Presenter: Jim White from Fortinet

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
By Hiranmayi Pai Neeraj Jain
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
APT29 HAMMERTOSS Jayakrishnan M.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Spyware, Viruses and Malware What the fuss is all about.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
Topic 5: Basic Security.
Malicious Software.
Computer Skills and Applications Computer Security.
Understand Malware LESSON Security Fundamentals.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
CompTIA Security+ Study Guide (SY0-401) Chapter 9: Malware, Vulnerabilities, and Threats.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Computer safety Filip Hruby.
Proactive Incident Response
Escalation Of Ad Wars Boosts Malware Delivery
Chapter 40 Internet Security.
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
Botnets A collection of compromised machines
What they are and how to protect against them
Ilija Jovičić Sophos Consultant.
Three Things About Malware
3.6 Fundamentals of cyber security
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
Network security threats
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Malware, Anti-malware & Rats
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Botnets A collection of compromised machines
NET 311 Information Security
Computer Applications Unit B
Risk of the Internet At Home
Malware, Phishing and Network Policies
Chap 10 Malicious Software.
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Chap 10 Malicious Software.
Computer Security By: Muhammed Anwar.
WJEC GCSE Computer Science
Test 3 review FTP & Cybersecurity
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction to Internet Worm
6. Application Software Security
Presentation transcript:

Presenter: Jim White from Fortinet Playing in the Sandbox Presenter: Jim White from Fortinet

Presentation overview Related terms and definitions to Advanced Persistent Threats/Attacks and Sandboxing Explanation of the threats What is sandboxing Benefits of sandboxing Lessons from the past Create an ATP Action Plan

The many definitions of Advanced Persistent Threat … APT is a set of stealthy and continuous computer hacking processes, often orchestrated by human(s) targeting a specific entity. APT is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.  APT refers to a cyberattack launched by an attacker with substantial means, organization and motivation to carry out a sustained assault against a target. An APT is advanced in the sense that it employs stealth and multiple attack methods to compromise […]. The attack is difficult to detect, remove, and attribute. An APT is persistent because the attacker can spend months gathering intelligence […]. It is threatening because perpetrators are often after highly sensitive information, such as the layout of nuclear power plants or codes to break into U.S. defense contractors.

Advanced Targeted Threats/Attacks APT could be considered as a subset of ATA Both are advanced attacks and share common criteria like long-term infiltration, stealth and sophisticated techniques ATAs are pragmatic: they are likely designed to steal confidential information or intellectual property APTs are dogmatic: they are largely driven by emotional or philosophical motivations, primarily politics. Business disruption is the main goal of such attacks

APT/A Related Definitions The following will be a list of commonly used terms and brief definitions for each term

Attacker An attacker is a program that performs a wide range of hacking related tasks without the user knowledge nor permission. Activities may include disabling an anti-virus software or personal firewall or modifying system settings.

Target The victim of an attack

Botnet A botnet is a group of computers, infected with a robot malware (the bot), that share program processing amongst them. Command & Control servers are central points used for the control of botnets. Bots will usually report back in some way, often via IRC or other simple messaging protocols, once a new system is infected, and will then receive commands from the central server. Among the most popular applications of botnets are the DDoS and spamming

A file infector is a computer virus. File infectors are malwares that are capable of attaching themselves to executable files, e.g. “calc.exe” and “notepad.exe”. When we run an infected file, we don’t notice that “calc.exe” is infected, since it still shows the calculator running properly. But, behind the scenes, the malware is doing its malicious activities. A file infector is a computer virus. foo.exe File Infection

Replication and Spreading Worm A computer worm is a standalone malware computer program that replicates itself in order to spread through the network to other computers. Unlike a computer virus, it does not need to attach itself to an existing program. Replication and Spreading

Stealer Stealer is a type of malware designed to steal information (credentials, address book, files, etc.) from the compromised computer. Multi-purpose key loggers are the most known technique that can record user credentials when the user is sign-in into an application. Some have the ability to make screenshots of the computer. Data exfiltration

Greyware A greyware is a program not classified as a virus but that has is annoying, undesirable. Often greyware performs a variety of undesired actions such as irritating users with pop-up windows, tracking user habits and unnecessarily exposing computer vulnerabilities to attack. Greyware encompasses spyware, adware, dialers, joke programs, remote access tools, and any other unwelcome files and programs apart from viruses

Adware The term adware is frequently used to describe a form of malware (malicious software), usually that which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up. !

Riskware Riskware covers legitimate programs which can cause damage when they fall into the hands of malicious users. Such software can be installed by a malware (ex.: WinVNC) or be already installed but can see their configuration modified (ex.: mIRC) without the user knowledge. IRC> JOIN #BOTNET

Downloader A downloader is a malware that will download and install other malwares onto a computer without the user knowledge. Downloader architectures involve generally an Command and Control channel as well as a download channel. The downloader first contacts a C&C server in order to get the URL of the malware to download/install. Both channels generally use IRC/HTTP and may obfuscate their communication by using cyphering technologies or TLS protocols.

