25
Albert Lewis, CISSP, CISM InfoSec Policy & Compliance Lead The MITRE Corporation [email protected] Fighting the APT: Intelligence, Analysis, and User Awareness © 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Albert Lewis, CISSP, CISM InfoSec Policy & Compliance Lead The MITRE Corporation [email protected]

Fighting the APT: Intelligence, Analysis, and User Awareness

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 2: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

30 Years of Information Assurance Different Areas of Focus, Same Model

© 2014 The MITRE Corporation. All rights reserved.

| 2 |

Approved for Public Release; Distribution Unlimited. 13-1513

SATAN Focus on protecting operating systems DoD 5200.28-STD

• Trusted computer base • Least privilege

Focus on firewall technology • Consolidate internet presence • Proxy internet traffic • Minimize ports & protocols

Focus on vulnerability assessments • Know your network • Find your vulnerabilities • Patch management

Focus on mitigation and compliance • FISMA → Continuous

Monitoring • Consensus Audit

Guidelines ‘CAG 20’

1980s

1990s 2000s

Today

Page 3: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

What We’ve Learned

Reducing attack surface really hard – maybe impossible

■ Networks too large and complex

■ Zero vulnerabilities for all assets on network? – Assumes you know all assets

– Assumes you can know all vulnerabilities

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 4: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Hockey Goalie

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 5: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 6: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Traditional Approach

A traditional information assurance approach based solely on regulation, which resulted in an approach based on mitigation and compliance around static defenses

To a threat based cyber defense that balances Mitigation with Detection and Response

• Defenders become demanding consumers of intelligence

• Producers of intelligence

M

D

R

| 6 |

NEW Approach

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 7: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

1. We won’t always see the initial attack

2. We can’t keep the adversary out

3. Advanced Persistent Threat is not a “hacker”

Characteristics of the Threat | 7 |

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 8: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

1. Cyber Intelligence Program Rich set of sources Disciplined Indication and Warning process Good understanding of threat actors in your sector

2. Quality Malware Analysis Program Large repository of samples which extracts unique signatures Works with larger malware community

3. Development team working side-by-side with operators (DevOps)

4. Incidence response “baked into” defensive posture

5. Workforce culture of “cyber aware”

Attributes of a Top-Notch Cyber Program Today

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 9: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Advanced Persistent Threat (APT) How do they attack?

Attachment Payload

Social Engineering Technique

Spear-phishing 82%

41%

41%

18%

Attack Vectors

Email AttachmentEmail URLOther

60%

40% Phishing

Spear-phishingWhaling

67%

33%

Other

MisconfiguredMITRE system

User accessingmalicious site

Drive-by

Reconnaisance

57% 15%

14%

14% .pdf.doc.zip.xls

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 10: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Recon

Weaponize

Deliver

Exploit

Control

Execute

Maintain

Scanning and Patching Isn’t Enough

0-day Exploits – Ave. patch time: 30 days – Ave. 0-days per year: 8 – Exposure: 240 days per year

Best-practice patching – 90% patched within 72 hours – Exposure : > 65% of the year

Cyber Attack Lifecycle

| 10 |

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 11: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Tools and Sensors

Centralized Log Manager – Web proxy, Mail, DNS, etc. logs

Security Information and Event Management – NetFlow analysis

Packet Capture and Analysis – Malware extraction – Traffic analysis

Snort – Network Intrusion Detection System – Intelligence derived signatures

RT - Trouble ticketing system – Incident Response work flow and documentation

Desktop anti-virus Email gateway anti-virus

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 12: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

User Awareness Practices Motivation: Users are the biggest

target Best Practices:

– Repeated Targeted messaging; building a “Don’t click” culture

– Easy reporting: [email protected] – Personal Engagement – 1-1 follow-up from suspicious email,

proactively briefing frequently targeted users, follow-up on incidents, …

41%

41%

18%

Attack Vectors

Email AttachmentEmail URLOther

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 13: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

User Awareness Results

Great patch response time Click rate Users as sensors

13%

49%

37%

Sensor Volume

UsersIntelCOTS

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 14: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Patch Management Objective: apply patches to client systems as soon as

possible to reduce the window of opportunity for the APT – Tiered criticality and compliance requirements

Key to Success: Senior management begins monitoring patch compliance

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 15: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Cyber Intelligence Business Case

Zero days exploits provide a window of opportunity for the APT COTS security technology is only partially effective against

detecting APT attacks User reporting is not 100%

– The APT needs only one user to click

Other means of detecting and defending against the APT are needed … the mission of cyber intelligence is to bridge this gap

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 16: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

1. Understanding of Threat Building Blocks

2. Effective Threat Sharing Model

3. Agile defensive posture aligned with threat

Key Elements of Threat-Based Approach

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 17: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Share Indicators and Tools, Not Outcomes

Early attempts focused on vulnerabilities, intrusions, and attribution Organizations resisted sharing

– Fear of embarrassment and liability – Classification constraints Attribution is overvalued

– Not that important to response and mitigation – Can be relevant to understanding adversary TTPs

| 17 |

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 18: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Evolve the Information Sharing Landscape Everyone Can Contribute

From government-led, top-down distribution

To new constructs

Regional and sector public-private partnerships

Cyber Threat Sharing Federation

Threat

Crowd sourcing

Threat

Fusion & Analysis Tools

tearlines

NTOC

Mil/Gov Sector

ACSC FS ISAC

Indicator DB Intrusion Information

Civil and Commercial Entities

| 18 |

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 19: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Evolve the Information Sharing Landscape Everyone Can Contribute

From government-led, top-down distribution To new constructs

Regional and sector public-private partnerships

Cyber Threat Sharing Federation

Threat

Crowd sourcing

Threat

Fusion & Analysis Tools

tearlines

NTOC

Mil/Gov Sector

ACSC FS ISAC

Indicator DB Intrusion Information

Civil and Commercial Entities

Indicator DB

ACSC

FS ISAC

Trans ISAC MilGov Sec

Indicator DB

Indicator DB

Indicator DB

| 19 |

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 20: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Supported By Standards-Based Infrastructure

MITRE CRITS: Structured Threat DB

External Feeds of Threat Information

OSINT

DCISE

AV vendors

ISPs, MSSs

| 20 |

Internal Feeds of Operational & Analyst

Threat Information

Indicators Observables Incidents TTPs Campaigns Threat Actors Targets COAs

Sharing Partners

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 21: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

What is “Cyber (Threat) Intelligence?”

Consider these questions: What activity are we seeing?

What threats should I look for on my networks and systems and why?

Where has this threat been seen?

What does it do?

What weaknesses does this threat exploit?

Why does it do this?

Who is responsible for this threat?

What can I do about it? 21

| 21 |

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 22: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

| 22 |

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 23: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

What you are looking for Why were they doing it?

Who was doing it?

What were they looking to exploit?

What should you do about

it?

Where was it seen?

What exactly

were they doing?

| 23 |

Why should you care about it?

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 24: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Partnerships

MITRE

FFRDCs

DCISE

ACSC

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513

Page 25: Fighting the APT: Intelligence, Analysis, and User Awareness · Snort – Network Intrusion Detection System ... COTS security technology is only partially effective against detecting

Big finish?

Sharing knowledge of our opponents and watching the plays develop, we can make the saves that protect our networks.

© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. 13-1513