Workflows for Identifying and Dealing with Advanced Threats and Sharing Information with the CiviCERT Community

      Comments Off on Workflows for Identifying and Dealing with Advanced Threats and Sharing Information with the CiviCERT Community

From the 3rd to the 6th December 2019, we held our first CiviCERT workshop on Workflows for Identifying and Dealing with Advanced Threats and Sharing Information with the CiviCERT Community. This workshop was coordinated and co-funded by DDP and Access Now. Greenhost kindly contributed to our dinner with all participants on the last day.

The workshop gathered 28 participants, among which 11 were female-identified, 15 male identified and 2 non binary/other identified. It also included a team of 7 facilitators from DDP, Access Now, Human Rights Watch, Amnesty Tech and Circl.lu. And there were participants from the following organisations: Access Now, Amnesty Tech, Center for Digital Resilience, Circl.lu, DDP, Defend Defenders, Freedom of Press, Front Line Defenders, Fundacion Karisma, Greenhost, Human Rights Watch, ShareCERT, Syrian Archive. Participants travelled from the following locations to attend the workshop: Bahrain, Brazil, Costa Rica, Colombia, Germany, Kyrgyzstan, Luxembourg, the Philippines, Serbia, the Netherlands, Uganda, USA and Zimbabwe.

In preparing for the workshop, we sent questions to all participants to get a better understanding of how they dealt with advanced threats in the field. We asked them to share 1 or 2 cases where they didn’t feel enough skilled or prepared to perform an initial triage of an advanced threat, and asked them to answer these questions in particular:

  • What kind of access did you have to the person looking for help?
  • Did you have access to the physical computer or mobile device?
  • Were you trying to collect indicators remotely via Teamviewer or remote desktop applications?
  • What kind of issues made you feel you could not deal with the threat?

We collected 14 answers that were reviewed by the team of facilitators in order to prepare the contents of their sessions.

Regarding the agenda, the first day has been focused in having the 28 participants getting to better know each other, sharing stories on advanced threats and starting a conversation on how to detect advanced threats. On the second day, the morning was focused on how to deal with advanced threats (Windows and Linux) and the afternoon on smartphones (Android and IOS). The third day was focused on MISP and information sharing and on the last day we split in break out groups to discuss more deeply several topics of interest for the community.

We include below more details regarding the contents and resources used during the workshop.

Training curricula

How to recognize advanced threats?

Tools for checking documents and links looking for malware

Live Forensics

Smartphone Forensics

MISP – Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing

Screenshot MISP Platform