2022 - Unit42 - Incident Response Report
2022 - Unit42 - Incident Response Report
RESPONSE
REPORT
2022
INCIDENT RESPONSE REPORT
2022
Executive Summary 5
Table of
How Incident Response Data Can
01 7
Help Prevent Bad Days
Spotlight: Ransomware—
03 15
a Favorite Cash Cow for Cybercriminals
Methodology46
2
Foreword
When it comes to cybersecurity, if implemented appropriately, would
there is a risk to government, industry, serve to ensure governments have the
and individual citizens alike. The world’s visibility necessary to adequately respond
infrastructure, economy, and healthcare to incidents affecting critical services
are increasingly dependent on digital and infrastructure, and ensure industry
systems, making it even more critical partners can effectively collaborate to
to align strategies and resources to defend against these threats.
best mitigate the risks and threats we
are facing. In other cases, proposed rules would
enhance public disclosure of material
It is important to recognize that incidents by publicly traded companies,
cybersecurity is no longer the with a goal of ensuring boards and
responsibility of the few. It requires the company executives are appropriately
constant vigilance and efforts of everyone resourcing and implementing
throughout your organization. Because of cybersecurity policies and procedures
the far-reaching ripple effects an attack commensurate with that organization’s
can have across the digital ecosystem, risk. The ultimate goal would be to
we are seeing everyone, from boards improve an organization’s preparedness
to regulators, take a more active role, to withstand a cyberattack by ensuring
demanding greater transparency and executive-level oversight.
the continuous demonstration of an
organization’s preparedness to respond to In order to prepare, organizations must
the ever-evolving threat landscape. first understand what they are up against.
The “2022 Unit 42 Incident Response
A series of recent high-profile cyber Report” sheds light on the risks and
attacks has spurred governments threats that organizations are facing. It
across the globe to propose new laws provides insights into threat actors and
or regulations related to reporting their methods that can then be used to
significant cyber incidents, from the help organizations identify potential
United States to the European Union, gaps in their defenses and areas to focus
United Kingdom, Canada, Australia, India, on to improve their cybersecurity stance
and elsewhere. These requirements, going forward.
Ciaran Martin
Founder and former CEO of the United Kingdom’s
National Cyber Security Centre
70%
of incident response cases
SOC teams need to know where to
over the past twelve months were
focus defensive and network security ransomware and business email
efforts in a dynamic cyberthreat compromise (BEC).
77%
greatest security risks they face, and where
of intrusions are suspected to be
to prioritize scarce resources to reduce them. caused by three initial access vectors:
phishing, exploitation of known
Unit 42 has insights into hundreds of incident software vulnerabilities and brute-force
response cases, as well as global telemetry credential attacks—focused primarily
on remote desktop protocol (RDP).
and threat intelligence gathered at a large
scale, and we can use that to provide insights
into today’s cyberthreat landscape—and MORE THAN of positively identified vulnerabilities
87%
where it might be headed. fell into one of six major categories:
ProxyShell, Log4j, SonicWall,
Using a selection of over 600 incident ProxyLogon, Zoho ManageEngine
ADSelfService Plus and Fortinet.
response cases conducted over the past year,
we identified these key patterns and trends:
7
most targeted industries were
finance, professional and legal
services, manufacturing, healthcare,
high tech, and wholesale and retail.
50%
of targeted organizations
lacked multifactor authentication
on key internet-facing systems
such as corporate webmail, virtual
private network (VPN) solutions
and other remote access solutions.
Alongside these predictions, we offer strategies for how you can get ahead of these
future threats today.
In the pages that follow, we identify the top methods attackers used to gain initial
access, as well as details on what led to the incident or allowed it to escalate.
We provide an in-depth spotlight on several key incident types—ransomware,
business email compromise, and cloud incidents. Finally, we share our top
actionable recommendations for securing organizations based on our experience
helping clients.
Reading about incident response can be a You don’t have to wait until a bad day to get that
totally different experience. advice. We’ve gathered our top insights from hundreds
of recent cases and are sharing them here along with
You can do this at a much calmer moment, gaining key tips for prevention and preparedness. You may still
insights from what’s gone wrong in the larger world so need to call on incident response services one day –
you know how to prepare your organization—and, we threat actors can be determined and innovative.
hope, successfully prevent some of those bad days.
