CHECK POINT NEXT GENERATION ZERO-DAY PROTECTION



Similar documents
ONE STEP AHEAD of hackers, cybersecurity, threats and the competition

Cloud Services Prevent Zero-day and Targeted Attacks

Cloud Services Prevent Zero-day and Targeted Attacks Tom De Belie Security Engineer. [Restricted] ONLY for designated groups and individuals

Check Point: Sandblast Zero-Day protection

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Uncover security risks on your enterprise network

Symantec Advanced Threat Protection: Network

How to create OpenDocument URL s with SAP BusinessObjects BI 4.0

Fighting Advanced Threats

Threat Intelligence. How to Implement Software-Defined Protection. Nir Naaman, CISSP Senior Security Architect

Visa Smart Debit/Credit Certificate Authority Public Keys

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

The Hillstone and Trend Micro Joint Solution

Secure Your Mobile Workplace

15 JAAR VOOROP IN ICT SECURITY

NetDefend Firewall UTM Services

Hope is not a strategy. Jérôme Bei

NetDefend Firewall UTM Services

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Advanced Persistent Threats

Evaluating Essential Advanced Security Options for Your Business. Robert Smithers CEO, Miercom

The ASCII Character Set

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Malware, Zero Day and Advanced Attack Protection Analysis Zscaler Internet Security and FireEye Web MPS

Cloud App Security. Tiberio Molino Sales Engineer

HTML Codes - Characters and symbols

Defending Behind The Device Mobile Application Risks

Anti-exploit tools: The next wave of enterprise security

Zscaler Cloud Web Gateway Test

Computer Security DD2395

Protecting the Infrastructure: Symantec Web Gateway

The Onslaught of Cyber Security Threats and What that Means to You

Endpoint Business Products Testing Report. Performed by AV-Test GmbH

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Cloud Based Secure Web Gateway

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Evolving Threat Landscape

WildFire. Preparing for Modern Network Attacks

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Active Threat Control

Sandy. The Malicious Exploit Analysis. Static Analysis and Dynamic exploit analysis. Garage4Hackers

Survey: Endpoint Security Concerns 2014 The issues keeping IT admins awake into the New Year

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

End to End Security do Endpoint ao Datacenter

Content-ID. Content-ID URLS THREATS DATA

Veranderende bedreigingen Security in het virtuele datacenter

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+

Attack Intelligence Research Center Monthly Threat Report MalWeb Evolution and Predictions

Endpoint Security Management

Breaking the Cyber Attack Lifecycle

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Security Intelligenece: tracking obfuscated and unrecognized attacks Check Point Software Technologies Ltd.

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

DDoS Attacks & Defenses

Big Data Analytics in Network Security: Computational Automation of Security Professionals

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Outpost Pro PC security products Security Suite, Antivirus, Firewall

RIA SECURITY TECHNOLOGY

Web site security issues White paper November Maintaining trust: protecting your Web site users from malware.

Unknown threats in Sweden. Study publication August 27, 2014

Boston University Security Awareness. What you need to know to keep information safe and secure

Securing the endpoint and your data

Barracuda Intrusion Detection and Prevention System

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

ESET SMART SECURITY 6

Combating the Next Generation of Advanced Malware

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY

User Documentation Web Traffic Security. University of Stavanger

LASTLINE WHITEPAPER. In-Depth Analysis of Malware

FROM PRODUCT TO PLATFORM

2015 Miercom Next Generation Firewall Solution Testing: Performance, Compliance and Advantages

White Paper. No Signature Required: The Power of Emulation in Preventing Malware

End-user Security Analytics Strengthens Protection with ArcSight

WHITE PAPER. Understanding How File Size Affects Malware Detection

Data Center Security in a World Without Perimeters

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Reduce Your Virus Exposure with Active Virus Protection

SOLUTION CARD WHITE PAPER

IBM Endpoint Manager Product Introduction and Overview

Symantec Security.cloud - Skeptic Whitepaper

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Anti-Bot and Anti-Virus

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Total Defense Endpoint Premium r12

First Look Trend Micro Deep Discovery Inspector

Benefits of Machine Learning. with Behavioral Analysis in Detection of Advanced Persistent Threats WHITE PAPER

A New Approach to Assessing Advanced Threat Solutions

The Advantages of Using AVG Identity Protection

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Five Tips to Reduce Risk From Modern Web Threats

Cisco Advanced Malware Protection for Endpoints

isheriff CLOUD SECURITY

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

THE THREE Es OF MODERN SECURITY FOR PHISHING

Closing the Antivirus Protection Gap

Tracking Anti-Malware Protection 2015

Deep Discovery. Technical details

Transcription:

CHECK POINT NEXT GENERATION ZERO-DAY PROTECTION Thinking Out of the Sandbox Luc Straeten Global Account Manager 2015 Check Point Software Technologies Ltd.

