Incedint Report Example
Incedint Report Example
ON THE BREACH OF
THE AUSTRALIAN
N AT I O N A L U N I V E R S I T Y ’ S
A D M I N I S T R AT I V E S Y S T E M S
CONTENTS
Vice-Chancellor’s Foreword 1
Executive summary 2
Appendix 14
Appendix A: “invitation” phishing email 14
Appendix B: “meeting” phishing email 15
Appendix C: “planning” phishing email 16
VICE-CHANCELLOR’S FOREWORD
In June 2019, I notified our community we had been the victims of a cyber attack.
In the wake of that announcement I committed to making our investigation public. I wanted to be as
transparent with you as possible about what happened, how it happened and why it happened. And by
doing so, I also want to encourage disclosure of these attacks more broadly.
This incident report provides details on the attack including the methods used by the attacker to
infiltrate The Australian National University (ANU) systems. To my knowledge, this publicly available
report is the first of its kind in Australia following a cyber attack on a public institution.
I have made this report public because it contains valuable lessons not just for ANU, but for all
Australian organisations who are increasingly likely to be the target of cyber attacks. It is confronting
to say this, but we are certainly not alone, and many organisations will already have been hacked,
perhaps without their knowledge. I hope this report will help them protect themselves, and their data
and their communities.
As I said in my statement on 4 June 2019, the perpetrators of our data breach were extremely
sophisticated. This report details the level of sophistication, the likes of which has shocked even the
most experienced Australian security experts.
While it’s clear we moved quickly to implement hardening and security improvement measures following
our first cyber-attack in May 2018, this report shows we could have done more.
The report outlines where those lessons for ANU have been learned and what we are doing to further
protect our systems. But we have to strike a balance and this report cannot be an instruction manual
for would-be hackers to launch another attack. I have asked for this report to be as transparent
as is allowable to ensure our community is well-informed, but not so that criminals are armed with
information that compromises our systems or that of another organisation.
Despite our considerable forensic work, we have not been able to determine, accurately, which records
were taken. However, our analysis has been able to establish that while the hackers had access to data
up to 19-years-old, the hackers took much less than the 19 years’ worth of data we originally feared.
We also knew the stolen data has not been further misused. Frustratingly this brings us no closer to the
motivations of the actor.
I thank all those involved in the response to this incident and in the preparation of this report,
particularly our colleagues across Commonwealth security agencies, IDCARE and Northrop Grumman.
Finally, and most importantly, I wish to apologise to the victims of this data breach: our community.
We are working constantly to ensure the protection of the data you entrust us with; and are investing
heavily in measures to reduce the risks of this occurring again, including a multi-year information
security investment program. But we must all remain vigilant and follow the advice of security experts
to protect our personal information.
1 Public incident report on the breach of The Australian National University’s administrative systems
EXECUTIVE SUMMARY
By gaining access to ESD, the actor was able to copy and steal an unknown quantity of data contained
in the above systems. There is some evidence to suggest the same actor attempted to regain access
to ESD during February 2019, but this second attack was ultimately unsuccessful.
Indications of an intrusion were first detected in April 2019 during a baseline threat hunting exercise. The
hunt uncovered network traffic data suggesting the presence of a malicious actor whose characteristics
were distinct from the actor detected during the breach reported by the University in May 2018. The new
detection precipitated an incident response, led by Northrop Grumman, working with ANU cybersecurity
staff. The incident response team uncovered the data breach on Friday 17 May and verbally reported it
to the Vice-Chancellor that day.
The initial means of infection was a sophisticated spearphishing email which did not require user
interaction, ie clicking on a link or downloading an attachment.1 The actor’s dwell time on the ANU
network was approximately six weeks, with most malicious activity ending around mid-December
2018, although there were some further attempts after this time.2
The actor’s activity was contained to a handful of systems, although they had gained broader access.
It is clear from the pathway taken by the actor the sole aim was to penetrate ESD and gain unauthorised
access to the systems mentioned above. There is no forensic evidence to suggest the actor accessed
or displayed any interest in files containing general administrative documents or research data; nor was
the ANU Enterprise Records Management System (ERMS) affected.3
At the time of the public announcement, ANU was not able to ascertain how much data or specifically
which fields might have been accessed. As such it was assumed that all data, dating back some
19 years, had been potentially affected and reported as such to err on the side of caution. More recent
forensic analysis has been able to determine that the amount of data taken is much less than 19 years’
worth; although it is not possible to determine how many, or precisely which, records were taken.4 This
analysis is based on duration of exfiltration activity and known, albeit incomplete, data volumes.
