tom parker, april 2015 · –(don’t just go fight mike tyson) –not nessus. –engage in...

36
All Material © Tom Parker 2015 Tom Parker, April 2015

Upload: others

Post on 09-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Tom Parker, April 2015

Page 2: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

The Speaker..

• CTO FusionX

• Consultant > 15 Years

• Author (2004): Cyber Adversary Characterization

• Speaker/Trainer Blackhat Briefings/Training

– Come learn how to own SCADA gear this summer!

• Columnist Dark Reading

04/16/15 1

Page 3: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

What we do & topic relevance

• Our Perspective:

– Conduct realistic, scenario based attacks

• Typically for CXO / BOD Level

– Identify customer ability to:

• Detect, Protect, Respond

– Provides first hand understanding of technical issues and common process level flaws

04/16/15 2

Page 4: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Todays Agenda

• Review of Threat Environment

– Evolution 00’s - today

• Common Adversary TTP’s

• Key Issues in Enterprise Environments

• Addressing Gaps:

– Increasing ROI on Existing Investments

04/16/15 3

Page 5: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Todays Environment

• 2014 estimated: $500B+ cost to Global Economy

• US “Hemorrhaging” Intellectual Property

• Enterprise IT is Losing Battles Daily

– Just not the war (yet)

• Focus on Expense in Depth

– And Compliance

404/16/15

Page 6: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Threat Time Line

2000: I Love U2001: EP3 Spy

Plane2001:

Code Red2003: SQL Slammer

2004: MyDoom 2005: Zotob 2008: Conficker2009: Operation

Aurora (Discovered)

2010: Stuxnet (Discovered)

2010: Comment Crew Attacks

2011: DuQu(Discovered)

2011: Operation Shady Rat

(Discovered)

2012: Flame (Discovered)

2013: Comment Crew Report (Disclosed)

504/16/15

Page 7: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Adversary Evolution:Attackers Respond to Defense

• Attackers Forced to Evolve

– Broad use of firewall products

• Focus on ‘hard outer shell’

– Microsoft focus on securing network services

– Implementation of DEP/ASLR for Services

– Lower Service Profile in Default Configurations

• Resulting in less network attack surface

• Offensive vs. Defensive Evolution

604/16/15

Page 8: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Real-World Attacks Today

• Are not:

– Nessus

– Always sophisticated

• Are:

– Fully Asymmetric

04/16/15 7

Page 9: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Process of Compromise:Non Linear

04/16/15 8

Asset Discovery

Asset Analysis

Asset Value Analysis

Compromise

Asset Data Mining

Page 10: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Observe, Orient & Decide: Reconnaissance

• Careful Planning Pays Dividends– Surgical Compromise of Key Resources/Individuals

– Reduced Likelihood of Detection

– Increased Chances of Success

• Common Sources Include:– Social Networks

– Search Engine Data Mining

– Tech Forums

– Paste Bin, Gist etc.

04/16/15 9

Page 11: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Act: Phishing & Drive-by Attacks

• Remains Tactic of Choice for Many Groups

• Often Provide High ROI for Attacker

– Direct, internal network access

– Immediate domain credentials / tokens

– Access to large amounts of internal data

• Cannot Be Entirely Solved via User Education

• Cannot Be Entirely Solved via IT Controls

– Even next-gen technologies (FireEye et al.)

04/16/15 10

Page 12: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Observe, Orient, Decide

• Information Repositories

– Poorly Protected File Shares

– Asset Management Systems

• Network Equipment

– Pub SNMP etc.

• Broadcast Protocols

04/16/15 11

Page 13: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Act: Lateral Movement & Escalation

• Attackers <3 Flat Networks

– Direct Access to Administrative Interfaces

– Exploitation of Internal Network Services

– Access to File Shares / Databases

• Secondary User Account Compromise

– Targeting of Administrative Group Users

04/16/15 12

Page 14: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Act: Common Internal Targets

• Authentication Subsystems:

– Domain Controllers

– RAS Servers

– Two Factor Systems (RSA SecurID Servers et al)

• Remote Access Devices:

– SSL & B2B VPN Appliances

– VDI Environments

04/16/15 13

Page 15: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Act: Common Internal Targets (Cont.)

• Internal Web Applications– Think HR, CRM, Management Apps

• Often built on tech such as SAP, JD Edwards, E-Business

– Typically less security scrutiny than ext. apps• Fewer controls between application tiers

• Far less frequently tested & monitored

• Management Infrastructure– Frequently crosses over trust-zones

– Patch & configuration management systems

04/16/15 14

Page 16: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Detect, Protect Respond

• Basic Enterprise Issues Hamper:

– Detection: with confidence

– Protection: effectively

– Response: quickly enough, or at all

04/16/15 15

Page 17: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Detect: Key Issues

• Missed First Opportunities for Detection

– Before primary attack even occurs

• Common Missed Opportunities

– Domain Registration

– Network Recon

– Social Networks etc.

