{"id":3022,"date":"2024-07-30T17:46:03","date_gmt":"2024-07-30T21:46:03","guid":{"rendered":"https:\/\/increasec.com\/?p=3022"},"modified":"2024-09-30T15:34:38","modified_gmt":"2024-09-30T19:34:38","slug":"the-post-ransomware-brain-dump","status":"publish","type":"post","link":"https:\/\/increasec.com\/?p=3022","title":{"rendered":"The Post Ransomware Brain Dump"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">The environment:<br>Windows 10+, VMware 8u2, SentinelOne, Fortigate Fw 7.0.15, Unsecured VPN tunnels to biz partners<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Good:<br>+Cove backup w Cloud really good. Attackers will wipe local backup repo. Caveat; when restoring we had problems with the Virtual Disaster Recovery, it would recover disks but many of the files were &#8220;In Use&#8221; &amp; unreadable. Instead VDR the Boot drive, Install the recovery software, create a new (thin provisioned) disk in VmWare and do a &#8220;Files &amp; Folders&#8221; restore to the new disk. The files we restored were larger than the drive they were backed up on, we had some NAS devices grafted into the NTFS tree.<br>+SentinelOne; didn&#8217;t find malware on any PCs. made an alert about lateral movement<br>+Tailscale unaffected, doesn&#8217;t require ports open from internet<br>+FreeMyIp.com dynamic DNS makes great poor-mans MFA<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Needs Improvement:<br>+Upgrade VmWare vCenter to 8u3 latest build<br>+enable AV on all VPN connectors and -limit their scope. Off for short term.<br>+Wazuh server deploy Script not OVA. install agent on workstations. Use a DNS name.<br>+Remove all users from local admin, make domain group, add users temporarily for self-service +U<br>+Deploy HoneyPot <a href=\"https:\/\/opencanary.readthedocs.io\/en\/latest\/starting\/configuration.html\">OpenCanary<\/a>, how 2 setup email alerts? TPot-ce, can&#8217;t login<br>+Logon script; Winget Upgrade &#8211;all (doesn&#8217;t run as a user with authority)<br>+Mgt interfaces unreachable from workstations. Router ACL&#8217;s configured VLan 1,111,121<br>+Vuln Scanner, gvm <a href=\"https:\/\/www.youtube.com\/watch?v=egiJ9A7oq3U\">https:\/\/www.youtube.com\/watch?v=egiJ9A7oq3U<\/a><br>+NiNite installer makes it difficult to upgrade or uninstall software. 2 versions of VLC a 32bit+64bit<br>+Tailscale+Terminal Server. OR RdWeb + Dyn dns from freeMyIp.com<br>++use Unifi to eject all the cellphones from the Corp network. Make them use the Guest network<br>+<a href=\"https:\/\/241931348f64b1d1.wordpress.com\/2010\/04\/21\/how-to-disable-netbios-via-command-line-on-windows\/\">netbios <\/a>Disable via Group Policy Powershell script, audit w <a href=\"https:\/\/www.nirsoft.net\/utils\/netbios_scanner.html\">NirSoft <\/a>util<br>&#8230;Automate Windows updates via Group Policy 1\/w. Verify no sleep<br>&#8230;Windows firewall servers p135, 3389 only from servers+mgt vlan. <br>&#8230;SMB1 Disable via Group Policy. audit w nmap &#8211;script smb-protocols.nse<br>-Windows firewall forced ON in group policy, allow server + mgt networks. Breaks scan to local share.<br>-Stronger password policy, expires yearly, reminder notes go in wallet. Start w exp 999d<br>&#8230;Harden servers, disable unused services \/ tcp ports. Run <a href=\"https:\/\/www.nartac.com\/products\/iiscrypto\/\">IISCrypto <\/a>+Best Practices(breaks SentinelOne?)<br>-DB config uses IP, change to DNS name<br>-arpwatch \/ DHCP log alert on new MAC addresses seen. Wazuh? <a href=\"https:\/\/github.com\/zsamuels28\/unificlientcheck-docker\">Unifi<\/a>ClientCheck<br>-Segment departments from each other, new edge switches vlans up 1 level<br>-Document the network OR buy Unifi switches<br>-Reboot Workstations nightly \/ have PCs BIOS power-on every morn 1h b4 work start, do updates etc.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Backup\/Restore:<br>+TrueNas Storage Snapshots daily +U +T +V<br>+Extra backups to external drives that power off daily. -auto, sync changes<br>-Extra backups at a driveable offsite location<br>-UPS shutdown automation, easy install via Home Assistant<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Blue Team;<br>-Verify you get alerts for creating a new account on server, workstation. not just in the Wazuh console<br>+NMAP scan all servers for open tcp port. Question everything. monitor required services<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Outside Improvements:<br>-MFA on for all Office365, +Rules to allow your country only.<br>-DKIM enable for all outbound email<br>-Investigate <a href=\"https:\/\/sublime.security\/\">sublime.security<\/a> for alternate\/additional email filtering<br><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Really Bad:<br>+vCenter assumes everyone in the domain group ESX Admins is an administrator.<br>+Wazuh .OVA install, changing the password breaks it.  Install from script<br>&#8211;Windows firewall is stoopidly complex to configure and make exceptions<br><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The environment:Windows 10+, VMware 8u2, SentinelOne, Fortigate Fw 7.0.15, Unsecured VPN tunnels to biz partners The Good:+Cove backup w Cloud really good. Attackers will wipe local backup repo. Caveat; when&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[198],"tags":[4],"class_list":["post-3022","post","type-post","status-publish","format-standard","hentry","category-blueteam","tag-security"],"_links":{"self":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/3022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3022"}],"version-history":[{"count":84,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/3022\/revisions"}],"predecessor-version":[{"id":3252,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/3022\/revisions\/3252"}],"wp:attachment":[{"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}