“Cybersecurity threats have become increasingly sophisticated and diverse over the past few decades. An environment that was once populated by lone hobbyists is now shared by skilled technologists, organized criminal syndicates, and even government-sponsored attackers, all seeking to exploit the digital domain to achieve their own objectives.”

Exploring Cybersecurity Threats

Classifying Cybersecurity Threats

  • Internal vs. External
  • Level of Sophistication/Capability
    • advanced persistent threat (APT)
  • Resources/Funding
  • Intent/Motivation
The Hats Hackers Wear
  • “White Hat” Authorized attackers
  • “Black Hat” Malicious attackers
  • “Gray Hat” Semi-authorized attackers
    • “They act without proper authorization, but they do so with the intent of informing their targets of any security vulnerabilities.”
    • Fully punishable under the law, regardless of intent.
    • Does bounty hunting count as Gray or White?

Threat Actors

Exam Note

“Be certain that you understand the differences between unskilled attackers; hacktivists; organized crime; advanced persistent threats (APTs), including nation-state actors; and shadow IT.”

Unskilled Attackers

  • script kiddie is a derogatory term for unskilled attackers
    • Often rely entirely on tools/scripts downloaded from the internet.
    • denial-of-service (DoS)
  • Technical skills are no longer a barrier to attacking a network.
  • Often targets are random and hacking is done simply to prove skills.
    • Done for the LOLz

Hacktivists

  • hack to accomplish an activist goal.
    • cyber terrorism?
  • “They may even view being caught as a badge of honor and a sacrifice for their cause.”
  • Some hacktivists are cybersecurity professionals by day.
  • some are part of organized efforts
    • Anonymous
  • sometimes internal employees turn hacktivist.
    • many people consider Edward Snowden a hacktivist

Organized Crime

  • Almost entirely motivated by financial gain.
  • In their 2021 Internet Organized Crime Threat Assessment (IOCTA), the European Union Agency for Law Enforcement Cooperation (EUROPOL) found that organized crime groups were active in a variety of cybercrime categories, including the following:
    • Cyber-dependent crime
      • ransomware
    • Child sexual abuse material
    • Online fraud
      • CC fraud
    • Dark web activity
      • sale of illegal goods and services
    • Cross-cutting crime factors
      • social engineering
      • money mules

Nation-State Attackers

  • advanced persistent threats (APTs) describes a series of attacks that they first traced to sources connected to the Chinese military.”
    • Room 39
  • motive can be political or economic
    • often traditional espionage goals
Zero-Day Attacks
  • unknown security vulnerability
    • “Attacks that exploit these vulnerabilities are known as zero-day attacks.”
    • “The Stuxnet attack, traced to the U.S. and Israeli governments, exploited zero-day vulnerabilities to compromise the control networks at an Iranian uranium enrichment facility.”

Insider Threat

  • “Behavioral assessments are a powerful tool in identifying insider attacks. Cybersecurity teams should work with human resources partners to identify insiders exhibiting unusual behavior and intervene before the situation escalates.”
The Threat of Shadow IT
  • Dropbox to sync work and personal computers
    • Not malicious, actually meant to increase productivity.
  • “Cybersecurity teams should remain vigilant for shadow IT adoption and remember that the presence of shadow IT in an organization means that business needs are not being met by the enterprise IT team.”

Competitors

  • Corporate espionage in the 21st century.
    • Hackers sell stolen data from a breach.
    • Insiders sell smuggled data for revenge.
    • Some dark web markets advertise to buy confidential data.
  • “You should conduct periodic organizational threat assessments to determine what types of threat actors are most likely to target your organization, and why.”

Attacker Motivations

Primary motivations behind cyberattacks:

  • Data exfiltration
  • Espionage
  • Service disruption
  • Blackmail
  • Financial gain
  • Philosophical/political
  • Ethical/White Hat
  • Revenge
  • Disruption/chaos
  • War
Exam Note

“It is very likely you will be asked to compare and contrast the various threat actors on the exam. You should know the attributes and motivations behind each.”

Threat Vectors and Attack Surfaces

Attack Surface

  • System
  • Application
  • Service

Threat Vector

  • the means that threat actors use to obtain access.

Message-Based Threat Vectors

  1. Email
    1. Phishing
    2. Spam
    3. Email-born attacks
      1. (malware attachments?)

Also includes all other digital communication.

