Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats



Similar documents
RSA Security Anatomy of an Attack Lessons learned

Evolving Threat Landscape

5 Steps to Advanced Threat Protection

Cisco Advanced Malware Protection for Endpoints

Comprehensive Advanced Threat Defense

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

SPEAR PHISHING AN ENTRY POINT FOR APTS

Breach Found. Did It Hurt?

Cisco Advanced Malware Protection for Endpoints

Practical Threat Intelligence. with Bromium LAVA

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Protecting Point-of-Sale Environments Against Multi-Stage Attacks

Unified Security, ATP and more

Concierge SIEM Reporting Overview

Whitepaper. Advanced Threat Hunting with Carbon Black

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

Speed Up Incident Response with Actionable Forensic Analytics

Introducing IBM s Advanced Threat Protection Platform

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

APPLICATION PROGRAMMING INTERFACE

SIEM is only as good as the data it consumes

Incident Response. Six Best Practices for Managing Cyber Breaches.

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

ThreatSTOP Technology Overview

EITC Lessons Learned: Building Our Internal Security Intelligence Capability

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Deep Discovery. Technical details

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Carbon Black and Palo Alto Networks

eguide: Designing a Continuous Response Architecture Disrupting the Threat: Identify, Respond, Contain & Recover in Seconds

IBM QRadar Security Intelligence April 2013

Cisco Advanced Malware Protection

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Breaking the Cyber Attack Lifecycle

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Advanced Threats: The New World Order

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Analyzing HTTP/HTTPS Traffic Logs

Spear Phishing Attacks Why They are Successful and How to Stop Them

C. Universal Threat Management C.4. Defenses

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

Covert Operations: Kill Chain Actions using Security Analytics

Best Practices for Deploying Behavior Monitoring and Device Control

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Things To Do After You ve Been Hacked

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Protecting Your Organisation from Targeted Cyber Intrusion

Redline Users Guide. Version 1.12

Under the Hood of the IBM Threat Protection System

Persistence Mechanisms as Indicators of Compromise

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Intrusion Detection in AlienVault

Fighting Advanced Threats

Using Network Forensics to Visualize Advanced Persistent Threats

The Hillstone and Trend Micro Joint Solution

SourceFireNext-Generation IPS

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Rashmi Knowles Chief Security Architect EMEA

Integrating MSS, SEP and NGFW to catch targeted APTs

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

The Comprehensive Guide to PCI Security Standards Compliance

Requirements When Considering a Next- Generation Firewall

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

SANS Top 20 Critical Controls for Effective Cyber Defense

RAVEN, Network Security and Health for the Enterprise

Symantec Endpoint Protection Datasheet

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Symantec Endpoint Protection

Symantec Advanced Threat Protection: Network

Eight Essential Elements for Effective Threat Intelligence Management May 2015

High End Information Security Services

Evolution Of Cyber Threats & Defense Approaches

Invincea Advanced Endpoint Protection

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

Enterprise-Grade Security from the Cloud

THE NEW FRONTIER FOR PROTECTING CORPORATE DATA IN THE CLOUD

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

ThreatSpike Dome: A New Approach To Security Monitoring

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Fidelis XPS Tech Talk: Preventing Cyber Attacks With Real-Time Threat Intelligence. June 2010 Version 1.0 PAGE 1 PAGE 1

Alert (TA14-212A) Backoff Point-of-Sale Malware

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

WildFire. Preparing for Modern Network Attacks

Performing Advanced Incident Response Interactive Exercise

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Effective Log Management

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Protect Your Business and Customers from Online Fraud

Transcription:

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats Jody C. Patilla The Johns Hopkins University Session ID: TECH-107 Session Classification: Intermediate

Objectives Get more out of tools you already have Target known attack-related activity Narrow the search space for investigations Get defenders out of the weeds and onto the target faster Automate more of the process 2

About Johns Hopkins Dynamic, open culture, environment Under constant attack by advanced and persistent threats Hundreds of millions of events enter the SOC every day Limited security staff to manage large set of resources 3

