SlideShare a Scribd company logo
ZERO-DAY VULNERABILITY FOR
CYBERSECURITY & INFRASTRUCTURE
Rifdhy RM
(Cyber Security Engineer)
Responding to a zero-day vulnerability for Cybersecurity & Infrastructure Security Agency (CISA)
Cybersecurity & Infrastructure Security Agency (CISA) has the goal of reducing the nation’s exposure
to cyber security threats and risks There are Two recent CISA advisories have been published
1. The first advisory (Log4j), outlines a serious vulnerability in one of the world’s most popular
logging software
2. The second advisory explores how ransomware has been increasing and is becoming
professionalized - a concern for a large company like AIG.
The Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of
Investigation (FBI), National Security Agency (NSA), Australian Cyber Security Centre (ACSC), and the
United Kingdom’s National Cyber Security Centre (NCSC-UK) issued a joint Cybersecurity Advisory
outlining the growing international threat posed by ransomware over the past year.
CISA, the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), the Australian
Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre (NCSC-UK)
have released a joint Cybersecurity Advisory (CSA) highlighting a global increase in sophisticated,
high-impact, ransomware incidents against critical infrastructure organizations in 2021. This CSA
provides observed behaviors and trends as well as mitigation recommendations to help network
defenders reduce their risk of compromise by ransomware.
What is a Zero-Day Exploit?
Zero-day exploit: an advanced cyber attack defined
A zero-day vulnerability, at its core, is a flaw. It is an unknown exploit in the wild that exposes a
vulnerability in software or hardware and can create complicated problems well before anyone
realizes something is wrong. In fact, a zero-day exploit leaves NO opportunity for detection ... at first.
Vulnerability timeline
A zero-day attack happens once that flaw, or software/hardware vulnerability, is exploited and
attackers release malware before a developer has an opportunity to create a patch to fix the
vulnerability—hence “zero-day.” Let’s break down the steps of the window of vulnerability:
• A company’s developers create software, but unbeknownst to them it contains a
vulnerability.
• The threat actor spots that vulnerability either before the developer does or acts on it
before the developer has a chance to fix it.
• The attacker writes and implements exploit code while the vulnerability is still open and
available
• After releasing the exploit, either the public recognizes it in the form of identity or
information theft or the developer catches it and creates a patch to staunch the cyber-
bleeding.
Once a patch is written and used, the exploit is no longer called a zero-day exploit. These attacks are
rarely discovered right away. In fact, it often takes not just days but months and sometimes years
before a developer learns of the vulnerability that led to an attack.
CVE-2021-44228 - Log4j RCE 0-day mitigation
A zero-day exploit affecting the popular Apache Log4j utility (CVE-2021-44228) was made public on
December 9, 2021 that results in remote code execution (RCE).
This vulnerability is actively being exploited and anyone using Log4j should update to version 2.15.0
as soon as possible. The latest version can already be found on the Log4j download page.
If updating to the latest version is not possible the vulnerability can be mitigated by removing the
JndiLookup class from the class path. Additionally, the issue can be mitigated on Log4j versions
>=2.10 by setting the system property log4j2.formatMsgNoLookups or
the LOG4J_FORMAT_MSG_NO_LOOKUPS environment variable to true.
Customers using the Cloudflare WAF can also leverage three newly deployed rules to help mitigate
any exploit attempts:
Rule ID Description Default Action
100514 (legacy WAF)
6b1cc72dff9746469d4695a474430f12 (new WAF)
Log4j Headers BLOCK
100515 (legacy WAF)
0c054d4e4dd5455c9ff8f01efe5abb10 (new WAF)
Log4j Body BLOCK
100516 (legacy WAF)
5f6744fa026a4638bda5b3d7d5e015dd (new WAF)
Log4j URL BLOCK
The mitigation has been split across three rules inspecting HTTP headers, body and URL respectively.
We are continuing to monitor the situation and will update any WAF managed rules accordingly.
More details on the vulnerability can be found on the official Log4j security page.
Who is affected?
Log4j is a powerful Java based logging library maintained by the Apache Software Foundation.
In all Log4j versions >= 2.0-beta9 and <= 2.14.1 JNDI features used in configuration, log messages,
and parameters can be exploited by an attacker to perform remote code execution. Specifically, an
attacker who can control log messages or log message parameters can execute arbitrary code
loaded from LDAP servers when message lookup substitution is enabled.
2021 Trends Show Increased Globalized Threat of Ransomware (Alert (AA22-040A)
