Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?



Similar documents
How Do Threat Actors Move Deeper Into Your Network?

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

43% Figure 1: Targeted Attack Campaign Diagram

DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:

Correlation and Phishing

A number of factors contribute to the diminished regard for security:

This document has been provided by the International Center for Not-for-Profit Law (ICNL).

The Hillstone and Trend Micro Joint Solution

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Achieve Deeper Network Security

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Fighting Advanced Threats

WildFire. Preparing for Modern Network Attacks

Achieve Deeper Network Security and Application Control

Advanced Threat Protection with Dell SecureWorks Security Services

FastPOS: Quick and Easy Credit Card Theft

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

The Custom Defense Against Targeted Attacks. A Trend Micro White Paper

Breach Found. Did It Hurt?

DIGITAL LIFE E-GUIDE How to Protect your Smartphone

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

What You Should Know About Cloud Storage

Unified Security, ATP and more

Reference Architecture: Enterprise Security For The Cloud

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

SPEAR PHISHING AN ENTRY POINT FOR APTS

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Defending Against Cyber Attacks with SessionLevel Network Security

Comprehensive real-time protection against Advanced Threats and data theft

Carbon Black and Palo Alto Networks

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Types of cyber-attacks. And how to prevent them

Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats

Protecting against cyber threats and security breaches

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

SSL Performance Problems

Comprehensive Advanced Threat Defense

OVERVIEW. Enterprise Security Solutions

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Under the Hood of the IBM Threat Protection System

Introducing IBM s Advanced Threat Protection Platform

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Breaking the Cyber Attack Lifecycle

Intelligent, Scalable Web Security

IBM QRadar Security Intelligence April 2013

Devising a Server Protection Strategy with Trend Micro

The Symantec Approach to Defeating Advanced Threats

IBM Managed Security Services (Cloud Computing) hosted and Web security - express managed Web security

Devising a Server Protection Strategy with Trend Micro

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Content Security: Protect Your Network with Five Must-Haves

IBM Security re-defines enterprise endpoint protection against advanced malware

Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.

A Case for Managed Security

Networking for Caribbean Development

The HeartBeat APT Campaign

Cisco Advanced Malware Protection for Endpoints

Securing the endpoint and your data

CyberArk Privileged Threat Analytics. Solution Brief

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

A Layperson s Guide To DoS Attacks

Protecting Your Organisation from Targeted Cyber Intrusion

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Cisco Advanced Malware Protection

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Agenda , Palo Alto Networks. Confidential and Proprietary.

HTTPS Inspection with Cisco CWS

Spear Phishing Attacks Why They are Successful and How to Stop Them

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Follow the Data: Analyzing Breaches by Industry

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

10 easy steps to secure your retail network

Data Loss Prevention with Platfora Big Data Analytics

Transcription:

A Cloud Security Primer : WHAT ARE YOU OVERLOOKING?

LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. Use of this information constitutes acceptance for use in an as is condition.

According to a Trend Micro-sponsored Enterprise Strategy Group (ESG) study, nearly 40% of large organizations invested in new security defenses to respond to APTs. 1 However, enterprise efforts in curbing these high-priority threats are still insufficient as security researchers continue to find successful APT campaigns inside corporate networks. The following are existing business realities that weaken enterprises security posture against APTs: Security is rarely a top priority in the corporate budget. Enterprises allocate minimal budget for security. 2 As a result, organizations tend to address APTs in increments with marginal changes to existing layers of defense to save on IT expenses. This practice can leave holes in their network security. Discrepancy between how enterprises perceive targeted attacks and how these campaigns unfold in real-world scenarios Most organizations still deploy traditional anti-malware detection and prevention to protect against these kinds of attacks. Traditional solutions typically lead to investing in inadequate security solutions. 3 APT defense as a bolt-on to pre-existing security architecture and practices APT requires a reexamination of the current security strategy. However, in the same survey cited above, 67% of infosec professionals disclosed that APT awareness trainings have not increased and 82% revealed that vendor agreements regarding information exchange have not changed as well. 1 http://www.trendmicro.es/media/wp/esg-apts-deep-discovery-whitepaper-en.pdf 2 http://reports.informationweek.com/abstract/21/9736/security/strategy-cybersecurity-on-the-offense.html 3 http://www.isaca.org/knowledge-center/research/researchdeliverables/pages/advanced-persistent-threats- Awareness-Study-Results.aspx

The Role of C&C Communications in an APT Campaign Threat Actor 1 C&C Server External Staging Server Intelligence Gathering 2 3 3 6 5 4 Point of Entry Lateral Movement Data of Interest Figure 1. The Six Stages of an APT Campaign An APT campaign/targeted attack can be segmented into six stages: Intelligence gathering: Threat actors prepare a customized attack design based on comprehensive research on the target organization. It uses public sources and other prior social engineering attacks such as LinkedIn, Facebook, or the company website. Point of entry: Threat actors launch a successful attempt to penetrate the target network by delivering malware via social engineering or watering hole technique. 4 Command-and-control (C&C) communications: After a backdoor opens the target network to infiltration, attackers use C&C channels to lead the compromised machines to the attack s subsequent phases. Lateral movement and persistence: Once inside the network, attackers compromise additional machines to gather credentials, escalate privilege levels, and maintain persistent control over the compromised network. Asset/Data discovery: Perpetrator employs several techniques to identify valuable servers and services that contain targeted information. Data exfiltration: Once the data is gathered, intruders send the stolen data to an internal staging server where it is chunked, compressed, and often encrypted for transmission to external locations. 4 http://blog.trendmicro.com/trendlabs-security-intelligence/watering-holes-and-zero-day-attacks/

