Top Banner
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. WHO NEEDS MALWARE? UNDERSTANDING FILELESS ATTACKS AND HOW TO STOP THEM
25

Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

Jan 22, 2018

Download

Technology

CrowdStrike
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

WHO NEEDS MALWARE?

UNDERSTANDING FILELESS ATTACKS AND HOW TO STOP THEM

Page 2: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

1 What are fileless attacks

2 How does a fileless attack work

3 Real world examples

4 Why traditional approaches don’t work

5 The CrowdStrike approach

Page 3: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

POOL QUESTION

HOW WOULD YOU RATE YOUR KNOWLEDGE OF FILELESS ATTACKS 1 TO 5 (1 = NONE. 5 = EXPERT)

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

Page 4: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Page 5: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

WHAT IS A FILELESS ATTACK

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

An attack that does not require a malicious executable file

to be written to disk

Page 6: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Page 7: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

THE REALITY OF FILELESS ATTACKS

Fileless techniques are not new

More prevalent than Ransomware 24% vs. 21%

78% of organizations are concerned about fileless attacks

Only 51% of breaches include malware - Source Verizon BDR 2017

Not all attacks are 100% fileless

80% of attacks use some fileless techniques - Source CrowdStrike Incident Response

Page 8: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

FILELESS ATTACK TECHNIQUES

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

Page 9: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

FILELESS

TECHINQUES

FILELESS INTRUSION TECHNIQUES OBSERVED BY THE FALCON PLATFORM

§ Spear phishing for credentials

§ Lateral movement using ‘living off the land’ tools (WMI, Unix commands, Powershell)

§ Registry persistence

§ Webshells

Page 10: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

1.Attackeridentifiesorganizationwithvulnerable

webapplication

2.RemoteattackerusesSQLinjectionorother

vulnerabilitytodroppayload

3. Vulnerable webserver is

compromised and becomes

backdoor

WEBSHELL ATTACKS

Page 11: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

FILELESS

TECHINQUES

FILELESS INTRUSION TECHNIQUES OBSERVED BY THE FALCON PLATFORM

§ Spear phishing for credentials

§ Lateral movement using ‘living off the land’ tools (WMI, Unix commands, Powershell)

§ Registry persistence

§ Webshells

§ Powershell-based credential dumpers

Page 12: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

GOAL

TOOL S

T E C H N I Q U E

HOW A FILELESS ATTACK TAKES PLACE

I N I T I A L C O M P R O M I S E

1

Remote access to a system using a

web browser. Can be web scripting

languageE.g. China Chopper

GAIN ACCESS

WebShell

C O M M A N D A N D C O N T R O L

2

Run system commands to

find out where we are

RECON

Sysinfo, Whoami

P R I V I L E G EE S C A L AT I O N

3

Run a PowerShell script such as

Mimikatz to dump credentials

DUMP CREDENTIALS

PowerShell

P E R S I S T E N C E

4

Modifies Registry to create a backdoor

E.g. On screen keyboard or sticky keys

MAINTAIN PERSISTENCE

Registry

E X F I LT R AT I O N

5

Uses system tools to gather data and

China Chopper Webshell to

exfiltrate data

EXFILTRATE DATA

VSSAdmin, Copy, NET use,

Webshell

Page 13: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

REAL WORLD EXAMPLES

§ Fileless Malwre: Kovter

§ Fileless Attack: Nation State

Page 14: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

KOVTER

§ Click-fraud

§ Fileless after initial infection

§ Hides encrypted malicious modules in the registry

§ Hides other malicious modules in PowerShell scripts

§ Uses shortcut file (.lnk) to download PowerShell scripts. The script launches PowerShell to start a shellcode

Page 15: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

NATION STATE ATTACK

§ Weaponization: Spoofed website

§ Delivery: Spear phishing

§ PowerShell modules connect to a remote server

§ Install/run MimiKatz

§ Lateral movement through stolen credentials

Page 16: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

MOVING LATERALLY WITHOUT MALWARE

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

Attacker sets the bait with a fake

website

Extract credentials from initial victim

Move laterally to other hosts

Page 17: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

HOW TO PROTECT AGAINST FILELESS ATTACKS

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

Page 18: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

HOW WOULD YOU RATE YOUR CURRENT LEVEL OF PROTECTION AGAINST FILELESS ATTACKS (1 = POOR – 5 = EXCELLENT)

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

Page 19: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Page 20: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

EDUCATE

83%Rate traditional AV based signature efficacy good or excellent

Page 21: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

WHY TRADITIONAL APPROACHES DON’T WORK

No file to analyze No artifacts left behind Blind if prevention fails

Uses legitimate applications No file to detonate Hands on keyboard

Page 22: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

PROTECTS AGAINST ALL TYPES OF ATTACKSProtect against Known/Unknown Malware/Malware Free

Protect Against Zero-Day Attacks

Endpoint Detection and Response

Managed Threat Hunting

BENEFITS

FALCON ENDPOINT PROTECTION

MachineLearning

IOABehavioral

Blocking

Block Known Bad

ExploitMitigation

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

Page 23: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

PROCESSINJECTSATHREADINTOSYSTEMPROCESS

INJECTEDTHREADREADSCREDENTIALSFROMTHESYSTEMPROCESSMEMORY

DUMPEDCREDENTIALSAREUSEDTOLOGININTOEXCHANGESERVER

MAILBOXESAREEXPORTEDOUTOFEXCHANGE

INDICATORS OF ATTACK

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

PROCESSCONDUCTSRECONNAISSANCE

PROCESSELEVATESPRIVILEGES

WEBSERVEREXECUTESAPROCESS

Page 24: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

KEY TAKEAWAYS

THE THREAT IS REAL TRADITIONAL AV IS NOT ENOUGH CURRENT DEFENSES

DO NOT WORK

NEED TO THINK BEYOND MALWARE AND FOCUS ON

STOPPING THE BREACH

Page 25: Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

Questions?Please submit all questions in the Q&A chat

right below the presentation slides

Contact Us

Additional Information

JoinWeeklyDemos

crowdstrike.com/productdemos

FeaturedAsset:HowAdversariesUseFileless AttacksTo

EvadeYourSecurity

Link in Resource List

Website: crowdstrike.comEmail: [email protected]: 1.888.512.8902 (US)