Professional Malware is Unstoppable

Slides:



Advertisements
Similar presentations
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Advertisements

By Hiranmayi Pai Neeraj Jain
New trends on cyber security - Cyber Espionage & Identity theft By K S Yash, CRO 1.
1© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threat Sachin Deshmanya & Srinivas Matta.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Ether: Malware Analysis via Hardware Virtualization Extensions Author: Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee Presenter: Yi Yang Presenter:
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Rootkits Jonathan Barella Chad Petersen. Overview What are rootkits How do rootkits work How to detect rootkits How to remove rootkits.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
bitdefender virus protection
Understanding and breaking the cyber kill chain
Technical Implementation: Security Risks
Computer safety Filip Hruby.
Air Force Research Labs Dept Homeland Security (HSARPA)
“Enterprise Malware Detection”
Air Force Research Labs Dept Homeland Security (HSARPA)
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Botnets A collection of compromised machines
Company Overview.
Ilija Jovičić Sophos Consultant.
Live Malware Analysis for the Incident Responder
Detect Malware No One Else Can… Rapidly Identify it’s capabilities, Mitigate the Threat with Actionable Risk Intelligence.
A lustrum of malware network communication: Evolution & insights
Malware Reverse Engineering Process
3.6 Fundamentals of cyber security
Company Overview.
Enterprise Botnet Detection and Mitigation System DHS Phase II SBIR Contract QUESTION: By a show of hands, how many of you believe that your networks.
Enterprise Botnet Detection and Mitigation System
Lecture 8. Cyber Security, Ethics and Trust
Defeat Tomorrow’s Threats Today
Air Force Research Labs Dept Homeland Security (HSARPA)
Malware Reverse Engineering Process
Active Cyber Security, OnDemand
Overview.
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
Conquering all phases of the attack lifecycle
Cyber Security By: Pratik Gandhi.
Home Computer Security
Protect Your Computer Against Harmful Attacks!
Botnets A collection of compromised machines
Jon Peppler, Menlo Security Channels
Teaching Computing to GCSE
Computer Security Elaine Munn Introduction to Computer Security.
NET 311 Information Security
Risk of the Internet At Home
Intercept X for Server Early Access Program Sophos Tester
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
David J. Carter, CISO Commonwealth Office of Technology
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Security.
Chap 10 Malicious Software.
Computer Security By: Muhammed Anwar.
Test 3 review FTP & Cybersecurity
Marcial Quinones-Cardona
Spam, Scam, and Slam Ira Goldstein –
Presentation transcript:

Professional Malware is Unstoppable It’s time to build a better mousetrap

Agenda Problem: Malware Growth What is Professional Malware? Why Cybercrime is thriving… Recent Attack Trends unstoppable Recent Anti-Detection Trends Almost unstoppable Next Generation Countermeasures Detect, Diagnose, Respond

New Malware Daily

Cybercrime Evolution Cybercrime Authors have evolved over the last 30 years Continued improvement and innovation Capitalistic Shadow Economy - Competition Malware Authors Professional Software Development Lifecycle model Professional Quality Assurance Malware doesn’t ship until code is undetected by latest Antivirus products Guarantee’s are provided – think SLA

What is Professional Malware? 0 out of 40 Antivirus Detected readme.pdf This file was a zero day attack.. No Antivirus detection

What is Professional Malware? Malware developed with a budget Rootkits, Trojans, keystroke loggers, bots, viruses Malware developed with a goal Cybercrime Cyber-espionage New and Unknown techniques No Signatures Zero Day Exploits Anti-Detection & Anti-Forensics

Professional Malware requires QA Quality Assurance is robust Labs are setup with “all” security products Antivirus Personal Firewalls IDS/IPS Data Leak Prevention Malware authors guarantee their products are undetectable… Including service level agreement… New strains released upon detection

Goals of Professional Malware Compromise a machine undetected Gain complete control Identify & acquire “target” information Exfiltrate information surreptitiously Remain undetected – see next slide until target info is acquired as long as possible/necessary

Why is Cybercrime Thriving?

