SlideShare a Scribd company logo
©2015 Check Point Software Technologies Ltd. 1
We’ve come a long way…
[Protected] Non-confidential content
From This:
Disney Epcot Spaceship Earth
Photo by Jeff Krause
©2015 Check Point Software Technologies Ltd. 22©2014 Check Point Software Technologies Ltd.[Protected] Non-confidential content
©2015 Check Point Software Technologies Ltd. 3
We’ve come a long way…
[Protected] Non-confidential content
To This:
Inside Google Data Centers.
Photo by Connie Zhou
©2015 Check Point Software Technologies Ltd. 4©2015 Check Point Software Technologies Ltd.
Zahier Madhar | Security Engineer
EVOLVING THREAT
LANDSCAPE
©2015 Check Point Software Technologies Ltd. 5
Why?
Bank robber, Willie
Sutton famous
answer when he was
asked why he robbed
banks:
“That’s where the
money is!”
©2015 Check Point Software Technologies Ltd. 6
Today..
• Banks don’t store that large amounts of money anymore..
• Coins and notes are used less due to plastic cards
• Most money transactions are initiated from a personal
computer
• A different approach is needed to steal your money
̶ or information that is valuable and be sold..
• This is where bots takes over!
• In most cases their purpose is to steal or make money
̶ Bots are organized crimes latest tools
©2015 Check Point Software Technologies Ltd. 7
High
Low 1980 1985 1990 1995 2000+
password guessing
self-replicating code
password cracking
exploiting known vulnerabilities
disabling audits
back doors
hijacking
sessions
sweepers
sniffers
packet spoofing
GUI
automated probes/scans
denial of service
www attacks
Tools
Attackers
Intruder
Knowledge
Attack
Sophistication
“stealth” / advanced
scanning techniques
burglaries
network mgmt. diagnostics
distributed
attack tools
Cross site scripting
Staged
attack
Zero Day
Source: CERT
Sophistication Continues To Evolve
©2015 Check Point Software Technologies Ltd. 8©2015 Check Point Software Technologies Ltd.
THE CYBER WAR IS
RAGING ON
“It's a CAT-AND-MOUSE game
We try to stay ahead.
People will try to break in,
and it's our job to STOPthem breaking in.”
Steve Jobs
©2015 Check Point Software Technologies Ltd. 9
Known Unknown Back Again!
• IPS/Anti Virus work by:
̶ Looking for specific patterns
̶ Enforce compliance of protocols to standards
̶ Detect variations from the protocols
• Attackers evade signature based detection by
obfuscating the attacks and creating attacks variants
• So how tough is it?
̶ Zeus and SpyEye ‘builder’s, generating Zeus or Spyeye
variants in a click, are sold at 1-10K$
̶ www.styx-crypt.com will obfuscate HTML, Javascript,
Executable files, PDF & Flash files at 5-25$ per file, quantity
discounts apply.
©2015 Check Point Software Technologies Ltd. 10
Protecting Against Such Attacks
Reputation
based
 Sender email addresses / mail server IP
 MD5 of the PDF or malware
 Ineffective against targeted attack –
no reputation data
Signature
based
 Match on the exploit
 Match on the malware
 Match on the CnC communication
 Limited due to lack of prior knowledge,
variants and obfuscation
[Protected] For public distribution
The multi-million dollar question:
How can we protect against the
known unknowns?
©2015 Check Point Software Technologies Ltd. 11
Let’s Talk About Food
• What would you do if you were given a fruit you didn’t know?
How can you know it isn’t dangerous?
• You should definitely look in the encyclopedia (or Google)
• But what would you do if it’s not listed?
• You can hire someone to examine it in a lab
̶ Very time consuming & expensive
• But you can also give it to a monkey
̶ Usually it gives a good answer
̶ But monkeys are cute
We DO NOT endorse experiments on animals.
(No animal was harmed in any way during the development
