Threat intelligence

Welcome and thanks for joining!

© Course authors (CC BY-SA 4.0) - Image: © Charles Hoisington, GSFC (CC BY 2.0)

What we will cover

What threat intelligence is and how it can be
utilized to protect individuals/organisations.

© Course authors (CC BY-SA 4.0) - Image: © Asparukh Akanayev (CC BY 2.0)

Learn to adapt and keep up with the attackers.

© Course authors (CC BY-SA 4.0) - Image: © Steve Jurvetson (CC BY 2.0)

Perform more realistic security
exercises and assessments.

© Course authors (CC BY-SA 4.0) - Image: © Steve Jurvetson (CC BY 2.0)

Learn what to look for when monitoring
IT systems and performing incident response.

© Course authors (CC BY-SA 4.0) - Image: © Steve Jurvetson (CC BY 2.0)

Targeting and fine-tuning communication about
threats towards different recipients.

© Course authors (CC BY-SA 4.0) - Image: © Steve Jurvetson (CC BY 2.0)

(Adapt efforts based on changes in
compliance rules/regulations and
advances in defensive technology)

© Course authors (CC BY-SA 4.0) - Image: © Steve Jurvetson (CC BY 2.0)

Satisfy our curiosity!

© Course authors (CC BY-SA 4.0) - Image: © Steve Jurvetson (CC BY 2.0)

Requires basic knowledge of...

  • OS and application management
  • Networking
© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

The primary focus of this course is to
change your way of thinking, not dig
deep into exciting technical details.

(don't worry, there will be some of
those acronyms that you know and love)

© Course authors (CC BY-SA 4.0) - Image: © Joel Rangsmo (CC BY-SA 4.0)

How we will do it

  • Lectures and Q&A
  • Individual and group presentations
  • Self-lead project
  • Continuous reflection
  • Quizzes and scored tests
© Course authors (CC BY-SA 4.0) - Image: © Kevin Dooley (CC BY 2.0)

For slides, notes and similar,
see: t.menacit.se/ti.zip .

These should be seen as a
complement to an instructor
lead course, not a replacement.

© Course authors (CC BY-SA 4.0)

Acknowledgements

Thanks to IT-Högskolan and Särimner for enabling development of the course.

Hats off to all FOSS developers and free culture contributors making it possible.

© Course authors (CC BY-SA 4.0) - Image: © Jesse James (CC BY 2.0)

Free as in beer and speech

Is anything unclear? Got ideas for improvements? Don't fancy the animals in the slides?

Create an issue or submit a pull request to
the repository on Github!

© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

Let us dig in!

© Course authors (CC BY-SA 4.0) - Image: © Jonathan Torres (CC BY 4.0)

Vocabulary and basics

© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)

Lots of different terms and abbreviations are thrown around.

(Sometimes used interchangeably :-/ )

Let's try to define some of them!

© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)

Threat

Bad stuff that we don't want to happen.

Unwanted events with negative consequences.

Earthquakes, terrorism, lawsuits, ransomware...

© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

Threat actor

Group or individual that wanna do bad stuff
towards other groups or individuals.

Intelligence agencies, criminal gangs,
hacktivists, disgruntled employees...

© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

Asset

Thing belonging to a target that a threat actor
may try to abuse to achieve their goal(s).

Servers, network equipment, endpoint devices
and software running on these computers.

Some include confidential information and
personnel (OBJECTIFICATION!) in their definition.

(Let's keep our focus on IT assets)

© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)

Vulnerability

Weakness that can be abused to affect
the security of an asset.

Software bug, default/bad password,
enabled debug functionality...

© Course authors (CC BY-SA 4.0) - Image: © Asparukh Akanayev (CC BY 2.0)

Exploit

Tool or method used to abuse a vulnerability.

Attack

Attempt to use an exploit against an asset.

© Course authors (CC BY-SA 4.0) - Image: © The Preiser Project (CC BY 2.0)

Attack surface

Assets exposed towards potential
threat actors that may be attacked.

The attack surface may not look
the same to all threat actors.

© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)

Services exposed towards the Internet.

Systems accessible by customers/partners
over a dedicated VPN tunnel.

Hosts exposed on internal office network.

Physical interfaces on industrial equipment.

APIs and other functionality accessible to
a (compromised) application/container.

© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)

Let's try putting these
terms to use, shall we?

© Course authors (CC BY-SA 4.0) - Image: © Yana Sychikova (CC BY 4.0)

A threat actor known as Grumpy Bear
enumerated the attack surface of
our Internet exposed systems.

They identified a vulnerability in
one of our assets: the VPN server
provided by UltraEnterPriseSec Inc.

They utilized a publicly available
exploit from Metasploit in their
attack, based on information
provided by the system logs.

© Course authors (CC BY-SA 4.0) - Image: © Yana Sychikova (CC BY 4.0)

TTPs

Describes (known historic) behavior
of a threat actor.

Tactics (high-level),
Techniques (mid-level) and
Procedures (low-level).

Used together with target analysis
(basically "who was targeted") and other
indicators for threat actor attribution.

© Course authors (CC BY-SA 4.0) - Image: © Gobi (CC BY 2.0)

Tactic: Steal sensitive information
and use it as blackmail for extortion.

Technique: Gain access to victim's email account
through "credential phishing" (social engineering).

Procedure:
Utilize the freely available tool "Gophish" to
send phishing emails claiming that the user must
change their password, setup redirect through
Google Docs domain to trick spam filters...

© Course authors (CC BY-SA 4.0) - Image: © Gobi (CC BY 2.0)

The CIA triad

Helps us break down what "secure" means.

Confidentiality,
Integrity and
Availability.

"Thought-tool" that can be used to discuss
priorities, expected outcome of changes...

(More about how to use it later...)

© Course authors (CC BY-SA 4.0) - Image: © Fibreman (CC0 1.0)

Quantifying risk

© Course authors (CC BY-SA 4.0) - Image: © Kārlis Dambrāns (CC BY 2.0)

Risk ~=
Consequences of bad thing * Probability.

Tsunami washing away Stockholm data center *
Probability of event ~= Extremely low risk.

Secrets being stolen from outdated system Z *
Probability of event ~= Low-to-medium risk.

© Course authors (CC BY-SA 4.0) - Image: © Kārlis Dambrāns (CC BY 2.0)

Wrapping up

© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)

Protecting whom?

© Course authors (CC BY-SA 4.0) - Image: © Pyntofmyld (CC BY 2.0)

Congratulations - the job is yours!
Make sure that we are safe.

Person who just hired you to do "security stuff"

© Course authors (CC BY-SA 4.0) - Image: © Pyntofmyld (CC BY 2.0)

Now what?

© Course authors (CC BY-SA 4.0) - Image: © Pyntofmyld (CC BY 2.0)

Understanding the organisation

Resources (time, money and smart people)
are always limited.

How do we best spend them?

Spoiler alert: "It depends!"

© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

What ensures the organisations survival
(income, political support, legal permits, etc)?

What are their worst nightmares?
"Extinction level events?"

How have other similar organisations
been affected by breaches/incidents?

© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

What are the organisations priorities
from a security perspective?

Let's use the CIA triad to get an idea!

© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

Psychotherapy clinic

Stores and processes highly sensitive information about patients.

Leakage of healthcare data would harm patient trust and may have legal repercussions.

Short-term inaccessibility of computer systems would be a nuisance, but likely manageable.

© Course authors (CC BY-SA 4.0)

Crisis information website

Designed to provide important guidance and information during natural disasters, war and similar.

Availability is extremely important, but inaccurate (or even malicious) information may be worse.

© Course authors (CC BY-SA 4.0)

Retail bank

Processes thousands of transactions per second.

Confidentiality, integrity and availability are all extremely important.

Money can't be allowed to dissapear from customers accounts.

© Course authors (CC BY-SA 4.0)

Priorities may shift if "incident duration" is specified/changed.

May be hard to accurately use for a whole organisation - drill into different business areas.

Just one of the ways you can wield the CIA triad.

© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

What do we have that others may want?

  • Money!
  • CRM information
  • Intellectual property (code, product schematics, etc)
  • Large number of eyeballs
  • Computing resources and bandwidth
  • Embarrassing documents/e-mails

...

© Course authors (CC BY-SA 4.0) - Image: © Reid Campbell (CC0 1.0)

Could we be used as a stepping stone?

The "Target retail breach" is
an interesting example.

© Course authors (CC BY-SA 4.0) - Image: © Reid Campbell (CC0 1.0)

Conclusions?

© Course authors (CC BY-SA 4.0) - Image: © Pyntofmyld (CC BY 2.0)

Meet the threat actors

© Course authors (CC BY-SA 4.0) - Image: © David Revoy (CC BY 4.0)

Why should we care?

Not all threat actors are created equal.

Different motivations and expertise/resources.

Tracking and understanding their activities may help us better protect ourselves.

(and it's fun!)

© Course authors (CC BY-SA 4.0) - Image: © David Revoy (CC BY 4.0)

Let's brasklapp!

Everyone has to live with
the "Internet noise".

Lots of hacking is opportunistic.

© Course authors (CC BY-SA 4.0) - Image: © David Revoy (CC BY 4.0)

Motivations

  • Personal
  • Financial
  • Political
  • Military
© Course authors (CC BY-SA 4.0) - Image: © David Revoy (CC BY 4.0)

Personal

  • Curiosity / Learning
  • Thrill seeking / Fun
  • Fame / Cred
  • Anger / Revenge
© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Financial

  • Industrial espionage
  • Blackmail
  • Stock / Market manipulation
  • Computational resources
© Course authors (CC BY-SA 4.0) - Image: © Asparukh Akanayev (CC BY 2.0)

Political

  • Intelligence gathering
  • Propaganda
  • Discrediting
© Course authors (CC BY-SA 4.0) - Image: © Theo Crazzolara (CC BY 2.0)

Military

  • Intelligence gathering
  • Disruption
© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Let's meet some of them!

