Gli ultimi ritrovati in termini di attacchi alle aziende
Transcription
Gli ultimi ritrovati in termini di attacchi alle aziende
Gli ultimi ritrovati in termini di attacchi alle aziende e furti di dati, come combatterli Roma 18 Giugno 2014 Maurizio Martinozzi Gli ultimi ritrovati in termini di attacchi alle aziende e furti di dati Degli Advanced Persistent Threats (APT) non solo se ne parla ma ad oggi se ne cominciano a contare i danni: è possibile contrastarli ma la difesa deve essere personalizzata e “tagliata su misura” dell’infrastruttura dell’azienda. Una ricerca del Ponemon Institute ha rilevato che il 67% delle aziende ammette che le proprie soluzioni sicurezza adottate non sono sufficienti a bloccare un attacco mirato. Ma il dato è tragico se consideriamo che il 55% delle aziende non viene nemmeno a conoscenza delle intrusioni subite e, una percentuale bassissima, è in grado di valutare la portata dell’attacco e, ancora più importante, chi lo ha sferrato. Per contrastare gli attacchi mirati è necessario adottare tecnologie si sicurezza evolute, quelle tradizionali non garantiscono più un adeguato livello di protezione. Di fatto le nuove tecnologie devono essere in grado di gestire la tipologia di attacco, rilevando e analizzando le minacce costanti evolute, ma anche di adattando rapidamente la protezione e reagendo in maniera proattiva ad attacchi specifici. La tecnologia deve essere in grado di integrare correttamente software, informazioni globali sulle minacce, strumenti e servizi specializzati per offrire nozioni personalizzate sulla minaccia specifica e sui criminali coinvolti. I recenti progressi nella gestione di comando e controllo (C&C) contribuiscono a bloccare i comportamenti sospetti prima ancora che riescano a compromettere l’obiettivo individuato. Ma non allarmiamoci: oggi sono disponibili specifiche soluzioni preventive e noi ve le racconteremo: vi spiegheremo perchè le soluzioni di sicurezza tradizionali non riescono a combattere queste nuove tipologie di minacce e di attacchi, vi spiegheremo le caratteristiche di queste recenti attività illecite dei cybercriminali e, soprattutto, vi mostreremo le più recenti e efficienti soluzioni ad oggi disponibili sul mercato per combattere questi nuovi crimini informatici. Trend Micro What We Do How We Do It Recognized global leader in server, virtualization and cloud security 1,200 threats experts in 12 TrendLabs locations around the globe; 1492 R&D engineers Innovative security solutions $400M USD and 500 engineers invested over last 4 years to develop cloud-related solutions Protecting the exchange of digital information for businesses and consumers Global Threat Intelligence Who We Are Eva Chen: CEO and Founder Co-founded: Offices: Global Employees: Revenue: Cash Assets: 1988 36 4942 $1.2B USD $1.65B USD Operating Income: $330M USD Headquarters: 3 Tokyo Gli investimenti in Software 6/23/2014 4 Gli investimenti in Infrastrutture IT 6/23/2014 5 Cyber crime or war?? It does not matter!! • 1 new threat each second 1 • 1 cyber-intrusion each 5 minutes 2 • 67 % of infrastructure can’t block a custom & targeted attack 3 • 55 % of companies didn’t detected the breach 1 More frequent More targeted More money Source : 1: Trend Micro, 2 : US-Cert 2012, 3 : Ponemom Institute 2012 More sophiticated Cyber crime or war?? It does not matter!! Cyber crime or war?? It does not matter!! Cyber crime or war?? It does not matter!! Le ‘minacce interne’ • 80% of data breaches Authorized Insiders – Ponemon Institute Study – 10 Insider Autorizzati Threat ► Accidental or malicious breach Outsider Non-Autorizzati Threat ► Dati rubati o persi Scopo Scopo ► Monitor, log, prevent breaches ► Assess risk continuously ► Educare gli impegati ► Impedire l’uso dei dati a personale non autorizzato Malware as a Service 6/23/201 4 11 Confidential © 2013 Trend Micro Inc. December 2010 Cyber attack on Iranian nuclear facilities January 2011 21-year-old George Hotz decrypts Sony PS3 root key February 2011 HBGary hacked by Anonymous and resulted data leakage March 2011 Authentication product related information leaked from RSA April 2011 77 million customers’ data leakage from Sony PSN users May 2011 360,000 US City Group customers’ data leaked June 2011 Major US defense contractor Lockheed Martin attacked July 2011 leakage of personal data of 35 million users of Korean social