Top Banner
Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern Paxson, David Wagner 1
28

Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

Mar 10, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

DetectingCredentialSpearphishingAttacksinEnterpriseSettings

GrantHoUCBerkeley

AashishSharma,MobinJaved,VernPaxson,DavidWagner

1

Page 2: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

SpearPhishingTargeted emailthattricksvictim intogivingattackerprivilegedcapabilities

2

Page 3: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

OurFocus:EnterpriseCredential Spearphishing

“Credentialsareking”- RobJoyce,DirectorofNSA’sTailoredAccessOperations

• Wealthofaccess&lowerbarrierthan0-daymaliciousattachments

• Whatabout2FA?• Cost,usability ,incompletedeployment,oftenstillphish-able

• Detectiontoday:userreporting,phish-able2FA,post-mortemforensics3

Page 4: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

OurWork

Practical detectionsystemforanenterprise’ssecurityteam

1. ExtremelylowFPburden(Goal:<minutesperday)

2. Raisesbar&detectsmanyattacks,butnot silverbullet

4

Page 5: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

OurWork

WorkedwiththeLawrenceBerkeleyNationalLaboratory(LBL)• USDoENationalLabw/5,000employees

Anonymizeddatasets:• SMTPheaderinformation(FromandRCPT-TOheaders)• URLsinemails• Networktrafficlogs• LDAPlogs

5

Page 6: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

KeyChallenges

1. Smallsetoflabeledattackdata• <10knownsuccessfulcredentialspearphishing attacks

2. Baserate• 372million emailsover4years (Mar2013– Jan2017)• Evendetectorw/99.9%accuracy=372,000alerts

6

Page 7: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

Structure-DrivenFeatures

7

Page 8: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

SpearphishingAttackTaxonomy• Successfulspearphishing attackshavetwonecessarystages:

1. TheLure• Successfulattackslure/convincevictimtoperformanaction

2. TheExploit• Successfulattacksexecutesomeexploit onbehalfoftheattacker• Malware,revealingcredentials,wiringmoneyto“corporatepartner”

8

Page 9: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

SpearphishingAttackTaxonomy• Successfulspearphishing attackshavetwonecessarystages:

1. TheLure• Successfulattackslure/convincevictimtoperformanaction

2. TheExploit• Successfulattacksexecutesomeexploit onbehalfoftheattacker• Malware,revealingcredentials,wiringmoneyto“corporatepartner”

9

Page 10: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

10

Page 11: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

Lure1. Attackersendscatchyemailundertrusted/authoritativeidentity

ModernCredentialSpearphishing:TheLure

From: “Berkeley IT Staff” <[email protected]>

11

Page 12: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

Exploit1. Victimclicksonembeddedlink2. Victimarrivesatphishingwebsite&submitscredentials

ModernCredentialSpearphishing:TheExploit

Actual Destination for linked text:auth.berkeley.netne.net

12

Page 13: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

LureFeatures:SuspiciousSenderPresent

• Commonlure:impersonateatrustedorauthoritativeentity

• Four“impersonation”classes- eachhasownsetoflure features1. Namespoofingattacker2. Addressspoofingattacker3. Previouslyunseenattacker4. Lateralattacker

• Thistalk:lateralattackers

13

Page 14: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

LureFeatures(Cont.):SuspiciousSenderPresent

• Lateralspearphishing lure:attackercompromisestrustedentity’saccount

• Featureintuition:email=suspiciousifemployeesentitduringasuspiciousloginsession

• Lurefeaturesforlateralspearphishing:• wasemailsentinasessionwheresenderloggedinw/newIPaddress?• #priorloginsbythesenderfromthegeolocatedcityofloginIPaddr• #ofotheremployeeswho’vealsologgedinfromcityofloginIPaddr

14

Page 15: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

ExploitFeatures:SuspiciousActionOccurred

• Winnowpoolofcandidatealertsto:EmailswhererecipientclickedonembeddedURL(aclick-in-email action)

• Exploitfeatures:URL’sFully-qualifieddomain(hostname)issuspicious• #ofpriorvisitstoFQDNacrossallenterprise’snetworktraffic• #ofdaysbetween1st employee’svisittoFQDN&currentemail’sarrival

15

Page 16: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

UsingFeaturesforDetection

16

Page 17: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

Howdoweleverageourfeatures?• Combinelure+exploitfeaturestogetFVsforemails

• Howdoweusethesefeaturesfordetectingattacks?

