|
| 1 | +Lateral Movement - Pass the Hash |
| 2 | + |
| 3 | +**(P) Preparation** |
| 4 | + |
| 5 | +1. Patch asset vulnerabilities |
| 6 | +2. Perform routine inspections of controls/weapons |
| 7 | +3. Ensure Antivirus/Endpoint Protection software is installed on workstations |
| 8 | +4. Ensure that servers and workstations are logging to a central location |
| 9 | +5. Network segmentation and firewalls can help reduce impact |
| 10 | +6. Disable NTLM authentication where possible |
| 11 | + a. SMB |
| 12 | + b. HTTP |
| 13 | + c. SMTP |
| 14 | + |
| 15 | +**(I) Identification** |
| 16 | + |
| 17 | +1. Monitor for: |
| 18 | + a. Unusual user activity |
| 19 | + b. Unexpected logins using NTLM |
| 20 | +2. Investigate and clear ALL alerts associated with the impacted assets |
| 21 | + |
| 22 | +**(C) Containment** |
| 23 | + |
| 24 | +1. Inventory (enumerate & assess) |
| 25 | +2. Detect | Deny | Disrupt | Degrade | Deceive | Destroy |
| 26 | +3. Observe -> Orient -> Decide -> Act |
| 27 | +4. Issue perimeter enforcement for known threat actor locations |
| 28 | +5. Lock accounts suspected of having a compromised hash |
| 29 | +6. Systems believed to have malware on them should be removed from the network |
| 30 | + |
| 31 | +**(E) Eradication** |
| 32 | + |
| 33 | +1. Close the attack vector |
| 34 | +2. Patch asset vulnerabilities |
| 35 | +3. Perform Endpoint/AV scans on the systems of affected users |
| 36 | +4. Review logs to identify other potential cases of passing the hash |
| 37 | + |
| 38 | +**(R) Recovery** |
| 39 | + |
| 40 | +1. Restore to the RPO within the RTO |
| 41 | +2. Address collateral damage |
| 42 | +3. Change the passwords of any potentially compromised accounts |
| 43 | +4. Determine the chain of events that led to the pass the hash incident |
| 44 | +5. Resolve any related security incidents |
| 45 | + |
| 46 | +**(L) Lessons/Opportunities** |
| 47 | + |
| 48 | +1. Perform routine cyber hygiene due diligence |
| 49 | +2. Engage external cybersecurity-as-a-service providers and response professionals |
| 50 | + |
| 51 | +**References:** |
| 52 | + |
| 53 | +1. MITRE ATT&CK Technique T1550 Sub-technique 002: https://attack.mitre.org/techniques/T1550/002/ |
0 commit comments