Advanced Persistent Threat

Slides:



Advertisements
Similar presentations
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Advertisements

By Hiranmayi Pai Neeraj Jain
Cyber X-Force-SMS alert system for threats.
Norman SecureSurf Protect your users when surfing the Internet.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
APT29 HAMMERTOSS Jayakrishnan M.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Technical Implementation: Security Risks
Emerging Threats and Trends 2011
Air Force Research Labs Dept Homeland Security (HSARPA)
“Enterprise Malware Detection”
Air Force Research Labs Dept Homeland Security (HSARPA)
Proactive Incident Response
ACTIVE DEFENSE Leveraging Threat Intelligence in the Enterprise
Advanced Persistent Threat
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Botnets A collection of compromised machines
Abusing 3rd-Party Services For Command And Control
ACTIVE DEFENSE Leveraging Threat Intelligence in the Enterprise
Company Overview.
Advanced Persistent Threat
Detecting Tomorrows Threats Today
Tracking Cyber-threat Actors
Cyber-Crash and Bleed Anatomy of a Cyber Terrorist Attack on the Nation’s Hospital Infrastructure.
ARSTRAT Cyber Threat Center
Detect Malware No One Else Can… Rapidly Identify it’s capabilities, Mitigate the Threat with Actionable Risk Intelligence.
Analyzing Malware Behavior
Analyzing Malware Behavior
A lustrum of malware network communication: Evolution & insights
Malware Reverse Engineering Process
IT Security  .
Company Overview.
Emerging Threats and Trends 2011
Real-time protection for web sites and web apps against ATTACKS
Enterprise Botnet Detection and Mitigation System DHS Phase II SBIR Contract QUESTION: By a show of hands, how many of you believe that your networks.
Enterprise Botnet Detection and Mitigation System
DHS Phase II SBIR Contract Senior Security Engineer
Defeat Tomorrow’s Threats Today
Air Force Research Labs Dept Homeland Security (HSARPA)
Malware Reverse Engineering Process
Active Cyber Security, OnDemand
Overview.
Global Services.
Defeat Tomorrow’s Threats Today
ACTIVE DEFENSE Leveraging Threat Intelligence in the Enterprise
Analyzing Malware Behavior
Botnets A collection of compromised machines
Jon Peppler, Menlo Security Channels
Cybersecurity Awareness
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Chap 10 Malicious Software.
Panda Adaptive Defense Platform and Services
Chapter 4: Protecting the Organization
Chap 10 Malicious Software.
Marcial Quinones-Cardona
6. Application Software Security
Comodo Dome Data Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Advanced Persistent Threat What APT Means To Your Enterprise Greg Hoglund

APT – What is it? A human being or organization, who operates a campaign of intellectual property theft using cyber-methods Malware, malware, malware Basically, the same old problem, but it’s getting far worse and far more important than ever before

Wake Up Google cyber attacks a 'wake-up' call -Director of National Intelligence Dennis Blair http://www.csmonitor.com/USA/2010/0204/Google-cyber-attacks-a-wake-up-call-for-US-intel-chief-says

Command and Control Server Anatomy of APT Malware Survive Reboot Command and Control Server C&C Protocol File Search Process Injection Update Keylogger USB Stick

IP is Leaving The Network Right Now Everybody in this room who manages an Enterprise with more than 10,000 nodes They are STEALING right now, as you sit in that chair.

The Coming Age Advanced nations are under constant cyber attack. This is not a future threat, this is now. This has been going on for YEARS. Cyber Cartels are rapidly going to surpass Drug Cartels in their impact on Global Security The scope of finance will surpass drug cartels The extent of the operation internationally

Economy Russian Mafia made more money in online banking fraud last year than the drug cartels made selling cocaine An entire industry has cropped up to support the theft of digital information with players in all aspects of the marketplace

MI5 says the Chinese government “represents one of the most significant espionage threats” http://www.timesonline.co.uk/tol/news/uk/crime/article7009749.ece

Cash is not the only motive State sponsored (economic power) Stealing of state secrets (intelligence & advantage) Stealing of IP (competitive / strategic advantage – longer term) Infrastructure & SCADA (wartime strike capable) Info on people (not economic) i.e., political dissidents

Why malware isn’t going away

The True Threat Malware is a human issue Bad guys are targeting your digital information, intellectual property, and personal identity Malware is only a vehicle for intent Theft of Intellectual Property Business Intelligence for Competitive Advantage Identity Theft for Online Fraud

The Scale Over 100,000 malware are automatically generated and released daily. Signature based solutions are tightly coupled to individual malware samples, thus cannot scale.

