Fighting Advanced Persistent Threats (APT) with Open Source Tools



Similar documents
Fighting Advanced Persistent Threats (APT) with Open Source Tools

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

The Hillstone and Trend Micro Joint Solution

Deep Security Vulnerability Protection Summary

5 Steps to Advanced Threat Protection

Covert Operations: Kill Chain Actions using Security Analytics

Networking for Caribbean Development

Detecting peer-to-peer botnets

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

FISMA / NIST REVISION 3 COMPLIANCE

RSA Security Anatomy of an Attack Lessons learned

How To Protect A Network From Attack From A Hacker (Hbss)

HoneyBOT User Guide A Windows based honeypot solution

Defending Against Cyber Attacks with SessionLevel Network Security

Windows Server 2003 End of Support. What does it mean? What are my options?

Cloud Services Prevent Zero-day and Targeted Attacks

GFI White Paper PCI-DSS compliance and GFI Software products

Computer Networks & Computer Security

Advanced & Persistent Threat Analysis - I

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Lessons from the DHS Cyber Test Bed Project

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Host-based Intrusion Prevention System (HIPS)

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Windows Remote Access

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

Who am I? BlackHat RSA

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

KEY TRENDS AND DRIVERS OF SECURITY

Unified Security, ATP and more

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Comprehensive Advanced Threat Defense

Getting Ahead of Malware

Best Practices For Department Server and Enterprise System Checklist

74% 96 Action Items. Compliance

Modular Network Security. Tyler Carter, McAfee Network Security

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Cisco Advanced Malware Protection for Endpoints

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Common Cyber Threats. Common cyber threats include:

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Fighting Advanced Threats

Locking down a Hitachi ID Suite server

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Detecting the One Percent: Advanced Targeted Malware Detection

Cisco Advanced Malware Protection Sandboxing Capabilities

Intrusion Detection in AlienVault

The Value of Physical Memory for Incident Response

UNCLASSIFIED. General Enquiries. Incidents Incidents

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Analyzing HTTP/HTTPS Traffic Logs

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Concierge SIEM Reporting Overview

Protecting Your Organisation from Targeted Cyber Intrusion

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Metric Matters. Dain Perkins, CISSP

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

End-user Security Analytics Strengthens Protection with ArcSight

Student Tech Security Training. ITS Security Office

Hosts HARDENING WINDOWS NETWORKS TRAINING

Unknown threats in Sweden. Study publication August 27, 2014

Threat Advisory: Accellion File Transfer Appliance Vulnerability

Agenda , Palo Alto Networks. Confidential and Proprietary.

PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

IBM Advanced Threat Protection Solution

IBM Security QRadar QFlow Collector appliances for security intelligence

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Intruders and viruses. 8: Network Security 8-1

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

INTRUSION DETECTION SYSTEMS and Network Security

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

McAfee Network Security Platform

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

24/7 Visibility into Advanced Malware on Networks and Endpoints

Understanding the Advanced Threat Landscape an MSPs Guide. IT Security: Enabled

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

GoToMyPC Corporate Advanced Firewall Support Features

Advanced Persistent Threats

Multifaceted Approach to Understanding the Botnet Phenomenon

Open Source Security Tool Overview

Transcription:

Fighting Advanced Persistent Threats (APT) with Open Source Tools

What is APT? The US Air Force invented the term in 2006 APT refers to advanced techniques used to gain access to an intelligence objective to gather the needed information to execute specific objectives. 2

APT characteristics Advanced: The intruder can exploit publicly known vulnerabilities but the attackers also are highly skilled and well funded and can research and exploit new vulnerabilities. Persistent: the attacker wants to accomplish a mission that can take place over months. Threat: Dedicated organized groups are behind the attack motivated by political, economical or military reasons. 3

GhostNet Ghostnet: China VS Tibetan institutions 1295 computers in 103 countries 4

Aurora Attack Coordinated attack against Google, Adobe, Juniper and 30 other companies. Exploits a zero-day vulnerability in Microsoft Internet Explorer (CVE-2010-0249) Installs Trojan.Hydraq. 5

Trojan.Hydraq Standard Trojan, not too sophisticated. No anti-debugging, No anti-analysis tricks. Uses spaghetti code to make code analysis more difficult. (Easily analized with IDA) Previous versions of Trojan.Hydraq observed 6 month previous to Aurora Attack. 6

Trojan.Hydraq Files: %System%\[RANDOM].dll: Main backdoor registered as a service. %System%\acelpvc.dll: Remote access capabilities (VNC). %System%\VedioDriver.dll: Helps monitoring keyboard and mouse activity. 7

Trojan.Hydraq Capabilities: Command execution Download additional files System operations (halt, clean log files ) Service, registry control. 8

Trojan.Hydraq C&C communication: Encrypted protocol on port 443 (not SSL) [ ff ff ff ff ff ff 00 00 fe ff ff ff ff ff ff ff ff ff 88 ff ] Source: McAfee Labs 9

Keys for Fighting APT 1

Intrusion Examples: An email with a PDF or Office document that exploits a vulnerability (Maybe 0-day). Countermeasures: Patch Management and Auditing (Openvas + OVAL). Policy Auditing (Openvas Ossec checks). Is Adobe Javascript support disabled? Internet Explorer Security Configuration 1

Setting Up Examples: Backdoor and Rootkit installation, system modification, privilege escalation. Countermeasures: Log monitoring: Ossec, Snare. Integrity Monitoring: Ossec Registry changes. File creation/modifications Service registration and process creation. 1

Network Activity Examples: C&C communication, cover channels, updated downloads Countermeasures: IDS/IPS technology (Snort, Suricata). Ej: Packed binary download. Deep Packet Inspection (OpenDPI). Ej: Non SSL traffic over port 443. 1

Network Activity 1

Advanced techniques Create an APT trap Information Gathering Collect suspicious content from Corporate Mail Server. Create false accounts. Automatic analysis framework Analize obtained information Check for exploits/javascript on.pdf,.xls,.doc files. Extract the involved binary Automatic sandbox/analysis environment. Compare obtained patterns with your SIEM data. 1

Advanced techniques Analize obtained data The goal is to identify malicious content an extract the involved binary. Tools: Didier Stevens pdf tools SpiderMonkey Libemu JsUnpack Malzilla Wepawet 1

Advanced techniques Automatic sandbox/analysis environment Once we have the binary we have to extract the information needed to build the Behaviour Matrix. SandBox execution: Qemu, VirtualBox, Bochs. Dynamic pattern extraction: Snare, Ossec, memoryze, Volatility Network behaviour pattern extraction: Snort for IDS pattern detection Scapy protocol parsers:» DNS, HTTP, IRC, SMTP. 1

Advanced techniques Static analysis o Antivirus Coverage : VirusTotal o Packers : PeFile + PEID o Imports/Exports : PeFile o Antidebug/Virtual Machine Detection : Pyew 1

Advanced techniques Build the behaviour matrix, example: [ Process_Creation, test.exe] [ DNS_Query, www.securedz.com] [ HTTP_Request, POST, /panel2/haya.php] [ Driver_Loaded, wowsub.sys] [ IDS_Pattern, Snort, 2008576] 1

Advanced techniques Once you have the behaviour matrix: 2

Jaime Blasco jaime.blasco@alienvault.com http://twitter.com/jaimeblascob