2015 Check Point Software Technologies Ltd. Check Point Zero- Day Attacks

An Ever-Changing Threat Landscape Every year threats are becoming MORE SOPHISTICATED and MORE FREQUENT 100,000+ malware variants daily 2014 1,300 known viruses 1997 50,000 known viruses VIRUSES AND WORMS 2004 ADWARE AND SPYWARE 2007 DDOS APTS 2010 RANSOMWARE HACTIVISM STATE SPONSORED INDUSTRIAL ESPIONAGE NEXT GEN APTS (MASS APT TOOLS) UTILIZING WEB INFRASTRUCTURES (DWS)

Networks need protection against ALL types of threats

New Threat Prevention Technologies PRE-INFECTION POST INFECTION MULTIPLE LAYERS OF PREVENTION AGAINST KNOWN, UNKNOWN AND ZERO-DAY THREATS

Pre-Infection Known Malware

Building Blocks of Advanced Threat Prevention IPS (pre) Stops exploits of known vulnerabilities Antivirus (pre) Block download of known malware infested files

Post Infection Known Malware

Building Blocks of Advanced Threat Prevention IPS (pre) Stops exploits of known vulnerabilities Antivirus (pre) Block download of known malware infested files Anti-Bot (post) Detect and prevent bot damage

Pre-Infection Unknown Malware

Antivirus is DEAD Modern antivirus software only stops ~45% of attacks on computers Source: http://www.theregister.co.uk/2014/05/06/symantec_antivirus_is_dead_and_not_a_moneymaker/

Cat and Mouse: Known Unknown Attackers evade signature based detection by obfuscating the attacks and creating attack variants

Your Team Can t Keep Up 106 New forms of malware hit a company per-hour Source: Check Point Security Report 2015

Building Blocks of Advanced Threat Prevention IPS (pre) Stops exploits of known vulnerabilities Antivirus (pre) Block download of known malware infested files Anti-Bot (post) Detect and prevent bot damage Threat Emulation and Extraction (pre) Stop zero-day and unknown malware in files

WOULD YOU OPEN THIS ATTACHMENT?

First Generation Zero-Day Protection OS-LEVEL THREAT EMULATION 2015 Check Point Software Technologies Ltd.

What is Threat Emulation or Sandboxing? A safe environment to evaluate suspicious files

Check Point Threat Emulation STOPS Unknown Attacks INSPECT FILE EMULATE TURN TO KNOWN PREVENT

1 Inspect files in Mail & Web No infrastructure changes No additional devices 2 Send files to virtual sandbox INSPECT EXE files, PDF, Java, Flash and Office documents

Windows XP, 7, 8, customer images EMULATE RUN files & identify abnormal behavior 3 - file system - registry - connections - processes

PREVENT Security Gateway Inline BLOCKING of malicious files on the gateway 4 Prevention-based approach (vs. detection only)

5 Automatic Signature Creation for ThreatCloud Turn the Unknown into KNOWN Collaborative protection through ThreatCloud

Test Results for Catching Unknown Malware with OS-Level Threat Emulation 99% Check Point: Industry s Best Catch Rate!

N E X T G E N E R AT I O N Z E R O - DAY P R OT E C T I O N NG Threat Emulation + Threat Extraction 2015 Check Point Software Technologies Ltd.

Known Unknown Back Again! Delays malware to operate after XX hours - Accelerating the clock won t work Malware to execute on shutdown/restart H A C K E R S Develop techniques to evade sandboxing / threat emulation products Malware to detect and not work on virtual environments Malware to look for human behavior to operate Evasion is code that comes together with the malware, but executes first

Attack Infection Flow V U L N E R A B I L I T Y Trigger an attack through unpatched software or zero-day vulnerability E X P L O I T S H E L L C O D E Bypass the CPU and OS security controls using exploitation methods Activate an embedded payload to retrieve the malware M A L W A R E Run malicious code

Attack Infection Flow V U L N E R A B I L I T Y Thousands E X P L O I T S H E L L C O D E EVASION CODE M A L W A R E HANDFUL DETECT THE ATTACK BEFORE IT BEGINS Identify the Exploit itself instead of looking for the evasive malware Millions

