Sure, being an adversary-emulating red teamer sounds thrilling when you’re hired to phish a CFO and sneakily bypass a company’s security defenses, but nobody ever talks about all the paperwork. Red teams frequently have to document the many steps of their path inside a company–and then present those notes to blue-team defenders for review. A “Stepping Stones” logging tool from NCC Group, released in June 2024, aims to help organize the infiltration. “It helps with that retrospective tracking for the blue team, because all of the events are logged at a specific time against a specific machine. So the blue team knows where to go and hunt for any logs that might have been missed,” Stephen Tomkinson, principal security consultant at NCC Group, told IT Brew. As a member of NCC Group’s Full Spectrum Attack Simulation (FSAS) team, Tomkinson often infiltrates the IT systems of big companies, including those in the financial sector. An exercise may feature a red team phishing their way into one laptop, which then potentially leads to access to additional company systems, or leads to the testers installing the adversary-simulation program Cobalt Strike, which simulates attacker tactics like recon and lateral movement. Read the rest here.—BH |