Our hope is that if you do, you’ll have some
For any type of incident response, the key questions peace of mind even if you’re having a bad day
remain the same: What did they do? How did they as you make that call.
do it? Did they take anything? When our experts ask
those questions, we learn what we need to help an If you apply the top recommendations we share here,
individual client, and we build up a body of knowledge you’ll know that you’ve made a strong start toward
about how threat actors operate and how they gain preparing your organization for today’s threat
access to systems. landscape. You’ll have an understanding of your
organization’s security posture so that if you do need
Our incident responders say there are key pieces of to respond to a critical security incident, you’ll come at
advice they give to almost every client about how that effort with a foundation of confidence. You’ll know
to recover from an incident and close security gaps that you’ve taken steps to limit the damage threat
moving forward. actors can do within your systems and put measures in
place to ease the recovery process.
Use the data in this report to help determine where This report includes many practical recommendations
to focus your resources. Pay close attention to What based on our incident responders’ on-the-
Attackers Are Going After in 2022 and Predictions: ground experiences. Start with our team’s top
Follow the Money, and use these views of the current recommendations—a set that is tailor-made to help
and future threat landscape to help you strategize prevent and mitigate many types of incidents that
about where your organization most needs protection. organizations commonly face. You’ll find them in the
section titled, If You Take Any Action to Protect Your
Sharing the report with your Board could help start and
Organization, Start With These Six Things.
support conversations about the resources you need to
properly protect your organization and the potential Once you’ve laid the foundation, move to the more
impact of a breach. You may benefit from spotlights on in-depth recommendations that follow the conclusion.
specific challenges, including ransomware, business These are grouped based on the incident types they’re
email compromise and cloud incidents—especially designed to address so you can focus your efforts on
if these are areas of particular concern for you or the issues that matter most to you and your leadership.
your board. Consider sharing the report with your
It may also benefit you to look closely at the sections
direct reports and security teams, too, so they can
on threat actor behavior. Seven Issues Threat Actors
evaluate and implement recommendations in the
Don’t Want You to Address covers the seven security
areas you prioritize.
gaps that we most commonly observed threat actors
However you decide to steer your team, it’s worth using to their advantage. What Threat Actors Do Once
taking a look at our incident responders’ top They’re Inside a Network includes our observations
recommendations: If You Take Any Action to Protect of threat actors’ most commonly used capabilities
Your Organization, Start With These Six Things. We after initial access. Both these sections can translate
recommend ensuring that your organization has to practical guidance on where to shore up your
these fundamentals covered since they would help organization’s defenses.
prevent and mitigate many types of incidents that
Consider sharing the report with your peers and
organizations commonly face.
leadership to coordinate your defense efforts and
obtain buy-in on key approaches to protecting
your organization.
Ransomware and BEC were the top attacks we responded to over vulnerabilities, already compromised
the past 12 months, accounting for approximately 70% of our systems, social engineering tactics,
etc.). Once deployed, the ransomware
incident response cases.
will encrypt the organization’s files
While these two attacks are the primary ways threat actors and render them unusable to the
can monetize illicit access to networks, attackers have and organization. The attacker demands
use additional strategies for financial gain. Threat actors have ransom, promising to provide a
increasingly paired extortion with encryption (sometimes decrypter and not further disclose the
client’s data or identity in exchange.
including added threats of informing customers or the press,
or conducting a distributed denial-of-service attack). Some
attackers focus on extortion alone. For example, 4% of our cases Business Email Compromise (BEC) is
involved extortion without encryption—a technique distinct a category of threat activity involving
from ransomware that can be simpler to execute. In these cases, sophisticated scams which target
attackers coerce organizations into paying by threatening the legitimate business email accounts
release of customers’ data. through social engineering (e.g.,
phishing) or other computer intrusion
Our incident responders and threat intelligence analysts note activities. Once businesses are
that extortion without encryption is likely to rise. The efficacy compromised, cybercriminals leverage
of extortion tactics has even led some prominent threat actors their access to initiate or redirect
associated with the Conti ransomware group to publicly state the transfer of business funds for
that they envision focusing their future efforts on attacking personal gain.
