Reverse Attack Simulations

As a means to develop our business we like to think about and prototype new ideas on how to improve and extend threat modeling, attack simulations and securiCAD. This happens down in the Foreseeti mine where our engineers are most happy. We have different shafts with different topics open. This blog series summarizes some of that work. 

Share on facebook
Facebook
Share on twitter
Twitter
Mathias Ekstedt

Mathias Ekstedt

Co-founder of Foreseeti and Professor in cyber security at KTH Royal Institute of Technology

We are currently participating in an Innovation Project about the next generation SOC. Our task in the project is to develop solutions for empowering SOCs with attack simulation-based information to support more well-informed decisions with respect to protecting enterprise ICT infrastructures. But the project has also made us think bigger, and at least somewhat close to the walls of the famous box. Could we perhaps also help the CSIRT somehow with our attack simulations? Here is a thought.  

Introduction Soccrates: SOC & CSIRT Response to Attacks & Threats

securiCAD makes attack simulations looking forward, in principle answering the question how difficult would it be for an attacker to reach to X starting from Y. But sometimes we know that Y was compromised. In that case we could clearly help the SOC with assessing the risk of that breach in terms of estimating how difficult it would be to reach Z (where the really, really sensitive stuff resides). But, moreover, if we assumed that the attackers actually came from X (perhaps the internet), how would they then easiest have gotten to Y?  

Wouldn’t it make sense to direct your forensic investigations along that critical path? In principle, yes! But there are caveats… Our attack simulations are not really predicting actual attacker behaviour, we just use them to identify vulnerabilities and risks in the system architecture. The attack simulations are shortest path calculations, most likely our antagonist was not optimal in its behaviour. Moreover, simulations are based on generic attacker profile, it is everybody and nobody, but during an attack clearly the compromise was done by somebody. But then again… 

… In a complex environment to start looking along the simulated attack vector is far better than taking a wild guess. And once we know more, we can narrow down simulation scenarios (how do you get from X to W that is preceding Y) or perhaps update simulation probability distributions with information about some specific attacker profile. We hope to be able to deliver something along the lines of these thoughts to the very exciting project (yes, we encourage you to follow the link above to read more about the cool work we and the other partners are doing).

 
 
And while the project clock is ticking, we keep scratching our heads about how to add features to securiCAD with respect to this topic. Let us know your thoughts – holler down the mine!  

 

About Foreseeti

Foreseeti is a leading provider of Automated Cyber Threat Modeling and Attack Simulation Solutions.
Our flagship products, the securiCAD solutions, empower IT decision makers with insight to the cyber risk exposure and resilience of their IT architectures, uncovering critical paths to high value assets and weak spots in the architecture so that proactive actions can be taken where they really matter.
Our solutions are used around the globe by a broad audience, including national and multi-national companies and organizations, critical infrastructure operators, leading consulting firms, and other companies for whom cyber security is truly important. We have certified partners around the globe and are proud to be an AWS Select Partner.

Let Foreseeti show you how the Security Organization can lead transformation, schedule a demo.

Capability PROFESSIONAL VANGUARD ENTERPRISE
Automated model generation

SDK/APIs

Manual model creation & editing

Attack Simulations

Risk levels, Attack Paths & Chokepoints

Threat Summary & Suggested Mitigations

Multiple attack scenarios & comparisons

Advanced Analysis, Reporting & Progress tracking

Multiple projects and models

Multiple Environments (On-prem, cloud, custom)

Multi-user collaboration

Capability VANGUARD ENTERPRISE
Automated model generation

SDK/APIs

Manual model creation & editing

Attack Simulations

Risk levels, Attack Paths & Chokepoints

Threat Summary & Suggested Mitigations

Multiple attack scenarios & comparisons

Advanced Analysis, Reporting & Progress tracking

Multiple projects and models

Multiple Environments (On-prem, cloud, custom)

Multi-user collaboration

WEBINAR NOVEMBER 19TH 17:00-18:30 CET

Automate Cyber Security in Cloud and DevOps Environments

We warmly welcome You to this webinar where our experts present leading security trends in using open-source software, hacker-powered knowledge, and attack simulations – automated in your pipelines!

detectify_outlined_logo_RBG
cropped-Debricked_LogoTransparentwhite (1)