270 likes | 495 Views
Next Generation Threat Protection. Charles Wilkerson, Sr. Security Engineer Charles.wilkerson@fireeye.com. Introduction.
E N D
Next Generation Threat Protection Charles Wilkerson, Sr. Security Engineer Charles.wilkerson@fireeye.com
Introduction "While traditional antivirus [vendors] may be able to spot and deflect many kinds of attacks, they're not well-equipped to handle targeted attacks. But there are technologies able to detect such attacks, if not entirely prevent them, Pescatore said, from the likes of vendors such as FireEye, not McAfee or Kaspersky." About every five years, we get in a phase when attacks get ahead of defenses, and we're in one now," said Pescatore. Source: CIO Magazine, Aug. 23rd 2011 - http://www.cio.in/news/security-firms-knock-heads-over-shady-rat-hacks-163462011
The New Breed of Cyber Attacks • Nature of threats changing • Today’s attacks sophisticated and successful Cyber-Espionage and Cybercrime Advanced Persistent Threats Zero-Day Targeted Attacks Dynamic Trojans Stealth Bots Cybercrime Damage of Attacks Spyware/Bots Disruption Worms Viruses 2005 2007 2009 2011 2013 “Organizations face an evolving threat scenario that they are ill-prepared to deal with….threats that have bypassed their traditional security protection techniques and reside undetected on their systems.” Gartner, 2012
Numbers Show a Harsh Reality 2/3 of U.S. firms report that they have been the victim of cyber attacks Every second 14 adults become a victim of cyber crime 00.01 6.5x 40% of all IT executives expect a major cybersecurity incident Number of cyber attacks since 2006 95 9,000+ 115% CAGR unique malware since 2009 malicious websites identified per day new vulnerabilities discovered each week
What’s Changed? Dynamic, Polymorphic Malware Coordinated Persistent Threat Actors NEW THREAT LANDSCAPE Multi-Vector Attacks Multi-Staged Attacks
Advanced Targeted Attacks Defined • IPS and AV Signatures bypassed by: • Dynamic zero-day malware • Targeted attacks • Polymorphic malware The New Threat Landscape There is a new breed of attacks that are advanced, zero-day, and targeted ADVANCED • URL Filtering & Reputation bypassed by: • Dynamic, disposable, malicious domains • Framed and deep embedded content • Compromised legitimate Web sites Advanced Targeted Attack • Heuristics, Correlation, & Basic Emulation techniques are bypassed by: • Targeted attacks • Zero-day vulnerability attacks TRADITIONAL
The Attack Life Cycle – Multiple Stages Compromised Web server, or Web 2.0 site 1 Callback Server Exploitation of system 1 4 Malware executable download 2 Callbacks and control established 3 File Share 2 IPS 5 Data exfiltration 4 File Share 1 2 3 Malware spreads laterally 5
Traditional Defenses Don’t Work The new breed of attacks evade signature-based defenses Firewalls/NGFW THREAT Anti-SpamGateways IPS Secure WebGateways Desktop AV
A New Model is Required • Signature-Based • Reactive • Only known threats • False positives Legacy Pattern-Matching Detection Model New Virtual Execution Model MATCH MATCH 101011010101101000101110001101010101011001101111100101011001001001001000 100100111001010101010110 100100111001010101010110 100100111001010101010110 110100101101011010101000 • Signature-less • Dynamic, real-time • Known/unknown threats • Minimal false positives
Malware Analysis • What types of Malware Analysis should you do?
Building Blocks of the FireEye Platform Dynamic Threat Intelligence (CLOUD) Multi-Vector Virtual Execution engine Dynamic Threat Intelligence (ENTERPRISE) Technology Interoperability
Multi-Flow Virtual Execution (MVX) Dynamic Threat Intelligence Aggressive Capture of Suspicious Traffic Purpose-built Virtual Execution Contextual Detonation of Malware in Virtual Victim Visibility & Forensics of Full Attack LifeCycle Block Inbound Attack, Outbound Callbacks to C2 Crowd-Sourced DTI for Scalable, Global Protection Hourly Content Updates DynamicThreat Intelligence Uploaded to FireEye Cloud Zero-Day DTI Profile Shared across FireEye Installation Blocks Inbound Exploit Attempts Blocks Outbound C&C Callbacks
Advanced Malware Protection Architecture Dynamic Threat Intelligence • Real-time Web, Email, & File Security to stop Advanced Targeted Attacks • Centralized Management, Reporting • Augments Zero-Day gaps traditional security misses • FireEye Platform shares DTI with 3rd party products • Automation ensures higher detection accuracy & low TCO • Dynamic Threat Intelligence provides unique, zero-day intelligence Firewall CMS Anti-Spam IPS File Share 2 Web MPS Email MPS File MPS File Share 1 LAN Mail Servers MAS
FireEye Platform – Extending DTI Closer to the Breach SIA Partner Member Network Monitoring Endpoint
Council of Foreign Relations (CFR) Attack • Zero-day attack • Targets IE 8.0 browsers with OS language English, Chinese, Japanese, Korean, or Russian • Delivered only once per user • Infection vector: Drive-by downloads targeting visitors to www.cfr.org • Exploits vulnerability in Internet Explorer 8.0 • CFR influential in US foreign policy decisions • Accessed by high ranking government officials, including former presidents, secretaries of state, ambassadors, and leaders of industry • Perpetrated by nation state actors • Goal seems to be to gather business and/or military intelligence