Insider Threat
Business Email Compromise (BEC) 5%
34%
Extortion –
No Encryption
4% Exposure
Investigation
1%
PCI Investigation
1%
Other Types
<1%
Other Digital Web App
Forensics Compromise
2% 1%
Attackers are looking for easy ways in. Remote Desktop Protocol (RDP) is
How do organizations
find out they’ve
Software
Vulnerabilities been compromised?
31%
Brute-force
Credential
Often, organizations notice an alert or
Attacks
9% find software that shouldn’t be installed,
signaling that something odd is going on
in the network.
Previously
6% Compromised
Credentials Other times, the threat actor reveals their
Log4Shell
On Dec. 9, 2021, a zero-day remote code immediately following public knowledge of the
execution (RCE) vulnerability in Apache Log4j vulnerability (Dec. 12-16), spikes of hits continued
2 was identified as being exploited in the wild. to take place throughout that entire period.
Public proof-of-concept (PoC) code was released
When we investigated what would have
and subsequent investigation revealed that
happened had the hits on our Threat Prevention
exploitation was incredibly easy to perform. What
signature been successful, we observed a wide
followed was a series of events that will go down
range of attempted activities: vulnerable server
in cybersecurity history.
identification via mass scanning, the installation
RCE vulnerabilities are often high severity of backdoors to exfiltrate sensitive information
because they allow an attacker to execute and to install additional tools, the installation
malicious code on a system, but this vulnerability of coin mining software for financial gain and
had a particularly far-reaching impact. Log4Shell many more.
was rated a 10 on the Common Vulnerability
Before long, incident response cases also began
Scoring System (CVSS)—the highest possible
to appear. Log4j accounts for 14% of cases where
score. And while Apache Log4j 2 may not have
responders positively identified the vulnerability
been a household name outside the technical
exploited by the threat actor—despite only being
community, the software underlies a large
public for a few months of the time
number of well-known services and systems.
period we studied.
Organizations all over the globe had
vulnerable systems (whether or not they
knew it), and mass scanning activities
seeking these vulnerable systems began “Log4Shell is not the first
almost immediately. vulnerability garnering
Unit 42 researchers monitored hits on significant public interest,
the Apache Log4j Remote Code Execution and it almost certainly won’t
Vulnerability Threat Prevention
be the last. That’s why it’s important to
signature, which allowed us to gain
visibility into exploitation attempts. look at Log4Shell both as a standalone
Between Dec. 10, 2021, and Feb. 2, 2022, vulnerability that demands discrete analysis
we observed almost 126 million hits
and reflection, and as the latest in a string
triggering the signature. While the
largest number of hits occurred in days
of national-level vulnerabilities that impact
federal systems, critical infrastructure, and
state and local networks alike.”
The top affected industries were finance, professional and legal services,
manufacturing, healthcare, high tech, and wholesale and retail. These
industries accounted for over 60% of our cases. Organizations within these
industries store, transmit and process high volumes of monetizable sensitive
information that attracts threat actors.
Finance
Professional &
Legal Services
Manufacturing
Healthcare
High Technology
Wholesale
& Retail
Education
Hospitality
0 10 20 30 40 50 60 70 80 90
RECORD COUNT
It sometimes seems as if every week brings new high-profile double extortion, occur when attackers
not only encrypt the files of an
headlines about multimillion dollar demands from threat
organization, but also name and shame
actors. The choice of targets has at times been disturbing,
the targets and/or threaten to launch
including hospitals and other organizations that people
additional attacks (e.g., distributed
depend on for the needs of daily life.
denial of service, known as DDoS) to
Ransomware can disrupt daily operations, causing encourage organizations to pay more
quickly. Many ransomware groups
significant headaches and financial pressure. Increasingly,
maintain dark web leak sites for the
affected organizations can also expect threat actors to use
purpose of double extortion.
double extortion, threatening to publicly release sensitive
information if a ransom isn’t paid.
