chapter 8 Flashcards

(89 cards)

1
Q

Title

A

Details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Microsoft Exchange Server hack (2021)
Description: ; Impact: ; Attribution:

A

Four zero-day vulnerabilities in Microsoft Exchange Server software were exploited to gain access to email accounts. Hackers deployed web shells to maintain persistent access and control over the compromised servers.]

Impact: At least 30,000 employees in the United States and potentially hundreds of thousands worldwide were affected, including organisations, local governments and educational institutions.; Attribution:

Attribution: �Microsoft attributed the attack to Hafnium, a group believed to operate from China with state sponsorship, indicating a high level of resources and co-ordination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Colonial Pipeline ransomware attack (2021)

A

Description: DarkSide ransomware gang used compromised login credentials to access Colonial Pipeline ��s network. The ransomware encrypted data and demanded a ransom for decryption keys.; Impact: The pipeline, responsible for transporting 45 per cent of the US ��s east coast fuel, shut down for several days, leading to fuel shortages, panic buying and price spikes. Colonial Pipeline paid a US$4.4 million ransom, although a portion was later recovered by the FBI.; Attribution: DarkSide is a cybercriminal group believed to operate out of Eastern Europe, possibly Russia. The group ��s tactics and the focus on financial gain are characteristic of organised cybercrime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

JBS Foods ransomware attack (2021)

A

Description: �JBS USA, part of the world ��s largest meat processing company, faced a ransomware attack that encrypted files and disrupted operations in North America and Australia.

Impact: �The attack led to a temporary shutdown of JBS facilities, causing significant disruptions in the meat supply chain. JBS paid US$11 million in ransom to REvil to regain access to their systems.

Attribution: �REvil (also known as Sodinokibi), a notorious ransomware group with ties to Russia, claimed responsibility. The attack demonstrated the vulnerabilities in critical food supply infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Kaseya VSA ransomware attack (2021)

A

Description: REvil exploited vulnerabilities in Kaseya ��s VSA software, which is used by MSPs. This allowed the ransomware to spread to MSPs �� customers, leading to a widespread impact.

Impact: �Up to 1,500 organisations were affected, with systems encrypted and demands for ransom payments. The attack highlighted the risks associated with supply chain vulnerabilities in IT management software.

Attribution: �REvil, consistent with their previous attacks, demanded significant ransoms and caused extensive disruption, leveraging the interconnected nature of MSPs and their clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Facebook data breach (2021)

A

Description: Personal data of more than 533 million Facebook users from 106 countries was leaked online. The data included phone numbers, Facebook IDs, full names, locations, birthdates, bios and, in some cases, email addresses.;

Impact: �Although the data breach occurred in 2019, the data resurfaced in 2021, making it readily available on hacking forums. This raised significant privacy concerns and potential risks for identity theft and targeted phishing attacks.

Attribution: �The breach resulted from a vulnerability in Facebook ��s ��Add Friend �� feature, which allowed for automated scraping of user profiles. While specific attackers were not identified, the incident underscores the risks of data scraping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T-Mobile data breach (2021)

A

Description: �Hackers gained access to T-Mobile ��s systems, stealing personal data of more than 40 million current and prospective customers. The breach included sensitive information such as names, dates of birth, social security numbers and drivers �� licence details.

Impact: �The breach exposed a significant volume of sensitive personal information, potentially leading to identity theft and fraud. T-Mobile faced criticism over their security practices and response to the breach.

Attribution: �A hacker claimed responsibility and offered the data for sale on a dark web forum. The breach highlighted vulnerabilities in T-Mobile ��s data security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Log4j vulnerability exploitation (2021 ��2022)

A

Description: �The Log4j logging library, widely used in Java applications, had a critical vulnerability (CVE-2021-44228) that allowed remote code execution. Attackers could exploit this flaw by sending a specially crafted request to affected servers.

Impact: �The vulnerability, known as Log4Shell, had a vast impact due to the widespread use of Log4j. It affected a large number of applications and services, with exploitation attempts reported globally. Organisations scrambled to patch the vulnerability and mitigate risks.

