Top Banner
1 SANS Threat Hunting & IR Summit 2018 Launching Threat Hunting from Almost Nothing Takahiro Kakumaru, CISSP NEC Corporation SANS Threat Hunting & IR Summit 2018 2018.09.06-09.07
78

Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

Mar 10, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

1 SANS Threat Hunting & IR Summit 2018

Launching Threat Hunting

from Almost Nothing

Takahiro Kakumaru, CISSP

NEC Corporation

SANS Threat Hunting & IR Summit 20182018.09.06-09.07

Page 2: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

2 SANS Threat Hunting & IR Summit 2018

Who am I

• Takahiro Kakumaru, CISSP

Assistant Manager

Cyber Security Strategy Division

NEC Corporation

<[email protected]>

• Focus : Cyber Threat Intelligence, Threat Hunting,

Cyber Threat Intelligence sharing & consumption

• Activities : OASIS CTI TC & OpenC2 TC member,

Talk at FIRST2016

• Play & coach ice hockeyDisclaimer: “The opinions expressed in this presentation and

on the following slides are solely those of the presenters and

not necessarily those of their employers.”

Page 3: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

3 SANS Threat Hunting & IR Summit 2018

My favorite quote

“A good hockey player plays where the puck is.A great hockey player plays where the puck isgoing to be.”

Wayne Gretzky “The Great One”, the greatest hockey player ever

Page 4: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

4 SANS Threat Hunting & IR Summit 2018

Threat

Hunter

Today’s talk

Threat

Hunting

Techniques

“How can we incorporate threat hunting functions into the current security operations which don’t have a sophisticated hunter?”

Security Operations in the enterprise

Page 5: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

5 SANS Threat Hunting & IR Summit 2018

Why I am here today

1. To share case study focusing on threat hunting

operations in enterprise security operations.

2. To emphasize the importance of the process,

communication, and culture.

Note: This presentation is going to be about operations,

not specific hunting techniques.

Page 6: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

6 SANS Threat Hunting & IR Summit 2018

Agenda

1. Introduction to Threat Hunting Operations

2. Let’s get quick win!

3. Building Threat Hunting Operations

4. Threat Hunting Case Study

5. Threat Hunting Operations At Scale

6. Threat Hunting Operations Framework

Page 7: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

7 SANS Threat Hunting & IR Summit 2018

Introduction to

Threat Hunting Operations

Page 8: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

8 SANS Threat Hunting & IR Summit 2018

Threat Hunting is the PROCESS

“Cyber Threat Hunting is the

process of proactively and

iteratively searching through

networks to detect and isolate

advanced threats that evade

existing security solutions.”

https://sqrrl.com/media/Framework-for-Threat-Hunting-Whitepaper.pdf

Page 9: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

9 SANS Threat Hunting & IR Summit 2018

Characteristics of a THREAT HUNTER

“Threat Hunter is a cybersecurity threat analyst who uses proactive methods to uncover security incidents that might otherwise go undetected.”

https://searchcio.techtarget.com/definition/threat-hunter-cybersecurity-threat-analyst

“Threat Awareness”

“Communicative”“Collaborative”

“Creative”

“Critical thinker”

“Business knowledge”

Page 10: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

10 SANS Threat Hunting & IR Summit 2018

Threat Hunting Maturity Model (HMM)

43

21

0

LEVEL

LEVEL

LEVEL

LEVEL

LEVEL

INITIAL

MINIMAL

PROCEDURAL

INNOVATIVE

LEADING

https://sqrrl.com/the-threat-hunting-reference-model-part-1-measuring-hunting-maturity/

Maturity level of :

- routine data collection

- data analytics and tools

Page 11: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

11 SANS Threat Hunting & IR Summit 2018

Our Security Operations

Threat

Research

Team

SOC

Team

Incident

Response

Team

Malware

Analysis

Team

Protection

Operation

Team

NEC groups

ca. 190,000 devices

ca. 110,000 employees

CSIRTCSIRT

Manager

Page 12: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

12 SANS Threat Hunting & IR Summit 2018

Security Tools (1)

SOC

Team

Protection

Operation

Team Patch

Management

System (NCSP)

Information

Sharing /

Enlightenment

Network

Isolation

(SDN)

Perimeter

defense

(Proxy, FW)

Alerting System (IDS) Report from employee

*NCSP: NEC Cyber Security Platform

Page 13: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

13 SANS Threat Hunting & IR Summit 2018

Security Tools (2)

Forensic Tool Log Management

Malware Analysis Tool Malware DB

Incident

Response

Team

Malware

Analysis

Team

Page 14: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

14 SANS Threat Hunting & IR Summit 2018

Security Tools (3)

Open Source

Threat Intelligence

Feeds

Security

Vendors

Commercial Threat

Feeds / Report

Threat Intelligence

Platform (TIP)

Threat

Research

Team

Community

Page 15: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

15 SANS Threat Hunting & IR Summit 2018

Let’s get quick win!