Cyber security authorities in the United States, Australia, and the United Kingdom observed the
following behaviours and trends among cyber criminals in 2021:
▪ Gaining access to networks via phishing
stolen Remote Desktop Protocols (RDP) credentials or brute force, and exploiting
vulnerabilities. Phishing emails, RDP exploitation, and exploitation of software vulnerabilities
remained the top three initial infection vectors for ransomware incidents in 2021. Once a
ransomware threat actor has gained code execution on a device or network access, they can
deploy ransomware. Note: these infection vectors likely remain popular because of the
increased use of remote work and schooling starting in 2020 and continuing through 2021.
This increase expanded the remote attack surface and left network defenders struggling to
keep pace with routine software patching.
▪ Using cybercriminal services-for-hire.
The market for ransomware became increasingly “professional” in 2021, and the criminal
business model of ransomware is now well established. In addition to their increased use of
ransomware-as-a-service (RaaS), ransomware threat actors employed independent services
to negotiate payments, assist victims with making payments, and arbitrate payment disputes
between themselves and other cyber criminals. NCSC-UK observed that some ransomware
threat actors offered their victims the services of a 24/7 help center to expedite ransom
payment and restoration of encrypted systems or data.
▪ Sharing victim information
Eurasian ransomware groups have shared victim information with each other, diversifying
the threat to targeted organizations. For example, after announcing its shutdown, the
BlackMatter ransomware group transferred its existing victims to infrastructure owned by
another group, known as Lockbit 2.0. In October 2021, Conti ransomware actors began
selling access to victims’ networks, enabling follow-on attacks by other cyber threat actors.
▪ Shifting away from “big-game” hunting in the United States
• In the first half of 2021, cybersecurity authorities in the United States and Australia
observed ransomware threat actors targeting “big game” organizations—i.e., perceived
high-value organizations and/or those that provide critical services—in several high-
profile incidents. These victims included Colonial Pipeline Company, JBS Foods, and
Kaseya Limited. However, ransomware groups suffered disruptions from U.S. authorities
in mid-2021. Subsequently, the FBI observed some ransomware threat actors redirecting
ransomware efforts away from “big-game” and toward mid-sized victims to reduce
scrutiny.
• The ACSC observed ransomware continuing to target Australian organizations of all
sizes, including critical services and “big game,” throughout 2021.
• NCSC-UK observed targeting of UK organizations of all sizes throughout the year, with
some “big game” victims. Overall victims included businesses, charities, the legal
profession, and public services in the Education, Local Government, and Health Sectors.
▪ Diversifying approaches to extorting money
After encrypting victim networks, ransomware threat actors increasingly used “triple
extortion” by threatening to (1) publicly release stolen sensitive information, (2) disrupt the
victim’s internet access, and/or (3) inform the victim’s partners, shareholders, or suppliers
about the incident. The ACSC continued to observe “double extortion” incidents in which a
threat actor uses a combination of encryption and data theft to pressure victims to pay
ransom demands.
Malicious cyber actors use system and network discovery techniques for network and system
visibility and mapping. To limit an adversary’s ability to learn an organization’s enterprise
environment and to move laterally, take the following actions:
▪ Segment networks. Network segmentation can help prevent the spread of ransomware by
controlling traffic flows between—and access to—various subnetworks and by restricting
adversary lateral movement. Organizations with an international footprint should be aware
that connectivity between their overseas arms can expand their threat surface; these
organizations should implement network segmentation between international divisions
where appropriate. For example, the ACSC has observed ransomware and data theft
incidents in which Australian divisions of multinational companies were impacted by
ransomware incidents affecting assets maintained and hosted by offshore divisions (outside
their control).
▪ Implement end-to-end encryption. Deploying mutual Transport Layer Security (mTLS) can
prevent eavesdropping on communications, which, in turn, can prevent cyber threat actors
from gaining insights needed to advance a ransomware attack.
▪ Identify, detect, and investigate abnormal activity and potential traversal of the indicated
