SlideShare uma empresa Scribd logo
1 de 18
Top 9 Mistakes of APT Victims:
   What They Are and What
 You Can Do To Prevent Them




                        © 2013 Monterey Technology Group Inc.
Brought to you by




               www.lumension.com



Speaker
      Chris Merritt – Director, Solution Marketing
Preview of Key Points

 1. Allowing open attack surfaces without securing
    configurations
 2. Permitting unlocked ports and unfettered device
    usage
 3. Failing to use centralized vulnerability remediation
 4. Allowing untrusted software to execute
 5. Failing to follow existing security policies/procedures
    and use at-hand technology consistently
 6. Permitting open policies for privileged user authority
 7. Not engaging in consistent end-user security
    awareness
 8. Failing to leverage logging and to set up traps
 9. Permitting Malware beaconing and exfiltration


© 2013 Monterey Technology Group Inc.
Risk Real and Percieved

 Do you think you could be a target
 How confident are you that you could detect
  an APT attack?




© 2013 Monterey Technology Group Inc.
1. Allowing open attack surfaces
                         without securing configurations
 Examples
  Automatic proxy detection
  Leaving auto-update configured to contact
   MS
  Unnecessary or out-of-date software




© 2013 Monterey Technology Group Inc.
2. Permitting unlocked ports
                                        and unfettered device usage
 Feds: Infected USB drive idled power plant
  3 weeks
  http://www.usatoday.com/story/tech/2013/01/
   16/usb-drive-infected-with-crimeware-shut-
   power-plant/1840783/
 Two-Thirds of Lost USB Drives Carry
  Malware
  http://it.slashdot.org/story/11/12/07/2037223/t
   wo-thirds-of-lost-usb-drives-carry-malware
 Malware USB drives handed out a
  tradeshows

© 2013 Monterey Technology Group Inc.
3. Failing to use centralized
                                            vulnerability remediation
  There are too many tweaks and security fixes that can’t be
   made via Group Policy
   De-registering unsafe DLLs
   Setting the kill bit
   Setting up bitlocker
   Configuring powershell security
   Changing admin password
  You can’t
   Visit each PC in person and that’s a waste of time anyway
   Depend on end-users
  You need a way to
   run commands, remediation scripts and other fixes on all your
    PCs automatically
   Track the success of remediation steps


© 2013 Monterey Technology Group Inc.
4. Allowing untrusted
                                          software to execute
 This is the single most effective way to
  stop APTs




© 2013 Monterey Technology Group Inc.
5. Failing to follow existing security
                                                 policies/procedures and use
                                            at-hand technology consistently

 Adobe allows critical code-signing server
  to run noncompliant with corporate
  standards
 Other
  examples




© 2013 Monterey Technology Group Inc.
6. Permitting open policies for
                                       privileged user authority
 RSA SecurID incident involved lateral
  movement resulting in privilege escalation
 This typically means that a privileged user was
  logged on interactively on a system where they
  also read email, browse the web or open
  document files
 Best practices and privileged user
  technologies exist to keep admin level
  credentials sacrosanct



© 2013 Monterey Technology Group Inc.
7. Not engaging in consistent
                                    end-user security awareness
 RSA SecurID incident occurred when 3 users
  were sent an infected spreadsheet, it went into
  their Junk email, and a single user opened it
 One corporation sent a spear-phishing email to
  its users
  It took 3 campaigns before they got the open rate
   below 20%
 Lesson
  Repeated and constant
  Trackable

© 2013 Monterey Technology Group Inc.
8. Failing to leverage logging
                                                    and to set up traps
 Most organizations do not
  Monitor process start events to discover new
   EXEs
  Deploy decoy folders with bait files on
   production systems and audit access




© 2013 Monterey Technology Group Inc.
9. Permitting Malware
                                        beaconing and exfiltration
  A EXE file must be installed and permitted to
   run for an APT to be successful
  When activated, most APT-ware must beacon
   back to command and control servers
  At some point data is exfiltrated
  It is challenging, but there are techniques for
   recognizing outbound traffic that could be
   malware
  Look for strange packet patterns inconsistent
    with normal web browsing
            • Like more data going up than down
     Look for mysterious domain names like
      ibiz.3387.org