© Course authors (CC BY-SA 4.0) - Image: © David Revoy (CC BY 4.0)

Stakkato

Swedish teenager hacking for
learning and the thrill.

Targeted "high-security organisations"
and educational institutions.

While at the surface somewhat harmless,
how should we handle incident response?

(Curious to learn more? Check out
the old and cozy book "Svenska hackare"!)

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

LulzSec

Small group of hackers with
"fun and mayhem" as their goals.

Targeted wide range of companies,
such as Sony Pictures, Fox News
and the game publisher Bethesda.

Disbanded after "50 days of lulz",
several members were later arrested
after group founder became informant.

While not the most technical and
quite opportunistic, good at PR!

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Casey Umetsu

Sysadmin who was fired/made redundant.

Allegedly used knowledge to disrupt
operations at former employer.

Malicious action by disgruntled employee
or an honest mistake using automation?

Useful lesson regardless!

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

FIN7

Highly organised criminal group based in Russia.

Focus on datatheft and "big-game" ransomware.

Branched out into becoming a
"Ransomware as a Service" provider.

AKA Carbon Spider, ELBRUS and Sangria Tempest,
depending on who you ask! :-/

© Course authors (CC BY-SA 4.0) - Image: © Asparukh Akanayev (CC BY 2.0)

APT10

Chinese threat actor with focus on industrial espionage.

Suspected ties to intelligence services.

Responsible for the "Cloud Hopper" attacks
targeting (Swedish) MSPs.

This type of group is known as an
Advanced Persistent Threat.

© Course authors (CC BY-SA 4.0) - Image: © Asparukh Akanayev (CC BY 2.0)

Lazarus Group

Hacking group associated with the
North Korean government.

Focus on attacks against payment services,
banking and cryptocurrency exchanges.

Known to use interesting tactics like
fake recruitment tests for developers
and getting hired for insider access.

© Course authors (CC BY-SA 4.0) - Image: © Asparukh Akanayev (CC BY 2.0)

Phineas Fisher

Highly skilled anarchist hacktivist.

Targeted makers of "law enforcement spyware",
political parties and financial institutions.

Claims to run "bug-bounty" for "ethical hacking".

Published surprisingly detailed write-ups of
hacking activities, providing useful lessons.

© Course authors (CC BY-SA 4.0) - Image: © Theo Crazzolara (CC BY 2.0)

Charming Kitten

State-sponsored Iranian group.

Spies on various targets of interest to the government.

Targets organisations and individuals
(mainly dissidents and activists).

© Course authors (CC BY-SA 4.0) - Image: © Theo Crazzolara (CC BY 2.0)

Equation Group

Threat actor associated with NSA.

Famous for malware such as "Stuxnet"
and "Flame".

Targets adversaries of the USA.

Several tools associated with the group,
like an exploit for the "EternalBlue"
vulnerability, were stolen and leaked
by the threat actor "Shadow Brokers".

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Sandworm

Unit of the Russian military intelligence service.

Known for disruptive attacks against the
Olympic Games and Ukrainian infrastructure.

While long known as a theoretical risk,
demonstrated attacks against a power grid.

(Check out Andy Greenberg's book if
you wanna learn more about them!)

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Countless more for the interested!

© Course authors (CC BY-SA 4.0) - Image: © David Revoy (CC BY 4.0)

Group exercise

© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

Exercise: Match the threat actor

Participants are split into groups.

Each group will be provided with descriptions of fictional organisations and threat actors.

For each organisation, motivate and define their priorities/needs using the CIA triad.

For each threat actor, motivate and rank (1 to 5) how "attractive" each target organisation is.

Use liberal amounts of imagination/guesstimation. After presentation, send slides as PDF to:
courses+ti_010401@0x00.lt

© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

Sounds complicated?

Let me show you an example...

© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

Org: XMPLE Prospecting Inc.

Experts in geological prospecting to find oil and natural gas deposits.

Operates several high-performance computing clusters for simulation models.

Produces reports and sells information, doesn't perform any extraction.

Active in the Central Asia region.

© Course authors (CC BY-SA 4.0) - Image: © Pyntofmyld (CC BY 2.0)

Org: XMPLE Prospecting Inc.

Needs/security priorities based on CIA triad.

Confidentiality

The organisation makes money by selling highly valuable information.

Customers pay for the advantage, value proposition fails otherwise.

© Course authors (CC BY-SA 4.0)

Org: XMPLE Prospecting Inc.

Needs/security priorities based on CIA triad.

Integrity

Manipulation of collected data/simulation models could result in misleading customers.

Long-term, this may result in a loss of credibility.

© Course authors (CC BY-SA 4.0)

Org: XMPLE Prospecting Inc.

Needs/security priorities based on CIA triad.

Availability

While the organisation relies on computer systems
to aid prospecting, its main strengths are expert
knowledge and customer relations.

Temporary inaccessibility of IT environment
is not deemed a major business risk.

© Course authors (CC BY-SA 4.0)

Threat actor: Crocs4Justice

Loosely organised group of "left-leaning" hacktivists.

Hacks for fun and as a political action.

Utilize DDoS, defacement and information leaks against their targets.

Known to use publicly available exploits and seem to lack deep technical knowledge/funding.

© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

Threat actor: Savory Bear

APT with suspected ties to the Russian state.

Hacks to extract sensitive information that may be of value to the state or associated actors.

Has historically exploited 0-day vulnerabilities to gain system access.

© Course authors (CC BY-SA 4.0) - Image: © William Warby (CC BY 2.0)

Org: XMPLE Prospecting Inc.

How well does the organisation match the threat actors focus/interest?

Crocs4Justice: 3

While the threat actor likely objects to the business ("aiding ecological destruction") of
the target organisation, it is far from a household name and the PR gains would be small.
May attack the organisation opportunistically, but won't spend much effort on the target.

© Course authors (CC BY-SA 4.0) - Image: © Pyntofmyld (CC BY 2.0)

Org: XMPLE Prospecting Inc.

How well does the organisation match the threat actors focus/interest?

Savory Bear: 5

Information produced by the target organisation may be of high value to the Russian state.
Central Asia is perceived as their historical sphere of influence and large energy deposits
could greatly change international interest in the region. Early access to the information
could allow state-friendly actors to quickly exploit the resources and gain an edge/presence.

© Course authors (CC BY-SA 4.0) - Image: © Pyntofmyld (CC BY 2.0)

Bonus points for verbosity,
group participation and fancy design!

Again: imagination is encouraged!

If you need a template of a triangle,
checkout this link.

© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

Write-up exercise

© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

Exercise: Threat actor report

Each participant should research and produce a report about one of the following threat actors:

  • "Ember Bear"
  • "Lapsus$"
  • "Darkhotel"

The report should contain information about the
threat actor's TTPs, known victims/attacks, motivations or similar (512 words or more).

Send as plain text, Markdown document or PDF to:
courses+ti_010501@0x00.lt

© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

Basics recap

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Fundamental vocabulary

  • Threat actor
  • Asset
  • Vulnerability
  • Exploit
  • Attack
  • Attack surface
© Course authors (CC BY-SA 4.0) - Image: © Guilhem Vellut (CC BY 2.0)

Tactics,
Techniques and
Procedures.

Confidentiality,
Integrity and
Availability.

© Course authors (CC BY-SA 4.0) - Image: © Adam Lusch (CC BY-SA 2.0)

Risk ~=
Consequences of bad thing * Probability

© Course authors (CC BY-SA 4.0) - Image: © Rick Massey (CC BY 2.0)

Protecting an organisation

What ensures its survival
(income, political support, legal permits, etc)?

What are their worst nightmares?

What are the organisation's priorities?

What do they have that others may want?

© Course authors (CC BY-SA 4.0) - Image: © Joel Rangsmo (CC BY-SA 4.0)

Understanding threat actors

Not all created equal.

Different skill levels and motivations:

  • Personal
  • Financial
  • Political
  • Military
© Course authors (CC BY-SA 4.0) - Image: © Stig Nygaard (CC BY 2.0)

Any recap questions?

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Intrusion vocabulary

A somewhat gentle introduction

© Course authors (CC BY-SA 4.0) - Image: © Mike Grauer Jr (CC BY 2.0)

We've begun to understand who we're protecting.

We've gotten to know some of the threat actors.

We know that there is something called TTPs.

What does a "typical hack" look like?

© Course authors (CC BY-SA 4.0) - Image: © Mike Grauer Jr (CC BY 2.0)

Overview of phases

  • Reconnaissance
  • Initial access
  • Persistence
  • Lateral movement / Privilege escalation
  • Causing impact
© Course authors (CC BY-SA 4.0) - Image: © Stig Nygaard (CC BY 2.0)

Reconnaissance

Understanding the target organisation
and their attack surface.

Active network scanning of exposed assets
and gathering of Open Source Intelligence.

Products in role descriptions on LinkedIn,
domains in certificate transparency logs,
paths/usernames in file metadata,
technical information leakage
in server headers...

(Mandatory plug for Bellingcat!)

© Course authors (CC BY-SA 4.0) - Image: © Todd Van Hoosear (CC BY-SA 2.0)

Initial access

  • (Spear) phishing / smishing / quishing...
  • Credential stuffing / Password guessing
  • Software bug exploitation
© Course authors (CC BY-SA 4.0) - Image: © Randy Adams (CC BY-SA 2.0)

Persistence

Wanna be able to come and go as we please.