ransomware with a network-monitoring tool. To aid in detecting the ransomware, leverage
a tool that logs and reports all network traffic, including lateral movement on a network.
Endpoint detection and response tools are particularly useful for detecting lateral
connections as they have insight into unusual network connections for each host. Artificial
intelligence (AI)-enabled network intrusion detection systems (NIDS) are also able to detect
and block many anomalous behaviors associated with early stages of ransomware
deployment.
▪ Document external remote connections. Organizations should document approved
solutions for remote management and maintenance. If an unapproved solution is installed
on a workstation, the organization should investigate it immediately. These solutions have
legitimate purposes, so they will not be flagged by antivirus vendors.
Responding to Ransomware Attacks
If a ransomware incident occurs at your organization, cybersecurity authorities in the United States,
Australia, and the United Kingdom recommend organizations:
• Follow the Ransomware Response Checklist on p. 11 of the CISA-Multi-State Information
Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
• Scan backups. If possible, scan backup data with an antivirus program to check that it is free
of malware. This should be performed using an isolated, trusted system to avoid exposing
backups to potential compromise.
• Report incidents to respective cybersecurity authorities:
o U.S. organizations should report incidents immediately to the FBI at a local FBI Field
Office, CISA at us-cert.cisa.gov/report, or the U.S. Secret Service at a U.S. Secret
Service Field Office.
o Australian organizations should report incidents to the ASD’s ACSC
via cyber.gov.au or call 1300 292 371 (1300 CYBER 1).
o UK organizations should report incidents to NCSC-UK via report.ncsc.gov.uk and/or
Action Fraud, the United Kingdom’s fraud and cyber reporting centre,
via actionfraud.police.uk.
• Apply incident response best practices found in the joint Cybersecurity Advisory, Technical
Approaches to Uncovering and Remediating Malicious Activity, developed by CISA and the
cybersecurity authorities of Australia, Canada, New Zealand, and the United Kingdom.
Note: cybersecurity authorities in the United States, Australia, and the United Kingdom strongly
discourage paying a ransom to criminal actors. Criminal activity is motivated by financial gain, so
paying a ransom may embolden adversaries to target additional organizations (or re-target the same
organization) or encourage cyber criminals to engage in the distribution of ransomware. Paying the
ransom also does not guarantee that a victim’s files will be recovered. Additionally, reducing the
financial gain of ransomware threat actors will help disrupt the ransomware criminal business
model.
Additionally, NCSC-UK reminds UK organizations that paying criminals is not condoned by the UK
Government. In instances where a ransom paid, victim organizations often cease engagement with
authorities, who then lose visibility of the payments made. While it continues to prove challenging,
the NCSC-UK has supported UK Government efforts by identifying needed policy changes—including
measures about the cyber insurance industry and ransom payments—that could reduce the threat
of ransomware.
Resources
• For more information and resources on protecting against and responding to ransomware,
refer to StopRansomware.gov, a centralized, U.S. whole-of-government webpage providing
ransomware resources and alerts.
• CISA’s Ransomware Readiness Assessment is a no-cost self-assessment based on a tiered set
of practices to help organizations better assess how well they are equipped to defend and
recover from a ransomware incident.
• CISA offers a range of no-cost cyber hygiene services to help critical infrastructure
organizations assess, identify, and reduce their exposure to threats, including ransomware.
By requesting these services, organizations of any size could find ways to reduce their risk
and mitigate attack vectors.
• The U.S. Department of State’s Rewards for Justice (RFJ) program offers a reward of up to
$10 million for reports of foreign government malicious activity against U.S. critical
infrastructure. See the RFJ website for more information and how to report information
securely.
• The ACSC recommends organizations implement eight essential mitigation strategies from
the ACSC’s Strategies to Mitigate Cyber Security Incidents as a cybersecurity baseline. These
strategies, known as the “Essential Eight,” make it much harder for adversaries to
compromise systems.
• Refer to the ACSC’s practical guides on how to protect yourself against ransomware
attacks and what to do if you are held to ransom at cyber.gov.au.
• Refer to NCSC-UK’s guides on how to protect yourself against ransomware attacks and how
to respond to and recover from them at ncsc.gov.uk/ransomware/home.