Page 16: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

16 SANS Threat Hunting & IR Summit 2018

Let’s get quick win!

Primary Threat Hunting Techniques

https://sqrrl.com/media/ebook-web.pdf

Searching Clustering Grouping

Stack

Counting

Proxy logIndicators

IOC searches

???{IP address, URL} {IP address, URL}

Page 17: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

17 SANS Threat Hunting & IR Summit 2018

Our First Threat Hunting Result

IOC searches finished!!!

0 (zero) matched.

Page 18: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

18 SANS Threat Hunting & IR Summit 2018

Let’s confirm definition, again

“Threat Hunting

is the PROCESS”

Page 19: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

19 SANS Threat Hunting & IR Summit 2018

What we did

Proxy logIndicators

IOC searches

0{IP address, URL} {IP address, URL}

PROCESS TECHNIQUEor

Page 20: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

20 SANS Threat Hunting & IR Summit 2018

Building Threat

Hunting Operations

Page 21: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

21 SANS Threat Hunting & IR Summit 2018

KAIZEN

"The right process will produce the right results."

TOYOTA WAY

Page 22: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

22 SANS Threat Hunting & IR Summit 2018

Outline of Threat Hunting Operations Framework

Hunting

Operations

Hunting

Procedures

Process 1 Process 2 Process 3 Process 4 Process 5

V

Value 1

V

Value 2

V

Value 3

Process

Hunting Team’s

Objective Statement

ProcessProcess

Process 6

Process ProcessProcess

Searching Clustering Grouping

Stack

Counting

Page 23: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

23 SANS Threat Hunting & IR Summit 2018

Challenges

Challenge 2:

“workable operations”

Challenge 1:

“for what?” and “so what?”

Page 24: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

24 SANS Threat Hunting & IR Summit 2018

Challenge #1 “For what?” and “So what?”

“For what?”Core values of threat hunting

• Threat Hunting Loop (cycle)

“So what?”Actions after finding threat

from hunting

• Remediation as quickly as

possible

• Close detection gap

(signatures, detection rules

/algorithms)

Page 25: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

25 SANS Threat Hunting & IR Summit 2018

Hunting Loop is “Core”

THREAT HUNTING LOOP

https://sqrrl.com/the-threat-hunting-

reference-model-part-2-the-hunting-loop/

CREATE

Hypotheses

UNCOVER

New Patterns

& TTP’s

INFORM &

ENRICH

Analytics

INVESTIGATE

Via Tools &

Techniques

- Incident Response

(Forensics)

- Threat Research

- Operate via Tools

- Threat Research

Page 26: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

26 SANS Threat Hunting & IR Summit 2018

Actions lead to business goals

“Crafting the InfoSec Playbook”

Define response policy

in advance

• Escalation

• Precaution

• Mitigation

• Remediation

“Understand business requirement

enough before constructing the process.”

https://www.amazon.com/Crafting-InfoSec-Playbook-

Security-Monitoring/dp/1491949406

Page 27: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

27 SANS Threat Hunting & IR Summit 2018

Challenges

Challenge 2:

“workable operations”

Challenge 1:

“for what?” and “so what?”

Page 28: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

28 SANS Threat Hunting & IR Summit 2018

Challenge #2 : “workable operations”

Prepare“where” and “what”

Find“how” and “query”

Communicate“so what”

https://www.first.org/resources/papers/conf2017/Building-

a-Threat-Hunting-Framework-for-the-Enterprise.pdf

Prepare- Ask a Question

- Research

- Hypothesis

Find- Experiment

- Working (Yes/No)

- Troubleshoot

Commu-

nicate

- Analyze and Draw Conclusions

- Communicate All Results

- Refactor include in Future Hunts

High Process Minimum Cycle

Page 29: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

29 SANS Threat Hunting & IR Summit 2018

Jump the hurdle to getting the milestone

3. Actionable course of actionsa. Understandable

b. Evidence to lead actions

Prepare“where” and “what”

Find“how” and “query”