Attribution: While the vulnerability itself was a flaw in the software, various threat actors, including state-sponsored groups and cybercriminals, quickly moved to exploit it. The widespread and rapid exploitation underscored the critical nature of the vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Crypto.com �hack (2022)

A

Description: �Hackers bypassed �Crypto.com ��s two-factor authentication system, stealing approximately US$34 million in Bitcoin and Ethereum from user accounts.

; Impact: Around 500 user accounts were affected, leading to significant financial losses. �Crypto.com �reimbursed affected users and implemented additional security measures.;

Attribution: �Specific attackers were not publicly identified. The breach highlighted vulnerabilities in cryptocurrency exchange security, particularly around MFA systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Okta security breach (2022)

A

Description: �Hackers gained access to Okta ��s internal system through a third-party contractor, potentially compromising thousands of Okta customers who rely on the company ��s authentication services.

Impact: �The breach raised concerns about the security of IAM services provided by Okta, affecting the trust and security posture of its customers.

Attribution: �The Lapsus$ group claimed responsibility for the breach. Lapsus$ is known for targeting large tech companies and exploiting vulnerabilities in third-party services to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IR

A

INCIDENT RESPONSE

IR is used to describe the process that an organisation uses in response to an incident. It is a structured approach to handling and managing the aftermath of an incident to reduce damage and recovery time and costs. The incident can be anything from a power outage, severe weather or fire to a data breach or cyber-attack. Each incident needs to be managed effectively to reduce the impact and harm to the organisation. With the greater reliance on information processes and systems. If these are disrupted the financial and reputational damage can be huge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SolarWinds incident in December 2020.

A

This incident impacted five of the seven African local markets I was supporting cybersecurity-wise for a global company. They were not attacked directly, but had software that required patching quickly due to a vulnerability, as well as undertaking a check for any IoCs. My role was to ensure systems were patched and a check for IoCs was performed, working with stakeholders at a local and senior level. What was also interesting was that, as soon as the vulnerability was known about, there was a huge increase in external scans looking for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The SolarWinds attack was a sophisticated supply chain cyber operation, conducted by APT29,

A

The SolarWinds attack was a sophisticated supply chain cyber operation, conducted by APT29, also known as Cozy Bear, and attributed to Russia ��s Foreign Intelligence Service. The compromise was discovered in December 2020. Cozy Bear had created customised malware and injected it into the SolarWinds Orion software build process. This was then distributed by a software update process unbeknown that it contained malware. As well as the malware, they used token theft, password spraying, spear phishing and API abuse along with other supply chain attacks to compromise user accounts to gain access. The US government assessed that, of the approximately 18,000 affected public and private sector customers of SolarWinds �� Orion, only a very small number were compromised with activity from Cozy Bear on their systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST 800-61 definition of an incident is:

A

NIST 800-61 definition of an incident is: ‘A security incident is the act of violating an explicit or implied security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An organisation should have an IR plan in place which…

A

clearly defines what an incident is with a guided process to follow in order to ascertain the severity of the incident and required response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The need for an effective IR and management is often driven by change. Some of the trends and increased occurrences that can lead to changes are:

A

a rise in information security incidents and losses such as ransomware;
vulnerabilities in hardware and software;
control failure;
legal and regulatory changes;
lack of security, with poorly managed IT;
threat actor capability growing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IR plan must be supported…

the first step in IR

A

by policy and procedure

first step in IR plan is revisiting other information security policies to ensure up to date or fit for purpose and built on solid foundations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A typical IR plan may include the following:

A

mission;
strategies and goals;
organisation response to IR;
triage and trigger for different IR levels;
key decision-making employee and responsibilities;
communication with the rest of the organisation and third parties or customers;
an ability to measure the IR;
capability and its effectiveness;
lessons learnt for ongoing IR improvement;
capability;
senior management approval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CERT

A

The preparation phase is perhaps the most important phase. Here the development of an IR plan and what is often called a computer emergency response team (CERT) is put together and trained The goal is to ensure the organisation has the people, tools, policies and plans to respond to an incident. The plan cannot be considered implemented unless it has been tested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A

The next phase is the detection of an incident; it could be just IoC, intrusion or a full blown cyber-attack. The sooner you can detect the sooner you can respond. A very important part is to check that it is an incident and not a false positive from a system failure or incorrect alerts. It is here where having monitors, vulnerability scanning, IDSs and log and network traffic analysis in place will help get quick visibility and therefore response. With detection you also need to be able to undertake further analysis to determine the required response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Monitoring: �Ongoing monitoring to detect any signs of residual issues or new attacks.

A

Description: ; Impact: ; Attribution:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Table 8.1 Basic prioritisation of incidents by severity of attacks (ENISA)

A

Description: ; Impact: ; Attribution:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Attack

A

Description: ; Impact: ; Attribution:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Organisations must understand their responsibility for notification of a breach following local law and regulation.

A

Description: ; Impact: ; Attribution:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Risk assessment is performed to identify potential threats (natural disasters, cyber-attacks and hardware failures) to assess their likelihood and impact.
Description: ; Impact: ; Attribution:
26
Looking at the records and information held by Quantum View, suggest how long they might be able to continue operating effectively if they lost data due to a ransomware attack that impacted the following:
Description: ; Impact: ; Attribution:
27
The CMA is aimed at criminalising unauthorised access to computer systems and data, and the creation or supply of items to conduct a CMA offence. Enacted in response to growing concerns about computer crime and to address legal inadequacies highlighted by high-profile hacking cases, the CMA provides a framework for prosecuting various forms of computer misuse crime.
Description: ; Impact: ; Attribution:
28
The CMA also covers acts with intent to impair, or with recklessness as to impairing, the operation of a computer. This includes actions such as the deployment of viruses, DoS attacks and other forms of cyber sabotage intended to disrupt or damage computer operations. Furthermore, the act covers the risk of serious damage, recognising that some cyber activities can have severe consequences for national security, public health or safety and economic stability.
Description: ; Impact: ; Attribution:
29
The CMA has undergone amendments to keep pace with the evolving nature of cyber threats. Notably, the Police and Justice Act 2006 introduced provisions to address DoS attacks and increased penalties for certain offences. The Serious Crime Act 2015 further expanded the CMA by introducing a new offence for unauthorised acts causing or creating the risk of serious damage, reflecting the growing potential impact of cyber activities on critical infrastructure and national security.
Description: ; Impact: ; Attribution:
30
Section 3 �Unauthorised acts with intent to impair or with recklessness as to impair the operation of a computer. This could be conducting a DDoS attack or the use of ransomware.
Description: ; Impact: ; Attribution:
31
Section 3A �Making, supplying or obtaining articles for use in another CMA offence. This could be creating malware, offering a DDoS service or creating tools that aid in ransomware or phishing attacks.
Description: ; Impact: ; Attribution:
32
Section 3ZA �Unauthorised acts causing, or creating risk of, serious damage. This could be an attacker hacking into a system and their reckless behaviour causing a large data loss and systems failure.
Description: ; Impact: ; Attribution:
33
EC Council (2023) Certified Hacking Forensic Investigator. Available from �cert.eccouncil.org/computer-hacking-forensic-investigator.html.
Description: ; Impact: ; Attribution:
34
Incident Response (IR)
**Definition:** Structured process to manage and respond to incidents; Reduces damage, recovery time, and costs; Applies to power outages, cyber-attacks, and data breaches.
35
NIST 800-61 Definition
**Definition:** A security incident is the act of violating an explicit or implied security policy.
36
Security Policy Differences
**Explanation:** Security policies vary by organisation; Example: Personal device in retail may not be an incident, but in a government building it could be serious.
37
Drivers of IR and Management Change
**Trends:** Rise in security incidents; Hardware/software vulnerabilities; Control failures; Legal/regulatory changes; Poor IT management; Growing threat actor capabilities.
38
Typical IR Plan Components
**Includes:** Mission; Strategies and goals; Response procedures; Triage levels; Key decision-makers; Communication plans; Measurement and effectiveness; Lessons learned; Senior management approval.
39
Figure 8.1
