the evolution of cyber attacks and next generation threat ...protects against the lateral movement...

30
Session ID: Session Classification: Ashar Aziz Founder, Vice-Chairman and CTO FireEye, Inc. The Evolution of Cyber Attacks and Next Generation Threat Protection

Upload: others

Post on 27-Jun-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

Session ID:

Session Classification:

Ashar Aziz Founder, Vice-Chairman and CTO

FireEye, Inc.

The Evolution of

Cyber Attacks and

Next Generation

Threat Protection

Page 2: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

► The New Threat Landscape

► Deep Dive on Advanced Attacks

► Principles of Next Generation Protection

Agenda

Page 3: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

► Nature of threats

changing

► Today’s attacks

sophisticated and

successful

The New Breed of Attacks

2005 2007 2009 2011 2013

Advanced Persistent Threats

Zero-day Targeted Attacks Dynamic Trojans

Stealth Bots

Worms Viruses

Disruption Spyware/ Bots

Cybercrime

Cyber-espionage

and Cybercrime

Da

ma

ge

of A

tta

cks

“Organizations face an evolving threat scenario that they are ill-prepared to deal

with….threats that have bypassed their traditional security protection techniques

and reside undetected on their systems.” Gartner, 2012

Page 4: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

What’s Changed?

NEW THREAT LANDSCAPE

Dynamic,

Polymorphic Malware Coordinated Persistent Threat Actors

Multi-Vector Attacks Multi-Stage Attacks

Page 5: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

Multiple Vectors - Targeting An

Organization’s Valuable Assets

CFO

Director of Engineering

Government Employee

Intellectual Property Web-Based Attack

Spear Phishing

File-Based Attack

Financial Information

National Security Info

Page 6: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

Multiple Stages: The New

Attack Life Cycle

Exploitation of system 1

3 Malware executable download

2 First Callback for malware download

Compromised

Web server, or

Web 2.0 site

1 Callback server

IPS

3 2

Malware spreads laterally

4 Data exfiltration

5

File Share 2

File Share 1

5

4

Page 7: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

Traditional Defenses Don’t Work

Firewalls/ NGFW

Secure Web Gateways

IPS Anti-Spam Gateways

Desktop AV

The new breed of attacks evade signature-based defenses

Page 8: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

The Security Gap is Broad

95% of Companies are Compromised

Page 9: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

The Degree of Compromise is

Significant

98.5% of deployments see at

least 10 incidents/week

Median is about

643 incidents/week

20% of deployments have

thousands of incidents/week

100%

90%

80%

70%

60%

50%

40%

30%

20%

10%

0%

100,000 10,000 1,000 100 10

Infections/Weeks at Normalized Bandwidth Percent of

Deployment

s

Source: FireEye Advanced Threat Report, Feb. 2012

643 Median Net New Infections Per Week!

Page 10: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

Spectrum of Frequent Advanced

Attacks For 2012/2013

Mass Website Compromises

• Exploit toolkits

• Zero-day exploits (rare)

• Sophisticated crimeware

Watering Hole Attacks

• Compromised site specific to industry vertical

• Zero-day exploits more common

• Frequently nation-state driven

Weaponized Email Attachments

• Common file formats

• Legit work product presented (decoy)

• Preferred by nation-states

Malicious URLs in Email (Spear phish)

• Exploits specific to target environment

• Only exploit if visited from target network(s)

• Use existing trust relationships

1000+ Victims

(Easiest to Detect)

~1-2 Victims

(Hardest to Detect)

Page 11: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

Watering Hole Attacks

Mass Website Compromises

• Exploit toolkits

• Zero-day exploits (rare)

• Sophisticated crimeware

Watering Hole Attacks

• Compromised site specific to industry vertical

• Zero-day exploits more common

• Frequently nation-state driven

Weaponized Email Attachments

• Common file formats

• Legit work product presented (decoy)

• Preferred by nation-states

Malicious URLs in Email (Spear phish)

• Exploits specific to target environment

• Only exploit if visited from target network(s)

• Use existing trust relationships

Page 12: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

► Growing in popularity among nation-state threat actors

► Useful when precise targeting intel is unknown

► Compromise website likely visited by target

► Start campaign when target is distracted (e.g. holidays)

► Once victim compromised, clean up site

► Or, leave exploit for opportunistic attacks

1) Offense: Watering Hole

Methods

Page 13: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

► On Dec 21, 2012, FireEye detected attacks from cfr.org to 4 major

customers

► Victims: large scale ISP, large US financial, US media outlet, and local

government

► Only worked from US, JP, KO, and CN systems

► Exploit triggers only one time (cookie tracking)

► First reported IE 8 zero-day exploit (CVE-2012-4792)

► Obfuscated JS + Heapspray via Flash + IE 8 exploit

► Fetches xsainfo.jpg as XOR encoded backdoor

► Loads backdoor as “shiape.exe”

► Callbacks to dynamic DNS C2 provider

as normal HTTP POST traffic

► More at: http://blog.fireeye.com

1) Offense: Watering Hole Methods

Ex: Council on Foreign Relations (CFR)

Page 14: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

1) Offense: Watering Hole Methods

Sept 2012 Capstone Turbine Space Foundation Reporters Without

Borders

Oct 2012 (Earlier

Campaigns End)

Dec 2012 CFR

Taiwan Travel Dissident

Uygur

CFR is not the first…nor the last…

Page 15: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

Email Attacks

Mass Website Compromises

• Exploit toolkits

• Zero-day exploits (rare)

• Sophisticated crimeware

Watering Hole Attacks

• Compromised site specific to industry vertical

• Zero-day exploits more common

• Frequently nation-state driven

Weaponized Email Attachments

• Common file formats

• Legit work product presented (decoy)

• Preferred by nation-states

Malicious URLs in Email (Spear phish)

• Exploits specific to target environment

• Only exploit if visited from target network(s)

• Use existing trust relationships

~1-2 Victims

(Hardest to Detect)

Page 16: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

Targeting a Large Taiwanese

Technology Firm

Page 17: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

► Coordinated and sustained attacks on Aerospace and

Defense contractors

Attack Campaigns: Operation BeeBus

Page 18: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

A New Model is Required

• Signature-based

• Reactive

• Only known threats

• False positives

• Signature-less

• Dynamic, real-time

• Known/unknown threats

• Minimal false positives

• Dynamic Threat Indicator

creations

Legacy Pattern-Matching

Detection Model

New Virtual Execution

Model

101011010101101000101110001

101010101011001101111100101

011001001001001000 100100111001010101010110 110100101101011010101000

MATCH

100100111001010101010110

MATCH

100100111001010101010110

Page 19: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

With Dynamic Cloud Threat

Intelligence

Page 20: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

► Signature-less detection engine

► Multi-vector coverage of attacks

► Multi-stage protection architecture

► Dynamic Threat intelligence for global sharing

► Dynamic Threat Intelligence for enterprise internal

sharing with API’s for

validation/interdiction/remediation

5 Design Principles of Next-

Generation Threat Protection

Page 21: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

FireEye’s DynamicThreat Protection

Platform

Att

ac

k V

ec

tors

We

b E

ma

il F

ile M

ob

ile A

pp

Multi-Vector VX (MVX) Engine

Fir

eE

ye A

PI

Dynamic Threat Intelligence (DTI)

Cloud

Security Framework FireEye OS

Virtual Object

Execution

Multi-Flow Virtual

Execution

Heuristics

Engine

Proprietary Virtual

Analysis

Dynamic Threat Intelligence (DTI)

Enterprise Partner Plug-ins

SIEM Endpoint

Gateways Packet Capture

Encrypted Traffic Network Taps

Page 22: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

Building Blocks of Our Fabric

APIs & Dynamic

Threat Intelligence

(Enterprise)

Dynamic Threat

Intelligence

(Global Cloud)

Multi-Vector Virtual

Execution (MVX)

Analysis

Page 23: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

► FireEye uses multi-flow virtual

execution analysis to capture the

full context of today’s new breed of

cyber attacks

► Stateful attack analysis enables

customers to see full attack life

cycle

► Point products only focus on a

single attack object (e.g., malware

executable), thereby missing the

attack and full life cycle view

Advanced Analysis Techniques

Multi-flow Virtual Execution

Exploit

Downloads

Callback Server Infection Server

Data

Exfiltration

Malware

Executable Callbacks

Page 24: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

The Rising Tide of Mobile Malware

► Diverse app markets with

millions of apps, billions of app

downloads

► Mobile an attractive target for

malware

► 50% of Android phones have

unpatched vulnerabilities [2]

► Mobile malware increased from

14,000 to 40,000 from July ’11 to

May ’12 [3]

Sources: [1] Managing cybersecurity risks: mobile and cloud open doors to opportunities and threats, Aug 2012 [2] Duo Security, X-Ray tool report, Sep 2012 [3] Cybersecurity Policy Report, Sep 2012

Page 25: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

Current Solutions

► Anti-virus tools

► Signature-based for known malware

► Easy to evade: code morphing,

obfuscation

► MDM tools

► Little to no knowledge about app

behaviors

► Can not reason about high-level

security properties

Page 26: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

Mobile Malware Malicious Behaviors

► Privacy violation

► Data theft

► Location tracking

► A/V recording

Page 27: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

FireEye Mobile Solution

• Mobile is now the

latest vector

supported by FireEye

• Flexible and

extensible MVX

engine to analyze

app behaviors

Page 28: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

FireEye Platform Partners

Perimeter

Monitoring

EndPoint

MSSPs

Consultants

Page 29: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

► Protects across all major

threat vectors, Web, email, file

and mobile

► Protects against the lateral

movement of malware within

the enterprise

► Most comprehensive portfolio

to stop the infiltration

mechanisms of today’s cyber

attacks and its persistence

Next-Generation Threat Protection

Portfolio Complete Protection Against

Next-Generation Threats

Web

Malware

Protection

System

Email

Malware

Protection

System

File

Malware

Protection

System

Page 30: The Evolution of Cyber Attacks and Next Generation Threat ...Protects against the lateral movement of malware within the enterprise Most comprehensive portfolio to stop the infiltration

► The new breed of attacks are

more advanced and

sophisticated, affecting all

verticals and all segments

► Traditional defenses (NGFW,

IPS, AV, and gateways) can’t

stop these attacks

► Real-time, integrated signature-

less solution is required across

Web, email, mobile, and file

attack vectors

Summary

Complete Protection Against

Next-Generation Threats

Web

Malware

Protection

System

Email

Malware

Protection

System

File

Malware

Protection

System