Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge



Similar documents
All Information is derived from Mandiant consulting in a non-classified environment.

Defending Against Data Beaches: Internal Controls for Cybersecurity

RSA Security Anatomy of an Attack Lessons learned

Hunting for Indicators of Compromise

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Agenda , Palo Alto Networks. Confidential and Proprietary.

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Enterprise Cybersecurity: Building an Effective Defense

Protecting Your Organisation from Targeted Cyber Intrusion

Evolving Threat Landscape

Software that provides secure access to technology, everywhere.

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Advanced Threats: The New World Order

Enterprise Cybersecurity: Building an Effective Defense

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Symantec Advanced Threat Protection: Network

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

SPEAR PHISHING UNDERSTANDING THE THREAT

After the Attack. The Transformation of EMC Security Operations

Security Controls Implementation Plan

ICS-CERT Incident Response Summary Report

2016 EMEA EDITION M-TRENDS MANDIANT CONSULTING SPECIAL REPORT / JUNE 2016 AUTHORS. Bill Hau Matt Penrose Tom Hall Matias Bevilacqua

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

Critical Security Controls

Seven Strategies to Defend ICSs

Advanced Threat Protection with Dell SecureWorks Security Services

How We're Getting Creamed

Modern Approach to Incident Response: Automated Response Architecture

September 20, 2013 Senior IT Examiner Gene Lilienthal

24/7 Visibility into Advanced Malware on Networks and Endpoints

UNCLASSIFIED. General Enquiries. Incidents Incidents

How to effectively respond to an information security incident

Presented by: Mike Morris and Jim Rumph

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

CROWDSTRIKE // WHITE PAPER CYBER ATTACK SURVIVAL CHECKLIST

I D C A N A L Y S T C O N N E C T I O N

5 Steps to Advanced Threat Protection

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

TrendsTM. an evolving threat

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Persistence Mechanisms as Indicators of Compromise

Endpoint Threat Detection without the Pain

A Case for Managed Security

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

IBM Security re-defines enterprise endpoint protection against advanced malware

RSA Security Analytics

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Working with the FBI

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Defending against modern threats Kruger National Park ICCWS 2015

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Fighting Advanced Threats

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Protecting Sensitive Data Reducing Risk with Oracle Database Security

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Top 20 Critical Security Controls

Incident Response. Six Best Practices for Managing Cyber Breaches.

Carbon Black and Palo Alto Networks

10 Smart Ideas for. Keeping Data Safe. From Hackers

Endpoint Security for DeltaV Systems

Stay ahead of insiderthreats with predictive,intelligent security

Alleged APT Intrusion Set: 1.php Group. Whitepaper: Alleged APT Intrusion Set: 1.php Group Zscaler. All Rights Reserved.

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Speaker Info Tal Be ery

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Network/Cyber Security

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Digital Evidence and Threat Intelligence

FACT SHEET: Ransomware and HIPAA

Where every interaction matters.

CKAHU Symposium Cyber-Security

The Next Generation Security Operations Center

IBM QRadar Security Intelligence April 2013

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

TAKING SECURITY TESTING TO THE NEXT LEVEL 5 MAY 2014 STAN HEGT

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

With Great Power comes Great Responsibility: Managing Privileged Users

Security & Threat Detection: Go Beyond Monitoring

Transcription:

Targeted Intrusion Remediation: Lessons From The Front Lines Jim Aldridge

All information is derived from MANDIANT observations in non-classified environments. Information has beensanitized where necessary to protect our clients interests.

Remediating intrusions by targeted, persistent adversaries requires a different approach

Targeted Non-Targeted Criminals (e.g. attacking banks) Espionagemotivated, e.g. the APT Botnet herders Opportunists Hacktivists Disgruntled insiders Spammers

Targeted The adversary chose your organization for a reason Today, they want some piece of electronic information And will likely want more in the future They are not opportunistic intruders

Persistent (adopted from Richard Bejtlich s definition of APT) The adversary is formally tasked to accomplish a mission Like an intelligence unit, they receive directives and work to satisfy their masters Persistent does not necessarily mean they need to constantly execute malicious code on victim computers They maintain the level of interaction needed to execute their objectives

Threat (adopted from Richard Bejtlich s definition of APT) The adversary is not a piece of mindless code. This point is crucial. Some people throw around the term "threat" with reference to malware If malware had no human attached to it, then most malware would be of little worry (as long as it didn't degrade or deny data) The adversary here is a threat because it is organized and funded and motivated Some people speak of multiple "groups" consisting of dedicated "crews" with various missions

Traditional IR Doctrine

updated for the modern era

Agenda Targeted attack lifecycle Recommended approach Background: IR = Investigation + Remediation Prioritizing: The Remediation Planning Matrix The Remediation Event Posturing Strategic Activities

TARGETED ATTACK LIFECYCLE

Maintain Presence Move Laterally Initial Recon Initial Compromise Establish Foothold Escalate Privileges Internal Recon Complete Mission 12

Company A High tech manufacturer Global presence 20,000 employees 24,000 workstations and laptops, 3,000 servers Company B Supplier to company A

Company C A service provider Targeted, Persistent Attacker Works on a regular schedule this is a job 14