Communicate“so what”

https://www.sans.org/reading-room/whitepapers/threats/

generating-hypotheses-successful-threat-hunting-37172

2. Practicable execution procedurea. Minimum data collection

b. User-friendly tools

1. Simple first and collect from outsidea. Intelligence-driven

b. Situational awareness

c. Domain expertise

Page 30: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

30 SANS Threat Hunting & IR Summit 2018

CSIRT with Threat Hunting Capabilities

Hunting

Operation

Team

Threat

Hunting

Team

Threat

Research

Team

SOC

Team

Protection

Operation

Team

Incident

Response

Team

Malware

Analysis

Team

CSIRT

CSIRT

Manager

Page 31: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

31 SANS Threat Hunting & IR Summit 2018

Threat Hunting Operations

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

Page 32: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

32 SANS Threat Hunting & IR Summit 2018

Threat Hunting Operations

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT ManagerThreat Research

Team

1. Collect internal

/external CTI

Page 33: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

33 SANS Threat Hunting & IR Summit 2018

Threat Hunting Operations

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

Threat Research

Team

1. Collect internal

/external CTI

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Hunting

Team

Threat Hunting

Team

Page 34: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

34 SANS Threat Hunting & IR Summit 2018

Threat Hunting Operations

0. Set Objectives

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

4. Search

Threat Hunting Operation

Team

Page 35: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

35 SANS Threat Hunting & IR Summit 2018

Threat Hunting Operations

0. Set Objectives

4. Search

Threat

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

CSIRT Manager

5. Evaluate

Result

6. Enforce

Response Policy

Incident

Response Team

Incident

Response Team

Page 36: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

36 SANS Threat Hunting & IR Summit 2018

Threat Hunting

Case Study

Page 37: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

37 SANS Threat Hunting & IR Summit 2018

Case Study #1 – Malicious email notification from employee

Sandbox email scanner didn’t detect spear phishing

email.

Employee felt malicious email, and then notified

security operation team of its.

Threat research and malware analysis team jointly

analyzed it, and recognized possible targeted attack.

Let’s start hunting!

Page 38: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

38 SANS Threat Hunting & IR Summit 2018

Case Study #1 – Process Overview

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT ManagerPossible targeted

attack via email ???

No alert, check email

delivery log

Check if employee

opened & clicked it.

Notify not to open it.

Search email delivery as

instructed

Confirmed undetected

attack

Contact employee not to

open it

Page 39: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

39 SANS Threat Hunting & IR Summit 2018

Case Study #1 – Process Overview (1)

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

Threat Research

Team

1. Collect internal

/external CTI

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Hunting

Team

Threat Hunting

Team

Possible targeted

attack via email ???

No alert, check email

delivery log

Check if employee

opened & clicked it.

Notify not to open it.

Page 40: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

40 SANS Threat Hunting & IR Summit 2018

Case Study #1 – Process Overview (2)

0. Set Objectives

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

4. Search

Threat Hunting Operation

Team

Search email delivery as

instructed

Page 41: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

41 SANS Threat Hunting & IR Summit 2018

Case Study #1 – Process Overview (3)

0. Set Objectives

4. Search

Threat

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

CSIRT Manager

5. Evaluate

Result

6. Enforce

Response Policy

Incident

Response Team

Incident

Response Team

Confirmed undetected

attack

Contact employee not to

open it

Page 42: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

42 SANS Threat Hunting & IR Summit 2018

Case Study #2 – Threat Report shows malicious indicators

Threat research team recognized APT report shows

several malicious indicators such as IP, URL, HTTP

request, file path of malware, etc.

Threat hunting team wondered if same attack

campaign has been happened to our organization

because of intended country.

There were log collections to be verified.

Let’s start hunting!

Page 43: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

43 SANS Threat Hunting & IR Summit 2018

Case Study #2 – Process Overview (part 1)

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT ManagerPossible similar APT

attack ???

Check IP, URL, and

HTTP request header

Need immediate

action because of APT

Repeatedly search every

evidence

Confirmed malicious

traffic evidence on proxy

Started a major

investigation into it.

Page 44: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

44 SANS Threat Hunting & IR Summit 2018

Case Study #2 – Process Overview (part 1) (1)

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

Threat Research

Team

1. Collect internal

/external CTI

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Hunting

Team

Threat Hunting

Team

Possible similar APT

attack ???

