Top Banner
Anatomy of a cyberattack Forensics made simple with Artificial Intelligence Peter Skondro Senior Sales Engineer
29

Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

May 25, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Anatomy of a cyberattackForensics made simple with Artificial Intelligence

Peter SkondroSenior Sales Engineer

Page 2: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Threat Landscape

2

Page 3: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Which malware types are we dealing with today?

67%

13%

Modern Malware

Generic MalwareZero-Day Malware2%

Crypto-Jacking

• Generic Malware• Variations of known Malware / Toolkits

• Modern Malware• (Known) Exploits, privilege escalation,

password theft, persistence• Combination of several techniques

• CryptoJacking• Unauthorized use of CPU computing time

for crypto currency mining

• Ransomware• Unauthorized encryption of files and hard

disks

• Zero-Day Malware• Zero-Day attacks with several steps• Worms, Trojans, VB Script, PDF,

file-less attacks

Ransomware 5%

13%

Source: SophosLabs, August 2018, Region: CEEMEA

Page 4: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Protection with traditional Endpoint Protection

Modern Malware

Generic MalwareZero-Day Malware

Crypto-Jacking

Ransomware

Traditional Endpoint

Protection

Page 5: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Protection with NextGen Endpoint Protection

Modern Malware

Generic MalwareZero-Day Malware

Crypto-Jacking

Ransomware

Traditional Endpoint

Protection

Page 6: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Protection with NextGen Endpoint Protection

ModernMalware

Generic MalwareZero-Day Malware

Crypto-Jacking

Ransomware

NextGen Endpoint

Protection

Page 7: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Protection against Ransomware and Exploits

NextGen Endpoint Protection• Machine Learning• Exploit Prevention• Ransomware Detection

YesterdayProtection against Hacking &Advanced Persistent Threats

Endpoint Detection and Response• Holistic integration of endpoint

technologies• Detection, containment and

threat analysis

TodayProtection against known malware variants

Traditional Endpoint Protection• Antivirus Signatures

& Heuristics• Control of infection paths

Past

Evolution of Endpoint technologies

Page 8: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Endpoint Detection and Response

8

Page 9: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

EDR is a holistic endpoint security approach focusing on• Detection of security incidents

• Reaction to security incidents

• Search for threats

• Forensic Investigation after an incident

integrates all EDR components in a single solution

What is EDR (Endpoint Detection & Response)?

Advanced with EDR

Page 10: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Why use EDR tools?• On the Endpoint

• most Hacker activities take place• we can find a lot of valuable data

• Pure Endpoint Protection solutions• Detect and log only clearly malicious behavior• Have only limited reaction capabilities

• Tightened compliance requirements for data protection• EDR Tools enable the complete management of a security

incident

Page 11: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

EDR helps customers during a security incident

How should I respond?

Does it exist anywhere else?

What is this file? Am I under attack?

What should I prioritize?

Has the attack spread?

Is the threat over?

Are we out of compliance?

Page 12: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Artificial Intelligence

12

Page 13: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

BetterProtection

Better Accuracy

Better Performance

Predictive Security

To foretell with precision of calculation, knowledge, or shrewd inference from facts or experience

Page 14: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

NEURAL NETWORK

The World of Artificial Intelligence (AI) in Cybersecurity

DECISION TREES SUPPORT VECTOR

NEAREST NEIGHBOR DEEP LEARNINGCLUSTERING, STATISTICAL

DISTRIBUTION

Machine Learning

Artificial Intelligence

Page 15: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Machine Learning vs. Deep LearningDE

EP L

EARN

ING

Interconnected Layers of Neurons, Each Identifying More Complex Features

INPUT OUTPUT

OUTPUT

MAC

HIN

E LE

ARN

ING

Decision Tree

INPUT

Random Forest

OUTPUTINPUT

Page 16: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Deep Learning Neural Network

SMARTER FASTER SMALLER

DEEP LEARNING

• High Detection Rates • Gets Better with

More Data

20 – 100 msDetection

10 – 20 MBModel Size

TRADITIONAL MACHINE

LEARNING

• Low Detection Rates• Diminishing Returns

with More Data

100 – 500 msDetection

500 MB to 1 GBModel Size

Page 17: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Intercept X for Endpoints and Servers

ANTI-EXPLOIT

MACHINE LEARNING

ANTI-RANSOMWARE

MALWARE REMOVAL ROOT CAUSE ANALYSIS

STOP UNKNOWN THREATS PREVENT RANSOMWARE DENY THE ATTACKER

Page 18: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Sandboxing - Sandstorm Deep Threat Prevention

Frequent & Aggressive Run-Time

Analysis

Sandbox EvasionTechniques,

API & File System Behavior

Intercept X Exploit Detection & CyrptoGuard

IPS detections coming soon

Continuously adaptive learning

model

Sophos Sandstorm

Deep Memory Analysis

Initial & Post Execution Memory

Inspection & Analysis

Deep Behavioural Analysis Deep Network Analysis Deep Learning Analysis

Full port and protocol analysis

Analysis of all dropped

executables

Page 19: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Analysis withMachine Learning Assistance

Page 20: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Root Cause Analysis

Page 21: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Example: EMOTET

Page 22: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Machine Learning Analysis

Page 23: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Cross Estate Threat Search

Page 24: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Containment of threats

24

Page 25: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Self Isolation

Infected clientIsolates himself

Page 26: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Admin Isolation

Admin isolatespotentially

compromised client

Admin

Page 27: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Traditional EDR

REACTION

VISIBILITY & DETECTION • Incomplete protection

ANALYSIS &INVESTIGATION

• Security experts required

• Best Protection available on the market

• No expert knowledge required

• Lengthy investigations• Until manual reaction the

damage might increase

• Automatic reaction• Without delay

Advanced with EDR

Page 28: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

Workshop:EDR in Action

Forensics and automatic containment of threats with Sophos Synchronized Security

28

EDR Live DemonstrationAutomatic containment of threats

Lateral Movement Protection

Page 29: Anatomy of a cyberattack - Infocom SecurityEndpoint Protection. Protection with NextGen Endpoint Protection. Modern Malware. Zero-Day Malware. ... Deep Memory Analysis. Initial & Post

29