ANU worked closely with, and reported findings to, the Australian Cyber Security Centre (ACSC)
and the Office of the Australian Information Commissioner (OAIC), before public notification. During
the intervening two weeks between the detection of the breach and the public announcement on
Tuesday 4 June 2019, we implemented a range of additional security controls inside ESD and the
broader network – many of these activities were to expedite hardening measures already scheduled
for implementation.
1 Spear-phishing emails are a form of malicious email targeting an individual or organisation. They mimic legitimate mail and
contain malicious attachments or links designed to steal credentials or enable the install malware.
2 Dwell time refers to the amount of time the actor spent on the network undetected.
3 The ANU ERMS is the central repository for the University’s records.
4 This analysis is based on duration of exfiltration activity and known, albeit incomplete, data volumes.
5 Tactics, techniques and procedures or TTPs refers to the methodology and tools used by the actor in gaining access and
taking out stolen information.
3
D E TA I L E D T I M E L I N E
O F T H E D ATA B R E A C H
Overview
This section provides a chronological account of the data breach based on available forensic data.
One of the hallmarks of the actor was the high degree of operational security which involved file and
log erasure. Another hallmark was measures designed to defeat forensic analysis and hide activities.
Because of this the forensics available (and subsequent analysis) is incomplete. However, there is
enough detail available to provide insight into the actor’s activities. Broadly speaking, there are three
categories of activities undertaken by the actor during the campaign:
>> Credential theft. The actor sent out four spearphishing emails, to ANU users,to try and gain
credentials ie passwords, usernames, hashes.6 The aim of these emails was to gain the credentials
of an administrator or someone with the right level of access to targeted systems. Actors also try to
gain a broad set of credentials in case they expire, or compromised accounts are exposed. In the
case of ANU, administrator credentials deliberately expire quickly. The other mechanism the actor
used was software designed to “sniff” credentials from network traffic.
>> Compromised infrastructure. The actor built a shadow ecosystem of compromised ANU
machines, tools and network connections to carry out their activities undetected. Some
compromised machines provide a foothold into the network. Others, like the so-called attack
stations, provided the actor with a base of operations to map the network, identify targets of
interest, run tools and compromise other machines.7
>> Data theft. The actor used a variety of methods to extract stolen data or credentials from the
ANU network. This was either via email or through other compromised Internet-facing machines.
6 Hashes are a one-way mathematically altered version of a password designed to ensure the confidentiality of credentials.
7 All ANU machines compromised by the actor have been cleansed of any malicious code.
8 A web shell is a script that is loaded onto a web server to enable remote access and administration that machine and be
used to access other machines on the network.
9 This refers to The Onion Router (TOR) network designed to anonymise internet traffic. Command and Control and or C2
refers to the commands sent via the webshell to control the compromised machine.
10 A privilege escalation exploit is malicious code which uses a flaw or bug in software or the operating system to gain
administrative access to a machine.
11 A copy of this email is available in Appendix A.
12 Lightweight Directory Access Protocol
5
27 November: access to ESD file shares achieved.
At this stage the actor did not appear to have the relevant credentials needed for their campaign and
over the course of 27 November, began a network-wide attempt to compromise a range of servers
using exploits or stolen credentials. The actor eventually found credentials to access file shares in
ESD and other parts of the network; and mapping directory structures. However the actor displays
no interest in file shares other than those in ESD. The file share in ESD is a temporary storage location
used by several business units, normally to facilitate the routine extraction and manipulation of data
such as finance and HR records.
The actor also starts to map out machines in ESD and locates servers housing the databases
underpinning ANU HR, finance, student administration and e-forms systems. Upon finding these
databases the actor tries repeatedly, and unsuccessfully, to access these systems. Late on
27 November the actor downloads source code for a bespoke toolset or malware; this code is
then compiled and run. The nature of this code is unknown as the actor wiped it and the compiled
executable after use. Executable files allow source code to run on a machine. Forensic evidence also
shows the extensive use of password cracking tools at this stage. The combination of the bespoke
code and password cracking is very likely to have been the mechanism for gaining access to the
above administrative databases or their host systems.
The actor then accessed the administrative databases directly using a commercial tool. This tool
allowed the actor to connect to several databases at once to search and extract records; and convert
them to PDF format. The PDFs were then sent to the compromised school machine one for extraction
from the ANU network.13
29 November−13 December 2018: clean-up operations and loss of attack station one.
As noted earlier, the actor displayed a very high degree of operational security and routinely erased
files and logs. One such clean up phase commenced on 29 November with the actor erasing files and
tools with logs packaged for exfiltration through school machine one, which itself was also subject to
clean up operations. It is believed that the actor was preparing attack station one for the next phase of
their campaign.
