A surge in DNS requests to domains with randomised subdomains from multiple internal hosts. What steps would you take to investigate this activity using the Cyber Kill Chain model?
Investigating a surge in DNS requests to domains with randomised subdomains using the Cyber Kill Chain model involves systematically analysing the activity at each stage of the attack lifecycle.
- Determine if the activity is part of an attacker's reconnaissance effort.
- Analyse DNS logs to identify patterns in the randomised subdomains
- Check if the domains are associated with known malicious actors or threat intelligence feeds.
- Look for signs of domain generation algorithms (DGAs) commonly used by malware.
- Identify if the DNS requests are part of a weaponised payload delivery mechanism.
- Correlate DNS requests with other network traffic to see if they are part of a larger attack chain.
- Check for suspicious files or processes on the internal hosts making the requests.
- Look for signs of command-and-control (C2) communication in the DNS traffic.
- Determine how the malicious activity was delivered to the internal hosts.
- Investigate email logs, web browsing history, or file downloads for potential delivery vectors
- Check for unauthorised software or scripts that may have been executed.
- Identify if the DNS requests are a result of an exploited vulnerability.
- Review system and application logs for signs of exploitation
- Check for known vulnerabilities in the software or systems on the affected hosts.
- Determine if malware or persistence mechanisms have been installed.
- Perform endpoint analysis to detect malware, backdoors, or other malicious software.
- Look for persistence mechanisms such as scheduled tasks, registry modifications, or new services.
- Confirm if the DNS requests are part of C2 communication.
- Analyse DNS traffic for patterns indicative of C2
- Check if the resolved IP addresses are associated with known malicious infrastructure.
- Use threat intelligence to identify if the domains or IPs are part of a botnet or other C2 network.
- Determine the attacker's end goal and mitigate the impact.
- Identify any data exfiltration, lateral movement, or other malicious activities.
- Contain affected systems to prevent further spread.
- Collect forensic evidence for further analysis and reporting.
Post a Comment