SlideShare a Scribd company logo
Preparation Identification Containment
Objective: Establish contacts, define
procedures, and gather information to save
time during an attack.
Contacts
■■ Identify internal contacts (security team,
incident response team, legal department etc.)
■■ Identify external contacts who might be
needed, mainly for investigation purposes like
Law Enforcement.
■■ Make sure that security incident escalation
process is defined and the actors are clearly
defined.
■■ Be sure to have intelligence gathering
capabilities (communities, contact, etc.) that
might be involved in such incidents.
Awareness
■■ Make sure that all the relevant employees are
aware of blackmail issues. This can be part of
the security awareness program.
Verify backup and incident response process is in
place and up to date.
Objective: Detect the incident, determine its
scope, and involve the appropriate parties.
■■ Alert relevant people
■■ Keep traces of any communications related to
the incident (don’t send emails to trash; write
down any phone contact with phone number
and timestamp if available, fax, etc.)
Try to get as much details as you can about
the author (name, fax, postal address, etc.)
■■ Examine possible courses of actions with your
incident response team and legal team.
■■ If internal data is concerned, check you have a
safe backup of it and try to find out how it was
gathered.
■■ Include top management to inform them that
blackmail is happening and is being handled
according to a defined process.
11 22
Objective: Mitigate the attack’s effects on the
targeted environment.
Determine how you can answer to the blackmail and the
consequences and costs of ignoring, answering yes or
no.
Most common threats tied with blackmail are:
■■ Denial of service
■■ Reveal sensitive data on Internet (credit card or
other personal data from customers or internal
worker/director, confidential company data, etc.)
■■ Reveal sensitive private information about
employees/VIPs
■■ Block your data access (wiped or encrypted
through ransomware for example [1])
■■ Mass-mailing using the brand (spam, child
pornography [2], bad rumours, etc.)
Check the background
 Check if similar blackmailing attempts have taken
place in the past. Check if other companies have been
threatened as well.
 All related technical data should be checked carefully
and collected for investigation purposes;
 Search if anyone would have any interest into
threatening your company
- Competitors
- Ideologically-motivated groups
- Former or current employees
 Try to identify the attacker with the available pieces
of information.
 More generally, try to find how the attacker got into
the system or got the object of the blackmail.
[1] http://en.wikipedia.org/wiki/Ransomware_(malware)
[2] Betting websites blackmailed with child pornography, 27/10/2004
http://software.silicon.com/malware/0,3800003100,39125346,00.htm
33
Containment
Remediation
Recovery
Aftermath
Incident Response Methodology
IRM #8
Blackmail
Guidelines to handle blackmail attempt
___________________________________________________
IRM Author: CERT SG / Julien Touche
IRM version: 1.3
E-Mail: cert.sg@socgen.com
Web: https://cert.societegenerale.com
Twitter: @CertSG
Abstract
Incident handling steps
Contact local law enforcement to inform them.
Try to gain time and details from fraudster. Ask:
■■ Proof of what he said: example data,
intrusion proof, etc.
■■ Time to get what fraudster wants
(money, etc.)
Objective: Take actions to remove the threat
and avoid future incidents.
If a flaw has been identified on a technical asset or
a process allowing the attacker to get access to the
object of the blackmail, ask for IMMEDIATE fix in
order to prevent another case.
■■ After getting as much information as possible,
ignore the blackmail and ensure appropriate
watch is in place to detect and react
accordingly on any new follow-ups.
■■ Don’t take any remediation decision alone if
strategic assets or human people are targeted.
Involve appropriate departments
Remember that a positive answer to the
fraudster is an open door for further
blackmails.
Objective: Restore the system to normal
operations.
Notify the top management of the actions and the
decision taken on the blackmail issue.
Objective: Document the incident’s details,
discuss lessons learned, and adjust plans and
defences.
If you don’t want to file a complaint, at least notify
Law Enforcement as other organizations could be
affected. At the same time, inform hierarchy and
subsidiaries to have a unique position in case the
fraudster tries to blackmail another internal
department.
Report
An incident report should be written and made
available to all of the actors of the incident.
The following themes should be described:
■■ Initial detection
■■ Actions and timelines
■■ What went right
■■ What went wrong
■■ Incident cost
Capitalize
Actions to improve the blackmail handling
processes should be defined to capitalize on this
experience.
This Incident Response Methodology is a cheat sheet dedicated
to incident handlers investigating a precise security issue.
Who should use IRM sheets?
 Administrators
 Security Operation Center
 CISOs and deputies
 CERTs (Computer Emergency Response Team)
Remember: If you face an incident, follow IRM, take notes
and do not panic. Contact your CERT immediately if
needed.
6 steps are defined to handle security Incidents
 Preparation: get ready to handle the incident
 Identification: detect the incident
 Containment: limit the impact of the incident
 Remediation: remove the threat
 Recovery: recover to a normal stage
 Aftermath: draw up and improve the process
IRM provides detailed information for each step.
This document is for public use
33
44
55
66