of the Threat Emulation Software Blade)
Our ‘monkeys’ don’t have feelings.
We can guarantee that.
©2015 Check Point Software Technologies Ltd. 1212©2014 Check Point Software Technologies Ltd.
Know
Knows
Know
Unknowns
Unknown
Unknowns
Threats we
know we know
Threats we know we
don’t know
Threats we don’t
know we
don’t know
ANTI VIRUS
ANTI BOT
IPS
NEXT GEN SANDBOX
ANTI BOT
[Confidential] For designated groups and individuals
THE THREATS WE NEED TO PREVENT
©2015 Check Point Software Technologies Ltd. 13[Confidential] For designated groups and individuals
Vulnerability
Trigger an attack with
unpatched software or
zero-day vulnerability
Malware
Run
malicious
code
Attack Infection Flow
Exploit
Run an embedded
payload by evading
the CPU
Shellcode
Run a small
payload to
activate malware
[Confidential] For designated groups and individuals
©2015 Check Point Software Technologies Ltd. 14[Confidential] For designated groups and individuals
Vulnerability
Malware
Stop Attacks at the
First Point of Contact
Shellcode
Thousands
Millions
Exploit HANDFUL
DETECT THE ATTACK
BEFORE IT BEGINS
Identify the exploit itself instead of
looking for the evasive malware
[Confidential] For designated groups and individuals
©2015 Check Point Software Technologies Ltd. 15[Confidential] For designated groups and individuals
Vulnerability
Malware
Focus on Malware in its Infancy
Shellcode
Thousands
Millions
Exploit HANDFUL
HIGHLY SOPHISTICATED
EXPLOIT DETECTION
ENGINE
Based on real-time
CPU-level analysis
[Confidential] For designated groups and individuals
©2015 Check Point Software Technologies Ltd. 16
Unprecedented real-time prevention against
unknown malware, zero-day and targeted attacks
WHAT IS THE NEXT GENERATION SANDBOX?
Sandbox with CPU-
Level Detection
Evasion-
resistant
malware
detection
Threat Extraction
Prompt
Delivery of safe
reconstructed
files
©2015 Check Point Software Technologies Ltd. 17
A STANDARD CV?
Emulation @ Work
©2015 Check Point Software Technologies Ltd. 18[Restricted] ONLY for designated groups and individuals
THREATEXTRACTION
CPU-Level Detection
Catches the most sophisticated malware
before evasion techniques deploy
O/S Level Emulation
Stops zero-day and unknown malware
in wide range of file formats
Malware Malware
Original Doc
Safe Doc
Threat Extraction
Deliver safe version of content quickly
SANDBLAST
ZERO-DAY PROTECTION
©2015 Check Point Software Technologies Ltd. 19
Threat Extraction
Document Reconstruction
Original
Document
Document
Reconstructed
Safe Copy of
Document
Reconstructed
safe copy of
documents
Delivered
immediately
Customizable
Protection
Level
[Restricted] ONLY for designated groups and individuals​
©2015 Check Point Software Technologies Ltd. 20
Threat Emulation
Exploit Detection and Prevention
Original
Document
Document is sent for
sandboxing, where it
is opened and
inspected
Original
Document
If no infection
found
Prevent Zero-Day
Attacks
Constantly Update
ThreatCloud
If infected with unknown Malware
-Document is deleted,
-ThreatCloud is updated,
-Admin is notified
Attack is PREVENTED
[Restricted] ONLY for designated groups and individuals​
©2015 Check Point Software Technologies Ltd. 21
VISIBILITY INTO ATTEMPTED ATTACKS
File System
Activity
System
Registry
System
Processes
Network
Connections
Abnormal file activity
Tampered system registry
Remote Connection to
Command & Control Sites
“Naive” processes created
©2015 Check Point Software Technologies Ltd. 22
PROVIDING CLEAN FILES
[Restricted] ONLY for designated groups and individuals
B E F O R E A F T E R
Malware activated Malware removed
©2015 Check Point Software Technologies Ltd. 24©2015 Check Point Software Technologies Ltd.
THANK YOU