On 30 November the ANU implemented a routine firewall change. This cut the actor off from attack
station one. The actor immediately then initiated activity to try and get back on to attack station one or
to find another place in the network to resume operations. This activity continued until 13 December.
13 This machine was not used directly for research purposes and there is no indication that any local data was taken
from this machine.
21 December 2018: fourth spearphishing attempt and loss of attack station two.
The actor starts to target users with administrative access and sends 40 phishing emails to ANU staff
with privileged accounts. This email, entitled “New Planning for Information Technology Services”
used calendar information gained from the first spearphishing campaign.14 This phishing attempt
was successful in harvesting a handful of privileged accounts, but ANU IT staff detected the unusual
behaviour and were able to remove the new attack station from the network. At the time, however, this
activity was treated as an individual event, by ANU IT, rather than part of a broader campaign.
Prior to the loss of attack station two the actor was able to scan an Internet facing web server. This
formed the basis of a subsequent intrusion attempt in February 2019.
7
Key
The Onion Router
BitTorrent
(TOR) connection
Compromised
Credential Theft Infrastructure Targets Data Theft
Legacy email
infrastructure used
for spearphishing
(throughout campaign
except 9th Nov 2018)
Four spearphishing
attempts.
(9, 26, 29 Nov & ANU spam filter
21 Dec 2018) compromised to allow
spearphishing campaigns
(28 Nov 2018)
8 The Australian National University Incident report on the breach of The Australian National University’s administrative systems
Figure 2: Attack timeline
Spearphishing Compromise of Creation of virtual 2nd spearphishing 3rd spearphishing Attack station C2 intrusion
against senior legacy server machines on campaign campaign two created and and second
officer attack station one exfiltration resumes intrusion
attempt in
Feb 2019
9 Nov 12−14 Nov 16 Nov 20−21 Nov 22 Nov 23 Nov 25−27 Nov 27 Nov 29 Nov 29 Nov− 13−20 Dec 21 Dec 21 Dec−
13 Dec Mar ‘19
9 The Australian National University Incident report on the breach of The Australian National University’s administrative systems
P O S T N O T I F I C AT I O N E V E N T S
In the intervening two weeks between the detection of the breach and the public notification, ANU
detected repeated attempts to gain or possibly regain access to ESD. Investigations into the nature of
these attempts, which were blocked, are still ongoing at the time of this report. Within an hour of the
Vice-Chancellor’s notice informing the ANU community and public of the data breach on 4 June, the
ANU network was subject to a botnet attack. This attack was also successfully stopped by ANU.15 By
way of comparison the ANU blocks multiple intrusion attempts on a daily basis.
On the night of the 5 June 2019, ANU detected a probable attack against its spam filter and mail
gateway. This attack was not successful, however, given the spam filter was a target during the
November 2018 intrusion there is a strong possibility this was the second attempt by the actor to gain
access to the filter potentially in preparation for another cycle of phishing emails.
15 Botnet is a combination of the words robot and network. It refers to a logical grouping (or network) of compromised machines
(known as bots), each running malware designed to control it and working in concert to undertake a malicious mission.
The actor exhibited exceptional operational security during the campaign and left very little in the way
of forensic evidence. Logs, disk and file wipes were a recurrent feature of the campaign. The exception
was attack station one which the actor lost control of on 30 November. At this point, the actor was
part way through its clean-up cycle and as such was not able to fully erase all traces. It is the forensic
analysis of these traces that form much of the content of this report. Analysis of attack station one is
still underway at the time of this report.
The analysis of attack station one yielded several insights. The actor was able to, in several cases,
avoid detection by altering the signatures of more common malware used during the campaign. Also,
the malware and some tools were assembled inside the ANU network after a foothold had been
established. This meant that the downloaded individual components did not trigger the University’s
endpoint protection. There is also evidence of bespoke malware in the form of source code (compiled
within the network) used to gain access to ESD. The purpose of this code remains unknown, and no
forensic traces of it or the executable file which was compiled from the code have been found at the
time of this report.
Other software used by the actor included network session capture and mapping tools, bespoke
clean-up, JavaScript and PowerShell scripts as well as a proxy tool. The actor downloaded several
types of virtualisation software before selecting one and downloaded disk images for Windows XP and
Kali Linux. There is little evidence to suggest much use of Kali Linux.
The first phishing email was designed to be interaction-less and likely used some form of scripting.
