SlideShare uma empresa Scribd logo
1 de 27
Cryptolocker & het gevecht tegen
IT’s grootste nieuwe vijand
Martijn Nielen
Sr. Sales Engineer WatchGuard
Houston, we have a problem!
• « My antivirus and IPS are updated but I got infected anyway »
First reason: « Zero Day »
• The vulnerabilty is still unkown
• Or the fix is still not available
Second reason: Technology changes, including hackers…
• “Antivirus is Dead” Brian Dye Senior VP of Symantec
*Malwise - An Effective and Efficient Classification System for
Packed and Polymorphic Malware, Deakin University, Victoria, June
2013
Nearly 88% of malware morphs to
evade signature-based antivirus
solutions*
Antivirus can’t keep up
AV Vendor Review
7
http://labs.lastline.com/lastline-labs-av-isnt-dead-it-just-cant-keep-up
• Average of 2 days for at least one AV scanner to detect what was not
detected on day 0
• Detection rates increase to 61% after two weeks
• After a year 10% of scanners still do not detect some malware
• The 1-perecentile of malware least likely to be detected was undetected by
a majority of AV scanners for Months
• In some cases the malware was never detected
Advanced Persistent Threat (APT)
• Nation-State techniques now used for financial gain
• Antivirus can’t keep up. New malware has been created as a variant of
existing malware to avoid detection by classic techniques
8
9
Evolution of APTs
Today, normal criminal malware exploits the
same advanced tactics as nation-state APTs.
Every organization is at risk of advanced
threats!
Zeus copies Stuxnet 0day
Criminals use 0day malware (Cryptolocker)
Zeus uses stolen certificates
Criminal spear phishing
Criminal watering hole attacks
10
« Cryptolockers »
APT or not APT…
11
13
Simple Threats
OpportunisticAttacks
APT
Solutions
Antivirus
Solutions
TargetedAttacks
Packing
Sophisticated Threats
Plain
Virus
Poly-
morphic
C&C
Fluxing
Persistent
Threats
Evasive
Threats
Malware (r)evolution
AV OS / ApplicationSandBox
Malware And
Virus Detection
Zero Day Threat Curve
Sandbox
OS – XP /Win 7
Hypervisor
Server
Process
Emulation
XP /Win 7
Functions
XP /Win 7
Functions
XP /Win 7
Functions
XP /Win 7
Functions
CPU Memory
Server
System
Emulation
OS – XP /Win 7
CPU / Memory
Server
High Fidelity
Low Visibility
Low Fidelity
High Visibility
High Fidelity
High Visibility
Advanced Malware Analysis
1st
2nd 3rd
APT Blocker with Code Emulation
• Evasion detection is critical
17
Stalling
Looping
Malware?
Exploit
Key logger C&C Network Traffic
Inaction
• Malware Checks the Environment
• Multi-Path execution
• Next step based on results
• Stalling / Looping
• Wait long enough for analysis to time out
Malware Checks the Environment Stalling / Looping
Multi-Path execution Wait long enough for analysis to time out
Next step based on results
Dynamic evasions
AntiVirus
URL
Filtering
AntiSpam
IPS
App Control
Data Loss
Prevention
APT
Platform
WatchGuard
Management
WatchGuard Best of Breed Defense in Depth
Lastline recommended by NSS: 2015 BDS Security Value Map
23
Unified Threat Management Platform
Security Eco System
24
Default Threat Protection
Proxy – Web, Email, FTP
Application Control / IPS
Webblocker / RED / SpamBlocker
AV - Malware APTBlocker
25
APT Blocker: Configuration
APTBlocker
Local
Cache
Remote
“Cache”
File
inspection
APT Blocker
Did you get Locky ?
http://watchguardsecuritycenter.com
Once I verified that many of our UTM’s security services could detect Locky, I ran through one last
test… I personally tried to download the malicious file “Rechnung-263-0779.xls” from my webmail.
I’ve configured my WatchGuard Firebox with HTTPS Deep Inspection. This feature allows
WatchGuard’s security services, such as GAV and Intrusion Prevention Service (IPS), to run security
scans even on encrypted web traffic, like the webmail I was using to download this ransomware.
Despite the encrypted webmail connection, our Firebox detected and blocked the Locky invoice file
with the GAV service. It was unable to reach my workstation.
As you can see, WatchGuard XTM and Firebox appliances have several features that can help
prevent ransomware like Locky. However, these protections only work if you turn them on and
configure them properly. If you want to keep Locky off your network , I highly recommend you read the
Knowledgebase Article “How to prevent ransomware and other malicious malware with your
Firebox” — Jonas Spieckermann
You need to enable HTTPS DPI on your Firebox!
34
An APT solution should
• not be dependent on (AV) signatures
• not depend on traditional sandbox technology
• detect evasions
• take prompt actions in real-time
35
36
Advanced Malware in
Security Dashboard
Visibility in WatchGuard Dimension
True APT’s – even obvious from the Dutch file-names
• Advanced: trigger interest
• Targeted e.g. containing the
name of the organization
• Threats: True APT’s
• Watering holes –
“Eucharistieviering”, Dutch
• Chain-of-Trust: by using
‘religious activities’ and social
engineering based factors
• Non-profit organizations
targeted
38
40
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid - 20160602

Mais conteúdo relacionado

Mais procurados

Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Marco Balduzzi
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
Blue Coat
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
Blue Coat
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
Blue Coat
 

Mais procurados (20)

Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
 
Equifax Breach Postmortem
Equifax Breach PostmortemEquifax Breach Postmortem
Equifax Breach Postmortem
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
In search of unique behaviour
In search of unique behaviourIn search of unique behaviour
In search of unique behaviour
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomware
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Antispam aneb plnoleté řešení
Antispam aneb plnoleté řešeníAntispam aneb plnoleté řešení
Antispam aneb plnoleté řešení
 
NTXISSA September 2016 Meeting - How to Get More from Your Security Investmen...
NTXISSA September 2016 Meeting - How to Get More from Your Security Investmen...NTXISSA September 2016 Meeting - How to Get More from Your Security Investmen...
NTXISSA September 2016 Meeting - How to Get More from Your Security Investmen...
 
Azlan Security Offering
Azlan Security OfferingAzlan Security Offering
Azlan Security Offering
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
 
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESETMITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 

Destaque

Storage front garage sales infographic
Storage front garage sales infographicStorage front garage sales infographic
Storage front garage sales infographic
Storage Front
 
The human heart medical images for power point
The human heart medical images for power pointThe human heart medical images for power point
The human heart medical images for power point
Medical_PPT_Images
 

Destaque (20)

Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Presentacion
PresentacionPresentacion
Presentacion
 
Introduction to BladeTec High Volume Low Speed HVLS Fan Indonesia
Introduction to BladeTec High Volume Low Speed HVLS Fan IndonesiaIntroduction to BladeTec High Volume Low Speed HVLS Fan Indonesia
Introduction to BladeTec High Volume Low Speed HVLS Fan Indonesia
 
Studi hukum islam kel.2
Studi hukum islam kel.2Studi hukum islam kel.2
Studi hukum islam kel.2
 
Storage front garage sales infographic
Storage front garage sales infographicStorage front garage sales infographic
Storage front garage sales infographic
 
The human heart medical images for power point
The human heart medical images for power pointThe human heart medical images for power point
The human heart medical images for power point
 
Bilangan Pi
Bilangan PiBilangan Pi
Bilangan Pi
 
MTH101 - Calculus and Analytical Geometry- Lecture 42
MTH101 - Calculus and Analytical Geometry- Lecture 42MTH101 - Calculus and Analytical Geometry- Lecture 42
MTH101 - Calculus and Analytical Geometry- Lecture 42
 
Kelompok 2
Kelompok 2Kelompok 2
Kelompok 2
 
7(1)
7(1)7(1)
7(1)
 
Perkembangan Dan Perubahan Organisasi
Perkembangan Dan Perubahan OrganisasiPerkembangan Dan Perubahan Organisasi
Perkembangan Dan Perubahan Organisasi
 
Studi hukum islam kel.2
Studi hukum islam kel.2Studi hukum islam kel.2
Studi hukum islam kel.2
 
Ten facts about child rights
Ten facts about child rightsTen facts about child rights
Ten facts about child rights
 
