Handling Security Alerts (THIS PAGE NEEDS UPDATING)

We regularly receive alerts from IST's Security Operations Centre or notice unusual high bandwidth activity. Here we will make note of how to handle various alerts, including draft emails that can be sent to the user identified as being potentially involved. That person may or may not be aware of the activity as it may be that their machine has been infected. Always deal with such issues with great tact.

For IST's full handling procedures, see: IST Security Incident Response Procedures

Excessive Resource Use

Sometimes an individual running a program or making a CGI available causes noticeable problems on a CS server or the network. This may be caught in high bandwidth usage statistics (see below) or it may be discovered during investigation of a server issue.

Further investigation

Current process lists, lastcomm, and web server access_log can be useful in finding problem user/program combinations.

Sample Email, web CGI misuse

In the course of investigating problems with the __ web server, it came to our attention that a CGI installed in your personal web space is being used extensively by off-campus clients. The CGI in question is ___ [apparent function of CGI].

This CGI has been consuming excessive computing resources on the __ web server, contributing to problems __ (if any noted). It is also using a significant amount of the University's Internet bandwidth. In short, the program being hosted in your web space makes inappropriate use of resources, per UCIST guidelines http://www.adm.uwaterloo.ca/infocist/use.htm and UW Policy 71 http://www.ucalendar.uwaterloo.ca/0405/UW/policy_71.html.

Execute permissions have been removed from the CGI to prevent further abuse. (Suggest removing the program or running it on a non-university server). Web server logs are being monitored to ensure the program or any related web pages do not become active.

Followup, web CGI misuse

Set up a cron job to check web server logs for continued use of the offending program.

High Bandwidth

Various CSCF staff watch the bandwidth usage statistics
These statistics are also posted daily to the uw.network.stats newsgroup.

Further investigation

IST maintains the FlowViewer network flow reporting interface to provide detailed information about network traffic patterns. Dawn is familiar with the interface, as are some IST network and security staff. In particular, it can be useful to determine the times of day, network ports, and external IP addresses associated with high bandwidth usage.

In the case of a computer used by multiple individuals, login logs can be useful.

Sample report

They may send an email similar to:

somepc.cs sent out 25 GB of data on Saturday.  This seems unusual.

2009-06-06, 3056 GB external traffic: 1770 GB sent, 1286 GB rcvd

I=Internet,O=ORION        %day      MB   sentI  rcvdI  sentO  rcvdO
------------------------  ----  ------  ------  -----  -----  -----
...
somepc.cs(129.97.xxx.yyy  )        0.8   25766   25311    455      0      0

Sample email

We need to determine the owner of the machine and then send email, such as:

Subject:  High Network Bandwidth Usage

Dear ....,

We recently received a report that there has been an unusually high amount of network
traffic to or from your computer, as shown below:
...include relevant piece of the report...

If you are aware of the reasons for the activity and it is related to your research work
that should be no problem, just let us know and describe the nature of the activity.
If it not work-related, then please refer to the University guidelines on appropriate use
of network resources:
http://www.adm.uwaterloo.ca/infocist/use.htm

If you are not aware of any reason for such high activity, it may be that your machine is
infected in some way and should be checked for malware or unauthorized usage.  Please speak
to your Point of Contact, or reply to this email and we will have someone take a look at the
machine.

Thank you for your prompt attention to this issue,

..sender's name ...

or, for the student computing environment:

Dear ...,

Your account was logged into ... at ...date/time..., when it appears to have
...downloaded/uploaded... a large volume of data ...number from report....  This network usage
amounts to a significant portion of the University's external network bandwidth and may have
interfered with use of the Internet connection for teaching, research and other university
business.

Excessive use of the University's Internet connection is generally considered an inappropriate
use of resources, per UCIST guidelines
http://www.adm.uwaterloo.ca/infocist/use.htm
and UW Policy 71
http://www.ucalendar.uwaterloo.ca/0405/UW/policy_71.html.

If you are not aware of any reason for such high activity, it may be that your account is
infected in some way and should be checked for malware or unauthorized usage.

Please contact me to discuss your use of UW network resources.

... sender's contact information ...

Excessive Scanning

IST's Security Operations Centre runs software which looks for network traffic patterns indicative of compromised or attacking systems and send email to the DNS and abuse contacts for the system.

