introduction to advanced persistent threats (apt) for non-security engineers

45
APT for Engineers IET - Cyber Security for Critical Infrastructure Ollie Whitehouse, Technical Director

Upload: ollie-whitehouse

Post on 10-Feb-2017

1.454 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

APT for EngineersIET - Cyber Security for Critical InfrastructureOllie Whitehouse, Technical Director

Page 2: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

Agenda

APT: definition

APT: manifestation and implementation

APT: mitigation, detection and remediation

Conclusions

2

Page 3: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

3

definition

Page 4: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

4

Advanced: i.e. not basic

Persistent: i.e. not non-persistent

Threat: i.e. backdoor, remote access, retained control, root kit etc.

APT: definition

Page 5: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

5

Intelligence agencies

Page 6: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

6

Intelligence agenciesOrganised criminals

Page 7: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

7

manifestation and implementation

Page 8: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

8

APT: manifestation

http://cyber.lockheedmartin.com/cyber-kill-chain-lockheed-martin-poster https://nigesecurityguy.wordpress.com/2013/06/04/defensible-security-posture/

Page 9: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

9

APT: manifestation - key functionsCommand

& Control

(C2)

Persistence

Security & Defence

Functionality & Maintenance

Page 10: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

10

Ensures remote and desired level of access

Persistent but minimizes forensic artefacts

Minimizes likelihood of detection

Frustrates analysis

Modular, upgradable and versatile

APT: manifestation - goals

Page 11: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

11

December 2014 NCC Group dealt with the compromise of REDACTED who had been compromised by Shell Crew

http://www.emc.com/collateral/white-papers/h12756-wp-shell-crew.pdf

This actor uses the Derusbi trojan family to maintain access which supports a form of port-knocking.

APT: manifestation

Page 12: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

12

APT: manifestation

Page 13: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

13

APT: implementation

Page 14: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

14

APT: implementation

Page 15: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

15

A program (i.e. on Windows, Mac OS X, Linux, iOS/Android etc.)

A kernel driver (i.e. on Windows, Mac OS X, Linux etc.)

A non-persistent patch to existing code (anything)

A malicious firmware (embedded devices)

APT: implementation

Page 16: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

16

Summer 2014 NCC Group detect a malicious RTF (document) containing the Havex RAT

We then developed signatures and detected numerous trojaned ICS / SCADA tools in malware zoos

Actor has been compromising ICS / SCADA tool vendor web sites, trojaning legitimate binaries with havex and waiting for downloads

APT: manifestation

https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2014/june/extracting-the-payload-from-a-cve-2014-1761-rtf-document/

Page 17: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

17

APT: manifestation

http://cyber.lockheedmartin.com/cyber-kill-chain-lockheed-martin-poster https://nigesecurityguy.wordpress.com/2013/06/04/defensible-security-posture/

Page 18: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

18

APT: manifestation

Cheap(ish) &

normally simple

deployment

Page 19: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

19

APT: manifestation

Moderately

costly &

semi-complex

deployment

Page 20: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

20

APT: manifestation

Cheap but

complex

deployment

Page 21: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

21

APT: manifestation

Typically very

cheap but

variable cost to

deployment

Page 22: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

APT: manifestation

22

Page 23: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

APT: manifestation

23

Page 24: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

APT: manifestation

24

Page 25: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

APT: manifestation

25

Page 26: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

APT: manifestation

26

Page 27: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

APT: manifestation

27

Page 28: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

APT: manifestation

28

Page 29: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

29

Software stacks are today very complex

Re-writable software is everywhere

Cryptographic code signing etc. is not

APT: manifestation - reality

Page 30: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

30

detection

Page 31: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

31

Known knowns = Indicators of Compromise (IOCs)

IOCs = signatures for network traffic or files

APT: detection – known knowns

Page 32: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

32

Monitoring and measurementnetworkOSdevice

Anomaly detection and investigationusing monitoring and measurement

APT: detection – unknown unknowns

Page 33: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

33

analysis

Page 34: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

34

observe – from the network or on host

identify – the program code

extract – from the host / device

analyse – statically / dynamically

APT: analysis

Page 35: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

35

mitigation and remediation

Page 36: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

36

APT: mitigation – 2002 proposal

https://en.wikipedia.org/wiki/Next-Generation_Secure_Computing_Base

Page 37: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

37

APT: mitigation - TPMs

https://en.wikipedia.org/wiki/Trusted_Platform_Module

Page 38: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

38

APT: mitigation – UEFI Secure Boot

http://answers.microsoft.com/en-us/windows/forum/windows8_1-security/uefi-secure-boot-in-windows-81/65d74e19-9572-4a91-85aa-57fa783f0759?auth=1

Page 39: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

39

APT: mitigation – UEFI Secure Boot

http://answers.microsoft.com/en-us/windows/forum/windows8_1-security/uefi-secure-boot-in-windows-81/65d74e19-9572-4a91-85aa-57fa783f0759?auth=1

Page 40: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

40

APT: mitigation – UEFI Secure Boot

http://answers.microsoft.com/en-us/windows/forum/windows8_1-security/uefi-secure-boot-in-windows-81/65d74e19-9572-4a91-85aa-57fa783f0759?auth=1

Page 41: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

41

Once we have an OS* we trust

.. we can do things likehypervisor level malicious code scanningearly launch malware detection (Windows)

APT: mitigation

* caveat is now hardware with DMA access and if IOMMUs are used or if data/code in RAM is otherwise protected from manipulation

Page 42: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

42

putting the advanced in APT

Page 43: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

43

persistent element: encrypted to hostnot persistent until shutdownpersisted via secondary host

command and controladding to legitimate network connections

APT: putting the advanced in APT

Page 44: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

44

Conclusions

Page 45: Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers

45

EuropeManchester - Head Office

Amsterdam

Cambridge

Copenhagen

Cheltenham

Edinburgh

Glasgow

Leatherhead

London

Luxembourg

Munich

Zurich

AustraliaSydney

North AmericaAtlanta

Austin

Chicago

New York

San Francisco

Seattle

Sunnyvale

Ollie [email protected]