SlideShare a Scribd company logo
1 of 28
© 2011 Monterey Technology Group Inc.
Brought to you by




               www.lumension.com



Speaker
      Chris Merritt - Director of Solution Marketing
Preview of Key Points

 How it worked
 Lessons learned




© 2012 Monterey Technology Group Inc.
How Flame Worked

                               24 Command &
                               Control Servers

                                                 84 Domain Names
                                                     traffic-spot.bz
                                                  trafffic-spot.com
                                                     quick-net.info
                                                  smart-access.net
                                                 chchengingine.com
                                                    chchengine.net
                                                  flasp.webhop.net




                                                       Internal Network




© 2012 Monterey Technology Group Inc.
How Flame Worked




                                        Internal Network




© 2012 Monterey Technology Group Inc.
How Flame Worked


                                            Flame’s 20MB of Capabilities
                                            • Bluetooth
                                            • Audio
                                            • USB
                                            • Backdoor accounts
                                            • Proxy server
                                            • Windows Update
                                            • Extendable modular architecture
                                            • File system search
                                            • Text summaries of interesting files
                                            • Logging
                                            • Trickle uploader
                                            • Anti-Malware aware
                                        Internal Network


                                            • Compression
                                            • SSL fallback to SSH


© 2012 Monterey Technology Group Inc.
How Flame Worked




                                        Internal Network




© 2012 Monterey Technology Group Inc.
How Flame Spread via WU




 1. Flame activates on first computer (X)
 2. Another computer (Y) wants to check for Windows Updates
 3. Y defaults to automatic proxy server and broadcasts an
    NBNS request for WPAD (Web Proxy Auto-Discovery)
 4. X answers back and spoofs itself as a proxy server
 5. Y attempts to connect through X to Microsoft’s Windows update
    site and retrieve updates
 6. X pretends to be Windows Update and sends back a bogus patch
    which contains Flame
 7. But why does Y’s Windows Update validation logic trust the bogus
    patch?
© 2012 Monterey Technology Group Inc.
How Flame Spread via WU




 8. Flame signs the patch with a certificate that appears to be from Microsoft
 9. The certificate was created from a Terminal Services Licensing Service
    CAL certificate
 10. Then used to sign the patch
 11. Why was it possible to do this?




© 2012 Monterey Technology Group Inc.
The Incredible Part

 All possible because the bad guys pulled
  off a highly advanced cryptography trick
  Chosen prefix attack on the MD5 hash of
   certificate signature




                                 Real           Fake
                                 TS Licensing   Windows Update
                                 Certificate    Certificate




                                                Signature from MS Certificate Authority
© 2012 Monterey Technology Group Inc.
What Microsoft Did Wrong

 TS Licensing certs included code signing
  in the intended uses
 TS Licensing certs were ultimately signed
  by Microsoft’s Root CA
  Windows Update was looking for cert’s
   signed by Microsoft
 TS Licensing certs used MD5
 This allowed the attackers to create a
  bogus certificate and forge signatures on
  bogus patches

© 2012 Monterey Technology Group Inc.
Lessons learned

 MD5 was broken a long, long time ago
  Stop using technologies theoretically broken
   (intersection w/o stoplight syndrome)
 PKI is tricky
  Who do you trust and for what purposes?
 Good security still rules




© 2012 Monterey Technology Group Inc.
Lessons learned

  Good security still rules
   Website categorization
   Egress traffic analysis
   Anti-malware
   Whitelisting
   Reduce attack surface
            • Turn off unneeded features like WPAD
            • Turn off bluetooth
      Device control
      Internally controlled patch management
      Security log monitoring
            • New account reconciliation
            • New authentication packages


© 2012 Monterey Technology Group Inc.
Bottom Line

 Endpoint security technologies really work
  Whitelisting
  Antimalware
  Device control
  Removable media
  Configuration management
  Internally controlled patch management




© 2012 Monterey Technology Group Inc.
Brought to you by




               www.lumension.com



Speaker
      Chris Merritt - Director of Solution Marketing
Defense-in-Depth


Tools You Need to
Disrupt Sophisticated
Attacks like Flame

Chris Merritt
Director of Solution Marketing
Lumension
Integrated Defense-in-Depth
             Unify workflows and technologies to deliver enhanced
           endpoint operations and security management capabilities

Endpoint Operations                        Intelligent Whitelisting                        Endpoint Security

                             Patch
                                                                         Application Control    Device Control
                           Management

       Asset               Configuration                  Trusted           Anti-Virus /
                                                          Change                               Disk Encryption
     Management            Management                                        Spyware

      Software               Power                                                             Windows Firewall
     Management            Management                                                           Management


                                                          Reporting




                              » Delivers Comprehensive Security Solution
                              » Provides Proactive Target Hardening
                              » Reduces Overall IT Cost and Burden


17
              PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Lumension® Patch and Remediation
                        Comprehensive and Secure Patch Management
Endpoint Operations                                              » Provides rapid, accurate and secure patch and
                                                                   configuration management for applications and
Endpoint Operations




                      Lumension® Patch and Remediation
                                                                   operating systems:
                         Lumension® Content Wizard                  •   Comprehensive support for multiple OS types
                       Lumension® Configuration Mgmt.
                                                                        (Windows, *nix, Apple), native applications, and
                                                                        3rd party applications
                       Lumension® Power Management                  •   Streamline and centralize management of
                                                                        heterogeneous environments
                                                                    •   Visibility and control of all online or offline endpoints
                                                                    •   Elevate security posture and proactively reduce risk
                                                                    •   Save time and cost through automation




18
                              PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Lumension® Content Wizard
                      Cost-Effectively Streamline Endpoint Management
Endpoint Operations                                              » Simple, wizard-based policy creation and
                                                                   baseline enforcement – without add’l tools:
Endpoint Operations




                      Lumension® Patch and Remediation
                                                                    •   Patch Creation
                         Lumension® Content Wizard                  •   Software Installs and Uninstalls
                       Lumension® Configuration Mgmt.               •   Windows Security Policies
                                                                    •   Power Management Policies
                       Lumension® Power Management
                                                                    •   NEW! Windows Firewall Policies




19
                              PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Lumension® Security Configuration Mgmt.
Prevent Configuration Drift and Ensure Policy Compliance
Endpoint Operations                                              » Ensure that endpoint operating systems and
                                                                   applications are securely configured and in
Endpoint Operations




                      Lumension® Patch and Remediation
                                                                   compliance with industry best practices and
                         Lumension® Content Wizard                 regulatory standards:
                       Lumension® Configuration Mgmt.               •   Security Configuration Management
                                                                    •   Out-of-the-box Checklist Templates
                       Lumension® Power Management
                                                                    •   NIST Validated Solution
                                                                    •   Continuous Policy Assessment and Enforcement
                                                                    •   Based on Open Standards for Easy Customization
                                                                    •   Security Configuration and Posture Reporting




20
                              PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Lumension® Power Management
                      Optimize Power Savings while Maintaining Security
Endpoint Operations                                              » Enhanced Wake-on-LAN relay architecture
                                                                   ensures systems are available for maintenance
Endpoint Operations




                      Lumension® Patch and Remediation
                                                                   despite being powered down
                         Lumension® Content Wizard
                                                                 » Monetizes Power Management Policies:
                       Lumension® Configuration Mgmt.
                                                                    • Integrated Power Savings Reports
                       Lumension® Power Management                  • Power Monitoring and Savings Calculator
                                                                    • Uptime Reports
                                                                    • Dashboard – Uptime or Savings Trends




21
                              PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Lumension® AntiVirus
             Multilayered Protection Against Malware
» Based on proven technology from industry                                         Endpoint Security
  leader providing complete protection against
                                                                           Lumension® AntiVirus
  known and unknown malware including viruses,




                                                                                                        Endpoint Security
  worms, Trojans, spyware, adware and more                             Lumension® Application Control


» Includes a breadth of analysis techniques from                        Lumension® Device Control

  traditional signature matching to behavioral                          Lumension® Disk Encryption
  analysis to effectively protect against zero-day
  and evolving threats:
 • Antivirus (AV) protection (full signature matching)
 • DNA Matching (partial signature matching)
 • SandBox (behavioral analysis in an emulated
   environment)
 • Exploit Detection (find hidden/embedded malware)

