1 ©2014 check point software technologies ltd. modern threats and malware kierk sanderlin regional...

57
1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

Upload: silvester-elwin-norman

Post on 17-Dec-2015

219 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

1©2014 Check Point Software Technologies Ltd.

Modern Threats and Malware

Kierk Sanderlin

Regional Engineering Manager

Page 2: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

2©2014 Check Point Software Technologies Ltd. 2©2014 Check Point Software Technologies Ltd.

We are surrounded by buzzwords

but what do they all mean?

Page 3: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

3©2014 Check Point Software Technologies Ltd.

A Little History

Page 4: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

4©2014 Check Point Software Technologies Ltd.

Behind The Scenes

Who would write a virus?A

Why would they write it?B

Page 5: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

5©2014 Check Point Software Technologies Ltd.

Behind The Scenes

‘80s and ‘90s

Nerds

Show OffCause Damage

Who

Why

Page 6: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

6©2014 Check Point Software Technologies Ltd.

Examples

Ping Pong Videohttp://www.youtube.com/watch?v=yxHalzuPyi8

Cascade Videohttp://www.youtube.com/watch?v=z7g-v3d7-Gk

Other Celebrities:

CIHMelissa

ILOVEYOU

Page 7: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

7©2014 Check Point Software Technologies Ltd.

Behind the Scenes

‘80s and ‘90s 21st Century

NerdsCriminals

Nation-State

Steal MoneySteal Data

Show OffCause Damage

Who

Why

Cause Damage

Page 8: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

8©2014 Check Point Software Technologies Ltd.

Examples

Criminals Nation-State

• Zeus• Spy-Eye• ZeroAccess/Sirefef• Carberp• Cridex• [more to come]

• Stuxnet• Duqu• Flame• Gauss• Shamoon• APT1• [more to come]

Page 9: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

9©2014 Check Point Software Technologies Ltd.

One Ware to Rule Them All

Steal Damage

• Spyware • Ransomware

Harass

• Adware• Scareware• Fake AV

Generic Names

• Virus• Trojan• Worm• Malware

M A L W

A R E

Page 10: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

10©2014 Check Point Software Technologies Ltd.

• Someone else’s code running on your server without your permission or knowledge is bad

• Malware can change functionality, based on collected information

• Malware can download other malware

• Bot-herders rent out parts of their network

• Bot-herders can change their mind

Why Do That?

Page 11: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

11©2014 Check Point Software Technologies Ltd.

• Was trademarked by

• Describes the phases of an attack

• Has become an industry standard

• We’ll get back to this later…

Cyber Kill Chain™

Page 12: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

12©2014 Check Point Software Technologies Ltd.

Attack Scenario

Spearphishing1Malware-bearing Spam2Link-bearing Spam3Pirated Software4Drive-By Download5Infected Media6

Page 13: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

13©2014 Check Point Software Technologies Ltd.

Attack Scenario

Spearphishing1Malware-bearing Spam2Link-bearing Spam3Pirated Software4Drive-By Download5Infected Media6

Page 14: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

14©2014 Check Point Software Technologies Ltd.

Spearphishing1Phishing Example #1: Completely Generic

Page 15: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

15©2014 Check Point Software Technologies Ltd.

Spearphishing1

Page 16: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

16©2014 Check Point Software Technologies Ltd.

Spearphishing1

Page 17: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

17©2014 Check Point Software Technologies Ltd.

Spearphishing1

Page 18: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

18©2014 Check Point Software Technologies Ltd.

Spearphishing1

Page 19: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

19©2014 Check Point Software Technologies Ltd.

Spearphishing1Spearphishing

A Phishing email aimed at a particular victim. The email is crafted using information that the victim is most likely to respond to. Might contain actual actionable content.

• Examples:

• CV’s sent to HR personnel

• A business proposal based on the victim’s previous work

• A request for opinion, decision or help

Page 20: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

20©2014 Check Point Software Technologies Ltd.