Multi-Flow Analysis of Council of Foreign Relations Attack HTTP Compromised domain Client PC Microsoft MSHTML workaround Custom tools http://www.cfr.org • Independent, nonpartisan membership organization, think tank, and publisher: • Influential in US foreign policy decisions • Preeminent personalities and corporations as members • Develops foreign policy leaders • Accessed by lawmakers, govt. officials First instance of attack reported 3 6 7 5 2 1 4 JavaScript in compromised page Open window of attack Lateral spread Check browser version, country, first visit FireEye DTI recorded malicious content Microsoft advisory published Microsoft security bulletin released Exploit file Exploit for IE8 XOR (0x83) Exploit detection is critical Following phases of the attack can be hidden or obfuscated Backdoor C&C Callback 1 – User visits compromised or tainted website 2 – JavaScript in page checks infection criteria 3 – Exploit code downloaded after checks 4 – Backdoor downloaded with exploit 5 – Backdoor decoded on client machine 6 – Infected client connects with C&C server 7 – Infected client infects other devices on network C&C Server: Dynamic DNS provide.yourtrap.com
Operation Beebus Attack • APT campaign targeting aerospace and defense industry in waves • No pattern to attack • Multiple weaponized emails some day; single targeted email on others • Infection vector: Email and drive-by downloads • Exploits common vulnerabilities in PDF and DOC • Familiar document names used in attack • Encrypted communications with C&C server • Backdoor contains modules to download and execute additional payloads and updates • Potentially same nation state actors that breached RSA • Same server domain seen in callbacks • Known to be behind information stealing from at least 70 organizations
Multi-Vector Analysis of Operation BeebusAttack update.exe Apr 2011 UKNOWN Sept 2011 RHT_SalaryGuide_2012.pdf Dec 2011 • Key Attack Characteristics • Nation state driven attack using multiple vectors & files in campaigns spread over 2 years • Exploits known vulnerabilities in several Adobe products such as Reader and Flash Player • Targeted attacks - each campaign tried to compromise few specific individuals • Encrypted callback communications to hide exfiltrated data Timeline of attack – multiple vectors, multiple campaigns install_flash_player.tmp2 Feb 2012 Defense Industry 1 3 2 Conflict-Minerals-Overview-for-KPMG.doc dodd-frank-conflict-minerals.doc update.exe Mar 2012 SMTP / HTTP Weaponized Email (RHT_SalaryGuide_2012.pdf) Boeing_Current_Market_Outlook_…pdf Understand your blood test report.pdf RHT_SalaryGuide_2012.pdf Apr 2012 UAV/UAS Manufacturers May 2012 sensor environments.doc FY2013_Budget_Request.doc Dept of Defense FY12 …Boeing.pdf April is the Cruelest Month.pdf Backdoor Backdoor Aerospace Industry National Human Rights…China.pdf Jul 2012 Aug 2012 Security Predictions…2013.pdf C&C Server: worldnews.alldownloads.ftpserver.biz Encrypted callback Sept 2012 rundll32.exe UKNOWN сообщить.doc Nov 2012 Multi-vectored attack Jan 2013 install_flash_player.ex install_flash_player.tmp2 Global_A&D_outlook_2012.pdf 1 – Email/Web with weaponized malware 2 – Backdoor DLL dropped 3 – Encrypted callback over HTTP to C&C
APT Protection Requirements Multi-Vector protection (web, email, file, mobile) Address all stages of advanced attacks (inbound attacks, outbound callbacks, malware executable downloads) Understand the full context of an attack using multi-flow analysis Share threat data in real time locally and globally (Dynamic Threat Intelligence)
Summary • Today’s new breed of attacks are more advanced and sophisticated • Affects all verticals and segments • Traditional defenses can’t stop these attacks • Real-time, integrated signature-less solution is required across Web, email and file attack vectors • Integrated, cross-enterprise platform to stop today’s new breed of cyber attacks Complete Protection Against Today’s New Breed of Cyber Attacks Dynamic Threat Intelligence Cloud Central Management System Malware Analysis System Web Malware Protection System EmailMalwareProtectionSystem File Malware Protection System
GuidePoint Security - Uniquely Positioned Boutique Shops • Highly-technical consultants • Security R&D Consulting Firms • Professional consultants • Broad client experience System Integrators • Comprehensive solutions • Extensive program knowledge • Partnering/teaming • Small Business (BPA/IDIQ) Value-Added Resellers • Vendor agnostic • Experienced engineers System Integrators Consulting Firms Value-Added Resellers Boutique Shops
Technology Integration Services Architecture and Design Technology Implementation Optimization • Rack and Stack • Configuration and Hardening • Functionality, Regression and Performance Testing • Technology Support • Security Technology Review • Consolidation Assessment • Technology Optimization • Security Architecture Review • Target Architecture Design • Technology Implementation Architecture
Information Assurance Services Security Program Strategy Security Assessments Compliance Services Third Party Management • Application Penetration Testing • Perimeter Security Assessment • Cloud Security Assessments • Security Code Reviews • Social Engineering • PCI DSS Compliance Program Management • PCI DSS QSA Assessment Services • HIPAA / HITECH Compliance • ISO 27002 Compliance • Third Party Management Program Design • Third Party Assessments • Security Program Review / Implementation • Cloud Migration Strategy • Trusted Advisory Services • Incident Response / Forensics • Security Policy & Standards