Lessons Learned from the NotPetya Cyber-Attack

Guy Barnhart-Magen

June 10, 2019

My Personal Take on the Maersk Case Study

Some images of Mr. Banks presentation were recently shared by Alon Refali from CyberTogether. I didn’t get to see the actual presentation, and I am not sure that a video will follow - so I took the liberty of writing down the slides so I could better comment on them.

The threat landscape has changed fundamentally

Prevention is unlikely to be an effective strategy, automated detection and response is key Online back up (standard) is no longer a safe approach Patching is necessary but insufficient Privileged access management takes on an even higher importance

for heavy industries, BCP & Crisis Management may need to be wider than asst focused

Skipping right to the conclusions, the struggle of the very large enterprise with security are tremendous. And as stated in the presentation, falling victim to Nation State conflicts will cause damages to your organization that current solutions are not dealing with well enough.

I think that there are some other options that can help limit and contain such issues, when assuming complete breach and network control by an adversary. Fast detection and automated response are key, but having a better baseline security for your server is just as important.

Server security is a difficult problem, and system hardening even more so - but assuming you’ve done your part - the blast radius of such malware will be significantly reduced - to the relativlely less protected systems (and endpoint devices). It’s not perfect - but it is easier to re-image laptops and printers than rebuilding your corporate application infrastructure.


Case Study: Lessons Learned from the NotPetya Cyber-Attack

7

Background to the malware: called NotPetya

1

“the superficial resemblance to Petya is only skin deep. Although there is significant code sharing, the real Petya was a criminal enterprise for making money. this [latest malware] is definitely not designed to make money. this is designed to spread fast and cause damage, with a plausibly deniable cover of ransomware”

Computer Security Veteran, The Grugg

How it got in

2

What happened next

3

Attack Vectors: * eternal blue exploit * administrator rights (pass the hash, credential theft)

The Damages

4

IT Services

End user Devices

Applications and Servers

all our 1200 applications were inaccessible and approximately 1000 were destroyed. Data was preserved through backup but the applications themselves couldn’t be restored from backup as they would be immediately have been infected. The impact on servers was that 3,500 out of 6,200 servers were destroyed. Again they couldn’t be restored from back up due to reinfections.

What did we do: days 1-3

5

What did we do: days 4-9

6

What did we do: day >9

9

Non-global applications, supporting non-global processes, have neem the most significant challenge in recovery

Industry wide learnings

8

The threat landscape has changed fundamentally

Prevention is unlikely to be an effective strategy, automated detection and response is key Online back up (standard) is no longer a safe approach Patching is necessary but insufficient Privileged access management takes on an even higher importance

for heavy industries, BCP & Crisis Management may need to be wider than asst focused


From slides presented by Adam Banks, Chief Technology & Information Officer, Maersk at InfoSec Europe 2019 (June 4-6, 2019)