27
CyberCrime, CyberSpy, CyberWar Looking back in order to protect the future JD Sherry VP of Public Technology and Solutions @jdsherry

Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the lessons from the past, to build for the future

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

CyberCrime, CyberSpy,

CyberWar – Looking back in

order to protect the future

JD Sherry

VP of Public Technology and Solutions

@jdsherry

Page 2: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Discussion Outcomes I. How might organizations learn from elite hackers?

II. Given the widespread use of APTs and the evolution of the cyber attack chain- how can advanced situational awareness be achieved?

III. Predictions for 2013 and how can we counter measure?

Page 3: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013

INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET

Identify trends

Understand customer behavior

Analyze opportunities

Discover efficiencies

Page 4: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

The New Reality

• One new threat created every second 1

• A cyber intrusion happens every 5 minutes 2

• Over 90% of enterprises have malware 1

• Almost 75% have one or more bots 1

• Mobile malware outpacing PC malware

– 350,000 Android pieces in 2012

Sources: 1: Trend Micro, 2012, 2: US-Cert 2012

Page 5: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

2013 Cyber Attack Trends

•DDOS-yes still…

•Mobile Malware/Proximity attacks

•Cross-Platform Attacks

•Man-in-the-Browser Attacks

•Watering Hole Attacks

•MAC Attacks

•Cloud Attacks/Island Hopping

•SWATing

Page 6: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

• Localized attacks such as malware that will not execute unless certain conditions are met, such as language settings, or “watering hole” attacks that will only affect certain geographic regions or even only specific netblocks.

• The malware used in targeted attacks will have destructive capacity, either as its primary intent or as a clean-up mechanism to cover the attackers’ tracks.

• Social, political and economic indicators must be used in conjunction with technical indicators to fully assess and analyze targeted attacks.

Targeted Attack Trends

Page 7: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Offense Informs Defense: Stages of Attack

1. Reconnaissance 2. Weaponization 3. Delivery 4. Exploitation 5. C&C 6. Lateral Movement 7. Exfiltration 8. Maintenance

Page 8: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

8

6/5/2013

Page 9: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

A Comparison of Eastern European and East Asian Blackhats

Page 10: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

The Greatest Trick the Devil Ever Pulled was Convincing the World that He Didn’t Exist… • Kevin Spacey aka Verbal Kint-“The Usual Suspects”

Page 11: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Chinese Actors Gaining Headlines but…

• Trend Micro has concluded that Eastern European hackers pose a greater threat than East Asian hackers

• East Asian objectives: speed and cost-effectiveness.

• Attacks are persistent, but use known vulnerabilities and malware and don’t hide their tracks as well.

• Eastern European objectives: remain hidden throughout the operation and build online reputation. Attacks use custom malware and innovative techniques.

Page 12: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Eastern European Tactics • Malware is innovative: RATs have all capabilities hard- coded internally;

encrypted traffic, dynamic drop zones, complex command & control • Infrastructure is internal to the operation, or bulletproof hosts are carefully

selected • Professionals who build a reputation over time; they respect and do not

attack the motherland • Generally control their own servers, develop DNS servers, and create

sophisticated traffic systems for attacks. Hallmark is to maintain total control.

Page 13: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

In the News… • Spanish police Ransomware-REVETON

– $1M per year revenue stream

– Victims tricked into paying attackers posing as law enforcement

– Computers compromised as well

– Trend Micro corroborates with Spanish police to bring down

• South Korean media and banking attacks

– Destructive Trojan/logic bombs that erased MBR

• Sleep cycle set to cause mayhem on March 20 at 2PM.

– Trend Micro provides intelligence prior to attack

– All codes detected by APT hunter-Deep Discovery

• Major Korean bank avoids major attack

Page 14: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

The Children of Stuxnet-

Page 15: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

ICS Attacks Become Mainstream

Page 16: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Go where the money is…

• 93.6% of the world’s currency is digital

• 6.4% cash and gold

• 95% of bank heists have an electronic vector

– (FINCEN)

Page 17: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Modern Day John Dillingers

Page 18: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Banking Malware: Customized and Quiet

• Citadel – modularized malware that steals online-banking credentials • TinBa- Tiny Banker 56K large- memory injection • SpyEye- Automated Transfer Systems • Eurograbber – multistaged attacks that compromise desktops and

mobile devices • Gozi-Prinimalka – spring attack to be aimed at 30 U.S. banking

institutions • High Roller - uses automation to drain high-value bank accounts

Page 19: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Cybercrime or Cyber Warfare? -The Shadow Economy

Page 20: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

IaaS

DMZ

Mission Critical Servers

Endpoints

Internet

Firewall

Anti-malware

IDS / IPS

Today’s Enterprise Challenges

SaaS

• Data in motion • Social Media • Virtualization and Cloud • Traditional defenses

bypassed by low and slow attacks

Page 21: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

How do you answer these questions? • Have you been targeted by an attack?

Unfortunately Yes!

Not sure? But would like to know!

• How do you know?

Data breach, forensic analysis

Continuous Monitoring

Security audit

Incident response, alerts

Custom threat defense

• Why are you being targeted?

• What are they after?

Page 22: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Detection Begins with Network Indicators • Changing C&C protocols requires considerable effort

• Network traffic can be correlated with other indicators to provide proactive detection

• Unknown threats may be detected by extrapolating methods and characteristics from known threat communication behaviors

Page 23: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Mitigation Requires a Custom Defense

Page 24: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Copyright 2013 Trend Micro Inc.

Data Center

Physical Virtual Private Cloud Public Cloud

Cloud and Data Center Security

Anti-Malware Integrity

Monitoring Encryption

Log Inspection

Firewall Intrusion

Prevention

Data Center Ops

Security

Page 25: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Copyright 2013 Trend Micro Inc.

Custom Defense

Network-wide Detection

Advanced Threat Analysis

Threat Tools and Services

Automated Security Updates

Threat Intelligence

Custom Sandboxes

Network Admin

Security

Page 26: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

Risk Management 101

6/5/2013 Copyright 2013 Trend Micro Inc.

1. Has the cyber security posture of all third parties been audited?

2. Is access to all sensitive systems and computers governed by two factor authentication?

3. Does a log inspection program exist? How frequently are they reviewed?

4. Does file integrity monitoring exist?

5. Can vulnerabilities be virtually patched?

6. Is MDM and Mobile Application Reputation software utilized?

7. Do you utilize a DLP?

8. Can you migrate your layered security into the cloud?

9. Do you maintain multi-level rule-based event correlation? Is there custom sandbox analysis?

10. Do you have access to global threat intelligence?

11. Can you transfer your risk?

Page 27: Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the lessons from the past,  to build for the future

27 Copyright © 2013 Trend Micro Incorporated. All rights reserved.

Thank You! [email protected]

@jdsherry