Blind Spot Analysis Finding RAT Communications through Entropy and Analytics



Similar documents
Covert Operations: Kill Chain Actions using Security Analytics

The Big Data Paradigm Shift. Insight Through Automation

RSA Security Analytics

RSA Security Anatomy of an Attack Lessons learned

After the Attack: RSA's Security Operations Transformed

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

WHITE PAPER Big Data Analytics. How Big Data Fights Back Against APTs and Malware

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

The session is about to commence. Please switch your phone to silent!

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Data Analytics for a Secure Smart Grid

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Advanced Threats: The New World Order

WHY ATTACKER TOOLSETS DO WHAT THEY DO

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Using Network Forensics to Visualize Advanced Persistent Threats

Netgator: Malware Detection Using Program Interactive Challenges. Brian Schulte, Haris Andrianakis, Kun Sun, and Angelos Stavrou

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

RSA Security Analytics Security Analytics System Overview

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Installation and configuration guide

The Epic Turla Operation: Information on Command and Control Server infrastructure

WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS

Security Analytics for Smart Grid

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

How to Build a Massively Scalable Next-Generation Firewall

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Rashmi Knowles Chief Security Architect EMEA

Security Operations Metrics Definitions for Management and Operations Teams

white paper How Big Data Fights Back Against APTs and Malware

OpenTPX 2015 LookingGlass Cyber Solutions Inc.

A Perfect CRIME? TIME Will Tell. Tal Be ery, Web research TL

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

Summary of Results. NGINX SSL Performance

What s New in Security Analytics Be the Hunter.. Not the Hunted

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

Detect & Investigate Threats. OVERVIEW

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Active Response: Automated Risk Reduction or Manual Action?

RSA Incident Response: An APT Case Study

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

Network Payload Analysis for Advanced Persistent Threats Charles Smutz, Lockheed Martin CIRT

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

CORPORATE AV / EPP COMPARATIVE ANALYSIS

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

How To Mitigate A Ddos Attack

ThreatSpike Dome: A New Approach To Security Monitoring

Understanding Slow Start

Post-Access Cyber Defense

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Intelligence Driven Security

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Concierge SIEM Reporting Overview

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Inside the Storm: Protocols and Encryption of the Storm Botnet

Redefining SIEM to Real Time Security Intelligence

CS 4803 Computer and Network Security

From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?

Network Security Incident Analysis System for Detecting Large-scale Internet Attacks

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

Comprehensive Advanced Threat Defense

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

RSA SecurID Ready Implementation Guide

The Top Web Application Attacks: Are you vulnerable?

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Analytics, Big Data, & Threat Intelligence: How Security is Transforming

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Chapter 7 Transport-Level Security

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

The Curious Case of Database Deduplication. PRESENTATION TITLE GOES HERE Gurmeet Goindi Oracle

Unified Security, ATP and more

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

WHITE PAPER: THREAT INTELLIGENCE RANKING

A perspective to incident response or another set of recommendations for malware authors

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)

LEVERAGING PROACTIVE DEFENSE TO DEFEAT MODERN ADVERSARIES. Jared Greenhill RSA Incident Response. September 17 th, 2015

Context Threat Intelligence

Firewall Testing Methodology W H I T E P A P E R

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Palo Alto Networks. October 6

Metric Matters. Dain Perkins, CISSP

Network Monitoring using MMT:

Network Security Solution. Arktos Lam

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM

The Evolution of Application Acceleration:

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Zak Khan Director, Advanced Cyber Defence

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Securing IP Networks with Implementation of IPv6

Transcription:

Blind Spot Analysis Finding RAT Communications through Entropy and Analytics

Customer Profile EMC CIRC ANDREW RUTKIEWICZ Principle IT Security Analyst Numerical weakness comes from having to prepare against possible attacks; numerical strength from compelling our adversary to make these preparations against us Sun Tzu Challenge Develop Analytics Intel Data Management Behavioral Malware Categorization Reporting Data -> Actionable Items Solution Quantitative Meta Creation Service Identification Defined Methodology Automated Processing Results Fingerprinting Capabilities Analytical Disintermediation Lowered Analytical Transaction Costs Applications SA ECAT Archer SAW 2

Resources Phillip Evans BCG How Data Will Transform Business Ted Talks https://www.ted.com/talks/philip_evans_how_data_will_transform_business Data Streaming Algorithms for Estimating Entropy of Networks 2006 http://www.cc.gatech.edu/~jx/reprints/sigm06_entropy.pdf 3

What This Talk Is And Is Not As much theory as practice Application of strategic business theory to information security Tools are useless without a methodology Ideas to creatively solve issues and shortcomings No silver bullet There is no magic to finding ALL malware 4

Porter, Strategy And Security Blind spot analysis Methodology for decision makers to determine current practices/thoughts are antiquated Perform Porter s Five Forces Gather competitive intelligence Compare the two Typically value chain analysis follows How you add value via process or knowledge Easily transferred to ever changing security world 5

Five Forces Business Threat Of New Entrants Threat Of Substitutes Barging Power of Suppliers Barging Power of Buyers Strength of Industry Rivalry Security Threat of New Actors Threat of New Malware GA Tools\Code\Exploits OTS Sec Tools Actor s $ & Build to Suit Tools DIY Sec Tools Pitch of Battlefield 6

Competitive Intelligence Threat intelligence feeds & portals Internal intelligence Level of expertise in security threats Counter intel operations Supply chain Do threat actors target your upstream and downstream? Does your supply chain communicate with you? 7

So Where Do You Stand? Any major contradictions? Where are you out-matched? Where do have a competitive advantage? What you should you do next? Data science/analytics AI/ML Panic/Freakout? Because Math is not an acceptable answer 95% have no staff or budget for analytics Detection methods are unproven (in production environments) It s not science if its not repeatable Can I make my own Skynet to help? 8

Blindspot Analysis Results (tool side) Few quantitative meta groups Packet meta is ugly in SAW Lack of placeholders for HTTP dir,filename,action Use of in strings that are arrays Nitty-gritty data manipulation Lack of building blocks Summary tables Profiling Data science free-for-all 9

A Common Blindspot New RATs Difficult to detect on the wire Thousands of variants from many families All have the same basic functionality Many share sections of code Slight changes allow evasion of detection Many different C2 Comm channels 10

Typical APT RATs Non-HTTP based 9002 aka Hydraq Gh0st aka Zegost aka LURK PlugX aka Sogu aka KorePlug Many others Hupigon, Pirpi*, ZiYang, ZXShell, Poison Ivy 11

What Do They Have In Common? 9002, Gh0st, ZiYang and PlugX Packet length is incorporated into header Packet header is inside of first 16 Bytes Non-HTTP based Use compression or encoding, sometimes both Traditionally hard to detect and easy to modify 12

Packet Headers RAT 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 Gh0st 5 Byte G h 0 s t L C M P L U C P Gh0st 6 Byte L O V E T T L C M P L U C P Gh0st Shifted L C M P L U C P A Q Q K L 9002 9 0 0 2 L C M P L U C P ZiYang XORed Cmd L C M P PlugX ENC Key Comm Flag C L U L (Encrypted) 13

C2 Check-in Payloads Uncompressed or decrypted all contain C2 Command CPU Speed and RAM Username and Computer Name OS Version Sys Info IP, Webcam, Volume Info, etc. Typically Padded With 0x00 Compression is only effective on larger payloads 14

Value Chain: SA&SAW as a raw material Analytics work best with quantitative data OOB SA Packets has little available for DIY analytics No client bytes vs server bytes Can t parse entire stream (OOB first 128K [97.6K]) Can t parse all streams natively Need token in parsers Not always sure of what your looking for new rats Limited avro data types No INET type Need to write UDFs UDAFs to deal with 15

DIY Analytics Cookbook Quantitative measures of sessions Entropy, #of symbols, avg. packet length, byte frequency Repeatable (It s science!) Measures like entropy directly correlate to compression and encryption Compression ratio is an expression of the entropy of information being compressed Encryption = Close to maximum entropy Obfuscation = High entropy 16

More Cookbook Fun Encoded data\compressed data have patterns 39U 19! and \x4b63\x6060 Gh0st - LZ Artifacts other than 789C Bytes 26 and 33 tend to be identical Low entropy Some PlugX variants are almost entirely 0x00 Hupigon uses 0x00 as padding (lots) High entropy AES or other encryption without SSL Teach a computer why traffic looks shady 17

Analytics and Beyond AIaaS? Data enrichment -> ECAT DB, WWW Profiling of IP.DEST, Alias.host, Entropy Calculate entropy of HTTP directory or domain name Base64 Identification DGA Identification In-depth byte frequency analysis - NLP Is your dataset ready for AIaaS? 18

Analytic Gotchas Entropy is computationally expensive (lots of LogN) High CPU cost 10% per 100Mb Boiling the ocean never works Service identification must be >90% accurate Data scientists are not security professionals Standard analytic methods for network security carry high transaction costs and low yields Outcome: Negative ROI this is changing 19

New Analytical Meta Client.payload Client.entropy Client.entropy.m Client.mfb Client.mcb Client.ub Client.aps Server.payload Server.entropy Server.entropy.m Server.mfb Server.mcb Server.ub Server.aps 20

Derived Calculations *.ub /256 = % key space used *.mfb/*.payload = padding factor Server.payload/Client.payload= RxTx ratio Entropy / payload = metric entropy Allows for finger printing of devices, websites, protocols and applications through network traffic Client entropy / server entropy = needs a cool name 21

SSL Entropy VS Unique Bytes Profile 22

Summary Define the big problem, break problem into smaller, solvable questions Solutions to small problems should be reusable and optimally quantitative Meaningful patterns will not solve problems alone Must be repeatable, therefore scriptable ->AI Simple is better keep transactions costs low! Follow a well defined methodology 23

Questions? 24

THANK YOU

<key description="client Entropy" format="float32" level="indexvalues" name="client.entropy" defaultaction="open"/> <key description="server Entropy " format="float32" level="indexvalues" name="server.entropy" defaultaction="open"/> <key description="client Metric Entropy" format="float32" level="indexvalues" name="client.entropy.m" defaultaction="open"/> <key description="server Metric Entropy" format="float32" level="indexvalues" name="server.entropy.m" defaultaction="open"/> <key description="client Payload" format="uint32" level="indexvalues" name="client.payload" defaultaction="open"/> <key description="server Payload" format="uint32" level="indexvalues" name="server.payload" defaultaction="open"/> <key description="client Most Common Byte" format="uint8" level="indexvalues" name="client.mcb" defaultaction="open"/> <key description="server Most Common Byte" format="uint8" level="indexvalues" name="server.mcb" defaultaction="open"/> <key description="client Unique Bytes" format="int16" level="indexvalues" name="client.ub" defaultaction="open"/> <key description="server Unique Bytes" format="int16" level="indexvalues" name="server.ub" defaultaction="open"/> <key description="client Occurrence of Most Common Byte" format="uint32" level="indexvalues" name="client.mfb" defaultaction="open"/> <key description="server Occurrence of Most Common Byte" format="uint32" level="indexvalues" name="server.mfb" defaultaction="open"/> 26