senior csirt investigator at privacy, access and …...“there's now a growing sense of...

13
Henry Stern Senior CSIRT Investigator At Privacy, Access and Security Congress 2012 October 4, 2012

Upload: others

Post on 03-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

Henry SternSenior CSIRT Investigator

At Privacy, Access and Security Congress 2012October 4, 2012

Page 2: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

“ There's now a

growing sense of

fatalism: It's no longer

if or when you get

hacked, but the

assumption that

you've already been

Cisco Highly Confidential – do not distribute2

you've already been

hacked, with a focus

on minimizing the

damage.

Source: Security’s New Reality: Assume the Worst; Dark Reading

Page 3: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

Event Analysis

Investigations

12 hr

12 hr

!!!!!!

!!!

!!

!!

!events

+ data

!!!!

Cisco Highly Confidential – do not distribute

inconclusive

solved

APT

false positive

• remediations

• incident summaries

• best practices

• product guidance

• metrics

Page 4: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

2000 2005 2011 Next

Cisco Posture

Unprotected

desktops

Unmanaged

desktops

Proliferating

device types

Cloud-connected

ecosystem

Malware Worms Rapidly

changing and

proliferating

Sophisticated Beyond Windows

Network Behavior

Disruptive Compromised

hosts remotely

Opaquely

compromised

Cloaked as

normal traffic

Posture Evolution

Cisco Highly Confidential – do not distribute

Behaviorcontrolled hosts exfiltrate

sensitive data

Threat Depth

Annoyance Individual host Sensitive

infrastructure

Embedded

CiscoResponse

Deploy AV 1) Deploy CSA

2) Detect

botnets via

IDS

1) Detect via

reputation

2) Automate

prevention

3) Detect via

behavior

1) Augment

detection with

intel

2) Detect via

precursors

3) Diversify

intelligence

and methods

Page 5: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

CSOC VisionHow to address loss of threat visibility

Signature Signature Behavior

Flows Signature

Past 2012 2013

Cisco Highly Confidential – do not distribute 5

Intel

Flows

Intel Intel

Data Loss Visibility

Page 6: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

Example Incident1. Detect Compromised Host

� Time: 2012-xx-xx xx:xx:xx

� Owner: ELIDED

� IP: 171.68.x.x

� Hostname: ELIDED-WXP07

� Site: SAN JOSE

Cisco Highly Confidential – do not distribute

� Country: UNITED STATES

� Theatre: AMER

� Hits:

ELIDED: 2

ELIDED: 2

6

Page 7: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

Example Incident2. Mitigate via BGP Blackhole

Cisco Highly Confidential – do not distribute

Page 8: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

Example Incident3. Locate

Compromised Hosts: Query

Cisco Highly Confidential – do not distribute

Search for all

internal hosts

connecting to this command-and-

control server

Page 9: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

Example Incident3. Locate Compromised Hosts

Cisco Highly Confidential – do not distribute

These hosts are

compromised

Page 10: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

Example Incident

4. Identify Victims

Search by

multiple IPs

Cisco Highly Confidential – do not distribute

Yields owner

info, including

DHCP history

Page 11: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

Example Incident

4. Identify Victims

Search

by IP

Cisco Highly Confidential – do not distribute

Yields info on

owning group

Page 12: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

Example Incident

5. Remediate Victims

iTrack iTrack

Cisco Highly Confidential – do not distribute

Case number 80208-4570

Infect Count 3

Virus Strain Exploit

Owner Dept 20072668

Last Infected 2009-05-05 10:13AM

Page 13: Senior CSIRT Investigator At Privacy, Access and …...“There's now a growing sense of fatalism: It's no longer if or when you get hacked, but the assumption that you've already

Cisco Highly Confidential – do not distribute 13Cisco Highly Confidential – do not distribute 13