Why does an attack need to start with exploitation? What the OS does DEP (Data Execution Prevention - since XP SP2) The processor will only run code marked as executable What the attackers do Re-use pieces of legit executable code that are already loaded ROP Most popular exploitation technique Examine code known to be loaded when the exploit is activated Search for useful Gadgets: short pieces of code immediately followed by a flow control opcode Bypass DEP using Gadgets as code primitives

Building a ROP Gadgets Dictionary - To gain privileges to run the malware 77E3346A 77E3348A 77E334AA 77E334CA 77E334EA 77E3350A 77E3352A 77E3354A 77E3356A 77E3358A 77E335AA 77E335CA 77E335EA 77E3360A 77E3362A 77E3364A 77E3366A 77E3368A 77E336AA 77E336CA 77E336EA 77E3370A 77E3372A 77E3374A 77E3376A 77E3378A 77E337AA 77E337CA 77E337EA 77E3380A 77E3382A 77E3384A 77E3386A 77E3388A 77E338AA FF FF FF 50 E8 6F DE FF FF 85 F6 0F 85 0F B8 FF C4 89 07 80 7D 18 00 0F 85 7B 7B FF FF 8B 85 64 FF FF 00 00 00 00 30 FF FF FF 00 00 00 00 FE FF FF 55 8B EC 6A 00 FF 75 14 FF 75 10 FF 75 0C FF C0 40 5D C2 14 00 E8 D4 FF FF FF E9 20 DD FF FF 90 90 90 90 90 FF 25 10 1A DE 77 90 90 90 90 90 8B EC 5D EB 05 90 90 90 90 90 FF 25 5C 1D DE 77 8B FF 55 8B EC 5D EB ED 90 90 90 90 90 8B FF 55 90 90 90 90 90 8B FF 55 8B EC 5D EB 05 90 90 90 8B EC 5D EB 05 90 90 90 90 90 FF 25 0C 1A DE 77 EA 77 89 45 FC 85 C0 0F 85 7E C3 FF FF 39 07 0F 84 12 7D 02 00 8B 0F 89 08 8B 03 8D 8E 24 6B EA 90 90 8B FF 55 8B EC 64 A1 18 00 00 00 8B 40 30 11 8B 4D 08 83 20 00 83 60 04 00 83 60 0C 00 89 5D EB 05 90 90 90 90 90 FF 25 80 19 DE 77 90 90 14 1B DE 77 90 90 90 90 90 FF 25 1C 1B DE 77 90 57 FF 15 78 15 DE 77 33 F6 39 75 08 0F 84 3C 60 84 D1 EE FE FF E8 D7 B6 00 00 8B F0 57 FF 15 7C 8B FF 55 8B EC 56 8B 75 08 57 33 C0 0F B7 0E 66 F9 2F 0F 84 AE 2F 00 00 66 83 3E 00 74 4D 8D 7E 83 F8 2F 74 04 47 47 EB E8 8B C7 2B C6 D1 F8 83 F7 D8 1B C0 40 85 C0 74 76 8B 55 0C 85 D2 74 0B 00 90 90 90 90 90 8B FF 55 8B EC 56 8B 75 08 56 2B F4 FD FF 83 C6 06 8B C6 5E 5D C2 04 00 90 90 3B C6 0F 85 4A 3E FE FF 39 75 10 0F 85 B9 41 FE 39 07 74 97 8D 77 02 E9 20 FF FF FF 90 90 5C 00 90 90 90 6A 20 68 A0 38 E3 77 E8 FB B9 FF FF 8B 89 45 D2 E8 31 BD FF FF 8B 40 2C 64 8B 0D 18 00 00 16 DE 77 89 45 D4 33 FF 3B C7 0F 84 0B C7 01 98 38 E3 77 57 8B 35 B4 12 DE 77 FF D6 3B C7 0F E8 66 83 7C 46 FE 5C 74 04 C6 45 E7 01 57 8B 7D E9 85 C0 0F 84 5C 05 01 00 3B C3 0F 83 54 05 01 0F 83 54 05 01 00 6A 5C 58 66 89 02 33 C0 66 89 00 00 00 8B 45 E0 E8 64 B9 FF FF C2 0C 00 06 00 FF FF 00 00 00 00 FE FF FF FF 00 00 00 00 C1 38 FF 83 BD 64 FF FF FF 00 7C 13 85 FF 74 0F 8B 45 FF FF FF E8 42 DB FF FF C2 14 00 90 90 90 E4 FF FF