Ransomware as a service (RaaS) is a
Cybercriminals have displayed innovation on the one
business for criminals, by criminals,
hand—introducing sophisticated attack tools, extortion with agreements that set the terms for
techniques, and marketing campaigns. On the other hand, providing ransomware to affiliates,
the RaaS business model has lowered the technical bar for often in exchange for monthly fees or
entry by making powerful tools accessible to wannabe cyber a percentage of ransoms paid. RaaS
extortionists with easy-to-use interfaces and online support. makes carrying out attacks that much
easier, lowering the barrier to entry for
What follows is a set of observations from our case data would-be threat actors and expanding
that highlight the impact that ransomware has had on the reach of ransomware. Unit 42 is
various industries. actively tracking at least 56 active
RaaS groups, some of which have been
operating since 2020. Due to the success
of these groups, we expect activity of
this type to continue to grow.
Ransom Demands
and Payments by Industry
Finance $7.96M
Manufacturing $1.63M
$1.5M
$1M
-60%
$0.5M
-74% -70%
-62%
-53% -51%
-85%
$0
High Manufacturing Transportation Wholesale Healthcare Professional &
& Logistics & Retail Finance Legal Services
Technology
Figure 7: When Ransom is Paid: Median Reduction from Initial Demand by Industry
• LockBit 2.0
• Phobos
Conti 22%
• Dharma
• BlackCat
Hive 8%
Sign up for notifications on new
Dharma 7% research about ransomware
groups and other threats.
PYSA 7%
Phobos 7%
For an in-depth ransomware
update and overview of
ALPHV / BlackCat 6%
ransomware threat actors
REvil 5% and their TTPs, refer to the
2022 Unit 42 Ransomware
BlackMatter 5% Threat Report 2022 or our
corresponding webinar.
Other Variants 18%
LockBit / LockBit /
LockBit 2.0 LockBit 2.0
Conti Conti
Hive Hive
BlackCat BlackCat
PYSA PYSA
Dharma Dharma
REvil REvil
BlackMatter BlackMatter
Phobos Phobos
LockBit / LockBit /
LockBit 2.0 LockBit 2.0
Conti Conti
Hive Hive
BlackCat BlackCat
PYSA PYSA
Dharma Dharma
REvil REvil
BlackMatter BlackMatter
Phobos Phobos
Manufacturing Education
LockBit / LockBit /
LockBit 2.0 LockBit 2.0
Conti Conti
Hive Hive
BlackCat BlackCat
PYSA PYSA
Dharma Dharma
REvil REvil
BlackMatter BlackMatter
Phobos Phobos
LockBit / LockBit /
LockBit 2.0 LockBit 2.0
Conti Conti
Hive Hive
BlackCat BlackCat
PYSA PYSA
Dharma Dharma
REvil REvil
BlackMatter BlackMatter
Phobos Phobos
LockBit / LockBit /
LockBit 2.0 LockBit 2.0
Conti Conti
Hive Hive
BlackCat BlackCat
PYSA PYSA
Dharma Dharma
REvil REvil
BlackMatter BlackMatter
Phobos Phobos
LockBit / LockBit /
LockBit 2.0 LockBit 2.0
Conti Conti
Hive Hive
BlackCat BlackCat
PYSA PYSA
Dharma Dharma
REvil REvil
BlackMatter BlackMatter
Phobos Phobos
Case Study
It was a typical day for our client, an executive with a U.S.
financial services firm that relies on a widely used MFA
mobile app to protect access to email, customer files, and Key Business Email Compromise Data
other sensitive data. His iPhone kept pinging him with Points From Unit 42 Investigations
MFA requests to access his email, interrupting him on a
day packed with customer meetings. He was annoyed by
the intrusion, figuring it was some kind of system error,
7-48 DAYS
Typical Dwell Time Prior to
and rejected each request so he could focus on work.
Containment
He thought it was over when the requests stopped. Months
38 DAYS
later, however, he learned he had fallen for an MFA fatigue
attack. He had mistakenly authorized one of those many
requests, unknowingly granting an attacker unfettered Median Dwell Time
access to his email. He learned about the compromise
when his bank flagged suspicious wire transfers totaling
nearly $1 million. Our investigation uncovered the
exposure of data belonging to the company, its employees,
$286,000
and clients.
Average Amount of
Successful Wire Fraud
Fortunately, the company was able to recover the stolen
funds, but attacks of this nature can still be costly in terms
of reputation—as well as the time and resources spent
cleaning up after them.
Techniques for business email compromise can vary. Some threat groups
gain access to targeted accounts through brute-force credential attacks,
for example. However, social engineering, including phishing, is often an
easy and cost-effective way to gain clandestine access while maintaining
a low risk of discovery.
