Artwork

内容由IMF Security and Brian and Michael提供。所有播客内容(包括剧集、图形和播客描述)均由 IMF Security and Brian and Michael 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

Getting back to basics, IR 101 - Episode 013

50:36
 
分享
 

Manage episode 263576476 series 2681668
内容由IMF Security and Brian and Michael提供。所有播客内容(包括剧集、图形和播客描述)均由 IMF Security and Brian and Michael 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Recorded May 2020

TOPIC: Getting back to basics, IR 101

OUR SPONSORS:

NEWS-WORTHY:

Best EDR Security Services In 2020 for Endpoint Protection

How to Avoid Spam—Using Disposable Contact Information

Shiny new Azure login attracts shiny new phishing attacks

Upgrading from EDR to MDR is Critical but Easier than You Think

The ransomware that attacks you from inside a virtual machine

SITE-WORTHY:

Malware Archaeology - Cheat Sheets

TOOL-WORTHY:

LOG-MD - The Log anD Malicious Discovery tool

MALWARE OF THE MONTH:

Qakbot

  • Typical delivery via a Office doc or URL

  • Created a folder in C:\Users

Key Detection points

  • Enable better logging AutoRuns - Uses Run key and Scheduled Task

  • WMIPrvSe launch binary in C:\Users

  • Binary in root of \Username directory C:\Users\\.exe

  • C:\Users\\AppData\Roaming\Microsoft\ Syswow64\Explorer.exe used Parent of Explorer.exe is NEVER a binary in C:\Users

  • Process injection of Syswow64\Explorer.exe

  • Ping 127.0.0.1

  • Scheduled Task created by a binary in C:\Users

  • Syswow64\Explorer,exe opening all the browsers

  • Binary in C:\User calling out to foreign country

PREVENTION

  • Block Office macros

  • Don’t allow uncategorized websites

  • EDR Software

  • Whitelisting C:\Users

TOPIC OF THE DAY:
Getting back to basics, IR 101

What is getting back to basics - IR 101

  • This will likely be multiple episodes

  • We will start with Windows

Why is this important?

  1. WHEN you have an incident, data we, and you need will be available

  2. This is probably the #1 finding and recommendation we have made to organizations we have been involved with over the years

  3. Security tools fail, so other data you collect can help discover what happened where, when, and how

What is the problem we are wanting our listeners to solve?

  1. To be better prepared in the event of an incident to speed up investigations

  2. Give your SOC, IT, or Security people the data they need to investigate events

  3. Make log management data better if you are collecting all the things

  4. And of course… help your IR Consultancy do a better job FASTER

Other Articles:

-------------------

CIS Benchmarks

DerbyCon talk on EDR

DerbyCon talk on Winnti

  continue reading

15集单集

Artwork
icon分享
 
Manage episode 263576476 series 2681668
内容由IMF Security and Brian and Michael提供。所有播客内容(包括剧集、图形和播客描述)均由 IMF Security and Brian and Michael 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Recorded May 2020

TOPIC: Getting back to basics, IR 101

OUR SPONSORS:

NEWS-WORTHY:

Best EDR Security Services In 2020 for Endpoint Protection

How to Avoid Spam—Using Disposable Contact Information

Shiny new Azure login attracts shiny new phishing attacks

Upgrading from EDR to MDR is Critical but Easier than You Think

The ransomware that attacks you from inside a virtual machine

SITE-WORTHY:

Malware Archaeology - Cheat Sheets

TOOL-WORTHY:

LOG-MD - The Log anD Malicious Discovery tool

MALWARE OF THE MONTH:

Qakbot

  • Typical delivery via a Office doc or URL

  • Created a folder in C:\Users

Key Detection points

  • Enable better logging AutoRuns - Uses Run key and Scheduled Task

  • WMIPrvSe launch binary in C:\Users

  • Binary in root of \Username directory C:\Users\\.exe

  • C:\Users\\AppData\Roaming\Microsoft\ Syswow64\Explorer.exe used Parent of Explorer.exe is NEVER a binary in C:\Users

  • Process injection of Syswow64\Explorer.exe

  • Ping 127.0.0.1

  • Scheduled Task created by a binary in C:\Users

  • Syswow64\Explorer,exe opening all the browsers

  • Binary in C:\User calling out to foreign country

PREVENTION

  • Block Office macros

  • Don’t allow uncategorized websites

  • EDR Software

  • Whitelisting C:\Users

TOPIC OF THE DAY:
Getting back to basics, IR 101

What is getting back to basics - IR 101

  • This will likely be multiple episodes

  • We will start with Windows

Why is this important?

  1. WHEN you have an incident, data we, and you need will be available

  2. This is probably the #1 finding and recommendation we have made to organizations we have been involved with over the years

  3. Security tools fail, so other data you collect can help discover what happened where, when, and how

What is the problem we are wanting our listeners to solve?

  1. To be better prepared in the event of an incident to speed up investigations

  2. Give your SOC, IT, or Security people the data they need to investigate events

  3. Make log management data better if you are collecting all the things

  4. And of course… help your IR Consultancy do a better job FASTER

Other Articles:

-------------------

CIS Benchmarks

DerbyCon talk on EDR

DerbyCon talk on Winnti

  continue reading

15集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南

边探索边听这个节目
播放