hiding in plain sight – protect against bad hashes

16
Hiding in Plain Sight: Protect Against Bad Hashes

Upload: tripwire

Post on 14-Aug-2015

240 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Hiding In Plain Sight – Protect Against Bad Hashes

Hiding in Plain Sight: Protect Against Bad Hashes

Page 2: Hiding In Plain Sight – Protect Against Bad Hashes

2

Presenters

Dave Meltzer, Chief Research Officer,

Tripwire

Dayne Cantu, Sr. Systems Engineer, Federal Team Lead,

Tripwire

Page 3: Hiding In Plain Sight – Protect Against Bad Hashes

3

What Happens When You Receive an IoC?

Page 4: Hiding In Plain Sight – Protect Against Bad Hashes

4

Guidance For ActionNIST SP800-150 Draft

Page 5: Hiding In Plain Sight – Protect Against Bad Hashes

5

Headed Towards Standards

Page 6: Hiding In Plain Sight – Protect Against Bad Hashes

6

But Not There Yet…E-mail is the most common source of indicators today

Page 7: Hiding In Plain Sight – Protect Against Bad Hashes

7

Advanced Malware Identification – Identify advanced threats on high risk assets through integration to malware analytics services and appliances using sandbox technology

Monitoring for Peer & Community Sourced IoCs – Automate the forensics investigation and proactive monitoring on high risk assets of indicators of compromise sourced from industry peers and community sources

Monitoring for Commercial Threat Intelligence Service IoCs – Automate the forensics investigation and proactive monitoring on high risk assets of indicators of compromise sourced from tailored commercial threat intelligence services

Use Cases for Threat Intelligence

Page 8: Hiding In Plain Sight – Protect Against Bad Hashes

Use Case 1: Monitoring for Commercial Threat Intelligence Services IoCs

!

THREATDETECTED!

3

NEW INDICATORS1

Search forensics data for previous existence of indicator. Start monitoring for indicator in all new changes.

2

Drive workflow to investigateand remediate system.

4

Threat Intelligence

Provider

Page 9: Hiding In Plain Sight – Protect Against Bad Hashes

Use Case 2: Monitoring for Peer and Community Sourced IoCs

!

THREATDETECTED!

4

IndicatorsFeed

2

Search forensics data for previous existence of indicator. Start monitoring for indicator in all new changes.

3

EnterpriseTAXII Server

PeerTAXII Server

Open Source IntelligenceTAXII Server

ISAC CommunityTAXII Server

Drive workflow to investigateand remediate system.

5

Indicators Feed1Local File Sources

(Flat, CSV, etc)

Page 10: Hiding In Plain Sight – Protect Against Bad Hashes

Use Case 3: Advanced Malware Identification

Next Generation Threat Prevention

Tripwire Enterprise

Agent NEW BINARYFOUND

1

SEND FILE/HASHFOR ANALYSIS

2

!

THREATDETECTED!

3

NEW ADVANCED

THREAT DETECTED

4

Drive workflow to investigateand remediate system.

5

UPDATE THREATPREVENTION RULES

6

Real-time blocking of command & control, exfiltration, and further infections.

7

Cloud or Appliance Sandbox Analytics

Page 11: Hiding In Plain Sight – Protect Against Bad Hashes

11

Page 12: Hiding In Plain Sight – Protect Against Bad Hashes

12

Page 13: Hiding In Plain Sight – Protect Against Bad Hashes

13

Page 14: Hiding In Plain Sight – Protect Against Bad Hashes

14

Page 15: Hiding In Plain Sight – Protect Against Bad Hashes

15

Tripwire Technology Alliance Partner EcosystemANALYTICS & SIEM IT SERVICE MANAGEMENT NERC ALLIANCE NETWORK

NETWORK SECURITY

PLATFORM PARTNERS

SECURITY COMMUNITY PARTNERS

IDENTITY MANAGEMENT

THREAT INTELLIGENCE

Page 16: Hiding In Plain Sight – Protect Against Bad Hashes

tripwire.com | @TripwireInc

Thank you