More Related Content

What's hot

Silver Lining for Miles: DevOps for Building Security Solutions
Silver Lining for Miles: DevOps for Building Security SolutionsSilver Lining for Miles: DevOps for Building Security Solutions
Silver Lining for Miles: DevOps for Building Security Solutions
SeniorStoryteller
 
Securing a Moving Target
Securing a Moving TargetSecuring a Moving Target
Securing a Moving Target
JAX Chamber IT Council
 
Building Security Controls around Attack Models
Building Security Controls around Attack ModelsBuilding Security Controls around Attack Models
Building Security Controls around Attack Models
SeniorStoryteller
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
Stefan Streichsbier
 
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven
FRSecure
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?
Adrian Sanabria
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
Adrian Sanabria
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
Claus Cramon Houmann
 
2018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 32018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 3
FRSecure
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten
FRSecure
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
Stefan Streichsbier
 
Amateur Hour: Why APTs Are The Least Of Your Worries
Amateur Hour: Why APTs Are The Least Of Your WorriesAmateur Hour: Why APTs Are The Least Of Your Worries
Amateur Hour: Why APTs Are The Least Of Your Worries
Ed Bellis
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
FRSecure
 
Scot Secure 2016
Scot Secure 2016Scot Secure 2016
Scot Secure 2016
Ray Bugg
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security
Adrian Sanabria
 
The road goes ever on and on by Ciaran Conliffe
The road goes ever on and on by Ciaran ConliffeThe road goes ever on and on by Ciaran Conliffe
The road goes ever on and on by Ciaran Conliffe
DevSecCon
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
SeniorStoryteller
 
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019
Stefan Streichsbier
 
AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019 AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019
Aaron Rinehart
 
RSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsRSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to Startups
Adrian Sanabria
 

What's hot (20)

Silver Lining for Miles: DevOps for Building Security Solutions
Silver Lining for Miles: DevOps for Building Security SolutionsSilver Lining for Miles: DevOps for Building Security Solutions
Silver Lining for Miles: DevOps for Building Security Solutions
 
Securing a Moving Target
Securing a Moving TargetSecuring a Moving Target
Securing a Moving Target
 
Building Security Controls around Attack Models
Building Security Controls around Attack ModelsBuilding Security Controls around Attack Models
Building Security Controls around Attack Models
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
 
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?
 
Ten Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard OfTen Security Product Categories You've Probably Never Heard Of
Ten Security Product Categories You've Probably Never Heard Of
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
2018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 32018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 3
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
 
Amateur Hour: Why APTs Are The Least Of Your Worries
Amateur Hour: Why APTs Are The Least Of Your WorriesAmateur Hour: Why APTs Are The Least Of Your Worries
Amateur Hour: Why APTs Are The Least Of Your Worries
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
 
Scot Secure 2016
Scot Secure 2016Scot Secure 2016
Scot Secure 2016
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security
 
The road goes ever on and on by Ciaran Conliffe
The road goes ever on and on by Ciaran ConliffeThe road goes ever on and on by Ciaran Conliffe
The road goes ever on and on by Ciaran Conliffe
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019
 
AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019 AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019
 
RSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsRSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to Startups
 

Similar to Evolving threat landscape

Ochrana pred modernými malware útokmi
Ochrana pred modernými malware útokmiOchrana pred modernými malware útokmi
Ochrana pred modernými malware útokmi
MarketingArrowECS_CZ
 
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
eGov Magazine
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Pointaliciasyc
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
Group of company MUK
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
Check Point Software Technologies
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
Group of company MUK
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
Diana Frolova
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
n|u - The Open Security Community
 
Reading the Security Tea Leaves
Reading the Security Tea LeavesReading the Security Tea Leaves
Reading the Security Tea Leaves
Ed Bellis
 
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
A Profile of the Backoff PoS Malware that Hit 1000+ Retail BusinessesA Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
Lastline, Inc.
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
w4tgrgdyryfh
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Cyren, Inc
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
MarketingArrowECS_CZ
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
CSA Argentina
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
MarketingArrowECS_CZ
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
Sean Whalen
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
SeniorStoryteller
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
Moti Sagey מוטי שגיא
 

Similar to Evolving threat landscape (20)

Ochrana pred modernými malware útokmi
Ochrana pred modernými malware útokmiOchrana pred modernými malware útokmi
Ochrana pred modernými malware útokmi
 
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
 
Reading the Security Tea Leaves
Reading the Security Tea LeavesReading the Security Tea Leaves
Reading the Security Tea Leaves
 
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
A Profile of the Backoff PoS Malware that Hit 1000+ Retail BusinessesA Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 

Recently uploaded

Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
ewymefz
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
NABLAS株式会社
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
ewymefz
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
James Polillo
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 

Recently uploaded (20)

Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 

Evolving threat landscape

  • 1. ©2015 Check Point Software Technologies Ltd. 1 We’ve come a long way… [Protected] Non-confidential content From This: Disney Epcot Spaceship Earth Photo by Jeff Krause
  • 2. ©2015 Check Point Software Technologies Ltd. 22©2014 Check Point Software Technologies Ltd.[Protected] Non-confidential content
  • 3. ©2015 Check Point Software Technologies Ltd. 3 We’ve come a long way… [Protected] Non-confidential content To This: Inside Google Data Centers. Photo by Connie Zhou
  • 4. ©2015 Check Point Software Technologies Ltd. 4©2015 Check Point Software Technologies Ltd. Zahier Madhar | Security Engineer EVOLVING THREAT LANDSCAPE
  • 5. ©2015 Check Point Software Technologies Ltd. 5 Why? Bank robber, Willie Sutton famous answer when he was asked why he robbed banks: “That’s where the money is!”
  • 6. ©2015 Check Point Software Technologies Ltd. 6 Today.. • Banks don’t store that large amounts of money anymore.. • Coins and notes are used less due to plastic cards • Most money transactions are initiated from a personal computer • A different approach is needed to steal your money ̶ or information that is valuable and be sold.. • This is where bots takes over! • In most cases their purpose is to steal or make money ̶ Bots are organized crimes latest tools
  • 7. ©2015 Check Point Software Technologies Ltd. 7 High Low 1980 1985 1990 1995 2000+ password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sweepers sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools Attackers Intruder Knowledge Attack Sophistication “stealth” / advanced scanning techniques burglaries network mgmt. diagnostics distributed attack tools Cross site scripting Staged attack Zero Day Source: CERT Sophistication Continues To Evolve
  • 8. ©2015 Check Point Software Technologies Ltd. 8©2015 Check Point Software Technologies Ltd. THE CYBER WAR IS RAGING ON “It's a CAT-AND-MOUSE game We try to stay ahead. People will try to break in, and it's our job to STOPthem breaking in.” Steve Jobs
  • 9. ©2015 Check Point Software Technologies Ltd. 9 Known Unknown Back Again! • IPS/Anti Virus work by: ̶ Looking for specific patterns ̶ Enforce compliance of protocols to standards ̶ Detect variations from the protocols • Attackers evade signature based detection by obfuscating the attacks and creating attacks variants • So how tough is it? ̶ Zeus and SpyEye ‘builder’s, generating Zeus or Spyeye variants in a click, are sold at 1-10K$ ̶ www.styx-crypt.com will obfuscate HTML, Javascript, Executable files, PDF & Flash files at 5-25$ per file, quantity discounts apply.
  • 10. ©2015 Check Point Software Technologies Ltd. 10 Protecting Against Such Attacks Reputation based  Sender email addresses / mail server IP  MD5 of the PDF or malware  Ineffective against targeted attack – no reputation data Signature based  Match on the exploit  Match on the malware  Match on the CnC communication  Limited due to lack of prior knowledge, variants and obfuscation [Protected] For public distribution The multi-million dollar question: How can we protect against the known unknowns?