More Related Content

Similar to Irm 8-blackmail

Irm 12-insiderabuse
Irm 12-insiderabuseIrm 12-insiderabuse
Irm 12-insiderabuse
Kasper de Waard
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
Cybersecurity Crisis Management Introduction
Cybersecurity Crisis Management IntroductionCybersecurity Crisis Management Introduction
Cybersecurity Crisis Management Introduction
Naor Penso
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
Piyush Jain
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
Mekhi Da ‘Quay Daniels
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
Veronica Pereira
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
Irm 10-social engineering
Irm 10-social engineeringIrm 10-social engineering
Irm 10-social engineering
Kasper de Waard
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
abhichowdary16
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
ahmad abdelhafeez
 
Irm 14-scam
Irm 14-scamIrm 14-scam
Irm 14-scam
Kasper de Waard
 
Practical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdfPractical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdf
Chris Galvan
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
Murray Security Services
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
Case IQ
 
GlobalCollect Data Breach Factsheet
GlobalCollect Data Breach FactsheetGlobalCollect Data Breach Factsheet
GlobalCollect Data Breach Factsheet
Ingenico ePayments
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
Brian Pichman
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
cejobelle
 
Incident Mgmt Nov 08
Incident Mgmt Nov 08Incident Mgmt Nov 08
Incident Mgmt Nov 08
empower
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Marlabs
 
insider threat research
insider threat researchinsider threat research
insider threat research
Asma Al-maskaria
 

Similar to Irm 8-blackmail (20)

Irm 12-insiderabuse
Irm 12-insiderabuseIrm 12-insiderabuse
Irm 12-insiderabuse
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Cybersecurity Crisis Management Introduction
Cybersecurity Crisis Management IntroductionCybersecurity Crisis Management Introduction
Cybersecurity Crisis Management Introduction
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Irm 10-social engineering
Irm 10-social engineeringIrm 10-social engineering
Irm 10-social engineering
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Irm 14-scam
Irm 14-scamIrm 14-scam
Irm 14-scam
 
Practical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdfPractical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdf
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
GlobalCollect Data Breach Factsheet
GlobalCollect Data Breach FactsheetGlobalCollect Data Breach Factsheet
GlobalCollect Data Breach Factsheet
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 
Incident Mgmt Nov 08
Incident Mgmt Nov 08Incident Mgmt Nov 08
Incident Mgmt Nov 08
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
insider threat research
insider threat researchinsider threat research
insider threat research
 

More from Kasper de Waard

Cheatsheet: Netcat
Cheatsheet: NetcatCheatsheet: Netcat
Cheatsheet: Netcat
Kasper de Waard
 
Cheatsheet: Metasploit
Cheatsheet: MetasploitCheatsheet: Metasploit
Cheatsheet: Metasploit
Kasper de Waard
 
Cheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regexCheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regex
Kasper de Waard
 
Cheatsheet: Google Search
Cheatsheet: Google SearchCheatsheet: Google Search
Cheatsheet: Google Search
Kasper de Waard
 
Irm 15-trademark infringement
Irm 15-trademark infringementIrm 15-trademark infringement
Irm 15-trademark infringement
Kasper de Waard
 
Irm 13-phishing
Irm 13-phishingIrm 13-phishing
Irm 13-phishing
Kasper de Waard
 
Irm 6-website-defacement
Irm 6-website-defacementIrm 6-website-defacement
Irm 6-website-defacement
Kasper de Waard
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
Kasper de Waard
 
Irm 4-ddos
Irm 4-ddosIrm 4-ddos
Irm 4-ddos
Kasper de Waard
 

More from Kasper de Waard (9)

Cheatsheet: Netcat
Cheatsheet: NetcatCheatsheet: Netcat
Cheatsheet: Netcat
 
Cheatsheet: Metasploit
Cheatsheet: MetasploitCheatsheet: Metasploit
Cheatsheet: Metasploit
 
Cheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regexCheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regex
 
Cheatsheet: Google Search
Cheatsheet: Google SearchCheatsheet: Google Search
Cheatsheet: Google Search
 
Irm 15-trademark infringement
Irm 15-trademark infringementIrm 15-trademark infringement
Irm 15-trademark infringement
 
Irm 13-phishing
Irm 13-phishingIrm 13-phishing
Irm 13-phishing
 
Irm 6-website-defacement
Irm 6-website-defacementIrm 6-website-defacement
Irm 6-website-defacement
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
 
