APT Advanced Persistent Threat Time to rethink?



Similar documents
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Defending Against Data Beaches: Internal Controls for Cybersecurity

IBM Security Strategy

Enterprise Cybersecurity: Building an Effective Defense

RSA Security Anatomy of an Attack Lessons learned

IT Security Risks & Trends

Locking down a Hitachi ID Suite server

We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site

Agenda , Palo Alto Networks. Confidential and Proprietary.

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Click to edit Master title style

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

I ve been breached! Now what?

Common Cyber Threats. Common cyber threats include:

INTRUSION DETECTION SYSTEMS and Network Security

Penetration Testing Report Client: Business Solutions June 15 th 2015

Cyber Security for SCADA/ICS Networks

How We're Getting Creamed

Web Application Security

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Presented by: Mike Morris and Jim Rumph

Spear Phishing Attacks Why They are Successful and How to Stop Them

Social Engineering Toolkit

Developing Network Security Strategies

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Targeted attacks: Tools and techniques

Getting real about cyber threats: where are you headed?

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Enterprise Cybersecurity: Building an Effective Defense

All Information is derived from Mandiant consulting in a non-classified environment.

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Protecting Your Organisation from Targeted Cyber Intrusion

Detailed Description about course module wise:

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

CYBER ATTACKS CASHING IN ON RETAILERS: A WEBINAR ON CYBERSECURITY

External Supplier Control Requirements

Data Center security trends

Penetration Testing - a way for improving our cyber security

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Secure Your Mobile Workplace

Fighting Advanced Threats

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

INCIDENT RESPONSE CHECKLIST

Windows Remote Access

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Seven Strategies to Defend ICSs

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Information Blue Valley Schools FEBRUARY 2015

Incident Response. Six Best Practices for Managing Cyber Breaches.

SPEAR PHISHING UNDERSTANDING THE THREAT

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

RMAR Technologies Pvt. Ltd.

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

CTS2134 Introduction to Networking. Module Network Security

Top 20 Critical Security Controls

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

How To Protect Your Online Banking From Fraud

Critical Security Controls

The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director

Rational AppScan & Ounce Products

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

FERPA: Data & Transport Security Best Practices

The Peak of Chaos Shane D. Shook, PhD 10/31/2012

Exploiting Transparent User Identification Systems

A Systems Approach to HVAC Contractor Security

Persistence Mechanisms as Indicators of Compromise

CYBERTRON NETWORK SOLUTIONS

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Healthcare Security Vulnerabilities. Adam Goslin Chief Operations Officer High Bit Security

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Network/Cyber Security

An Introduction on How to Better Protect Your Computer and Sensitive Data

DMZ Gateways: Secret Weapons for Data Security

Innovations in Network Security

AGENDA HIP Ho AA w i rivacy d The B reach Happen? I P nc AA Secu dent R rit esp y o nse Corrective Action Plan What We Learned ACRONYMS USED

2015 TRUSTWAVE GLOBAL SECURITY REPORT

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Transcription:

APT Advanced Persistent Threat Time to rethink? 23 November 2012 Gergely Tóth Senior Manager, Security & Privacy

Agenda APT examples How to get inside? Remote control Once we are inside Conclusion 2 APT Advanced Persistent Threat Time to rethink?

APT Advanced Persistent Threat Definition The term is commonly used to refer to cyber threats, in particular that of Internetenabled espionage using a variety of intelligence gathering techniques to access sensitive information... -- Wikipedia Advanced Sophisticated attack potentially combining several types of techniques including zero-day exploits and social engineering Persistent Targeted instead of being opportunistic: i.e. attack is tailored to the organization at hand Threat 3 APT Advanced Persistent Threat Time to rethink?

APT example Spear phishing attack 4 APT Advanced Persistent Threat Time to rethink?

Spear Phishing Example #1 5 APT Advanced Persistent Threat Time to rethink?

Spear Phishing Example #1, cont d 6 APT Advanced Persistent Threat Time to rethink?

Spear Phishing Details of the attack Attack lasted two days Two user groups received spear phishing e-mails They were not privileged users Interesting e-mails 2011 Recruitment Plan At least one user Retrieved the e-mail from the Junk e-mails folder Opened the attachment Source: http://blogs.rsa.com/rivner/anatomy-of-an-attack/ 7 APT Advanced Persistent Threat Time to rethink?

Spear Phishing Details of the attack, cont d The payload Excel document with embedded Flash object Zero-day (CVE-2011-0609) Flash exploit Modified Poison Ivy installed by the payload Well-known remote management software Reverse connect mode workstation connects to attacker s server Privilege escalation Domain users Service users Domain admins Internal attacks Internal servers Staging server storage, compression, encryption FTP out collected data to a cracked server Clean-up after the attack: wipe traces Source: http://blogs.rsa.com/rivner/anatomy-of-an-attack/ 8 APT Advanced Persistent Threat Time to rethink?

APT example Traditional systems compromise 9 APT Advanced Persistent Threat Time to rethink?

Traditional systems compromise Example #2 Secure LAN DMZ Office LAN 10 APT Advanced Persistent Threat Time to rethink?

Traditional systems compromise Details of the attack Attack lasted one month Systems compromise route Web server in the DMZ used as file manager and proxy Office LAN systems Secure LAN Scale of the attack All CA servers compromised Certificates issued using the HSM module used later in a large-scale attack (300k+ victims potentially) Log files tampered with to hide traces of activity Source: http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/rapporten/2012/08/13/black-tulipupdate/black-tulip-update.pdf 11 APT Advanced Persistent Threat Time to rethink?

HSM Myths and reality We use HSM (Hardware Security Module) in business critical systems for sensitive transactions HSM used in batch processes or automatically Compromised systems will to use the HSM just as easily 12 APT Advanced Persistent Threat Time to rethink?

How to get inside? The Spear 13 APT Advanced Persistent Threat Time to rethink?

The Spear Example #3 Approx. 5000 users 57 clicks :::::: :::::: :::::: :::::: :::::: :::::: :::::: Approx. 530 targets 2 successful exploits Source: http://www.securitynewsdaily.com/-cyberattack-hits-oak-ridge-national-laboratory-0709/ 14 APT Advanced Persistent Threat Time to rethink?

The Spear The Ignore the security warnings training course 15 APT Advanced Persistent Threat Time to rethink?

The Spear Myths and reality Anti-virus and IDS/IPS stops such attacks Signature-based mechanisms are ineffective against unknown attack types (e.g. zero-day vulnerabilities, customized payloads) 16 APT Advanced Persistent Threat Time to rethink?

The Spear Experiences (1) Targeted users 17 APT Advanced Persistent Threat Time to rethink?

The Spear Experiences (2) Fooled users Insider info (disgruntled employee) Stolen laptop Compromised e-mail account? Does Corporate templates Culture/language habits Systems, typical e-mail it really matter? Autopilot The myth of templates 18 APT Advanced Persistent Threat Time to rethink?

The Spear Experiences (3) Successful exploits Insider info (disgruntled employee) Stolen laptop Zero-day exploit Custom payload 19 APT Advanced Persistent Threat Time to rethink?

What would be your conversion rate? Targeted users: 1 in 4 Fooled users: 1 in 3 Successful exploits: 1 in 2 20 APT Advanced Persistent Threat Time to rethink?

Remote control 21 APT Advanced Persistent Threat Time to rethink?

Remote control Poison Ivy 22 APT Advanced Persistent Threat Time to rethink?

Remote control Metasploit - Meterpreter 23 APT Advanced Persistent Threat Time to rethink?

Remote control Metasploit - Meterpreter 24 APT Advanced Persistent Threat Time to rethink?

Remote control Myths and reality We use proxies to access the Internet, which require username-password authentication The typical exploit injects the code responsible for communication into Internet Explorer IE authenticates automatically at the proxy as the logged in (attacked) user 25 APT Advanced Persistent Threat Time to rethink?

Once we are inside 26 APT Advanced Persistent Threat Time to rethink?

Once we are inside An attacker s heaven Normal business user Application access E-mail access Network (share) access Helpdesk access Privilege escalation Two-tier applications Direct database access Weak authentication schemes Access with admin role Weak passwords Unauthorized access Unpatched systems Exploits 27 APT Advanced Persistent Threat Time to rethink?

Once we are inside The reality Length of the patching cycle Ratio of unpatched devices Criticality of the system 28 APT Advanced Persistent Threat Time to rethink?

Once we are inside Where is your data? User Application Server Printer server User User Application Server User Mail Server User Application Server Admin File Server User 29 APT Advanced Persistent Threat Time to rethink?

Results of systems compromise Example #1 Several major VLANs compromised Access to undisclosed internal sensitive information Example #2 Several major VLANs compromised (DMZ, office, secure server) All critical systems compromised (all CAs and the HSM) Bankruptcy within 2 months of the attack Example #3 Access to undisclosed internal sensitive information Commonalities Skilled and customized attacks Access to sensitive information Sophisticated attempts to hide traces 30 APT Advanced Persistent Threat Time to rethink?

Conclusion 31 APT Advanced Persistent Threat Time to rethink?

APT The schematics Example #1 Spear phishing Example #3 Traditional systems compromise Do they look similar? It s not a coincidence... 32 APT Advanced Persistent Threat Time to rethink?

Defenses Prevent Defense in depth network zones Hardening on the external-facing and internal networks Detect IDS, IPS, anti-virus Awareness Log analysis Correct Incident response 33 APT Advanced Persistent Threat Time to rethink?

Conclusion Targeted and sophisticated attacks high probability to succeed External attacker internal attacker Prevent / detect / correct there is no silver bullet 34 APT Advanced Persistent Threat Time to rethink?

Contact Gergely Tóth Senior Manager Security & Privacy Tel: + 36 (1) 428 6607 Email: getoth@deloittece.com 35 APT Advanced Persistent Threat Time to rethink?

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.hu/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms..