A Trend Micro White Paper April Countering the Advanced Persistent Threat Challenge with Deep Discovery
|
|
|
- Arron Johns
- 10 years ago
- Views:
Transcription
1 A Trend Micro White Paper April 2013 Countering the Advanced Persistent Threat Challenge with Deep Discovery
2 Contents Executive Summary...3 The Anatomy of a Targeted Attack...3 Trend Micro Deep Discovery: Custom Defense against APTs...8 Going Beyond Detection: Enabling a Complete Custom Defense...11 Conclusion...13 Page 2 of 13 Trend Micro White Paper
3 Executive Summary Targeted attacks and advanced persistent threats (APTs) are quickly becoming the new norm of cyber security threats encompassing organized, focused efforts that are custom-created to penetrate enterprises and government agencies for valuable data, trade secrets, and access to internal systems. Significant breaches at RSA, Citibank, and Global Payments have made headlines, and according to a recent ISACA member survey, 21% of respondents reported that their enterprise has already been victimized by an APT, and 63% think it is only a matter of time before their enterprise is targeted. 1 While traditional security products can defend against malware and other known vulnerabilities, they are ineffective against this new era of custom, targeted, never-been-seen-before, slow and low attacks. According to Gartner Research, There is widespread agreement that advanced attacks are bypassing our traditional, signature-based security controls and persisting undetected on our systems for extended periods of time. The threat is real. You are compromised; you just don t know it. 2 Combating these custom attacks requires a new approach one that closes the security gap created by this new generation of stealthy, sophisticated targeted attacks. An organization s strategy against APTs should utilize an approach that takes into account how targeted attacks infiltrate and work inside an organization, and it should also provide custom detection and intelligence adapted to the organization and its attackers. In addition, an ideal solution should integrate advanced detection technology into an organization s existing endpoint and gateway defenses to help strengthen detection of targeted attacks. This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks. The Anatomy of a Targeted Attack APTs are highly sophisticated and are a reality for both small and large organizations. Already, we have seen the likes of ShadowNet, Flame, Global Payments, and the recently discovered Red October campaign as successful examples of carefully crafted attacks focused on specific goals in targeted entities. While cyber-attacks previously employed a mass scale approach that readily enabled the creation of security signatures, advanced malware not only disguises its presence but also goes to great lengths to hide its communications within seemingly legitimate network traffic making it virtually impossible to defend against using traditional, signature-based approaches. The goal of this one-to-one, stealthy technique is to steal valuable intellectual property, money, and other personally identifiable information (PII). Given the customized nature of these advanced malware attacks, they have a high rate of success and have resulted in extensive cost to organizations. As recently as January 2013, Global Payments, Inc. reported an updated figure of $93.9 million in costs associated with the data breach they discovered in April In order to understand how APTs are so successful, it is important to take a deeper look at real examples to gain insight into the attack sequence and techniques used. Here, we ll review the RSA, Diginotar, and Luckycat attacks. 1 ISACA, Advanced Persistent Threats Awarness, February Gartner Inc., Best Practices for Mitigating Advanced Persistent Threats, Report G , 18 January 2012 Page 3 of 13 Trend Micro White Paper
4 RSA In March 2011, when EMC disclosed an attack against its RSA division that successfully stole SecureID data, it quickly made national headlines especially due to the millions of RSA SecureID tokens in use at the time, providing protection to corporate networks and smartphones. It was subsequently discovered in June 2011 that targeted attacks against Lockheed Martin, L-3 Communications, and Northrop Grumman were made possible from the SecureID data obtained in the successful RSA breach. Attack Overview: 1. Two spear phishing s were sent over a two-day period targeted at low to mid-level employees with subject 2011 Recruitment Plan and.xls attachment with the same title 2..xls file contained an exploit through an Adobe Flash zero-day vulnerability that installed a backdoor using a Poison Ivy RAT variant set in a reverse-connect mode 3. Attackers moved laterally to identify users with more access and admin rights to relevant services and servers of interest 4. Access was then established to staging servers at key aggregation points 5. Data of interest was moved to the internal staging servers, aggregated, compressed, and encrypted for extraction 6. FTP was then used to transfer password protected RAR files to a compromised machine at a hosting provider 7. Files were subsequently removed from the host to cover up traces of the attack DigiNotar In August 2011, a network compromise was discovered at DigiNotar, a former Dutch certificate authority (CA), which led to the issuing of fraudulent digital certificates used to make malicious Web sites and malware look legitimate. In particular, valid certificates were obtained for a number of high-value domains, including Yahoo, Mozilla, and Google, who discovered the fraudulent certificates in use in a large-scale, Man-In-The-Middle (MITM) attack on 300,000+ of its Gmail users who were being eavesdropped on for weeks before detection. By