Sample report

Date: Sun, 7 Jun 2009 09:27:21 -0400
From: IST Security Operations Centre 
Subject: SECURITY(WARNING): Scanning(Excessive) at someserver.cs.uwaterloo.ca [129.97.7.XXX]
To: admin-contact@cs.uwaterloo.ca
Reply-to: abuse+reply@ist.uwaterloo.ca
Cc: abuse+reply@ist.uwaterloo.ca, dns-cs-admin@cscf.cs.uwaterloo.ca

Attacker: someserver.cs.uwaterloo.ca [129.97.7.XXX]
Attack: Network Scanning detected at cn-rtext router
Date: Sun, 07 Jun 2009 09:27:01 -0400

Automated monitoring processes have detected your system scanning for too many
network services -- well outside the norm. Network scanning has been detected
at levels which constitute good evidence of either gaming, a peer-to-peer
application (e.g., Skype and Bittorrent), a compromise or malicious intent.
Systems detected are routinely isolated from the campus network without
notice. See

     http://noc.uwaterloo.ca/cn/Stats/blocked

For our best advice on Skype see:

     http://ist.uwaterloo.ca/security/howto/2006-06-21/

You should determine why your system is scanning for so many network services
-- you may have a virus of some sort. An up to date version of Norton
Anti-Virus will help:

   http://ist.uwaterloo.ca/download/

University policies and the Resnet Statement on Misuse are clear that
network scanning of any sort will not be tolerated -- that includes scanning
programs to find open file shares. If you are running a scanner of that sort
you should stop now.

Resnet users should contact Resnet support staff:

   http://www.housing.uwaterloo.ca/resnet
   Phone: ResNet office at 519-888-4567 x33538 

If you need any help or assistance please let us know.


      IST Security Operations Centre
      
      Information Systems and Technology
      University of Waterloo, 200 University Ave W
      Waterloo, Ontario N2L 3G1 Canada


**** Flow Data Summary ****

1) Number of Flows observed from 129.97.7.XXX

2443

2) First few observations

0004 129.97.7.XXX     0001 65.109.171.24     06 a40e 50    9          729       
0004 129.97.7.XXX     0001 212.84.72.7       06 dd04 50    4          467       
0004 129.97.7.XXX     0001 81.169.145.69     06 8193 50    6          573       
0004 129.97.7.XXX     0001 115.28.148.229    06 a78c 50    14         920       
0003 129.97.7.XXX     0001 81.0.233.82       06 aa13 50    3          156       
0004 129.97.7.XXX     0001 205.211.183.4     06 850  c195  5          383       
0003 129.97.7.XXX     0001 216.197.111.238   06 829b 50    8          740       
0004 129.97.7.XXX     0001 217.76.142.21     06 ddc2 50    17         1142      
0004 129.97.7.XXX     0001 208.109.138.124   06 cad6 50    4          471       
0004 129.97.7.XXX     0001 82.98.135.43      06 d90d 50    5          520       

3) Last few observations

0004 129.97.7.XXX     0001 205.178.145.65    06 c47e 50    7          626       
0004 129.97.7.XXX     0001 216.230.225.3     06 d48c 50    9          729       
0003 129.97.7.XXX     0001 174.132.5.254     06 886a 50    9          729       
0004 129.97.7.XXX     0001 64.14.72.72       06 cc8b 50    6          574       
0003 129.97.7.XXX     0001 208.31.37.142     06 bef8 50    8          677       
0003 129.97.7.XXX     0028 216.251.43.98     06 e321 50    6          573       
0004 129.97.7.XXX     0001 72.47.229.3       06 c735 50    6          571       
0004 129.97.7.XXX     0001 67.210.107.83     06 8fdb 50    7          625       
0003 129.97.7.XXX     0028 64.26.174.74      06 a912 50    5          520       
0004 129.97.7.XXX     0001 206.171.93.39     06 b7d2 50    11         833       

4) Number of Peers Involved

2108

Sample email 1

We need to determine the owner of the machine and then send email, such as:

Subject:  Excessive scanning from your machine

Dear ....,

We recently received a report that there has been an unusually high amount of network
traffic to or from your computer, as shown below:
...include relevant piece of the report...

