APT in Corporate America and the Exposure to Foothold Scenarios Nathaniel Puffer Technical Lead, Neohapsis Labs.

Slides:



Advertisements
Similar presentations
1 Michael Siegel James Houghton Advancing Cybersecurity Using System Dynamics Simulation Modeling For System Resilience, Patching, and Software Development.
Advertisements

© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
PAGE 1 | Gradient colors RGBRGB Diagrams RGBRGB RGBRGB 166.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
Risk Management a Case Study DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Cyber Resilience Simon Onyons Financial Stability – Resilience Team.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Gift Card Landscape & Competitive Report July 2012.
Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Conostix S.A. Sensible defence.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Introduction to Computer Ethics
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Information Warfare Playgrounds to Battlegrounds.
Cyber Warfare Case Study: Estonia
Cyber vulnerabilities and the threat of attack: Making things better:
The Changing World of Endpoint Protection
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
SOCIAL BUSINESS PLAN. SOCIAL BUSINESS  Social enterprise is a business that trades for a social purpose. The social aims of the business are of equal.
CSCE 522 Secure Software Development Best Practices.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Legitimate Vulnerability Markets By: Jeff Wheeler.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
CSCE 548 Secure Software Development Security Operations.
Ewan Donald Cyber Security FEEL FREE A NEW APPROACH TO CYBER SECURITY.
Information Warfare Playgrounds to Battlegrounds.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Security Mindset Lesson Introduction Why is cyber security important?
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Information Management System Ali Saeed Khan 29 th April, 2016.
Vulnerability / Cybersecurity Research Discussion Dwayne Melancon, CISA Chief Technology Officer and VP of Research & Development.
CSCE 548 Secure Software Development Penetration Testing.
Cybersecurity as a Business Differentiator
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Comprehensive Security and Compliance at an Affordable Price.
Cyber Security: State of the Nation
Compliance with hardening standards
Introduction What's my experience? Why am I talking to you?
Improving Security By Embracing The Cloud
Cyber Protections: First Step, Risk Assessment
بهترین راهکار را انتخاب کنید...
Data Security Team 1.
Threat Landscape for Data Security
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Securing the Threats of Tomorrow, Today.
Introduction What's my experience? Why am I talking to you?
Information Security – July 18
Forensic and Investigative Accounting
Strategic threat assessment
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Engineering Secure Software
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

APT in Corporate America and the Exposure to Foothold Scenarios Nathaniel Puffer Technical Lead, Neohapsis Labs

2 Background Shaping My Views Public Sector consulting across verticals Penetration Testing Forensics Publically available information Peer groups within the penetration testing community

3 Cyber-warfare will be most effective as a way to force Nation-States to look inward, or weaken resolve It is better to rely on footholds than rely on previously unknown exploit code at the critical moment It is preferable to leverage exploit code as close to the time of discovery as possible

4 An Outsiders View of Cyber-War Estonia Online banking was unavailable Disruption of Government Services Cyber Shockwave Table Top Exercise Scenarios involved loss of use for cellular networks, power grid CIA / DoD friendly fire? Forcible removal of a known intelligence asset

5 Compared to Corporate Breaches Heartland Payment Systems Organized group of individuals Largest payment card breach Aurora Focus on Silicon Valley technology firms Loss of Intellectual property

6 Classification Cyberwar Denial of Service (DoS) Estonia 0-Day Exploitation Cyber Shockwave Leverage Known Insecurity CIA/DoD Asset Corporate Breaches Blended use of 0-Day and known Attacks Significant time between initial breach and detection/leverage

7 0-Day Exploits Require investment in time, skill Have a window of effectiveness Changes to the target systems Discovery and exposure by third parties Why Stockpile 0-Day? Metaphorical Arsenal An effective way to win laptops

8 0-Day, Disclosure, and COTS DiscoverWeaponizeStoreExploit

9 But Your Systems Are My Systems Reliance on Commercial Off the Shelf Components (COTS) What if you’re using the same systems? What if the companies that people rely on are using the same systems? Cyber-warfare will be most effective as a way to force Nation-States to look inward, or weaken resolve

10 Competing Motivations Offensive Keep knowledge and weaponized code a secret You maintain short-term capability but leave organizations you depend on exposed Defensive Disclose knowledge to vendors and assist with fixing problems You place an expiration on your capability; requires timing and discretion to not have exposure and public exploit code Attempted Hybrid Disclose issues to vendors, keep weaponized code a secret Core Impact, Immunity Canvas Attempt to keep NDA; manipulate timing Goal to is reach a fixed state

11 Logical Offensive Capability - Foothold Research security issues in systems to find weaknesses Maintain a well organized vendor disclosure program Provide assistance to vendors; Pressure vendors Promote public disclosure Provide hooks into corporate vulnerability management Exploit target systems Maintain presence Ensure survivability after the fix is released

12 Plausible? Heartland Payment Systems Systems were compromised for over a year Initial off the shelf malware was detected ‘Anti-virus’ did its job, Whew! Custom malware was introduced Pop, Pivot, Repeat Detection was due to fraud, by a system specifically designed to catch fraud Additional signs were there

13 Plausible? Aurora Google blows the whistle in January 20 companies targeted, interrelated malware “The major pattern of attacks previously identified as occurring in mid-December 2009 targeting Google appear to originate in July 2009 from mainland China” Detected on egress to command and control, internal behavior Of all the companies impacted, timelines on AV response indicate Google was the first that discovered / disclosed

14 Anecdotal Accounts Verizon Business Presentation at the PCI group meeting in Las Vegas An attacker had built a network diagram more detailed than any owned by the corporation Mandiant Corporate systems in Florida Initial breach of a limited number of systems leads to a realization that thousands of nodes are compromised

15 Defensive Solutions The purpose of corporations, groups we rely on for our way of live, is to make money; not to run the most secure networks Shore up loopholes for Financial Disclosure “Misrouted Funds” Promote additional legal requirements for disclosure Look for macro-correlation and trends Provide financial incentives for Vendors to create secure code Provide regulatory and incentive based “carrot and stick” to maintain secure systems

16 Thank you Questions and Feedback Welcome!