how they’re getting the data out of your …...ibm security systems | © 2014 ibm corporation...

19
IBM Security Systems | © 2014 IBM Corporation HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK Eric Koeppen IBM X-Force Advanced Research erkoeppe[at]us[dot]ibm[dot]com @PorkChop (v1)

Upload: others

Post on 30-May-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

HOW THEY’RE GETTING THEDATA OUT OF YOUR NETWORK

Eric KoeppenIBM X-Force Advanced Research

erkoeppe[at]us[dot]ibm[dot]com@PorkChop

(v1)

Page 2: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

AGENDA

Introduction

Exfiltration Scenarios– Advanced Persistent Threat (APT)– Point of Sale (POS) Malware– Financial Malware

Conclusion

Page 3: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

INTRODUCTION

HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK:

A SURVEY OF METHODS USED FOR EXFILTRATION OF SENSITIVE DATA, RECOMMENDATIONS FOR DETECTION AND PROTECTION

Page 4: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

INTRODUCTION

Initial malware infection often just the first step.

Data sent to external servers.

Can have disastrous effects:– Initial loss of revenue– Company brand image– Customer loyalty– Competitive advantage (trade secrets)– Subsequent lawsuits

Page 5: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

EXFILTRATION SCENARIOS

HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK:

A SURVEY OF METHODS USED FOR EXFILTRATION OF SENSITIVE DATA, RECOMMENDATIONS FOR DETECTION AND PROTECTION

Page 6: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

Operation ShadyRAT– Began 2006 and ran for 5 years– Targeted over 70 organizations– Government organizations & private companies– Multiple infection mechanisms– Moves laterally through network– Novel C2 (often used steganography)– Petabytes of data

ADVANCED PERSISTENT THREAT

Page 7: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

ADVANCED PERSISTENT THREAT

Page 8: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

Detection APT Exfiltration tactics– Data different for each site• Data types different• Data formats different

– Various forms of C2– Initial connection uses predefined handshake

ADVANCED PERSISTENT THREAT

Page 9: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

BlackPOS – the Target attack– Customer data compromised• 40 million accounts • PII data for 70 million

– Initial infection by Trojan– Periodic memory scraping to collect info

POINT OF SALE MALWARE

Page 10: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

POINT OF SALE MALWARE (SCENARIO 1)

Page 11: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

POINT OF SALE MALWARE (SCENARIO 2)

Page 12: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

Detection POS Malware Exfiltration– Leverages different transport protocols/methods• HTTP Posts, HTTP Gets, HTTPS, FTP,

SMB/NetBIOS, NFS, etc– Data usually known format:• Track 1 & 2 credit card information

– Various data encoding techniques:• Some samples use Ascii or UUencoding• Some samples use minor obfuscation• Some samples use encryption

POINT OF SALE MALWARE

Page 13: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

Zeus Banking Trojan – Many variants – Has been around for years– Gameover Zeus variant has accounted for over

$100 million in theft since 2011– Various techniques:• Mock up web pages for stealing bank info• Parsing cookie files for local data-containing files• Steal digital certificates, local private keys• Stealing FTP client info and mail client settings• Parses registry keys for valuable information

FINANCIAL MALWARE

Page 14: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

FINANCIAL MALWARE (SCENARIO 1)

Page 15: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

FINANCIAL MALWARE (SCENARIO 2)

Page 16: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

Detection Zeus Banking Trojan Exfiltration– Constantly updating their techniques– Payload messages hashed, signed, and encrypted

with RC4 encryption– Can detect the presence of P2P botnet on the

network (Game Over P2P variant)• Detect P2P keep-alive messages

FINANCIAL MALWARE

Page 17: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

CONCLUSION

HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK:

A SURVEY OF METHODS USED FOR EXFILTRATION OF SENSITIVE DATA, RECOMMENDATIONS FOR DETECTION AND PROTECTION

Page 18: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

CONCLUSION

– Changing landscape– Detection based on knowing:• Which data is being targeted• What are typical formats for that data• How that data is being encoded

– When data is encrypted, monitor traffic patterns– Common practices can go a long way:• Monitor logs• Keep patches up to date• Lock down acceptable communication• Educate users

Page 19: HOW THEY’RE GETTING THE DATA OUT OF YOUR …...IBM Security Systems | © 2014 IBM Corporation INTRODUCTION HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK: A SURVEY OF …

IBM Security Systems | © 2014 IBM Corporation

HOW THEY’RE GETTING THE DATA OUT OF YOUR NETWORK

Thank You!

Eric KoeppenIBM X-Force Advanced Researcherkoeppe[at]us[dot]ibm[dot]com@PorkChop