85.6 F
Washington D.C.
Monday, April 29, 2024

Sandia Helps CISA Develop Digital Toolset to Track Cloud Hackers

Untitled Goose Tool can be very helpful for a wide variety of accounts of differing sizes and numbers of users, all to find bits of code left behind by an intruder.

Programmers at Sandia National Laboratories are helping the Cybersecurity and Infrastructure Security Agency protect the nation through an innovative program, assisting Microsoft cloud users everywhere in tracking down hackers and cyber terrorists.

Untitled Goose Tool was introduced to the public through a CISA alert in March. Sandia cybersecurity expert Wellington Lee was part of the team that developed the free tool to track potentially malicious activity in Microsoft Azure, Azure Active Directory and Microsoft 365 environments. The tool’s name was inspired by a videogame about a troublemaking goose.

“All these environments are very, very different so we wanted to figure out the best way to quickly obtain all the cloud information we need from a forensic standpoint,” Lee said. “Cybersecurity in general is a fast-evolving field, but cloud computing, especially, is much newer compared to traditional computer or network forensics where people are investigating things on site. It is a new area, and we are trying to figure out the best way to approach it.”

Untitled Goose Tool is a suite of data collection tools that can quickly scour a virtual storage space to find evidence of a possibly malicious user accessing the data. It gathers data on how they accessed the supposedly secure cloud space and brings the data back to CISA’s security experts for review.

“Sometimes it’s a large department or agency with tens of thousands of users,” Lee explained. “So that’s a lot of data that we have to work with. The tool can pull down data for all those users, which is not a simple feat.”

But it could also be small businesses with payroll and other information stored virtually. In short, Untitled Goose Tool can be very helpful for a wide variety of accounts of differing sizes and numbers of users, all to find bits of code left behind by an intruder. However, that variety, including different types of paid access, also makes things complicated, which programmers had to account for.

“That’s why we built the Untitled Goose Tool to be able to pull that data back, so we have all the data locally and we can do an analysis on that data without relying on capabilities in the customer’s cloud environment,” Lee said.

The idea for this forensic software came organically while Lee was deployed to support CISA. The team working on cloud computing forensics — which serves federal, state, local, tribal and territorial agencies — was called in to investigate data breaches in systems that differ as much as the groups that use them. They had a short amount of time to try and figure out what happened.

“These environments are not homogeneous,” he said. “Large departments or agencies with tens of thousands of users, maybe even up to 100,000-plus users, is a lot of data that we have to work through. We created Untitled Goose Tool to be agnostic to the customer’s subscription tier of their cloud environment.”

Gathering as much data as possible no matter what customer environment they are in became very important, so the team and Lee started with the Microsoft servers.

“We figured out the best way to get all the cloud information we need to do what we do from a forensic standpoint and do so really quickly,” Lee recalled, adding that cyber threats are constantly evolving.

“In the cloud, you might have someone impersonating someone else,” he said. “Perhaps they got an authentication token stolen through a phishing email. So, let’s say someone’s authentication token might have been stolen and then used to log in as Wellington Lee from Los Angeles. But we can see that Wellington Lee is not in Los Angeles. This looks suspicious, so Untitled Goose Tool pulls back data that can help identify some of those inconsistencies. It pulls back quite a lot of different types of logs from various sources in the cloud.”

The appointment of Sandia to aid CISA speaks to the expertise that the Labs bring to these kinds of threats.

“We have a unique level of expertise in terms of our cybersecurity,” Lee said. “We have a smaller presence in terms of how many physical people are working with CISA, but we bring a really advanced level of understanding of the nation’s problems. From deep in the weeds, all the way up to sweeping policies that affect a lot of things.”

It’s a relationship that continues to evolve and pay dividends for the nation, something Lee has seen first-hand.

“It’s really cool to see how much excitement there is around the tool,” he said. “But the war goes on. There are always improvements that we have the expertise to make that give our federal partners valuable tools to continue to protect the nation.”

Read more at Sandia National Laboratories

author avatar
Homeland Security Today
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.
Homeland Security Today
Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

Latest Articles