» VB100 certified by VirusBulletin


22
            PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Lumension® Application Control
        Proactive Protection Against Malware and More
» Effective Endpoint Security: Block known and                                      Endpoint Security
  unknown malware without signatures, and
                                                                            Lumension® AntiVirus
  prevent exploitation of application / configuration




                                                                                                         Endpoint Security
  vulnerabilities                                                       Lumension® Application Control


» Control the Unwanted: Real-time view of all                            Lumension® Device Control

  application inventory, ensuring only approved                          Lumension® Disk Encryption
  software is allowed to run, and denying /
  removing all unwanted applications
» Control the Unknown: Enforce, log and audit
  all endpoint application change while controlling
  end-users with Local Admin rights
» Flexible and Easy-To-Use: Unified solution
  workflow via single console with flexible trusted
  change management policy


23
             PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Lumension® Device Control
          Policy-Based Data Protection and Encryption
» Protect Data from Loss or Theft: Centrally                                       Endpoint Security
  enforce usage policies of all endpoint ports and
                                                                           Lumension® AntiVirus
  for all removable devices / media.




                                                                                                        Endpoint Security
                                                                       Lumension® Application Control
» Increase Data Security: Define forced
  encryption policy for data flows onto removable                       Lumension® Device Control

  devices / media. Flexible exception                                   Lumension® Disk Encryption
  management.
» Improve Compliance: Centrally encrypt
  removable devices / media to ensure data
  cannot be accessed if they are lost or stolen.
» Continuous Audit Readiness: Monitor all
  device usage and data transfers. Track all
  transferred files and content. Report on all
  data policy compliance and violations.


24
            PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Lumension® Disk Encryption (powered by Sophos)
             Transparent Full Disk Encryption for PCs
» Secures all data on endpoint harddrives                                           Endpoint Security
» Provides single sign-on to Windows                                        Lumension® AntiVirus




                                                                                                         Endpoint Security
» Enforces secure, user-friendly pre-boot                               Lumension® Application Control
  authentication (multi-factor, multi-user options)
                                                                         Lumension® Device Control
» Quickly recovers forgotten passwords and data
  (local self-help, challenge / response, etc.)                          Lumension® Disk Encryption

» Automated deployment, management and
  auditing via L.E.M.S.S. (integrated version)




25
             PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Lumension® Endpoint Management and Security Suite
                                                      Total Endpoint Protection

                 Endpoint Operations                         Endpoint Reporting Services

                                       Lumension® Patch and Remediation               Lumension® AntiVirus




                                                                                                                   Endpoint Security
                                          Lumension® Content Wizard               Lumension® Application Control

                                        Lumension® Configuration Mgmt.             Lumension® Device Control

                                        Lumension® Power Management                Lumension® Disk Encryption

                                                      Lumension® Endpoint Management Platform



»   Comprehensive suite that unifies IT operational and security functions
»   Delivers a more effective defense-in-depth endpoint security solution
»   Simplifies endpoint system and agent management thru single console
»   Centralizes policy management and reporting
»   Expands operational and security visibility
»   Reduces technology complexity and integration costs
»   Flexible and modularly licensed best-of-breed application modules
»   Scalable and agile single-agent, single-server platform architecture


26
                       PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Next Steps
• Free Tools
     »   http://www.lumension.com/Resources/Premium-Security-Tools.aspx
     »   Application Scanner – see what applications are running on your network
     »   Device Scanner – see what removable devices are being used
     »   Vulnerability Scanner – see what your OS / application risks are


• Whitepapers
     » Endpoint Management and Security Buyers Guide
         •   http://www.lumension.com/Resources/WhitePapers/
             Endpoint-Management-and-Security-Buyers-Guide.aspx



• Free Evaluation
     » http://www.lumension.com/
       endpoint-management-security-suite/free-trial.aspx


27
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255

1.888.725.7828
info@lumension.com

More Related Content

What's hot

PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosNextel S.A.
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Managementdavidzucker
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify PillarEd Wong
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Digicomp Academy AG
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the CloudNeil Readshaw
 

What's hot (20)

PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Management
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 