  • 11. ©2015 Check Point Software Technologies Ltd. 11 Let’s Talk About Food • What would you do if you were given a fruit you didn’t know? How can you know it isn’t dangerous? • You should definitely look in the encyclopedia (or Google) • But what would you do if it’s not listed? • You can hire someone to examine it in a lab ̶ Very time consuming & expensive • But you can also give it to a monkey ̶ Usually it gives a good answer ̶ But monkeys are cute We DO NOT endorse experiments on animals. (No animal was harmed in any way during the development of the Threat Emulation Software Blade) Our ‘monkeys’ don’t have feelings. We can guarantee that.
  • 12. ©2015 Check Point Software Technologies Ltd. 1212©2014 Check Point Software Technologies Ltd. Know Knows Know Unknowns Unknown Unknowns Threats we know we know Threats we know we don’t know Threats we don’t know we don’t know ANTI VIRUS ANTI BOT IPS NEXT GEN SANDBOX ANTI BOT [Confidential] For designated groups and individuals THE THREATS WE NEED TO PREVENT
  • 13. ©2015 Check Point Software Technologies Ltd. 13[Confidential] For designated groups and individuals Vulnerability Trigger an attack with unpatched software or zero-day vulnerability Malware Run malicious code Attack Infection Flow Exploit Run an embedded payload by evading the CPU Shellcode Run a small payload to activate malware [Confidential] For designated groups and individuals
  • 14. ©2015 Check Point Software Technologies Ltd. 14[Confidential] For designated groups and individuals Vulnerability Malware Stop Attacks at the First Point of Contact Shellcode Thousands Millions Exploit HANDFUL DETECT THE ATTACK BEFORE IT BEGINS Identify the exploit itself instead of looking for the evasive malware [Confidential] For designated groups and individuals
  • 15. ©2015 Check Point Software Technologies Ltd. 15[Confidential] For designated groups and individuals Vulnerability Malware Focus on Malware in its Infancy Shellcode Thousands Millions Exploit HANDFUL HIGHLY SOPHISTICATED EXPLOIT DETECTION ENGINE Based on real-time CPU-level analysis [Confidential] For designated groups and individuals
  • 16. ©2015 Check Point Software Technologies Ltd. 16 Unprecedented real-time prevention against unknown malware, zero-day and targeted attacks WHAT IS THE NEXT GENERATION SANDBOX? Sandbox with CPU- Level Detection Evasion- resistant malware detection Threat Extraction Prompt Delivery of safe reconstructed files
  • 17. ©2015 Check Point Software Technologies Ltd. 17 A STANDARD CV? Emulation @ Work
  • 18. ©2015 Check Point Software Technologies Ltd. 18[Restricted] ONLY for designated groups and individuals THREATEXTRACTION CPU-Level Detection Catches the most sophisticated malware before evasion techniques deploy O/S Level Emulation Stops zero-day and unknown malware in wide range of file formats Malware Malware Original Doc Safe Doc Threat Extraction Deliver safe version of content quickly SANDBLAST ZERO-DAY PROTECTION
  • 19. ©2015 Check Point Software Technologies Ltd. 19 Threat Extraction Document Reconstruction Original Document Document Reconstructed Safe Copy of Document Reconstructed safe copy of documents Delivered immediately Customizable Protection Level [Restricted] ONLY for designated groups and individuals​
  • 20. ©2015 Check Point Software Technologies Ltd. 20 Threat Emulation Exploit Detection and Prevention Original Document Document is sent for sandboxing, where it is opened and inspected Original Document If no infection found Prevent Zero-Day Attacks Constantly Update ThreatCloud If infected with unknown Malware -Document is deleted, -ThreatCloud is updated, -Admin is notified Attack is PREVENTED [Restricted] ONLY for designated groups and individuals​
  • 21. ©2015 Check Point Software Technologies Ltd. 21 VISIBILITY INTO ATTEMPTED ATTACKS File System Activity System Registry System Processes Network Connections Abnormal file activity Tampered system registry Remote Connection to Command & Control Sites “Naive” processes created
  • 22. ©2015 Check Point Software Technologies Ltd. 22 PROVIDING CLEAN FILES [Restricted] ONLY for designated groups and individuals B E F O R E A F T E R Malware activated Malware removed
  • 23. ©2015 Check Point Software Technologies Ltd. 24©2015 Check Point Software Technologies Ltd. THANK YOU