Player FM 앱으로 오프라인으로 전환하세요!
Getting back to basics, IR 101 - Episode 013
Manage episode 263576476 series 2681668
Recorded May 2020
TOPIC: Getting back to basics, IR 101
OUR SPONSORS:

NEWS-WORTHY:
Best EDR Security Services In 2020 for Endpoint Protection
How to Avoid Spam—Using Disposable Contact Information
Shiny new Azure login attracts shiny new phishing attacks
Upgrading from EDR to MDR is Critical but Easier than You Think
The ransomware that attacks you from inside a virtual machine
SITE-WORTHY:
Malware Archaeology - Cheat Sheets
TOOL-WORTHY:
LOG-MD - The Log anD Malicious Discovery tool
“LOG-MD -a” will give you how you compare against the cheat sheets
MALWARE OF THE MONTH:
Qakbot
Typical delivery via a Office doc or URL
Created a folder in C:\Users
Key Detection points
Enable better logging AutoRuns - Uses Run key and Scheduled Task
WMIPrvSe launch binary in C:\Users
Binary in root of \Username directory C:\Users\\.exe
C:\Users\\AppData\Roaming\Microsoft\ Syswow64\Explorer.exe used Parent of Explorer.exe is NEVER a binary in C:\Users
Process injection of Syswow64\Explorer.exe
Ping 127.0.0.1
Scheduled Task created by a binary in C:\Users
Syswow64\Explorer,exe opening all the browsers
Binary in C:\User calling out to foreign country
PREVENTION
Block Office macros
Don’t allow uncategorized websites
EDR Software
Whitelisting C:\Users
TOPIC OF THE DAY:
Getting back to basics, IR 101
What is getting back to basics - IR 101
This will likely be multiple episodes
We will start with Windows
Why is this important?
WHEN you have an incident, data we, and you need will be available
This is probably the #1 finding and recommendation we have made to organizations we have been involved with over the years
Security tools fail, so other data you collect can help discover what happened where, when, and how
What is the problem we are wanting our listeners to solve?
To be better prepared in the event of an incident to speed up investigations
Give your SOC, IT, or Security people the data they need to investigate events
Make log management data better if you are collecting all the things
And of course… help your IR Consultancy do a better job FASTER
Other Articles:
-------------------
CIS Benchmarks
DerbyCon talk on EDR
DerbyCon talk on Winnti
15 에피소드
Manage episode 263576476 series 2681668
Recorded May 2020
TOPIC: Getting back to basics, IR 101
OUR SPONSORS:

NEWS-WORTHY:
Best EDR Security Services In 2020 for Endpoint Protection
How to Avoid Spam—Using Disposable Contact Information
Shiny new Azure login attracts shiny new phishing attacks
Upgrading from EDR to MDR is Critical but Easier than You Think
The ransomware that attacks you from inside a virtual machine
SITE-WORTHY:
Malware Archaeology - Cheat Sheets
TOOL-WORTHY:
LOG-MD - The Log anD Malicious Discovery tool
“LOG-MD -a” will give you how you compare against the cheat sheets
MALWARE OF THE MONTH:
Qakbot
Typical delivery via a Office doc or URL
Created a folder in C:\Users
Key Detection points
Enable better logging AutoRuns - Uses Run key and Scheduled Task
WMIPrvSe launch binary in C:\Users
Binary in root of \Username directory C:\Users\\.exe
C:\Users\\AppData\Roaming\Microsoft\ Syswow64\Explorer.exe used Parent of Explorer.exe is NEVER a binary in C:\Users
Process injection of Syswow64\Explorer.exe
Ping 127.0.0.1
Scheduled Task created by a binary in C:\Users
Syswow64\Explorer,exe opening all the browsers
Binary in C:\User calling out to foreign country
PREVENTION
Block Office macros
Don’t allow uncategorized websites
EDR Software
Whitelisting C:\Users
TOPIC OF THE DAY:
Getting back to basics, IR 101
What is getting back to basics - IR 101
This will likely be multiple episodes
We will start with Windows
Why is this important?
WHEN you have an incident, data we, and you need will be available
This is probably the #1 finding and recommendation we have made to organizations we have been involved with over the years
Security tools fail, so other data you collect can help discover what happened where, when, and how
What is the problem we are wanting our listeners to solve?
To be better prepared in the event of an incident to speed up investigations
Give your SOC, IT, or Security people the data they need to investigate events
Make log management data better if you are collecting all the things
And of course… help your IR Consultancy do a better job FASTER
Other Articles:
-------------------
CIS Benchmarks
DerbyCon talk on EDR
DerbyCon talk on Winnti
15 에피소드
모든 에피소드
×플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.