intercept x is sophos answer to ransomware

21
Intercept X is Sophos answer to ransomware Joanna Wziątek-Ładosz Sales Engineer, Sophos

Upload: hoangbao

Post on 14-Feb-2017

222 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Intercept X is Sophos answer to ransomware

InterceptXisSophosanswertoransomware

JoannaWziątek-ŁadoszSalesEngineer,Sophos

Page 2: Intercept X is Sophos answer to ransomware

You’rebeinghacked…..

1983199519992001201020112015

“TRUTH IS STRANGER THAN FICTION”

Page 3: Intercept X is Sophos answer to ransomware

3

MelissaVirus

1998

$1.2B

LoveLetterWorm

$15B

1999

$2.3B

2007

$800M

2014

LockyRansomware

$1.1B

2016

FinFischerSpyware

2003

$780M

ExploitasaService

$500M

2015

TRADITIONAL MALWARE ADVANCED THREATS

TheEvolutionofEndpointThreatsFromMalwaretoExploits

Page 4: Intercept X is Sophos answer to ransomware

TRADITIONAL MALWARE ADVANCED THREATS

TheEvolutionofSophosEndpointSecurityFromAnti-MalwaretoAnti-ExploittoNext-Generation

ExposurePrevention

URLBlockingWebScripts

DownloadRep

Pre-ExecAnalytics

GenericMatchingHeuristicsCoreRules

File-Scanning

SignaturesKnownMalwareMalwareBits

Run-Time

SignaturelessBehaviorAnalyticsRuntimeBehavior

ExploitDetection

TechniqueIdentification

Page 5: Intercept X is Sophos answer to ransomware

EXECUTABLEFILES

MALICIOUSURLS

UNAUTHORIZEDAPPS

REMOVABLEMEDIA

EXPLOITPREVENTION

MSFILES&PDF

!

ADVANCEDCLEAN

RANSOMWAREPREVENTION

INCIDENTRESPONSE

DETECT RESPONDPREVENTBEFORE IT REACHES DEVICE BEFORE IT RUNS ON DEVICE

SOPHOS NEXT GENERATION ENDPOINT DETECTION AND RESPONSE

90%OF DATA BREACHES AREFROM EXPLOITS KITS

90%OF EXPLOIT KITS ARE BUILTFROM KNOWN VULNERABILITIES

AND YET…MORE THAN 60%OF ITSTAFFLACK INCIDENT RESPONSE SKILLS

Page 6: Intercept X is Sophos answer to ransomware

Anatomyofaransomware attack

Andgone

Theransomwarewillthendeleteitselfleavingjusttheencryptedfilesandransomnotesbehind.

Ransomdemand

Amessageappearsontheuser’sdesktop,explaininghowaransom(oftenintheformofbitcoins)canbepaidwithinatimeframe ofe.g.72hourstoenabledecryptionofthedatawiththeprivatekeythatonlytheattacker’ssystemhasaccessto.

Encryptionofassets

Certainfilesarethenencryptedonthelocalcomputerandonallaccessiblenetworkdriveswiththispublickey.AutomaticbackupsoftheWindowsOS(shadowcopies)areoftendeletedtopreventdatarecovery.

Contactwiththecommand&controlserveroftheattacker

TheransomwaresendsinformationabouttheinfectedcomputertotheC&Cserveranddownloadsanindividualpublickeyforthiscomputer.

Installationviaanexploitkitorspamwithaninfectedattachment

Onceinstalledtheransomwaremodifiestheregistrykeys

Page 7: Intercept X is Sophos answer to ransomware

2mainvectorsofattack

• SPAM (viasocialengineering)○ Seeminglyplausiblesender○ Hasattachmente.g.invoice,parceldeliverynote○ Theattachmentcontainsanembeddedmacro○ Whentheattachmentisopenedthemacrodownloads

andthenexecutestheransomwarepayload○ UsedbyLocky,TorrentLocker,CTB-Locker

• Exploitkits○ Blackmarkettoolsusedtoeasilycreateattacksthat

exploitknownorunknownvulnerabilities(zero-day)○ ClientsidevulnerabilitiesusuallytargettheWebbrowser○ UsedbyAngler,CryptoWall,TeslaCrypt,CrypVault,

ThreatFinder

Page 8: Intercept X is Sophos answer to ransomware

AcommonLocky attack

• Youreceiveanemailcontaininganattacheddocument.o Thedocumentlookslikegobbledegook.o Thedocumentadvisesyoutoenablemacros“ifthedataencodingisincorrect.”

o Thecriminalswantyoutoclickonthe'Options'buttonatthetopofthepage.

• OnceyouclickOptions,Locky willstarttoexecuteonyourcomputer.• Assoonasitisreadytoaskyoufortheransom,itchangesyourdesktopwallpaper.• Theformatofthedemandvaries,buttheresultsarethesame.

