SlideShare a Scribd company logo
1 of 33
Download to read offline
SESSION ID:
#RSAC
Araceli Treu Gomes
Advanced Persistent Security
to Combat
Advanced Persistent Threat
EXP-R03
Subject Matter Expert –
Intelligence and Investigations
Dell SecureWorks
@sleepdeficit_
Ira Winkler, CISSP
President
Secure Mentem
@irawinkler
#RSAC
Why The Hype Matters to Us
2
It destroys our focus
It changes the story
It asks questions that shouldn’t be asked
It deflects blame
Bad security vs unstoppable enemy
“If the top organizations can be hit, there is no way anyone will
expect us to stop the attacks”
#RSAC
The Question That Should Be Asked
3
Was it really a “sophisticated” attack, or
just bad security?
#RSAC
The Proclaimed “Sophisticated Attacks”
4
Hacking Team
IRS
Ashley Madison
Anthem
Premera
You name it, it’s sophisticated according to someone
#RSAC
It Can Also Help You
5
It gets people talking about security
Use the narrative to help your cause
If management is concerned about the hype, use it
Highlighting the common vulnerabilities exploited during attacks
can get you funding to mitigate similar vulnerabilities
Stating how your security would have stopped the attacks would
give you kudos
#RSAC
Hacking Team
6
Notable in that they supposedly support law enforcement and
had zero day vulnerabilities
Embarrassing data to customers
Leak of vulnerabilities causing ripple effect
#RSAC
Sophisticated?
7
Password was passw0rd
Able to access and download data as engineer
Sophisticated: HELL NO!
Once inside there was apparently a flat network or easy data
access
#RSAC
IRS Breach
8
330,000 records compromised through Get Transcript function
400,000 attempted breaches
Compromised authentication scheme
Required “information on the taxpayer had”
Hmmmm….
Criminal downloaded records, filed false tax returns
Stole $50 Million
IRS Commissioner said it couldn’t be stopped citing
Smart criminals with lots of advanced computers, hiring smart people
OMG
#RSAC
Sophisticated?
9
All the criminals needed were credit reports
IRS used commercial system that asked questions with answers
available through credit reports
Went undetected for 400,000 relatively intensive attempts
#RSAC
Ashley Madison
10
Compromise of clients and client information
Led to suicides
Led to great embarrassment for others
Demonstrated that they did not delete accounts as
promised
Released sensitive internal documents
Revealed that there weren’t many real women on
site
#RSAC
Sophisticated?
11
SQL injection attacks likely
Criminals claimed that network poorly segmented
Pass1234 was root password on all servers
Poor password encryption used
Data not deleted
Arrogance
#RSAC
Anthem
12
80,000,000 health care records compromised
Largest breach of his type
This one was personal
Potentially perpetrated by China
Seemed to have signature of Deep Panda, and pandas are from
China
A large number of people have government access
#RSAC
Sophisticated?
13
Watering hole attack suspected
Compromised administrator credentials
Undetected for nine months
Massive querying of data
#RSAC
Premera
14
11,000,000 accounts compromised
Phishing attack suspected
Operated for 9 months
Deep Panda suspected again
277 data breaches in healthcare organizations in 2015
#RSAC
Commonalities
15
Improperly segmented networks
Detection Deficit Disorder
Ignoring or looking at incidents in wrong places
Failure to white list
Not monitoring critical systems
Poor awareness
No multi-factor authentication
Phishing messages
#RSAC
Preventing the IRS Attack
16
Frankly authentication might not be feasible to strengthen
Better detection
IP analysis
Rapid increase in requests
Focus on misuse detection
#RSAC
The Irari Rules of Sophisticated Attacks
17
Must not actualize because of a
Phishing message
Malware must have been undetectable
Passwords were not easily guessed
User awareness exploited with poor
awareness program in place
Known vulnerabilities cannot have been
exploited
Multifactor authentication in use on
critical systems
Passwords were not hardcoded into the
systems (or on TV)
Detection capability was in place and
not ignored
