Top Banner
Telenet for Business Telenet for Business Modern Malwares… ... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about WMDs – Weapons of Mass Destruction. Now it is time to worry about a new kind of WMDs – Weapons of Mass Disruption.” (John Mariotti)
55

Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Dec 26, 2015

Download

Documents

Charlotte Horn
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Telenet for BusinessTelenet for Business

Modern Malwares…... Only a few clicks away from you!Xavier Mertens - Principal Security Consultant

“We worried for decades about WMDs – Weapons of Mass Destruction. Now it is time to worry about a new kind of WMDs – Weapons of Mass Disruption.” (John Mariotti)

Page 2: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

# whoami

Xavier Mertens, again!

Page 3: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Agenda

Introduction How to fight? Quick wins Real time analysis Solutions Limitations Conclusions

Page 4: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Let’s Avoid This!

Page 5: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.
Page 6: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Me? Breached?

In 66% of investigated incidents, detection was a matter of months or even more

69% of data breaches are discovered by third parties

(Source: Verizon DBIR 2012)

Page 7: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Malicious Code is not New

2003 - The SQL Slammer worm

2010 – Stuxnet is the first worm to attack SCADA systems

2011 - SpyEye and Zeus merged code is seen.

2013 - The CryptoLocker trojan horse is discovered.

1971 - The Creeper system, an experimental self-replicating program, infected DEC PDP-10 computers.

1986 - The Brain boot sector virus is released

1999 - The Melissa worm targeted Microsoft Word and Outlook systems

2000 - The ILOVEYOU worm, also known as Love Letter

Page 8: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

2014?

Fridge sends spamemails as attack hitssmart gadgets…

Page 9: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

2014?

“Target” PoS werecompromised…

Page 10: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

2014?

Yahoo! ads networkcompromised toredirect users tomalicious websites

Page 11: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

“Malware?”

“A malware, or malicious code, is defined assoftware or firmware intended to perform anunauthorized process that will have anadverse impact on confidentiality, integrityand availability of an information system.”

Page 12: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Understanding Threats

Attack actors• $$$• Espionage (industrial or political)• Hacktivism

Attack vectors• Mainly: HTTP / SMTP• Local access (USB – CIFS)• Interactions with humans

Page 13: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

“WMP”

“Weapon of Mass Pwnage”

Page 14: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Backdoors in Software

Page 15: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Backdoors in Software

Page 16: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Golden Tips

Always download from official repositories

Always cross-check the MD5/SHA1 hash

Deploy in a lab

Page 17: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Bulk VS. Targeted

Bulk attacks use a well-known vulnerability in a piece of softwareEx: CVE-2012-4681

Lot of computers infected, low revenue Massive pwnage

Targeted attacks uses a 0-day vulnerability in a piece of softwareEx: CVE-2011-0609

Limited amount of victims but potentially huge revenue

Page 18: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Easy as 1, 2, 3, ... 4, 5!

Step 1 : 0-day attack via phishing

Step 2 : Backdoor installed and accessed

Step 3 : Privileges escalation & “pivot”

Step 4 : Gather data

Step 5 : Exfiltrate

Page 19: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Callbacks...

A malware without C&C communications is useless...

Callbacks are used to phone home• To send interesting data• To ask for what to do?

Page 20: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Below the Radar...

Callbacks must be stealthy• Obfuscated, encrypted and look “very

common”

Multiple channels• JPEG images• Twitter• Tor• Google Drive• ... Theoretically any web 2.0 app!

Page 21: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Agenda

IntroductionHow to fight? Quick wins Real time analysis Solutions Limitations Conclusions

Page 22: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Step 1 – Infection

Rogue e-mails• Security awareness• Limit / scan attachments

Malicious websites• Can be your favourite website visited

daily Scan web traffic

Trust nobody Prevent the “click-o-mania”

Page 23: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Step 2 - Malware Behavior

Alter the OS• Create/alter files• Create/kill processes• Wait for events• Work stealthy

Network flow• Contact the C&C

Page 24: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Step 3 – Escalation & Pivot

Hardening• Restrict users privileges• Uses OS security features

Network segmentation• Don’t put all your eggs in the same bag

Page 25: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Step 4 – Data Are Valuable

Protect your data• Encrypt them• Restrict access to them

Data at rest Data in motion Data in use

Page 26: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Step 5 – Exfiltration

Classify data Network flows

Page 27: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Due Diligence

Page 28: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Agenda

Introduction How to fight?Quick wins Real time analysis Solutions Limitations Conclusions

Page 29: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

RRD

Page 30: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

NetFlow / Firewall Logs

Why is this server trying to connect to the wild Internet?

