22
Applying AI to Detect and Hunt Advanced Attackers Matt Walmsley EMEA Director Vectra [email protected] Empowering security superheroes

Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Applying AI to Detect and Hunt Advanced Attackers

Matt WalmsleyEMEA Director [email protected]

Empowering security superheroes

Page 2: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Equifax’s Automated Consumer Interview System (ACIS) […] was running a version of Apache Struts containing the vulnerability. Equifax did not patch the Apache Struts software […]

The attack lasted for 76 days. The attackers dropped “web shells” (a web-based backdoor) to obtain remote control over Equifax’s network. They found a file containing unencrypted credentials (usernames and passwords), enabling the attackers to access sensitive data outside of the ACIS environment. The attackers were able to use these credentials to access 48 unrelated databases.

Page 3: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

We understand the ways in

Spear phishing email

• Already know who to target• Craft a clever email• Get them to click

Web server vulnerability exploit

• Identify a vulnerable web property e.g. WordPress or Struts

• Find an exploitable input• Obtain a shell

Page 4: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Expand presence

A lengthy journey from compromise to breach

Initial exploit

Gain persistence and learn about host

Local network

discovery

Domain recon

Locate the keys to the kingdom

Obtain the keys to the kingdom

Own the Domain

Controller

Jump segments

Crack the Data

Center

Explore the Data

Center

Pull and stage data

Exfiltrate data

Page 5: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Attacker methods

Page 6: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

• Adversarial Tactics, Techniques, & Common Knowledge

• Knowledge base of methods observed in the wild

• Curated from community submissions

• Links to known groups and tools

MITRE ATT&CK

Group

Tool

Method

Objectiveattack.mitre.org

Page 7: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Methods evolve slowly, especially on the network

53

70

81

116

130

152 156

3946 48 49

5460 60

4 4 4 4 4 7 7

1 2 3 4 5 6 7

Endpoint

Network

Physical

May 2015 Oct 2018ATT&CK Versions

Page 8: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Detecting attacks using AI

Page 9: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Just looking for anomalies isn’t enough

Focus on what attackers must do

Unusual ≠ Bad Don’t let them hide inside encryption

Page 10: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

No single algorithm performs best for all problemsChoosing the right algorithm for the problem is critical

Type of Problem

Highly Specialized Algorithm

Perfo

rman

ce

General Purpose Algorithm

The “No Free Lunch” theorem

Page 11: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Apply a spectrum of learning approaches

SUPE

RVI

SED

UN

SUPE

RVI

SED

SHALLOW

DEEP

K-MeansDBSCANLogistic RegressionKNN

PCASVMOne-Class

SVM

GMMNaïve Bayes

HMMRBE

MDN

Decision Tree Random

Forest

IsolationForest

Deep Autoencoder

Deep Neural Network

Network Embeddings

ARTMAP ART

RBMPerceptron

DBN

Neural Networks

Page 12: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Training approaches

SupervisedLabeled Data Available

Learn to Predict Label from DataGlobal threats

Unsupervised

No Labeled Data Available

Discover Structure in the DataLocal threats

Page 13: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

What is needed

The right dataHigh fidelity

Security enriched360 deg view

Analysed the right wayAI detections

Smart signaturesThreat intel

Continuous compromise awareness

=

Legacy network security is a weak link

Relevance

Visibility

IDSSignature onlyNo historical data

SIEM

Limited E-WLimited fidelity

Detects what matters

Provides a complete record of what happened

Simple anomaliesLow fidelity

Netflow

PCAP Deep but narrow visibilitySlow investigation

Page 14: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Cognito platformCollects and stores the right network metadata and augments it with machine learning

• High-fidelity

• Security-enriched

• Scalable architecture

• 360° visibility: user, datacenter and cloud

• Real time and historical

We need the right data with the right context

Page 15: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

The Cognito platform collects and stores the right network metadata and enriches it with machine learning

Cognito platform

Investigate and hunt in a cloud-based application

Cognito RecallSend security-enriched metadata

to data lakes and/or SIEM

Cognito StreamDetect and prioritize hidden

threats at speed using AI

Cognito Detect

Cognito is the ultimate AI-powered network detection and response platform

Page 16: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Use AI to detect immutable attacker behaviors

Security ResearchCharacterise fundamental attacker behaviors

Data ScienceAI models to accurately detect behaviors

Attacker Behavior modelsHigh-fidelity, signatureless, and durable

detection of methods

Page 17: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Supervised Learning: Classification with Deep Learning

Data: Samples of Remote Access Tool traffic and normal traffic.

