Cert-Eu-Swp 11 003 v2
Cert-Eu-Swp 11 003 v2
■ unable to run even manually ■ (or tlisk, tasklist depending on Windows release)
Keep an update list of persons who need to be contacted
in case of such an incident
■ Unusual hard-disk activity: the hard drive makes huge ■ Look for unusual/unexpected network services installed
operations at unexpected time. and started:
■ Take regular snapshots of usual network performance and ■ Unusually slow computer: while it was usually delivering o C:\> services.msc
local activities of the system, including description of usual good speed, it got slower recently o C:\> net start
port activity, to have a comparison baseline with current ■ Unusual network activity: Internet connection is very slow ■ Note : a good knowledge of the usual services is needed.
state. or not available at all.
■ Ensure there is a good knowledge of the impacted
■ The computer reboots without reason.
Unusual Network Activity
■ Check for file shares and verify each one is linked to a
infrastructure, including services and installed
applications. Do not hesitate to ask a Windows expert for ■ Some applications are crashing, unexpectedly. normal activity:
assistance. ■ Error messages and Pop-up windows are appearing while o C:\> net view \\127.0.0.1
active for example, distracting all your tools from giving An incident report should be written and relevant information Authorised User: CERT-EU
good results. distributed on the basis of the need to know principle. Sensitive
■ Further forensic investigation can be done on the system information should be sanitized
E-Mail: cert-eu.@ec.europa.eu
while it is off, if the system is still suspicious. The ideal
The following themes should be described: Web: http://cert.europa.eu/
case is to make a bit-by-bit copy of the hard disk
■ Initial detection.
containing the system, and to analyse the copy using
■ Actions and timelines.
Last updated : 15 May 2012
forensic tools like EnCase or X-Ways.
■ What went right. o
■ What went wrong.
■ Incident cost.
■
Containment
After having analysed the impact on the service, and after
33 Capitalize
Whether the incident led to disciplinary action or
prosecution
Remove the hard disk and deliver it to the internal incident J Preparation: get ready to handle the incident In specific cases, in particular if the malware is advanced,
response capability who will take a forensics copy and recover J Identification: detect the incident performing such activities may make prejudice to the analysis of
important data on user’s request. J Containment: limit the impact of the incident the incident. Therefore, no investigation shall be performed prior
J Eradication: remove the threat approval from the team in charge of responding to incidents
Remove the binaries and the related registry entries. J Recovery: recover to a normal stage within the organisation
J Aftermath: draw up and improve the process
It is usually sufficient to run a full antivirus scan using known
good sources for the antivirus software and signatures. IRM provides detailed information for each step. WARNING
This White Paper is being issued by CERT-EU without prejudice
■ Find the best practices to remove the malware. They can to any policies, procedures or standards which the effected
usually be found on antivirus companies websites. organisation may already have in place. It is intended as an
■ Run an online antivirus scan. aide, to IT specialists working in coordination with security
■ Launch a Bart PE- based live CD containing disinfection The original author of this incident response methodology team/officer or the internal incident response capability of the
tools (can be downloaded from AV websites), or a is the Incident Response Methodology (IRM) Author: Institution, for cases where the persons responsible must act
dedicated anti-virus live CD. CERT-SG / Cédric Pernet immediately and/or do not have other superseding policies,
IRM version: 1.2 procedures and standards to address the problem. Persons
for more sophisticated types of malware, this method may not responsible for dealing with information security matters should
be sufficient. In such cases the safest approach is to rebuild the E-Mail: cert.sg@socgen.com primarily abide by the policies, procedures and standards of
system from scratch. Web: http://cert.societegenerale.com their respective organisations.
Twitter: @CertSG