CISA :2023 年 SILENTSHIELD 红队活动报告(2024)29页

ID:70697

大小:1.18 MB

页数:30页

时间:2024-07-18

金币:15

上传者:Iris
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at
Report@cisa.gov or (888) 282-0870. When available, please include the following information regarding the
incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment
used for the activity; the name of the submitting company or organization; and a designated point of contact.
This document is marked TLP:CLEAR. Disclosure is not limited. Sources may use TLP:CLEAR when information
carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public
release. Subject to standard copyright rules, TLP:CLEAR information may be distributed without restriction. For
more information on the Traffic Light Protocol, see cisa.gov/tlp.
Product ID: AA24-193A
July 11, 2024
Authored by:
TLP:CLEAR
TLP:CLEAR
CISA Red Team’s Operations Against a
Federal Civilian Executive Branch Organization
Highlights the Necessity of Defense-in-Depth
EXECUTIVE SUMMARY
In early 2023, the Cybersecurity and Infrastructure Security Agency (CISA) conducted a
SILENTSHIELD red team assessment against a Federal Civilian Executive Branch (FCEB)
organization. During SILENTSHIELD assessments, the red team first performs a no-notice, long-term
simulation of nation-state cyber operations. The team mimics the techniques, tradecraft, and
behaviors of sophisticated threat actors and measures the potential dwell time actors have on a
network, providing a realistic assessment of the organization’s security posture. Then, the team works
directly with the organization’s network defenders, system administrators, and other technical staff to
address strengths and weaknesses found during the assessment. The team’s goal is to assist the
organization with refining their detection, response, and hunt capabilitiesparticularly hunting
unknown threats.
In coordination with the assessed organization, CISA is releasing this Cybersecurity Advisory (CSA)
detailing the red team’s activity and tactics, techniques, and procedures (TTPs); associated network
defense activity; and lessons learned to provide network defenders with recommendations for
improving their organization’s detection capabilities and cyber posture.
During the first phase, the SILENTSHIELD team gained initial access by exploiting a known
vulnerability in an unpatched web server in the victim’s Solaris enclave. Although the team fully
compromised the enclave, they were unable to move into the Windows portion of the network due to
a lack of credentials. In a parallel effort, the team gained access to the Windows network through
phishing. They then discovered unsecured administrator credentials, allowing them to pivot freely
throughout the Windows environment, which resulted in full domain compromise and access to tier
zero assets. The team then identified that the organization had trust relationships with multiple
external partner organizations and was able to exploit and pivot to an external organization. The red
team remained undetected by network defenders throughout the first phase.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