29
This Is Next-Gen IT Security Mark Loman Director of Engineering Next-Gen Technologies

This is Next-Gen IT Security - Introducing Intercept X

Embed Size (px)

Citation preview

Page 1: This is Next-Gen IT Security - Introducing Intercept X

This Is Next-Gen IT Security

Mark LomanDirector of Engineering Next-Gen Technologies

Page 2: This is Next-Gen IT Security - Introducing Intercept X

Melissa Virus

1999

$1.2B

Love LetterWorm

$15B

1998

Zeus Trojan

$2.3B

2007

JSocket RATs

$800M

2014

LockyRansomware

$1.1B

2016

FinFischerSpyware

2003

$780M

Exploit as aService

$500M

2015

Traditional Malware Advanced Threats

The Evolution of ThreatsFrom Malware to Exploits

Page 3: This is Next-Gen IT Security - Introducing Intercept X

Traditional Malware Advanced Threats

The Evolution of SecurityFrom Anti-Malware to Anti-Exploit

Exposure Prevention

URL BlockingWeb/App/Dev Ctrl

Download Rep

Pre-Exec Analytics

Generic MatchingHeuristicsCore Rules

File Scanning

Known MalwareMalware Bits

TrojanSpywareVirus Worm

Run-Time

Behavior AnalyticsRuntime Behavior

Exploit Detection

Technique Identification

RATs RansomwareExploit Kits

Page 4: This is Next-Gen IT Security - Introducing Intercept X

Threat Landscape 2016

Page 5: This is Next-Gen IT Security - Introducing Intercept X

THIRD PARTY

Malvertising Threat Chain

AD NETWORK

RTB

Page 6: This is Next-Gen IT Security - Introducing Intercept X

No Site Is Immune

Page 7: This is Next-Gen IT Security - Introducing Intercept X

Exploits As a ServiceInitial Request

Victims

Exploit Kit Customers Redirection

MaliciousPayloads

Stats

Landing Page

Tor

Exploit Kit Admin

Exploits

Payloads

Get Current Domain

Get Stats

Update payloads

Management Panel Malware DistributionServers

Gateway Servers

Page 8: This is Next-Gen IT Security - Introducing Intercept X

Ransomware

Page 9: This is Next-Gen IT Security - Introducing Intercept X

Ransomware Evolves

Page 10: This is Next-Gen IT Security - Introducing Intercept X

Known to Unknown75% of malware inside an organization is unique to that organization

Evolutionary Threat Trends

Large to Small Business70% of all organizations reported a compromise in the last 12 months.

Simple to IndustrializedAs Malware-as-a-Service platforms evolve, payloads are being monetized on the Dark Web with the same market pressures we see govern any industry

Volume to TargetedExploit kits cause over 90% of all data breaches

Malware to Hacking63% of data breaches involve stolen credentials

Everyone to WeakestAverage time to fix vulnerabilities is 193 days

Threats Targets

(Source: Sophos Labs)

(Source: NSS Labs)

(Source: WhiteHat Security)(Source: Verizon DBIR)

(Source: Sophos Labs)

(Source: FBI / InfoSec London)

Page 11: This is Next-Gen IT Security - Introducing Intercept X

Anatomy of an Advanced Attack

Page 12: This is Next-Gen IT Security - Introducing Intercept X

Introducing

Page 13: This is Next-Gen IT Security - Introducing Intercept X

Introducing Sophos Intercept X

ADVANCEDMALWARE

ZERO DAYEXPLOITS

LIMITEDVISIBILITY

Anti-Exploit

Prevent Exploit Techniques• Signatureless Exploit Prevention• Protects Patient-Zero / Zero-Day• Blocks Memory-Resident Attacks• Tiny Footprint & Low False Positives

No User/Performance ImpactNo File Scanning

No Signatures

Automated Incident Response• IT Friendly Incident Response• Process Threat Chain Visualization• Prescriptive Remediation Guidance• Advanced Malware Clean

