2020 was full of major cyber events. Here is an end of year #ff thread of some of the most impactful people and research that I leveraged in my work this year
I’ve said it before - but cyber is a team sport and we are better when we share and collaborate
I’ve said it before - but cyber is a team sport and we are better when we share and collaborate
The year started off “with a bang” when CVE-2019-19781 was weaponized prior to patches being available. It felt like every threat actor under the sun was exploiting any Internet facing system and sorting out the wheat from the chaff later.
I didn’t know much about Citrix or Freebsd forensics - but @SecShoggoth and @hal_pomeranz’s work was helpful
https://www.sans.org/blog/freebsd-computer-forensic-tips-tricks/ https://www.trustedsec.com/blog/netscaler-remote-code-execution-forensics/
https://www.sans.org/blog/freebsd-computer-forensic-tips-tricks/ https://www.trustedsec.com/blog/netscaler-remote-code-execution-forensics/
We took the learnings from the CVE-2019-19781 investigations and @williballenthin and @MadeleyJosh help turn that into a public tool release In what felt like a land speed record from concept to prototype to testing and finally publishing https://www.fireeye.com/blog/products-and-services/2020/01/fireeye-and-citrix-tool-scans-for-iocs-related-to-vulnerability.html
APT28/STRONTIUM’s use of OAuth apps in 2016 got me interested in the novel technique. When I started on the #MSTIC team @MsftSecIntel I spent a bunch of research time on the topic and leveraged @doughsec and @MDSecLabs research
https://www.mdsec.co.uk/2019/07/introducing-the-office-365-attack-toolkit/
https://www.fireeye.com/blog/threat-research/2018/05/shining-a-light-on-oauth-abuse-with-pwnauth.html
https://www.mdsec.co.uk/2019/07/introducing-the-office-365-attack-toolkit/
https://www.fireeye.com/blog/threat-research/2018/05/shining-a-light-on-oauth-abuse-with-pwnauth.html
This resulted in #AzureSentinel detections that are tool specific & others that are tool agnostic. @ashwinpatil’s help as I learned KQL was invaluable here
There are other improvements that aren’t as public but are moving the needle at protecting orgs
https://github.com/Azure/Azure-Sentinel/tree/master/Detections/AuditLogs
There are other improvements that aren’t as public but are moving the needle at protecting orgs
https://github.com/Azure/Azure-Sentinel/tree/master/Detections/AuditLogs
CVE-2020-5902 (F5 BIG-IP) was weaponized in a similarly broad fashion as CVE-2019-19781.
@buffaloverflow’s research and also observations from honeypots in both incidents was invaluable. https://www.mdsec.co.uk/2020/01/deep-dive-in-to-citrix-adc-remote-code-execution-cve-2019-19781/
@buffaloverflow’s research and also observations from honeypots in both incidents was invaluable. https://www.mdsec.co.uk/2020/01/deep-dive-in-to-citrix-adc-remote-code-execution-cve-2019-19781/
Here’s the link for @buffaloverflow and @NCCGroupInfosec research https://research.nccgroup.com/2020/10/09/rift-f5-cve-2020-5902-and-citrix-cve-2020-8193-cve-2020-8195-and-cve-2020-8196-honeypot-data-release/
I’ve spent time on human operated ransomware research and there are so many blogs and researchers who give insight into the rapidly evolving landscape
@TheDFIRReport
@kyleehmke @smoothimpact
Just to name a few https://thedfirreport.com/2020/11/05/ryuk-speed-run-2-hours-to-ransom/
@TheDFIRReport
@kyleehmke @smoothimpact
Just to name a few https://thedfirreport.com/2020/11/05/ryuk-speed-run-2-hours-to-ransom/
Speaking of human operated ransomware - this @MsftSecIntel blog from earlier in the year summarizes a number of attacker TTPs as well as recommended mitigation actions organizations can take to be more resilient to these kind of attacks https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/
In August a patch was released for CVE-2020-1472 (ZeroLogon), in September technical details were released by @SecuraBV. @GossiTheDog @ashwinpatil and I worked on detecting someone leveraging the CVE to conduct a DCSync attack
https://www.secura.com/blog/zero-logon https://twitter.com/gossithedog/status/1308148096237436928?s=21
https://www.secura.com/blog/zero-logon https://twitter.com/gossithedog/status/1308148096237436928?s=21
In October @CISAgov warned of imminent ransomware attacks targeting US Healthcare
This was all-hands on deck moment @microsoft & across industry. Most people won’t know details but a number of orgs were saved. Super proud of my teammates & industry peers
https://us-cert.cisa.gov/ncas/alerts/aa20-302a
This was all-hands on deck moment @microsoft & across industry. Most people won’t know details but a number of orgs were saved. Super proud of my teammates & industry peers
https://us-cert.cisa.gov/ncas/alerts/aa20-302a