Why is this laptop trying to connect to China?

Why does this protocol suddenly appear?

Page 31: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

DNS

No DNS, no Internet! Malwares need DNS to communicate

with C&C Alert on any traffic to untrusted DNS Investigate for suspicious domains Track suspicious requests (TXT)

Page 32: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

DNS

Page 33: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

virustotal.com

Page 34: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

urlquery.net

Page 35: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Intelligence

Local logfiles Public resources

Suspicious behavior

Page 36: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Action... Reaction!

DetectIdentify

Contain

Eradicate

Recover

Learn

IncidentHandling

Page 37: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Agenda

Introduction How to fight? Quick winsReal time analysis Solutions Limitations Conclusions

Page 38: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Two Approaches

VS.

Page 39: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Hashing

1.Files are extracted fromnetwork flows

2.Hash is computed3.Hash is compared to a

database (local or remote)4.File is blocked

(know hash) or allowed

Page 40: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Hashing

Page 41: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Sandbox (Live)

1.Files are extracted fromnetwork flows

2.Files are executed in a sandbox

3.Behavior is analyzed andscore is computed

4.File is blocked(>score) or allowed

Page 42: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Sandbox (Live)

Score is computed based on “actions” performed by the malware

If ($score > $threshold) { alert(); }

Action Score

Try to find a debugger +1

Connect to a known IP +2

Perform multiple sleep() +1

Inject itself into a DLL +3

TOTAL +7

Page 43: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

So what?

Pro ConHashing • Speed

• Privacy• Integrated into modern firewalls

• Less reliable• Database growingdaily• 0-day or targeted malwares not detected

Live Analysis • More reliable• Targeted malware detected

• Resources usage intensive• Requires dedicated hardware• Privacy issue?

Page 44: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Agenda

Introduction How to fight? Quick wins Real time analysisSolutions Limitations Conclusions

Page 45: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Some products

Palo Alto Networks “Wildfire” Check Point “Anti-bot” & “Threat

Emulation” FireEye (core-business) Cuckoo (open source project)

Page 46: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Advantages

PA & CP integrate smoothly with existing infrastructure

Data is captured live Cloud or Appliance based Data sharing Web traffic, email protocols (SMTP,

IMAP, POP), FTP, and SMB.

Page 47: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Mix Technologies!

Inspect traffic with the product proposed by your firewall vendor

Mix this with off-line tools to inspect network shares or suspicious computers

On demand analysis

Page 48: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Agenda

Introduction How to fight? Quick wins Real time analysis SolutionsLimitations Conclusions

Page 49: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Cat & Mouse Game

Page 50: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Evasive Techniques

Wait for user interactions Looks at the $ENV: HW devices, MAC

addresses, disk size, processes, … Use non-standard protocols Use encryption

Page 51: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Let’s tap!

Access to malwares in motion? Where to capture the traffic? Malware could be already installed

and stealthy

Page 52: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Sandboxes

OS & software restricted to Windows

Difficult to deploy your own images with commercial products

Only droppers are analyzed, and after?

Page 53: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Agenda

Introduction How to fight? Quick Wins Live Analysis Solutions LimitationsConclusions

Page 54: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Conclusions

You will be hit by a malware! Be ready or … maybe already infected?

You already have valuable data, use them to track suspicious activity

Best practices might reduce risks Backdoors in software aren’t

reported as suspicious Patch, patch and patch again…

Page 55: Telenet for Business Modern Malwares…... Only a few clicks away from you! Xavier Mertens - Principal Security Consultant “We worried for decades about.

Thank You!

Interested?Contact your AccountManager for moreinformation!