Taking Action Against the Insider Threat

Interested in learning
more about security?
SANS Institute
InfoSec Reading Room
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.
Taking Action Against the Insider Threat
Most organizations tend to focus on external threats, but insider threats are increasingly taking center
stage. Insider threats come not only from the malicious insider, but also from infiltrators and unintentional
insiders as well. Why are insider threats so common and why do they have such a significant impact? What is
the difference between the different types of insider threats and the degree of risk they can constitute?
Copyright SANS Institute
Author Retains Full Rights
Taking Action Against the Insider Threat
A SANS Whitepaper
Written by Eric Cole, PhD
October 2016
Sponsored by
Dtex Systems
©2016 SANS™ Institute
Introduction
When most organizations perform risk analysis and look at threats, they often
immediately focus on external threats. The media and cyber professionals often
overhype foreign adversaries, competitors and organized crime as the main source of
concern; however, it is important to understand which threat causes the most damage
to an organization: the insider threat.
The Insider Email Becomes the
Insider Threat
Imagine a user at his desk working before he
leaves for the weekend. An email arrives from
a potential customer, asking for additional
information about the company’s products,
with details provided in an attachment. The
user opens the attachment and realizes this
individual is looking for information about
the company’s gateway solution product.
Since this is a common request, the company
has a pre-written response. After pasting
the information into the reply, attaching the
documents and hitting “send,” the employee
resumes his previous activity.
Instead of an email from a customer with
an attachment, this scenario could have
also been an email from a supervisor
or co-worker with an embedded link or
embedded scripting. Regardless of the specific
details, this scenario happens often in most
organizations. The problem occurs when the
email is not from a customer, but an adversary
posing as a customer. When the attachment
is opened, the system becomes compromised
and the adversary can use it as a pivot point
for causing further damage.
The 2016 Cost of Data Breach Study noted that 48% of breaches were caused
by outside attackers and malicious insiders; 25% of attacks reported by survey
respondents were caused by negligent employees or contractors.1 The cost of
these breaches averaged $4 million per incident, with an 18% greater capita cost
than in 2013.2
The same report in 2015 found that malicious insiders were the source of the
most costly attacks, at approximately $144,000 per incident.
The insider threat is the silent killer for most organizations. Most people associate
insider threats with malicious/deliberate insiders; however, the greater issue is
the accidental/unintentional insider threat and cases in which an external entity
can manipulate a trusted insider. Therefore, many organizations spend a lot of
money fighting perceived threats, but not fixing those problems that damage
the organization in a very real way.
Ultimately, security is focused on controlling and protecting the data critical to
an organization. Employees and contractors have access to this data. Therefore,
adversaries have learned that targeting insiders is the easiest means of
compromising an organization.
While network security devices are important and play a key role in defense in
depth, effective security also includes studying and acting on user behavior.
There are distinct differences between legitimate, authorized behavior and
unauthorized activity. By closely understanding and tracking user behavior,
anomalies can be detected and the amount of damage caused by an insider
threat can be controlled.
The challenge with an insider email attack is that it is very easy to perform and very hard
to detect (see sidebar). The user has no idea that he has been compromised because this
type of attack bypasses most traditional endpoint and network security devices. This is
why organizations can often be compromised for more than a year and not realize it.
SANS ANALYST PROGRAM
1
2016 Ponemon Cost of Data Breach Study: Global Analysis, June 2016
2
2015 Ponemon Institute Cost of Cybercrime Study: The Threats vs. Defenses Gap, October 2015
1
Taking Action Against the Insider Threat
External vs Internal Threats
When most organizations think of security and the threats that could cause the most
damage to them, they immediately imagine these will be external threats based on the
attention commonly paid to external entities, such as foreign governments, outside
adversaries, competitors or organized crime that target and attack organizations.
But often, insider threats are just as problematic in terms of lost data and other
repercussions.
Unfortunately, many organizations cannot detect the insider threat. It is difficult for an
organization to fix a problem it can’t see. But by gaining better visibility into traffic flow,
properly controlling access to critical information and monitoring user activity, proper
protection against the insider threat can be implemented.
