Combating the Next Generation of Advanced Malware



Similar documents
Advanced Persistent Threats

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Fighting Advanced Threats

Agenda , Palo Alto Networks. Confidential and Proprietary.

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Data Center security trends

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Breaking the Cyber Attack Lifecycle

Integrating MSS, SEP and NGFW to catch targeted APTs

A New Approach to Assessing Advanced Threat Solutions

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Advanced Persistent Threats

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

Advanced Persistent Threats

Advanced Persistent Threats

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Networking for Caribbean Development

RSA Security Analytics the complete approach to security monitoring or how to approach advanced threats

Unified Security, ATP and more

The Hillstone and Trend Micro Joint Solution

Malware, Zero Day and Advanced Attack Protection Analysis Zscaler Internet Security and FireEye Web MPS

The Next Level of Secure Channel Partnership

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Perspectives on Cybersecurity in Healthcare June 2015

Check Point: Sandblast Zero-Day protection

Spear Phishing Attacks Why They are Successful and How to Stop Them

Cisco Advanced Malware Protection

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

FortiGuard Security Services

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Securing the endpoint and your data

CYBER ATTACK DEFENSE A KILL CHAIN STRATEGY WHITE PAPER

Advanced Threats: The New World Order

A Modern Framework for Network Security in the Federal Government

McAfee Network Security Platform

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Covert Operations: Kill Chain Actions using Security Analytics

5 Design Principles for Advanced Malware Protection

Next Generation Firewalls and Sandboxing

Carbon Black and Palo Alto Networks

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Protection Against Advanced Persistent Threats

24/7 Visibility into Advanced Malware on Networks and Endpoints

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Report. Bromium: Endpoint Protection Attitudes & Trends Increasing Concerns Around Securing End Users

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Comprehensive Advanced Threat Defense

The Next Generation Security Operations Center

Content Security: Protect Your Network with Five Must-Haves

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

ENABLING FAST RESPONSES THREAT MONITORING

Defending Against Cyber Attacks with SessionLevel Network Security

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Securing Cloud-Based

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Symantec Advanced Threat Protection: Network

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible

Cloud Services Prevent Zero-day and Targeted Attacks

Cisco Advanced Malware Protection for Endpoints

Advanced Targeted Attacks

OPC & Security Agenda

Symantec Advanced Threat Protection: Network

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

You ll learn about our roadmap across the Symantec and gateway security offerings.

Unknown threats in Sweden. Study publication August 27, 2014

Beyond the Hype: Advanced Persistent Threats

Simple security is better security Or: How complexity became the biggest security threat

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

FROM PRODUCT TO PLATFORM

INDUSTRY OVERVIEW: FINANCIAL

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Transcription:

Peter McNaull Director of Technical Marketing WatchGuard Combating the Next Generation of Advanced Malware Surviving APT Attacks

Current State of AV Solutions Nearly 88% of malware morphs to evade signature-based antivirus solutions*

Attacking the Weakest Link Spear Phishing Watering Holes Chains-of- Trust

Zero Day Threat Curve Zero Day Malware AV Signatures - OS / Application

Opportunistic Attacks Targeted Attacks Malware (R)evolution Antivirus APT Detection NG APT Detection Polymorphic Persistent Threats Fluxing Evasive Threats Plain Virus Packing C&C Simple Threats Sophisticated Threats

Evasion Will Put APT Solutions to the Test Dynamic Evasion Stalling / Looping Checks for Environment Tool Kits Available for Download Defeats sandbox and virtual machines

What s an Advanced Persistent Threat (APT)? An Advanced Persistant Threat (APT) is a very high-tech, cutting edge attack leveraged to gain prolonged, stealthy control over a high value political or business target. Three APT Attributes: 1. Targeted 2. Advanced 3. Persistent

Stuxnet: Pandora s Box of APT Four zero day exploits Self replicates over LAN USB exploit jumps air gap P2P update mechanisms Stealthy C&C Kills security processes Kernel Windows rootkit Finds SCADA software (WinCC, Step7) Fingerprints Siemens ICS system First PLC rootkit

The Nation State Tactics for Criminal Gain Breached - Nov. 15, 2014 Disclosed - Dec. 18, 2014 40M CCNs stolen (Track 1 & 2 data) Attackers nabbed encrypted PINs 70M PII records stolen 0day POS Malware (BlackPOS variant) FTP used to exfiltrate data HVAC partner s creds used in attack Started with a spear phishing email Target ignored alerts warning of breach

APT Techniques Trickle Down to SMB Today, normal criminal malware exploits the same advanced tactics as nation-state APTs. Every organization is at risk of advanced threats! Zeus copies Stuxnet 0day Criminals use 0day malware (Cryptolocker) Zeus uses stolen certificates Criminal spear phishing Criminal watering hole attacks

Defending Against Advanced Threats

12 Focus on The Data Adopt Controls and Procedures that work together as a system to protect Data. Appropriate to Risk Appropriate to the Asset Being Protected Balance Access and Security Have a Plan When a Breach Occurs

Security Eco System Expanding Attack Surface Users Applications Connected Devices Expanding Access

Security Eco System Suspension Tires Wipers Headlights Seatbelts Airbags Defense-in-Depth

Advanced Threats Require Defense-in-Depth Advanced threats, by definition, leverage multiple vectors of attack. No single defense will protect you completely from an APT attacks The more layers of security you have, the higher chance an additional protection might catch an advanced threat that other layers might miss.

Best of Breed to Break The Attack Chain

APT Blocker - High-Resolution System Emulation System level Execution Individual CPU instructions Memory Accesses Analysis System Call Analysis Detects Evasion Providing a granularity and fidelity that exceeds competing approaches.

APT Blocker: Virtual Execution Sandbox Virtualizes a full victim system Runs unknown content in protected environment Analyzes behaviors Detects sandbox evasion Tracks additional malware & C&Cs Results Shared with All Sensors Adds Visibility

Actual APT Blocked AT HOME OFFICE! WG SE in Melbourne, Australia Activated APT Blocker What happened? His wife got an email with a PDF attachment (more specifically, a PDF in a zip) Gateway Anti Virus did not tag as malicious APT blocker caught the threat and recognized the PDF as bad

Visibility WatchGuard Dimension Advanced Malware in Security Dashboard 21

Visibility WatchGuard Dimension 22

Visibility WatchGuard Dimension Drill down to find why the activity is determined to be malware 23

Test Drive WatchGuard Dimension online! www.watchguard.com/dimension

Promotions: APT Blocker 30 days for Free Try-before-buy for APT Blocker on XTM APT Blocker comes pre-installed on all WatchGuard Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) appliances with a free 30-day trial.

Evaluation of our solutions before you decide to buy. Proof of Concept

A simple way to evaluate - WatchMode Traffic mirroring XTM850 & Above Collects Data Span port from your existing switch WatchGuard Dimension TM Real time monitoring/reporting of internet traffic Applications, URLs, Intrusions, etc No disruption to the existing network

Sample Report Showing Our Discoveries URL can be provided for you to monitor and track progress real time. Can be exported to a PDF report by yourself!

Please Contact: Check out our new website! www.watchguard.com WatchGuard Technologies, Inc. Hong Kong office Tel: +852.2824.8454 Fax: +852.2124.8376 Email: inquiry.hk@watchguard.com Unit 10-18, 32/F, Tower 1, Millennium City 1 388 Kwun Tong Road, Kwun Tong, Kowloon, Hong Kong