Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom...

47
Tom Kellermann, CISM Chief Cybersecurity Officer, Trend Micro Spinning the Chess Board 8/19/2014 Confidential | Copyright 2013 Trend Micro Inc. Copyright 2014 Trend Micro Inc.

Transcript of Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom...

Page 1: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Tom Kellermann, CISM

Chief Cybersecurity Officer, Trend Micro

Spinning the Chess Board

8/19/2014 Confidential | Copyright 2013 Trend Micro Inc.Copyright 2014 Trend Micro Inc.

Page 2: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

2014 to 213 BC

Confidential | Copyright 2013 Trend Micro Inc.

Page 3: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Connected Devices Outnumber People

Confidential | Copyright 2013 Trend Micro Inc.

Page 4: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Employee Data Leaks

Traditional Malware Vulnerability Exploits Advanced Malware

Targeted Attacks

220,000 NEW malware programs EVERY day!

Source: AVTest.Org

Page 5: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Offense Must Inform Defense

Confidential | Copyright 2013 Trend Micro Inc.

Page 6: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Q2 Industry Attack Campaigns

Confidential | Copyright 2013 Trend Micro Inc.

Page 7: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Who Are We Up Against?

Confidential © 2013 Trend Micro Inc.

Page 8: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Arms Bazaar of Attack Code

Confidential © 2013 Trend Micro Inc.

Page 9: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

VPN Service

Botnet Framework

Bulletproof hosting

Exploit Kit

Domain names

Dropper file and crypt

Modules

$25

$125

monthly onetime

$0

$40

$0$52

$38 $120

$0 $20

$25$70

$80$8

Total: $225 $370

Menu for Full Service Hacking

Page 10: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Exploit Kits: Do-it-Yourself

Confidential © 2013 Trend Micro Inc.

Page 11: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

• Thriving Underground Market

Malware offered for $249 with a service level agreement (SLA)

and replacement warranty if the creation is detected by any

antivirus within 9 months

Page 12: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Banking Crimekits Decrease in Price

Confidential © 2013 Trend Micro Inc.

Page 13: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

13

GameOverZeus: GOZ

Page 14: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

14

Zberb

Page 15: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

A Comparison of Russian and Chinese Hackers

8/19/2014

Page 16: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Weapons Grade Arsenal

•Greater reconnaissance

•Utilization of 0-days

•Undetectable by anti-virus

•Able to withstand normal disinfection methods like reinstalling OS

•Calling home is undetected by DLPs and IPS/IDS

•Data extraction, command and control even across an air gap

Page 17: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

What are the Trends of Attack?

Confidential © 2013 Trend Micro Inc.

Page 18: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

8/19/2014 18Confidential | Copyright 2012 Trend Micro Inc.

Page 19: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Q2 Serious Java Vuls

8/19/2014

Page 20: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Offense Must Inform Defense

8/19/2014

Page 21: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Exfiltration: Most Used APPs and Protocols

Page 22: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Evasions

• Packers

• Compressors

• Metamorphism

• Port Binding

• Polymorphism

• Virtual Machine

• Sandbox

Page 23: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Dropping In

Confidential | Copyright 2013 Trend Micro Inc.

Page 24: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

What are the new attack vectors?

Confidential © 2013 Trend Micro Inc.

Page 25: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Watering Hole Attacks

Copyright 2014 Trend Micro Inc. Source: Trend Micro Q2’14 Treat Roundup Report

Page 26: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Malicious URLs by Country

8/19/2014

Page 27: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Island Hopping

8/19/2014

Page 28: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

81% Have Not Updated SLAs

8/19/2014

Page 29: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Man-in-the-Browser Attacks

8/19/2014

Page 30: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

EMMENTAL

8/19/2014 30Confidential | Copyright 2012 Trend Micro Inc.

Page 31: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

The Evolution of Mobile Attacks

8/19/2014

Page 32: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Mobile Ransomware: Svpeng & Locker

Confidential | Copyright 2013 Trend Micro Inc.

Page 33: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Proximity Attacks Realized

8/19/2014

Page 34: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

34(NEST, 2014)

Page 35: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Geopolitics as Harbingers for Attack

Confidential © 2013 Trend Micro Inc.

Page 36: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Energetic Bear

Confidential | Copyright 2013 Trend Micro Inc.

Page 37: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

2014 Cyber Attack Trends

1. Island Hopping2. Mobile Malware/Proximity

attacks3. Cross-Platform Attacks4. Man-in- the- Browser

Attacks5. Watering Hole Attacks6. Ransomware7. Cloud Attacks

8/19/20148/19/2014

Page 38: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Foiling the Digital Insider

8/19/2014 Copyright 2013 Trend Micro Inc.

Page 39: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Opportunities to Detect the Breach

8/19/2014 39Confidential | Copyright 2012 Trend Micro Inc.

Page 40: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Advanced Persistent Response

Confidential | Copyright 2013 Trend Micro Inc.

Page 41: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Advanced

Malware

Detection

Attacker Activity

Detection

Threat Impact

Assessment

Contextual

Threat Analysis

Page 42: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

42

Custom Defense

Network-wideDetection

AdvancedThreat Analysis

Threat Services

AutomatedSecurity Updates

ThreatIntelligence

CustomSandboxes

Copyright 2013 Trend Micro Inc.

Network Admin

Security

Known ThreatsNetwork

Ports

NetworkTraffic

CommunicationProtocols Unknown

Threats

EvolvingThreats

Page 43: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Risk Management in 2014

8/19/2014

1. Conduct Pen test of all third parties.

2. Use Two-factor authentication.

3. Conduct egress filtering.

4. Deploy file integrity monitoring.

5. Implement virtual shielding for zero day exploits.

6. Deploy both an MDM and Mobile Application Reputation software.

7. Deploy a DLP.

8. Implement whitelisting.

9. Manage the crypto keys for your cloud data.

10. Implement DMARC.

11. Deploy context aware Threat Intelligence.

12.Utilize a Breach Detection System.

Page 44: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Breach Detection with Deep Discovery

360 Degree Detection

• Custom sandboxing

– Matching precise customer specs

– Mobile, Mac, and more

• Beyond malware

– C&C comms, attacker activity

• Beyond web & email traffic

– 80+ protocols/apps over all ports

Copyright 2014 Trend Micro Inc.

Custom Intelligence• Smart Protection Network

& Threat Researchers• Threat Connect for custom intel

Advanced

Protection

Integration

Custom Security

Updates

Forensics,

Containment,

Remediation

Custom Detection

and Intelligence

Page 45: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

45

Threat profile: What are the characteristics, origins and variants of this malware.

Related IPs/Domains: What are the known C&C comms for this attack.

Attack Group/Campaign: Who and what is behind this threat.

Containment and remediation: What to look for, how to eradicate.

Threat Connect Portal – Impact Analysis

Accessed directly fromDeep Discovery Console

Page 46: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Situational Awareness

Confidential | Copyright 2013 Trend Micro Inc.

Page 47: Spinning the Chess BoardBreach Detection with Deep Discovery 360 Degree Detection •Custom sandboxing –Matching precise customer specs –Mobile, Mac, and more •Beyond malware

Securing your journey to the cloud