DDoS Attack Incident Report
Incident Response & Reporting, NIST CSF, Compliance, Vulnerability Assessment & Mitigation, Network Security
Contents
Scenario
I’m a cybersecurity analyst at a multimedia company that provides web design, graphic design, and social media marketing services to small businesses. Recently, our organization faced a DDoS attack that disrupted our internal network for two hours.
During the attack, our network services suddenly became unresponsive due to a massive influx of ICMP packets. This essentially blocked normal internal network traffic from accessing any network resources. Our incident management team responded by blocking incoming ICMP packets, taking non-critical network services offline, and restoring critical network services.
Subsequently, our cybersecurity team conducted an investigation into the security incident. We discovered that a malicious actor had flooded our network with ICMP pings through an unconfigured firewall, exploiting this vulnerability to launch a distributed denial of service (DDoS) attack that disrupted our operations.
Objectives
Analyze the situation using the NIST CSF and create an incident report, building trust and improving security practices within the company.
Results
NIST CSF Incident Report
Identify | An ICMP flood attack was used by the threat actor. The systems affect were the network server, network router, and firewall. |
Protect | The following protective measures must be put in place to prevent further occurrences of this type of attack:
|
Detect | Implementing both an IDS and IPS system will help monitor and stop any malicious network activity such as an ICMP flood attack. Employing the use of SIEM tools will help cybersecurity personnel monitor and analyze both normal and malicious network traffic. |
Respond | In response to this type of attack, the Cybersecurity team can perform the following:
|
Recover | To recover:
|