Cyber Operations Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

password hash

# mathematically generated for a persons password, reverse hash by guessing password and seeing if any numbers match

Lee's Sliding Scale of Cybersecurity

1. Architecture 2. Passive Defense 3. Active Defense 4. Intelligence 5. Offense

Basic states of Data

1. Data at rest 2. Data in motion 3. Data in use

Buchanon Intrustion Model

1. Target Reconnaissance 2. Development 3. Authorization 4. (Initial) Entry 5. Establishing C2 6. Internal Reconnaissance and Pivoting 7. Action on Objective 8. Confirmation

Monte's Life Cycle of an Operation

1. Targeting 2. Initial Access 3. Persistence** 4. Expansion 5. Exfiltration 6. Detection**

Backdoor

A backdoor or implant is a piece of software, hardware, or modification to an existing piece of software or hardware that enables the Attacker to circumvent security Ensures future access without hassle of initial entry

Vulnerabilities

A flaw in a system or software system

zero-day exploit

A vulnerability that is exploited before the software creator/vendor is even aware of its existence. Once known, you have "zero days" to patch it Rare but powerful

Scope

Ability to go broad, potentially hit targets in the thousands

Scale

Ability to go deep, steal valuable secrets and gain econ/political advantages or cause deep damage

Computer Network Defense (CND)

Actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within information systems and computer networks.

Computer Network Attack (CNA)

Actions taken using computer networks to disrupt, deny, degrade or destroy information resident in computers and computer networks or the computers and networks themselves. EX: DDOS, Wiper, Ransomware

5 Categories of CND/Lee's Sliding Scale of Cybersecurity

Architecture Passive Defense Active Defense Intelligence Offense

Shaping

Change the state of play, stealing deck or opponents card

Intelligence (CND)

Collecting data, exploiting it into information, and producing intelligence

CIA Triad

Confidentiality, Integrity, Availability What harms can occur

Example of CNA

DDOS, wiper, ransomware

Data in motion (or in transit)

Data crossing or temporarily resident in a network. Sitting in computer to be read, updated, or processed.

Data at rest

Data stored on a device or backup medium. This data is not currently being transmitted across a network or actively being read or processed

Data in use

Data undergoing analysis, change, or other manipulation. Being processed by 1 or more applications rather than stored passively on a hard drive or external storage media.

Wiper

Definition/Description: Wiper was a 2012 cyber operation named after the wiper malware that targeted Iran's oil and natural gas sector and was attributed (by some, given similarities to Stuxnet) to the US and potentially even Israel, despite an inability by private cybersecurity firms to discover robust examples of its code in targeted systems. Example of this Identification/What is this identification an example of: The operation is a classic example of a wiper attack, which typically attacks a target network by erasing or overwriting the master boot record, files and folders, and backups. In so doing, Wiper also destroyed most traces of its own code in the targeted systems. Significance: Wiper was significant in that it (likely unintentionally) revealed the existence of another operation, Flame, which had been previously undiscovered in these same systems and was later attributed to the same actor(s).

Availability

Denying access to data or systems (attack) 2007 Russian DDOS attacks against Estonia

DCS

Distributed Control System provides human operators with the ability to remotely monitor and control an industrial process. computerized control system consisting of computers, software applications and controllers

Stuxnet

EX: CNA, someone (US and Israel) used this program to directly target and degrade the Iranian nuclear facility at Natanz by making centrifuges self-destruct. Definition: A piece of malware directly targeted to the Iranian nuclear facility at Natanz, malware speeds up, then slows down centrifuges to self-destruct while playing back a "business as usual" message. Significance:

Microsoft Exchange

EX: CNE Definition: Attack perpetrated by China through a zero-days vulnerability in Microsoft's system, when it was clear that Microsoft may be patching, smash and grab, use of ransomware Significance: Smash and grab when clear Microsoft is patching; debate over timing of announcing a patch

Equation Group

EX: CNE Definition: One of most sophisticated cyber espionage organizations, infect 500 systems in 42 countries, may be NSA tailored access organization Significance: Malware they install can self-destruct, affiliated with Stuxnet, may be predecessor

Slingshot

EX: CNE program Definition: Cyber espionage with operations across Africa and ME, 6 years of access Significance: Attacked through routers, very unusual

APT 10

EX: CNE, as data was stolen from clients once MSP were infiltrated Definition: Enter through managed service providers, choose victim from customer list, extract data; Target US, Europe, Japan Significance: Display of risk posed by 3rd party partnerships, Use of "supply chain" as an avenue to hack as governments get better at security

Flame

EX: CNE, connecting groups through TTP, as early Stuxnet had a flame module in it, so likely came from same source Definition: Cyber espionage software deployed against Iran Significance: With ability to forge Microsoft signing certificate and turning an infected computer into a Microsoft update server, able to infect network without ever compromising a password; Flame was outed by Wiper, so whoever did so have choices to make

APT 1

EX: CNE, shaping, use of spearphishing to gain initial access Definition: Multi year, enterprise scale computer espionage by China. Stole from 141 companies in 20 industries. Significance: 1st time a private company exposed a state hacking operation, speed and momentum denote significance of APT 1.