@SElovitz @doughsec @jshilko @anthomsec and the rest of the team @Mandiant put out a great blog encapsulating a years worth of TTPs & IOCs of UNC1878 intrusions - many of which led to Ryuk ransomware deployments https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html
And if all of that wasn’t enough for 2020 - @FireEye identified a sophisticated threat actor compromising the software supply chain of SolarWinds & conducting post compromise activities leveraging multiple novel techniques
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
https://www.fireeye.com/blog/threat-research/2020/12/sunburst-additional-technical-details.html
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
https://www.fireeye.com/blog/threat-research/2020/12/sunburst-additional-technical-details.html
Golden SAML tokens, compromised AAD Global Admin accounts, creds added to cloud application service principals, new/modified federation trusts, TTPs to evade detection
, sophisticated OPSEC, this one had it all
It was great to collaborate w/ @ItsReallyNick Solid rundown here
https://twitter.com/itsreallynick/status/1338382939835478016

It was great to collaborate w/ @ItsReallyNick Solid rundown here

@msftsecurity has put out a ton of content on the various techniques observed. As new blogs/findings are released - they are being aggregated here:
#ff @Alex_T_Weinert @JohnLaTwC @MSSPete @n0x08 @DeltaTangoTwo @jepayneMSFT
https://msrc-blog.microsoft.com/2020/12/21/december-21st-2020-solorigate-resource-center/
#ff @Alex_T_Weinert @JohnLaTwC @MSSPete @n0x08 @DeltaTangoTwo @jepayneMSFT
https://msrc-blog.microsoft.com/2020/12/21/december-21st-2020-solorigate-resource-center/
This blog has some EDR technical details that may have been overlooked including:
-renamed adfind
-lateral movement via winrm & scheduled tasks
-remote execution of tools via WMI + rundll32 w/legitimate named files in C:\\Windows\\* & unique name per system https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/
-renamed adfind
-lateral movement via winrm & scheduled tasks
-remote execution of tools via WMI + rundll32 w/legitimate named files in C:\\Windows\\* & unique name per system https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/
@Volexity & @stevenadair Dark Halo blog discusses similarly interesting TTPs including:
-bypassing MFA after stealing the Duo integration secret key
-PowerShell to access the EWS API for email theft
-staging data for exfil on internet facing mail servers
https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/
-bypassing MFA after stealing the Duo integration secret key
-PowerShell to access the EWS API for email theft
-staging data for exfil on internet facing mail servers
https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/
OPSEC examples: “each compromised device receives unique binary hash, unique local filesystem path, pseudo-unique export & unique C2 domain” & variety of persistence mechanisms
Makes single detection harder to identify other backdoors & reduces utility of sharing hashes/domains
Makes single detection harder to identify other backdoors & reduces utility of sharing hashes/domains
There are a number of resources you can leverage to learn about the Golden SAML, OAuth abuse & federation trust abuse
@Mandiant & @Microsoft’s DART team collaborated on blog about Azure Active Directory backdoors
Backdoor #2 is particularly relevant
https://www.fireeye.com/blog/threat-research/2020/09/detecting-microsoft-365-azure-active-directory-backdoors.html
@Mandiant & @Microsoft’s DART team collaborated on blog about Azure Active Directory backdoors
Backdoor #2 is particularly relevant
https://www.fireeye.com/blog/threat-research/2020/09/detecting-microsoft-365-azure-active-directory-backdoors.html
@DrAzureAD’s blog and associated tools like AAD Internals are a wealth of knowledge about using/abusing functionality of Azure Active Directory and Office365 https://o365blog.com/aadinternals/
A number of TTPs of the Solorigate/SOLARBURST attacks mirror TTPs that @_dirkjan researched and discussed at conferences including @WEareTROOPERS & @defcon 27
Highly recommended reading
https://troopers.de/downloads/troopers19/TROOPERS19_AD_Im_in_your_cloud.pdf
https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Dirk-jan-Mollema-Im-in-your-cloud-pwning-your-azure-environment.pdf
Highly recommended reading
https://troopers.de/downloads/troopers19/TROOPERS19_AD_Im_in_your_cloud.pdf
https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Dirk-jan-Mollema-Im-in-your-cloud-pwning-your-azure-environment.pdf
If you want to learn how to secure various aspects of your security architecture @PyroTek3 & @TrimarcSecurity have some useful material including:
Securing ADFS
Securing AD Connect
https://www.hub.trimarcsecurity.com/post/securing-microsoft-azure-ad-connect
https://adsecurity.org/?p=3782
Securing ADFS
Securing AD Connect
https://www.hub.trimarcsecurity.com/post/securing-microsoft-azure-ad-connect
https://adsecurity.org/?p=3782