Approach1:Manualrules• Problems:soundlychoosingthresholds&generalizabilityApproach2:SupervisedML• Problems:tiny#oflabeledattacksandbaserate

17

Page 18: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

LimitationsofStandardTechniquesApproach3:Unsupervisedlearning/anomalydetection

• Clustering/DistanceBased:kNN• Density-based:KDE,GMM• Manyothers...

Threecommonproblems:1. Requirehyperparameter tuning

18

Page 19: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

ClassicalAnomalyDetection:LimitationsThreethematicproblems:1. Parametricand/or

hyperparameter tuning2. Direction-agnostic

(standarddevof+3justasanomalousas-3)

19

Feature:# prior logins by current employee from

city of new IP addr

50 1000

Mean

Page 20: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

ClassicalAnomalyDetection:LimitationsThreethematicproblems:1. Parametricand/or

hyperparameter tuning2. Direction-agnostic3. Alertifanomalousin

onlyonedimension

20

MORE

BENIGN

MOREBENIGN

Page 21: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

ClassicalAnomalyDetection:LimitationsThreethematicproblems:1. Parametricand/or

hyperparameter tuning2. Direction-agonistic3. Alertifanomalousinonly

onedimension

21

•DAS:simple,newmethodthatovercomesthese3problems

MORE

BENIGN

MOREBENIGN

Page 22: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

DAS:DirectedAnomalyScoring

1. Securityanalystsw/limitedtime: specifyB =alertbudget

2. Forsetofevents,assigneacheventa“suspiciousness”score

3. Rankeventsbytheir“suspiciousness”

4. OutputtheBmostsuspiciouseventsforsecurityteam

22

Page 23: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

DAS:DirectedAnomalyScoring• Score(EventX)=#ofothereventsthatareasbenign asXinevery dimension

• i.e.,Largescore=manyothereventsaremorebenignthanX

23

MORE

BENIGN

MOREBENIGN

6 1

10

3

11

Page 24: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

DAS:DirectedAnomalyScoring• Score(EventX)=#ofothereventsthatareasbenign asXinevery dimension

24

MORE

BENIGN

MOREBENIGN

D

A

3

BC

Page 25: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

DAS:DirectedAnomalyScoring• Score(EventX)=#ofothereventsthatareasbenign asXinevery dimension

25

MORE

BENIGN

MOREBENIGN

1

A

B

Page 26: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

DetectionResults

• Real-timedetectoron370millionemailsover~4years

• Randetectorw/totalbudgetof10alerts/day• PracticalforLBL’ssecurityteam(~240alerts/daytypical)

• Detected17/19spearphishing attacks(89%TP)• 2/17detectedattackswerepreviouslyundiscovered

• Bestclassicalanomalydetection:4/19 attacksforsamebudget• Needbudget>=91alerts/daytodetectsame#ofattacksasDAS

26

Page 27: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

Results:CostofFalsePositives• 10alarms/day:Howmuchtimedoesthiscostthesecurityteam?

• LBL’ssecuritystaffmanuallyinvestigatedallouralerts• 24alerts/minute(avg rateforoneanalyst)• <15minutes for1analysttoinvestigatealertsfrom anentiremonth

• Subject+URL+“From:”=quicksemanticfilter• “Never Lose Your Keys, Wallet, or Purse Again!”• “Invitation to Speak at Summit for Energy...”

27

Page 28: Detecting Credential Spearphishing Attacks in Enterprise ......Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern

Conclusion• Real-timesystemfordetectingcredentialspearphishing attacks

• TP=89%: detectsknown+previouslyundiscoveredattacks• FP=0.004%:10alerts/day(alertsprocessedin<minutesperday)

Keyideas1. Leveragelure+exploitstructureofspearphishing todesignfeatures2. DAS:unsupervised,non-parametrictechniqueforanomalydetection

1. Generalizesbeyondspearphishing2. “Needle-in-haystack”problemsw/curated&directionalfeatures

[email protected]

28