network site August 2011 Japanese defense related firms suffered from cyber attacks September 2011 Japanese National Personnel Authority Cabinet Office sites were temporarily unavailable by DDoS attacks October 2011 PCs in Japanese by virus; possible data leakage 13 and House of representatives infected 13 ※ These information are all extracts from news Rivoluzione tecnologica4 L’impatto tecnologico di Virtualizzazione, Cloud, Consumerization sta rivoluzionando il concetto di perimetro, smaterializzando elementi delle architetture IT La crescita del volume di dati creati, scambiati e conservati ha aumentato in modo significativo la complessità della gestione del rischio informatico per aziende e governi La sofisticazione e industrializzazione delle tecnologie Cyber-criminali richiede competenze sempre più specifiche e capacità d’intelligence per reagire rapidamente ed efficacemente agli attacchi RIVOLUZIONE: L’atto di modificare e rinnovare in modo radicale, profondamente Dizionario Treccani della Lingua Italiana 6/23/2014 14 Evoluzione del business Necessità di modelli integrati di governance e di gestione del rischio informatico adeguati al nuovo scenario, abilitanti al controllo del processo Valore per il Valore: portare al cliente reali competenze a valore aggiunto, accreditandosi come consulente, broker tecnologico, partner di progetto affidabile Fattori macro-economici attuali e conditio sine qua non di TCO, Riduzione dei Costi misurabili e concreti EVOLUZIONE: Ogni processo di trasformazione, graduale e continuo, per cui una data realtà passa da uno stato all’altro – quest’ultimo inteso generalmente come più perfezionato – attraverso cambiamenti successivi Dizionario Treccani della Lingua Italiana 6/23/2014 15 4Evoluzione della Domanda Le tecnologie restano il motore del business della sicurezza, ma non sono più sufficienti da sole a coprire le esigenze di un mercato sempre più complesso Oggi i Clienti richiedono a vendor e partner un miglior supporto per gli impatti organizzativi e di processo 6/23/2014 16 Cosa vuol dire compromettere una risorsa IT (e come) 17 Network Perimeter is Expanding Virtualization, Cloud, Consumerization & Mobility New Perimeter IaaS SaaS Internet Old Perimeter Mobile User Main Campus Remote Office Big Data Everywhere Who is accessing your data from where using what? Public Cloud Desktop Virtualization Private Cloud Server Virtualization The Targeted Attack Process Stage 0 Stage 2 Stage 1 Preparation for attack Initial penetration Establishment of attack platform As a preparation stage before they conduct attacks, the Various methods are used in the initial penetration stage. Once the attackers succeed to get into the system, they quickly attackers investigate information of target organization. Suspicious (targeted) email is one such method. For that, they attack organizations around target to collect platform information for initial intrusion like Emails exchanges between that organization and the target. Using this information, they conduct attacks which increase the success rate of the initial penetration. Copyright 2012 Trend Micro Inc. These methods are used to deploy viruses deep within the organization. In this stage, the attack can achieve the goal only when establish a backdoor for communication with a server they prepare. Unlike the traditional backdoors , this backdoor is the one that uses HTTP and other communication protocols that are used in the business in the target one employee open that Email. organization. Thus it In the initial penetration stage, there is no need for virus to infect many systems. It is thought that the attack methods used at this stage are expected to be detected and cleaned. That mean they are disposable. Using this backdoor, they will add functions needed for next system investigation stage, and an attack platform will be established. 