Module 9 Incident Response Template

docx

School

Bellevue College *

*We aren’t endorsed by this school

Course

430

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

8

Uploaded by CountDugongPerson1794

Report
Bellevue Bank and Trust Cybersecurity Incident Report Juan Rodriguez Reported By: Mike Simms Date of Report: Thursday, September 17, 2023 Title/Role: Junior Analyst Incident No: 02 Incident Severity: Negligible: Minor: Severe: Critical: X TLP: White: Green: Amber: Red: X CYBERSECURITY INCIDENT INFORMATION Date of Incident: Thursday, September 17, 2023 Time of Incident: 9:48 a.m. CST Incident Manager: Bruce Edwards Title/Role: Security Operation Center Manager Phone: 123-458-4100 Email: Bedwards@bbtrust.org Location: Bellevue, NE Specific Area: Bellevue Bank and Trust Incident Type: Ransomware No. of Hosts Affected: 3 Source IP Address IP Address: 10.103.14.47, 10.103.52.55, 10.104.25.6 Computer/Host: Operating Systems: Windows Other Applications: Incident Background: On Wednesday, September 15, 2021, at 6:00 PM CST, the Security Operation Center (SOC) detected a phishing email from crownpension@rosemoreinc.com targeting 150 employees. Proofpoint successfully blocked the emails between 4:30 PM and 6:00 PM CST. The following day, Thursday, September 16, 2024, at 9:30 AM, the SOC received an alert regarding a new ransomware variant attacking American and Canadian banks via phishing emails. A conference call was held at 11:00 AM involving the SOC, Threat Intelligence, server engineering, desktop services, the Bank’s help desk, and business technology teams. At 10:00 PM, the SOC was alerted by the Endpoint Detection and Response (EDR) tool about a suspicious file, "ATTN: Bank COVID-19 Response Update.docx," originating from a virtual desktop and a back-office computer. The EDR tool successfully blocked the file, and a case was opened by Junior Analyst Sandra Williams. On Friday, September 17, 2021, at 9:48 AM, the help desk reported employees receiving a ransomware message, leading to Junior Analyst Mike Simms opening a case. At 10:26 AM when users reported difficulty accessing files, the CIO's laptop displayed the ransomware message at 10:45 AM. The SOC manager declared an incident at 10:52 AM, leading to the formation of the Computer Incident Response Team (CSIRT). A series of tasks were assigned, including isolating infected computers, deleting phishing emails, identifying, and deleting the malicious
document, and stopping the encryption source. By 11:10 AM, emails from the attacker were deleted, and at 11:15 AM, a query was ran to identify and delete files associated with the attack. At 11:28 the CIO's laptop was determined to be the source of the encryption. Malware analysis results were received at 12:05 PM, and IOCs were added to the DNS blocklist. By 2:35 PM, forensic images of compromised laptops were completed. Server engineering finished restoring directories at 5:45 PM, and CSIRT closed the incident at 9:27 PM. On Monday, September 20, 2021, at 8:00 AM, compromised laptops were returned with a new image, followed by a debrief conference call at 11:00 AM. Incident Description: On September 17, 2021, Bellevue Bank and Trust faced a ransomware incident caused by a phishing attempt. The incident involved a malicious document, that led to employee disruptions due to encrypted files. The encryption occurred due to the CIO’s laptop being compromised. Once compromised, attackers were able to gain access to most directories and shared files due to his clearance. The CSIRT responded by isolating infected systems, deleting phishing emails, and restoring encrypted folders. Malware analysis led to DNS and firewall updates, addressing operational disruptions, financial impacts, and reputational concerns. Ongoing efforts focus on rebuilding trust and implementing long-term security measures. Events Timeline: Wednesday September 15, 2021 - At 6:00m pm security operation center (SOC) detected a phishing email sent to 150 employees from crownpension@rosemoreinc.com - Proofpoint blocked the emails between 4:30 pm – 6:00 pm CST. Thursday, September 16, 2021 - At 9:30 Security operation center received an alert from Financial Services Information Sharing and Analysis informing that American and Canadian banks are being attacked by phishing emails with a new ransomware variant. - At 11:00 AM SOC and Threat Intelligence held a conference call with server engineering, desktop services, the Bank’s help desk, and business technology to inform them. - At 10:00 PM EDR alerted security operation center of strange behavior of a file name ATTN: Bank