Question: Alert - C 2 Beacon In this activity, you will continue your role as an SOC analyst for the California Department of Motor Vehicles (
Alert C Beacon
In this activity, you will continue your role as an SOC analyst for the California Department of Motor Vehicles DMV
Your organization has just experienced another, more sophisticated attack. Its a red alert that Snort has identified as an emerging threat: a C beacon acknowledgement attack.
The entire network is down across the state. As long as the network is down, none of the DMV offices can issue or renew licenses and registrations, or complete driving tests.
As part of the Computer Incident and Response Team CIRT you need to establish an attacker profile that includes the tactics, techniques, and procedures used by the adversary, and document all of your findings. Like a real security analyst, you may need to research other sources to answer all the questions.
Instructions
Use the following indicator of attack:
Destination IP:
Source IP:
Snort Message: ET MALWARE Zbot POST Request to C
Note: You'll notice many attacks targeting the victim IP address. Please make sure to focus on the ET MALWARE Zbot POST Request to C attack.
Open Security Onion and look for C and Drilldown to see the details. Filter the results for the source IP
What is the rule that triggered this alert?
According to the rule, what is the destination port?
Taking a closer look at the event fields, what is the rule category?
What is the event module that triggered the alert?
Use this link to answer the following questions: A Look At The New Gameover Zeus Variant.
What type of threat is this?
Did this threat modify Windows registry keys?
Why does this threat modify Windows registry keys?
What does C stand for and what is it
What is a sign that a computer may be under the control of a C server?
Bonus Questions
Name one of the most popular techniques an adversary uses to infect a host with a botnet.
What are two ways an organization can mitigate this type of a threat?
How far up the cyber kill chain did this attack get?
What procedure does this threat use to hide when it's discovered?
Why is this threat persistent?
What tactic does this threat use to remain hidden and unnoticed?
Create a new case based off of your findings by clicking on the alert.
Click the title and change it to Zbot Malware Discovery
Scroll down and click ADD to include this event as an Observable
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
