SlideShare a Scribd company logo
1 of 13
Download to read offline
Case Study: Shamoon, a two
stage targeted attack
Case Study: Shamoon, a two stage targeted attack
Dudi Matot, Co-Founder & CEO
29/04/14
Company logo
Agenda
• The Shamoon attack
• Why the attack was not prevented
• Attacks today
• How Shamoon was identified
• A holistic approach to threat protection
• Q&A
Company logo
Shamoon Targeted Attack
• Shamoon is a 2-stage attack targeting Oil &
Energy companies
• Comprised of 3 modules
— Dropper
— Reporter
— Wiper
• Extracted data via an internal infected
machine proxy
Company logo
Shamoon Targeted Attack
• Spread itself on the local network via
Scheduled Tasks
• Abused a legitimate & signed RawDisk
driver to wipe MBR
• Wiper module Time Bomb
• Wiped drive and MBR at
specified dates and times
• Risk of copycats
Company logo
Shamoon: Why wasn’t it prevented?
• Actual attack vector – still unknown
— Insider
— Physical access of a partner
— Spear phishing
• Time based attack (time bomb)
• Worm spreading in local network
• Using local machine as a proxy
• Targeted companies were using solutions which are focused on
prevention
Company logo
Attacks Today: The Kill Chain
• Describes the progression an attacker follows when planning
and executing an attack against a target
• Based on “Intelligence Based Defense”
• Presumes a rich threat intelligence capability leveraging
internal and/or external sourced visibility
Recon
Weapon
-ization Delivery Exploit Install C&C Action
Predictive Proactive Reactive
Company logo
Why it wasn’t prevented
• Traditional solutions are limited
Recon
Weapon
-ization Delivery Exploit Install C&C Action
AV
Recon
Weapon
-ization Delivery Exploit Install C&C Action
FW/IPS/IDS
Recon
Weapon
-ization Delivery Exploit Install C&C Action
Sandbox/NGFW/Proxy
Company logo
100% Prevention is Not Possible
• Only focused on part of the kill chain
Recon
Weapon
-ization Delivery Exploit Install C&C Action
Neiman
Marcus
Target
PoS
French
Aerospace
0 day
Company logo
How Seculert Identified Shamoon
• Take the accurate intelligence gathered during the late stages
of the kill chain and push it back into existing systems
• Enhances your ability to recognize and stop attacks
Recon
Weapon
-ization Delivery Exploit Install C&C Action
Malware behavioral profile
Actionable Data Crowdsourced threat data
Traffic log analysisElastic Sandbox
Company logo
A Holistic Approach
PREDICTIVE
Recon
Weaponization
PROACTIVE
Delivery
Exploit
Install
REACTIVE
C&C
Action
Risk
Intelligence
FW/IPS
Sandbox/NGFW/
Proxy
IR/Forensics
Threat Intel
SIEM
IntelligenceVectors
Seculert
Intelligence Identification
Company logo
Q&A
Company logo
Thank You!
www.seculert.com
Come visit us at stand M85!

More Related Content

What's hot

TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
Symantec
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
Symantec
 

What's hot (20)

Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive Summary
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
What is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemWhat is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your System
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
September 2012 Security Vulnerability Session
September 2012 Security Vulnerability SessionSeptember 2012 Security Vulnerability Session
September 2012 Security Vulnerability Session
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USM
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and Analysis
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
 

Similar to Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack

New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
 

Similar to Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack (20)

CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security Breakfast
 
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
2020 11-15 marcin ludwiszewski - purple, red, blue  and others - rainbow team...2020 11-15 marcin ludwiszewski - purple, red, blue  and others - rainbow team...
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)
 
Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
5 Effective Ways for Website Protection
5 Effective Ways for Website Protection5 Effective Ways for Website Protection
5 Effective Ways for Website Protection
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and Response
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack

  • 1. Case Study: Shamoon, a two stage targeted attack
  • 2. Case Study: Shamoon, a two stage targeted attack Dudi Matot, Co-Founder & CEO 29/04/14
  • 3. Company logo Agenda • The Shamoon attack • Why the attack was not prevented • Attacks today • How Shamoon was identified • A holistic approach to threat protection • Q&A
  • 4. Company logo Shamoon Targeted Attack • Shamoon is a 2-stage attack targeting Oil & Energy companies • Comprised of 3 modules — Dropper — Reporter — Wiper • Extracted data via an internal infected machine proxy
  • 5. Company logo Shamoon Targeted Attack • Spread itself on the local network via Scheduled Tasks • Abused a legitimate & signed RawDisk driver to wipe MBR • Wiper module Time Bomb • Wiped drive and MBR at specified dates and times • Risk of copycats
  • 6. Company logo Shamoon: Why wasn’t it prevented? • Actual attack vector – still unknown — Insider — Physical access of a partner — Spear phishing • Time based attack (time bomb) • Worm spreading in local network • Using local machine as a proxy • Targeted companies were using solutions which are focused on prevention
  • 7. Company logo Attacks Today: The Kill Chain • Describes the progression an attacker follows when planning and executing an attack against a target • Based on “Intelligence Based Defense” • Presumes a rich threat intelligence capability leveraging internal and/or external sourced visibility Recon Weapon -ization Delivery Exploit Install C&C Action Predictive Proactive Reactive
  • 8. Company logo Why it wasn’t prevented • Traditional solutions are limited Recon Weapon -ization Delivery Exploit Install C&C Action AV Recon Weapon -ization Delivery Exploit Install C&C Action FW/IPS/IDS Recon Weapon -ization Delivery Exploit Install C&C Action Sandbox/NGFW/Proxy
  • 9. Company logo 100% Prevention is Not Possible • Only focused on part of the kill chain Recon Weapon -ization Delivery Exploit Install C&C Action Neiman Marcus Target PoS French Aerospace 0 day
  • 10. Company logo How Seculert Identified Shamoon • Take the accurate intelligence gathered during the late stages of the kill chain and push it back into existing systems • Enhances your ability to recognize and stop attacks Recon Weapon -ization Delivery Exploit Install C&C Action Malware behavioral profile Actionable Data Crowdsourced threat data Traffic log analysisElastic Sandbox
  • 11. Company logo A Holistic Approach PREDICTIVE Recon Weaponization PROACTIVE Delivery Exploit Install REACTIVE C&C Action Risk Intelligence FW/IPS Sandbox/NGFW/ Proxy IR/Forensics Threat Intel SIEM IntelligenceVectors Seculert Intelligence Identification

