27
Borderless Threat Intelligence Using External Threat Intelligence for Brand and Supply Chain Monitoring

Anomali Detect 2016 - Borderless Threat Intelligence

Embed Size (px)

Citation preview

Page 1: Anomali Detect 2016 - Borderless Threat Intelligence

Borderless Threat IntelligenceUsing External Threat Intelligence for Brand and Supply Chain Monitoring

Page 2: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

whoami• Jason Trost• VP of Threat Research • Anomali Labs

Page 3: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Agenda• Overview• Supply Chain Monitoring• External Threat Intelligence

• Suspicious Domains• Network Cleanliness• Social Media and DarkWeb• Credential Exposures• Phishing Campaigns

• Operationalizing• Wrap up

Page 4: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Overview• External threat intelligence based Breach Analytics• i.e. using intelligence about events that may not be observable on your

network to detect breaches or other security events• We apply this beyond your borders to your supply chain• Types of threat intelligence covered include:• Suspicious Domains• Network Cleanliness • Social Media and DarkWeb• Credential Exposures• Spam and Phishing Campaigns

Page 5: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Defining Your Supply Chain• Any vendor, partner, or customer that your organization relies on or trusts implicitly or

explicitly• Supply chain members are a dependency in your vulnerable graph• Breaches within your supply chain may impact your organization• Supply chain examples:• Contractors or vendors• Software, Third Party Libraries, Remote Access Tools (VPN)• Environmental Control• Power, Utilities, and Telecomms• Computing, Hosting, and ISPs• SaaS Services

Page 6: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

On Premises Controls• On Premises Controls will only work for supply chain events within your

network• Code / Library Reviews• Network Flow and Account Access Reviews• Internal Pivoting• Threat Feeds correlated with log events (DNS, web proxy, firewall, etc.)• They cannot detect events occurring outside your network

Page 7: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Zero Premises Controls• How can you use Your Threat Intelligence solution to identify Supply Chain

Threats?• Zero Premises Controls will extend your capabilities deep within your

suppliers infrastructure!• Public Credential Exposures (Yourself, Partners, Suppliers)• Threat Feeds (External Organizations on Block lists)• Portscan/Web crawl Data Reviews (Shodan/Censys)• Suspicious Domain Registrations (Yourself, Partners, Suppliers)• Social Media / DarkWeb Monitoring• Spam and Phishing Campaigns

Page 8: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Supply Chain Threat Intelligence• Document and Research• Supply chain company’s security posture?• Network cleanliness? Web footprint?

(Services/Capabilities)• Supply chain company compromised?• How Recent? Repeated? May put you at risk

• Supply chain company’s brand used to phish you?• Pay Special Attention to Service Desk Companies!

• Supply chain company being targeted?• Examples may not be so obvious• DNS Registrars hold the keys

Page 9: Anomali Detect 2016 - Borderless Threat Intelligence

External Threat Intelligence

Page 10: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Suspicious Domain Name Monitoring• Adversaries register domains mimicking the target’s brand• Techniques:• Transforms: Typosquat, Homoglyph, Character Omission/insertion/swap, etc• Deceptive domains: vpn-mycompany.com, portal-mycompany.com

• Used to phish you, exploit you, or as C2 domains• Very effective social engineering tactic• Inventory Items: internal and external domain names, brand names• Data Sources: New Domain registrations, Passive DNS, Virustotal Hunting,

URLCrazy, dnstwist• Operations: SIEM integration, Email alerts, IDS Signatures, DNS RPZ

Page 11: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Suspicious Domain Examplesthrea4stream.eduth2eatdtream.comthreatstrewqm.comthreatsrraem.comthvaatstraam.comthbeaystream.comth2eatstreams.comthreatstreal.sethpeatstreasm.comthreatatream.sethreadstrean.comtheeatstreae.comthreatrtrteam.comthraatstream.ruthr3atstraem.comthreststram.comthruatsdtruam.comthhreatstrema.com

threratstveam.comthrra4stream.comthroatstroasm.comthreutsatreum.comthreitstreram.comthraetstrecm.comthteatstrgam.comthreattstream.sethreatsttteam.comthreautsream.comthreatst2eam.nothreitstreasm.comthruatstzuam.comthreatstreaen.comthreatstreem.ruthruatctruam.comthretstreaam.comthreatstrawm.com