© 2013 Monterey Technology Group Inc.
Bottom Line

 Most of these are little things
 But with APTs it only takes one
  One user
  One PC
  One setting or vulnerability that lets the bad
   guy get established
 It’s all about
  Defense-in-depth
  Doing everything right
  Not allowing untrusted code to execute

© 2013 Monterey Technology Group Inc.
Brought to you by




               www.lumension.com



Speaker
      Chris Merritt – Director, Solution Marketing
Defense-in-Depth Strategy
                                              Successful risk mitigation
                       AV
                                              starts with a solid vulnerability
                  Control the Bad             management foundation,
                                              augmented by additional
                 Device Control
                 Control the Flow             layered defenses which go
                                              beyond the traditional blacklist
           HD and Media Encryption
                                              approach.
                 Control the Data



              Application Control
                 Control the Gray



     Patch and Configuration Management
        Control the Vulnerability Landscape



16
Mapping
  Top Mistakes                                         How Lumension Helps
  1. Allowing open attack surfaces without securing    Security Configuration Management /
     configurations                                    Patch and Remediation
  2. Permitting unlocked ports and unfettered device   Device Control
     usage
  3. Failing to use centralized vulnerability          Patch and Remediation
     remediation
  4. Allowing untrusted software to execute            Application Control / AntiVirus
  5. Failing to follow existing security policies /
     procedures and to use at-hand technology
     consistently
  6. Permitting open policies for privileged user      Application Control
     authority
  7. Not engaging in consistent end-user security
     awareness
  8. Failing to leverage logging and to set up traps
  9. Permitting malware beaconing and exfiltration     Application Control

© 2013 Monterey Technology Group Inc.
More Information
• Free Security Scanner Tools                    • Get a Quote (and more)
 » Vulnerability Scanner – discover all OS and    http://www.lumension.com/endpoint-
   application vulnerabilities on your network    management-security-suite/buy-now.aspx#2
 » Application Scanner – discover all the apps
   being used in your network
 » Device Scanner – discover all the devices
   being used in your network
   http://www.lumension.com/Resources/
   Security-Tools.aspx


• Lumension® Endpoint Management
  and Security Suite
 » Online Demo Video:
   http://www.lumension.com/Resources/Demo-
   Center/Vulnerability-Management.aspx
 » Free Trial (virtual or download):
   http://www.lumension.com/endpoint-
   management-security-suite/free-trial.aspx




18

Mais conteúdo relacionado

Mais de Lumension

2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusLumension
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?Lumension
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportLumension
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsLumension
 
Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Lumension
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityLumension
 
Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...
Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...
Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...Lumension
 

Mais de Lumension (20)

2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
 
Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You.
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater Insanity
 
Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...
Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...
Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...
 

Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them

  • 1. Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them © 2013 Monterey Technology Group Inc.
  • 2. Brought to you by www.lumension.com Speaker  Chris Merritt – Director, Solution Marketing
  • 3. Preview of Key Points 1. Allowing open attack surfaces without securing configurations 2. Permitting unlocked ports and unfettered device usage 3. Failing to use centralized vulnerability remediation 4. Allowing untrusted software to execute 5. Failing to follow existing security policies/procedures and use at-hand technology consistently 6. Permitting open policies for privileged user authority 7. Not engaging in consistent end-user security awareness 8. Failing to leverage logging and to set up traps 9. Permitting Malware beaconing and exfiltration © 2013 Monterey Technology Group Inc.
  • 4. Risk Real and Percieved Do you think you could be a target How confident are you that you could detect an APT attack? © 2013 Monterey Technology Group Inc.
  • 5. 1. Allowing open attack surfaces without securing configurations Examples Automatic proxy detection Leaving auto-update configured to contact MS Unnecessary or out-of-date software © 2013 Monterey Technology Group Inc.
  • 6. 2. Permitting unlocked ports and unfettered device usage Feds: Infected USB drive idled power plant 3 weeks http://www.usatoday.com/story/tech/2013/01/ 16/usb-drive-infected-with-crimeware-shut- power-plant/1840783/ Two-Thirds of Lost USB Drives Carry Malware http://it.slashdot.org/story/11/12/07/2037223/t wo-thirds-of-lost-usb-drives-carry-malware Malware USB drives handed out a tradeshows © 2013 Monterey Technology Group Inc.
  • 7. 3. Failing to use centralized vulnerability remediation  There are too many tweaks and security fixes that can’t be made via Group Policy  De-registering unsafe DLLs  Setting the kill bit  Setting up bitlocker  Configuring powershell security  Changing admin password  You can’t  Visit each PC in person and that’s a waste of time anyway  Depend on end-users  You need a way to  run commands, remediation scripts and other fixes on all your PCs automatically  Track the success of remediation steps © 2013 Monterey Technology Group Inc.
  • 8. 4. Allowing untrusted software to execute This is the single most effective way to stop APTs © 2013 Monterey Technology Group Inc.
  • 9. 5. Failing to follow existing security policies/procedures and use at-hand technology consistently Adobe allows critical code-signing server to run noncompliant with corporate standards Other examples © 2013 Monterey Technology Group Inc.
  • 10. 6. Permitting open policies for privileged user authority RSA SecurID incident involved lateral movement resulting in privilege escalation This typically means that a privileged user was logged on interactively on a system where they also read email, browse the web or open document files Best practices and privileged user technologies exist to keep admin level credentials sacrosanct © 2013 Monterey Technology Group Inc.
  • 11. 7. Not engaging in consistent end-user security awareness RSA SecurID incident occurred when 3 users were sent an infected spreadsheet, it went into their Junk email, and a single user opened it One corporation sent a spear-phishing email to its users It took 3 campaigns before they got the open rate below 20% Lesson Repeated and constant Trackable © 2013 Monterey Technology Group Inc.
  • 12. 8. Failing to leverage logging and to set up traps Most organizations do not Monitor process start events to discover new EXEs Deploy decoy folders with bait files on production systems and audit access © 2013 Monterey Technology Group Inc.
  • 13. 9. Permitting Malware beaconing and exfiltration  A EXE file must be installed and permitted to run for an APT to be successful  When activated, most APT-ware must beacon back to command and control servers  At some point data is exfiltrated  It is challenging, but there are techniques for recognizing outbound traffic that could be malware Look for strange packet patterns inconsistent with normal web browsing • Like more data going up than down Look for mysterious domain names like ibiz.3387.org © 2013 Monterey Technology Group Inc.
  • 14. Bottom Line Most of these are little things But with APTs it only takes one One user One PC One setting or vulnerability that lets the bad guy get established It’s all about Defense-in-depth Doing everything right Not allowing untrusted code to execute © 2013 Monterey Technology Group Inc.
  • 15. Brought to you by www.lumension.com Speaker  Chris Merritt – Director, Solution Marketing
  • 16. Defense-in-Depth Strategy Successful risk mitigation AV starts with a solid vulnerability Control the Bad management foundation, augmented by additional Device Control Control the Flow layered defenses which go beyond the traditional blacklist HD and Media Encryption approach. Control the Data Application Control Control the Gray Patch and Configuration Management Control the Vulnerability Landscape 16
  • 17. Mapping Top Mistakes How Lumension Helps 1. Allowing open attack surfaces without securing Security Configuration Management / configurations Patch and Remediation 2. Permitting unlocked ports and unfettered device Device Control usage 3. Failing to use centralized vulnerability Patch and Remediation remediation 4. Allowing untrusted software to execute Application Control / AntiVirus 5. Failing to follow existing security policies / procedures and to use at-hand technology consistently 6. Permitting open policies for privileged user Application Control authority 7. Not engaging in consistent end-user security awareness 8. Failing to leverage logging and to set up traps 9. Permitting malware beaconing and exfiltration Application Control © 2013 Monterey Technology Group Inc.
  • 18. More Information • Free Security Scanner Tools • Get a Quote (and more) » Vulnerability Scanner – discover all OS and http://www.lumension.com/endpoint- application vulnerabilities on your network management-security-suite/buy-now.aspx#2 » Application Scanner – discover all the apps being used in your network » Device Scanner – discover all the devices being used in your network http://www.lumension.com/Resources/ Security-Tools.aspx • Lumension® Endpoint Management and Security Suite » Online Demo Video: http://www.lumension.com/Resources/Demo- Center/Vulnerability-Management.aspx » Free Trial (virtual or download): http://www.lumension.com/endpoint- management-security-suite/free-trial.aspx 18