Editor's Notes

  1. • Explore the mechanics of the two stage targeted attack known as Shamoon• Understand why the attack was not prevented by traditional on-premises security solutions• Understand through the Shamoon attack that 100% prevention is not possible• Gain an introduction to the tools and solutions that detected Shamoon• Further comprehend APTs and other advanced malware and how to protect your company from attacks like Shamoon
  2. In August of 2012, Shamoon, a new malware that was designed to attack Aramco, the Saudi Arabian national oil and natural gas company was discovered. In its wake, the Shamoon malware destroyed data on about 30,000 of Aramco’s computers and servers, and inflicted a massive amount of damage and chaos that is still being felt today.
  3. Created scheduled tasks on remote machines on the local networkWorm capabilities spread itself, by trying to create a scheduled task on remote LAN linesWiper module time bomb designed to evade traditional Sandboxing technologies Eldossigned the certificate
  4. AS ONE CISO TOLD ME – ANY TIME I STOP A STEP IN THE KILL CHAIN, I WIN. I NEED INTELLIGENCE TO PRIME MY DEFENSES EARLIER IN THE KILL CHAINCyber adversaries are increasingly sophisticated and well-fundedDesign malware to evade a sandbox by having it remain dormantDevice specificVirtualized environments The majority of today’s attacks follow the kill chainIt is important to addresses all 3 stages of the kill chain- maximizing protectionPredictiveProactiveReactiveNeed a whole lot of threat intelligence
  5. This leaves significant gaps that attackers take advantage ofShamoon took advantage of a gap the kill chain
  6. targeted companies were using solutions which are focused on prevention/ the predictive section of the kill chainonly stops known threatsthis leaves significant gaps in a company’s security allowing threats to get through we saw this most recently with examples like Target PoS, Neiman Marcus, French Aerospace
  7. How the attack was identified?A customer uploaded a suspicious file to the SeculertElastic SandboxA malware behavioral profile was automatically createdBig Data analytics simultaneously searched for anomalies on another customers’ gateway traffic logs and found activity that fit new behavior profile Crowdsourcing the threat data- feeds devices at start of kill chainProtected othersSmarter use of resourcesAccurate and actionable threat dataother vendorshoneypotsP2P and HTTP sinkholesbotnet communicationsmachine learningtraffic log analysis
  8. AS WE MOVE FROM LEFT TO RIGHT – WE MOVE THROUGH THE STEPS OF THE KILL CHAIN – THE RISK OF LEARNING OF THE ATTACK VECTORS INCREASES THE LONGER YOU WAIT; BUT THE INTELLIGENCE OF WHAT”s HAPPENING DOES ALSO - THIS MAKES RESPONDING MUCH MORE EFFECTIVE.AS WE LOOK AT THE DEFENSES WE HAVE AT EACH STAGE OF THE KILL CHAIN, WE UNDERSTAND THAT EACH DEFENSE IS FALLIBLEFW/IPS is EASILY BYPASSEDSANDBOX; NGFW; PROXY HAS 2-5 MINS TO IDENTIFY NEW INBOUND EMAIL or URLs, even then this is just THREAT – not yet an INFECTION – so how do you respond to a THREAT – EITHER BLOCK IT or FOLLOW WHERE IT GOES. What do you do when you get there?SIEM/THREAT INTEL – We are looking for possible INFECTIONS when we compare where our users and systems have communicated vs the best ‘THREAT INTEL’ we can buy – but due to the HIGH FALSE POSITIVE RATE, we have to employ EXPENSIVE and HARD TO FIND ANALYSTS to figure out if we are TRULY INFECTED or COMPROMISED. The IR/Forensic Team dream of ACCURATE, ACTIONABLE information that allows them to MIGITATE or REMEDIATE an INFECTION or COMPROMISE before it becomes a BREACHAt SECULERT, we are providing that CRISP, CLEAN, ACTIONABLE, ACCURATE INTELLIGENCE that confirms an INFECTION or COMPROMISE before it BREACHES. Making it much more COST EFFECTIVE and EFFICIENT for existing ANALYSTS, IR and FORENSIC TEAMs to respond, whether the USERS is INTERNAL or REMOTE, an EMPLOYEE or a PARTNER/CONTRACTOR. The Key is to feed this advanced information into the EARLIER PREVENTION DEFENSES to give them the latest INTELLIGENC VECTORS to BLOCK current COMMUNICAITONS, giving IR time to REMEDIATE the INFECTION.WHAT DOES THIS LOOK LIKE IN REAL LIFE?