Not an antivirus problem Malware isn’t released until it bypasses all the AV products! Testing against AV is part of the QA process AV doesn’t address the actual threat – the human who is targeting you AV has been diminished to a regulatory checkbox – it’s not even managed by the security organization, it’s an IT problem

Annealing Value Horizon Hardness of Windows remote RPC Use of Windows remote RPC overflows

Continuous area of attack Continuum Value Horizon Continuous area of attack Windows remote RPC GDI Image Bugs Flash Overflows IIS Server overflows

Technology Lifecycle Value Horizon Area of attack

Continuous Area of Attack By the time all the surfaces in a given technology are hardened, the technology is obsolete Value Horizon Continuous area of attack We secured java, but now we have flash We secure the web, but now we have Second Life Technology Lifecycle

The Global Malware Economy

A Global Theatre There are thousands of actors involved in the theft of information, from technology developers to money launderers Over the last decade, an underground economy has grown to support espionage and fraud This “malware ecosystem” supports both Crimeware and e-Espionage

Payment system developer $500+ Implant Vendor $1,000+ Exploit Pack Vendor $10,000+ for 0-day Exploit Developer $10,000+ for 0-day Rootkit Developer Rogueware Developer Back Office Developer $1000+ Wizard Bot Vendor eGold* ~4% of bank customers Payment system developer Country that doesn’t co-op w/ LE Secondary atm Keep 10% Victims Small Transfers A single operator here may recruit 100’s of mules per week $5,000 incrm. Drop Man Account Buyer Affiliate Botmaster ID Thief Endpoint Exploiters Keep 50% $100.00 per 1000 infections PPI Forger Cashier / Mule Bank Broker Sells accounts in bulk Country where account is physically located $5.00 per $50 Keep 10% *http://en.wikipedia.org/wiki/E-gold

China “There are the intelligence-oriented hackers inside the People's Liberation Army” “There are hacker conferences, hacker training academies and magazines” “Loosely defined community of computer devotees working independently, but also selling services to corporations and even the military” When asked whether hackers work for the government, or the military, [he] says "yes." http://news.cnet.com/Hacking-for-fun-and-profit-in-Chinas-underworld/2100-1029_3-6250439.html

C&C map from Shadowserver, C&C for 24 hour period

Crimeware Affiliate Networks Grown out of older adware business models

Pay-per-install.org

Earning4u Pays per 1,000 infections * http://www.secureworks.com/research/threats/ppi/

PPI Programs * http://www.secureworks.com/research/threats/ppi/

Custom Crimeware Programming Houses

Anatomy of an APT Operation

Anatomy of an APT Operation You must understand that an ongoing operation is underway – this involves one or more primary actors, and potentially many secondary actors

Malware Distribution Systems Large scale systems to deploy malware Browser component attacks Precise spear-phising attacks Contain boobytrapped documents Backdoored physical media USB, Camera, CD’s left in parking lot, ‘gifts’

Boobytrapped Documents This is the current trend Single most effective focused attack today Human crafts text

Social Networking Space Web-based attack Social Networking Space Injected Java-script Used heavily for large scale infections Social network targeting is possible

Trap Postings I www.somesite.com/somepage.php <script> Some text to be posted to… the site ….

Trap Postings II www.somesite.com/somepage.php <IFRAME src= style=“display:none”></IFRAME> Some text to be posted to… the site ….

SQL attack, inserts IFRAME or script tags SQL Injection www.somesite.com/somepage.php SQL attack, inserts IFRAME or script tags

‘Reflected’ injection Link contains a URL variable w/ embedded script or IFRAME * User clicks link, thus submitting the variable too Trusted site, like .com, .gov, .edu The site prints the contents of the variable back as regular HTML *For an archive of examples, see xssed.com

A three step infection Exploit Server Redirect Browser Exploit Injected Java-script Exploit Server Redirect 1010101010 Browser Exploit Payload Server Dropper

Eleonore (exploit pack)

Tornado (exploit pack)

Napoleon / Siberia (exploit pack)

Rogueware 35 million computers infected every month with rogueware* Many victims pay for these programs, $50-$70, and stats show bad guys are making upwards of $34 million dollars a month with this scam* Many are fake anti-virus scanners *http://www.pandasecurity.com/img/enc/The%20Business%20of%20Rogueware.pdf

Rogueware

Payload Server A machine that has the actual malware dropper ready for download. The exploit server will redirect the victim to download a binary from this location

Command and Control Once installed, the malware phones home… TIMESTAMP SOURCE COMPUTER USERNAME VICTIM IP ADMIN? OS VERSION HD SERIAL NUMBER

Command and Control Server The C&C system may vary Custom protocol (Aurora-like) Plain Old Url’s IRC (not so common anymore) Stealth / embedded in legitimate traffic Machine identification Stored infections in a back end SQL database

Command and Control These commands map to a foreign language keyboard.

