Case Analysis

Throughout the collection of cases from V1 and V2, the Center team has put together several resources to inform insider programs through analysis of the submitted cases.

Frequency Heatmap

This heatmap contains the techniques of the MITRE ATT&CK® framework that were used in insider threat cases with an overlay of the frequency of each technique. The heatmap consists of three categories of frequency:

  • Frequent (Red): The technique was seen in more than 16% of cases submitted by participants.

  • Moderate (Orange): The technique was seen in 6-15% of cases submitted by participants.

  • Infrequent (Yellow): The technique was seen in less than 5% of cases submitted by participants.

Open Heatmap in Navigator Download Heatmap JSON

../_images/heatmap_InT_2.09.svg

Click to enlarge.

Evidence-Based Inferences

  • The majority of cases can be broken into two categories: exfiltration and fraud.

  • We did not observe any privilege escalation in the case data.

  • In many cases where fraud was detected, there was some form of immediate monetary compensation. In all of those cases, the compensation was under $250. and in most cases there were multiple instances of small amounts.

  • Indicators deemed non-technical can typically be grouped into T1657 - Financial Theft. These techniques can be broken down further into:

    • Circumventing Security Controls: security checks put in place by an organization were circumvented to avoid detection (e.g. improper key control or avoidance of cameras).

    • Collusion: multiple employees worked together to perform actions such as sending all customers to one employee for compensation.

    • Deceit for Personal Gain: Use of insider knowledge to decieve untrained employees.

    • Failure to Follow Procedure: Employees unintentionally or intentionally gave the wrong amount of money to a customer or improperly logged cash flows.

    • Physical Theft: Any type of theft that occurs with physical objects such as cash or physical machines.

Fraud

Insider threats routinely utilized their current given permissions to commit fraud. This was most commonly seen with T1565 Data Manipulation and T1136 Create Account. These permissions were used to generate illegitimate refunds and payments to accounts handled by the subject as well as to apply and approve for illegitimate loans. Privilege escalation was rarely identified when a subject was commiting fraud.

In fraud cases insider threats routinely researched the customer before committing fraud. This is seen in many instances of T1213 Data from Information Repositories prior to techniques such as T1098 Account Manipulation and T1565 Data Manipulation. The insider threat would utilize the internal customer database to review account information prior to targeting the customer’s account.

The common goal among insider threats committing fraud was monetary compensation. This occurred through four main methods:

  • Creation of accounts: The accounts created were loans for customers not present but verified by the insider threat, as well as the creation of illegitimate bank accounts. The information used to create these accounts were of family members or friends with no knowledge of the account. The account was maintained and used by the insider threat.

  • Unauthorized accessing of accounts: Legitimate accounts of customers that were accessed by the insider threat led to acts such as the processing of illegitimate payments or the altering of account data.

  • Processing refunds/payments: The insider threat processed payments from an existing customer account to an account managed by them, or processed refunds for accounts managed by them or a close acquaintance.

  • Altering accounts: Existing customer accounts were altered to allow for insider threats to remain in access without being detected. This included changing the email or phone number associated with the account.

Open Fraud Heatmap in Navigator Download Fraud Heatmap JSON

../_images/fraud_heat.svg

Click to enlarge.

Exfiltration

Data was often accessed from a data repository such as One Drive or SharePoint: Prior to exfiltration, files were accessed and downloaded from data repositories such as One Drive and SharePoint.

Data was commonly staged by the subject prior to exfiltration: Large quantities of files, 500+, were downloaded from shared resources such as OneDrive and SharePoint then stored locally on the insider’s system (T1074 Data Staged) or to an archived file (T1560 Archive Collected Data) prior to exfiltration.

A common exfiltration channel is USB/removable device storage: Due to the physical size of USB devices and other removable media it is easy to conceal and be transported in and out of organizations with little difficulty. Furthermore, these devices are often used frequently so their movement is less likely to raise red flags. T1052 Exfiltration Over Physical Medium is seen with a higher frequency, specifically USB devices (T1052.001 Exfiltration over USB) more than other exfiltration techniques.

Open Exfiltration Heatmap in Navigator Download Exfiltration Heatmap as JSON

../_images/exfil_heat.svg

Click to enlarge.

V1 vs V2

The knowledge base has grown between V1 and V2. Cases are showing that some techniques are continuing to be used with some frequency, but are also showing new techniques as well. In V2, we see more case data collected from various types of institutions including financial institutions. Due to this new variety of organizations it has opened the knowledge base to different types of techniques being seen. In V1 the common goal between cases was exfiltration. While this remained a key goal in case data from V2, fraud was also seen as another common goal. This added techniques such as financial theft and account manipulation. As the knowledge continues to grow receiving data from various types of organizations allows the team to see a broader picture of what techniques insider threats are using. In V1 there were 16% of ATT&CK techniques accounted. Even with the net increase of techniques contained in the ATT&CK knowledge base as it evolves over time, the V2 case data includes 22% of all techniques.

Limitations

  • When analyzing these submissions, it is important to keep in mind that researchers will not know the ins and outs of the organization contributing data. Therefore, context such as detection mechanism may not be known.

  • Some insider threats can go years without being detected, therefore all of the techniques an insider has used may not be identified.

  • The human factor has been identified as an area for growth, and our researchers are working to expand upon it. This specifically focuses on the Observable Human Indicators (OHIs). Collecting data about the insider threat allows for the identification of patterns, insights and possible warning signs.