{"id":1017,"date":"2024-10-27T12:00:23","date_gmt":"2024-10-27T18:00:23","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=1017"},"modified":"2024-10-27T12:00:26","modified_gmt":"2024-10-27T18:00:26","slug":"network-sandbox-creating-a-secured-test-environment","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/27\/network-sandbox-creating-a-secured-test-environment\/","title":{"rendered":"Network Sandbox: Creating a Secured Test Environment"},"content":{"rendered":"\n<p>Imagine a playground where you can build, break and rebuild without the fear of consequences! This is the essence of a Network Sandbox.<\/p>\n\n\n\n<p>Welcome to our project <strong>Network Sandbox: Creating a Secured Test Environment<\/strong>, executed by <strong>Maria, Kamaldeep and Achu<\/strong>.<\/p>\n\n\n\n<p>A sandbox is an isolated environment on a network that mimics end-user operating environments. They are used to safely execute suspicious code without risking harm to the host device or network. Whether you are coding, troubleshooting, or just playing around, you can push boundaries and discover what works for you and what doesn\u2019t, letting you learn from each trial and refine your approach.<\/p>\n\n\n\n<p><strong>Why Sandboxing?<\/strong><\/p>\n\n\n\n<p>The benefits of sandboxing technology for security became obvious as cyber threats grew more complex over time. Traditional antivirus programs had trouble keeping up with malware that was rapidly evolving.&nbsp;By isolating potentially harmful files in a safe environment, cybersecurity experts could observe their behavior and intentions. Sandboxing technology is now a crucial part of modern cybersecurity strategies.&nbsp;It serves as an essential line of defense, assisting in the detection and neutralization of advanced persistent threats (APTs) and zero-day exploits. APTs are particularly dangerous because conventional security measures frequently miss them.<\/p>\n\n\n\n<p>Let\u2019s take a moment to look at a notorious incident in the cybersecurity world, which reflects the importance of sandboxing. The Target Data Breach (2013)! In this attack, cybercriminals were able to steal 40 million credit and debit records and 70 million customer records. While it wasn\u2019t the single largest security breach in history, it was still one of the largest!<sup>[1]<\/sup> The attackers were able to infiltrate Target\u2019s Ariba vendor portal, enter the company\u2019s internal network, and take over its servers. Target was required to pay an $18.5 million as part of settlement.<sup>[2]<\/sup> They could have isolated vendor access in a controlled environment by implementing a robust sandboxing strategy and simulated potential threats and tested their network defenses against real-world attack vectors without jeopardizing their operations. A sandbox would have allowed them to identify weaknesses in their security posture and address them before disaster struck.<\/p>\n\n\n\n<p>Next, let\u2019s look at an analysis of FortiSandbox<sup>[3]<\/sup>, a malware analysis tool, that detects and analyzes suspicious files and behaviors.<\/p>\n\n\n\n<p><strong>Malware Analysis&nbsp;<\/strong><\/p>\n\n\n\n<p>FortiSandbox examined an obfuscated JavaScript file (MD5: a3774b95093df96be7959ea2870ab3df), which triggered the download of another file from \u2018hxxps:\/\/nac-ecs[.]co[.]mz\/onedrive\/wx[.]js.\u2019 This second file (MD5: e787ce73144ebc03d7641aafba01c1da) was saved as \u2018GKCTI.JS\u2019 and executed via WScript.exe.<\/p>\n\n\n\n<p><strong>Analysis Findings<\/strong><\/p>\n\n\n\n<p>The analysis revealed that the script modifies the AutoStart registry to enable automatic execution and drops suspicious files in the startup folder for persistent operation. It manages a botnet and connects to a Command and Control (C2) server at hxxp:\/\/chongmei33[.]publicvm[.]com:7045\/is-ready, awaiting further instructions.<\/p>\n\n\n\n<p>The FortiSandbox team managed to de-obfuscate the file offline to further understand these commands used by the malware. An example of such a command is \u2018up-n-exec\u2019 for downloading files and \u2018shutdown\u2019 to forcefully close applications and power off the victim\u2019s system. The malware employed a passive mode for updating its binaries, complicating security analysis.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"820\" height=\"659\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/anothercommand.png\" alt=\"\" class=\"wp-image-1018 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/anothercommand.png 820w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/anothercommand-300x241.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/anothercommand-768x617.png 768w\" data-sizes=\"(max-width: 820px) 100vw, 820px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 820px; --smush-placeholder-aspect-ratio: 820\/659;\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><em>\u2018up-an-exec\u2019 command with its function<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"504\" height=\"63\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/shutdown.jpg\" alt=\"\" class=\"wp-image-1019 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/shutdown.jpg 504w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/shutdown-300x38.jpg 300w\" data-sizes=\"(max-width: 504px) 100vw, 504px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 504px; --smush-placeholder-aspect-ratio: 504\/63;\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><em>\u2018shutdown\u2019 command<\/em><\/p>\n\n\n\n<p><strong>Threat Mitigation<\/strong><\/p>\n\n\n\n<p>The detailed analysis of an obfuscated zero-day JavaScript sample underscores the sophistication of modern malware delivery methods and emphasizes the importance of proactive defense measures.&nbsp;In this scenario, FortiSandbox&nbsp;successfully&nbsp;identified&nbsp;both downloaded files and&nbsp;their&nbsp;connection to remote sites,&nbsp;demonstrating&nbsp;its&nbsp;effectiveness in&nbsp;threat detection and mitigation.<\/p>\n\n\n\n<p>The critical role of sandbox in cybersecurity cannot be overstated. They provide a vital layer of defense by isolating and analyzing potential threats before they could impact real time systems. We invite you all to engage with our teaching aide, a PowerPoint presentation titled \u201cNetwork Sandbox: Creating a Secured Test Environment.\u201d This demonstrates the implementation of sandbox technology using VirtualBox, a cross-platform virtualization software, allowing users to gain hands-on experience. By exploring this presentation, you will learn to effectively leverage sandbox technology.<\/p>\n\n\n\n<p>Happy Learning!<\/p>\n\n\n\n<p>Teaching aide and questions for our project can be found in the below attachments.<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-2e0c1761-5fea-4773-94d7-a63e7e56c5a7\" href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Network-Sandbox-Teaching-Aide-2.pptx\">Network Sandbox Teaching Aide<\/a><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Network-Sandbox-Teaching-Aide-2.pptx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2e0c1761-5fea-4773-94d7-a63e7e56c5a7\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-8ba1ee50-b84b-475a-91c8-c8a04b4b6f08\" href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Questions.pdf\">Questions<\/a><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Questions.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8ba1ee50-b84b-475a-91c8-c8a04b4b6f08\">Download<\/a><\/div>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Target Data Breach:<\/strong><em> <\/em><a href=\"https:\/\/redriver.com\/security\/target-data-breach\">https:\/\/redriver.com\/security\/target-data-breach<\/a>&nbsp;| Published on October 26, 2021, | Accessed on October 22, 2024.<\/li>\n\n\n\n<li><strong>The Target Breach 10 Years: <\/strong><a href=\"https:\/\/www.securityinfowatch.com\/retail\/article\/53098895\/the-target-breach-10-years-later\">https:\/\/www.securityinfowatch.com\/retail\/article\/53098895\/the-target-breach-10-years-later<\/a>&nbsp;| Published on March 12, 2024 | Accessed on October 22, 2024.<\/li>\n\n\n\n<li><strong>FortiSandbox: <\/strong><a href=\"https:\/\/community.fortinet.com\/t5\/FortiSandbox\/Threat-Coverage-How-FortiSandbox-protects-against-unknown\/ta-p\/305208\">https:\/\/community.fortinet.com\/t5\/FortiSandbox\/Threat-Coverage-How-FortiSandbox-protects-against-unknown\/ta-p\/305208<\/a> | Published on March 18, 2024 | Accessed on October 23, 2024.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Imagine a playground where you can build, break and rebuild without the fear of consequences! This is the essence of a Network Sandbox. Welcome to our project Network Sandbox: Creating a Secured Test Environment, executed by Maria, Kamaldeep and Achu. A sandbox is an isolated environment on a network that mimics end-user operating environments. They &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/27\/network-sandbox-creating-a-secured-test-environment\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Network Sandbox: Creating a Secured Test Environment&#8221;<\/span><\/a><\/p>\n","protected":false},"author":655,"featured_media":1020,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1017","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","entry"],"featured_image_src":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/sandboxpurposeblog-600x400.jpg","featured_image_src_square":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/sandboxpurposeblog-600x600.jpg","author_info":{"display_name":"Achu Philip","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/achu-philip\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/655"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=1017"}],"version-history":[{"count":4,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1017\/revisions"}],"predecessor-version":[{"id":1032,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1017\/revisions\/1032"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media\/1020"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=1017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=1017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=1017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}