Insider Threat
- brencronin
- Nov 26, 2024
- 3 min read
Updated: Feb 2
Three categories of Insider Threats:
Malicious insiders
Theft of IP
Sabotage
Espionage
Negligent Insiders
Ignoring policy and procedures
falling for phishing or social engineering attacks
Misusing or oversharing privileges
Accidental insiders
Accidental disclosures of sensitive info (e.g., emails, file uploads)
Loss of devices
Unintentional installation of software
Systematic ethical decisions
Employees who have people problems.
Many corporations are blocking the usage of personal applications entirely (e.g., google, webmail, drop box, etc) and also adding additional levels of system monitoring like Proofpoint ObserveIT activity recording.

List of some insider threat indicators:
Direct correspondence with competitors
Email messages with abnormally large attachments or amounts of data
Domain Name System (DNS) queries associated with Dark Web activities
Use of activity masking tools (e.g., virtual private networks [VPN] or the Onion Router Tor])
Executing offensive tools
Executing malware
Connecting an unauthorized device to the network
Downloading or installing prohibited software
Unexpected activity outside of normal working hours
Attempts to bypass or disable malware protection tools or security controls
Attaching an unidentified device to a workstation (USB, external hard drive)
Maintaining access to sensitive data after termination notice
Different users attempting to log in from the same workstation or device
Lack of log messages or monitoring data
Unauthorized modification of centrally stored files
Copying large numbers of documents to a local drive
Authentication failures or failed login attempts
Unauthorized configuration file changes or permission changes
Unauthorized database content changes
Irresponsible social media habits
Unauthorized attempts to escalate permissions or privileges, especially without a need to know
Attempting to print or copy protected or restricted documents
Abnormally large number of software or operating system errors
Insider attempts to access resources not associated with that insider’s normal role
User account used from multiple devices
Multiple accounts identified for a single user
Triggering of key words or phrases in emails, text messages, or phone calls
Tools used to abuse Insider Threats
Anonymity Tools - VPNs
??????
Anonymity Tools - Browsing
Thanks for pointing out TAILS "The Amnesiac Incognito Live System". I have heard of it but never used it.
"Recently the Afaaq Electronic Foundation (AEF), an arm of the Islamic State who are dedicated to “raising security and technical awareness” among jihadists, published their advice on how to avoid law enforcement surveillance. Their message was broadcast on Telegram, with a message of “Stay calm and use strong encryption”: It provides a focus on the three T’s which are cause law enforcement to lose sleep: Tor, Telegram and Tails OS." (Buchanan, 2018).
The TAILS feature to wipe memory seems pretty bullet-proof. The main forensic evidence for CD-booted filesystems are gathered through memory analysis. The TAILS memory wipe feature adds an additional hurdle to the investigator in that they would have to capture memory while TAILS is being used.
"By automating forensic memory analysis of RAM, Digital Forensics Solutions has provided investigators with a method to completely reconstruct a live CD-booted filesystem. Recovery of the filesystem not only allows for standard forensic process to be followed, including the recovery of all relevant evidence, but it also allows for the evidence obtained and the results gathered to be used in a legal setting. Through the development of the Volatility memory analysis plug-in, the anti-forensics power of live CDs has been greatly diminished, and analysis of these systems is now possible for investigators of all skill levels." (Case, 2011).
To add even more security TAILS started supporting secure boot in 2020.
"However, until today, despite the plethora of security and privacy features it possessed, Tails did not support UEFI Secure Boot setups. Users who wanted to use Tails on a computer had to disable Secure Boot in the computer's BIOS, leaving their devices vulnerable to firmware tampering that could later compromise the communications carried out through Tails. According to the Tails website, work began on adding Secure Boot to Tails six years ago (Links to an external site.), and starting with Tails 4.5, released yesterday (Links to an external site.), users can now safely enable Secure Boot and run it alongside Tails, out of the box, without having to do anything or run complicated workarounds." (Cimpanu, 2020)
References
Buchanan, B. (2018, August 2018). The 3T challenge for digital forensics: Tails, Telegram and Tor. Medium. Retrieved September 10, 2021 from https://medium.com/asecuritysite-when-bob-met-alice/the-3t-challenge-for-digital-forensics-tails-telegram-and-tor-8d800c42af15 (Links to an external site.)
Case, A., Pfeif, D. (2011). Evidence Technology Magazine. Forensic Investigation of Live CDs. Retrieved September 10, 2021 from https://www.evidencemagazine.com/index.php?option=com_content&task=view&id=735&Itemid=50 (Links to an external site.)
Cimpanu, C. (2020, April 8). Tails, the security-focused OS, adds support for Secure Boot. ZDNet. retrieved September 10, 2021 from https://www.zdnet.com/article/tails-the-security-focused-os-adds-support-for-secure-boot/
References
Johnson, J. (2021, January 21). Most common data exfiltration behaviors during insider threats in the United States in 2020. Statista. Retrieved August 21, 2021 from https://www.statista.com/statistics/1155846/most-common-data-exfiltration-insider-threat-types-usa/
Коментарі