Tactic | Technique ID | Technique Name | Sub-Technique Name | Platforms | Permissions Required |
---|---|---|---|---|---|
Initial Access | T1189 | Drive-by Compromise | Linux, SaaS, Windows, macOS | User |
(P) Preparation
1. Patch browsers and other software regularly
2. Perform routine inspections of controls/weapons
3. Ensure Antivirus/Endpoint Protection software is installed on workstations
4. Ensure that workstations are logging to a central location
5. Log network traffic
6. Set up a proxy for web traffic
7. Use Group Policy to manage security related browser settings
8. Make use of Windows Defender Exploit Guard or other exploit mitigation tools"
Assign steps to individuals or teams to work concurrently, when possible; this playbook is not purely sequential. Use your best judgment.
TODO: Expand investigation steps, including key questions and strategies, for Drive By Compromise.
- Monitor for:
- Unusual DNS activity
- Antivirus/Endpoint alerts
- IDS/IPS alerts
- User reports of unexpected behavior
- Investigate and clear ALL alerts associated with the impacted assets
- Plan remediation events where these steps are launched together (or in coordinated fashion), with appropriate teams ready to respond to any disruption.
- Consider the timing and tradeoffs of remediation actions: your response has consequences.
TODO: Customize containment steps, tactical and strategic, for Drive By Compromise.
TODO: Specify tools and procedures for each step, below.
TODO: Consider automating containment measures using orchestration tools.
- Inventory (enumerate & assess)
- Detect | Deny | Disrupt | Degrade | Deceive | Destroy
- Observe -> Orient -> Decide -> Act
- Issue perimeter enforcement for known threat actor locations
- Systems believed to have been compromised should be removed from the network
TODO: Customize eradication steps, tactical and strategic, for Drive By Compromise.
TODO: Specify tools and procedures for each step, below.
- Close the attack vector
- Patch asset vulnerabilities
- Perform an antivirus scan on the affected system
- Review logs and network traffic to identify any related malicious activity
TODO: Specify financial, personnel, and logistical resources to accomplish remediation.
TODO: Customize communication steps for Drive By Compromise
TODO: Specify tools and procedures (including who must be involved) for each step, below, or refer to overall plan.
In addition to the general steps and guidance in the incident response plan:
- TODO
TODO: Customize recovery steps for Drive By Compromise.
TODO: Specify tools and procedures for each step, below.
In addition to the general steps and guidance in the incident response plan:
- Restore to the RPO within the RTO
- Address collateral damage
- Reset the passwords of any accounts in use on the compromised system
- Resolve any related security incidents
- Perform routine cyber hygiene due diligence
- Engage external cybersecurity-as-a-service providers and response professionals
- "Title", Author Last Name (Date)