Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Maastricht University Ransomware Attack Flow #116

Conversation

jonibim
Copy link
Contributor

@jonibim jonibim commented Nov 18, 2023

My first attempt on making an attack flow describing the Maastricht University ransomware attack that happened in 2019. The article are used for building the attack flow (in Dutch): https://www.maastrichtuniversity.nl/nl/file/foxitrapportreactieuniversiteitmaastrichtnl10-02pdf

Please let me know if I missed anything or did something wrong.

@jonibim jonibim changed the title Maastricht University Ransomware Attack Attack Flow Maastricht University Ransomware Attack Flow Nov 18, 2023
Added attack flow describing the Maastricht University ransomware attack that happened in 2019
@jonibim jonibim force-pushed the corpus/maastricht-ransomware branch from 2ada033 to 6c9f1c3 Compare November 18, 2023 13:35
Copy link

codecov bot commented Nov 20, 2023

Codecov Report

All modified and coverable lines are covered by tests ✅

Comparison is base (826971f) 99.64% compared to head (6c9f1c3) 99.64%.

❗ Current head 6c9f1c3 differs from pull request most recent head c0d7dea. Consider uploading reports for the commit c0d7dea to get more accurate results

Additional details and impacted files
@@           Coverage Diff           @@
##             main     #116   +/-   ##
=======================================
  Coverage   99.64%   99.64%           
=======================================
  Files           9        9           
  Lines         837      837           
=======================================
  Hits          834      834           
  Misses          3        3           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@mehaase
Copy link
Contributor

mehaase commented Nov 20, 2023

Thank you for submitting this new flow. This is an excellent application of the Attack Flow concepts combined with good writing and clear organization. I'm excited to get this merged into our corpus.

I have a few suggestions that I will leave here, but these are not mandatory. If you have the time and interest to make these adjustments, that's great, otherwise just let me know that you are done and I will merge this into our corpus.

There is a URL object in STIX that you could use here. The infrastructure object is fine, but if you use URL objects it will be easier to extract the URL IOCs.

Maastricht University Ransomware

The direction of the arrow between action and asset indicates if the asset's state is changed or consumed. this example has the asset pointing to the action, which means the action depends on the state of the asset. I think you intended to communicate that the action changes the asset's state (i.e. the new state is "compromised"), so the arrow should point from action to asset.

Maastricht University Ransomware (1)

This condition action appear to be reversed. If the condition "user opens excel attachment" is true, then that would lead to the "User Execution: Malicious File" action.

Maastricht University Ransomware (2)

Changes:
- The condition was rewritten  and properly seated before the Action
- Make use of the STIX objects for the URL
- Rewrite infrastructure objects that contained URLs in them
- Simplify the first malicious URL infrastructure objects into just one
- Add an asset for internal domain at the moment it was fully compromised when the attacker gained admin control
@jonibim
Copy link
Contributor Author

jonibim commented Nov 21, 2023

@mehaase Thank you for your feedback. I implemented your feedback and I as well did some (small) improvements on the attack flow :)

The full details of the changes I did are in the description of my last commit

Changes:
- Assets arrows were properly inversed to indicate that the action affected the asset 
- Fixed a hidden arrow under the OS Credential Dumping actions
Copy link

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
No Duplication information No Duplication information

@mehaase mehaase merged commit d14bfe9 into center-for-threat-informed-defense:main Jan 3, 2024
2 checks passed
@mehaase
Copy link
Contributor

mehaase commented Jan 3, 2024

Thank you @jonibim and my apologies for not seeing this earlier. I have just merged it in.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants