Leveraging Continuous View to Hunt Malware. Why hunt for malware? Scanned services Unauthorized systems Patches Config Unauthorized software Malware Malware.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

3D Tool Examples Dave Breslin Tenable Discussions Forum)
Standardized Threat Indicators Tenable Formatted Indicator Export Adversary Analysis (Pivoting) Private and Community Incident Correlation ThreatConnect.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
Using PI to Aggregate & Correlate Security Events to Detect Cyber Attacks Dale Peterson Digital Bond, Inc.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
By Hiranmayi Pai Neeraj Jain
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
The Most Analytical and Comprehensive Defense Network in a Box.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 SIEM Based Intrusion Detection Jim Beechey March 2010 GSEC Gold, GCIA Gold, GCIH,
Vulnerability Assessments with Nessus 3 Columbia Area LUG January
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
1 Enabling Secure Internet Access with ISA Server.
Vulnerability Types And How to Use Them.
Security Guidelines and Management
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Norman SecureSurf Protect your users when surfing the Internet.
Using Iterators in Reports
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Malware Hunter How To Guide for SecurityCenter Continuous View™
Server tools. Site server tools can be utilised to build, host, track and monitor transactions on a business site. There are a wide range of possibilities.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
The Most Analytical and Comprehensive Defense Network in a Box.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Supplied on \web site. on January 10 th, 2008 Reducing Risk Through Incremental Malware Detection January 2008.
©2015 Check Point Software Technologies Ltd. 1 Rich Comber SME, Threat Prevention Check Point Software Technologies Moving to a Prevent Based Security.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Standardized Threat Indicators Indicator Export Adversary Analysis (Pivoting) Private and Community Incident Correlation ThreatConnect Intelligence Research.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Integrating and Troubleshooting Citrix Access Gateway.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
Footprinting and Scanning
Role Of Network IDS in Network Perimeter Defense.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Copyright ©2016 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training What’s New in Dimension v2.1.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 7: Identifying Advanced Attacks
Footprinting and Scanning
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Virtualization & Security real solutions
IIS.
Reduce the attack surface overnight
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
The Next Generation Cyber Security in the 4th Industrial Revolution
Chapter 4: Protecting the Organization
Cybersecurity Simplified: Phishing
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Leveraging Continuous View to Hunt Malware

Why hunt for malware? Scanned services Unauthorized systems Patches Config Unauthorized software Malware Malware is another form of vulnerable software that has been introduced into your network. Hunting modern malware is much more about enterprise vulnerability and configuration auditing that traditional anti-virus agent based discovery. At one end of the spectrum, finding an open port can make you fail a compliance audit. On the other end of the spectrum, you can have a fully patched systems with a RAT, Trojan, botnet,.etc on it. Traditional Vulnerability Management

Advanced Analytics Massive App Library Updated Daily. Dashboard and Report Designer Connectors for Complete Context Unique Sensors 100% Asset Discovery YOUR NETWORK Unique Underlying Architecture

Port Scans Botnet Malware System Tests Real-time Ports User Agents Network Logs DNS & Web Queries Netflow Process Logs Botnet Anomalies

2D Dashboards Data mining 3D Visualization Spreadsheets Command Line Tools

Topics Sweet Orange RedKit ComFoo RAT Zeus P2P Neutrino Tenable Botnet/Malware Detection Technology

Hunting for IP Addresses Sweet Orange Exploit Kit

List of IP addresses associated with Sweet Orange URI associated with systems redirected to Sweet orange web pages

Create watchlist

LCE has events (mostly from PVS) to these IPs

Example URI from blog: Detected query with PVS: The sniffed URIs match URI !!!

Indicators from May 2013 DHS Weekly Synopsis Product RedKit

Keyword search for PVS plugin 7039 Generic SC searches for Nessus scan results Manual search of hosted URL/URI content in any result, including port Independent PVS 7039 Are we hosting RedKit content?