thrmatstream.chthreaystr3am.comtheatsdream.comthhreatrstream.comthreustreum.comtheretstreem.comthreatsvrewam.comthreatstreal.usthr3atsvream.comthreotstrreom.comthreatstrgams.comthreatsteram.cmthreetstreel.comthgraatstream.comtheeatstresm.comthreatstrreal.comthreattresm.comthvatstream.com

threatwtreams.comthreatstrtewam.comthgreatstreai.comthuatstream.comthraatsyraam.comthr3avstr3am.comthreattreamm.comthreatstreal.ruthreatstr3m.comthreat3trearn.comthrratsttream.comthreatystream.chthrrapstream.comthreatstrea.detheatstrewam.comthreatstreams.orgthreatstram.frthseatstream.net

thveatsttream.comthreaustrwam.comthreatsrreem.comthreatstrr3am.comthreatstr3qm.comthreatsyzeam.comthpeatstreaam.comthreatstteam.nothreaststream.usthrratstrwam.comthreatstrream.orgthreattstreamcom.comthreatwtrem.comthreaatstream.cathreattrgam.comthreastsstream.comthrmatstreaam.comthrratstreams.com

Page 12: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Don’t Forget About Dynamic DNSthreatstream.gnway.netthreatstream.rincondelmotor.comthreatstream.pluginfree.netthreatstream.estr.com.ruthreatstream.teksunpv.comthreatstream.gameyg.comthreatstream.redbirdrestaurant.comthreatstream.linkpc.netthreatstream.support-microsoft.netthreatstream.openoffcampus.comthreatstream.keygen.com.ruthreatstream.cu.ccthreatstream.pornandpot.comthreatstream.informatix.com.ruthreatstream.fuentesderubielos.com

threatstream.9wide.comthreatstream.jaqan.cnthreatstream.hyfitech.comthreatstream.easyeatout.comthreatstream.xicp.cnthreatstream.xenbox.netthreatstream.publicvm.comthreatstream.ven.bzthreatstream.meibu.comthreatstream.aq.plthreatstream.m3th.org

threatstream.lioha.comthreatstream.meibu.netthreatstream.kz.com.ruthreatstream.gnway.ccthreatstream.ircop.cnthreatstream.igirl.ruthreatstream.newsexstories.comthreatstream.free-stuff.com.ruthreatstream.leedichter.comthreatstream.ggsddup.comthreatstream.yooko.com.ruthreatstream.za.plthreatstream.servercide.comthreatstream.sxn.usthreatstream.wmdshr.com

Page 13: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Case Study: Suspicious Domain Registration• Abuse isn’t always about network compromises• Major US Based Cable and Telecommunications company• Fraudulent procurement attempt• Email sent from johnsmith@${company}-us.com, but with the correct letter

head and markings• Discovered by SIEM scanning incoming email logs and flagged messages as

suspicious• Security team prevented fraudulent transaction, fraud team seized domain

Page 14: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Network Cleanliness Monitoring• Systems from your IP space or your supply chain’s showing up as

…• Bot IPs• Scanning IPs• Brute force IPs• Spam IPs

• Your webserver hosting malicious content?• Vulnerable or unexpected services running and discoverable?• Inventory Items: IP Address Space of organization and key

executives (if possible)• Data Sources: Threat intelligence feeds, honeypot events, botnet

sinkhole (esp. DGAs), Portscan/Web crawl data• Operations: SIEM integration, Email notifications, passive audits

of portscan/webcrawl data

Page 15: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Case Study: Network Cleanliness• Large Hi-tech firm evaluating IT staffing company for outsourcing some development and

IT services• IT Staffing company would need VPN access and access to other internal IT resources• Passive vendor audit performed using threat intelligence data and public portscan

repository• Upon inspection, IT staffing company had very poor network hygiene• tens of IPs regularly checked in to malware sinkholes• tens of IPs regularly scanned honeypot sensors• thousands of compromised credentials

• IT staffing company deemed too risky

Page 16: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Social Network and Darkweb Monitoring

• Inventory Items: Brand names, key executive names, domain names, IP address space

• Data Sources: Social media feeds, Crawling DarkWeb, analysts monitoring darkweb, Google Dorks

