SlideShare uma empresa Scribd logo
1 de 21
Defending Against Broad-Based
Cyber Attacks with Unified & Collaborative Defenses
THE LAZY ATTACKER:
A CONVERSATION WITH JAIME BLASCO, DIRECTOR OF ALIENVAULT LABS
JUNE 2013
2
Meet today’s presenters
INTRODUCTIONS
Sandy Hawke, CISSP
Moderator
VP, Product Marketing
@sandybeachSF
Jaime Blasco
Presenter
Director of Research, AlienVault Labs
@jaimeblascob
WHO ARE THESE PEOPLE AND WHAT ARE THEY DOING?
WHAT DO WE MEAN BY A “LAZY” ATTACKER?
3
Meet the “Lazy Attacker”
Image source: http://www.heromachine.com/2009/07/04/random-panel-next-week-on-lazy-criminal-minds/
Not all of the attacks need to
be “advanced” / APTs to be successful.
In fact, most aren’t.
“Lazy” in terms of:
Recycled attack platform:
Same type of attacks against wide
surface area
Same toolset (exploits and malware)
Same set of source IP addresses
4
What are the differences between attack types?
Image source: http://imgur.com/r/pics/r20GpFI Image source: http://www.guardian.co.uk/commentisfree/2013/mar/17/dont-
judge-me-i-love-sniping-games
VS.
Broad-based attacks
APTs
5
6
Broad-based Attacks vs. APTs
Broad-based Attacks Advanced Persistent Threats
Attacker Profile Opportunistic; uses the
tactics of “script kiddies” but
not always a “script kiddie”
Nation-state actors
Organized criminal actors
Corporate espionage actors
Attacker Technique Non-stealthy; easy to identify Stealthy; difficult to detect
Attack Surface Area Broad and dispersed Targeted and precise
Attack Tools Commonly used and old
exploits; automated
reconnaissance & probing
Zero-day exploits; “manual”
social engineering vs.
automated probes/scans
Broad-based Attacks: Some Examples
Malvertising; drive-by-downloads
How it works: Websites and advertising networks are infected with malware,
unsuspecting visitors get infected
How to avoid it: URLQuery Chrome Extension plug-in*; browser patch updates
Botnets
How they work: Bots are installed onto unsuspecting users’ devices and then
remotely controlled by attackers to execute more attacks, steal data, etc.
How to avoid them: Keep devices patched, install endpoint security protection;
implement egress filtering, threat detection and network monitoring to
identify/block connections to CnC servers.
Phishing (vs. Spear-phishing)
How it works: Emails sent to victims to lure them to infected
websites to steal credentials, data, etc.
How to avoid it: User education; IP/domain reputation data
7*For more info: http://labs.alienvault.com/labs/index.php/2013/urlquery-chrome-extension/
Lazy Attacker: Tools of the Trade
Black Hole
Sakura
Phoenix
RedKit
Sweet Orange
8
POLLING QUESTION
HOW TO DEFEND AGAINST
THESE ATTACKS
Collaboration, Correlation, Context and Simplified Security
10
Use the Power of Collaboration:
Shared Threat Intelligence
The “lazy attacker” is using
(and reusing) the same
exploits against others (and
you).
Sharing (and receiving)
collaborative threat
intelligence makes us all
more secure.
Using this data, identify, flag
and block known attackers
by source IP addresses.
11
 8,000+ contributors
 120+ countries
 17M URLs analyzed
AlienVault Open Threat Exchange (OTX)
12
Asset
Discovery
Vulnerability
Assessment
Threat
Detection
Behavioral
Monitoring
Security
Intelligence
Asset Discovery
• Active Network Scanning
• Passive Network Scanning
• Asset Inventory
• Host-based Software Inventory
Vulnerability Assessment
• Network Vulnerability Testing
Threat Detection
• Network IDS
• Host IDS
• Wireless IDS
• File Integrity Monitoring
Behavioral Monitoring
• Log Collection
• Netflow Analysis
• Service Availability Monitoring
Security Intelligence
• SIEM Correlation
• Incident Response
Use the Power of Automated Correlation: USM
13
The Need for Context…
Which alert do I need to worry about?
Adware-
HotBar.f!886F6F2A1226
FILE-PDF PDF with large
embedded JavaScript - JS
string attempt
FILE-IDENTIFY Microsoft Office
Access file magic detected
14
Use the Power of Simplified Security:
AlienVault Intuitive Alarm Taxonomy (4.3 “preview”)
Alarm Type Description Examples
Reconnaissance &
Probing
Behavior indicating an actor
attempting to discover information
about the organization
• Port scans
• Social engineering
Delivery & Attack Behavior indicating an attempted
delivery of an exploit
• Malicious email
attachments
• Network-based and analysis-based detection of
known attacks and attack payloads (e.g. SQL
injection)
Exploitation &
Installation
Behavior indicating a successful
exploit of a vulnerability or
backdoor/RAT being installed on a
system
• RAT installation
• Bot installation
System
Compromise
Behavior indicating a
compromised system
• Data exfiltration attempts
• Outbound traffic to CnC host
Informational:
Environmental
Awareness
Observed behavior and status
about the environment being
monitored
• Information about running
services
• User activity and behavior 15
FILE-IDENTIFY Microsoft Office
Access file magic detected
Adware-
HotBar.f!886F6F2A1226
FILE-PDF PDF with large embedded
JavaScript - JS string attempt
AlienVault Threat Intelligence:
Stay Ahead of Basic & Advanced Attacks
Network and host-based IDS signatures – detects the
latest threats in your environment
Asset discovery signatures – identifies the latest OS’es,
applications, and device types
Vulnerability assessment signatures – dual database
coverage to find the latest vulnerabilities on all your
systems
Correlation rules – translates raw events into
actionable remediation tasks
Reporting modules – provides new ways of viewing data
about your environment
Dynamic incident response templates – delivers
customized guidance on how to respond to each alert
Newly supported data source plug-ins – expands your
monitoring footprint
16
POLLING QUESTION
SUMMARY
18
AlienVault: Unified and collaborative security
AlienVault Open Threat Exchange (OTX) helps you:
Know who the attackers are
Based on a diverse set of global threat data
AlienVault Labs Threat Intelligence:
Tells you what to do, when and how
Based on rich set of security research, best practices,
and guidance
AlienVault USM provides the foundation to:
Leverage this intelligence to prioritize incident
response efforts
Plus… it’s easy to deploy and manage over time
AlienVault Community serves and supports:
Experienced and aspiring cyber security professionals around the world
Shared intelligence makes us all more secure
19
Next Steps / Q&A
Request an AlienVault USM demo at:
www.alienvault.com/schedule-demo.html
Request a free trial of AlienVault USM:
http://www.alienvault.com/free-trial
Not quite ready for all that?
Test drive our open source project - OSSIM here:
communities.alienvault.com/
Need more info to get started?
Try our knowledge base here:
alienvault.bloomfire.com
These resources are also in the Attachments section
Join the
conversation!
@AlienVault
#AlienIntel
20
#AlienIntel
@AlienVault
21

