The Investigation
1. The 3-Step Cyclic Process
Purpose: To systematically investigate a security incident by iteratively refining the understanding of the attack through indicators of compromise (IOCs), identifying new leads, and collecting/analyzing data.
Why: This cyclic process ensures that the investigation evolves as new evidence is discovered, leading to a comprehensive understanding of the incident.
Step 1: Creation and Usage of Indicators of Compromise (IOCs)
Purpose: To identify and track specific artifacts or patterns associated with the incident.
Why: IOCs help detect malicious activity, correlate events across systems, and guide further investigation.
Technical Example:
Generate IOCs from Initial Data:
Extract file hashes, IP addresses, domain names, and registry keys from logs or forensic analysis:
Example IOC list:
File Hash:
abc123
(MD5),def456
(SHA256)IP Address:
192.168.1.100
Domain:
malicious-domain.com
Search for IOCs Across Systems:
Use tools like Splunk, Elasticsearch, or EDR solutions to search for IOCs:
Query endpoint logs for suspicious activity:
Step 2: Identification of New Leads and Impacted Systems
Purpose: To expand the scope of the investigation by identifying additional systems or activities related to the incident.
Why: Attackers often move laterally within a network, so identifying all impacted systems is crucial to containing the threat.
Technical Example:
Identify Lateral Movement:
Analyze logs for unusual login attempts or connections between systems:
Use EDR tools to trace lateral movement:
Map Affected Systems:
Cross-reference IOCs with asset management databases:
Step 3: Data Collection and Analysis from New Leads and Impacted Systems
Purpose: To gather additional evidence from newly identified systems and analyze it to uncover further details about the incident.
Why: Each new lead provides more context, helping to reconstruct the attack timeline and understand the adversary's actions.
Technical Example:
Collect Logs and Artifacts:
Use forensic tools to collect logs, files, and memory dumps from impacted systems:
Export Windows Event Logs for analysis:
Analyze Collected Data:
Correlate events across systems using SIEM tools:
Identify malicious processes or files:
Iterating Through the Cycle
As new data is collected and analyzed, the cycle repeats:
Create New IOCs: Extract additional IOCs from newly identified systems.
Identify Additional Leads: Use the new IOCs to find other impacted systems or activities.
Collect and Analyze More Data: Gather logs and artifacts from these systems to uncover further details.
Conclusion
The investigation process is inherently iterative, driven by the continuous discovery of new evidence. By creating and leveraging IOCs, identifying new leads, and collecting/analyzing data, organizations can build a comprehensive understanding of the incident.
This approach ensures that no aspect of the attack is overlooked, enabling effective containment, remediation, and long-term improvements in security posture. Regularly revisiting and refining the investigation steps helps uncover hidden threats and strengthens the organization's defenses against future attacks.
Last updated