Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In this activity, you are a junior administrator at Rezifp Pharma Inc. The company maintains a large database of data associated with patients, doctors, and

In this activity, you are a junior administrator at Rezifp Pharma Inc. The company maintains a large database of data associated with patients, doctors, and their treatments. These files are maintained on a local server.
The local server was hit with MedusaLocker, a nasty ransomware attack that left all the organizations hard drives crypto-locked.
Under extreme pressure to restore medical services, your organization decided to pay the ransom using Bitcoin. The drives were subsequently unlocked and all data was recovered. However, you noticed that new user accounts have been created. Youve already confirmed that these users do not exist within your company.
This implies that MedusaLocker left behind a specific type of malware, known as a logic bomb, designed to create persistent backdoor access into the system by creating new user accounts.
The term comes from the idea that a logic bomb explodes when it is triggered by a specific event. Events could be a certain date or time, a particular record being deleted from a system, or the launching of an infected software application.
To help mitigate against future ransomware attacks, you have decided to create an event monitoring system that specifically generates alerts when new user accounts are created and/or modified. Typically, attackers will create a user account for themselves to establish persistence, in addition to using cron to keep their backdoors open.
Instructions
Install auditd using the apt package manager.
Verify the auditd service using the systemctl command.
Configure the /etc/audit/auditd.conf file with the following parameters using sudo:
Log file location is /var/log/audit/audit.log.
Number of retained logs is 10.
Maximum log file size is 50.
Check to make sure there are no existing rules.
Create a rule that will monitor /etc/passwd and /etc/shadow for any changes.
Restart the auditd daemon.
Check to verify the new rules have taken place.
Add a new rule to audit the /usr directory.
Verify the new rule by listing auditcl rules.
Perform a search in the authentication report for user authentication attempts.
Make sure to disable your current sudo access with sudo -k. This option revokes your current sudo session, requiring you to have to enter your password on your next sudo command.
Perform a sudo su three times using the wrong password, then run the same report again.
Create a new user, criminal, then perform a search for account modifications

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases Organizing Information Digital And Information Literacy

Authors: Greg Roza

1st Edition

1448805929, 978-1448805921

More Books

Students also viewed these Databases questions

Question

b. Why were these values considered important?

Answered: 1 week ago