To really understand the scope of the problem, it is important to differentiate between
the source of a threat and the cause of damage.
Traditionally, attackers would scan the public IP address range of an organization to find
visible systems. From there, they would identify services that are opening ports, exploit
a vulnerability and break into a system that is believed to be protected. They could then
gain access into additional areas of the organization, causing more damage.
This scenario worked well many years ago, but this approach is far less effective today
because organizations have invested significant resources in locking down systems
visible from the Internet. In addition, more segmentation has been put in place to make
this a very difficult proposition for an adversary. Today, it is much easier for an adversary
to target an individual within the network, compromise the person’s system and gain
access to an organization. Why should an adversary try to break into secured, hardened
systems when he can easily target the unsecured insider? The variations of this,
malicious and unintentional insiders, will be addressed later in this paper.
SANS ANALYST PROGRAM
2
Taking Action Against the Insider Threat
External vs Internal Threats
(CONTINUED)
Types of Insider Threats
Insider threats can be organized into one of two general categories:
• Deliberate/malicious insider. When most people think of an insider threat, they
immediately think of the malicious insider. This is someone who deliberately
causes harm to an organization. Examples include Edward Snowden and Aldrich
Ames, who were deliberate, malicious insiders working as a contractor and
employee, respectively, for the United States government.
• Accidental insider. An accidental insider is someone who is tricked or
manipulated into doing something that ultimately harms the organization. Some
people further categorize the accidental insider threats into “the infiltrator” and
“the ignorant insider.” The infiltrator situation occurs when an adversary accesses
a user’s system or steals credentials to gain access to a system. The ignorant
insider is a situation that occurs when an adversary convinces the user to click
on a link or open an attachment, which ultimately causes the user’s system to
be compromised. Since both cases are caused by a user action that ultimately
results in a system or account being compromised, we group these types of
threats together.
Whether we are discussing the malicious insider or the accidental insider, in both
cases, the adversary will often install various tools on the system and try to bypass
security controls. The adversary will also access and compromise critical information.
The good news is there are distinct patterns of how these types of insider threats
work. The bad news is that most organizations have not been focused on finding and
preventing such attacks.
A More Deliberate Insider Attack
An employee can become a malicious insider threat when there is job frustration, persuasion
by a competitor who is trying to hire him or a financial motive. Based on the lack of security
and control around critical information, the malicious insider will often copy large amounts of
proprietary data either to the cloud, a USB device or a personal device. While this seems very
simple and basic, it is extremely effective and happens on a regular basis.
When concerned about the insider threat, ask yourself these questions:
• Do you know all locations where your critical data resides?
• Do you know who has access to your critical data?
• What is the probability that critical data resides on personal devices?
A second type of insider attack can occur when an
adversary finds a target within the organization. The
adversary performs extensive research to discover
specific details about the insider’s job and personal
life that can be used in a well-crafted email that
looks legitimate and contains an embedded link or an
attachment. When the user clicks on the link or opens
the attachment, the user’s system becomes infected or
the credentials are stolen. Once again, the attack vectors
are simple, but very effective.
• What is the probability that critical data resides on employees’ home devices?
SANS ANALYST PROGRAM
3
Taking Action Against the Insider Threat
External vs Internal Threats
(CONTINUED)
Insider Threat Kill Chain
To build effective defensive solutions against the insider threat, it is critical to understand
how the adversary works and operates. The insider threat kill chain shows how the
insider threat operates. See Figure 1.
STEP Reconnaissance or
information gathering
1
STEP Develop attack
model
2
STEP Determination of
attack method
3
STEP Attack/
exploitation
4
STEP Longevity/
maintaining access
5
STEP Pivoting and
internal reconnaissance
6
STEP Hiding/covering
their tracks
7
Figure 1. The Insider Threat Kill Chain
The following steps detail the insider threat kill chain:
STEP
1
Reconnaissance or information gathering.
