apt - hunting 0day malware

44
APT: Hunting ÖDay Malware Mustafa Qasim

Upload: mustafa-qasim

Post on 09-Jun-2015

636 views

Category:

Technology


2 download

DESCRIPTION

Presentation slides of my talk at Cyber Secure Pakistan 2013.

TRANSCRIPT

Page 1: APT - Hunting 0Day Malware

APT: Hunting ÖDay Malware

Mustafa Qasim

Page 2: APT - Hunting 0Day Malware

Since this presentation started

of organizations will have some malware event successfully evade their IT defenses.

Page 3: APT - Hunting 0Day Malware

On average, malware events occur at a single organization once every

3 MIN

UT

ES

Page 4: APT - Hunting 0Day Malware

Introduction

Page 5: APT - Hunting 0Day Malware

Once upon a time...

Page 6: APT - Hunting 0Day Malware
Page 7: APT - Hunting 0Day Malware
Page 8: APT - Hunting 0Day Malware

According to IDC, between 2003 and 2011, total IT security spend grew from $12 billion to $28 billion.

$12 Billion2003

$28 Billion2011

Page 9: APT - Hunting 0Day Malware

reActive

Vs

proActive

Page 10: APT - Hunting 0Day Malware
Page 11: APT - Hunting 0Day Malware

Fear of False Positive!

Page 12: APT - Hunting 0Day Malware

So called Defenders!

Page 13: APT - Hunting 0Day Malware

Firewalls

- Yes/No

- NexGen Firewall Buzz

- Latency Impact

Page 14: APT - Hunting 0Day Malware

IPS

- Traffic Signatures

- 0Day Prevention Buzz (Exploit > Vulnerability)

- Network Services vs. Client Side Attacks

Page 15: APT - Hunting 0Day Malware

Web Gateways

Called: Defense In-depth

In Actual: Iteration

Page 16: APT - Hunting 0Day Malware

Anti-Virus (L0L)

- Signatures

- Heuristics

- Sandbox

Page 17: APT - Hunting 0Day Malware

Anti-Virus (L0L)

- VIP entry via signed binary– Flame by Microsoft ;-)

Page 18: APT - Hunting 0Day Malware

Signatures

- Binary / Traffic

- Morphing, Obfuscation, Encryption

Page 19: APT - Hunting 0Day Malware

Heuristics Dilemma

Page 20: APT - Hunting 0Day Malware

Heuristics Dilemma

Page 21: APT - Hunting 0Day Malware

Isn't Sandbox made up of sand?

Page 22: APT - Hunting 0Day Malware
Page 23: APT - Hunting 0Day Malware
Page 24: APT - Hunting 0Day Malware

Disheartened by Backward Looking Defenders?

Page 25: APT - Hunting 0Day Malware

The highest technique is to have no technique.

My technique is a result of your technique; my movement is a result of your movement.

Page 26: APT - Hunting 0Day Malware

APT Malware vs. Traditional

Page 27: APT - Hunting 0Day Malware

APT Attack Life Cycle

Page 28: APT - Hunting 0Day Malware
Page 29: APT - Hunting 0Day Malware

Stage 1

Intrusion through exploitation

- Remote Exploit / Local Exploit

- Social Engineering

Page 30: APT - Hunting 0Day Malware

Stage 2

Malware is dropped

- Single Click

- 64base Encrypted Hidden Link

- Java revoke list check disabled

- Legacy vs Advanced

* pdf not exe

* DLL search order hijacking

Page 31: APT - Hunting 0Day Malware

Stage 3

Phones Home

- RAT

- Outbound Encrypted Connection

- Proxy CnC for a network

Page 32: APT - Hunting 0Day Malware

Stage 4

Spreads laterally

- Not always hits target

- Clear entry point

Page 33: APT - Hunting 0Day Malware

Stage 5

Data extraction

- Small Chunks

- Staged Host

- Encrypted RAR

Page 34: APT - Hunting 0Day Malware

Case Studies

- RSA breach

- Operation Aurora

Page 35: APT - Hunting 0Day Malware

Forensics & Challenges

- Behavior

- Code

* Packed

* Obfuscated

* Anti Debugger

* Anti VM

* Time

Page 36: APT - Hunting 0Day Malware

NGTP

- Signature less

- Protection not Detection

- Virtual Execution Engine

Page 37: APT - Hunting 0Day Malware

Pakistan Cyber Space

Page 38: APT - Hunting 0Day Malware

First things FIRST!

Page 39: APT - Hunting 0Day Malware

“ If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat.”

— Sun Tzu, The Art of War

Page 40: APT - Hunting 0Day Malware

Honeynet Pakistan

- 6 Deployments

- Avg. 400 malware per day

- Around 100 Unique

Page 41: APT - Hunting 0Day Malware
Page 42: APT - Hunting 0Day Malware

ISPs

FinancialInstitutions

NADRA

Government Organizations

Page 43: APT - Hunting 0Day Malware

Honeytoken Snort Rule

alert ip any any -> any any (msg:"Alert! Token c86"; content:"r71p@g3r";)

Page 44: APT - Hunting 0Day Malware

Catch Me

Twitter: mustafaqasim

Freenode: mustu @ #offsec