Leveraging Cyberspace - Marine Corps Association

Page created by Ana Hoffman
 
CONTINUE READING
Leveraging Cyberspace - Marine Corps Association
Leveraging
                                 Cyberspace
                           Reconnaissance and counter-reconnaissance
                                 in the information environment
                                     by Capt Michael Holdridge

T
            he Watch Officer for the MEB                                                    For the Marine Corps to succeed in
            Operations Center attempts to                                                   the era of great power competition,
            log in to his NIPR computer           >Maj Holdridge is the 2d MARDIV           the Service must continue to increase
            but receives an error stating his     G-6 Operations Officer. He was pre-       the synergy between communicators
account is locked because of excessive failed     viously the Commanding Officer for        and defensive cyberspace operators to
login attempts. He angrily calls over to the      Company C, 8th Communication Bat-         better enable both reconnaissance and
Communication Help Desk, stating that             talion.                                   counter-reconnaissance.
he had just come on shift and had not                                                          Two recent incidents demonstrate
attempted to log in yet. The Help Desk                                                      the importance of the synergy between
Marines re-enable his account, and he           and attack the ground lines of communi-     communication elements and cyber-
successfully logs on. When he checks his        cation in these now-exposed areas.          space: the NotPetya attack in Ukraine
inbox, he finds a few unread emails that            This vignette demonstrates the pos-     in 2017 and the 2021 Colonial Pipeline
he did not recognize from the day prior.        sible results of the invisible reconnais-   Ransomware attack.1 The NotPetya at-
At the same moment, he hears the G-4            sance that occurs on the front lines of     tack was a cyberattack targeting civil-
Operations section calling down to the          the information domain on a daily basis.    ian and government users in Ukraine
CLR to ask why the infantry regiment            It reveals the very real way that opera-    that leveraged the Eternal Blue exploit:
never received its ammo and fuel resupply.
He overhears the MEB Surgeon talking
about CASEVAC flights being cancelled
without reason. When he looks at the com-
                                                  For the Marine Corps to succeed in the era of great
mon operating picture, he realizes that           power competition, the Service must continue to in-
the delayed resupply caused the eastern
flank for the infantry regiment to become         crease the synergy between communicators and de-
exposed. Simultaneously, he overhears a           fensive cyberspace operators ...
report of troops in contact from within
the rear area.
    Unbeknownst to the MEB watch of-
ficer, the adversary had gained access to       tions in the information environment        a National Security Agency tool that the
the MEB communications network and              can impact the kinetic battle and op-       hacking group Shadow Brokers stole in
had stolen his log in credentials. Using his    erations across the land, air, space, and   2017.2 The Eternal Blue exploit is a vul-
credentials, the adversary leveraged the        sea domains. In the scenario, the failure   nerability in Microsoft’s Server Message
unclassified logistics programs to cancel       to investigate the account access issues    Block Protocol that tricks a breached
the resupply for the infantry regiment.         and suspect emails caused the MEB to        system into allowing illegitimate traf-
Additionally, the adversary sent false          overlook a gap that the adversary was       fic into the network. Once the Eternal
weather reports sent to the Marine Air          actively exploiting. The end result of      Blue tool was stolen, the National Se-
Wing, grounding CASEVAC flights that            this critical gap leads directly to mis-    curity Agency alerted Microsoft, who
caused a lengthy delay to life support for      sion failure. Within the Marine Corps,      then released a patch in March 2017
the troops in contact. The adversary also       the MEF Information Group is leading        that addressed the vulnerabilities.3 The
leveraged access to these logistics programs    the charge to address these gaps head       impact of NotPetya in Ukraine was
to identify staging areas for combat service    on by strengthening the relationship        immediate, as the attack wiped data
support and gaps in the front line. With        between the 17XX Cyberspace Opera-          from banks, energy firms, government
this knowledge, the adversary sent special      tions, 02XX Intelligence, and 06XX          officials, and an airport.4 The attack
operations forces to penetrate friendly lines   Communication occupational fields.          crippled and froze domestic functions

