BreachExchange mailing list archives
You’ve been hacked. What now?
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Wed, 23 Sep 2015 14:05:49 -0600
http://realbusiness.co.uk/article/31486-youve-been-hacked-what-now/page:1 An IT department may have taken all the necessary precautions to ensure that they prevent a security breach, and yet shrewd attackers may still get through. Once you’ve been hacked, how does a business deal with the fallout? As hackers have become increasingly intelligent in their approach, organisations need to be prepared for such situations. Cybercriminals are constantly looking to new tools and methods, which not all businesses can anticipate or protect against. Crucially, as criminals have grown more sophisticated, and as state-sponsored attacks have increased, the likely motives and methods have changed. This signifies a shift from the old days where hacks were very visible. Today, advanced, tenacious threats are the norm. Worryingly, the average number of days hackers remain undetected on a network is 243 days. Eight months! That’s a lot of time to steal data. Often, malware doesn’t want to be detected and generally won’t be seen directly. Rather, companies will become aware due to its effects. This could simply be noticing that your computer is doing strange things. Equally, in financial malware scenarios, employees may notice money missing from their accounts or on their credit cards. Companies can also look for signs such as unusual network traffic and unusual systems access patterns. Savvy companies will use experienced investigators to analyse their logs for signs of malicious activity, and log analysis tools like Splunk can help here by providing a layer of business intelligence on top of otherwise unfathomable system logs. Put a plan in place One of the worst things that can happen to a company that has already been compromised is not knowing what to do next. As much as we may not want to admit to the possibility of a security breach, it’s important that organisations have a "what if" plan in place that allows them to react quickly. This should be detailed and well-rehearsed so that the business can immediately spring into action. This playbook should include information about who to call. A very small percentage of businesses have the skills and expertise in-house to carry out a forensic analysis of how and why an attack has happened – and how they can prevent it from taking place in the future. Specialists will extend beyond forensic security analysts and infrastructure managers to delve into other areas too. There is of course a legal and compliant part of the puzzle, as well as involving media and communications staff to discuss both internal, and external messaging. These areas can – and should – work in tandem. For instance, technology staff who analyse lost or compromised data should then inform the legal team, who can then work out whether the lost data impacts customers and requires notification. Communications staff can then reach out accordingly. Some of the worst responses are down to a lack of information, a lack of transparency, and in the worst cases, complete denial. By having a premeditated plan in place however, with dedicated teams responsible for specific areas, the business can work in sync to minimise the impact of the fallout as best they can. A mature plan will break down into at least three main parts: containment, mitigation, and cleanup. Keeping the attack contained Once an attack has taken place, it’s crucial it doesn’t go any further – a kind of digital sandbag if you will, to prevent further injury. After circling in on the attacker, this is the first action that the response team should take, largely because it is near impossible to mitigate what cannot be contained. This containment can be a difficult task. Attackers are stealthy, making it difficult for businesses or security experts to see how far hackers have got in their attack. You could possibly enlist the response teams for the vendors to navigate this. Typical candidates are antivirus companies or ethical hackers who can be brought in to look at patterns that are interesting in terms of who these attackers are, and where their interest lies. Mitigation and clean-up After the containment comes the mitigation. At this stage, the security response team should have identified the weak spot. In short, how the attacker got inside. Was it unpatched Windows workstations? Or a misconfigured web server? Batten down the hatches and close the door to fresh attacks, unless you want to find yourself in an endless cycle of cleanup-reinfection. Completely removing the malware and fixing any compromised user accounts is the next a crucial step. Once you’ve carefully extradited the attackers from corporate systems and surveyed the extent of the damage, an organisation must look to fixing as much of the damage as possible. This includes reinstalling compromised systems from known, good media and potentially restoring data from backup. Added to this, businesses must reconfigure network and server software, monitoring its operation for a set time in order to ensure that everything is working as it should. Lessons learnt Perhaps the only benefit of having been attacked is that you can learn from it. This includes carrying out a post-mortem with tangible insights that can then be fed into a company security policy, as well as the wider business strategy. You may discover that you need to embark on an internal education phase that addresses training and awareness for example. No one likes facing adversity, but one true test of an IT director’s character lies in how they deal with it. When hackers strike, the truly savvy IT decision maker will have the tools and contacts in place to get the job done.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- You’ve been hacked. What now? Audrey McNeil (Sep 24)