Incident Response Play Book
Incident Response Play Book
2
Introduction
Applying the widely-used approach to incident response from the NIST Framework, we can split
the Dark Web monitoring lifecycle into seven stages, provided in the figure below.
After the incident is confirmed, the team can respond to the threat using the relevant IR playbooks.
In this document, we will consider a Dark Web monitoring procedure involving these teams:
● IR (Incident Response)
Depending on the structure of your cybersecurity team, these roles can be combined or split – but
the overall procedure will stay the same.
When it comes to Dark Web monitoring, it's essential for companies to consult with legal experts
and adhere to the laws and regulations applicable in their region. Additionally, transparent and
ethical practices should guide the approach to cybersecurity and data protection. If you
encounter any difficulties with a step, don't hesitate to reach out to experts specializing in Dark
Web threats and incident response. You can continue progressing through the steps, but it's
important to remember that seeking their assistance can help you address the threat more
effectively.
3
1. Roles and responsibilities
This procedure was developed as a reference for the following security roles:
Procedure roles
Incident
CTI Analyst SOC Analyst Responder
Handles and performs initial Thoroughly investigates CTI Performs the necessary
processing of CTI alerts, verifies findings, verifies threats within threat response actions.
found information, assesses threats a protected environment,
based on external information, creates an information security
passes findings to the SOC team. incident.
Investigation C R I
Containment I I R
Eradication I I R
Lessons learned C C R
4
2. Preparation
Set up monitoring of the Dark Web for information related to your company:
● Names of company/subsidiaries + partners/suppliers
● Shortened names/abbreviations
● Domains of the company/subsidiaries + partners/suppliers
● IP address ranges
● Industry/geolocation
Compile a list of relevant Dark Web resources where you will look for information.
Deploy infrastructure:
● VPN, Tor
● External virtual hosts for obtaining the data
● Register special accounts on forums for intelligence purposes, since some of the forums
require an account, making it more difficult for law enforcement or researchers to access
the resource and acting as an entry barrier to casual visitors
5
3. Detection
CTI detection usually involves sending an automatic alert when certain information is found on the
Dark Web or in data dumps. The confidence of the alert can vary depending on its type.
Dedicated services for Dark Web monitoring, such as Kaspersky Digital Footprint Intelligence, can
monitor all the alert types mentioned in the table.
6
4. Procedure workflow
The procedure starts with the "Analysis" stage of incident response.
False positive
Dark Web •User rating
monitoring
alert End •Former activity
•Presence on other forums
1. Verification •Community gratitude
•Top's of interests
•"Successful" activity
•Date of publication
•Is it related to your company
2. Threat 3. Attacker Profiling 4. Threat Evaluation or your supplier/partners?
Identification •Has it been posted before?
•Impact information (size,
CTI
•Accounts
Threat Attacker Threat Artifacts 5. Extraction •System
type Profile Level of artifacts •IP/Protocols
•Access type
•Data samples
7. Investigation
8. Containment
Remote access
compromise
playbook
IR Team
9. Eradication
10. Recovery
7
Step Description
1. Verification
The first step in processing a CTI alert is verifying the found information.
This especially concerns the data the relevance of which cannot be confirmed directly.
Points for verification:
● Direct mentions of the company with relevant proofs.
● If the company was not mentioned, assess indirect pieces of data (mentions
of company geolocation, industry, size, revenue, list of systems).
● Find original posts – a lot of posts are reshared. If you know the resource
where the data was initially mentioned but now the post cannot be found,
it may have been deleted and the data sold.
● Compile a full list of mentions.
2. Threat identification
Identify the threat type described in the data. What information is being sold? It could be:
● Compromised accounts
● Remote access
● Company data
3. Attacker profiling
Build a new attacker profile – or update an existing one – with the following information:
● Author registration date.
● Author rating (if the forum supports such feature).
● Previous activity. Search for other messages of the author.
● Presence on other forums. Search for the same username on other resources.
● Community gratitude. Check the author's relationship with other
members. Check reactions and comments to the author's posts.
● Topics of interests. Is the current topic related to the author's main area
of interest?
● "Successful" activity. Try to find any evidence that previous offers were
successfully sold.
Based on the collected data, build or update the attacker profile.
8
Step Description
4. Threat evaluation
Evaluate the risk associated with the threat:
● Check the date of the offer.
● Check if this information was published before.
● Analyze the offer's price, data volume and value, and access or account types.
● Deal conditions: is it for free or for sale, is it sold to one buyer only.
Check if the information is related to your company or to third parties
(partners/subcontractors/suppliers/etc.).
Based on the collected data, identify the threat level.
5. Extraction of artifacts
Identify all the valuable information in the offer. Key artifacts to look for:
● Account names
● Systems and applications mentioned
● IPs/protocols
● Access type
● Data samples
6. Raising an incident
Create an incident for the Security Operation Center (SOC) team to investigate further. From
this point on, CTI findings are processed according to the SOC's standard incident response
procedures.
7—10. The next steps of the workflow (Investigation, Containment, Eradication, Recovery) are
handled by the SOC and IR teams and determined by the relevant playbook according to the
identified threat type:
● Sale of compromised accounts → Account compromise
● Sale of remote access → Remote access compromise
● Sale of company data → Data exfiltration
9
5. Response playbooks
5.1 Data exfiltration playbook
Incident
Data samples
2. Data origin
confirmed? x no 2a. Close incident
End
Not
confirmed
yes IOCs
Insider Attack
• Data owner and data custodian
• Compromised system owner
• Management 6b
• Stakeholders
• Affected partners 6a. Identify an insider Identify initial vector
• Regulators
6a
Vulnerability
Check insider Identify compromised
accesses hosts and accounts
Insider
access
Identify accessible
data
Compromised
Check insider accounts
access log
Containment
Tools/malware
7b. Rest passwords Accounts
Eradication
Privileges
Scheduled tasks
Services
10. Recover
10
Data exfiltration playbook steps
Step Description
11
Step Description
6. Run the appropriate investigation procedures for the identified compromise vector
Based on the results of this investigation, compile a list of affected/compromised accounts
and a list of compromised hosts.
6b. In case of an attack, identify the initial attack vector and attack path within your network.
Compile a list of systems fully or partially controlled by the attacker.
In case of exploited vulnerabilities, carry out the proper management procedures to prevent
further exploitation.
7. Lock accounts
Regardless of the initial compromise vector, lock any compromised or insider accounts.
Also, reset passwords for the accounts before unlocking them.
10. Recover
Carry out recovery procedures.
12
5.2 Account compromise playbook
Incident
Third party
•Email subject
•Filenames
•Corporate/partner/client/other account •File hashes
•System/application •User-agents
•domain/local/service/admin •IPs/FQDNs
•URLs
•abnormal authentications
data/resources
•phishing attempts
IOCs
•malware alerts
•abnormal system
3. Check possible 4. Collect IOCs and data access
compromise vectors •abnormal sources
of authentication
affected:
3a. Run deep 5. Identify other 6. Check behavior •hosts
forensics compromised accounts of compromised accounts •applications/systems
•data
•valid accounts
7. Prioritize accounts •privileges
for further response •behavior
List of accounts
Containment
8b. Reset
passwords
Eradication
10. Recover
13
Account compromise playbook steps
Step Description
4. Collect IOCs
for identified compromised systems and accounts.
IOCs can be:
● Phishing email subjects
● Malware filenames
● File hashes of malware
● User-Agent strings of web clients used by malware
● IPs/FQDNs
● URLs accessed by users
14
Step Description
8. Lock accounts
Lock the compromised accounts.
10. Recover
Carry out recovery procedures.
15
5.3 Remote access compromise playbook
Incident
•Accounts
•External IPs
•Service, port
•User-Agent/app version
•Authentication methods
•Geolocation
1. Identify
exposed system(s)
IOCs
2. Check
Analysis. Investigation
for anomalies/
Anomalies found 3. Check other
unauthorized access systems •Compromised system owner
•Management
•Stakeholders
No sign of external access •Affected partners
•Regulators
8. Lock
compromised
accounts
8a. Reset
passwords
Eradication
Tools/malware
Accounts
9b. Monitor 9a. Verify 9. Eliminate Privileges
continuously eradication attacker's presence Scheduled tasks
Services
Recovery
10. Recover
16
Remote Access playbook steps
Step Description
For the identified systems, analyze access logs and look for anomalies.
In case anomalies are detected, collect IOCs to check for access. Here's a list of typical
indicators:
● Account names
● Authentication methods
● Geolocation profile
● System owners
● Management
● Affected partners
17
Step Description
8. Lock accounts
Lock the compromised accounts.
10. Recover
Carry out recovery procedures.
18
6. Lessons learned from
CTI findings
The "Post-incident activity" stage for CTI alerts includes standard "lessons learned" tasks based
on the results of the incident investigation, but also some specific steps to update threat
landscape information and adjust CTI alerts.
Dark web
incident closed
2a. Update
2. Update detection
threat model mechanisms
User-caused
or user-targeted
threat?
3a. Plan
security
awareness
training
4. Update
alert/incident
context enrichment
procedure
5. Update
response plan
End
19
Post-incident activity playbook steps
Step Description
3. Analyze the nature of the threat and whether it could be caused by an internal user error.
If yes, plan an appropriate awareness training.
20
Appendix. Diagram guidelines
The following table provides a reference for the diagram elements used in the playbooks above.
Gateway
x Only one of the paths can be taken based on the workflow
logic.
www.kaspersky.com/
www.securelist.com
21