SilverTerrier
Over the past half decade, Unit 42 has actively monitored the evolution of
business email compromise with a unique focus on threat actors based in
Nigeria, which we track under the name “SilverTerrier.”
While BEC is a global threat, our focus on Nigerian actors provides insights
into one of the largest subcultures of this activity, given the country’s
consistent ranking as one of the top hotspots for cybercrime. We have
compiled one of the most comprehensive data sets across the cybersecurity
industry, with over 170,700 samples of malware from over 2.26 million
phishing attacks, linked to roughly 540 distinct clusters of BEC activity.
How the Cloud Landscape Changes Ashlie Blanca, Unit 42 Consulting Director
Incident Response
Cloud environments are ever-changing. Instances
are spun up briefly to handle key workloads, and
the next day they no longer exist. Standard incident Case Study
response procedures, specific to data collection, An organization set up a cloud environment for
often aren’t as effective in cloud environments a short-term project. It was left exposed to the
because the cloud landscape is both dynamic and internet and misconfigured with a blank root
ephemeral, and cloud environments can be complex, password. A threat actor happened to find the asset
often using a variety of applications and tools that and came in, wiped the data, and left a ransom note.
may even be hosted across several different cloud
service providers (CSPs). This can create a challenge
in identifying the full scope.
Many customers appreciate the “plug and play” aspects of operating in the
cloud, and they operate trusting in the security controls afforded by major
CSPs, but that security breaks down when organizations don’t realize that
those security controls often need to be activated and properly configured.
Organizations are also responsible for identity and access management
(IAM)—setting and maintaining proper controls over who can do what in a
given cloud environment.
their goals.
Security alerts
EDR/XDR 5
2 In 11% of cases, organizations failed to
In 44% of cases, organizations did not have review/action security alerts.
an endpoint detection and response (EDR)
or extended detection and response (XDR)
Password security
security solution or it was not fully deployed
6
on the initially impacted systems to detect and In 7% of cases, weak password security
respond to malicious activities. practices contributed to threat actors’
ability to further their objectives
(e.g., default password, blank or
Patch management
3 empty password, easily guessed or
In 28% of cases, having poor patch management brute-forced password).
procedures contributed to threat actor
success. This refers to any time a non-zero-day
Misconfigurations
vulnerability was exploited by a threat actor 7
in any way and includes situations in which an In 7% of cases, system misconfiguration
exploit helped a threat actor at some point after was a contributing factor to the incident.
initial access. It does not include cases when
threat actors exploited a zero-day vulnerability
to gain access.
In many of these matters, organizations did do This advice also applies to old school
some of these things in many instances. But even antivirus for organizations that don’t
one gap is all an attacker needs to get a foothold into have EDR or XDR. Many threat actor
a victim’s environment. tools will be blocked by antivirus. It is
important to stay on top of what your
Likewise with EDR/XDR deployment, even in security tools are blocking so you can take
environments with broad coverage, there can be appropriate action.”
“shadow IT” (unmanaged or unauthorized) systems
John Percival, Unit 42 Consultant
in the environment with inadequate security controls,
or unsupported legacy systems with deficient
protections. Often companies are unaware of these
systems, and they can end up being contributing
factors to a cybersecurity incident.
50%
Therefore, one important step organizations can of organizations involved in breaches
take to improve defenses is to conduct a thorough lacked multifactor authentication on
inventory of what’s on the network and watch out key internet-facing systems.
Actors Do Once after initial compromise of a network. If you work closely with
the specifics of your organization’s systems, this list can help
They’re Inside you see what you most need to watch for. If you safeguard your
a Network
organization from a higher-level perspective, you can share
this list with your security team or use it to help you gain an
understanding of how threat actors typically behave once
they’re inside.
Once attackers gain access to
a network, they have certain Discovery
typical goals. For example,
This is a step attackers take to figure out what they can do
they might begin using tactics with the access they’ve gained. They’re essentially exploring
associated with discovery— a system and internal network to see what they can control,
gaining knowledge about what they can steal, what else they can attack, etc.
Lateral Movement
An attacker gains initial access to a specific part of a network. Similar
to opening doors to get from a foyer into other parts of a house, lateral
movement is the process attackers use to move into and control other
systems on a network. Doing this expands the impact an attacker can
have in a compromised environment.
