the challenges of the kill chain
Transcription
the challenges of the kill chain
THE CHALLENGES OF THE KILL CHAIN Mischel Kwon, President and CEO MKA TODAY’S ATTACKS And that’s just one version of one adversaries tactics! ATTACKER WORKFLOW SPOOFED EMAIL Apr 2 18:57:39 mka-admin sendmail[14766]: q32MvdU8014766: Subject:FOSE.2012.-.Earn.CPE.Credit! Apr 2 18:57:39 mka-admin sendmail[14766]: q32MvdU8014766: [email protected], size=5331, class=0, nrcpts=1, msgid=<[email protected]>, proto=SMTP, daemon=MTA, relay=[5.85.165.165] Apr 2 18:57:39 mka-admin sendmail[14767]: q32MvdU8014766: [email protected], delay=00:00:00, xdelay=00:00:00, mailer=local, pri=35634, dsn=2.0.0, stat=Sent From [email protected] Mon Apr 2 18:57:39 2012 Return-Path: <[email protected]> Received: from fose.mkwonassoc.com ([5.85.165.165]) by mka-admin.mkwonassoc.com (8.14.4/8.14.4) with SMTP id q32MvdU8014766 for [email protected]; Mon, 2 Apr 2012 18:57:39 -0400 Date: Mon, 2 Apr 2012 18:57:39 -0400 Message-Id: <[email protected]> From: "FOSE Outreach" <[email protected]> Subject: FOSE 2012 - Earn CPE Credit! X-Sender: [email protected] X-Mailer: QUALCOMM Windows Eudora Version 4.3.2 MALWARE DOWNLOAD 1333316104.437 6972 10.20.30.11 TCP_MISS/200 901555 GET http://evil.com/inst.exe - DIRECT/5.85.165.245 application/x-msdos-program 01-Apr-2012 17:16:43.087 client 10.0.0.10#58382: query: evil.com IN AAAA + (10.0.0.10) 01-Apr-2012 17:16:43.088 client 10.0.0.10#58382: query: evil.com IN A + (10.0.0.10) 04/01-17:16:30.902006 [**] [1:100001:1] inst.exe Download Detected [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 10.20.30.11:1138 -> 10.0.0.10:8080 MALWARE INSTALL Apr 1 17:16:47 10.20.30.11 Process ID: 1208 Apr 1 17:16:47 10.20.30.11 Image File Name: C:\Documents and Settings\Administrator\My Documents\Installs\inst.exe Apr 1 17:16:48 10.20.30.11 Process ID: 1464 Apr 1 17:16:48 10.20.30.11 Image File Name: C:\WINDOWS\system32\reg.exe Apr 1 17:16:48 10.20.30.11 New Process ID: 1836 Apr 1 17:16:48 10.20.30.11 Image File Name: C:\DOCUME~1\ADMINI~1\LOCALS~1\APPLIC~1\47501.exe CALLBACK ACTIVITY 1-Apr-2012 17:18:15.231 client 10.0.0.10#58382: query: littlepayform.biz IN AAAA + (10.0.0.10) 1-Apr-2012 17:18:21.223 client 10.0.0.10#58382: query: littlepayform.biz IN AAAA + (10.0.0.10) 1-Apr-2012 17:18:22.687 client 10.0.0.10#58382: query: littlepayform.biz IN A + (10.0.0.10) 1-Apr-2012 17:18:28.400 client 10.0.0.10#58382: query: billextrapay.com IN AAAA + (10.0.0.10) 1-Apr-2012 17:18:31.141 client 10.0.0.10#58382: query: billextrapay.com IN A + (10.0.0.10) 1333040144.983 59 10.20.30.11 TCP_MISS/503 4060 GET http://littlepayform.biz/buy.php? - DIRECT/littlepayform.biz text/html 1333040145.819 565 10.20.30.11 TCP_MISS/302 441 GET http://billextrapay.com/buy.php? - DIRECT/69.43.161.176 text/html 1333040146.483 661 10.20.30.11 TCP_MISS/200 53962 GET http://ww35.billextrapay.com/buy.php? - DIRECT/141.8.224.44 text/html 1333040147.548 112 10.20.30.11 TCP_MISS/200 383 POST http://ww35.billextrapay.com/rg-rlog.php - DIRECT/141.8.224.44 text/html 1333040261.553 49 10.20.30.11 TCP_MISS/503 4060 GET http://littlepayform.biz/buy.php? - DIRECT/littlepayform.biz text/html 1333040261.902 297 10.20.30.11 TCP_MISS/302 441 GET http://billextrapay.com/buy.php? - DIRECT/69.43.161.176 text/html 1333040262.189 285 10.20.30.11 TCP_MISS/200 53847 GET http://ww35.billextrapay.com/buy.php? - DIRECT/141.8.224.44 text/html BEACONING ACTIVITY 1333050577.463 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333050655.557 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333050733.653 