Features and Separability: Timeseries with traffic statistics at each moment in time; not even close to linearly separable

Model Choice: Not linearly separable? Inputs are timeseries rather than static vectors? Requires a Recurrent, Deep Neural Network.

Page 18: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Unsupervised Learning: Custom Novelty Detector

Data: DCE/RPC data for UUIDs performing remote code execution on your network

Features and Constraints: Timeseries of [uuid, src, dst, account] tuples on DCE/RPC

Model Choice: Custom novelty detector anchored on UUIDs to detect unexpected remote execution

Page 19: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Spot attackers throughout the kill chain

Botnet MonetizationAbnormal Web or Ad Activity

Cryptocurrency Mining

Brute-Force Attack

Outbound DoS

Outbound Port Sweep

Outbound Spam

Command and ControlExternal Remote Access

Hidden DNS Tunnel

Hidden HTTP/S Tunnel

Suspicious Relay

Suspect Domain Activity

Malware Update

Peer-to-Peer

Pulling Instructions

Suspicious HTTP

Stealth HTTP Post

TOR Activity

Threat Intel Match

ReconnaissanceInternal Darknet Scan

Port Scan

Port Sweep

SMB Account Scan

Kerberos Account Scan

File Share Enum

Suspicious LDAP Query

RDP Recon

RPC Recon

Lateral MovementSuspicious Remote Exec

Suspicious Remote Desktop

Suspicious Admin

Shell Knocker

Automated Replication

Brute-Force Attack

SMB Brute-Force

Kerberos Brute Force

Suspicious Kerberos Client

Suspicious Kerberos Account

Kerberos Server Activity

Ransomware File Activity

SQL Injection Activity

ExfiltrationData Smuggler

Smash and Grab

Hidden DNS Tunnel

Hidden HTTP/S Tunnel

Page 20: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Mapping to the Equifax attack

Botnet MonetizationAbnormal Web or Ad Activity

Cryptocurrency Mining

Brute-Force Attack

Outbound DoS

Outbound Port Sweep

Outbound Spam

Command and ControlExternal Remote Access

Hidden DNS Tunnel

Hidden HTTP/S Tunnel

Suspicious Relay

Suspect Domain Activity

Malware Update

Peer-to-Peer

Pulling Instructions

Suspicious HTTP

Stealth HTTP Post

TOR Activity

Threat Intel Match

ReconnaissanceInternal Darknet Scan

Port Scan

Port Sweep

SMB Account Scan

Kerberos Account Scan

File Share Enum

Suspicious LDAP Query

RDP Recon

RPC Recon

Lateral MovementSuspicious Remote Exec

Suspicious Remote Desktop

Suspicious Admin

Shell Knocker

Automated Replication

Brute-Force Attack

SMB Brute-Force

Kerberos Brute Force

Suspicious Kerberos Client

Suspicious Kerberos Account

Kerberos Server Activity

Ransomware File Activity

SQL Injection Activity

ExfiltrationData Smuggler

Smash and Grab

Hidden DNS Tunnel

Hidden HTTP/S Tunnel

Page 21: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

• Opportunity to detect attackers using AI

• Stop compromise from becoming a breach

• Address skills and resource gaps• Automation empowers analysts• Reduce barriers to entry into our

profession

Summary

• Prevention is good, BUT there will always be a way in

• Enterprise remain blind to attackers active inside their network• Attacker dwell times too long

• Attacker methods remain stable over time

Page 22: Applying AI to Detect and Hunt Advanced Attackers · Brute-Force Attack. SMB Brute-Force: Kerberos Brute Force. Suspicious Kerberos Client: Suspicious Kerberos Account. Kerberos Server

Join the huntvectra.ai

Thank you