brief Flashcards

1
Q

Intro: Hello! thanks…

A

for allowing me to help kick off what should be a fascinating day of deeply technical talks. Im humbled to be included with the other bright minds that will be sharing this venue, and I want to apologize in advance for mucking up what should be a fascinating groups of technologists with my government flavors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intro: by way of introductions…

A

I’m Josh Finney, and i’m from CISA. This is pronounced, for the record, as “CISA” not “Seesaw” or “SY-SA”, or any of the other hilarious versions we hear every year. We’re an agency that still has a “new car smell” as congress surged us into being under the department of homeland security umbrella in 2020.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intro: I presently lead

A

CISA’s incident response teams and our proactive threat hunting cohort. This means that whenever things go bump in the cyber night, my team of exceptionally bright analysts are tasked with figuring out who it was that bumped, what systems got bumped, and in some cases……how do we evict the bumpers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Intro: if that explanation…

A

makes any sense to you, then you’re doing better than friends and family of mine who I attempt to describe the very important work of CISA’s Threat Hunting team to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intro: Folks may be familiar

A

with the tendrils of CISA’s Threat Hunting team at work, whether it’s in our public advisory work that we help author for identifying specific activity or for securing cloud environments. Our collaboration with industry around our SCUBA project represents the new frontier for collaboration with the government, and I couldn’t be happier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intro: Folks may ALSO be familiar

A

with the some of our open sourced tooling, such as Untitled Goose Tool, which is an incident responders companon for hunting in Microsoft M365 SaaS environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intro: we continue to partner

A

with our friends at the NSA, FBI, Cybercom, and across the USG to disrupt threats as early and as often as we can. That means active hunts across the federal civilian executive branch of government, in 16 critical infrastructure sectors, and in partnership with State and Local governments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intro: I know its popular

A

to say that “i’m from the government, and i’m here to help” but I swear we mean it, every time. There’s nothing that makes us happier than finding that final puzzle in an investigation and helping our stakeholders when they’re having the worst day of their life, in the midst of a cyber event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Core Challenge: Over the last few

A

years, we continue to encounter identity related compromises in our partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Core Challenge: it’s worth providing some context

A

CISA is engaged with partners of a LOT of different sizes and maturity levels. We’ve worked with everyone from the threat hunters at Department of state, who are some of the best we know, all the way out to remote water and electrical municipal suppliers who’s network defenders sometimes double as the guy who does the daily lunch runs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Core Challenge: We have a much broader

A

sphere of obligation than a lot of our friends in the incident response and threat hunting industries, and we also face an extremely challenging landscape of threasts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Core Challenge: identity is a very different

A

conversation relative to the system owners complexity. It’s especially interesting when we add fun variables like physical control systems or embedded processors in places like Manufacturing or transportation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Transitive Identity: i’m going to read the language we used in our guidance

A

to stakeholders experiencing a major identity compromise from the Solarwinds/M365 event. ““This [is an activity] that can be conducted, for example, using a transitive mapping of all potentially compromised credentials to the systems that those credentials accessed.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Transitive Identity: To say that this language

A

didn’t resonate with our partners could be considered a massive understatement. I think the response, collectively, was a lottttt of raised eyebrows and requests for explanations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Transitive identity: I think what we meant to say

A

in laymans terms, was “once an attacker has definitively gotten access to privileged credentials, what DID they, or COULD they, have done with them? What came next?” This is relatively simple stuff, but sometimes the simplest ideas are the most difficult to articulate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transitive identity: i think in the future

A

it shouldn’t take a PHD to dissect an attackers opportunity space, for what they can reach and what the context of their access is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

threat trends: We’ve heard from partners

A

that they’d like to transition from the term “assume breach” because it’s overly pessimistic. If anyone here can help me come up with a more positive spin on that term…..please let me know what it is. In the meantime, We’re going to continue to workshop ideas while only whispering “assume breach”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

threat trends: CISA continues to work

A

with partners at OMB and in industry on Zero Trust methodologies and breach prevention techniques, but its worth noting that sophisticated threats (like the one on the screen) continue to prey on similar identity based attacks with small iterations, year over year…..because they’re effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Threat trends : these threats here share one thing

A

in common; they’re preying on normal traffic and identity structures to make evasion easier and detection much more challenging. The recently released blog post from Microsoft detailing the Storm 558 threat also illustrate how much of that responsibility is shared amongst customers and cloud service providers in the detection space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Threat Trends: I know the feedback we’ve gotten

A

from our friends in industry about CISA continuing to talk about Solarwinds elicits some eyerolls. “This again?” I can relate to that, but also think that when the collective has mitigated the threat activity and neutralized those TTPs, we’ll stop talking about it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Threat trends: threat actors are still

A

using the same TTPs, and if that isn’t clear, i’d encourage everyone to read MSFT’s blog on FoggyWeb and Magicweb. These blog posts perfectly illustrate some examples of threat actors pivoting their techniques just a little bit to evade atomic detections, while maintaining a consistent approach to attacking the identity plane.

22
Q

Threat trends: fortunately, most of the briefs I see

A

at major conferences assure me that the AI/ML revolution will solve this problem for us, so i’m looking forward to packing up my antacids, as they’ll no longer be needed. Eventually. But this isn’t an AI/ML discussion!

23
Q

Red teaming: you know who doesn’t struggle with this mindset?

A

Offensive security professionals. Red teamers, penetration testers, exploit developers.

24
Q

Red teaming: Also, if you didn’t believwe

A

that we’d see the famous Jack Lambert quote represented here in a talk about graphing…..surprise! we’ve made it. For those unfamiliar with this quote, Jack says ““Defenders think in lists. Attackers think in graphs.. As long as this is true, attackers win.”

