SafeMax_Security_Assignment.
SafeMax_Security_Assignment.
Hello Team,
If i was to be a cybersecurity analyst at a mid-sized e-commerce company and
faced the respective scenarios as mentioned in the assignment , before
implementing the incident response plain it is also important to think in the same
way the attacker might think . This includes re-imagining how he would have
carried out the attack as well.
As per our scenario I think that the attacker may have carried out the attack as
follows:
1. While performing the recon the attacker could have discovered outdated
software versions running on a server(Using Wappalyzer or builtwith.com).
Further research about the outdated software versions he came to know about
the vulnerabilities associated with these software.
4. Later he waits for non-business hours when no one will be monitoring or will
be in the offices to exfiltrate the sensitive data.
5. Using this sensitive data which might be credentials of the credit cards of the
customers of the organization he later carries out transactions or also known
as CARDING.
Removing the Payment Gateway Server from the network and isolating it.
Ensuring that this Payment Gateway Server is not in the same network of other
Payment Gateway Servers which might allow the attacker to pivot to other servers.
Using firewalls to block the malicious IP from the whole network .
Rate-Limiting the authentication attempts to overcome brute-force attempts.
Patching the identified outdated software versions from the logs.
Monitoring network and process activity on the server to verify if any backdoor is
still active using tools like wireshark ,etc.
Multiple Payment Gateway Server ensures that if one Payment Gateway Server
goes down the availability is not compromised.
Log Analysis:
Analyzing log entries help to track the movements of the attacker and to
understand how he might have carried out the attack.
/var/log/apache2/access.log
/var/log/nginx/access.log
/var/log/auth.log
5. Analyzing the last command output in Linux which provides historical data of
sessions .
Tool Selection:
1.EDR and XDRs:
EDR (Endpoint Detection and Response) and XDR (Extended Detection and
Response) tools give a in-depth analysis of the endpoints and servers.
2. Isolate: Isolate the endpoint from the network to reduce the spread of
attack.
WAFs allows to analyze and protect the web endpoints from attackers .
3. SIEM Tools:
SIEM tools provide a centralized console to view and analyze logs of the
endpoints and servers.
Example: Splunk, Wazuh.
Impact Assessment:
This phase involves assessing the impact of the incident such as financial,
operational and reputational.
Financial Impact : Financial Impact address the financial cost or losses incurred by
the incident. In our case as unauthorized transactions were carried out by the
attacker the financial impact is huge.
Customer Communication:
Customer communication is important as it helps conveying the message that
organization is responsible.
Automatic updates helps to update the software and components to the latest
available version .
Two-Factor Authentication:
Security Tests:
Conduct routine penetration testing to simulate attack vectors and patch
identified vulnerabilities proactively.
Documentation:
Document the entire process in detail and store it for increasing the knowledge
base.