In Mandiant's seminal report on APT1, they reported that these sophisticated attackers had penetrated the target, on average, a year prior to being detected. In one of the investigations they conducted, the attacker had persisted in the network for 4 years and 10 months!
This is interesting. First off, it is really amazing that Mandiant was able to find evidence five years old. This is in contradiction to what I have been taught and what I have experienced. My guess is that it was a stroke of good luck, or that they had a very definitive indicator of compromise (IOC) and were able to get backups going back long enough to establish "patient zero." That is some excellent investigation, and a client that was willing to pay enough to let them dig back far enough.
As pointed out in Mandiant's report -digital evidence is ephemeral. Which means that responding quickly to an event is paramount.
We can increase our chances of conducting a successful investigation if the local security team has done one or more of the following (or managed to get their enterprise to do the following):
- Enabled verbose logging - everywhere, ideally. But at least on critical infrastructure, servers and other likely targets on the host level and all network devices and security technologies.
- Created secure and centralized logging infrastructure
- Good packet capture or other network surveillance technologies (netflow, etc.)
However, the point of this post is not about doing a root cause analysis and being able to go "back in time" to identify the initial penetration. The point is about reacting quickly and "violently" to initial indicators that something is wrong in your environment.
This is something I have been thinking about a lot recently. Anyone who does security operations knows that there is a deluge of eventing that must be processed effectively and efficiently by security analysts. Distinguishing signal from noise is THE main issue for security operations.
[Note I am using the term "security operations" versus "incident responders" - in some organizations, these may not be the same people. For the purposes of this blog, security operations pertains to the analysts who are engaged in incident detection]
I don't know that I have any definitive rules for knowing when an event is an incident. But I think this is a topic that we security professionals should start discussing more. And where knowledge transfer should occur. I will be posting more about this topic in the future.
However, here are some final thoughts. In each of the APT intrusions investigated by Mandiant, I bet my bottom dollar that there was some indication that things were amiss. Yes, for some enterprises, they don't even have the detective controls to look at. I wonder, though - in how many cases, did an alert fire and no one looked at it? (The age old question - if a tree falls in the forest...) We know for a fact that this happened in the Target breach.
So - when an alert fires one certainly needs to respond quickly. My contention is that even in instances where suspicious events arise - they should be quickly and fully investigated to the satisfaction of the entire security team. This may seem like an obvious point, but we should be mindful of the quality of our investigations to ensure that what we think we are seeing, is in fact what we are seeing. More on this later (before I get "TL;DR'd")