Check IP, URL, and

HTTP request header

Need immediate

action because of APT

Page 45: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

45 SANS Threat Hunting & IR Summit 2018

Case Study #2 – Process Overview (part 1) (2)

0. Set Objectives

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

4. Search

Threat Hunting Operation

Team

Repeatedly search every

evidence

Page 46: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

46 SANS Threat Hunting & IR Summit 2018

Case Study #2 – Process Overview (part 1) (3)

0. Set Objectives

4. Search

Threat

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

CSIRT Manager

5. Evaluate

Result

6. Enforce

Response Policy

Incident

Response Team

Incident

Response Team

Confirmed malicious

traffic evidence on proxy

Started a major

investigation into it.

Page 47: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

47 SANS Threat Hunting & IR Summit 2018

Case Study #2 – Malware samples with characteristics

After investigation, IR team identified tens of PCs

had been infected by this campaign.

Threat research team and malware analysis team

looked at past attacks and TTPs attacker used.

Threat hunting team successfully generated

extraction rule to this type of attack from samples.

Let’s start hunting, again!

Page 48: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

48 SANS Threat Hunting & IR Summit 2018

Case Study #2 – Process Overview (part 2)

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT ManagerPossible similar TTPs

used ???

Check HTTP request

with extracted pattern

Need immediate

action because of APT

Search query expressed

as specific HTTP request

Found specific traffic on

PCs undetected by

initial known indicators

Started immediate

mitigation

Page 49: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

49 SANS Threat Hunting & IR Summit 2018

Case Study #2 – Process Overview (part 2) (1)

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

Threat Research

Team

1. Collect internal

/external CTI

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Hunting

Team

Threat Hunting

Team

Possible similar TTPs

used ???

Check HTTP request

with extracted pattern

Need immediate

action because of APT

Page 50: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

50 SANS Threat Hunting & IR Summit 2018

Case Study #2 – Process Overview (part 2) (2)

0. Set Objectives

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

4. Search

Threat Hunting Operation

Team

Search query expressed

as specific HTTP request

Page 51: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

51 SANS Threat Hunting & IR Summit 2018

Case Study #2 – Process Overview (part 2) (3)

0. Set Objectives

4. Search

Threat

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

CSIRT Manager

5. Evaluate

Result

6. Enforce

Response Policy

Incident

Response Team

Incident

Response Team

Found specific traffic on

PCs undetected by

initial known indicators

Started immediate

mitigation

Page 52: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

52 SANS Threat Hunting & IR Summit 2018

Case Study #2 – Found additional infected PCs by pattern

http://www.xxx.com/{path1/path2/path3/xxx.html}?svkrfghu=VGhpcyBpcyBzYW1wbGUxLiBUaGlzIGlzIHNhbXBsZTIuIFRoa

http://www.xxx.com/{path1/path2/path3/xxx.html}?emexg=3YXMgc2FtcGxlMS4gVGhhdCB3YXMgc2FtcGxlMyFtcGxlMS4gVG

http://www.xxx.com/{path1/path2/path3/xxx.html}?eprinuf=a29yZWhhIHNhbXBsZSBkZXN1MS4hhIHNhbXBBkZXN1Mi4ga29yZW

- Host name are same, and length > 100.

- Variable are almost different each other.

- Length of parameter > x0 byte

ParameterHost nameVariable

*It’s sample of patterning.

Each value are not

original one, but replaced.

Page 53: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

53 SANS Threat Hunting & IR Summit 2018

Case Study #3 – Adware, it’s not Adware!?

Threat research team recognized that an

unauthorized modification has been found on

cleaner software, and notified it to hunting team.

Threat hunting team started looking at it within

several hours after first recognition.

Let’s start hunting!

Page 54: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

54 SANS Threat Hunting & IR Summit 2018

Case Study #3 – Process Overview (part 1)

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT ManagerPossible adware type

attack ???

Make scenario to

check IP, URL

Blocking external

traffic would be fine.

Repeatedly search

evidence on proxy log

Confirmed exact traffic

on several PCs

Started a normal

investigation actions

Page 55: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

55 SANS Threat Hunting & IR Summit 2018

Case Study #3 – Process Overview (part 1) (1)

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

Threat Research

Team

1. Collect internal

/external CTI

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Hunting

Team

Threat Hunting

Team

Possible adware type

attack ???

Make scenario to

check IP, URL

Blocking external

traffic would be fine.

