Non-Political Security Learnings from the Mueller Report Arkadiy - - PowerPoint PPT Presentation

non political security learnings from the mueller report
SMART_READER_LITE
LIVE PREVIEW

Non-Political Security Learnings from the Mueller Report Arkadiy - - PowerPoint PPT Presentation

Non-Political Security Learnings from the Mueller Report Arkadiy Tetelman (@arkadiyt) GLOBAL APPSEC DC TM Agenda Background Blue Team Learnings Personal Security Learnings Questions GLOBAL APPSEC DC TM About me Arkadiy


slide-1
SLIDE 1

GLOBAL APPSEC DC

TM

Non-Political Security Learnings from the Mueller Report

Arkadiy Tetelman (@arkadiyt)

slide-2
SLIDE 2

GLOBAL APPSEC DC

TM

Agenda

  • Background
  • Blue Team Learnings
  • Personal Security Learnings
  • Questions
slide-3
SLIDE 3

GLOBAL APPSEC DC

TM

About me

  • Arkadiy Tetelman (@arkadiyt)
  • Head of Security at Lob
  • Previously appsec at Airbnb, Twitter
  • Fun fact
slide-4
SLIDE 4

GLOBAL APPSEC DC

TM

Background

slide-5
SLIDE 5

GLOBAL APPSEC DC

TM

Background

  • 2 years 8 months
  • Employed:

○ ~22 attorneys & paralegals ○ ~9 support staff

  • Worked alongside:

○ ~40 FBI staff (agents, analysts, accountants, etc)

slide-6
SLIDE 6

GLOBAL APPSEC DC

TM

Background

  • Volume 1: Russian interference in 2016 election

○ II. “Active Measures” social media campaign ○ III. Hacking/dumping campaign

  • Volume 2: Administration obstruction of justice
slide-7
SLIDE 7

GLOBAL APPSEC DC

TM

Blue Team Learnings

slide-8
SLIDE 8

GLOBAL APPSEC DC

TM

Timeline

slide-9
SLIDE 9

GLOBAL APPSEC DC

TM

slide-10
SLIDE 10

GLOBAL APPSEC DC

TM

slide-11
SLIDE 11

GLOBAL APPSEC DC

TM

slide-12
SLIDE 12

GLOBAL APPSEC DC

TM

slide-13
SLIDE 13

GLOBAL APPSEC DC

TM

slide-14
SLIDE 14

GLOBAL APPSEC DC

TM

  • Mr. Delavan ... said that his bad advice was a result of a typo: He

knew this was a phishing attack, as the campaign was getting dozens of them. He said he had meant to type that it was an “illegitimate” email, an error that he said has plagued him ever since.

* https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html

slide-15
SLIDE 15

GLOBAL APPSEC DC

TM

Phished accounts

  • numerous email accounts of Clinton Campaign employees and

volunteers

  • junior volunteers assigned to the Clinton Campaign's advance team
  • informal Clinton Campaign advisors
  • a DNC employee
  • 118 GRU officers stole tens of thousands of emails
slide-16
SLIDE 16

GLOBAL APPSEC DC

TM

Recommendations

  • Password manager / hardware (U2F, WebAuthn) 2fa tokens
  • Ingest & alert on DNS
  • Scan incoming emails
  • Ingest mail audit log events
  • Phishing exercises?
slide-17
SLIDE 17

GLOBAL APPSEC DC

TM

slide-18
SLIDE 18

GLOBAL APPSEC DC

TM

slide-19
SLIDE 19

GLOBAL APPSEC DC

TM

Over the ensuing weeks, the GRU traversed the network, identifying different computers connected to the DCCC network. By stealing network access credentials along the way (including those of IT administrators with unrestricted access to the system), the GRU compromised approximately 29 different computers on the DCCC network.

* Report Volume 1, p38

slide-20
SLIDE 20

GLOBAL APPSEC DC

TM

slide-21
SLIDE 21

GLOBAL APPSEC DC

TM

Democratic Party

slide-22
SLIDE 22

GLOBAL APPSEC DC

TM

Democratic Party

slide-23
SLIDE 23

GLOBAL APPSEC DC

TM

slide-24
SLIDE 24

GLOBAL APPSEC DC

TM

slide-25
SLIDE 25

GLOBAL APPSEC DC

TM

Recommendations

  • “just” don’t allow 3rd party access into your network
slide-26
SLIDE 26

GLOBAL APPSEC DC

TM

The VPN in this case had been created to give a small number of DCCC employees access to certain databases housed on the DNC network.