If you are aware of the reasons for the activity and it is related to your research work
that should be no problem, just let us know and describe the nature of the activity.
If it not work-related and/or involves copyrighted materials, then please refer to the 
University guidelines on appropriate use of network resources:
http://www.adm.uwaterloo.ca/infocist/use.htm

If you are not aware of any reason for such high activity, it may be that your machine is
infected in some way and should be checked for malware or unauthorized usage.  Please speak
to your Point of Contact, or reply to this email and we will have someone take a look at the
machine.

Please be aware that when there is evidence of a machine compromise, we will need to investigate
further to determine if there is any potentially sensitive information that may have been exposed.
Please do not wipe your machine, until instructed that it ok to proceed.

Thank you for your prompt attention to this issue,

..sender's name ...

Sample email 2

We need to determine the owner of the machine and then send email, such as:

Subject: Re: SECURITY(WARNING): Scanning(Excessive) at xxx.cs.uwaterloo.ca [129.97.xxx.xxx]
From: drallen@cs.uwaterloo.ca
Date: January 27, 2010 4:17:18 PM GMT-05:00

Hello, we've just received notice from IST security operations centre
that xxx.cs is performing scans and ssh brute-force attacks.  Unless
you know more about the situation, it looks like someone has
compromised the system.

Jason Testart wrote:
> I have disabled the port to xxx.cs since I've had several reports from
> on-campus of SSH brute-force attacks.
> jt

Since the system is likely compromised, I'd recommend a wipe/restore,
and changing your passwords on any accounts you have accessed via the
system.

Let me know if you would like assistance with next steps.

-Daniel

Following is the automated message we received earlier today:

Date: Wed, 27 Jan 2010 01:57:57 -0500
[...]
4) Number of Peers Involved

123 

Sample followup message, when the user has confirmed that they weren't doing scans themselves:

 Hi, I stopped by a few times and didn't catch you in.  The most
essential steps at this point are:

1) don't let this computer connect to any networks including wifi; it
may be able to "phone home" and allow access to the exploiter.  My
understanding is that its hardware port in the office is off and will
stay off until I tell IST the security problem is resolved.

2) if you used the laptop to connect to other services or servers, you
should change your passwords on all of them.  An assumption is that
anything you've done on the computer since it was exploited may have
been "sniffed" by the exploiter.  (It is possible that the exploiter
did not, but it would take some investigation to be sure).

3) Similarly: if you have private SSH keys that you could get to from
this laptop (either on the laptop, or on your CS accounts), you will
need to change those keys after you've changed your passwords.

4) Recovery of the system will require reinstalling the OS.  User data
may be compromised; we recommend (but don't have requirements about)
restoring your user data from known-good backups.

5) If student-related information is on the laptop, I'll need to know,
as part of campus Policy 8 on Computer Security Response Procedures;
the information will be shared with IST.

I'm around if you have questions/concerns; if I don't know the answers
to the questions I will figure out who does.

-Daniel 

Copyright Infringement

Sample Infringement Letter

Subject: Case ID 456555123 - Notice of Claimed Infringement
Date: Mon, 27 Jul 2009 11:47:38 -0400
From: MediaSentry 
To: Security Abuse Reports 

Monday, July 27, 2009


University of Waterloo
200 University Avenue West
Waterloo, ON  N2L 3G1  CA



RE:  Unauthorized Distribution of the Copyrighted Audio Work Entitled
       Pimsleur German - Pimsleur


Dear Security, Abuse Reports:

We are writing this letter on behalf of the Simon & Schuster Audio, a
division of Simon & Schuster, Inc., a a CBS Corporation.

We have received information that an individual has utilized the
below-referenced IP address at the noted date and time to offer
downloads of copyrighted television programs through a "peer-to-peer"
service, including such title(s) as:

     Pimsleur German - Pimsleur

The distribution of unauthorized copies of copyrighted works constitutes
copyright infringement under the Copyright Act, Title 17 United States
Code Section 106(3).  This conduct may also violate the laws of other
countries, international law, and/or treaty obligations.

Since you own this IP address (129.97.X.Y), we request that you
immediately do the following:

1) Remove or disable access to the individual who has engaged in the
conduct described above; and

2) Take appropriate action against the account holder under your Abuse
Policy/Terms of Service Agreement.

