InfoGuard AG (Headquarter)
Lindenstrasse 10
6340 Baar
Switzerland
InfoGuard AG
Stauffacherstrasse 141
3014 Bern
Switzerland
InfoGuard Deutschland GmbH
Landsberger Straße 302
80687 Munich
Germany
It will soon be Easter, and the Easter egg hunts will be starting up all over again. Just as the Easter bunny leaves clues and tracks, attackers also leave their traces in your network. It is important to preserve as many of these traces as possible in the run-up to an attack, to enable you to track down the attacker more quickly in the event of a serious incident. In my blog post, find out what precautions you can take to be as efficient as possible when it comes to following the traces.
Easter is almost upon us, and at home, my 3 ½-year-old is obsessed with the Easter Bunny: How does the Easter Bunny get into the house even through locked doors? Does he bring just one Easter egg or will there be several - or will he even take my beloved dummy away with him? Even in the perfect world my son inhabits, an Easter bunny can be seen as a potential threat actor.
I think back fondly to my own childhood. Back then, every child made an Easter nest which the Easter Bunny then filled up with eggs overnight and hid somewhere. On rainy days it was inside the house and, on fine days, outside in the garden. It was also strange thing, but our parents always knew where the Easter Bunny had hidden the Easter egg nests. We were supposed to look for “tracks”, such as paw prints in the snow (sometimes there really was still snow at Easter), bent dandelion flowers (when the snow was gone) or other clues. Over time, we got better and better at tracking. This way, the “Threat Actor” Easter Bunny could be tracked down by collecting clues, or at least the “Easter egg” he had planted there.
These days, I don’t hunt for Easter egg nests, I search for malware, and I no longer read tracks in the snow, I find attacker traces in forensic artefacts. When we search for an attacker‘s traces in a network as part of an incident response, it is primarily done at the endpoints. This is where we are most likely to find traces of the attacker. Of course, we also use various network artefacts, such as firewall or proxy logs, to search for C2 communications or evidence of data exfiltration. However, the attacker leaves most of the traces where the attack happens – that is, on the endpoint.
Every attacker leaves behind traces here, whether it is an automated or opportunistic attack, such as the large-scale hafnium attacks in recent weeks, or a long-planned attack by a nation-state actor. The trick is to distinguish between normal user and system behaviour and attacker activity. This can be a major challenge in very large, diverse or confusing environments. It is particularly difficult where a developer has local administrator rights in his development system, because in that case, a lot of things can look like an attack.
Fortunately, there are artefacts, or logs where we almost always find traces of the attacker, so this is where we start searching first.
If we are unable to track down the attacker at these locations, we dig deeper. We analyse a range of forensic artefacts for traces of the attacker. These include any event logs, various registry hives, file system artefacts, recent memory images, etc. However, in order to ensure that these traces are available in the event of an incident, it makes sense to think in advance about what these artefacts are for your own company.
When we went on Easter egg hunts when I was young, it was always lucky if the snow hadn't melted yet. Then it was much easier for us to find the tracks of the “Easter Bunny”. To prevent the snow from melting in your vicinity, we recommend you take the following precautions:
A cyberattack can strike your company at any time, not just at Easter. That's why it's so important to quickly recognise attacks and their traces and to react immediately to them. Our Incident Response Retainer creates the optimal conditions for us to provide you with quick, efficient and effective support in the event of a cyberattack. You will have our cyber security experts available to you 24/7. Learn more about our Incident Response Retainer now and don't give the attackers a chance.
The more attacker traces you can find in the run-up to an incident, the faster we will find the “Easter bunny” or the attacker and the “Easter eggs” they have planted. On that note, I wish you and your family a happy Easter and I hope your children find the clues quickly.