APT Attack: Day One Company B Company A 15 1 Attacker has compromised Company B. 2 Attacker sends phishing emails from Company B to a handful of employees of Company A, subject line: Re: Explanation of new pricing. Email contains malicious PDF attachment. 3 Bob opens the attachment. 4 A backdoor installed on Bob s workstation calls home by making an HTTPS request to a website. 5 The attacker, via the command and control (C2) server, executes commands on the victim PC. bad.dynamic-dns.com 6 The attacker now owns Bob s workstation. ( Hop point infrastructure was already deployed.) Company C

APT Attack: Days Two Four 1 Attacker queries Active Directory for a user and computer listing. 4 Attacker dumps all users password hashes from Active Directory, using the domain admin s credentials. Company A 5 Attacker infects another system with a different malware variant, using the domain admin credentials. another.bad.com bad.dynamic-dns.com 2 Attacker uses WCE to obtain admin and service account passwords from Bob s system. 3 Attacker connects to IT admins PCs using a service account he obtained from Bob s system. Uses WCE to obtain hashes. 16 (network boundary) 6 Attacker connects to engineer s workstation using compromised account; confirms location of crown jewels 7 Connects to Alice s system, using her password 8 from there connects to the server, and pulls back engineering data 9 and encrypts them into RAR archives. (network boundary)

Takeaways: The organization was targeted for a reason The attacker s goals Accomplish their mission Remain undetected Maintain access to the network Defense is not what it used to be Cannot prevent instead think inhibit And, focus on detecting and responding quickly 17

Win by: Inhibiting Make the attacker s job difficult but realize he will succeed in establishing a foothold Detecting Capability to proactively identify anomalies Ability to quickly answer investigative questions Enhancing response capabilities Investigate + remediate in hours, not months/years 18

RECOMMENDED APPROACH

Response = Investigate + Remediate Investigation Scope of compromise Attacker TTPs Data loss Attribution and attacker motivations Remediation Mitigate current threat Make it more difficult for future attackers More rapidly detect future activity Analyze lessons learned and strengthen security program 20

Attacker TTPs drive the approach Attacker TTPs Established a foothold Lateral movement capability Methods of evading detection Specific malware and tools deployed Specific command-and-control (C2) networks Key Remediation Tactics Isolate environment during remediation Execute contain/eradicate activities over a short time period Block C2 and implement rapid alerting mechanism Inhibit attacker and improve visibility to detect future attacker activities 21

Remediation phases Remediation encompasses containment, eradication and recovery. A remediation eventas a short, defined period of time during which an organization Mitigates the current threat Implements enhancements to directly frustrate attackers techniques Posturing Remediation Event(s) Strategic 22

The Remediation Event 1. Isolate WAN from the Internet. 2. Block egress traffic to attacker C2 addresses & domains. 3. Replace compromised systems. 4. Reset passwords. 5. Implement technical countermeasures that directly address the attack lifecycle: a) Secure Windows local administrator accounts b) Patch third-party desktop applications c) Implement application whitelisting (critical systems) d) Block workstation-to-workstation communication 6. Validate effective implementation of tasks 7. Reconnect Internet *NB: One size does not fit all. 23

The Remediation Event Execute event when: Thorough understanding of the extent of the compromise Know the attacker s tactics Can reliably detect the attackers malware and tools 24

Remediation phases Remediation is preceded by posturing Implement triage countermeasures that do not disrupt the investigation Plan for the remediation event(s) Instrument the environment to make it more investigation-ready Remediation is followed by the implementation of strategic initiatives Longer-term security improvements that are not tactically necessary for remediation Posturing Remediation Event(s) Strategic 25

Caveats Some situations warrant immediate containment, e.g. when Attacker knowing that you are remediating [has less impact than] Consequences of not containing

Caveats in Action Example: financial breach, smash-and-grab Attackers are about to steal millions in cash Attackers are not interested in maintaining access Immediate containment is likely justified

Prioritizing initiatives

Maintain Presence Move Laterally Initial Recon Initial Compromise Establish Foothold Escalate Privileges Internal Recon Complete Mission Initial Recon Initial Compromise Establish Foothold Escalate Privileges Internal Recon Move Laterally Maintain Presence Complete Mission Inhibit Detect Respond Threat Intelligence Operational Visibility Operational Complexities Business Drivers Resource Constraints

Plan the remediation workstream Posturing

Enhance logging and monitoring Posturing

Prepare enterprise-wide password change Posturing

Posturing Focus on the most impactful defensive measures

Investing in people Strategic

Creating an investigation-ready environment Strategic

Enhancing authentication and authorization Strategic

Improving the network architecture Strategic

Summary Targeted, persistent threats require a different approach for remediation success. Redefine winning: such attackers will return. Plan countermeasures that directly address the attack lifecycle to optimize chances of success.

Contact information Jim.Aldridge at Mandiant.com 703.224.2963 About MANDIANT: MANDIANT is the information security industry s leading provider of incident response and computer forensics solutions and services. MANDIANT provides products, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments and leading U.S. law firms. To learn more about MANDIANT visit www.mandiant.com, read M-unition, the company blog:http://blog.mandiant.com, or follow on Twitter@MANDIANT.