We also would request that you inform the individual who engaged in this
conduct that legitimate copies of Simon & Schuster Audio content are
available for purchase..

On behalf of Simon & Schuster, owner of the exclusive rights in the
copyrighted material at issue in this notice, we hereby state that we
have a good faith belief that use of the material in the manner
complained of is not authorized by Simon & Schuster, its respective
agents, or the law.

Also, we hereby state, under penalty of perjury, that the information in
this notification is accurate and that we are authorized to act on
behalf of the owner of the exclusive rights being infringed as set forth
in this notification.

Please direct any end user queries to the following:
CopyrightQs@mediasentry.com
 
Please include the Case ID 889380690, also noted above, in the subject
line of all future correspondence regarding this matter.

We appreciate your assistance and thank you for your cooperation in this
matter. Your prompt response is requested.

Respectfully,

A Kempe
Enforcement Coordinator
MediaSentry


------------------------------

INFRINGEMENT DETAIL
--------------------

Infringing Work: Pimsleur German - Pimsleur
First Found: 26 Jul 2009 10:07:35 EDT (GMT -0400)
Last Found: 26 Jul 2009 10:07:35 EDT (GMT -0400)
IP Address: 129.97.X.Y
IP Port: 58649
Protocol: BitTorrent
Torrent InfoHash: B8C527ABCD78ACF6D157454E293721AFDC5DF81C
Containing file(s):
Learn German.torrent (1,584,397,559 bytes)

Sample email to UW user

After doing some investigation to be as sure as possible regarding the likely user involved, send an email similar to the following:
Dear ,

We have received a complaint regarding a copyright infringement based on file(s) on your machine, see below.

If you are aware of the presence of this file, please make sure that it is removed and refer to the following regarding appropriate use of UW network and computing resources:
http://www.adm.uwaterloo.ca/infocist/use.htm

If you are not aware of how such files ended up on your machine, it may be that your machine is
infected in some way and should be checked for malware or unauthorized usage.  Please speak
to your Point of Contact, or reply to this email and we will have someone take a look at the
machine.

In either case, please respond to let us know that you have received this email and what actions you have taken.

Thank you for your prompt attention to this issue,

..sender's name ...

... Include full body of report here ...

Official response

Once the problem has been dealt with, send a report back to IST or the original complainant (to be determined) to let them know what was done.

Port pirating

Connections to lab computers or thin clients are sometimes unplugged so that people can plug in their own laptops. In order to make this work, the hijacker will need to allocate an IP address that will work on the port -- and typically (but not always) the IP address of the unplugged device is used.

Diagnosis

ONA can determine what MAC addresses are in use on a port. If the hijacker has ever used campus wireless with the hijacking device, the offending user can be tracked through ONA's authentication database.

How to notify the offending user

To be written/

SECURITY(WARNING): Windows Patches ...

These are sent out to warn when a system that had previously received patches from the UW WSUS server has not recently updated some critical patches. Note: in our dual-boot environment, this could be due to the fact that the user has been running Linux and not Windows.

Sample patch warning email

From: IST Security Operations Centre [mailto:soc@uwaterloo.ca] 
Sent: Sunday, May 01, 2011 3:31 AM
To: cs-rsg-bif@cs.uwaterloo.ca
Cc: abuse+reply@ist.uwaterloo.ca; dns-cs-admin@cscf.cs.uwaterloo.ca
Subject: SECURITY(WARNING): Windows Patches at xxx.cs.uwaterloo.ca [129.97.84.xxx]

The UW/IST Windows Software Update Service (WSUS) reports that your system is failing to install the following important Microsoft updates. 
These failures need to be investigated and resolved by human intervention. If you require assistance please contact your computing support representative.

Security Update for Windows XP (KB2481109)

If you need any help or assistance please let us know.


      IST Security Operations Centre
      
      Information Systems and Technology
      University of Waterloo, 200 University Ave W
      Waterloo, Ontario N2L 3G1 Canada

Sample email to user about Windows patching

... tbd
Edit | Attach | Watch | Print version | History: r12 < r11 < r10 < r9 < r8 | Backlinks | Raw View | WYSIWYG | More topic actions
Topic revision: r12 - 2024-11-01 - MariHassanzada
 
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2024 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback