InfoGuard AG (Headquarter)
Lindenstrasse 10
6340 Baar
Switzerland
InfoGuard AG
Stauffacherstrasse 141
3014 Bern
Switzerland
InfoGuard Deutschland GmbH
Landsberger Straße 302
80687 Munich
Germany
In the dynamic environment of increasing cyber threats, extended detection and response (XDR) technology has proven to be indispensable. In the first part of this blog series, we reported on how XDR works as an AI-supported technology, provides 24/7 protection against attack vectors and actively supports your Security Operation Centre (SOC) from “detection” to “response”. In the second part, we examine how a modern security architecture makes a decisive difference. The real-life case study illustrates the benefits of a structured cyber defence journey with an XDR stack and points the way to a robust security strategy.
The rapid pace of technological change not only boosts economic development, but also offers new opportunities for cyber criminals. The number and complexity of cyber attacks are alarming. A security operation centre (SOC) find themselves faced with significant challenges, while companies are forced to keep pace with rapid developments. The behaviour-based XDR technology is the key to effective cyber defence – from prevention to recovery.
In the context of cyber defence, the use of a comprehensive NIST Cybersecurity Framework 2.0 (MDR/SOC dispositive) is essential for the safeguarding of all essential security aspects. In other words, a balanced combination of identification, protection, detection, response and recovery forms the basis for effective cyber defence and protects against potential damage and business-relevant effects.
Figure 1: The NIST Cyber Security Framework 2.0, a MDR/SOC dispositive
Let’s take a detailed look at how the five components in this security framework are optimally interlinked.
The first step in any security framework is identification. This process includes:
After identifying the risks, we turn to the protective measures:
Detecting security incidents is crucial for early warning and rapid response:
Once suspicious activity has been detected, it is important to respond correctly:
Recovery is the final step after a security incident:
This integrated approach ensures that organisations are not only proactively protected against threats, but can also respond and recover quickly and effectively in the event of an attack.
Let’s now examine a concrete attack attempt on a service provider. This case illustrates the challenges and response strategies involved in complex cyber attacks. To this end, we take a detailed look at the architectural issues, the course of the attack and the response measures.
The incident analysed concerned a service provider whose infrastructure was monitored and protected with an XDR stack in our SOC 24/7. This company provides its customers with infrastructure-as-a-service, but without adequate monitoring. The architectural issue lay in the shared use of the Active Directory by the company and its customers. The shared responsibility thus led to increased risk exposure. After the report was received by the SOC, it quickly became clear that an intervention by the CSIRT would be necessary.
Reconnaissance tour to prepare for the attack – day 1
On the first day, the attacker established access via a “Cobalt Strike”-based “command and control” infrastructure. This took place in an area of the infrastructure that was not monitored by the XDR system. The attacker reconnoitred the system to determine whether the company would be a worthwhile target and left the system empty handed – albeit only temporarily.
Figure 2: Preparatory activities and reconnaissance
Continuation and extension of the attack – day 9
Nine days after the initial access, the attacker returned to the compromised server to carry out further activities.
Before performing several attack attempts, he extended the visibility in the network:
Figure 3: DC sync attack, attempts to install vulnerable drivers and Cobalt Strike
Alerting and activation of incident response measures
The first alarm was triggered at 5:27 a.m. UTC and signalled the start of the response measures at the same time.
These measures included:
Neutralisation and clean-up using artificial and human intelligence
The attacker was neutralised both automatically by the XDR stack and manually by the incident response team. The infrastructure was cleaned up to prevent further attacks. Even though the XDR technology had considerably slowed down the attack, complete neutralisation was only possible thanks to coordinated measures by the security team.
Figure 4: Triaging and validation
Overall, this incident shows that modern security architectures combined with well thought-out response processes are crucial for protecting against and dealing with cyber attacks.
The cyber defence journey describes the systematic process for building a robust and efficient cyber defence.
Let’s take a closer look at the journey based on our four-stage “managed detect and response (MDR)” setting:
Figure 5: Cyber defence journey with a XDR-stack
Initialisation opens the cyber defence journey and lays the foundation for the entire security architecture.
During the realisation phase, the fundamental security components are implemented.
Baselining is important for creating a basis for continuous monitoring and improvement.
In the operations phase, operational capability is ensured so that threats can be responded to 24/7.
By taking this structured approach to the cyber defence journey, a company can ensure that it has the necessary technologies and processes in place to effectively detect, prevent and respond to attacks.
The cyber defence journey shows clearly that a well thought-out and structured security strategy with effective solutions is essential for protection against increasingly complex cyber threats. But even the most sophisticated technology can only achieve its full effect in conjunction with the right expertise.
Our ISO 27001:2022-certified security experts not only support you in choosing the right XDR stack, but also work with you to develop a holistic security architecture that optimally strengthens your security operation centre (SOC) in the areas of detection, response and recovery.
Together we’ll ensure that your cyber defence meets the highest standards not only today, but also in the future.
Our two-part blog series on “The Magic Word for Efficient Defence against Modern Cyber Attacks” gives you a complete 360-degree perspective:
Also for streaming: Ernesto Hartmann, Chief Cyber Defence Officer, and Sandro Bachmann, Senior Incident Responder, discussed how XDR can be used to effectively defend against cyber threats during an InfoGuard Security webcast.
The recording of this webcast is available as a YouTube video. It's well worth listening to!
Caption: with Midjourney generated image