Especially with the accidental insider threat, reconnaissance is critical for an
attack to be successful. This step involves finding a target within the organization and
gathering as much information about him as possible. This includes using social media
to identify supervisors and co-workers, as well as key projects on which the target is
working. Finding out details about the target’s personal life is also important to the
adversary.
SANS ANALYST PROGRAM
4
Taking Action Against the Insider Threat
External vs Internal Threats
STEP
2
(CONTINUED)
Develop attack model.
Once detailed information has been gathered about the target, the adversary
has to analyze the information and determine how he will attack the target. A key
component of building out the model is understanding how people respond and react
in a given situation, which is known as predictable response. Knowing how someone
will respond to a specific stimuli or situation allows the adversary to construct an attack
model in which the potential for compromise is a given because the target’s response
can be predicted based on the target being presented with certain stimuli. Most
employees, for example, always will open email from the boss.
STEP
3
Determination of attack method.
After the model is built, the specific delivery method will be determined. This is
typically an email that has an embedded link or an attachment. The method of delivery
can be as simple as sending one email message, or it can be a hybrid attack, which may
be a complex combination of physical targeting, phone exploitation and additional
social engineering.
STEP
4
Attack/exploitation.
The success of an attack is predicated on proper reconnaissance and planning.
If the prior steps were executed correctly, the adversary should now have access to an
account or system at the target organization. The ultimate goal of an attack is to gain
access and compromise critical data by data aggregation and exploitation. During the
attack, the adversary is targeting key data and exploiting it in some manner. This could
include modifying, deleting or copying the data.
STEP
5
Longevity/maintaining access.
A typical adversary does not want to exploit a system for a short period of time.
The attacker wants to stay in the network as long as possible, constantly monitoring
and exploiting information. Therefore, after the initial compromise, the adversary will
create backdoors or additional methods for readily gaining access to the organization,
providing multiple points of entry and alternatives in the event the target organization
fixes or closes the initial vulnerability.
SANS ANALYST PROGRAM
5
Taking Action Against the Insider Threat
External vs Internal Threats
STEP
6
(CONTINUED)
Pivoting and internal reconnaissance.
In many attacks, the initial point of compromise is not the ultimate target. A
backend database might not be accessible to the adversary, for example, which means
the adversary must break into a client system and, once inside the network, use that to
pivot deeper and deeper until he ultimately finds the target system.
STEP
7
Hiding/covering their tracks.
An adversary does not want to get caught. Therefore, once he breaks in and
causes harm, he will want to hide any traces of his activities to make it harder for the
target organization to detect him. This includes deleting logs and modifying files so
there is no evidence of the attack left on any system within the network.
Based on this knowledge of how the adversary works and operates, this information can
be used to build effective defenses for combating the insider threat.
Dealing with the Insider Threat
To combat the insider threat, organizations need to implement a different type of
solution. Firewalls, IDS, IPS and security information and event management (SIEM) are
good for detecting certain types of attacks, but those devices have several problems,
including the following:
• They look for signatures or set patterns of attack. If the adversary is always
changing how he attacks, which includes launching unique attacks—one of which
is the insider threat—many of these technologies will fall short.
• They are looking for attacks that are occurring on the network. The challenge with
an insider threat is that the person committing the act is a trusted insider who is
utilizing his privileges in an authorized manner. Accessing data is not deemed an
attack because the actions of the attack are based on those normal users perform,
but it is also exactly how the adversary works.
• Firewalls, IDS, IPS and SIEM are looking for external attacks and may not see activity
on the endpoint. Copying data to an unsecured USB is an example of an insider
threat that cannot be detected with those controls.
SANS ANALYST PROGRAM
6
Taking Action Against the Insider Threat
External vs Internal Threats
(CONTINUED)
Dealing with the insider threat, then, requires a combination of context, user behavior,
tracking anomalies and detection, as seen in Figure 2.
CONTEXT
Understand the surrounding
activity and the reason why certain
actions are being performed.
DETECTION
Preventing an insider threat
is very difficult; the goal is early
detection to control damage.