Irm 4-ddos
Irm 4-ddosIrm 4-ddos
Irm 4-ddos
 

Recently uploaded

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 

Recently uploaded (16)

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 

Irm 8-blackmail

  • 1. Preparation Identification Containment Objective: Establish contacts, define procedures, and gather information to save time during an attack. Contacts ■■ Identify internal contacts (security team, incident response team, legal department etc.) ■■ Identify external contacts who might be needed, mainly for investigation purposes like Law Enforcement. ■■ Make sure that security incident escalation process is defined and the actors are clearly defined. ■■ Be sure to have intelligence gathering capabilities (communities, contact, etc.) that might be involved in such incidents. Awareness ■■ Make sure that all the relevant employees are aware of blackmail issues. This can be part of the security awareness program. Verify backup and incident response process is in place and up to date. Objective: Detect the incident, determine its scope, and involve the appropriate parties. ■■ Alert relevant people ■■ Keep traces of any communications related to the incident (don’t send emails to trash; write down any phone contact with phone number and timestamp if available, fax, etc.) Try to get as much details as you can about the author (name, fax, postal address, etc.) ■■ Examine possible courses of actions with your incident response team and legal team. ■■ If internal data is concerned, check you have a safe backup of it and try to find out how it was gathered. ■■ Include top management to inform them that blackmail is happening and is being handled according to a defined process. 11 22 Objective: Mitigate the attack’s effects on the targeted environment. Determine how you can answer to the blackmail and the consequences and costs of ignoring, answering yes or no. Most common threats tied with blackmail are: ■■ Denial of service ■■ Reveal sensitive data on Internet (credit card or other personal data from customers or internal worker/director, confidential company data, etc.) ■■ Reveal sensitive private information about employees/VIPs ■■ Block your data access (wiped or encrypted through ransomware for example [1]) ■■ Mass-mailing using the brand (spam, child pornography [2], bad rumours, etc.) Check the background  Check if similar blackmailing attempts have taken place in the past. Check if other companies have been threatened as well.  All related technical data should be checked carefully and collected for investigation purposes;  Search if anyone would have any interest into threatening your company - Competitors - Ideologically-motivated groups - Former or current employees  Try to identify the attacker with the available pieces of information.  More generally, try to find how the attacker got into the system or got the object of the blackmail. [1] http://en.wikipedia.org/wiki/Ransomware_(malware) [2] Betting websites blackmailed with child pornography, 27/10/2004 http://software.silicon.com/malware/0,3800003100,39125346,00.htm 33
  • 2. Containment Remediation Recovery Aftermath Incident Response Methodology IRM #8 Blackmail Guidelines to handle blackmail attempt ___________________________________________________ IRM Author: CERT SG / Julien Touche IRM version: 1.3 E-Mail: cert.sg@socgen.com Web: https://cert.societegenerale.com Twitter: @CertSG Abstract Incident handling steps Contact local law enforcement to inform them. Try to gain time and details from fraudster. Ask: ■■ Proof of what he said: example data, intrusion proof, etc. ■■ Time to get what fraudster wants (money, etc.) Objective: Take actions to remove the threat and avoid future incidents. If a flaw has been identified on a technical asset or a process allowing the attacker to get access to the object of the blackmail, ask for IMMEDIATE fix in order to prevent another case. ■■ After getting as much information as possible, ignore the blackmail and ensure appropriate watch is in place to detect and react accordingly on any new follow-ups. ■■ Don’t take any remediation decision alone if strategic assets or human people are targeted. Involve appropriate departments Remember that a positive answer to the fraudster is an open door for further blackmails. Objective: Restore the system to normal operations. Notify the top management of the actions and the decision taken on the blackmail issue. Objective: Document the incident’s details, discuss lessons learned, and adjust plans and defences. If you don’t want to file a complaint, at least notify Law Enforcement as other organizations could be affected. At the same time, inform hierarchy and subsidiaries to have a unique position in case the fraudster tries to blackmail another internal department. Report An incident report should be written and made available to all of the actors of the incident. The following themes should be described: ■■ Initial detection ■■ Actions and timelines ■■ What went right ■■ What went wrong ■■ Incident cost Capitalize Actions to improve the blackmail handling processes should be defined to capitalize on this experience. This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a precise security issue. Who should use IRM sheets?  Administrators  Security Operation Center  CISOs and deputies  CERTs (Computer Emergency Response Team) Remember: If you face an incident, follow IRM, take notes and do not panic. Contact your CERT immediately if needed. 6 steps are defined to handle security Incidents  Preparation: get ready to handle the incident  Identification: detect the incident  Containment: limit the impact of the incident  Remediation: remove the threat  Recovery: recover to a normal stage  Aftermath: draw up and improve the process IRM provides detailed information for each step. This document is for public use 33 44 55 66