25
Q

Red teaming: what does this mean?

A

He goes on to say “Your network is a directed graph of credentials. Hacking is graph traversal. See the graph or all you’ll see is exfil.”

26
Q

Red teaming: attackers in industry continue to

A

to use tools like Bloodhound and Redeye, CISA’s C2 graphing app that you can find on our Github page, to create graphs of transitive identity space; they can model privilege escalation and C2 channels.

27
Q

Red teaming: for decades

A

Attackers have been able to construct an approach that is part of their core philosophy within an offensive security fabric. Once they’ve established a user context and what the boundaries are for that access, they can expand that access until they reach their objectives. It’s second nature…..intuitive for those in the community.

28
Q

Red Teaming: from an attackers perspective

A

an service identity is every bit as useful as an interactive identity. This can be profound.

29
Q

How to transition: What must we do?

A

We must understand the difference here and evolve. We must grapple with network defenders understanding how directory services, API calls, managed identity providers, and every other new technology leads to a new node in the identity graph for their enterprise.

30
Q

How to transition: we’re currently doing this…

A

from surveying lists, performing find functions, and centering on hashes and IoC’s. This leads to defenders thinking in linear, boxed fashion, not in a hub/spoke model. One of the things I find most interesting for responders is what happens when the whiteboards come out while working a case; when multiple folks start drawing correlations between nodes, the magic begins!

31
Q

How to transition: unfortunately, our stakeholders tell us

A

that as a whole, the reality of defenders thinking in graphs is not on the immediate horizon.

32
Q

Pelican Project: I want to discuss

A

How we’re trying to tackle some of these concepts for our incident response teams, with a project called Pelican. I’ll explain the name later.

33
Q

Pelican project: our first step

A

in this process was to look at how others were tackling visualizing and graphing large data sets. We found great examples out there; our first example was in Lyft’s Cartography project on their github, which lead us down the rabbit hole of looking at capabilities like Neo4J.

34
Q

Pelican Project: we also looked at…

A

projects that had nothing to do with cyber. We found great insight in projects meant to map transitions in the financial sector, and social media interactions. There’s great energy in the industry space for this problem set; most of the major CSPs, for example, have great data lake services that allow us to manage the core data elements

35
Q

Pelican project: So, what did we learn?

A

We learned that graphs are powerful! They have a very low barrier to entry, and they let us take structured and unstructured information to visualize it.

36
Q

Pelican project; it works well with

A

large data sets, and allows us to apply high efficiency algorithms to the models.

37
Q

Pelican project: graphs dramatically reduce

A

comoplexity, and can translate deeply nuanced technical information to a broad audience. This is the more useful modern equivalent of SOC watch standers throwing pie charts with IP addresses on the wall when VIPs were visiting; instant light bulbs for the audience!

38
Q

Pelican project: vendors and open source technologies

A

are built to neck down and reduce the voliume of data so that defenders can focus on “what’s important” in a meaningful sample size.

39
Q

Pelican: <press> So, why did we name it</press>

A

Pelican? At some point, we started naming everything after bird stuff? We had a Goose, a Sparrow, a Hawk, and now a Pelican. At some point, you just commit to the bit whether you like it or not!

40
Q

Pelican: in reality

A

Pelican was chosen as a totem because it’s a bird that will continue to ingest more even after it’s past it’s capacity to take it in. This is a great analogy for our big data analysis capability, and also a great euphamism for me and my uncles at Thanksgiving, as we continue to go for another plate.

41
Q

Pelican: In this video

A

you can see the “travel” for identities. This application lso has a timelining capacity, so it can zoom in and out on specific timeframes. This is meant to represent every interactive and non-interactive identity identity in a broad enterprise environment, and everything that’s accessed.

42
Q

Pelican case study: So, what happens when you plumb

A

in these data sets? Well, let me tell you the a story.

43
Q

Pelican case study: we had an AWS

A

AWS development environment. We used this environment to test our tooling and to emulate specific types of threats, and we decided to use THAT environment as a test bed for the Pelican graphing analytic.

44
Q

Pelican case study What we saw

A

Is what appeared to be a sophisticated threat actor in our environment. Oh noooooooooooooo. We saw thousands of API calls with commensurate data exfil activity, on a regular basis. This rightfully raised a lot of alarms and lead to some frantic emails with our staff. This activity turned out to be, you guessed it: me, being an idiot.

45
Q

Pelican case study: I had totally forgotten

A

That in the early days of testing, we had established an API based ingestion project in our environment, meant to both check the state of AWS services but to also ingest key logs like CloudTrail. So the great mystery of the APT actor in the environent was….Josh. This case was handled extremely efficiently. This is a very funny story to relay now, but I can’t understate how terrifying it was up front.

46
Q

Future state: so what does the future hold?

A

We’re eager to move from what we know and can visualize into a semi-supervised graph learning state; we want to move to a place where the knowns and unknowns begin to label themselves, over time.

47
Q

Future state: our next use case

A

Now that we’ve got some core Cloud identity information ingested into the tool, is to draw the cross CSP correlation between MSFT and AWS identity structures.

48
Q

Future state: simply put

A

we’re eager to move to a state where incident responders can focus on the weird and the unique. That they can focus on bespoke oddities, and away from detections around atomic indicators.

49
Q

Future state: this is one method

A

That CISA is exploring to try to tackle this particular program, but i’m eager to spend the next few days listening and learning how the brilliant folks here are also tackling similar challenges. We’re collectively better than the sum of our parts.

50
Q

Future state: thanks

A

for your time, and i’m looking forward to meeting as many of you all as I can in the coming days!