prevention is better than cure · 2016. 5. 12.  · jamie brummell. are our cyber adversaries...

44
PREVENTION IS BETTER THAN CURE JAMIE BRUMMELL

Upload: others

Post on 28-Mar-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

PREVENTION IS BETTER THAN CURE

JAMIE BRUMMELL

Page 2: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Are our cyber adversaries winning?

2

Page 3: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

FSI is one of the top 3 industries for security incidents

• Trailing only Government and Media

• Accounted for ~35% of confirmed data breaches

Verizon Data Breach Investigations Report

3

Page 4: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

4

CyberHacktivism

CyberMischief

CyberWarfare

CyberTheft

CyberEspionage

CyberTerrorism

£700bn+CYBERCRIME IS NOW A

BOOMING INDUSTRY

Motivations may vary…

but the fact is…

Page 5: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

why are our cyber adversaries winning?

5

Page 6: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

anatomy of a data breach

6

Page 7: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

But first…. Some Terminology

• Vulnerability▪ A weakness in a product that could allow an attacker to compromise the integrity,

availability, or confidentiality of that product

• Exploit▪ A piece of software, a chunk of data, or a sequence of commands that causes

unintended or unanticipated behaviour to occur on software or hardware

• Malware▪ An umbrella term used to refer to a variety of forms of hostile or intrusive software

• Patch▪ Software security patches (attempt to) fix vulnerabilities that might be exploited

• Code Execution▪ An ability that allows an attacker to execute their own code on the victim machine

7

“An attacker uses an exploit against a vulnerability, on an unpatched system, to obtain code execution, often resulting in the installation of malware”

Page 8: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Join | LoginPresenting a Webinar?SLIDESOURCE

Protect your company

Our amazing new product provides unprecedented protection from 100% of all threats. You will never need to buy anything else.

SearchFind more webinars and videos

Enterprise Security

Channel Profile

Channel RSS Feed(12,000 Subscribers)

Find the topicsthat interest you

HOME > All SLIDESOURCE > Enterprise Security

Protecting Critical Assets

Leading a new era in cybersecurity by protecting thousands of enterprise, government

CIO News

Leading a new era in cybersecurity by protecting thousands of enterprise,

Sandboxing is enough

Leading a new era in cybersecurity by protecting thousands of enterprise,

Standalone IPS

Leading a new era in cybersecurity by protecting thousands of enterprise,

Date | Rating | Views

Step 1: Reconnaissance

Identify a specific target within an organisation:

8

▪ Content fromcorporate websites

▪ Third-party sites to identify key targets

▪ Common search techniques

Page 9: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 1: Reconnaissance

9

Simple Google Search Event attendee contact detailsfiletype:xls inurl:attendees

Page 10: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 1: Reconnaissance

Identify the tools used to protect an organisation

10

Page 11: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 2: Weaponisation & Delivery

11

Attack a with a specific target

USB stick, direct network attack etc

Attack a group with specific interests

Spear Phishing

Everything Else

Watering Hole

Page 12: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 2: Weaponisation & Delivery: Spear Phishing + Drive-by Download

12

User clicks on link to a malicious website

Targeted malicious email sent to user Malicious website

silently uses exploit kit against a client-side vulnerability

System infected, attacker has full access

‘Drive-by download’ of malicious payload

Page 13: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

http://...

Step 2: Weaponisation & Delivery: Watering hole + Drive-by Download

13

Page 14: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 2: Weaponisation & Delivery

14

I wonder what’s on it…

Ooh – a USB stick!

Page 15: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 3: Exploitation

15

Why use malware when you have legitimate credentials?

Users are typically the path of least resistance

Exploiting the user

Page 16: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 3: Exploitation

16

Exploit

Why use a valuable, previously unknown exploit (aka ‘0-day’) when old vulnerabilities may not be patched?

Exploiting software

Page 17: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 4: Installation

17

Highly customised and unique tools are used for

most attacks

‘Off-the-shelf' tools are most commonly used

in an attack

RealityMyth

OR

?

Page 18: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 4: Installation

18

▪ Keylogger▪ Audio Capture▪ Screen Capture▪ Webcam Capture

Page 19: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 4: Installation

19

Buy ready-made, malicious software with 2 years support for only $140!

Page 20: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 4: Installation

20

Or buy a massive, ready-made malware network for $15k!

Page 21: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 5: Command and Control (aka ‘C2' or ‘CnC’)

21

User Land

DMZ

Ingress/Egress

Data Centre/Infrastructure

Internet

Adversary Infrastructure

Communicating with infected hosts and providing instructions

Page 22: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

User Land

DMZ

Ingress/Egress

Data Centre/Infrastructure

Internet

Adversary Infrastructure

Step 5: Command and Control (aka ‘C2' or ‘CnC’)

22

Second stage+

Establish C2

Malware downloads 2nd stage or beacons

2nd stage malware download and establish C2 channel

Page 23: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

User Land

DMZ

Ingress/Egress

Data Centre/Infrastructure

Internet

Adversary Infrastructure

Step 6: Actions on Objectives

C2 ultimately enables the attacker’s endgame: Actions on Objectives

23

Objective based

commands

Information exfiltration

Dump domain credentials

Steal repository information

Steal local credentials

Deface or host malware from site

Steal local information

Page 24: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Step 6: Actions on the Objective

24

Goals Inside the Network

Your data in their hands

Completed by an Active Operator

Page 25: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Prevention Opportunities in the Cyber Attack Lifecycle

Reconnaissance Delivery Exploitation Command-and-Control Objective

UnauthorisedAccess UnauthorisedUse

Installation

25

1 2 3 4 5 6

Page 26: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

…so what have we been doing wrong?

26

Page 27: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

27

Legacy Whack-a-Mole Security

Page 28: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

We mistakenly shift focus to detection and remediation

28

Page 29: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

29

Page 30: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

30

“The Home Office has determined that preventing

attacks on our streets is futile and is therefore shifting investment to

crime scene cleanup and timely restoration of

normal life"

Page 31: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

a new approach to prevention

31

Page 32: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

1: Be Positioned to Prevent

32

AttheInternetEdgeandPartner

Edge

D

BetweenourEmployees

Devicesinsidethenetwork

AttheDataCentreEdgeand

betweenservers

OntheEndpoint,anywhereit

resides

Cloud

WithinPrivate,Public,HybridCloudsandSaaS

platforms

‘Zero Trust’ Approach

Page 33: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

2: On the Endpoint: Prevent the Techniques - not the Attacks

33

Individual Attacks

New Software Vulnerability Exploits p/a1,000s

Core Techniques

New Exploitation Techniques p/a2-4

New Malware variants p/a1,000,000s

New Malware Techniques p/a~10s

Signature-based, AV technology is ineffective against unknown threats

Page 34: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

3: We need Automation

34

Page 35: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

4: We must share Threat Intelligence with our peers

35

• Global resource for cyber threat intelligence analysis and sharing for the Financial Services industry

• Distils threat information into actionable intelligence

• Palo Alto Networks is establishing automation to consume and share threat intelligence with the FS-ISAC and its members

• Co-founded by Palo Alto Networks to share threat intelligence among cyber-security solutions providers

• Leverage the shared intelligence to improve collective defences offered to their customers

www.securityroundtable.org - The Security Roundtable is a community designed to share best practices, use cases, and expert advice to guide executives on managing cybersecurity risks.

Page 36: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Only an Integrated Platform can Prevent Cyber Attacks

36

• On the network and on the endpoints: Positioned to Prevent

• All components natively integrated and automated

• Driven by threat intelligence in the cloud

Page 37: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

The End Result? We disrupt the attacker’s business model

Page 38: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents
Page 39: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

the detail…

39

Page 40: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Preventing Delivery and Installation

40

Prevent malware and exploits at the network level

Deploy a solution that can detect new exploits and malware, dynamically updated your protections across AV, URL and DNS

Prevent exploits that have never been seen before on the endpoint

User-based policy such as limiting the download of executable files from the Internet