Dropper A dropper is a malware component designed to install another malware to a target system. In order to avoid virus detection, the malware code is usually embedded into the dropper (single stage) or may be downloaded (two stages). foo.exe Drop File

Rootkit A rootkit is a type of software designed to hide the fact that an operating system has been compromised. Rootkits themselves are not harmful; they are simply used to hide malware.

Most popular code injections: Injector Code injection is a method that force a legitimate program to run a piece of malicious code. Most popular code injections: DLL: force a program to run with a malicious DLL that override legitimate system calls with malicious code. Web-based: force the browser to execute some malicious code without the user knowledge (i.e. drive-by attack) <iframe src=”http://malware.tld/foo.js” width=0 …

Trojan A Trojan is a program that appears legitimate, but performs some illicit activity when it is run.

Hijack Hijacking is a type of network security attack in which the attacker takes control of a communication. One of the most popular form of hijacking is the Man in the Middle There are also some malware whose purpose is to silently modify the browser settings (like the home page, the search engine, etc,). This techniques is called browser hijacking as the user is not aware of this modification (except when the browser is running).

Backdoor A backdoor is a method, usually hidden, of bypassing normal authentication of a computer system. It can take the form an installed program, a rootkit, a default password not changed or some debug commands that are not disabled by default.

Why are signatures based solutions are not enough? Zero Days Obfuscation Runtime Packers Encryption

Zero-day is like… The latest hit wonder…. You’re so 2000 and late! Who really understands it?

Zero-day Vulnerabilities (aka the known-unknown) […] attack that exploits a previously unknown vulnerability in a computer application A key component for maximizing the success of an advanced attack Easy to find or buy on continuously growing grey market Vulnerability publicly known Risk assessment and mitigation possible Vulnerability known to privileged group only mitigation not possible Vulnerability not discovered ? No exploitation or risk - not yet discovered Known Unknown Information to Public Vulnerability Source: https://www.nsslabs.com/system/files/public-report/files/The%20Known%20Unknowns_0.pdf

Obfuscation is like… Think of the Sci-Fi TV Show – FACE OFF Or shape shifting like X-Men’s Mystique Some files can mutate to change its appearance

Obfuscation In software development, obfuscation is the deliberate act of creating obfuscated code, i.e. source or machine code that is difficult for humans to understand. In the malware industry, this technique is massively employed to evade detection by anti-virus software.

Runtime packers is like… No, not those packers

Runtime A runtime packer is a (legitimate) software program used for obfuscating a malware. The result is a new executable file embedding the necessary code to unpack itself and launch the malicious code.

Encryption is like… The Matrix code - beware of Cypher!

Encryption Encryption is another obfuscation technique. The original executable file is embedded into a new one, containing a the decryption code and the key -OR- Where the malicious payload is delivered over through and encrypted session, like HTTPS / SSL / TLS, in an attempt to avoid detection in transit from Antivirus and IPS scanners

What other tools are there beyond Signature Protection? AV Heuristics Code Emulation Sandboxing

Heuristic Heuristic is a set of well-defined rules to apply to a problem in the hope of achieving a known result

Code Emulation A code emulator is a software which has the capability to take a program instruction by instruction and imitate what that program would do if it were ran. BUT, the code emulator will never allow a program to really do what it should do. It only tries to come to that program's goal and guess it with a set of heuristic rules.

What does Sandboxing offer? Sandboxing helps detect these advanced threats by coaxing malicious threats into exposing themselves

How does Sandboxing exposes threats? Sandboxing uses isolated and controlled environments designed to observe and record file behavior, typically in VMs After executing file(s) in the controlled VM environments, the sandbox analyzes behavior to determine any malicious intent within the target OS

Why Do You Need Sandboxing for Protection? Benefits of Sanboxing Detects advanced persistent threats Expose previously unknown malware Block more spear phishing attacks Increase effectiveness of your NGFW, or UTM or Secure Email Gateway solutions Increase incident response times Sandboxing provides the ability to detect &reveal details of new and nameless APTs & APAs

Will simply adding Sandboxing be enough effort? NO! Sandboxing technology alone is not enough to protect against APTs and ATAs Reminder: TARGET Corp. breach occurred while a sandboxing solution was present

Lesson Learnt! ATP - Advanced Threat Protection ATP is the framework that helps to protect against APT Advanced Persistent Threats and Advanced Targeted Attacks The framework covers techniques, processes and tools

Advanced Threat Protection Framework “The Action Plan” Access Control Next Generation Firewalls 2 Factor Authentication Vulnerability Management Threat Prevention IPS, App Control, DLP Deep Flow Antimalware Email/Web Filter Deep SSL Inspection Antibot Reduce Attack Surface Inspect and Block Threats Assess, Audit, Improve incidents Identify new Advanced Threat Detection File Sandbox analysis Network behavioral analysis Client reputation Botnet reporting Continuous Monitoring Regular Security Assessments Reporting Research SIEM/Log Mgt/Intelligence Service partners Validate and Contain Incident Response Research, Plan, Study & Practice! 39

Questions?

Time is up! Thank You