threat landscape

29
The Threat Landscape Don Murphy Senior Systems Engineer Fortinet, Inc.

Upload: adnet-technologies-llc

Post on 05-Aug-2015

108 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Threat Landscape

The Threat Landscape

Don MurphySenior Systems Engineer

Fortinet, Inc.

Page 2: Threat Landscape

The Internet is only 45 Years Old

Page 3: Threat Landscape

What was the plan for security?

Page 4: Threat Landscape

• Difference between Viruses and Malware• Viruses are a specific type of malware designed to replicate and

spread• Malware is all types of malicious code• Malware can include Viruses, Spyware, Adware, Nagware,

Trojans and Worms• Because Viruses obtained so much press the standard became

Anti-Virus

De-Mystifying Viruses, Malware, and Other Threats

Page 5: Threat Landscape

• Delivery Mechanism has yet to be relieved • Creates a network share accessible by all computers• Hosts a web server• Malware attempts to connect to C&C in Italy, Poland or Thailand • Similar to DarkSeoul that struck South Korea last year

Sony Pictures – Wiper Malware

Page 6: Threat Landscape

• Attackers gained credentials from a third-party vendor• Exploited third-party vendor’s system and Home Depot’s

network via Microsoft Exploit• A large Apple purchase was made by Home Depot shortly after

Home Depot Breach

Page 7: Threat Landscape

• Breached unclassified network used by President’s Senior staff• Discovered in Early October - Alerted by Foreign Government• Hackers appeared to be mapping and probing the network• Hackers are believed to be working for the Russian Government

The White House Breach

Page 8: Threat Landscape

• Was not a breach of Apple Systems including iCloud or Find My Phone

• Very targeted attack on user names, passwords, and security questions

• Apple Recommends a strong two factor authentication solution and will also send out more alerts

• Phishing scam came out soon after

iCloud Celebrity Photo Breach

Page 9: Threat Landscape

DISGUISE SURVIVABILITY IMPACT

Detect Disguise,Kill the Chain

Reduce Survivability,Break Impact

What are APTs?Defining Advanced Persistent Threats

Page 10: Threat Landscape

• Probing of Targets• Information Gathering

APT Stages - Reconnaissance

Page 11: Threat Landscape

• Phishing Emails, Malicious Flash or PDFS• Malicious Websites that attack flaws in browsers• Piggybacking mouse clicks

APT Stages - Infiltration

Page 12: Threat Landscape

• Callback Attempts are made to Mothership• Low Profile Otherwise

APT Stages – Malware Action

Page 13: Threat Landscape

• Delivery of Stolen/Compromised Data

APT Stages – Exfiltration

Page 14: Threat Landscape

• Command and Control have established connection to compromised client

• Attacks continue on file shares, cloud-based applications, databases, etc.

• Expect lateral moves within the network to expand reach as well as destruction

APT Stages – Further Exploitation

Page 15: Threat Landscape

• Ransomware: Attempts to extort money out of the infected users

• Cryptolocker encrypts locals files or networks • Ransom to unlock the files can be anywhere from $200 to

$2000

Cryptolocker / CryptoWall

Page 16: Threat Landscape

• Email attachments: .exe files posing as .pdf• Botnets: a pay-per-install operation

Cryptolocker – How did I get infected?

Page 17: Threat Landscape

• Rolling back changes from the infected system itself • Restoring files from external back-ups• Paying the ransom.

Cryptolocker – What can I do if I’m infected?

Page 18: Threat Landscape

The HeartBleed Bug

• Why is it call a Bug?»OpenSSL 1.0.1 library implementation

problem• Why should I change my passwords?

»Usernames, Passwords, and Private keys exposed.

• What should I do if my company is effected?»Vendor patches, new certificates, IPS

signatures

Page 19: Threat Landscape

2015: What’s Next?

• Mobile»New Milestone 2013 - Mobile Malware in listed Top

10 Virus Index»Custom Polymorphic Malware / Evasion

• Moving beyond applications (APK)

• 2014 Data Security “Breach a month”»Prediction on track so far…

• More Ransomware due to Cryptolocker Success»Estimated at over $40 Million in ransom dollars paid

Zero-Day Trends

Page 20: Threat Landscape

Mobile: Android Malware

Page 21: Threat Landscape

Mobile: IOS Malware

Page 22: Threat Landscape

• Blacklisting C2 servers with Webfiltering• Disrupting Trojan to C2 server communication with IPS/AppCtrl • AV Protection of all known Variants

Cryptolocker – What Fortiguard does to protect and prevent

Page 23: Threat Landscape

Case Study: FortiGuard Response

South Korea Attacks

SupiciousActivity

March 12th, 2013

Time BombAttacks

Botnet ServersDeteted

March 20th, 2013Malware Planted

WCF SignaturesAdded

Botnet ServersMitigated

KISA Request(FortiGuard)

MalwareMitigated

+4 Hours

AVSig (Flow)

12 Hours

Botnet FlowMitigated

AV Sig (CPRL)AppCtl (Botnet)

48 Hours

BlogAnalysis

ZERO-DAY MALWARE USED

Overwrote hard drives

Detonated simultaneously

Page 24: Threat Landscape
Page 25: Threat Landscape

APT Strategy: Multi-Layer Defenses

1) Anti-Virus--------------------------------------

Detect known viruses Detect new variants (emulation and sandboxing)

2) Web Filtering--------------------------------------

Detect connections going to malware sites Typically to download the real malware

4) IPS--------------------------------------

Block known vulnerabilities Including undisclosed vulnerabilities

3) Botnet / AppCtrl--------------------------------------

Detect connections or traffic going to botnet sites Detect known botnet applications

5) Behavioral--------------------------------------

Sandbox analysis Client reputation analysis

Page 26: Threat Landscape

www.cyberthreatalliance.org

Page 27: Threat Landscape

Questions?

Don [email protected]

www.fortinet.com

Page 28: Threat Landscape

@Fortinet

@Fortinet

@Fortinet

www.fortinet.com

Page 29: Threat Landscape

@ADNETTech

@ADNETTechnologiesLLC

@ADNETTechnologiesLLC

www.thinkADNET.com