Malware such as a Remote Access Trojan.

Configuration of additional reset email addresses.

Backdooring of firmware if we're real serious!

© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)

Privilege escalation

Vertical escalation ("guest to admin rights")
and horizontal escalation ("Org. A to Org. B").

Lateral movement

Gain access to sensitive systems by exploiting
lacking segmentation and interconnectedness.

© Course authors (CC BY-SA 4.0) - Image: © Kevin Dooley (CC BY 2.0)

Causing impact

  • Disruption
  • Data theft
  • Defacement
  • Resource hijacking
© Course authors (CC BY-SA 4.0) - Image: © Kārlis Dambrāns (CC BY 2.0)

During all the phases, we might put
some effort into covering our tracks
and "muddy the waters" to make
attribution more difficult.

Delete (some) audit log events,
utilise proxy/tunneling services,
modify locale metadata in malware,
avoid hacking during "working hours"...

© Course authors (CC BY-SA 4.0) - Image: © Andrew Pontzen / Fabio Governato (CC BY 2.0)

Wanna dig deeper into the phases of a hack
and discover known TTPs of threat actors?

Have a look at MITRE ATT&CK.

© Course authors (CC BY-SA 4.0) - Image: © Guilhem Vellut (CC BY 2.0)

Some are trying to name and define
the phases of a hacking campaign in a
standardised way, with more or less success.

Lockheed Martin's "Cyber Kill Chain"
is a commonly used example.

© Course authors (CC BY-SA 4.0) - Image: © Stig Nygaard (CC BY 2.0)

Wrapping up

© Course authors (CC BY-SA 4.0) - Image: © Mike Grauer Jr (CC BY 2.0)

CVE and vulnerability tracking

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Background

Software will always contain bugs.

Some of those are exploitable.

Some software components are used in more
than one product by more than one vendor
(think popular libraries like OpenSSL).

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Is vendor Y's software affected by vulnerability X?

Does our product have vulnerabilities similar to X?

Can our Intrusion Detection System
identify attempts to exploit vulnerability X?

Can our vulnerability scanner detect X?

© Course authors (CC BY-SA 4.0) - Image: © Rod Waddington (CC BY-SA 2.0)

What are "CVE IDs"?

Common Vulnerabilities and Exposures.

Unique identifier assigned to vulnerabilities.

Developed and managed by MITRE since 1999.
Over 280000 flaws registered in the database.

Defacto industry standard used to track
and talk about vulnerabilities.

© Course authors (CC BY-SA 4.0) - Image: © Stig Nygaard (CC BY 2.0)

CVE-2022-47949

"CVE-" + $Year + $Sequence number

© Course authors (CC BY-SA 4.0) - Image: © Stig Nygaard (CC BY 2.0)

CVE IDs are in either the "reserved",
"published" or "rejected" state.

At its core, a CVE database entry contains
a vulnerability description and optionally
a list of references (external links).

© Course authors (CC BY-SA 4.0) - Image: © Stig Nygaard (CC BY 2.0)

How do I get one?

CVE IDs are allocated/assigned by a
CVE Numbering Authority.

Each CNA is responsible for one or more
vendors/products/software components.

If the software isn't covered by the
scope of any existing CNA, talk to a
CNA of Last Resort (CNA-LR).

© Course authors (CC BY-SA 4.0) - Image: © Loco Steve (CC BY-SA 2.0)

CVE-2020-29583

Firmware version 4.60 of Zyxel USG devices
contains an undocumented account (zyfwp)
with an unchangeable password. The
password for this account can be found in
cleartext in the firmware. This account
can be used by someone to login to the
ssh server or web interface with
admin privileges.

© Course authors (CC BY-SA 4.0) - Image: © Randy Adams (CC BY-SA 2.0)

CVE-2021-22893

Pulse Connect Secure 9.0R3/9.1R1 and higher
is vulnerable to an authentication bypass
vulnerability exposed by the Windows File
Share Browser and Pulse Secure Collaboration
features of Pulse Connect Secure that can
allow an unauthenticated user to perform
remote arbitrary code execution on the Pulse
Connect Secure gateway. This vulnerability
has been exploited in the wild.

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

CVE-2016-5195

Race condition in mm/gup.c in the Linux
kernel 2.x through 4.x before 4.8.3 allows
local users to gain privileges by leveraging
incorrect handling of a copy-on-write (COW)
feature to write to a read-only memory
mapping, as exploited in the wild in
October 2016, aka "Dirty COW."

© Course authors (CC BY-SA 4.0) - Image: © Nacho Jorganes (CC BY-SA 2.0)

CVE-2022-33637

Microsoft Defender for Endpoint
Tampering Vulnerability.

© Course authors (CC BY-SA 4.0) - Image: © Jack Lawrence (CC BY-SA 2.0)

CVE-2017-0144

The SMBv1 server in Microsoft
Windows Vista SP2;
Windows Server 2008 SP2 and R2 SP1;
Windows 7 SP1; Windows 8.1;
Windows Server 2012 Gold
and R2; Windows RT 8.1;
and Windows 10 Gold, 1511, and 1607;
and Windows Server 2016 allows
remote attackers to execute
arbitrary code via crafted packets,

© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

There are "extensions" to the CVE database
that may be used to associate additional
useful information to an identifier.

Some are created/managed by MITRE,
others by third-parties.

Let's have a look at the most common ones...

© Course authors (CC BY-SA 4.0) - Image: © Stig Nygaard (CC BY 2.0)

Common Platform Enumeration
provides as structured/computer-readable
format to describes which vendors, products
and software versions are affected by a flaw.

cpe:2.3:a:ivanti:endpoint_manager_mobile:12.5

The page about CPE on Wikipedia provides
a decent explanation of the sub-fields.

© Course authors (CC BY-SA 4.0) - Image: © Egill Egilsson (CC BY 2.0)

Common Weakness Enumeration
provides a list of common vulnerability
types that may affect software/hardware.

Similar to OWASP Top Ten, but more generic.

Useful as reference for flaw mitigation
and to understand historic security
challenges in codebase.

Who could forget classics like
CWE-416 (AKA "Use After Free") and
CWE-89 (AKA "Improper Neutralization of Special Elements used in an SQL Command") ?!

© Course authors (CC BY-SA 4.0) - Image: © Adam Lusch (CC BY-SA 2.0)

The USA's Cybersecurity and
Infrastructure Security Agency
maintains two lists of CVE IDs that
may be of particular interest.

The Known Exploited Vulnerabilities
list contains flaws that they've identified
being actively exploited by threat actors.

Fixing or mitigating vulnerabilities included
in the list should be highly prioritized
(great "signal-to-noise ratio").

© Course authors (CC BY-SA 4.0) - Image: © ESA (CC BY-SA 3.0 IGO)

The organisation "FIRST" provides
the "Exploit Prediction Scoring System".

Uses machine learning and voodoo magic
sophisticated prediction models to guesstimate
how likely it is that a flaw will be
practically exploitable.

Currently provided as API with scores
for all published CVEs. Use with caution.

(CISA has launched an alternative called
"Likely Exploited Vulnerabilities".)

© Course authors (CC BY-SA 4.0) - Image: © Joel Rangsmo (CC BY-SA 4.0)

We will cover the wide-spread
Common Vulnerability Scoring System
later during the course, don't worry...

© Course authors (CC BY-SA 4.0) - Image: © Stig Nygaard (CC BY 2.0)

Manually monitoring CVEs is time-consuming.

Tools like OpenCVE can help you
track/triage those relevant to your organisation.

© Course authors (CC BY-SA 4.0) - Image: © Andreas Swane (CC BY 2.0)

Sounds amazing, doesn't it?

Spoiler alert: it ain't all roses...

© Course authors (CC BY-SA 4.0) - Image: © Guilhem Vellut (CC BY 2.0)

CNAs are responsible for allocating
CVE IDs and submitting description to MITRE.

Product vendors are often their own CNA.

They may be unresponsive to reports.

They could be incentivised to
procrastinate publication or polish
descriptions to downplay the severity.

The "NotCVE" project attempts to
provide an alternative. Will it succeed?

© Course authors (CC BY-SA 4.0) - Image: © Matthias Ripp (CC BY 2.0)

CVE IDs gets allocated and assigned
to bugs/behaviors that are not
security vulnerabilities.

Submitted by sloppy researches and
hallucinating AI bots.

Developers may dispute bogus claims,
but it's hard to get them removed
from the CVE database.

A common work-around is to become
your own CNA to filter requests,
like the curl project did.

© Course authors (CC BY-SA 4.0) - Image: © Franz van Duns (CC BY-SA 4.0)

Some software projects don't wanna spend
time on classifying whether a bug could
be a security vulnerability or not.

The Linux kernel team recently became
their own CNA and simply assigns a
CVE ID to each identified bug.

...thereby spamming the database
with a bunch of non-flaws.

© Course authors (CC BY-SA 4.0) - Image: © Brocken Inaglory (CC BY-SA 3.0)

MITRE is mainly funded by the US government.

Like many similar organisations, there have
been significant uncertainty regarding
their ability to continue operating.

Furthermore, they've been failing to
maintain the database and promptly
allocate CVE IDs to CNAs.

Alternatives have appeared, like
EU's own Vulnerability Database and
the decentralised Global CVE system.

© Course authors (CC BY-SA 4.0) - Image: © Joel Rangsmo (CC BY-SA 4.0)

Conclusions?

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

CVSS basics

Common Vulnerability Scoring System

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Background

CVE IDs tell us that a vulnerability exist.

Its description doesn't necessarily tell us
the potential impact or if there are any
prerequisites for exploitation.

Great need for a common method to rate and
compare severity of vulnerabilities.

