170 likes | 320 Views
DESTROYER : Why Intelligence Matters in InfoSec Operations. John Holland. Managed Adversary and Threat Intelligence (MATI). Principal Cyber Intelligence Analyst. Outline. 1. Why Intelligence Matters. Why APTs Matter. DESTROYER Overview. Applying Intelligence. 2. 3. 4.
E N D
DESTROYER: Why Intelligence Matters in InfoSec Operations John Holland Managed Adversary and Threat Intelligence (MATI) Principal Cyber Intelligence Analyst
Outline 1 Why Intelligence Matters Why APTs Matter DESTROYER Overview Applying Intelligence 2 3 4
Why Intelligence Matters Increased Temporal Distance Tool-basedProbing Global Reconnaissance MD5 Hash Options:Monitoring/Detection+Incident Response Options:Vulnerability Management+Perimeter Defense Options:Intelligence Operations(CI)
Why Understanding APTs Matter Develop leading Tactics, Techniques, and Procedures (TTP) Operate with impunity TTPs proliferate
DESTROYER Overview Sponsorship Almost certainly acting on behalf of Vietnamese government (circa 2014) Supporting Evidence Targeting political dissidents and domestic media Targeting foreign companies operating in country Targeting foreign companies in areas of strategic interest to Vietnam
DESTROYER Targeting Targeted entities include: • Political dissidents and media • Foreign-government diplomatic posts • Automotive manufacturing • Financial institutions • Educational institutions
DESTROYER Intentions Focus • Creating economic advantage • Regional political maneuver Supporting Evidence • TTP align with espionage-centric intent • Custom backdoors allow for data exfiltration (DNS subdomains) • ColbaltStrike “Malleable C2” supports covert data exfiltration • Operations track with economic and political themes • Supporting extraordinary due diligence • Targets’ data not easily monetized
DNS Subdomain Exfiltration <your data>.badguys.com
Auto Manufacturing Activity Noteworthy Observations • Observed concerted focus on global automotive manufacturing (Dec 2018-current) • Targeted at least (5) auto-manufacturers with regional operations • India, Germany, United States, Japan • Coincides with ramp-up of domestic automobile manufacturing Also noteworthy • Massive domestic production of automobile parts • No observed targeting to date
Identifying the Indicators • Technical/Tactical Level • IP addresses • Domain/URL • Hashes • Operational level • Reg Keys • PowerShell • Scheduled Tasks • Strategic level • Press Releases • Media Statements Addressed by Technology Easily Changed (Rapidly) Less “What”--More “How” Difficult + Expensive to Change Maximum Temporal Distance Usually… Highly Visible
Applying the Intelligence • Living Off the Land techniques on the rise • PowerShell exploitation • Easily monitored with Windows logging capability • Requires activation and monitoring schema • Registry Keys used for persistence • RK not standard in data feeds • Native Windows logging capability • Globally visible indicators • Press releases • Financial statements (forward looking) Operational Strategic
Closing Thoughts • IOCs alone tell you you’re in trouble • The wrong IOCs will let you know when it’s too late • You may never be targeted by an APT
Thank You! John Holland john_holland@Symantec.com