threats makes it difficult to prevent access to your computer network and, once the threat actor has successfully gained access to your network, very difficult to remove.
highly capable and persistent in their aNempts to access sensiPve informaPon, such as intellectual property, negoPaPon strategies or poliPcal dynamite, from their chosen targets.
2006 US Congressman 2007 US Congressmen Oak Ridge NaPonal Laboratory Los Alamos NaPonal Laboratory 2008 US Department of Defense Office of His Holiness the Dalai Lama
Australian Government Comodo Affiliated Root Authority RSA Oak Ridge NaPonal Laboratory L-‐3 CommunicaPons Lockheed MarPn Northrop Grumman InternaPonal Monetary Fund SK CommunicaPons
into the Network 3. Establish a Backdoor into the Network 4. Obtain User CredenPals 5. Install Various UPliPes 6. Privilege EscalaPon / Data ExfiltraPon 7. Maintain Persistence
2011 Ended: September 2011 Reported: Symantec Target: Chemical Industry Goal: “Collect intellectual property (IP) such as design documents, formulas and manufacturing processes.”
-‐ The mails purported to be meePng invitaPons from established business partners Broad Targets -‐ The mails purported to be a necessary security update
Malware -‐ Executable that appears as a text file -‐ Password-‐protected archive In both cases contained a self-‐extracPng executable containing Poison Ivy(RAT)
a remote “operator” to control a system as if he has physical access to that system. -‐ Screen/camera capture -‐ File Management -‐ Shell -‐ Computer Control -‐ So>ware Management
Poison Ivy gets installed -‐ As soon as the RAT is installed, it contacts the C2 server on TCP 80(Web) using an encrypted protocol -‐ The RAT provides informaPon of its environment to the server like computers on the workgroup, domain, password hashes etc.
Reported: McAfee Target: Global oil, energy and petrochemical Goal: “TargePng and harvesPng sensiPve compePPve proprietary operaPons and project-‐financing informaPon with regard to oil and gas field bids and operaPons”
-‐ Files of interest focused on operaPonal oil and gas field producPon systems and financial documents related to exploraPon and bidding. -‐ SCADA data acquisiPon -‐ ExecuPves emails
exfiltraPon SK CommunicaPons? 35 million people informaPon compromised Comodo Affiliated Root Authority Fraudulent SSL cerPficates for mail.google.com, www.google.com, login.yahoo.com, etc.
It is a Model – An approach to detect advanced (or low skilled) aNackers in a network – Relies on people using products following a process to detect intrusions – Analysis of collected network-‐based evidence
A piece of so>ware or appliance whose purpose is to analyze packets on the network. People perform analysis – While products can perform conclusions of what they see, only people can provide context. Processes guides escala%on – EscalaPon is the act of bringing informaPon to the aNenPon of decision makers.
Many intruders are unpredictable PrevenPon eventually fails Intruders who can communicate with vicPms can be detected DetecPon through sampling is beNer than no detecPon DetecPon through traffic analysis is beNer than no detecPon at all