CYBER THREATS AND RISKS

CYBER THREATS AND RISKS Maturing Your Incident Response Capabilities Chong Kwek Wee (CISSP) Snr Systems Engineer – ASEAN Copyright © 2016 Blue Coat Sy...
2 downloads 0 Views 4MB Size
CYBER THREATS AND RISKS Maturing Your Incident Response Capabilities Chong Kwek Wee (CISSP) Snr Systems Engineer – ASEAN Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

1

WE LIVE IN A POST PREVENTION WORLD

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

Source: Verizon 2015 breach report2

THE INVISIBLE MAN…OR MALWARE

Threats we can’t see…

30-60% of Traffic is Encrypted

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

3

THE INVISIBLE MAN…OR MALWARE New Zeus Variant Uses Sophisticated Control Panel: Researchers “Date: Jan 29, 2015” “The new Zeus variant has been used to target major Canadian banks, including the National Bank of Canada, the Royal Bank of Canada, and the Bank of Montreal.” “Furthermore, the threat doesn’t raise too much suspicion since browser security is bypassed and no SSL warnings are generated.”

GameOver Trojan hides activities in SSL connections to defraud victims “Date: Oct 7, 2013” “Instead of receiving instructions from an attacker-operated commandand-control server, the Upatre downloader uses an encrypted SSL connection to download malware directly from compromised web servers.”

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

4

TERMINAYOR – RISE OF RANSOMWARES

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

Source: http://www.pcworld.com 5

THE QUESTIONS TO ASK •  Incident Response should answer the following: What are you looking for? Why should you care about it? Where was this seen? What exactly were they doing and how? What were they looking to exploit? Why were they doing it? Who is responsible for this threat? What can I do about it? Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

6

THE EXPANDING WINDOW OF EXPOSURE T O D AY ’ S R E A L I T Y INCIDENT IDENTIFIED

RESOLUTION

TIME TO DETECTION

TIME TO RESPONSE

206 DAYS

21-35 DAYS

to Detection*

Average Breach Resolution

* Verizon Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

2014 Data Breach Investigations Report

7

SHRINKING THE WINDOW OF EXPOSURE OUR MISSION INCIDENT IDENTIFIED

TIME TO DETECTION

RESOLUTION

TIME TO RESPONSE

NET RESULT = LOWER COST

manpower, time, exposure to business and mitigated risk Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

8

MANUAL FORENSICS CLEANUP TAKES MONTHS WITH RANDOM PACKET ANALYSIS WITHOUT COMPLETE RESOLUTION

RISK ANALYSIS REPORT TO 3RD PARTIES

BREACH

NOTIFICATION

ANALYZE ENDPOINT ACTIVITY

COPY HARD DRIVES

TRY TO CREATE SCOPE OF EVENT

!

TURN ON PCAP / LOGS WHERE NEEDED

COLLECT SYSTEM LOGS

REPORT TO EXECUTIVE TEAM

ANALYZE SERVER ACTIVITY

MANUAL STITCHING OF DATA

ANALYZE PCAPS ANALYZE IP ADDRESS COMM / URLS / WEB SITES ANALYZE LOGS

START COLLECTING PCAPS

COLLECT SAMPLES / QUARANTIN E

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

ISOLATE RESPONSE

REMEDIATE

CORRELATE NETWORK TRAFFIC TIMES ZONES / ENDPOINTS ROOT CAUSE ANALYSIS

9

BASIC Forensics HISTORICAL CAPTURE AND REPLAY ACCELERATES RESPONSE AND MINIMIZES COSTS DRAMATICALLY

BREACH

!

NOTIFICATION

RISK ANALYSIS

REPORT TO EXECUTIVE TEAM

REPORT TO 3RD PARTIES ANALYSIS, CONTAINMENT

REVIEW REVIEW CAPTURED CAPTURED TRAFFIC TRAFFIC

REPLAY NETWORK ACTIVITY

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

TARGETED RESPONSE & REMEDIATION

ROOT CAUSE ANALYSIS

10

PROACTIVE INCIDENT RESPONSE FAST DETECTION OF MALWARE WITH RAPID RESPONSE MINIMIZES COSTS RESULTING FROM BREACH MALWARE EVENT

INSTANT SECURITY ALERT

GUIDED WORKFLOW

AUTOMATIC REPLAY OF ATTACK

RAPID RESPONSE

!

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

11

MATURING INCIDENT RESPONSE CAPABILITIES PROACTIVE INCIDENT RESPONSE

ENRICHED I N V E S T I G AT I O N

RETAIN EVIDENCE & I M PA C T

THREAT DETECTION

MALWARE

•  FILE

•  STATIC CODE

•  WEB

•  BEHAVIORAL

•  MAIL

•  EMULATION

SIEM INTEGRATION

ENDPOINT INTEGRATION

•  SPLUNK

•  GUIDANCE

•  DIGITAL GUARDIAN

•  ARCSIGHT

•  COUNTERTACK

•  TRIPWIRE

•  Q1 RADAR

•  BIT9+CARBON BLACK

•  PROMISEC

RECORD

REPLAY

SEARCH / METADATA

•  FULL PACKET CAPTURE

•  FILE RECONSTRUCTION

•  REAL-TIME INDEXING

•  EVIDENCE PRESERVATION

•  FILE ANALYSIS

•  OVER 2000 APPLICATIONS •  APP AWARENESS

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

12

THE HIGH PRICE OF TOO MANY ALERTS “Two-thirds of the time spent by security staff responding to malware alerts is wasted because of faulty intelligence.”!

Weekly Alerts 16,937

‘Investigated’ ‘Reliable’ Alerts 19%

Alerts 4%

Average Annual Cost $1.27M

The Cost of Malware Containment Ponemon Institute, January 2015

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

13

CAR ALARM SYNDROME “…in the case of each large breach over the past few years, the alarms and alerts went off but no one paid attention to them.” —Gartner Analyst

Avivah Litan Computerworld, 3/14/14

“….the Security software sent an alert with the generic name “malware.binary”. It is possible that the staff could have viewed this alert as a false positive if the system was frequently alarming.”

“Place your quote in this text box. The black transparent overlay will grow to accommodate your quote as it gets longer. Right click on image and select Change Picture to customize.”

– US Senate Commerce Committee Report. 3/26/14

-Don’t‘ forget to provide an attribute for the quote

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

14

FOCUSING YOUR EFFORTS Avoid the Car Alarm Syndrome Block all known sources/malnets & threats before they are on the network

Block Known Web Threats ProxySG

Allow Known Good

Free up resources to focus on advanced threat analysis

Content Analysis System with Application Whitelisting

Block Known Bad Downloads Content Analysis System with Malware Scanning & Static Code Analysis

Analyze/Alert All Ports/ Protocols in ? Real-time

? Security Analytics ? Platform Analyze Unknown Threats

Reduce threats for incident containment and resolution Analyze traffic across protocols often missed & alert in real-time for containment & resolution

Discover new threats and then update your gateways

Malware Analysis Appliance

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

15

ADVANCE THREAT DEFENSE LIFECYCLE ON GOING OPERATIONS

•  Detect and Protect

INCIDENT RESOLUTION

•  Investigate and Remediate Breach •  Threat Profiling and Eradication •  Retrospective Escalation

ON GOING OPERATIONS

INCIDENT RESOLUTION

Global Intelligence Network

•  Block ALL Known Threats •  Fortify and Operationalize

INCIDENT CONTAINMENT

•  Analyze and Mitigate INCIDENT CONTAINMENT

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

•  Novel Threat Interpretation •  Unknown Event Escalation

16

BLUE COAT GLOBAL INTELLIGENCE NETWORK 75 Million users

1 Billion+ daily categorized web requests 3.3 Million+ threats blocked daily 80 categories

Anti-virus AV scanning Central cloud database Dynamic Real-Time Ratings Malware detection

Malware expertise

Whitelisting

Global Intelligence Network Next-Generation Sandboxing

Quality checks 3rd party feeds

Unrivaled! Advanced! Threat! Protec2on!&! Defense!

55 languages

Real-time

Cloud-based

Zero-day Response

Performance and Scalability

Blocks 3.3 million threats per day Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

Unrivaled Network Effect

17

ADVANCE THREAT PROTECTION BY BLUE COAT Security Analytics Platform HTTP/S

(Alerting)

SMTP/POP3/IMAP SMB/CIFS FTP

(Blocking)

1 Scan/block/alert on all known bad files

Content Analysis System

ProxySG

IP/URL Categorization and Reputation

2

Known-Bad Malware Rejection Layer

Next-Gen – or 3rd party – sandboxing

Whitelisting/Dual-AV/ Blacklisting

4

File-Based Known Good/Bad Malware Rejection Layer

Subsequent files blocked by File/IP/ URL Rejection Layers

Blue Coat GIN

Blue Coat Malware Analysis Malware Analysis Appliance

Any 3rd Party Sandbox

NOT MALICIOUS

Cloud-based Malware Analysis

3 Update WebPulse & GIN and fortify Ecosystem

MALICIOUS

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

18



Fixed fortifications
 are monuments 
 to man’s stupidity.



— General George S. Patton

“Place your quote in this text box. The black transparent overlay will grow to accommodate your quote as it gets longer. Right click on image and select Change Picture to customize.” -Don’t‘ forget to provide an attribute for the quote

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.

19

Suggest Documents