got hacked? it’s too late to run now!

31
GOT HACKED? IT’S TOO LATE TO RUN NOW. Janne Kauhanen Twitter: @JKauhanen

Upload: f-secure-corporation

Post on 28-Jan-2018

232 views

Category:

Software


1 download

TRANSCRIPT

Page 1: Got hacked? It’s too late to run now!

GOT HACKED?IT’S TOO LATE TO RUN NOW.

Janne Kauhanen

Twitter: @JKauhanen

Page 2: Got hacked? It’s too late to run now!

360°OF CYBER SECURITY

2

MINIMIZE ATTACK SURFACE

PREVENT INCIDENTS

UNDERSTAND YOUR RISK, KNOW YOUR ATTACK SURFACE,

UNCOVER WEAK SPOTS

REACT TO BREACHES, MITIGATE THE DAMAGE,

ANALYZE AND LEARN

RECOGNIZE INCIDENTS AND THREATS, ISOLATE AND CONTAIN THEM

Page 3: Got hacked? It’s too late to run now!

AGENDA

3

Definitions

Threat detection, a short summary

Why do you get hacked?

What to do when you get hacked?

Incident Response process

Forensics

Incident Response capabilities you should (and shouldn’t) have

Crisis management

Page 4: Got hacked? It’s too late to run now!

SECURITY INCIDENTS

Hacker actions

4

Information leak Widespread malware infection

Internal misbehavior

(unintentional included)

Page 5: Got hacked? It’s too late to run now!

"A SECURITY INCIDENT IS ANY KIND OF ACTION

THAT RESULTS IN A CHANGETO A KNOWN GOOD STATE.“

KURTHAGERMAN, CISO, ARMOR DEFENSE INC.

5

Page 6: Got hacked? It’s too late to run now!

THE DOS AND DON’TS OF THREAT DETECTION

RECAP OF WEBINAR #3

6

Page 7: Got hacked? It’s too late to run now!

WHY DID I GET HACKED?

7

"DRIVE BY" & SCRIPT KIDDIES

FOCUS

SKILL

TARGETED ATTACKS

IDENTITY THEFT, 0DAY

EXPLOITS

ADVANCED PERSISTENT

THREATS

Page 8: Got hacked? It’s too late to run now!
Page 9: Got hacked? It’s too late to run now!
Page 10: Got hacked? It’s too late to run now!
Page 11: Got hacked? It’s too late to run now!
Page 12: Got hacked? It’s too late to run now!
Page 13: Got hacked? It’s too late to run now!
Page 14: Got hacked? It’s too late to run now!
Page 15: Got hacked? It’s too late to run now!
Page 16: Got hacked? It’s too late to run now!

INCIDENT RESPONSE PROCESS

16

Briefing Identification Containment Recovery Aftermath

Page 17: Got hacked? It’s too late to run now!

INCIDENT RESPONSE PROCESS

17

Briefing Identification Containment Recovery Aftermath

Page 18: Got hacked? It’s too late to run now!

INCIDENT RESPONSE PROCESS

18

Briefing Identification Containment Recovery Aftermath

Page 19: Got hacked? It’s too late to run now!

INCIDENT RESPONSE PROCESS

19

Briefing Identification Containment Recovery Aftermath

Page 20: Got hacked? It’s too late to run now!

INCIDENT RESPONSE PROCESS

20

Briefing Identification Containment Recovery Aftermath

Page 21: Got hacked? It’s too late to run now!

FORENSIC INVESTIGATION

1. HOW WAS THE DEVICE BREACHED?‒ WHAT WAS THE ROOT CAUSE?

2. HOW DID THE ATTACKER COMMUNICATE WITH THE DEVICE?‒ IS THE ATTACKER STILL ABLE TO COMMUNICATE WITH THE DEVICE?

3. WAS THE ATTACKER ABLE TO MOVE BEYOND THIS DEVICE?‒ IS THERE A WAY TO DETECT INFECTED DEVICES?

4. WAS DATA EXFILTRATED FROM THE DEVICE?‒ HOW MUCH DATA, WHAT KIND OF DATA, AND WHERE DID IT GO?

21

Page 22: Got hacked? It’s too late to run now!

FORENSIC INVESTIGATION

1. HOW WAS THE DEVICE BREACHED?‒ WHAT WAS THE ROOT CAUSE?

2. HOW DID THE ATTACKER COMMUNICATE WITH THE DEVICE?‒ IS THE ATTACKER STILL ABLE TO COMMUNICATE WITH THE DEVICE?

3. WAS THE ATTACKER ABLE TO MOVE BEYOND THIS DEVICE?‒ IS THERE A WAY TO DETECT INFECTED DEVICES?

4. WAS DATA EXFILTRATED FROM THE DEVICE?‒ HOW MUCH DATA, WHAT KIND OF DATA, AND WHERE DID IT GO?

22

Page 23: Got hacked? It’s too late to run now!

FORENSIC INVESTIGATION

1. HOW WAS THE DEVICE BREACHED?‒ WHAT WAS THE ROOT CAUSE?

2. HOW DID THE ATTACKER COMMUNICATE WITH THE DEVICE?‒ IS THE ATTACKER STILL ABLE TO COMMUNICATE WITH THE DEVICE?

3. WAS THE ATTACKER ABLE TO MOVE BEYOND THIS DEVICE?‒ IS THERE A WAY TO DETECT INFECTED DEVICES?

4. WAS DATA EXFILTRATED FROM THE DEVICE?‒ HOW MUCH DATA, WHAT KIND OF DATA, AND WHERE DID IT GO?

23

Page 24: Got hacked? It’s too late to run now!

FORENSIC INVESTIGATION

1. HOW WAS THE DEVICE BREACHED?‒ WHAT WAS THE ROOT CAUSE?

2. HOW DID THE ATTACKER COMMUNICATE WITH THE DEVICE?‒ IS THE ATTACKER STILL ABLE TO COMMUNICATE WITH THE DEVICE?

3. WAS THE ATTACKER ABLE TO MOVE BEYOND THIS DEVICE?‒ IS THERE A WAY TO DETECT INFECTED DEVICES?

4. WAS DATA EXFILTRATED FROM THE DEVICE?‒ HOW MUCH DATA, WHAT KIND OF DATA, AND WHERE DID IT GO?

24

Page 25: Got hacked? It’s too late to run now!

FORENSIC INVESTIGATION

1. HOW WAS THE DEVICE BREACHED?‒ WHAT WAS THE ROOT CAUSE?

2. HOW DID THE ATTACKER COMMUNICATE WITH THE DEVICE?‒ IS THE ATTACKER STILL ABLE TO COMMUNICATE WITH THE DEVICE?

3. WAS THE ATTACKER ABLE TO MOVE BEYOND THIS DEVICE?‒ IS THERE A WAY TO DETECT INFECTED DEVICES?

4. WAS DATA EXFILTRATED FROM THE DEVICE?‒ HOW MUCH DATA, WHAT KIND OF DATA, AND WHERE DID IT GO?

25

Page 26: Got hacked? It’s too late to run now!

IN-HOUSE CAPABILITIES

26

What kind of capabilities should I

have in-house?

Is there anything I should not try to do myself?

Page 27: Got hacked? It’s too late to run now!

“BY FAILING TO PREPARE YOU ARE PREPARING TO FAIL”

BENJAMIN FRANKLIN

27

Page 28: Got hacked? It’s too late to run now!

Scenarios based on real life, adjusted to target organization

GameMaster monitors actions and generates additional inputs

28

CRISIS MANAGEMENT EXERCISE

Page 29: Got hacked? It’s too late to run now!

THERE ARE TWO TYPES OF COMPANIES:

THOSE WHO HAVE BEEN BREACHED, AND THOSE WHO

DON’T KNOW IT YET.

29

Page 30: Got hacked? It’s too late to run now!

Q&A

30

Page 31: Got hacked? It’s too late to run now!