COVID-19 Response Update.docx coming from a virtual desktop instance and a back-office computer - EDR tool detected it and blocked the files from executing. - Security operation center updated the Managed Security Service Provider. - Junior Analyst Sandra Williams opened a case stating the two alert logs as followed: Hostname IP Username Time vdi15a22.bbtrust.com 10.45.16.32 asmith 10:55 p.m. CST lincolnbackoffice15.bbtrust.com 10.105.127.134 Jgarcia 11:02 p.m. CST - Sandra obtained Word Document MD5 Hash: 5cb9cff7e12b6c1d8724ab8f8a10555e from ATTN: Bank COVID-19 Response Update. Friday September 17, 2021 - At 9:48, Junior Analys Mike Simms received a call from help desk staff Jordan Brands stating two employees have message on their screen stating, “All your files are encrypted!” - Employees were unable to access email, local documents, internet, and corporate intranet. - Mike Simms opens a case using the bank’s incident response platform and reviews the MSSP. - Mike finds that the MSSP scanned for the MD5 hash from the previous night, and no results came back. - MSSP detected an email containing the malicious document ATTN: Bank COVID-19 Response Update.docx as an attachment, which was sent to 10 bank addresses from phishing@uottawa.ca
- Proofpoint did not block the emails, but no alerts or signs of infection were detected. - asmith and jgarcia, attempted to open the file before the MSSP deleted the phishing emails from all mailboxes. The following information was recorded Hostname IP Username Time l55cm2.bbtrust.com 10.103.14.47 skopsa 9:48 a.m. CST mgr257.bbtrust.com 10.103.52.55 mmichelson 9:48 a.m. CST - Mike Simms runs a query on SIEM to find that skopsa and mmichelso received an email from lisa.trudell@genworth.com with the attachment ATTN: Bank COVID-19 Response Update.docx - An MD5 hash was retrieved from the docx Word Document MD5 Hash: dcc43f6872da3da500be2562cd0b2789 . And sent to Security operation center malware analysis expert, Josh Pierce, to analyze the file. - At 10:26 am, help desk informs the security operation center of multiple users reporting trouble accessing important files, and have been renamed with the extension .enc - An attempt to rename them to the original file extension they become corrupted. - At 10:45 am, CIOs secretary calls the security operation center to inform them the CIOs laptop is showing the ransomware message. The following log appeared. Hostname IP Username Time cio1.bbtrust.com 10.104.25.6 csullivan 10:45 a.m. CST - At 10:52 am, Security operation center manager, Bruce Edwards, declares an incident and convenes the computer incident response team (CSIRT). - Bruce took the lead as incident manager. - Meeting with the CIO, CISO, managers joined for a phone conference through WebEx. The call determined the following task. - Use the EDR tool to isolate all currently known infected computers from the network. - Everyone who received an email from lisa.trudell@genworth.com o Mike should turn over the list to a fellow CSIRT member so the CSIRT can delete phishing emails containing the malicious document from any other user mailbox. - Everyone computer that has the file containing the hats of the malicious word document o Mike should turn over the list to a fellow CSIRT member so the CSIRT can delete the malicious document and record where the documents have been found. - The source of the of the computers or computer that is encrypting files on the share and every folder on the share those computers have touched. o Mike should turn over the list to a fellow CSIRT member so the CSIRT can stop the endpoint computers from encrypting folders and so that the server engineering can begin restoring encrypted folders from the most recent good backup. - At 10:57 am Mike Simms uses EDR management interface to disable the following computers from accessing the network Hostname IP Username l55cm2.bbtrust.com 10.103.14.47 skopsa mgr257.bbtrust.com 10.103.52.55 mmichelson cio1.bbtrust.com 10.104.25.6 csullivan - At 11:01 am, Mike gave the list of the emails to Junior Analyst Sandra Williams
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
