Skip to main content
Contest

Spooky Security Showdown:🚨 Cyber Incident Response Challenge 🚨

Spooky Security Showdown:🚨 Cyber Incident Response Challenge 🚨
TylerM
Administrator
Forum|alt.badge.img+25
  • Sr. Security Analyst & Community Manager
  • 1260 replies

 Part of our Spooky Security Showdown Series

 

October is Cybersecurity Awareness Month, and to celebrate, we are presenting a realistic incident response challenge! We’ve crafted a simulated scenario for a fictional company, CyberSecure Inc., that has fallen victim to a cyber-attack. Your mission, should you choose to accept, involves analyzing the provided log file, identifying the malicious activities, and proposing a comprehensive incident response plan.

 

Scenario:

CyberSecure Inc., a rising FinTech company, started its day with several employees reporting an inability to access critical financial databases. The IT department soon discovered a ransom note demanding cryptocurrency in exchange for a decryption key. Preliminary investigations suggest a ransomware attack that originated from a phishing email.

 

Resources:

  • Log File: A server log file capturing system events on the day of the incident.

[2023-10-19 07:45:00] INFO: System startup complete.

[2023-10-19 07:50:23] INFO: User 'admin' logged in from IP 192.168.1.10.

[2023-10-19 07:53:37] INFO: Database routine maintenance started.

[2023-10-19 08:12:34] INFO: Database maintenance completed successfully.

[2023-10-19 08:45:23] INFO: User 'jdoe' logged in from IP 192.168.1.15.

[2023-10-19 09:30:45] WARN: Failed login attempt from IP 203.0.113.5.

[2023-10-19 09:30:46] WARN: Failed login attempt from IP 203.0.113.5.

[2023-10-19 09:30:47] WARN: Failed login attempt from IP 203.0.113.5.

[2023-10-19 09:30:48] INFO: User 'admin' logged in from IP 203.0.113.5.

[2023-10-19 09:31:52] INFO: User 'admin' initiated file write operation on /financial_data/.

[2023-10-19 09:32:15] INFO: High volume of file write operations detected on /financial_data/.

[2023-10-19 09:32:20] WARN: File modification detected: /financial_data/quarterly_report.q1 encrypted.

[2023-10-19 09:32:21] WARN: File modification detected: /financial_data/annual_report.2022 encrypted.

[2023-10-19 09:32:22] WARN: File modification detected: /financial_data/client_data.csv encrypted.

[2023-10-19 09:32:30] INFO: User 'admin' initiated network connection to external IP 198.51.100.2.

[2023-10-19 09:33:00] INFO: Database backup initiated by User 'admin'.

[2023-10-19 09:45:00] INFO: Database backup completed successfully.

[2023-10-19 10:00:15] INFO: User 'mkim' logged in from IP 192.168.1.20.

[2023-10-19 10:20:00] ERROR: Ransomware detection alert triggered on /financial_data/.

[2023-10-19 10:20:05] INFO: User 'admin' logged out from IP 203.0.113.5.

[2023-10-19 10:25:00] INFO: IT Admin alerted via email to ransomware detection.

[2023-10-19 10:30:00] INFO: User 'sysadmin' logged in from IP 192.168.1.10.

[2023-10-19 10:35:00] INFO: Network traffic analysis initiated by User 'sysadmin'.

[2023-10-19 10:40:00] WARN: Unusual outbound traffic detected to IP 198.51.100.2.
 

 

Challenge Tasks:

  1. Incident Analysis:

    • Analyze the provided log file to identify ALL suspicious activities.
    • Determine the likely attack vector and the extent of the compromise.
    • Identify any external IP addresses involved in the incident.
  2. Incident Response Plan:

    • Propose immediate steps to contain the incident.
    • Outline a plan to eradicate the threat and recover affected systems.
    • Suggest measures to prevent such incidents in the future.

Submission Guidelines:

  • Submit your analysis and response plan as a reply to this thread by October 31, 2023, 11:59 PM 
  • Each submission should include a BRIEF Incident Analysis and Response Plan.

Evaluation Criteria:

  • Accuracy of the incident analysis.
  • Effectiveness and comprehensiveness of the incident response plan.

