comesa cybersecurity

22
Zero day attacks anatomy & countermeasures By Cade Zvavanjanja Cybersecurity Strategist

Upload: cade-zvavanjanja

Post on 14-Apr-2017

135 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: comesa cybersecurity

Zero day attacks anatomy

& countermeasures

ByCade Zvavanjanja

Cybersecurity Strategist

Page 2: comesa cybersecurity

Question?• How do you secure against something Your security system can’t capture, your

experts don’t know , your vendors don’t know and the tech community doesn’t know?

~ Which is only known by the attacker(s)!

Page 3: comesa cybersecurity

Outline:• Key terms• Anatomy of Zero days• Attack methodology• Zero day attack(s) Countermeasures• Way forward• Economics of cybersecurity• Q & A• References

Page 4: comesa cybersecurity

Key term(s):

• Zero-day exploits are cyber-attacks against software/hardware vulnerabilities that are unknown and have no patch or fix.

Page 5: comesa cybersecurity

Introduction:•Traditional security tools rely on malware binary signatures or the reputation of outside URLs and servers. By definition, these defenses identify only known, confirmed threats. •At the same time, operating system-level protections such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) are becoming less effective

Page 6: comesa cybersecurity

Intro Cont….•An attacker can easily hijack a legitimate website to bypass a blacklist. •Code morphing and obfuscation techniques generate new malware variants faster than traditional security firms can generate new signatures. •And spam filters will not stop lowvolume, targeted spear-phishing attacks.•ASLR bypassing methods to neutere once-effective safeguard.

Page 7: comesa cybersecurity

Intro Cont….• Zero day attacks are rising in prominence• They tend to be behind the most

devastating attacks these days• Generally used by very high end criminals

and nation states• You usually don’t know about the attack unless there are other indicators

Page 8: comesa cybersecurity

Key term(s)

Page 9: comesa cybersecurity

Lifespan of Zero-day:•typical zero-day attack lasts an average of eight months—and can last close to three years in some cases. That gives attacks ample time to steal organizations’ most valuable assets and leave before anyone knows what happened.•Not surprisingly, zero-day exploits are heavily used in targeted attacks. These secret weapons give attackers a crucial advantage over their targets.

Page 10: comesa cybersecurity
Page 11: comesa cybersecurity

Zero Day Anatomy

Page 12: comesa cybersecurity

Introduction

Page 13: comesa cybersecurity

Threat landscape:

Page 14: comesa cybersecurity

Countermeasures:

Page 15: comesa cybersecurity
Page 16: comesa cybersecurity
Page 17: comesa cybersecurity

Way Forward

Page 18: comesa cybersecurity

Economics of Cybersecurity

Page 19: comesa cybersecurity

• What is the ratio between events received and action taken?

• What is the efficacy level in the events & incidents you identify (i.e. the real cyber attack event to false positive ratio)?

• How many cycles do you iterate through to get from an event(s) to an action; is it timely and cost efficient? (Can you rank the processes/tools you leverage today in terms of man-hours and skills required to get to to action?)

Page 20: comesa cybersecurity

• Do you align, prioritize and qualify events against against business goals and impact (How many cycles does this take)?

• Make the assessment using the framework & success criteria below to evaluate the key time and cost multipliers in your event/incident security process, so you can validate the economic value that comes from the processes and tools you leverage today, to see which are effective and which are not?

Page 21: comesa cybersecurity

Q& A: Thank You

Cade ZvavanjanjaDirector - Zimbabwe Cybersecurity

[email protected]

+263 773796365

Page 22: comesa cybersecurity

References•Zero Day Malware Threat Prevention Ensuring Document Safety with Outside In Clean Content Oracle brief | july 2015 •The Best Defenses Against Zero-day Exploits for Various-sized Organizations SANS I September 21st 2014: David Hammarberg•http://www.trapx.com/wp-content/uploads/2015/02/Anatomy-of-Attack__Zombie-Zero.pdf•http://www.industryweek.com/rockwell-connected-industrial-enterprise/cyber-threats-hiding-targeting-valuable-assets• Internet Security Threat ReportInternet Report Symatic, APRIL 2016•https://www2.fireeye.com/rs/848-DID-242/images/wp-zero-day-danger.pdf• k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks •A Review on Zero Day Attack Safety Using Different Scenarios 2015 Harshpal R Gosavi and Anant M Bagade•Detection and Prevention of Unknown Vulnerabilities on Enterprise IP Networks IJRITCC | February 2015, Vincy Rose Chacko• Regulating the zero-day vulnerability trade: a preliminary analysis 2014: mailyn fidler