More Related Content

Similar to RIFDHY RM ( Cybersecurity ).pdf

2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf
ssuserc3d7ec1
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
 
Intelligent cyber security solutions
Intelligent cyber security solutionsIntelligent cyber security solutions
Intelligent cyber security solutions
Swapnil Deshmukh
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
Roen Branham
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center
- Mark - Fullbright
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)
OllieShoresna
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
Andrea Bissoli
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
Sergio Renteria Nuñez
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
Andreanne Clarke
 
CTI Report
CTI ReportCTI Report
CTI Report
Alex Deac
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
Felipe Prado
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
- Mark - Fullbright
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
Andreas Hiller
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
Muhammad FAHAD
 
185
185185
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
Maaz Ahmed Shaikh
 
ALPHV site taken down [EN].pdf
ALPHV site taken down           [EN].pdfALPHV site taken down           [EN].pdf
ALPHV site taken down [EN].pdf
Overkill Security
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
MicroWorld Software Services Pvt Ltd
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
KalponikPrem
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Aaron ND Sawmadal
 

Similar to RIFDHY RM ( Cybersecurity ).pdf (20)

2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Intelligent cyber security solutions
Intelligent cyber security solutionsIntelligent cyber security solutions
Intelligent cyber security solutions
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
CTI Report
CTI ReportCTI Report
CTI Report
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
185
185185
185
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
ALPHV site taken down [EN].pdf
ALPHV site taken down           [EN].pdfALPHV site taken down           [EN].pdf
ALPHV site taken down [EN].pdf
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 