Viewers also liked

Attacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryAttacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryJames Wickett
 
iPods, CD/DVD, USB, etc. - How to Protect From the Dangers Within
iPods, CD/DVD, USB, etc. - How to Protect From the Dangers WithiniPods, CD/DVD, USB, etc. - How to Protect From the Dangers Within
iPods, CD/DVD, USB, etc. - How to Protect From the Dangers Withindigitallibrary
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAlgoSec
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSAmazon Web Services
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
Consul: Microservice Enabling Microservices and Reactive Programming
Consul: Microservice Enabling Microservices and Reactive ProgrammingConsul: Microservice Enabling Microservices and Reactive Programming
Consul: Microservice Enabling Microservices and Reactive ProgrammingRick Hightower
 
Orchestrating Docker with Terraform and Consul by Mitchell Hashimoto
Orchestrating Docker with Terraform and Consul by Mitchell Hashimoto Orchestrating Docker with Terraform and Consul by Mitchell Hashimoto
Orchestrating Docker with Terraform and Consul by Mitchell Hashimoto Docker, Inc.
 
An intro to Docker, Terraform, and Amazon ECS
An intro to Docker, Terraform, and Amazon ECSAn intro to Docker, Terraform, and Amazon ECS
An intro to Docker, Terraform, and Amazon ECSYevgeniy Brikman
 

Viewers also liked (9)

Attacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryAttacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous Delivery
 
iPods, CD/DVD, USB, etc. - How to Protect From the Dangers Within
iPods, CD/DVD, USB, etc. - How to Protect From the Dangers WithiniPods, CD/DVD, USB, etc. - How to Protect From the Dangers Within
iPods, CD/DVD, USB, etc. - How to Protect From the Dangers Within
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’ts
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWS
 
London HUG 19/5 - Kubernetes and vault
London HUG 19/5 - Kubernetes and vaultLondon HUG 19/5 - Kubernetes and vault
London HUG 19/5 - Kubernetes and vault
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
Consul: Microservice Enabling Microservices and Reactive Programming
Consul: Microservice Enabling Microservices and Reactive ProgrammingConsul: Microservice Enabling Microservices and Reactive Programming
Consul: Microservice Enabling Microservices and Reactive Programming
 
Orchestrating Docker with Terraform and Consul by Mitchell Hashimoto
Orchestrating Docker with Terraform and Consul by Mitchell Hashimoto Orchestrating Docker with Terraform and Consul by Mitchell Hashimoto
Orchestrating Docker with Terraform and Consul by Mitchell Hashimoto
 
An intro to Docker, Terraform, and Amazon ECS
An intro to Docker, Terraform, and Amazon ECSAn intro to Docker, Terraform, and Amazon ECS
An intro to Docker, Terraform, and Amazon ECS
 

Similar to Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It

Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 
End-point Management
End-point ManagementEnd-point Management
End-point ManagementIBM Danmark
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionF5 Networks
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityLumension
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryBlack Duck by Synopsys
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryTim Mackey
 
Presentation applications with the power of soft layer
Presentation   applications with the power of soft layerPresentation   applications with the power of soft layer
Presentation applications with the power of soft layerxKinAnx
 
IBM InterConnect 2013 Cloud General Session: George Karidis
IBM InterConnect 2013 Cloud General Session: George KaridisIBM InterConnect 2013 Cloud General Session: George Karidis
IBM InterConnect 2013 Cloud General Session: George KaridisIBM Events
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
PCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin VittrupPCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin VittrupIBM Danmark
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementjustinkallhoff
 
סייבר ארק מירי
סייבר ארק  מיריסייבר ארק  מירי
סייבר ארק מיריlihig
 
Future of IT
Future of ITFuture of IT
Future of ITSimon May
 

Similar to Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It (20)

VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
End-point Management
End-point ManagementEnd-point Management
End-point Management
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater Insanity
 
S series presentation
S series presentationS series presentation
S series presentation
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Presentation applications with the power of soft layer
Presentation   applications with the power of soft layerPresentation   applications with the power of soft layer
Presentation applications with the power of soft layer
 