Spearphishing1Spearphishing

Most of the times, the emailwill contain a malicious document. The document, in turn, contains an Exploit targeting a vulnerability, whether Disclosed or Undisclosed (also known as a 0-Day Vulnerability)

Page 21: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

21©2014 Check Point Software Technologies Ltd.

Spearphishing1Spearphishing

Most of the times, the emailwill contain a malicious document.

ActualContent

Page 22: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

22©2014 Check Point Software Technologies Ltd.

Spearphishing1Spearphishing

Most of the times, the emailwill contain a malicious document. The document, in turn, contains an Exploit targeting a vulnerability, whether Disclosed or Undisclosed (also known as a 0-Day Vulnerability),

Exploit

ActualContent

Page 23: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

23©2014 Check Point Software Technologies Ltd.

Spearphishing1Spearphishing

Most of the times, the emailwill contain a malicious document. The document, in turn, contains an Exploit targeting a vulnerability, whether Disclosed or Undisclosed (also known as a 0-Day Vulnerability), and aPayload,

Exploit

ActualContent

Payload

Page 24: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

24©2014 Check Point Software Technologies Ltd.

Spearphishing1Spearphishing

Most of the times, the emailwill contain a malicious document. The document, in turn, contains an Exploit targeting a vulnerability, whether Disclosed or Undisclosed (also known as a 0-Day Vulnerability), and aPayload, which installs aMalware on the computer.

Exploit

ActualContent

Payload

Malware

Page 25: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

25©2014 Check Point Software Technologies Ltd.

Attack Scenario

Spearphishing1

Link-bearing Spam3Pirated Software4Drive-By Download5Infected Media6

Malware-bearing Spam2

Page 26: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

26©2014 Check Point Software Technologies Ltd.

Malware-bearing Spam2

Page 27: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

27©2014 Check Point Software Technologies Ltd.

Malware-bearing Spam20-Day Vulnerability

When a vulnerability is published or disclosed, the days until it’s patched are counted. This is the age of the vulnerability. If the vulnerability was never disclosed, it is still unpatched. 0 days have passed since its disclosure.

An Exploit is a piece of code and data that takes advantage of an unpatched vulnerability, in order to gain Code Execution or Privilege Escalation.

Page 28: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

28©2014 Check Point Software Technologies Ltd.

Attack Scenario

Spearphishing1

Pirated Software4Drive-By Download5Infected Media6

Malware-bearing Spam2Link-bearing Spam3

Page 29: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

29©2014 Check Point Software Technologies Ltd.

Link-bearing Spam3

Page 30: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

30©2014 Check Point Software Technologies Ltd.

Link-bearing Spam3Exploit Kit

A collection of Exploits, usually Web-oriented, that are used to infect a computer through its browser or associated plugins. The exploits will usually target JavaScript, Java or Flash vulnerabilities.

An Exploit Kit is a good example for CaaS – Crime as a Service.

Page 31: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

31©2014 Check Point Software Technologies Ltd.

Attack Scenario

Spearphishing1

Drive-By Download5Infected Media6

Malware-bearing Spam2Link-bearing Spam3Pirated Software4

Page 32: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

32©2014 Check Point Software Technologies Ltd.

Pirated Software4

Page 33: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

33©2014 Check Point Software Technologies Ltd.

Pirated Software4Bundled Malware

A lot of today’s software is not free. If you don’t pay, you can’t use it properly. People try to bypass this protection by looking for a Cracked Copy of the software, or a KeyGen (Key Generator).

When you use cracked software, it is actually a modified software. You may think that the only change is the removal of the protection, but nothing prevents the attacker from including whatever additional functionality they desire.

Page 34: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

34©2014 Check Point Software Technologies Ltd.

Pirated Software4Bundled Malware

The same applies to KeyGens. They really do generate a valid serial number, but at the same time they install a malware in the background.

The most famous example is Android Apps. Hackers take a software that costs money, repackage it with malware and put it back on the store, under the same name, for free.