Marine Corps Gazette • September 2021                                                           www.mca-marines.org/gazette        9
Leveraging Cyberspace - Marine Corps Association
Ideas & Issues (MCISRE/OIE)

at all affected entities within Ukraine          Most importantly, however, these          when it comes to patching in response
and caused major difficulties for the         attacks could have been completely           to a previously identified vulnerability
Ukrainian government in managing              mitigated through a concerted approach       or in responding to a true Zero Day.
the ongoing conflict with pro-Russian         to preventing cyberattacks. Both intru-      In the event of a previously identified
Separatists in the Donbass region.5 This      sions relied upon vulnerable systems         vulnerability, the network and systems
attack demonstrated that the cyberspace       that already had fixes in place. Without     administrators who fill the duties of
domain is not limited to geographic bor-      the network and system administra-           the cybersecurity professional are re-
ders, a theater of operations, or an area     tors to apply the patches, and without       sponsible for applying the patches and
of responsibility. Our adversaries do not     a defensive cyberspace capability to         searching for indicators of compromise
have the same reluctance to target civil-     assess the threat environment and the        on the network. The cyberspace defense
ian infrastructure, non-military targets,     intelligence teams to gather the relevant    operators are responsible for assessing
or even their own citizens. All targets       information, the victims of NotPetya         the intelligence from the threat envi-
are fair game.                                and Colonial Pipeline were left unaware      ronment, providing recommendations
    The 2021 Colonial Pipeline hack,          of the risks they faced. If Colonial Pipe-   to the administrators, and assessing
which impacted oil distribution across        line and Ukraine had those teams in          the overall protection level of the net-
the Southeastern United States, was           place, like the DOD currently does,          work. In the event of a true Zero Day,
the result of a compromised password          they could have prevented these attacks      the defensive cyberspace operators are
leaked onto a hacker forum.6 Com-             from occurring in the first place.           responsible for hunting, isolating, and
promised passwords are often leaked                                                        gathering intelligence on the intrusion
across the dark web, a series of difficult    Before We Go Any Further, Some               while providing recommendations to
to find web sites designed to promulgate      Definitions                                  the network and systems administra-
hacking tools and is a common source              To fully understand the impact of        tors to fix the network security. With-
of intelligence for cybersecurity firms.      these cyberattacks, it is important to       out both of these elements operating
Additionally, during the course of the        understand what ransomware attacks           in sync, networks will remain vulner-
Colonial Pipeline investigation, it was       are. Ransomware, as seen in the Co-          able and the response timeline for the
found that Colonial Pipeline did not use      lonial Pipeline incident, is an attack       eventual intrusion will increase, which
multi-factor authentication, an account       where in which an adversary infiltrates      results in more damage occurring.
access method that requires more than         a system, encrypts all of the data, and
just username and password, such as a         then ransoms the data to the owners.         What Is the Difference Between Cy-
text message to a phone in the case of        The encrypted data can be anything           bersecurity and Cyber Defense, and
many banks or the use of a log on token       from an individual user’s emails to the      What Is Synergy Between Them?
for government computers.7 Multifac-          operating system files required to run          The DOD is currently postured in
tor authentication is a basic cybersecu-      the device. By encrypting this data, an      a three-column approach to deterring
rity tool that has been used for decades      attacker can then deny a user access to      cyberattacks: Offensive Cyberspace
and is a common security practice by          the system or device until a fee is paid.    Operations, Defensive Cyberspace
network administrators worldwide.             All ransomware attacks start with an         Operations (DCO), and Department
    Neither of these incidents involved       adversary gaining access to a system.        of Defense Information Networks (DO-
direct kinetic attacks between the per-       Common methods of gaining access in-         DIN) Operations (DODIN Ops). The
petrators and the victims, but both           clude through social engineering, which      0600 occupation field is focused on the
possess the same devastating ability to       is the process of gaining access through     DODIN Ops portion of cyberspace op-
shape the battlefield below the level of      tricking someone into providing log in       erations, specifically on the on the plan-
armed conflict. These attacks serve as        information, or by using an exploit, such    ning, installation, security, operation,
a warning to what we will shortly face        as a Zero Day. A Zero Day exploit is         and maintenance of communication
on the modern battlefield: cyberattacks       a previously unidentified vulnerabil-        architectures. The 1700 occupation field
designed to damage our ability to com-        ity for which the manufacturer of the        has the responsibility for Offensive Cy-
municate and conduct basic operational        program or operating system does not         berspace Operations and DCO, with
and support functions, to gain intel-         have a patch or fix. Once a Zero Day is      the 1721, Defensive Cyberspace Opera-
ligence on our operations, to shift our       identified, manufacturers will quickly       tor, supported by the 1702, Cyberspace
focus, and to disorient our military. As      design a patch to prevent perpetrators       Operations Officer, having a primary
the Commandant has already pointed            from using them in the future. Once          focus on DCO. The difference between
out, “the answer to the question of how       inside the system, attackers can gather      DCO and DODIN Ops can be sum-
we may best support the broader effort,       intelligence, steal information, manipu-     marized with the following statement:
it seems increasingly likely, is not lethal   late information, or otherwise operate       DODIN Ops is responsible for a threat
fires as an end themselves but rather re-     undetected until they are found and          agnostic but threat informed security
connaissance and counter-reconnaissance       their access removed.                        posture, while DCO is an intelligence
applied in all domains and across the             The cybersecurity and defensive cy-      driven investigative, as well as command
competition continuum.”8                      berspace operators have different roles      and control function, body working

10     www.mca-marines.org/gazette                                                           Marine Corps Gazette • September 2021
Leveraging Cyberspace - Marine Corps Association
Ideas & Issues (MCISRE/OIE)

against an identified specific anomaly
or threat. In practice, this equates to
the following: DODIN Ops secures the
network and any suspicious activity is
routed to DCO to investigate and, if
identified as an actual threat, neutralize
that threat.
   The risk that arises with this three-
column approach is the space that exists
between them. While DODIN Ops and
DCO are separate functions, they need
to be closely aligned in order to ensure
that the security and defense of the
network is synchronized. Without the
DODIN Ops support to apply changes
to the security posture of the network,
DCO is unable to truly eliminate a
threat once it is identified. Without
the intelligence and recommendations
provided by DCO, DODIN Ops is un-
able to secure the network against the
specific threats it faces.

What Is the Way Ahead?                       Reconnaissance and counter-reconnaissance in the context of the pillars of cyberspace op-
   As the DOD ramps up its cyber de-         erations. (Graphic provided by author.)
fense in response to increasing threats
and invests heavily in the evolution of      of the defensive cyberspace analysists        tions for a synergistic operation would
defensive cyberspace operations, it is       and the cybersecurity administrators          include the following: along with the
worth noting that the first line of de-      by facilitating the relationship between      usual intelligence preparation of the bat-
fense against these attacks is not the       these units in order to increase infor-       tlespace, the defensive cyberspace intel-
1700 community but the 0600 com-             mation sharing, intelligence gathering,       ligence analysts would provide an ad-
munity. The 0631 Network Systems             and threat response. The defensive cy-        ditional intelligence preparation of the
Administrators and 0671 Data Systems         berspace analysists have access to the        information environment, to include
Administrators throughout the Marine         intelligence resources to identify which      the cyberspace threat actors active in
Corps are the primary MOSs respon-           advanced persistent threat, or specific       the region. The cyberspace intelligence
sible for the security of our systems and    adversaries that contain “sophisticated       analysists would review which peer ad-
for patching previously identified vul-      levels of expertise and significant re-       versaries were likely to be active, which
nerabilities. However, the biggest risk      sources,”9 may be active in a region          friendly systems are at risk, and which
that we face in current practice is the      as well as the TTPs associated with           exploits are likely to be used against U.S.
fact that our threat agnostic defense is     those advanced persistent threat. Fur-        forces. The intelligence analysts would
often a threat uninformed defense. In        thermore, increased synergy between           also prepare a threat briefing to the G-2,
other words, while a vulnerability may       the DODIN Ops and DCO teams                   G-3, and G-6 about the risks in the area
be listed as medium risk by the Defense      enables the network administrators to         and which advanced persistent threats
Information Systems Agency (DISA),           assist DCO is intelligence gathering          belonging to which country would be
it may also be a tactic, technique, or       and reverse targeting of adversary teams      in play.
procedure (TTP) that is frequently em-       through the use of various tools and              Using this information, the defen-
ployed by an adversary involved in our       network changes.                              sive cyberspace intelligence analysts and
area of operations. In that situation, a        Currently, the synergy between DO-         the DODIN Ops community would
threat formed approach would grant           DIN Ops and DCO is not where it               prepare a threat informed security en-
a higher priority for patching than a        needs to be. Rarely do the DODIN Ops          vironment, with a focus on patching
vulnerability listed as critical by DISA     Marines responsible for maintaining the       vulnerabilities likely to be exploited.
that is not a TTP of that specific ad-       cybersecurity posture receive relevant        This is much more threat focused and
versary. Traditional DODIN Ops uses          intelligence briefs in order to prepare       relevant than the typical critical, high,
a checklist to address the most dan-         them for operations. This causes signifi-     medium, low risk assessment included
gerous vulnerabilities rather than the       cant delays in response and can lead to       within the information assurance vul-
most likely vulnerabilities. The solu-       disastrous consequences like NotPetya         nerability alerts provided by the DISA.
tion to this is to improve the synergy       and Colonial Pipleine. The correct ac-        Once the security posture is in place

