GRC & Cyber Security Conference - Bringing the Silos Together ISACA Ireland 3 Oct 2014 Fahad Ehsan



Similar documents
Detecting Unknown Malware: Security Analytics & Memory Forensics. Fahad Ehsan. Cyber Security #RSAC

Memory Forensics & Security Analytics: Detecting Unknown Malware

Digital Forensic analysis of malware infected machine Case study ***

HP NonStop Server Security and HP ArcSight SIEM

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Cisco Advanced Malware Protection for Endpoints

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

egambit Forensic egambit, your defensive cyber-weapon system. You have the players. We have the game.

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

All Information is derived from Mandiant consulting in a non-classified environment.

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Evolving Threat Landscape

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Practical Threat Intelligence. with Bromium LAVA

Search and Destroy the Unknown FROM MALWARE ANALYSIS TO INDICATIONS OF COMPROMISE

NTT R&D s anti-malware technologies

Modern Approach to Incident Response: Automated Response Architecture

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Unified Security Management and Open Threat Exchange

Secure Your Mobile Workplace

IT Security Strategy and Priorities. Stefan Lager CTO Services

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

CHAD TILBURY.

The Value of Physical Memory for Incident Response

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

The Cloud App Visibility Blindspot

Concierge SIEM Reporting Overview

Find the needle in the security haystack

Defending Against Data Beaches: Internal Controls for Cybersecurity

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Rashmi Knowles Chief Security Architect EMEA

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

Persistence Mechanisms as Indicators of Compromise

Automate your IT Security Services

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Unprecedented Malware Growth

Speed Up Incident Response with Actionable Forensic Analytics

High End Information Security Services

Cisco Advanced Malware Protection for Endpoints

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

New Zealand National Cyber Security Centre

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

How To Integrate Intelligence Based Security Into Your Organisation

Active Response: Automated Risk Reduction or Manual Action?

TUT8173 Best Practices for Security Monitoring in Distributed Environments November 2014

The SIEM Evaluator s Guide

Bridging the gap between COTS tool alerting and raw data analysis

McAfee Network Security Platform

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Unified Security, ATP and more

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

IBM Advanced Threat Protection Solution

The Future of the Advanced SOC

Integrating MSS, SEP and NGFW to catch targeted APTs

FORBIDDEN - Ethical Hacking Workshop Duration

Critical Controls for Cyber Security.

Security Intelligence Services.

Splunk: Using Big Data for Cybersecurity

Data Science Transforming Security Operations

Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute

Cyber Security Operations: Building or Outsourcing

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

Endpoint Threat Detection without the Pain

Eight Essential Elements for Effective Threat Intelligence Management May 2015

The Role of Security Monitoring & SIEM in Risk Management

Endpoint Security - HIPS. egambit, your defensive cyber-weapon system. You have the players. We have the game.

Using SIEM for Real- Time Threat Detection

Security Services. 30 years of experience in IT business

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Cisco Advanced Malware Protection

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Critical Security Controls

Next Generation IPS and Reputation Services

Advanced Endpoint Protection

Deep Discovery. Technical details

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Analyzing HTTP/HTTPS Traffic Logs

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

EnCase Analytics Product Overview

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Redline Users Guide. Version 1.12

Transcription:

Fahad Ehsan Cyber Security Researcher

Where it all started. ------------------------------------------------------------------------------------------ Welcome to the Dungeon (c) 1986 Basit & Amjad (pvt) Ltd. BRAIN COMPUTER SERVICES 730 NIZAB BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE :430791,44324 Beware of this VIRUS...Contact us for vaccination... $#@% ------------------------------------------------------------------------------------------- http://campaigns.f-secure.com/brain/virus.html

Bolware.. Boleto Fraud $3.75 Billion Country : Brazil (since 2013) Total Victims: 192,227 (unique IPs) Browsers : IE, Firefox, Chrome Method : Create Dummy Exe (AvastSvc.exe) Code Injection into a legit Process Wait for Browser Launch Launch Injected code Create hooks in system APIs Create a copy and Add Registry Key MITB RegKey: HKCU\Software\Microsoft\Windows\Curren tversion\run\76e35fb1 https://blogs.rsa.com/wp-content/uploads/2015/07/bolware-fraud- Ring-RSA-Research-July-2-FINALr2.pdf

Agenda Unknown Malware Memory Forensics IOCs and Threat Intelligence Security Analytics My Solution Q & A

What is Unknown Malware All Malware is Unknown at some point in its life. Rule and Signature based tools often fail to detect Unknown malware. Any malware that is not detected by traditional and modern security tools at any given time. The bottle neck is generally the time taken by the vendors to update the signatures and contents. Unknown Malware can target a specific environment, which makes it even more difficult to detect e.g. stuxnet Unknown Malware generally target Zero-Vulnerabilities, as there is little protection available against such vulnerabilities.

Common Enterprise Security Tools Most of the tools found in enterprise today are signature or rule based. Host based Anti- Malware HIDS/HIPS Signature Based Policy and Heuristics Based Limited Customization Customizable DLP Policy based Customizable Firewall Rule Based Customizable Network based NIPS/NIDS Signature Based Customizable Sandboxing Tools Proxy Content Filtering Signature and Heuristics Based Signature Based Limited Customization Customizable Gateway - Anti-Spam & Malware Signature Based Customizable

Latest Host Based Tool : On-Host Forensics Host based tools Anti- Malware HIDS/HIPS Signature Based Policy and Heuristics Based Limited Customization Customizable DLP Policy based Customizable On-Host Forensics Heuristics and IOC based Customizable Mandiant Redline Carbon Black Encase ediscovery

Memory Forensics Forensic Analysis of the Memory dump taken from an infected computer. Traditionally, this is done manually with the help of tools. Memory dump taken from a live system Identify artifacts in memory which can be malicious or stealthy Techniques In enterprises, generally used for Incident Response The findings can be helpful for future investigations Build internal repository of known malware and build defenses against them 8

How Memory Forensic Tools work In most cases, a successful malware infection leaves a trail of evidence and symptoms in the memory Audits and collects running processes, drivers from memory, registry data, tasks, network connections etc Analyze data, which is collected from the Memory, this maybe based on heuristics or other techniques 9 Perform Indicator of Compromise (IOC) analysis. It is any artifact residing in the memory or on the system, e.g. Registry Key, File Hash, Connection, Process, Files Source : SANS Website

Threat Intelligence It is a source of information which provides early warnings on emerging threats applicable to your environment. TI can be gathered from multiple sources Cyber Security Communities e.g. CERTs, Cyber Security Forums, OpenIOC, Cybox Government briefings e.g. US- CERT, FBI Open Forums e.g. facebook, IRC channels, Websites In-House/Vendor Research E.g. Verizon, McAfee etc Closed Source Peer Discussions Cyber Security Communities Government Briefings Closed Source Peer Discussions In-House / Vendor Research Open Forums Threat Intelligence

Using Memory forensics with Security Analytics The Security Analytics solution bring information together from multiple sources to detect Unknown Malware. Honeypots Memory Analysis Data Packet Capture Other Security Feeds Threat Intelligence IOCs, IRC chat, Forums, Facebook ref Security Analytics Solution SIEM IDS, Antivirus, Syslogs, Proxy, etc

Detecting Known Malware Both IOCs and Signatures have similar limitations, both require somebody to report. You need something smarter. IOCs Signatures Open Format Low turnaround time Can be incomplete / experimental May requires internal research Can be customized Somebody needs to report Vendor Specific Depends on the Vendor Independently validated by Vendor Environment independent Limited Customization Somebody needs to report

Detecting Known Malware : ZEUS If any of the criteria in the IOC is met, the host is likely to be infected with Zeus. IOCs via Threat Intelligence Feed Security Analytics Solution Get Memory Analysis data Memory Analysis Data Process List ZEU S Registrykey:Microsoft\Windows NT\CurentVersion\Winlogon RegistryValue: C:/WINDOWS/system32/sdra64.exe. AND RegistryKey: ControlSet001\Services\SharedAccess\Param eters\firewalpolicy\standardprofile RegistryValue:0 AND IP:193.104.41.75 Report and Raise Alerts Correlate results with other sources Map Against IOCs Gather Results Registry Keys Connections List Loaded Dlls Environment variables File Handles

Understand your Environment One of the ways to detect Unknown Malware is by baselining your environment Compare your current environment with a known old state. Baseline your Environment Statistical analysis of your environment Use Security Analytics Solution to do massive historical analysis Feedback the findings in to new Baseline Collect Data 14 Identify anomalies in your environment Build strong research and incident response capabilities to detect and respond to Unknown Malware Look for anomalies and investigate Compare against Baseline

Detecting Unknown Malware Security Analytics can be used to detect anomalies by doing comparisons against last known baseline. Latest known Baseline Security Analytics Solution Get Memory Analysis data Memory Analysis Data Known Processes Registry Keys Whitelisted Connections Drivers, Dlls File Hashes Software installs Report and Raise Alerts Detect anomalies using mathematical models, trending etc Compare Against Baseline Gather Results Process List Registry Keys Connections List Loaded Dlls Environment variables File Handles 15

The Solution Based on an Open source Toolkit and relatively cheap solutions Volatility is a well known open source memory Analysis tool Has built in Malware detection capabilities Supports Windows, Linux, Android, Mac OS etc Can help in capturing Indicators of compromise (IOC) by listing memory contents as text or dumping files Items like processes, connections, registry keys etc can be dumped to disk

The Solution Step 1 Dump memory to a Secure Drive. The Secure Drive is Hidden from the user. RAM Step 2 Run Volatility to extract contents of the memory Processes Registry Keys Connections Drivers IE History

The Solution Step 3 Send data to a central server every 30 mins Windows Server Clients Windows 7 Clients DB and Analytics Server Windows XP Clients 18

Lab Setup A Windows XP Client 1 GB RAM Running Volatility Windows 7 Running SQL Server This is our POC Security Analytics Engine Sample IOCs loaded in the Security Analytics solution The server receives memory analysis data from the Client and processes it 19

The Demo Detecting Known Malware : ZEUS Detecting Unknown Malware

Pros and Cons Benefits Cost Provides vital information from clients which may not be available from any other source e.g. registry key, active processes Open source tool, which is flexible. The scripts can be changed to suit the environment and scale in the future. Can be integrated with external Intelligence feeds to detect emerging threats Concerns Can be resource intensive, consumes CPU during advanced analysis Based on open source tools with limited support Data Privacy

So where do we go from here We learned today that a Memory Forensics tool can be developed using open source software We can automate many of the steps involved in Memory Forensics You don t need a fancy Analytics solution to get started with finding Unknown Malware

The Big Picture Memory Forensics is a growing field and it will play a vital role as Security Analytics Solutions mature. Honeypots Memory Analysis Data Packet Capture Other Security Feeds Threat Intelligence IOCs, IRC chat, Forums, Facebook Security Analytics Solution SIEM IDS, Antivirus, Asset Inventory, Syslogs, Proxy, etc

Credits Lenny Zeltser @lennyzeltser http://zeltser.com/ Jamie Levy Volatility project http://gleeda.blogspot.com Malware Analyst's Cookbook by Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard

Thank You Questions? Fahad Ehsan Cyber Security Researcher fahade@gmail.com