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

The Common Vulnerability Scoring System
aims to provide a solution.

Standard developed by FIRST to describe
the "characteristics of a vulnerability".

Widely used to guide and prioritize
vulnerability remediation efforts.

© Course authors (CC BY-SA 4.0) - Image: © Loco Steve (CC BY-SA 2.0)

Produces a numerical score between 0.0 and 10.0.

Vulnerabilities may be assigned a textual
severity rating based on their score:

Severity Numerical score range
None 0.0
Low 0.1 - 3.9
Medium 4.0 - 6.9
High 7.0 - 8.9
Critical 9.0 - 10.0
© Course authors (CC BY-SA 4.0) - Image: © Joel Rangsmo (CC BY-SA 4.0)

CVSS "vector strings" provide a compact way to
communicate the reasoning behind a score:

CVSS:4.0/AV:N/AC:L/AT:N/PR:L ↴
/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N

(We shall cover this later, don't worry!)

© Course authors (CC BY-SA 4.0) - Image: © Joel Rangsmo (CC BY-SA 4.0)

Several different versions exist,
4.0 was release in late 2023.

Version 3.1 is still most commonly used.

Available as a formal specification or
through a handy online calculator tool.

(If you're paranoid, consider using
a local copy of the calculator!)

© Course authors (CC BY-SA 4.0) - Image: © Loco Steve (CC BY-SA 2.0)

Let there be demos!

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Group exercise

© Course authors (CC BY-SA 4.0) - Image: © Randy Adams (CC BY-SA 2.0)

Exercise: CVSS base score

Participants are split into groups.

Each group will be provided with five CVE IDs and
their descriptions. Based on the descriptions,
calculate CVSS 4.0 base metrics.

Guesstimation/basic research may be required.

Send resulting CVSS vector strings to:
courses+ti_011001@0x00.lt

© Course authors (CC BY-SA 4.0) - Image: © Randy Adams (CC BY-SA 2.0)

CVE-2017-6742

The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0
through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an
authenticated, remote attacker to remotely execute code on an affected system or cause an affected
system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet
to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to
exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the
SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions
1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must
know the SNMP read-only community string for the affected system. To exploit these vulnerabilities
via SNMP Version 3, the attacker must have user credentials for the affected system. All devices
that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be
considered vulnerable. Cisco Bug IDs: CSCve54313.
© Course authors (CC BY-SA 4.0)

CVE-2021-22009

The vCenter Server contains multiple denial-of-service vulnerabilities
in VAPI (vCenter API) service. A malicious actor with network access
to port 443 on vCenter Server may exploit these issues to create a
denial of service condition due to excessive memory consumption
by VAPI service.
© Course authors (CC BY-SA 4.0)

CVE-2022-39945

An improper access control vulnerability [CWE-284] in FortiMail 7.2.0,
7.0.0 through 7.0.3, 6.4 all versions, 6.2 all versions, 6.0 all versions
may allow an authenticated admin user assigned to a specific domain to
access and modify other domains information via
insecure direct object references (IDOR).
© Course authors (CC BY-SA 4.0)

CVE-2022-44877

login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7
before 0.9.8.1147 allows remote attackers to execute arbitrary
OS commands via shell metacharacters in the login parameter.
© Course authors (CC BY-SA 4.0)

CVE-2018-1000803

Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability
that can result in Exposure of users private email addresses.
This attack appear to be exploitable via Watch a repository to receive
email notifications. Emails received contain the other recipients even
if they have the email set as private. This vulnerability appears to
have been fixed in 1.5.1.
© Course authors (CC BY-SA 4.0)

Advanced CVSS usage

Beyond the base metrics

© Course authors (CC BY-SA 4.0) - Image: © Pedro Mendes (CC BY-SA 2.0)

The problem

In practice, the urgency to mitigate a
vulnerability may change over time.

Is it just theoretically exploitable or
are there public Metasploit modules?

Are there any factors that affect the
severity based on my particular usecase?

© Course authors (CC BY-SA 4.0) - Image: © Pedro Mendes (CC BY-SA 2.0)

The supplemental, environmental
and threat metrics are available
to tweak the calculated score!

© Course authors (CC BY-SA 4.0) - Image: © Adam Lusch (CC BY-SA 2.0)

Let's take 'em for a spin!

© Course authors (CC BY-SA 4.0) - Image: © Adam Lusch (CC BY-SA 2.0)

Wrapping up

© Course authors (CC BY-SA 4.0) - Image: © Pedro Mendes (CC BY-SA 2.0)

Write-up exercise

© Course authors (CC BY-SA 4.0) - Image: © Johannes P1hde (CC BY 2.0)

Exercise: Incident report

Each participant should research and produce a report about one of the following incidents:

  • Cayman National Bank hack
  • Equifax data breach
  • Logica leak

The report should describe (to the extent known) what happend, which flaws were exploited,
suspected perpetrators and incident aftermath.
777 words or more, remember to cite sources!

Send as plain text, Markdown document or PDF to:
courses+ti_011201@0x00.lt

© Course authors (CC BY-SA 4.0) - Image: © Johannes P1hde (CC BY 2.0)

CVE / CVSS recap

Tracking and rating vulnerabilities

© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

Common Vulnerabilities and Exposures.

Unique identifier assigned to a vulnerability
in a software component.

Used to track flaws and communicate about them.

Managed by MITRE and
CVE Numbering Authorities (often vendors).

"CVE-" + $Year + $Sequence number

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

We can tie other useful information to CVE IDs!

Common Platform Enumeration
provides as structured/computer-readable
format to describes which vendors, products
and software versions are affected by a flaw.

Common Weakness Enumeration
provides a list of common vulnerability
types that may affect software/hardware.

© Course authors (CC BY-SA 4.0) - Image: © Adam Lusch (CC BY-SA 2.0)

The Known Exploited Vulnerabilities
list contains flaws that they've identified
being actively exploited by threat actors.

The Exploit Prediction Scoring System
and Likely Exploited Vulnerabilities
aim to predict how likely it is that a flaw
will actually be exploited in "the wild".

© Course authors (CC BY-SA 4.0) - Image: © Darkday (CC BY 2.0)

Common Vulnerability Scoring System.

Used to calculate severity rating and
describe the "characteristics of a vulnerability".

Widely used to prioritize remediation efforts.

Can adapt rating based on a specific
organisation's implementation/requirements
using "environmental metrics".

"Threat metrics" can be added to
indicate availability of exploits.

© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)
Severity Base score
None 0.0
Low 0.1 - 3.9
Medium 4.0 - 6.9
High 7.0 - 8.9
Critical 9.0 - 10.0

Vector string

CVSS:4.0/AV:N/AC:L/AT:N/PR:L ↴
/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)

Ready to move forward?

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Indicators of Compromise

Low-level threat sharing

© Course authors (CC BY-SA 4.0) - Image: © M. Zamani, ESO (CC BY 2.0)

Threat intelligence is not just for humans.

Especially observed behavior of attackers
and their malware that we commonly call
Indicators Of Compromise.

Used to improve (automated)
Intrusion Detection/Prevention Systems.

© Course authors (CC BY-SA 4.0) - Image: © M. Zamani, ESO (CC BY 2.0)

Like what exactly?

  • IP addresses
  • Domain names
  • File hashes
  • User agents / Client identifiers
  • URL paths
  • JA3 / JA3S fingerprints
  • Traffic patterns
  • Bank account numbers

....

© Course authors (CC BY-SA 4.0) - Image: © Jonathan Torres (CC BY 4.0)

Convert into configuration for firewalls,
End-point Detection and Response agents,
log alerting queries, e-mail spam filters, etc.

© Course authors (CC BY-SA 4.0) - Image: © Jonathan Torres (CC BY 4.0)

How do I get hold of these?

© Course authors (CC BY-SA 4.0) - Image: © Jonathan Torres (CC BY 4.0)

Feeds (Passive)

APIs (Active)

© Course authors (CC BY-SA 4.0) - Image: © Yellowcloud (CC BY 2.0)

Pros/Cons with active/passive approaches?

© Course authors (CC BY-SA 4.0) - Image: © Yellowcloud (CC BY 2.0)

Not all sharing is done in the open.

Information Sharing and Analysis Centers
exist to support specific private/public
sectors and interest areas.

© Course authors (CC BY-SA 4.0) - Image: © Adam Lusch (CC BY-SA 2.0)

What is MISP?

FOSS solution for threat sharing.

Instances can subscribe and publish information to public or private communities.

Normalize data from different feeds.

Provides a powerful search engine and
supports IoC import/export for common formats, such as STIX and YARA/Snort rules.

© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

Let's have a look, shall we?

© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

Considerations and gotchas?

© Course authors (CC BY-SA 4.0) - Image: © Fritzchens Fritz (CC0 1.0)

Risks with sharing

© Course authors (CC BY-SA 4.0) - Image: © Cory Doctorow (CC BY-SA 2.0)

Quality of data

  • False positives
  • Freshness of data
  • Collateral damage
© Course authors (CC BY-SA 4.0) - Image: © Chad Davis (CC BY-SA 2.0)

Wrapping up

© Course authors (CC BY-SA 4.0) - Image: © M. Zamani, ESO (CC BY 2.0)

Targeting communication

Knowing your audience

© Course authors (CC BY-SA 4.0) - Image: © Randy Adams (CC BY-SA 2.0)

We gather threat intelligence to help
groups and individuals protect themselves.

Ideally, change their behavior and invest
in suitable supporting technology.

How do we maximize the value of that
information and our hard work?

