Answered step by step
Verified Expert Solution
Question
1 Approved Answer
In this activity, you are a junior administrator at Rezifp Pharma Inc. The company maintains a large database of data associated with patients, doctors, and
In this activity, you are a junior administrator at Rezifp Pharma Inc. The company maintains a large database of data associated with patients, doctors, and their treatments. These files are maintained on a local server.
The local server was hit with MedusaLocker, a nasty ransomware attack that left all the organizations hard drives cryptolocked.
Under extreme pressure to restore medical services, your organization decided to pay the ransom using Bitcoin. The drives were subsequently unlocked and all data was recovered. However, you noticed that new user accounts have been created. Youve already confirmed that these users do not exist within your company.
This implies that MedusaLocker left behind a specific type of malware, known as a logic bomb, designed to create persistent backdoor access into the system by creating new user accounts.
The term comes from the idea that a logic bomb explodes when it is triggered by a specific event. Events could be a certain date or time, a particular record being deleted from a system, or the launching of an infected software application.
To help mitigate against future ransomware attacks, you have decided to create an event monitoring system that specifically generates alerts when new user accounts are created andor modified. Typically, attackers will create a user account for themselves to establish persistence, in addition to using cron to keep their backdoors open.
Instructions
Install auditd using the apt package manager.
Verify the auditd service using the systemctl command.
Configure the etcauditauditdconf file with the following parameters using sudo:
Log file location is varlogauditauditlog
Number of retained logs is
Maximum log file size is
Check to make sure there are no existing rules.
Create a rule that will monitor etcpasswd and etcshadow for any changes.
Restart the auditd daemon.
Check to verify the new rules have taken place.
Add a new rule to audit the usr directory.
Verify the new rule by listing auditcl rules.
Perform a search in the authentication report for user authentication attempts.
Make sure to disable your current sudo access with sudo k This option revokes your current sudo session, requiring you to have to enter your password on your next sudo command.
Perform a sudo su three times using the wrong password, then run the same report again.
Create a new user, criminal, then perform a search for account modifications
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started