CSM-ACE 2014 Cyber Threat Intelligence Driven Environments



Similar documents

If an alert falls in the forest, does your SOC hear it?

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

How To Create An Insight Analysis For Cyber Security

A Primer on Cyber Threat Intelligence

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Cybersecurity Awareness. Part 1

DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION.

BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION

Cybercrime: risks, penalties and prevention

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Gregg Gerber. Strategic Engagement, Emerging Markets

Protecting against cyber threats and security breaches

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Promoting a cyber security culture and demand compliance with minimum security standards;

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Getting Ahead of Advanced Threats

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION

The Cyber Threat Profiler

National Cyber Crime Unit

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Risk Management in Global Operating Industry

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Who s Doing the Hacking?

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

The session is about to commence. Please switch your phone to silent!

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Into the cybersecurity breach

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Security Analytics for Smart Grid

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

U. S. Attorney Office Northern District of Texas March 2013

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

September 20, 2013 Senior IT Examiner Gene Lilienthal

Marble & MobileIron Mobile App Risk Mitigation

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Combating a new generation of cybercriminal with in-depth security monitoring

Cyber intelligence exchange in business environment : a battle for trust and data

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Security strategies to stay off the Børsen front page

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Symantec Cyber Security Services: DeepSight Intelligence

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Security Intelligence

BT Assure Threat Intelligence

Practical Steps To Securing Process Control Networks

Using big data analytics to identify malicious content: a case study on spam s

Eight Essential Elements for Effective Threat Intelligence Management May 2015

BAE Systems Cyber Security Survey Report

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Digital Evidence and Threat Intelligence

How To Protect Your Online Banking From Fraud

OCIE Technology Controls Program

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Italy. EY s Global Information Security Survey 2013

Cyber Security Metrics Dashboards & Analytics

Advanced Analytics For Real-Time Incident Response A REVIEW OF THREE KNOWN CASES AND THE IMPACT OF INVESTIGATIVE ANALYTICS

CyberReady Solutions. Integrated Threat Intelligence and Cyber Operations MONTH DD, YYYY SEPTEMBER 8, 2014

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Fraud and Abuse Policy

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Protect Your Business and Customers from Online Fraud

Identifying Cyber Risks and How they Impact Your Business

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

AMPLIFYING SECURITY INTELLIGENCE

Advanced Threat Protection with Dell SecureWorks Security Services

IBM Security Systems Trends and IBM Framework

Cybercrime Security Risks and Challenges Facing Business

Report on Cyber Security Alerts Processed by CERT-RO in 2014

Information Security Incident Management Guidelines

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

idata Improving Defences Against Targeted Attack

Modern Approach to Incident Response: Automated Response Architecture

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Advanced Persistent Threats

Transcription:

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments Presented by James Calder Client Services Manager, Singapore 1

CONTENTS Digital criminality Intelligence-led security Shylock case study Making threat intelligence work Countering digital criminality 2

DIGITAL CRIMINALITY Convergent trends in cyber and financial crime 3

RISKS IN CYBER SPACE Dec 2013 Initial disclosure Jan 2014 Full extent revealed Feb 2014 Supply chain link May 2014 Target CEO resigns 4

Criminal Gains Applied Intelligence EVOLUTION OF FRAUD ATTACK METHODOLOGIES "I've poured a glass of water down the back of the TV... but, I was told to do it by the man from the TV repair shop. - Woman from Europe Staged / Induced Accidents Tax Refund Fraud Identify Theft Insider Fraud Social Engineering First Party Fraud Cyber Attack + Fraud Phishing Account Takeover Automated Insurance Claims Benefit Fraud Tax Evasion Internal Fraud Opportunistic Individuals First Party Fraud Application Fraud Tax Evasion Benefit Fraud Insurance Fraud Planned Planned Individuals and Small Groups Organised Teams Skills for hire Hierarchy Technology enabled Highly scalable International After penetrating the computer network, the crime ring allegedly made more than 4,500 ATM transactions in about 20 countries around the world - Fox news Time / Confidence / Sophistication 5

Threat Actor Goal Method Definition Applied Intelligence THE ROLE OF CYBER IN ENABLING FRAUD Definitions Cyber-crime: Illegal or damaging acts in cyber-space (eg hacking, DDoS, information theft) Fraud Challenge Fraud attacks are attacks against a business process Cyber Challenge Cyber attacks are against information technology infrastructure Cyber-enabled crime: Crimes facilitated or enhanced through use of cyber-space Criminals seek to create or manipulate transactions. Criminals seek to steal data or control/disrupt systems. Digital criminal: Organised criminals who specialise in stealing money using cyber techniques Financial Gain Information Theft System Manipulation Economic Espionage Denial of Service 6

Intelligence-led security Understanding threat intelligence 7

UNDERSTANDING THREAT INTELLIGENCE Malware signatures IOCs / IOAs Domain blacklists IP reputation lists Security mailing lists RSS feeds Open-source reports THREAT INTELLIGENCE Targets (sector / region) Motivation / Persistence Tools / Tactics / Procedures Attribution / Affiliation Socio-political context Business impacts Suggested mitigations 8

DRIVES THE BUILDING OF INTELLIGENCE MODELS Police Banks Investigators Criminals Malware Victims Infrastructure Researchers CERTs 9

SIX STEPS TO INTELLIGENCE-LED SECURITY PERFORM THREAT ASSESSMENT DETERMINE INTELLIGENCE REQUIREMENTS BUILD COLLECTION SOURCES OPERATIONALIZE THREAT INTELLIGENCE INTRODUCE SECURITY ANALYTICS GAIN SITUATIONAL AWARENESS 10

Shylock Case Study Use of threat intelligence to counter digital crime 11

SHYLOCK A CYBER CRIMINAL INTELLIGENCE PROBLEM Criminals Malware Intelligence Model Infrastructure Victims 12

SHYLOCK FINANCIAL CRIME OPERATION Estimated at over 50K machines compromised Global victimisation, but with a preference for UK, US, and Italy UK US IT BR TW UA DE Other 13

HOW IT WORKS COMPROMISING THE VICTIM Criminals Malware Intelligence Model Infrastructure Victims 14

HOW IT WORKS MALWARE AUTOMATION Malware Criminals Intelligence Model Infrastructure Victims 15

HOW IT WORKS MALWARE AUTOMATION Malware Criminals Intelligence Model Infrastructure Victims 16

HOW IT WORKS MALWARE AUTOMATION Malware Criminals Intelligence Model Infrastructure Victims 17

HOW IT WORKS BANKING WEBSITE MODIFICATION Criminals Malware Intelligence Model Infrastructure Victims 18

FINDING THE C2 INFRASTRUCTURE Malware Criminals Intelligence Model Infrastructure Victims 19

LINKS TO MULE RECRUITMENT Malware Criminals Intelligence Model Infrastructure Victims 20

PUTTING IT ALL TOGETHER 21

THE SHYLOCK TAKEDOWN INTELLIGENCE INTO ACTION 22

Making threat intelligence work Turning people, process and technology into action 23

MONITORING Applied Intelligence FORMS OF THREAT INTELLIGENCE INCREASING VOLUME, DETAIL AND URGENCY Tactical Intelligence Operational Intelligence Strategic intelligence Immediate threat Emerging threats Trend analysis Knowledge of threats Investment decisions Horizon scanning HOT SPOT SECURITY OPERATIONS SECURITY MANAGEMENT CORPORATE STRATEGY AND RISK DIFFERENCES IN LANGUAGE AND PERSPECTIVE 24

MAKING THREAT INTELLIGENCE WORK PEOPLE 25

MAKING THREAT INTELLIGENCE WORK ACTION APPLICATION OF THREAT INTELLIGENCE PAST Exposure Testing Apply the threat details to historical log data, and even closed alerts and incidents to easily identify previously unknown exposures to the threat PRESENT Current Investigations Apply the threat details to current alarms and incidents in the queue or under investigation to immediately alert operators and analysts to the active threat FUTURE Sensor Enrichment Apply the threat details to monitoring infrastructure to begin monitoring for and preventing new instances of the identified threat activity 26

IN A SECURITY OPERATIONS ENVIRONMENT Information sharing with trusted partners Centrally managed threat intelligence repository Indicators deployed to monitoring systems Ingest of structure and unstructured feeds Contextual information available to SOC analysts Integrated threat models for security analytics research 27

BAE Systems Applied Intelligence Level 28, Menara Binjai 2 Jalan Binjai Kuala Lumpur, 50450 Malaysia James Calder Client Services Manager, Singapore T: +60 (3) 2191 3000 F: +60 (3)1483 816144 www.twitter.com/baesystems_ai www.linkedin.com/company/baesystemsai Copyright BAE Systems 2014. All rights reserved. BAE SYSTEMS, the BAE SYSTEMS Logo and the product names referenced herein are trademarks of BAE Systems plc. BAE Systems Detica and BAE Systems Applied Intelligence are trading names of Detica Limited registered in England (No.1337451) with its registered office at Surrey Research Park, Guildford, England, GU2 7RQ. 28