IBM InterConnect 2013 Cloud General Session: George Karidis
IBM InterConnect 2013 Cloud General Session: George KaridisIBM InterConnect 2013 Cloud General Session: George Karidis
IBM InterConnect 2013 Cloud General Session: George Karidis
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
PCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin VittrupPCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
סייבר ארק מירי
סייבר ארק  מיריסייבר ארק  מירי
סייבר ארק מירי
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
Future of IT
Future of ITFuture of IT
Future of IT
 

More from Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 

More from Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Recently uploaded

08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking MenDelhi Call girls
 
DARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda BuxDARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda BuxBeEducate
 
Akshay Mehndiratta Summer Special Light Meal Ideas From Across India.pptx
Akshay Mehndiratta Summer Special Light Meal Ideas From Across India.pptxAkshay Mehndiratta Summer Special Light Meal Ideas From Across India.pptx
Akshay Mehndiratta Summer Special Light Meal Ideas From Across India.pptxAkshay Mehndiratta
 
Italia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue muraItalia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue murasandamichaela *
 
08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking MenDelhi Call girls
 
Moving to Italy - A Relocation Rollercoaster
Moving to Italy - A Relocation RollercoasterMoving to Italy - A Relocation Rollercoaster
Moving to Italy - A Relocation RollercoasterStefSmulders1
 
Exploring Sicily Your Comprehensive Ebook Travel Guide
Exploring Sicily Your Comprehensive Ebook Travel GuideExploring Sicily Your Comprehensive Ebook Travel Guide
Exploring Sicily Your Comprehensive Ebook Travel GuideTime for Sicily
 
08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking Men08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking MenDelhi Call girls
 
visa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa Consultantvisa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa ConsultantSherazi Tours
 
VIP Call Girls in Noida 9711199012 Escorts in Greater Noida,Ms
VIP Call Girls in Noida 9711199012 Escorts in Greater Noida,MsVIP Call Girls in Noida 9711199012 Escorts in Greater Noida,Ms
VIP Call Girls in Noida 9711199012 Escorts in Greater Noida,Msankitnayak356677
 
Dubai Call Girls O528786472 Call Girls Dubai Big Juicy
Dubai Call Girls O528786472 Call Girls Dubai Big JuicyDubai Call Girls O528786472 Call Girls Dubai Big Juicy
Dubai Call Girls O528786472 Call Girls Dubai Big Juicyhf8803863
 
Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236Sherazi Tours
 
A Comprehensive Guide to The Types of Dubai Residence Visas.pdf
A Comprehensive Guide to The Types of Dubai Residence Visas.pdfA Comprehensive Guide to The Types of Dubai Residence Visas.pdf
A Comprehensive Guide to The Types of Dubai Residence Visas.pdfDisha Global Tours
 
08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking MenDelhi Call girls
 
best weekend places near delhi where you should visit.pdf
best weekend places near delhi where you should visit.pdfbest weekend places near delhi where you should visit.pdf
best weekend places near delhi where you should visit.pdftour guide
 
"Fly with Ease: Booking Your Flights with Air Europa"
"Fly with Ease: Booking Your Flights with Air Europa""Fly with Ease: Booking Your Flights with Air Europa"
"Fly with Ease: Booking Your Flights with Air Europa"flyn goo
 
Top 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxTop 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxdishha99
 
How can I fly with the British Airways Unaccompanied Minor Policy?
How can I fly with the British Airways Unaccompanied Minor Policy?How can I fly with the British Airways Unaccompanied Minor Policy?
How can I fly with the British Airways Unaccompanied Minor Policy?flightsvillacom
 
BERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxBERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxseribangash
 

Recently uploaded (20)

08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
 
DARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda BuxDARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda Bux
 
Akshay Mehndiratta Summer Special Light Meal Ideas From Across India.pptx
Akshay Mehndiratta Summer Special Light Meal Ideas From Across India.pptxAkshay Mehndiratta Summer Special Light Meal Ideas From Across India.pptx
Akshay Mehndiratta Summer Special Light Meal Ideas From Across India.pptx
 
Italia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue muraItalia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue mura
 
Call Girls In Munirka 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Munirka 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Munirka 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Munirka 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men
 
