Crack the Code: Defeat the Advanced Adversary



Similar documents
Agenda , Palo Alto Networks. Confidential and Proprietary.

Breaking the Cyber Attack Lifecycle

How Attackers are Targeting Your Mobile Devices. Wade Williamson

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Unknown threats in Sweden. Study publication August 27, 2014

THREAT INTELLIGENCE CLOUD

SANS Top 20 Critical Controls for Effective Cyber Defense

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Doris Yang Vectra Networks, Inc. June 16, 2015 The World Ahead

A Modern Framework for Network Security in Government

Palo Alto Networks. October 6

Fighting Advanced Threats

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Defending Against Data Beaches: Internal Controls for Cybersecurity

Practical Steps To Securing Process Control Networks

Analyzing HTTP/HTTPS Traffic Logs

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

RSA Security Analytics

Enterprise Security Platform for Government

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Security A to Z the most important terms

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Bad Romance: Three Reasons Hackers <3 Your Web Apps & How to Break Them Up

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

You ll learn about our roadmap across the Symantec and gateway security offerings.

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Secure Your Mobile Workplace

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Marble & MobileIron Mobile App Risk Mitigation

Incident Response. Six Best Practices for Managing Cyber Breaches.

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

IBM Security re-defines enterprise endpoint protection against advanced malware

of firms with remote users say Web-borne attacks impacted company financials.

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

WildFire. Preparing for Modern Network Attacks

Advanced Persistent Threats

APPLICATION PROGRAMMING INTERFACE

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Advanced Persistent Threats

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Protecting Your Organisation from Targeted Cyber Intrusion

Advanced Threats: The New World Order

The Hillstone and Trend Micro Joint Solution

Perspectives on Cybersecurity in Healthcare June 2015

Comprehensive Advanced Threat Defense

Next Generation Enterprise Network Security Platform

Security Intelligence Services.

Covert Operations: Kill Chain Actions using Security Analytics

Sophistication of attacks will keep improving, especially APT and zero-day exploits

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Cisco Advanced Malware Protection

Information Security for the Rest of Us

Unified Security, ATP and more

Common Cyber Threats. Common cyber threats include:

Advanced Threat Protection with Dell SecureWorks Security Services

24/7 Visibility into Advanced Malware on Networks and Endpoints

Cyber Security Metrics Dashboards & Analytics

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Securing Your Business with DNS Servers That Protect Themselves

Zak Khan Director, Advanced Cyber Defence

5 Steps to Advanced Threat Protection

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Endpoint Security for DeltaV Systems

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Cisco Advanced Malware Protection for Endpoints

How Do Threat Actors Move Deeper Into Your Network?

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

BeyondInsight Version 5.6 New and Updated Features

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Data Center security trends

What Do You Mean My Cloud Data Isn t Secure?

Networking for Caribbean Development

Managing Web Security in an Increasingly Challenging Threat Landscape

Malicious Network Traffic Analysis

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

The Leading Provider of Endpoint Security Solutions

4 Steps to Effective Mobile Application Security

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

DEC Next Generation Security with Endpoint Detection and Response WHITE PAPER

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

IBM Security Strategy

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Surviving and operating services despite highly skilled and well-funded organised crime groups. Romain Wartel, CERN CHEP 2015, Okinawa

WhatWorks in Detecting and Blocking Advanced Threats:

Securing Your Business with DNS Servers That Protect Themselves

Description: Course Details:

Streamlining Web and Security

Concierge SIEM Reporting Overview

Beyond the Hype: Advanced Persistent Threats

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Web site security issues White paper November Maintaining trust: protecting your Web site users from malware.

Transcription:

Crack the Code: Defeat the Advanced Adversary Security Summit Clusit Verona 1st October 2015 Andrea Zapparoli Manzoni Head of Cyber Security KPMG Advisory Stefania Iannelli System Engineer Palo Alto Networks

Key Perspectives Who is the Adversary? Understanding the Cyber Attack Lifecycle How Attacks Happen 2 2014, Palo Alto Networks. Confidential and Proprietary.

Challenges and Change Introduce Risks Risk Exposure Organiza,onal Risk Social, Mobile, Analy(cs, Cloud Internet of Things Applica(on Economy Consumeriza(on of IT Decreasing Visibility and Control Rate of Change/Complexity Reliance on Mul,ple Layers of Service Providers 3 2014, Palo Alto Networks. Confidential and Proprietary.

