FireEye Security-Update 28. August 2014 IT IS TIME TO REIMAGINE SECURITY Thomas Cueni, Senior Systems Engineer 1 2 FireEye Security-Update 28. August 2014 The High Cost of Being Unprepared THREAT UNDETECTED REMEDIATION Initial Breach of Companies Learned They Were Breached from an External Entity 229 Days 3 Months 6 Months 9 Months of Victims Had Up-To-Date Anti-Virus Signatures Source: M-Trends Report 3 Advanced Threat Analysis 2013 4 FireEye Security-Update 28. August 2014 A Typical Story • Proof of Concept at large Swiss Customer • >30,000 users, 60 days Firewalls/ NGFW Secure Web Gateways IPS ( B e s t o f Anti-Spam Gateways B r e e d ) FireEye 5 Proof of Concept Results • Houdini / H-worm APT activity detected Remote access tool, giving total control over compromised machines Callbacks from multiple hosts • >130 hosts associated with malicious behaviour • 33 binary email attachments undetected – 6 not detected by any AV-vendor – 2/3 detected by less than half of AV-vendors • 25 different malicious families – Backdoors, infostealers, trojans, drive-by downloads, malware archives, etc. 6 FireEye Security-Update 28. August 2014 Houdini • Full access to compromised machine: – Files, processes, passwords, command shell – Lateral spread possible via Windows mechanisms 7 Real-Time Detection 8 FireEye Security-Update 28. August 2014 Current State of Cyber Security Coordinated Persistent Threat Actors Dynamic, Polymorphic Malware NEW THREAT LANDSCAPE Multi-Vector Attacks Multi-Staged Attacks 9 10 FireEye Security-Update 28. August 2014 What Is An Exploit? Compromised webpage with exploit object Exploit object can be in ANY web page 1. Exploit object rendered by vulnerable software An exploit is NOT the same as the malware executable file! 2. Exploit injects code into running program memory 3. Control transfers to exploit code 11 Structure of a Multi-Flow APT Attack Exploit Server 1 Embedded Exploit Alters Endpoint 12 FireEye Security-Update 28. August 2014 Structure of a Multi-Flow APT Attack Exploit Server 1 Embedded Exploit Alters Endpoint Callback Server 2 Callback 13 Structure of a Multi-Flow APT Attack Exploit Server 1 Embedded Exploit Alters Endpoint Callback Server 2 Callback Encrypted Malware 3 Encrypted malware downloads 14 FireEye Security-Update 28. August 2014 Structure of a Multi-Flow APT Attack Exploit Server 1 Embedded Exploit Alters Endpoint Callback Server 2 Callback Command and Control Server Encrypted Malware 3 Encrypted malware downloads 4 Callback and data exfiltration 15 Structure of a Multi-Flow APT Attack Exploit Server 1 Embedded Exploit Alters Endpoint Callback Server 2 Callback Command and Control Server Encrypted Malware 3 Encrypted malware downloads 4 Callback and data exfiltration 16 FireEye Security-Update 28. August 2014 Multi-Vector Structure of APT Attack Weaponized Email with Zero-Day Exploit (e.g. RSA) 1 Email with weaponized document, opened by user, causing exploit 2 Client endpoint calls back to infection server 3 Backdoor DLL dropped 4 Encrypted callback over HTTP to command and control server Weaponized Email (2011 Recruitment Plan.xls) 1 Callback Server Backdoor C&C Server 2 3 4 17 Traditional “Defense in Depth” is failing The New Breed of Attacks Evade Signature-Based Defenses Firewalls/ NGFW IPS Secure Web Gateways Anti-Spam Gateways Desktop AV 18 FireEye Security-Update 28. August 2014 Purpose-Built for Security Hardened Hypervisor Multi-flow Multi-vector Scalable Extensible Security 19 FireEye’s Technology: State of the Art Detection ANALYZE DETONATE CORRELATE (1M+ OBJECTS/HOUR) Network Exploit Email Malware Download Callback Mobile Lateral Transfer Files Exfiltration Within VMs Across VMs Cross-enterprise 20 FireEye Security-Update 28. August 2014 FireEye Technology: Inside the MVX 1 FireEye Hardened Hypervisor Custom hypervisor with built-in countermeasures