Proper network segmentation in place
User accounts had minimum privileges
#RSAC
Advanced Persistent Threat or
ADAPTIVE Persistent Threat?
18
They are Persistent
They are a Threat
But they are more adaptive than they are advanced
Advanced implies sophisticated
Sophisticated implies unstoppable
#RSAC
APT Assumes Failure
19
Actually, “successful” APT assumes failure
They assume there will be countermeasures in place
They assume there will be detection mechanisms
They know they need to be adaptive
They are proactive
“Be like water” – Bruce Lee
#RSAC
“Persistence and focus will get
you in”
Rob Joyce
Chief, NSA Tailored Access Office
#RSAC
Advanced Persistent Security
21
#RSAC
Advanced Persistent Security
22
Fight APT with APS
Adaptive Persistent Security, but Advanced Persistent Security is
a better buzz term
Security programs must be adaptive
Security programs must assume failure
Designed to presume failure
Extrusion prevention > Intrusion prevention
#RSAC
Risk Management Implies Failure is Acceptable
IRS hack demonstrates availability requires better detection, not
prevention
It can be more cost effective
Better detection = Better protection
Security is about Risk Management not perfect prevention
Detection and reaction mitigate loss that cannot be prevented
Adversary disruption is an acceptable “Security” strategy
Kill Chain Analysis
Goal is exit prevention
#RSAC
Optimizing Risk
24
Cost
Countermeasures
Vulnerabilities
Risk Optimization Point
#RSAC
Proaction
Design program always looking for failures
Determine where failure is likely to occur
Perform threat intelligence to determine likely attackers and
attack vectors
Implement security countermeasures as appropriate
Implement detection
Build the ability to modify protection into your program
#RSAC
Defensive Information Warfare
Protection Detection Reaction
#RSAC
Protection
27
Understand what you Value
Understand your Threats
What they target
What they value
Likely attack vectors
Determine your vulnerabilities
Prioritize countermeasures based on likely
threats and vulnerabilities
Address security culture
#RSAC
Detection
Understand your Kill Chain
Detection Deficit Disorder
Avoid it
Human sensors
Constantly examine the data
Assume critical assets are being stolen
Assume networks are compromised and look
for indications
#RSAC
Reaction
Reaction should be anticipated as being a common circumstance
Reaction built into security program and architecture
Determine who’s attacking you
What are their attack methods
Look for additional attacks
Be a hunter
Feedback into Protection
Remember, your goal is exit prevention
Extrusion prevention is more manageable intrusion prevention
#RSAC
The Role of Security Culture/Awareness
People have a role in Prevention, Detection, and Reaction
A strong security culture prevents incidents
People should behave appropriately
A strong security culture detects incidents in progress
Snowden’s coworkers should have noticed suspicious activity
Detecting incidents, phishing, etc.
Reaction
Reporting
Taking actions to mitigate incidents before they get too
damaging
#RSAC
Conclusions
31
Attackers are successful not because they are advanced or
sophisticated, but because they are adaptive and persistent
Be adaptive and persistent in response
Be proactive
Failure is expected
Failure can be good
Implement Advanced Persistent Security
#RSAC
“Apply” Slide
32
Next week you should:
Determine whether you have a “Security” program or a
“Prevention” program
Within 3 months you should:
Reevaluate your awareness program
Determine the protection of your critical data
Analyze your likely threats
Determine if you have Detection Deficit Disorder
Within 6 months you should:
Reevaluate the structure of your overall security program
#RSAC
For More Information
33
ira@securementem.com
@irawinkler
www.securementem.com
www.linkedin.com/in/irawinkler
Facebook.com/irawinkler
Ira Winkler, CISSP Irari Report
www.irarireport.com
@irarireport
Araceli Treu Gomes
agomes@secureworks.com
@sleepdeficit_
www.secureworks.com
www.linkedin.com/in/sleepdeficit
Facebook.com/sleepdeficit

More Related Content

What's hot

Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
Kunal Sharma
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin Attack
Gavin Davey
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
Loay Elbasyouni
 
Intruders
IntrudersIntruders
Intruders
techn
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
ecmee
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
Okehie Collins
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
Ehtisham Ali
 

What's hot (19)

Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin Attack
 
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Intruders
IntrudersIntruders
Intruders
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environments
 

Similar to Sophisticated Attacks vs. Advanced Persistent Security

Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
Ward Pyles
 

Similar to Sophisticated Attacks vs. Advanced Persistent Security (20)

Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 
Intelligence-Led Security: Powering the Future of Cyber Defense
Intelligence-Led Security: Powering the  Future of Cyber DefenseIntelligence-Led Security: Powering the  Future of Cyber Defense
Intelligence-Led Security: Powering the Future of Cyber Defense
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Make IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and ReportingMake IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and Reporting
 
Introduction and a Look at Security Trends
Introduction and a Look at Security TrendsIntroduction and a Look at Security Trends
Introduction and a Look at Security Trends
 
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
 
Securing the “Weakest Link”
Securing the “Weakest Link”Securing the “Weakest Link”
Securing the “Weakest Link”
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Three Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramThree Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response Program
 
Insights from-NSAs-cybersecurity-threat-operations-center
Insights from-NSAs-cybersecurity-threat-operations-centerInsights from-NSAs-cybersecurity-threat-operations-center
Insights from-NSAs-cybersecurity-threat-operations-center
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
Learnings from the Cloud: What to Watch When Watching for Breach
Learnings from the Cloud:  What to Watch When Watching for BreachLearnings from the Cloud:  What to Watch When Watching for Breach
Learnings from the Cloud: What to Watch When Watching for Breach
 
Opening the Door to DoD Perspectives on Cyber Threat Intelligence
Opening the Door to DoD Perspectives  on Cyber Threat IntelligenceOpening the Door to DoD Perspectives  on Cyber Threat Intelligence
Opening the Door to DoD Perspectives on Cyber Threat Intelligence
 
Main Menu
Main MenuMain Menu
Main Menu
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Security precognition chaos engineering in incident response
Security precognition  chaos engineering in incident responseSecurity precognition  chaos engineering in incident response
Security precognition chaos engineering in incident response
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

Sophisticated Attacks vs. Advanced Persistent Security

  • 1. SESSION ID: #RSAC Araceli Treu Gomes Advanced Persistent Security to Combat Advanced Persistent Threat EXP-R03 Subject Matter Expert – Intelligence and Investigations Dell SecureWorks @sleepdeficit_ Ira Winkler, CISSP President Secure Mentem @irawinkler
  • 2. #RSAC Why The Hype Matters to Us 2 It destroys our focus It changes the story It asks questions that shouldn’t be asked It deflects blame Bad security vs unstoppable enemy “If the top organizations can be hit, there is no way anyone will expect us to stop the attacks”
  • 3. #RSAC The Question That Should Be Asked 3 Was it really a “sophisticated” attack, or just bad security?
  • 4. #RSAC The Proclaimed “Sophisticated Attacks” 4 Hacking Team IRS Ashley Madison Anthem Premera You name it, it’s sophisticated according to someone
  • 5. #RSAC It Can Also Help You 5 It gets people talking about security Use the narrative to help your cause If management is concerned about the hype, use it Highlighting the common vulnerabilities exploited during attacks can get you funding to mitigate similar vulnerabilities Stating how your security would have stopped the attacks would give you kudos
  • 6. #RSAC Hacking Team 6 Notable in that they supposedly support law enforcement and had zero day vulnerabilities Embarrassing data to customers Leak of vulnerabilities causing ripple effect
  • 7. #RSAC Sophisticated? 7 Password was passw0rd Able to access and download data as engineer Sophisticated: HELL NO! Once inside there was apparently a flat network or easy data access
  • 8. #RSAC IRS Breach 8 330,000 records compromised through Get Transcript function 400,000 attempted breaches Compromised authentication scheme Required “information on the taxpayer had” Hmmmm…. Criminal downloaded records, filed false tax returns Stole $50 Million IRS Commissioner said it couldn’t be stopped citing Smart criminals with lots of advanced computers, hiring smart people OMG
  • 9. #RSAC Sophisticated? 9 All the criminals needed were credit reports IRS used commercial system that asked questions with answers available through credit reports Went undetected for 400,000 relatively intensive attempts
  • 10. #RSAC Ashley Madison 10 Compromise of clients and client information Led to suicides Led to great embarrassment for others Demonstrated that they did not delete accounts as promised Released sensitive internal documents Revealed that there weren’t many real women on site
  • 11. #RSAC Sophisticated? 11 SQL injection attacks likely Criminals claimed that network poorly segmented Pass1234 was root password on all servers Poor password encryption used Data not deleted Arrogance
  • 12. #RSAC Anthem 12 80,000,000 health care records compromised Largest breach of his type This one was personal Potentially perpetrated by China Seemed to have signature of Deep Panda, and pandas are from China A large number of people have government access
  • 13. #RSAC Sophisticated? 13 Watering hole attack suspected Compromised administrator credentials Undetected for nine months Massive querying of data
  • 14. #RSAC Premera 14 11,000,000 accounts compromised Phishing attack suspected Operated for 9 months Deep Panda suspected again 277 data breaches in healthcare organizations in 2015
  • 15. #RSAC Commonalities 15 Improperly segmented networks Detection Deficit Disorder Ignoring or looking at incidents in wrong places Failure to white list Not monitoring critical systems Poor awareness No multi-factor authentication Phishing messages
  • 16. #RSAC Preventing the IRS Attack 16 Frankly authentication might not be feasible to strengthen Better detection IP analysis Rapid increase in requests Focus on misuse detection
  • 17. #RSAC The Irari Rules of Sophisticated Attacks 17 Must not actualize because of a Phishing message Malware must have been undetectable Passwords were not easily guessed User awareness exploited with poor awareness program in place Known vulnerabilities cannot have been exploited Multifactor authentication in use on critical systems Passwords were not hardcoded into the systems (or on TV) Detection capability was in place and not ignored Proper network segmentation in place User accounts had minimum privileges
  • 18. #RSAC Advanced Persistent Threat or ADAPTIVE Persistent Threat? 18 They are Persistent They are a Threat But they are more adaptive than they are advanced Advanced implies sophisticated Sophisticated implies unstoppable
  • 19. #RSAC APT Assumes Failure 19 Actually, “successful” APT assumes failure They assume there will be countermeasures in place They assume there will be detection mechanisms They know they need to be adaptive They are proactive “Be like water” – Bruce Lee
  • 20. #RSAC “Persistence and focus will get you in” Rob Joyce Chief, NSA Tailored Access Office
  • 22. #RSAC Advanced Persistent Security 22 Fight APT with APS Adaptive Persistent Security, but Advanced Persistent Security is a better buzz term Security programs must be adaptive Security programs must assume failure Designed to presume failure Extrusion prevention > Intrusion prevention
  • 23. #RSAC Risk Management Implies Failure is Acceptable IRS hack demonstrates availability requires better detection, not prevention It can be more cost effective Better detection = Better protection Security is about Risk Management not perfect prevention Detection and reaction mitigate loss that cannot be prevented Adversary disruption is an acceptable “Security” strategy Kill Chain Analysis Goal is exit prevention
  • 25. #RSAC Proaction Design program always looking for failures Determine where failure is likely to occur Perform threat intelligence to determine likely attackers and attack vectors Implement security countermeasures as appropriate Implement detection Build the ability to modify protection into your program
  • 27. #RSAC Protection 27 Understand what you Value Understand your Threats What they target What they value Likely attack vectors Determine your vulnerabilities Prioritize countermeasures based on likely threats and vulnerabilities Address security culture
  • 28. #RSAC Detection Understand your Kill Chain Detection Deficit Disorder Avoid it Human sensors Constantly examine the data Assume critical assets are being stolen Assume networks are compromised and look for indications
  • 29. #RSAC Reaction Reaction should be anticipated as being a common circumstance Reaction built into security program and architecture Determine who’s attacking you What are their attack methods Look for additional attacks Be a hunter Feedback into Protection Remember, your goal is exit prevention Extrusion prevention is more manageable intrusion prevention
  • 30. #RSAC The Role of Security Culture/Awareness People have a role in Prevention, Detection, and Reaction A strong security culture prevents incidents People should behave appropriately A strong security culture detects incidents in progress Snowden’s coworkers should have noticed suspicious activity Detecting incidents, phishing, etc. Reaction Reporting Taking actions to mitigate incidents before they get too damaging
  • 31. #RSAC Conclusions 31 Attackers are successful not because they are advanced or sophisticated, but because they are adaptive and persistent Be adaptive and persistent in response Be proactive Failure is expected Failure can be good Implement Advanced Persistent Security
  • 32. #RSAC “Apply” Slide 32 Next week you should: Determine whether you have a “Security” program or a “Prevention” program Within 3 months you should: Reevaluate your awareness program Determine the protection of your critical data Analyze your likely threats Determine if you have Detection Deficit Disorder Within 6 months you should: Reevaluate the structure of your overall security program
  • 33. #RSAC For More Information 33 ira@securementem.com @irawinkler www.securementem.com www.linkedin.com/in/irawinkler Facebook.com/irawinkler Ira Winkler, CISSP Irari Report www.irarireport.com @irarireport Araceli Treu Gomes agomes@secureworks.com @sleepdeficit_ www.secureworks.com www.linkedin.com/in/sleepdeficit Facebook.com/sleepdeficit