Acknowledgments |
|
xiii | |
Introduction |
|
xv | |
Who Should Read This Book? |
|
xviii | |
How This Book Is Organized |
|
xviii | |
|
PART I AN ADVANCED CYBER-THREAT LANDSCAPE |
|
|
1 | (106) |
|
Chapter 1 Nation-State Attacks |
|
|
3 | (32) |
|
|
4 | (1) |
|
|
5 | (1) |
|
Hidden Lynx Espionage Campaigns |
|
|
5 | (1) |
|
|
6 | (1) |
|
The U.S. and China Cease-Fire of 2015 |
|
|
7 | (1) |
|
|
8 | (2) |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (2) |
|
|
16 | (1) |
|
|
16 | (2) |
|
|
18 | (2) |
|
|
20 | (2) |
|
|
22 | (1) |
|
|
22 | (2) |
|
|
24 | (3) |
|
|
27 | (3) |
|
|
30 | (2) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
Chapter 2 State-Sponsored Financial Attacks |
|
|
35 | (24) |
|
Distributed DoS Attacks Against Financial Institutions |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
IRGC Targets U.S. Banks (2011-2013) |
|
|
39 | (2) |
|
|
41 | (2) |
|
Russian Attacks Against Ukraine |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
The North Korea Financial Theft Model |
|
|
45 | (6) |
|
Bank of Bangladesh Response |
|
|
51 | (1) |
|
FAST Cash: A Global ATM Robbery |
|
|
52 | (2) |
|
Odinaff: How Cybercriminals Learn from Nation-States |
|
|
54 | (3) |
|
|
57 | (2) |
|
Chapter 3 Human-Driven Ransomware |
|
|
59 | (28) |
|
|
61 | (6) |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (2) |
|
Linking These Ransomware Attacks |
|
|
75 | (5) |
|
|
80 | (1) |
|
The DarkSide Gas Pipeline Attack |
|
|
81 | (1) |
|
|
82 | (2) |
|
|
84 | (3) |
|
Chapter 4 Election Hacking |
|
|
87 | (20) |
|
The 2014 Ukraine Presidential Election |
|
|
88 | (3) |
|
The Ukrainian Election Attack Model |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
Manipulation and Public Release of Stolen Political Data |
|
|
93 | (1) |
|
Malware and Fraudulent Election Data |
|
|
93 | (1) |
|
The 2016 U.S. Presidential Election |
|
|
93 | (8) |
|
The 2017 French Presidential Election |
|
|
101 | (3) |
|
|
104 | (3) |
|
PART II HUNTING AND ANALYZING ADVANCED CYBER THREATS |
|
|
107 | (103) |
|
Chapter 5 Adversaries And Attribution |
|
|
109 | (26) |
|
Threat Group Classification |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (3) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
116 | (2) |
|
|
118 | (1) |
|
|
119 | (3) |
|
Identifying Tactics, Techniques, and Procedures |
|
|
122 | (1) |
|
Conducting Time-Zone Analysis |
|
|
123 | (3) |
|
|
126 | (1) |
|
Don't Identify Attacker Infrastructure Based on DDNS |
|
|
127 | (1) |
|
Don't Assume Domains Hosted on the Same IP Address Belong to the Same Attacker |
|
|
127 | (2) |
|
Don't Use Domains Registered by Brokers in Attribution |
|
|
129 | (1) |
|
Don't Attribute Based on Publicly Available Hacktools |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (2) |
|
|
134 | (1) |
|
Chapter 6 Malware Distribution And Communication |
|
|
135 | (24) |
|
|
136 | (1) |
|
Basic Address Information |
|
|
137 | (3) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
Analyzing Malicious or Compromised Sites |
|
|
143 | (3) |
|
Detecting Covert Communications |
|
|
146 | (1) |
|
Shamoon's Alternative Data Stream (ADS) Abuse |
|
|
146 | (1) |
|
Bachosens's Protocol Misuse |
|
|
147 | (4) |
|
Analyzing Malware Code Reuse |
|
|
151 | (1) |
|
|
151 | (2) |
|
The Elderwood Zero-Day Distribution Framework |
|
|
153 | (4) |
|
|
157 | (2) |
|
Chapter 7 Open Source Threat Hunting |
|
|
159 | (22) |
|
|
160 | (1) |
|
Protecting Yourself with OPSEC |
|
|
160 | (1) |
|
|
161 | (1) |
|
Infrastructure Enumeration Tools |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
Searching for Code Samples on NerdyData |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
Analyzing Network Communications with Wireshark |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (2) |
|
Chapter 8 Analyzing A Real-World Threat |
|
|
181 | (29) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (3) |
|
|
185 | (1) |
|
|
186 | (4) |
|
|
190 | (2) |
|
Identifying the Command-and-Control Infrastructure |
|
|
192 | (1) |
|
Identifying Any Altered Files |
|
|
192 | (2) |
|
Analysis of Dropped Files |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
Signature Detection Clues |
|
|
196 | (3) |
|
|
199 | (1) |
|
Finding Additional Domains |
|
|
200 | (1) |
|
|
201 | (4) |
|
Visualizing Indicators of Compromise Relationships |
|
|
205 | (1) |
|
|
206 | (1) |
|
Creating a Threat Profile |
|
|
207 | (3) |
Conclusion |
|
210 | (3) |
A Threat Profile Questions |
|
213 | (4) |
B Threat Profile Template Example |
|
217 | (2) |
Endnotes |
|
219 | (24) |
Index |
|
243 | |