©LogRhythm 2017. All rights reserved. Company Confidential
PIE
Active Defense Against Phishing
Greg Foss
Manager, Global Security Operations
OSCP, GMON, GAWN, GPEN, GWAPT, GCIH, CEH, APT
Email is the Gateway
Corporate boundaries are a thing of the past…
Most Common Attack - Phishing
242 Phishing Attacks in Q4
Average 5 emails received per case – many 100+ email cases
31%
12%
12%
11%
10%
9%
5%
5%
3%
2%
Phishing Attack by Type
Credential Theft Link
Spam
Social Engineering
Malicious Link
Wire Fraud Attempt
Credential Theft Attachment
Malicious PDF
Macro Enabled Document
Encrypted Attachment
False Positive
Metrics are only from the ones that make it through
Majority of
Spam and
Malware are
Blocked
Automatically
It’s not Just Emails from Phishers to Worry About
• Exchange OWA / O365 password spraying
• Targeted mail scraping and extraction
• Malicious rule creation
• Passive account monitoring
• Auto Forwarding
• Email Spoofing
• VoIP and SMS Spoofing
• Data leakage
• General Malware
• …
https://github.com/LogRhythm-Labs/PIE
• Extract email from specific users
• Extract email from all affected users
• Block senders
• Unblock senders
• Reset Office 365 credentials
• Evaluate Message Forwarding rules
• Create and update LogRhythm Cases
• And more…
Story Time!
Quick Metrics
• 90% of phishing attacks that make it through Office365 filters are never seen
by LogRhythm Employees…
• Those that make their way to inboxes are tracked, documented, and
quarantined following a report from a user.
• Of messages reported 75% are quarantined automatically
Story #1 – Phishing Exercise
Users Reporting to Phishing Address
Automate Metric Collection - Basics
Automate Metric Collection – Focus on the Positive
Automate Cleanup and Email Quarantine
Story #2
November 2017
What are you
asking, Andy?
Poof
We had
been
watching
the
whole
time…
Actually registered logrhytthm.com under real name
Turns out he was an older script kiddie
Story #3 – Operation Nigerian Rhythm
Low and Slow dictionary attacks against O365 – going on for months
~3.5k attempts in 1-week
Eventually – they got in via credential phishing
And blasted the entire Sales org an hour later…
It
happened
again…
Round 2 – Bigger, better, and more disruptive
Initial Phish Second Wave
Nick
David
Bob
ENABLE MFA!
Story #4 - Mailsploit
PIE Future Plans and Development Priorities
• 7.3.2 Case API Integration
• O365 URL Rewriting integration
• IDS, Firewall, and Endpoint integration
• Support for On-Premise Exchange
• Web Leaderboard and Open Metrics
• Implement Active Defense Scripts
• Seamless SIEM integration
• Community Integrations!
- What tools are you using?
- What else do you want to see PIE do?
©LogRhythm 2017. All rights reserved. Company Confidential
https://github.com/LogRhythm-Labs/PIE
©LogRhythm 2017. All rights reserved. Company Confidential
Bonus
Messing with Phishers…
What About VoIP and SMS?
What About VoIP and SMS?
Thank You!
Questions?
Greg . Foss [at] logrhythm . com
@heinzarelli
https://github.com/LogRhythm-Labs/PIE/

PIE - BSides Vancouver 2018