Recently uploaded

Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

RIFDHY RM ( Cybersecurity ).pdf

  • 1. ZERO-DAY VULNERABILITY FOR CYBERSECURITY & INFRASTRUCTURE Rifdhy RM (Cyber Security Engineer)
  • 2. Responding to a zero-day vulnerability for Cybersecurity & Infrastructure Security Agency (CISA) Cybersecurity & Infrastructure Security Agency (CISA) has the goal of reducing the nation’s exposure to cyber security threats and risks There are Two recent CISA advisories have been published 1. The first advisory (Log4j), outlines a serious vulnerability in one of the world’s most popular logging software 2. The second advisory explores how ransomware has been increasing and is becoming professionalized - a concern for a large company like AIG. The Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI), National Security Agency (NSA), Australian Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre (NCSC-UK) issued a joint Cybersecurity Advisory outlining the growing international threat posed by ransomware over the past year. CISA, the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre (NCSC-UK) have released a joint Cybersecurity Advisory (CSA) highlighting a global increase in sophisticated, high-impact, ransomware incidents against critical infrastructure organizations in 2021. This CSA provides observed behaviors and trends as well as mitigation recommendations to help network defenders reduce their risk of compromise by ransomware. What is a Zero-Day Exploit? Zero-day exploit: an advanced cyber attack defined A zero-day vulnerability, at its core, is a flaw. It is an unknown exploit in the wild that exposes a vulnerability in software or hardware and can create complicated problems well before anyone realizes something is wrong. In fact, a zero-day exploit leaves NO opportunity for detection ... at first. Vulnerability timeline A zero-day attack happens once that flaw, or software/hardware vulnerability, is exploited and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability—hence “zero-day.” Let’s break down the steps of the window of vulnerability: • A company’s developers create software, but unbeknownst to them it contains a vulnerability. • The threat actor spots that vulnerability either before the developer does or acts on it before the developer has a chance to fix it. • The attacker writes and implements exploit code while the vulnerability is still open and available • After releasing the exploit, either the public recognizes it in the form of identity or information theft or the developer catches it and creates a patch to staunch the cyber- bleeding. Once a patch is written and used, the exploit is no longer called a zero-day exploit. These attacks are rarely discovered right away. In fact, it often takes not just days but months and sometimes years before a developer learns of the vulnerability that led to an attack.
  • 3. CVE-2021-44228 - Log4j RCE 0-day mitigation A zero-day exploit affecting the popular Apache Log4j utility (CVE-2021-44228) was made public on December 9, 2021 that results in remote code execution (RCE). This vulnerability is actively being exploited and anyone using Log4j should update to version 2.15.0 as soon as possible. The latest version can already be found on the Log4j download page. If updating to the latest version is not possible the vulnerability can be mitigated by removing the JndiLookup class from the class path. Additionally, the issue can be mitigated on Log4j versions >=2.10 by setting the system property log4j2.formatMsgNoLookups or the LOG4J_FORMAT_MSG_NO_LOOKUPS environment variable to true. Customers using the Cloudflare WAF can also leverage three newly deployed rules to help mitigate any exploit attempts: Rule ID Description Default Action 100514 (legacy WAF) 6b1cc72dff9746469d4695a474430f12 (new WAF) Log4j Headers BLOCK 100515 (legacy WAF) 0c054d4e4dd5455c9ff8f01efe5abb10 (new WAF) Log4j Body BLOCK 100516 (legacy WAF) 5f6744fa026a4638bda5b3d7d5e015dd (new WAF) Log4j URL BLOCK The mitigation has been split across three rules inspecting HTTP headers, body and URL respectively. We are continuing to monitor the situation and will update any WAF managed rules accordingly. More details on the vulnerability can be found on the official Log4j security page. Who is affected? Log4j is a powerful Java based logging library maintained by the Apache Software Foundation. In all Log4j versions >= 2.0-beta9 and <= 2.14.1 JNDI features used in configuration, log messages, and parameters can be exploited by an attacker to perform remote code execution. Specifically, an attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.
  • 4. 2021 Trends Show Increased Globalized Threat of Ransomware (Alert (AA22-040A) Cyber security authorities in the United States, Australia, and the United Kingdom observed the following behaviours and trends among cyber criminals in 2021: ▪ Gaining access to networks via phishing stolen Remote Desktop Protocols (RDP) credentials or brute force, and exploiting vulnerabilities. Phishing emails, RDP exploitation, and exploitation of software vulnerabilities remained the top three initial infection vectors for ransomware incidents in 2021. Once a ransomware threat actor has gained code execution on a device or network access, they can deploy ransomware. Note: these infection vectors likely remain popular because of the increased use of remote work and schooling starting in 2020 and continuing through 2021. This increase expanded the remote attack surface and left network defenders struggling to keep pace with routine software patching. ▪ Using cybercriminal services-for-hire. The market for ransomware became increasingly “professional” in 2021, and the criminal business model of ransomware is now well established. In addition to their increased use of ransomware-as-a-service (RaaS), ransomware threat actors employed independent services to negotiate payments, assist victims with making payments, and arbitrate payment disputes between themselves and other cyber criminals. NCSC-UK observed that some ransomware threat actors offered their victims the services of a 24/7 help center to expedite ransom payment and restoration of encrypted systems or data. ▪ Sharing victim information Eurasian ransomware groups have shared victim information with each other, diversifying the threat to targeted organizations. For example, after announcing its shutdown, the BlackMatter ransomware group transferred its existing victims to infrastructure owned by another group, known as Lockbit 2.0. In October 2021, Conti ransomware actors began selling access to victims’ networks, enabling follow-on attacks by other cyber threat actors. ▪ Shifting away from “big-game” hunting in the United States • In the first half of 2021, cybersecurity authorities in the United States and Australia observed ransomware threat actors targeting “big game” organizations—i.e., perceived high-value organizations and/or those that provide critical services—in several high- profile incidents. These victims included Colonial Pipeline Company, JBS Foods, and Kaseya Limited. However, ransomware groups suffered disruptions from U.S. authorities in mid-2021. Subsequently, the FBI observed some ransomware threat actors redirecting ransomware efforts away from “big-game” and toward mid-sized victims to reduce scrutiny. • The ACSC observed ransomware continuing to target Australian organizations of all sizes, including critical services and “big game,” throughout 2021. • NCSC-UK observed targeting of UK organizations of all sizes throughout the year, with some “big game” victims. Overall victims included businesses, charities, the legal profession, and public services in the Education, Local Government, and Health Sectors.
