● Scan incoming emails ● Ingest mail audit log events ● Phishing exercises? GLOBAL APPSEC DC TM

  17. GLOBAL APPSEC DC TM

  18. GLOBAL APPSEC DC TM

  19. Over the ensuing weeks, the GRU traversed the network, identifying different computers connected to the DCCC network. By stealing network access credentials along the way (including those of IT administrators with unrestricted access to the system), the GRU compromised approximately 29 different computers on the DCCC network. * Report Volume 1, p38 GLOBAL APPSEC DC TM

  20. GLOBAL APPSEC DC TM

  21. Democratic Party GLOBAL APPSEC DC TM

  22. Democratic Party GLOBAL APPSEC DC TM

  23. GLOBAL APPSEC DC TM

  24. GLOBAL APPSEC DC TM

  25. Recommendations ● “just” don’t allow 3rd party access into your network GLOBAL APPSEC DC TM

  26. The VPN in this case had been created to give a small number of DCCC employees access to certain databases housed on the DNC network. * Report Volume 1, p38 GLOBAL APPSEC DC TM

  27. Recommendations ● “just” don’t allow 3rd party access into your network ● segregate access, practice least privilege, add monitoring GLOBAL APPSEC DC TM

  28. GLOBAL APPSEC DC TM

  29. GLOBAL APPSEC DC TM

  30. GLOBAL APPSEC DC TM

  31. Installed tools ● X-Agent: ○ Log keystrokes, take screenshots, gather filesystem/OS info, etc ● X-Tunnel: ○ Create an encrypted tunnel for large-scale data transfers ● Mimikatz ● rar.exe GLOBAL APPSEC DC TM

  32. Stolen data ● keylog sessions containing passwords, internal communications, banking information, sensitive PII ● internal strategy documents, fundraising data, opposition research, emails from work inboxes ● exfiltrated > 70GB in election documents GLOBAL APPSEC DC TM

  33. Structure of GRU ● 26165 ○ spearphishing ○ building malware ○ mining bitcoin ● 74455 ○ assisted with release & promotion of stolen materials ○ “Officers from Unit 74455 separately hacked computers belonging to state boards of elections, secretaries of state, and U.S. companies that supplied software and other technology related to the administration of U.S. elections.” (Report Volume 1, p37) GLOBAL APPSEC DC TM

  34. Exfiltration GLOBAL APPSEC DC TM

  35. Recommendations ● alert on mimikatz ● endpoint monitoring ● network segregation ● IDS? GLOBAL APPSEC DC TM

  36. Blue Team Conclusions ● attack vectors: spearphishing, lateral movement via overprivileged permissions & mimikatz ● defense in depth: 2fa, endpoint monitoring, least privilege, etc ● few organizations can defend against a nation state GLOBAL APPSEC DC TM

  37. Background ● Volume 1: Russian interference in 2016 election ○ II. “Active Measures” social media campaign ○ III. Hacking/dumping campaign ● Volume 2: Administration obstruction of justice GLOBAL APPSEC DC TM

  38. Personal Security Learnings GLOBAL APPSEC DC TM

  39. Sources ● Twitter DMs, Facebook messages, LinkedIn messages & emails GLOBAL APPSEC DC TM

  40. Sources ● Text messages ● Call records GLOBAL APPSEC DC TM

  41. Sources ● Internet search histories GLOBAL APPSEC DC TM

  42. Sources ● Company financial records ● US State Department visa records ● Hotel / flight / CBP records GLOBAL APPSEC DC TM

  43. Sources * Report Volume 1, p13 GLOBAL APPSEC DC TM

  44. Michael Cohen ● Credit: Marcy Wheeler (@emptywheel) ● 7/18/2017: warrant on Michael Cohen’s Google activity from 1/1/2016 - 7/18/2017 ● 8/8/2017: warrant on Michael Cohen’s iCloud account ● 11/13/2017: warrant on business email hosted by 1&1 GLOBAL APPSEC DC TM

  45. Michael Cohen ● Credit: Marcy Wheeler (@emptywheel) ● 11/7/2017 & 1/4/2018: pen-registers for real time communications info ● 2/8/2018: Mueller handed off Cohen investigations to SDNY ● 4/8/2018: SDNY got warrant for stingray to figure out what room in hotel GLOBAL APPSEC DC TM

  46. Michael Cohen ● Credit: Marcy Wheeler (@emptywheel) ● 4/9/2018: SDNY got warrant for that hotel room, Cohen’s home/office/hotel raided GLOBAL APPSEC DC TM

  47. What Didn’t Work GLOBAL APPSEC DC TM

  48. What Didn’t Work GLOBAL APPSEC DC TM

  49. What Didn’t Work GLOBAL APPSEC DC TM

  50. Personal Security Conclusions ● be cognizant about what data you share ● e2e encryption works ○ expiring messages protect against physical device access GLOBAL APPSEC DC TM

  51. Rate this Session Non-Political Security Learnings from the Mueller Report Arkadiy Tetelman (@arkadiyt) SCAN THE QR CODE TO COMPLETE THE SURVEY Thank You! GLOBAL APPSEC DC TM OWASP, Open Web Application Security Project, Global AppSec and AppSec Days are Trademarks of the OWASP Foundation, Inc.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend