Download presentation
Presentation is loading. Please wait.
Published byReginald O’Connor’ Modified over 7 years ago
1
Understanding and breaking the cyber kill chain
Peter Sandkuijl Head of security solutions engineering Europe [Protected] Non-confidential content
2
THINGS WE DON’T KNOW THE GROWTH OF THE UNKNOWN MALWARE CVEs Botnets
Exploits Trojans Bad URLs THERE ARE MORE AND MORE THINGS WE DON’T KNOW Virus Because there are more and more threats and hackers we don’t know Threat landscape is evolving so fast with new threats, new techniques, new actors and new targets. Impossible to predict with certainty what the next waves of malware will look like. ZERO DAY, APTs, UNKNOWN MALWARE Signatures [Protected] Non-confidential content
3
ATTACKS ARE MORE DANGEROUS THAN EVER
Modern Threats Are… STRATEGIC TARGETED PERSISTENT MULTI-STAGE SOPHISTICATED EVASIVE ATTACKS ARE MORE DANGEROUS THAN EVER [Protected] Non-confidential content
4
Simple protections are FAILING
Modern threats require SOPHISTICATED DEFENSE STRATEGY [Protected] Non-confidential content
5
Planning and Executing A Cyber Attack
Planning the Attack Getting In Carrying out the Attack Weeks in Advance Within Seconds From Here On… Look for potential victims Collect relevant social data Build, find or buy your weapon of choice Exploit kit, Malware package Adapt to your specific needs Package for delivery Bypass detection Convince the victim to open your crafted file Bypass system security control Install your malware Wait for your malware to “call home” Instruct it what to do on the victim’s computer Continuously monitor its progress Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Act on Objectives Identify the target and exploitable weaknesses Create/select attack vector Deliver the malicious payload to the victim Gain execution privileges Install the malware on infected host Establish a channel of communication Data collection or corruption, Lateral movement and exfiltration [Protected] Non-confidential content
6
The Cyber Kill Chain Reconnaissance Weaponization Delivery
Exploitation Installation Command & Control Act on Objectives Identify the target and exploitable weaknesses Create/select attack vector Deliver the malicious payload to the victim Gain execution privileges Install the malware on infected host Establish a channel of communication Data collection or corruption, Lateral movement and exfiltration [Restricted] ONLY for designated groups and individuals
7
Simple Attack Timeline: Australian Ransomware
Locate addresses Send a spoofed with PDF Key obtained from C&C server TIME Create an infected PDF Victim double clicks attachment Cryptolocker installed Files gradually encrypted Some kill-chain steps take hours or even weeks, while others take mere seconds Act On Recon Weapon Delivery Exploit Install C&C [Protected] Non-confidential content
8
How does one buy an attack?
[Protected] Non-confidential content
9
Images from: www.deepdarkweb.com
[Protected] Non-confidential content
10
Very generous indemnity program: $0
334 listings for “software & malware” Images from: [Protected] Non-confidential content
11
Don’t forget to read user reviews
[Protected] Non-confidential content
12
And then there are Exploit Kit-as-a-Service (EaaS) sites
[Protected] Non-confidential content
13
Method example: Angler [Protected] Non-confidential content
14
Exploit delivery service
Web-connected servers with WordPress vulnerabilities Operates as an Exploit Kit [Protected] Non-confidential content
15
Browsing, link in email or integrated domain call
Users connect to a site Browsing, link in or integrated domain call Machines scanned for vulnerabilities Exploits lead to malware drop: TeslaCrypt, Locky, Dridex… [Protected] Non-confidential content
16
Each site leads to multiple destinations, some are unintended
[Protected] Non-confidential content
17
You’re actually going to many more places
Let’s say you go to your favorite site… [Protected] Non-confidential content
18
Your unintended destinations aren’t necessarily evil…
But they can be Your unintended destinations aren’t necessarily evil… [Protected] Non-confidential content
19
Let‘s take a look at how Angler leverages Silverlight
[Protected] Non-confidential content
20
Looks for Silverlight version 4.0.50524.0
Tells itself to… Pulls the upgrade file from… That’s the location of the dropper, which leads to the Ransomware [Protected] Non-confidential content
21
The outcome is the same [Protected] Non-confidential content
22
[Protected] Non-confidential content
23
IT’S TIME TO BREAK THE CHAIN
[Protected] Non-confidential content
24
Successful Defense Strategy
Pre-Compromise Compromise Post-Compromise Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Act on Objectives Apply protection for EACH of the stages No single step protection is enough Tackle attackers at each stage of their attack Strong preventive defense BEFORE infection Prevention is the most cost-effective form of protection Protect against the devastating cost of a successful attack Damage and cost are proportional to time Minimize the time it takes to detect and contain attacks Effective POST compromise defense [Protected] Non-confidential content
25
Successful Defense with Check Point
Pre-Compromise Compromise Post-Compromise Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Act on Objectives IPS Threat Intelligence Firewall Anti-Virus Anti-Bot Anti-Bot DLP Firewall Anti-Spam IPS Endpoint Security Endpoint Security Document Security DLP URL Filtering Threat Emulation Forensics Firewall Document Security Threat Emulation Mobile Threat Prevention IPS Threat Extraction Mobile Threat Prevention INTELLIGENCE DETECTION PREVENTION Extensive research Collaboration with industry leading services Sharing across users community Multi-layer architecture Evasion-resistant detection Best catch rate Proactive practical prevention Effective containment Clear visibility and insight [Protected] Non-confidential content
26
PROTECT FROM THE UNKNOWN
Evasion resistant sandboxing at CPU- and OS- Level THREAT EMULATION Quick delivery of safe reconstructed content THREAT EXTRACTION PROTECT FROM THE UNKNOWN [Restricted] ONLY for designated groups and individuals
27
ACCELERATE RESPONSE TO INFECTIONS
Detect and block malicious infections and activity PREVENT & CONTAIN Automated forensics analysis for effective response RESPOND & REMEDIATE ACCELERATE RESPONSE TO INFECTIONS lock [Restricted] ONLY for designated groups and individuals
28
One Console to Manage Everything
Enterprise Now with one console, security teams can now manage all aspects of security from policy to threat prevention – across their entire organization – both their physical and virtual environments. You get operational efficiency, you simplify management and avoid overlapping policies and redundant configurations. Less maintenance costs and labor man hours equals lower TCO. ONE CONSOLE ONE POLICY [Protected] Non-confidential content
29
Ask questions. Share code. Stay up-to-date.
COMMUNITY. CHECKPOINT.COM Ask questions. Share code. Stay up-to-date. Customers Partners Experts [Protected] Non-confidential content
30
THANK YOU [Protected] Non-confidential content
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.