Introducing the New Cisco PowerPoint Templates

Transcription

Introducing the New Cisco PowerPoint Templates
Protection Against Advanced
Persistent Threats
Peter Mesjar
Systems Engineer, CCIE 17428
October 2014
Agenda

Modern Threats

Advanced Malware Protection Solution

Why Cisco?
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
2
The Problem are Threats
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
3
So, What is Malware like these days?
Malware
VIRUSES
1985
MACRO
VIRUSES
1995
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
WORMS
HACKERS
SPYWARE /
ROOTKITS
APTs
MALWARE
as a
Service
Mobile
Malware
SDKS
2000
2005
2010
2013
Cisco Public
4
APT / Advanced Malware

Is now a tool for financial gain
• Uses formal Development Techniques
• Standard Sandbox aware
• Quality Assurance to evade detection
• 24/7 Tech support available
• Has become a math problem
• End Point AV Signatures ~20 Million
• Total KNOWN Malware Samples ~100 M
• AV Efficacy Rate ~50%
http://www.pcworld.com/article/2150743/antivirus-is-dead-says-maker-of-norton-antivirus.html
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
5
An Example
Out of the 45 different pieces of malware
planted on the Times‘ systems over the
course of three months, just one of those
programs was spotted by the Symantec
antivirus software the Times used... The
other 44 were only found in…post-breach
investigation months later
http://www.forbes.com/sites/andygreenberg/2013/01/31/symantec-gets-a-black-eye-in-chinese-hack-of-new-york-times/
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
6
Introducing Virtest: Virus Total’s evil twin
• Russian Malware Service
- For malware authors
(bad guys)
• Paid for services (inc bitcoins)
• 1) Upload your malware
• 2) Choose AV engine(s)
• 3) Wait…
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
7
The Reality: Organizations Are Under Attack

“95% of large companies are targeted by
malicious traffic, and 100% of organizations
have interacted with websites that host
malware.” -2014 Cisco Annual Security Report

Neiman Marcus breach
 350,000 credit cards stolen

Target Breach, December 2013
 40 million credit cards stolen
 70 million personal records stolen
…and many more
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data
Cisco Public
8
Little Focus on Response…
Prevention
Historic
investment
here
“…According to US Cert,
the average time from
breach to discover is 486
days and normally the
person breached finds out
from a 3rd party ”
US CERT
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
“Based on a forensic analysis
going back months, it appears
hackers broke into The Times
computers on Sept. 13.”
NY Times, Jan 30, 2013
Incident
Response
Need more
focus and investment
here.
Cisco Public
9
If you knew you were going to
be compromised, would you
do security differently?
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
10
The New Security Model
Attack Continuum
BEFORE
DURING
AFTER
Control
Enforce
Harden
Detect
Block
Defend
Scope
Contain
Remediate
Firewall/NGFW
VPN
NGIPS
Advanced Malware Protection
UTM
Vulnerability mgmt
Web Security
Network Behavior Analysis
Email Security
Retrospective Security
NAC + Identity Services
Visibility and Context
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
11
Advanced Malware Protection,
Solution
AFTER
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
12
We Provide Continuous
Analysis
Analysis Stops
Point-in-time Detection
Not 100%
Antivirus
Sleep Techniques
Unknown Protocols
Blind to scope of
compromise
Encryption
Polymorphism
Sandboxing
Initial Disposition = Clean
Actual Disposition = Bad = Too Late!!
Retrospective Detection,
Analysis Continues
Turns back time
Continuous
Visibility and
Control are Key
Initial Disposition = Clean
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Actual Disposition = Bad = Blocked
Addresses limitations of point-in-time detection
Cisco Public
13
Point in Time Detection…
Point-in-time security sees a
lighter, bullet, cufflink, pen &
cigarette case…
Wouldn’t it be nice to know if
you’re dealing with something
more deadly?
… vs Continuous Analysis
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
14
Our Approach for Advanced Malware Protection
Retrospective Security
• Continuous File Analytics
Network AMP
• Reputation Determination
✖
✔
Firesight management
#
Sourcefire Sensor
#
Client based AMP
AMP
Malware
license
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
No Need for Client
•
•
•
•
•
Small code (like a printer driver)
Desktop and mobile devices
Checking of file copying / execution /moving
Traps fingerprint & attributes
Cisco Public
Queries cloud for file disposition
16
When You Have Been Breached
Questions that Need Answers
The Complexity of the Problem that AMP Solves
Confirm Infection
Where do I start?
•
How did the threat get onto the
system?
•
What systems
were impacted?
•
What did the threat do?
•
How do we recover?
•
How do we keep it from
happening again?
Notification
Quarantine
Triage
Confirm
Stop
Analyze Malware
Build Test
Bed
Cannot Identify Infection
Static
Analysis
Device
Analysis
Network
Analysis
Update Profile
Malware Proliferation
Remediate
Search
Network
Traffic
Search
Device
Logs
Scan
Devices
No Infection
Infection Identified
•
Proliferation
Analysis
Malware
Profile
Define
Rules
(from
profile)
Search for Re-infection
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
17
AMP Console
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
18
19
One Step Remediation
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
20
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
21
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
22
File Trajectory
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
23
The Results

Major US utility company
• Responsible for protecting a variety of assets, including nuclear power plants
• FireAMP detected a system compromised via a remote Java exploit 2 days before the
Java exploit was announced
• Took incident response time from several hours to 15 minutes per compromised machine
• Able to rapidly determine if a user who claimed to be spearphished actually were
spearphished
• Remediated what appeared to be an internal network DoS by discovering a misconfigured
system
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
24
Private Cloud – Local Decision (VM)
Capability
Private Cloud
Public
Cloud
File/Device Trajectory
✔
✔
Threat Root Cause
✔
✔
IOC and alerting
✔
✔
Simple and Custom
detection
✔
✔
Cloud
Lookups/Retrospective
Alerting
✔
✔
File Analysis
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
* (ThreatGrid
integration)
✔
Cisco Public
25
Android : new target – Cisco Annual Security Report
Mobile devices as
targets (99% Android)
Most visible mobile
malwares
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Cloud Web Security reports
Cisco Public
27
Android Risks
• Many ways to monetize attacks
• Device often tied directly to billing system
• Easier to to locate personal data than PC
• Users often use default apps such as "Contacts" and
"Gallery” and often will store full personal data
<iframe style
• Personal information on devices often difficult to change
• Gmail email address tied to Google Play
Can be more
susceptible than PC
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
• Device identifier (phone number, mac address, IMEI,
IMSI)
• Lots of free apps readily available from Google Play
• Easy to install and try
Cisco Public
28
Why Cisco?
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
33
Sourcefire Advanced Malware Protection

Complete solution suite to protect the extended network
FireAMP for hosts, virtual
and mobile devices
Dedicated Advanced Malware
Protection (AMP) appliance
Advanced Malware Protection
for FirePOWER (NGIPS, NGFW)
Cisco Email and Web Security Appliances
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
34
NSS Labs Report
Comparative Testing on Breach Detection Systems
Who is NSS Labs?
NSS Labs, one of the best and most thorough independent
testing bodies in the industry, performed comparative
testing on Breach Detection Systems.
What was measured?
Security Effectiveness of Breach Detection Systems
•
HTTP/Email Malware, Exploits, Evasions, and False
Positive Rate
Total Cost of Ownership per protected Mbps
What Cisco-Sourcefire
products were tested?
AMP Everywhere
•
AMP for Networks and AMP for Endpoints (TCO
calculations include this set of FireAMP connectors)
•
FirePOWER 8120 (with AMP subscription)*
What competitor
products were
evaluated?
FireEye, AhnLab, Fortinet, TrendMicro, Fidelis
BDS Methodology v1.5
[The methodology] utilizes real threats
and attack methods that exist in the
wild and are actually being used by
cyber-criminals and other threat
actors. This is the real thing, not
facsimile; systems under test (SUT)
are real stacks connected to a live
internet feed.
--NSS Labs
*Dedicated AMP Appliances (AMP8150/AP7150) were not shipping at the time of the test, otherwise one would have been used
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
35
The result (1/2)
Cisco AMP is a Leader in Security Effectiveness and TCO and offers Best
Protection Value
Security Effectiveness
NSS Labs Security Value Map (SVM) for Breach Detection Systems
Cisco Advanced
Malware Protection
Best Protection Value
99.0% Breach
Detection Rating
Lowest TCO per
Protected-Mbps
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
TCO per Protected-Mbps
Cisco Public
36
The result (2/2)
Cisco AMP is a Leader in Security Effectiveness and TCO and offers Best
Protection Value
Cisco-Sourcefire AMP Results – For Detection Capability Only
Cisco Advanced
Malware Protection
Best Protection Value
99.0% Breach
Detection Rating
Lowest TCO per
Protected-Mbps
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
37
Conclusion

A Revolutionary Approach…
• Attackers are determined and resourceful
• Provides an Architecture - AMP everywhere
• Malware still getting on devices, detection not
100%
• Our database of common threats gives you
upfront defense
• Point-in-time detection is not sufficient
• Our real-time behavioral tracking, background
information on the prevalence of software, and
malware sandboxing allows you to quickly
separate out the innocuous software,
understand what the attacker did, how far he
or she moved, what kind of tools they are
using
• Integrated response required to be effective
• Cisco FireAMP solves business problems
• Where do I start?
• What is the scope and how bad is the situation?
• What was the point and method of entry?
• Can I control and remediate across the network
and endpoints?
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
• Our threat defense tools allow you to rapidly
remove previously unrecognized threats
without waiting on big AV firms to respond
Cisco Public
38
Thank you.