The Bad Guys are well funded and aggressive They’ve developed techniques to slip by our protections and detection systems

Software and people have vulnerabilities Security is only as strong as the weakest link

Recent Attack Trends “Unstoppable”

“This is the “bread and butter” of normal business operations today” Attack Trends Code gets into your network via Email – Spear phishing & Spam Browsing the Internet Web Browser bugs exploiting: Internet Explorer, Firefox, Safari, Opera Sharing Files – conducting business… Doc’s, Xls, pdf, ppt, mp3, zip, jpg “This is the “bread and butter” of normal business operations today”

2009 Attack Trends

2009 Attack Trends “Drive By Download”

Why is this a serious threat? The Attack Vector is very advanced… Basically unstoppable! Legitimate web sites are compromised Example foxnews.com compromised DOD for 2 weeks User’s browser is infected by visiting the site User doesn’t have to click on anything… Remains Hidden From Antivirus by code injection and rootkit techniques

Information Stealing Techniques Sniffs Usernames and Passwords All accounts – not just banks Transfers Money while you are logged into your bank account Man-in-the-browser Can bypass multiple levels of authentication 2 factor key fobs – think RSA SecureID

Defensive Techniques Anti Forensics Anti-Anti-Virus Network Traffic In-memory only payloads – no disk access Flash RAM based storage of code, no disk Encryption of disk-based assets Anti-Anti-Virus Recompile code – pack code – encrypt code Network Traffic Inject evil traffic in with legitimate web browsing Hiding in plain site

Defeating Forensics and Antivirus “Memory Tricks”

Dynamic, uploaded capability – no disk presence Non-persistant

Defeating Antivirus & Reverse Engineering

Packing & Code Obfuscation Themida is a commercial packer About $300 US Can make “Known” viruses undetectable by Antivirus 1 of the most advanced tools available Others: VMProtect

Defeating Live Analysis

Defeating Malware Analysis Sandboxes & Virtualization One of many “kits” available online This kit has techniques to defeat AntiVirus, Malware Analysis, Virtualization, Hardware Emulation, Debuggers, and Disassemblers

Defeating Personal Firewalls

Just interface lower in the driver chain Firewall ROOTKIT

Use your own driver Firewall ROOTKIT

Snip out the firewall Bypass Firewall X X ROOTKIT

Alter firewall logic directly to break it ROOTKIT

Why is this a serious threat? The Anti-Detection & Self Defense is very advanced… Host Detection: Bypasses all AV & Personal Firewalls New Rootkit techniques New variants come out every day Network Detection: Advanced covert communication system to avoid detection Looks like legitimate web traffic to real domains

So why are we all fighting against military grade cyber weapons?

Supply and Demand

Espionage Isn’t Just for Govt’s April 3rd, 2008 - "Espionage used to be a problem for the FBI, CIA and military, but now it's a problem for corporations. It's no longer a cloak-and-dagger thing. It's about computer architecture and the soundness of electronic systems.“ - Joel Brenner - Office of the Director of National Intelligence

100 – 200 Billion Dollar Industry Digital Black Market 100 – 200 Billion Dollar Industry Oct 24, 2008 – The Congressional Research Service study says cyber attacks cost $226 billion annually. Mar 2008 – PricewaterhouseCoopers research study says US$45 billion every year * Despite the significant impact, there is no clear framework for business executives to assess the financial impact of their cyber risks.

Build a better Mouse Trap The Opportunity Build a better Mouse Trap

Build A Better Mouse Trap The Opportunity Build A Better Mouse Trap

Next Generation Countermeasures

Next Generation Countermeasures Host Scanning Improvements Memory Forensics Automated Reverse Engineering Runtime Analysis Scalable Sandbox Analysis

Improved Host Scanning Engine Scanning Engines must evolve: Must be able to search physical memory Must be able to parse undocumented OS structures, such as process table or thread structures Must detect illegal modifications to the system Must provide improved behavioral identification Must create new algorithm for lower levels of visibility

Memory Forensics Memory Forensics is important why? Can Identify executable code hidden from AV Can overcome many of the advanced tricks posed by advanced malware Can detect illegal modifications to the system Is the only way to detect some of the latest threats

Running memory contains evidence

Automated Reverse Engineering Once you detect suspicious or unknown code you need to identify if it’s malicious or not… Automated Reverse Engineering provides critical intelligence: Is this written by kids or Professionals? How malware installs itself How to identify other compromised hosts How to clean it up How and to whom it communicates over the network What information it steals How it remains undetected….

Conclusion A motivated & funded adversary will get in… it’s a just matter of time… New & Improved security diagnostics ARE needed to keep up with the bad guys: Memory Forensics - better malware detection RAM today, E-Prom’s on motherboards & video card memory tomorrow Automated Malware Analysis and Debugging – real intelligence Hypervisor, Kernel, Emulation, Hooking, Hardware Malware Intelligence Sharing & Collaboration Platform Database of malware intelligence mined for intelligence purposes Law Enforcement Backing

Any Questions? For more information please contact sales@hbgary.com or call 301-652-8885