Exploring Actor Motivations These are not mutually exclusive Cyber Espionage Cyber Crime Cyber Hack(vism Cyber Warfare Cyber Terrorism Cyber Mischief $$$

The Advanced Adversary Majority of adversaries are just doing their job: Bosses, families, bills to pay. Want to get in, accomplish their task, and get out (un-detected). Goal isn t making your life hard. =

The Advanced Adversary Increase the cost for adversaries. Defenders need a Adversaries combination have of a people, set of tools available process to accomplish and technology their task

Cyber Attack Lifecycle Reconnaissance Weaponiza,on and Delivery Exploita,on Installa,on Command- and- Control Ac,ons on the Objec,ve Unauthorized Access Unauthorized Use There is no predictable path for the advanced adversary. 7 2014, Palo Alto Networks. Confidential and Proprietary.

Reconnaissance Identify a specific target within an organization: SLIDESOURCE Join Login Find more webinars and videos Search Presenting a Webinar? HOME > All SLIDESOURCE > Enterprise Security Enterprise Security Protecting Critical Assets Channel Profile Leading a new era in cybersecurity by protecting thousands of enterprise, government Protect your company Our amazing new product provides unprecedented protection from 100% of all threats. You will never need to buy anything else. (12,000 Subscribers) CIO News Leading a new era in cybersecurity by protecting thousands of enterprise, Sandboxing is enough Leading a new era in cybersecurity by protecting thousands of enterprise, Find the topics that interest you Third-party sites to identify key targets Common search techniques Date Rating Views Channel RSS Feed Content from corporate websites Standalone IPS Leading a new era in cybersecurity by protecting thousands of enterprise,

Reconnaissance Simple Google Search List of Attendees at a National Defense Industrial Association

Reconnaissance Identify the tools used to protect an organization

Preventing Recon People & Process Nothing the Adversary Did Could Have Been Prevented by Technology

Exploitation Exploiting the user 1 Why use malware when you have legitimate credentials? Users are typically the path of least resistance.

Exploitation Exploit Exploiting the software 2 Why use a 0-day when 2012-0158/2010-3333 still open? Old vulnerabilities may not be patched.

Exploitation People: Training to recognize phishing attempts and be careful with credentials. Process: Keep software patched to reduce the attack surface. Technology: If you can t patch systems, limit access via user-based policy. Deploy solutions that can prevent exploitation on the endpoint and network, even those that have not been seen before. Use systems that learn from new exploits and can stop them in real-time.

Delivery Technology Technology Becomes Critical to Preventing Advanced Attacks

Delivery Delivering the Exploit Spear Phishing Attackers with a specific target Watering Hole AKA: Strategic Web Compromise for attackers targeting people with specific interests Everything Else Malicious USB Drives, Network Exploitation, etc.

Spear Phishing & Drive-by Download System infected, attacker has full access to steal data Targeted malicious email sent to user Malicious website silently exploits client-side vulnerability with Web Attack Toolkit User clicks on link to a malicious website Drive-by download of malicious payload

Watering hole http://...

Installation Myth Reality Highly customized and unique tools are used for every attack. Off-the-shelf tools are the most common method of attack.

Common Tools Remote Shell Direct access to the OS as logged in user Keylogger Audio Capture Screen Capture Webcam Capture 20 2014, Palo Alto Networks. Confidential and Proprietary.

Common Tools

Common Tools 22 2014, Palo Alto Networks. Confidential and Proprietary.

The Underground Economy Active Easily marketplace purchase for tools. attacks: Conversations Remote access on each tools. aspect of the Malware. kill-chain. Discuss Exploits. tactics A tool for creating Botnets on Android with Etc. [ ] other $4,000 attackers.

The Underground Economy Peer-to-peer Botnet [ ] $15,000 24 2014, Palo Alto Networks. Confidential and Proprietary.

Preventing Delivery and Installation Technology: Prevent malware and exploits at the network level Deploy a solution that can detect new exploits and malware, dynamically updated your protections across AV, URL and DNS. Prevent exploits that have never been seen before on the endpoint User-based policy such as limiting the download of executable files from the Internet Block commonly exploited filetypes on your network

Command and Control (C2) Communicating with infected hosts and providing instructions Myth Reality http://... Customized protocols, with unique encryption types are used for CnC. HTTP is most common for custom backdoors.

Command and Control (C2) Enterprise and adversary infrastructure User Land Data Center/Infrastructure Adversary Infrastructure Ingress/Egress Internet DMZ

Command and Control (C2) Malware for automated exfiltration User Land Data Center/Infrastructure Information exfiltration Adversary Infrastructure Ingress/Egress Internet Malware automatically captures information DMZ 28 2014, Palo Alto Networks. Confidential and Proprietary.

