<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>attack - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/attack/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/attack/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 26 Feb 2024 14:08:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>attack - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/attack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Attacking AI? A real-life example!</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/06/attacking-ai-a-real-life-example/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/06/attacking-ai-a-real-life-example/#respond</comments>
		
		<dc:creator><![CDATA[Pierre Aubret]]></dc:creator>
		<pubDate>Fri, 30 Jun 2023 13:50:02 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[evasion]]></category>
		<category><![CDATA[Oracle]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20772</guid>

					<description><![CDATA[<p>In 2023, Artificial Intelligence has received unprecedented media coverage. Why? ChatGPT, a generative artificial intelligence capable of answering questions with astonishing precision. The potential uses are numerous and go beyond current comprehension. So much so that some members of the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/06/attacking-ai-a-real-life-example/">Attacking AI? A real-life example!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<ul>
<li style="text-align: justify;"><em>In 2023, Artificial Intelligence has received unprecedented media coverage. Why? ChatGPT, a generative artificial intelligence capable of answering questions with astonishing precision.</em> <em>The potential uses are numerous and go beyond current comprehension. So much so that some members of the scientific and industrial communities are suggesting that we need to take a six-month break from AI research to reflect on the transformation occurring in our society. </em></li>
</ul>
<p style="text-align: justify;"><em>As part of its commitment to supporting the digital transformation of its clients while limiting the risks involved, Wavestone&#8217;s Cyber teams invites you to discover how cyber-attacks can be carried out on an AI system and how to protect against them.</em></p>
<h2 style="text-align: justify;">Attacking an internal AI system (our CISO hates us)</h2>
<h3 style="text-align: justify;">Approach and objectives</h3>
<p style="text-align: justify;">As demonstrated by recent work on AI<a href="#_ftn1" name="_ftnref1">[1]</a> systems by <a href="https://www.enisa.europa.eu/publications/securing-machine-learning-algorithms">ENISA</a><a href="#_ftn2" name="_ftnref2">[2]</a> and <a href="https://csrc.nist.gov/publications/detail/white-paper/2023/03/08/adversarial-machine-learning-taxonomy-and-terminology/draft">NIST</a><a href="#_ftn3" name="_ftnref3">[3]</a>, AI is vulnerable to a number of cyber threats. These threats can be generic or specific, but impact all AI systems based on Machine Learning.</p>
<figure id="attachment_20773" aria-describedby="caption-attachment-20773" style="width: 941px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="wp-image-20773 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image1A.png" alt="Different threats facing Artificial Intelligence: evasion, oracle, poisoning, ML failure or malfunction, model or data disclosure, compromise of ML application components" width="941" height="457" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image1A.png 941w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image1A-393x191.png 393w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image1A-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image1A-768x373.png 768w" sizes="(max-width: 941px) 100vw, 941px" /><figcaption id="caption-attachment-20773" class="wp-caption-text"><em>Different threats facing Artificial Intelligence</em></figcaption></figure>
<p style="text-align: justify;">To check the feasibility of such threats, we wanted to test Evasion and Oracle threats on one of our low-impact internal applications: Artistic, a tool for classifying employee tickets for IT support.</p>
<p style="text-align: justify;">To do this, we put ourselves in the shoes of a malicious user who, knowing that ticket processing is based on an Artificial Intelligence algorithm, would try to carry out Evasion or Oracle-type attacks.</p>
<p style="text-align: justify;">Obviously, the impact of such attacks is very low, but our AI is a great playground for experimentation.</p>
<h3 style="text-align: justify;">Application overview</h3>
<h3><img decoding="async" class="aligncenter wp-image-20802 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/MicrosoftTeams-image-8.png" alt="Application presentation" width="1499" height="914" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/MicrosoftTeams-image-8.png 1499w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/MicrosoftTeams-image-8-313x191.png 313w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/MicrosoftTeams-image-8-64x39.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/MicrosoftTeams-image-8-768x468.png 768w" sizes="(max-width: 1499px) 100vw, 1499px" /></h3>
<h3 style="text-align: justify;">Application architecture</h3>
<p><img decoding="async" class="wp-image-20800 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/MicrosoftTeams-image-9.png" alt="Artistic architecture" width="1269" height="921" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/MicrosoftTeams-image-9.png 1269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/MicrosoftTeams-image-9-263x191.png 263w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/MicrosoftTeams-image-9-54x39.png 54w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/MicrosoftTeams-image-9-768x557.png 768w" sizes="(max-width: 1269px) 100vw, 1269px" /></p>
<h2> </h2>
<h2 style="text-align: justify;">Evasion attack</h2>
<h3 style="text-align: justify;">Approach overview</h3>
<p style="text-align: justify;">An evasion attack consists of hijacking the artificial intelligence by providing it with contradictory examples (also known as &#8220;adversarial examples&#8221;) in order to create inaccurate predictions. An adversarial example is an input with intentional mistakes or changes that cause a machine learning model to make a false prediction. These mistakes or changes can easily go unnoticed by a human, such as a typo in a word, but radically alter the model&#8217;s output data.</p>
<p style="text-align: justify;">For our example, we will try to build different contradictory examples using three techniques:</p>
<ul>
<li style="text-align: justify;"><span style="color: #33cccc;">Deleting and changing characters</span></li>
<li style="text-align: justify;"><span style="color: #ff0000;">Replacing words using a dedicated technique (Embedding)</span></li>
<li style="text-align: justify;"><span style="color: #7030a0;">Changing the position of words</span></li>
</ul>
<p style="text-align: justify;">The contradictory examples in our use case are slightly modified written requests (see example 1 below) which will be categorised in the Artistic ticketing tool.</p>
<p style="text-align: justify;">To do this, we&#8217;re going to use a dedicated tool: TextAttack. TextAttack is a Python framework for performing evasion attacks (interesting for our case), training an NLP model with contradictory examples, and performing data augmentation in the NLP domain.  </p>
<h3 style="text-align: justify;">Results</h3>
<p style="text-align: justify;">Consider a sentence correctly classified by our Artificial Intelligence with a high probability. Let&#8217;s now apply the TextAttack Framework and use it to generate contradictory examples based on our correctly classified sentence.</p>
<figure id="attachment_20779" aria-describedby="caption-attachment-20779" style="width: 943px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-20779 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image4A.png" alt="Test example" width="943" height="419" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image4A.png 943w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image4A-430x191.png 430w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image4A-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image4A-768x341.png 768w" sizes="auto, (max-width: 943px) 100vw, 943px" /><figcaption id="caption-attachment-20779" class="wp-caption-text"><em>Test example</em></figcaption></figure>
<p style="text-align: justify;">We have observed that sentences which are (more or less) comprehensible to a person can confuse the Artificial Intelligence to the point of misclassifying them. In addition, we can see that with a multitude of contradictory examples created, it is possible for the model to assign the same message to each of the classification categories with varying accuracy rates.</p>
<p style="text-align: justify;">By extension, with more critical Artificial Intelligence models, these poor predictions cause a number of problems:</p>
<ul style="text-align: justify;">
<li>Security breaches: the model in question is compromised and it becomes possible for attackers to obtain inaccurate predictions</li>
<li>Reduced confidence in AI systems: such an attack reduces confidence in AI and the choice of adopting such models, calling into question the potential of this technology</li>
</ul>
<p style="text-align: justify;">However, according to ENISA, a number of measures can be implemented to be protected against this type of attack:</p>
<ul style="text-align: justify;">
<li>Define a model that is more robust against evasion attacks. Artistic&#8217;s AI system is not particularly robust to these attacks and is very basic in its operation (as we shall see later). A different model would certainly have been more resistant to evasion attacks.</li>
