W E I V R E V O

  • Slides: 44
Download presentation
W E I V R E V O C A M S I S

W E I V R E V O C A M S I S LEE MYERS SENIOR MANAGER OF SECURITY OPERATIONS

MULTI-STATE INFORMATION SHARING AND ANALYSIS CENTER The U. S. Department of Homeland Security has

MULTI-STATE INFORMATION SHARING AND ANALYSIS CENTER The U. S. Department of Homeland Security has designated the MS-ISAC as its key cybersecurity resource for cyber threat prevention, protection, response and recovery for all U. S. State, Local, Tribal and Territorial (SLTT) governments.

WHO WE SERVE MS-ISAC Members include: § All 56 US States and Territories §

WHO WE SERVE MS-ISAC Members include: § All 56 US States and Territories § All 78 federally recognized fusion centers § More than 1, 000 local governments and tribal nations State, Local, Tribal, and Territorial Cities, counties, towns, airports, public education, police departments, ports, transit associations, and more

24 X 7 SECURITY OPERATIONS CENTER Central location to report any cybersecurity incident §

24 X 7 SECURITY OPERATIONS CENTER Central location to report any cybersecurity incident § Support: § Network Monitoring Services § Research and Analysis § Analysis and Monitoring: § Threats § Vulnerabilities § Attacks § Reporting: § Cyber Alerts & Advisories § Web Defacements § Account Compromises § Hacktivist Notifications To report an incident or request assistance: Phone: 1 -866 -787 -4722 Email: soc@msisac. org

INTELLIGENCE SOURCES § 24 x 7 x 365 Monitoring § Analysis of ~500 billion

INTELLIGENCE SOURCES § 24 x 7 x 365 Monitoring § Analysis of ~500 billion logs/month § Integration with federal agencies via the NCCIC, NCIJTF and private companies § Research into vulnerabilities, exploits, TTPs, patterns, and trends § Constant contact with all ISACs Information Sharing and Analysis Centers

LEVELS OF ACCESS Public Information Fee Based Services Any SLTT Full MS-ISAC Membership

LEVELS OF ACCESS Public Information Fee Based Services Any SLTT Full MS-ISAC Membership

C A I L M B R U P FO IN I T N

C A I L M B R U P FO IN I T N O

MS-ISAC ADVISORIES Public Information

MS-ISAC ADVISORIES Public Information

MONTHLY NEWSLETTER Distributed in template form to allow for re-branding and redistribution by your

MONTHLY NEWSLETTER Distributed in template form to allow for re-branding and redistribution by your agency Public Information

T E T L S NM Y R E N A OV G T

T E T L S NM Y R E N A OV G T N

MONITORING OF IP RANGE & DOMAIN SPACE IP Monitoring Domain Monitoring § IPs connecting

MONITORING OF IP RANGE & DOMAIN SPACE IP Monitoring Domain Monitoring § IPs connecting to malicious C&Cs § Compromised IPs § Indicators of compromise from the MS-ISAC network monitoring (Albert) § Notifications from Spamhaus § Notifications on compromised user credentials, open source and third party information § Vulnerability Management Program (VMP) Send domains, IP ranges, and contact info to: soc@msisac. org Any SLTT

VULNERABILITY MANAGEMENT PROGRAM What Data Are We Collecting? § Server type and version (IIS,

VULNERABILITY MANAGEMENT PROGRAM What Data Are We Collecting? § Server type and version (IIS, Apache, etc. ) § Web programming language and version (PHP, ASP, etc. ) § Content Management System and version (Word. Press, Joomla, Drupal, etc. ) Email notifications are sent with 2 attachments containing information on out-of-date and up-to-date systems: • Out-of-Date systems should be patched/updated and could potentially have a vulnerability associated with it • Up-to-Date systems have the most current patches Any SLTT

COMPUTER EMERGENCY RESPONSE TEAM (CERT) § Incident Response (includes on-site assistance) § Network &

COMPUTER EMERGENCY RESPONSE TEAM (CERT) § Incident Response (includes on-site assistance) § Network & Web Application Vulnerability Assessments (Fee) § Malware Analysis § Computer & Network Forensics § Log Analysis § Statistical Data Analysis § Penetration Testing (Fee) To report an incident or request assistance: Phone: 1 -866 -787 -4722 Email: soc@msisac. org Any SLTT

WHAT IS AN “INCIDENT”? As defined by NIST: A computer security incident is a

WHAT IS AN “INCIDENT”? As defined by NIST: A computer security incident is a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices. Examples: § Phishing § Network Intrusion § DDo. S § Ransomware

AFTER ACTION REVIEW § Who, What, When, Where and How it Happened § The

AFTER ACTION REVIEW § Who, What, When, Where and How it Happened § The Good, The Bad, and The Ugly § Incident Response Plan § Training § Documentation