USER BEHAVIOR
A baseline of user behavior
is critical in order to understand
“normal” behavior.
ANOMALIES
Anything that differs from
“normal” behavior or is unusual
needs to be tracked.
Figure 2. The Keys to Addressing Insider Threats
Detect, Control and Minimize the Insider Threat
The following are effective measures that can be used to detect, control and minimize
the damage caused by an insider threat:
Data visibility.
The difference between a minor attack and a major attack is the amount and crucial
nature of the data that was exploited. Ultimately, any insider threat will be looking
for critical data and exploiting it. Therefore, gaining an understanding of where all
the data is located and the access patterns are key indicators that can be used to find
an insider threat.
Understanding vulnerabilities.
Many insiders already have access to and understand the environment in which
they operate, including detailed knowledge of vulnerabilities or weakness that can
be exploited. Most security teams run regular vulnerability scans that are accessible
internally. For deliberate/malicious insiders, this could provide valuable information
not only for exploiting systems, but also for bypassing monitoring to launch an
attack undetected.
SANS ANALYST PROGRAM
7
Taking Action Against the Insider Threat
External vs Internal Threats
(CONTINUED)
Baseline behavior(s).
An insider threat is a person or an account acting on behalf of a person performing
actions on a computer or across a network. Most employees’ behaviors are similar
day to day and week to week. When an insider either becomes rogue (malicious
insider) or has his credentials compromised (accidental insider), his behavior
patterns will be different because the mission has changed from performing his job
in a routine way to causing harm. Only by having a baseline of “normal” activity can
potential deviations be detected. Anomaly detection is such a powerful technique
for detecting an insider threat that it is covered in detail in the next section.
Develop clear metrics.
A key component of baselining user behavior is determining metrics that can
be used to track and monitor behavior. Login time, logout time, number of
files accessed and type of information accessed can also be used to detect
unusual behavior.
Understand the context.
With external attacks, the line between good and bad activity is very clear. An
external entity should be accessing your web page, for example, but should never
be running software that tries to log in with 500 different passwords in a short time.
Therefore, typical preventive measures are very effective. With an insider threat, a
user performs a normal set of actions, but the context in which the user executes
them is quite different.
As an example, one user could be accessing files for project A because she is actively
working with the client. This is quite different than the user who is accessing files
for project B, a project he has not worked on for several months, then immediately
copies the information to a USB drive. In both cases, the access is similar, but the
context makes these very different situations.
Determine the risks.
The driving factor for any threat is the overall risk to the organization. If there is
activity that is suspicious but no critical information is accessed, no further action
might be required. But if a user is accessing very critical information, worth a
significant amount of money, immediate action is required.
In reality, it is impossible to prevent all attacks, especially when the individual who
presents a threat to the organization has access and the means and methods to commit
the attack. Therefore, timely detection is the key to controlling damage with an insider
threat. Effective incident response will play a key role in determining what happened,
helping practitioners learn what went wrong and minimizing the chances of it
happening in the future. Your incident response plan should clearly address the vectors
of attack used by the insider threat.
SANS ANALYST PROGRAM
8
Taking Action Against the Insider Threat
Behavioral Analytics and Context
When an endpoint or user credentials become compromised, there are distinct
differences in the sequence of activities a normal user performs and those activities an
adversary would perform. By carefully monitoring, watching and tracking any changes
in behaviors—which include data access, applications, services and network activity—
distinct differences can be detected to indicate a compromise has occurred.
When using behavior analytics tools, it is important to track both host- and networkbased anomalies because both provide value. In addition to anomalies, analytics can
help provide correlations between or insights into the sequence of events performed
by a user. Looking at single data points has some initial value, but the real benefit of
increased accuracy and reduced false positives is derived when anomalies and event
sequences are used together.
Accessing a file, for example, is a normal user activity. Just because a user accesses a
file, it does not mean they are an insider threat; however, by looking at all of the other
actions that have been performed by this user, these varied actions can be put in proper
context to determine if there is indeed a threat and whether action is required.