<li>Adversarial training during the model learning phase. This consists of adding examples of attacks to the training data so that the model improves its ability to classify &#8220;strange&#8221; data correctly.</li>
<li>Implement checks on the model&#8217;s input data to ensure the &#8216;quality&#8217; of the words entered.</li>
</ul>
<h2 style="text-align: justify;"> </h2>
<h2 style="text-align: justify;">Oracle Attack</h2>
<h3 style="text-align: justify;">Definition</h3>
<p style="text-align: justify;">Oracle attacks involve studying AI models and attempting to obtain information about the model by interacting with it via queries. Unlike evasion attacks, which aim to manipulate the input data of an AI model, Oracle attacks attempt to extract sensitive information about the model itself and the data it has manipulated (the type of training data used, for example).</p>
<p style="text-align: justify;">In our use case, we are simply trying to understand how the model works. To do this, we sought to understand the model’s behaviour by analysing the input-output pairs provided by our contradictory examples.</p>
<h3 style="text-align: justify;">Results</h3>
<figure id="attachment_20781" aria-describedby="caption-attachment-20781" style="width: 942px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-20781 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5A.png" alt="Test example" width="942" height="288" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5A.png 942w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5A-437x134.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5A-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5A-768x235.png 768w" sizes="auto, (max-width: 942px) 100vw, 942px" /><figcaption id="caption-attachment-20781" class="wp-caption-text"><em>Test example</em></figcaption></figure>
<p style="text-align: justify;">By going through several trials, the attacker may be able to detect the sensitivity of the model to changes in the input data. From the example above, we can see that the algorithm used by the application predicts the class of a message by assigning a score to each word and then determines the category. By analysing these various results, the attacker may be able to deduce the model’s vulnerabilities to evasion attacks.</p>
<p style="text-align: justify;">By extension, on more critical Artificial Intelligences, Oracle-type attacks pose several problems:</p>
<ul style="text-align: justify;">
<li>Infringement of intellectual property: as mentioned, the Oracle attack can allow the theft of the model architecture, hyperparameters, etc. Such information can be used to create a replica of the model.</li>
<li>Attacks on the confidentiality of training data: this attack may reveal sensitive information about the training data used to train the model, which may be confidential.</li>
</ul>
<p style="text-align: justify;">A few measures can be implemented to protect against this type of attack:</p>
<ul style="text-align: justify;">
<li>Define a model that is more robust to Oracle-type attacks. Artistic&#8217;s AI system is very basic and easy to understand.</li>
<li>For AI more broadly, ensure that the model respects differential privacy. Differential privacy is an extremely strong definition of privacy that guarantees a limit to what an attacker with access to the results of the algorithm can learn about each individual record in the dataset.</li>
</ul>
<h2 style="text-align: justify;">Getting to grips with the subject in your organisation today</h2>
<p style="text-align: justify;">We have observed that even without precise knowledge of the parameters of an Artificial Intelligence model, it is relatively easy to carry out Evasion or Oracle-type attacks.</p>
<p style="text-align: justify;">In our case, the impact is limited. However, the consequences of an evasion attack on an autonomous vehicle or an Oracle-type attack on a model used with health data are far more serious for individuals: physical damage in one case and invasion of privacy in the other.</p>
<p style="text-align: justify;">A number of our customers are already starting to deploy initial measures to deal with the cyber risks created by the use of AI systems. In particular, they are developing their risk analysis methodology to take account of the threats outlined above, and most importantly they are putting in place relevant countermeasures, based on security guides such as those proposed by ENISA or NIST.</p>
<p> </p>
<p> </p>