Key Insight
Our incident responders sometimes find that threat actors have been
active in an environment for much longer than initially thought by
the client. In some cases, threat actors have been found to have been
active and moving laterally through an environment for a period of six
months or more.
Credential Harvesting
Credential harvesting is another way for attackers to gain access to
more resources or more sensitive information. It refers to methods
of stealing names and passwords. Like many other techniques here,
this expands access for the threat actor, which in turn expands the
potential impact of the breach.
Exfiltration
Exfiltration means stealing data. This is often where attackers
make their money. Once they steal data, they can sell it to interested
parties or extort the target by threatening to release it publicly.
affiliate programs could cause a flood of ransomware case, but the threat
wannabes. It’s also possible that nation-state actors they needed to deal with had
a broken chat portal and busted
recruitment of skilled threat actors could leave
infrastructure. This left no way
spots open for novices wishing to operate more
to communicate with the threat
pedestrian scams. Even unskilled attackers,
actors—or even to pay the ransom
however, could do damage to your organization if
demand should the client have
they’re able to breach your systems.
chosen to do so.
If global economic conditions worsen, more people may be Despite the low-tech approach, the
incentivized to try their hand at cybercrime. While this could group’s attacks and leaking of stolen
mean people with some technical skills looking to make a data can be damaging. We’ve also
quick buck during a hard time, it could also mean that people seen destructive Lapsus$ attacks
within organizations are more likely to explore potential deals where the actors gained access to an
These factors may combine with the prevalence of remote individuals between 16 and 21. Unit 42
and hybrid work—which can make it easier for insiders to researchers assisted law enforcement
with information on Lapsus$ threat
steal intellectual property. When working remotely for most
actors’ activities.
organizations, simply disconnecting from the VPN is sufficient for
preventing the organization from having insight into your traffic.
A company might block personal email and cloud storage sites, but
the employee can simply disconnect from the VPN and use their
home internet to access these resources from their work computer,
then copy company data to these personal locations.
acting as trusted advisors. We are always looking improves on the traditional password
authentication method by requiring
for opportunities to give back to the cybersecurity
two or more pieces of evidence for
community, and we often share key pieces of advice with
authentication—helping prevent
existing and future clients.
threat actors from being able to access
Our security consultants have compiled the list below a system with stolen passwords alone.
the organization, including requiring unique and • Passwords should include numbers.
complex passwords that are at least 15 characters in
• Passwords should include special characters.
length so they cannot be easily brute forced.
• Individuals should be educated about the dangers
• Implement a password management solution to of reusing passwords in multiple contexts.
enable employees to manage complex passwords
• Provide a password management solution to
more effectively.
enable employees to manage complex passwords
more effectively.
• Prevent the use of default accounts and passwords.
• Have an incident response and remediation • Upgrade from Server Message Block Version
plan: Incidents may occur despite best efforts, so 1 to limit adversaries from using the inherent
have a tested, comprehensive plan to ensure fast file sharing protocol to move laterally within
action should an incident occur. If you have cyber your systems.
insurance (recommended), be sure to integrate the
• Implement change control protocols that require
policy’s key processes and contacts into the plan.
review and sign-off on configuration changes.
• Follow a defense-in-depth approach,
• Disable administrative interfaces and access to
implementing safeguards at each layer of the
debugging tools for anyone whose job role does
web application stack. While the list can be long,
not require them.
it can include, for example, web application
firewalls, operating system hardening, • Configure servers to prevent unauthorized
application input controls (e.g., parameterization, access and directory listings. Enforce strong
validation), file integrity monitoring, least- access controls.
privileged user accounts for database access and
industry-standard encryption. • Configure security settings in your development
environment according to best practices.
• When implementing open source code, research
it to understand whether it has any published • Implement full-disk encryption for laptops and
vulnerabilities; only use code that is vetted removable devices. Also have a contingency plan
and patched. Code scanners may help identify to disable lost or stolen devices.
• Conduct regular web application/code reviews • Establish a DLP program responsible for
and annual penetration testing for all public- classifying and tagging data and providing alerts
facing infrastructure to search for vulnerabilities; when sensitive or other company-identified
follow remediation recommendations. relevant information is leaving the organization.