  • 5. ▪ Diversifying approaches to extorting money After encrypting victim networks, ransomware threat actors increasingly used “triple extortion” by threatening to (1) publicly release stolen sensitive information, (2) disrupt the victim’s internet access, and/or (3) inform the victim’s partners, shareholders, or suppliers about the incident. The ACSC continued to observe “double extortion” incidents in which a threat actor uses a combination of encryption and data theft to pressure victims to pay ransom demands. Malicious cyber actors use system and network discovery techniques for network and system visibility and mapping. To limit an adversary’s ability to learn an organization’s enterprise environment and to move laterally, take the following actions: ▪ Segment networks. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement. Organizations with an international footprint should be aware that connectivity between their overseas arms can expand their threat surface; these organizations should implement network segmentation between international divisions where appropriate. For example, the ACSC has observed ransomware and data theft incidents in which Australian divisions of multinational companies were impacted by ransomware incidents affecting assets maintained and hosted by offshore divisions (outside their control). ▪ Implement end-to-end encryption. Deploying mutual Transport Layer Security (mTLS) can prevent eavesdropping on communications, which, in turn, can prevent cyber threat actors from gaining insights needed to advance a ransomware attack. ▪ Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a network-monitoring tool. To aid in detecting the ransomware, leverage a tool that logs and reports all network traffic, including lateral movement on a network. Endpoint detection and response tools are particularly useful for detecting lateral connections as they have insight into unusual network connections for each host. Artificial intelligence (AI)-enabled network intrusion detection systems (NIDS) are also able to detect and block many anomalous behaviors associated with early stages of ransomware deployment. ▪ Document external remote connections. Organizations should document approved solutions for remote management and maintenance. If an unapproved solution is installed on a workstation, the organization should investigate it immediately. These solutions have legitimate purposes, so they will not be flagged by antivirus vendors. Responding to Ransomware Attacks If a ransomware incident occurs at your organization, cybersecurity authorities in the United States, Australia, and the United Kingdom recommend organizations: • Follow the Ransomware Response Checklist on p. 11 of the CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
  • 6. • Scan backups. If possible, scan backup data with an antivirus program to check that it is free of malware. This should be performed using an isolated, trusted system to avoid exposing backups to potential compromise. • Report incidents to respective cybersecurity authorities: o U.S. organizations should report incidents immediately to the FBI at a local FBI Field Office, CISA at us-cert.cisa.gov/report, or the U.S. Secret Service at a U.S. Secret Service Field Office. o Australian organizations should report incidents to the ASD’s ACSC via cyber.gov.au or call 1300 292 371 (1300 CYBER 1). o UK organizations should report incidents to NCSC-UK via report.ncsc.gov.uk and/or Action Fraud, the United Kingdom’s fraud and cyber reporting centre, via actionfraud.police.uk. • Apply incident response best practices found in the joint Cybersecurity Advisory, Technical Approaches to Uncovering and Remediating Malicious Activity, developed by CISA and the cybersecurity authorities of Australia, Canada, New Zealand, and the United Kingdom. Note: cybersecurity authorities in the United States, Australia, and the United Kingdom strongly discourage paying a ransom to criminal actors. Criminal activity is motivated by financial gain, so paying a ransom may embolden adversaries to target additional organizations (or re-target the same organization) or encourage cyber criminals to engage in the distribution of ransomware. Paying the ransom also does not guarantee that a victim’s files will be recovered. Additionally, reducing the financial gain of ransomware threat actors will help disrupt the ransomware criminal business model. Additionally, NCSC-UK reminds UK organizations that paying criminals is not condoned by the UK Government. In instances where a ransom paid, victim organizations often cease engagement with authorities, who then lose visibility of the payments made. While it continues to prove challenging, the NCSC-UK has supported UK Government efforts by identifying needed policy changes—including measures about the cyber insurance industry and ransom payments—that could reduce the threat of ransomware. Resources • For more information and resources on protecting against and responding to ransomware, refer to StopRansomware.gov, a centralized, U.S. whole-of-government webpage providing ransomware resources and alerts. • CISA’s Ransomware Readiness Assessment is a no-cost self-assessment based on a tiered set of practices to help organizations better assess how well they are equipped to defend and recover from a ransomware incident. • CISA offers a range of no-cost cyber hygiene services to help critical infrastructure organizations assess, identify, and reduce their exposure to threats, including ransomware. By requesting these services, organizations of any size could find ways to reduce their risk and mitigate attack vectors. • The U.S. Department of State’s Rewards for Justice (RFJ) program offers a reward of up to $10 million for reports of foreign government malicious activity against U.S. critical infrastructure. See the RFJ website for more information and how to report information securely. • The ACSC recommends organizations implement eight essential mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents as a cybersecurity baseline. These
  • 7. strategies, known as the “Essential Eight,” make it much harder for adversaries to compromise systems. • Refer to the ACSC’s practical guides on how to protect yourself against ransomware attacks and what to do if you are held to ransom at cyber.gov.au. • Refer to NCSC-UK’s guides on how to protect yourself against ransomware attacks and how to respond to and recover from them at ncsc.gov.uk/ransomware/home.