12     www.mca-marines.org/gazette                                                            Marine Corps Gazette • September 2021
to counter an identified adversary, the     Much of the intelligence gathered by         a specific threat are implemented by
Systems Control Center (SYSCON),            the 1700 community is often at the           the network and systems administrators
which monitors, maintains, and chang-       top-secret level, which is above the se-     that the 0600 community owns and
es the communication architecture and       curity clearance required by the vast        develops. Without the administrators to
is staffed by the 0600 personnel, and       majority of the 0600 community. Ad-          patch systems, update the architecture,
the Cyberspace Defensive Operations         ditionally, since DODIN Ops focuses          and create mitigations, the 1700 com-
Center (CDOC), which commands and           on a threat agnostic security posture, the   munity is unable to successfully defend
controls the investigation of network       specified threats posed by adversaries       the network against identified threats.
anomalies and mitigation actions and        are rarely addressed by the 0600 com-        But most importantly, the communica-
is staffed by the 1700 personnel, would     munity. However, as discussed earlier,       tion officer and communication chiefs
have a synergistic relationship. This       this results in a threat uninformed and      have the specific requirement built
would enable the staff to address every     therefore vulnerable network archi-          into their billet and training to trans-
anomaly and vulnerability as a team to      tecture. Furthermore, the 1700 com-          late commander’s operational priorities
fully analyze the potential threat and      munity lacks the ability to implement        into communication plans that enable
response action.                            network and systems changes in the           command and control. This means that
    Some leaders argue that the 1700        architecture in order to mitigate specific   communication officers and chiefs, by
community does not require the 0600         exploits discovered.                         necessity, must be able to effectively un-
community to conduct cyberspace op-            There are two main benefits of the        derstand and translate the risks identi-
erations. Other than the network being      0600 community to defensive cyber-           fied by cyberspace focused intelligence.
established, what benefit does the 1700     space operations: the implementation of      Without that synergy between the com-
community gain from the 0600 com-           changes on the network to respond to         munication officers, communication
munity? It is a fair question, especially   a threat, and the understanding of the       chiefs, and the defensive cyberspace
since the 0600 community will always        network as a whole. The majority of the      intelligence analysts, it is difficult to
create the network to enable command-       network changes that are required by         translate threats to risks, understand
ers to execute C2 across the battlespace.   defensive cyberspace operations against      when risk is unavoidable, and identify

                                              FULL C4I
                                            INTEGRATION

                                                TO ENABLE

                                   DISTRIBUTED
                               MARITIME OPERATIONS
                                                 www.systematicinc.com

Marine Corps Gazette • September 2021                                                        www.mca-marines.org/gazette        13
Ideas & Issues (MCISRE/OIE)

additional mitigation that improve the           The Watch Officer for the MEB Opera-        formation from the honey-pot, to identify
chance of operational success.               tions Center attempts to log in to his NIPR     specific adversary units involved. This in-
                                             Computer but receives an error stating his      formation is then provided to the Informa-
Conclusion                                   account is locked because of excessive failed   tion Operations Center which provides
   The relationship between DODIN            log in attempts. He angrily calls over to       recommended targeting solutions to the
Ops and DCO already exists within II         the Communication Help Desk, stating            MEB G-3 for action.
MEF. The CDOC, as a component of             that he had just come on shift and had not
the Information Command Center and           attempted to log in yet. The Help Desk
the MEF SYSCON, both manned an               Marines register the anomalous activity of                         Notes
operated by 8th Communication Bat-           a locked account without login attempts to      1. Andy Greenberg, “The Untold Story of Not-
talion Marines, already have a relation-     the SYSCON. The SYSCON Watch Of-                Petya, the Most Devastating Cyberattack in
ship due to the proximity of command.        ficer logs the issue with the CDOC, which       History,” Wired, (August 2018), available at
The MEF Network Operations Center            begins investigation into the anomaly. The      https://www.wired.com; and Joe Tidy, “Colo-
already has defensive cyberspace opera-      DCO Marine investigates the issue and           nial Hack: How Did Cyber-Attackers Shut Off
tions liaisons located within their struc-   discovers a breach in the network which is      Pipeline?” BBC News, (May 2021), available at
                                                                                             https://www.bbc.com.
ture. The intelligence section within the    impacting the logistics supply chain result-
MEF Information Group Information            ing in manipulated logistics requests and       2. Hypr Security Encyclopedia, s.v. “EternalBlue,”
                                                                                             available at https://www.hypr.com.