Block commonly exploited file-types on your network

Page 41: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

URL Filtering

DNS Sinkholing

Dynamic DNS

Detect and Block

Preventing Command-and-Control

41

Proactively Block Unknown

and Undesirable

websites

Identify source of malicious DNS queries

Block the Dynamic DNS URL category

Common RAT C2 signatures

Page 42: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Preventing Attacks at Every Stage of the Attack Lifecycle

42

Breach the perimeter1 Deliver the malware2 Lateral movement3 Exfiltrate data4

URLFiltering

▪ Preventuseofsocialengineering▪ Blockknownmalicious URLs&IPaddresses

Next-GenerationFirewall/GlobalProtect

▪ Visibilityintoalltraffic,includingSSL▪ Enablebusiness-critical applications

▪ Blockhigh-riskapplications▪ Blockcommonly exploited filetypes

ThreatPrevention

▪ Blockknownexploits,malwareandinbound command-and-controlcommunications

Sandboxing(WildFire)

▪ Sendspecific incoming filesandemaillinksfrom theinternettopublicorprivatecloudforinspection

▪ Detectunknownthreats

▪ Automaticallydeliverprotectionsglobally

Next-GenerationFirewall/GlobalProtect

▪ Establishsecurezoneswithstrictlyenforcedaccess control

▪ Provideongoingmonitoringandinspectionof alltrafficbetweenzones

ThreatPrevention

▪ Blockoutbound command-and-controlcommunications

▪ Blockfileanddatapatternuploads▪ DNSmonitoringandsinkholing

Traps/Sandboxing (WildFire)

▪ Blockknown&unknown vulnerabilityexploits

▪ Blockknownandunknownmalware

▪ Providedetailedforensicsonattacks

URLFiltering

▪ Blockoutbound communication toknownmalicious URLsand IPaddresses

Sandboxing(WildFire)

▪ Detectingunknownthreatspervasivelythroughoutthenetwork

11 | © 2015,Palo Alto Networks. Confidential and Proprietary.

Page 43: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Private WAN

FINANCIAL SERVICES REFERENCE BLUEPRINT

Datacenter

Campus/HQ3rd-party ServicesSoftwareasaService(SaaS)

Online Consumers

Proxy

PrivateLAN/WAN

Wi-Fi

Security Appliance

Security Appliance

Web Server VPN Gateway

DMZ

WildFire

Aperture

Teleworkers Public Cloud

Teller

Security ApplianceGlobalProtect

Wi-Fi

Retail Branches

Internet

Development CorporateInstitutionalBanking

Active Directory (LDAP)

Consumer Banking

Security Appliance

e-Commerce WildFire Appliance

Traps

Private Cloud

Page 44: PREVENTION IS BETTER THAN CURE · 2016. 5. 12.  · JAMIE BRUMMELL. Are our cyber adversaries winning? 2. FSI is one of the top 3 industries for security incidents

Private WAN

FINANCIAL SERVICES REFERENCE BLUEPRINT

Datacenter

Campus/HQ3rd-party ServicesSoftwareasaService(SaaS)

Online Consumers

Proxy

PrivateLAN/WAN

Wi-Fi

Security Appliance

Security Appliance

Web Server VPN Gateway

DMZ

WildFire

Aperture

Teleworkers Public Cloud

Teller

Security ApplianceGlobalProtect

Wi-Fi

Retail Branches

Internet

Development CorporateInstitutionalBanking

Active Directory (LDAP)

Consumer Banking

Security Appliance

e-Commerce WildFire Appliance

Traps

Private Cloud

Employee access:• Visibility into who accesses what• Segmentation of departments and

functions

External Gateway:• Visibility and control of all Internet

and external traffic• Inspection of all traffic for known

and unknown threats

Data Center:• Perimeter: high performance control

and inspection of all traffic• Segmentation into zones of similar

security profileVirtualized Data Center:• Gain visibility and control into East-

West traffic (VM-to-VM)

Endpoints:• Lightweight prevention

Malware Analysis:• Cloud-based sandbox• Auto updates to NGFW

Mobile Devices:• Manage and protect

device, control data• IPSec/SSL VPN

SaaS Protection:• Visibility and

control• Prevent threat

propagation and data leakage