unknown threat detection - first · advanced attack vs. defense spear-phishing customed malware...

16
Tian Tian, ZTE Corporation --- the Key Ability of APT Defense Unknown Threat Detection

Upload: others

Post on 27-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

Tian Tian, ZTE Corporation

--- the Key Ability of APT Defense

Unknown Threat Detection

Page 2: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved2

Fast ? Slow ?

Passive ? Active ?

Detection Response

Page 3: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved3

APT Case Review --- RSA SecurID Breach

Spear phishingutilizing Adobe Flash 0Day vulnerability (CVE-2011-0609)

• Opened Email, opened malicous attachment ”2011 Recruitment Plan.xls”

C&C Server

• C&C Servers connections

• Lateral movement• Privilege escalation

Page 4: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved4

unknown malware

Reconnaissance

Initial Compromise

Command & Control

Lateral Movement/Privilege Escalation

Target Attainment/Exfiltration

Creative and sophisticated

Long-t

erm

laten

tTargeted and

high impact

Advanced cyber threats are hard to detect, new methods of detection and analysis are needed.

• Location C&C Server• C&C Communication

• Remote vulnerability attack

• Spreading other malicious codes

• Spear Phishing

• Data exflitration• Bitcoin mining • Sabotage

Advanced Cyber Attack Lifecycle & Features

Page 5: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved5

Advanced Attack Vs. Defense

Spear-Phishing

CustomedMalware

0-DayExploits

Socail Engineering

Firewall

IDS/IPS

Email-GW

Anti-Virus Convert/EncrptedTunnel

Malware Variants metamorphism&packer •C&C Communication

•Internal abnormal access•Abnormal data transmission

•Email attachments• Web download files

• Other files

Page 6: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved6

File Dynamical Behavior Analysis --- Sandbox Technology

Page 7: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved7

Sandbox Technologies

First-generationSandboxing

CPU Memory ... CPU

Sandbox Malware

CPU

MalwareMalware

Monitoring Point

Second-generation Sandbox based on

software virtualization

Third-generation Sandboxbased on

hardware virtualization

Memory ... Memory ...

Monitoring Point

Monitoring Point

Page 8: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved8

ZTE Email/Web Anti-APT System

ZTE Email/Web Anti-APT System

E-mail ServerSever

Internet

• Easy deployment• Common mode: parallel deployment• Analyze incoming traffic mirroring

• Advanced technology• Third-generation Sandbox technology

based on hardware virtulization • Scalble Analysis and Management

• Support distributed deployment of dynamic analysis engines

Page 9: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved9

Distributed big data platform

Cyber Abnomal Behavior Analysis

Security Indicator

Correlation Analysis

Situation Awareness

Network Visualization

Attack Traceback

Page 10: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved10

Probability Analysis Model Design

DGA Detection Model

Access Sequence Detection Model

Relevance Detection Model

• Random domain names used to locate C&C servers• Probability of a domain name belonging to DGA

• Abnormal access behavior to the core resources• Constructing transition probability matrix for behavior patterns

• Springboards and a series individual actions of malware attacks• Temporal correlation of individuals, attack chain and scope suvey

Page 11: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved11

ZTE Defense Solution Overview

Page 12: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved12

© ZTE Corporation. All rights reserved12

Analyze

&

n Threat Extractionn Statistics & Displayn Sample deletion

and management

n Event Tracebackn Traffic storagen Log storage

n Correlation Analysisn Combination queryn Visualization

n Important sample analysis

n Event investigation

n Threat Intelligence

n Defense rules deployment

Page 13: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved13

© ZTE Corporation. All rights reserved13

Automatic Response

• System alarming• Relevant staff imforming

• Terminal defense products• Network defense products

• Internal security incidents• External security incidents

• Threat Intelligence Providing• Local and Clouds sharing

Page 14: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved14

Practical Deployment in ZTE

Page 15: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

© ZTE All rights reserved15

Practical Effect

Jan. 2017 Particular areas attack detected

Feb.~Aug.2016 Continuous ransomware

attack detected

Feb. 2016 Company executives

targeted attack detected

uHighest daily detection number of ransomware: 10,000 +u Average daily high-risk malwares detected in email : 10 +(cannot be detected by most world famous antivirus software)

Page 16: Unknown Threat Detection - FIRST · Advanced Attack Vs. Defense Spear-Phishing Customed Malware 0-Day Exploits Socail Engineering Firewall IDS/IPS Email-GW Convert/Encrpted Anti-Virus

Thanks!