FF 42 D4 E5 77 53 D4 E5 77 90 90 90 90 90 8B 75 08 E8 0B FF FF FF 85 C0 0F 8C 7F 9F 02 00 33 90 90 90 90 90 8B FF 55 8B EC 5D E9 D4 F4 FF FF 8B FF 55 8B EC 5D EB ED 90 90 90 90 90 8B FF 55 90 90 90 90 90 FF 25 A4 1C DE 77 90 90 90 90 90 8B EC 5D EB 05 90 90 90 90 90 FF 25 48 1D DE 77 90 90 FF 25 30 1D DE 77 90 90 90 90 90 8B FF 55 90 90 00 00 57 68 00 00 00 02 6A 00 FF 96 28 6B 84 76 C3 FF FF 57 E8 27 00 00 00 89 03 85 C0 0F 77 8B 11 89 50 0C 89 01 E9 4E C3 FF FF 90 90 90 6A 10 6A 00 FF 70 18 FF 15 00 16 DE 77 85 C0 74 48 08 5D C2 04 00 90 90 90 90 90 8B FF 55 8B EC 90 90 90 FF 25 3C 1B DE 77 90 90 90 90 90 FF 25 90 90 90 90 8B FF 55 8B EC 56 57 BF C0 62 EA 77 01 00 FF 75 08 FF 15 54 13 DE 77 50 39 75 0C 0F 15 DE 77 5F 8B C6 5E 5D C2 08 00 90 90 90 90 90 85 C9 74 67 66 83 F9 5C 0F 84 B8 2F 00 00 66 83 02 0F B7 07 66 85 C0 74 10 66 83 F8 5C 74 0A 66 7D 14 00 50 56 0F 85 FA 14 FF FF E8 DF 0A 00 00 8B 4D 10 85 C9 74 04 89 32 89 39 5F 5E 5D C2 10 FF 15 DC 13 DE 77 48 0F 84 57 13 FE FF 48 0F 85 90 90 90 8B FF 55 8B EC 8B 45 0C 53 56 33 F6 57 FF 8B 45 14 89 30 33 C0 5F 5E 5B 5D C2 10 00 66 2F 00 00 00 90 90 54 00 4D 00 50 00 00 00 90 90 5D 0C 03 DB 33 C0 66 89 45 D0 B8 05 01 00 00 66 00 00 0F B7 55 D2 52 50 8B 41 30 FF 70 18 FF 15 00 89 7D E0 89 7D FC C6 45 E7 00 8D 45 D0 50 68 8C F8 C6 01 00 8B 75 D4 89 75 DC 0F B7 45 D0 D1 10 57 53 56 FF 15 B8 12 DE 77 89 45 D8 8B C8 D1 00 8D 14 4F 66 83 7A FE 5C 74 19 8D 48 02 3B CB 42 02 D1 E9 89 4D E0 C7 45 FC FE FF FF FF E8 34 08 00 A0 37 E3 77 FE FF FF FF 00 00 00 00 C0 FF E3 77 90 90 90 90 90 64 A1 18 00 00 00 FF 75 D4 PFo à.à.+ â+d..à t.ïe -ë.ç}...à{{ ïàd FB -..ÉÉÉS...0... B+swS+swÉÉÉÉÉï Uï8j. u. u. u. u.f. à+.î ƒ..3 +@]-..F+ T ÉÉÉÉÉï Uï8]T+( ÉÉÉÉÉ %.. wéééééï Uï8]dfÉÉÉÉÉï U ï8]d.ééééé %\. wééééé %ñ. wééééé ï Uï8]dfÉÉÉÉÉï Uï8]d.ÉÉÉÉÉ %H. w ÉÉÉÉÉï Uï8]d.ÉÉÉÉÉ %0. wéééééï U ï8]d.ééééé %.. wéé..wh...j. û(k OwëEnà+.à~+ 9..äv+ WF'...ë.à+. ä.}..ï.ë.ï.ìä$kowï.ëp.ë.tn+ ÉÉÉ ÉÉï Uï8dí...ï@0j.j. p.... wà+t.ïm.â.â`..â`..ëh.]-..éééééï Uï8 ]d.ééééé %Ç. wééééé %<. wééééé %.. wééééé %.. wéééééï Uï8VW++bOw W.x. w3 9u..ä<`.. u..t. wp9u.. ä-e F+..ï=W.. w_ï ^]-..ÉÉÉÉÉ Gadgets Dictionary ï Uï8Vïu.W3+.+.fà+tgfâ \.ä+/..fâ /.ä«/..fâ>.tmì~..+.fà+t.fâ \t.f â /t.ggdfï + - â}..pv.à. F... +.+@à+tvïu.à-t.ïm.à+t.ë2ë9_^]-. 1.ÉÉÉÉÉï Uï8Vïu.V._. wh.äw. H.à 2 +(² â.ï ^]-..ÉÉÉÉÉï Uï8ïE.SV3 W ;.àj> 39u..à A ïe.ë03+_^[]-..f 9.tùìw.T ÉÉ\./...ÉÉT.M.P...ÉÉ ÉÉÉj há8pwfv 4 ï].. 3+fëE-+...f ëe-f1+ ï@,dï...+u-rpïa0 p.. 5.. wëe+3 ;.ä...ë}aë}n Et.ìE-Ph ÿ8pwwï5. w 6 +;.î..ïu+ëu_.+e-- Ffâ F \t. Et.Wï}.WSV.+. wëe+ï+- Tà+.ä\...;+.âT...ì.Ofâz \t.ìh.;- 7.âT...j\Xfë.3+fëB.-TëMa En F4 8 9 10...ïEaFd -...á7pw...+......-8pwééééédí... u+

