Safebreach Labs has updated the Hacker's Playbook™ with simulations for a new US-CERT Alert TA17-293A, updated October 21, 2017.
Thanks to the depth of the Hacker's Playbook™, many of the phases of this multi-stage attack campaign have already been simulated. This means that existing SafeBreach customers who have run these simulations and remediated to protect against them can be confident that their existing security controls will alert and protect against this new campaign — for example: secure web gateway, malware sandbox, IPS/IDS, next-generation firewalls, and endpoint security. As always, SafeBreach Labs will continue to monitor the situation, and develop new simulations as necessary.
This alert, related to the ongoing Dragonfly campaign, is classified as a series of advanced persistent threat (APT) actions targeting government entities and organizations in the energy, nuclear, water, aviation, and critical manufacturing sectors. However, SafeBreach recommends all industries and businesses simulate this attack to identify whether or not they can be compromised, and then take action to prevent this APT campaign.
To assess security control effectiveness against techniques involved in US-CERT Alert TA17-293A, the SafeBreach Breach and Attack Simulation Platform specifically tests the following endpoint and network security controls:
Newly Added Playbook Methods
Playbook #1390: SMB - Shares Connection Attempts
Playbook #1391 - Network transfer of attack tools
Playbook #1393 - Local installation of attack tools
Already Existing Playbook Methods
Playbook #268: Passing malicious Windows Shortcut (LNK) via HTTP/S
Playbook #1269: Windows - Scheduled task creation
Playbook #1342: PowerShell - Get Periodic Screenshot and Zip
Additional breach methods added recently include:
The Safebreach Hacker's Playbook™ of breach methods simulates these breach scenarios, and thousands more, without impacting users or infrastructure. Breach methods are constantly updated by SafeBreach Labs, our team of offensive security researchers, to help keep customers ahead of attacks.