- At 11:10 am, Sandra and Exchange administrator Kevin Silkwood delete emails from lisa.trudell@genworth.com from user’s mailboxes. - Sandra also deletes the email through the bank’s security program. - Below is a report of the breakdown of emails of who received, download, opened, and reported Username Received Downloaded Opened Reported Hostname skopsa@bbtrust.com X X X l55cm2.bbtrust.com mmichelson@bbtrust.com X X X mgr257.bbtrust.com csullivan@bbtrust.com X X X ciso1.bbtrust.com mmedows@bbtrust.com X N/A dmiller@bbtrust.com X X X l62t51.bbtrust.com ebrown@bbtrust.com X N/A srodriguez@bbtrust.com X X X l51g5.bbtrust.com mwilson@bbtrust.com X N/A sburke@bbtrust.com X N/A lhayden@bbtrust.com X N/A - At 11:15 am, Mike Simms ran a query using the bank’s Velociraptor endpoint visibility platform to search for the following name files and hashes ATTN: Bank COVID-19 Response Update.docx or ATTN: Updated Bank COVID-19 Response Update.docx or hashes on endpoints matching 5cb9cff7e12b6c1d8724ab8f8a10555e or dcc43f6872da3da500be2562cd0b2789. - At 11:25 am, Mike Simms hands the results to Junior Analyst Lee Mulling which he deletes the files found. Hostname IP Username Path l55cm2.bbtrust.com 10.103.14.47 skopsa C:\Users\skopsa\Documents mgr257.bbtrust.com 10.103.52.55 mmichelson C:\Users\\Documents cio1.bbtrust.com 10.104.25.6 csullivan C:\Users\csullivan\Desktop - At 11:28 am, Mike Simms finds that cio1.bbtrust.com at 10.104.25.6 has accessed many files on the following file shares. Which, was determined it was the CIOs laptop - Due to the CIOs laptop who had access to the bank’s file shares. It had given access to most all shares and directories on the file server, it led to the encryption. - At 11:45 am, An update was given to the computer incident response team manager (CSIRT), Bruce. - Mike and Don Sanders begin to restore directories/shares that were encrypted. @12:05 pm - At 12:05 pm, Josh Pierce reports his malware analysis providing a list of IOCs to be able to add to the DNS blocklist. The list consist of o Domains yoursuperservice.com zapored.com arcnew.com aerodx.com avetoo..com banolik.com fangulf.com
kuxizi.com rosemoreinc.com genworth.com uottawa.com o email crownpension@rosemoreinc.com phishing@uottawa.ca lisa.trudell@genworth.com o IP Addresses 142.234.157.164 108.52.12.100 104.244.154.112 102.195.100.204 192.111.149.58 205.221.186.24 o MD5 Hashes 5cb9cff7e12b6c1d8724ab8f8a10555e dcc43f6872da3da500be2562cd0b2789 0615d36031bf3da7ec68c5f2d46d4c04 784c7b3c4131cf0f8ac3d38feb1f378b 0dedfa96043208167f8deb5cc652909a 06122d9d3f5fd498c75e1894684d7659 7e7023a81ca8f0d86211899ca85a5ba8 - At 1:36 pm, Mike Simms requested approval of an emergency change to be able to add the IOCs to the DNS blocklist and temporary IP address firewall block rules. - At 2:35 pm. Analyst Silvester Jones completes the forensic images of the three compromised laptops and hands the laptops to desktop services for reimaging. - At 5:45 pm, server engineering finishes restoring directories on the file share that were encrypted by the CIOs laptop. - At 9:27 pm, CSIRT closes incident WebEx and conference call. Monday September 20, 2021 - At 8:00 am, desktop services return compromised laptops with a new image to the CIO and two employees. - At 11:00 am, CSIRT holds a debrief conference call to discuss the following incident. o No new ransomware activity or phishing emails detected over the weekend. o The Word document took advantage of CVE-2021-4044 MSHTML zero day. o Patches for the MSHTML are available and were in the process of being deployed but KB5005573 had not been deployed to the three endpoints suffering the attack. o Patching had been disabled on the CIO laptop including EDR and Anti-virus updates. o A new vulnerability in Proofpoint allowed the email to evade detection. The vulnerability was fixed by Proofpoint over the weekend. o Files stored locally on the laptops were unrecoverable as the bank would not be paying a ransom for the files. Some work was lost but the loss was not devastating to the employees or bank.
o No sensitive information, including customer information, was exfiltrated or accessed as part of this attack. Impact Assessment: Due to the ransomware incident, Bellevue Bank and Trust had operational disruptions on September 17,2021. Employees were unable to access critical files due to the ransomware encryption. This led to work loss and financial costs. If sensitive data was compromised, it may lead to further money loss. Reputation implications are to be concerned since the incident will be public. Further investigation may occur to ensure compliance is met. Although the bank was compromised, they were able to mitigate the attack. The bank will need to continue to monitor the breach and focus on rebuilding trust. Network Infrastructure Overview: The network has advanced email security through Proofpoint and EDR tools. And Managed Security Service Provider to ensure the system is safe during non-operational hours. Compromised hosts had access to files shares and servers which held critical data. The main server they are connected to is the File Server-bankshare01. The diagram shows the compromised host in red and the shared file server in yellow.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
