Violent Crime to Cybercrime

In his post, Detective Ritch describes Evolution of Facts over the course of a shooting investigation. In this installment we’ll examine how we’ve adapted that paradigm into InfoSec investigations.

Importance of Evolution

Evolving data into higher level objects serves two critical purposes: noise reduction & translation.

Noise Reduction

First, the nature of evolution discards noise. Much like the concept in biology, only fit, useful facts survive the evolution process. When exposed to more complex systems, noise goes the way of the dodo bird. A “possible SQL injection attack on MySQL” event becomes irrelevant when vulnerability reports show the targeted server isn’t running MySQL. As data becomes a more mature, evolved object the irrelevant events fall away.

Translation

The main question facing an incident responder when presented with an event is “How does this impact my organization?” Getting from a single event to a paragraph that the Board of Directors can understand takes significant evolution of the data.

Applying Law Enforcement Vernacular

The mission of WitFoo is to mature the craft of Incident Response. A core hypothesis held is InfoSec is immature because it is using untested, immature paradigms. We test this hypothesis by examining more mature crafts like Law Enforcement.

Evolution of Data Vernacular

Facts

In InfoSec, a fact is any logged observation. It is often referred to as an artifact by incident responders. Examples of facts are log entries, NetFlow records, packet captures, files and video recordings.

Lead

When a fact has been identified as possibly nefarious, it is promoted (evolved) into a lead. A packet capture that matches a signature for SQL Injection creates a lead that we normally call an event.

Evidence

When a lead is validated as nefarious by an investigator (or system criteria) it is promoted to evidence. This evolutionary step generally requires querying other data sources (i.e. identity logs or reputation feeds).

Incident

When one or more pieces of evidence are connected to the modus operandi (MO) of an aggressor, it is promoted to an incident. In information security, this is generally defined by models like Lockheed’s Cyber Kill Chain or MITRE ATT@CK Continuum.  Incident tracking requires evidence over time to be stitched together. It is at this level that human conversations can begin beyond InfoSec professionals.

Crime

When an incident is investigated and determined to be benign, it is called a false positive in InfoSec. It is called an acquittal or dismissal in Law Enforcement. If the intent is confirmed nefarious, the incident is promoted into a Crime. It is at this point that the adversary and motive is identified and the impact to the business is documented.

Spree

When an adversary is connected to multiple crimes, it is known as a Crime Spree in law enforcement and sometimes called a campaign in InfoSec. These are very hard to detect because the victims are distributed (across an industry or geography.)

Application of Vernacular

Evolving data is the work of the investigative craft. Often frustration with executives is born of inadequate data evolution. That inadequacy is caused by lack of tools, process and people (see: Failure Reports.) Starting with an understanding of what the evolutionary steps are can help a Security Architect and IR Team lead craft better approaches in solving this systemic problem.

Share This