The most high-profile targeted attacks in the past could have been discovered if security defenders kept their eyes on malicious network communications. Nart Villeneuve Source: Detecting APT Activity with Network Traffic APTs are a category of threat that refers to computer intrusions by threat actors that aggressively pursue and compromise specific targets. Threat actors use social engineering and malware to enter a network, after which they move laterally throughout the network to extract sensitive information. In an APT campaign, keeping the communication channel between the compromised machine and the threat actor s C&C server open is crucial for the success of targeted attacks. 5 These conduits allow threat actors to: Confirm system breach Obtain information about the targeted network Send commands to the malware within the compromised network Instruct the compromised PC to download second stage malware and the tools used for lateral movement C&C Traffic in Uncovered APT Campaigns 11% 2% 1%1%1%1% 4% 9% 30% 40% Given the pivotal role of C&C communications in a targeted attack, Trend Micro research suggests that proactively detecting malicious C&C traffic is an important element in exposing APTs. Our research further shows that high-profile APTs in the past could have been discovered if security groups monitored malicious network communications. 6 In this same study, we identified network traffic indicators that reveal the presence of known APT campaigns in a network: Consistent URL paths The initial malware dropped by the Gh0stNet campaign uses specific and consistent URL parameters. Detectable packet headers Network traffic of campaigns using Gh0st RAT have packet headers that always contain five bytes, such as Gh0st or LURKO, followed 8 bytes later by a zlib compression header. Identifiable network communications Port 443 Port 80 Port 220 Port 143 Port 8080 Port 1234 Port 53 Port 110 Port 25 Port 995 Figure 2. Regularly used ports by PoisonIvy samples found in Japan from 2008 to 2012 PoisonIvy, a RAT used in the Nitro attack, uses the same 256-byte outbound packet containing mostly non-ascii data, using varying ports. This is a challenge request. After the challenge response is received, it sends a consistent 4-byte value. Several versions of the Enfal malware exist; but the communication between its compromised host and a C&C server remains consistent. 7 The Taidoor campaign, likewise, constantly follows the same format for initial C&C server requests. 5 http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_apt-primer.pdf 6 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-detecting-aptactivity-with-network-traffic-analysis.pdf 7 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/ white-papers/wp_dissecting-lurid-apt.pdf

Unusual ports and protocols Gh0st RAT uses non-http protocols on port 80, which usually only contains HTTP traffic. Secure sockets layer (SSL) certificates Even if Sykipot uses HTTPS to evade network detection, this campaign used consistent elements within its SSL certificates. These consistent network traffic indicators provide an opportunity for enterprises to check if ongoing campaigns exist in the network. While changes to a certain campaign s network communications are not unheard of, the campaign s C&C network traffic patterns are relatively more difficult to modify than the servers, domains, or even the malware a threat actor uses. Figure 3. Initial communication between a PoisonIvy server and client Custom Defense against APTs Targeted attacks constantly take advantage of unknown malware. The ability to identify anomalous network traffic indicative of these kinds of attacks constitutes a crucial part of any sound APT defense. Given the highly targeted and persistent nature of APT campaigns, an APT defense framework must enable the network to identify and assess threats in real time leveraging the following components: Network content inspection technology: An in-depth network monitoring technology that identifies and analyzes dubious C&C traffic can help security groups spot possible targeted attacks. An effective solution should have a deep packet inspection capability that performs port-agnostic protocol detection, decoding, decompression, and file extraction across hundreds of protocols. Advanced threat detection technology: On top of traditional antivirus file scanning and aggressive heuristic analysis, enterprises should leverage reputation-based detection that checks and correlates suspicious attack components (file, email and URLs) to discover both known and unknown malware and exploits. Sandbox technology: A virtualized threat sandbox analysis system that uses network-specific configurations to detect and analyze APTs further strengthens protection against these threats. Threat intelligence: You need to build threat intelligence using both external resources and your network s threat history. While the network indicators discussed in the earlier section can identify documented APT campaigns, an effective APT defense that leverages threat intelligence can enable security groups to develop their own indicators for ongoing campaigns.

TREND MICRO Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years experience, we deliver top-ranked client, server and cloudbased security that fits our customers and partners needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emerge from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. TRENDLABSSM TrendLabs is a multinational research, development, and support center with an extensive regional presence committed to 24x7 threat surveillance, attack prevention, and timely and seamless solutions delivery. With more than 1,000 threat experts and support engineers deployed round-the-clock in labs located around the globe, TrendLabs enables Trend Micro to continuously monitor the threat landscape across the globe; deliver real-time data to detect, to preempt, and to eliminate threats; research on and analyze technologies to combat new threats; respond in real time to targeted threats; and help customers worldwide minimize damage, reduce costs, and ensure business continuity. Copyright 2013 Trend Micro Incorporated. All Rights Reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.