Moving to Italy - A Relocation Rollercoaster
Moving to Italy - A Relocation RollercoasterMoving to Italy - A Relocation Rollercoaster
Moving to Italy - A Relocation Rollercoaster
 
Exploring Sicily Your Comprehensive Ebook Travel Guide
Exploring Sicily Your Comprehensive Ebook Travel GuideExploring Sicily Your Comprehensive Ebook Travel Guide
Exploring Sicily Your Comprehensive Ebook Travel Guide
 
08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking Men08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking Men
 
visa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa Consultantvisa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa Consultant
 
VIP Call Girls in Noida 9711199012 Escorts in Greater Noida,Ms
VIP Call Girls in Noida 9711199012 Escorts in Greater Noida,MsVIP Call Girls in Noida 9711199012 Escorts in Greater Noida,Ms
VIP Call Girls in Noida 9711199012 Escorts in Greater Noida,Ms
 
Dubai Call Girls O528786472 Call Girls Dubai Big Juicy
Dubai Call Girls O528786472 Call Girls Dubai Big JuicyDubai Call Girls O528786472 Call Girls Dubai Big Juicy
Dubai Call Girls O528786472 Call Girls Dubai Big Juicy
 
Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236
 
A Comprehensive Guide to The Types of Dubai Residence Visas.pdf
A Comprehensive Guide to The Types of Dubai Residence Visas.pdfA Comprehensive Guide to The Types of Dubai Residence Visas.pdf
A Comprehensive Guide to The Types of Dubai Residence Visas.pdf
 
08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men
 
best weekend places near delhi where you should visit.pdf
best weekend places near delhi where you should visit.pdfbest weekend places near delhi where you should visit.pdf
best weekend places near delhi where you should visit.pdf
 
"Fly with Ease: Booking Your Flights with Air Europa"
"Fly with Ease: Booking Your Flights with Air Europa""Fly with Ease: Booking Your Flights with Air Europa"
"Fly with Ease: Booking Your Flights with Air Europa"
 
Top 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxTop 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptx
 
How can I fly with the British Airways Unaccompanied Minor Policy?
How can I fly with the British Airways Unaccompanied Minor Policy?How can I fly with the British Airways Unaccompanied Minor Policy?
How can I fly with the British Airways Unaccompanied Minor Policy?
 
BERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxBERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptx
 

Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It

  • 1. © 2011 Monterey Technology Group Inc.
  • 2. Brought to you by www.lumension.com Speaker  Chris Merritt - Director of Solution Marketing
  • 3. Preview of Key Points How it worked Lessons learned © 2012 Monterey Technology Group Inc.
  • 4. How Flame Worked 24 Command & Control Servers 84 Domain Names traffic-spot.bz trafffic-spot.com quick-net.info smart-access.net chchengingine.com chchengine.net flasp.webhop.net Internal Network © 2012 Monterey Technology Group Inc.
  • 5. How Flame Worked Internal Network © 2012 Monterey Technology Group Inc.
  • 6. How Flame Worked Flame’s 20MB of Capabilities • Bluetooth • Audio • USB • Backdoor accounts • Proxy server • Windows Update • Extendable modular architecture • File system search • Text summaries of interesting files • Logging • Trickle uploader • Anti-Malware aware Internal Network • Compression • SSL fallback to SSH © 2012 Monterey Technology Group Inc.
  • 7. How Flame Worked Internal Network © 2012 Monterey Technology Group Inc.
  • 8. How Flame Spread via WU 1. Flame activates on first computer (X) 2. Another computer (Y) wants to check for Windows Updates 3. Y defaults to automatic proxy server and broadcasts an NBNS request for WPAD (Web Proxy Auto-Discovery) 4. X answers back and spoofs itself as a proxy server 5. Y attempts to connect through X to Microsoft’s Windows update site and retrieve updates 6. X pretends to be Windows Update and sends back a bogus patch which contains Flame 7. But why does Y’s Windows Update validation logic trust the bogus patch? © 2012 Monterey Technology Group Inc.
  • 9. How Flame Spread via WU 8. Flame signs the patch with a certificate that appears to be from Microsoft 9. The certificate was created from a Terminal Services Licensing Service CAL certificate 10. Then used to sign the patch 11. Why was it possible to do this? © 2012 Monterey Technology Group Inc.
  • 10. The Incredible Part All possible because the bad guys pulled off a highly advanced cryptography trick Chosen prefix attack on the MD5 hash of certificate signature Real Fake TS Licensing Windows Update Certificate Certificate Signature from MS Certificate Authority © 2012 Monterey Technology Group Inc.
  • 11. What Microsoft Did Wrong TS Licensing certs included code signing in the intended uses TS Licensing certs were ultimately signed by Microsoft’s Root CA Windows Update was looking for cert’s signed by Microsoft TS Licensing certs used MD5 This allowed the attackers to create a bogus certificate and forge signatures on bogus patches © 2012 Monterey Technology Group Inc.
  • 12. Lessons learned MD5 was broken a long, long time ago Stop using technologies theoretically broken (intersection w/o stoplight syndrome) PKI is tricky Who do you trust and for what purposes? Good security still rules © 2012 Monterey Technology Group Inc.
  • 13. Lessons learned  Good security still rules  Website categorization  Egress traffic analysis  Anti-malware  Whitelisting  Reduce attack surface • Turn off unneeded features like WPAD • Turn off bluetooth  Device control  Internally controlled patch management  Security log monitoring • New account reconciliation • New authentication packages © 2012 Monterey Technology Group Inc.
  • 14. Bottom Line Endpoint security technologies really work Whitelisting Antimalware Device control Removable media Configuration management Internally controlled patch management © 2012 Monterey Technology Group Inc.
  • 15. Brought to you by www.lumension.com Speaker  Chris Merritt - Director of Solution Marketing
  • 16. Defense-in-Depth Tools You Need to Disrupt Sophisticated Attacks like Flame Chris Merritt Director of Solution Marketing Lumension
  • 17. Integrated Defense-in-Depth Unify workflows and technologies to deliver enhanced endpoint operations and security management capabilities Endpoint Operations Intelligent Whitelisting Endpoint Security Patch Application Control Device Control Management Asset Configuration Trusted Anti-Virus / Change Disk Encryption Management Management Spyware Software Power Windows Firewall Management Management Management Reporting » Delivers Comprehensive Security Solution » Provides Proactive Target Hardening » Reduces Overall IT Cost and Burden 17 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 18. Lumension® Patch and Remediation Comprehensive and Secure Patch Management Endpoint Operations » Provides rapid, accurate and secure patch and configuration management for applications and Endpoint Operations Lumension® Patch and Remediation operating systems: Lumension® Content Wizard • Comprehensive support for multiple OS types Lumension® Configuration Mgmt. (Windows, *nix, Apple), native applications, and 3rd party applications Lumension® Power Management • Streamline and centralize management of heterogeneous environments • Visibility and control of all online or offline endpoints • Elevate security posture and proactively reduce risk • Save time and cost through automation 18 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 19. Lumension® Content Wizard Cost-Effectively Streamline Endpoint Management Endpoint Operations » Simple, wizard-based policy creation and baseline enforcement – without add’l tools: Endpoint Operations Lumension® Patch and Remediation • Patch Creation Lumension® Content Wizard • Software Installs and Uninstalls Lumension® Configuration Mgmt. • Windows Security Policies • Power Management Policies Lumension® Power Management • NEW! Windows Firewall Policies 19 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 20. Lumension® Security Configuration Mgmt. Prevent Configuration Drift and Ensure Policy Compliance Endpoint Operations » Ensure that endpoint operating systems and applications are securely configured and in Endpoint