Lec 14
Lec 14
• Blackhole Feature: Enable the Blackhole feature on the web application to drop requests from the same source after a
limit.
• Blacklist IPs: Blacklist or block single IPs if the attack seems to originate from them.
DoS:
• Increase Server Capacity: Upgrade server capacity to handle more connections and deter low-and-slow attacks.
• Use Anti-DDoS Services: Employ services like CloudFlare for DDoS protection and maintaining web application availability.
• Manage Authenticated User Load: Define limits for authenticated users' load on the web app and terminate old requests
for new ones.
Filtering:
• Filter Traffic with Special Routers: Use routers to filter legitimate traffic from incoming ones, based on protocols and
patterns.
• Traffic Flow Restriction: Restrict traffic flow from compromised systems and networks.
• Use Web Application Firewall (WAF): Deploy WAF to monitor and block potential threats.
• Enable Egress Filtering: Restrict traffic flow from compromised systems using egress filtering.
Containment
Negotiate with Attackers: Negotiate with attackers in certain incidents to buy time
Negotiate for management approvals and minimize data loss.
Regular Malware Scans: Perform malware and virus scans, delete browser cookies
Perform regularly.
Whitelisting/Blacklisting
Proxy Servers
Whitelisting/Blacklisting
An application whitelist is a list of authorized applications that are
legitimate and safe to be present and active on a computer in an
organization.
The main aim of web content filtering is to restrict the use of web
applications that are unsafe if they are run or executed on the system.
There are several advantages of using proxy servers as they provide a high level of privacy and
protect the users and the organizational network from any harm from malicious activities.
Incident handlers should use proxy servers in order to filter the web traffic either explicitly and
transparently.
Proxy
Servers:
Tools
Eradication
Eradication
Configure firewall, IDS, and Identify the compromised Use the cleaned, verified,
Change the administrative other security solutions to user accounts from the web and patched backup
passwords of all the detect the identified attack server and remove those version of the web
devices and resources. using signatures and accounts after informing application to restore the
behavior analysis. the users. services.
Data Encryption
• The organization should encrypt its data at all levels: at rest, in motion, and in
use.
Recovering
Developing a data backup plan requires the investment of time and money but it is
far better than burden of recreating data. The main primary task is to understand
what data is to back up and protect. As a part of data backup plan, determine the
following:
•What data to back up?
•Which compression method to use?
•How often backup needs to run?
•What type of backups to run?
•What kind of media to use for backup?
•Where to store backup data to keep it secure?
Responding to Malware Incidents
Containment
Incident responder must In case the malware has
simultaneously gather and compromised multiple systems,
After confirming the presence of
analyze network logs of the you must cut the network
malware, separate the
system to find the events of services of these systems and
compromised host from the
malware propagation through prioritize them according to the
operational network.
shared files and connected importance of the affected host
systems. for business continuity.
• An incident responder can also use blacklisting technique to block malware from
executing.
• This method is applicable even if the responder did not receive malware signatures
from the vendor.
• For this, the incident responder can simply enter the names of the files that should
not be executed into operating systems, host based IPS products, and other security
tools in the network.
• Antivirus tools can quarantine and contain existing malware but may not be much
effective in case of new malware. An incident responder should hence update the
antivirus software with the latest signatures.
Antivirus Tools
Eradication • A responder may eradicate malware by cleaning with antivirus, quarantining with
antivirus software, using malware removal tools, through manual intervention,
vulnerability management technologies, and using network access control software.
An organization may also use automated eradication methods, such as triggering
antivirus scans remotely.
• To remove the binaries and the related registry entries, the responders should run a
full antivirus scan. For this they should use an antivirus software that contains
updated signatures. An incident responder may also run an online antivirus scan or
make use of best practices that antivirus vendors suggest.
• Responders should remember that while eradicating sophisticated malware,
rebuilding the system from is the safest approach. An incident responder can rebuild
the system from a trusted source, such as system installation disk or a clean system
image.
Eradication
• Update the malware databases in the organization with the signatures of newly found malware and, also report the
same to the malware vendors and antivirus developers. Save the signatures in the form of Hashes for future reference of
organization as well as the public recognition.
Fixing Devices
• Once the IRT team detects the vulnerability on their network that the malware has exploited, it must address them on
the other systems in the network as well. Some examples are security misconfigurations, which an incident responder
can rectify by implementing proper access controls, or vulnerabilities in shared drives, that a responder can update or
stop their usage to contain the attack.
Manual Scan
• Run a full scan of the compromised system with an updated antivirus program to remove the malicious codes, binaries,
related registry entries, scheduled tasks and other files and folders related to the malware. Recheck the recovered
devices for traces of malware before introducing it to the functional network.
Recovery