Page 56: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

56 SANS Threat Hunting & IR Summit 2018

Case Study #3 – Process Overview (part 1) (2)

0. Set Objectives

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

4. Search

Threat Hunting Operation

Team

Repeatedly search

evidence on proxy log

Page 57: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

57 SANS Threat Hunting & IR Summit 2018

Case Study #3 – Process Overview (part 1) (3)

0. Set Objectives

4. Search

Threat

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

CSIRT Manager

5. Evaluate

Result

6. Enforce

Response Policy

Incident

Response Team

Incident

Response Team

Confirmed exact traffic

on several PCs

Started a normal

investigation actions

Page 58: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

58 SANS Threat Hunting & IR Summit 2018

Case Study #3 – No Adware!? Software Supply Chain Attack

A few days later, software developer notified IR team

as it’s watering hole attack and we are one of them!?

Threat research team started analyzing threat report

from the developer and looking for more information.

Threat hunting team changed response policy from

adware policy to targeted attack policy immediately.

Let’s start hunting, again, and rapidly!

Page 59: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

59 SANS Threat Hunting & IR Summit 2018

Case Study #3 – Process Overview (part 2)

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT ManagerNo, it’s targeted

attack !

Make scenario

updated with

additional indicators

Need investigation,

forensic, and response

Search evidence with

updated indicators

Confirmed additional

evidence undetected

Started deep

investigation actions

Page 60: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

60 SANS Threat Hunting & IR Summit 2018

Case Study #3 – Process Overview (part 2) (1)

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

Threat Research

Team

1. Collect internal

/external CTI

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Hunting

Team

Threat Hunting

Team

No, it’s targeted

attack !

Make scenario

updated with

additional indicators

Need investigation,

forensic, and response

Page 61: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

61 SANS Threat Hunting & IR Summit 2018

Case Study #3 – Process Overview (part 2) (2)

0. Set Objectives

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

4. Search

Threat Hunting Operation

Team

Search evidence with

updated indicators

Page 62: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

62 SANS Threat Hunting & IR Summit 2018

Case Study #3 – Process Overview (part 2) (3)

0. Set Objectives

4. Search

Threat

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

CSIRT Manager

5. Evaluate

Result

6. Enforce

Response Policy

Incident

Response Team

Incident

Response Team

Confirmed additional

evidence undetected

Started deep

investigation actions

Page 63: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

63 SANS Threat Hunting & IR Summit 2018

Lessons learned from case study

1. It’s not always have to rely on difficult hunting techniques

to identity undetected threat, but build the process.

2. It’s much worth if we can find security breach by ourselves

before being notified from outside.

3. Let's start from what we can do, and we should do what

we can do.

4. Hypothesis generation would be still difficult part for us.

Page 64: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

64 SANS Threat Hunting & IR Summit 2018

Threat Hunting

Operations

At Scale

Page 65: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

65 SANS Threat Hunting & IR Summit 2018

Threat Hunting Operations

0. Set Objectives

4. Search

Threat

5. Evaluate

Result

6. Enforce

Response Policy

3. Set

Response Policy

2. Analyze CTI &

Create Scenario

Threat Research

Team

1. Collect internal

/external CTI Threat Hunting

Team

Threat Hunting

Team

Hunting Operation

Team

Incident

Response Team

Incident

Response Team

CSIRT Manager

Page 66: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

66 SANS Threat Hunting & IR Summit 2018

Tools for Support Threat Hunting Operations

Hunting

Operation

Team

Threat

Hunting

Team

EDR / NCSPUser Inquiry

System

Log Analysis &

Dashboard

Internal CTI (Observed

& Analysis) DB

Asset, Internal System,

Directory DB

Hunting Scenario

System (STIX)

Forensic Tool Log Management

Incident

Response

Team Threat Analysis

System

Threat Intelligence

Platform (TIP)

Page 67: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

67 SANS Threat Hunting & IR Summit 2018

Threat Hunting System Architecture Overview

Threat Analysis

System

Threat Intelligence

Platform (TIP)

Hunting Scenario

System (STIX)

User Inquiry

System

Threat Research

Team

Threat Hunting

Team

Hunting Operation

TeamIncident

Response Team

Enrichment

SourceCTI Source

(External/Internal)

Training Data

Logs(Network/Mail)

Log Analysis &

Dashboard

Page 68: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

68 SANS Threat Hunting & IR Summit 2018

Threat Hunting

Operations

Framework

Page 69: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

69 SANS Threat Hunting & IR Summit 2018

Look for

uncovered threat

or ongoing threat

that evade

existing security

solutions, and

mitigate and

remediate it as

soon as possible.