Page 9: Intercept X is Sophos answer to ransomware

Introducing

Page 10: Intercept X is Sophos answer to ransomware

IntroducingSophosInterceptX

ADVANCEDMALWARE

ZERODAYEXPLOITS

LIMITEDVISIBILITY

Anti-Exploit

PreventExploitTechniques• SignaturelessExploitPrevention• ProtectsPatient-Zero/Zero-Day• BlocksMemory-ResidentAttacks• TinyFootprint&LowFalsePositives

NoUser/PerformanceImpactNoFileScanningNoSignatures

AutomatedIncidentResponse• ITFriendlyIncidentResponse• ProcessThreatChainVisualization• PrescriptiveRemediationGuidance• AdvancedMalwareClean

Root-CauseAnalysis

FasterIncidentResponseRoot-CauseVisualizationForensicStrengthClean

DetectNext-GenThreats• StopsMaliciousEncryption• BehaviorBasedConviction• AutomaticallyRevertsAffectedFiles• IdentifiessourceofAttack

Anti-Ransomware

PreventRansomwareAttacksRoll-BackChanges

AttackChainAnalysis

Page 11: Intercept X is Sophos answer to ransomware

AnatomyofaRansomware Attack

ExploitKitorSpamwithInfection

Command&ControlEstablished

LocalFilesareEncrypted

Ransomwaredeleted,Ransom

Instructionsdelivered

CryptoGuard

• SimpleandComprehensive

• UniversallyPreventsSpontaneousEncryptionofData

• RestoresFilestoKnownState

• SimpleActivationinSophosCentralCRYPTOGUARD

Page 12: Intercept X is Sophos answer to ransomware

CryptoGuard- InterceptingRansomware

Monitorfileaccess• Ifsuspicious filechangesaredetected,filecopiesarecreated

Attackdetected• Malicious processisstoppedandweinvestigatetheprocesshistory

Rollbackinitiated• Originalfilesrestored• Maliciousfilesremoved

Forensicvisibility• User message• Adminalert• Root causeanalysisdetailsavailable

Page 13: Intercept X is Sophos answer to ransomware

NEW – Anti-ExploitAttackPrevention• Providesadvancedexploitprotectionbyfocusingon

commontechniquesusedbyattackers• Protectsapplicationsagainstzero-dayexploits,malicious

traffic,andprocessbreaches

UpdatedEndUser AgentUI UpdatedAdminUI

Page 14: Intercept X is Sophos answer to ransomware

Root-CauseAnalyticsUnderstandingtheWho,What,When,Where,WhyandHow

WhatHappened?• RootCauseAnalysis

• Automaticreport@theprocess/threat/registrylevel• 90Daysofhistoricalreporting• DetailedVisualrepresentationofwhatotherassetshavebeentouched

WhatisatRisk?• CompromisedAssets

• Comprehensivelistofbusinessdocuments,executables,librariesandfiles• Anyadjacentdevice(i.e.,mobile)ornetworkresourceswhichmaybeatrisk

FuturePrevention• SecurityPosture

• Recommendationsbasedonhistoricalsecurityrisks• Providesstepstopreventfutureattacks• RichreportingofCompliancestatus

Page 15: Intercept X is Sophos answer to ransomware

RootCauseAnalysisInterface

15

Page 16: Intercept X is Sophos answer to ransomware

InterceptingExploits

ExploitPrevention• Monitorsprocessesforattempteduseofexploittechniquese.g Bufferoverflow,codeinjection,stackpivotandothers

• Blockswhentechniqueisattempted

• Malwareispreventedfromleveragingvulnerabilities

?

Page 17: Intercept X is Sophos answer to ransomware

SophosCleanMalwareRemoval.VulnerabilityAssessment.

• 100%AutomatedwithInterceptX• AlsoavailableasastandaloneForensicCleanUtility

RemovesThreats• DeepSystemInspection• RemovesMalwareRemnants• FullQuarantine/Removal• EffectiveBreachRemediation

On-DemandAssessment• IdentifiesRiskyFiles/Processes• ConstantlyRefreshedDatabase• ProvidesAdditionalConfidence• Command-LineCapable

Page 18: Intercept X is Sophos answer to ransomware

SophosInterceptX– TwoWaystoPlay

• Purposebuilttocomplimentandenhance”traditionalAV”solutions• Securityfocusedonexploittechniques,notmerelythetoolsused• DesignedfortheITGeneralist.PowerfulenoughfortheInfo-SecProfessional

The“UltimateBundle”• CentralEndpointAdvancedAdd-OnProduct• “UltimatePromo”Bundle– Contactre:Discount• UpgradestheEndpointtoaSingleAgent

ExistingAV?BetterTogether• ComplimentsandenhancestraditionalAV• AddsLevelsofProtectioncurrentlylacking• ProvidesaForensic-LevelClean

Page 19: Intercept X is Sophos answer to ransomware

IntroducingSophosInterceptX

ADVANCEDMALWARE

ZERODAYEXPLOITS

LIMITEDVISIBILITY

Anti-Exploit

PreventExploitTechniques• SignaturelessExploitPrevention• ProtectsPatient-Zero/Zero-Day• BlocksMemory-ResidentAttacks• TinyFootprint&LowFalsePositives

NoUser/PerformanceImpactNoFileScanningNoSignatures

AutomatedIncidentResponse• ITFriendlyIncidentResponse• ProcessThreatChainVisualization• PrescriptiveRemediationGuidance• AdvancedMalwareClean

Root-CauseAnalysis

FasterIncidentResponseRoot-CauseVisualizationForensicStrengthClean

DetectNext-GenThreats• StopsMaliciousEncryption• BehaviorBasedConviction• AutomaticallyRevertsAffectedFiles• IdentifiessourceofAttack

Anti-Ransomware

PreventRansomwareAttacksRoll-BackChanges

AttackChainAnalysis

Page 20: Intercept X is Sophos answer to ransomware

You’rebeinghacked…..

1983199519992001201020112015

“TRUTH IS STRANGER THAN FICTION”

Page 21: Intercept X is Sophos answer to ransomware

21