Malware Mega Threats 2700 W. Cypress Creek Rd. Suite C110, Fort Lauderdale, FL 33309 954-832-3601 ● Fax: 954-659-1610 ● www.greysontech.com Who is Greyson Technologies? www.greysontech.com What We Do! Greyson delivers measureable business outcomes by architecting and implementing Unified Communications, Security, Enterprise Networking, Virtualization and Storage solutions in secure, hybrid cloud environments. www.greysontech.com Why Greyson? Named South Florida’s Fastest Growing IT Company Florida’s 13th fastest Simply the Best Engineers – An Expert Team of A+ Players Local Certified Experienced w/Real World Expertise Professional www.greysontech.com Why We Are Here CIO Roundtable – Security Presents a Major Concern! Survey Data: 57% of respondents expect to experience a security breach within the next year. Attack vectors changing: Silverlight attacks up 228% in Sept. 2014 Phishing and SPAM: Up 250% Persistent state of infection: Malware infections 250% in Oct 2014 Only 20% of respondents regularly communicate with management about threats. 1 month The amount of time survey respondents say it took to investigate, restore service and verify resolution of incidents. www.greysontech.com Intelligent Cybersecurity for the Real World Chris Robb Advanced Malware Specialist, Cisco Security chrrobb@cisco.com © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 The World Has Changed: Any Device to Any Cloud PUBLIC CLOUD HYBRID CLOUD PRIVATE CLOUD © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 The World Has Changed: The Industrialization of Hacking Enterprise Response Intelligence and Analytics Anti-virus IDS/IPS Anti-malware (Host) (Network) (Host+Network) Viruses Worms Spyware & Rootkits APTs Cyberware 2000 2005 2010 Today + © 2014 Cisco and/or its affiliates. All rights reserved. (Host+Network+Cloud) Cisco Confidential 8 In the news…what do these all have in common? Home Depot Florida bank notifies roughly 72,000 customers of breech Russian PM’s Twitter hacked – “I resign” Sony suffer DOS attack 25,000 Records of Homeland Security Employees Stolen JP Morgan $100,000 bitcoin loss due to hack Teenager hacked in to Metropolitan Police’s computer 60k Tennessee works impacted by subcontractor breech Los Angeles based health system breached 4.5M Records stolen from US Health Giant Over 50 UPS Franchises hit by data breach Saudi TV website hacked by Libyan NRC Compturs hacked 3 times Microsoft’s Twitter Account Hacked Goodwill Sony’s Twitter Account Hacked Insider breach at Las Vegas Brain and Spine Surgery Center MeetMe Social Network User’s Passwords Stolen Russian Hackers steal 4.5B records Norwegian oil industry under attack Ferguson police offices computers hacked Albertson’s stores CC data hacked Payment cards used on Wireless Emporium website compromised Dairy Queen hacked © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Customer Success Story: Large Financial Services Firm Version of malware that took out Sony Pictures seen “in wild” in July 12/04/2014: What has happened at Sony Pictures While the malware that took down computers at Sony Pictures last week was justreads dayslike a blockbuster Entertainment over compiled the past week before it was triggered, an earlier version of the code used toscreenplay—or unleash the adestructive attack may chief executive’s nightmare: have been in use much earlier within Sony’s network. Malware with target the same cryptographic Hackers a major company, disabling its internal systems and leaking documents revealing signature and filename as the “Destover” malware was spotted by the security firm Packet Ninjaslong-held secrets, from coming products to executive pay. in July. That malware communicated with one of the same IP addresses and domain names as the final “Destover” malware: a server at Thammasat University in Bangkok, Thailand. The malware, which 12/05/2014: The Sony data breach continues to get worse. was found in a Cisco Partner ThreatGrid repository, also communicated with a network address First, it was exposed budgets, layoffs and 3,800 SSNs, assigned to a New York business customer of TimeWarner Cable. then it was passwords. Now, it's way more social security numbers—including Sly Stallone's. Taken from article, http://arstechnica.com/security/2014/12/version-of-malware-that-took-outsony-pictures-seen-in-wild-in-july/ The Wall Street Journal reports that analysis of the documents leaked so far included the Social Security numbers of 47,000 current and former Sony Pictures workers. That included Sylvester Stallone, Rebel Wilson, and Anchorman director, Judd Apatow. The Journal reports that the SSNs are found alongside salary information, home addresses, and contract details. © 2014 Cisco. CONFIDENTIAL. www.ThreatGRID.com The Silver Bullet Does Not Exist Threat Analytics The Best Point in Time Protection Protects you 90 + % of the time Sandboxing Application Control “Detect the Unknown” “Fix the Firewall” NAC IDS/IPS UTM “Outside looking in” “Captive portal” “No false positives, no false negatives” PKI AV FW/VPN “No key, no access” “It matches the pattern” “Block or Allow” © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Point-in-Time Detection Analysis Stops Not 100% Event Horizon Antivirus Sandboxing Initial Disposition = Clean © 2014 Cisco and/or its affiliates. All rights reserved. Sleep Techniques Unknown Protocols Encryption Polymorphism Blind to scope of compromise Actual Disposition = Bad Too Late!! 12 AMP goes beyond point-in-time detection Attack Continuum BEFORE DURING AFTER Discover Enforce Harden Detect Block Defend Scope Contain Remediate Network Endpoint Mobile Point-in-time © 2014 Cisco and/or its affiliates. All rights reserved. Virtual Cloud Email & Web Continuous 13 Continuous Protection when advanced malware evades point-in-time detection Analysis Stops Point-in-time Detection Antivirus Not 100% Sleep Techniques Unknown Protocols Encryption Sandboxing Initial Disposition = Clean AMP Initial Disposition = Clean © 2014 Cisco and/or its affiliates. All rights reserved. Polymorphism Actual Disposition = Bad = Too Late!! Retrospective Detection, Analysis Continues Actual Disposition = Bad = Blocked 14 Sample of Traditional Point in Time Protection © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 AMP for Endpoint: Device Trajectory / Incident Analysis © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Reduce Attack Surface Retrospective detection and protection Ability to learn and proactively reduce your attack Surface © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Cisco Advanced Malware Protection Built on unmatched collective security intelligence Cisco® Collective Cisco Collective 1001 1101 1110011 0110011 101000 0110 00 1101 1110011 0110011 101000 0110 00 1001 Security Security 101000 0110 00 0111000 111010011 101 1100001 101000 0110 110 00 0111000 111010011 101 1100001 110 Intelligen 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 1101 1110011 0110011 1100001110001110 1001 101000 0110 Cloud 00 Intelligence ce WWW Email Endpoints Web Networks IPS 1.6 million global sensors web requests Intelligence 24x7x365 AMP Threat Grid Dynamic Analysis 10 million files/month 100 TB of data received per day operations 150 million+ deployed endpoints 40+ languages 600+ engineers, technicians, and researchers 180,000+ File Samples per Day 35% worldwide email traffic © 2013 Cisco and/or its affiliates. All rights reserved. Devices Automatic Updates every 3-5 minutes Advanced Microsoft and Industry Disclosures Snort and ClamAV Open Source Communities AMP Community AEGIS™ Program Private/Public Threat Feeds Cisco Confidential 18 Cisco AMP Solution Options Customer Need Feature WSA, ESA, CWS Network Endpoint I want to be able to define policies for malware… File Reputation ✔ ✔ ✔ I want to be able to isolate suspected malware for threat analysis… Sandboxing ✔ ✔ ✔ I want to be able to backtrack if malware makes it into my system… Retrospective Security ✔ ✔ ✔ I need to identify compromised devices on my network… Indications of Compromise ✔ ✔ I want to track how a file has been behaving… File Analysis ✔ ✔ I want to track how threats traverse the network… File Trajectory ✔ ✔ I want to see system activities, relationships and events … Device Trajectory ✔ I want to search large sets of data for compromises… Elastic Search ✔ I want to be able to stop the spread of malware with custom tools… © 2013 Cisco and/or its affiliates. All rights reserved. Outbreak Control ✔ Cisco Confidential 19 Malware Analysis & Threat Intelligence The First Unified Malware Analysis & Threat Intelligence Solution Be Proactive. Recover Faster. Defeat Advanced Threats. Maximize Existing Investments. ThreatGRID is revolutionizing how organizations use accurate and context-rich malware analysis and threat intelligence to defend against advanced cyber attacks. © 2014 Cisco. All Rights Reserved. CONFIDENTIAL. Some Cool Things We Do !!! Allow you Interact with Malware Prioritize threats © 2014 Cisco. CONFIDENTIAL. Outside Looking In approach Context-driven Malware Analytics 21 www.ThreatGRID.com Sample report from AMP integration © 2014 Cisco. CONFIDENTIAL. www.ThreatGRID.com ThreatGRID Unique Value SOC Investigation & Response Threat Intelligence Security Infrastructure Eng. Context-Driven Malware Analytics Simple & Custom Feeds Community Power & Scale 2 way API Integration Easy to use Adaptive Analysis ThreatGRID Portal Defeat Advanced Attacks © 2014 Cisco. CONFIDENTIAL. Recover Faster Be Proactive Multiple Deployment options Maximize Existing Investment 23 www.ThreatGRID.com Cisco AMP Delivers Three Advantages 3 Address the full attack continuum 2 More comprehensive protection BEFORE DURING AFTER Network Content Point-in-Time Detection Endpoint Retrospective Security Cisco® Collective Security Intelligence 1 A better approach C97-732872-00 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Cisco Advanced Malware Protection (AMP) TALOS ThreatGrid After Web Filtering and Reputation File Type Blocking Application Visibility & Control Security Intelligence www.website.c om Indicators of Compromise File Reputation Traffic Intelligence Threats File Sandboxin g Cognitive Threat Analytics File Retrospection X Traffic Redire ctions ASA/NSI PS X WSA X AMP Applianc e X ESA X X AnyConnect AMP for Endpoint Admin HQ Management Reporting Log Extraction Main Office © 2014 Cisco. CONFIDENTIAL. Branch Office Roaming User Allow Warn Block Partial Block www.ThreatGRID.com AMP2012 Retrospective Trajectory Outbreak Control AMP Endpoint PC AMP Network Appliance AMP Endpoint Mobile 2014 2013 AMP Endpoint Virtual 2013 2012 AMP Network AMP Endpoint Mac AMP for Content 2014 ThreatGRID 2014 2014 2013 Device Trajectory Flow Correlation AMP Private Cloud AMP for ASA 2014 2014 2014 Evolution of AMP Everywhere © 2014 Cisco and/or its affiliates. All rights reserved. Security Cisco Confidential 26 AMP for Endpoints Customer Testimonial… https://www.youtube.com/watch?v=RjPB__9BIww C97-732872-00 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Let’s Play Enterprise Feud www.greysontech.com Top 3 Answers on the Board www.greysontech.com Phishing Attack Example www.greysontech.com Phishing Attack Results www.greysontech.com Greyson Consulting Services www.greysontech.com How Greyson Works with Our Clients Local, personal relationships built on trust. Long term partnerships with consistency of engineering talent. Analysis, Architecture, Delivery and Management. Enterprise solutions: Security infrastructure best practices assessment Next generation firewalls and IPS Advanced Malware Protection Email and Web Content Security Netflow based network behavior anomaly detection Policy based security enforcement www.greysontech.com Questions? www.greysontech.com