Root-Cause Analysis

Faster Incident ResponseRoot-Cause VisualizationForensic Strength Clean

Detect Next-Gen Threats• Stops Malicious Encryption• Behavior Based Conviction• Automatically Reverts Affected Files• Identifies source of Attack

Anti-Ransomware

Prevent Ransomware AttacksRoll-Back Changes

Attack Chain Analysis

Page 14: This is Next-Gen IT Security - Introducing Intercept X

Intercepting ExploitsVulnerabilities vs Exploits vs Exploit Techniques

time

tota

l cou

nt

vulnerabilities

public exploits

exploittechniques

Prior knowledge of public attacks(signatures / behaviors)

Patching

1,000s/yr

100s/yr

10s

Page 15: This is Next-Gen IT Security - Introducing Intercept X

Intercepting ExploitsVulnerabilities vs Exploits vs Exploit Techniques

time

tota

l cou

nt

vulnerabilities

public exploits

exploittechniques

Prior knowledge of public attacks(signatures / behaviors)

Patching

1,000s/yr

100s/yr

10s

100,000,000+new malware each year

Page 16: This is Next-Gen IT Security - Introducing Intercept X

Heap Spray Use after Free Stack Pivot ROP Call OS

functionRansomware

activity

PREPARATION TRIGGERING GAIN CONTROL CIRCUMVENT(DEP)

POST

Exploit TechniquesAntivirus

Sophos Intercept X

• Most exploit-based attacks consist of 2 or more exploit techniques• Exploit techniques do not change and are mandatory to exploit existing and future

software vulnerabilities

Intercepting ExploitsBlocking Exploit Techniques vs Antivirus

Page 17: This is Next-Gen IT Security - Introducing Intercept X

Example Code Execution Flow

time

01101101 01110010 00101110 00100000 01110010 01101111 01100010 01101111 01110100 00100000 01110111 01100001 01110011 00100000 01101000 01100101 01110010 01100101

System DLL

User Space

Kernel

Processor

System callAPI call

Page 18: This is Next-Gen IT Security - Introducing Intercept X

01101101 01110010 00101110 00100000 01110010 01101111 01100010 01101111 01110100 00100000 01110111 01100001 01110011 00100000 01101000 01100101 01110010 01100101

time

User Space

System DLL

Kernel

Processor

Check File on Disk (signature check) when Process is createdNo attention to machine code that called CreateProcess

System call (e.g. CreateProcess)API call

On Execute File ScanningAntivirus

Page 19: This is Next-Gen IT Security - Introducing Intercept X

01101101 01110010 00101110 00100000 01110010 01101111 01100010 01101111 01110100 00100000 01110111 01100001 01110011 00100000 01101000 01100101 01110010 01100101

timeDuring ROP attacks, stack contains no reliable dataAttacker has control over steps (stack), can manipulate defender

System DLL

User Space

Kernel

Processor

System callAPI call (VirtualProtect)

Stack-based ROP Mitigations Microsoft EMET

Page 20: This is Next-Gen IT Security - Introducing Intercept X

01101101 01110010 00101110 00100000 01110010 01101111 01100010 01101111 01110100 00100000 01110111 01100001 01110011 00100000 01101000 01100101 01110010 01100101

System DLL

User Space

Kernel

Processor

VirtualProtect

timeSoftware Stack and Hardware-traced Branch Analysis (manipulation resistant)Leverages and repurposes a previously unused feature in mainstream Intel® processors

CreateProcess

Branch-based ROP Mitigations (Hardware Assisted)Sophos Intercept X

Page 21: This is Next-Gen IT Security - Introducing Intercept X

Intercepting Exploit Techniques (Overview)Stack PivotStops abuse of the stack pointerStack ExecStops attacker’ code on the stackStack-based ROP MitigationsStops standard Return-Oriented Programming attacksBranch-based ROP Mitigations (Hardware Assisted)Stops advanced Return-Oriented Programming attacksImport Address Table Filtering (IAF) (Hardware Assisted)Stops attackers that lookup API addresses in the IATSEHOPProtects against overwriting of the structured exception handlerLoad LibraryPrevents loading of libraries from UNC pathsReflective DLL InjectionPrevents loading of a library from memory into a host processShellcodeStops code execution in the presence of exploit shellcodeVBScript God ModePrevents abuse of VBScript in IE to execute malicious codeWoW64Stops attacks that address 64-bit function from WoW64 (32-bit) processSyscallStops attackers that attempt to bypass security hooks

Enforce Data Execution Prevention (DEP)Prevents abuse of buffer overflowsMandatory Address Space Layout Randomization (ASLR)Prevents predictable code locationsBottom Up ASLRImproved code location randomizationNull Page (Null Dereference Protection)Stops exploits that jump via page 0Heap Spray AllocationPre-allocated common memory areas to block example attacksDynamic Heap SprayStops attacks that spray suspicious sequences on the heapVTable HijackingHelps to stop attacks that exploit virtual tables in Adobe Flash PlayerHollow ProcessStops attacks that use legitimate processes to hide hostile codeDLL HijackingGives priority to system libraries for downloaded applicationsApplication LockdownStops logic-flaw attacks that bypass mitigationsJava LockdownPrevents attacks that abuse Java to launch Windows executablesAppLocker BypassPrevents regsvr32 from running remote scripts and code

Page 22: This is Next-Gen IT Security - Introducing Intercept X

Intercepting Ransomware

Monitor File Access• If suspicious file

changes are detected, file copies are created

Attack Detected• Malicious process is

stopped and we investigate the process history

Rollback Initiated• Original files restored• Malicious files removed

Forensic Visibility• User message• Admin alert• Root cause analysis

details available

Page 23: This is Next-Gen IT Security - Introducing Intercept X

Root Cause AnalyticsUnderstanding the Who, What, When, Where, Why and How

23

Page 24: This is Next-Gen IT Security - Introducing Intercept X

Sophos CleanMalware Removal. Vulnerability Assessment.

Works with existing AV• Signatureless, on-demand scanner • Does not need to be installed• Shows what the others missed• 30-Day Free License

Removes Threats• Deep System Inspection• Removes Malware Remnants• Full Quarantine / Removal• Effective Breach Remediation

On-Demand Assessment• Identifies Risky Files / Processes• Constantly Refreshed Database• Provides Additional Confidence• Command-Line Capable

Page 25: This is Next-Gen IT Security - Introducing Intercept X

Cloud IntelligenceAnalytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions

Sophos Labs | 24x7x365, multi-continent operation | URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere

UTM/Next-Gen Firewall

Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations

Wireless

Email

Web

Synchronized Encryption

Endpoint/Next-Gen Endpoint

Mobile

Server

Encryption

Sophos CentralIn Cloud On Prem

Synchronized Encryption

Page 26: This is Next-Gen IT Security - Introducing Intercept X

Synchronized Encryption: A New Paradigm in Data Protection

User Integrity App Integrity System Integrity

Encrypt Everything, Everywhere, Automatically

Synchronized with Endpoint Protection

“By 2019, 25% of security spend will be driven by EU data protection regulation

and privacy concerns.” - IDC

Page 27: This is Next-Gen IT Security - Introducing Intercept X

Intercepting Threats withSynchronized Security

Demo

Page 28: This is Next-Gen IT Security - Introducing Intercept X

Synchronized Security

Sophos Central

Cloud Intelligence

Sophos Labs

Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions

| 24x7x365, multi-continent operation | URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere

Admin Self Service Partner| Manage All Sophos Products | User Customizable Alerts | Management of Customer Installations

Endpoint/Next-Gen Endpoint

Mobile

Server

Encryption

UTM/Next-Gen Firewall

Wireless

Email

Web

In Cloud On Prem

Page 29: This is Next-Gen IT Security - Introducing Intercept X