LEVERAGING PROACTIVE DEFENSE TO DEFEAT MODERN ADVERSARIES. Jared Greenhill RSA Incident Response. September 17 th, 2015



Similar documents
Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

RSA Security Anatomy of an Attack Lessons learned

Unified Security, ATP and more

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Integrating MSS, SEP and NGFW to catch targeted APTs

RSA Incident Response: An APT Case Study

Concierge SIEM Reporting Overview

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Advanced Threats: The New World Order

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

CASE STUDY USING ECAT AND SA. Running Circles Around Traditional IR Teams

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

RSA Security Analytics

Security Analytics for Smart Grid

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

JOOMLA REFLECTION DDOS-FOR-HIRE

Alert (TA14-212A) Backoff Point-of-Sale Malware

Network Security Monitoring

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6

Getting Ahead of Malware

DYNAMIC DNS: DATA EXFILTRATION

THE EVOLUTION OF SIEM

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

Analyzing HTTP/HTTPS Traffic Logs

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Persistence Mechanisms as Indicators of Compromise

Comprehensive Advanced Threat Defense

Old Web Shells, New Tricks

Threat Intelligence is Dead. Long Live Threat Intelligence!

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Detect & Investigate Threats. OVERVIEW

Cisco Advanced Malware Protection for Endpoints

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

ThreatSpike Dome: A New Approach To Security Monitoring

Breaking the Cyber Attack Lifecycle

Active Response: Automated Risk Reduction or Manual Action?

Detecting Threats Via Network Anomalies. Paul Martini Cofounder and CEO iboss Cybersecurity

Suricata IDS. What is it and how to enable it

After the Attack: RSA's Security Operations Transformed

Cisco Advanced Malware Protection for Endpoints

Intelligence Driven Security

Rashmi Knowles Chief Security Architect EMEA

Endpoint Threat Detection without the Pain

Deep Discovery. Technical details

Breach Found. Did It Hurt?

Crowbar: New generation web application brute force attack tool

Redline Users Guide. Version 1.12

MatrixSSL Getting Started

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats

REVOLUTIONIZING ADVANCED THREAT PROTECTION

FortKnox Personal Firewall

Bridging the gap between COTS tool alerting and raw data analysis

Automate the Hunt. Rapid IOC Detection and Remediation WHITE PAPER WP-ATH

Network Monitoring using MMT:

The session is about to commence. Please switch your phone to silent!

The Next Generation Security Operations Center

Covert Operations: Kill Chain Actions using Security Analytics

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Hunting for Indicators of Compromise

Defending Against Cyber Attacks with SessionLevel Network Security

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

DPI and Metadata for Cybersecurity Applications

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

SOURCEFIRE RNA (REAL-TIME NETWORK AWARENESS)

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Playing with Web Application Firewalls

UNMASKCONTENT: THE CASE STUDY

05 June 2015 A MW TLP: GREEN

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

Hunting for the Undefined Threat: Advanced Analytics & Visualization

Networks & Security Course. Web of Trust and Network Forensics

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Achieving PCI-Compliance through Cyberoam

Managing Latency in IPS Networks

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Discover & Investigate Advanced Threats. OVERVIEW

WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS

Modern Approach to Incident Response: Automated Response Architecture

How To Use Kiteworks On A Microsoft Webmail Account On A Pc Or Macbook Or Ipad (For A Webmail Password) On A Webcomposer (For An Ipad) On An Ipa Or Ipa (For

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Data Science Transforming Security Operations

DNS Update API November 15, 2006 Version 2.0.3

Evolution Of Cyber Threats & Defense Approaches

5 Steps to Advanced Threat Protection

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

NERC CIP Version 5 and the PI System

Transcription:

LEVERAGING PROACTIVE DEFENSE TO DEFEAT MODERN ADVERSARIES Jared Greenhill RSA Incident Response September 17 th, 2015

Current State of Detection Many organization's depend on alerts and feel this provides an adequate detection mechanism. Examples Include: Signature based detection IDS/IPS/AV, In house alerting, filenames, hashes. Static defense is easy to get around for advanced threats This model is not proactive, but reactive in nature. Lacks focus on adversarial techniques, tactics & procedures. How do attackers use their tools & malware? Typical Attacker dwell times of approximately 1+ year. 2

Are We Being Proactive? The legacy mindset of alerting and defending in wait must change. Organizations must be prepared to defend themselves and bring capabilities in house take ownership of what s theirs. This starts with being proactive and hunting their infrastructures and datasets for signs of attacker activity. Need to move away from only signature based detection. Don t depend solely on sigs, use it to compliment behavioral based proactive hunting. 3

Hunting Starts with proactive hunting of datasets for attacker activity. This needs to occur on multiple levels. Eyes on glass with an experienced analyst Focus on: Endpoint and Network based detection. Signature based detection should compliment behavioral based proactive hunting. Let s consider: China Chopper IDS alert what do you do next? (later) How would you run this down? Verify at both the host/network level. 4

Global Triage Host Level Scheduled Tasks Shim Cache Analysis Auto Start Analysis Event Log Analysis Services Process List Process Dlls 5

Global Triage Job Related Scheduled Tasks why we care? Looking for lateral movement and malware execution artifacts Looking for At*.job attackers set up manual AT jobs and get this naming convention. Job Related Artifacts: C:\Windows\Tasks\Schedlgu.txt C:\Windows\Tasks\At*.job C:\Windows\System32\winevt\Logs\Microsoft-Windows- TaskScheduler* Looking to grab Microsoft-Windows-TaskSchedules%4Operational.evtx Vista + newer Windows systems. 6

Schedlgu.txt Windows Task Scheduler Output C:\Windows\Tasks\Schedlgu.txt Parsing Schedlgu.txt processing with grep Type *.* Grep A1 At > out.txt Triage method to detect Lateral movement & malware artifacts 7

Global Triage Job Related (At*.job files) Move At#.job files to a separate folder Run via PowerShell: Get-ChildItem foreach {e:\tools\jobparser.exe -f $_} >> results.txt 8

Global Triage Job Related (EVTX files) Move Microsoft-Windows-TaskScheduler%4Operational.evtx files to a separate folder, and run via PowerShell. Only extract At#.job files or review everything. Get-ChildItem foreach {e:\tools\logparser\logparser.exe - i:evt SELECT TimeGenerated,EventID,Strings,Computername,SID FROM $_ WHERE strings LIKE _At% -o:csv -q:on -stats:off} >..\At-jobs.csv Extract all job files Get-ChildItem foreach {e:\tools\logparser\logparser.exe -i:evt SELECT * FROM $_ -o:csv -q:on -stats:off} >..\ALL-jobs.csv 9

ShimCache What is it? Shimcache or AppCompactCache Created to track compatibility issues A forensic goldmine! Records file path, size, last modified, last exec time (if supported by OS) File execution logged if file executed via CreateProcess(). HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatibility\AppCompatCache (XP) HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\AppCompactCache\AppCompatCache 10

Global Triage ShimCache System Hive Request: C:\Windows\system32\config\SYSTEM Move system files to a unique folder Run: Shim.py d unique modified version of Mandiant s shimcache parser: https://github.com/mandiant/shimcacheparser Results saved to.csv GREP away looking for suspicious stuff Filename searches Non-standard extensions (.txt,.gif,.jpg,.log) Date, size, path related searches Etc. 11

Global Triage ShimCache (ShellCrew Artifacts) RedactedHost,07/14/09 01:16:12,N/A,D:\temp\Exchange\dllhost.exe,N/A,True RedactedHost,07/14/09 01:16:12,N/A,C:\Windows\Temp\hotfix.log,N/A,True RedactedHost,07/14/09 01:16:12,N/A,D:\temp\hotfix.log,N/A,True RedactedHost,07/14/09 01:16:12,N/A,D:\temp\dllhost.exe,N/A,True RedactedHost,07/14/09 01:16:12,N/A,D:\temp\setup.log,N/A,True RedactedHost,07/14/09 01:16:12,N/A,c:\Temp\EVTLOGS\hotfix.log,N/A,True RedactedHost,07/14/09 01:16:12,N/A,C:\Windows\Temp\showmbrs.log,N/A,True HOHUMCOC1,07/14/09 01:16:12,N/A,SYSVOL\temp\setup.log,N/A,True RedactedHost,07/14/09 01:16:12,N/A,SYSVOL\temp\dllhost.exe,N/A,True RedactedHost,07/14/09 01:16:12,N/A,C:\setup.log,N/A,True RedactedHost/14/09 01:16:12,N/A,C:\setup.gif,N/A,True RedactedHost,07/14/09 01:16:12,N/A,C:\temp\setup.gif,52224,N/A RedactedHost,07/14/09 01:16:12,N/A,C:\temp\setup.gif,N/A,True RedactedHost/14/09 01:16:12,N/A,C:\hotfix.log,N/A,True RedactedHost/14/09 01:16:12,N/A,C:\Temp\setup.gif,52224,N/A RedactedHost,07/14/09 01:16:12,N/A,C:\temp\setup.gif,52224,N/A RedactedHost,07/14/09 01:16:12,N/A,C:\Temp\setup.gif,52224,N/A 12

Global Triage Job Related (.EVTX files) 13

Examine Malware & Generate YARA signatures Yes, signatures can still help! Find unique functions, EG. encoders/decoders Mix signature with unique strings specific to malware Strings only YARA signatures provide mixed results Sweeping your environment with Yara sigs. 14

Network Based Hunting Full packet capture is ideal for this. HTTP typically accounts for a large amount of network traffic. Great 1 st protocol to inspect. Inbound/Outbound inspection can reveal malicious/anomalous activity. HTTP POSTs occur 10x more than GETs Review POSTs to DMZ webservers (Webshells are bad!). DynDns traffic and suspect TLD s. Direct to IP communication, especially with binary payload. Uncommon ports? Traffic not inline with port usage. Port 443 & not SSL 15

Network Based Hunting China Chopper Commonly used Advanced Actor webshell Cross Platform Can use Javascript (.js), PHP (.php) & ColdFusion (.cfm) RAT CLI access, Send/Receive files, File mod Server Side Client code: Code is embedded on a functional webpage IIS webserver.aspx webpage ex. 404.aspx 16

China Chopper CMDs via HTTP POST POST /401.aspx HTTP/1.1 Cache-Control: no-cache X-Forwarded-For: 192.168.1.29 Referer: http://8.8.8.8 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) Host: 192.168.1.29 Content-Length: 1115 Connection: Close password=response.write("-> ");var err:exception;try{eval(system.convert.frombase64string("dmfyigm9bmv3ifn5c3 RlbS5. )) cd /d "D:\Content\webserver\"&ping -n 1 10.10.1.69 17

Final Thoughts Challenge yourself and your organization's ability to detect badness. Next, work on doing is faster Learn from your mistakes! Document findings, tighten gaps & Integrate new IOC s Know your inventory! Ensure all endpoints have visibility (host/network both is best!). Monitor your most sensitive data closely and segregate it ACL s/preventative measures Ingest, Analyze and Automate. Detection Confirm Badness Automate Alerting Keep Hunting in a Proactive Manor. 18

Contact jared.greenhill@rsa<dot>com @jared703 on Twitter 19

EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.