© Course authors (CC BY-SA 4.0) - Image: © Randy Adams (CC BY-SA 2.0)

Targeting communication based on:

  • Role / Responsibilities
  • Technical skills
  • Domain specific knowledge
  • Bandwidth
© Course authors (CC BY-SA 4.0) - Image: © Wonderlane (CC BY 2.0)

What do you think are the most important
take-aways for role X? (desires/responsibilities)

How do you want them to react (mohaha)?

© Course authors (CC BY-SA 4.0) - Image: © Wonderlane (CC BY 2.0)

Some examples, mayhaps?

© Course authors (CC BY-SA 4.0) - Image: © Wonderlane (CC BY 2.0)

CTO

Chief Technology Officer.

Sets medium- to long-term direction
and goals for IT in the organisation.

Technical skill level highly varied.

Influence to prioritize security related efforts,
but remember that IT is a support function-ish.

© Course authors (CC BY-SA 4.0) - Image: © Raphaël Vinot (CC BY 2.0)

CTO

Should we migrate our sensitive applications
to a public cloud provider in country X?

How much effort should we spend on migrating
away from platform X that is End-of-Life
and no longer updated by the vendor?

Should the development teams standardise on
usage of programming language X or Y?

© Course authors (CC BY-SA 4.0) - Image: © Raphaël Vinot (CC BY 2.0)

CISO

Chief Information Security Officer.

Reports to CTO, CSO or CEO.

Often acts as counter-balance to CTO.

Help them filter out the noise and produce
sound-bites/ammunition.

Lessons learned from incidents affecting
competitors and similar organisations
are usually an effective tool.

© Course authors (CC BY-SA 4.0) - Image: © Ron Frazier (CC BY 2.0)

CEO

Chief Executive Officer.

Extremely limited bandwidth.

Just enough information to not be embarrassed
in front of board/shareholders/partners.

Reporting through one or two slides is common.

© Course authors (CC BY-SA 4.0) - Image: © David Revoy (CC BY 4.0)

SOC analyst

Security Operations Center analyst.

Typically, highly skilled.

Focus on TTPs and IoCs that can be used
to develop detection/prevention.

Keep it to the point and prepare
for asynchronous communication.

© Course authors (CC BY-SA 4.0) - Image: © Lisa Brewster (CC BY-SA 2.0)

Marketing department

Mostly applicable if we wanna make
money on security-related events.

What makes a headline?

What are the scariest parts and
how can we help?

Who are their audience?
Recruits, customers, etc.

© Course authors (CC BY-SA 4.0) - Image: © Solarbotics (CC BY 2.0)

In the marketing field, personas are
often used to focus communication efforts.

Fictional character that represents
a group of customers/targets.

We can borrow the tool to practice our skills!

© Course authors (CC BY-SA 4.0) - Image: © Asparukh Akanayev (CC BY 2.0)

Max is the CTO at a small power utility
company owned by the local municipality.

Responsible for Information Technology
and its interaction with their
Operational Technology
(computers making power go buzz).

Due to their size, they haven't employed a
CISO - the work and worries falls on Max.

Struggles with funding and budget cuts.

Used to be technically skilled, but have
fallen behind due to the work load.

© Course authors (CC BY-SA 4.0) - Image: © Nirvana Studios (CC BY 4.0)

How can we help Max?

© Course authors (CC BY-SA 4.0) - Image: © Nirvana Studios (CC BY 4.0)

Conclusions

There is no "one size fits all".

Know your audience and
make the most of it!

© Course authors (CC BY-SA 4.0) - Image: © Randy Adams (CC BY-SA 2.0)

Group exercise

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Exercise: Target the message

Participants are split into groups.

Groups should research the
"Colonial Pipeline ransomware attack"
and produce a targeted report for one of the following recipients:

  • CEO at large sewage treatment plant
  • Technical CISO at pharmaceutical factory
  • SOC operator at small MSSP

After presentation, send as plain text, Markdown document or PDF to:
courses+ti_011601@0x00.lt

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Protecting what?

Managing your attack surface

© Course authors (CC BY-SA 4.0) - Image: © Solarbotics (CC BY 2.0)

Quick recap

Assets exposed towards threat actors
that may be attacked.

The attack surface may not look
the same to all threat actors.

Keeping track of systems in
your IT environment is key!

© Course authors (CC BY-SA 4.0) - Image: © Solarbotics (CC BY 2.0)

How about a CMDB?

Configuration Management Database.

Tool for documenting HW- and/or SW-assets.
Excel spreadsheet or fully-fledged application.

Stores related information like system owners
and their relationships/dependencies.

Often aims to provide a Single Source of Truth.

Use the information to configure monitoring
of specific CPEs in the CVE database...

© Course authors (CC BY-SA 4.0) - Image: © Pyntofmyld (CC BY 2.0)

Sounds simple enough?

© Course authors (CC BY-SA 4.0) - Image: © Pyntofmyld (CC BY 2.0)

Manual documentation always* drift
from reality over time.

Documentation tends to be sacrificed
first during stress/pressure.

Faulty/Outdated documentation may
be worse than not having any.

© Course authors (CC BY-SA 4.0) - Image: © Theo Crazzolara (CC BY 2.0)

All doom and gloom?

© Course authors (CC BY-SA 4.0) - Image: © Theo Crazzolara (CC BY 2.0)

IaC and automation

Automation tools, such as Terraform,
Ansible and CI/CD pipelines,
are "self-documenting".

(rant about incident recovery)

Only works if ClickOps is
disallowed/heavily restricted.

© Course authors (CC BY-SA 4.0) - Image: © Wolfgang Stief (CC0 1.0)

Using the hacker toolbox

DNS zone dumping/enumeration.

Network and service scanning tools,
such as Nmap and Shodan.

Application fingerprinting with tools like WhatWeb.

Querying of cloud platform APIs.

Purpose built software like runZero.

Product category: Attack Surface Management.

© Course authors (CC BY-SA 4.0) - Image: © Randy Adams (CC BY-SA 2.0)

Perhaps an agent like osquery may be useful?

SELECT name, version FROM chrome_extensions 
WHERE name LIKE "%Netflix%";

+-----------------------+---------+
| name                  | version |
+-----------------------+---------+
| Netflix Party         | 1.0.4   |
+-----------------------+---------+
| US Netflix Anywhere   | 0.2.7   |
+-----------------------+---------+

Deploy it to your servers and end-points
to gain insights unavailable through
simple network scanning.

© Course authors (CC BY-SA 4.0) - Image: © Randy Adams (CC BY-SA 2.0)

Wrapping up

Understanding your IT environment and
attack surfaces may help you focus
gathering of threat intelligence.

Sadly, it is rarely well documented.

In most organisations, you'll likely need
to utilize all three methods described.

© Course authors (CC BY-SA 4.0) - Image: © Solarbotics (CC BY 2.0)

Software supply chain

Dependencies and imported risk

© Course authors (CC BY-SA 4.0) - Image: © Axelspace Corporation (CC BY-SA 4.0)

No one builds computers from scratch.

Relies on a highly interconnected
and globalized supply chain.

Risk VS Reward.

© Course authors (CC BY-SA 4.0) - Image: © Axelspace Corporation (CC BY-SA 4.0)

Likewise,
no one builds software from scratch.

© Course authors (CC BY-SA 4.0) - Image: © Chris 73 (CC BY-SA 3.0)

Example: Keycloak server

Popular solution for identity and access
management - an authentication service.

$ mvn clean install | tee build_output.txt

[...]
Downloaded from central:
https://repo.maven.apache.org/maven2/org/
fusesource/jansi/jansi/1.16/jansi-1.16.jar
[...]

$ grep \
  -E 'Downloaded from central: .+\.jar' \
  build_output.txt | wc --lines

1465
© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

What's the problem?

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

XZ Utils backdoor

Freely available code library for handling
LZMA data compression ("liblzma").

Great example of something (boring) that
people wanna avoid writing from scratch.

Included in countless code-bases
(both proprietary and open-source),
for example systemd...

© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

XZ Utils backdoor

In March of 2024, malicious code was
detected in the software library that
targeted the widely deployed
OpenSSH server process.

The code introduced a backdoor,
allowing attackers with a secret key
to remotely access the vulnerable system.

The backdoor code was included by one of
the maintainers of XZ Utils.

© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

Log4Shell

Vulnerability in popular Java logging library
"Log4j" (CVE-2021-44228).

Could be exploited by injecting code in messages that were logged (CVSS 10.0).

© Course authors (CC BY-SA 4.0) - Image: © Fredrik Rubensson (CC BY-SA 2.0)

Not just a problem affecting freely
available open source libraries...

© Course authors (CC BY-SA 4.0) - Image: © Kevin L Neff (CC BY 2.0)

Root cause analysis

The initial cost of including
third-party libraries is near zero.

Dependencies often have their own dependencies.

Maintaining software over time ain't always
the most fun/rewarding task, especially for free.

Your security depends on the security of
your dependencies and that of its developers.

© Course authors (CC BY-SA 4.0) - Image: © Nirvana Studios (CC BY 4.0)

XKCD #2347: Dependency

© Course authors (CC BY-SA 4.0) - Image: © Nirvana Studios (CC BY 4.0)

(Software) Bill Of Materials.

Term borrowed from physical manufacturing.
Describes components (and their suppliers)
required to assemble a product.

Helps us understand what/who our software
relies on and what/who we need to monitor.

Several competing standards exist,
like CycloneDX and SPDX.

Also useful for license compliance.

Tools exist to generate SBOMs using
source code analysis and guesstimation.

© Course authors (CC BY-SA 4.0) - Image: © Tobin (CC BY-SA 2.0)

Conclusions

Should I really depend on
third-party code?

In the end of the day,
it's all a cost-benefit gamble.

