SlideShare uma empresa Scribd logo
1 de 24
Battlefield Network
Speaker: Tal Be’ery
October 2015
Speaker Info – Tal Be’ery
• Senior Security Research Manager @Microsoft
• Former VP for Research @Aorato (Acquired by Microsoft)
• 15 years of security research
• Author of the TIME attack on SSL
• Regular speaker in Industry’s top conventions
• Named a “Facebook Whitehat”
• Twitter: @TalBeerySec
Agenda
• Intro
• Current state of affairs
• Why do we fail
• Know the enemy
• The modified Cyber Kill Chain
• Know thyself
• What is normal?
• Choose the right battlefield
• Network based detection of Reconnaissance and Lateral Movement
Current State of affairs
• 90% of large organizations and 74% of small businesses reporting a
security breach
• Data breach costs 2015: $6M on average, $65M max
• Average time to breach detection: eight months
• Most breaches are not detected internally
Test Case: The Dow Jones Breach
• Reported this month (October 9th 2015)
Reported by
others
Breached for 3
years
In other words:
We still don’t know
what happened
Why do We Fail?
• “If you know the enemy and know yourself, you
need not fear the result of a hundred battles. If
you know yourself but not the enemy, for every
victory gained you will also suffer a defeat. If
you know neither the enemy nor yourself, you
will succumb in every battle.”
• We don’t know the enemy
• We don’t know ourselves
https://upload.wikimedia.org/wikipedia/commons/3/37/Enchoen27n3200.jpg
Know the Enemy
The Cyber Kill-Chain
• Presented by Lockheed Martin, 2010
• Main achievements
• Knowing the enemy: The first widely accepted model of
APT attackers
• Important insight: It’s a chain!
• The chain is only as strong as its weakest link
• Defenders get to choose where to break the chain
Modifying the Kill-Chain #1
• The original Kill-Chain puts too much emphasis on the initial infection
• LightCyber’s version:
Modifying the Kill-Chain #2
• The process is not linear
• Mandiant’s version:
The start: Initial Compromise & Foothold
• Attackers move from the Internet to
initial, arbitrary foothold in victim’s
network
• Through interfaces open to the internet:
• E-Mail:
• The most popular method
• phishing E-mail bearing a malware
• Web:
• Watering hole attack: malware “Drive-by
download” on relevant sites
• Enterprise Web App
• Using WebApp vulnerabilties
The Middle #1: Lateral Movement
• Attackers move from their arbitrary foothold in victim’s network to
their destination
• Using the Lateral Movement vehicle
• The engine: Stolen credentials
• The wheel: Data obtained in the Recon phase
• The Lateral Movement methods are standard:
• Steal credentials from infected computer
• Expand to other computers using these creds
• Steal other creds from the computer
• Repeat
The Middle #2: Recon
• The recon phase is the most non standard part, as every victim’s
network is different:
• Attacks destinations, networks’ topology, IT conventions
• Therefore it involves more manual work:
• More time
• Attackers’ mistakes
• Recon methods are standard
• Scan the vicinity: near-by (network-wise) computers
• Query central repositories: Active Directory, DNS
The End: Exfiltration
• Attackers move data to the internet
using standard open channels
• Mostly through web
• But also FTP or any other protocol
Know Thyself
Learn What is Normal
• Per entity and containing groups
• Access patterns
• Logged-on Computers
• Accessed resources
• Working period
• Working days
• Working hours
• Physical location
• Where is the user’s home
• In case of travel, does it makes sense? http://seanheritage.com/blog/profiling-normal/
Choose the Battlefield
Time for another Sun Tzu Quote
• “...And therefore those skilled in war bring the
enemy to the field of battle and are not brought
there by him.“
• Remember this is a chain!
• We get to choose where to cut it!
• It’s not a binary decision:
• Prioritization
• Balance
https://upload.wikimedia.org/wikipedia/commons/3/37/Enchoen27n3200.jpg
It’s a Battle of Movement
• All phases involve movement
• Movement in IT = Network
• Therefore the battle must take
place over the network
• But we have a limited budget:
in which phase we should
invest more and in which we
should invest less?
Where to Invest Less
• Exfiltration – too late
• The information is already making its way out
• Infiltration – too much attack surface
• Too many users, end systems, 0-days vulnerabilities
• We had already invested a lot of budget there, mainly in anti-malware
• And both
• Very generic to the attacker, very similar for all victims
• The attackers are well trained there as they do it all the time
• Highly automated
• Very rapid, compared to the middle section
• Less mistakes
Where to Invest More
• In the middle part:
• Not generic: Attacker does not know internal network
• Intelligence gaps: Attacker does not what is normal within the internal
network
• Before any real damage has been done
• The longest of phases: Takes weeks or even months
Weapons #1: Monitoring Traffic
• Detect known attackers’ patterns
• Learn normal traffic patterns
• To identify anomalies
• Monitoring everything does not scale and we must prioritize
• Invest more in monitoring central repositories
• E.g. Active Directory, DNS, DHCP
• Invest more in monitoring sensitive servers
• E.g. relevant file servers, DataBase servers, Active Directory/Domain
Controllers
Weapons #2: Deception
• Confuse the attacker with deception
• Use network tripwires and landmines
• Deploy honeypots
• Fake servers
• Deploy honeytokens
• Fake entries in real servers
• Monitor access to honeypots and use of honeytokens over the
network
Putting it All Together
• We know ourselves
• We learn what is normal over the network
• We know the enemy
• We know what the attacker is doing and able to detect it
• We had chosen the right battlefield
• The middle of the attack: recon + lateral movement
• We have the right weapons:
• Network monitoring to detect known attackers’ patterns, anomalies and
deception tripwires and landmines
• Sun Tzu promises victory!

Mais conteúdo relacionado

Mais procurados

Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
Seamus Tuohy
 

Mais procurados (20)

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Threat Intelligence Data Collection & Acquisition
Threat Intelligence Data Collection & AcquisitionThreat Intelligence Data Collection & Acquisition
Threat Intelligence Data Collection & Acquisition
 
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
 
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
 
MISP EcoSystem - Threat Intelligence, VMRay, MISP
MISP EcoSystem - Threat Intelligence, VMRay, MISPMISP EcoSystem - Threat Intelligence, VMRay, MISP
MISP EcoSystem - Threat Intelligence, VMRay, MISP
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?
 
The Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceThe Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber Intelligence
 
Presentation1
Presentation1Presentation1
Presentation1
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence Matrix
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
 

Destaque

Trt previdenciário - questões complementares (1)
Trt   previdenciário - questões complementares (1)Trt   previdenciário - questões complementares (1)
Trt previdenciário - questões complementares (1)
João Gilberto Costa Lima
 

Destaque (11)

Trt previdenciário - questões complementares (1)
Trt   previdenciário - questões complementares (1)Trt   previdenciário - questões complementares (1)
Trt previdenciário - questões complementares (1)
 
practica 16 true, practica 17 false
practica 16 true, practica 17 falsepractica 16 true, practica 17 false
practica 16 true, practica 17 false
 
Rozengeur en maneschijn
Rozengeur en maneschijnRozengeur en maneschijn
Rozengeur en maneschijn
 
Trt português 03 (1)
Trt   português 03 (1)Trt   português 03 (1)
Trt português 03 (1)
 
iff 2015
iff 2015iff 2015
iff 2015
 
Web iii
Web iiiWeb iii
Web iii
 
Journey Through the Bible: Mark's Gospel
Journey Through the Bible: Mark's GospelJourney Through the Bible: Mark's Gospel
Journey Through the Bible: Mark's Gospel
 
Обеспечение централизованной обработки документации в ОЦО группы «ФосАгро»
Обеспечение централизованной обработки документации в ОЦО группы «ФосАгро»Обеспечение централизованной обработки документации в ОЦО группы «ФосАгро»
Обеспечение централизованной обработки документации в ОЦО группы «ФосАгро»
 
новэйдж презентация
новэйдж презентацияновэйдж презентация
новэйдж презентация
 
MEMBANGUN EKONOMI PEDESAAN DENGAN FINANCIAL INCLUSION MELALUI LEMBAGA KEUAN...
MEMBANGUN EKONOMI PEDESAAN DENGAN  FINANCIAL INCLUSION MELALUI LEMBAGA  KEUAN...MEMBANGUN EKONOMI PEDESAAN DENGAN  FINANCIAL INCLUSION MELALUI LEMBAGA  KEUAN...
MEMBANGUN EKONOMI PEDESAAN DENGAN FINANCIAL INCLUSION MELALUI LEMBAGA KEUAN...
 
Wiki y blog
Wiki y blogWiki y blog
Wiki y blog
 

Semelhante a Battlefield network

BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Andrew Morris
 

Semelhante a Battlefield network (20)

CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
CNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 LeadsCNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 Leads
 
Paranoia 2018: A Process is No One
Paranoia 2018: A Process is No OneParanoia 2018: A Process is No One
Paranoia 2018: A Process is No One
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
Vulnerability assessment on cyber security
Vulnerability assessment on cyber securityVulnerability assessment on cyber security
Vulnerability assessment on cyber security
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Session Slide
Session SlideSession Slide
Session Slide
 
Bh europe 2013_wilhoit
Bh europe 2013_wilhoitBh europe 2013_wilhoit
Bh europe 2013_wilhoit
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
2021-06-16_Attack Lifecycle (1).pptx
2021-06-16_Attack Lifecycle (1).pptx2021-06-16_Attack Lifecycle (1).pptx
2021-06-16_Attack Lifecycle (1).pptx
 

Mais de Tal Be'ery

Web3’s red pill: Smashing Web3 transaction simulations for fun and profit
Web3’s red pill: Smashing Web3 transaction simulations for fun and profitWeb3’s red pill: Smashing Web3 transaction simulations for fun and profit
Web3’s red pill: Smashing Web3 transaction simulations for fun and profit
Tal Be'ery
 
Web3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEMWeb3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEM
Tal Be'ery
 
Open Sesame: Picking Locks with Cortana
Open Sesame: Picking Locks with CortanaOpen Sesame: Picking Locks with Cortana
Open Sesame: Picking Locks with Cortana
Tal Be'ery
 
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES   THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
Tal Be'ery
 
Skeleton key malware detection owasp
Skeleton key malware detection owaspSkeleton key malware detection owasp
Skeleton key malware detection owasp
Tal Be'ery
 

Mais de Tal Be'ery (15)

Give me some (key) space!
Give me some (key) space!Give me some (key) space!
Give me some (key) space!
 
Web3’s red pill: Smashing Web3 transaction simulations for fun and profit
Web3’s red pill: Smashing Web3 transaction simulations for fun and profitWeb3’s red pill: Smashing Web3 transaction simulations for fun and profit
Web3’s red pill: Smashing Web3 transaction simulations for fun and profit
 
Understanding Compound‘s Liquidation
Understanding Compound‘s LiquidationUnderstanding Compound‘s Liquidation
Understanding Compound‘s Liquidation
 
Web3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEMWeb3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEM
 
The Color of Money
The Color of MoneyThe Color of Money
The Color of Money
 
Open Sesame: Picking Locks with Cortana
Open Sesame: Picking Locks with CortanaOpen Sesame: Picking Locks with Cortana
Open Sesame: Picking Locks with Cortana
 
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES   THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
 
Automate or Die: How Automation Reshapes Cybersecurity
Automate or Die: How Automation Reshapes CybersecurityAutomate or Die: How Automation Reshapes Cybersecurity
Automate or Die: How Automation Reshapes Cybersecurity
 
The Industrial Revolution of Lateral Movement
The Industrial Revolution of Lateral MovementThe Industrial Revolution of Lateral Movement
The Industrial Revolution of Lateral Movement
 
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local UsersThe Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
 
Client sidesec 2013-intro
Client sidesec 2013-introClient sidesec 2013-intro
Client sidesec 2013-intro
 
Client sidesec 2013 - non js
Client sidesec 2013 - non jsClient sidesec 2013 - non js
Client sidesec 2013 - non js
 
Client sidesec 2013 - script injection
Client sidesec 2013 - script injectionClient sidesec 2013 - script injection
Client sidesec 2013 - script injection
 
One Key to Rule Them All: Detecting the Skeleton Key Malware
One Key to Rule Them All: Detecting the Skeleton Key MalwareOne Key to Rule Them All: Detecting the Skeleton Key Malware
One Key to Rule Them All: Detecting the Skeleton Key Malware
 
Skeleton key malware detection owasp
Skeleton key malware detection owaspSkeleton key malware detection owasp
Skeleton key malware detection owasp
 