**Description:** NIST 800-61 four-stage incident response model; * Preparation; * Detection and Analysis; * Containment, Eradication and Recovery; * Post-Incident Activity
40
IR Stage: Preparation
**Key Elements:** * Establish IR policies and procedures; * Ensure tools and resources are available; * Train staff to recognize and respond to incidents; * Test the incident response plan
41
IR Stage: Detection and Analysis
**Key Elements:** * Monitor systems for potential incidents; * Use IDS, vulnerability scanning, and traffic analysis; * Confirm incident vs false positive; * Assess scope and impact
42
IR Stage: Containment, Eradication and Recovery
**Key Elements:** * Contain incident to prevent spread; * Decide on forensic collection; * Remove malware and vulnerabilities; * Restore systems to clean state; * Monitor for residual issues
43
IR Stage: Post-Incident Activity
**Key Elements:** * Conduct root cause analysis; * Review response effectiveness; * Update policies and procedures; * Improve IR plan based on lessons learned
44
Table 8.1
**Description:** Basic prioritisation of incidents by severity (ENISA); * RED: Very high severity (e.g., DDoS, phishing site); * ORANGE: High severity (e.g., Trojan distribution, unauthorised modification); * YELLOW: Normal severity (e.g., Spam, copyright issue)
45
Table 8.2
**Description:** Alternate site descriptions for disaster recovery; * Cold site: Basic infrastructure, no equipment; * Warm site: Infrastructure with systems, needs data recovery; * Hot site: Fully operational with latest systems and data; * Mobile site: Transportable, pre-configured equipment; * Redundant site: Backup for critical apps, high availability
46
Table 8.3
**Description:** Devices and potential digital evidence; * RAM: Passwords, unsaved work, open files; * Memory card: Logs, text/images, browsing history; * Digital camera: Images, video, timestamps; * Hard drive: Multimedia, databases, programs; * Biometric scanner/smart card: Access/authentication data; * Mobile phone: Contacts, messages, multimedia; * Thumb drive: Text, graphics, images; * Printer: Logs, timestamps, network info; * Routers/firewalls/switches: Configuration files, logs
47
IR Team Role: Technical team
**Responsibilities:** * IT and security experts; * Includes security analysts, threat intelligence, cyber engineering
48
IR Team Role: Senior management
**Responsibilities:** * Provides oversight; * Informs board or CEO; * Makes decisions
49
IR Team Role: Incident manager
**Responsibilities:** * Coordinates IR team; * Tracks timelines; * Manages triage and post-incident reporting
50
IR Team Role: Communications coordinator
**Responsibilities:** * Manages internal and external communications; * Works with legal and media
51
IR Team Role: Forensic analyst
**Responsibilities:** * Conducts forensic analysis; * Often outsourced due to cost
52
IR Team Role: External consultant
**Responsibilities:** * Provides support if no internal IR team; * Advises during incidents
53
IR Team Role: Legal representative
**Responsibilities:** * Identifies legal concerns; * Controls communication; * Protects organisation
54
Stolen Laptop Case Study
**Attack:** Physical theft of a laptop containing unencrypted sensitive data; **Response:** Police and IT department notified; Remote access disabled; Laptop had password protection and security tools; US Department of Health and Human Services notified; Internal policy review and vendor security assessment conducted; **Impact:** �160,000 in remediation, monitoring, and operational improvements (excluding reputational damage); **Lessons Learned:** * Train employees in secure device handling; * Avoid leaving devices in vehicles; * Understand breach notification responsibilities; * Review security practices at least annually
55
Disaster Recovery (DR)
**Definition:** Use of people, process, and technology to minimise impact of incidents; Ensures continuity during disruptions; Integrates with BCP and IR planning
56
Implementing DR
**DRP Implementation Steps:** * Risk assessment and BIA; * Create DR plan and team; * Implement technical solutions; * Develop communication plan; * Conduct testing and training; * Review and update DRP; * Continuous improvement
57
Risk Assessment and BIA
