Just got off phone with a client. Log4j is in their network. Vendor claims patch will be available next release... which is multiple months from now.

Here's what you do if you're in this situation.

1. Keep calm. There's no need to panic.
2. Carefully read this thread.

1/?
First, it's bad. It's a remote code execution meaning any attacker will almost certainly be able to run code of their choice on your systems.

If you can, please patch it's the easiest path. But you're reading this because you can't patch (for whatever reason) OK, let's go!
2
When dealing with attacks like this you should remember the acronym IMMA.

I = Isolate
M = Minimize
M = Monitor
A = Active Defense

I'll walk you through the IMMA model for the Log4j attacks we've seen so far.

3
Isolate.
If you can, move impacted systems to a 'vulnerable VLAN'.

If you can't do that, *carefully* review firewall rules between impacted hosts and the rest of your fleet.

Another option is deploying a proxy firewall with deep packet inspection.
4
Monitor
Start looking for odd traffic patterns to or from systems (even if they're not known)

Some interesting things I've seen so far... Look for DMZ systems that INITIATE outbound connections. Typically your web servers RESPOND to requests.
5
When attackers get shell access they will frequently have a phone home check... or are establishing a "reverse shell" (where your victim system calls back to them)

This looks odd from a network layer because most internet facing systems respond to requests.
6
Key word last tweet: MOST
Some of your systems do initiate outbound comms. But these should be few. Even if you don't know which ones do/don't the odds are in your favor here. Your false positive rate should be low-ish.

Start looking for outbound initiated connections now.
7
Monitoring cont:
We all hate change management, right? I know I do! This is a time it pays off. Look for unauthorized config changes on ALL systems. Some of these vuln log4j instances will be tucked away. When an attacker starts changing the host... you should see it.
8
Monitoring cont:
start looking for port/protocol mismatch. lots of the early attacks I've seen are using very old tricks to do recon in your network. In many cases, these are probes to common ports... but... they're not using the protocol. They're empty probes. Or just wrong.
9
side note: you should be doing port/protocol mismatch checks anyway because it's a great detect for misconfigured systems or janky code.
/end side note
Monitoring cont:
if you cannot isolate the host, consider putting a firewall or any other type of tool that logs network connections next to vuln systems.

Even a firewall with ALLOW ALL/ALL rules and a LOG unexpected connections is an amazing win.
10
Mon cont:
Start looking for AD interactions from non-AD systems. Lots of appliances have these Log4j issues. Typically such devices are NOT bound to AD.
DO THIS RIGHT NOW, PLEASE!! Yes, you will get false positives. (typically printers) make a list, alert on all others
11
Mon cont:
now is a GREAT time to start doing "top talkers" analysis on all suspected vuln systems. I suggest you do this for every protocol, not just the common ones. Attackers try to blend in, but it's tricky. Top talkers tend to stick out.
12
Minimize:
This isn't great, but as a quick and dirty check, you can use strings on the binaries to see if you have references to log4j. I've found a few this way. It's not elegant, but it may work for you too
docs.microsoft.com/en-us/sysinter…

13
Minimize:
Now's a great time to consider shutting off unneeded services! One client had a VPN that appears vulnerable, but it looks like it's only used by the management web ui. They like using that UI because it's easy... just for now they're doing without.
14
Active defense:
Now more than ever it's a great idea to setup a fake simple web service that mimics a vuln system. Even something as simple as a cowrie target is worth deploying. Find out who's doing recon on your network.

15
github.com/cowrie/cowrie
Active defense -- spicy advice -- WARNING! not for everyone.
If you find attacker indicators... you may want to sit back and observe what they're doing. If you simply firewall block them, they'll be back almost instantly.
16
Active Defense MAJOR WIN
I've had some clients shy away from firewall blocks "what if this is a real customer?"
If that's you, use QoS to your advantage. QoS allows you to shape traffic. Most use it for service mins. But you can also set for service max! slow down the attacker
17
That's it for now. I hope the IMMA process helps you triage this difficult time. I've got to hop back into the fray right now.

We're all in this together. Take some time, chill.

Slow is smooth, and smooth is fast.

