supercharge your soc · 2/23/2019  · dns tunneling apts targeted campaigns false positives <...

53
1 ©2019 Check Point Software Technologies Ltd. Eytan Segal, Head of Product Management Avishai Duer, R&D Director with InfinitySOC SUPERCHARGE YOUR SOC

Upload: others

Post on 29-Sep-2020

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

1©2019 Check Point Software Technologies Ltd.

Eytan Segal, Head of Product Management

Avishai Duer, R&D Director

with InfinitySOC

SUPERCHARGE YOUR SOC

Page 2: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

2©2019 Check Point Software Technologies Ltd.

A customer story…

Page 3: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

3©2019 Check Point Software Technologies Ltd.

A GLOBAL MANUFACTURING COMPANY

• HQ in EU

• 20K employees, €2B revenue

• 24x7 SOC

Page 4: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

4©2019 Check Point Software Technologies Ltd.

• Ryuk ransomware outbreak

• 500 systems are down

• Production is paralyzed

FEBRUARY 23, 2019

EMERGENCY CALL

(we’ll skip the story on how we saved them…)

Why did this happen???

Page 5: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

5©2019 Check Point Software Technologies Ltd.

Feb 2019Jan 2019Dec 2018Nov 2018Oct 2018

Threat actor uses Trickbot to

deploy Ryuk ransomware

Spear-phishingemail leads to

Trickbot Trojan Infection

Trickbot lateral movement infects 500 hosts

How did the SOC miss it?

Page 6: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

6©2019 Check Point Software Technologies Ltd.

SOCs know they have a problem!

Check Point survey, n=199

53% of SOCsRate their own operation as immature

Page 7: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

7©2019 Check Point Software Technologies Ltd.

SOC teams face formidable challenges

Not enough skilled people

Too many alerts,

too many false positives

Lack of insights & actionable

information

Result: critical attacks are missed, until it’s too late

Page 8: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

8©2019 Check Point Software Technologies Ltd.

SUPERCHARGE YOUR SECURITY OPERATIONS

Introducing

BETA

Page 9: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

9©2019 Check Point Software Technologies Ltd.

Actionable Insights

BOOST INVESTIGATION AND RESPONSE

AccelerateInvestigation

Effective Response & Prevention

BETA

Page 10: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

10©2019 Check Point Software Technologies Ltd.

Automate & integrate

API

Rich native experience in Infinity Portal

Web UI

Maintainanalyst workflow

SIEM

INTEGRATES WITH YOUR SOC

BETA

Page 11: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

11©2019 Check Point Software Technologies Ltd.

Actionable Insights

AccelerateInvestigation

Effective Response & Prevention

BOOST INVESTIGATION AND RESPONSE

BETA

Page 12: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

12©2019 Check Point Software Technologies Ltd.

How do you expose a host that’s infected with stealth malware?

50M logs/day

YOUR NETWORK

10,000 hosts

SIEM

Page 13: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

13©2019 Check Point Software Technologies Ltd.

Log correlation

Traditional approaches fail

Anomaly detection

EXPOSING ATTACKS

Too many false positives

Correlation rules miss events

Page 14: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

14©2019 Check Point Software Technologies Ltd.

Accurately exposing stealth attacks

1. Learn from ThreatCloud

2. Apply to customer events

3. Customer feedback loopAI model

Exposehidden attacks

Page 15: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

15©2019 Check Point Software Technologies Ltd.

100+ SOC

operations for ML training

7000+infected

hosts found

68%Remediation

under 24 hours

Page 16: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

16©2019 Check Point Software Technologies Ltd.

Connection rate

Connection time

Repetitive connections

Number of sessions

Volume of data sent

Harnessing AI for big data analysis

1. LEARN

AI model

events from benign hosts

events from infected hostsmillions of events

Learnevent patterns

Page 17: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

17©2019 Check Point Software Technologies Ltd.

AI model

Harnessing AI for big data analysis

1. LEARNevents from benign hosts

events from infected hostsmillions of events

2. EXPOSE

Learnevent patterns

AI model

Customer events Expose

hidden attacks

Page 18: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

18©2019 Check Point Software Technologies Ltd.

Exposehidden attacks

Accurately exposing stealth attacks

Page 19: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

19©2019 Check Point Software Technologies Ltd.

Exposehidden attacks

Accurately exposing stealth attacks

Infected hosts

Compromised cloud assets

DNS tunneling

APTs

Targeted campaigns

False Positives < 1%

Page 20: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

20©2019 Check Point Software Technologies Ltd.

Page 21: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

21©2019 Check Point Software Technologies Ltd.

What if an attack lives outside your network?

Phishing campaigns

Targeting customers

Brand impersonation

Page 22: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

22©2019 Check Point Software Technologies Ltd.

Exposing brand impersonation attacks

• Domain registration

• URLs seen in the wild

• Reputation & intelligenceTextual similarity

Visual analysis

Domain attributes

InfinitySOCExpose

brand impersonations

CustomerDomains

Page 23: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

23©2019 Check Point Software Technologies Ltd.

Exposebrand

impersonations

Page 24: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

24©2019 Check Point Software Technologies Ltd.

Exposebrand

impersonations

Uncover real attacks

Automated visual triage

Detailed domain analytics

Domain takedown service

Page 25: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

25©2019 Check Point Software Technologies Ltd.

Page 26: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

26©2019 Check Point Software Technologies Ltd.

Actionable Insights

BOOST INVESTIGATION AND RESPONSE

Expose attacks in your network

Expose attacks outside your network

BETA

Page 27: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

27©2019 Check Point Software Technologies Ltd.

Actionable Insights

AccelerateInvestigation

Effective Response & Prevention

BOOST INVESTIGATION AND RESPONSE

BETA

Page 28: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

28©2019 Check Point Software Technologies Ltd.

How can you understandwhat you’re dealing with?

Page 29: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

29©2019 Check Point Software Technologies Ltd.

The traditional approach…

Spend a lot of time

on complex manual investigation

Page 30: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

30©2019 Check Point Software Technologies Ltd.

Accelerate investigationswith ThreatCloud

Page 31: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

31©2019 Check Point Software Technologies Ltd.

Leverage the power of ThreatCloud

F E E D S

• CERTS• Law enforcement• Partnerships• Cyber Threat Alliance

A I E N R I C H M E N T

• Attack campaigns hunting• Phishing analysis• Malware DNA• Context aware detection• DGA

RESEARCH & ANALYSIS

Devices

Gateways

V I S I B I L I T Y

Cloud

10

0’s

mill

ion

s

Page 32: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

32©2019 Check Point Software Technologies Ltd.

A portal into ThreatCloud

Search for any indicator

Activity timeline

Check Point Research insights

OSINT

Known attack surfaces

Geographical spread

Supercharge your investigation with contextualized threat intelligence

Page 33: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

33©2019 Check Point Software Technologies Ltd.

Page 34: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

34©2019 Check Point Software Technologies Ltd.

Page 35: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

35©2019 Check Point Software Technologies Ltd.

Page 36: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

36©2019 Check Point Software Technologies Ltd.

Analysts access Threat Emulation

reports from InfinitySOC

Page 37: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

37©2019 Check Point Software Technologies Ltd.

Accelerate investigationwith automated endpoint forensics

Page 38: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

38©2019 Check Point Software Technologies Ltd.

AUTOMATED FORENSICS ANALYSIS

[Restricted] ONLY for designated groups and individuals

GENERATED AUTOMATICALLY

ACTIONABLE INFORMATION

Instant visibility to what you need to

know

Interactive Attack Summary

Avoids expensive manual analysis of raw forensic data

Triggered for All Events

Page 39: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

39©2019 Check Point Software Technologies Ltd.

Endpoint Forensics demo

Page 40: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

41©2019 Check Point Software Technologies Ltd.

Page 41: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

43©2019 Check Point Software Technologies Ltd.

Accelerate investigationswithin your SIEM

Page 42: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

44©2019 Check Point Software Technologies Ltd.

We support your environment

Infinity SOC platform

AutomateInfinity Portal

Our native UI platform

AP

I

sysl

og

SIEM

Splunk

Qradar

ArcSight

Logrithm

Splunk app

Page 43: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

45©2019 Check Point Software Technologies Ltd.

Distillcritical events

Accelerate investigation withInfinitySOC Splunk app

OPTIMIZED FOR SOC ANALYSTS

Threat Emulation

reports

MITRE Att&ck analysis

Page 44: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

46©2019 Check Point Software Technologies Ltd.

Page 45: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

47©2019 Check Point Software Technologies Ltd.

AccelerateInvestigation

BOOST INVESTIGATION AND RESPONSE

ThreatCloud investigation

Threat hunting

Automated forensic analysis

SIEM integration

BETA

Page 46: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

48©2019 Check Point Software Technologies Ltd.

Actionable Insights

AccelerateInvestigation

Effective Response & Prevention

BOOST INVESTIGATION AND RESPONSE

BETA

Page 47: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

49©2019 Check Point Software Technologies Ltd.

Containment & Remediation

Network & Cloud Security

Endpoint Security

Isolate infected hosts

Contain: Prevent C&C communications

Contain: Prevent lateral movement

Recover from ransomware

Remediate infections

AUTOMATE

Page 48: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

50©2019 Check Point Software Technologies Ltd.

PREVENTION FIRST

DETECTION PREVENTION

80% 20%20% 80%0 100

Page 49: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

51©2019 Check Point Software Technologies Ltd.

Best Security starts with Best In Class Prevention

Page 50: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

52©2019 Check Point Software Technologies Ltd.

IoC Enforcement

IoCsIoCsIoCsIoCs

Simple indicator dissemination across organizationEnforcement of new prevention controls

Your SOC IoCs

Page 51: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

57©2019 Check Point Software Technologies Ltd.

Page 52: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

58©2019 Check Point Software Technologies Ltd.

Effective Response & Prevention

AccelerateInvestigation

Actionable Insights

BOOST INVESTIGATION AND RESPONSE

BETA

Join Infinity SOC EA [email protected]

Page 53: SUPERCHARGE YOUR SOC · 2/23/2019  · DNS tunneling APTs Targeted campaigns False Positives < 1% ... Detailed domain analytics Domain takedown service ©2019 Check Point Software

60©2019 Check Point Software Technologies Ltd.

SUPERCHARGE YOUR SECURITY OPERATIONS

BETA