defending$against$ ransomware - black hat dns$(tor) teslacrypt dns cryptowall dns torrentlocker dns...

11
Meg Diaz OpenDNS Products July 21,2016 Defending Against Ransomware

Upload: trandung

Post on 21-May-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Defending$Against$ Ransomware - Black Hat DNS$(TOR) TeslaCrypt DNS CryptoWall DNS TorrentLocker DNS ... Blocking Ransomware Locky: Real World Example Domains in Red …

Meg DiazOpenDNS ProductsJuly 21,2016

Defending Against Ransomware

Page 2: Defending$Against$ Ransomware - Black Hat DNS$(TOR) TeslaCrypt DNS CryptoWall DNS TorrentLocker DNS ... Blocking Ransomware Locky: Real World Example Domains in Red …

2© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Page 3: Defending$Against$ Ransomware - Black Hat DNS$(TOR) TeslaCrypt DNS CryptoWall DNS TorrentLocker DNS ... Blocking Ransomware Locky: Real World Example Domains in Red …

3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

3

NAME DNS IP NO C&C TOR PAYMENT

Locky DNS

SamSam DNS (TOR)

TeslaCrypt DNS

CryptoWall DNS

TorrentLocker DNS

PadCrypt DNS (TOR)

CTB-­Locker DNS

FAKBEN DNS (TOR)

PayCrypt DNS

KeyRanger DNS

Encryption C&C Payment MSG

Page 4: Defending$Against$ Ransomware - Black Hat DNS$(TOR) TeslaCrypt DNS CryptoWall DNS TorrentLocker DNS ... Blocking Ransomware Locky: Real World Example Domains in Red …

4© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Page 5: Defending$Against$ Ransomware - Black Hat DNS$(TOR) TeslaCrypt DNS CryptoWall DNS TorrentLocker DNS ... Blocking Ransomware Locky: Real World Example Domains in Red …

5© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Blocking Ransomware: Real World Example with a Locky Domainglslindia[.]com (detection Date: 15/03/2016)

Page 6: Defending$Against$ Ransomware - Black Hat DNS$(TOR) TeslaCrypt DNS CryptoWall DNS TorrentLocker DNS ... Blocking Ransomware Locky: Real World Example Domains in Red …

6© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Blocking RansomwareLocky: Real World Example

Domains in Red are automatically blocked by OpenDNS

Hash of the malicious file downloaded from these domains

Malware Download URLThese domains

co-occurr

These domains share the same infrastructure

Page 7: Defending$Against$ Ransomware - Black Hat DNS$(TOR) TeslaCrypt DNS CryptoWall DNS TorrentLocker DNS ... Blocking Ransomware Locky: Real World Example Domains in Red …

7© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Current Malware distribution

Point

Infection Point

Next Malware Distribution Points

Expose the attacker’s infrastructure (Nameservers and IPs) to predict the next moves

Blocking RansomwareLocky: Real World Example

Page 8: Defending$Against$ Ransomware - Black Hat DNS$(TOR) TeslaCrypt DNS CryptoWall DNS TorrentLocker DNS ... Blocking Ransomware Locky: Real World Example Domains in Red …

8© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Discover the Threats Before They Happen (1)VT Link: https://virustotal.com/en/file/07bed9baa42996bded75dacf5c2611ba5d3a3f19b8588ea734530f74c2586087/analysis/(first VT submission: 2016-­03-­18 16:51:45 three daysOpenDNS)

Page 9: Defending$Against$ Ransomware - Black Hat DNS$(TOR) TeslaCrypt DNS CryptoWall DNS TorrentLocker DNS ... Blocking Ransomware Locky: Real World Example Domains in Red …

9© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Best Practice Recommendations

• Solid patch management

• Non-­native document rendering PDF + Office

• Users run as non-­privileged users (no admin)

• Disable RDP

• Firewall enabled on endpoints

• Segmented and secured backups (tested)

• Encryption of backups and local documents

• Look into adding Endpoint Threat Detection & Response and DNS-­layer security

Page 10: Defending$Against$ Ransomware - Black Hat DNS$(TOR) TeslaCrypt DNS CryptoWall DNS TorrentLocker DNS ... Blocking Ransomware Locky: Real World Example Domains in Red …

10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

INTERNET

MALWAREC2/BOTNETSPHISHING

AV

AV

AV AV

ROUTER/UTM

AV AV

ROUTER/UTM

SANDBOXPROXY

NGFWNETFLOW

AV AV

AV AV

MID LAYER

LAST LAYERMID LAYER

LAST LAYER

MID LAYER

FIRST LAYER

Where Do You Enforce Security?

Perimeter

Perimeter Perimeter

Endpoint

Endpoint

BENEFITSAlerts Reduced 2-­10x;; Improves Your SIEM

Traffic & Payloads Never Reach Target

Provision Globally in UNDER 30 MINUTES

Page 11: Defending$Against$ Ransomware - Black Hat DNS$(TOR) TeslaCrypt DNS CryptoWall DNS TorrentLocker DNS ... Blocking Ransomware Locky: Real World Example Domains in Red …