Slides Deck 1

download report

Transcript Slides Deck 1

Advanced Persistent Threat

Sachin Deshmanya & Srinivas Matta © Copyright 2011 EMC Corporation. All rights reserved.

1

Agenda

• Defining APT • Evolution of threat models • Intention of such threats • How to gear up for such a threat © Copyright 2011 EMC Corporation. All rights reserved.

2

What is APT

• • Advanced – – – Sophisticated.

Targeted.

With a purpose.

Persistent – – Continued efforts to achieve the goal.

Month after month, even years.

• Threat – – Are resourceful, capable.

Are determined to achieve the goals.

© Copyright 2011 EMC Corporation. All rights reserved.

3

Intrusion kill chain

Chain is a series of process such as find, fix, track, target, engage and assess. So find the targets for engagement, fix their location, track and keep an eye, target with suitable weapon, engage, assess the effects. This is called a chain because any interruption breaks the entire process.

Different Stages

Reconnaissance Weaponization Research, identification and selection of targets.

Coupling a remote access Trojan with an exploit into a deliverable payload.

Delivery Exploitation Installation Command and Control Transmission of weapon into the target network.

Once a weapon is delivered, the intruders code exploits a vulnerability of an application OR operating system.

Installation of remote access Trojan, allows backdoor entry.

Compromised host forms a channel to controlled servers.

Actions on objectives © Copyright 2011 EMC Corporation. All rights reserved.

Once the above phases are complete, intruders take actions to achieve original goal.

4

Differentiator, evolution of threats

Traditional Virus/Malware APT

Target random networks/hosts.

Target specific network/hosts.

Probably of getting detected are high by AV as their signatures get detected.

Combination of malware used, signatures go undetected because of this.

The effects become visible over a period of time, as large network/hosts get infected.

The idea is to lay low over a significant period of time.

A good firewall OR intrusion detection system can prevent entry by signature checking.

Carrier is mostly through content, which uses well known ports (80, 443 etc.) and known protocol http, https etc.

© Copyright 2011 EMC Corporation. All rights reserved.

5

Different techniques used in an APT

• Social engineering emails • Spear phishing emails © Copyright 2011 EMC Corporation. All rights reserved.

6

Different techniques used in an APT

• Zero Day exploits © Copyright 2011 EMC Corporation. All rights reserved.

7

Am I a APT victim, how to gear up?

• How to figure out you are a victim of APT attack?

• What to look out for?

• • • • • • May get unnoticed by a single AV/IDS.

Analyzing network layered packets is good way to start.

Log analyses from various sources with co-relation should help.

Monitoring end points for suspicious behavior.

Good asset management should be in place, guard critical systems.

Monitoring critical asset’s is very important.

Finding needle in a hay stack.

© Copyright 2011 EMC Corporation. All rights reserved.

8

Am I a APT victim, how to gear up?

• What to look out for?

• Multi layered defense is needed.

• We are moving towards intelligence driven security systems.

© Copyright 2011 EMC Corporation. All rights reserved.

9

RSA Security Analytics

RSA Security Analytics gives security teams the ability to unleash their full potential and stand tall against today’s attackers by evolving from a traditional log-centric approach to one with better visibility, analysis, and workflow © Copyright 2011 EMC Corporation. All rights reserved.

10