Mais conteúdo relacionado

Mais procurados

Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cns
mmubashirkhan
 

Mais procurados (20)

Best Practices for Leveraging Security Threat Intelligence
Best Practices for Leveraging Security Threat IntelligenceBest Practices for Leveraging Security Threat Intelligence
Best Practices for Leveraging Security Threat Intelligence
 
Break IT Down by Josh Smith
Break IT Down by Josh SmithBreak IT Down by Josh Smith
Break IT Down by Josh Smith
 
CSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri DiogenesCSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri Diogenes
 
MISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
MISP Summit 2018: Barncat: Using MISP for Bulk Malware SurveillanceMISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
MISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
 
Extracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet NoiseExtracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet Noise
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
 
The Rising Threat of Fileless Malware
The Rising Threat of Fileless MalwareThe Rising Threat of Fileless Malware
The Rising Threat of Fileless Malware
 
Honeypot
HoneypotHoneypot
Honeypot
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cns
 
Cybersecurity is the Future of Computing
Cybersecurity is the Future of ComputingCybersecurity is the Future of Computing
Cybersecurity is the Future of Computing
 
Syrian Malware
Syrian MalwareSyrian Malware
Syrian Malware
 
Misp(malware information sharing platform)
Misp(malware information sharing platform)Misp(malware information sharing platform)
Misp(malware information sharing platform)
 
DISA's Open Source Corporate Management Information System (OSCMIS)
DISA's Open Source Corporate Management Information System (OSCMIS)DISA's Open Source Corporate Management Information System (OSCMIS)
DISA's Open Source Corporate Management Information System (OSCMIS)
 
Jul outlook malware18
Jul outlook malware18Jul outlook malware18
Jul outlook malware18
 
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESETMITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacks
 
2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoring2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoring
 
MISP EcoSystem - Threat Intelligence, VMRay, MISP
MISP EcoSystem - Threat Intelligence, VMRay, MISPMISP EcoSystem - Threat Intelligence, VMRay, MISP
MISP EcoSystem - Threat Intelligence, VMRay, MISP
 
Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown
 
Down The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security ProfessionalDown The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security Professional
 

Semelhante a The Lazy Attacker: Defending Against Broad-based Cyber Attacks

Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
Yury Chemerkin
 

Semelhante a The Lazy Attacker: Defending Against Broad-based Cyber Attacks (20)

Barcamp: Open Source and Security
Barcamp: Open Source and SecurityBarcamp: Open Source and Security
Barcamp: Open Source and Security
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
 
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USM
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Cybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdfCybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdf
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends
 
SEC 572 Entire Course NEW
SEC 572 Entire Course NEWSEC 572 Entire Course NEW
SEC 572 Entire Course NEW
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Sec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.comSec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.com
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 

Mais de AlienVault

Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
AlienVault
 
AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & Response
AlienVault
 

Mais de AlienVault (20)

Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
Malware Invaders - Is Your OS at Risk?
Malware Invaders - Is Your OS at Risk?Malware Invaders - Is Your OS at Risk?
Malware Invaders - Is Your OS at Risk?
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
 
The State of Incident Response - INFOGRAPHIC
The State of Incident Response - INFOGRAPHICThe State of Incident Response - INFOGRAPHIC
The State of Incident Response - INFOGRAPHIC
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation Directives
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 
AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & Response
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

The Lazy Attacker: Defending Against Broad-based Cyber Attacks

  • 1. Defending Against Broad-Based Cyber Attacks with Unified & Collaborative Defenses THE LAZY ATTACKER: A CONVERSATION WITH JAIME BLASCO, DIRECTOR OF ALIENVAULT LABS JUNE 2013
  • 2. 2 Meet today’s presenters INTRODUCTIONS Sandy Hawke, CISSP Moderator VP, Product Marketing @sandybeachSF Jaime Blasco Presenter Director of Research, AlienVault Labs @jaimeblascob
  • 3. WHO ARE THESE PEOPLE AND WHAT ARE THEY DOING? WHAT DO WE MEAN BY A “LAZY” ATTACKER? 3
  • 4. Meet the “Lazy Attacker” Image source: http://www.heromachine.com/2009/07/04/random-panel-next-week-on-lazy-criminal-minds/ Not all of the attacks need to be “advanced” / APTs to be successful. In fact, most aren’t. “Lazy” in terms of: Recycled attack platform: Same type of attacks against wide surface area Same toolset (exploits and malware) Same set of source IP addresses 4
  • 5. What are the differences between attack types? Image source: http://imgur.com/r/pics/r20GpFI Image source: http://www.guardian.co.uk/commentisfree/2013/mar/17/dont- judge-me-i-love-sniping-games VS. Broad-based attacks APTs 5
  • 6. 6 Broad-based Attacks vs. APTs Broad-based Attacks Advanced Persistent Threats Attacker Profile Opportunistic; uses the tactics of “script kiddies” but not always a “script kiddie” Nation-state actors Organized criminal actors Corporate espionage actors Attacker Technique Non-stealthy; easy to identify Stealthy; difficult to detect Attack Surface Area Broad and dispersed Targeted and precise Attack Tools Commonly used and old exploits; automated reconnaissance & probing Zero-day exploits; “manual” social engineering vs. automated probes/scans
  • 7. Broad-based Attacks: Some Examples Malvertising; drive-by-downloads How it works: Websites and advertising networks are infected with malware, unsuspecting visitors get infected How to avoid it: URLQuery Chrome Extension plug-in*; browser patch updates Botnets How they work: Bots are installed onto unsuspecting users’ devices and then remotely controlled by attackers to execute more attacks, steal data, etc. How to avoid them: Keep devices patched, install endpoint security protection; implement egress filtering, threat detection and network monitoring to identify/block connections to CnC servers. Phishing (vs. Spear-phishing) How it works: Emails sent to victims to lure them to infected websites to steal credentials, data, etc. How to avoid it: User education; IP/domain reputation data 7*For more info: http://labs.alienvault.com/labs/index.php/2013/urlquery-chrome-extension/
  • 8. Lazy Attacker: Tools of the Trade Black Hole Sakura Phoenix RedKit Sweet Orange 8
  • 10. HOW TO DEFEND AGAINST THESE ATTACKS Collaboration, Correlation, Context and Simplified Security 10
  • 11. Use the Power of Collaboration: Shared Threat Intelligence The “lazy attacker” is using (and reusing) the same exploits against others (and you). Sharing (and receiving) collaborative threat intelligence makes us all more secure. Using this data, identify, flag and block known attackers by source IP addresses. 11
  • 12.  8,000+ contributors  120+ countries  17M URLs analyzed AlienVault Open Threat Exchange (OTX) 12
  • 13. Asset Discovery Vulnerability Assessment Threat Detection Behavioral Monitoring Security Intelligence Asset Discovery • Active Network Scanning • Passive Network Scanning • Asset Inventory • Host-based Software Inventory Vulnerability Assessment • Network Vulnerability Testing Threat Detection • Network IDS • Host IDS • Wireless IDS • File Integrity Monitoring Behavioral Monitoring • Log Collection • Netflow Analysis • Service Availability Monitoring Security Intelligence • SIEM Correlation • Incident Response Use the Power of Automated Correlation: USM 13
  • 14. The Need for Context… Which alert do I need to worry about? Adware- HotBar.f!886F6F2A1226 FILE-PDF PDF with large embedded JavaScript - JS string attempt FILE-IDENTIFY Microsoft Office Access file magic detected 14
  • 15. Use the Power of Simplified Security: AlienVault Intuitive Alarm Taxonomy (4.3 “preview”) Alarm Type Description Examples Reconnaissance & Probing Behavior indicating an actor attempting to discover information about the organization • Port scans • Social engineering Delivery & Attack Behavior indicating an attempted delivery of an exploit • Malicious email attachments • Network-based and analysis-based detection of known attacks and attack payloads (e.g. SQL injection) Exploitation & Installation Behavior indicating a successful exploit of a vulnerability or backdoor/RAT being installed on a system • RAT installation • Bot installation System Compromise Behavior indicating a compromised system • Data exfiltration attempts • Outbound traffic to CnC host Informational: Environmental Awareness Observed behavior and status about the environment being monitored • Information about running services • User activity and behavior 15 FILE-IDENTIFY Microsoft Office Access file magic detected Adware- HotBar.f!886F6F2A1226 FILE-PDF PDF with large embedded JavaScript - JS string attempt
  • 16. AlienVault Threat Intelligence: Stay Ahead of Basic & Advanced Attacks Network and host-based IDS signatures – detects the latest threats in your environment Asset discovery signatures – identifies the latest OS’es, applications, and device types Vulnerability assessment signatures – dual database coverage to find the latest vulnerabilities on all your systems Correlation rules – translates raw events into actionable remediation tasks Reporting modules – provides new ways of viewing data about your environment Dynamic incident response templates – delivers customized guidance on how to respond to each alert Newly supported data source plug-ins – expands your monitoring footprint 16
  • 19. AlienVault: Unified and collaborative security AlienVault Open Threat Exchange (OTX) helps you: Know who the attackers are Based on a diverse set of global threat data AlienVault Labs Threat Intelligence: Tells you what to do, when and how Based on rich set of security research, best practices, and guidance AlienVault USM provides the foundation to: Leverage this intelligence to prioritize incident response efforts Plus… it’s easy to deploy and manage over time AlienVault Community serves and supports: Experienced and aspiring cyber security professionals around the world Shared intelligence makes us all more secure 19
  • 20. Next Steps / Q&A Request an AlienVault USM demo at: www.alienvault.com/schedule-demo.html Request a free trial of AlienVault USM: http://www.alienvault.com/free-trial Not quite ready for all that? Test drive our open source project - OSSIM here: communities.alienvault.com/ Need more info to get started? Try our knowledge base here: alienvault.bloomfire.com These resources are also in the Attachments section Join the conversation! @AlienVault #AlienIntel 20

