These are the different roles in the cybersecurity field. Each one of the colors is a general domain, and each of the bubbles a specialist. You will probably develop your career moving from bubble to bubble, and occasionaly from domain to domain.
These are the main domains in cybersecurity: - Defense, avoiding the bad guys to enter the premises - Firefighters, fixing things when things go down - Reactive, or forensic analysists. They act after a security incident - Hacking, to find vulnerabilities, test the security of the system or learn about new things - Engineers, to develop the security systems - Management roles
This is a typical organigram for the cybersecurity departments of a big company The CISO (Chief Information Security Officer) is the main responsible of the cybersec in an organization. It can report directly to the CEO (general manager of the company) or to the CIO (Chief Information Officer, he/she manages all other aspects of the information technologies) Check: https://blogs.cisco.com/security/should-the-ciso-report-to-the-cio Many companies cannot afford to have dedicated departments, and some of these are oursourced. For example, it is common outsourcing the Security Operations Center, the Incident Management and the Red Teams, specialy if cyber is not your core business.
There are several "sub-roles" inside the blue team: - Security Office Center tier 1: monitor systems and respond to common security events - SOC tier 2: respond to exceptional security events - SOC tier 3: configure alarms, filter data... - Threat intelligence: learn about current attacks and check if your company has the defenses against them - Define alarms and playbooks They are usually the security department of a company, in the IT department, and they work on-premises. Large companies are starting to outsource the monitoring of the security systems, and the SOC (i.e., "the monitoring") is run by an external entity. Skills: reading, detailed-oriented, kwowledge about a security product. No coding required!
Incident responders act when an intrusion is confirmed. You have seen this many times in movies: https://www.youtube.com/watch?v=msX4oAXpvUE They must identify: - which systems were affected. It is not an easy task. For example, during a ransomware, the entry point used by the attackers is probably NOT encrypted. - the attackers usually leave "persistence mechanisms" to be able to enter the company again after the incident - is there information leak apart from the ransomware? Notice: when an incident responder acts, the security systems already failed. Firewalls, antiviruses... they are of little use. The tools and skills they use are different. The Incident Response team is nearly always externalized, outsourced to a specialized company Skills: very good communication skills and cold blood
You have seem this many times in movies: https://www.youtube.com/watch?v=Vxq9yj2pVWk A forensic analysts: - investigates some special security events that the SOC cannot decide if there was an intrusion or not. For example, there is some logon attempts from the machine used by the company CEO and monitoring is not enough. The antivirus does not say something. Is is compromised? - Identify the identity of the bad guys. Can we prosecute them? Did they receive assistance from someone inside? - Act as Expert Witness in a trial Forensics analysts check very carefully a security event. Time is usually not important to them. Forensic analysts, specially if they must act as Expert Witness, are external to a company
El ransomware es uno de los mayores peligros para una compañía, y también uno de los ataques más lucrativos... ...hasta 2020. Enseguida veremos qué pasó en 2020 y cómo respondieron los atacantes
The attackers are well known, wealthy and they do not hide themselves. They say the plate on that automobile says, in Russian, "THIEF"
Notice: - The group is perfectly identified - The group has been active for 10 years - They are suspected to be supported by the Chinese goverments - This is APT 41... and that implies that there are at least other 40 identified groups! Check the link to MITRE, they have the list of other groups and their methods and techniques
- Hay mafias perfectamente organizadas detrás del ransomware y está totalmente profesionalizado - OJO: está tan profesionalizado que si pagas, es MUY PROBABLE que recuperes tus archivos - OJO2: si un atacante no recupera sus archivos, enseguida se correrá la voz y "el mayorista" tomaría el control Por ejemplo: nosotros hemos detectado el "modus operandi" asociado a APT41 varias veces. ¡Pero eso no significa que haya sido APT41! Varios grupos pueden estar usando el mismo software, o el mismo manual, o APT41 puede estar colaborando con otros grupos (es habitual: APT41 espía, luego vende el acceso a otros grupos que plantan ransomware)
Fijaos que no hay tantas variantes de ransomware: solo unas pocas familias. Fijas también en que cambian muy rápidamente: de las 10 variantes más usadas, 5 han aparecido en los últimos 3 meses y otras 5 han desaparecido. Es un mundo que cambia MUY RAPIDAMENTE ¿Cómo es que hay tan pocas variantes de ransomware?
En la imagen hay una parte de los manuales, traducidos al inglés. El material original tiene los manuales solo en ruso. No hace falta un gran conocimiento técnico para llevar a cabo un ataque de ransomware: puedes comprar el malware y los manuales detallados, y ofrecen un "servicio técnico de cibercriminales" para ayudarte a usarlo. Luego, desarrolladores y atacantes van a medias. Fíjate: de esta manera, un desarrollador de ransomware no se expone y es poco probable que se le pueda detener algún día.
Ejemplo de una página web de un grupo de atacantes que ha tenido mucho éxito durante 2021: Babyk/Babuk. Aquí se pueden ver sus últimos ataques con éxito y la amenaza de publicar los datos robrados. Estos grupos tienen páginas en la dark web que son visitable con Tor o similares - Los investigadors conocen estas páginas - Los grupos de atacantes conocen estas páginas - Si tu información está ahí, es necesario darla como comprometida - En enlace propuesto https://www.ransomwatch.org/ (gestionado por investigadores de seguridad) hace capturas periódicas de las páginas de muchos grupos conocidos que tienen sus páginas en .onion - Podéis encontrar "List of ransomware groups" en varios sitios. Los enlaces dejan de funcionar a menudo
Image: https://s3-us-west-2.amazonaws.com/courses-images-archive-read-only/wp-content/uploads/sites/1110/2016/02/19004252/Critical_Thinking_Infographic-e1345139343418.jpg
Dado que los atacantes han visto que se reducen sus ganancias porque las empresas están usando sus backups... Han decidido que harán extorsión con los datos. Algunos grupos, como Babyk, han anunciado (abril 2021) que no cifrarán más, que se limitarán a robar información y amenazar con publicarla