This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "I've Been Hacked-What Now"

From OWASP
Jump to: navigation, search
Line 55: Line 55:
 
** Evidence of insider threat with identified motivation by salaried employees or contractors
 
** Evidence of insider threat with identified motivation by salaried employees or contractors
  
== Containment ==
+
== Containment ==
  
 
Containment should be broken into proactive and reactive methods.  
 
Containment should be broken into proactive and reactive methods.  
Line 72: Line 72:
 
*No communications should be allowed between the DMZ segments and the internal company network.  
 
*No communications should be allowed between the DMZ segments and the internal company network.  
 
*If database information is required, do so in scheduled DTS packages that are strickly filtered and scrutinized on the internal network.
 
*If database information is required, do so in scheduled DTS packages that are strickly filtered and scrutinized on the internal network.
 +
 +
=== Reactive Methods ===
 +
 +
Assuming your proactive methods are in place, you simply need to identify the point of entry, restore the server and applications and close the vulnerability that lead to the compromise. <br>
 +
 +
In a scenario where your WA is not properly segmented, you'll need to identify the system where the entry point exists and isolate that system. This is typically the point that some rudamentery forensics is required in order to determine the scope of the breach, time exposed, and other details. This is discussed in more detail in the forensics section.
 +
 +
Depending on your research, you may find that attempts were made to expand the level of the breach. In this case, you'll need to quickly determine an area of effect. This type of "hacking triage" can be performed by analyzing paths in the network that the attacker most likely took. This can be difficult depending on the network design. The best point to make this evaluation is at the egress point of the network. If out-bound web traffic is proxied, then proxy logs would be a great place to start. Egress firewall logs, IDS logs, and any other type of outbound traffic analysis will provide the most detail. This should provide you a list of compromised machines that you can address quickly.
 +
 +
This is also the point where you, your legal team, and your organizations leadership will need to make a few critical decisions:
 +
 +
*Does this breach require customer/FED notification (typically when it involves regulated data such as PII)
 +
*Do you want to pursue legal prosecution of the attacker? If so, evidence collection should be the next priority above containing the breach.
 +
*Put your hands on your recovery plan, and make sure anything required within is accessible
  
 
==Evidence Collection==
 
==Evidence Collection==

Revision as of 02:53, 6 January 2010

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.


My server has been hacked...what do I do now?

This page will offer suggestions and resources for identifying and eliminating threats to your web servers/applications after a suspected attack.

Anyone interested in contributing is welcome.


Identification

Basic principles:

  • Incident identification/notification may occur from a number of information sources (events):
    • Staff reporting unusual activity
    • Staff, clients or public reporting a problem
    • Technical teams/support discovering evidence of an incident on systems.
    • Alerts from IDS, security monitoring systems or anti-virus software, Firewalls or WAFS.
  • Roles:
    • A Security incident owner must be assigned.
    • A point of contact must be available to respond to incidents at all times.
    • A security incident owner must track the security incident to remediation and resolution.


  • Examples of an incident:
    • Virus/malware infection
    • Unauthorized system changes
    • Unauthorized application/web site changes
    • Unauthorized disclosure of client information or information leakage
    • Theft or loss of company information/assets
  • Examples of an event:
    • Reports from intrusion detection system/WAF/Firewall or log scraping system
    • Reports from vulnerability scanning/traffic monitoring/performance monitoring

Assessment

Incident severity :

Risk Rating

  • Low:
    • Events that cannot be 100% identified as attacks and have no effect on operations;
    • False activation of intrusion detection systems, WAF alerts etc
    • Non-repeated scans or probing from an external uncontrolled network
  • Medium
    • Incidents that have no negative impact on operations. Incidents identified but unsuccessful in an attempt to actively breach information security controls from external or internal standpoint
    • Repeated active probing or parameter manipulation from an external or internal source.
    • Malware/rogue code/virus that has been successfully contained or removed
  • High
    • Incidents that have major impact to operations or corporate branding
    • Evidence of insider threat with identified motivation by salaried employees or contractors

Containment

Containment should be broken into proactive and reactive methods.


Proactive Methods

These are methods to be used in anticipation of a Web Application server compromise. Web applications have, by comparison to other server types, a much larger attack surface. This is typically because of the fact that by nature they are meant to be internet accessible and require anonymous access in order to be functional. Part of being proactive is segmentation of functions. Your web server should be separate from your application server and separate from your database server. Each tier should be divided by firewalls that only allow the necessary protocols and ports between each tier. In addition, accounts used to communicate between tiers of your web application (WA) should be implemented using the least-privelege method 1.

Additional notes:

  • All tiers of the WA should be behind firewalls with egress filtering enabled.
  • Your web server should never speak directly to your database server.
  • All communications should be filtered by a reverse proxy when possible.
  • No communications should be allowed between the DMZ segments and the internal company network.
  • If database information is required, do so in scheduled DTS packages that are strickly filtered and scrutinized on the internal network.

Reactive Methods

Assuming your proactive methods are in place, you simply need to identify the point of entry, restore the server and applications and close the vulnerability that lead to the compromise.

In a scenario where your WA is not properly segmented, you'll need to identify the system where the entry point exists and isolate that system. This is typically the point that some rudamentery forensics is required in order to determine the scope of the breach, time exposed, and other details. This is discussed in more detail in the forensics section.

Depending on your research, you may find that attempts were made to expand the level of the breach. In this case, you'll need to quickly determine an area of effect. This type of "hacking triage" can be performed by analyzing paths in the network that the attacker most likely took. This can be difficult depending on the network design. The best point to make this evaluation is at the egress point of the network. If out-bound web traffic is proxied, then proxy logs would be a great place to start. Egress firewall logs, IDS logs, and any other type of outbound traffic analysis will provide the most detail. This should provide you a list of compromised machines that you can address quickly.

This is also the point where you, your legal team, and your organizations leadership will need to make a few critical decisions:

  • Does this breach require customer/FED notification (typically when it involves regulated data such as PII)
  • Do you want to pursue legal prosecution of the attacker? If so, evidence collection should be the next priority above containing the breach.
  • Put your hands on your recovery plan, and make sure anything required within is accessible

Evidence Collection

Forensic Analysis

Investigation

Incident Follow-up

Lessons Learned

Event Correlation and Aggregation (Streamlining)

External Resources

Questions to Ask

  • Was card data compromised?
  • Do you need professional legal advice?