<p style="text-align: justify;"><a href="#_ftnref1" name="_ftn1">[1]</a> An artificial intelligence system, in the AI Act legislative proposal, is defined as <em>&#8220;software developed using one or more of the techniques and approaches listed in Annex I of the proposal and capable, for a given set of human-defined goals, of generating results such as content, predictions, recommendations, or decisions influencing the environments with which they interact.</em>&#8221; In our paper, we consider that AI systems have been trained via Machine Learning, as is generally the case on modern use cases such as ChatGPT.</p>
<p style="text-align: justify;"><a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://www.enisa.europa.eu/publications/securing-machine-learning-algorithms">https://www.enisa.europa.eu/publications/securing-machine-learning-algorithms</a></p>
<p style="text-align: justify;"><a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://csrc.nist.gov/publications/detail/white-paper/2023/03/08/adversarial-machine-learning-taxonomy-and-terminology/draft">https://csrc.nist.gov/publications/detail/white-paper/2023/03/08/adversarial-machine-learning-taxonomy-and-terminology/draft</a></p>
<p style="text-align: justify;"><a href="#_ftnref4" name="_ftn4">[4]</a> A ticket represents a sequence of words (in other words, a sentence) in which the employee expresses his or her need.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/06/attacking-ai-a-real-life-example/">Attacking AI? A real-life example!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/06/attacking-ai-a-real-life-example/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to take advantage of a red team operation?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/how-to-take-advantage-of-a-red-team-operation/</link>
		
		<dc:creator><![CDATA[Rémi Escourrou]]></dc:creator>
		<pubDate>Tue, 25 Aug 2020 12:40:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[MITRE ATT&CK]]></category>
		<category><![CDATA[red team]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14065</guid>

					<description><![CDATA[<p>Out of the 40 major incidents managed by CERT-Wavestone last year, only 26% of security incidents were identified by the organisation&#8217;s cyber detection team (the SOC in most cases). It is therefore quite logical that the ANSSI mentioned a collective...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/how-to-take-advantage-of-a-red-team-operation/">How to take advantage of a red team operation?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Out of the <a href="https://www.wavestone.com/app/uploads/2019/10/2019-Security-incident-response-benchmark-Wavestone.pdf">40 major incidents</a> managed by <a href="https://www.wavestone.com/en/capabilities/cybersecurity-digital-trust/cert-w/">CERT-Wavestone</a> last year, only 26% of security incidents were identified by the organisation&#8217;s cyber detection team (the SOC in most cases). It is therefore quite logical that the ANSSI mentioned a <strong>collective weakness in detection</strong> at the last French major security conference &#8220;les Assises de la Sécurité&#8221;.</p>
<p>&nbsp;</p>
<figure id="post-14725 media-14725" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14725 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1595335008859.png" alt="" width="866" height="542" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1595335008859.png 866w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1595335008859-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1595335008859-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1595335008859-768x481.png 768w" sizes="auto, (max-width: 866px) 100vw, 866px" /></figure>
<p style="text-align: justify;">But how to <strong>strengthen the detection</strong> of an intrusion into one&#8217;s company? Penetration testing allows us to evaluate the level of protection/hardening on a precise and supervised perimeter, which does not necessarily represent the reality experienced during a real situation. Crisis management simulations help to improve the response&#8230; Red Team operations can be a good element of response, allowing the information system and <strong>detection capabilities</strong> to be evaluated (and therefore improved) from the beginning to the end of a cyberattack.</p>
<p style="text-align: justify;">What is a Red Team operation? It is simply <strong>a realistic attack without the negative effects</strong>. The objective is to determine, today, what malicious actions a group of attackers can carry out on my company and when am I able to detect them?</p>
<p style="text-align: justify;">In this article, we will see what the key steps are in such an operation and how to ensure that we reap the benefits.</p>
<p>&nbsp;</p>
<h2>STEP 1: DEFINE THE CORE TEAM AND IDENTIFY THE TROPHY</h2>