Designed for threat analysis FireEye Hardened Hypervisor Hardware 21 FireEye Technology: Inside the MVX 1 FireEye Hardened Hypervisor 2 Massive cross matrix of virtual executions Multiple operating systems Multiple service packs Multiple applications Multiple application versions Cross-Matrix Virtual Execution FireEye Hardened Hypervisor Hardware 22 FireEye Security-Update 28. August 2014 FireEye Technology: Inside the MVX FireEye Hardened 1 Hypervisor Massive cross matrix of virtual execution 2 Threat Protection at Scale 3 >2000 simultaneous executions Multi-flow analysis > 2000 Execution Environments Cross-Matrix Virtual Execution v1 v2 v3 v1 v2 Control Plane v3 FireEye Hardened Hypervisor Hardware 23 FireEye Technology: Scaling the MVX Realworldlinerate (objects/hour) MVX 400000 Phase 1 Phase 2 300000 200000 Line Rate Intelligent Capture 100000 0 Reduce False Negatives HTML and JavaScript form 95% of objects to be scanned on the wire 1M+ objects/hour MVX Core (Detonation) Reduce False Positives Multi-flow virtual analysis APT web attacks are nearly invisible needles in haystack of network traffic 24 FireEye Security-Update 28. August 2014 FireEye Product Portfolio: Powered by MVX Threat Analytics Platform Mobile Threat Prevention Email Threat Prevention EX NX MVX Dynamic Threat Intelligence SEG IPS SWG Host Anti-virus HX FX IPS MTP Host Anti-virus MDM 25 Validation & Containment 26 FireEye Security-Update 28. August 2014 Example: Council on Foreign Relations Attack Lateral spread infecting more machines About CFR: • Independent, nonpartisan organization, think tank, and publisher • Influential among US policy makers • Members include preeminent personalities and corporations 27 FireEye HX Platform: Workflow 1 FireEye Network Platforms Monitor Flows for Events MVX 2 FireEye Network Platforms Alert FireEye HX On Event + OS Change Report 28 FireEye Security-Update 28. August 2014 FireEye HX Platform: Workflow HX 3 FireEye Validates Reach Endpoints Anywhere Endpoints For Compromise Understand What Happened to Define Next Steps Detect Events in the Past Home Office Airplane Hotel Corporate Headquarters Coffee Shop Agent Anywhere™ Automatically Investigates Endpoints No Matter Where They Are 29 FireEye HX Platform: Workflow & 4 Contain Isolate Deny attackers access to systems with a single mouse click while still allowing remote investigation. Compromised Devices Airplane Home Office Hotel Coffee Shop Corporate Headquarters 30 FireEye Security-Update 28. August 2014 Forensics 31 Forensics „Kill chain reconstruction What happened? Lateral movement? to determine the scope Who and how many affected? and impact of a breach.“ What data was stolen? What is the damage? 32 FireEye Security-Update 28. August 2014 nPulse Enterprise Forensics Features Continuous, lossless packet capture at up to 20 Gbps and 1 Petabyte of storage Ultrafast search and retrieval of connections and packets RESTful web API and drill-down web GUI for search, inspection, and retrieval of packets, connections, and sessions Session decoder for web, email, FTP, DNS, chat, SSL, and file extraction Industry-standard storage and export in PCAP, Netflow v9 and IPFIX formats 33 Layer 1-4 Analysis • Packets: Wireshark-based analysis • Connections: Connection Flow View, IP, Port, Protocol 34 FireEye Security-Update 28. August 2014 Layer 7 Analysis • Sessions: Mail, web, DNS, chat, file extraction 35 36 FireEye Security-Update 28. August 2014 37 38 FireEye Security-Update 28. August 2014 Why Trust FireEye? 11 of 13 Zero Days First to detect malware from 2013 discovered by FireEye (compared to traditional Over 80% of the times AV engines) 39 Who Are We? • Founded 2004, based in California • 2000+ Employees • Global Presence • The leader in stopping advanced targeted attacks 40 FireEye Security-Update 28. August 2014 41
© Copyright 2024 ExpyDoc