Rsac 2023 Soc Findings Report
Rsac 2023 Soc Findings Report
Rsac 2023 Soc Findings Report
Published by
Written by
David Glover, Jessica Bair Oppenheimer, and Steve Fink
CONTENTS
Contents
TECHNOLOGY USED IN THE RSAC SOC .................................................................................................... 5
THE DATA ............................................................................................................................................ 10
Cleartext Usernames and Passwords................................................................................................ 11
Cleartext Usernames and Passwords: SNMP ..................................................................................... 11
Cleartext Usernames and Passwords: POP3/IMAP2/HTTP ................................................................. 13
Cleartext Usernames and Passwords: Password Security, Protocol Insecurity ..................................... 13
Stories of Insecurity ....................................................................................................................... 14
Dating App, password (sometime) strong but in Clear Text ............................................................... 14
Internet of Things .......................................................................................................................... 15
Unsecure Vendor ............................................................................................................................ 16
INTEGRATION AND THREAT HUNTING .................................................................................................. 17
Investigating Malware..................................................................................................................... 19
MALWARE ANALYSIS............................................................................................................................. 21
Documents in the Clear .................................................................................................................. 22
DOMAIN NAME SERVER (DNS) .............................................................................................................. 27
Automate, Automate ...................................................................................................................... 31
Apps, Apps and more Apps ............................................................................................................. 35
INTRUSION DETECTION ....................................................................................................................... 36
File Transfers ................................................................................................................................. 40
Malware Threats ............................................................................................................................ 44
Firepower Encrypted Visibility Engine (EVE) ..................................................................................... 46
Firepower and NetWitness Integration ............................................................................................. 47
More SIP........................................................................................................................................ 47
Other Firepower Statistics ............................................................................................................... 49
CONCLUSION ....................................................................................................................................... 51
ACKNOWLEDGEMENTS .......................................................................................................................... 52
It is important to clearly understand the role of the security operations center (“SOC”) at RSA Conference
(“RSAC”).
®
• The SOC is an educational exhibit sponsored by NetWitness , a RSA Security LLC company
(“NetWitness”) and Cisco Systems, Inc. (“Cisco”) that monitors network activity during the
course of the RSA Conference event.
• By connecting to Moscone Center WIFI or using the RSAC mobile application, all RSAC attendees
(including e.g., sponsors, exhibitors, guests, employees) accepted the following terms and conditions:
“THE WIRELESS NETWORK AVAILABLE AT THE MOSCONE CENTER IS AN OPEN, UNSECURED 5 GHZ NETWORK.
NETWITNESS AND CISCO SYSTEMS WILL BE USING DATA FROM THE MOSCONE WIRELESS NETWORK FOR AN
EDUCATIONAL DEMONSTRATION ON A WORKING SOC. WE STRONGLY RECOMMEND THAT YOU USE
APPROPRIATE SECURITY MEASURES, SUCH AS UTILIZING A VPN CONNECTION, INSTALLING A PERSONAL
FIREWALL AND KEEPING YOUR OPERATING SYSTEM UP-TO-DATE WITH SECURITY PATCHES. WE RECOMMEND
TURNING OFF YOUR WIRELESS ADAPTER WHEN NOT IN USE AND ENSURING AD-HOC (PEER-TO-PEER)
CAPABILITIES ARE DISABLED ON YOUR DEVICE.).”
• Additionally, RSA Conference advised attendees of the educational SOC in printed materials and
onsite signage.
• The SOC is not a true security operations center. The infrastructure at the event is managed by the
Moscone Center, except for Cisco Umbrella DNS, and only has a SPAN of the network traffic from the Moscone
Center wireless network (named .RSACONFERENCE). There are limited log files from Cisco Firepower
Threat Defense Intrusion Detection System (IDS) because it is not inline; however, the primary data is a
real-time mirror of the traffic traversing the wireless network.
• The SOC goal is to use technology to educate RSAC attendees about what happens on a typical open,
unsecured wireless network. The education comes in the form of SOC tours, an RSAC session and the
publication of a Findings Report issued by sponsors RSA and Cisco.
• The RSAC SOC team is not part of the RSAC security team. As such, the RSAC SOC acted as an
educational exercise only and was not intended to protect, mitigate or remediate any issue uncovered
during the SOC educational exercise.