C S A R S I E S B M EM M P I

C S A R S I E S B M EM M P I H

BENEFITS OF MEMBERSHIP § Access to information, intelligence, products, resources, and webcasts § Insider

BENEFITS OF MEMBERSHIP § Access to information, intelligence, products, resources, and webcasts § Insider access to federal information § Training and resource discounts § CIS Security Benchmarks discounts § US-CERT Portal access § Cybersecurity exercise participation § Malicious Code Analysis Platform (MCAP) access MS-ISAC Membership

US-CERT PORTAL Access to: § MS-ISAC Cyber Alert Map § Archived webcasts & products

US-CERT PORTAL Access to: § MS-ISAC Cyber Alert Map § Archived webcasts & products § Cyber Table Top Exercises § Guides and templates § Message Boards MS-ISAC Membership

MS-ISAC PRODUCTS Cybersecurity Advisory: short, timely, emails containing technical information regarding system patching and

MS-ISAC PRODUCTS Cybersecurity Advisory: short, timely, emails containing technical information regarding system patching and similar system maintenance activity Purchasing Alliance: Discounted purchasing buys s r e b em nly M O Incident Notifications: via phone or email, as appropriate – domain & IP based National Webcasts: 6 bi-monthly webcasts on national topics of interest End User Newsletters: Monthly newsletter to rebrand distribute Cyber Alerts: Intel Papers: short, timely, emails containing information on a specific cyber incident or threat Intelligence-driven papers on TTPs, trends, patterns, and actors affecting SLTT governments Threat Information: Information on malicious domains, IPs, and current threat events Cybersecurity Toolkit: Hot Topics Webcasts: Items to promote cybersecurity awareness in your organization Monthly guest speakers on areas of interest to MS-ISAC members

MS-ISAC CYBER ALERTS MS-ISAC Membership

MS-ISAC CYBER ALERTS MS-ISAC Membership

MS-ISAC INTEL PAPERS MS-ISAC Membership

MS-ISAC INTEL PAPERS MS-ISAC Membership

WEEKLY MALWARE IPS AND DOMAINS MS-ISAC Membership

WEEKLY MALWARE IPS AND DOMAINS MS-ISAC Membership

MALICIOUS CODE ANALYSIS PLATFORM A web based service that enables members to submit and

MALICIOUS CODE ANALYSIS PLATFORM A web based service that enables members to submit and analyze suspicious files in a controlled and non-public fashion § § § Executables DLLs Documents Quarantine files Archives To gain an account contact: soc@msisac. org MS-ISAC Membership

D E S S A B CE I E E V F R E

D E S S A B CE I E E V F R E S

FEE BASED SERVICES § § § § Network Monitoring (Albert) Managed Security Services (MSS)

FEE BASED SERVICES § § § § Network Monitoring (Albert) Managed Security Services (MSS) Web application vulnerability assessments Network vulnerability assessments Penetration testing Phishing engagements Security assessments For more info on any of these contact: info@msisac. org Fee Based Services

NETWORK MONITORING (ALBERT) § § § SLTT focus 24 x 7 x 365 research,

NETWORK MONITORING (ALBERT) § § § SLTT focus 24 x 7 x 365 research, analysis, and support Signatures unique to SLTT governments Real-time information sharing with SLTT partners Experienced cybersecurity analysts who review each event minimizing the number of false-positive notifications Fee Based Services

T A E R H E T P A R E SC B D

T A E R H E T P A R E SC B D LEE MYERS Y C AN SENIOR MANAGER L OF SECURITY OPERATIONS

TRAFFIC LIGHT PROTOCOL (TLP)

TRAFFIC LIGHT PROTOCOL (TLP)

FINANCIALS, PII, PHI Account compromises of PII • Emails • Login credentials • DOB,

FINANCIALS, PII, PHI Account compromises of PII • Emails • Login credentials • DOB, SSN, Contact Information PHI • PHI is more valuable in underground markets • Hospitals a potential target in the wake of insurance breaches Point of Sale systems • Those slow to adopt EMV become a target TLP: WHITE

Y A C E S T S D U Vikingdom

Y A C E S T S D U Vikingdom

“Lulz, ” Bragging Rights, Personal Motivations VIKINGDOM From March –August 2015 Vikingdom claimed: 77

“Lulz, ” Bragging Rights, Personal Motivations VIKINGDOM From March –August 2015 Vikingdom claimed: 77 DDo. S attacks against state and local government websites in 34 states SQLi POC targeting against 1000+ university URLs