     ... in conducting reconnaissance, counter-reconnais-                                    3. Staff, “Security update for Microsoft Win-
                                                                                             dows SMB Server (4013389),” Microsoft,
     sance and counter-exploitation of our networks, the                                     (March 2017), available at https://docs.mi-
                                                                                             crosoft.com.
     synergy between the 0600 and the 1700 communities
     must be ... strengthened.                                                               4. Ellen Nakashima, “Russian Military Was
                                                                                             Behind ‘Notpetya’ Cyberattack in Ukraine, CIA
                                                                                             Concludes,” Washington Post, (January 2018),
                                                                                             available at https://www.washingtonpost.com.
Command Center already synthesizes           weather reports. The DCO Marine iden-           5. Staff, “Conflict in Ukraine,” Council on For-
the intelligence requirements identified     tifies that an adversary had compromised        eign Relations, (July 2021), available at https://
within an area of operations. However,       login credentials for the MEB Operations        microsites-live-backend.cfr.org.
as demonstrated by the significance of       staff allowed the adversary to manipulate
cyberattacks throughout the world,           data and harvest intelligence within the        6. William Turton and Kartikay Mehrotra,
movement needs to be made to ensure          MEB NIPR network.                               “Hackers Breached Colonial Pipeline Using
that these two occupational fields are           After analyzing the specific threat vec-    Compromised Pasword,” Bloomberg, (June
more closely aligned than ever, with         tor used, he begins to hunt for the perpe-      2021), available at https://www.bloomberg.com.
a focus on closing the space between         trating unit. After receiving approval from     7. Emily McKeown, “What Is Multi-factor Au-
DCO and DODIN Ops. Without a                 the MEB G-6 and Information Control             thentication (MFA)?” PingIdentity, (September
clear threat picture provided by cyber-      Center, the CDOC and SYSCON work                2020), available at https://www.pingidentity.
space intelligence analysists, patched       together to establish a cyber-operations        com.
systems provided by the network and          approved honey-pot; a collection point
systems administrators, and the inves-       designed to lure in the adversary to gather     8. Gen David H. Berger, “Preparing for the
tigative and response actions by defen-      intelligence. Once the adversary is identi-     Future” Marine Corps Support to Joint Opera-
sive cyberspace operators, the Marine        fied, the CDOC provides recommenda-             tions in Contested Littorals,” Military Review,
Corps places itself in a position of sig-    tions to the SYSCON, which coordinates          (May 2021), available at https://www.armyu-
nificant risk. But most importantly, in      with the MEB G-6 to implement network           press.army.mil.
the question of providing cybersecurity      changes to protect the network. The Net-
                                                                                             9. Staff, “Glossary: Advanced Persistent Threat,”
to the MEF and in conducting recon-          work Systems Administrators update the          National Institute of Standards and Technology,
naissance, counter-reconnaissance and        MEB firewalls to limit adversary traffic        (n.d.), available at https://csrc.nist.gov.
counter-exploitation of our networks,        into the network and the Data Systems
the synergy between the 0600 and the         Administrator update the Assured Com-
1700 community must be nourished,            pliance Assessment Solutions scanners to
grown, and strengthened. When the            search for specific indicators of compro-
synergy between the 0600 and 1700            mise. The CDOC provides information
community is maximized, the open-            to the Cyberspace Intelligence Analysts
ing vignette would have proceeded very       who are able to connect the TTPs for the
differently:                                 specific threat vector used, along with in-

14      www.mca-marines.org/gazette                                                            Marine Corps Gazette • September 2021
You can also read