FROM THE FRONT LINES: M-TRENDS® 2015 © Mandiant, a FireEye Company. © Mandiant, All rights a FireEye reserved. Company. CONFIDENTIAL All rights reserved. CONFIDENTIAL 1 We Are Mandiant Expert Responders for Critical Security Incidents Full Range of Security Consulting Worldwide Presence - Mandiant is a FireEye Company - 1,500+ employees - Offices in 40+ countries © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 2 Introductions Jen Weedon Manager, Threat Intelligence 2.5 Years at Mandiant/FireEye Leads strategic analysis team Advises and briefs on cyber threat risks to public and private sector clients © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 3 Introductions Jason Rebholz Principal Consultant Five years at Mandiant - Incident Response - Forensics © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 4 Introductions Ryan Kazanciyan Technical Director Incident Response Functional Lead 5.5 years at Mandiant Co-author, “Incident Response & Computer Forensics, 3rd Ed” © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 5 Agenda By the Numbers Trend 1: Struggling with Disclosure Trend 2: Retail in the Crosshairs Trend 3: The Evolving Attack Lifecycle Trend 4: Blurred Lines – Criminal and APT Actors Take a Page from Each Others’ Playbook Q&A Note: Some information has been sanitized to protect our clients’ interests. © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 6 BY THE NUMBERS © Mandiant, a FireEye Company. © Mandiant, All rights a FireEye reserved. Company. CONFIDENTIAL All rights reserved. CONFIDENTIAL 7 Who’s a Target? © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 8 How Compromises Are Being Detected 9 © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL Dwell Time 24 days less than 2013 Longest Presence: 2,982 days © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 10 APT Phishing © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 11 TREND 1 Struggling with Disclosure © Mandiant, a FireEye Company. © Mandiant, All rights a FireEye reserved. Company. CONFIDENTIAL All rights reserved. CONFIDENTIAL 12 Trend 1: Struggling with Disclosure Mandiant worked with over 30 companies that publicly disclosed a compromise Public is asking more informed questions - Attribution - Malware - Attacker TTPs Public speculation starting to affect investigations © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 13 Why the Increase in Notifications? Mandiant worked an increased number of cases where protected data was lost - Cardholder data, Personally identifiable information (PII), and Protected Health Information (PHI) - Contractual and legal obligation to notify 69% of victims did not self-detect - Increased pressure to notify More companies willing to notify - Companies feel like it’s the right thing to do - Being a breach victim is less taboo than in the past © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 14 Critical Investigation Questions Questions you should have answers to during the investigation - How did the attacker gain initial access to the environment? - How did the attacker maintain access to the environment? - What is the storyline of the attack? - What data was stolen from the environment? - Have you contained the incident? 15 © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL The Takeaways Breaches are inevitable - Have an effective communication strategy available Consistent communication is key - Based on factual investigative findings Public speculation will happen - Avoid distracting the investigation CAUTION Investigation Hazard © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 16 TREND 2 Retail in the Crosshairs © Mandiant, a FireEye Company. © Mandiant, All rights a FireEye reserved. Company. CONFIDENTIAL All rights reserved. CONFIDENTIAL 17 Trend 2: Retail in the Crosshairs Retailers thrust into the spotlight in 2014 - Mandiant responded to many headlines New groups getting into the game Small misconfigurations led to greater compromise © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 18 Themes of Financial-Motivated Attackers in 2014 Application virtualization servers used as an entry point - Valid credentials used to authenticate - Misconfigurations / lack of network segmentation allowed greater access New tools, tactics, and procedures - Highly sophisticated malware - Publically available tools Increased number of attacks against e-commerce in locations that deployed chip-and-PIN technology - Attackers shifting focus to lowest hanging fruit © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 19 Initial Access To Environment Attacker authenticated to a virtual application server - Already had legitimate credentials, no failed logons Escaped from “jailed” environment to gain additional control over the system Misconfiguration in virtual application server resulted in greater access to environment - No segmentation Same local administrator password on all systems - Allowed attacker privileged access to systems © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 20 Lateral Movement - Forensic Artifacts Attacker used the “psexec_command” Metasploit module to execute commands on remote systems - Mimics command execution capability of the SysInternals PsExec utility Windows 7/Server 2008 System event logs tracked installation of service © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 21 Persistence - Sophisticated Malware Backdoor targeted Windows XP systems Used a sophisticated packer Backdoor gets capabilities from shellcode Ability to download additional shellcode - Makes for a versatile backdoor © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 22 Data Theft Attacker used domain controller as pivot point into retail environment - The retail domain had a two-way trust with the corporate domain - The store registers ran Microsoft Windows XP - The store registers were joined to the retail domain Deployed card harvesting malware to registers throughout the environment Malware wrote stolen track data to temporary MSSQL database Attacker queried database to collect stolen track data Transferred files off of network using FTP © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 23 A Retailer Case Study © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 24 Protect Yourself Secure remote access - Two-factor authentication required Secure access to the PCI environment - Segment the PCI environment - Require access through internal jump server Deploy application-whitelisting on critical assets - Protect the POS servers and registers Managed privileged accounts - Control access © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 25 TREND 3 The Evolving Attack Lifecycle © Mandiant, a FireEye Company. © Mandiant, All rights a FireEye reserved. Company. CONFIDENTIAL All rights reserved. CONFIDENTIAL 26 Trend 3: The Evolving Attack Lifecycle Threat actors have used stealthy new tactics to move laterally and maintain persistence in victim environments. © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 27 Attack Lifecycle © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 28 Hijacking the VPN Heartbleed vulnerability Single-factor authentication & credential theft Bypassing two-factor authentication Dumping certificates with Mimikatz (Image Source: www.darkoperator.com) © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 29 Password Harvesting “Victims quickly learned that the path from a few infected systems to complete compromise of an Active Directory domain could be incredibly short.” Clear-text passwords in memory “Golden Ticket” Kerberos attack Malicious security packages © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 30 Persisting with WMI © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 31 Persisting with WMI © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 32 Persisting with WMI © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 33 TREND 4 Blurred Lines – Criminal and APT Actors Take a Page from Each Others’ Playbook © Mandiant, a FireEye Company. © Mandiant, All rights a FireEye reserved. Company. CONFIDENTIAL All rights reserved. CONFIDENTIAL 34 Trend 4: Blurred Lines – Criminal and APT Actors Take a Page from Each Others’ Playbook As actors' tactics merge, discerning their goals becomes critical to gauging the impact of incidents. © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 35 Tactical Overlaps between Cybercriminals and APT Groups Interactive social engineering & social media presence Custom malware and tools, development on the fly Effective lateral movement and long-term persistence Repeated, wide scale data theft © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 36 From Russia with Ambiguity: Intent Matters Russia-based cyber activity - Nation state espionage - Cybercrime - Gray area... APT28 and “Sandworm” - Use of BlackEnergy (traditionally crimeware) to target Industrial Control Systems Intent & motive matters © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 37 Conclusion Organizations are under increasing pressure to disclosure details on breaches and provide attribution Retail remains a top target as attackers found more victims Threat actors have adopted stealthy new tactics to hide in compromised environments Attribution is becoming harder as the lines blur between tactics used by cyber criminals and nationstate actors © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 38 RESOURCES © Mandiant, a FireEye Company. © Mandiant, All rights a FireEye reserved. Company. CONFIDENTIAL All rights reserved. CONFIDENTIAL 39 Free Resources Available on www.mandiant.com ‒ Redline ‒ IOC Editor ‒ IOC Finder ‒ Memoryze ‒ Memoryze for Mac ‒ Highlighter ‒ ApateDNS ‒ Heap Inspector ‒ PdbXtract © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 40 Mandiant Consulting Incident Response Investigation and resolution of large-scale security breaches Security Assessments Unique offerings applying Mandiant’s specialized expertise in advanced threats to evaluate organizations' security programs, systems and processes; we can also determine if attackers are active in your network Security Transformation Development/enhancement of your security posture including security operation center (SOC) design and computer incident response team (CIRT) capabilities 41 © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL M-Trends® 2015 Download the full report at www.mandiant.com © Mandiant, a FireEye Company. All rights reserved. CONFIDENTIAL 42 THANK YOU © Mandiant, a FireEye Company. © Mandiant, All rights a FireEye reserved. Company. CONFIDENTIAL All rights reserved. CONFIDENTIAL 43
© Copyright 2024