2015 VIKINGDOM DDOS ACTIVITY WA OR 2 MT 1 ND 2 ID 1 CA

2015 VIKINGDOM DDOS ACTIVITY WA OR 2 MT 1 ND 2 ID 1 CA 2 NV 2 UT 1 AZ 2 MN 1 SD 1 WY IA 1 KS OK 9 NM TX 2 AK MI 1 WI NB 2 CO 1 ME 11 IL 1 MO 1 IN 4 PA 1 OH WV KY MS AL 1 NJ, 2 MD DE, 1 VA 1 NC 1 TN 5 AR 2 NH NY VT 2 3 MA CT, 1 RI GA 3 SC 1 LA Impact Levels No Targeting FL 2 Unknown Limited Moderate M P AS GU HI Severe VI TLP: AMBER PR Catastrophic

 I T G IN P P W A R P U

I T G IN P P W A R P U

WHAT CAN YOU DO? Low Hanging Fruit! 1. 2. 3. 4. 5. PATCH! Use

WHAT CAN YOU DO? Low Hanging Fruit! 1. 2. 3. 4. 5. PATCH! Use defensive software Back-up Train users Enforce strong, complex, unique passwords Critical Security Controls 1. Identify authorized and unauthorized devices 2. Inventory authorized and unauthorized software 3. Secure configurations for hardware and software 4. Continuous vulnerability assessment and remediation 5. Controlled use of admin privileges TLP: WHITE

IDENTIFY MALICIOUS ACTIVITY § § § Antivirus Firewalls IDS/IPS Logs (90 days!) Places to

IDENTIFY MALICIOUS ACTIVITY § § § Antivirus Firewalls IDS/IPS Logs (90 days!) Places to Look § § § Pastebin, Ghostbin, Zerobin Twitter Facebook Google SHODAN § Things to Look For: § Announcements § Hashtags § Doxings Hacktivist DDo. S Claim TLP: WHITE

SHARE INFORMATION § Be prepared § Learn from others’ best practices § Gather intel

SHARE INFORMATION § Be prepared § Learn from others’ best practices § Gather intel to help you be proactive § Be willing to ask for help § Identify other resources to augment what you are doing § Be a part of the solution § Take part in information sharing

LOOKING FORWARD Tactics, Techniques, and Procedures Targeted Data and Systems Cyber Threat Actors Developing

LOOKING FORWARD Tactics, Techniques, and Procedures Targeted Data and Systems Cyber Threat Actors Developing Issues TLP: WHITE

EXTORTION • DDo. S for Bitcoin (DD 4 BC) • Ransomware • New threats

EXTORTION • DDo. S for Bitcoin (DD 4 BC) • Ransomware • New threats (data posting) • Ransomware-as-a-service TLP: WHITE TTPs

PII, PHI, FINANCIALS Account compromises of PII • Emails • Login credentials • DOB,

PII, PHI, FINANCIALS Account compromises of PII • Emails • Login credentials • DOB, SSN, Contact Information PHI • PHI is more valuable in underground markets • Hospitals a potential target in the wake of insurance breaches Point of Sale systems • Those slow to adopt EMV become a target TLP: WHITE

ICS & MEDICAL DEVICES INDUSTRIAL CONTROL SYSTEMS • Increased interest in ICS vulnerabilities •

ICS & MEDICAL DEVICES INDUSTRIAL CONTROL SYSTEMS • Increased interest in ICS vulnerabilities • Honeypots • Black Energy Medical Devices • Personal vs. Hospital Devices • Continued vulnerabilities • Increased regulation TLP: WHITE

CYBER INSURANCE Organizations need to consider cyber risk insurance as part of their insurance

CYBER INSURANCE Organizations need to consider cyber risk insurance as part of their insurance portfolio: § Cost of remediating/replacing systems § Cost of notifying/protecting affected individuals Don’t Get Burned! Ensure you understand your policy’s coverage

QUESTIONS?

QUESTIONS?

WHO DO I CALL? Security Operations Center (SOC) SOC@cisecurity. org - 1 -866 -787

WHO DO I CALL? Security Operations Center (SOC) SOC@cisecurity. org - 1 -866 -787 -4722 31 Tech Valley Dr. , East Greenbush, NY 12061 -4134 www. cisecurity. org to join or get more information: https: //msisac. cisecurity. org/memb ers/index. cfm TLP: WHITE

MS-ISAC CONTACT NUMBERS Thank You! Lee Myers Lee. Myers@cisecurity. org Security Operations Center 24/7

MS-ISAC CONTACT NUMBERS Thank You! Lee Myers Lee. Myers@cisecurity. org Security Operations Center 24/7 Phone Number 1 -866 -787 -4722 soc@msisac. org MS-ISAC HQ Front Desk 518 -266 -3460 info@msisac. org