<p style="text-align: justify;">Defining a restricted control team is essential to limit the leakage of information to the Blue Team (detection team, i.e. SOC), to make communications more fluid and to facilitate decision-making by the client. The control team must therefore be clearly separated from the Blue Team. <strong>Often the choice is made between the CISO or a representative of the ExCom</strong>, with whom the limits of the perimeter and the operating mode (as wide as possible) will have to be set, in order to avoid any unfortunate incident!</p>
<blockquote><p>&#8220;That&#8217;s out of scope&#8221; &#8211; Said no attacker ever</p></blockquote>
<p style="text-align: justify;">Then, a particularity of a Red Team operation is to define a &#8220;trophy&#8221;, the final target of the operation. Indeed, an attacker is often <strong>motivated by an objective</strong> (gain, destruction, data theft, &#8230;) and it is advisable to copy the Red Team&#8217;s objectives on it. The Red Team generally already has some good ideas but the best trophies (i.e. the strongest impact during the restitution) are closely linked to the <strong>business stakes</strong> of the company and its <strong>current events</strong>.</p>
<p style="text-align: justify;">The target must be the scenarios that are the most chilling for the managers: a remote takeover of the SWIFT infrastructure? A compromise of the payment terminals? The leakage of the VIP customer list? Positions taken in recent months abroad? The ideas may be numerous, but it is necessary to <strong>restrict oneself to one or two targets</strong> to keep the most critical ones visible. It will always be possible to identify another trophy for the next operation: it is even advisable to modify the trophies from one year to the next in order to test different parts of the information system.</p>
<p style="text-align: justify;">During our latest operations, ExComs have chosen <strong>scenarios that have already taken place during real cyber attacks</strong> they have been subjected to. This also enables them to assess the effectiveness of the new security measures implemented.</p>
<p>&nbsp;</p>
<h2>STEP 2: PREPARE AND LAUNCH THE ASSAULT BY MIXING EFFICIENCY AND STEALTH</h2>
<p style="text-align: justify;">The credibility of the attack is one of the key factors in the success of the operation, particularly during the restitution phase. Once the trophy has been arrested: we build an <strong>approach based on the techniques used by the attacking groups.</strong></p>
<p style="text-align: justify;">It is at this point that field returns are particularly useful! At Wavestone, we rely heavily on our Incident Response Team (CERT-W) and its <strong>Threat Intelligence capacity</strong> to identify the latest trends, on the <strong>technical know-how</strong> of our audit team and the <strong>creativity</strong> of our CTF (Capture The Flag) team.</p>
<p style="text-align: justify;">Thus, the Red Team will use <strong>all possible and necessary means</strong> to penetrate the IS (phishing campaign, telephone phishing, physical intrusion, compromise of components exposed on the internet&#8230;) and then bounce back to the trophy. This phase is the most <strong>creative</strong> and exciting for the listeners (as well as for the attackers), and can potentially last several weeks, just like the most high-profile cyber-attacks.</p>
<p style="text-align: justify;">However, the key word must remain: &#8220;stealth&#8221;! Indeed, the slightest detection by the Blue Team can totally derail or set back the operation. Particular attention must be paid to <strong>customised attack tools and infrastructures</strong> to <strong>avoid panicking the detection systems</strong>. For the first point, we have developed internally the <a href="https://github.com/wavestone-cdt/abaddon">Abaddon tool</a>, now open-source, which allows us to build and deploy the necessary infrastructures in just a few clicks.</p>
<p>&nbsp;</p>
<figure id="post-14728 media-14728" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14728 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/0-8-1.png" alt="" width="1272" height="709" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/0-8-1.png 1272w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/0-8-1-343x191.png 343w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/0-8-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/0-8-1-768x428.png 768w" sizes="auto, (max-width: 1272px) 100vw, 1272px" /></figure>
<p style="text-align: justify;">Two questions always come up when it comes to the conduct of a Red Team operation.</p>