63099 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333050811.747 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333050889.841 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333050967.938 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333051046.030 63101 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333051124.124 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333051202.220 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333051280.314 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333051358.409 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333051436.505 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333051514.601 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333051592.692 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333051670.788 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333051748.924 63100 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html 1333051827.049 63101 10.20.30.11 TCP_MISS/503 3886 GET http://195.54.171.33/cb_soft.php? - DIRECT/195.54.171.33 text/html MALWARE DOWNLOAD 31-Mar-2012 17:50:57.005 client 10.0.0.10#58382: query: www.f0se.com IN AAAA + (10.0.0.10) 31-Mar-2012 17:51:00.292 client 10.0.0.10#58382: query: www.f0se.com IN A + (10.0.0.10) 1333233560.373 5 10.20.30.13 TCP_MISS/302 329 GET http://www.f0se.com:8080/earn_CPE - DIRECT/5.85.165.245 text/html 1333233560.577 3 10.20.30.13 TCP_MISS/200 515 GET http://www.f0se.com:8080/earn_CPE/ - DIRECT/5.85.165.245 text/html 1333233569.602 1110 10.20.30.13 TCP_MISS/200 51453 GET http://www.f0se.com:8080/earn_CPE/SiteLoader.jar DIRECT/5.85.165.245 application/octet-stream 1333233570.838 1206 10.20.30.13 TCP_MISS/200 51582 GET http://www.f0se.com:8080/earn_CPE/SiteLoader.jar DIRECT/5.85.165.245 application/octet-stream 1333233578.690 1084 10.20.30.13 TCP_MISS/200 51512 GET http://www.f0se.com:8080/earn_CPE/SiteLoader.jar DIRECT/5.85.165.245 application/octet-stream 1333233579.944 1237 10.20.30.13 TCP_MISS/200 51592 GET http://www.f0se.com:8080/earn_CPE/SiteLoader.jar DIRECT/5.85.165.245 application/octet-stream 1333233581.079 1101 10.20.30.13 TCP_MISS/200 51666 GET http://www.f0se.com:8080/earn_CPE/SiteLoader.jar DIRECT/5.85.165.245 application/octet-stream 1333233582.150 1052 10.20.30.13 TCP_MISS/200 51593 GET http://www.f0se.com:8080/earn_CPE/SiteLoader.jar DIRECT/5.85.165.245 application/octet-stream ODD FILE Apr 1 12:27:40 10.20.30.13 988 <133>1 2012-04-01T13:24:49-04:00 demoxp2 Security 380 - [meta sequenceId="322" sysUpTime="5032725"][origin ip="demoxp2" software="Security"][[email protected] EVENT_CATEGORY="Detailed Tracking" EVENT_FACILITY="16" EVENT_ID="600" EVENT_LEVEL="5" EVENT_NAME="Security" EVENT_REC_NUM="1876” EVENT_SID="S-1-5-21-1757981266-413027322-1801674531-500" EVENT_SID_TYPE="User" EVENT_SOURCE="Security" EVENT_TYPE="Success Audit" EVENT_USERNAME="DEMOXP2\\Administrator"] DEMOXP2\Administrator: Security Security: [Success Audit] A process was assigned a primary token. Apr 1 12:27:40 10.20.30.13 Assigning Process Information: Apr 1 12:27:40 10.20.30.13 Process ID: 3184 Apr 1 12:27:40 10.20.30.13 Image File Name: C:\Documents and Settings\TEMP\Local Settings\Temp\~spawn12488.tmp.dir\FSdXvdnm.exe Apr 1 12:27:40 10.20.30.13 New Process Information: Apr 1 12:27:40 10.20.30.13 Process ID: 4028 Apr 1 12:27:40 10.20.30.13 Image File Name: C:\WINDOWS\system32\cmd.exe LATERAL SCANNING Apr 1 12:28:48 10.20.30.13 (EventID 593) Apr 1 12:28:49 10.20.30.13 558 <131>… Unknown User: System Service Control Manager: [Error] Timeout (30000 milliseconds) waiting for the