what happens before the kill chain

55
1 CONFIDENTIAL Dan Hubbard, CTO, OpenDNS Rick Holland, Principal Analyst, Forrester What Happens Before the Kill Chain

Upload: opendns

Post on 21-Feb-2017

2.382 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: What Happens Before the Kill Chain

1 CONFIDENTIAL

Dan Hubbard, CTO, OpenDNS Rick Holland, Principal Analyst, Forrester

What Happens Before the Kill Chain

Page 2: What Happens Before the Kill Chain

2 CONFIDENTIAL

Speakers

Dan Hubbard CTO

OpenDNS

Rick Holland Principle Analyst

Forrester

Page 3: What Happens Before the Kill Chain

3 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 3

Agenda

› The cyber kill chain › Targeted Attack Hierarchy of Needs › Making prevention work

@rickhholland

Page 4: What Happens Before the Kill Chain

4 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 4

STRESS

Page 5: What Happens Before the Kill Chain

5 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 5

Time to discover is pathetic

Page 6: What Happens Before the Kill Chain

6 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 6

asdf

205 days to discover intrusions

Page 7: What Happens Before the Kill Chain

7 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 7

Adversaries are on shopping sprees

Page 8: What Happens Before the Kill Chain

8 CONFIDENTIAL With no time limits

Page 9: What Happens Before the Kill Chain

9 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 9

New Incident Response Metric: Mean Time Before CEO Apologizes

Page 10: What Happens Before the Kill Chain

10 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 10

asdf

›  asdf We need

bright ideas

Page 11: What Happens Before the Kill Chain

11 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 11

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains

Page 12: What Happens Before the Kill Chain

12 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 12

Agenda

› The cyber kill chain › Targeted Attack Hierarchy of Needs › Making prevention work

@rickhholland

Page 13: What Happens Before the Kill Chain

13 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 13

Targeted attack hierarchy of needs

Source: May 15, 2014, “Introducing Forrester's Targeted-Attack Hierarchy Of Needs, Part 1 Of 2” Forrester report

Page 14: What Happens Before the Kill Chain

14 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 14

asdf

›  asdf

Page 15: What Happens Before the Kill Chain

15 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 15

asdf

›  asdf

Why should we give up on prevention?

Page 16: What Happens Before the Kill Chain

16 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 16

asdf

›  asdf

Why should you settle for detection and response?

Page 17: What Happens Before the Kill Chain

17 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 17

asdf

›  asdf

Can you imagine incident volume without prevention?

Page 18: What Happens Before the Kill Chain

18 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 18

Prevention is dead?

›  Be wary of anyone claiming that prevention is dead

›  Especially if all the sell are detection tools or services

›  You should lead with prevention and fall back to detection and response

Be suspicious

Page 19: What Happens Before the Kill Chain

19 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 19

Agenda

› The cyber kill chain › Targeted Attack Hierarchy of Needs › Making prevention work

@rickhholland

Page 20: What Happens Before the Kill Chain

20 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 20

Don’t wait for reconnaissance

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command & Control

Action on objectives

Source: http://cyber.lockheedmartin.com/cyber-kill-chain-lockheed-martin-poster

Page 21: What Happens Before the Kill Chain

21 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 21

asdf

›  asdf Napoleon: “An army

marches on its stomach”

Page 22: What Happens Before the Kill Chain

22 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 22

asdf

›  asdf Attacks against your org rely upon infrastructure

Page 23: What Happens Before the Kill Chain

23 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 23

Block enemy infrastructure

›  The best way to get time to containment down is to reduce the overall number of security incidents ›  Free up your limited resources to focus

more on detection and response

›  You can disrupt the adversary by blocking its ability to target you

›  The military puts the kill in the kill chain, leave hack back to the government

Page 24: What Happens Before the Kill Chain

24 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 24

Source: http://www.threatconnect.com/files/uploaded_files/The_Diamond_Model_of_Intrusion_Analysis.pdf

The Diamond Model of Intrusion Analysis

Page 25: What Happens Before the Kill Chain

25 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 25

Infrastructure that the adversary could reuse

›  Domain names ›  IP addresses

›  Command and Control structure ›  Internet Service Providers

›  Domain registrars

›  Web-mail providers

Page 26: What Happens Before the Kill Chain

26 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 26

Lenny Zeltser: Report Template for Threat Intelligence and Incident Response

Source: https://zeltser.com/cyber-threat-intel-and-ir-report-template/

Page 27: What Happens Before the Kill Chain

27 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 27

Domain registration OPSEC fail

›  Careful observation of DNS registrant contact information history has revealed an OPSEC failure by the attackers in one instance.

›  For a brief period (possibly before the server was operational), WHOIS privacy was inactive, pointing at a real identity of the registrant. ›  This e-mail address leads to social

media accounts that show public and clear affinity with Lebanese political activism.

Page 28: What Happens Before the Kill Chain

28 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 28

Page 29: What Happens Before the Kill Chain

29 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 29

Forrester definition: Predictive analytics

›  “Software and/or hardware solutions that allow firms to discover, evaluate, optimize, and deploy predictive models by analyzing big data sources to improve business performance or mitigate risk.”

Page 30: What Happens Before the Kill Chain

30 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 30

Predictive security analytics

›  Uses Big Data analysis techniques to anticipate future attacker activity based on historical activity ›  Leverages machine learning, statistical

analysis, and visualization

›  Unless you have a data science skills, navigating vendor marketing can be challenging ›  Ask vendors to provide use cases

Page 31: What Happens Before the Kill Chain

31 CONFIDENTIAL © 2015 Forrester Research, Inc. Reproduction Prohibited 31

asdf

›  asdf

Page 32: What Happens Before the Kill Chain

32 CONFIDENTIAL

OpenDNS Research

Applied Research Thought Leadership

Response Customer / Prospect Engagements

Page 33: What Happens Before the Kill Chain

33 CONFIDENTIAL

Requests Per Day

70B Countries 160+

Daily Active Users

65M Enterprise Customers

10K

Our Perspective Diverse Set of Data & Global Internet Visibility

Page 34: What Happens Before the Kill Chain

34 CONFIDENTIAL

Our view of the Internet providing visibility into global Internet activity (e.g. BGP, AS, DNS)

Page 35: What Happens Before the Kill Chain

35 CONFIDENTIAL

Apply statistical models and

human intelligence

Identify probable

malicious sites

Ingest millions of data

points per second

How it works

.com

.cn

.ru

.net

.com

Page 36: What Happens Before the Kill Chain

36 CONFIDENTIAL

How we develop our statistical models…

3D Visualization

Data Mining Security Research Expertise

Page 37: What Happens Before the Kill Chain

37 CONFIDENTIAL

Single, correlated source of information

Investigate

Types of threat information provided

WHOIS record data

ASN attribution

IP geolocation

IP reputation scores

Domain reputation scores

Domain co-occurrences

Anomaly detection (DGAs, FFNs)

DNS request patterns/geo. distribution

Passive DNS database

Page 38: What Happens Before the Kill Chain

38 CONFIDENTIAL

Predictive Intelligence

Inference Knowledge Learning

Pre-Compromise

Compromise

Post-Compromise

Page 39: What Happens Before the Kill Chain

39 CONFIDENTIAL

Predictive Intelligence

Inference Knowledge Learning

Reconnaissance

Exploitation

C & C

Weaponization Delivery Installation

Actions & Objectives

Page 40: What Happens Before the Kill Chain

40 CONFIDENTIAL

Before the Kill Chain

Reconnaissance Weaponization Delivery

Plan Build Test / Iterate

Page 41: What Happens Before the Kill Chain

41 CONFIDENTIAL

Predictive Intelligence

Plan Build Test / Iterate

•  Where will we host the infrastructure? •  How will it be fault tolerant? •  What domain / IP / Networks will I utilize? •  How will the backend scale? Reporting? Uptime? •  Private and public announcement and advertising? •  Testing and iteration of the solution

Page 42: What Happens Before the Kill Chain

42 CONFIDENTIAL

We see where attacks are staged

Page 43: What Happens Before the Kill Chain

43 CONFIDENTIAL

Examples

Page 44: What Happens Before the Kill Chain

44 CONFIDENTIAL

Malaysia Airlines DNS Hijack January 25, 2015

Page 45: What Happens Before the Kill Chain

45 CONFIDENTIAL

MALICIOUS ASN/IP IDENTIFIED Owned  by  Lizard  Squad  who  hacked  PS3  and  Xbox  Networks  in    December  2014  

Page 46: What Happens Before the Kill Chain

46 CONFIDENTIAL

OpenDNS recognized the domain hijacking on Jan 25th and blocked the DNS request, and hence any

subsequent attack

Page 47: What Happens Before the Kill Chain

47 CONFIDENTIAL

WHOIS: BEDEP Example

Page 48: What Happens Before the Kill Chain

48 CONFIDENTIAL

WHOIS: Visualization of Inferences

Page 49: What Happens Before the Kill Chain

49 CONFIDENTIAL

WHOIS: Visualization of Inferences

Page 50: What Happens Before the Kill Chain

50 CONFIDENTIAL

WHOIS Registration date after first seen!

Page 51: What Happens Before the Kill Chain

51 CONFIDENTIAL

Anomaly Detection: Identify DGAs Domain Generation Algorithms: technique for generating malware domains on-the-fly

yfrscsddkkdl.com

qgmcgoqeasgommee.org

iyyxtyxdeypk.com

diiqngijkpop.ru

Does the probability distribution of letters

appear random?

N-gram” analysis Do letter pairings

match normal language patterns?

Page 52: What Happens Before the Kill Chain

52 CONFIDENTIAL

DGA Example: Gameover

Min: May 30: Plan, Build, Test, Iterate

Page 53: What Happens Before the Kill Chain

53 CONFIDENTIAL

Conclusion

§  Do not give up on prevention and shift *all* resources to detection

§  Analyze your security posture for predictive elements

§  Utilize hunting and analytic tools to increase security efficacy

§  Explore security analytics to identify and map attacker infrastructure before the kill chain

Page 54: What Happens Before the Kill Chain

54 CONFIDENTIAL

Start a 14-Day Trial signup.opendns.com/freetrial

Page 55: What Happens Before the Kill Chain

55 CONFIDENTIAL

Questions?