IRC C&C IRC control channel for a DDOS botnet Most of the C&C has moved to the web.

Triad (botnet)

ZeuS (botnet)

Fragus (botnet)

Implants The ‘persistent’ backdoor program Hide in plain sight strategy General purpose hacking tool Stealth capabilities In-field update capabilities

Poison Ivy (implant)

CRUM (protector)

Intellectual Property Threats

Steal Credentials Outlook Email Password Generic stored passwords

All the file types that are exfiltrated Steal Files All the file types that are exfiltrated

Staging Server A place to store all the stolen goods before it gets ‘exfiltrated’ Data is moved off the network in a variety of ways – ‘Hacking Exposed’ level behavior

Drop Site Sometimes the stolen data is moved to a tertiary system, not the same as the C&C

Drop-point is in Reston, VA in the AOL netblock

Attribution and Actionable Intelligence How Digital DNA™ works behind the scenes…

Digital DNA™ Automated malware detection Software classification system 3500 software and malware behavioral traits Example Huge number of key logger variants in the wild About 10 logical ways to build a key logger

Ranking Software Modules by Threat Severity Software Behavioral Traits Digital DNA™ Ranking Software Modules by Threat Severity 0B 8A C2 05 0F 51 03 0F 64 27 27 7B ED 06 19 42 00 C2 02 21 3D 00 63 02 21 8A C2 Malware shows up as a red alert. Suspicious binaries are orange. For each binary we show its underlying behavioral traits. Examples of traits might be “packed with UPX”, “uses IRC to communicate”, or “uses kernel hooking with may indicate a presence of a rootkit”. The blue bar shows the Digital DNA sequence for the binary iimo.sys. 0F 51 0F 64 Software Behavioral Traits

B[00 24 73 ??]k ANDS[>004] C”QueueAPC”{arg0:0A,arg} What’s in a Trait? 04 0F 51 B[00 24 73 ??]k ANDS[>004] C”QueueAPC”{arg0:0A,arg} The rule is a specified like a regular expression, it matches against automatically reverse engineered details and contains boolean logic. These rules are considered intellectual property and not shown to the user. Unique hash code Weight / Control flags The trait, description, and underlying rule are held in a database

Scalable Detection The “bad guy” keeps using the same methods Repeated use of the same exploit methods Repeated use of same C&C system Detect the rest of the malware using perimeter security and registry / file scans Cut off egress & C&C

Hunting Cyber Spies and Digital Criminals How HBGary keeps a constant edge…

Why fingerprint the developers? One actor leads to others, and subsequently more malicious technology that can be fingerprinted as well Relate separate infection events as part of the same operation, and likely the same attackers & intentions of attack Predict the kinds of attacks that will be launched in the future The ‘bad guy’ won’t go away, but you will catch him next time

Where Digital Fingerprints Occur Several actors in the underground economy will leave digital fingerprints Malware system components that have digital fingerprints (different developers for each): Distribution system Exploitation capability Command and Control Payload (what does it do once its in)

The developer != operator The developer may not have any relation to those who operate the malware The operation is what’s important Ideally, we want to form a complete picture of the ‘operation’ – who is running the operation that targets you and what their intent is

Same malware compiled in three different ways DISK FILE IN MEMORY IMAGE Same malware compiled in three different ways OS Loader MD5 Checksums all different Code idioms remains consistent

In-memory analysis tends to defeat packers IN MEMORY IMAGE Packer #1 Packer #2 Decrypted Original OS Loader In-memory analysis tends to defeat packers Starting Malware Packed Malware Unpacked portions remains consistent

Toolkits and developer signatures can be detected IN MEMORY IMAGE OS Loader Toolkits and developer signatures can be detected Malware Tookit Different Malware Authors Using Same Toolkit Toolkit Marks Detected Packed