SolarWinds

EX: CNE, within bounds of acceptability as it was highly targeted, disabled other backdoors Definition: Russian group 1st discovered in 2020, accessed many systems, chose to pursue access to narrow number of solarwinds systems, targeted DoE. Put backdoor into critical infrastructure across US. Significance: Scale of hack, number of systems targeted, sophistication of what's used, length undetected

Operation Ababil

EX: DDOS attack Definition: Target NYSE, B of A, Chase with flood of internet traffic. Significance: Not quiet, loud protest to innocence of Muslims video

Estonia 2007

EX: DDOS attack, signaling Definition: 4 wave DDOS attacks against Estonia to prevent the movement of a statue from Tallinn to outskirts. 1. DDOS on govt. websites, DNS systems 2. DDOS govt. websites 3. DDOS on govt. websites, financial industry 4. Govt. websites, banks Significance: Attempt by Russia to signal capability, compel Estonia to keep statue/force resignation of government. Signaling didn't work, didn't impose severe econ cost, did get Estonia increased NATO support and center for excellence in cybersecurity; Existence of strong Estonian cybersecurity community made consequences of attacks mild; if Russia had been successful, creates illusion it can limit Estonia FP

Sands Casino

EX: Signaling, signals full of sound and fury; wiper attack, got into small casino in PA to get into wider Adelson system Definition: Wiper attack by Iran against Sheldon Adelson Casino network Significance: $40 million in damage, one of most significant cyber attacks; hacking as a means to attack Sheldon Adelson without escalating to level of armed conflict; failed signaling as Iran denied responsibility, spent capability as soon as it was gained

Sony

EX: Use of spearphishing for initial access. Definition: Hacking attempt by DPRK to compel Sony to change mind on "The Interview". Attack master boot record, wiper, overwrote files of value Significance: Perfect op for signaling in Cyber OP--1. motivation to compel Sony to cancel 2. Clear communication by DPRK 3. Ability to do real harm to Sony 4. Credible ability to further raise harm 5. Film wasn't as important to Sony as it was to DPRK

Shamoon

EX: wiper attack overcoming MBR, initial entry with spear-phishing, persistence in copying self over all of ARAMCO's servers Definition: August 2012 Iranian attack on ARAMCO Significance: Loud and disruptive attack, not Stuxnet or Wiper

Computer Network Exploitation (CNE)

Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks.

DDOS attacks

Floods bandwidth or resources of targeted system

Confidentiality

Gaining access to data that was supposed to be private (espionage) APT1

HMI

Human Machine Interface How you interact with SCADA

Targeting (Monte)

ID of the target network and IDing the attack stretegics and tactics necessary to exploit that network

IT/OT Difference

IT manages data, OT manages world IT security driven by CIA

Expansion (Monte)

Increasing access to a target network. Done to establish more robust level of persistence or locate and access wanted data.

ICS

Infrastructure control systems Part of OT Built specifically for industry, control operated processes, circuit breakers SCADA, DCS, HMI all fall into this

Establishing Command and Control (C2) (Buchanon)

Intruders (usually) need to be able to control their code once it is on the target network

(Initial) Entry (Buchanon)

Intruders have to get access to systems belonging to the target

Development (Buchanon)

Intruders must develop programs and infrastructure to enable an intrusion

Target reconnaissance (Buchanon)

Intruders must find our "where" the target is located and "what" the target is, technically

Payload Delivery (action on objective) (Buchanon)

Intruders need ot do what they came to do: destroying something, stealing data, altering something

Internal Reconnaissance and Pivoting (Buchanon)

Intruders need to figure out what they have gained access to as well as where they need to go and how they get there Map overall network

Confirmation (Buchanon)

Intruders need to verify attack was successful

Moonlight Maze

Large, wide hacking attempt against DOD, Govt. Public in 1999, since 1996 Primary target was military technical info Highlighted IT as part of revolution in military affairs, weakness of US IT

Offense (CND)

Legal countermeasures and self-defense action against an adversary

virus

Malicious program that can infect other programs, carry out mission, self-replicate

Integrity

Manipulating data or systems (attack) Stuxnet

PRISM

NSA program for collection, can conduct surveillance (forward looking) and stored communications collection (backward looking). Collaborate with private US companies Daily contributor to PDB, about 500 reports in one week

Dilemma of interpretation

Once presence discovered in my network, how do I interpret it? Is it state prepping for an attack, or conducting espionage? OPE or espionage?

Dilemma of Interpretation

Once presence discovered in network, how do I determine how to interpret it: Is state prepping for an attack, or conducting espionage? Is it OPE or espionage?

Detection (Monte)

Operation exposed to target

OT

Operational Technology Controls physical world Safety, then availability, then integrity, then confidentiality

Initial Access (Monte)

Penetrating any defensive security and gaining the abilit to ru commands other software on one of the target's computers or network devices

Architecture (CND)

Planning, establishing, and upkeep of systems with security in mind

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access. Originally to protect data in motion, increasingly used for data at rest, data in use

Worm

Program in and of itself (unlike virus), can replicate self over network without any user interaction

Turla

Prolific scope Vintage web server connects Turla to 1998, as Turla used LOKI2 backdoor from 1996 Either same group as Moonlight Maze or successor group with same TTP

Exfiltration (Monte)

Retrieval of wanted data from the target network.

SIS

Safety instrumental system autonomous control system that independently monitors the status of the process under control. If the process exceeds the parameters that define a hazardous state, the SIS attempts to bring the process back into a safe state or automatically performs a safe shutdown of the process.

Titan Rain/Byzantine Hades (early 2000s)

Series of coordinated attacks by computer systems in US, CNE against NASA, FBI Attributed to China Notable for time for 1. Level of deception 2. Multiple attack vectors Very sophisticated, much more sophisticated than previously seen; APT 1 most likely

Authorization (Buchanon)

Sometimes, intruders need to get permission to operate, and must operate within certain parameters Policy environment dependent

Dumping password hashes

Stealing hashed passwords, brute force "dumping" them until login credential appear real

SCADA

Supervisory Control and Data Acquisition Family of industrial control packages Geographically diverse, leveraged across infrastructure

Passive Defense (CND)

Systems added to the architecture to provide reliable defense or insight against threats

TTPs

Tactics Techniques Procedures Can signal who a group is, can be reverse engineered once made public

Persistence (Monte)

The art of turning initial access into reoccurring access Foundation that makes sustaining an operation possible

Active Defense (CND)

The process of analysts monitoring for, responding to, and learning from adversaries internal to the network

Signal

To hint credibly at the cards one holds

Persistence (Monte)

Turning Initial access into reoccurring access. Foundation that makes operation sustainable.

Home field advantage

US and allies home field advantage in cyber ops Positioned along key cables, US telecom providers serve many clients, US tech essential to global ecosystem Companies compelled to partner on foreign intelligence collection

Cuckoo's egg

USSR in W Germany accessing military systems Pre-internet 1st case of cyber espionage Story of institutional limitations

Cryptography

Used to ensure the confidentiality of data Encryption and decryption methods

Detection (Monte)

When an operation is exposed to a target

Exploits

attacks that take advantage of vulnerabilities

DDOS attacks target

availability

The Iranian denial of service attacks against US banks in 2012 impacted their ________ for their customers

availability

The Chinese hack of OPM in 2015 targeted the ________ of millions of private data records

confidentiality

CIA

confidentiality, integrity, availability

3 types of data

data in motion, data at rest, data in use

The DPRK bank hacking operations affected the _______ of numerous financial institutions

integrity

wiper attacks target

integrity

ransomware

malware that compromises or disables a suer's system until the user pays a ransom. Encrypt victim's data, render it unusable to the victim who owns it until victim pays for encryption key

OPE

operational preparation of the environment (OPE) Tough to tell if network intrusion OPE for attack or intel collection

Trojan horse

program with something malicious hidden inside, like virus or worm

tactical intelligence

respond to need of operators or military field commands

spear phishing

sending socially engineered emails in order to dupe a target into surrendering vital information or opening malicious code common Chinese tactic

Cybersecurity is more a tool of _______ rather than ________

shaping; signaling

Malware

software that is intended to damage or disable computers and computer systems.

Packet

the term given for the smallest unit of information transmitted across certain types of digital networks (e.g. internet or LAN) Internet data divided into packets, sent through variety of different routes across internet

strategic intelligence

to formulate new policy and military planning

wiper attacks

wipes/overwrites/removes data from the victim


Conjuntos de estudio relacionados

Ch. 34: Obstetrics and Neonatal Care

View Set

Innovation and Entrepreneurship Ch 1 - 5

View Set

earth science- chapter 7 earthquakes

View Set

Week 3 Check Your Understanding Assignment

View Set

Finance chapter 15- Stock valuation

View Set