Fighting Advanced Persistent Threats (APT) with Open Source Tools



Similar documents
Fighting Advanced Persistent Threats (APT) with Open Source Tools

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Deep Security Vulnerability Protection Summary

Detecting peer-to-peer botnets

The Hillstone and Trend Micro Joint Solution

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Covert Operations: Kill Chain Actions using Security Analytics

Open Source Security Tool Overview

UNCLASSIFIED. General Enquiries. Incidents Incidents

FISMA / NIST REVISION 3 COMPLIANCE

IBM Advanced Threat Protection Solution

Networking for Caribbean Development

How To Protect A Network From Attack From A Hacker (Hbss)

Unknown threats in Sweden. Study publication August 27, 2014

5 Steps to Advanced Threat Protection

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Windows Server 2003 End of Support. What does it mean? What are my options?

Defending Against Cyber Attacks with SessionLevel Network Security

RSA Security Anatomy of an Attack Lessons learned

Analyzing HTTP/HTTPS Traffic Logs

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Metric Matters. Dain Perkins, CISSP

GFI White Paper PCI-DSS compliance and GFI Software products

Modular Network Security. Tyler Carter, McAfee Network Security

24/7 Visibility into Advanced Malware on Networks and Endpoints

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

End-user Security Analytics Strengthens Protection with ArcSight

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

HoneyBOT User Guide A Windows based honeypot solution

Comprehensive Advanced Threat Defense

Intrusion Detection in AlienVault

RSA Security Analytics

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Who am I? BlackHat RSA

Concierge SIEM Reporting Overview

Getting Ahead of Malware

Host-based Intrusion Prevention System (HIPS)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Cisco Advanced Malware Protection for Endpoints

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Unified Security, ATP and more

74% 96 Action Items. Compliance

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

Computer Networks & Computer Security

Best Practices For Department Server and Enterprise System Checklist

Hosts HARDENING WINDOWS NETWORKS TRAINING

IBM Security QRadar QFlow Collector appliances for security intelligence

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

KEY TRENDS AND DRIVERS OF SECURITY

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Windows Remote Access

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Agenda , Palo Alto Networks. Confidential and Proprietary.

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

McAfee Network Security Platform

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Security Intelligence Services.

APPLICATION PROGRAMMING INTERFACE

Common Cyber Threats. Common cyber threats include:

Fighting Advanced Threats

Streamlined Malware Incident Response with EnCase

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Advanced & Persistent Threat Analysis - I

Network Intrusion Analysis (Hands-on)

True in Depth Security through Next Generation SIEM. Ray Menard Senior Principal Security Consultant Q1 Labs

Lessons from the DHS Cyber Test Bed Project

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

OWASP Logging Project - Roadmap

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Intro to Firewalls. Summary

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Incident Response. Six Best Practices for Managing Cyber Breaches.

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

INFORMATION SECURITY TRAINING CATALOG (2015)

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

IBM QRadar Security Intelligence April 2013

PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Locking down a Hitachi ID Suite server

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Specific recommendations

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

Protecting Your Organisation from Targeted Cyber Intrusion

INTRUSION DETECTION SYSTEMS and Network Security

Transcription:

Fighting Advanced Persistent Threats (APT) with Open Source Tools

What is APT? The US Air Force invented the term in 2006 APT refers to advanced techniques used to gain access to an intelligence objective to gather the needed information to execute specific objectives. 2

APT characteristics Advanced: The intruder can exploit publicly known vulnerabilities but the attackers also are highly skilled and well funded and can research and exploit new vulnerabilities. Persistent: the attacker wants to accomplish a mission that can take place over months. Threat: Dedicated organized groups are behind the attack motivated by political, economical or military reasons. 3

GhostNet Ghostnet: China VS Tibetan institutions 295 computers in 03 countries 4

Aurora Attack Coordinated attack against Google, Adobe, Juniper and 30 other companies. Exploits a zero-day vulnerability in Microsoft Internet Explorer (CVE-200-0249) Installs Trojan.Hydraq. 5

