Conquering all phases of the attack lifecycle

Slides:



Advertisements
Similar presentations
An Analysis of Recent Cyber Attacks WADE WILLIAMSON.
Advertisements

Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
ECE Prof. John A. Copeland Advanced Persistent Threat Material.
RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Security Issues and Challenges in Cloud Computing
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Network Security Testing Techniques Presented By:- Sachin Vador.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
How do worms work? Vivek Ramachandran Nagraj – An Indian comic book hero, who commands all the snakes of the world.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Advanced Persistent Threats (APT) Sasha Browning.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Sky Advanced Threat Prevention
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Russell Rice Senior Director, Product Management Skyport Systems
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Introduction SQL Injection is a very old security attack. It first came into existence in the early 1990's ex: ”Hackers” movie hero does SQL Injection.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
An Anatomy of a Targeted Cyberattack
Proactive Incident Response
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
WannaCry/WannaCrypt Ransomware
Network security Vlasov Illia
Stopping Attacks Before They Stop Business
CISOs Guide To Communicating WNCRY.
Industrial Control System Cybersecurity
WannaCry/WannaCrypt Ransomware
Six Steps to Secure Access for Privileged Insiders and Vendors
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Malware Reverse Engineering Process
Microsoft Ignite /2/2018 6:37 AM BRK2293
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
Six Steps to Secure Access for Privileged Insiders and Vendors
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Incident Detection and Response
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Intercept X for Server Early Access Program Sophos Tester
CS4622: Computer Networking
Malware, Phishing and Network Policies
What Makes a Network Vulnerable?
Validating Your Information Security Program (ISP 3 of 3)
Shifting from “Incident” to “Continuous” Response
Network Security: DNS Spoofing, SQL Injection, ARP Poisoning
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Cybersecurity and Cyberhygiene
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Test 3 review FTP & Cybersecurity
Introduction to Internet Worm
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Engineering Secure Software
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Conquering all phases of the attack lifecycle

The Headlines: Damage. Damage. Damage. http://techcrunch.com/2014/12/16/hack-sony-twice-shame-on-sony/ http://www.bloomberg.com/news/2014-12-19/staples-says-1-16-million-cards-affected-in-breach.html http://www.wsj.com/articles/j-p-morgan-says-about-76-million-households-affected-by-cyber-breach-1412283372 http://www.bbc.com/news/technology-25681013 http://www.wsj.com/articles/home-depot-breach-bigger-than-targets-1411073571

The Technical Headlines: Penetration. http://www.computerworld.com/article/2862578/twofactor-authentication-oversight-led-to-jpmorgan-breach-investigators-reportedly-found.html http://www.scmagazine.com/home-depot-breach-caused-by-windows-vulnerability/article/382450/ http://www.securityweek.com/target-confirms-point-sale-malware-was-used-attack http://dealbook.nytimes.com/2014/12/22/entry-point-of-jpmorgan-data-breach-is-identified/?_r=0

The Attack Lifecycle Penetration ↓ Hacking operation ↓ Breach detected Damage Sec. Min. Hrs. Days Weeks Months Time Breach C & C Recon Spread Damage

The Attack Lifecycle

External Recon Social Networking Conferences Call Help Desk or Admin External Scans Buy Information/Tools in Black Market

Breach: Penetration. Privilege escalation. Obfuscation. Phishing & spear phishing Vulnerability exploit Social Engineering Infected USB drive Compromised credentials Autorun Process Injection Breach C & C Recon Spread Damage

Process Injection Evasion Reading host process memory Running another procedure as a thread inside another process. Evasion Reading host process memory Affecting host process behavior

Process Injection Code injection is a great way to hide yourself. It's a great way to gain privileges to do things that might be blocked otherwise. This is part of the first step of an attack, part of the [foothold]. If we're able to identify this specific technique, we can stop the attack in the very, very early stage.

Command & Control Operation. Exfiltration. Legitimate HTTP Legitimate DNS request Fust Flux TOR Facebook / Twitter / YouTube comments Domain Generation Algorithm Breach C & C Recon Spread Damage

Command & Control Domain generation algorithm Regular C&C servers can be blacklisted and firewalled DGA is generating a daily domain list (1000’s of domains) Malware tries to resolve each one of those random domains. The attack (who created the algorithm) knows which domains will be generated. Once a certain C&C domain is blocked, attacker can select one of the daily generated domains, register it and continue his endeavors. Breach C & C Recon Spread Damage

Command & Control DGA Breach C & C Recon Spread Damage

Recon Scanning ARP scanning SYN scanning FYN scanning Port scanning ("half-open scanning“) FYN scanning Port scanning Breach C & C Recon Spread Damage

Reconnaissance Port Scanning Services are using ports to communicate (HTTP = 80, DNS = 53, etc.) When an attacker gets a foothold on a computer, he needs to move around the organization. The attacker scans the subnet to find exposed and exploitable services on other computers and platforms. Once an open port is found, further exploitation occurs.

Reconnaissance Port Scanning

Spread Pass The Hash/Ticket Shares PSExec Lateral movement - Legitimate tools used maliciously. Pass The Hash/Ticket Shares PSExec Breach C & C Recon Spread Damage

Spread PSEXEC - Legitimate tools used maliciously. A legitimate tool by Microsoft. Commonly used by IT professionals Allows to run a process on a remote machine interactively. Attackers use that technique to spread their malware through an entire network. Breach C & C Recon Spread Damage

Lateral Movement --- Pass-the-ticket

Lateral Movement --- Pass-the-ticket

Damage. Business. Money. Physical. Breach C & C Recon Spread Damage

The Attack Lifecycle

www.cybereason.com Thank you.