Satuan acara perkuliahan Metode Numerik Pendidikan matematika UMT
Satuan acara perkuliahan Metode Numerik Pendidikan matematika UMTSatuan acara perkuliahan Metode Numerik Pendidikan matematika UMT
Satuan acara perkuliahan Metode Numerik Pendidikan matematika UMT
 
Presentation 211 b linda lorentzen_ helping your constituents navigate life ...
Presentation 211 b  linda lorentzen_ helping your constituents navigate life ...Presentation 211 b  linda lorentzen_ helping your constituents navigate life ...
Presentation 211 b linda lorentzen_ helping your constituents navigate life ...
 
Presentation 214 b. bartja wachtel meaningful_the life practice of mindful ...
Presentation 214  b. bartja wachtel meaningful_the life practice of  mindful ...Presentation 214  b. bartja wachtel meaningful_the life practice of  mindful ...
Presentation 214 b. bartja wachtel meaningful_the life practice of mindful ...
 
Presentation 220 richard strozewski building an als telehealth support syst...
Presentation 220  richard strozewski building an als telehealth  support syst...Presentation 220  richard strozewski building an als telehealth  support syst...
Presentation 220 richard strozewski building an als telehealth support syst...
 
Child labour& economic conditions
Child labour& economic conditionsChild labour& economic conditions
Child labour& economic conditions
 
Control de calidad
Control de calidadControl de calidad
Control de calidad
 
Prilozhenie o personal6nykh_dannykh_danip
Prilozhenie o personal6nykh_dannykh_danipPrilozhenie o personal6nykh_dannykh_danip
Prilozhenie o personal6nykh_dannykh_danip
 

Semelhante a WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid - 20160602

Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Aaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Aaron ND Sawmadal
 

Semelhante a WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid - 20160602 (20)

NetWitness
NetWitnessNetWitness
NetWitness
 
Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Malware
MalwareMalware
Malware
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software Vulnerabilities
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 

Mais de Orbid

Mais de Orbid (9)

Online samenwerken anno 2017
Online samenwerken anno 2017Online samenwerken anno 2017
Online samenwerken anno 2017
 
Professionaliseer uw technische dienst en facility management
Professionaliseer uw technische dienst en facility managementProfessionaliseer uw technische dienst en facility management
Professionaliseer uw technische dienst en facility management
 
Orbid - Grow your business
Orbid - Grow your businessOrbid - Grow your business
Orbid - Grow your business
 
Orbid updates Microsoft Dynamics CRM
Orbid updates Microsoft Dynamics CRMOrbid updates Microsoft Dynamics CRM
Orbid updates Microsoft Dynamics CRM
 
Proximus - Cyber security workshop - Orbid - 20160602
Proximus - Cyber security workshop - Orbid - 20160602Proximus - Cyber security workshop - Orbid - 20160602
Proximus - Cyber security workshop - Orbid - 20160602
 
Orbid - Cybercrime en de continuiteit van uw onderneming
Orbid - Cybercrime en de continuiteit van uw ondernemingOrbid - Cybercrime en de continuiteit van uw onderneming
Orbid - Cybercrime en de continuiteit van uw onderneming
 
Cyber security workshop - Proximus
Cyber security workshop - ProximusCyber security workshop - Proximus
Cyber security workshop - Proximus
 
Cloud & connectiviteit - Proximus
Cloud & connectiviteit - ProximusCloud & connectiviteit - Proximus
Cloud & connectiviteit - Proximus
 
IT security - continuïteit van uw onderneming - Orbid
IT security - continuïteit van uw onderneming - OrbidIT security - continuïteit van uw onderneming - Orbid
IT security - continuïteit van uw onderneming - Orbid
 

Último

₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 

WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid - 20160602

  • 1. Cryptolocker & het gevecht tegen IT’s grootste nieuwe vijand Martijn Nielen Sr. Sales Engineer WatchGuard
  • 2. Houston, we have a problem! • « My antivirus and IPS are updated but I got infected anyway »
  • 3. First reason: « Zero Day » • The vulnerabilty is still unkown • Or the fix is still not available
  • 4. Second reason: Technology changes, including hackers… • “Antivirus is Dead” Brian Dye Senior VP of Symantec
  • 5. *Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware, Deakin University, Victoria, June 2013 Nearly 88% of malware morphs to evade signature-based antivirus solutions* Antivirus can’t keep up
  • 6. AV Vendor Review 7 http://labs.lastline.com/lastline-labs-av-isnt-dead-it-just-cant-keep-up • Average of 2 days for at least one AV scanner to detect what was not detected on day 0 • Detection rates increase to 61% after two weeks • After a year 10% of scanners still do not detect some malware • The 1-perecentile of malware least likely to be detected was undetected by a majority of AV scanners for Months • In some cases the malware was never detected
  • 7. Advanced Persistent Threat (APT) • Nation-State techniques now used for financial gain • Antivirus can’t keep up. New malware has been created as a variant of existing malware to avoid detection by classic techniques 8
  • 8. 9 Evolution of APTs Today, normal criminal malware exploits the same advanced tactics as nation-state APTs. Every organization is at risk of advanced threats! Zeus copies Stuxnet 0day Criminals use 0day malware (Cryptolocker) Zeus uses stolen certificates Criminal spear phishing Criminal watering hole attacks
  • 10. 11
  • 11. 13
  • 13. AV OS / ApplicationSandBox Malware And Virus Detection Zero Day Threat Curve
  • 14. Sandbox OS – XP /Win 7 Hypervisor Server Process Emulation XP /Win 7 Functions XP /Win 7 Functions XP /Win 7 Functions XP /Win 7 Functions CPU Memory Server System Emulation OS – XP /Win 7 CPU / Memory Server High Fidelity Low Visibility Low Fidelity High Visibility High Fidelity High Visibility Advanced Malware Analysis 1st 2nd 3rd
  • 15. APT Blocker with Code Emulation • Evasion detection is critical 17
  • 16. Stalling Looping Malware? Exploit Key logger C&C Network Traffic Inaction • Malware Checks the Environment • Multi-Path execution • Next step based on results • Stalling / Looping • Wait long enough for analysis to time out Malware Checks the Environment Stalling / Looping Multi-Path execution Wait long enough for analysis to time out Next step based on results Dynamic evasions
  • 18. Lastline recommended by NSS: 2015 BDS Security Value Map 23
  • 19. Unified Threat Management Platform Security Eco System 24 Default Threat Protection Proxy – Web, Email, FTP Application Control / IPS Webblocker / RED / SpamBlocker AV - Malware APTBlocker
  • 22. Did you get Locky ? http://watchguardsecuritycenter.com Once I verified that many of our UTM’s security services could detect Locky, I ran through one last test… I personally tried to download the malicious file “Rechnung-263-0779.xls” from my webmail. I’ve configured my WatchGuard Firebox with HTTPS Deep Inspection. This feature allows WatchGuard’s security services, such as GAV and Intrusion Prevention Service (IPS), to run security scans even on encrypted web traffic, like the webmail I was using to download this ransomware. Despite the encrypted webmail connection, our Firebox detected and blocked the Locky invoice file with the GAV service. It was unable to reach my workstation. As you can see, WatchGuard XTM and Firebox appliances have several features that can help prevent ransomware like Locky. However, these protections only work if you turn them on and configure them properly. If you want to keep Locky off your network , I highly recommend you read the Knowledgebase Article “How to prevent ransomware and other malicious malware with your Firebox” — Jonas Spieckermann You need to enable HTTPS DPI on your Firebox! 34
  • 23. An APT solution should • not be dependent on (AV) signatures • not depend on traditional sandbox technology • detect evasions • take prompt actions in real-time 35
  • 24. 36 Advanced Malware in Security Dashboard Visibility in WatchGuard Dimension
  • 25. True APT’s – even obvious from the Dutch file-names • Advanced: trigger interest • Targeted e.g. containing the name of the organization • Threats: True APT’s • Watering holes – “Eucharistieviering”, Dutch • Chain-of-Trust: by using ‘religious activities’ and social engineering based factors • Non-profit organizations targeted 38
  • 26. 40

Notas do Editor

  1. Traditional Sandboxing Technology Limited visibility due to reliance on OS system calls and library instrumentation Susceptible to evasive techniques Detectable inside sandbox