September, DigiNotar filed for bankruptcy and shut down, and all major browser and operating system vendors revoked all DigiNotar signed certificates. The DigiNotar breach and subsequent Google MITM-attack resulted in an erosion of public trust in the existing Public Key Infrastructure. Attack Overview: 1. Attacker located compromised network access Web servers in external DMZ were breached 2. Diginotar used a highly segmented, ringed network defense methodology to protect its eight CA servers, and attackers methodically compromised one ring at a time to gain access 3. With access to the CA servers, more than 531 (identified) rogue certificates were issued 4. Rogue certificates were transmitted to attacker s external IP server, using a proxy tunneling tool Luckycat The Luckycat APT, active since June 2011, is a broad attack tied to a gang of Chinese cybercriminals aimed at more than 90 targets in Asia, including executive level employees in the aerospace, energy, and engineering industries with the initial intended goal of remaining on infected systems, covertly monitoring activity over an extended time frame. Subsequently, in July 2011 research uncovered malware in the form of two, unfinished and undelivered Android apps that communicate with Luckycat s C&C server. Attack Overview: 1. Attackers researched intended targets, including sensitive entities in Japan and India as well as Tibetan activists 2. Spear phishing s were predominantly used as point of entry one aimed at a Japan target used the confusion after the Great East Japan Earthquake to lure potential victims into opening a malicious.pdf attachment and another aimed at an entity in India lured victims into opening a.doc file on India s ballistic missile defense program 3. Once opened, both example targets were displayed a decoy document while zero-day vulnerabilities in.pdf and in.doc enabled the malware, TROJ_WIMMIE, to install 4. Exfiltrated data, including attack campaign codes, victim s identity details and contents of the compromised computers and servers were sent back to Luckycat C&C servers Page 4 of 13 Trend Micro White Paper
5 From these attack examples, the level of sophistication in targeted attacks is readily apparent. It is also notable that initial attacks are often linked to subsequent attack targets (e.g. the RSA attack linked to Lockheed Martin) or repeatedly executed by an inter-connected, criminal network that uses or even shares the same infrastructure or malware components. While these successful attacks were all custom tailored to their attack target, each followed a carefully staged lifecycle to enter the intended organization and retrieve the desired data before detection. With further analysis of the anatomy of these example APTs, six distinct stages become apparent: The APT Attack Sequence Threat Agent 1 Intelligence Gathering External Server 3 C & C Server 5 Point of Entry 2 4 File Store Database Data of Interest Lateral Movement Stage 1: Intelligence Gathering In this stage, cyber criminals have their attack targets in mind and conduct research to identify target individuals within the organization most likely leveraging social medial sites, such as LinkedIn, Facebook, and MySpace. With the wealth of personal information provided on these sites, attackers arm themselves with in-depth knowledge on individuals within the organization for example, their role, hobbies, trade association memberships, and the names of those in their personal network. With this information in hand, attackers prepare a customized attack in order to gain entry into the organization. As seen in the successful attack against RSA, the criminal s intelligence and gathering phase focused on identifying a small group of employees within two groups to target with a well-crafted and compelling . According to RSA, the targeted employees weren t considered particularly high profile or high value targets. This research approach has become commonplace, whereby employees within a certain department or with a desired management level are targeted, which also demonstrates the importance in educating employee about security awareness. Page 5 of 13 Trend Micro White Paper
6 Stage 2: Point of Entry Once cyber criminals have gathered the intelligence on their intended target, they begin work on designing their point of entry into the organization. While in the Diginotar attack example, a network compromise was found, initial compromises are typically from attacks that exploit zero-day vulnerabilities to place malware on the system, which are most often delivered via social media ( , IM or drive-by download) as seen in the RSA and Luckycat examples. In fact, recent Trend Micro research has discovered 91% of targeted attacks involve spear phishing. In the RSA example, the attack began with spear phishing s sent to targeted employees with an excel attachment titled, 2011 Recruitment Plans. When the employee opened the spreadsheet, it ran malware that exploited a previously unknown Adobe Flash zero-day vulnerability (CVE ) to install a Poison Ivy Remote Administration Tool (RAT). In the broad Luckcat APT campaign, a variety of spear phishing s were sent across the spectrum of targets that exploited Adobe and Microsoft vulnerabilities to penetrate networks. As seen in the Japan target example, the attackers used the 2011 Japan earthquake disaster to lure potential victims into opening a malicious.pdf attachment with information containing radiation dose measurement results, and once opened, it exploited a vulnerability in Adobe Reader CVE , to install malware (TROJ_WIMMIE) onto the target s system. Stage 3: Command and Control Communication Once the malware is successfully installed on a compromised machine, it is able to communicate back to the cyber criminal s command and control (C & C) servers for further instructions or download additional malware and attacker tools. This C & C connection allows the attacker to instruct and control the compromised machines and malware throughout all subsequent phases of the attack and to establish long-term access to the network. Most commonly, this includes the download of additional malware executables following the initial infection, such as, key loggers, Trojan backdoors, and password cracking tools. The Luckycat campaign extensively used free hosting services for its C & C servers. The domains used were considerably diverse, and all were available from three, free hosting services. As such, the attackers had extensive resources to continue creating diverse domain names for their C&C servers. address cattree.1x.biz charlesbrain.shop.co footballworldcup.website.org [email protected] [email protected] [email protected] Sampling of free web-hosting service domains attackers used for Luckycat C&C servers In the Diginotar APT example, the attacker clearly had frequent C&C communications as efforts were made to steal fraudulent certificates over the span of the attack from June 17 to July 24, 2011, and in the RSA breach, attackers used a Poison Ivy RAT set in reverse-connect mode to remotely manage the attack from their external location. Page 6 of 13 Trend Micro White Paper
7 Stage 4: Lateral Movement and Persistence Once inside the network, the attacker moves laterally within the organization to compromise additional machines in order to harvest credentials and gain escalated privilege levels. The attacker will also acquire strategic information about the IT environment operating systems, security solutions and network layout to maintain persistent control of the target organization. In the attack against Diginotar, several tools were used to increase the intruder s level of access in the network, including, port redirectors, scanning tools, and remote process executor tools. In the RSA breach, attackers obtained login credentials from the first compromised accounts, including usernames, passwords, and domain information, and then pursued higher-value accounts with more access privileges. According to Uri Rivner, former Head of RSA New Technologies and Identity Protection, This is one of the key reasons why, having failed to prevent the initial social engineering phase, detecting [an APT] quickly is so important. In many APT [examples] the attackers had months to do digital shoulder surfing on the attacked users, map the network and resources, and start looking for a path to the coveted assets they desired. Then they use the compromised accounts, coupled with various other tactics to gain access to more strategic users. In the RSA attack, the timeline was shorter, but still there was time for the attacker to identify and gain access to more strategic users. Stage 5: Asset/Data Discovery In an advanced malware attack, cyber criminals are in pursuit of a high valued asset. This could be anything from financial data, trade secrets, or source code, and most noteworthy, attackers know the intended data of interest when a target organization is selected. As seen in the RSA breach, attackers pursued the company s SecureID two-factor authentication data, and in the attack against Diginotar, rogue certificates were created and stolen. The attacker goal is to identify the data of interest as quickly as possible without being noticed. In the asset and data discovery phase, the attacker uses several techniques to identify the noteworthy servers and services that house the data of interest, for example they will: Check the configuration of the infected host s client to locate the server Locate file servers by checking the host for currently mapped network drives Obtain the browser history to identify internal Web services, such as CMS or CRM servers Scan the local network for folders shared by other endpoints Stage 6: Data Exfiltration In this final stage of a targeted attack, sensitive information is gathered and then funneled to an internal staging server where it is chunked, compressed, and often encrypted for transmission to external locations. In the Diginotar attack, once the Certificate Authority servers were compromised, the criminals used their complete access to create fraudulent but valid certificates and exfiltrated them from Diginotar s network to their own location. In the RSA attack, once the criminals located the data they wanted to steal, they gathered it in a staging area, compressed it, and then exfiltrated it via FTP. Page 7 of 13 Trend Micro White Paper
8 Trend Micro Deep Discovery: Custom Defense against APTs Standard protection products signature-based, one-size-fits-all approach cannot deal with the custom nature of targeted attacks and their dedicated perpetrators. The malware, communications, and attacker activities used in targeted attacks are invisible to standard endpoint, gateway, and network security measures. Security analysts and experts recommend a new type of network monitoring that uses specialized detection and analysis techniques designed specifically to discover the telltale signs of these attacks. Trend Micro Deep Discovery is a leading product in this movement, enabling organizations to deploy a full Detect Analyze Adapt Respond lifecycle to protect themselves from these attacks. The Deep Discovery solution is comprised of two components: Deep Discovery Inspector and Deep Discovery Advisor. Deep Discovery Inspector provides network threat detection, custom sandboxing, and real-time analysis and reporting. Its capabilities are the primary topic of this section. The optional Deep Discovery Advisor provides open, scalable, custom sandbox analysis that can augment the protection capabilities of an organization s existing security products, such as and Web gateways. It also provides visibility to network-wide security events and security update exports all in a unified intelligence platform. Deep Discovery Advisor is the gateway to the full power of the Trend Micro Custom Defense solution, described in the next section. Deep Discovery Inspector Network traffic inspection Custom threat detection Real-time analysis & reporting Open custom sandboxing platform Deep investigation & analysis Adaptive Protection against attack Page 8 of 13 Trend Micro White Paper
9 How Deep Discovery Inspector Works attack detection Malicious Content s containing embedded document exploits Drive-by-downloads Zero-day and known malware Decode and decompress embedded files Sandbox simulation of suspicious files Browser exploit kit detection Malware scan (Signature and Heuristic) Suspect Communication Command-and-control communication for all malware: bots, downloaders, data stealing, worms, and blended threats Backdoor activity by attacker Destination analysis (URL, IP, domain, , IRC channel, etc.) via dynamic blacklisting, white listing Smart Protection Network Web reputation Communication fingerprinting rules Attack Behavior Malware activity: propagation, downloading, spamming, etc. Attacker activity: scan, brute force, service exploitation Data exfiltration Rule-based heuristic analysis Identification and analysis of usage of 100 s of protocols and applications including HTTP-based apps Threat profile What are the characteristics, origins and variants of this malware? Related IPs/Domains What are the known C&C comms for this attack? Attack Group/Campaign Who and what is behind this threat? Containment and remediation What to look for, how to remediate and eradicate? Page 9 of 13 Trend Micro White Paper
10 Deep Discovery Inspector is purpose-built for detecting APT and targeted attacks identifying malicious content, communications, and behavior that may indicate advanced malware or attacker activity across every stage of the attack sequence. Deep Discovery Inspector uses a three-level methodology to perform initial detection, simulation, correlation, and, ultimately, a final cross-correlation to discover targeted attacks discernible only over an extended period of time. Specialized detection and correlation engines provide the most accurate and up-to-date detection aided by global threat intelligence from the Trend Micro Smart Protection Network. Dedicated threat researchers continually update the detection rules that correlate events and define the behavior and communication fingerprinting that detects targeted attacks. The result is a high detection rate with low false positives and in-depth incident reports that help speed up containment of an attack. Network Content Inspection Engines Deep packet inspection engines perform protocol detection, decoding, decompression, and file extraction across all ports and hundreds of protocols Advanced Threat Scan Engines Malware file scanning combines with aggressive heuristic scanning techniques to detect both known and unknown malware and document exploits Custom Sandbox Analysis A virtualized threat sandbox analysis system uses customer-specific images that exactly match the target environments ensuring accurate detection and reducing false positives Threat Detection and Correlation Rules Behavior and communication techniques used by attackers are detected based on identification and correlation rules developed and continually updated by Trend Micro s 1,200 threat researchers and extensive Smart Protection Network intelligence Trend Micro Smart Protection Network The first and most extensive global threat intelligence and reputation service processes over 16+ billion requests daily ensures Deep Discovery detects any threat variant seen worldwide Threat Connect Intelligence Portal Full breadth of relevant threat intelligence about a customer s targeted attack that includes malware characteristics, origins and variants, related C&C IPs, attacker profile, and suggested remediation procedures Page 10 of 13 Trend Micro White Paper
11 Going Beyond Detection: Enabling a Complete Custom Defense An ideal solution against APTs should not only perform custom detection and analysis of attacks at the network level but should also integrate advanced detection technology into an organization s existing endpoint, messaging, and gateway defenses to strengthen the protection levels of current security investments. Detection of an attack at any one protection point would automatically update other protection points to defend against further attack all working in a multi-vendor security environment. An ideal solution should leverage the global intelligence of a major security vendor to aid in detection, and use it to provide threat profile information relevant to an organization s particular attack. Finally, an ideal solution should pair this profile with network-wide event analysis to guide rapid containment and remediation. In short, an ideal solution against APTs goes beyond detection and provides a complete custom defense employing a comprehensive Detect Analyze Adapt Respond lifecycle unique to each, specific organization and the threats against it. Trend Micro believes the attributes of a custom defense strategy make it the best choice to combat targeted attacks and that belief is being put into action by delivering a complete Trend Micro Custom Defense with Trend Micro Deep Discovery serving as the foundation. The TrendMicro Custom Defense weaves an organization s entire security infrastructure into a tailored and adaptable defense that is tuned to an organization s particular environment and particular attackers. Using custom sandbox analysis, custom intelligence and custom security updates, Trend Micro Custom Defense enables an organization not only to detect and analyze APTs and targeted attacks, but also to rapidly adapt its protection and response to these attacks. The Trend Micro Custom Defense Solution How It Works Detect: what standard defenses can t In the previous section you read about Trend Micro Deep Discovery, which provides advanced threat protection that performs network-wide monitoring to detect zero-day malware, malicious communications and attacker behaviors that are invisible to standard security defenses. Deep Discovery sandbox simulation is also integrated with other Trend Micro products including Messaging Security products, giving them the power to block the spear phishing and social engineering exploits commonly used by attackers in the initial phase of a targeted attack. And, Deep Discovery supports an open Web Services interface so that any security product can integrate with the custom sandbox detection. Analyze: using real-time global and local intelligence Upon detection, Deep Discovery analytics and attack-relevant intelligence from the Smart Protection Network and Threat Connect portal create a rich threat profile that enables an organization to gain an in-depth understanding of the risk, origin and characteristics of the attack that help prioritize and guide containment and remediation plans. The depth of these threat profiles also enables the adaptive protection capability of the Trend Micro Custom Defense solution. Page 11 of 13 Trend Micro White Paper
12 Adapt: security protection points to block the new threat To immediately adapt and strengthen protection against further attacks, the Trend Micro Custom Defense solution uses in-depth threat profiles to update the Smart Protection Network and to generate automated, custom security updates (IP/Domain blacklists and security signatures) to existing Trend Micro products in a customer s environment, including endpoint, gateway, and server enforcement points. Built using an open and extensible platform, the solution can also export security updates to non-trend Micro security products that may already be an important part of the organization s defense in-depth strategy. Respond: with rapid containment and remediation Finally, the Trend Micro Custom Defense solution delivers 360-degree contextual visibility of the attack by combining the rich threat profile with results from employing specialized attack response tools and intelligence gathered from network-wide security event collection and analysis. Alternatively, the threat profile and other findings can be shared with a SIEM system already in place. Armed with this information organizations gain the insight needed to expedite the containment and remediation process and to contact authorities, as may be appropriate. detect Trend Micro Custom Defense Solution analyze adapt Targeted Attack Detection & Analysis respond Advanced Protection Solutions Security Updates Forensics, Containment, Remediation Page 12 of 13 Trend Micro White Paper
13 Conclusion Targeted attacks are successfully bypassing traditional security defenses, and the majority of IT professionals now believe their organizations have been targeted. According to an Information Week Security article by Mathew Schwartz, [APTs take a] low-and-slow approach that s difficult to detect, but which has a high likelihood of success. Attackers only need to trick a single employee into opening a piece of malware that exploits a zero-day vulnerability, thus giving them access to not just the employee s PC, but potentially the entire corporate network. As seen with the review of successful APT attacks, these threats are highly sophisticated and take a highly specialized and customized approach to gain access to their targets. These are next-generation attacks that require a next-generation security approach to close the gaps these threats exploit. While each attack is tailored to its target, they consistently follow key lifecycle phases: intelligence gathering entry point command and control communication lateral movement asset/data discovery data exfiltration A strong defense against APTs must have in-depth detection and analysis capabilities across all phases of the attack lifecycle. As organizations plan their IT security projects for 2013, it is critical to include the defense strategy against APTs as part of the project scope. Trend Micro Deep Discovery should be considered as a key solution to defend against targeted attacks. Deep Discovery uniquely detects and identifies evasive threats in real-time and provides the in-depth analysis and relevant, actionable intelligence specific to each organization s environment. Trend Micro Incorporated is a pioneer in secure content and threat management. Founded in 1988, Trend Micro provides individuals and organizations of all sizes with award-winning security software, hardware and services. With headquarters in Tokyo and operations in more than 30 countries, Trend Micro solutions are sold through corporate and value-added resellers and service providers worldwide. For additional information and evaluation copies of Trend Micro products and services, visit our Web site at TREND MICRO INC. U.S. toll free: phone: fax: by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [WP02_DeepDiscovery_130515US] Page 13 of 13 Trend Micro White Paper
The Custom Defense Against Targeted Attacks. A Trend Micro White Paper
The Custom Defense Against Targeted Attacks A Trend Micro White Paper Contents Executive Summary...3 The Anatomy of a Targeted Attack...4 The Reality and Costs of Targeted Attacks...5 Strategic Choices
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher
TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category
DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?
A Special Primer on APTs DETECTING THE ENEMY INSIDE THE NETWORK How Tough Is It to Deal with APTs? What are APTs or targeted attacks? Human weaknesses include the susceptibility of employees to social
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
How Do Threat Actors Move Deeper Into Your Network?
SECURITY IN CONTEXT LATERAL MOVEMENT: How Do Threat Actors Move Deeper Into Your Network? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Understanding the Advanced Threat Landscape an MSPs Guide. IT Security: Enabled
Understanding the Advanced Threat Landscape an MSPs Guide IT Security: Enabled 1.0 Cutting through the APT hype to help your clients prevent, detect and mitigate advanced threats Sophisticated cyber-espionage
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
SPEAR-PHISHING ATTACKS
SPEAR-PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM WHITE PAPER RECENTLY, THERE HAS BEEN A RAPID AND DRAMATIC SHIFT FROM BROAD SPAM ATTACKS TO TARGETED EMAIL-BASED-PHISHING CAMPAIGNS THAT
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
APT Advanced Persistent Threat Time to rethink?
APT Advanced Persistent Threat Time to rethink? 23 November 2012 Gergely Tóth Senior Manager, Security & Privacy Agenda APT examples How to get inside? Remote control Once we are inside Conclusion 2 APT
Protect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Addressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer
CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati Patrick Gada 18 March 2015 Senior Sales Engineer CryptoLocker Rossi Mario, CryptoLocker CryptoLocker Attacco del 27 gennaio
Innovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
Practical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
A New Perspective on Protecting Critical Networks from Attack:
Whitepaper A New Perspective on Protecting Critical Networks from Attack: Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network 2014: A Year of Mega Breaches A Ponemon Study published
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,
Stop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Security strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
The Value of QRadar QFlow and QRadar VFlow for Security Intelligence
BROCHURE The Value of QRadar QFlow and QRadar VFlow for Security Intelligence As the security threats facing organizations have grown exponentially, the need for greater visibility into network activity
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
After the Attack. The Transformation of EMC Security Operations
After the Attack The Transformation of EMC Security Operations Thomas Wood Senior Systems Engineer, GSNA CISSP RSA, The Security Division of EMC [email protected] 1 Agenda Review 2011 Attack on RSA
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Finding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model
White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security
White Paper Advantage FireEye Debunking the Myth of Sandbox Security White Paper Contents The Myth of Sandbox Security 3 Commercial sandbox evasion 3 Lack of multi-flow analysis and exploit detection 3
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
INDUSTRY OVERVIEW: FINANCIAL
ii IBM MSS INDUSTRY OVERVIEW: FINANCIAL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: NOVEMBER 5, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW... 1 MAJOR FINANCIAL
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
Securing Cloud-Based Email
White Paper Securing Cloud-Based Email A Guide for Government Agencies White Paper Contents Executive Summary 3 Introduction 3 The Risks Posed to Agencies Running Email in the Cloud 4 How FireEye Secures
Advanced Targeted Attacks
White Paper Advanced Targeted Attacks How to Protect Against the Next Generation of Cyber Attacks White Paper Contents Executive Summary 3 Nature of Next-Generation Threats 4 The Price of The Problem 6
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
TRITON APX. Websense TRITON APX
TRITON APX Unified protection and intelligence against Advanced Threats and data theft Your organization is faced with an increasing number of Advanced Threats that lead to data theft, denial of service
How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)
A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
CISO Guide to Next Generation Threats
White Paper CISO Guide to Next Generation Threats Combating Advanced Malware, Zero-Day and Targeted APT Attacks White Paper Table of Contents Introduction The Moving Target: From PII to IP to Credentials
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
SPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
How We're Getting Creamed
ed Attacks How We're Getting Creamed By Ed Skoudis June 9, 2011 ed Attacks - 2011 Ed Skoudis 1 $ cut -f5 -d: /etc/passwd grep -i skoudis Ed Skoudis Started infosec career at Bellcore in 1996 working for