Page 35: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

35©2014 Check Point Software Technologies Ltd.

Attack Scenario

Spearphishing1

Infected Media6

Malware-bearing Spam2Link-bearing Spam3Pirated Software4Drive-By Download5

Page 36: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

36©2014 Check Point Software Technologies Ltd.

Drive-By Download5

Page 37: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

37©2014 Check Point Software Technologies Ltd.

Drive-By Download5

Page 38: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

38©2014 Check Point Software Technologies Ltd.

Drive-By Download5

Page 39: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

39©2014 Check Point Software Technologies Ltd.

Drive-By Download5

Page 40: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

40©2014 Check Point Software Technologies Ltd.

Drive-By Download5Watering Hole Attack

Borrowed from the Wild Life world, it describes an attack on a website that attracts many visitors, just like the watering hole.

Instead of spending agreat deal of resourcesin order to attack manyvictims, the attackeronly has to attack onevictim – the popularwebsite.

Page 41: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

41©2014 Check Point Software Technologies Ltd.

Attack Scenario

Spearphishing1Malware-bearing Spam2Link-bearing Spam3Pirated Software4Drive-By Download5Infected Media6

Page 42: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

42©2014 Check Point Software Technologies Ltd.

Infected Media6

Page 43: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

43©2014 Check Point Software Technologies Ltd.

Infected Media6

Page 44: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

44©2014 Check Point Software Technologies Ltd.

Infected Media6

Page 45: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

45©2014 Check Point Software Technologies Ltd.

Infected Media6

Page 46: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

46©2014 Check Point Software Technologies Ltd.

Back to the Cyber Kill Chain™

Code Execution

Privilege EscalationExploit Kit

SpamSpearphishing

Pirated Software

Bundled Malware

KeyGen

Cracked Software

Watering Hole Attack

Drive-By Download

0-Day Vulnerability

Payload

Malware

Page 47: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

47©2014 Check Point Software Technologies Ltd. 47©2014 Check Point Software Technologies Ltd.

Page 48: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

48©2014 Check Point Software Technologies Ltd.

Why Would Anyone Attack Me?

© Brian Krebs

Page 49: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

49©2014 Check Point Software Technologies Ltd.

Alternate Topic

Advanced Persistent Threat

Another Pointless Term?

OR

Page 50: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

50©2014 Check Point Software Technologies Ltd.

Advanced Persistent Threat

Nation-State

Targeted Attack

0-Day Vulnerability

Unknown Tools

Spearphishing

Compromised PC

Page 51: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

51©2014 Check Point Software Technologies Ltd.

Random Attack

Hacker / Criminal

Wide Campaign

0-Day / Unpatched

New / Existing Tool

Spam / Drive-By

Compromised PC

Page 52: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

52©2014 Check Point Software Technologies Ltd.

Nation-State

Targeted Attack

Unknown Vulnerability

Unknown Tools

Spearphishing

Compromised PC

Hacker / Criminal

Wide Campaign

0-Day / Unpatched

New / Existing Tool

Spam / Drive-By

Compromised PC

Now Let’s Compare…

Page 53: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

53©2014 Check Point Software Technologies Ltd.

And…on October 21st, 2012

Page 54: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

54©2014 Check Point Software Technologies Ltd.

What it looks like…

Page 55: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

55©2014 Check Point Software Technologies Ltd.

Summary

“I’m not interesting, no one will attack me” and “It’s too complicated” are irrelevant responses.A

Page 56: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

56©2014 Check Point Software Technologies Ltd.

Summary

“I’m not interesting, no one will attack me” and “It’s too complicated” are irrelevant responses.A

The balance is shifting from Prevention to Detection. B

Page 57: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager

57©2014 Check Point Software Technologies Ltd.

Summary

“I’m not interesting, no one will attack me” and “It’s too complicated” are irrelevant responses.A

The balance is shifting from Prevention to Detection. B

There is no silver bullet. You must have layered security covering all fronts.C