20 cannot be blocked by a firewall. Stage 3 Stage 4 System investigation Attack on the ultimate target Using the attack plat-form established in the prior stage, They steal information the attackers search In some cases, using information stolen, they repeat attacks. for internal system information. via the backdoor. used to communicate APT is the attack which the attackers keep attack platform which established in the target with the attackers and organizations to repeat the search will be continued while confirming system information. penetrations and data thefts. At this time, a back door is This attack is the one tend to be repeated several times. Source: IPA design/ maintenance guide to aim for the solution against “new type of attack”. Le tecnologie Deep Discovery Deep Discovery provides the visibility, insight and control you need to protect your company against APTs and targeted attacks Deep Discovery Advisor Deep Discovery Inspector • Network traffic inspection • Advanced threat detection • Real-time analysis & reporting • Custom scalable threat simulation • Deep investigation & analysis • Actionable intelligence & results Targeted Attack/APT Detection In-Depth Contextual Analysis Rapid Containment & Response A Custom Defense for a Smart Protection DETECT ANALYZE ADAPT RESPONSE Advanced technologies Threat profiling Instant protection with to analyze low signals Origin ? Risk ? Channel ? dynamic signature Threat infection containement • Full visibility with Deep Discovery technologies • Advanced monitoring with Network and Host Sensor • Next-gen protection against custom threat & targeted attack Sandbox 6/23/2014 Protocol Inspection Network Reputation File Analysis Behavioral Analysis C&C Identification System Monitoring What is Deep Discovery ? • A network & host monitoring solution designed to provide network-wide visibility, insight and control against data breaches and advanced threats. • Deep Discovery uniquely detects and identifies evasive threats in real-time, and provides the in-depth analysis and actionable intelligence needed to prevent, discover and contain attacks against corporate data 6/23/20 14 24 DETECT Single Appliance for Advanced Protection Entry point Lateral Movement Deep Discovery All protocols analyzed HTTP SMTP DNS FTP on a single box ----- Inspector Exfiltration CIFS SQL P2P Network Content Inspection Engine 360°Approach • Appliance All-in-One • Content Up to 4 Inspection Gbps model •• Document Bare MetalEmulation & VA available •• • •• Payload Custom Download sandboxes embedded Behavior Tracing Can beDetection linked to external Exploit SB • Network Monitoring Advanced Threat Security Engine IP & URL reputation Virtual Analyzer Network Content Correlation Engine 6/23/2014 • Detect known, unknown and custom Embedded threats doc exploits Drive-by downloads • Dropper Leverage Trend Micro Unknown Threat Malware Intelligence C&C access technologies Data stealing • Worms/Propagation Adapts and responds Backdoor activities to threats in your Data exfiltration3 unique environment DETECT Deeper Look into Deep Discovery Docode Engine Win32 DLLs Advanced File Emulation Process Environment Virtual Processor File & Registry Simulation Extraction & Correlation • Fast analysis • Shellcode • Document type • Exploit data • Microsoft Office • Scripts (JS/AS) • Adobe PDF • File Structure • Adobe Flash Doc Analyzer Parser Extractor Emulator • Payload... High detection rate 6/23/2014 26 ANALYZE Deeper Look into Deep Discovery Virtual Analyzer Your Custom Sandbox Isolated Network • • • • • Custom OS image Execution acceleration Anti-Analysis detection 32 & 64 bits Execute binaries, documents, URL... Live monitoring WinXP SP3 Win7 Base Hardened LoadLibraryA ARGs: ( NETAPI32.dll ) Return value: 73e50000 LoadLibraryA ARGs: ( OLEAUT32.dll ) Return value: 75de0000 Modifies file with infectible type value: : eqawoc.exe LoadLibraryA ARGs: ( WININET.dll ) Return 777a0000 key: HKEY_CURRENT_USER\Local Inject processus : 2604 taskhost.exe Settings\MuiCache\48\52C64B7E\LanguageList value: Access suspicious host : mmlzntponzkfuik.biz key: HKEY_CURRENT_USER\Software\Microsoft\Onheem\20bi1d4f Write: path: %APPDATA%\Ewada\eqawoc.exe type: VSDT_EXE_W32 API ID: 2604 Inject Fake API: CreateRemoteThread Fake Injecting process Target process Fake AV Hooks Explorer ID: 1540 Target image path: taskhost.exeServer socket ARGs: ( 2, 2, 0 ) Return value: 28bfe socket ARGs: ( 23, 1, 6 ) Return value: 28c02 window API Name: CreateWindowExW ARGs: ( 200, 4b2f7c, , 50300104, 0, 0, 250, fe, 301b8, f, 4b0000, 0 ) Return value: 401b2 internet_helper API Name: InternetConnectA ARGs: ( cc0004, mmlzntponzkfuik.biz, 10050, , , 3, 0, 0 ) Return value: cc0008 ....... ! Core Threat Simulator • Kernel integration (hook, dll injection..) Filesystem monitor • Network flow analysis • Event correlation 6/23/2014 Win7 27 Registry