Country of Origin Country of origin Is the bot designed for use by certain nationality? Geolocation of IP is NOT a strong indicator However, there are notable examples Is the IP in a network that is very unlikely to have a third-party proxy installed? For example, it lies within a government installation C&C map from Shadowserver, C&C for 24 hour period

Language Native language of the software, expected keyboard layout, etc – intended for use by a specific nationality Be aware some technologies have multiple language support Language codes in resources

Actor: Endpoint Exploiter Endpoint Exploiters Actor: Endpoint Exploiter $100.00 per 1000 infections The exploiter of the end nodes, sets up the XSS or javascript injections to force redirects Newcomers can learns various attack methods from their PPI affiliate site (mini-training) These are generally recruited hackers from forums (social space) The malware will have an affiliate ID “somesite.com/something?aflid=23857  look for potential ID’s – this ID’s the individual endpoint exploiter

Link Analysis URL artifact Unique Affiliate ID’s Codenamed Botmaster C&C Fingerprint Endpoints Link Analysis

Actor: Developers Sell bot systems for four figures $4,000 - $8,000 with complete C&C and SQL backend Sell advanced rootkits for low five figures Possibly integrated into a bot system Possibly used as a custom extension to a bot, integrated by a botmaster, $10,000 or more easily for this All of this development is strongly fingerprinted in the malware chain

Link Analysis We want to find a connection here C&C Fingerprint Botmaster URL artifact Affiliate ID Developer Protocol Fingerprint Endpoints Developer C&C products Link Analysis

Softlinking into the Social Space Where is it sold, does that location have a social space? If it has a social space, then this can be targeted Forum, IRC, instant messaging Using link-analysis, softlink can be created between the developer of a malware product and anyone else in the social space Slightly harder link if the two have communicated directly If someone asks for tech support, indicates they have purchased If someone queries price, etc, then possibly they have purchased

Link Analysis Software Author Software Author Social Space

Working back the timeline Who sells it, when did that capability first emerge? Requires ongoing monitoring of all open-source intelligence, presence within underground marketplaces Requires budget for acquisition of emerging malware products

Software Author Social Space i.e., Technical Support Query made AFTER version 1.4 Release Use of timeline to differentiate links Link Analysis

Actor: Vuln Researchers Paid well into the five figures for a good, reliable exploit $20,000 or more for a dependable IE exploit on latest version Injection vector & activation point can be fingerprinted Method for heap grooming, etc Delivery vehicle

Detect, Diagnose, Respond

Threat Intelligence Who is targeting you? What are they after? Have they succeeded? How long have they been succeeding? What have I lost so far? What can I do to counter their methods? Are there legal actions I can take?

Primary Internal Data Sources Endpoint physical memory snapshots There is more evidence in physical memory than any other source Physical memory is where Digital DNA™ will be calculated Other sources Message archives Netflow data

External Evidence Dropsite where IP is being dropped IP Address, Server Version, Country of Origin Command and Control Server Version of C&C, Fingerprint Designed to survive takedowns Hot staged failovers likely Exploit Pack Server Version of Exploit Pack, Fingerprint

Intel Feeds (external) malwaredomainlist.com abuse.ch spamcop.net team-cymru.org shadowserver.org

HBGary and Verdasys Integration Responder Professional Digital Guardian Console Analysis Reporting Policies Actions DG Server DG Agents (Endpoints) SQL Results Livebins Live Bins DDNA Extensions HBGary DDNA

Integrated License Management © 2009 Verdasys All rights reserved

DDNA Deployment & Activation Scheduled or ad hoc endpoint scans © 2009 Verdasys All rights reserved

Detect Malware alert reporting Configure risk reporting thresholds © 2009 Verdasys All rights reserved

Diagnose Extract malware (livebins) from endpoint nodes Analyze with HBGary Responder Professional © 2009 Verdasys All rights reserved

Respond Create DG policy rules to contain malware discovered by Digital DNA Examples Block host/hijacked applications from running Limit which apps can act on sensitive data Block network access to specific URLs/IDs Prevent read/write to files used by malware

Conclusion

Take Away ‘Hands off’ IDS and AV security isn’t enough to keep bad guys out Go ‘beyond the checkbox’ You have to investigate and respond to funded adversaries Determine their intent, and defend yourself against their methods DG + DDNA allows detection and rapid response countermeasures

HBGary Enterprise Offerings www.hbgary.com Digital DNA™ - Malware detection Without using signatures Based on malicious behaviors, developer code idioms, and trait patterns Integrated into Verdasys Digital Guardian Responder™ – Malware investigation and incident response platform