32
Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 1 The New Threat Landscape Andy Sciaroni – FireEye Systems Engineer

The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 1 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 1

The New Threat Landscape

Andy Sciaroni – FireEye Systems Engineer

Page 2: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 2 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 2

Agenda

•  Threat Landscape Defined •  Malware Infection Lifecycle •  FireEye Overview

Page 3: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 3 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 3

The Acceleration of Advanced Targeted Attacks

•  # of threats are up 5X •  Nature of threats changing

–  From broad, scattershot to advanced, targeted, persistent

•  Advanced attacks accelerating –  High profile victims common

(e.g., RSA, Symantec, Google) –  Numerous APT attacks like

Operation Aurora, Shady RAT, GhostNet, Night Dragon, Nitro

“Organizations face an evolving threat scenario that they are ill-prepared to deal with….advanced threats that have bypassed their traditional security protection techniques and reside undetected on their systems.”

Gartner, 2012

2004 2006 2008 2010 2012

Advanced Persistent Threats

Zero-day Targeted Attacks Dynamic Trojans

Stealth Bots

Worms Viruses

Disruption Spyware/ Bots

Cybercrime

Cyber-espionage and Cybercrime

Dam

age

of A

ttack

s

Page 4: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 4 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 4

Technological Risks

Page 5: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 5 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 5

Top 5 Global Risks

Source: World Economic Forum

Page 6: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 6 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 6

High Profile APT Attacks Are Increasingly Common

Page 7: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 7 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 7

Wall Street Journal – Cybersecurity 2.0

FBI Director Robert Mueller last month told a Senate committee that cyber espionage against infrastructure such as power plants will someday surpass terrorism as the "No. 1 threat to the country." This may be hyperbole, but the violations we know about are the tip of the iceberg. It takes a high level of sophistication to discover breaches of computer systems, which makes it likely that many remain undiscovered. Also, many companies choose not to disclose violations for fear of being sued. For example, news that some 30 high-tech companies had been hacked, including Yahoo, Adobe and Northrop Grumman, came to light a few years ago only when Google disclosed that the Gmail accounts for Chinese human-rights activists had been compromised. Excerpt from Cybersecurity 2.0 – Wall Street Journal February 27th, 2012 by L. Gordon Crovitz http://online.wsj.com/article/SB10001424052970203918304577243423337326122.html

Page 8: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 8 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 8

We Are Only Seeing the Tip of the Iceberg

HEADLINE GRABBING ATTACKS

THOUSANDS MORE BELOW THE SURFACE APT Attacks

Zero-Day Attacks Polymorphic Attacks

Targeted Attacks

Page 9: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 9 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 9

ADVANCED

TRADITIONAL

Advanced Targeted Attack

Defining Advanced Targeted Attacks

•  Utilizes advanced techniques and/or malware

–  Unknown –  Targeted –  Polymorphic –  Dynamic –  Personalized

•  Uses zero-day exploits, commercial quality toolkits, and social engineering

•  Often targets IP, credentials and often spreads laterally throughout network

•  AKA—Advanced Persistent Threat (APT)

Stealthy Unknown and Zero Day Targeted Persistent

Open Known and Patchable Broad One Time

The New Threat Landscape There is a new breed of attacks that are

advanced, zero-day, and targeted

Page 10: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 10 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 10

Typical Enterprise Security Architecture

Firewalls/ NGFW

Block IP/port connections, application-level control, no visibility into exploits and ineffective vs. advanced targeted attacks

IPS

Attack-signature based detection, shallow application analysis, high-false positives, no visibility into advanced attack lifecycle

Secure Web Gateways

Some analysis of script-based malware, AV, IP/URL filtering; ineffective vs. advanced targeted attacks

Anti-Spam Gateways

Relies largely on antivirus, signature-based detection (some behavioral); no true spear phishing protection

Desktop AV

Signature-based detection (some behavioral); ineffective vs. advanced targeted attacks

Page 11: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 11 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 11

The Enterprise Security Hole

Web-based Attacks

NGFW FW

IPS

SWG AV

Attack Vector

SECURITY HOLE

Malicious Files

Spear Phishing Emails

Page 12: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 12 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 12

The Degree of Compromise is Significant

100%

90%

80%

70%

60%

50%

40%

30%

20%

10%

0% 100,000 10,000 1,000 100 10

Infections/Weeks at Normalized Bandwidth Percent of

Deployments

98.5% of deployments see at least 10 incidents/week/Gbps

Median is about 450 incidents/week/Gbps

20% of deployments have thousands of incidents/week/Gbps

1 Gbps 5 Gbps

450 Median Net New Infections Per Week at Only 1 Gbps!

Source: FireEye Advanced Threat Report, Feb. 2012

Page 13: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 13 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 13

Malware Infection Lifecycle

FireEye - Modern Malware Protection System

Page 14: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 14 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 14

Example Playbook

Page 15: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 15 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 15

(Advertisement)

Malware Infection Lifecycle

cnn.com

(Exploit)

(Dropper) (Command/ Control)

Page 16: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 16 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 16

(Advertisement)

Infection Phase

cnn.com

(Exploit)

(Dropper) (Command/ Control)

Page 17: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 17 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 17

(Advertisement)

Callback Phase

cnn.com

(Exploit)

(Dropper) (Command/ Control)

Page 18: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 18 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 18

(Advertisement)

Three Independent Detections…Correlated

cnn.com

(Exploit)

(Dropper) (Command/ Control)

Page 19: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 19 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 19

What does a Phish email look like?

•  Omaha's Cyber Security Forum welcomes you! August's meeting is at •  7:30 a.m. on Wednesday the 15th and regular meetings will continue •  to be held on the third Wednesday of each month. Details are as follows:

•  Note #1: If you need a CPE form please let us know when you •  RSVP.

•  TOPIC: The New Threat Landscape •  BY: Andy Sciaroni •  FireEye •  WHO: All Nebraska/Iowa Information Security Professionals •  WHEN: Wednesday - August 15, 7:30 am - 9:00 am •  WHERE: Bellevue Public Schools Support Center - Room A •  2820 Arboretum Drive, Bellevue NE •  (behind Computer Cable Connection) •  WHY: To share information with like-minded professionals •  (and to share a FREE breakfast) •  HOW: Please RSVP to [email protected] and provide •  your name, company, phone and email address •  by Close Of Business Monday, 13 August.

•  DESCRIPTION: Traditional protections, like traditional and next-generation •  firewalls, intrusion prevention systems, anti-virus and Web •  gateways, only scan for the first move, the inbound attack. •  These systems rely heavily on signatures and known patterns •  of misbehavior to identify and block threats. This leaves a •  gaping hole in network defenses that remain vulnerable to •  zero-day and targeted advanced persistent threat (APT) •  attacks.

•  Find out how Malware Protection Systems (MPS) can help stop •  attacks that traditional and next-generation firewalls, IPS, •  AV, and Web and email gateways miss

•  If those of you who have access to lists of interested individuals •  would pass this message along, it would be appreciated!

Page 20: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 20 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 20

RSA two-factor tokens

Page 21: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 21 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 21

21

Page 22: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 22 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 22

Actual spearphish (H/T, @mikko)

Page 23: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 23 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 23

RSA malware found 9 months before hand!

Page 24: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 24 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 24

Simple Website Review: www.same.org

Page 25: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 25 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 25

Upcoming Golf Tournament

Page 26: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 26 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 26

FireEye Overview

Page 27: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 27 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 27

Protecting Against Advanced Targeted Attacks

FireEye Advanced Threat Protection Architecture

•  Inline blocking and quarantine available across MPS portfolio –  Block inbound zero-day

Web attacks –  Multi-protocol blocking of

callbacks –  Quarantine of malicious zero-

day emails –  Quarantine of malicious zero-

day files

•  Mitigates risk of data exfiltration

•  Provides highly actionable information for timely incident response

Email MPS Web MPS

File MPS

CMS

Data Center

Lateral Malware

Movement

signature-based defenses

proactive, real-time defenses

Page 28: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 28 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 28

Multi-protocol Object Capture

FireEye Appliance Platform

MALWARE-VM FILTER

Multi-Protocol, Real-Time VX Engine

Dynamic, real-time analysis -  Exploit detection -  Malware Binary analysis -  Cross-matrix of OS/apps -  Originating URL -  Subsequent URLs -  OS Modification Report -  C&C Protocol descriptors -  Generic heap spray -  Shellcode detection

Virtual Execution Environments Phase 2

Phase 1 – Web MPS •  Aggressive Capture •  Web Object Filter M

ap To Target O

S&A

pps

Phase 1 – Email MPS •  Email Attachments •  URL Submission

Phase 1 – MAS appliance •  File directories •  Batch mode processing

Page 29: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 29 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 29

Global Intelligence to Protect Local Network

Page 30: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 30 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 30

Enterprise Malware Protection Deployment

Anti-Spam

Mail Servers

File Share 2

File Share 1 LAN

IPS

Web MPS Email MPS

File MPS

CMS

File Share 3

•  Real-time Web, email, and file security to stop advanced targeted attacks

•  Centralized reporting and management

•  Integration into cyber incident response system

MALWARE PROTECTION CLOUD

Page 31: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 31 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 31

FireEye making a difference

Page 32: The New Threat Landscape · • firewalls, intrusion prevention systems, anti-virus and Web • gateways, only scan for the first move, the inbound attack. • These systems rely

Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 32 Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 32

Q&A