Under the Hood of the IBM Threat Protection System



Similar documents
Society Protection Best Practices from Industry

Security Intelligence

The webinar will begin shortly

IBM QRadar Security Intelligence April 2013

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

The Current State of Cyber Security

Protecting against cyber threats and security breaches

IBM Security Intelligence Strategy

and Security in the Era of Cloud

Security strategies to stay off the Børsen front page

IBM Security X-Force Threat Intelligence

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM SECURITY QRADAR INCIDENT FORENSICS

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

How to Choose the Right Security Information and Event Management (SIEM) Solution

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager

BigData Analytics per la sicurezza delle Infrastrutture Critiche

Data Security: Fight Insider Threats & Protect Your Sensitive Data

IBM Security IBM Corporation IBM Corporation

Strengthen security with intelligent identity and access management

Leverage security intelligence for retail organizations

Introducing IBM s Advanced Threat Protection Platform

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

IBM Advanced Threat Protection Solution

Win the race against time to stay ahead of cybercriminals

Cyber security - the business critical issues facing organisations

IBM Security QRadar Vulnerability Manager

Do not forget the basics!!!!!

IBM Security Strategy

IBM Security QRadar QFlow Collector appliances for security intelligence

Safeguarding the cloud with IBM Dynamic Cloud Security

AMPLIFYING SECURITY INTELLIGENCE

Beyond passwords: Protect the mobile enterprise with smarter security solutions

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

IBM Security QRadar Vulnerability Manager Version User Guide

Cloud Security. Vaughan Harper IBM Security Architect

Breaking down silos of protection: An integrated approach to managing application security

Addressing Security for Hybrid Cloud

Applying IBM Security solutions to the NIST Cybersecurity Framework

Reducing the cost and complexity of endpoint management

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Risk-based solutions for managing application security

Boosting enterprise security with integrated log management

IBM Security Privileged Identity Manager helps prevent insider threats

SPEAR PHISHING AN ENTRY POINT FOR APTS

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Extending security intelligence with big data solutions

QRadar SIEM and FireEye MPS Integration

QRadar SIEM and Zscaler Nanolog Streaming Service

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

Introduction to PCI DSS

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

IBM Endpoint Manager Product Introduction and Overview

Unified Security, ATP and more

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

End-user Security Analytics Strengthens Protection with ArcSight

IBM Security QRadar SIEM Product Overview

IBM QRadar Security Intelligence Platform appliances

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Preemptive security solutions for healthcare

Protect Your Business and Customers from Online Fraud

IBM Security Intrusion Prevention Solutions

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Let s talk about assets in QRadar

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

RSA Security Anatomy of an Attack Lessons learned

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

End to End Security do Endpoint ao Datacenter

Countering Insider Threats Jeremy Ho

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dagli attacchi

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Security Intelligence Solutions

Cisco Advanced Malware Protection

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

Stay ahead of insiderthreats with predictive,intelligent security

Managing security risks and vulnerabilities

Security for a Smarter Planet IBM Corporation All Rights Reserved.

Integrating MSS, SEP and NGFW to catch targeted APTs

Extreme Networks Security Analytics G2 Vulnerability Manager

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

IBM Security QRadar Vulnerability Manager Version User Guide IBM

24/7 Visibility into Advanced Malware on Networks and Endpoints

Speed Up Incident Response with Actionable Forensic Analytics

1 Introduction Product Description Strengths and Challenges Copyright... 5

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

IBM Security Framework

IBM Security Services Cyber Security Intelligence Index

Breach Found. Did It Hurt?

Transcription:

Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE balazs.csendes@cz.ibm.com 1

You are an... IT Security Manager at a retailer with 50 locations. You manage a team of IT analysts that are responsible for maintaining network operations for point of sale in retail locations, central servers, the company website and mobile applications. 2 Other areas of your company, like product management, have credentials for various applications to enable them to conduct business. 2

Monday 8:30am Over a cup of coffee, you get a phone call from a well-known security blogger that your customer credit card numbers and one of your Internetaccessible server addresses showed up on an underground forum known for trading stolen information. 3 Within 10 minutes, you notify legal counsel, the CIO, and law enforcement and begin a forensics investigation to figure out how the breach occurred. 3

The previous Saturday Investigating the server logs from the weekend shows a connection from a server to an eternal FTP server you don t recognize, hosted at the dynamic domain 1337.my-ftp.biz. The attacker must have manually copied ecerpts of the data from the FTP server to the 4 underground forum. 4

The previous week You find evidence in the log files of transfers of PCI in the previous week from POS servers to a single internal server, the server that connected to the eternal FTP server. 5 5

The previous 2-3 weeks You find a copy of the file CardScraper.ee on each of the POS servers that sent PCI to the server that made the eternal connection. 6 In the 2-3 week prior, that malware hunted for additional POS servers, copying penetration tools and password crackers to them, and infiltrating the network. 6

28 days earlier Probing further, you find a RAT (Remote Access Trojan) named svch0st.ee, which 7 acted as a dropper to secretly install, eecute, and avoid anti-virus detection. This program downloaded CardScraper.ee from an eternal server located at IP Address 91.216.73.32 and copied it to the POS servers. 7

29 days earlier While working in a coffee shop, Ivo, in Development, receives an email from a retailer requesting account verification. 8 He clicked the link, but didn t notice it was to fake website named acccount-verify.com, which launched a zero-day eploit to his browser and downloaded the trojan svch0st.ee to his system. Ivo drives to work where he logs into the network, allowing svch0st.ee to slip into the network and start the chain of events leading to the breach. 8

Let's start from the beginning to see how the attack could have been disrupted... 9 9

System A dynamic, integrated system to disrupt the entire lifecycle of advanced attacks Smarter ion Stop unknown threats with behavioral-based defenses on both the endpoint and network Security Intelligence Automatically detect weaknesses and anomalies with enterprise-wide visibility and insights 10 Continuous Response Quickly understand incidents and use findings to strengthen realtime defenses Open Integrations Share contet between domains and third party products using an open platform and ecosystem 10

30+ days earlier ion measures are in place to identify and remediate eposure for the company. IBM Endpoint Manager (BigFi) identifies and manages policy eceptions on endpoints to quarantine and mark assets for remediation before the attack occurs. 11 11

29 days earlier Ivo is the subject of a phishing scam and inadvertently downloads malware IBM Security Trusteer Ape Advanced Malware stops the zero-day eploit from attacking his web browser and eecuting the RAT named svch0st.ee 12 12

29 days earlier Ivo is the subject of a phishing scam and inadvertently downloads malware Based on the output from Trusteer Ape, IBM Endpoint Manager quarantines Ivo s laptop so that it can only communicate with IEM to be remediated 13 13

29 days earlier Ivo is the subject of a phishing scam and inadvertently downloads malware The malware attempts to take advantage of an eisting vulnerability but IBM Endpoint Manager applies patches and adjusts configuration settings to eliminate the vulnerability and reports the vulnerability to QRadar in for further analysis 14 14

28 days earlier The RAT downloads CardScraper.ee and the malware starts to replicate Trusteer Ape blocks command & control (C&C) activity on the endpoint, stopping the RAT from communicating with the server to download CardScraper.ee 15 15

28 days earlier The RAT downloads CardScraper.ee and the malware starts to replicate IBM Security Network (XGS) prevents C&C activity on the server by blocking the remote IP 91.216.73.32 hosting CardScraper.ee based on IP reputation 16 16

28 days earlier The RAT downloads CardScraper.ee and the malware starts to replicate IBM QRadar SIEM detects the RAT install from system event logs, giving it a magnitude score of 8 and raising a flag in the security analyst s dashboard 17 17

2-3 weeks earlier CardScraper.ee is copied to POS servers throughout the business IBM Guardium Data Activity Monitor blocks the unauthorized connection to the database servers. 18 Session Terminated, Data Secured 18

2-3 weeks earlier CardScraper.ee is copied to POS servers throughout the business IBM QRadar SIEM detects file transfers based on network events, and reports a policy violation on unauthorized access to a POS server 19 19

The previous week PCI was transferred from infected POS servers to a single server IBM Guardium Data Activity Monitor alerts on the suspicious activity of the attempt by an unauthorized user to access a large amount of sensitive data as a potential precursor to an efiltration attempt, raising the offense to IBM QRadar SIEM 20 20

The previous week PCI was transferred from infected POS servers to a single server IBM QRadar SIEM detects communication behavior that deviates from corporate and compliance policies 21 21

The previous Saturday A server connects to an unknown eternal FTP server and the PCI is efiltrated. IBM Security Network XGS would block the outbound connection based on the URL reputation of remote FTP server 1337.my-ftp.biz 22 22

The previous Saturday A server connects to an unknown eternal FTP server and the PCI is efiltrated. IBM QRadar SIEM would detect anomalous flow out from a server that never connected outbound before with a Connection Outbound to Internet from Critical Asset flag 23 23

How do you conduct this forensics investigation? With a solution like QRadar Incident Forensics, you can 24 Query eternal server addresses found on the underground forum Report internal connections Show eternal file transfers IBM Security QRadar Incident Forensics Identify malware transferred by the attacker Discover connection histories and etended relationships with internal assets and identities via deep analysis and reconstruction of recorded packet capture files. Directly from the QRadar console. 24

Early detection and rapid response are critical It can take just minutes to compromise your network, but months to discover and recover. IBM offers Emergency Response Services to help. A team of incident response and forensics eperts ready to respond globally 120 staff hours per year, which can be utilized for emergency response services or preventative services 25 Unlimited emergency declarations Access to the X-Force Threat Analysis Service backed by global intelligence research Quarterly checkpoint, support, and update on threat landscape 25

A dynamic, integrated system to help break the attack chain. 26 1 2 3 4 5 Break-in Focus on critical points in the attack chain with preemptive defenses on endpoints, the network, and critical data repositories. Continuously monitor activity from across the entire organization. Rapidly investigate breaches, retrace activity, and learn from findings. 26

System 27 Smarter ion Trusteer Ape Endpoint Malware malware installation and disrupt malware communications IBM Security Network XGS remote network eploits and limit the use of risky web applications IBM Guardium Data Activity Monitoring remote network eploits and limit the use of risky web applications Open Integrations Security Intelligence IBM Security QRadar Security Intelligence Discover and prioritize vulnerabilities Correlate enterprise-wide threats and detect suspicious behavior Continuous Response IBM Security QRadar Incident Forensics Retrace full attack activity, Search for breach indicators and guide defense hardening IBM Endpoint Manager Automate and manage continuous security configuration policy compliance IBM Emergency Response Services Assess impact and plan strategically and leverage eperts to analyze data and contain threats Global Threat Intelligence Ready for IBM Security Intelligence Ecosystem Share security contet across multiple products 100+ vendors, 400+ products IBM X-Force Threat Intelligence Leverage threat intelligence from multiple epert sources 27

IBM Security Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY www.ibm.com/security 28 Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, epress or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.