Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Similar documents
A Penetration Testing Maturity and Scoring Model

Advanced Persistent Threats

Advanced & Persistent Threat Analysis - I

How We're Getting Creamed

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

RSA Security Anatomy of an Attack Lessons learned

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

FERPA: Data & Transport Security Best Practices

Rational AppScan & Ounce Products

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Trends in Advanced Threat Protection

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

The Peak of Chaos Shane D. Shook, PhD 10/31/2012

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

Agenda , Palo Alto Networks. Confidential and Proprietary.

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Storage Cloud Infrastructures

Breaking the Cyber Attack Lifecycle

Presented by Evan Sylvester, CISSP

How To Test For Security On A Network Without Being Hacked

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Information Security Services

A Case for Managed Security

SECURITY INTELLIGENCE: CAN BIG DATA ANALYTICS OVERCOME OUR BLIND SPOTS? AN IANS CUSTOM REPORT

Fighting Advanced Threats

SECURITY. Risk & Compliance Services

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

After the Attack. The Transformation of EMC Security Operations

Unknown threats in Sweden. Study publication August 27, 2014

Protecting against cyber threats and security breaches

Overview. Figure 1 - Penetration testing screenshot examples showing (i) PACS image and (ii) breached Electronic Health Record system

Advanced Persistent Threats

I ve been breached! Now what?

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Recent Developments in PCI DSS. PCI in the Headlines Risks to Higher Education PCI DSS Version 1.2

The Essentials Series. PCI Compliance. sponsored by. by Rebecca Herold

McAfee Database Security. Dan Sarel, VP Database Security Products

Data Center security trends

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

The Top Web Application Attacks: Are you vulnerable?

Advice from the Trenches: Preparing for the Challenges and Pressures of a Security Incident Investigation

Penetration Testing Services. Demonstrate Real-World Risk

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

What Do You Mean My Cloud Data Isn t Secure?

Cyber Security for SCADA/ICS Networks

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

INDUSTRY OVERVIEW: HEALTHCARE

Incident Response. Six Best Practices for Managing Cyber Breaches.

Into the cybersecurity breach

Application Security in the Software Development Lifecycle

Understanding the Advanced Threat Landscape an MSPs Guide. IT Security: Enabled

Course Descriptions November 2014

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Surviving and operating services despite highly skilled and well-funded organised crime groups. Romain Wartel, CERN CHEP 2015, Okinawa

Developing Secure Software in the Age of Advanced Persistent Threats

Speaker Info Tal Be ery

Cyber Security Management

The Mile High Denver Chapter of ARMA welcomes you to our virtual meeting!

PCI Compliance for Healthcare

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Malicious Network Traffic Analysis

TESTING OUR SECURITY DEFENCES

Protecting Your POS System from PoSeidon and Other Malware Attacks

Penetration Testing Walkthrough

Penetration Testing Using The Kill Chain Methodology

Give Vendors Access to the Data They Need NOT Access to Your Network

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

SecurityMetrics Introduction to PCI Compliance

Jumpstarting Your Security Awareness Program

DMZ Gateways: Secret Weapons for Data Security

What s Lurking in Your Network & The Business Impact of Data Breaches. Colby Clark Director of Incident Management FishNet Security

Why The Security You Bought Yesterday, Won t Save You Today

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

Continuous Network Monitoring

We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site

Are You A Sitting Duck?


TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

Elevation of Mobile Security Risks in the Enterprise Threat Landscape

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

PCI DSS Overview and Solutions. Anwar McEntee

Advanced Threat Protection with Dell SecureWorks Security Services

DSL and Cable Modems: The Dangers of Having a Static IP Address

Top 10 Database. Misconfigurations.

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Data Security for the Hospitality

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Penetration Testing //Vulnerability Assessment //Remedy

Enterprise Cybersecurity: Building an Effective Defense

Transcription:

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data Dave Shackleford February, 2012

Agenda Attacks We ve Seen Advanced Threats what s that mean? A Simple Example What can we do? A cycle: Prevent Detect React

What are we seeing? (2009- The attacks are getting worse More stealthy, more damaging, for longer term compromises April 2009: US Electrical Grid compromised by Chinese & Russian hackers US Joint Strike Fighter Program compromised through contractor networks data was encrypted June 2010 2010) Stuxnet discovered, affecting Siemens SCADA control systems

What are we seeing in 2011-2012? RSA Breach in March 2011 Compromised token seed files via initial vector of social engineering (email) + 0-day Flash exploit Lockheed Martin compromised 2 months later with fake tokens Possibly other victims too, including Northrop Grumman Citigroup hacked in June 2011 210,000 customer records exposed And there s plenty of hacktivism targeting that s happening with Lulzsec and Anonymous

What s an APT? The APT is A more methodical, professional attack conducted by well-organized and possibly well-funded attackers The APT is NOT Just malware. Or any one attack. We ve settled on this term for anything even remotely sophisticated or targeted Is this a cop out? Are all of these breaches that sophisticated at all?

