emrg1 wildfire ilta seminar presentationilta.personifycloud.com/webfiles/productfiles... · injects...

32
Modern Malware James Sherlow SE Manager NEUR

Upload: others

Post on 26-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

Modern Malware

James SherlowSE Manager NEUR

Page 2: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes
Page 3: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•data breach mythology

Page 4: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•we invest in protecting our data centers

Page 5: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•rarely the datacenter is attacked directly

Page 6: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

no more vulnerability scanning

Page 7: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•the new attacker

Page 8: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

the attacker is not a bored geek

Page 9: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

nation states and organized crime

Page 10: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•data breaches in 2011

Page 11: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

step one: bait an end‐user

Page 12: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

step one: bait an end‐user

spear phishing

Page 13: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

step one: bait an end‐user

Page 14: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

step two: exploit a vulnerability

Page 15: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

step three: download a backdoor

Page 16: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

step four: establish a back channel

Page 17: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

step five: explore and steal

Page 18: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•the state of malware protection

Page 19: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•blueprint for stopping modern malware

Page 20: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

need to protect all applications

Page 21: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•response time is key

Page 22: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•automation is a must

Page 23: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•a sandbox at the core

Page 24: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•perform the analysis for all devices centrally

Page 25: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•automatically generate multiple signatures

• Anti-malware download signatures

• IPS back-channel signatures

• Malware URLs

• IPS signatures for identified new vulnerabilities

Page 26: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•need to protect at all stages

bait exploit download back channel steal

Page 27: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

•© 2010 Palo Alto Networks. Proprietary and Confidential. •Page 27 |

Page 28: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

Case Study: Jericho Banking Trojan

• Passwords and Credentials for Websites– Username/Login Pairs– Website Cookies– Keystrokes

• Targets Credentials for 100+ Websites– Vast majority of targeted sites are banking

and financial sites– Hiring and employment sites also targeted– Small number of technology sites targeted

Page 29: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

Injects Into Common Applications

• Injects malicious code into common application processes– Browsers – Heavy focus on Firefox,

but also targets, IE, Chrome and Opera

– Email Clients – Outlook and WinMail– Other Apps – Skype, Java, and

Reader_sl.exe

• Allows the malware to make use of functions in those target applications– No need for the malware to import

networking libraries, it can simply use the ones already imported by the target app.

Page 30: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

Ierihon Samples Delivered From Israel

Page 31: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

Poor Coverage by Traditional AV• Tested malware against the top 6 antivirus

vendors• Repeated tests daily to track improvements

coverage

0.0%

10.0%

20.0%

30.0%

40.0%

50.0%

60.0%

70.0%

80.0%

90.0%

100.0%

Day‐0 Day‐1 Day‐2 Day‐3 Day‐4 Day‐5 Day‐6

Page 32: EMRG1 WildFire ILTA Seminar Presentationilta.personifycloud.com/webfiles/productfiles... · Injects Into Common Applications • Injects malicious code into common application processes

the role of NGFW in stopping modern malware

© 2012 Palo Alto Networks. Proprietary and Confidential.Page 32 |