introduction to threat deception for modern cyber warfare · myths and realities evaluating...

30
1 Attivo © 2018 Attivo Networks. All rights reserved. Joseph R. Salazar | Technical Deception Engineer CISSP, CEH, EnCE Introduction to Threat Deception for Modern Cyber Warfare

Upload: others

Post on 24-Jul-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

1Attivo© 2018 Attivo Networks. All rights reserved.

Joseph R. Salazar | Technical Deception EngineerCISSP, CEH, EnCE

Introduction to Threat Deception for Modern Cyber Warfare

Page 2: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

2Attivo© 2018 Attivo Networks. All rights reserved.

AGENDA

Introduction

Attacker Playbook

The Need for Deception

Deception as Detection

Myths and Realities

Page 3: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

3Attivo© 2018 Attivo Networks. All rights reserved.

root@kali:~# whoami

Joseph R. Salazar • Information Technology since 1995• Information Security since 1997• Major, USAR (retired) with 22 years as a

Counterintelligence Agent, Military Intelligence Officer, and Cyber-Security Officer

• CISSP, CEH, EnCE

Page 4: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

4Attivo© 2018 Attivo Networks. All rights reserved.

A Peek at an Attacker’s Playbook

Attacker assumes he has time, has

unlimited attempts, and can move slowly through the network to avoid detection

24

Attacker moves laterally inside the

network and escalates privileges to

reach critical assets

Attacker assumes all information found is

real; deceptive data is not expected

Page 5: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

5Attivo© 2018 Attivo Networks. All rights reserved.

Most perimeter & end-point security solutions cannot reliably detect the following attack vectors

Detection Gaps Create Open Doors for Attackers

HTTPS bypasses network security

Zero-day exploitation

Stolen employee credentials

End-point/BYOD

Breaches can take months before being detected

Active Directory reconnaissance

Page 6: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

6Attivo© 2018 Attivo Networks. All rights reserved.

The Entire Network Becomes A Trap And A Hall Of Mirrors

Obscures the Attack Surface; Disrupts AttackerDeception to Divert Attacker’s Attention

• Decoy systems to misdirect attacker• Deception credentials and bait lure attackers

Deception as a Method of Detection

Deception Forces the Attacker to Have to Be Right 100% of the Time.

Page 7: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

7Attivo© 2018 Attivo Networks. All rights reserved.

Deception, for Better Detection Against Better Attackers

VSFirewall

IDS Proxy

AV

Hunt Teams

Network Anomaly Detection

UEBA SIEM

ACCURATELY DETECT KNOWN & UNKNOWNS

DETECT ACROSS ALL ATTACK SURFACES

HIGH-FIDELITY ALERTS WITH FORENSICS

EASY, SCALABLE OPERATIONS

THREAT DECEPTION: EARLY, ACCURATE, EFFICIENT

- SLOWS DOWN AND RAISES COST TO ATTACKERS -

Other Detection Methods

Page 8: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

8Attivo© 2018 Attivo Networks. All rights reserved.

Attivo ThreatDefend Deception in the Security Control StackReduce Dwell Time & Close Detection Gaps

Perimeter SecurityDeception-based Detection

Host FirewallHIPSEDR

Antivirus

Network Reconnaissance

Credential Harvesting

Man-in-the-Middle Attack

Active Directory Reconnaissance

In- Network Detection for what other controls miss

Page 9: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

9Attivo© 2018 Attivo Networks. All rights reserved.

Efficient, Scalable, In-network Threat Detection that changes Asymmetry of AttackDeception for Closing the Detection Deficit

In-network: Recon, Credential Harvest; Slowing of Attack

Detect Endpoint & Domain Credential Theft; Attack Path Visibility

User Networks, Datacenters, Specialized (SCADA, IoT, POS, SWIFT, Telecom, Router Decoys), Cloud (AWS, Azure, OpenStack)

Detection, Analysis, Interaction to Slow Attack

Compliance and Forensics; Pen Test, Evaluate Latent Threats

Easy to Deploy and OperationalizeAutomated Attack Analysis and Incident Response

Closes the Detection Gap with Accurate Detection and Threat Visibility

Challenges Deception-Based Solution to Close the Gap

Compliance, Breach Investigation, M&A Visibility

Skills Shortage and Ability to Respond to Incident

Credential Theft Based Attack

Lateral Movement Threat Detection

Ransomware

Evolving Attack Surface

Page 10: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

10Attivo© 2018 Attivo Networks. All rights reserved.

Establish Foothold

Escalate Privileges

Internal Recon

Complete Mission

Initial Compromise

MoveLaterally

MaintainPresence

Deception in the Attack Life Cycle

Detection & Investment Gap

Deception Value = High Fidelity AlertsReconnaissance, Lateral Movement, Credential Theft

Page 11: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

11Attivo© 2018 Attivo Networks. All rights reserved.

• Operating System• Network Services• Active Directory• Application and Data

Entire Network Becomes a Trap Across All Threats and Attack SurfacesDeception-based Detection for Evolving Attack Surfaces

Deception Server

Data Center

User Network

SpecializedSCADA/ IoT/ POS

Cloud and Remote Networks

Active Directory Deception Objects

1

2

3

4

Lateral Movement

Credential Theft

Active Directory Recon

Ransomware

Malicious ActorInsider

3rd Party

Page 12: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

12Attivo© 2018 Attivo Networks. All rights reserved.

Myth 1

100% Security is Achievable.

Reality 1

A Shift to Detection as a Security Control is Critical.

Page 13: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

13Attivo© 2018 Attivo Networks. All rights reserved.

Detection for the Modern Day Attacker

Evolving Attack SurfaceEvolving Threats

Reconnaissance

Stolen Credential

Active Directory

Man-in-the-Middle

Endpoint

Network & Campus

Data Center & Cloud

IoT, ICS, POS, SWIFT …

Malicious ActorInsider

3rd Party

Page 14: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

14Attivo© 2018 Attivo Networks. All rights reserved.

Myth 2

Deception is Just a Honeypot.

Reality 2

Only if you believe a horse and buggy is the same as a Tesla Model S.

Page 15: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

15Attivo© 2018 Attivo Networks. All rights reserved.

Why Honey Pots are Not the Same as Deception

Outside the Network

Low Authenticity

Low Interaction

Inside the Network

Network, Credential

High Authenticity

AD Integration

Easy Operation

IR Automation

BOTs and Brute Force Attacker Designed for

Research

the Human Attacker

Global Scale

Page 16: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

16Attivo© 2018 Attivo Networks. All rights reserved.

Myth 3

Deception is Hard to Deploy.

Reality 3

Machine learning and ubiquitous computing make deployment easy.

Page 17: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

17Attivo© 2018 Attivo Networks. All rights reserved.

Scalability and On Demand Ability to Change the Game Board on AttackersAdaptive Deception Campaign Deployment

Deploy Dynamic Deception Campaigns based on Machine Learning

Learn Suspicious Behavior

Network Profiling &

Assessment

IOT/SCADAData Center/CloudUser Networks

Network Discovery

SIEM Feeds

Security Partner Feeds

Manual1 Auto-Propose2 Auto-Deploy3

Page 18: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

18Attivo© 2018 Attivo Networks. All rights reserved.

Myth 4

All Deception is Created Equal.

Reality 4

Solutions vary widely based on comprehensiveness, authenticity, attack analysis, and ability to improve incident response.

Page 19: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

19Attivo© 2018 Attivo Networks. All rights reserved.

Not All Deception Technology Provides an Active Defense

Authenticity

Evolving Attack Surface

Ease to Operationalize

Attack Threat and Malware Analysis

Simplifies Incident Response

Attack Simulation & Threat Assessment

Depth of Deception

Real OS, Apps, Services, high interaction, Dynamic

Network, DC, Cloud, Specialty IOT, ICS, POS, and more

Not inline; Agentless

Full sandbox and forensic reporting

Integrations for automated blocking, quarantine, hunting

Attack path and replay visual maps, simulators

Network, Endpoint, Application, Data

Low interaction, emulated, static

Limited environments

Inline, reliant on agents

Limited forensics and analysis

No or limited automation

Partial assessment tools

Only Network or EP

Enterprise Grade Limited Functionality

Relies on the element of surpriseBuilt for the anticipating attacker

Page 20: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

20Attivo© 2018 Attivo Networks. All rights reserved.

Advanced Threat Intelligence

Early In-Network Threat Detection(Attack Vectors; Evolving Attack Surface)

Eval

uatio

n C

riter

ia

Types of Deception Technology

Environments

Authenticity

Ease of Deployment and Operations

Attack forensics

Attack Analysis

Threat Vulnerability Assessment

Incident Response

Evaluating Deception Technology and Providers

Accelerated and Continuous Response

Page 21: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

21Attivo© 2018 Attivo Networks. All rights reserved.

Myth 5

It’s a “nice to have,” not a “need to have.”

Reality 5

Deception is customer proven to close the detection gap with early and accurate detection.

Page 22: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

22Attivo© 2018 Attivo Networks. All rights reserved.

Organization DiscoversInsider Threat

• The customer was concerned about internal risks to the network and sensitive client information.

• After installing the deception solution, security saw SMB share connections to multiple endpoints followed by recon scans.

• Network administrator with credentials had infected endpoints as zombies to scan network.

• Only the deception solution efficiently and accurately detected the recon activity.

• Network administrator was terminated by customer and legal action are pending.

The customer was able to monitor for insider threats and collect the necessary evidence to support legal action.

Concern Overview Outcome

Value

Page 23: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

23Attivo© 2018 Attivo Networks. All rights reserved.

Mergers & AcquisitionsSecurity Concerns

• The organization wanted visibility into the networks of recently acquired companies.

• They suspected the networks were compromised, had no dedicated security team, and lacked a mature security infrastructure.

• They deployed the deception solutions to the subsidiary networks for visibility, and a central manager in the cloud for reporting and alerting.

• They were able to assess the network security infrastructure remotely, and validated their visibility by running Red Team tests in the acquired networks that they detected with the deception solutions.

The organization assessed the security readiness of the acquired networks and resolved issues before connecting them to the corporate network.

Concern Overview Outcome

Value

Page 24: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

24Attivo© 2018 Attivo Networks. All rights reserved.

Annual Penetration Testingfor Compliance Validation

• Customer wanted to validate their network resiliency to meet annual security compliance requirements.

• The team had failed multiple penetration tests because of their inability to detect advanced, in-network threats.

• Customer installed deception solution for pen test.

• Pen tester compromised an endpoint, stole deceptive credentials, and engaged with deception solution decoy, thinking it was a real system.

• The deception solution immediately detected when the pen tester used stolen credentials during the penetration test.

• The InfoSec team was able to track their every move.

The customer successfully validated their security infrastructure resiliency for annual compliance requirements.

Concern Overview Outcome

Value

Page 25: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

25Attivo© 2018 Attivo Networks. All rights reserved.

Myth 6

Deception Won’t Work Against Real Attackers.

Reality 6

Accurate, realistic, and authentic Deception can fool even the most experience attackers.

Page 26: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

26Attivo© 2018 Attivo Networks. All rights reserved.

"From an environment perspective, looking at it from the network and Active Directory,

everything looked legitimate. That's where most people will be coming from. It's likely they won't be able to decipher what is real

and what is not, like I couldn't."

- Senior Penetration TesterPen-testing Attivo Deception

Page 27: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

27Attivo© 2018 Attivo Networks. All rights reserved.

Compromised AD/Network Incident Response and Cleanup

• Attackers had been inside customer’s network for years.

• Attackers compromised numerous servers including AD and the gift card portal with stolen credentials,

• Attackers created AD accounts to maintain access.

• Customer stealthily installed deception solution for network visibility and IR.

• Professional services engaged to help triage, respond, and remediate attacker presence across numerous environments.

• The deception solution detected attacks to the Citrix environment, identified fraudulent AD accounts, and identified credentials used to steal gift card information.

• Final cleanup is ongoing with deception solution providing visibility.

The customer used the deception solution for unparalleled network visibility to clean up the persistent presence without alerting the attacker.

Concern Overview Outcome

Value

Page 28: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

28Attivo© 2018 Attivo Networks. All rights reserved.

Summary

Deception for Internal Threat Detection

Myths and Realities

Evaluating Deception Technology Differences

Value of Deception

Conclusion

Detection Efficiently Closes the Detection Deficit

Deception Platforms are Not Created Equal

Deception is a need-to-have technology that provides immediate and long-term value

Summary and Conclusions

Page 29: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

29Attivo© 2018 Attivo Networks. All rights reserved.

Questions?

Page 30: Introduction to Threat Deception for Modern Cyber Warfare · Myths and Realities Evaluating Deception Technology Differences Value of Deception. Conclusion Detection Efficiently Closes

30Attivo© 2018 Attivo Networks. All rights reserved.

Let’s Keep in Touch!

Deceive. Detect. Defend.