18
18 QUALYS SECURITY CONFERENCE 2018 Bringing IOC to the Next Level Chris Carlson VP, Product Management, Qualys, Inc. Qualys Indication of Compromise

Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

18QUALYS SECURITY CONFERENCE 2018

Bringing IOC to the Next Level

Chris Carlson VP, Product Management, Qualys, Inc.

Qualys Indication of Compromise

Page 2: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Vulnerabilities are Low Hanging Fruit

November 16, 2018 QSC Conference, 2018 2

Early 2010s Zero-day Vulnerabilities

Today

Rapidly weaponizing newly-disclosed vulnerabilities

Page 3: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Known Critical Vulnerabilities are Increasing

6-7K vulnerabilities are disclosed each year 30-40% are ranked as “High” or “Critical” severity “Mean Time to Weaponize” is rapidly decreasing y/y

November 16, 2018 QSC Conference, 2018 3

0

1,000

2,000

3,000

4,000

5,000

6,000

7,000

8,000

9,000

2011 2012 2013 2014 2015 2016

Vulnerabilities

Total High (CVSS 7-10)

Page 4: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Vulnerability Management Lifecycle

November 16, 2018 QSC Conference, 2018 4

Vulnerability Management

Threat Risk and Prioritization Patch

Management

Asset Inventory

Page 5: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Vulnerability Spread at Speed of DevOps

Red Hat 7.4 Marketplace

Image

Page 6: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Auto-Deploy Qualys Cloud Agent

Page 7: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Vulnerability Results

Page 8: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Threat Protection: Exploitability Opportunity

Page 9: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Get Proactive – Reduce the Attack Surface Immediately Identify Vulnerabilities in Production

Notify IT Asset Owner to Patch/Stop the Instance

Control Network Access / Cloud Security Groups

Add Detection and Response – Endpoint & Network

November 16, 2018 QSC Conference, 2018 9

Page 10: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Proactively Hunt, Detect, and Respond

Passive Network Sensor

Indication of Compromise

Detect IOCs, IOAs, and verify Threat Intel What new devices are on the

network? Are there new/different traffic patterns?

November 16, 2018 QSC Conference, 2018 10

Page 11: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Qualys IOC Use Cases – Visibility Beyond AV

Detect Known/Unknown Malware Family Variants

Using Qualys Malware Labs behavior models and Threat Feeds (OEM, customer)

Threat Intel Verification

Threat Intel Feeds / Mandated to Verify “Is this hash, registry, process, mutex on my

network?”

“Look Back” Investigation after a known breach

Go back over months of stored events and

find the first occurrence of a breach

Hunting / Find Suspicious Activity

Indicator of Activity hunting with pre-built and user-defined queries for Fileless attacks

API Integration

SIEM

Page 12: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Organizations Struggle to Answer Basic Questions

Are these hashes on/running in my network? Are these mutexes / processes / registry keys?

Did any endpoints connect to these IPs / Domains?

Are there any connections to TOR exit nodes?

What system is the first impacted? “Patient Zero” Did this spread to others systems? When?

November 16, 2018 QSC Conference, 2018 12

Page 13: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Threat Intel Verification

Find the object there. Threat Intelligence lists attack information …

1

Search for the file hash here…

2

3

Page 14: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Malware Hides with Stolen Code-Signing Certificates

https://www.welivesecurity.com/2018/07/09/certificates-stolen-taiwanese-tech-companies-plead-malware-campaign/

Page 15: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

New IOC CVE - File Reputation Threat Feed

Threat Feed of malware hashes used

in real-world vulnerability exploits

Prioritize vulnerability remediation based on successful attacks in

your network

IOC

Real-Time Indicators for which

vulnerabilities have known / POC exploits

Prioritize vulnerability

remediation on likelihood of attack

TP

Find Vulnerabilities

Verify that vulnerabilities have been remediated

VM

November 16, 2018 QSC Conference, 2018 15

Page 16: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

DEMO

Threat Intel Verification Hunting Alerting

Create Emergency Patch Job from CVE Exploitation

18fc1b9b29a2d281ec9310f9f226ad77e3cb9c558f696c37390bbac72baa8ba8 168.63.129.16

Indication of Compromise

IOC

Page 17: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

Qualys Cloud Agent IT, Security, Compliance Apps

Asset Inventory

Vulnerability Management

Policy Compliance

Indication of Compromise Detection

File Integrity Monitoring

Upcoming IT App (Beta November 2018)

Patch Management

PC

VM

AI

November 16, 2018 QSC Conference, 2018 17

Page 18: Qualys Indication of Compromise · 2019-08-29 · Qualys Indication of Compromise. Vulnerabilities are Low Hanging Fruit 2 QSC Conference, 2018 November 16, 2018 Early 2010s Zero-day

18QUALYS SECURITY CONFERENCE 2018

Thank You Chris Carlson

[email protected]