Advanced Threats: The New World Order



Similar documents
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

RSA Security Anatomy of an Attack Lessons learned

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

After the Attack. The Transformation of EMC Security Operations

The Future of the Advanced SOC

Security Analytics for Smart Grid

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

The Next Generation Security Operations Center

The session is about to commence. Please switch your phone to silent!

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Rashmi Knowles Chief Security Architect EMEA

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Advanced Persistent Threats

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Intelligence Driven Security

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

Defending Against Data Beaches: Internal Controls for Cybersecurity

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

DYNAMIC DNS: DATA EXFILTRATION

Analyzing HTTP/HTTPS Traffic Logs

Enabling Security Operations with RSA envision. August, 2009

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

REVOLUTIONIZING ADVANCED THREAT PROTECTION

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

After the Attack: RSA's Security Operations Transformed

IT Security Strategy and Priorities. Stefan Lager CTO Services

Advanced Threat Protection with Dell SecureWorks Security Services

IBM Security re-defines enterprise endpoint protection against advanced malware

Endpoint Threat Detection without the Pain

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Persistence Mechanisms as Indicators of Compromise

Incident Response. Six Best Practices for Managing Cyber Breaches.

CyberArk Privileged Threat Analytics. Solution Brief

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Using Network Forensics to Visualize Advanced Persistent Threats

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Cisco Cyber Threat Defense - Visibility and Network Prevention

Agenda , Palo Alto Networks. Confidential and Proprietary.

Security and Privacy

The Custom Defense Against Targeted Attacks. A Trend Micro White Paper

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

24/7 Visibility into Advanced Malware on Networks and Endpoints

Joining Forces: Bringing Big Data to your Security Team

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

SIEM is only as good as the data it consumes

Unified Security, ATP and more

Caretower s SIEM Managed Security Services

Securing OS Legacy Systems Alexander Rau

Detect & Investigate Threats. OVERVIEW

Getting Ahead of Advanced Threats

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

The SIEM Evaluator s Guide

RSA Security Analytics

Win the race against time to stay ahead of cybercriminals

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Data Science Transforming Security Operations

Security strategies to stay off the Børsen front page

SANS Top 20 Critical Controls for Effective Cyber Defense

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Enterprise Cybersecurity: Building an Effective Defense

Getting real about cyber threats: where are you headed?

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

The Hillstone and Trend Micro Joint Solution

THE EVOLUTION OF SIEM

Combating a new generation of cybercriminal with in-depth security monitoring

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

FIVE PRACTICAL STEPS

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

What s New in Security Analytics Be the Hunter.. Not the Hunted

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

IBM QRadar Security Intelligence April 2013

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Vulnerability Management

Using SIEM for Real- Time Threat Detection

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Unknown threats in Sweden. Study publication August 27, 2014

RSA Security Analytics the complete approach to security monitoring or how to approach advanced threats

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

All Information is derived from Mandiant consulting in a non-classified environment.

2011 Forrester Research, Inc. Reproduction Prohibited

IBM Security IBM Corporation IBM Corporation

Spear Phishing Attacks Why They are Successful and How to Stop Them

Transcription:

Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China gary.lau@rsa.com 1

Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC APTs Investigation Q&A 2

Traditional Security Is Not Working 99% of breaches led to compromise within days or less with 85% leading to data exfiltration in the same time 85% of breaches took weeks or more to discover Source: Verizon 2012 Data Breach Investigations Report 3

What is APT? 4

What is APT? Gartner uses a simple definition for APT : Advanced: It gets through your existing defenses. Persistent: It will keep trying until it gets in, and once done, it succeeds in remaining hidden from your current level of detection until it attains its objective. Threat: It can cause harm. Strategies for Dealing with Advanced Target Attacks Gartner, 6 Jun 2013 5

Aims of APT Information compromise: Stealing, destroying or modifying business-critical information. Theft of service: Obtain use of the business product or service without paying for it. Denial of service: Disrupting business operations. 6

Known vs Unknown Threat Detection Known Unknown Firewall IDS/IPS AV DLP SIEM Others Detect What Where How Investigate 7

Unknown Threat. Targeted attacks often use custom-created malware that is undetectable by signaturebased techniques. Such attacks generally require some means of communication back to an outside party (beaconing). 8

APT leaves clues! APT footprints Payload (one or several) Compromised host Remote C2 server Network communications Routable IP address or a domain name pointing to it Registered with a fully qualified domain name Or an account with a DDNS provider Payload Binaries, strings & functions, etc. Configured with the address\domain Proactive Intelligence to detect these clues 9

Advanced Threats Are Different 1 TARGETED SPECIFIC OBJECTIVE 2STEALTHY 3 INTERACTIVE LOW AND SLOW HUMAN INVOLVEMENT System Intrusion Attack Begins Cover-Up Discovery Leap Frog Attacks Cover-Up Complete TIME Dwell Time Response Time 1 Decrease Dwell Time [Attacker Free Time] Attack Identified 2 Speed Response Time Response 10

Resource Shift: Budgets and People Monitoring 15% Response 5% Monitoring 33% Response 33% Prevention 80% Prevention 33% Traditional Defense Increase the ability to detect and respond 11

A New Security World It will become increasingly difficult to secure infrastructure We must focus on people, the flow of data and on transactions 12

You need Visibility!! 13

SIEM has been a good start SIEM can provide: Valuable reporting on device and application activity Basic alerting on known sequences (i.e. basic correlation) Proof of compliance for internal and external auditors Central view into disparate event sources being collected In today s world Threats are multi-faceted, dynamic and stealthy The most dangerous attacks have never been seen before Threats often don t leave a footprint in logs 14

Today s tools need to adapt Today s tools need to be able to detect and investigate Lateral movement of threats as they gain foothold Covert characteristics of attack tools, techniques & procedures Exfiltration or sabotage of critical data Today s tools need to be able to scale To collect and store the volume and diversity of data required To provide analytic tools to support security workstreams Time to respond is critical in a breach situations and SIEM often falls short Traditional SIEM will not meet these needs! 15

Control Coverage Attack the control white space Defense in Depth DLP FW IDS AV End Point DLP Adversary Emerging Threats 0 day malware Trusted C2 Valid Credentials log log log log log full packet capture Assets SIEM threat intelligence Log Packet Intelligence ECAT Live Intelligence & CCI Governance

Holistic Approach to Address APT 17

Critical Questions against APTs Governance Comprehensive Visibility Actionable Intelligence What Matters? What is going on? How do I address it?

Use a Strategic Security Approach to Implement Tactical Best-Practice Controls Best Practice Strategies from Gartner Use a comprehensive approach; no one single technology will stop advanced targeted attacks, even products specifically targeted at advanced forms of attacks. Acknowledge that technology alone won t stop APT; your strategy must include the search for compromised systems, improvements in your forensics and incident response capabilities, and rapid response. 19

List of RSA offerings within Gartner control layers Technologies Authentication Technology Advanced Threat Protection Appliances Network forensics Security information and event management Security Intelligence Services Endpoint Threat Detection and response Incident Response Capabilities DLP Solution Offerings RSA SecurID RSA Security Analytics RSA Security Analytics RSA Security Analytics RSA Security Analytics RSA Cyber Crime Intelligence RSA ECAT RSA Archer RSA DLP Garnter:G00256438 20

Korean Incidents The power of Detect and Investigate 21

Disruptive Attacks - 2011 22

Disruptive Attacks - 2013 23

Multi-Vector Co-ordinated Attack 24

What changed between 2011->2013 2011 2013 Target 1 Bank 3 Banks and a TV Station Destruction Delete Bootfiles & Reboot Delete MBR & Reboot Delivery Single Vector Multi-Vector SIEM No Mostly Network Forensics No Partial Investigative Capabilities None Minimal Downtime 2 Days 2 Hours 25

EMC CIRC 26

Global Security Organization Functional Areas Implement Office of Information Security Investigate Corporate Protective Services RISK MGT Enable Business Security Enablement Group Detect Critical Incident Response Group 27

Sphere of Protection Fed by more than 2,000 security devices which generate 12 to 14 million security events per hour Protecting critical infrastructure of thousands of customers spanning more than 500 sites in over 100 countries Manages Security Incidents, Investigate Suspicious Behavior, Vulnerability Analysis, Malware Analysis, and Threat Management Built on EMC Proven Technologies from RSA, including RSA Security Analytics and RSA Archer A specialized cross-functional highly skilled team focused just on monitoring for critical threats and incident response 28

EMC CIRC Statistics Reference After filtering, alerts that need to be handle is around 200 instances. Out of the 200 alerts, ~30 need to do further investigation. Need 3 person to handle the in-depth advance investigation. 29

Investigating against APTs - a case study 30

Solutions Highlights RSA Security Analytics (upgradable from RSA envision) Provide enterprise-wide visibility into network traffic and log event data to reduce attacker free time from weeks to hours. RSA ECAT (Enterprise Compromise Assessment Tool) Detect advanced malware and quickly response leveraging innovative live memory analysis. RSA Archer Provide business context hence incident prioritization, manage remediation procedures. 31

Planning Your Journey CONTROL COMPLIANCE IT RISK BUSINESS RISK MATURITY LEVEL Technology Focused Business Risk Focus 60

RSA ACD Services Portfolio NextGen SOC Design & Implementation Identity & Access Control Breach Management Cyber Threat Intelligence Breach Readiness Incident Response/Discovery Impacting the Attack Cyber Kill Chain Establish Beach Head Copyright 2011 EMC Corporation. All rights reserved. Infiltration Data Exfiltration 61