+ All Categories
Home > Documents > Temet Nosce: Know Thy Endpoint Through and … Nosce: Know Thy Endpoint Through and Through Thomas...

Temet Nosce: Know Thy Endpoint Through and … Nosce: Know Thy Endpoint Through and Through Thomas...

Date post: 28-Mar-2018
Category:
Upload: doxuyen
View: 226 times
Download: 2 times
Share this document with a friend
10
Temet Nosce: Know Thy Endpoint Through and Through Thomas V. Fischer
Transcript
Page 1: Temet Nosce: Know Thy Endpoint Through and … Nosce: Know Thy Endpoint Through and Through Thomas V. Fischer I am … Threat Researcher 25+ years experience in InfoSec Spent number

Temet Nosce: Know Thy Endpoint Through and Through Thomas V. Fischer

Page 2: Temet Nosce: Know Thy Endpoint Through and … Nosce: Know Thy Endpoint Through and Through Thomas V. Fischer I am … Threat Researcher 25+ years experience in InfoSec Spent number

I am …

Threat Researcher

25+ years experience in InfoSec

Spent number years in IR team positions

Contact • [email protected]

[email protected]

• @Fvt

Page 3: Temet Nosce: Know Thy Endpoint Through and … Nosce: Know Thy Endpoint Through and Through Thomas V. Fischer I am … Threat Researcher 25+ years experience in InfoSec Spent number

A Journey

Transformation of a tool

Real time actionable intelligence

(re)Enabling the end point as an active defence mechanism

Detecting behaviour…

Public 3

Page 4: Temet Nosce: Know Thy Endpoint Through and … Nosce: Know Thy Endpoint Through and Through Thomas V. Fischer I am … Threat Researcher 25+ years experience in InfoSec Spent number

Are we in the Wrong Place

Network based solutions

Post incident end point technology

Forensics ~ what changed != necessarily what happened

Public 4

Page 5: Temet Nosce: Know Thy Endpoint Through and … Nosce: Know Thy Endpoint Through and Through Thomas V. Fischer I am … Threat Researcher 25+ years experience in InfoSec Spent number

Those Cool Tools…

Current Arsenal & Key Tools

Procexp; procmon; tcpview

Public 5

Page 6: Temet Nosce: Know Thy Endpoint Through and … Nosce: Know Thy Endpoint Through and Through Thomas V. Fischer I am … Threat Researcher 25+ years experience in InfoSec Spent number

Single Footprint Intelligence

Arsenal tools on steroids

High level of visibility: • File ops

• Network ops

• Registry ops

• DLL activity

• Process data

Application DNA ~ identifiable events

Public 6

Page 7: Temet Nosce: Know Thy Endpoint Through and … Nosce: Know Thy Endpoint Through and Through Thomas V. Fischer I am … Threat Researcher 25+ years experience in InfoSec Spent number

Real Time Forensics Evidence

Detect compromise events

Log the foot prints

Public 7

Page 8: Temet Nosce: Know Thy Endpoint Through and … Nosce: Know Thy Endpoint Through and Through Thomas V. Fischer I am … Threat Researcher 25+ years experience in InfoSec Spent number

Initial Entry Vector Entry Vector Attack (EVA) Alert Subsequent Attack Stages Indicator of Compromise Alert

Base Rules Correlated Alerts Base Rules – Exploit/Installation Correlated AlertsBase Rules - Recon Base Rules – C&C

Em

ail –

Ma

licio

us

PD

F

Co

rre

late

d A

lert

s

Em

ail –

Ma

licio

us

Off

ice

Fil

e

Co

rre

late

d A

lert

s

Bas

e R

ule

s

Co

rre

late

d A

lert

s

ATP522-Email attachment saved

via Outlook

ATP521-Email attachment saved

via Outlook (tagged)

ATP505-User double-clicks on

Outlook attachment

ATP506-Office app opens

attachment via Outlook

ATP8003-Office opens email attachment

ATP523-Office opens saved email

attachment

ATP307-Office spawns CMD or Powershell via

WSH

ATP103-Office macro call ing

WSH

ATP507-Office macro call ing

WMI

ATP306-WMI spawns CMD or

PowershellATP906-

Suspected Office macro phishing

ATP9005-Office executes code

ATP1010-Detect both RTLO and

LTRO in file

ATP505-User double-clicks on

Outlook attachment

ATP101-Acrobat opens PDF

attachment via Outlook

ATP102-Acrobat process tree saving EXE

ATP304-CMD running batched

commands

ATP405-Process launched from

CMD or Powershell

ATP522-Email attachment saved

via Outlook

ATP521-Email attachment saved

via Outlook (tagged)

ATPxxxx-Acrobat opens saved email

attachment

ATPxxxx-Acrobat opens email attachment

ATPxxxx-Acrobat executes code

ATP904-Suspected PDF phishing attack

ATP1011-Detect multiple spaces

before executable

ATP1012-Detect RTLO in File

ATP1014-Create c:\program.exe

ATP9201-IOC Persistence

Detected

ATP3101-Execute c:\program.exe

file

ATP3212-SVCHOST not

child process of services.exe

ATP1204-Suspicious

process modifying local hosts file

ATP3103-Application with

obfuscated extension launch

ATP9102-GEN.IOC Process

ATP9101-GEN.IOC File Manipulation

ATP2101-SMB scanning over short period ATP9xxx-Indicator

of Infection Detected

ATP9104-IOC.NET Enumeration

ATP2xxx-Port scanning detected

ATP9202-IOC Network Activity

DetectedATP2xxx-NET.OUT Malicious

component list

ATP2xxx-NET.OUT Malicious

component l ist

ATP9103-GEN.IOC Outbound Network

ATP2xxx-Suspicious child process creating

network op ATP2xxx-High risk application netop after suspicious

event

ATP9xxx-Correlated IOC

Alert

The correlated IOC alert triggers from an IOC alert

that then looks to see if an EVA triggered, and if so,

alerts itself

If IOC Alert fired, check for EVA

fired. If yes, fire correlated IOC

Alert

Likelybenign

Almost

certainly

malicious

Definitely

malicious

Riskofdata

exfiltration

It’s Doing This so Probably Suspicious

Enable behavioural analysis

phishing :- (a+b),(c,(d|e)),!(x,y,z)

Response ? Kill any point in the chain

Public 8

Page 9: Temet Nosce: Know Thy Endpoint Through and … Nosce: Know Thy Endpoint Through and Through Thomas V. Fischer I am … Threat Researcher 25+ years experience in InfoSec Spent number

Keeping the Story Alive

Increase Visibility: • More DLL events

• Memory events

Capture More…

Public 9


Recommended