a talos look into the evolving threat landscape · a talos look into the evolving threat landscape...

36
A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher

Upload: others

Post on 17-Jun-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

A Talos Look into the Evolving Threat Landscape

E a r l C a r t e rS e n i o r T h r e a t R e s e a r c h e r

Page 2: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Today ’s P lan

• Threat Landscape• Attack Techniques

• An Unexpected Attack Vector• Self-Propagation (Worms)• Attacking Trust

• Talos Threat Intelligence

Page 3: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

THREAT LANDSCAPE - VULNERABIL IT IES

25%• Network Accessible• Low Complexity• No Authorization• High Severity

Low Hanging Fruit on Decline60%

50%

40%

30%

20%

10%

0

2005 2007 2009 2011 2013 2015 2017

60% Reduction

Page 4: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Common Attack Vectors

U s e r sU n p a t c h e d V u l n e r a b i l i t i e s

I o T

Page 5: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Data i s the New Target

Page 6: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

An Attack Vector In Plain Site

Page 7: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Covert Channels and Poor Decisions:The Tale of DNSMessenger

Page 8: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Mult i S tage

Powershell to Gain Persistence

Powershell to Launch C&C

Stage 1 Stage 2 Stage 3

Stage 4

Page 9: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Message Query

Stage 4 – DNS Messages

SYN Query

Page 10: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Spoofed SEC Emails Distribute Evolved DNSMessenger

Page 11: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Spoofed SEC Emai l s

• Targeted spear phishing campaign.

• Spoofed from SEC EDGAR system and contained malicious attachment.

Page 12: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

DNSMessenger – Stage 4

• Functions as a Remote Access Trojan (RAT) that is implemented using PowerShell.

• Uses DNS for command retrieval from C2.– Sample domain: EFA29DD310.stage.0.ns0.pw

• POSTs data to attackers server via HTTP.

• Can be used to execute a variety of commands on infected systems.

Page 13: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

2017 – Attack of the Worms

Page 14: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Remember

1988 Morris Worm(Sendmail, finger, rsh)

2008 Conficker Worm (RPC, NetBIOS)

2001 Code Red Worm (IIS)

2003 Blaster Worm (RPC)

Page 15: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

And Then (May 2017)- WannaCry (SMB)

Page 16: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

WannaCry Propagat ion

Page 17: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Next Evolut ion ( June 2017) - Nyetya

Page 18: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Nyetya Propagat ion

ETERNALBLUE

Scans IP subnet139 TCP

Perfc.datPSEXEC

WMI

ETERNALROMANCE

Page 19: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

October 2017 – Bad Rabbi t

Page 20: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Propagat ion

NTLMSSP brute forcing

Scans IP subnet139 TCP

infpub.dat SMB/SMB2/SVCCTL

WMI

ETERNALROMANCE

Page 21: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

February 2018 – Olympic Destroyer

Page 22: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Olympic Destroy Propagat ion

Eternal Romance Artifacts – No execution

Page 23: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Olympic Destroy Workf low

Page 24: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Supply Chain AttacksExploiting Trust Relationships

Page 25: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Supply Chain Backdoor

DistributedIntegrated Communicates Installs

Victim

SourceCode

Hidden Backdoor

Final PayloadCnC

</>

Installed orupdated

Page 26: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Nyetya “Ransomware” Attack

Page 27: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

M.e.Doc Connect ion

Page 28: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Restor ing Connect ions

Page 29: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

The Backdoor

Contacts upd.me-doc.com.ua every 2 mins

If finds a proxy:

Retrieve email data from local me-doc

Wait for & execute commands

These commands almost certainly used to distribute Nyetya.

Page 30: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

CCleanup: A Vast Number of Machines at Risk

CCleaner Command and Control Causes Concern

Page 31: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Digital Signature of CCleaner 5.33• presence of a valid digital may be indicative of

a larger issue that resulted in portions of the development or signing process being compromised

• this certificate should be revoked and untrusted moving forward

Compilation Artifact• likely an attacker compromised a portion of

development or build environment • Leveraged access to insert malware into the

CCleaner build that was released and hosted by the organization

Page 32: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Data Collected on Infected SystemsInstalled Programs Process List

Page 33: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

Targeted to Tech Companies2nd Stage only delivered to 23 specific domains

Database Tracked 2nd Stage Delivery

No Cisco Devices Delivered 2nd Stage

Page 34: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

250+Full Time Threat Intel Researchers

MILLIONSOf Telemetry Agents

4Global Data Centers

1100+Threat Traps

100+Threat Intelligence Partners

THREAT INTEL

1.5 MILLIONDaily Malware Samples

600 BILLIONDaily Email Messages

16 BILLIONDaily Web Requests

Honeypots

Open Source Communities

Vulnerability Discovery (Internal)

Product Telemetry

Internet-Wide Scanning

20 BILLIONThreats Blocked

INTEL SHARING

TALOS INTEL BREAKDOWN

Customer Data Sharing Programs

Service Provider Coordination Program

Open Source Intel Sharing

3rd Party Programs (MAPP)

Industry Sharing Partnerships (ISACs)

500+Participants

Page 35: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

MULTI-TIERED DEFENSE

Cloud to Core Coverage• WEB: Reputation, URL Filtering, AVC• END POINT: Software – ClamAV, Razorback, Moflow• CLOUD: FireAMP & ClamAV detection content• EMAIL: Reputation, AntiSpam, Outbreak Filters• NETWORK: Snort Subscription Rule Set, VDB –

FireSIGHT Updates & Content, SEU/SRU Product Detection & Prevention Content

• Global Threat Intelligence Updates

Page 36: A Talos Look into the Evolving Threat Landscape · A Talos Look into the Evolving Threat Landscape Earl Carter Senior Threat Researcher. Today’s Plan • Threat Landscape • Attack

talosintelligence.com@talossecurity

@kungchiu