LMK if any of the infosec fam can help you out.

Let's go!
fin
Monitor bonus: look for CPU load spikes. Coin miners are going nuts with this vuln. It's not great that you're hit, but the silver lining is they are making vulnerable boxes really stand out.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Mick Douglas

Mick Douglas Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @bettersafetynet

10 Dec
Boating update:
Mrs signed us up for a week long bootcamp style live aboard sailing adventure... however unlike earlier trainings we've done... this school sent us books 4 months out. With a warning... most take 6 months to do the homework. We have 4.
1
We were granted an exception since we've got prior experience. After looking at these books... I'm regretting asking for it.

There's just **so** much to learn.

I'm most worried about the night non-radio signaling & signal flags. Stuff I've never done before. :-/
2
If our paths cross over the next few months, and you hear me making odd dinging or horn sounds... I've not gone mad... I'm practicing overtaking in fog procedures. (which it's cool how nuanced the conversation can be... but like... wow it's also complex)
3
Read 4 tweets
8 Dec
HR & middle management folks... we need to talk.

Some management of people is done in the most non-nonsensical ways.

You may know that I mentor folks... like a lot of them.

Today one called me almost in tears. With permission here's a redacted version.
1
End of year evals are due soon. This person was told to rank each employee. Top 25% will get bonuses and put on advancement path. Bottom 25% will be put on PIP!

For those not aware PIP is Performance Improvement Program, it's basically the first step to being fired.
2
For a very large team you may have a bell curve distribution where this may be a viable approach. (I'd like to quibble at the numbers, but it's not THAT bad)

The issue is this approach is **horrible** for the small teams we tend to have in infosec.
Read 8 tweets
21 Apr
blue teamers:
We have to talk. Not everyone, but lots of us are writing really bad detects. Stop trying to detect the tool you will never win doing that. Detect the impacts.

A great example of this:
Responder.
1/?
Responder is a great pen test tool (we use it on our offensive engagements and you should to)

You damn well better be looking for responder... but HOW you do that look is just as important as the fact that you do.

2/?
Perhaps the most frequently used mode of responder is the LLMNR function. This allows responder to trick Windows systems into giving up the currently logged in user's creds to the attacker who is on your local network, but not yet on the victim's system.
3/?
Read 6 tweets
8 Apr
I *rarely* call out journalists. But this is an exception.

Hey @dannyjpalmer, this article you wrote is everything that is wrong in infosec.

zdnet.com/article/why-do…

ding ding schools in session!

1/?
First of all your headline is deliberately inflammatory.

but more critically, you miss the really interesting angle... how is it that these users are setup to fail?

2/?
The fourth estate is supposed to be elevating the discussion. You sir have let us down here. I don't know you... but I feel like you phone it in on this one.

The article should enlighten. At a few points you come close but don't drive home.

3/?
Read 14 tweets
30 Mar
I don't normally repost stuff from reddit or other sites, but this is *important*

arstechnica.com/tech-policy/20…

A thread of things to know why US citizens should care deeply about this.

1/?
Many (most?) folks in the US know that the internet was developed by the US by DARPA.

What few do know is that year over year, the US has been slipping in terms of broadband... by every measurable metric.

I'll cover them one at time so you can understand how bad it is
2/?
The US does *not* have the fastest internet speed. We're ranked 11th in the world!

decisiondata.org/news/analysis-…

3/?
Read 12 tweets
19 Aug 20
I hate that I'm going to have this little thread. Buckle up.

Yesterday I made a passing reference to the fact that I take meds for treating my ADHD.

(I hope you know how rarely I cuss)

Fuck you to those who sent me hate DMs. Seriously. You are horrible people.

1/?
I know I shouldn't feed trolls, but this has to be said.

While not perfect, I am a *damn good* tech, biz owner, instructor, and hacker.

You reducing my accomplishments -- while having so very few of your own -- is telling.

2/?
I've opened a boutique infosec consultancy. I am a certified SANS instructor. A member of the IANS faculty... and someone who's not done yet. I've got plans.

For you to say that this is all thanks to a "pill that makes me not be a retard" is about as ugly as it gets.

3/?
Read 17 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(