After malware analysis, a list of IOCs was created to block and prevent any future incidents. The network can implement a DNS blocklist and IP address firewall rules to prevent malicious entities from connecting. After the incident the following domains, email, IP addresses were blocked. o Domains yoursuperservice.com zapored.com arcnew.com aerodx.com avetoo..com banolik.com fangulf.com kuxizi.com rosemoreinc.com genworth.com uottawa.com o email crownpension@rosemoreinc.com phishing@uottawa.ca lisa.trudell@genworth.com o IP Addresses 142.234.157.164 108.52.12.100 104.244.154.112 102.195.100.204 192.111.149.58 205.221.186.24 Forensic Analysis Overview: During the analysis, Josh Pierce identified a list of IOCs that included domains, email addresses, IP addresses, and MD5 hashes associated with malicious activities. IOCs were able to provide valuable insights into the attack and update the DNS blocklists and IP address firewall rules to prevent further communication with malicious entities. Forensic analysis also revealed that the CIO's laptop, identified as cio1.bbtrust.com IP address 10.104.25.6, had accessed numerous files on critical file shares, leading to the encryption of them. Analyst Sylvester Jones performed forensic imaging on the three compromised laptops, capturing a snapshot of the systems at the time of the incident. The forensic images were then handed over to desktop services for reimaging, ensuring a clean and secure state for the devices.
Containment Actions: Upon identifying the systems that were compromised, the CSIRT initiated the isolation process from the network. This included usernames skopsa, mmichelson, and csullivan to prevent further spread. Deletion of the phishing emails from lisa.trudell@genworth.com were removed from all emails to prevent further spread. The same was done with using the MD5 that was generated from the ATTN: Bank COVID-19 Response Update.docx and ATTN: Updated Bank COVID-19 Response Update.docx. After analyzing the malware, an IOCs was created to update the DNS blocklists and temporary IP address firewall block rules; to mitigate any risk of further infections. One last scan of the IOCs was done to guarantee no files were missed. The CSIRT team initiated the restoration of encrypted directories and shared files. This meant deleting compromised directories and using the backup systems to restore the data. Findings/Root Cause Analysis: On September 17, 2021, Proofpoint did not block phishing emails since the attacker was able to find a vulnerability to evade detection. The email contained a malicious document that reached bank users. The malicious document was opened by three users with one of the users being the CIO. Due to the CIO’s extensive access to critical file shares it led to widespread of folders to be encrypted. The ransomware took advantage of CVE-2021-4044, a MSHTML zero-day exploit. Patches were available but weren’t deployed. Remediation: Implemented the patch CVE-2021-4044, MSHTML zero-day exploit, and ensured it was deployed across all endpoints. The next step, we updated Proofpoint and tested it to ensure it would block similar ransomware in the future. Next, we reimaged the compromised laptops, to ensure the removal of all threats. A review of access control and permissions was done to verify what needs to be granted to employees and CIO. Implementing the principle of least privilege to keep critical file shares and directories protected. A review of EDR tools was done and updated to strengthen endpoint security. Final Recommendation: We will need to evaluate our user awareness training. Focus on enhancing it to raise awareness about phishing emails threats and allow our staff to be educated on detecting phishing emails. Implement a system on how phishing emails can be reported. Set procedures and policies for patch management, this will ensure patches are deployed in a timely manner and know vulnerabilities are being addressed. Include threat intelligence to be able to stay informed with new threats and identify vulnerabilities before they are exploited. Review all security tools to ensure they are up to date and continue to update. Further discuss the need of new tools such as SIEM to be able to assist security team to detect threats sooner. Definitions: Proofpoint- a cloud-based solution for threat protection, email security, and compliance. This allows us our company to ensure there are no email-based threats.