Notas do Editor

  1. Which of the following are you most concerned about?APTsBroad-based attacksInsider threats Failed audits
  2. Automated Correlation is a critical success factor for defending against broad-based attacks. With AlienVault’s Unified Security Management, we combine all of the essential security you need in a single platform, and give you a way to evaluate, respond and manage it all. This includes:Asset Discovery- in terms of active and passive network scanning, building dynamic asset inventories that include detailed information about the software that lives on each host.Vulnerability Assessment – you can schedule scans across your network – again both active and passive probing – to identify and remediate application and system vulnerabilities. Threat Detection – network IDS, host-based IDS, wireless IDS, and file integrity monitoring gives you ability to detect known threats whether it’s a rogue insider accessing unauthorized data on a database server or someone trying to access your wireless network.Behavioral Monitoring will give you the coverage you need for unknown threats – typically exemplified by strange or anomalous network or system behavior – this includes netflow analysis, service availability and of course log collection and analysis for in-depth forensic investigations.Finally, aggregation, correlation and analysis of this information provides the security intelligence you need in order to manage threats and maintain and demonstrate compliance.
  3. Based on today’s discussion, which of the following do you think is easiest for your organization to implement?Reputation data monitoring (file-based, web, email, etc.)SIEM / event correlationLog managementI have already done all of the above