Your SlideShare is downloading. ×
михаил кондрашин
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

михаил кондрашин

1,507
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,507
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Что придумала индустрия ИБ, чтобы заработать еще денег
  • Industrialized hackingJust as the Industrial Revolution advanced methods and accelerated assembly from single to mass production in the 19th century, today's cybercrime industry has similarly transformed and automated itself to improve efficiency, scalability and profitability. What are the key characteristics of an industrialized attack?It's ROI focused. All involved parties work to increase the bottom line, similar to the way a business works to maximize gain with as little investment as possible. It's not personal. Automated attacks do not target specific individuals. Rather, they target the masses, both enterprises and users, using general selection criteria. For example, a botnet that drives mass SQL injection attacks or brute force password attacks will not discriminate between large or small organizations.It's multilayer. Each party involved in the hacking process has a unique role and uses a different financial model.It's automated. Botnets, armies of unknowingly enlisted computers controlled by hackers, scan and probe the web seeking to exploit vulnerabilities and extract valuable data, conduct brute force password attacks, disseminate spam, distribute malware and manipulate search engine results.Common attack types include:Data theft or SQL injections. Data theft is most commonly administered through SQL injection. Between January and June of 2009, IBM reported nearly 250,000 daily SQL injection attacks on websites around the world. Imperva researchers reported the use and deployment of SQL injections as the top chat topic on hacker forums. For example, the 2009 assault against Heartland Payment Systems, which resulted in 130 million dollars of lost records, was attributed to SQL injection.Business logic attacks. Recently, web application hackers have begun to develop attacks that target vulnerabilities in the business logic, rather than in the application code. Business logic attacks often remain undetected. In fact, most business logic vulnerabilities are hard to anticipate and detect using automated test tools, such as static code analyzers, and vulnerability scanners. Often, attack traffic resembles normal application traffic. Attacks are usually not apparent from code and are too diverse to be expressed through generic vulnerability scanner tests. A recent hack against Durex India highlights how this type of attack works.Denial of service attacks. This type of attack is usually executed as part of a blackmail scheme that forces application owners to pay a ransom to free their application from the invasion of useless traffic. For instance, attackers will threaten to shut-down online gambling sites for a particular ransom.
  • Advanced persistent threats (APT) are driven, usually, by government agencies or their terrorist counterparts. Rarely are APTs led by political or commercial organizations. However, in some cases, marginal threats do arise from obsessed individuals and legitimate commercial organizations. What are the key characteristics of APT hacking?It's very personal. The attacking party carefully selects targets based on political, commercial and security interests. Social engineering is often employed by an APT.It's persistent. If the target shows resistance, the attacker will not leave, but rather change strategy and deploy a new type of attack against the same target. The attacker may also decide to shift from an external threat to an internal threat.Control focused. APTs are focused on gaining control of crucial infrastructure, such as power grids and communication systems. APTs also target data comprised of intellectual property and sensitive national security information. Personal data, however, is of no interest. Surprisingly, APT hackers are not as concerned with costs or revenue. Thus, large budgets may be thrown against individual targets with no “financial” justification. How can you quantify state security?It's automated, but on a small scale. Automation is used to enhance the power of an attack against a single target, not to launch broader multi-target attacks.It's one layer. One party owns and controls all hacking roles and responsibilities. In fact, the most serious government organizations operate their own botnets (or at least take control of parts of botnets).
  • Advanced targeted threats can easily evade conventional perimeter and content security, software vulnerabilities are rampant, insider threats are a constant, and consumerization and mobility open the network even further to exploitation. Stuxnet, Wikileaks, RSA, Epsilon breaches are the latest demonstration of the advanced exploits and damages facing the modern enterprise
  • And this is what Fidelis XPS sees.In addition to fully decoding the protocols and applications traversing the network (and doing so in a completely port-independent way), the Fidelis XPS Deep Session Inspection architecture gives you full visibility into all content at every level so you can “see” sensitive and/or malicious content no matter how deeply encoded, embedded and/or compressed it might be. And our Deep Session Inspection architecture also lets you do something about it when you see it, such as taking a real-time, policy based alerting/recording, visualization or prevention action. The ability to see this deeply into applications and content as they are occurring on the network, make a policy decision based on that information, and take an enforcement action in real-time, before the session completes, is unique to Fidelis XPS.
  • All hell breaks loose. This is a very interesting PDF, with all kinds of unusual stuff. Let’s look at these alerts.
  • Mention access to raw packets, downloadable payloads/sessions and decoded forensic details
  • Transcript