From a host-based activity perspective, it is important to carefully monitor what is
happening on the system and detect subtle differences in activity or behavior. Files
and applications that open at system boot are critical to track. One of the goals of an
adversary is to maintain persistence. This is achieved by running malicious code when
the system starts. Because there are only a finite number of ways that programs can run
during boot up, this is an easy area to monitor and track.
From a network perspective, a compromised system will often establish a command
and control (C2) channel for the adversary so he can continue to monitor the system
and cause additional harm. These connections are often fully encrypted and go to IP
addresses that are not associated with legitimate or normal sites and often are not
tied to any domain names. Therefore, by carefully monitoring network connections,
including DNS lookups, suspicious activity can be detected.
SANS ANALYST PROGRAM
9
Taking Action Against the Insider Threat
Behavioral Analytics and Context
(CONTINUED)
This general activity of looking for compromised systems is referred to as hunting.
Threat hunting is the act of aggressively tracking and eliminating cyber adversaries as
early as possible and is a key component of mitigating damage. There is no such thing
as an invisible adversary. By carefully monitoring and tracking the system, the dwell
time—or the amount of time an adversary is on a system—can be reduced, helping to
limit any damage.
While host- and network-based analytics provide value, the real value is derived when
this information is combined with analytics related to data access. Because the ultimate
goal of an adversary is exploitation of data, building analytics and looking for anomalies
is a key way to stay one step ahead of the adversary.
Catching the Insider with Behavioral Analytics
With both a deliberate insider and an accidental insider, there are clear differences in behavioral patterns. By
monitoring the analytics behind the behavior, organizations can do a more effective job detecting and minimizing
the damage caused by the adversary. The most damaging part of an attack is the compromise of critical or sensitive
information. Therefore, the best analytics focus in on metrics around the successful and failed access attempts
to critical information. In performing these types of analysis, there are three behavioral patterns that drastically
change when an insider becomes an insider threat:
• Number of objects accessed
• Number of failed access attempts
• Amount of data accessed
A typical user will access 50 to 60 files a week, for example, and have two or three failed attempts. This could vary
based on the specifics of a job, but these numbers are fairly typically and used as an example. However, if the user
becomes an insider threat, one of the first things that is done is internal reconnaissance and data harvesting to
see the information to which the compromised account has access. In these types of cases, the number of access
attempts will now be 50,000 and the number of failed access attempts will be 5,000. In addition, the amount of
data access will also dramatically increase. This is because all of the data stores are being accessed, or the insider
threat is attempting to access them. Clearly, there is a big difference in the metrics when a normal insider becomes
an insider threat. By monitoring and tracking behavioral analytics of data access, organizations can perform early
detection of an insider threat.
SANS ANALYST PROGRAM
10
Taking Action Against the Insider Threat
Conclusion
Security is all about understanding managing and mitigating risks to your critical
assets and how those risks could impact your organization. An effective insider threat
mitigation strategy will help reduce risk, as well as financial, legal and other potential
damage to the organization.
In assessing the impact the insider threat has on an organization, the following
questions must be asked:
• What information would an adversary target?
• What systems contain the information that attackers would target?
• Who has access to critical information?
• What would be the easiest way to compromise an insider?
• What measures or solutions can IT use to prevent/detect these attacks?
• Does our current budget appropriately address insider threats?
• What would a security roadmap that includes insider threats look like for our
organization?
Insider threat is a problem that is not going away, and all indications show that it is only
going to get worse. Visibility is key. By carefully monitoring user behavior and network
activity, you can quickly detect the malicious insider. It is also important to note that
many organizations’ networks were designed primarily to detect external threats with
minimal to no protection against insider threats.
The bottom line is that insider threats will continue to cause damage when continuously
ignored by an organization. Organizations that focus on insider threats and build out an
appropriate program will defend themselves against this threat.