monitor Process monitor Rootkit scanner Network driver ANALYZE Deeper Look into Deep Discovery Smart Protection Network Mobile Advanced Protection Cloud Android Sandbox • • • • MARS SANDBOX Crawl & Collect apps from various market (Play, Amazon, SlideMe3) Automatic download of unknown Android app from hosting source High quantity of Android apps catch Detection of suspicious behaviours – – – – – – C&C communications Data leak transfer Malware payload Invalid certificate Privacy abuse PermissionX Static Analyzer Dynamic Analyzer Smart Protection Network Unpack Variant Scanning UI Trigger Syscall hook Data Spoofing Behavior Logging Permission Check Privacy Data Tracking Resource Analysis Log Collector APK SINCE 2012 Deep Discovery 6/23/2014 28 ADAPT Deeper Look into Deep Discovery C&C Callback Protection FTP Multi-Source Scoring DNS TCP UDP CIFS ICMP SQL HTTP ----SMTP Protocol Analyzer • Virtual Analyzer Feedback – – – – • • • Hidden callback URL Domain Name IP:Port File Signature Botnet behavior Trojan identification Global C&C Live Intelligence User-Defined C&C List Content Inspection Rules Blocking capabilities ! 6/23/2014 29 TCP Reset DNS Spoofing HTTP Redirect ICMP Code Deep Discovery Infection & payload Simple & Efficient Lateral movement C&C callback Dynamic blacklist Web proxy af12e45b49cd23... 48.67.234.25:443 68.57.149.56:80 d4.mydns.cc b1.mydns.cc ... SMTP relay Storage Mail Server ! App Server Inspector ! Endpoint ! 6/23/2014 ! 30 Create your Custom Defense Integrated into Analyzer Trend Micro solutions • External sandbox system • Automatic Analysis Labs • Manual & API submission tools • Multi-box (5 nodes, 100k files/day) Email Inspector Threat profil export (IOC, hash) API & scripting Threat Intelligence Center • Email reputation & attachment analysis • Central event dashboards • Embedded URL analysis in VA • Custom searches & reports • MTA (inline) or BCC (monitor) mode • Central alerting and reporting • Up to 2M mails/day per box 6/23/2014 Confidential | Copyright 2012 Trend Micro Inc. 31 Get a complete picture of targeted attacks Deep Discovery Endpoint Sensor Context-aware endpoint solution designed to speed the discovery, investigation and response to security incidents Accelerate you response process • Confirm endpoint infiltration alerts from network security • Analyze actual malware behavior and results • See which endpoints have specific malware or C&C activity • Discover full context and spread of an attack Get a full picture of threats • Records detailed system activities • Performs multi-level search across endpoints • Uses rich search criteria • Compatible with any AV security solution Trend Micro Products Integrated Advanced Protection ! Dynamic blacklist Web proxy IWSva IMSvarelay SMTP Storage Analyzer Mail Server ScanMail App Server OfficeScan Deep Security Infection & payload Endpoint ! C&C callback ! 3c4çba176915c3ee3df8 7b9c127ca1a1bcçba17 Custom Signature 6/23/2014 33 af12e45b49cd23... 48.67.234.25:443 68.57.149.56:80 d4.mydns.cc b1.mydns.cc ... DetectX DetectX XAnalyzeX Human readable X React Copyright 2013 Trend Micro Inc. • Search summary • Individual endpoint flow & drilldown • Context and network aware 37 Why Deep Discovery ? NSS Labs Breach Detection Tests Better detection & 360°protection • Proven results for standard HTTP & SMTP • Plus detection for 80+ protocols & applications across all ports • Detection of Mac and Mobile malware • Custom sandboxing • Attacker activity detection All at half of the TCO than main competitor 6/23/2014 38 Why Deep Discovery ? Dynamic advanced security • Multi-engine for analysis and correlation • Leverages Smart Protection Network • CustomVirtual Analyzer sandbox • Access to TrendLabs Security Expert Plug & Protect • High Throughput Network Analysis • Flexible architecture: HW, SW, VM • Fast forensics & custom signature 6/23/2014 39 Il cloud DAILY: • Collects 1.15B threat samples • Correlates 7.2 TB data • Protects against 200M threats • • • • • • • Whitelisting Network traffic rules Mobile app reputation Vulnerabilities/Exploits Threat Actor Research Enhanced File Reputation Enhanced Web Reputation BIG DATA ANALYTICS-DRIVEN GLOBAL THREAT INTELLIGENCE 2012 • Email reputation • File reputation • Web reputation CLOUD BASED GLOBAL THREAT INTELLIGENCE 2008 SIGNATURE BASED ANTI-MALWARE 1988 - 2007 maurizio_martinozzi@trendmicro.it