Top Banner
TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion
34

TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Dec 16, 2015

Download

Documents

Fay Phelps
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

TARGETED ATTACKS AND THE SMALL BUSINESS

Stephen FerreroConsultant, Xantrion

Page 2: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Xantrion• Founded in 2000 by Anne Bisagno and Tom Snyder• Wanted to bring big company IT to small and

midsized organizations• Among the top 50 worldwide MSPs (1)

• 45 person technical team• 70 core clients• 3000 end users supported• 600 servers managed

(1) MSP Mentor worldwide survey results.

Page 3: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Agenda

• The current SMB security paradigm• Why we need to evolve our thinking• Targeted attack methods• The new SMB security paradigm

Page 4: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

CURRENT SECURITY PARADIGM

Page 5: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Protect againstOpportunistic Attacks

Attacker

Your Company

Page 6: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Security mindset

“Be more secure than the other guy”

“I’m too small to be a target”

Page 7: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Typical security layers

Hardware Firewall

Antivirus / Antimalware

OS Security Patches

User Rights Assignment

Email Filter Web Filter

Policies, and AwarenessUser

Page 8: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

WHY CHANGE?

Page 9: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Targeted Attack

Attacker

Your Company

Page 10: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Small Biz31%

Midsize Biz19%

Large Biz50%

(Symantec, 2013)

Targeted attacks in 2012

Page 11: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

More targeted attacks on SMB

• Attackers have more and better resources • SMBs are typically less secure• SMBs make good launch points

Page 12: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

TARGETED ATTACK METHODS

Page 13: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Spear Phishing

1• Attacker collects data about

victim perhaps “friends” them on social networking sites

2 •Attacker looks for possible themes to leverage against victim

3 •Attacker crafts highly custom email message with malware laced attachment and sends to victim

4 •Victim opens highly realistic email and launches attachment

Page 14: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Water Hole Attack

1• Attacker collects data about

victim and the kind of websites they visit

2 •Attacker looks for vulnerabilities in these websites

3 •Attacker injects JavaScript or HTML which redirect to a separate site hosting exploit code

4 •Compromised site is waiting for unsuspecting victims

Page 15: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Process of A Typical AttackAttacker delivers custom malware

to victim

Victim opens the attachment, custom malware is installed

Malware phones home and pulls down

additional malware

Attacker establishes multiple re-entry

points

Attacker continues to attempt privilege

escalation and reconnaissance

Attacker achieves goal

and exits

1 2 3

4 5 6

Page 16: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Hardware Firewall

Antivirus / Antimalware

OS Security Patches

User Rights Assignment

Email Filter Web Filter

User

Spear Phishing, Waterholing, etc.

Page 17: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

NEW SMB SECURITY PARADIGM

Page 18: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Protect againstTargeted Attacks

Attacker

Your Company

Page 19: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Security mindset

“I have important data and assets to protect”

Assume you are a target

Page 20: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Typical SMB security layers

Hardware Firewall

Antivirus / Antimalware

OS Security Patches

User Rights Assignment

Email Filter Web Filter

Policies, and AwarenessUser

Page 21: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Add more layers• Educate employees• Review hiring and firing policies• Aggressive patching of OS and Apps

• Acrobat, Flash, QuickTime, Java• Get off End of Life software

• Windows XP• Office 2003 End of Support - April, 2014

Page 22: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Hardware Firewall

Antivirus / Antimalware

OS Security Patches

User Rights Assignment

Email Filter Web Filter

Additional security layers

HR and Security Policies

App Security Patches

User

User Awareness and Training

Page 23: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Identify your valuable assets

• Customer Data• Customer Relationships• Intellectual Property• Bank Account Info

Page 24: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Identify your special risks

• Internal threats• Liability• Unmanaged mobile devices• Physical security

Page 25: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Plan your response

Page 26: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Practice secure banking

• Use Two-Factor authentication• Require “Dual-Control” or separation of duties• Require one control be completed on a

dedicated PC• Require out-of-band confirmation from your

bank for large transactions

Page 27: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Protect mobile devices• Be aware of the increase in mobile malware• Stream data to mobile devices instead of

storing it there• Separate personal and work data• Track devices• Have remote-wipe capability• Enforce password policies

Page 28: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Regularly re-evaluate your security

Use the Top 20 security controls as a framework for frequent security policy updates. www.sans.org

Remind users of proper security best practices

Page 29: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

QUESTIONS

Page 30: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Referencescybersecurity. (n.d.). In Merriam-Webster’s online dictionary. Retrieved from http://www.Merriam-webster.com/dictionary/cybersecuritySmall and midsize businesses. (n.d.). In Gartner IT Glossary. Retrieved from http://www.gartner.com/it-

glossary/smbs-small-and-midsize-businesses/Symantec Inc. (2013, April). Internet Security Threat Report. Retrieved from http://www.symantec.com/security_response/publications/threatreport.jspVerizon. (2012). Data Breach Investigations Report. Retrieved from http://www.verizonenterprise.com/products/security/dbir/?CMP=DMC- SMB_Z_ZZ_ZZ_Z_TV_N_Z041Mandiant. (2013) M-Trends 2013: Attack the Security Gap. Retrieved from https://www.mandiant.com/resources/m-trends/

Page 31: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.
Page 32: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.
Page 33: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Top 10 Threat Actions1. Keylogger / Form-Grabber / Spyware2. Exploitation of default or guessable passwords3. Use of stolen login credentials4. Send data to external site/entity5. Brute force and dictionary attacks6. Backdoor (Allows remote access / control)7. Exploitation of Backdoor or CnC Channel8. Disable or interfere with security controls9. Tampering10. Exploitation of insufficient authentication (no login required)

Page 34: TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.

Advanced Persistent Threats

• Long-term attacks• Focused on large organizations• Organized Crime or State Sponsored