• Run periodic scans that include configuration • Should an employee be terminated, act quickly
checks and perform regular system audits to to revoke their access (e.g., active sessions,
detect misconfigurations. Open source scanning tokens, accounts, MFA devices and rotating
tools are available to help. For example, there are credentials), and then verify that access has been
open source tools to identify leaked information revoked. Ensure you preserve their system and
from misconfigured IAM or find vulnerabilities data in case an investigation is needed. Coupling
during build-time in infrastructure as code. account revocation processes with HR processes
can help ensure these steps are not overlooked
during the termination process.
• Tailor web-based modules customized to • Leverage email security solutions that scan
individual groups pertinent to their roles attachments and message contents as well as
and how they may be specifically targeted so assess sender reputation.
employees can better spot and avoid tactics that
may be used against them.
• Create custom retention tags for email that: automatically move older
items to archive; delete items older than a certain age (e.g., five years); and
permanently delete items no longer needed (e.g., those older than seven
years) from both primary and archive mailboxes. Keep in mind, however,
that archival policies should align with compliance requirements.
• Configure and enable a DLP solution to prevent users from accidentally (or
intentionally) sharing sensitive information.
The Unit 42 Incident Response team is available 24/7, year-round. If you have cyber
insurance, you can request Unit 42 by name. You can also take preventive steps by
requesting any of our cyber risk management services.
Define Fully understand the Contain and Findings and response Improve your
engagement scope incident eradicate assistance security posture
Assess the breadth, Our experts use We remove the threat Get a detailed investigation Use lessons learned
severity and nature of advanced tools for with custom eradication report as well as guidance and apply specific
the security incident. evidence collection, strategies and provide in implementing additional improvements to your
detection and analysis 24/7 monitoring against security controls while you security approach to
to flag IoCs, TTPs and new malicious activity. get back on your feet. protect against future
other clues. and similar attacks.
THREAT INTELLIGENCE
Palo Alto Networks has shared these findings, including file samples
and indicators of compromise, with our fellow Cyber Threat Alliance
members. CTA members use this intelligence to rapidly deploy
protections to their customers and systematically disrupt malicious
cyber actors. Visit the Cyber Threat Alliance for more information.
About Unit 42
Palo Alto Networks Unit 42 brings together world-renowned threat
researchers, elite incident responders and expert security consultants
to create an intelligence-driven, response-ready organization
that’s passionate about helping you proactively manage cyber risk.
Together, our team serves as your trusted advisor to help assess
and test your security controls against the right threats, transform
your security strategy with a threat-informed approach and respond
to incidents in record time so that you get back to business faster.
Visit paloaltonetworks.com/unit42.
PREVENT
Secure Access and Minimize Recommended products
DETECT
Detect Threats in Real Time Recommended products
Cortex XDR
To safeguard any enterprise, detecting and
WildFire
blocking exploits and evasive attacks with swift
resolution is essential. Cortex XDR® uses machine
learning to profile behavior and detect anomalies
indicative of attack. WildFire® utilizes near
real-time analysis to detect previously unseen,
targeted malware and advanced persistent
threats, keeping your organization protected.
Palo Alto Networks helps ensure that all cloud Cloud Workload Protection
infrastructure, Kubernetes, and container images Cloud Code Security
are securely configured, and steps have been Cloud Network Security
taken to minimize vulnerabilities by:
• Segmenting services.
RESPOND
Stop Lateral Movement and Data Leakage Recommended products
Advanced Threat Prevention
Threat actors, including ransomware actors, must establish
DNS Security
command-and-control and will then typically move laterally
Enterprise Data Loss Prevention
after initial exploitation,. Acting on objectives will often end in
sensitive data extraction. Palo Alto Networks: Identity-Based Microsegmentation
Consider implementing tools that support the automated XSOAR Ransomware Playbooks
remediation of events that leverage pre-made playbooks to XSOAR Marketplace contains many
other playbooks related to incident
respond and recover from incidents.
types discussed in this report.
Main: +1.408.753.4000
Sales: +1.866.320.4788
Support: +1.866.898.9087
www.paloaltonetworks.com
© 2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found
at https://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective
companies. 2022 Unit 42 Incident Response Report 07/2022