CPU-Level Threat Emulation Detects the Exploitation Applications OS-Level Threat Emulation Operating System (Windows, MAC OS, etc.) CPU-Level Threat Emulation CPU Use the latest CPU-interfacing technologies Monitor CPU based instructions for exploits attempting to bypass OS Security Controls

CPU-Level Threat Emulation Highest accuracy Detection is outright, not based on heuristics or statistics Evasion-proof Detection occurs before any evasion code can be applied Efficient and fast CPU-level technology identifies the attack at its infancy OS Independent Detection occurs at the CPU level

Check Point Next Gen Threat Emulation OS-Level + CPU-Level FASTEST HIGHEST CATCH RATE ADVANCED DETECTION EVASION RESISTANT

THREAT EXTRACTION 2015 Check Point Software Technologies Ltd.

How can we further reduce the attack surface? ANTIVIRUS Catches known or old malware NG THREAT EMULATION Detects unknown or zero-day malware 100% P O S S I B L E S E C U R I T Y G A P

Addressing the possible Security Gap: Threat Extraction THREAT EXTRACTION Proactively REMOVE potential malicious objects from ALL incoming attachments Eliminates any remaining threats 100% of all incoming attachments go through Threat Extraction - whether malicious or not

How Does Threat Extraction Work? Security Gateway with Threat Extraction Software Blade RECONSTRUCTS DOCUMENTS Removes embedded objects, macros and Java Script Code, sensitive hyperlinks USER EXAMPLES HR with CV s Purchasing receiving quotes Data from untrusted websites

Threat Extraction Statistics Tested Thousands of Recently-Discovered Malicious Files Remove active content from the file (such as macros and embedded objects) Cleaned 93% of the files Average cleaning time: 0.3 seconds / document Convert file to PDF Cleaned 100% Average conversion time: 5 seconds

Configurable Content Removal For Original Format Documents Administrator Establishes Removal Policy: Macros or JavaScript Embedded Objects External Links Document Properties

Always Maintain Access to Originals

CPU level detection and Threat Extraction are not supported by any other sandbox solution

Check Point Offering Threat Extraction Zero malware documents delivered in zero seconds Threat Ex t r a c t i o n Visibility on attack attempts and inspection of original documents NG Threat E m u l a t i o n

DEPLOYMENT CHOICES 2015 Check Point Software Technologies Ltd.

CURRENT NEW NGTP IPS Anti Bot Anti Virus URL Filtering Application Control Anti Spam NGTX ThreatCloud Emulation Service Threat Extraction IPS Anti Bot Anti Virus URL Filtering Application Control Anti Spam TX NGTP Out of the box COMPLETE protection against advanced ZERO DAY threats

SUMMARY 2015 Check Point Software Technologies Ltd.

Next Gen Zero-Day Protection NG Threat Emulation Threat + Extraction TRY IT NOW! It s easy and free! BEST EVASION RESISTANT ZERO MALWARE FASTEST ADVANCED DETECTION ZERO SECOND DELIVERY STRONGEST HIGHEST CATCH RATE SAFE DOCUMENTS

Thank you 2015 Check Point Software Technologies Ltd.