Profile of an Advanced Threat 1 2 3 4 5 Highly targeted Phishing and Zero day attack Back Door Lateral Movement Data Gathering Exfiltration Establishes foothold on endpoint A handful of users are targeted by phishing attacks; one user opens Zero day payload file The user s machine is accessed remotely by a remote admin tool such as Poison Ivy Attacker elevates access to important services and accounts, and specific systems Data is acquired from target systems and staged for exfiltration Data is exfiltrated via encrypted files over ftp to external, compromised machine Can remain dormant for months Controlled by a remote operator Targets your most valuable IP and assets Hide in plain sight 4

Challenges for Defenders Too much data, too little time, not enough analysts Most data is captured in motion, on the wire; most attacks hit the endpoint Post-event forensics a nightmare of needles and haystacks Near-real time correlation of endpoint and network events could be a force multiplier 1 2 3 4 5 Phishing and Zero day attack Back Door Lateral Movement Data Gathering Exfiltration At rest. In motion. 5

Endpoint Sensor Intelligence Real Time File Intelligence Arrival of every new executable or script file File name, path, hash, type, reputation and other metadata Timestamp, Target host, IP address User name, process name, installer Removable Device Intelligence Vendor, device name, serial number Timestamp, Target host, IP address Configuration and Memory Monitoring Define traps on any registry setting or configuration file Monitor any cross process memory access or injection Inventory and Propagation Intelligence Where else does the file exist in my organization What other files has it created 6

Providing Better Threat Indicators Whitelisting technology provides deeper near real-time visibility into endpoint activity (in addition to proactive defensive capabilities) The endpoint sensor becomes a means to filter out noise Visibility into all unapproved file and process activity, and targeted configuration and memory activity Data is available even if malware removes its tracks Reputation services can augment filters with threat and trust indicators iexplore.exe created webexsetup.exe webexsetup.exe created webex.dll iexplore.exe created a.exe iexplore.exe launched a.exe a.exe modified startup configuration USB device X attached explorer.exe launched unknown.exe unknown.exe accessed svchost.exe 7

Endpoint InfoSec Events Event ID Message Description Significance 1201 Malicious file detected File with high threat has been detected based on Bit9 software reputation service 1200 Potential risk file detected Potentially unwanted file has been detected based on Bit9 software reputation service 1004 Banned file written to computer Explicitly blocked file (name and/or hash) detected. [active process, installer, ] Standalone Standalone Standalone 802 Execution block (banned file) Explicitly blocked file attempted execution. Standalone 1009 Device attached USB with file system attached. [vendor, device] Correlate 1003 New pending file to computer Unapproved file detected. [file, hash, installer, ] Correlate 1007 First execution on network Never before seen file executed. [file, hash, installer, ] Correlate 800 Tamper protection blocked Attempt to stop security service, or modify/delete files or configuration. [user, process, ] Correlate 305 Multiple failed logins Three consecutive login failures Standalone [Future] Registry / memory / file traps Specific traps can be defined on any file, registry or cross process memory activity Standalone 8

Correlation with Other Devices 9

Assessing Risk Against Attack Patterns Track entry vectors of attacks USB devices EXE download over the wire Track arrival of unapproved executables New pending files Look for suspicious indicators The parent process is an unlikely install vector The file is trying to hide itself The file matches known intelligence indicators Track new file executions Correlate with suspicious outbound traffic 10

Detection and Correlation Use Cases Examples for handling standalone and correlated events Basic use case format: 1. Example event is generated at endpoint and/or on network, and sent to SIEM 2. Event passes current SIEM filters 3. New SIEM rule triggers given selected condition 4. Can tie to previously observed activity 5. Action and/or notification generated 11

Detection: Alternate Data Streams (ADS) Windows Hidden file attached to normal file Originally created for NTFS compatibility with Macintosh OS Resource Fork Some malware hides executables in ADS files ADS Filename resembles good.exe:bad.exe Where good.exe is known but the related good.exe:bad.exe is HIDDEN. Utilities are generally needed to list ADS files in directories To execute the ADS, the call must be: start {fullpath}\goodfile.exe:bad.exe 12

Detection: New Executable is an ADS Endpoint Sensor 1. Sends New File Event to SIEM SIEM 2. Filter passes endpoint New File events 3. Rule triggers if filename contains : and does not start with <fileid: 4. Action sends Notification: ADS File Benefit Anomalous files associated with malware automatically flagged 13

Detection: New EXE File written by Atypical Process Endpoint Sensor 1. Sends New File Event to SIEM SIEM 2. Filter passes New File events 3. Rule triggers if New File is an EXE and the Creation Process is not a typical Process 4. Action sends Notification: New EXE written by Anomalous Process Benefit Files of dubious origin are automatically flagged 14

Detection/Correlation: Tracking New Endpoint External Drives Endpoint 1. User attaches new device to PC 2. Sensor sends Device Attached Event to SIEM SIEM 3. Filter passes Event 4. Rule triggers and 5. Associated Action writes record to Active List (Active List record = PC IP address and attached Device info) Benefit The SIEM Active List can be used to correlate the origin of new malware with a file introduced from a physical device 15

Detection/Correlation: Tracking New Internet Downloads IDS 1. User downloads EXE to PC 2. IDS sends EXE Download E4 to SIEM SIEM 3. Filter passes event 4. Rule triggers and 5. Associated Action writes record to Active List 6. Active List record = PC IP address, Remote Site IP address Benefit SIEM can correlate the appearance of new malware with a file downloaded from the Internet 16

Correlation: Actionable Events with Drop Vector Endpoint Sensor 1. Sends Actionable Event to SIEM SIEM 2. Filter passes Actionable events 3. Rule compares User/Endpoint IP address to records in lists Device attached and IDS EXE Download 4. If Rule triggers, Action sends Notification Actionable Event with Device Attached or EXE Download Benefit SIEM can correlate, in real-time, the origin of new malware introduced into the environment by a new drive or Internet download 17

Correlation: Actionable Events with Blocked Outbound Activity FW/DNS 1. Sends Deny event to SIEM SIEM 2. Filter passes Outbound Deny events 3. Rule compares Intranet Source IP with Active List records of Endpoints with New Files 4. If Rule triggers, Action sends Notification: Outbound Traffic Blocked with New File Benefit SIEM can correlate new blocked outbound activity with new files on the endpoint could be linking malware with exfiltration attempt 18

How to Apply in Your Environment Within three months from this presentation, you should Identify the events your endpoint tool can detect and report Select cases for maximum bang for the buck (use our examples!) Within six months, you should Implement appropriate SIEM rules When further investigation is required, have single click access to All recent activity on target machine Detailed information about suspect file (where is it, who created it, what other files did it drop, trust level of file, ) 19

Wins for You Extended detection of new threats and attacks Detection based on new indicators Detection of malware at rest versus in motion Reduce signal-to-noise ratio: More accurate filtering Escalate severity of suspicious network activity based on actual endpoint activity Correlation with ID/IPS and firewall to identify suspicious attack vectors yields a more complete picture Reduce time to investigate Use endpoint events to gain more insight into suspicious activity Console integration for investigation and analysis from single pane 200m per day 20m per day 3 dozen per day 320k per day 9 types correlated Impact mean time to threat conclusion by removing endpoint blind spot 20

Questions? Jody C. Patilla Sr. Information Assurance Analyst The Johns Hopkins University jody dot patilla at jhuapl dot edu 21

Examples The following examples from our ArcSight server show how the filters, rules, and actions are implemented to address two cases discussed today: Alternate Data Streams (ADS) and a specific Internet executable download. 22

ADS Example: Filter and Rule Filter Rule 23

ADS Example: Associated Action Rule -> Action 24

Snort Download Example: Filter and Rule Filter Rule 25

Snort Download: Associated Action Rule -> Action 26