23
How to be prepared for the next generation of malware Martin Zich, CISSP HPE Pointnext 24th Sep, MS Ignite 2018

How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

Page 1: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

How to be prepared for the next generation of malwareMartin Zich, CISSPHPE Pointnext

24th Sep, MS Ignite 2018

Page 2: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

MalwareA threat which is here to stay

Ransomware

Cryptoware/coin miners – cryptojacking

Adware

Banking trojan

Other malware to steal credentials, PII, and much more.

2

Page 3: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

What we keep finding at our clients

Page 4: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Many disconnected detection controls.

Alerts missing a context.

Inability to detect/react to unknown and take immediate action.

Missing or wrongly trained machine learning.

Lots of unwatched and unpatched current and legacy systems.

Lots of correct „paperwork“ which differs from what is deployed.

Lots of victims of social engineering.

Findings from the „field“ - highlights

User education and training showing dubious

outcomes.

Completely paralyzed environments.Lack of visibility.

Page 5: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Malware

5

We found completely paralyzed companies

The were looking for doubtful symptoms like:

Cryptojacking:

CPU/power consumption rise Overheating Periodical unknown traffic etc.

Ransomware:

Usually there was no need to watch for symptoms ... it was too late...

We found many victims of social engineering

Page 6: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Defense-in-depth.Security in multiple layers.

6

Administrative Technical Physical

HW

Platforms

Applications

Page 7: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

7

1. Secure hardware base.

Page 8: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Next-generation malware defenseSecure hardware base

Silicon root of trust with HPE Gen10 – Secure start base

8

Page 9: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Next-generation malware defenseSecure hardware base for Azure Stack

HPE ProLiant Gen10 for Azure Stack Silicon root of trust

9HPE ProLiant Gen10

Page 10: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Next-generation malware defense

2. Locked-down OS platform

Defending against known „by design“ Secure configuration (hardening) – CIS benchmarks, STIGs, etc.

10

Page 11: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Next-generation malware defense

2. Locked-down OS platform

Defending against known „by design“ Secure configuration (hardening) – CIS benchmarks, STIGs, etc.

11

Microsoft Credential Guard

Windows Defender Application Control (WDAC)

Microsoft Device Guard

Microsoft Edge AppGuard

Windows S

Example by:

Page 12: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Next-generation malware defense

3. Blocking the known and blocking the most frequent threat vectors

At best, right away = without any need for a long analysis Defending against specific threat vectors instead of specific threats Previously unknown threats included (zero-day)

12

Page 13: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Next-generation malware defense

3. Blocking the known and blocking the most frequent threat vectors

At best, right away = without any need for a long analysis Defending against specific threat vectors instead of specific threats Previously unknown threats included (zero-day)

13

Microsoft Exploit Guard

Attack Surface Reduction – Office rules, Script rules, Email rule

Controlled Folder Access

Network protection

Exploit Protection

Example by:

Page 14: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Next-generation malware defense

4. Defending legacy and embedded

Turning on backported features Secure configuration – hardening Applications whitelisting Network/physical isolation – e.g. separated VLAN for legacy, air-gaped embedded

14

Page 15: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Next-generation malware defense

4. Defending legacy and embedded

Turning on backported features Secure configuration – hardening Applications whitelisting Network/physical isolation – e.g. separated VLAN for legacy, air-gaped embedded

15

Microsoft env., for example:

W8 Restricted Admin mode, backported to Windows 7 (extended support till January 14, 2020).

Group policies for SLA on e.g.SAM-R (net user, net group, etc.)

Disabling low-level encryption types (RC4 with NTLM, SSLv1,2, etc.)

Disabling SMBv1

Page 16: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Next-generation malware defense

5. Detection and stopping the unknown

Detect and block all of the unknown threat vectors (zero-day) Train well the „machine learning“ Maintaining visibility and taking actions over the whole environment

16

Page 17: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Next-generation malware defense

5. Detection and stopping the unknown

Detect and block all of the unknown threat vectors (zero-day) Train well the „machine learning“ Maintaining visibility and taking actions over the whole environment

17

MS Intelligent Security Graph + various associated solutions Example by:

Page 18: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

18

Page 19: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Intelligent Security Graph

19

Microsoft feeds it‘s security solutions with information stored and processed in ISG

Windows Defedender AV – local ML portion + from-cloud delivered protection

Windows Defender Advanced Threat Protection

Office 365 Advanced Threat Protection

Azure Advanced Threat Protection

API – getting your own context information, security profiles, taking active actions through the API

Page 20: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Intelligent Security Graph – Windows Defender AV

20

Page 21: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Intelligent Security Graph – API

21

Page 22: How to be prepared for the next generation of malware · Next-generation malware defense 3. Blocking the known and blocking the most frequent threat vectors At best, right away =

Intelligent Security Graph – API

22