Top Banner
1 Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved. Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved. Cyber Kill Chain Methodology Brian Wrozek, Managing Executive Director
30

Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

Jul 13, 2018

Download

Documents

danganh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

1Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Cyber Kill Chain

Methodology

Brian Wrozek, Managing Executive Director

Page 2: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

2Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Agenda

Kill Chain Components

Final ThoughtsThreat Strategy Use Cases

Cautionary Notes

Page 3: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

3Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Threat Strategy

Page 4: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

4Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Security Strategy Development

Page 5: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

5Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

1

23

4

56

Determine

Assets

Understand

Actors &

Vectors

Develop

Threat

Model

Counter-

measure

mapping

Positioning

Monitor

and

Repeat

Threat Strategy Methodology

Kill Chain

Page 6: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

6Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Kill Chain Components

Page 7: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

7Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

F2T2EA Kill Chain

• Find: Locate the target

• Fix: Fix their location, make it difficult for them to move

• Track: Monitor their movement

• Target: Select an appropriate weapon or asset to use on the target to create desired effects

• Engage: Apply the weapon to the target

• Assess: Evaluate effects of the attack, including any intelligence gathered at the location

http://www.military-dictionary.org/F2T2EA

Page 8: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

8Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Gather data and

intelligence on

target

organization

Craft

malicious

payload, use

exploits for

vulnerabilities

Payload sent

to target

(phishing)

Compromise

system

Install malware,

obtain

credentials and

establish

backdoors.

Navigate internal

network and

setup command

and control

Ultimate goals

achieved

Recon Weaponize Deliver Exploit Install C2 Actions

Traditional Kill Chain Model

http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf

Page 9: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

9Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Reconnaissance

Initial Planning Phase

• Threat perpetrator or actor researches target

• Analyze online activities and public presence

• Observe websites visited and social media networks used

• Harvest email addresses

• Collect publically available news

• Discover scanning for internet facing systems and applications

• Build a profile

Page 10: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

10Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Weaponization

Preparing and Staging the Attack

• Select appropriate malware payload based on research

• Reuse existing malware families – create slight variant

• Build the phishing email campaign

• Leverage exploit kits and botnets

https://blog.barkly.com/how-exploit-kits-work

Page 11: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

11Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Delivery

Launching the Attack

• Go live of the compromised website

“watering hole”

• Delivery of the phishing email

• Phishing is the most common attack

vector especially for the US

• Distribution of infected USB sticks

• Execution of attack tools against servers

and applications

2017 Phishlabs phishing and threat intelligence report

Page 12: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

12Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Exploitation

Gain Access to Victim

• Exploited a hardware or software vulnerability

• Zero days are rare

• Most vulnerabilities exploited have known patches available

• Tricked a human being into providing access

Scanned websites with vulnerabilities

229,000 Attacks / Day

Internet Security Threat Report from Symantec #22

Page 13: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

13Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Installation

Establish a Foothold in the Environment

• Installation of a persistent backdoor

• Utilize webshells on web servers

• Create additional accounts or services

• Leverage techniques to keep malware hidden and running

• Goal is to maintain access for an extended period of time

http://inkotech.co.id/what-is-web-based-malware-also-known-as-web-shell/

Page 14: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

14Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Command and Control (C2)

Establish Remote Control

• Use a two-way communication channel for remote control

• Common channels are web, email and DNS

• Often look to escalate privileges

• Move laterally internally

• Employ obfuscation (anti-forensics)

techniques

https://logrhythm.com/blog/catching-beaconing-malware/

Page 15: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

15Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Actions and Objectives

Achieve the Goals of the Mission

• Successfully complete their end goal

• Steal data (IP, PII, $$$)

• Corrupt, modify, destroy systems or data

• Use as a launching point to attack another

Verizon DBIR 2017

Page 16: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

16Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Use Cases

Page 17: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

17Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Controls Mapping

Page 18: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

18Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Effectiveness Scorecard

Seven ways to apply the cyber kill chain with a threat intelligence platform – LM

Page 19: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

19Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Education and Awareness

ATTACK

VECTORS:

INTERNETSocial Media, P2P,

Drive-By Download

EMAILSpear Phishing,

Whale Phishing

DEVICEUSB Flash Drive,

Phones, Tablets

Lure End-User to

Download Exploit or

Corrupt File

Exploit

ExecutedInject Additional Code,

Trojan or Backdoor

Establish

Command and

Control Channel

Explore and Move

Laterally Within

OrganizationSteal and Transmit

Target Data Out of

Organization

Malware

Becomes APT

(Final Stage,

Mutation)

Page 20: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

20Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Target Breach

Supplier portal and facilities

management information

publically available

Password logging malware

embedded in email

attachment (PDF or MS

Office) sent to Fazio

Classic phishing campaign

directed towards Fazio

Compromised a default

password and moved

internally around Target

from external billing system

to POS devices

Data exfiltrated in plain text

to a server in RussiaRAM scrapping and data

exfiltration malware loaded

on POS devices at Target

Had access to internal

systems for over a month

A kill chain analysis of the 2013 target data breach –

UNITED STATES SENATE: COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION

Page 21: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

21Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Target Breach – Missed Opportunities

A kill chain analysis of the 2013 target data breach –

UNITED STATES SENATE: COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION

Attackers took advantage of weak security

at a Target vendor, gaining a foothold in

Target’s inner network.

Attackers took advantage of weak controls within

Target’s network and successfully maneuvered into

the network’s most sensitive areas.

Target missed warnings from its

anti-intrusion software that

attackers were installing malware

in its network.

Target missed information provided by its

anti-intrusion software about the attackers’

escape plan, allowing attackers to steal as

many as 110 million customer records.

Page 22: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

22Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Cautionary Notes

Page 23: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

23Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Many Similar Versions

Differences

• Change the wording

• Breakout specific actions into stages

• Combine different actions into stages

Gigamon

Page 24: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

24Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Limitations

External Intrusion-Centric

• Reinforces perimeter-focused mindset

• Predominately malware-prevention focused

• Less effective for insiders and social engineering

Light on Recommendations

• Steps 1,2,3 have little defensive actions

• Steps 4,5 are classic protection solutions

• Steps 6,7 are more reactive solutions

Recon Weaponize Deliver Exploit Install C2 Actions

Page 25: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

25Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Final Thoughts

Page 26: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

26Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Other Threat Modeling Approaches

Attack Tree SDLC

http://www.schneier.com/paper-attacktrees-ddj-ft.html

Page 27: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

27Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Actors – Intel Threat Agent Library

Page 28: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

28Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Threat Modeling – Maturity Assessment

RESUR-

RECTION

Page 29: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

29Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

Battle Plan – Break the Kill Chain

Stop

Attacker

Here

Fallback

Position

RESUR-

RECTION

Last StandUpdate

Resume

Page 30: Cyber Kill Chain Methodology - ISACA Kill Chain Methodology Brian Wrozek, ... • Steps 6,7 are more reactive solutions ... PowerPoint Presentation Author:

30Proprietary and Confidential. Do Not Distribute. © 2017 Optiv Inc. All Rights Reserved.

[email protected]

214-797-2007

@bdwtexas