The Lumu Data Exfiltration Incident Response Playbook is based on the Computer Security Incident Handling Guide by the National Institute of Standards and Technology (NIST). According to NIST special publication 800-61, the incident response life cycle has four main phases, as described in the following illustration.
This document contains guidelines for Data Exfiltration incident response using Lumu. Consider this playbook as a guideline to improve the effectiveness of the incident response and adapt it according to your specific requirements.
Lumu is capable of detecting Data Exfiltration activity targeting your organization's sensitive data. Today, many ransomware groups utilize a double extortion method where they exfiltrate data before encrypting it; if they cannot encrypt the data, they threaten to disclose it to collect payment.
Most modern attack chains utilize Living off the Land (LotL) techniques, which involve using legitimate binaries, drivers, or programs for malicious purposes. A primary example is Rclone, a program designed for backups that is compatible with over 70 different cloud storage providers. Attackers use these legitimate tools and scripts to exfiltrate information to common cloud infrastructures like Mega or Dropbox because these connections often do not raise suspicion in corporate environments.
By identifying Data Exfiltration incidents, Lumu helps your organization gain insight into:
The data used to identify this type of incident includes:
In this article, you will find a general playbook to operate Data Exfiltration incidents alongside an example scenario.
This is the general playbook for Data Exfiltration incident operation. It covers the main steps that you can take when investigating and remediating this type of incident.
Now, let’s delve into a common scenario that an organization can find when operating Data Exfiltration incidents. This will help exemplify the value this feature can provide.
Let’s consider a scenario where Lumu notifies your organization that a specific endpoint is sending a high volume of outbound traffic that deviates from the company's baseline triggering the Data Exfiltration detection. To resolve the incident, the analyst starts to investigate to determine the 2 potential paths for this attack.
1. Organization A gets notified of a Data Exfiltration incident. By inspecting the incident, the analysts in charge will be able to access its details to learn more relevant information about the incident, as well as additional context to better operate it.
2. After analysis of the information of the incident, they notice the data is being transferred to an authorized cloud service; however, Lumu still notified the incident as the amount of data being transferred is highly anomalous for the organization’s standards while also being done at unusual hours for it to be a normal operation which raises the alert.
3. Since it is an authorized cloud service, the analysts cannot directly block the connection via firewall as it will affect the normal operations of the organization.
4. After verifying whether the endpoint has the required permission to perform this type of activity, the analysts contact the owner of the asset to verify if this data transfer was done intentionally or was in fact an attack to the organization.
If the data transfer was intentional, for operations like a sporadic backup, the analysts document the information and close the incident.
5. Having determined that it is in fact a Data Exfiltration incident, the analysts immediately contain the asset involved in the incident to prevent any further data exfiltration.
6. Once the immediate risk has been contained, analysts start investigating the root cause of this incident by correlating the endpoint with previous incidents reported, such as an Unusual Login or a Malware or Phishing incident, as this will indicate the initial stages of the attack.
7. After a thorough analysis of the asset, the security team eliminates the malicious binaries and configuration files that were causing the unauthorized connections. Then, they perform an account compromise verification to discard lateral movement. If any account compromise is identified, an account reset must be executed, and if there is lateral movement, the investigation must continue up to the compromised devices to carry out the same measures.
8. Once analysts have remediated the incident, they document their findings and keep the asset under surveillance for any additional contacts with unauthorized cloud storage APIs or signs of re-infection, ensuring that the threat has been completely eradicated.
9. Lastly, the security team makes an investigation to identify the data that has been exfiltrated to respond accordingly.
1. Organization A gets notified of a Data Exfiltration incident. By inspecting the incident, the analysts in charge will be able to access its details to learn more relevant information about the incident, as well as additional context to better operate it.
2. Now the analysts check the cloud to which the data is being sent to verify whether the data transfer is legitimate and notices the cloud is not included within the authorized clouds of the organization.
3. Having determined that this a clear exfiltration of data to an unauthorized cloud, the analysts immediately block the IP to which the data is being sent and start the containment measures with the asset that is being affected to prevent further incidents.
4. Then, the analysts start a thorough investigation to determine the cause of the incident. During their investigation, they notice the asset was involved in a previous incident.
5. Noticing that during the previous incident the machine has been previously infected, the analysts manage to eliminate the malicious binaries and configuration files that were causing the incident. Then, they perform an account compromise verification to discard lateral movement. If any account compromise is identified, an account reset must be executed, and if there is lateral movement, the investigation must continue up to the compromised devices to carry out the same measures.
6. Once analysts have remediated the incident, they document their findings and keep the asset under surveillance for any additional contacts with unauthorized cloud storage APIs or signs of re-infection, ensuring that the threat has been completely eradicated.
7. Lastly, the security team makes an investigation to identify the data that has been exfiltrated to respond accordingly.
This is the initial phase where organizations take preventive measures to respond effectively to incidents, some recommended steps to prepare your company to deal with a Data Exfiltration incident are listed below:
Lumu provides the ability to illuminate the blind spots in your network by providing coverage of your entire infrastructure, namely on-premises, public and private clouds, and roaming devices.
Organizations should prioritize rapid incident detection and validation to enable effective containment and eradication. Early detection limits the spread of infection and simplifies the response process. During this phase, security teams monitor and analyze alerts and data from systems, networks, and logs to identify potential incidents, understand the threat's scope, impact, and potential source, assess its severity, and gather forensic information. Proper documentation and communication are essential for successful incident response.
Some steps are listed below:
Lumu unlocks the value of your own network metadata by implementing the concept of Continuous Compromise Assessment that provides comprehensive and detailed visibility into your network infrastructure. Lumu illuminates the various activities associated with indicators of compromise (IoCs) detected on your network and provides all the contextual information needed for in-depth analysis through the Lumu Portal.
This phase has two key goals: stopping the spread of the threat and preventing further damage within the network. Organizations should implement strategies and procedures based on the risk level of the detected compromise. Containment strategies will vary depending on the type of incident and must consider potential damage or theft of resources, the need for evidence preservation, service availability, and the time and resources required for effective response.
Below are some steps to follow in this phase:
Confirmed compromise intelligence about the compromised device helps security analysts to understand where and how to contain and eradicate the compromise.
This phase is designed to incorporate the lessons learned from each incident and to evaluate future improvements.
Lumu helps refine your current and future defense and response by continuously monitoring that the compromise has been eradicated.