The APT: An Attack Cycle The APT is really an attack cycle: Reconnaissance Intrusion Backdoors and persistence Advancement Privilege escalation Data theft Additional attacks Maintenance Maintenance Advancement Recon Backdoors & malware Initial intrusion

Advanced Attacks Methods? The methods, techniques, and technology we see now, more than ever: Social engineering, especially phishing Use of 0-day exploits HTTP and HTTPS C&C channels Memory-resident payloads Use of common document formats for delivery, such as PDF, DOC, XLS, etc. Focus on client-side software exploits Data stealing code components

A Targeted Attack Example Competitor wants to gain access to R&D documents They decide to target the firm s engineers Step 1: Recon Step 2: Targeted Attack Step 3: Gaining Access Step 4: Command and Control Step 5: Data Access/Exfiltration

Step 1: Recon Twitter Starbucks Starbucks Sniffing Captured: Email address (engineer@gmail.com) Friend s email (engineer2@gmail.com) Interests (www.techstuff.com)

Step 2: Targeted Attack Hey look! An email from Engineer2. With a catalog attached! Spoofed, of course Most certainly clicking here

Step 3: Gaining Access The PDF gets clicked. Code gets dropped. The backdoor is opened.

Step 4: Command & Control The attacker connects back to the listening port A more likely scenario would be the other way around an outbound shell ( Shoveling Shell ) or a more robust bot/rootkit

Step 5: Adios to the Data At this point, the attacker could do any number of things to get more sensitive data FTP/SFTP SSH/SCP Custom encrypted channels (Base64/UDP)

Today s Security Programs $$$ People Security Information Tools Decrease Risk Increase Security Maintain Compliance

How most security shops spend their time

Changing our Risk Profile Today s attacks require a different focus: 1. Prevention techniques should protect you from 80% or more of the issues 2. Detection techniques should be focused on continuous monitoring 3. Reaction capabilities are inevitable, and should be focused on speed and thoroughness With 90% Detection and Reaction - we are just doing knee jerk security This is bad.

Prevention: Education Educating users about the dangers of the Internet (!) is important Browsing safely Not giving out personal or sensitive information over the phone Separating work and personal life on social media networks Being wary of links and emails with attachments However, many security awareness programs don t seem to work well - why?

Prevention: Communication Risk needs to be articulated in audience-specific formats What are the best ways to communicate and work with groups internally & externally? Internally: Proactive communications: Share news stories and new threat information with executive management, IT management, and employees (via newsletter or Intranet) Externally: Develop and nurture contacts and relationships with law enforcement, ISP, and key partners and customers Set a threshold or trigger for when to communicate potential issues

Prevention: Testing Yourself Find holes before attackers do! Prove that security issues exist to skeptical management Raise overall security awareness Verify secure system configurations Test new technology Discover gaps in compliance posture and satisfy legal, industry and/or governmental requirements such as HIPAA, SOX or PCI DSS.

Prioritized and risk-focused remediation guidance Define what is important to you in terms of risk Confidentiality for PII and other data? Availability concerns with systems and apps? Integrity with MitM and other attacks? Build on this for the report Ensure both attacks and successful exploits are framed in the context of priorities to your business Any VA/PT should be focused on your actual risks not just a scan or exploit to prove you re vulnerable

Pen Testing Metrics What kinds of metrics make sense for penetration testing and vulnerability assessments? For more continual vulnerability assessments: Number of vulnerabilities found Criticality and types of vulnerabilities Percentage of systems/apps scanned Number of unowned or questionable assets detected For penetration tests, the key is a baseline: How many critical vulnerabilities were found vs. the last test? User accounts / passwords compromised Data records accessed (or similar)

The Rub: Wrapping Up The APT is not malware, or one specific type of attack Any targeted attacks with forethought, custom exploits or malware, and social engineering will likely fall into the APT realm Embedded document code is a very common attack vector We have a huge gap in our risk profile right now: PROACTIVE ASSESSMENT Better knowledge of attack vectors = better security overall.

Final Discussion & Questions Thanks for attending!