o Our goal is to make threat Intel, and systems capable of providing actionable threat Intel that businesses and nations can use.
o Initial start of Threat Research with Windows and Unix (first mainstream viruses) (Firewalls, Logs,
SNMP, Syslog, packet capture, IDS, IPS, SIEM & DAM o Academic Research into Innovative leadership of Security Teams o Research into Cyber Espionage / Warfare as a factor in Cyber Crime o Creation of Cyber Unit Trainings for Gov. and Corporate Customers o Creation of AIFM – Actionable Intel Focus Methodology o Creation of PSTM – Proactive Security Team Methodology o Creation of SITAM– Secure IT Asset Management Methodology o Creation of ETM – Evolving Threat Methodology
© 2015 · Auxilium Cyber Security GmbH
o Creating an accurate picture o Proactive security o Understanding risks / threats o Getting Actionable Intel
Improve
Assessment o Continuous Research / Understanding Threats o Always evolving and dynamic o Creating proactive and tested methods o PSTM o SITAM o ODA
Analyze o Business Focused Security o Security as a “business critical” process with benchmarks & goals o Providing ROI for Security Investments that protect and increase revenue
Actionable
Intel
Classify
Audit
© 2015 · Auxilium Cyber Security GmbH
o H1 - Attacks are successful because they have become undetectable by current Anti Virus,
Firewalls and other current technology o H2 - Attacks are successful because they are dynamic & complex (spillover of tech) o H3 - Attacks are becoming polymorphic in nature (due to them evolving and tech spillover), which makes them detection averse!
o H4 - Security Teams and Classical security training are not targeted at or teach how to detect spyware and next gen threats (our Proactive Security Team Methodology PTSM) o H5 - Currently security processes, procedures and awareness are not adapted to cooping with Next Gen Threats!
o H6 - When “new” attacks and technology are published or found, they are reverse engineered
© 2015 · Auxilium Cyber Security GmbH
Definition of Cyber (What does it really mean???) o Origin of cyber and what it meant, how that changed
© 2015 · Auxilium Cyber Security GmbH
“Cyber” really involves a few core things o The Internet o The eEconomy (how we use inter-connected systems for eCommerce and eBusiness) o The Global Electronic World (Cyberspace) o Traditional Network, Server and Clients that “connect” with each other o Changes in how systems are attacked (Cyber Threats) o Changes in Traditional Security due to new “threats” (Cyber Security) o Changes in Warfare (Cyber War), Espionage (Cyber Espionage) and Crime (Cyber
Crime)
© 2015 · Auxilium Cyber Security GmbH
Cyber History 101 o The Internet was never meant to be secure!
o A global system used to communicate with others o The importance was on being able to communicate, even when the network was attacked because of a nuclear bomb o Used to connect military, agencies and universities o Security was originally not impacted by this first version (ARPA) o Security and confidentiality was never part of the equation
© 2015 · Auxilium Cyber Security GmbH
o Networks and the protocols of the Internet were not restricted in any real tangible ways because the objective was communication o TCP / IP o HTTP o HTTPS (this came later with ssl) o No one ever thought that this network would be as critical as it is today o Interconnected Systems o Bases for an entirely new type of economy o This open communication is the root of most of the web application, network services and router, firewall hacks and vulnerabilities today o Challenging communication connections o Data-in-transit security o Requests / Responses
© 2015 · Auxilium Cyber Security GmbH
o The Internet has formed the basis for eBusiness and eCommerce o Small companies are now global players because of reduced investments needed to deliver goods o Competition is totally different because all nations are part of the economy o All nations are impacted by the eEconomy o National Boarders o The Internet has no national identity or border o 24/7 not closed for any holidays and always on o Nations can not control what comes in or out of their “portion” of the internet o Legal Issues o There is no global law for things “Cyber” o No global police force that monitors who is misbehaving
© 2015 · Auxilium Cyber Security GmbH
o Not just about large corporations, SMBs get attacked more and more o SMBs spend less on security but also find less attacks, there is a connection?
o Security is a critical business process, it protects revenue and products
© 2015 · Auxilium Cyber Security GmbH
o Increase in attacks and complexity on all levels and for all businesses including SMBs!
© 2015 · Auxilium Cyber Security GmbH
o Here are some attacks in April..
© 2015 · Auxilium Cyber Security GmbH
o Here are some attacks in April..
© 2015 · Auxilium Cyber Security GmbH
“Cyber” really involves a few core things
© 2015 · Auxilium Cyber Security GmbH
“Cyber” really involves a few core things
© 2015 · Auxilium Cyber Security GmbH
The CAPEC Website and CybOx initiative
© 2015 · Auxilium Cyber Security GmbH
o Cyber Espionage – This is the term that is used to refer to using computers, computer technology such as malware, viruses and more complex spyware for spying. Recently the lines that separate espionage from cyber crime, warfare and terrorism are very thin if not diluted o Cyber has introduced a move from HUMINT to computer based espionage o Think of the old classical phone taps and transpose this onto network devices, cables and connections
© 2015 · Auxilium Cyber Security GmbH
o Cyber Crime – This is essentially using criminal tactics that use computer systems to steal data and also implant espionage technology In order to bypass security systems and personnel. Cyber crime can involve espionage tech as well as warfare tech (and often does). This is a newer type of
“crime” and also has the more traditional crime approaches that use electronic means in an effort to lower risk of capture and higher return on investment of the criminal or gang.
o Traditional criminal acts by electronic means (i.e. cracking, card skimmers, interception).
o Leveraging criminal groups for espionage or hacktivisim o Cyber Terrorism
© 2015 · Auxilium Cyber Security GmbH
o Open systems lead to new architecture, network services, new protocols and network devices that were created to enable global communication o Based on the global nature of internet connected systems and potential attacks, security teams need a new approach to security o New threats are also classified as “Cyber Threats” and can target anything and anyone 24/7
© 2015 · Auxilium Cyber Security GmbH
As new technology and access to otherwise closed systems was opened, so do we also have new types of attacks and technologies that are used to attack those systems o Botnets o Social Botnets o Espionage based attacks that steal data and information o DOS / DDOS o Drive-by-downloads o Last Mile Interceptions o Transmission Bugs / Intercepts o Critical Infrastructure o Cyber Kidnapping o Cyber Extortion o Hacktivisim
© 2015 · Auxilium Cyber Security GmbH
o When “new” attacks and technology are published or found, they are reverse engineered o New attacks are then “rewritten” for cyber crime based attacks o Stolen data is also purchases from (crackers) by nations o Espionage is also done on a corporate level by nations o New attacks lead to the need for better defenses and protection o Security Teams as a result need to be dynamic, up to date, knowledgeable in Cyber
Threats
New Cyber Crime
/ War attack
Cyber Criminals modify technology
Nation Develops
Technology
Military Hacker uses attack on target
Target reverse engineers technology
© 2015 · Auxilium Cyber Security GmbH
o Everything connected to the Internet and its network of systems and businesses is a separate economy o As discussed in the introduction, cyberspace has no traditional borders and so it spans the entire world o Any attack on the internet such as a DOS (Denial Of
Service) or DDOS (Distributed DOS) can potentially impact all businesses connected to the Internet o Any Cyber War, Espionage and Crime can also impact this “Economy”
New Cyber Crime
/ War attack
Cyber Criminals modify technology
Nation Develops
Technology
Military Hacker uses attack on target
Target reverse engineers technology
© 2015 · Auxilium Cyber Security GmbH
o The Internet is global, has its own economy and in some cases its own currency (aka BitCoin, etc.) o If someone attacks the Internet, they also attack this separate economy o Does an attack on the Internet endanger local economies?
o Does Espionage make this economy more or less trusted and used?
o Who is responsible for governing the Internet and its economy?
New Cyber Crime
/ War attack
Cyber Criminals modify technology
Nation Develops
Technology
Military Hacker uses attack on target
Target reverse engineers technology
© 2015 · Auxilium Cyber Security GmbH
o A term that only recently has come up in the cyber world o Started in its more modern form in 1998 with the US Presidential directive PDD-63 of
May 1998 o Listed vital and important assets that were critical to the country o Was updated by President Bush in December 17 th , 2003 by Homeland Security
Presidential Directive HSPD-7 for “Critical Infrastructure Identification, Prioritization and Protection
© 2015 · Auxilium Cyber Security GmbH
Critical Infrastructure Protection
Protecting Critical Infrastructure (audits, assessments, defense & threat / infection detection) o National Borders o Utilities o Financial Industry and “Economy Critical” o Global and National Corporations o National and Local Government, Law enforcement, Agencies o Military and Defense Industry o Educational, Cultural, Parks, Museums o Telecommunications , Transport and Agriculture
© 2015 · Auxilium Cyber Security GmbH
Water o Some of the “assets” deemed important to a nation’s stability and well-being are listed on the right o The EU also has something similar called
EUCOM 2006 o Another term is “Infracritical” and can be referenced at: http://www.infracritical.com/images/cipsectors5.jpg
o http://www.sciencedirect.com/science/article
/pii/S1040619014000268
Power
Banking & Financial Institutions
Transportation, Logistics &
Shipping
Information & Communications
Federal & Municipal services
Emergency Services
Fire Departments
Public Works
Agriculture & Food
National Monuments & Icons
© 2015 · Auxilium Cyber Security GmbH
Attack Chain for Critical Infrastructure
© 2015 · Auxilium Cyber Security GmbH
o Understanding in writing Malware, Virus, Worms and Rootkits o Understanding of OS and Application Vulnerabilities o Understanding of defensive technologies o Interception methods (network, communications systems) o Usage of OSINT against targets o Understanding and reverse engineering previous attack technologies to understand how to defend o Usage of executive buy-in o Using Awareness and Awareness Campaigns o Integration of ITIL Processes like Asset Management, Change Management,
Incident Management, Problem Management, etc.
o Integration of ISO2700X o Looking at and integrating SANs
© 2015 · Auxilium Cyber Security GmbH
o Hackers are not Crackers (Criminal Hackers) o Hackers understand technology, improve on it o Find holes so that people are aware, ask for fixes o Crackers are the criminals o Crackers use vulnerabilities to exploit and break into systems o Disrupt systems for financial gain or Lulz o Hacktivists o Like Crackers but have political motivations o Can in extreme cases turn into Cyber Terrorists
© 2015 · Auxilium Cyber Security GmbH
o Hacking is a science o The reason or motivation tends to point to a narrow set of profiles o Intel and Recon are vital to hacking
© 2015 · Auxilium Cyber Security GmbH
o The reason for a hack defines the hacker profile o Also points to possible goal o Cyber Warfare o Cyber Espionage / Corp Espionage o Cyber Crime o Cyber Terrorism
© 2015 · Auxilium Cyber Security GmbH
o Intel o Gathering information about the target and scoping out how the company is, are vitial to successful hacking o Good hackers will spend a majority of their time here (80%+)
© 2015 · Auxilium Cyber Security GmbH
o After getting intel and noting down any interesting pieces of information, we move on to the next phase which is Identifying and looking for potential systems and vulnerabilities o This includes using tools like google dorks, shodan and other tools that search but do not leave an imprint or trail
© 2015 · Auxilium Cyber Security GmbH
o After identifying potential target systems its now time to look at specific exploits and prepare them for testing o We take the information from previous phases to select low hanging fruits and then match these with zero day attacks or CVEs
© 2015 · Auxilium Cyber Security GmbH
o After accessing a system it is then time to look around in the system for more important data, information or planting malware or rootkits o While injecting or installing tools, it also becomes important to keep access by deleting important logs, alerts, etc.
o This phase is also were additional users are added to maintain access if activity is detected
© 2015 · Auxilium Cyber Security GmbH
o Here we are close to the goal or have achieved the goal o Data and information are saved and stored off-site o Depending on the goal the website was defaced, the server was corrupted, a rookit installed or systems disrupted
© 2015 · Auxilium Cyber Security GmbH
One of the biggest threats today in cyberspace is the Botnet o Botnets are used in cyber war, espionage and crime o Botnets can have very complex structures o Are typically used for DOS/DDOS attacks and can have attack bandwidths over 100GBS!
o Are created very quickly and are very economical
Command & Control Server
BotNet Owner
Cybil Creator
Social Media
Monitor
Target 1
Target 2
Target ….
© 2015 · Auxilium Cyber Security GmbH
There are different types of Botnets, we will talk about two o “Traditional” or normal o Social Media BotNet
© 2015 · Auxilium Cyber Security GmbH
There are different types of Botnets, we will talk about two o “Traditional” or normal o Social Media BotNet
© 2015 · Auxilium Cyber Security GmbH
Here is an example of a Botnet attack case that we see and resolve on a regular basis o Attack Case $Random Company
© 2015 · Auxilium Cyber Security GmbH
o Initially we dealt with “typical” threats o Malware, Virus, Worms o Less from Nations o More from Groups o Increase in Hacktivisim o Emerging of Espionage as a way to steal corporate data o Emerging of the “Military Hacker”
© 2015 · Auxilium Cyber Security GmbH
Threat Evolution Methodology
How Threats evolve via Espionage
& Warfare into Cyber Crime o Cyber Warfare Technology develops o Cyber Espionage develops o Developed technology finds its way into Cyber Crime groups o Technology is reverse engineered
© 2015 · Auxilium Cyber Security GmbH
Threat Evolution Methodology
New Threats evolve from old o Old Attacks are developed and tested o Old technology improved o New Types of attacks are developed o New variants turn into completely new threats o Traditional Security got “stuck”
© 2015 · Auxilium Cyber Security GmbH
Threat Evolution Methodology
How Threats evolve via Espionage & Warfare into Cyber Crime o Cyber Warfare Technology develops
© 2015 · Auxilium Cyber Security GmbH
Threat Evolution Methodology
How Threats evolve via Espionage & Warfare into Cyber Crime o Cyber Warfare Technology develops
© 2015 · Auxilium Cyber Security GmbH
Cyber Defense / Anti Espionage
Defense o Creation, Training, Implementation o Support, Audits, Assessments o Cyber Defense Systems
Offense o Creation, Training, Implementation o Support, Audits, Assessments o Cyber Offense Systems
Products/Services o Interception Detection / Blocking o Secure Infrastructure
© 2015 · Auxilium Cyber Security GmbH
Cyber Defense / Anti Espionage
Impact factors of Cyber Defense o Creation, Training, Implementation o Support, Audits, Assessments o Cyber Defense Systems
© 2015 · Auxilium Cyber Security GmbH
Cyber Defense / Anti Espionage
Social Engineering o Drive-By- Downloads o Phishing / Emails o PDF or Email Attachments o Dumpster Diving o Tailgating o Intel o Traditional o Social Media o Maltego o Web Leaks
© 2015 · Auxilium Cyber Security GmbH
Cyber Defense / Anti Espionage
Web Applications / Web2.0, 3.0
o MitM o SQLi (Sql injection) o XSS – Cross Site Scripting o Authentication (Verification) o Weak Passwords (Cracking)
© 2015 · Auxilium Cyber Security GmbH
Cyber Defense / Anti Espionage
Hardware Hacking o Baseband – Telephones o Only 2 manufacturers o Supply-Chain-Hacking/Espionage o Firmware o Out-of-Band Management o AMT / Intel o Out of band protocol used to spy on people via chipset o Signals Hacking o Signals Interception o GSM, 3 and 4G o Sat
© 2015 · Auxilium Cyber Security GmbH
Cyber Defense / Anti Espionage
Next Generation Hacking o Combining old tech with new features o Using Hostile Encryption (Ransom) o Solutions that proactively intercept traffic and signals (Heat, Wifi, Sound) o Application Backdoors o Cloud Backdoors (AWS & Co.) o Critical Infrastructure o Cyber War / Espionage
© 2015 · Auxilium Cyber Security GmbH
SOC – Security Operations Center
Core ITIL Processes o Incident & Problem Management (*) o Change Management (*) o Risk Management (*) o Service Desk, Service Level Management (*) o IT Asset, Configuration Mgmt. / CMDB (*) o Application, Test and Development Mgmt.
o IT / Strategic Planning (*) o Release, Deployment, capacity, & Availability Mgmt.
o Demand & Service Continuity Mgmt.
o Vendor / Supplier / Partner Management o (*) = Minimal Requirements
© 2015 · Auxilium Cyber Security GmbH
SOC – Security Operations Center
Basic Level (logs, files, Agents, Monitoring) o LAN / WAN / VPN / Proxy o Firewall / IDS / IPS o AV (Client, Server and Mobile Devices) o Data Base Monitoring / Access & ID Management o Service Desk
Advanced Level o Software Catalogue, CMDB o NAC o SIEM o Threat Intel (sensors & system) o Proactive Security Tools and Lab
© 2015 · Auxilium Cyber Security GmbH
SOC – Security Operations Center
Personnel o Manager o SIEM / Monitoring Engineer o Analyst o Incident Response / Blue / Red(?) Teams
Technology o Software o Hardware o Facilities / Data Center
Services o Event Monitoring, Correlation, Incident Response/Management o Consulting, Training o Penetration Testing, Audits, Assessments
© 2015 · Auxilium Cyber Security GmbH
SOC – Security Operations Center
In-house o Own staff & technology (larger companies) o Higher Costs o All Skills in house
Outsourced o Outsourced staff & systems (SMB’s) o Skills purchased externally o Lower Costs (depending on levels)
Hybrid o Mixture of in-house and external staff & technologies o Services via long term contracts possible o Mixed costs (in some cases cheapest option)
© 2015 · Auxilium Cyber Security GmbH
SOC – Security Operations Center
SOC Reasons: Laws, Regulations o Based on National & International Laws o High fines for non compliance or breaches
Protecting Revenue o High Risk of attacks o High Risk of lost revenue due to downtime, IP theft or disruption
Critical Infrastructure / National Defense o National Security o Economical or Cultural Collapse o Cyber War and Espionage Defense
© 2015 · Auxilium Cyber Security GmbH
SOC – Security Operations Center
Business Case o Assessment on what is in place for SOC o Business Case for SOC
Classify Security Service Catalogue needed o Catalogue of security services needed
Audit o Build Management / Ops pieces to support SOC
Actionable Intel o Build Technology in place for Event Mgmt. etc.
Analyze o Start Operations and gather metrics
Improve o Tweak Operations and Tech to achieve goals
© 2015 · Auxilium Cyber Security GmbH
Proactive Threat Intelligence
Standard Components of a SIEM or Event Management System
Interpreting and unifying threat Intel that’s usable o Firewall, SIEM, IDS/IPS from multiple InfoSec Event &
Info Systems into actionable Intel o Planning, Configuring, Implementing and Tweaking o Threat Research into Cyber Espionage, War and Crime o Turning systems into proactive threat and cyber threat management systems (also using PSTM and SITAM) o Providing NOC, SOC and Detailed Security Analysis via team of globally experienced Forensics and InfoSec professionals o Additional Threats Intel via Partners and Social Media Analysis
Solution
Installation and con figuration of credentials for console/dashboard
Installation and con figuration of appliance
(Data Collection, Retention, Reporting, Access Control)
(Con figuration of Rules, Alerts, Reports, Actions, CSIRT)
Installation and con figuration of appliance
(Data Collection, Retention, Reporting, Access Control)
(Con figuration of Rules, Alerts, Reports, Actions, CSIRT)
(Rollout of Agents, data capture, forwarding)
SIEM Dashboard/Console
SIEM Collection Appliance
(can also contain multiple reporting servers depending on freq of events)
Enterprise Management Server
(policies, deployment of sensors, etc.)
Messages, Alerts, Information of Login, Logoff, Failed Access, Traf fic Flow, Dropped Packets, etc.
(SNMP, SYSLOG, LOGFILES, Scripts, Commands, Queries, NAC Messages, VFlow, JFlow, NetFlow, SFlow)
Additional Data collected by IPS, IDS, NAC is forwarded to SIEM Appliance
NAC - Network Access Control
(policies, deployment of sensors, etc.)
IPS/IDS - Network Intrussion / Detection System
(policies, deployment of sensors, etc.)
Data collected by agents, messages, log files and defined in policy push to EMS, IPS, NAC,
SIEM
© 2015 · Auxilium Cyber Security GmbH
SOC 2.5
Proactive Monitoring
Alert & Event Reporting
Incident / Problem
Management
Event Correlation
Change / Risk Management
API, Agents, Logs, Other
Proactive Intel (security posture & status) Dashboard
© 2015 · Auxilium Cyber Security GmbH
Governance & Actionable Intel
Governance
ITSM
ITAM
Apps, Data & Info, IP
FW, Net, IDS, IPS, LM, SIEM, TI
Hardware, Firmware, Baseband
© 2015 · Auxilium Cyber Security GmbH
Attack Case Studies
© 2015 · Auxilium Cyber Security GmbH
Threatbutt o Attacks going on in real Time
© 2015 · Auxilium Cyber Security GmbH
Norse o Attacks going on in real Time
© 2015 · Auxilium Cyber Security GmbH