Último

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Battlefield network

  • 1. Battlefield Network Speaker: Tal Be’ery October 2015
  • 2. Speaker Info – Tal Be’ery • Senior Security Research Manager @Microsoft • Former VP for Research @Aorato (Acquired by Microsoft) • 15 years of security research • Author of the TIME attack on SSL • Regular speaker in Industry’s top conventions • Named a “Facebook Whitehat” • Twitter: @TalBeerySec
  • 3. Agenda • Intro • Current state of affairs • Why do we fail • Know the enemy • The modified Cyber Kill Chain • Know thyself • What is normal? • Choose the right battlefield • Network based detection of Reconnaissance and Lateral Movement
  • 4. Current State of affairs • 90% of large organizations and 74% of small businesses reporting a security breach • Data breach costs 2015: $6M on average, $65M max • Average time to breach detection: eight months • Most breaches are not detected internally
  • 5. Test Case: The Dow Jones Breach • Reported this month (October 9th 2015) Reported by others Breached for 3 years In other words: We still don’t know what happened
  • 6. Why do We Fail? • “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” • We don’t know the enemy • We don’t know ourselves https://upload.wikimedia.org/wikipedia/commons/3/37/Enchoen27n3200.jpg
  • 8. The Cyber Kill-Chain • Presented by Lockheed Martin, 2010 • Main achievements • Knowing the enemy: The first widely accepted model of APT attackers • Important insight: It’s a chain! • The chain is only as strong as its weakest link • Defenders get to choose where to break the chain
  • 9. Modifying the Kill-Chain #1 • The original Kill-Chain puts too much emphasis on the initial infection • LightCyber’s version:
  • 10. Modifying the Kill-Chain #2 • The process is not linear • Mandiant’s version:
  • 11. The start: Initial Compromise & Foothold • Attackers move from the Internet to initial, arbitrary foothold in victim’s network • Through interfaces open to the internet: • E-Mail: • The most popular method • phishing E-mail bearing a malware • Web: • Watering hole attack: malware “Drive-by download” on relevant sites • Enterprise Web App • Using WebApp vulnerabilties
  • 12. The Middle #1: Lateral Movement • Attackers move from their arbitrary foothold in victim’s network to their destination • Using the Lateral Movement vehicle • The engine: Stolen credentials • The wheel: Data obtained in the Recon phase • The Lateral Movement methods are standard: • Steal credentials from infected computer • Expand to other computers using these creds • Steal other creds from the computer • Repeat
  • 13. The Middle #2: Recon • The recon phase is the most non standard part, as every victim’s network is different: • Attacks destinations, networks’ topology, IT conventions • Therefore it involves more manual work: • More time • Attackers’ mistakes • Recon methods are standard • Scan the vicinity: near-by (network-wise) computers • Query central repositories: Active Directory, DNS
  • 14. The End: Exfiltration • Attackers move data to the internet using standard open channels • Mostly through web • But also FTP or any other protocol
  • 16. Learn What is Normal • Per entity and containing groups • Access patterns • Logged-on Computers • Accessed resources • Working period • Working days • Working hours • Physical location • Where is the user’s home • In case of travel, does it makes sense? http://seanheritage.com/blog/profiling-normal/
  • 18. Time for another Sun Tzu Quote • “...And therefore those skilled in war bring the enemy to the field of battle and are not brought there by him.“ • Remember this is a chain! • We get to choose where to cut it! • It’s not a binary decision: • Prioritization • Balance https://upload.wikimedia.org/wikipedia/commons/3/37/Enchoen27n3200.jpg
  • 19. It’s a Battle of Movement • All phases involve movement • Movement in IT = Network • Therefore the battle must take place over the network • But we have a limited budget: in which phase we should invest more and in which we should invest less?
  • 20. Where to Invest Less • Exfiltration – too late • The information is already making its way out • Infiltration – too much attack surface • Too many users, end systems, 0-days vulnerabilities • We had already invested a lot of budget there, mainly in anti-malware • And both • Very generic to the attacker, very similar for all victims • The attackers are well trained there as they do it all the time • Highly automated • Very rapid, compared to the middle section • Less mistakes
  • 21. Where to Invest More • In the middle part: • Not generic: Attacker does not know internal network • Intelligence gaps: Attacker does not what is normal within the internal network • Before any real damage has been done • The longest of phases: Takes weeks or even months
  • 22. Weapons #1: Monitoring Traffic • Detect known attackers’ patterns • Learn normal traffic patterns • To identify anomalies • Monitoring everything does not scale and we must prioritize • Invest more in monitoring central repositories • E.g. Active Directory, DNS, DHCP • Invest more in monitoring sensitive servers • E.g. relevant file servers, DataBase servers, Active Directory/Domain Controllers
  • 23. Weapons #2: Deception • Confuse the attacker with deception • Use network tripwires and landmines • Deploy honeypots • Fake servers • Deploy honeytokens • Fake entries in real servers • Monitor access to honeypots and use of honeytokens over the network
  • 24. Putting it All Together • We know ourselves • We learn what is normal over the network • We know the enemy • We know what the attacker is doing and able to detect it • We had chosen the right battlefield • The middle of the attack: recon + lateral movement • We have the right weapons: • Network monitoring to detect known attackers’ patterns, anomalies and deception tripwires and landmines • Sun Tzu promises victory!

Notas do Editor

  1. Source: https://dl.mandiant.com/EE/library/WP_M-Trends2014_140409.pdf http://h30499.www3.hp.com/t5/HP-Security-Products-Blog/2015-Cost-of-Cyber-Crime-study-The-average-cost-of-cybercrime/ba-p/6802367#.ViNnwfnyuUk http://www.out-law.com/en/articles/2015/june/cost-of-data-breach-incidents-to-business-soars-finds-uk-government-study/
  2. http://s.wsj.net/message/dowjonesletter-20151009.pdf
  3. http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf http://cdn2.hubspot.net/hub/91979/hubfs/social-suggested-images/cyber-kill-chain.jpg
  4. http://core0.staticworld.net/images/idge/imported/article/nww/2011/08/082611-rsa-email-100271913-orig.jpg