SANS ANALYST PROGRAM
11
Taking Action Against the Insider Threat
About the Author
Eric Cole, PhD, is a SANS faculty fellow, course author and instructor who has served as CTO of
McAfee and chief scientist at Lockheed Martin. He is credited on more than 20 patents, sits on several
executive advisory boards and is a member of the Center for Strategic and International Studies’
Commission on Cybersecurity for the 44th Presidency. Eric’s books include Advanced Persistent Threat,
Hackers Beware, Hiding in Plain Sight, Network Security Bible and Insider Threat. As founder of Secure
Anchor Consulting, Eric puts his 20-plus years of hands-on security experience to work helping
customers build dynamic defenses against advanced threats.
Sponsor
SANS would like to thank this paper’s sponsor:
SANS ANALYST PROGRAM
12
Taking Action Against the Insider Threat
Last Updated: July 12th, 2017
Upcoming SANS Training
Click Here for a full list of all Upcoming SANS Events by Location
Security Awareness Summit & Training 2017
Nashville, TNUS
Jul 31, 2017 - Aug 09, 2017
Live Event
SANS San Antonio 2017
San Antonio, TXUS
Aug 06, 2017 - Aug 11, 2017
Live Event
SANS Hyderabad 2017
Hyderabad, IN
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS Boston 2017
Boston, MAUS
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS Prague 2017
Prague, CZ
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS New York City 2017
New York City, NYUS
Aug 14, 2017 - Aug 19, 2017
Live Event
SANS Salt Lake City 2017
Salt Lake City, UTUS
Aug 14, 2017 - Aug 19, 2017
Live Event
SANS Virginia Beach 2017
Virginia Beach, VAUS
Aug 21, 2017 - Sep 01, 2017
Live Event
SANS Adelaide 2017
Adelaide, AU
Aug 21, 2017 - Aug 26, 2017
Live Event
SANS Chicago 2017
Chicago, ILUS
Aug 21, 2017 - Aug 26, 2017
Live Event
SANS San Francisco Fall 2017
San Francisco, CAUS
Sep 05, 2017 - Sep 10, 2017
Live Event
SANS Tampa - Clearwater 2017
Clearwater, FLUS
Sep 05, 2017 - Sep 10, 2017
Live Event
SANS Network Security 2017
Las Vegas, NVUS
Sep 10, 2017 - Sep 17, 2017
Live Event
SANS Dublin 2017
Dublin, IE
Sep 11, 2017 - Sep 16, 2017
Live Event
Data Breach Summit & Training
Chicago, ILUS
Sep 25, 2017 - Oct 02, 2017
Live Event
Rocky Mountain Fall 2017
Denver, COUS
Sep 25, 2017 - Sep 30, 2017
Live Event
SANS SEC504 at Cyber Security Week 2017
The Hague, NL
Sep 25, 2017 - Sep 30, 2017
Live Event
SANS Baltimore Fall 2017
Baltimore, MDUS
Sep 25, 2017 - Sep 30, 2017
Live Event
SANS London September 2017
London, GB
Sep 25, 2017 - Sep 30, 2017
Live Event
SANS Copenhagen 2017
Copenhagen, DK
Sep 25, 2017 - Sep 30, 2017
Live Event
SANS DFIR Prague 2017
Prague, CZ
Oct 02, 2017 - Oct 08, 2017
Live Event
SANS Oslo Autumn 2017
Oslo, NO
Oct 02, 2017 - Oct 07, 2017
Live Event
SANS Phoenix-Mesa 2017
Mesa, AZUS
Oct 09, 2017 - Oct 14, 2017
Live Event
SANS October Singapore 2017
Singapore, SG
Oct 09, 2017 - Oct 28, 2017
Live Event
SANS AUD507 (GSNA) @ Canberra 2017
Canberra, AU
Oct 09, 2017 - Oct 14, 2017
Live Event
Secure DevOps Summit & Training
Denver, COUS
Oct 10, 2017 - Oct 17, 2017
Live Event
SANSFIRE 2017
OnlineDCUS
Jul 22, 2017 - Jul 29, 2017
Live Event
SANS OnDemand
Books & MP3s OnlyUS
Anytime
Self Paced