* Report Volume 1, p38

slide-27
SLIDE 27

GLOBAL APPSEC DC

TM

Recommendations

  • “just” don’t allow 3rd party access into your network
  • segregate access, practice least privilege, add monitoring
slide-28
SLIDE 28

GLOBAL APPSEC DC

TM

slide-29
SLIDE 29

GLOBAL APPSEC DC

TM

slide-30
SLIDE 30

GLOBAL APPSEC DC

TM

slide-31
SLIDE 31

GLOBAL APPSEC DC

TM

  • X-Agent:

○ Log keystrokes, take screenshots, gather filesystem/OS info, etc

  • X-Tunnel:

○ Create an encrypted tunnel for large-scale data transfers

  • Mimikatz
  • rar.exe

Installed tools

slide-32
SLIDE 32

GLOBAL APPSEC DC

TM

  • keylog sessions containing passwords, internal communications,

banking information, sensitive PII

  • internal strategy documents, fundraising data, opposition research,

emails from work inboxes

  • exfiltrated > 70GB in election documents

Stolen data

slide-33
SLIDE 33

GLOBAL APPSEC DC

TM

Structure of GRU

  • 26165

○ spearphishing ○ building malware ○ mining bitcoin

  • 74455

○ assisted with release & promotion of stolen materials ○ “Officers from Unit 74455 separately hacked computers belonging to state boards of elections, secretaries of state, and U.S. companies that supplied software and other technology related to the administration of U.S. elections.” (Report Volume 1, p37)

slide-34
SLIDE 34

GLOBAL APPSEC DC

TM

Exfiltration

slide-35
SLIDE 35

GLOBAL APPSEC DC

TM

Recommendations

  • alert on mimikatz
  • endpoint monitoring
  • network segregation
  • IDS?
slide-36
SLIDE 36

GLOBAL APPSEC DC

TM

Blue Team Conclusions

  • attack vectors: spearphishing, lateral movement via overprivileged

permissions & mimikatz

  • defense in depth: 2fa, endpoint monitoring, least privilege, etc
  • few organizations can defend against a nation state
slide-37
SLIDE 37

GLOBAL APPSEC DC

TM

Background

  • Volume 1: Russian interference in 2016 election

○ II. “Active Measures” social media campaign ○ III. Hacking/dumping campaign

  • Volume 2: Administration obstruction of justice
slide-38
SLIDE 38

GLOBAL APPSEC DC

TM

Personal Security Learnings

slide-39
SLIDE 39

GLOBAL APPSEC DC

TM

Sources

  • Twitter DMs, Facebook messages, LinkedIn messages & emails
slide-40
SLIDE 40

GLOBAL APPSEC DC

TM

Sources

  • Text messages
  • Call records
slide-41
SLIDE 41

GLOBAL APPSEC DC

TM

Sources

  • Internet search histories
slide-42
SLIDE 42

GLOBAL APPSEC DC

TM

Sources

  • Company financial records
  • US State Department visa records
  • Hotel / flight / CBP records
slide-43
SLIDE 43

GLOBAL APPSEC DC

TM

Sources

* Report Volume 1, p13

slide-44
SLIDE 44

GLOBAL APPSEC DC

TM

Michael Cohen

  • Credit: Marcy Wheeler (@emptywheel)
  • 7/18/2017: warrant on Michael Cohen’s Google activity from

1/1/2016 - 7/18/2017

  • 8/8/2017: warrant on Michael Cohen’s iCloud account
  • 11/13/2017: warrant on business email hosted by 1&1
slide-45
SLIDE 45

GLOBAL APPSEC DC

TM

  • Credit: Marcy Wheeler (@emptywheel)
  • 11/7/2017 & 1/4/2018: pen-registers for real time communications

info

  • 2/8/2018: Mueller handed off Cohen investigations to SDNY
  • 4/8/2018: SDNY got warrant for stingray to figure out what room in

hotel

Michael Cohen

slide-46
SLIDE 46

GLOBAL APPSEC DC

TM

  • Credit: Marcy Wheeler (@emptywheel)
  • 4/9/2018: SDNY got warrant for that hotel room, Cohen’s

home/office/hotel raided

Michael Cohen

slide-47
SLIDE 47

GLOBAL APPSEC DC

TM

What Didn’t Work

slide-48
SLIDE 48

GLOBAL APPSEC DC

TM

What Didn’t Work

slide-49
SLIDE 49

GLOBAL APPSEC DC

TM

What Didn’t Work

slide-50
SLIDE 50

GLOBAL APPSEC DC

TM

  • be cognizant about what data you share
  • e2e encryption works

○ expiring messages protect against physical device access

Personal Security Conclusions

slide-51
SLIDE 51

GLOBAL APPSEC DC

SCAN THE QR CODE TO COMPLETE THE SURVEY

Rate this Session

Thank You!

TM

OWASP, Open Web Application Security Project, Global AppSec and AppSec Days are Trademarks of the OWASP Foundation, Inc.

Non-Political Security Learnings from the Mueller Report

Arkadiy Tetelman (@arkadiyt)