bsides 2016 presentation

22
Defending Against APT’s (Advanced Persistent Threats) Presented By: Angelo Rago Twitter: @arrago2 E-mail: [email protected]

Upload: angelo-rago

Post on 27-Jan-2017

99 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: BSides 2016 Presentation

Defending Against APT’s(Advanced Persistent Threats)

Presented By: Angelo Rago

Twitter: @arrago2

E-mail: [email protected]

Page 2: BSides 2016 Presentation

@ARRAGO2

Disclaimer

• Please note that all opinions shared during today’s presentation are solely my own, and do not reflect those of my employer, past or future employers or my clients.

Page 3: BSides 2016 Presentation

@ARRAGO2

Learning Objectives

Understand Best Practices for Defending Against Advanced Persistent Threats

Identify and Understand Common Trends and Challenges within Infosec for 2016

Mitigation of APT’s

Page 4: BSides 2016 Presentation

@ARRAGO2

Who Am I?

• 10 Years of experience within the Infosec Industry

Fortune 500’s SMB’s Telecom Healthcare

Page 5: BSides 2016 Presentation

@ARRAGO2

What is Blue Team

Definition:

The group responsible for defending an enterprise, and maintaining its security posture against red team and actual attacks.

Page 6: BSides 2016 Presentation

@ARRAGO2

Common Challenges in Corporations

• Allocation of Resources

• Allocation of Funding

• Time Management

• Skill Shortage

Page 7: BSides 2016 Presentation

@ARRAGO2

Story Time!

A Tale of Two Clients…

• Client 1: A Ransomware Attack Gone WRONG

• Client 2: A Ransomware Attack PREVENTED

Page 8: BSides 2016 Presentation

@ARRAGO2

Look for Executables

Sniff Traffic

Analyze Logs

Identify Patterns

Identify Rogue Processes, Connections, Services, Users, Scheduled Tasks

What We Do (Defenders)

Minimize the amount of recognizable changes

Generate Minimal Traffic

Install Multiple avenues of Persistence

Continue to pervade a system and obtain persistence again if discovered

What They Do(Attackers)

Page 9: BSides 2016 Presentation

@ARRAGO2

The Technical Issues…

Passwords

Securing the Environment

Understanding the Attacker’s Goal

Page 10: BSides 2016 Presentation

@ARRAGO2

Passwords(aka where most problems stem from)

• Easy to Guess Passwords

• No Real Enforcement

• No Second Level Authentication

• Enforced Policies

Page 11: BSides 2016 Presentation

@ARRAGO2

Forget It…We’re Lazy!(aka Headaches)

• Easy To Remember

• Reuse Old Password

• Based on easily Identifiable information

• Reuse same passwords multiple places

• We Never Learn!

Page 12: BSides 2016 Presentation

@ARRAGO2

Securing the Environment(The Basics…)

Patching

Hardening

TestingLogging

Aggregate Data

Build Situational Awareness

Page 13: BSides 2016 Presentation

@ARRAGO2

• Persistence

• Data exploitation

• Find default / weak passwords

• Compromise as many systems as possible

The Attacker’s Goal

Page 14: BSides 2016 Presentation

@ARRAGO2

Lock down workstations by Group Policies

Limit network traffic

Restrict Remote SAM calls from PC’s

Disable Java

Disable Macros

Whitelist good extensions

Monitor for odd patterns or behaviors

What We Can Do Backups

Page 15: BSides 2016 Presentation

@ARRAGO2

In addition, Organizations such as NIST recommend the following to mitigate threats:

Apply Industry Best Practices

Vulnerability Scan

Use Emet

Disable Telnet

Disable HTTP

Ensure no Clear Text Passwords are used

No open WiFi

Use SSL Version 3

NIST- National Institute of Standards and Technology

Page 16: BSides 2016 Presentation

@ARRAGO2

Option 1: Minimal End User Impact

Option 2: Balanced End User Impact

Option 3: Hardened Environment (This also brings with it overhead and complexity)

Group Policies

Page 17: BSides 2016 Presentation

@ARRAGO2

A Look Back at 2016• Ransomware attacks primarily targeted Healthcare, Government,

and Educational Institutions

• Ransomware Variants: Crysis Locky Odin Cerber

Page 18: BSides 2016 Presentation

@ARRAGO2

A Look Back at 2016(Continued)

• State Sponsored Leaks

• State Sponsored Tools being sold i.e. Equation Group

Page 19: BSides 2016 Presentation

@ARRAGO2

A Look Back at 2016(Continued)

• DDOS AttacksAttackers / National States

The Good Guys

Page 20: BSides 2016 Presentation

@ARRAGO2

Where Do We Go From Here?• Ignore Everything We’ve Learned

OR• Use the Knowledge we have in front of us to create change, and

secure our environment

Page 21: BSides 2016 Presentation

@ARRAGO2

Questions?

Page 22: BSides 2016 Presentation

@ARRAGO2

Thanks for Listening!

E- Email: [email protected]

Twitter Handle: @arrago2