<p style="text-align: justify;">The first one is &#8220;What to do <strong>in case of detection</strong>? ». That an action may be detected can happen during a Red Team operation: a good SIEM correlation rule, an informed user who shares an abnormal behaviour, etc&#8230; First of all, in the basic organisation, the <strong>control team must supervise incidents</strong> within the SOC in order to avoid an &#8220;over-escalation&#8221; in crisis of an incident related to the Red Team. The control unit will then be able to request <strong>a report from the Blue Team</strong> (summary, detected behaviour, timeline of actions, remedial actions, etc.) and then define the <strong>recovery scenario</strong> with the Red Team: ignore the detection because it is too old, start from the penultimate compromised asset that has not been detected, etc. Moreover, the work will become more complicated for the Red Team, which will have to completely change its C2 infrastructure and henceforth succeed in deceiving a Blue Team on alert.</p>
<p style="text-align: justify;">The second &#8220;If the <strong>trophy(s) are obtained very quickly</strong>, what can be done?&#8221; Let&#8217;s imagine the worst case scenario: the application administrator of the trophy gets trapped by a phishing email and allows us to take complete control of the application from the very beginning of the operation (Anyone can make a mistake). The point will be<strong> shared with the control team</strong> and the procedure to be followed will be defined jointly: add trophies to test the robustness of another perimeter, start from scratch and identify another compromise path, &#8230; This somewhat caricatural example is there to remind us that the objective of a Red Team operation is to <strong>durably improve the level of security</strong> via Blue Team training and not just to obtain a trophy.</p>
<p>&nbsp;</p>
<h2>STEP 3: PROVIDE A CLEAR RESPONSE TO A CRITICAL BUSINESS RISK</h2>
<p style="text-align: justify;">The objective remains to provide sponsors with a <strong>clear vision</strong> of the real security status of their IS, the attack scenarios that will give them access to their critical resources (identified as &#8220;trophies&#8221; of the operation), as well as their detection capabilities. Quite simply, the Red Team operation must make it possible to answer the question &#8220;Is the trophy accessible and with what level of expertise? ». However, it should be remembered that Operation Red Team will highlight an <strong>exploitable path</strong> that may not be the only or the simplest one.</p>
<p style="text-align: justify;">From then on, we return to the stakeholders (CISO, SOC, COMEX&#8230;) with a high-level synthesis in order to present the conclusions of the Red Team operation, the attack scenario followed and the most priority worksites. The results are generally compared with <strong>typical attacker profiles</strong> (Maze, REvil/Sodinoki&#8230;) on the <a href="https://attack.mitre.org/">MITRE ATT&amp;CK</a> reference frame to be more meaningful.</p>
<p>&nbsp;</p>
<figure id="post-14730 media-14730" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14730 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/0-9.png" alt="" width="1170" height="229" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/0-9.png 1170w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/0-9-437x86.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/0-9-71x14.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/0-9-768x150.png 768w" sizes="auto, (max-width: 1170px) 100vw, 1170px" /></figure>
<p style="text-align: justify;">In a second stage, the <strong>Blue Team will obviously have to be given a detailed</strong> account of the technical stages of the operation, with a view to defining areas of progress on detection.</p>
<blockquote><p>&#8220;If we win, we lose &#8221; Said a good red teamer</p></blockquote>
<p style="text-align: justify;">This second phase is fundamental for the operation to have the expected added value:<strong> pedagogy and clarity</strong> are needed to get the right messages across! Let&#8217;s not hesitate to hold <strong>additional workshops</strong> to explain the problems raised by the operation and to find solutions together. A <strong>joint interpretation of the findings</strong> by the Blue Team and the Red Team allows us to take a step back from the vulnerabilities and <strong>identify concrete actions for improvement</strong>.</p>
<p style="text-align: justify;">The Red Team operation should not be reduced to correcting a few vulnerabilities on the IS, but should make it possible to obtain the<strong> effective level of security</strong> (even if it is not exhaustive, as a Red Team will never be an audit).</p>
<p style="text-align: justify;">In a few words, a Red Team operation makes it possible to <strong>test its defence strategy on a large scale</strong> and to <strong>train</strong> (improve) its <strong>defence team</strong>. The very concrete nature of the trophies allows an understanding and awareness of the cyber risk of the <strong>decision-makers</strong>.</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/how-to-take-advantage-of-a-red-team-operation/">How to take advantage of a red team operation?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
