代写COMP2216 Principles of Cyber Security 2023/24代写C/C++语言

- 首页 >> Matlab编程

COMP2216 Principles of Cyber Security 2023/24

Coursework on Cyber-Attack Analysis

Coursework: individual report on the analysis of a cyber-attack

Deadline : 3:59pm Monday 11th  March 2024

(please note that submitting exactly at 4:00pm will result in a penalty)

Feedback: by Monday 29th April 2024

Weighting : 30% of module evaluation

Introduction

For this assignment,you will analyse a given cyber-attack using the kill chain model. You will also analyse the profile of the attacker.

Cyber-Attack description

Top secret documents revealing evidence of recent government misconduct have been publicly leaked, inciting citizens' anger and resulting in  widespread chaos.  These documents  were stolen from the government agency GovVault.

A forensic analysis disclosed that the data breach occurred a few months before the public leak. The stolen documents were stored within GovVault's internal network, housed in a local file  sharing  application  widely  regarded  as  a  leading  enterprise-grade  software  solution trusted by numerous high-profile clients. Despite its exemplary security configuration and access control policies, the version deployed in GovVault's internal network contained a known Remote  Code  Execution  (RCE)  vulnerability,  exploited  in  this  attack  to  gain  unauthorised access  to  the  stolen  top  secret  documents.  Specifically,  this  RCE  vulnerability  could  be exploited using specially crafted packets that, upon processing, triggered a buffer overflow condition, leading to the execution of arbitrary code with system-level privileges. The forensic analysis also revealed that the attackers gained a foothold inside GovVault's internal network via  a  backdoor  injected  into  an  application  called  SecMon,  a  well-known,  high-standard security  monitoring  service   widely  utilised  by  high-profile  enterprises  and  government agencies.

The investigation extended to SecProv, the software provider responsible for developing and maintaining SecMon.  The forensic  team  traced  the  malicious  SecMon  version  back  to  a software update uploaded to SecProv's internal code repository. The update was made using a legitimate account of a developer who was indeed working on SecMon and had full access privileges   to   the   corresponding   code   repository.   Further   inquiries   and   investigations completely ruled out any voluntary involvement of the developer in the breach. However, a thorough analysis of the developer's workstation revealed an unusual configuration of the Remote Desktop Protocol (RDP) service, where notifications and logging had been disabled. Furthermore,  the forensic  team  discovered  that  the  credentials  to  access  the  developer's machine via RDP were rather weak and susceptible to a brute force attack. The forensic team continued  their  work  under  the  assumption  that  the  attackers  breached  the  developer's workstation via the poorly secured RDP service, although they remained uncertain about the initial intrusion method. Therefore, the analysis was expanded to encompass SecProv's entire internal network. In doing so, they identified a separate backdoor, different from the one found within the GovVault’s internal network, installed on a machine hosting services provided by SecProv over the Internet. One of these services, a Customer Relationship Management (CRM) system,  was found  to  be  vulnerable  to  an  RCE  vulnerability  distinct from  the  one exploited  to  access  the  local file  sharing  application  in  GovVault's  internal  network.  The forensic  team  is  still  investigating  this  breach,  operating  under  the  assumption  that  the attackers  exploited  the  CRM   vulnerability  to  infiltrate  SecProv's  internal  network.   They recently discovered a downloader script on the same machine, responsible for downloading the backdoor and modifying the operating system registry keys to ensure it ran everytime the system booted up. Additionally, they noted that it took four months from the initial intrusion to the upload of the malicious update to SecProv's internal code repository.

The government has not released any information regarding interactions or negotiations with the attackers. Furthermore, this attack has not been publicly claimed by any threat actor.

Task 1 - Kill Chain-based Analysis

The objective of this task is to analyse the cyber-attack described above  using  Lockheed Martin’s  kill  chain  model  of  cyber-attack  life  cycle.  Some  attacks  may  require  multiple iterations of the kill chain; if so, add a subsection for each additional phase, using the phase name and iteration number as the title (e.g., “Reconnaissance Phase #2”).

•    First, determine the number of kill chain iterations needed to model this attack and list  all  phases  it  went  through,   choosing  from   Reconnaissance,  Weaponisation, Delivery, Exploitation, Installation, Command & Control, and Actions on Objectives.

•   Then, describe what occurred in each  phase  in the appropriate subsection of the template (e.g., “Reconnaissance Phase,” “Weaponization Phase,” …).

o When  describing a  phase,  focus  solely  on  events  within that  phase;  avoid mentioning events from prior or subsequent phases.

o If nothing occurred in a phase, explicitly state it and provide justification.

o If no information is available for a phase but you believe something must have occurred,  make   hypotheses  and  discuss  them,  clearly  stating  they  are assumptions not directly based on the provided attack description.

o The description for each phase must not exceed 100 words. If over 100 words, only the first 100 will be considered.

Task 2 - Attacker Analysis

Consider the following cyber actor profiles: Cybercriminal, Nation State, and Hacktivist. For each,  assess  their   suitability  for  the   previously   analysed  attack,  discussing  both  their alignment and  misalignment  in terms of  motivations, attack strategy, and technical skills required.

•    Regarding   motivations,   evaluate   how   the   attack's   impact   aligns   with   typical motivations for each profile.

•   The  discussion  on  attack  strategy  should  analyse  the  extent  to  which  the  attack vectors and techniques used match those commonly employed by each profile.

•   The discussion on technical skills should assess  how the attack’s sophistication and technical  skill   requirements  compare  with  those  typically   seen  in  cyber-attacks launched by each profile.

The maximum length for each discussion (motivations, attack strategy, technical skills) for a cyber actor profile is 100 words. If exceeding 100 words, only the first 100 will be considered.

Marking

Module Learning outcomes

A2. Demonstrate knowledge and understanding of the cyber threat landscape, both in terms of recent emergent issues and those issues, which recur overtime.

A3. Demonstrate knowledge and understanding of the roles and influences of governments,

commercial and other organisations, citizens, and criminals in cyber security affairs. B1. Critically analyse a cyber-attack and identify effective countermeasures.

Assignment Learning Outcomes (ALOs)

AS1. Analyse cyber-attacks by applying the kill chain model.

AS2. Examine the profile of the cyber actors behind a cyber-attack.

Marking Criteria

Your submission will be marked out of 100. The following criteria will be used.

Task

Criteria

ALO

Marking scheme

Task 1

Ability to apply the kill chain model to analyse a cyber-attack

AS1

Up to 73 marks, awarded based on how many phases are (i)

correctly identified, (ii) well- placed in the chain, and (iii)  accurately described

Task 2

Ability to examine a cyber actor profile

AS2

Up to 27 marks, awarded based on      the      correctness      and completeness of the discussion around    why    the    proposed profiles   fit   the   given   cyber- attack in terms of motivations, attack   strategy   and   technical skills required.

File

format, report   length

Submitted file is in PDF format, the report is  compliant with the provided template and is not longer than 4000 words. If the report is   more than 4000 words or the format is not    PDF, a 10 marks penalty will be applied. If

the report is corrupted or cannot be opened, 0 marks will be awarded for the coursework.

-

-

 


站长地图