Next-Generation Security and the Problem of Exploitation

25
1 1 Next-Generation Security and the Problem of Exploitation April 2015 Matthew Ancelin, CISSP, CNSE 1

Transcript of Next-Generation Security and the Problem of Exploitation

Page 1: Next-Generation Security and the Problem of Exploitation

11

Next-Generation Security andthe Problem of Exploitation

April 2015

Matthew Ancelin, CISSP, CNSE

1

Page 2: Next-Generation Security and the Problem of Exploitation

2

Network: Old Methods vs. New Methods

• Port and protocol allow/block firewalling• URL filtering, black lists• Blacklisting of IP or range• Standalone signature based IPS• UTM: unified threat management• Web gateways/Proxy

• Visibility and Control• Application based firewalling• Integrated Threat Prevention• SSL decryption/inspection• Automated threat intelligence sharing• Sandboxing

Page 3: Next-Generation Security and the Problem of Exploitation

3

Visibility and Control: Application based firewalling, SSL Decryption/Inspection, Integrated Threat Prevention

Page 4: Next-Generation Security and the Problem of Exploitation

4

Sharing is Cyber-Caring: Verizon’s 2015 Breach report

Source: Verizon 2015 Data Breach Investigations Report

Page 5: Next-Generation Security and the Problem of Exploitation

5

Sharing is Cyber-Caring: Verizon’s 2015 Breach report

Source: Verizon 2015 Data Breach Investigations Report

75% of attacks spread from victim 0 to victim 1 within

24 hours

Page 6: Next-Generation Security and the Problem of Exploitation

6

Sandboxing and Threat Intelligence…3 years later

Watchguard- Dimension (threat intel only)

CheckPoint - Threat Emulation(sandbox), ThreatCloud service (intel, MSP)

Cisco(Sourcefire) - Threat Grid and AMP

Palo Alto Networks – WildFire Threat Intelligence Cloud

McAfee – TrustedSource (threat intel only – IP/Domain)

Fortinet – FortiSandbox

FireEye – core product + Threat Intelligence

BlueCoat – Malware Analysis ApplianceSource: www.watchguard.com

Page 7: Next-Generation Security and the Problem of Exploitation

7

Sandboxing and Automated Threat Intelligence sharing

AV Signatures DNS Signatures C&C Signatures

Malware URL Filtering

Sandbox

Global install base and Threat Intel Consortium

SIEM

AV dat

a

Network data

other

Page 8: Next-Generation Security and the Problem of Exploitation

8

Endpoint Protection

“Anti-virus is Dead”

Source: Wall Street Journal, May 2014

Page 9: Next-Generation Security and the Problem of Exploitation

9

Endpoint: Old Methods vs. New Methods

• Signature matching• Heuristics• Kernel-level root-kit protection• Cloud based updates• Web threat protection• IP Reputation services• Registry cleaners

• Micro-virtualization• Task introspection• Process/App whitelisting• Automated threat intelligence• Exploit trapping• Sandboxing• Predictive math modeling• Either Prevent or Detect/Remediate

Page 10: Next-Generation Security and the Problem of Exploitation

10

Application Whitelisting

Source: www.talk.pharma-mkting.com

Page 11: Next-Generation Security and the Problem of Exploitation

11

Micro virtualization

Source: www.bromium.com

Page 12: Next-Generation Security and the Problem of Exploitation

12

Predictive Math Modeling

Source: www.cylance.com

Page 13: Next-Generation Security and the Problem of Exploitation

13

Traps - Exploit Trapping by Technique

Individual Attacks

Software Vulnerability Exploits

Thousands of new vulnerabilitiesand exploits per year

1,000s/yrCore Techniques

Exploitation Techniques

In the past 3 years, 2 new techniques have been discovered

1 or 2/yr

Source: www.cvedetails.com

Page 14: Next-Generation Security and the Problem of Exploitation

14

Prevention of One Technique in the Chain will Block the Entire Attack

Exploit Prevention Case Study Unknown Exploits Utilize Known Techniques

DLLSecurity

IE Zero DayCVE-2013-3893

Heap SprayDEP

CircumventionROP/UtilizingOS Function

Adobe ReaderCVE-2013-3346

Heap SprayDEP

CircumventionUtilizing

OS Function

Adobe FlashCVE-2015-3010/0311

ROP JiT Spray Utilizing

OS Function

Page 15: Next-Generation Security and the Problem of Exploitation

15

Are exploits really the problem?

99.9% of the exploited vulnerabilities were compromised more than 1 year after the CVE was published.

~50% of 2014 CVEs exploited fell within 2 weeks of announcement.

* Source: Verizon 2015 Data Breach Investigations Report

Page 16: Next-Generation Security and the Problem of Exploitation

16

How does exploit trapping fare against a sophisticated APT?

Page 17: Next-Generation Security and the Problem of Exploitation

17

Traps stops 0-day exploits without prior knowledge of them

Page 18: Next-Generation Security and the Problem of Exploitation

18

Attacks LEAD with exploits

Nov 2014: Operation CloudyOmegaNov 2014: Dark Hotel campaignOct 2014: SandWormOct 2014: Hurricane PandaFeb 2014: Operation SnowMan (MS IE 0-day exploit)Sept 2013: Ichitaro Zero DayFeb 2014: IE 0-day, Watering Hole attackFeb 2014: ‘The Mask’ CampaignDec 2013: Operation KeyChangOct 2013: Egobot CampaignSept 2013: Icefog campaignSept 2013: EvilGrab campaignJune 2013: NetTraveler campaign

…this pattern repeats over and over again

Page 19: Next-Generation Security and the Problem of Exploitation

19

Social Engineering 101 – determine an Attack Vector

Page 20: Next-Generation Security and the Problem of Exploitation

20

Social Engineering 101 – determine an Attack Vector

Upgrade to Office 2010

Page 21: Next-Generation Security and the Problem of Exploitation

21

Page 22: Next-Generation Security and the Problem of Exploitation

22

Page 23: Next-Generation Security and the Problem of Exploitation

23

Social Engineering 101 – deliver the Attack

Page 24: Next-Generation Security and the Problem of Exploitation

24

Social Engineering 101 – deliver the Attack

SEND US YOUR RESUME

Page 25: Next-Generation Security and the Problem of Exploitation

25