  • Short Message Service (SMS)
  • Instant Messaging (IM)
  • “Voice calls may also be used to conduct vishing (voice phishing) attacks”
  • Social Media more broadly
    • see Chapter 4 Social Engineering and Password Attacks

Wired Networks

  • Unprotected/monitored ethernet plugs
    • see Chapter 9 Resilience and Physical Security

Wireless Networks

  • Wireless networks are even easier.
    • Pineapple router
    • Bluetooth can also prove an attack vector
    • see Chapter 13 Wireless and Mobile Security

Systems

“The operating system configuration may expose open service ports that are not necessary to meet business needs or that allow the use of well-known default credentials that were never changed.”

  • Old software with known vulnerabilities
  • Outdated OS (Windows XP)
  • see Chapter 11 Endpoint Security

Files and Images

  • file that contains embedded malicious code

Removable Devices

  • Malicious USBs
  • see Chapter 11 Endpoint Security

Cloud

  • Accidently leaked API keys
  • see Chapter 10 Cloud and Virtualization Security

Supply Chain

  • Attacks on the IT supply chain
  • Also known to attack software
  • managed service providers (MSPs)

Threat Data and Intelligence

Threat intelligence is the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment.”

  • Can also be used for predictive analysis to predict likely risks.
    • open source intelligence (OSINT)
    • Threat Feeds
      • Common Vulnerabilities and Exposures (CVE)
      • A must have for organizations
    • Vulnerability databases
      • indicators of compromise (IoCs)

Open Source Intelligence

Cybersecurity & Infrastructure Security Agency (CISA)

Exploring the Dark Web
  • “The dark web is a network run over standard Internet connections but using multiple layers of encryption to provide anonymous communication.”
  • “The sudden appearance of credentials on dark web marketplaces likely indicates that a successful attack took place and requires further investigation.”
  • Tor browser: www.torproject.org

Proprietary and Closed-Source Intelligence

  • Closed-Source Intelligence Commercial Security Vendors
    • “Commercial closed-source intelligence is often part of a service offering, which can be a compelling resource for security professionals.”
When a Threat Feed Fails
  • “In one case, a critical Microsoft vulnerability was announced, and exploit code was available and in active use within less than 48 hours. Despite repeated queries, the vendor did not provide detection rules for over two weeks.”
  • Have multiple feeds to check against each other

Threat maps provide a geographic view of threat intelligence.”

Assessing Threat Intelligence

  • Evaluate a threat intelligence source:
    1. Is it timely?
    2. Is the information accurate?
    3. Is the information relevant?
  • Give it a confidence score
Assessing the Confidence Level of Your Intelligence
  • Threat feeds use a score range
    • Confirmed (90–100) uses independent sources or direct analysis to prove that the threat is real.
    • Probable (70–89) relies on logical inference but does not directly confirm the threat.
    • Possible (50–69) is used when some information agrees with the analysis, but the assessment is not confirmed.
    • Doubtful (30–49) is assigned when the assessment is possible but not the most likely option, or the assessment cannot be proven or disproven by the information that is available.
    • Improbable (2–29) means that the assessment is possible but is not the most logical option, or it is refuted by other information that is available.
    • Discredited (1) is used when the assessment has been confirmed to be inaccurate or incorrect.

Threat Indicator Management and Exchange

  • Structured Threat Information eXpression (STIX) is an XML language originally sponsored by the U.S. Department of Homeland Security.”
  • STIX has been handed off to the Organization for the Advancement of Structured Information Standards (OASIS)
  • Trusted Automated eXchange of Intelligence Information (TAXII)

Information Sharing Organizations

  • Information Sharing and Analysis Centers (ISACs) help infrastructure owners and operators share threat information
    • In 1998: part of Presidential Decision Directive-63 (PDD-63)

Conducting Your Own Research

  • Focus on: tactics, techniques, and procedures (TTPs)

Review Questions (17/20) 85%

Studied last night, and took this test during the afternoon without review. 85% is not great, but I think spacing out the studying and testing phases will provide a more accurate assessment of how much of the information has stuck.

Correct

2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 16, 17, 18, 19, 20

Incorrect

1, 13, 15

    1. need to review threat ratings
    1. not sure why I chose source-code over API keys.
    1. guessed RFC, likely from question 12, instead of IoC. Need to study my Acronym list/cards. Security+ Acronym List