Command and Control (C2) 2 nd stage download and establish C2 channel User Land Data Center/Infrastructure Second stage+ Adversary Infrastructure Ingress/Egress Internet Establish C2 Malware downloads 2nd stage or beacons DMZ 29 2014, Palo Alto Networks. Confidential and Proprietary.

Preventing Command-and-Control URL Filtering Dynamic DNS DNS Sinkholing Detect and Block Proactively Block Unnecessary URLs Dynamic DNS category Identify source of malicious DNS queries. Common RAT C2 signatures

Actions on the Objective Goals Inside the Network These are Completed by an Active Operator And Then the Bad Guys Steal All Your Data

Command and Control (C2) C2 ultimately enables the attacker s endgame, Actions on Objectives Steal local credentials User Land Data Center/Infrastructure Steal repository information Adversary Infrastructure Dump domain credentials Ingress/Egress Internet Information exfiltration Objective based commands Steal local information DMZ Deface or host malware from site 32 2014, Palo Alto Networks. Confidential and Proprietary.

Example: XCodeGhost APTs in action

XcodeGhost Summary Report released on 9/17 Thousands of ios Apps infected in the official Apple App store. Millions of users impacted, primarily in China but around the globe. First widespread infection of Apps in the official store.

XcodeGhost Infects Developers Xcode is the tool Apple provides to developers to write and build ios Apps March 2015 Attacker uploads modified Xcode packages to Baidu cloud storage server Attacker posted links to modified Xcode Packages on Chinese developer forums Chinese developers download Xcode package and build Apps, most likely due to very slow downloads from Apple

XcodeGhost Modifies Apps Modified Xcode contains an altered CoreServices library that is added to every app built. Modified apps report to command and control servers and retrieve commands from attacker. Infected apps can display pop-ups and open new URLs on the phone Many Chinese-developed Apps, including WeChat infected.

XcodeGhost Response DNS signatures for three C2 servers released on 9/17. C2 servers shut down shortly after publication Thousands of additional apps discovered including the malware. Apple pulls infected apps from their store, promises a local Chinesedownload server for Xcode. Attacker posts source code to Github, claims it as only an experiment.

XcodeGhost What you should do Check your logs for systems accessing the 3 C2 servers to identify infected phones. init.crash-analytics[.]com init.icloud-diagnostics[.]com init.icloud-analysis[.]com Update apps as soon as clean versions are available, or delete infected Apps Never trust development tools that haven t originated with their source.

New Strategic Approaches to Security Are Needed Security Organiza,ons Are Not Innova,ng Fast Enough Exis(ng controls ineffec(ve against new threats Controls not evolving fast enough ANackers Are Innova,ng Faster Sophis(ca(on of global afackers Increasing value of informa(on Easier targets Vulnerability Gap Con,nues to Widen Goal: reduce threat exposure by strengthening controls 39 2014, Palo Alto Networks. Confidential and Proprietary.

WHY BREACHES STILL HAPPEN COMMON TRAITS Port based Firewall Sta,c IPS 0- Day Malware and Exploits used ID creden(als hijacked

Next-Generation Security Platform THREAT INTELLIGENCE CLOUD AUTOMATED NATIVELY INTEGRATED EXTENSIBLE NEXT- GENERATION FIREWALL ADVANCED ENDPOINT PROTECTION 41 2014, Palo Alto Networks. Confidential and Proprietary.

Detect & Prevent Threats at Every Point Cloud At the Mobile Device At the Internet Edge Between Employees and Devices within the LAN At the Data Center Edge and between VMs Within Private, Public and Hybrid Clouds Prevent afacks, both known and unknown Protect all users and applica(ons, in the cloud or virtualized Integrate network and endpoint security Analy(cs that correlate across the cloud 42 2014, Palo Alto Networks. Confidential and Proprietary.

Preventing Across the Cyber Attack Lifecycle 1 Breach the Perimeter 2 Deliver the Malware 3 Lateral Movement 4 Exfiltrate Data Reconnaissance Weaponiza,on and Delivery Exploita,on Installa,on Command- and- Control Ac,ons on the Objec,ve Unauthorized Access Unauthorized Use 43 2014, Palo Alto Networks. Confidential and Proprietary.

44 2014, Palo Alto Networks. Confidential and Proprietary.