Page 1254 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1254

breaches in the past. For example, in the Sony attack of 2014,
               attackers exfiltrated more than 25 GB of sensitive unencrypted data on

               Sony employees, including social security numbers, medical, and
               salary information. If the attackers didn’t encrypt the data prior to
               retrieving it, a DLP system could have detected attempts to transmit it
               out of the network.

               However, it’s worth mentioning that advanced persistent threats (such
               as Fancy Bear and Cozy Bear discussed in Chapter 14) commonly

               encrypt traffic prior to transmitting it out of the network.



                             The U.S. Department of Homeland Security and the

                  Federal Bureau of Investigation released a joint analysis report

                  (JAR-16-20296A) in December 2016 outlining the actions of Fancy
                  Bear (APT 28) and Cozy Bear (APT 29).




               Steganography

               Steganography is the practice of embedding a message within a file.
               For example, individuals can modify bits within a picture file to embed
               a message. The change is imperceptible to someone looking at the
               picture, but if other people know to look for the message, they can
               extract it.

               It is possible to detect steganography attempts if you have the original

               file and a file you suspect has a hidden message. If you use a hashing
               algorithm such as Secure Hash Algorithm 3 (SHA-3), you can create a
               hash of both files. If the hashes are the same, the file does not have a
               hidden message. However, if the hashes are different, it indicates the
               second file has been modified. Forensic analysis techniques might be
               able to retrieve the message.

               In the context of egress monitoring, an organization can periodically

               capture hashes of internal files that rarely change. For example,
               graphics files such as JPEG and GIF files generally stay the same. If
               security experts suspect that a malicious insider is embedding
               additional data within these files and emailing them outside the
   1249   1250   1251   1252   1253   1254   1255   1256   1257   1258   1259