Four days have passed since the Mission Briefing identified the LSE as the target of a highly sophisticated Advanced Persistent Threat (APT).
The assessment has reinforced the theory that the Syndicate is a pursuing a dual-threat strategy for financial gain:
Given the sophistication of the threat and rapid progression of the tactics employed, there is an urgent need to decide on a response strategy. Your team has developed a list of response options, in collaboration with the NCSC, for your consideration. The urgency to select and implement the most appropriate response cannot be overstated. Your decision will not only directly impact the integrity and continuity of the LSE’s operations, but influence the broader trust and confidence in the global financial markets.
Select the best strategy to neutralize the APT considering the key factors of maintaining continuity of operations, minimizing exposure, upholding public trust, and complying with legal and regulatory requirements.
Discuss and fully consider the options below with your team members.
This option involves shutting down critical parts of the trading system to prevent further unauthorized access. The lockdown would be targeted at systems identified as compromised or at high risk. The implementation time is 1 hour and the technical risk is low to moderate.
Advantages
Disadvantages
This strategy involves isolating sections of the network that are believed to be compromised, allowing parts of the system to continue operating while affected areas are dealt with. The implementation time is 2-3 hours and the technical risk is moderate, due to the need for precise network mapping and execution.
Advantages
Disadvantages
Your approach is to upgrade system monitoring tools and protocols to detect unusual activities more efficiently and effectively, focusing on the most critical areas of the network and trading systems. The implementation time is 2 days and the technical risk is moderate to high to achieve the desired level of efficacy and using a streamlined deployment and systems integration approach.
Advantages
Disadvantages
This strategy involves setting up decoy servers or databases (i.e. honeypots) to mislead attackers into targeting non-critical system parts, thereby protecting valuable data and gathering intelligence on their methods. The implementation time is 2-3 days and the technical risk is high, due to the complexity of creating convincing decoys that are effective against sophisticated threats.
Advantages
Disadvantages
This option involves transitioning the LSE’s cybersecurity framework to a Zero Trust model, where no entity inside or outside the network is trusted by default. All access requests are verified rigorously before granting access, ensuring that security is maintained through continuous validation of both credentials and device health. The implementation will take place incrementally over 3-6 months and the technical risk is assessed moderate to high due to the comprehensive changes required in both infrastructure and operational procedures.
Advantages
Disadvantages
This approach leverages a combination of advanced threat hunting by cybersecurity experts and AI-driven automated defence systems to detect, respond, and neutralize threats in real time. Threat hunters use AI-enhanced tools to conduct deep investigations into potential malicious activity while automated defense mechanisms respond to and contain threats as they are identified.
Advantages:
Disadvantages:
After carefully assessing all of the options above, choose the best option (select below) to manage the coolant leak while balancing health & safety and mission imperatives.