presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a...

55
Telenet for Business Telenet for Business Modern Malwares… Modern Malwares… Modern Malwares… Modern Malwares… ... Only a few clicks away from you! ... Only a few clicks away from you! ... Only a few clicks away from you! ... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about WMDs – Weapons of Mass Destruction. Now it is time to worry about a new kind of WMDs Weapons of Mass Disruption.” (John Mariotti)

Transcript of presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a...

Page 1: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Telenet for BusinessTelenet for Business

Modern Malwares…Modern Malwares…Modern Malwares…Modern Malwares…... Only a few clicks away from you!... Only a few clicks away from you!... Only a few clicks away from you!... Only a few clicks away from you!

Xavier Mertens - Principal Security Consultant

“We worried for decades about WMDs – Weapons of Mass Destruction. Now it is time to worry about a new kind of WMDs – Weapons of Mass Disruption.”

(John Mariotti)

Page 2: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

# whoami

� Xavier Mertens, again!

Page 3: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Agenda

�Introduction

� How to fight?

� Quick wins

� Real time analysis

� Solutions

� Limitations

� Conclusions

Page 4: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Let’s Avoid This!

Page 5: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers
Page 6: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Me? Breached?

� In 66% of investigated incidents, detection was a matter of monthsor even more

� 69% of data breaches are discovered by third parties

(Source: Verizon DBIR 2012)

Page 7: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Malicious Code is not New

2003 - The SQL Slammer worm

2010 – Stuxnet is the first worm to attack SCADA systems

2011 - SpyEye and Zeus merged code is seen.

2013 - The CryptoLocker trojan horse is discovered.

1971 - The Creeper system, an experimental self-replicating program, infected DEC PDP-10 computers.

1986 - The Brain boot sector virus is released

1999 - The Melissa worm targeted Microsoft Word and Outlook systems

2000 - The ILOVEYOU worm, also known as Love Letter

Page 8: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

2014?

Fridge sends spamemails as attack hitssmart gadgets…

Page 9: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

2014?

“Target” PoS werecompromised…

Page 10: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

2014?

Yahoo! ads networkcompromised toredirect users tomalicious websites

Page 11: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

“Malware?”

“A malware, or malicious code, is defined assoftware or firmware intended to perform anunauthorized process that will have anadverse impact on confidentiality, integrityand availability of an information system.”

Page 12: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Understanding Threats

� Attack actors

• $$$

• Espionage (industrial or political)

• Hacktivism

� Attack vectors

• Mainly: HTTP / SMTP

• Local access (USB – CIFS)

• Interactions with humans

Page 13: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

“WMP”

“Weapon of Mass Pwnage”

Page 14: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Backdoors in Software

Page 15: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Backdoors in Software

Page 16: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Golden Tips

� Always download from official repositories

� Always cross-check the MD5/SHA1 hash

� Deploy in a lab

Page 17: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Bulk VS. Targeted

� Bulk attacks use a well-known vulnerability in a piece of softwareEx: CVE-2012-4681

� Lot of computers infected, low revenue

� Massive pwnage

� Targeted attacks uses a 0-day vulnerability in a piece of softwareEx: CVE-2011-0609

� Limited amount of victims but potentially huge revenue

Page 18: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Easy as 1, 2, 3, ... 4, 5!

Step 1 : 0-day attack via phishing

Step 2 : Backdoor installed and accessed

Step 3 : Privileges escalation & “pivot”

Step 4 : Gather data

Step 5 : Exfiltrate

Page 19: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Callbacks...

� A malware without C&C communications is useless...

� Callbacks are used to phone home

• To send interesting data

• To ask for what to do?

Page 20: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Below the Radar...

� Callbacks must be stealthy

• Obfuscated, encrypted and look “very common”

�Multiple channels

• JPEG images

• Twitter

• Tor

• Google Drive

• ... Theoretically any web 2.0 app!

Page 21: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Agenda

� Introduction

�How to fight?

� Quick wins

� Real time analysis

� Solutions

� Limitations

� Conclusions

Page 22: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Step 1 – Infection

� Rogue e-mails

• Security awareness

• Limit / scan attachments

�Malicious websites

• Can be your favourite website visited daily � Scan web traffic

� Trust nobody

� Prevent the “click-o-mania”

Page 23: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Step 2 - Malware Behavior

� Alter the OS

• Create/alter files

• Create/kill processes

• Wait for events

• Work stealthy

� Network flow

• Contact the C&C

Page 24: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Step 3 – Escalation & Pivot

� Hardening

• Restrict users privileges

• Uses OS security features

� Network segmentation

• Don’t put all your eggs in the same bag

Page 25: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Step 4 – Data Are Valuable

� Protect your data

• Encrypt them

• Restrict access to them

� Data at rest

� Data in motion

� Data in use

Page 26: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Step 5 – Exfiltration

� Classify data

� Network flows

Page 27: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Due Diligence

Page 28: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Agenda

� Introduction

� How to fight?

�Quick wins

� Real time analysis

� Solutions

� Limitations

� Conclusions

Page 29: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

RRD

Page 30: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

NetFlow / Firewall Logs

�Why is this server trying to connect to the wild Internet?

�Why is this laptop trying to connect to China?

�Why does this protocol suddenlyappear?

Page 31: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

DNS

� No DNS, no Internet!

�Malwares need DNS to communicate with C&C

� Alert on any traffic to untrusted DNS

� Investigate for suspicious domains

� Track suspicious requests (TXT)

Page 32: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

DNS

Page 33: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

virustotal.com

Page 34: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

urlquery.net

Page 35: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Intelligence

Local logfiles Public resources

Suspicious behavior

Page 36: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Action... Reaction!

Detect

Identify

Contain

Eradicate

Recover

Learn

IncidentHandling

Page 37: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Agenda

� Introduction

� How to fight?

� Quick wins

�Real time analysis

� Solutions

� Limitations

� Conclusions

Page 38: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Two Approaches

VS.

Page 39: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Hashing

1.Files are extracted fromnetwork flows

2.Hash is computed3.Hash is compared to a

database (local or remote)4.File is blocked

(know hash) or allowed

Page 40: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Hashing

Page 41: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Sandbox (Live)

1.Files are extracted fromnetwork flows

2.Files are executed in a sandbox

3.Behavior is analyzed andscore is computed

4.File is blocked(>score) or allowed

Page 42: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Sandbox (Live)

� Score is computed based on “actions” performed by the malware

� If ($score > $threshold) { alert(); }

Action Score

Try to find a debugger +1

Connect to a known IP +2

Perform multiple sleep() +1

Inject itself into a DLL +3

TOTAL +7

Page 43: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

So what?

Pro Con

Hashing • Speed• Privacy• Integrated into modern firewalls

• Less reliable• Database growingdaily• 0-day or targeted malwares not detected

Live Analysis • More reliable• Targeted malware detected

• Resources usage intensive• Requires dedicated hardware• Privacy issue?

Page 44: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Agenda

� Introduction

� How to fight?

� Quick wins

� Real time analysis

�Solutions

� Limitations

� Conclusions

Page 45: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Some products

� Palo Alto Networks “Wildfire”

� Check Point “Anti-bot” & “Threat Emulation”

� FireEye (core-business)

� Cuckoo (open source project)

Page 46: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Advantages

� PA & CP integrate smoothly with existing infrastructure

� Data is captured live

� Cloud or Appliance based

� Data sharing

�Web traffic, email protocols (SMTP, IMAP, POP), FTP, and SMB.

Page 47: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Mix Technologies!

� Inspect traffic with the product proposed by your firewall vendor

�Mix this with off-line tools to inspect network shares or suspicious computers

� On demand analysis

Page 48: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Agenda

� Introduction

� How to fight?

� Quick wins

� Real time analysis

� Solutions

�Limitations

� Conclusions

Page 49: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Cat & Mouse Game

Page 50: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Evasive Techniques

�Wait for user interactions

� Looks at the $ENV: HW devices, MAC addresses, disk size, processes, …

� Use non-standard protocols

� Use encryption

Page 51: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Let’s tap!

� Access to malwares in motion?

�Where to capture the traffic?

�Malware could be already installed and stealthy

Page 52: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Sandboxes

� OS & software restricted to Windows

� Difficult to deploy your own images with commercial products

� Only droppers are analyzed, and after?

Page 53: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Agenda

� Introduction

� How to fight?

� Quick Wins

� Live Analysis

� Solutions

� Limitations

�Conclusions

Page 54: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Conclusions

� You will be hit by a malware! Be ready or … maybe already infected?

� You already have valuable data, use them to track suspicious activity

� Best practices might reduce risks

� Backdoors in software aren’t reported as suspicious

� Patch, patch and patch again…

Page 55: presentaties security day modern malware-xavier mertens · Bulk VS. Targeted Bulk attacks use a well-known vulnerability in a piece of software Ex: CVE-2012-4681 Lot of computers

Thank You!

Interested?Contact your AccountManager for moreinformation!