Best Practices for Thwarting an APT Attack with IBM Security

advertisement
Best Practices for Thwarting an APT Attack with
IBM Security QRadar SIEM and Trend Micro Deep Discovery
IBM InterConnect, Las Vegas, February, 2016
Trend Micro & IBM Japan Inc.
What’s happening in Japan
2
Copyright 2016 Trend Micro Inc.
3
Copyright 2016 Trend Micro Inc.
Agenda
•
•
•
•
•
4
Introduction
Overview Deep Discovery Inspector
Key Solution
Success Case Story
Demo
Copyright 2016 Trend Micro Inc.
Introduction
5
Copyright 2016 Trend Micro Inc.
Takashi Sayama
Trend Micro Senior Security Engineer
• Help implement of CSIRT/SOC
• SIEM System Architecture
• Information Security Consulting
• 13 years: SIEM, SOC, ISP…
6
Copyright 2016 Trend Micro Inc.
Trend Micro
 26 years focused on security software, now largest pure-play
 Headquartered in Japan, Tokyo Exchange Nikkei Index (4704)
 8 consecutive years on Dow Jones Sustainability Indexes
Enterprise & VLE
 Customers include 48 of top 50 global corporations
 5200+ employees, 38 business units worldwide
Midsize
Business
Small Business
Consumer
7
Copyright 2016 Trend Micro Inc.
500,000 commercial customers
155 Million Endpoints
> 1 Million Servers
Leading the way with a history of
continuous security innovation
AntiMalware
Corporate
server
protection
Gateway virus Cloud-based
global threat
Protection
Intelligence
Mail server
protection
Agentless
security for
virtualized
environments
Protection
against targeted
attacks
Cloud security
Optimized for
AWS, VMware
Flexible
interconnected
threat defense
Deep
Discovery
More than just AV
•
•
•
•
•
•
8
Advanced Threat Detection
Anti-malware
Application Control
Application Scanning
Behavior Monitoring
Browser Exploit Protection
Copyright 2016 Trend Micro Inc.
•
•
•
•
•
•
Command & Control Blocking
Contextual Threat Analysis
Custom Sandboxing
Data Loss Prevention
Device Policy
Encryption
•
•
•
•
•
•
•
Host Firewall
Integrity Monitoring
Log Inspection
Threat Impact Assessment
Vulnerability Protection /
Intrusion Prevention
Web Reputation
Trend Micro
Deep Discovery Inspector
9
Copyright 2016 Trend Micro Inc.
Trend Micro Deep Discovery Inspector
Network-Wide Attack Detection
 Single network appliance
 Detection across all network traffic
•
Malware, C&C, attacker activity across 100+ protocols and all ports
 Custom sandboxing analysis
 Global threat intelligence drives rapid assessment and response
 Handles BYOD and other complex environments
•
10
Detection beyond Windows: mobile, Mac, Android, legacy systems and specialty
devices…
Copyright 2016 Trend Micro Inc.
Trend Micro Deep Discovery Inspector
Product Overview
•
•
•
•
•
Network Sensor
Visualize Unknown Threats/Suspicious Behaviour in network
100 Protocols, All network ports are covered
Collects suspicious files and performs sandbox analysis
Daily, Weekly, Monthly reports
Little impact to existing environment:
• No INLINE installation
• Power, IP Address and Mirrored Port are all that is required
• Form factor: appliance / virtual appliance
11
Copyright 2016 Trend Micro Inc.
Top 3 Solution Differentiators
Smart
360-degree network wide detection of
targeted attacks
Simple
Low cost to deploy & manage
Security that fits
Fits evolving ecosystem & enables sharing of
intelligence across solution areas
12
Copyright 2016 Trend Micro Inc.
Key Points
•
•
•
•
Can detect internal suspicious activities
Has multiple analysis engines (including Sandboxes)
Can monitor many protocol connections (like SMB)
Has many detection rules
Challenges:
• Due to the nature of targeted attacks, indicators are often spread across
different protocols and technologies.
• It’s difficult for an Administrator to prioritize which threats are most
harmful.
13
Copyright 2016 Trend Micro Inc.
Analysis Flow for Deep Discovery Inspector (DDI)
“Analysis Flow” for DDI event handling operation:
【 Data Flow 】
1.Black List
Analysis
2.White List
Analysis
3.Use Case
Analysis
4.Rule Detect
Analysis
14
Compare with Black List.
If YES, send alert.
Compare with White List.
If YES, get off from log.
Compare with Use Case.
If YES, send alert as a
suspicious behavior.
Compare with Rule Detect.
If YES, set severity and send
alert (severity =>High).
Copyright 2016 Trend Micro Inc.
Black List log
White List log
Use Case log
Rule Detect (High) log
Rule Detect (Med/Low) log
Concerns about analysis flow
【 Data Flow 】
Black List log
White List log
Use Case log
Rule Detect (High) log
Rule Detect (Med/Low) log
15
Copyright 2016 Trend Micro Inc.
Possibility of “False Negative”
I wanted some function to resolve
False Negative problem.
QRadar Correlation Engine
QRadar Analysis Flow
Black activities as an offense
- Critical / High event
- Medium / Not offense
Make Low severity offense
- Amount by time
- Not white lists
Correlate other event
- Correlate other events of DDI
- Correlate other logs like IDS
Suspicious
16
Copyright 2016 Trend Micro Inc.
Sensor vs SIEM
•
•
•
•
•
•
•
Sensor can detect suspicious activities easily
Administrator must monitor logs of sensor
Can’t find cyber kill chain by single sensor
SIEM has intelligent function for security analysis
Administrator can notice suspicious activities easily
Can’t detect suspicious activities without logs
Most important thing is how to find suspicious activities
Important thing……
• We need both a sensor and SIEM
• We must have analysis logic for cyber threats
17
Copyright 2016 Trend Micro Inc.
Solution Details
18
Copyright 2016 Trend Micro Inc.
Solution Overview
“Detection” and “Analysis”
Trend
Micro
DDI
Deep
Discovery
Inspector
IBM
Qradar
(SIEM)
Trend
Micro
Analysis
Logic
19
Copyright 2016 Trend Micro Inc.
TM Knowledge
Trend Micro Analysis Logic
• Trend Micro engineers have been researching Suspicious
Activities like APT
• Analysis Logic is their knowledge of how to find cyber threats
• This knowledge is input as “Custom Rules” in QRadar
• We have a template of “DDI Custom Rules”
• 6 Categories, and 15 Rules
• Can be customized for each customer’s environment
• Can find Suspicious Activities by QRadar Correlation Engine
• “Analysis Logic” is continually updated by Trend Micro
20
Copyright 2016 Trend Micro Inc.
Analysis Logic Sample
21
Rule name
Importance
Objective
Operation action
High-risk malware
detection
Critical
If Malware name used in APT attack
matches open information announced
from Trend Micro, notify as High incident.
Notify by e-mail
Notify by SNMP
Suspicious EXE file
drop
Critical
Detection of executable file by DDI of the
communication if the following
information is included
•
System32
•
RECYCLER
•
AppData
•
PSEXESVC.exe
Check if it is intended for business
Investigation of the computer
Malware URL
requested
High
If the malware target access the URL site
in DDI, SIEM also detects it by the rule
From the SIEM, correlation analysis with
other log source(IPS,Qflow,etc.)
If the URL is described, analyze via external
site( for example: Site Safety Center, Virus
Total,etc.)
QRadar’s right click connection, can
analyze external site analysis using GUI
Suspicious archive file
uploaded behavior
Critical
If the file name “rar” is used and from the
upload event, use rule detect
Check if it is intended operation
C&C Server Access
Critical
Detect access to C&C domain site
Destination IP client terminal investigation
Block connecting domain
Copyright 2016 Trend Micro Inc.
Analysis Logic Sample(C&C Server Access)
Communication that
accesses C&C Server
DDI
Explanation
Detection of communication that access to C&C server used in Targeted
Attacks. HTTP communication that generates for specific malware and IP and
URL’s classified as C&C in Trend Micro’s database.
Target
1.1 APT Callbacks
1.2 Web Reputation (C&C)
1.3 IRC bot command
Concrete
detection
Malware that generates C&C server connection communication detection.
・IP and URL’s classified as C&C in Trend Micro Smart Protection Network
・Communication that generates for specific malware to specialized in targeted
attacks (following examples)
• Communication by POISON Ivy
• Communication by PLUGX
• Communication by DERUSBI
22
Copyright 2016 Trend Micro Inc.
Solution Advantages
23
Scrutinize
Logs
• From the analysis knowledge, quick
detection of “High Risk” event
• Customize analysis of event according
to customer’s environment
Quick
correspondence
available
Correlation
Analysis
• Not only by single event, but
determine by multiple events
• Trigger by DDI log, and analyze
correlation with other logs (eg. Proxy)
Advanced
analysis
available
Copyright 2016 Trend Micro Inc.
Success Case Story
24
Copyright 2016 Trend Micro Inc.
Success Story: Financial Services Co.
Use Trend Micro Deep Discovery Inspector
- Able to find suspicious activities
- Experienced in security operations
Key Issues:
- They couldn’t handle the large number of events
- They weren’t able to do real-time log analysis
25
Copyright 2016 Trend Micro Inc.
Success Story: Financial Services Co.
They adopted our solution for security operation.
As a result, they were able to expand a secure environment.
Before
After
DDI
26
DDI
• Download Excel,
• Check logs the the
next morning.
• Store DDI and Proxy logs to
QRadar.
• Real time analysis by analysis logic.
• Only specific events
• Day behind handling
• Monthly statistical
analysis
• Real time detection of threats by
Analysis Logic
• Target handling all events thanks to
Offense
• Correlation analysis with proxy log
Copyright 2016 Trend Micro Inc.
Demo
27
Copyright 2016 Trend Micro Inc.
Demo: Attacker Scenario
1. Attacker remotely accesses & infects client PC from
another PC
2. Remotely copy executable file
3. Remotely add job
4. Execute job and access it to the C&C server
Attacker
1. Copy executable file
Suspected client
infected by back door
3. Access to C&C server
2. Add job
C$(Administration Share)
28
Copyright 2016 Trend Micro Inc.
401
Thank you
TRENDMICRO.COM/CLOUD
29
Copyright 2016 Trend Micro Inc.
Download