Look for logic

such as signature,

detection rule to

detect uncovered

threat, and apply

to existing

security solutions

to close detection

gaps.

Close attack

surface as part of

hardening

activities to

enhance current

security posture

together with Red

team.

Values of Hunting Operations

1 2 3

Page 70: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

70 SANS Threat Hunting & IR Summit 2018

Threat Hunting Operations Framework

Hunting

Operations

Hunting

Procedures

Process 1 Process 2 Process 3 Process 4 Process 5

1

Value 1

2

Value 2

3

Value 3

Create

Scenario

Hunting Team’s

Objective Statement

Evaluate

Result

Enforce

Policy

Search

Threat

Set

Policy

Collect

CTI

Process 6

Trailhead Trailblazing

Searching Clustering Grouping

Stack

Counting

Look for

uncovered

threat

Look for

detection

logic

Close attack

surface as

hardening

Page 71: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

71 SANS Threat Hunting & IR Summit 2018

KAIZEN, again

"The right process will produce the right results."

TOYOTA WAY

Page 72: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

72 SANS Threat Hunting & IR Summit 2018

Hunting Process KAIZEN Model

Level - 1

Level - 2

Level - 3

Level - 0 Ad-hoc

Define your standard hunting process

Follow your standard process at all times

Evolving your standard process at all times

3 21 3 12 2 31

2 312 312 31

2 31 21 3

Standard process

A B C

A B C

Managed

and defined

Quantitatively

managed

Optimized and

improved

Page 73: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

73 SANS Threat Hunting & IR Summit 2018

To improve productivity of hunting program

1. Define your hunting process according to objectives

where hunting team would produce the right results.

• Give priority to accomplish the process than making use

of difficult hunting techniques you cannot handle.

• Choose hunting techniques and tools which support the

hunting process.

2. Improve the process first based on KAIZEN

• Communication and KAIZEN culture are key to success.

Page 74: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

74 SANS Threat Hunting & IR Summit 2018

HMM and KAIZEN

0

INITIAL

1

MINIMAL

2

PROCEDURAL

3

INNOVATIVE

4

LEADING

HMM

KAIZEN

Level - 1DEFINE

Level - 2FOLLOW

Level - 3EVOLVE

Level - 0ADHOC

Road to productive

hunting program Hunting

program

Page 75: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

75 SANS Threat Hunting & IR Summit 2018

Conclusion

“A good hunter plays where the threat is.A great hunter plays where the threat isgoing to be.”

Page 76: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

76 SANS Threat Hunting & IR Summit 2018

Thanks to

• Naoki Sasamura (NEC-CSIRT)

• Takeo Tagami (NEC-CSIRT)

• Yoshihiro Oshibuchi (NEC)

Page 77: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays
Page 78: Launching Threat Hunting from Almost Nothing...3 SANS Threat Hunting & IR Summit 2018 My favorite quote “A good hockey player plays where the puck is. A great hockey player plays

78 SANS Threat Hunting & IR Summit 2018

References

“A Framework for Cyber Threat Hunting”https://sqrrl.com/media/Framework-for-Threat-Hunting-Whitepaper.pdf

“threat hunter (cybersecurity threat analyst)”https://searchcio.techtarget.com/definition/threat-hunter-cybersecurity-threat-analyst

“THE THREAT HUNTING REFERENCE MODEL PART 1: MEASURING HUNTING MATURITY”https://sqrrl.com/the-threat-hunting-reference-model-part-1-measuring-hunting-maturity/

“Hunt Evil - Your Practical Guide to Threat Hunting”https://sqrrl.com/media/ebook-web.pdf

“THE THREAT HUNTING REFERENCE MODEL PART 2: THE HUNTING LOOP”https://sqrrl.com/the-threat-hunting-reference-model-part-2-the-hunting-loop/

“Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan”https://www.amazon.com/Crafting-InfoSec-Playbook-

Security-Monitoring/dp/1491949406

“Hunting Update, Joe Ten Eyck”https://www.first.org/resources/papers/conf2017/Building-a-Threat-Hunting-Framework-for-the-Enterprise.pdf

“Generating Hypotheses for Successful Threat Hunting”https://www.sans.org/reading-room/whitepapers/threats/generating-hypotheses-successful-threat-hunting-37172

“Threat Hunting in Security Operation -SANS Threat Hunting Summit 2017”https://www.youtube.com/watch?v=pDY639JsT7I

“TOYOTA KAIZEN practice in management”https://www.amazon.co.jp/o/ASIN/4046019603