Automated dependency monitoring,
OpenSSF Scorecard reviews and
similar efforts can minimize the risk.

© Course authors (CC BY-SA 4.0) - Image: © Axelspace Corporation (CC BY-SA 4.0)

Dependency tracking exercise

© Course authors (CC BY-SA 4.0) - Image: © Wolfgang Stief (CC0 1.0)

Exercise: Dependency tracking

To the best of your abilities,
identify and document third-party
dependencies (both direct and indirect)
required to run the automation tool "Ansible".

Send as plain text, Markdown document or PDF to:
courses+ti_011901@0x00.lt

© Course authors (CC BY-SA 4.0) - Image: © Wolfgang Stief (CC0 1.0)

Course midpoint

What have we learned so far?

© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)

We've talked about...

  • Who we're protecting
  • What we're protecting
  • Who we're protecting against
© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)

We've talked about...

  • Tracking and rating vulnerabilities
  • Adapting communication based on recipients
© Course authors (CC BY-SA 4.0) - Image: © Brendan J (CC BY 2.0)

What's next?

Put your skills to the test.

Report about real events to real people.

+ Some deep dives and hopefully guest lectures!

© Course authors (CC BY-SA 4.0) - Image: © Eric Friedebach (CC BY 2.0)

Feedback, bitte!

  • What are your course highlights so far?
  • How would you re-balance the course? (less/more lectures, practical labs, etc.)
  • Any "Ahaaa!"-moments you remember?
  • What would you like to learn more about?
  • Other thoughts/comments/suggestions?

Take the chance to be a bit --verbose!

courses+ti_012001@0x00.lt

© Course authors (CC BY-SA 4.0) - Image: © Der Keks (CC BY-SA 4.0)

Course recap

Let's look back for a while

© Course authors (CC BY-SA 4.0) - Image: © Kevin Dooley (CC BY 2.0)

We've talked about...

  • Who we're protecting
  • What we're protecting
  • Who we're protecting against
© Course authors (CC BY-SA 4.0) - Image: © Kevin Dooley (CC BY 2.0)

Learn to adapt and keep up with the attackers.

Perform more realistic security exercises and assessments.

Invest in appropriate security controls.

Learn what to look for when monitoring systems and performing incident response.

© Course authors (CC BY-SA 4.0) - Image: © Solarbotics (CC BY 2.0)

Basic vocabulary

  • Threat actor
  • Asset
  • Vulnerability, exploit and attack
  • Attack surface
© Course authors (CC BY-SA 4.0) - Image: © Pedro Mendes (CC BY-SA 2.0)

Tactics,
Techniques and
Procedures.

Confidentiality,
Integrity and
Availability.

© Course authors (CC BY-SA 4.0) - Image: © ESA-G (CC BY-SA 3.0 IGO)

Risk ~=
Consequences of bad thing * Probability.

© Course authors (CC BY-SA 4.0) - Image: © Tobin (CC BY-SA 2.0)

Threat actor motivations

  • Personal
  • Financial
  • Political
  • Military
© Course authors (CC BY-SA 4.0) - Image: © David Revoy (CC BY 4.0)

Causing impact

  • Disruption
  • Data theft
  • Defacement
  • Resource hijacking
© Course authors (CC BY-SA 4.0) - Image: © Kevin Dooley (CC BY 2.0)

Indicators of Compromise

Used to improve Intrusion Detection /
Prevention Systems and for attribution.

IP addresses, domain names, file hashes,
URL paths, traffic patterns...

© Course authors (CC BY-SA 4.0) - Image: © The Preiser Project (CC BY 2.0)

Tracking vulnerabilities

Common Vulnerabilities and Exposures.

Common Platform Enumeration and
Common Weakness Enumeration.

Common Vulnerability Scoring System.

Known Exploited Vulnerabilities.

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Managing assets/attack surface

Configuration Management Database.

Infrastructure as Code,
Configuration Management automation and
Continuous Integration.

Active scanning ("Hacker's toolbox").

© Course authors (CC BY-SA 4.0) - Image: © Rich Bowen (CC BY 2.0)

Supply chain security

Most applications utilize third-party
code libraries for (boring) functionality.

May contain (intentional) vulnerabilities,
backdoors and other malicious things.

Utilize Software Bill of Materials files
to keep track of dependencies.

Auditing and risk management.

© Course authors (CC BY-SA 4.0) - Image: © Maximilien Brice / CERN (CC BY-SA 3.0)

Knowing your audience

Target communication based on:

  • Role / Responsibilities
  • Technical skills
  • Domain specific knowledge
  • Bandwidth

What do you think are the most important
take-aways for role X?

Using personas for targeting practice.

© Course authors (CC BY-SA 4.0) - Image: © Jesse James (CC BY 2.0)

Rules and regulations

  • GDPR
  • NIS(2)
  • DORA
  • CRA
  • PSD2
  • FIPS
  • PCI DSS
  • ISO 27K / SOC 2
© Course authors (CC BY-SA 4.0) - Image: © Lauri Veerde (CC BY-SA 4.0)

Everything clear?

© Course authors (CC BY-SA 4.0) - Image: © SMTW.de (CC BY-SA 4.0)

Final exercise

© Course authors (CC BY-SA 4.0) - Image: © Scott Schiller (CC BY 2.0)

Exercise: Yearly summary report

Each student should produce a report analyzing
the most noteworthy IT security-related
incidents and developments of 2024.

Its content should be targeted and adapted
to a recipient persona assigned by the teacher.

© Course authors (CC BY-SA 4.0) - Image: © Scott Schiller (CC BY 2.0)

Report requirements

Minimum 1500 words, maximum 2500.

Remember to cite your sources
("in-line" or "appendix").

Upload report as plain text, Markdown document
or PDF to ITHS Distans.

Deadline: 2025-08-20 08:59

© Course authors (CC BY-SA 4.0) - Image: © Scott Schiller (CC BY 2.0)

Exercise grading

  • Targeting
  • Relevance
  • Analysis
  • Recommendations / "Actionability"
  • Report length
© Course authors (CC BY-SA 4.0) - Image: © Scott Schiller (CC BY 2.0)

Tips and guidance

  • Don't forget an introduction
  • "Descriptive" or "Narrative" approach
  • Ain't only "text" in your toolbox
  • A LLM can help, but you're responsible
  • Utilize help offered by teacher
© Course authors (CC BY-SA 4.0) - Image: © Scott Schiller (CC BY 2.0)

Let's have a look at
the recipient personas!

© Course authors (CC BY-SA 4.0) - Image: © Jan Helebrant (CC0 1.0)

#1: Saylor Twift

Head of Security Operations @ EXMPL Bets

  • Works at large sports betting company
  • Need to delegate work and motivate security investments to higher-ups
  • Very technically skilled, but quite busy
  • Interested in new threats, defensive tech and incidents affecting gambling sector
© Course authors (CC BY-SA 4.0) - Image: © Cory Doctorow (CC BY-SA 2.0)

#2: Garvin Maye

Sales Director @ ExamPL CybSec

  • Works at Managed Security Service Provider
  • Need to help his staff convince (see "scare") potential customer into investing in security
  • Want to map threat landscape into existing or new service offerings
  • Low technical skill level
  • Interested in high-level knowledge about current events, both technical and rules/regulation
© Course authors (CC BY-SA 4.0) - Image: © Dennis van Zuijlekom (CC BY-SA 2.0)

#3: Krida Fahlo

SOC team leader @ Esimerkki Defense

  • Works at company developing highly secret military equipment
  • Responsible for transferring security knowledge to team members and plan improvement efforts
  • Highly skilled, but need to delegate work
  • Interested defensive technologies and incidents affecting the defense sector
© Course authors (CC BY-SA 4.0) - Image: © Solarbotics (CC BY 2.0)

#4: Hustin Doffman

Cybersecurity advisor @ Ejemplo OT Inc.

  • Works as freelance consultant, focusing on Industrial Control Systems ("OT")
  • Needs to convince (see "scare") companies providing critical infrastructure to hire him
  • Medium level technical skills, but interacts mostly with "C-level" personnel
  • Interested in incidents, developments and regulation related to critical infrastructure
© Course authors (CC BY-SA 4.0) - Image: © Kurayba (CC BY-SA 2.0)

#5: Rargot Mobbie

CISO @ Exemplum Medical Services

  • Works at company providing highly sensitive SaaS for hospitals
  • Needs help prioritising security efforts and motivate/defend investments
  • Low technical skill level, but curious
  • Interested in incidents/regulation affecting the sector and defensive technology
© Course authors (CC BY-SA 4.0) - Image: © Snemani2023 (CC BY 4.0)

Rules and regulation

(Seen by some as a threat)

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

We've mostly focused on keeping up with activities of threat actors.

Other developments can greatly affect how organizations prioritize their security efforts.

Let's talk a bit about
regulation and compliance frameworks.

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

More specifically...

  • GDPR
  • NIS(2)
  • DORA
  • CRA
  • PSD2
  • FIPS
  • PCI DSS
  • ISO 27K / SOC 2
© Course authors (CC BY-SA 4.0) - Image: © Bruno Cordioli (CC BY 2.0)

GDPR

General Data Protection Regulation.

Attempt to unify and strengthen privacy
for individuals within the EU + EEA.

Translate into member state law
and enforced since 2018 by
Data Protection Authorities.

© Course authors (CC BY-SA 4.0) - Image: © Yellowcloud (CC BY 2.0)

Protecting what?

Privacy of natural/physical persons
(temporarily) located in the EU.

More specifically, protection of Personal Data
(AKA Personally Identifiable Information).

Personal Data is (according to the GDPR)
anything that can be tied to the activities of
an individual.

© Course authors (CC BY-SA 4.0) - Image: © Yellowcloud (CC BY 2.0)

Personal Data

Physical/digital addresses, gender, ID number,
location information, phone number,
date of birth, photographs...

Sensitive Personal Data

Race/ethnicity, political opinions/affiliations,
religious/philosophical beliefs, union membership,
Sexual preferences/activities and
health/medical information.

© Course authors (CC BY-SA 4.0) - Image: © Yellowcloud (CC BY 2.0)

Individuals have the right to...

  1. Be informed
  2. Access
  3. Rectification
  4. Object processing
© Course authors (CC BY-SA 4.0) - Image: © Yellowcloud (CC BY 2.0)

Individuals have the right to...

  1. Avoid/restrict automated profiling
  2. Be forgotten
  3. Data portability
  4. Restrict processing
© Course authors (CC BY-SA 4.0) - Image: © Yellowcloud (CC BY 2.0)

Consequences

Organization must document how they
store, process and protect PD.

They must also assign a
Data Protection Officer*.

Failure to respect individuals' rights or
inadequate protection of PD could result in
large sanction fees (200 MSEK || 4% of revenue)
and other forms of punishment.

© Course authors (CC BY-SA 4.0) - Image: © Yellowcloud (CC BY 2.0)

Enforcement in Sweden

Intigritetsskyddsmyndigheten
(previously called Datainspektionen) is the DPA.

~150 employees, slowly growing.

How's it going?

© Course authors (CC BY-SA 4.0) - Image: © Bengt Nyman (CC BY 2.0)

Official IMY statistics

Year Fees in SEK Number of fees
2018 0 0
2019 500 000 2
2020 150 000 000 15
2021 32 500 000 7
2022 9 720 000 4
2023 120 400 000 11
2024 60 580 000 6
© Course authors (CC BY-SA 4.0) - Image: © Bengt Nyman (CC BY 2.0)

IMY has been criticized for its
"lazy handling" of complaints.

On-going court case against them
by privacy interest group "noyb".

© Course authors (CC BY-SA 4.0) - Image: © Bengt Nyman (CC BY 2.0)

EU and USA

GDPR limits transfer of PD to
third countries.

In practice, tons of (S)PD is collected
and processed in the USA.

When (and if at all) this is okay is a
constant back and forth.

© Course authors (CC BY-SA 4.0) - Image: © Manfred Werner (CC BY-SA 3.0)

Example: Data transfer fine

© Course authors (CC BY-SA 4.0) - Image: © Johannes P1hde (CC BY 2.0)

Example: Employee monitoring

© Course authors (CC BY-SA 4.0) - Image: © ESA (CC BY-SA 3.0 IGO)

Example: Google school ban

© Course authors (CC BY-SA 4.0) - Image: © Ted Eytan (CC BY-SA 2.0)

Example: Inadequate protection

© Course authors (CC BY-SA 4.0) - Image: © Tom Held (CC BY 2.0)

Example: Unlawful marketing

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Example: Not just giants

© Course authors (CC BY-SA 4.0) - Image: © Crazy Crusty (CC0 1.0)

For more examples and details, check out
GDPRhub.

© Course authors (CC BY-SA 4.0) - Image: © Bruno Cordioli (CC BY 2.0)

NIS(2)

Network and Information Security Directive.

Aims to ensure availability of services and infrastructure critical to society.

Initially released in 2018, version 2 should
be implemented by member states during 2024.

As of 2025, Sweden is still working on
fulfilling requirements through
"Cybersäkerhetslagen".

© Course authors (CC BY-SA 4.0) - Image: © Todd Van Hoosear (CC BY-SA 2.0)

What does that mean?

Organizations must structure and document
their IT security efforts.

Security efforts must be
appropriate to the risk posed,
as interpreted by the sector regulator.

If an incident occurs, it must be reported to
the sector regulator within 6h, 12h...

Failure to comply can result in
sanction fees (10 MSEK || 2% of revenue)
and other consequences.

© Course authors (CC BY-SA 4.0) - Image: © Todd Van Hoosear (CC BY-SA 2.0)

Critical sectors

Version 1

Banking/payment services, digital infrastructure,
Energy, healthcare and logistics/transportation.

Version 2

Food production/distribution, waste treatment,
central heating/cooling, "heavy industry",
local/national "authorities", postal services
and (aero)space.

© Course authors (CC BY-SA 4.0) - Image: © Todd Van Hoosear (CC BY-SA 2.0)

Is our organization providing
services critical to society?

Well, that's up to the sector regulator.

NIS2 does however provide much
clearer guidance for selection.

© Course authors (CC BY-SA 4.0) - Image: © Todd Van Hoosear (CC BY-SA 2.0)

DORA

Digital Operational Resilience Act.

EU regulation targeting "financial entities"
(banks, insurance companies, investment firms,
crowdfunding services, crypto exchanges, etc!).

More detailed requirements than NIS(2),
for example regarding security testing.

Enforced since January 2025.

© Course authors (CC BY-SA 4.0) - Image: © Michael Garlick (CC BY-SA 2.0)

CRA

Cyber Resilience Act.

Aims to improve security of software
and hardware products sold in the EU.

Requires that vendors understand
and document their supply chain.

Products should be
"reasonably secure-by-default"
and those "critical for security"
must be audited by a third party.

Expected enforcement by 2027.

© Course authors (CC BY-SA 4.0) - Image: © Timothy J Toal (CC BY 4.0)

PSD2

Payment Services Directive.

Aims to increase innovation and competition
within payment/banking sector.

Among other things, forces banks to open up
their online services (APIs) to third-parties.

While not focused on security,
it surely affects it.

© Course authors (CC BY-SA 4.0) - Image: © Kevin Dooley (CC BY 2.0)

FIPS

Federal Information Processing Standards.

Published by NIST,
describes things such as acceptable encryption algorithms and other security related requirements.

US government/military enforces FIPS during procurement.

© Course authors (CC BY-SA 4.0) - Image: © Wolfgang Stief (CC0 1.0)

PCI DSS

Payment Card Industry
Data Security Standard.

Specifies technical and organizational
security requirements.

Requires yearly audit by an external
Qualified Security Assessor.

If you want to handle card numbers,
you need to comply.

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

ISO 27K / SOC 2

The ISO 27000-family of standards describes
methods for organizations to structure
their security efforts.

Identified risks must be evaluated,
documented and acted upon.

No legal requirement, but many organizations
require that vendors/partners are certified.

SOC 2 is basically the equivalent thing in the USA,
but with stricter/more expensive auditing.

© Course authors (CC BY-SA 4.0) - Image: © Jan Helebrant (CC0 1.0)

Many more out there, but hopefully
you get the idea by now!

(IT / cyber security VS Information security)

© Course authors (CC BY-SA 4.0) - Image: © Jan Helebrant (CC0 1.0)

Wrapping up

While rules/regulations serve different purposes,
they warrant a response more often than not.

Especially since interpretation and enforcement may change over time.

© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Example observations

© Course authors (CC BY-SA 4.0) - Image: © Kevin Stanchfield (CC BY 2.0)

Let's take a look at some security related happenings and use what we've learned to analyze them.

© Course authors (CC BY-SA 4.0) - Image: © Kevin Stanchfield (CC BY 2.0)
  • Norwegian government intrusion
  • CISA launches CyberSentry
  • Lemmy zero-day exploitation
  • Wiper attacks in Ukraine
  • Microsoft cloud vulnerabilities
  • Real-world impact of WebAuthn
© Course authors (CC BY-SA 4.0) - Image: © Kevin Stanchfield (CC BY 2.0)

Norwegian government intrusion

  • Norway's department of security reports that 12 government ministries have suffered data breaches
  • Attackers used 0-day flaw in a Mobile Device Management solution (CVE-2023-35078)
  • Vulnerability could be used to gain authentication administrative access of MDM
  • The software vendor has previously patched several similar flaws
© Course authors (CC BY-SA 4.0) - Image: © Randy Adams (CC BY-SA 2.0)

Norwegian government intrusion

  • With great power comes great responsibility
  • Security tools aren't necessarily secure tools
  • Perhaps we should include "security track-record" in procurement process?
© Course authors (CC BY-SA 4.0) - Image: © Randy Adams (CC BY-SA 2.0)

CISA launches CyberSentry

  • US government agency "CISA" published a press release about the new "CyberSentry program"
  • Provide intrusion monitoring services and expertise to operators of critical infrastructure
  • Voluntary participation for public and private entities
© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

CISA launches CyberSentry

  • Method for circumventing political challenges
  • Carrot, not stick
  • May make even more sense in EU and Sweden
© Course authors (CC BY-SA 4.0) - Image: © Marcin Wichary (CC BY 2.0)

Lemmy zero-day exploitation

  • Catalin Cimpanu reports that several Lemmy instances have been compromised using a zero-day
  • Patched within an hour after issue was reported
  • Unknown threat actor
© Course authors (CC BY-SA 4.0) - Image: © Mike Grauer Jr (CC BY 2.0)

Lemmy zero-day exploitation

  • Monocultures are inherently vulnerable
  • Sometimes it makes sense to wait for software to become battle hardened
  • Lack of previous CVEs ain't necessarily a good security indicator
© Course authors (CC BY-SA 4.0) - Image: © Mike Grauer Jr (CC BY 2.0)

Wiper attacks in Ukraine

  • ESET Research has investigated cyberattacks against Ukraine
  • Increase of cyberattacks since before full-scale invasion
  • Mostly DDoS and wiper attacks, confirmed by Head of Cyber at SBU
  • Commonly attributed to APT group "Sandworm" (Russian military intelligence agency)
© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

Wiper attacks in Ukraine

  • When facing APTs, incidents will happen
  • Fast cleanup/restoration seems to be key to success. Are we ready?
  • Most organizations put availability first
© Course authors (CC BY-SA 4.0) - Image: © Miguel Discart (CC BY-SA 2.0)

Microsoft cloud vulnerabilities

  • Tenable published a blog post about Microsoft's handling of vulnerability reports
  • Security flaw could be used by an unauthenticated attacker to access data of Azure customers
  • Vulnerability was only properly patched after five months since initial report
  • Controversy comes on the heels of Office 365 breach by Chinese APT
© Course authors (CC BY-SA 4.0) - Image: © Ted Eytan (CC BY-SA 2.0)

Microsoft cloud vulnerabilities

  • No one is "too big to fail"
  • Even if managed services are in use, organizations should plan/prepare to handle data breaches
  • E2EE is not just for paranoid individuals
© Course authors (CC BY-SA 4.0) - Image: © Ted Eytan (CC BY-SA 2.0)

Real-world impact of WebAuthn

Okta released a blog post where they show how
phishers are desperately trying to circumvent FIDO2 authentication:

Attention: To view your new tickets,
you must temporarily remove your
Yubikey authenticator for up to
6 hours, then proceed to: https: //....

© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

Real-world impact of WebAuthn

  • Ain't all doom and gloom!
  • Better security doesn't necessarily mean worse UX
  • Low cost, large (demonstrable) impact
  • How do we handle account recovery?
© Course authors (CC BY-SA 4.0) - Image: © Edenpictures (CC BY 2.0)

Have you come to any other conclusions?

Hopefully this will serve as inspiration!

© Course authors (CC BY-SA 4.0) - Image: © Kevin Stanchfield (CC BY 2.0)

Source analysis

Critical parsing of intelligence

© Course authors (CC BY-SA 4.0) - Image: © Kurayba (CC BY-SA 2.0)

Most organisations rely on third-party
sources to provide threat intelligence.

Lots out there with widely different quality.

Let's look at some considerations
before relying on it, shall we?

© Course authors (CC BY-SA 4.0) - Image: © Kurayba (CC BY-SA 2.0)

Source categories

  • First-party producers
  • Free / Public aggregators
  • Paid / Private aggregators
© Course authors (CC BY-SA 4.0) - Image: © Joel Rangsmo (CC BY-SA 4.0)

Some examples, perhaps?

© Course authors (CC BY-SA 4.0) - Image: © Joel Rangsmo (CC BY-SA 4.0)

First-party producers

  • Victims
  • Security companies/vendors
  • Journalists
  • Governmental organisations
© Course authors (CC BY-SA 4.0) - Image: © Oklahoma National Guard (CC BY 2.0)

Victims

Straight from the horse's mouth!

Crisis management and/or legal requirement
(privacy laws, financial reports, court cases).

Beware of spin and lacking expertise.

© Course authors (CC BY-SA 4.0) - Image: © Dennis van Zuijlekom (CC BY-SA 2.0)

Security companies/vendors

Most intelligence are provided by
commercial cybersecurity actors.

Original research or analysis from
incident responses efforts.

Often high quality.

Ask yourself what they're selling.

© Course authors (CC BY-SA 4.0) - Image: © Austin Design (CC BY-SA 2.0)

Journalists

<INSERT EVERYTHING GREAT ABOUT
PROFESSIONAL JOURNALISM HERE>

May provide the "attacker's perspective".

Severe lack of technical competency
and often sensationalist.

© Course authors (CC BY-SA 4.0) - Image: © Jan Hrdina (CC BY-SA 2.0)

Governmental organisations

Allegedly have access to high-quality and
non-publicly available information.

Spying, surveillance and reporting requirements.

Unfortunately a lot of "trust me, bro".

Shouldn't be discarded, but meditate upon
possible alternative motives.

© Course authors (CC BY-SA 4.0) - Image: © Richard James (CC BY 2.0)

Free / Public aggregators

  • Academic research
  • Think Tanks / NGOs
  • Community threat feeds
© Course authors (CC BY-SA 4.0) - Image: © Adam Lusch (CC BY-SA 2.0)

Academic research

Hopefully provides high-quality analysis.

Often lack relevant "educated guesses".

Think Tanks / NGOs

Provides "hot-takes", "other perspectives"
"interesting correlations"...

Beware of their agenda, biases and funding.

(Often used in PSychological OPerations.)

© Course authors (CC BY-SA 4.0) - Image: © FoAM (CC BY-SA 2.0)

Community threat feeds

(Automatically) collects, normalises and
publish IoCs from other sources.

Shared effort, inexpensive for consumers.

Highly-variable quality, significant
risk of "false-positives".

© Course authors (CC BY-SA 4.0) - Image: © Cory Doctorow (CC BY-SA 2.0)

What about paid / private aggregators?

© Course authors (CC BY-SA 4.0) - Image: © D. Essl / ESO (CC BY 4.0)

ISACs

Information Sharing and Analysis Centers
exist to support specific private/public
sectors and interest areas.

Defense alliances, telecom, financial services...

Highly intelligence with less fear
of "tipping off" threat actors.

May have "sharing requirements".

Tricky to draw generalised conclusions
regarding quality and biases.

© Course authors (CC BY-SA 4.0) - Image: © Holger Ellgaard (CC BY-SA 4.0)

Commercial providers

Sells (original) research and aggregations
through a "subscription" model.

Adds value by normalising/categorising data.

Many produce targeted reports per request.

Often expensive, sometimes high quality.

© Course authors (CC BY-SA 4.0) - Image: © Elly Jonez (CC BY 2.0)

Wrapping up

© Course authors (CC BY-SA 4.0) - Image: © Stig Nygaard (CC BY 2.0)

Artificial intelligence

Utilising LLMs for threat intelligence

© Course authors (CC BY-SA 4.0) - Image: © Wolfgang Stief (CC0 1.0)

Artificial intelligence is all the rage,
especially Large Language Models.

Humans are expensive,
computers are cheap-ish.

Let's look at how we can utilise it
for threat intelligence purposes!

(...and not discuss philosophy/ethics)

© Course authors (CC BY-SA 4.0) - Image: © Wolfgang Stief (CC0 1.0)

Data classification
VS
Text analysis / generation.

© Course authors (CC BY-SA 4.0) - Image: © Joel Rangsmo (CC BY-SA 4.0)

Writing aid++

  • Improve communication about threats
  • Shorten or summarise our writing
  • Make it sound more formal/boring
  • Provide the occasional inspiration
  • Iterate based on feedback from personas
© Course authors (CC BY-SA 4.0) - Image: © Shannon Kringen (CC BY 2.0)

Thanks to Retrieval-Augmented Generation,
we can feed a LLM with fresh information like:

  • News / Threat intelligence feeds
  • Non-public data, like reports
  • Legalese
© Course authors (CC BY-SA 4.0) - Image: © Stig Nygaard (CC BY 2.0)

Categorise, normalise and extract
information from unstructured data.

"Cyber Espresso" is a neat example.

© Course authors (CC BY-SA 4.0) - Image: © Joel Rangsmo (CC BY-SA 4.0)

...and yes, it ain't perfect.

© Course authors (CC BY-SA 4.0) - Image: © Leah Oswald (CC BY-SA 2.0)

"Hallucinations".

© Course authors (CC BY-SA 4.0) - Image: © Indrora (CC BY 2.0)

Information leakage risks.

© Course authors (CC BY-SA 4.0) - Image: © Nicholas A. Tonelli (CC BY 2.0)

Garbage in, garbage out*.

© Course authors (CC BY-SA 4.0) - Image: © Cory Doctorow (CC BY-SA 2.0)

Let us summarise!

© Course authors (CC BY-SA 4.0) - Image: © Wolfgang Stief (CC0 1.0)

Welcome participants and wait for everyone to get settled. Introduction of the lecturers and their background. Segue: In this course we'll talk about threat intelligence...

Segue: Let's try to break this down...

- We'll cover lots of things in a short amount of time - In order to be able to do this we'll use scientifically proven methods to Make It Stick - Basically what the slide says - Don't forget to have fun! - If available, show detailed course schedule

- There are several resources to help you learn - Speaker notes in slides are heavily recommended for recaps/deep diving - May also be available through LMS, depending on how the course is consumed - The course is designed to be instructor lead, won't make the most of it on your own, see as aid - Presentations may be recorded, but only the speaker side for good and bad

The course wouldn't be available if it wasn't for financial support - Thanks!

- Encourage participants to make the course better - Learners are likely the best to provide critique, lecturers are likely a bit home-blind - No cats or dogs allowed! - Feel free to share it with friends or use it yourself later in your career

https://www.splunk.com/en_us/blog/learn/ttp-tactics-techniques-procedures.html https://www.proofpoint.com/us/threat-reference/tactics-techniques-procedures-ttps

https://www.youtube.com/watch?v=Op4gX7NwKj0

https://www.bleepingcomputer.com/news/security/fired-admin-cripples-former-employers-network-using-old-credentials/

https://attack.mitre.org/groups/G1017/ / Volt Typhoon is decent example

https://www.misp-project.org/communities/

https://en.wikipedia.org/wiki/Persona_(user_experience)

https://en.wikipedia.org/wiki/Operational_technology

Examples: - https://krebsonsecurity.com/2024/11/an-interview-with-the-target-home-depot-hacker/ - https://goodreads.com/book/show/18509663-spam-nation

Example: https://en.wikipedia.org/wiki/Concerns_over_Chinese_involvement_in_5G_wireless_networks

Example: https://github.com/stamparm/ipsum

Examples: - https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center - https://www.fsisac.com/

Example of commercial vendor: https://www.recordedfuture.com/