• Operations: SIEM integration, Email notifications

Credential Exposure Posting from the Hell Darkweb forum

Page 17: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Case Study: Social Media/Darkweb Monitoring• Brand monitoring for Major US Based Retailer• Discovered a custom built attack tool designed

for the sole purpose of brute forcing a specific part of the retailer’s web infrastructure• Provided the sample and a report about what it

did, how it worked and who built it to the retailer

Page 18: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Credential Exposure Monitoring

• Inventory Items: email domains, email addresses of key executives• Data sources: Paste sites, Google Dorks, Darkweb• Operations: SIEM integration / orchestration system – notify users/reset passwords,

Email alerts

Page 19: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Case Study: Credential Exposures• Brand monitoring for a Major Food and Beverage Company• Discovered leaked credentials from an internal IT wiki page that was

accidently exposed• Company alerted and changed all passwords within 24 hours• No evidence that these credentials were abused in that time

Page 20: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Spam and Phishing Campaigns• Are your brand names, company name, or logos being used in large-scale Spam

or Phishing campaigns?• If you’re not monitoring outside your network, you may have no visibility• Discovering early allows notifying customers or other business units (customer

support, legal, etc)

• Inventory Items: external domain names, brand names, logo URLs• Data Sources: Spam honeypots, VirusTotal, DNS DMARC providers, Commercial

phishing threat intelligence• Operations: SIEM integration, Email alerts

Page 21: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Case Study: Spam & Phishing Campaigns

Phish Domain: www[.]BANKNAME-login[.]ml/nl/prive/aanvraag-formulier/Real Domain: www[.]BANKNAME[.]nl

• Banking Phishing Campaign• Using the bank’s branding, logos• Mimicked bank’s domain name and URL

structure• appended “-login” to domain• .ml ccTLD instead of .nl

Page 22: Anomali Detect 2016 - Borderless Threat Intelligence

Operationalizing

Page 23: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Build an Inventory• Create an inventory• Yourself • Critical supply chain partners

• The adversaries this, you should too

Email domains names Internal and External domain names Personal email addresses of key executives Company’s IP address space IP address space of key executives’ home networks Names of key executives Internal project code names Brand names Logos and Logo URLs

Page 24: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Data Sources Integration Points

Suspicious Domains • New domain registration data (Whois)• Passive DNS• Virustotal Hunting• Repeated reviews of DynDNS • URLCrazy / dnstwist DNS lookups

• SIEM integrations• Email based alerting• IDS Signatures• DNS RPZ

Network Cleanliness • Honeypots / C2 Sinkholes• Open source threat feeds• Spammer feeds• Commercial Threat intelligence providers• Portscan / Web crawl data

• Search/Alert on your IP network or your supply chain’s network showing up on these lists.

• SIEM integrations• Email based alerting• Periodic review of external internet facing assets

Social Media and Dark Web

• DarkWeb / DeepWeb Forums• Social Media Sites• Google Dorks

• Search/Alert on your brand or your supply chains’• SIEM integrations

Data Sources and Integration Points (1 of 2)

Page 25: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Data Sources Integration Points

Compromised Credentials

• Paste sites• DarkWeb / DeepWeb monitoring• Google dorks• Commercial Threat intelligence providers

• Search/Alert on your email domains or those of your supply chain

• Notify users• Reset passwords as needed

Spam and Phishing Campaign Monitoring

• Spam Honeypots• Virustotal Hunting• DNS DMARC providers• Commercial Threat intelligence providers

• Search/Alert on your domains, brands, or logo URLs (or those of your supply chain)

• SIEM integrations• Email based alerting

Data Sources and Integration Points (2 of 2)

Page 26: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Summary• Organizations must watch more than themselves and their industry vertical• High Tech Suppliers such as Web and Domain Services, Firewall and Desktop

Application vendors are increasingly targeted• Chatter on social media and DarkWeb forums can provide early warning• Compromised Credentials may be used by third party contractors on your

network• Passive vendors audits should be part of your procurement process• Spam/phishing campaign monitoring can help you get ahead of the fallout

Page 27: Anomali Detect 2016 - Borderless Threat Intelligence

© Anomali 2016 Confidential

Questions?