It is assumed the actor anticipated a high degree of security awareness on the part of the intended
recipient. Unfortunately, a copy of this email was not recoverable, so further analysis is not possible.
Subsequent phishing attachments were designed to harvest credentials and used similar scripts. The
user opened the attached Word document and the credentials were sent to the remote server. All the
attachments in the second, third and fourth spear-phishing cycles used the same technique with the
credentials sent to the active attack station instead of the internet.
Due to the operational security and clean-up operations of the actor, it has not been possible to retrieve
copies of the files exfiltrated from the network. In some cases, there was enough forensic and log
data to ascertain file sizes. However, because these files were compressed and likely to have been
encrypted, it is difficult to infer what specific data sets was taken from the affected systems. However,
based on log analysis and known data volumes it is highly likely that the actor took much less than the
19 years’ worth of data first noted at the time of the breach announcement.
The actor’s use of a third-party tool to extract data directly from the underlying databases of our
administrative systems effectively bypassed application-level logging. Safeguards against this
happening again have been implemented.
Analysis of school machine one, through which most of the data was taken, is ongoing. However,
this machine has been subject to a range of erasure and clean-up techniques, so it is not possible to
identify precisely what data was taken at the time of writing.
11
L E S S O N S F R O M T H E AT TA C K
AND FOLLOW-UP ACTIONS
While, and in part because, the actor was operationally sophisticated and deliberate in their targeting,
there are several lessons for the University that have arisen from the data breach and have formed the
basis of a range of remediation and hardening measures. Below, personally identifiable information and
phishing awareness are called out for special attention, and the remainder are captured in Table One.
Phishing awareness
As noted throughout the timeline, phishing emails were a hallmark of the activities of the actor. The
social engineering which underpinned these emails highlights the vigilance needed to protect users
against this form of attack.16 Given the methods of the actor and the number of successfully phished
users, it is clear to us that more effort is required to help drive awareness and safe user behaviours
across the University community. ANU will focus significantly in this area as part of a broader
investment in security culture efforts under the auspices of its forthcoming strategic information security
strategy. Work has already commenced with awareness training for high-risk groups.
In addition to security culture, we have invested in stronger safeguards for our mail gateway and are
expediting the retirement of legacy mail systems. These measures have already resulted in better
technical protection for our mail users, and further investment will follow under the strategic program.
16 Social engineering is a form of deception used by threat actors to trick users into handing over credentials or other data
to gain unauthorised access to systems. It can involve using information about the user or their organisation in a carefully
crafted manner to successfully trick the user.
Legacy devices Incomplete identification of legacy and at-risk devices Discovery and remediation activities have commenced
on the ANU network. in high-risk areas of the network including the hardening
of devices and their access to the network. This will be
expanded significantly under the strategic information
security program over 2019 and 2020.
ESD data Information held in ESD represents a significant a risk Initial data protection measures have been deployed
protection to ANU and its community. Reducing the risk to the and a working group established to develop a
irreducible minimum and additional protective controls risk management strategy in-line with legislative
are essential. requirements. Implementation will occur under the
strategic information security program.
Legacy email Continued use of legacy email systems represents a Work has commenced on identifying residual legacy
significant risk to network security; and the primary mail email solutions and affected users. The ANU primary
gateway protection system requires a security review mail server has been significantly hardened and will
and potentially further hardening. gain further investment under the strategic information
security program over the course of 2019 and 2020.
Two-factor Two-factor authentication rollout needs to be Two-factor authentication has already been rolled out
authentication accelerated and legacy authentication removed to administrative users and high-risk systems. The
across all systems. scope and speed of deployment will be expanded and
accelerated throughout 2019 and 2020.
Firewall coverage Firewall coverage needs to be reviewed and re-validated Work has commenced on reviewing firewall coverage
for all parts of the network. with industry assistance.
Network Network segmentation, zoning and other network A range of network hardening measures has been
hardening hardening measures need to be expedited including the undertaken including segmentation of ESD. Future work
review and phasing out of publicly routable addresses. is being planned at the time of this report and will form
the basis of further uplift and network modernisation
under the strategic information security program.
Vulnerability Vulnerability and patch management initiatives need to Deployment of these systems commenced under
and patch be expedited. the tactical cyber program following the May 2018
management intrusion. The scope of this initiative has been
expanded and will continue under the strategic
information security program.
Simulation ANU responded quickly to the breach but ongoing The first exercise is scheduled under the strategic
exercises practice and simulation exercises are vital. security program in 2020.
13
APPENDIX
15
Appendix C: “planning” phishing email
MO_SCAPA190209