Trojan.Hydraq Standard Trojan, not too sophisticated. No anti-debugging, No anti-analysis tricks. Uses spaghetti code to make code analysis more difficult. (Easily analized with IDA) Previous versions of Trojan.Hydraq observed 6 month previous to Aurora Attack. 6

Trojan.Hydraq Files: %System%\[RANDOM].dll: Main backdoor registered as a service. %System%\acelpvc.dll: Remote access capabilities (VNC). %System%\VedioDriver.dll: Helps monitoring keyboard and mouse activity. 7

Trojan.Hydraq Capabilities: Command execution Download additional files System operations (halt, clean log files ) Service, registry control. 8

Trojan.Hydraq C&C communication: Encrypted protocol on port 443 (not SSL) [ ff ff ff ff ff ff 00 00 fe ff ff ff ff ff ff ff ff ff 88 ff ] Source: McAfee Labs 9

Keys for Fighting APT An anti-apt solution doesn t exists. Centralizing and correlating security data is the key (SIEM!!) Security is a continuous process. 0

Intrusion Examples: An email with a PDF or Office document that exploits a vulnerability (Maybe 0-day). Countermeasures: Patch Management and Auditing (Openvas + OVAL). Policy Auditing (Openvas Ossec checks). Is Adobe Javascript support disabled? Internet Explorer Security Configuration

Setting Up Examples: Backdoor and Rootkit installation, system modification, privilege escalation. Countermeasures: Log monitoring: Ossec, Snare. Integrity Monitoring: Ossec Registry changes. File creation/modifications Service registration and process creation. 2

Network Activity Examples: C&C communication, cover channels, updated downloads Countermeasures: IDS/IPS technology (Snort, Suricata). Ej: Packed binary download. Deep Packet Inspection (OpenDPI). Ej: Non SSL traffic over port 443. 3

Network Activity Netflow Data : Nfdump + Nfsen (plugins). AS and Country data. Alert on suspicious AS s (reputation) Fire project http://www.maliciousnetworks.org/index.php Identify traffic patterns: Mutiple clients sending high amount of data to an external server. Regurarly client connections to external servers (even after hours) 4

Advanced techniques Create an APT trap Information Gathering Collect suspicious content from Corporate Mail Server. Create false accounts. Automatic analysis framework Analize obtained information Check for exploits/javascript on.pdf,.xls,.doc files. Extract the involved binary Automatic sandbox/analysis environment. Compare obtained patterns with your SIEM data. 5

Advanced techniques Analize obtained data The goal is to identify malicious content an extract the involved binary. Tools: Didier Stevens pdf tools SpiderMonkey Libemu JsUnpack Malzilla Wepawet 6

Advanced techniques Automatic sandbox/analysis environment Once we have the binary we have to extract the information needed to build the Behaviour Matrix. SandBox execution: Qemu, VirtualBox, Bochs. Dynamic pattern extraction: Snare, Ossec, memoryze, Volatility Network behaviour pattern extraction: Snort for IDS pattern detection Scapy protocol parsers:» DNS, HTTP, IRC, SMTP. 7

Advanced techniques Static analysis o Antivirus Coverage : VirusTotal o Packers : PeFile + PEID o Imports/Exports : PeFile o Antidebug/Virtual Machine Detection : Pyew 8

Advanced techniques Build the behaviour matrix, example: [ Process_Creation, test.exe] [ DNS_Query, www.securedz.com] [ HTTP_Request, POST, /panel2/haya.php] [ Driver_Loaded, wowsub.sys] [ IDS_Pattern, Snort, 2008576] 9

Advanced techniques Once you have the behaviour matrix: DNS Activity - DNS Server Log HTTP Activity - Corporate Proxy Logs Suspect Matrix Connections - Firewall logs - Netflow Data System Activity - Change management system logs 2 0

Jaime Blasco jaime.blasco@alienvault.com http://twitter.com/jaimeblascob