When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński



Similar documents
ENABLING FAST RESPONSES THREAT MONITORING

Comprehensive real-time protection against Advanced Threats and data theft

TRITON APX. Websense TRITON APX

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Stop advanced targeted attacks, identify high risk users and control Insider Threats

WEBSENSE TRITON SOLUTIONS

Defending Against. Phishing Attacks

Fighting Advanced Threats

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Evolution Of Cyber Threats & Defense Approaches

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

Advanced Persistent Threats

Websense Solutions. TRITON v7.7 Architecture

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS:

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

You ll learn about our roadmap across the Symantec and gateway security offerings.

The Cloud App Visibility Blindspot

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Spear Phishing Attacks Why They are Successful and How to Stop Them

Unified Security, ATP and more

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Streamlining Web and Security

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Advanced Threat Protection with Dell SecureWorks Security Services

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

ITAR Compliance Best Practices Guide

Lab Testing Detailed Report DR Competitive Testing of the Websense TRITON Web Security Gateway Anywhere v7.7.3

RETHINKING CYBER SECURITY Changing the Business Conversation

2012 Data Breach Investigations Report

High End Information Security Services

Advanced Persistent Threats

Protection Against Advanced Persistent Threats

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

AB 1149 Compliance: Data Security Best Practices

INDUSTRY OVERVIEW: FINANCIAL

Sophistication of attacks will keep improving, especially APT and zero-day exploits

SPEAR PHISHING AN ENTRY POINT FOR APTS

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth


defending against advanced persistent threats: strategies for a new era of attacks agility made possible

IBM Security Strategy

Secure Your Mobile Workplace

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Defending Against Cyber Attacks with SessionLevel Network Security

CISO Guide to Next Generation Threats

Symantec Advanced Threat Protection: Network

Using big data analytics to identify malicious content: a case study on spam s

Content Security: Protect Your Network with Five Must-Haves

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Securing Cloud-Based

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Comprehensive Advanced Threat Defense

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

The Ostrich Effect In Search Of A Realistic Model For Cybersecurity

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Internet threats: steps to security for your small business

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Breaking the Cyber Attack Lifecycle

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Innovations in Network Security

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

10 Smart Ideas for. Keeping Data Safe. From Hackers

Training Employees to Recognise & Avoid Advanced Threats

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Data Center security trends

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Fight Malware, Malfeasance, and Malingering with F5

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Agenda , Palo Alto Networks. Confidential and Proprietary.

RSA Security Analytics

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

Transcription:

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński 1

Agenda Spear-Fishing the new CEO Fear How to Fight Spear-Fishing It s All About the Data

Evolution of the bad guys modus operandi EASY TO PROTECT HARD TO PROTECT

The Enemy is in your Blind Spots SSL Spear Phishing AD, SAM, Password extraction Custom Encryption Malware

Email Security Trends Spam huge volumes ensure penetration often used as the first stage in many attacks 92 % of email spam contains a URL The total percent of spam that can be categorized as leading to a traditional phishing is approximately 1.62 % The percentage of virus-related email spam is only 0.4 % phishing attempts outnumber malicious executables in email volume 6

How to Lure? Four out of the top five phishing email subject lines are related to security. These types of attacks represent the largest volume of recent subject lines designed to lure in victims. Top five phishing email subject lines: Your account has been accessed by a third party (Bank Name) Internet Banking Customer Service Message Security Measures Verify your activity Account security Notification *Based on July September 2012 research 7

Time for Phishing 8

Lures Prey on Human Curiosity Spear-Phishing The key to major data theft attacks last year 92 % of email spam contains a web link Defenses focused on high volume known attacks which are less effective 9

Attack Scenario A typical attack of this type would have the bad guy doing the following: Find a URL that can be easily compromised but do nothing at that time. Leave it as is for now. Craft an email that will not trigger spam, AV or other security measures based on its content, but include links to the currently safe URL. Since they typically pretend to be something legitimate, it is best to simply copy a legitimate message and only change one link to the safe URL. Send the email over the weekend, or late at night, so email defenses will approve the email and deliver it into the user s mailbox. Just before you believe employees will begin accessing email, compromise the URL and install that part of the attack strategy. 10

New Defense Game 11

The decline of AV effectiveness NUMBER OF MALWARE THREATS DETECTED BY WEBSENSE ADVANCED DETECTION PER DAY NOT DETECTED BY FIVE TOP AV ENGINES 153 298 409 641 2008 2009 2010 2011

30% 25% 20% What is your best security solution? AV? Firewall? 15% 10% 5% 0% Web Security Gateway SIEM- Intelligence Vulnerability Mgmt DLP Endpoint IDM IDS/IPS Encryption GRC Firewall Security (AV, 2012 etc.) Websense, Inc. Security & IT Exec s Surveyed

14

Three Ways to Stop Spear-phishing Websense recommends a three-pronged approach designed to stop 95-99 percent of spear-phishing attempts: Employee education Inbound email sandboxing Real-time analysis and inspection of your web traffic 15

The human element is incredibly important. Employee education is fundamental to preventing a spear-phish attack. Consider pen-testing your users. Show them why they need to think before they click. 16

Sandboxing Spear-phishing technique Embedded web link in email lure Time malware infection after delivery Email security sees a clean link Sunday Monday Email Security OK Target Web Site Web Target Site Infected 4am Web 17

ACE: Composite Security Engine Security Technologies Embedded in ACE 18

Advanced Classification Engine (ACE) 19

ACE New Defenses Advanced Classification Engine Predictive Inline Analytical Engine 10 New Defenses in ACE to protect against Advanced Threats & Data Theft New ACE Analytics/Defenses: Advanced Malware Payloads Potentially Exploited Documents Mobile Malware Criminal Encrypted Uploads Files Containing Passwords Advanced Malware Command & Control Unauthorized Mobile Marketplaces OCR (Optical Character Recognition) Behavioral (Drip) DLP Geo-Location INBOUND WSG OUTBOUND WSG OUTBOUND WSGA 20

aceinsight.com 21

Spear-Phishing examples The White House became the victim of a spear-phishing attack. It is alleged that Chinese hackers attempted to gain access to an unclassified network within the office. Last year, an email spear-phishing attack succeeded at Oak Ridge National Laboratory before the organization cut off internet access to workers. The Oak Ridge facility handles classified and non-classified research for the federal government and is known for researching cybersecurity initiatives. A targeted email was sent to specific employees masquerading as an employee benefits email from the human resource department. In March 2011, executives from security company RSA announced a possible breach of SecurID product information from a spear-phishing attack. A spear-phishing e-mail was sent to two small groups within the company. Though the e-mail was automatically marked as Junk, the subject of the message ("2011 Recruitment Plan") tricked one employee into opening it anyway. GhostNet, Night Dragon, and the Operation Aurora attack against Google, Adobe and approximately a dozen other companies, and many of the other so-called advanced persistent threats (APT) that have been publicly documented have been initiated at least in part through targeted spear phishing emails. 22

Watering the hole: the new way to hunt In May 2012, the Websense ThreatSeeker Network detected that the Institute for National Security Studies (INSS) website in Israel was injected with malicious code. INSS is described in its website as an independent academic institute that studies key issues relating to Israel's national security and Middle East affairs. 23

Even more water... Nepalese government websites were compromised to serve Zegost RAT in August 2012. Also, in May 2012, the Amnesty International UK website was compromised to serve Gh0st RAT. All of these used the same vulnerability (CVE-2012-0507). 24

New Defense Game 25

Criminal Encrypted Uploads Proprietary encryption Cloak comms & data theft Crimeware toolkit enabled Blind spot for defenses Web 26

Password File Data Theft Password files Active Directory/SAM database Expand reach/control within target First priority once inside Web 27

Non-Document Data Theft Image files Confidential information Smart phone pictures Blind spot for defenses Web 28

Slow Data Leaks Remain below the radar Low record count per request/incident Steal data in small chunks Persistence and patience One data record One data record Web 29

Protection & Containment One data record Criminal Encrypted Uploads Password File Data Theft Image OCR/Text Analysis Drip (Stateful) DLP Cloud Sandboxing for Email Monday Redirect Wrapper Real-time web security analysis Target Site Infected 4am Web 30

31

Threat Dashboard 32

Forensic Reporting Know WHO was compromised Know HOW the malware operates (intent) Know WHERE the data was being sent Know WHAT was prevented from being stolen 33

During the presentation 34

CyberSecurity Intelligence Services "It's becoming clear that many of these emerging threats cannot be defended against in-house, creating a shift in security posture toward being more proactive. IDC Senior Analyst Christine Liebert IDC press release, Jan. 31, 2012, http://www.idc.com/getdoc.jsp?containerid=prus23290912 CSI: On-Demand ThreatScope malware analysis sandbox Priority access to research tools/services Video resources from research presentations & TAB events Online security training CSI: Live Direct access to Security Labs researchers Forensic investigation partner 3-day classes w/hands-on labs Regular security reviews Customer Allow/Deny lists Full security posture Includes CSI: On-Demand 35

Questions http://securitylabs.websense.com/ 36