Did someone query RedKit content? Search LCE proxy logs Search PVS Web logs Search PVS & DNS logs Refine search to avoid generic match Search PVS logs: Example Domain_Summary query

Secrets of the Comfoo Masters Comfoo RAT

Look for failed credential Nessus scans “ipnat” running in system logs

PVS will log the queries and they can be discoverable as shown below.

Nessus web scan results – which ports? PVS web scan sniffing results – all ports!

PVS plugin 2 – client side usage PVS plugin 16 – outbound client side usage

The detected port traffic on 1688 was bittorrent

type: AUDIT_POWERSHELL description: "Comfoo Masters - ServiceDLL Check" value_type: POLICY_TEXT value_data: "(cmmos.dll|jacpet.dll|javadb.dll|mszlobm.dll|netfram.dll|netman.dll|ntdapie.dll|ntdelu.dll|ntobm.dll|odbm.d ll|senss.dll|suddec.dll|tabcteng.dll|vmmreg32.dll|wini nete.dll)” powershell_args : "Get-ItemProperty HKLM:\system\CurrentControlSet\Services\*\Param eters | select PSPath,ServiceDll | format-list" check_type : CHECK_NOT_REGEX powershell_option : CAN_BE_NULL Search registry for evidence of Comfoo.

type : AUDIT_POWERSHELL description: "Comfoo Masters - Find DLLs" value_type : POLICY_TEXT value_data : "" powershell_option: CAN_BE_NULL powershell_args: "get-childitem -recurse c:\ -include cmmos.dll,jacpet.dll,javadb.dll,mszlobm.dll,netfram. dll,netman.dll,ntdapie.dll,ntdelu.dll,ntobm.dll,odbm.dl l,senss.dll,suddec.dll,tabcteng.dll,vmmreg32.dll,wini nete.dll -erroraction silentlycontinue|select directory,name|format-list" Search file system for evidence of Comfoo.

257 domain names Powerful command-line search associative-search.sh Searches DNS, MD5 & SSL message/19698#19698 Ran 1 hour to search all domain names across 6 months of data

ZeuS-P2P

Infected computer has BOTH UDP and TCP ports open between 10,000 and 30,000

Manually finding systems with TCP and UDP ports between 10,000 and 30,000 is tricky. Need to save a list of IPs with UDP 10,000 to 30,000 and then filter that list with a TCP filter of 10,000 to 30,000 Filter on an asset list of IPs with UDP ports 10k to 30k for those IPs with TCP ports in the same range.

These hashes were already part of the malware cloud database; i.e., Nessus or LCE Client would have found these.

A New Exploit Kit in Neutrino Neutrino

Also Covered at MalwareSigs Neutrino Take IPs from blog post and create a SecurityCenter watchlist named Neutrino

Search for any hits in past 30 days and then do a port summary to see port 8000 activity. Search for any hits in past 30 days and then do a port summary to see port 8000 activity. Extend search to 50 days and see some more activity.

VirusTotal claimed the following DNS names were in use by Neutrino on various dates

On Aug 5, we saw lots of queries for ifjtjdhcywssbhdxk.dyndns-mail.com recorded by the PVS. This DNS name was NOT on the list from the blog for Aug 5 th nor any other day, but was very close. Differences in DNS names at VirusTotal and in “live” use can result from many things including variants and different behaviors based on where it is run.

Tenable Botnet/Malware Detection Technology

Passive Web Traffic Analysis Malicious Process Detection Botnet Detection based on IP reputation

PVS passively logs all DNS lookups, web queries and network traffic in real-time. This event indicates there have been nine web queries in the past 30 days which were related to known botnet activity.

These are the nine queries, each one to a known malicious botnet or malware related site.

Nessus scans identify malicious processes with cross-industry index of known bad hashes

LCE Windows agents perform malware detection on all running processes.

The LCE checks all IDS, login, netflow & PVS logs against a botnet reputation database

Nessus checks systems for active botnet connections, settings and content

Nessus also identifies systems running unique and unknown processes

Each of these checks, and many others, is leveraged by real- time dashboards to identify malware