04/16/15 16

Page 18: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Detect: Key Issues

• There’s LOTS of Data within Enterprise

• Often Look to ‘Next-Gen’ Solutions

– When the answer/data might already exist

• Data worthless without context

– Asset context

– Event context

04/16/15 17

Page 19: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Detect: Key Issues

• Common Monitoring Gaps:– Service & Privileged Account Usage

– Industrial Control Systems Equipment• Often operated behind back of Enterprise IT

– Enterprise Applications• Any monitoring often lacks application context

– Generally focused around WAF technology

– Versus application-level feedback to SIEM

– Databases• Query auditing uncommon

• DB logging infrequently tied to SIEM

04/16/15 18

Page 20: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Protect: Key Issues

• You can only protect what you know exists

• Unknown Unknowns

– Poor Internal & External Asset Awareness

• Sparsely Distributed Assets / Hosting

• Domain Registration Tracking

• Asset Management / Unmanaged Connectivity

– Data Classification, Storage & Flows

• Where your crown jewels are stored (incl. the copies)

• How does it move around the environment

04/16/15 19

Page 21: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Protect: Key Issues

• Poor User Education wrt/:

– Social Media Usage

– Use of Technical Forums

– Use of Paste Bin et al.

04/16/15 20

Page 22: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Protect: Key Issues

• Basic Hygiene Issues– Poor network segmentation

• Common IT resources leveraged across trust-zones

– Excessive account privileges

– Third party software patching

– Insecure or non existent system base lines

– Insecure remote access solutions (end points)

– Over reliance on silver bullet solutions• FireEye, MIR et al.

3/28/2013

21

Page 23: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Incident Response:Everyone Has a Plan

“Everyone has a plan ‘till they get punched in the mouth” – Mike Tyson

04/16/15 22

Page 24: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Compromise Time Line

• First 24 Hours of Internal Access Critical– For Both Attackers and Defenders

– > 24 Hours == Non-trivial remediation

– Will have established multiple C2 methods

• One week+:– Enterprise-wide compromise

– Will likely know more about your own environment than your own staff

– Significantly hinders future defensive efforts

04/16/15 23

Page 25: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Cost Of Response

4/1/15 24

0

20

40

60

80

100

120

1 2 3 4

Adversary Time On Network

Cost

Page 26: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Response: Key Issues

• Response Times Hampered By:

– Poor knowledge of targeted assets

• Allowing for effective triage/prioritization

– Incomplete information on breach activity

• Poor visibility / forensic data readily available

– Inability to handle digital ‘fog of war’

• Response Plan Infrequently (Fully) Tested

– Table-top exercises have limited value

04/16/15 25

Page 27: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Detect

• Users– Educate them

• They might be your first line of detection• Ensure acceptable social network use is covered.

– Develop a culture of self reporting– Educate them some more– Proactively monitor for infringements

• Particularly social network / disclosures

• Monitor– New domains, SSL Certs, Web Sites

• Via threat intel & other monitoring services

04/16/15 26

Page 28: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Detect

• Databases: Increase ROI

– Leverage Table & Column ACL’s

• Enabling detection of anomalous queries

– Monitor Sensitive Fields

• Such as via Oracle AUDIT Tables

– Baseline Normal Query Activity

• Such as Originating from App Server

• Leverage SIEM for Deviations & Correlation Events

04/16/15 27

Page 29: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Detect

• Applications

– Hook Applications to Understand Business Logic

• Log business logic trespass attempts

• Instrument Interface to SIEM

– Stop Relying on that WAF!

• Identify & Track Priv. Account Activity

– Reduce day-to-day use of priv. accounts.

– Service account RDP’ing – probably not good.

04/16/15 28

Page 30: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Detect

• Industrial Control Systems

– Everyone has them

• HVAC, Energy Distribution Subs, Data Centers Power Management, Branch UPS Devices et al.

– Find them, monitor them.

• Get Context

– Develop Asset Risk / Scoring

• Automate Prioritization Accordingly

04/16/15 29

Page 31: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Protect

• Get Asset Management Right

– Don’t necessarily buy that list IT gave you.

– Monitor Company-Branded Websites

– Centralize Hosting / Reduce Attack Surface

• Mature Data Classification

– Enforce adherence to data protection policy

– Leverage e-Discovery tools to identify spillage

04/16/15 30

Page 32: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Protect

• Address Segmentation Issues

– Identify & address problematic trust relationships

• Review Privilege Requirements

• Implement 3rd Party Patch Strategy

– Proactively identify gaps

• Evaluate True Effectiveness of Security Products

– Don’t believe (all) the marketing.

04/16/15 31

Page 33: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Respond

• Ensure your Responders Understand:

– Your network

– Have IR SME’s for Specialized Systems

– Ensure access is provisioned to the right data

– Train your team to operate under fog of war

– Test & update your IR plan regularly

• Not just table top exercises

04/16/15 32

Page 34: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Detect, Protect, Respond

• Find a Sparring Partner

– (Don’t just go fight Mike Tyson)

– Not nessus.

– Engage in scenario based red teaming activities

• Test your response times (let the SOC believe its real)

• Test your business continuity processes– Legal, marketing, corporate communications

04/16/15 33

Page 35: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Wrapping Up

• Get back to basics

• Focus has to change from

– Silver Bullet Solutions

• No Solution Can Save you from Poor Hygiene

– Compliance-centric Security

• Many solutions exist within the Enterprise

• Smart Money Matters, not Volume

– Measure ROI

04/16/15 34

Page 36: Tom Parker, April 2015 · –(Don’t just go fight Mike Tyson) –Not nessus. –Engage in scenario based red teaming activities •Test your response times (let the SOC believe

All Material © Tom Parker 2015

Questions?

04/16/15 35