qfdtzy service to connect. (EventID 7009) Apr 1 12:30:37 10.20.30.11 741 <132>…: Security Security: [Failure Audit] Logon Failure: Apr 1 12:30:37 10.20.30.11 Reason: Unknown user name or bad password Apr 1 12:30:37 10.20.30.11 User Name: larry Apr 1 12:30:37 10.20.30.11 Domain: WORKGROUP Apr 1 12:30:37 10.20.30.11 Workstation Name: VKFzuLVYrkeh2qpP (EventID 529) Apr 1 12:31:25 10.20.30.11 741 <132>..: Security Security: [Failure Audit] Logon Failure: Apr 1 12:31:25 10.20.30.11 Reason: Unknown user name or bad password Apr 1 12:31:25 10.20.30.11 User Name: lucky Apr 1 12:31:25 10.20.30.11 Domain: WORKGROUP Apr 1 12:31:25 10.20.30.11 Workstation Name: Dn6cPTbMWvhxuSYC (EventID 529) Apr 1 12:32:33 10.20.30.11 749 <132>…: Security Security: [Failure Audit] Logon Failure: Apr 1 12:32:33 10.20.30.11 Reason: Unknown user name or bad password Apr 1 12:32:33 10.20.30.11 User Name: Administrator Apr 1 12:32:33 10.20.30.11 Domain: WORKGROUP MALWARE INSTALL Apr 2 20:37:05 10.20.30.102 657 <133> … [origin ip="10.20.30.102" … EVENT_TYPE="Success Audit" EVENT_USERNAME="NT AUTHORITY\\SYSTEM"] <U+FEFF>NT AUTHORITY\SYSTEM: Security Security: [Success Audit] A process has exited: Apr 2 20:37:05 10.20.30.102 Process ID: 2248 Apr 2 20:37:05 10.20.30.102 Image File Name: C:\WINDOWS\IaBOwFIe.exe Apr 2 20:37:05 10.20.30.102 User Name: MACHINEA2$ Apr 2 20:37:05 10.20.30.102 Domain: AD Apr 2 20:37:05 10.20.30.102 624 <133> … [origin ip="10.20.30.102" … EVENT_USERNAME="AD\\larry"] <U+FEFF>AD\larry: System Service Control Manager: [Information] The MIbRQJsnmQcTDtfmHx service was successfully sent a start control. (EventID 7035) Apr 2 20:37:05 10.20.30.102 566 <133> … [origin ip="10.20.30.102" … EVENT_SOURCE= "Service Control Manager" … [Information] The MIbRQJsnmQcTDtfmHx service entered the running state. (EventID 7036) Apr 2 20:37:05 10.20.30.102 566 <133> … [origin ip="10.20.30.102" … EVENT_SOURCE= "Service Control Manager" … <U+FEFF>Unknown User: System Service Control Manager: [Information] The MIbRQJsnmQcTDtfmHx service entered the stopped state. (EventID 7036) Apr 2 20:37:07 10.20.30.102 610 <133>… machinea2 … EVENT_CATEGORY="Logon/Logoff" …EVENT_USERNAME="AD\\larry"] <U+FEFF>AD\larry: Security Security: [Success Audit] User Logoff: Apr 2 20:37:07 10.20.30.102 User Name: larry Apr 2 20:37:07 10.20.30.102 Domain: AD DATA EXFIL INPUT: 12947 Records for 12765 Bins and 44577810 Total Bytes OUTPUT: Top 30 Bins by Bytes sIP|sPort| dIP|dPort| Bytes| %Bytes| cumul_%| 10.20.30.102| 3869|5.85.165.245|33333|38229438|85.758897| 85.758897| 10.20.30.102| 4435| 10.0.0.15| 2006| 438480| 0.983628| 89.699344| 10.20.30.100|63464| 10.0.0.15| 2008| 388211| 0.870862| 90.570205| 10.20.30.13| 2166| 10.0.0.15| 2001| 388120| 0.870657| 91.440863| 10.20.30.11| 1176| 10.0.0.15| 2000| 388080| 0.870568| 92.311430| 10.20.30.100|65247|65.55.184.16| 443| 213243| 0.478361| 94.202196| 10.20.30.102| 3249| 10.0.0.15| 4444| 116425| 0.261173| 94.463369| 10.20.30.100|52086|4.59.136.208| 443| 81870| 0.183656| 94.647025| 10.20.30.100|51314|5.85.165.245|33333| 48004| 0.107686| 94.754711| KILL CHAIN Military Concept – target identification, force dispatch to target, decision and order to attack the target, and finally the destruction of the target Air Force’s process subdivided into seven “events” Anticipate Find Fix Track Target Engage Access http://ftp.rta.nato.int/public//PubFullText/RTO/TR/RTO-TR-SAS-050///TR-SAS-050-10-06.pdf KILL CHAIN THEORY Cybersecurity – Understanding the phases of a cyber attack in order to eliminate it and defend against it To record, track and group information about a cyber attack to develop profiles that allow us to defend against particular types of attacks and adversaries Enables analysts to identify adversary attack patterns Enabling next step predictions Enabling proactive defense Cyber Attack Progression Stages Courtesy Mike Cloppert, Lockeed Martin Thank you Mike Cloppert http://computer-forensics.sans.org/blog/2009/10/14/security-intelligence-attacking-the-kill-chain/ OTHER BUZZ WORDS AND STRATEGIES One for One – better known as “Whac-a-Mole” method SEIM Model Packet reconstruction Flow APT Continuous Monitoring Exploitation Life Cycle Ostrich Method TOOLS AND TECHNIQUES USED TODAY SEIM IDS Firewall Packet Reconstruction Network Forensics Flow Data Host Based Detection Host Forensics Honey Pot Vulnerability and Patch Management Tools Configuration Management Tools Network Management Tools Scanners Virtualization – Hypervisor Monitoring Tools AND IT LOOKS LIKE THIS: DATA AND ANALYTICS – THE ACHILLES’ HEEL Massive amount of Data 165,000 end users – 6000 servers 3 core enterprise domains 10 internet gateways – 4 OC-12s, 6 OC-3s 126 TB of network traffic a day Roughly one billion events received by SIEM and log aggregation devices daily Expensive analysts often repeating analysis Doesn’t include remediation or compliance data WHAT DOES IT TAKE TO DO KILL CHAIN? Threat Intelligence = Data Indicators TTPs – Tactics, Techniques, Procedures Adversary Behavior System Monitoring = Data System Knowledge = Data Known vulnerabilities Known users + there behaviors Mission and criticality Analysts and Hunters The ability to process the data quickly Not on a one for one alert basis Enable pattern recognition http://computer-forensics.sans.org/blog/2009/10/14/security-intelligence-attacking-the-kill-chain/ SO…NOW YOU HAVE DETECTED A PATTERN – WHAT DO YOU DO? Prioritize the Monitoring – prioritized threat Remediation Policy You might not have it all How is the mission owner involved Tie back to audit It’s not just a technical fix! Manage the RISK Not just what you have detected! Take advantage of understanding their patterns Make it not happen again! FISMA DIACAP Make it operational no matter what you call it! Defense Make strategic changes – configuration of architecture, network, devices, procedures Monitor, monitor, monitor the hard stuff Control the domain, control administrative power Be creative SOLUTION – ONE SECURITY PLATFORM Courtesy MKA VSOC™ SCALABILITY, SPEED, FLEXIBILITY NEW DATA STRUCTURES, IN MEMORY ANALYSIS http://www.experiencesaphana.com/community/solutions/predictive-analysis CHALLENGES Storing the data Accessing the data Fast Analysis Engine – in memory Analysis Engine must allow for simple model modification Mapping Reporting and Metrics How does policy keep up with the actions of the adversary? Risk Technical Managerial Executive Mission Policy Attack patterns – whether all the pattern has happened or not Attack points to vulnerabilities Vulnerabilities to Controls and Policies Attack results to mission So much data – how do you understand the ultimate risk to the mission? Budget How do you right size this How do you articulate the need, successes, and cost effectiveness to the Executive level FUTURE (WISH LIST ☺) Shared Pattern Libraries – on the meta data level Vulnerability management based on patterns not just one for one One data format Acceptance and tools to manage other data storage formats Shared Analyst pools Mission participation in Risk Analysis Questions? For copies of slide and or more information contact: Mischel Kwon: [email protected],