**DRP Component:** * Identify threats (natural disasters, cyber-attacks, hardware failures); * Assess likelihood and impact; * Determine critical functions and dependencies; * Establish RTOs and RPOs
58
Disaster Recovery Plan (DRP)
**DRP Component:** * Define scope and objectives; * Assign DR team roles; * Document recovery procedures; * Establish backup strategy (on-site, off-site, cloud)
59
60
**DRP Component:** * Notify stakeholders, employees, customers, partners; * Include contact lists and templates
61
62
63
64
65
Table 8.1
66
Table 8.2
67
Table 8.3
**Description:** Devices and potential digital evidence; * RAM: Passwords, unsaved work, open files; * Memory card: Logs, text/images, browsing history; * Digital camera: Images, video, timestamps; * Hard drive: Multimedia, databases, programs; * Biometric scanner/smart card: Access/authentication data; * Mobile phone: Contacts, messages, multimedia; * Thumb drive: Text, graphics, images; * Printer: Logs, timestamps, network info; * Routers/firewalls/switches: Configuration files, logs
68
Digital Forensics Overview
**Definition:** Investigation of electronic data; * Identify, collect, preserve, analyse, and present digital evidence; * Used in criminal investigations, corporate inquiries, and security incidents
69
Digital Forensics Phases (NIST)
**Phases:** * Collection; * Examination; * Analysis; * Reporting
70
Digital Forensics Tools
**Examples:** * FTK and EnCase; * Cellebrite and XRY for mobile data; * Autopsy (free); * CAINE Linux distribution with built-in tools
71
Digital Evidence Types
**Categories:** * Volatile data: Lost when power is off (e.g., RAM, clipboard); * Non-volatile data: Stored permanently (e.g., HDD, USB, logs)
72
Order of Volatility (RFC 3227)
**Sequence:** * Registers, cache; * Routing table, ARP cache, process table, memory; * Temporary file systems; * Disk; * Remote logging; * Physical configuration; * Archival media
73
Chain of Custody
**Requirements:** * Track evidence from collection to court; * Document handlers, locations, timestamps; * Prevent tampering and ensure admissibility
74
Evidence Characteristics
**Must be:** * Understandable; * Admissible; * Authentic; * Reliable; * Complete
75
Computer Misuse Act 1990 (CMA)
**Purpose:** Criminalises unauthorised access and cybercrime; * Section 1: Unauthorised access; * Section 2: Access with intent to commit further offences; * Section 3: Acts impairing operation; * Section 3A: Tools for CMA offences; * Section 3ZA: Acts causing serious damage
76
Regulation of Investigatory Powers Act 2000 (RIPA)
**Purpose:** Governs surveillance and interception; * Requires warrants for communication interception; * Regulates covert human intelligence sources; * Allows access to communication metadata; * Includes oversight and safeguards
77
Activity 8.1 - Quantum View Ransomware Scenario
**Prompt:** Assess operational impact if data is lost due to ransomware; * Customer database; * Reports; * Financial information; * Monitoring systems; * Consider factors affecting recovery timescale
78
Activity 8.2 - IR Plan Advice
**Prompt:** Advice for Quantum View's IR plan; * Ensure clear incident definitions; * Include triage and escalation; * Assign roles and responsibilities; * Include communication and legal protocols
79
80
81
82
83
84
Figure 8.2
**Description:** Digital forensics process; * Collection; * Examination; * Analysis; * Reporting
85
Which of the following should inform the decision to invoke a business continuity plan?; * Risk assessment; * Security policy; * Business impact analysis; * All of the above
c
86
If the solution to deal with an issue that has arisen is to move to alternative office accommodation, what is the plan likely called?; * Disaster recovery plan; * Business continuity plan; * Alternative accommodation plan; * Organisation disaster plan
c
87
Data stored in RAM is what type of digital evidence?; * Volatile; * Static; * Non-volatile; * Forensics
a
88
What actions SHOULD a first responder initially make at a digital crime scene?; * Remove power from all devices; * Triage for live data capture; * Remove all evidence; * Wait for senior investigator
b
89
What KEY principle must a digital forensics investigator adhere to when handling original data?; * Be competent and justify actions; * Be observed by senior investigator; * Avoid handling evidence; * Adjust data for investigation
a