Operations Lumension® Patch and Remediation compliance with industry best practices and Lumension® Content Wizard regulatory standards: Lumension® Configuration Mgmt. • Security Configuration Management • Out-of-the-box Checklist Templates Lumension® Power Management • NIST Validated Solution • Continuous Policy Assessment and Enforcement • Based on Open Standards for Easy Customization • Security Configuration and Posture Reporting 20 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 21. Lumension® Power Management Optimize Power Savings while Maintaining Security Endpoint Operations » Enhanced Wake-on-LAN relay architecture ensures systems are available for maintenance Endpoint Operations Lumension® Patch and Remediation despite being powered down Lumension® Content Wizard » Monetizes Power Management Policies: Lumension® Configuration Mgmt. • Integrated Power Savings Reports Lumension® Power Management • Power Monitoring and Savings Calculator • Uptime Reports • Dashboard – Uptime or Savings Trends 21 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 22. Lumension® AntiVirus Multilayered Protection Against Malware » Based on proven technology from industry Endpoint Security leader providing complete protection against Lumension® AntiVirus known and unknown malware including viruses, Endpoint Security worms, Trojans, spyware, adware and more Lumension® Application Control » Includes a breadth of analysis techniques from Lumension® Device Control traditional signature matching to behavioral Lumension® Disk Encryption analysis to effectively protect against zero-day and evolving threats: • Antivirus (AV) protection (full signature matching) • DNA Matching (partial signature matching) • SandBox (behavioral analysis in an emulated environment) • Exploit Detection (find hidden/embedded malware) » VB100 certified by VirusBulletin 22 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 23. Lumension® Application Control Proactive Protection Against Malware and More » Effective Endpoint Security: Block known and Endpoint Security unknown malware without signatures, and Lumension® AntiVirus prevent exploitation of application / configuration Endpoint Security vulnerabilities Lumension® Application Control » Control the Unwanted: Real-time view of all Lumension® Device Control application inventory, ensuring only approved Lumension® Disk Encryption software is allowed to run, and denying / removing all unwanted applications » Control the Unknown: Enforce, log and audit all endpoint application change while controlling end-users with Local Admin rights » Flexible and Easy-To-Use: Unified solution workflow via single console with flexible trusted change management policy 23 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 24. Lumension® Device Control Policy-Based Data Protection and Encryption » Protect Data from Loss or Theft: Centrally Endpoint Security enforce usage policies of all endpoint ports and Lumension® AntiVirus for all removable devices / media. Endpoint Security Lumension® Application Control » Increase Data Security: Define forced encryption policy for data flows onto removable Lumension® Device Control devices / media. Flexible exception Lumension® Disk Encryption management. » Improve Compliance: Centrally encrypt removable devices / media to ensure data cannot be accessed if they are lost or stolen. » Continuous Audit Readiness: Monitor all device usage and data transfers. Track all transferred files and content. Report on all data policy compliance and violations. 24 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 25. Lumension® Disk Encryption (powered by Sophos) Transparent Full Disk Encryption for PCs » Secures all data on endpoint harddrives Endpoint Security » Provides single sign-on to Windows Lumension® AntiVirus Endpoint Security » Enforces secure, user-friendly pre-boot Lumension® Application Control authentication (multi-factor, multi-user options) Lumension® Device Control » Quickly recovers forgotten passwords and data (local self-help, challenge / response, etc.) Lumension® Disk Encryption » Automated deployment, management and auditing via L.E.M.S.S. (integrated version) 25 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 26. Lumension® Endpoint Management and Security Suite Total Endpoint Protection Endpoint Operations Endpoint Reporting Services Lumension® Patch and Remediation Lumension® AntiVirus Endpoint Security Lumension® Content Wizard Lumension® Application Control Lumension® Configuration Mgmt. Lumension® Device Control Lumension® Power Management Lumension® Disk Encryption Lumension® Endpoint Management Platform » Comprehensive suite that unifies IT operational and security functions » Delivers a more effective defense-in-depth endpoint security solution » Simplifies endpoint system and agent management thru single console » Centralizes policy management and reporting » Expands operational and security visibility » Reduces technology complexity and integration costs » Flexible and modularly licensed best-of-breed application modules » Scalable and agile single-agent, single-server platform architecture 26 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 27. Next Steps • Free Tools » http://www.lumension.com/Resources/Premium-Security-Tools.aspx » Application Scanner – see what applications are running on your network » Device Scanner – see what removable devices are being used » Vulnerability Scanner – see what your OS / application risks are • Whitepapers » Endpoint Management and Security Buyers Guide • http://www.lumension.com/Resources/WhitePapers/ Endpoint-Management-and-Security-Buyers-Guide.aspx • Free Evaluation » http://www.lumension.com/ endpoint-management-security-suite/free-trial.aspx 27
  • 28. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 info@lumension.com