Prizes:

  • The top incident analysis will get a Amazon gift card $25 or £20
  • The top incident response plan will get a Amazon gift card $25 or £20
  • A random poster who put in the effort will also get a Amazon gift card $25 or £20

We look forward to witnessing your cybersecurity expertise in action! If you have any questions, feel free to ask in this thread. Good luck!

Did this help you find an answer to your question?

10 replies

Someone has got to be first 🕵👀

Show more

 

 

Hidden for those who dont want to see any other attempts 👻


Rodney18
New Member
Forum|alt.badge.img
  • New Member
  • 60 replies
  • October 27, 2023

Change Admin login password

Set password to a secure password

Setup two factor athentication

Restore network changes

Delete encrypted data

Restore data from backup


tmcmullen
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 177 replies
  • October 27, 2023

Incident Analysis:

Admin password was compromised and someone logged in from outside the network. After several attempts they were able to gain access using the correct password.

High volume of file write operation on Financial data - bad actor is copying, then encrypting financial data files

User “Admin” connected to another external IP address and backed up financial data to off-site location 198.51.100.2 so they can review the information and use it to demand ransom or sell to dark web. 

When user mkim logs in the ransomware alert is triggered and bad actor using admin account logs off

Incident Response Plan:

Change all Admin passwords, and for good measure have all users change passwords immediately to a password with a very secure password requiring at least one upper case letter, at least one lower case letter, at least one number, and special character - password should be more than 8 characters and nothing used anywhere else. 

Set up multi factor authentication

Restore full server from previous good backup

Invest in MDR services to prevent/stop future attempts  

Remove “Admin” account and create a unique name for the admin account such as “ABCcompanyAdmin” so that the user name is not as easy to guess. 

Limit the number of users who have admin level access on the network


Rondolino Cellamare
New Voice

Incident Analisys

  • On the fourth attempt a user outside the local network gained access to the "admin" account
  • The attempts followed each other within a very short period of time (1 sec.).
  • The admin user performed a write and modification operation on a large volume of files, with subsequent encryption.
  • Soon after, an outbound connection was activated with suspected database backup activity purporting to be directed at the outbound connection for data exfiltration.
  • The "mkim" connection revealed the presence of ransomeware for the first time (I think becose mkim adopte Webroot 😁)
  • The IT manager is alerted to anomalies The IT manager begins an analysis of network traffic and detects anomalous outgoing traffic to an unknown address.


Incident Response Plan:

  • Immediately disconnect the server from the network to stop the flow of data to the outside.
  • Run a scan with an antivirus to eliminate any ransomeware present and stop the encryption.
  • Immediately change the admin password and adopt password security policies (lowercase letters, uppercase letters, numbers, symbols and a reasonable minimum length of at least 8 characters but at least 12, 15 or more is recommended). With a good password manager this is not a problem.
  • Set a rule of maximum number of authentication attempts(ex. 3), after which banning the account for a minimum period of a few hours (this makes a bot give up in a good number of cases).
  • Adopt a multifactor authentication system.
  • Delete the files compromised by encryption and restore the files from the last available backup copy before the attack. Alternatively, restore the entire server from the last full backup copy available before the attack.
  • Replace the admin account with a more personalized and more difficult to identify user (avoid "administrator" or similar), for example "UserADMMyCompanyUnique".
  • Put the server back on the network.
  • Force all administrators to change passwords to apply password restriction rules to everyone. The number of network administrators should be as limited as possible.
  • The password rule must be respected by all users therefore the obligation should be extended to all users.
  • The adoption of a good EDR or rather an MDR should be the primary investment for the company

TylerM
Administrator
Forum|alt.badge.img+25
  • Author
  • Sr. Security Analyst & Community Manager
  • 1260 replies
  • November 2, 2023

Good responses here!

 

@tmcmullen  and @Rondolino Cellamare are our winner!

 

Will PM details for gift card 😉


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • 8928 replies
  • November 2, 2023
TylerM wrote:

Good responses here!

 

@tmcmullen  and @Rondolino Cellamare are our winner!

 

Will PM details for gift card 😉

 

 


ProTruckDriver
Moderator

Rondolino Cellamare
New Voice

A thousand thanks. Too easy to win when you play alone (or almost...)


russell.harris
Popular Voice
Forum|alt.badge.img+5

Congrats!


Forum|alt.badge.img+1
  • New Voice
  • 86 replies
  • November 21, 2023

Too late to compete, but a great idea to use a scenario like this in a company quiz ;-)


Reply