    • 1. NAV против APTNetworkAnalysis & Visualization— защита от AdvancedPersistentThreat
      Михаил КондрашинAPL
    • 2. Оглавление
      Advanced Persistent Threat (APT)
      Примеры APT
      Как защищаться?
      Примерыиспользования средств защиты
    • 3. Advanced Persistent Threat
      Изощренная постоянная угроза
    • 4. Индустрия взлома
      ROI
      Не нацелена на кого-либо персонально
      Множество участников
      Автоматизация
    • 5. APT
      Персонализация
      Постоянство
      Цель — контроль
      Автоматизация в меньшем масштабе
      Атакующий один
      APT (Advanced Persistent Threat — Изощренная долгосрочная угроза)— это не «что», а «кто»
      —ДжошКорман, The 451 Group
    • 6. Примеры
    • 7. Stuxnet
      Честно…
      это для
      мирного
      домашнего
      использования…
    • 8. Aurora
    • 9. Атака на RSA
      Штатные сотрудники получили сообщение с темой “2011 Recruitment Plan” (они попали, как спам в папки карантина);
      К письмам был прикреплен файл Excel с внедренным Flash. В последнем был 0-day эксплоит (CVE 20110609), который использовался для загрузки трояна.
      Троян начал поиск паролей доступа к все более и более значимым компьютерам, пока не получил привилегированный доступ к той системе, которая была изначальной целью.
      Желаемые файлы были украдены и отправлены на внешний компьютер (это был взломанный компьютер у хостунг-провайдера).
    • 10. Защита
      Не переход на последнюю версию AV/FW/IDS/IPS/DLP/…
      Не еще одна «коробка с лампочками»NAV/NSM
      Управление рисками в реальном времени!
    • 11. Управление рисками в реальном времени
      DMZ
    • 12. Доверяй, но проверяй
    • 13. Какой разъем ведет в Интернет?
      Доверенная сеть
      Недоверенная сеть
      Недоверенная сеть
    • 14.
    • 15. NAV & NSM
      Сканирование сети
      Анализ потоков данных
      Расследование сетевых инцидентов
      Анализ сетевых метаданных
      Захват и анализ сетевых пакетов
      Network Analysis & VisualizationNetwork Security Monitoring
    • 16. Жизненный цикл
      Установить базовый уровень защиты
      Обновить информацию об угрозах
      Контролировать и изучать сетевой трафик
      Расследовать возможную угрозу
      Инициировать процесс реакции на инцидент или обновить защиту
      Перейти к шагу 1.
    • 17. Trend Micro Threat Intelligence Manager
    • 18. Традиционной защитынедостаточно!
      EmpoweredEmployees
      & Wikileaks
      AdvancedTargeted Threats
      De-Perimeterization
      Virtualization, Cloud, Consumerization & Mobility
      i.e., Stuxnet, Epsilon, Aurora, Mariposa, Zeus,
      Sony PlayStation, etc.
    • 19. Threat Intelligence Manager
      Office Scan
      Incident Discovery
      Threat Discovery Appliance
      Suspicious Network Behavior
      Threat Intelligence Manager
      Threat Analysis and Response
      Deep Security
      System Integrity
    • 20. Панель управления
    • 21. Статистика Smart Protection Network
    • 22. Fidelis XPS
    • 23. Секретный ингредиент: Deep Session Inspection®
    • 24. Полностью очищенная луковица
      Вот, что видит Deep Session Inspection:
      Полное декодирование на всех портах, протоколах и приложениях
      Полная видимость всего содержимого на всех уровнях
      Уведомление, сохранение и блокировка на основе установленных правил в реальном времени
      Стеваясессия
    • 25. Что такое правила?
      ЧТО?(содержимое)
      КАК?(атрибуты сессии)
      КТО?
      (местоположение, репутация)
      И/ИЛИ/НЕ
      Блокировка
      Запись
      Визуализация
      Перенаправление
      Карантин
      Сигнал
      Шифрование
      Уведомление
      Экспорт
      Ограничение скорости
    • 26. Какие правила возможны?
      Все, что можно сформулировать словами:
      • “Блокировать приложения в социальных сетях”
      • 27. “Предупреждать о передаче наружу любых персональных данных вне регламентированных бизнес-процессов”
      • 28. “Передачу персональных данных на известные фишинговые и вредоносные сайты”
      • 29. “Предупреждать о использовании шифрования SSL/TLS с подозрительными странами в нерабочие часы”
      • 30. “Предупреждать об исполняемых файлах, у которых подменено расширение”
      • 31. “Предупреждать о PDF-файлах с внедренным исполняемым кодом”
      • 32. “Предупреждать о зашифрованном трафике с неправильным алгоритмом или стойкостью”
      • 33. “Предупреждать о сессиях с неизвестным протоколом”
    • Правила (выдержка из обновления за май)
    • 34. Что мы хотим найти?
      • JavaScript in PDF
      • 35. JavaScript “unescape” in PDF
      • 36. Executable in PDF
      • 37. Flash in Excel/Word/PowerPoint
      • 38. .exe or .scr in .zip or .rar over SMTP
      • 39. X in Y under Z circumstances
      • 40. THINK FIDELIS!
      28
    • 41.
    • 42.
    • 43. FSS_Suspicious Executable
    • 44. Что поймали наши сети?
      32
    • 45. 33
      Файл формата tar
      Нет“.tar”
    • 46. 34
      Ну и спрятался!
    • 47. 35
      Что у нас в кустах?
      Это исполняемый файл!
    • 48. 36
      (?!/JavaScript)(?:/|#2f|#2F)(?:J|#4a|#4A)(?:a|#61)(?:v|#76)(?:a|#61)(?:S|#53)(?:c|#63)(?:r|#72)(?:i|#69)(?:p|#70)(?:t|#74)
    • 49. 37
      Это не просто поиск подстроки!
    • 50. Мартовская уязвимость нулевого дня во Flash
      38
      “Show me Flash in XLS”
    • 51. Апрельская уязвимость в Flash “Show me Flash in Doc”
      39
    • 52. А теперь…
    • 53. Competitive Pricing
      • Pricing scenario is for 2,500 employee organization with 70 servers, and management of events from all devices.
      • 54. Pricing does not include database licenses, server clusters and more, which are required for all but the Trend Micro offering.

    ×