Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Additional Threats #8

Merged
merged 30 commits into from
Mar 7, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
30 commits
Select commit Hold shift + click to select a range
7a92ed3
- Initial DNS manipulation threat
shivaccuknox Jan 8, 2024
53f6247
- Generated README.md
shivaccuknox Jan 8, 2024
29d0442
- Converted the intent to actions
shivaccuknox Jan 8, 2024
56fd912
- Update the README.md
shivaccuknox Jan 8, 2024
dadb850
- Fixed gendoc.sh for correct README.md
shivaccuknox Jan 8, 2024
72f975e
- More changes
shivaccuknox Jan 8, 2024
9a21b2d
- Update README.md
shivaccuknox Jan 8, 2024
1ee5b3f
- More files
shivaccuknox Jan 8, 2024
60d57de
- Update README
shivaccuknox Jan 8, 2024
d35260d
- Update README.md
shivaccuknox Jan 8, 2024
a4cd13f
- Add more threats
shivaccuknox Jan 8, 2024
9cd00ae
- The security actions field does not need to have entries
shivaccuknox Jan 8, 2024
599d5d1
- Added README.md
shivaccuknox Jan 8, 2024
25805ef
- More threats
shivaccuknox Jan 8, 2024
9b6ae19
- More files
shivaccuknox Jan 8, 2024
363ac1e
- Mitre list for power optimization
shivaccuknox Jan 9, 2024
c15aaa9
- Minor changes
shivaccuknox Jan 9, 2024
f5680a4
- Table syntax changes
shivaccuknox Jan 9, 2024
6c92b6e
- More syntax changes
shivaccuknox Jan 9, 2024
94d6f3e
- More syntax changes
shivaccuknox Jan 9, 2024
dd2d2df
- More changes
shivaccuknox Jan 9, 2024
ee2e6da
- Update power opt details upto FGT1195
shivaccuknox Jan 9, 2024
3a98b27
- more changes
shivaccuknox Jan 9, 2024
9d9e8b9
- More changes
shivaccuknox Jan 9, 2024
02c1328
- Final changes for the power optimization scenario
shivaccuknox Jan 9, 2024
0683784
- Initial version of the actions
shivaccuknox Jan 10, 2024
0e2c010
- Added network traffic
shivaccuknox Jan 10, 2024
5746a0c
- Nit
shivaccuknox Jan 10, 2024
d4c9f98
- Nit
shivaccuknox Jan 10, 2024
476553d
- Integrity Protection
shivaccuknox Jan 10, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
29 changes: 20 additions & 9 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,9 +39,9 @@ mitigationMethods: # Mechanisms to mitigate the threat
- accuknox/ax0015
description: desc
url: https://...
securityIntents:
- sample-si-1.yaml
- sample-si-2.yaml
securityActions:
- sample-sa-1.yaml
- sample-sa-2.yaml
securityIntentBinding: # Set of labels, annotations describing workloads who would be impacted by this threat
- sample-si-binding.yaml
preDeploymentConsiderations: [ ] # Anything that can be done in CI/CD pipelines that can alleviate this threat
Expand All @@ -54,8 +54,19 @@ references:

## Security Threats

| Title | Description | Severity | Security Intents | References |
| Title | Description | Severity | Security Actions | References |
|:-----:|-------------|----------|------------|------------|
| [DNS Manipulation](threats/mitre/dnsManipulation.yaml) | An adversary can manipulate DNS requests to redirect network traffic and potentially reveal end user activity. | high | [accuknox/preventLocalDNSHijack](actions/accuknox/preventLocalDNSHijack), [mitre/integrityProtection](actions/mitre/integrityProtection), [mitre/networkTraffic](actions/mitre/networkTraffic) |[MITRE FiGHT](https://fight.mitre.org/techniques/FGT5006) |
| [Exploit Public-Facing Application](threats/mitre/exploitPublicFacingApplication.yaml) | | High | |[FGT1190](https://fight.mitre.org/techniques/FGT1190) |
| [Exploit Semi-public Facing Application](threats/mitre/exploitSemiPublicFacingApplication.yaml) | | High | [mitre/networkTraffic](actions/mitre/networkTraffic) |[FGT5029](https://fight.mitre.org/techniques/FGT5029) |
| [gNodeB Component Manipulation](threats/mitre/gNodeBComponentManipulation.yaml) | An adversary may compromise a component of gNodeB to affect radio network configuration | high | |[MITRE FiGHT](https://fight.mitre.org/techniques/FGT5032) |
| [Protocol Tunneling](threats/mitre/protocolTunnelling.yaml) | Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. | High | [mitre/encryptSensitiveInformation](actions/mitre/encryptSensitiveInformation), [mitre/networkTraffic](actions/mitre/networkTraffic) |[FGT1572.501](https://fight.mitre.org/techniques/FGT1572.501) |
| [Regitration of Malicious Network Functions](threats/mitre/registrationMaliciousNetworkFunctions.yaml) | An adversary, such as an insider to the MNO or vendor, could install a malicious NF into the core network, in order to launch other attacks or get access to information. | high | [mitre/networkSegmentation](actions/mitre/networkSegmentation) |[MITRE FiGHT](https://fight.mitre.org/techniques/FGT5006) |
| [Rogue xApps unauthorized access](threats/mitre/rogueXappsUnauthAccess.yaml) | Malicious xApps may gain unauthorized access to near-RT RIC and E2 nodes | High | [mitre/credentialAccessProtection](actions/mitre/credentialAccessProtection), [mitre/networkSegmentation](actions/mitre/networkSegmentation) |[FGT5034](https://fight.mitre.org/techniques/FGT5034) |
| [Software Deployment Tools](threats/mitre/softwareDeploymentTools.yaml) | Adversaries may gain access to and use third-party software suites installed within an enterprise network, such as administration, monitoring, and deployment systems, to move laterally through the network. | High | [accuknox/preventPkgInstall](actions/accuknox/preventPkgInstall) |[FGT1072](https://fight.mitre.org/techniques/FGT1072) |
| [SupplyChainCompromise](threats/mitre/supplyChainCompromise.yaml) | Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. | High | |[FGT1195](https://fight.mitre.org/techniques/FGT51195) |
| [Unauthorized access to Network Exposure Function (NEF) via token fraud](threats/mitre/unAuthAccessNEFTokenFraud.yaml) | An adversary controlling an (external) Application Function (AF) presents a fraudulent OAuth access token to access Network Exposure Function (NEF) services | High | |[FGT5011](https://fight.mitre.org/techniques/FGT5011) |
| [Valid Accounts](threats/mitre/validAccounts.yaml) | | High | |[FGT1078](https://fight.mitre.org/techniques/FGT1078) |

## Contributions welcome...

Expand All @@ -67,13 +78,13 @@ references:
```shell
cp res/threatTemplate.yaml threats/execution/threat-name.yaml
```
3. Create the Security Intent file(s) you listed in the `.securityIntents` field of the `threat-name.yaml` file, and
place them within the [intents](intents) directory. For e.g.,
3. Create the Security Actions file(s) you listed in the `.securityActions` field of the `threat-name.yaml` file, and
place them within the [actions](actions) directory. For e.g.,
```yaml
...
securityIntents:
- sample-si.yaml
- sample-si-2.yaml
securityActions:
- sample-sa-1.yaml
- sample-sa-2.yaml
...
```
4. Run `make`
Expand Down
12 changes: 12 additions & 0 deletions actions/accuknox/preventLocalDNSHijack
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
title: preventLocalDNSHijack
description: This attack consists of modifying the /etc/resolv.conf file
to point to a malicious DNS server. The mitigation consists of having an security engine rule preventing writes to /etc/resolv.conf file
severity: high
tags: [5gcore, edge, accuknox]
references:
- name: MITRE FiGHT
url: https://fight.mitre.org/techniques/FGT5006
- name: Hellfire
url: https://hellfire0x01.medium.com/get-familiar-with-dns-hijacking-2215a0a318d4
- name: SecurityTrails
url: https://securitytrails.com/blog/preventing-domain-hijacking-10-steps-to-increase-your-domain-security
16 changes: 16 additions & 0 deletions actions/mitre/integrityProtection
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
title: integrityProtection
description: There are multiple contexts here:
DNS Manipulation: In this context, integrity protection refers to ensuring
that the DNS responses integrity. Currently, there is no way to for security
engines to do this on the cluster. There are techniques to use DNSSEC
[ibm, microsoft] to secure DNS data validating the digital signatures.
of the
severity: high
tags: [5gcore, edge, mitre]
references:
- name: mitre
url: https://fight.mitre.org/mitigations/FGM1557
- name: ibm
url: https://www.ibm.com/docs/en/i/7.3?topic=support-domain-name-system-security-extensions-dnssec
- name: microsoft
url: https://learn.microsoft.com/en-us/windows-server/networking/dns/validate-dnssec-responses
9 changes: 9 additions & 0 deletions actions/mitre/networkTraffic
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
title: networkTraffic
description: Malware uses DNS as a transport to communicate with the command-and-control servers [infloBlox]. Hence the packets contents need to be checked for data exfiltration. Basic checks can be implemented by the security engines on the DNS packets
severity: high
tags: [5gcore, edge, mitre]
references:
- name: mitre
url: https://fight.mitre.org/data%20sources/DS0029
- name: infoBlox
url: https://www.infoblox.com/dns-security-resource-center/dns-security-faq/what-is-dns-protection/
Loading
Loading