Zero day attacks anatomy & countermeasures. By Cade Zvavanjanja Cybersecurity Strategist



Similar documents
Practical Threat Intelligence. with Bromium LAVA

Fighting Advanced Threats

The Hillstone and Trend Micro Joint Solution

Anti-exploit tools: The next wave of enterprise security

Managing Web Security in an Increasingly Challenging Threat Landscape

Securing Cloud-Based

SANS Top 20 Critical Controls for Effective Cyber Defense

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

How To Prevent Hacker Attacks With Network Behavior Analysis

A Review on Zero Day Attack Safety Using Different Scenarios

Top five strategies for combating modern threats Is anti-virus dead?

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Cloud Services Prevent Zero-day and Targeted Attacks

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

SPEAR PHISHING UNDERSTANDING THE THREAT

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

Defending Against Cyber Attacks with SessionLevel Network Security

Uncover security risks on your enterprise network

Symantec Cyber Security Services: DeepSight Intelligence

Gregg Gerber. Strategic Engagement, Emerging Markets

Enterprise Cybersecurity: Building an Effective Defense

NATIONAL CYBER SECURITY AWARENESS MONTH

Defending Against. Phishing Attacks

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

Next Generation IPS and Reputation Services

ONLINE RECONNAISSANCE

Defending Against Data Beaches: Internal Controls for Cybersecurity

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Breaking the Cyber Attack Lifecycle

WRITTEN TESTIMONY OF

WEB ATTACKS AND COUNTERMEASURES

Overcoming Five Critical Cybersecurity Gaps

Why should I care about PDF application security?

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Anti Spam Best Practices

Integrating MSS, SEP and NGFW to catch targeted APTs

Enterprise Apps: Bypassing the Gatekeeper

SPEAR PHISHING AN ENTRY POINT FOR APTS

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

Data Center security trends

2012 Data Breach Investigations Report

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Building a Business Case:

Cyber Security Modeling and Assessment of SCADA System Architectures

Types of cyber-attacks. And how to prevent them

Carbon Black and Palo Alto Networks

SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:

Managed Security Services

Persistence Mechanisms as Indicators of Compromise

Bridging the gap between COTS tool alerting and raw data analysis

Reinventing Network Security Vectra s cyber-security thinking machine delivers a new experience in network security

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Zak Khan Director, Advanced Cyber Defence

Agenda , Palo Alto Networks. Confidential and Proprietary.

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Modular Network Security. Tyler Carter, McAfee Network Security

Protect Your Brand Investment with. Brand Monitoring. from DomainTools DOMAINTOOLS SOLUTION BRIEF

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Advanced Cyber Threats in State and Local Government

Security Intelligence

Endpoint Security: Moving Beyond AV

Social Engineering Toolkit

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Developing Secure Software in the Age of Advanced Persistent Threats

Internet threats: steps to security for your small business

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Cyber Security Management

ENABLING FAST RESPONSES THREAT MONITORING

On-Premises DDoS Mitigation for the Enterprise

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Security Controls Implementation Plan

Developing a Successful Security Awareness Training Program. Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc.

Transcription:

Zero day attacks anatomy & countermeasures By Cade Zvavanjanja Cybersecurity Strategist

Question? How do you secure against something Your security system can t capture, your experts don t know, your vendors don t know and the tech community doesn t know? ~ Which is only known by the attacker(s)!

Outline: Key terms Anatomy of Zero days Attack methodology Zero day attack(s) Countermeasures Way forward Economics of cybersecurity Q & A References

Key term(s): Zero-day exploits are cyber-attacks against software/hardware vulnerabilities that are unknown and have no patch or fix.

Introduction: Traditional security tools rely on malware binary signatures or the reputation of outside URLs and servers. By definition, these defenses identify only known, confirmed threats. At the same time, operating system-level protections such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) are becoming less effective

Intro Cont. An attacker can easily hijack a legitimate website to bypass a blacklist. Code morphing and obfuscation techniques generate new malware variants faster than traditional security firms can generate new signatures. And spam filters will not stop lowvolume, targeted spear-phishing attacks. ASLR bypassing methods to neutere once-effective safeguard.

Intro Cont. Zero day attacks are rising in prominence They tend to be behind the most devastating attacks these days Generally used by very high end criminals and nation states You usually don t know about the attack unless there are other indicators

Key term(s)

Lifespan of Zero-day: typical zero-day attack lasts an average of eight months and can last close to three years in some cases. That gives attacks ample time to steal organizations most valuable assets and leave before anyone knows what happened. Not surprisingly, zero-day exploits are heavily used in targeted attacks. These secret weapons give attackers a crucial advantage over their targets.

Zero Day Anatomy

Introduction

Threat landscape:

Countermeasures:

Way Forward

Economics of Cybersecurity

What is the ratio between events received and action taken? What is the efficacy level in the events & incidents you identify (i.e. the real cyber attack event to false positive ratio)? How many cycles do you iterate through to get from an event(s) to an action; is it timely and cost efficient? (Can you rank the processes/tools you leverage today in terms of man-hours and skills required to get to to action?)

Do you align, prioritize and qualify events against against business goals and impact (How many cycles does this take)? Make the assessment using the framework & success criteria below to evaluate the key time and cost multipliers in your event/incident security process, so you can validate the economic value that comes from the processes and tools you leverage today, to see which are effective and which are not?

Q& A: Thank You Cade Zvavanjanja Director - Zimbabwe Cybersecurity Center cadezvavanjanja@gmail.com +263 773796365

References Zero Day Malware Threat Prevention Ensuring Document Safety with Outside In Clean Content Oracle brief july 2015 The Best Defenses Against Zero-day Exploits for Various-sized Organizations SANS I September 21st 2014: David Hammarberg http://www.trapx.com/wp-content/uploads/2015/02/anatomy-of- Attack Zombie-Zero.pdf http://www.industryweek.com/rockwell-connected-industrialenterprise/cyber-threats-hiding-targeting-valuable-assets Internet Security Threat ReportInternet Report Symatic, APRIL 2016 https://www2.fireeye.com/rs/848-did-242/images/wp-zero-day-danger.pdf k-zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks A Review on Zero Day Attack Safety Using Different Scenarios 2015 Harshpal R Gosavi and Anant M Bagade Detection and Prevention of Unknown Vulnerabilities on Enterprise IP Networks IJRITCC February 2015, Vincy Rose Chacko Regulating the zero-day vulnerability trade: a preliminary analysis 2014: mailyn fidler