situational awareness threat report satr
play

Situational Awareness Threat Report (SATR) Presenters: Stacie Green - PowerPoint PPT Presentation

Situational Awareness Threat Report (SATR) Presenters: Stacie Green & Casey Kahsen United States Computer Emergency Readiness Team (US-CERT) 13 January 2016 Outline 1. Goal of SATR 2. Overview of SATR 3. Components of SATR 4.


  1. Situational Awareness Threat Report (SATR) Presenters: Stacie Green & Casey Kahsen United States Computer Emergency Readiness Team (US-CERT) 13 January 2016

  2. Outline 1. Goal of SATR 2. Overview of SATR 3. Components of SATR 4. Accomplishments of SATR 5. Standardized Reporting 6. Conclusion 2 Homeland Office of Cybersecurity and Communications Security

  3. Situational Awareness Threat Report Goal Who is being attacked? Who is attacking? What is the impact/magnitude of the attack? What is the likelihood of attacks and the risks? ISP validation and awareness Signature development and deployment Aware of types of attacks on sectors Development of means of identifying potential compromises Machine speed alert capability Joint Capabilities to enhance computer network defense mitigation actions 3 Homeland Office of Cybersecurity and Communications Security

  4. 4 Homeland Office of Cybersecurity and Communications Security

  5. Overview: Data Sources GLOBAL THREAT BIG DATA PERSPECTIVE QUERIABLE INDICATORS • IPs • APT Activity • MD5 • Malware family • Domains • CVEs • URLs • NAICs/Sectors 5 Homeland Office of Cybersecurity and Communications Security

  6. Overview: Reporting Capabilities Customizable Correlation of Big Data Reporting on Reporting Federal and Visualizations Critical Commercial Infrastructure Threat Data Sectors 6 Homeland Office of Cybersecurity and Communications Security

  7. Component: Threat Actors Reporting Example: Threat Actors APT Indicators Monitored for Activity • Provides insight into high priority indicators that have been previously associated with threat actors and focused operations • Illustrates potential threats that haven’t been reported • Offers view of potential focused operations activity from commercial data perspective 7 Homeland Office of Cybersecurity and Communications Security

  8. Component : Government Targets Depicts Attacks Against Illustrates Top Indicators from U.S. Government Countries of Interest • By most counter-measures triggered By Source Country • Two categories: Attacking & Scanning 8 Homeland Office of Cybersecurity and Communications Security

  9. Component: Vulnerabilities Image Depicts Report for 8/3/2015 Daily Report Monitors Exploit Usage • Provide exploit trending • Indicates usage patterns • Can drive decision making 9 Homeland Office of Cybersecurity and Communications Security

  10. Component : Vulnerabilities Reporting Example: Vulnerabilities Report From Next Day • Article describes RIG’s use of CVE-2015-5119 • Reported previous day with an uptick of activity • Example of threat forecasting Image Depicts Report for 8/4/2015 10 Homeland Office of Cybersecurity and Communications Security

  11. Accomplishments of SATR Tagged APT Further Analysis on net flow yielded traffic to Placeholder Text Infrastructure potential botnet infected machines The government machine connected to a Trend Micro sinkhole (Malware research) These connections used high (random) port numbers, which is a sign of FTP connections 11 Homeland Office of Cybersecurity and Communications Security

  12. Accomplishments of SATR Operational Success Use Cases Potential reduction in SATR analysis, alerted Possible identification data exfiltration from USG department a of botnet machines public facing device was observed used for data government FTP communicating with exfiltration campaigns servers potential APT actors 12 Homeland Office of Cybersecurity and Communications Security

  13. Accomplishments of SATR 13 Homeland Office of Cybersecurity and Communications Security

  14. Accomplishments of SATR This analysis resulted This use case in a reduction of potentially increased potentially unsolicited government reputation email traffic (spam) as the machine was on two known blacklists 14 Homeland Office of Cybersecurity and Communications Security

  15. Standardized Reporting 15 Homeland Office of Cybersecurity and Communications Security

  16. Reporting Aspects 16 Homeland Office of Cybersecurity and Communications Security

  17. Conclusion 17 Homeland Office of Cybersecurity and Communications Security

  18. QUESTIONS? 18 Homeland Office of Cybersecurity and Communications Security

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend