Commonwealth Bank
Completed a job simulation involving the role of a cybersecurity generalist, specializing in fraud detection and prevention for Commonwealth Bank's Cybersecurity team.
Developed skills in building data visualization dashboards using Splunk to uncover patterns and insights in historical customer data, aiding in fraud detection.
Demonstrated the ability to respond effectively to cybersecurity incidents, including notifying relevant teams, collecting information, containing and stopping attacks, and aiding in recovery efforts.
Enhanced security awareness expertise by designing infographics promoting best practices for secure password management, following Australian Cybersecurity Centre advice.
Acquired practical experience in penetration testing, assessing the security of web applications, identifying vulnerabilities, and providing recommendations for remediation to bolster cybersecurity defenses.
Task 1 - Data Analysis
Imported “prepared_data” file into Splunk.
File analysis using the “Interesting Fields” section in Splunk.
Dashboard creation to include the following charts/tables:
Count by Category, Fraudulent transactions, Age and Merchant.
sourcetype="fraud_detection.csv" | top category
sourcetype="fraud_detection.csv" | top fraud
sourcetype="fraud_detection.csv" | top age
sourcetype="fraud_detection.csv" | top merchant
Fraud detected by Age, Category, Step (month) and Gender.
sourcetype="fraud_detection.csv" fraud="1" | stats count values(fraud) by age
sourcetype="fraud_detection.csv" fraud="1" | stats count values(fraud) by category
sourcetype="fraud_detection.csv" fraud="1" | stats count values(fraud) by step
sourcetype="fraud_detection.csv" fraud="1" | stats count values(fraud) by gender
Provide responses to
Which gender performed the most fraudulent activities and in what category?
sourcetype="fraud_detection.csv" fraud="1" | stats count values(fraud) by category, gender
Trellis > Use Trellis Layout > Split By gender
Which age group performed the most fraudulent activities and to what merchant?
sourcetype="fraud_detection.csv" fraud="1" | stats count values(fraud) by merchant, age
Trellis > Use Trellis Layout > Split By age
Exported dashboard as a PDF.
Task 2 - Incident Response
Resources
Study the links in the Resources to learn how to provide solutions to the following questions.
1. What kind of attack has happened and why do you think so?
This is a phishing attack that has potentially escalated into a ransomware attack:
Phishing: The email from "HR" was designed to trick employees into entering their credentials into a fake portal, which likely allowed the attacker to capture their login information.
Ransomware: The report of colleagues unable to open Word documents and file-shares suggests a malware infection. Phishing emails often serve as the entry point for ransomware to infiltrate systems, encrypt files, and block access.
2. As a cyber security analyst, what are the next steps to take? List all that apply.
Isolate affected systems: Immediately isolate any compromised machines from the network to prevent the spread of ransomware or other malware.
Identify the scope: Determine the extent of the attack by identifying who received the phishing email and whether any systems were successfully compromised.
Reset compromised credentials: Instruct all affected employees to reset their login credentials, especially if they entered information on the fake website.
Check for malware presence: Conduct a thorough scan of affected systems to check for any malicious software or ransomware.
Activate incident response: Notify upper management and activate the organization's incident response team.
3. How would you contain, resolve and recover from this incident? List all answers that apply.
Containment:
Quarantine infected systems and networks.
Block access to external communication for potentially compromised systems.
Shut down unnecessary services and ensure that malicious emails are blocked at the server level.
Resolution:
Analyze the phishing emails and attachments for further clues on the malware.
Restore systems from backups, ensuring that backups themselves are free of malware.
Apply patches to known vulnerabilities in the systems.
Recovery:
Remove malware by cleaning infected systems using malware removal tools.
Restore files from backups, ensuring backups are recent and verified safe.
Monitor systems for abnormal activity to prevent further exploitation.
4. What activities should be performed post-incident?
Incident report: Document the entire incident, including timeline, actions taken, and the outcome.
Review and improve security measures: Conduct a review of current security practices and implement improvements such as:
Enhanced email filtering and anti-phishing tools.
Multi-factor authentication (MFA) for sensitive systems.
Employee security training on phishing and other cyber threats.
Conduct a post-incident review: Analyze the attack's impact, the effectiveness of the response, and where improvements can be made.
Monitor systems: Keep monitoring for any additional suspicious activity to ensure no further threats remain.
Update disaster recovery plans: Adjust plans based on lessons learned to ensure faster, more effective responses in the future.
Task 3 - Penetration testing
Go to HackThisSite and create an account.
On the left-hand side, Click on the “Challenges” section and select “Basic” (or click here).
Complete all levels from Basic Level 1 to 11.
After completing all levels, document a Penetration Testing Report that includes an executive summary, scope of web application tested, vulnerability description and key findings for each level, as well as recommendations on how to better secure the web application.
Additional resources are provided in the Resources for help, which will be especially useful if you have no prior experience with pentesting.
Resources:
How to View the HTML Source Code of a Web Page (computerhope.com) - Hint for Level 1, 2 & 3
How to view source code – ViewSourcePage.com - Hint for Level 1, 2 & 3
How to Edit Any Web Page in Chrome (or Any Browser) (howtogeek.com) - Hint for Level 4 & 5
ASCII Table - ASCII Character Codes, HTML, Octal, Hex, Decimal - Hint for Level 6.
cal command in Linux with Examples - GeeksforGeeks - Hint for Level 7
Linux Commands Cheat Sheet | Red Hat Developer - Hint for Level 7
Server-Side Includes (SSI) Injection | OWASP Foundation - Hint for Level 8 & 9
View, edit, and delete cookies - Chrome Developers - Hint for Level 10
Apache HTTP Server Tutorial: .htaccess files - Apache HTTP Server Version 2.4 - Hint for Level 11
Last updated