• “The network” is a typical network that users connect to for internet access, similar to networks in
hotels, airports or coffee shops. The network used during RSAC is an open network offered by the
Moscone Center.
• The findings of this report and any security issues identified relate to user activity, not the network itself.
• Data collected by the RSAC SOC has been wiped and a certificate of completion is held by RSAC.
NOTE: This report was prepared as a summary of the RSA Conference educational SOC exercise. RSA, Cisco nor any of
their employees or subcontractors, makes any warranty, express or implied, or assumes any legal liability
or responsibility for the accuracy, completeness, or any third party’s use or the results of such use of any information,
product, or process referenced or disclosed herein, or represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise,
does not necessarily constitute or imply its endorsement or recommendation.
The RSACONFERENCE wireless network is a flat network with no (as in zero) host isolation. This alone is an
important statement and a great starting point for understanding wireless networks and the risks
associated with connecting to them. A flat network without host isolation means that anyone with an IP
address can theoretically communicate to any other devices on the network. Host isolation provides a
device a one-way route out to the internet, but no routes within the network. Knowing which type of
network you are attaching to can be discovered by identifying your IP address and trying to ping
another IP address on that network. If you get a response, you are on a network without host
isolation; if you get a “request timed out” response, you are probably isolated.
The RSAC SOC team deployed the NetWitness platform, including NetWitness® Network,
NetWitness® Logs and NetWitness® Orchestrator. Also, Cisco XDR, Cisco Secure Malware Analytics
(formerly Cisco Threat Grid), Cisco Talos Intelligence, Cisco Firepower Threat Defense Intrusion
Detection, Cisco Secure Cloud Analytics, Cisco Defense Orchestrator and Cisco Umbrella®.
For threat intelligence, the SOC received donated licenses from alphaMountain.ai, IBM X-Force
Exchange, Recorded Future and Pulsedive, along with open-source threat intelligence.
NetWitness Logs is a security monitoring and forensics tool that collects, analyzes, reports on and
stores log data from a variety of sources to support security. NetWitness Logs parses, enriches, and
indexes logs at capture time, creating sessionized metadata that serves to accelerate alerting and
analysis.
NetWitness Network provides real-time visibility into network traffic. It enables detection and threat
hunting with streamlined workflows and automated investigation tools used to monitor the timing and
movements of threat actors. NetWitness Network utilizes correlation, data science and threat
intelligence to detect anomaly and speed response. The proprietary capability to reconstruct the full
communication sessions permits to have a deep analysis and detection. It allows analysts to have a
full picture of the communication and to hunt for threats without ever having to look at a raw packet
again. This capability permits also to extract file also if it’s incapsulated in a non-standard/unknown
protocol.
NetWitness collected all the raw network traffic from a switch port analyzer (SPAN) from the Moscone
Center network, generated metadata, and visually prioritized threats occurring in real time.
It inspected every network packet session for threat indicators at time of collection and enriched this
data with threat intelligence and business context.
For suspicious files that might be malicious, NetWitness checked a community anti-virus (AV) lookup,
some static analysis, and its own network intelligence. NetWitness Orchestrator, built on
ThreatConnect, then sent the files to Cisco Secure Malware Analytics for dynamic malware analysis.
Secure Malware Analytics combined advanced sandboxing with threat intelligence in one unified
solution to protect organizations from malware. It analyzed the behavior of a file against millions of
samples and billions of malware artifacts. With Secure Malware Analytics, the RSAC SOC team had a
global and historical view of the malware, its activity, and how large a threat it posed to the RSAC
network.
Secure Malware Analytics identified key behavioral indicators of malware and their associated
campaigns, which enabled the RSAC SOC team to save time by quickly prioritizing attacks with the
biggest potential impact. The built- in Glovebox user interaction tool made it possible to safely
interact with samples and observe malware behavior directly.
Cisco Secure Firewall Firepower Threat Defense IDS received the same network SPAN as RSA
NetWitness Network. The IDS inspected all wireless guest traffic from event attendees, configured in
monitor-only mode. Firepower Threat Defense offered breach detection, threat discovery and security
automation. Rich contextual information (such as applications, operating systems, vulnerabilities,
intrusions, and transferred files) served the SOC to help uncover threats lurking on the network. The
Cisco Umbrella provided visibility into DNS activity, with default security blocking turned off. We also
used Cisco XDR, which integrated threat intelligence from the Cisco Talos intelligence team and other
sources, along with correlating sightings of indicators of compromise / observables from NetWitness
and the Cisco Secure Firewall / Firepower logs and Umbrella DNS queries, along with the network
visibility from Secure Cloud Analytics. Below is a visual representation of the technology used at the
RSAC SOC.
A commonly requested RSAC SOC Findings session, attendees requested more statistics. The RSAC
SOC team tried their best to provide more statistics and refined context and granularity.
2023 Stats
The RSAC SOC started analyzing all wireless traffic on Monday, April 24, and collected traffic
through Thursday, April 27, 2023, at 3p.m. There were 383 million sessions during this period.
Which was ~2 times the amount of traffic collected from RSAC 2022. This corresponds to a
bandwidth utilization of 1.8 Gbps vs. 2020 of 1.3 Gbps and 740 Mbps in 2019.
Historically speaking, for events where this team has provided services like this, such as in the
United States and the United Kingdom, the average percentage of encrypted vs. unencrypted traffic
has varied from 60-78 percent encrypted and 22-40 percent unencrypted. For RSAC 2023, the SOC
saw a downtrend in the amount of encrypted traffic, at 75 percent, from 78 percent in both RSAC
2019 and 2020. 55,029,102 of the 70,440,998 sessions were encrypted.
The role of the RSAC SOC around this issue is to help educate RSAC attendees about the
information that is readily available on a public wireless network. In the past, we have spoken to
many people on SOC tours about their mobile applications. We have seen mobile applications such
as dating and home security video camera applications streaming data in the clear. Authentication
to the apps was secure, but once authenticated, the data went back to an insecure transport—and
we could see it all. Fortunately, many of these applications, but not all, have been secured and are
now using secure protocols post-authentication to secure viewing.
Security Events
Security conferences typically have many vendors displaying their wares on the expo floor. RSAC is
no exception, and some of these cleartext usernames and passwords appeared to be from demo
environments. Looking at other protocols, the majority of the cleartext usernames and passwords
came from older protocols such as POP3, IMAP2, HTTP and FTP.
The use of POP3, IMAP2 and HTTP could provide an interesting conversation about who, what,
where and why. It is difficult to send email in cleartext these days, and analyzing these incidents
found similarities. Most of this traffic was to and from hosted domains. This means email services
on domains that are family names or small businesses. The RSAC SOC team plans to work with
RSAC to help notify those who are sending email in cleartext.
A nice consideration about this finding. Users are now also using strong and complex passwords.
Unfortunately, you can use any kind of complex password but if no encryption is adopted no strong
password is strong enough to protect data confidentiality.
Once again, within the cleartext username and password data, there were passwords that were
very complex. This means the passwords were long, and they had upper- and lower-case, numeric and
RSA Conference 2023 Security Operations Center Findings Report 13
special characters. Password security is very important, but if we do not understand the protocols
we use, our efforts in security education are wasted. The passwords are complex (red rectangles in the
image above), but it doesn’t matter because they were sending the data in cleartext. Ultimately, you
must understand your device and its protocols, and use strong passwords—because as strong as some
of these were, they were in cleartext.
Stories of Insecurity
During the RSAC, we observed evidence that the common cybersecurity best practices are not fully
adopted. In the actual growing hyperconnected world the number of systems that can be connected
to the internet has increased, but the common security best practices are not always implemented.
Analyzing the findings of the impression is a missing of the “awareness”, and users are relying on
and trusting vendors or engineers, but they ignore what a system is doing under the hood. They are
not fully aware that the best securities are ignored. In the following sections we describe some clear
evidence of this.
The username (full email address) was transmitted in the clear, with an encrypted password.
However, the IOT device responded to the device’s admin user and password in clear text.
This specific situation evidenced how not all the developers and engineers for IoT are adopting
security development and a strong security. In these scenarios, we don’t just have a behavior of
compromise, but also a risk for the privacy.
Also, our pets are at risk for the privacy and…for the food. NetWitness platform found unencrypted
traffic related to an app to manage our pets and their daily feeding. Also in this case, the credential
was in clear text and the credential too.
Unsecure Vendor
A user was using a VPN tunnel from a famous security enterprise vendor used by his company.
Unfortunately, it wasn't working as expected. The application created the tunnel, but the traffic was
not encrypted, and the communication was totally in clear text. You can also leverage on the
famous security vendor, but you should always configure it in the best way possible.
Lesson Learned: Companies that adopt a security platform to protect the asset should also ensure
that the system is working as expected and leverage the right competencies to guarantee the
correct configuration. Also, proactive and periodical checks of the security posture of security tools
are a good approach to ensure time by time everything is working as expected.
Cisco brought Cisco XDR, Umbrella, Secure Firewall, Secure Malware Analytics, Secure Cloud
Analytics, Cisco Defense Orchestration, Secure Network Analytics, and Cisco Telemetry Broker, to
provide visibility and integrate with NetWitness and threat intelligence partners.
The Cisco XDR Control Center widgets provided insights into the network data and any threats.
Cisco built a custom integration with NetWitness to visualize sightings, targets and relationships
during investigations. This custom integration connects the NetWitness platform hosted at the RSAC
conference, using Security Services Exchange.
Investigating Malware
The SOC team received about 60 alerts about malware downloads and/or download attempts, over
the course of 48 hours, from 13 endpoints -- always attempting to download one or more of the
same three known malicious PNG files, from the same domain and URLs. We have to allow
demonstrations/briefings/trainings on malware, but always investigate to ensure the network is not
compromised and attendees are safe.
The malicious files were Trickbot, as identified by our integrations with Cisco Talos, Cisco Secure
Endpoint’s file reputation database, AlienVault and IBM X-Force Exchange.
Easily explained in this case by “because vendor booth demos at a security conference”, but in your
environment, it might mean lateral movement – or a dedicated attacker trying the same attacks
against multiple spear phished targets. The fact that it hadn’t worked *yet* shouldn’t keep you in
the dark about a pattern of targeted attempts.
The RSAC SOC team sent over 400 potentially malicious files to Secure Malware Analytics via the
NetWitness platform and Secure Firewall, for automated behavioral analysis.
To emulate a user automatically during sample analysis, Secure Malware Analytics provides user
emulation through playbooks, which are pre-defined steps that simulate user activity. A system with a
user present appears vastly different from an automated analysis system (i.e., a sandbox). For example,
an automated system may execute a submitted sample, but never change windows or move the mouse.
On the other hand, a system with a real user present will have mouse movement and window changes as
the user proceeds with a task or attempts to determine why the file they just opened did nothing.
You can also select the Network Exit, to investigate malware that behaves differently by region.
NetWitness found and analyzed many email attachments which were in the clear. Any attendee at
the conference who had the right tools and knowledge, would have been able to view the
attachments.
They also included confidential sales presentation, where a username and password were required
to access the file server, but then the documents were downloaded in the clear.
The Cisco team built an improved Tower Light. This year, five RGB Matrix panels, using more than
20,000 LED’s, scrolled messages and simulated the Tower Light, using a custom Cisco XDR
Automation workflow to interact with Secure Malware Analytics and NetWitness. When an alert
occurred, the workflow caused the light to flash or pulse and indicate its status.
The SOC had complete DNS visibility, thanks to the support of the Moscone Center agreeing to
change their DNS to Cisco Umbrella and installing an Umbrella virtual appliance in the Network
Operation Center. The default security settings for Cisco Umbrella are to block malware, command-
and-control callback, and phishing attacks. All blocking was turned off for the conference network.
We saw over 53 million DNS requests over the week, of which several thousand would have been
blocked for security.
Domains also could have been blocked for content, such as pornography, hate/discrimination or
other such categories. It is not possible to turn off blocking for certain queries that are criminal in
nature.
And if there is any true indication that the pandemic is behind us, look no further than the RSA
dating scene. Once again, Grindr’s grinders topped the show with over 5,000 DNS requests made,
more than every other dating app combined. Not far behind was Tinder at a little over 3,900, while
the more serious dating apps took a back seat here.
Investigation identified the IP address of the user and the frequency of the DNS requests.
This included the global query volume and that it was not a recently created domain.
We dug in deeper with an investigation in Cisco XDR investigate, where we could see the threat
intelligence about the domain and related artifacts. We could see multiple hosts requesting
resolution for 1passworb.com, global threat intelligence from APIvoid and sightings from Netwitness
in one view.
The investigation pointed to a demo in the Expo Hall, an acceptable use of the conference network.
Discovered Applications
Firepower detected over 1,500 different applications during the conference, with the number of
unique applications concurrently seen on the network spiking during conference hours each day.
The operating systems generating application traffic were primarily Apple, which took the top two
spots with Mac OSX and iOS.
Daily OS counts also help provide a rough number of how many attended the event for that day.
However, the wireless session lease was only three hours, which makes it difficult to make more
precise daily OS counts. The same user connected to RSAC Wi-Fi could show multiple counts in one
day. It is recommended to configure a wireless lease of more than one day to help correlate events
for a user the next day.
Web Application traffic was dominated by the major tech companies Apple, Google, and Microsoft.
In social media, Facebook and Instagram took the top spots. IPsec also made the list, indicating
that many visitors were using a VPN over the RSAC Wi-Fi.
Port Scanning
On Monday, 24 April, an IP address was identified making connections to many IPs on the guest
wireless network and connected subnets.
However, no connection had more than 4 response packets, and it does not appear that logins were
attempted or successful. Below is a screenshot of an SSH connection that progressed beyond the
initial SYN packet, with the scanning device forcing a reset of the connection after receiving a TCP
Window Update from the server.
The scanning device also connected to the internet, where an HTTP GET request was recorded by
NetWitness.
File Transfers
File monitoring and analysis yields valuable network monitoring information, as well as providing
insight into the types of users in the network. The large number of locally spread malware files
indicate that someone was downloading these files locally from inside the network.
If it was not already known to the SOC who perpetrated the dump, these malware files could also
provide other information such as:
• User education covering email security (what to click and what to not click.)
• Target analysis: Is the company network being targeted specifically with these files?
• Files with the help of our Cisco Secure Cloud Lookup and Talos Intelligence integration.
At RSAC 2023, Cisco Secure Firewall’s detected potential C2C and DGA (Domain Generation
Algorithm) technique. We saw some hosts using DGA technique to generate new domain names
and IP addresses for malware’s command and control servers. Executed in a manner that is
random.
More SIP
In 2022, the SOC team members saw clear text Session Initiation Protocol (SIP) Control Channel (setting up
audio call) under user activity in the Cisco Secure Firewall Management Center.
From this experience, we again investigated SIP traffic. We found attendees connecting on a
dating/marriage site via unencrypted SIP messages:
• Msg from RXXX DXXXX: “Hi, I liked the Profile that you have posted on SXXXX.com!
Please visit my Profile and respond. https://t.sXXXXX.com/L/VKXXX“
• SIP server: 216.XX.XXX.XX
Firewall’s deep packet inspection makes it capable of learning about every user’s activity and
capture details like Usernames/password from applications like FTP, SIP (VoIP), non-encrypted
email (IMAP, POP3), API’s not using encryption for many apps like an automatic dog feeder.
Following are some of the performance statistics for peak traffic, total number of connections and
events/connections per second from firewall.
Connections/sec: 2.37K
After a few years of slight improvement with using encryption and secure protocols, 2023 was a
step back. We can all make greater strides in becoming more secure, but we need to learn to stop
giving away valuable information that can only hurt us. We have valuable information and—based
on analysis of this free public wireless network—we are giving away way too much of that
information.
The percentage of encrypted traffic rose two percent to 80 percent. Encrypt, encrypt…trust, but
verify!
You can view the presentation and recording from the 4th Annual SOC Report here.
We’re looking forward to monitoring traffic at next year’s RSAC and reporting the results to you.
The RSAC SOC team is always looking for ways to educate and assist attendees.
• Use a Virtual Private Network
• Use a personal firewall when possible
• Keep your operating system patched
• Check your configuration settings
Thank you to the amazing engineers and analysts who made the SOC possible:
NetWitness Staff
Steve Fink
Dave Glover
Iain Davison
Alessandro Zatti
Coody Spooner
Bart Stump
Bj Deonarain
Joseph Murphy
Theodore Hanibal
Kalyan Ramkumar
Cisco Staff
Jessica Bair Oppenheimer Cisco SOC Manager
Ian Redden Team Lead & Integrations
Aditya Sankar / Ben Greenbaum Cisco XDR, Secure Cloud Analytics & Malware Analytics
Alejo Calaoagan / Christian Clasen Cisco Umbrella
Dinkar Sharma / Adam Kilgore Cisco Secure Firewall
Brian McMahon Threat Wall
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in
the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are
the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.
(1110R)