Slide 1

Slide 1 text

1 Copyright © 2014, FireEye, Inc. All rights reserved. Enterprise Security Monitoring Comprehensive Intel-Driven Detection David J. Bianco [email protected] HTCIA Atlantic Canada September 2014

Slide 2

Slide 2 text

2 Copyright © 2014, FireEye, Inc. All rights reserved. About Me Hunt Team Manager at FireEye 15 years of Detection & Response experience in government, research, educational and corporate arenas One of the founding members of a Fortune 5 CIRT. Spent 5 years helping to build an international detection & response capability Been waiting years for a venue in which this picture would be appropriate!

Slide 3

Slide 3 text

3 Copyright © 2014, FireEye, Inc. All rights reserved. First There Was…

Slide 4

Slide 4 text

4 Copyright © 2014, FireEye, Inc. All rights reserved. Then There Was…

Slide 5

Slide 5 text

5 Copyright © 2014, FireEye, Inc. All rights reserved. Now There Is… Enterprise Security Monitoring (ESM)

Slide 6

Slide 6 text

6 Copyright © 2014, FireEye, Inc. All rights reserved. Enterprise Security Monitoring ESM

Slide 7

Slide 7 text

7 Copyright © 2014, FireEye, Inc. All rights reserved. ESM Architecture Threat Intelligence Technical Data HTTP Server & Proxy Logs Firewalls & Network Infrastructure IDS/NSM/ Endpoints OS & Application Logs Business Data Org Charts Employee DB Travel Plans Enterprise Security Monitor

Slide 8

Slide 8 text

8 Copyright © 2014, FireEye, Inc. All rights reserved. Benefits of Enterprise Security Monitoring § Increased visibility across the organization § Get more value out of existing systems § Data aggregation is hunter friendly § Better organization around: –  Detection platform coverage –  Detection planning •  General •  Threat-specific –  Prioritization of detection resources § Quicker, more accurate incident detection and response § Leverage your detection/response infra as an offensive capability

Slide 9

Slide 9 text

9 Copyright © 2014, FireEye, Inc. All rights reserved. Intel Lifecycle Direction Collection Analysis Dissemination

Slide 10

Slide 10 text

10 Copyright © 2014, FireEye, Inc. All rights reserved. Detection Process Observe Compare Alert Validate

Slide 11

Slide 11 text

11 Copyright © 2014, FireEye, Inc. All rights reserved. Response Cycle Contain Investigate Remediate

Slide 12

Slide 12 text

12 Copyright © 2014, FireEye, Inc. All rights reserved. The Intel-Driven Operations Cycle Direction Collection Analysis Dissemination Observe Compare Alert Validate Contain Investigate Remediate Intelligence Detection Response Validated Alerts Quality Feedback

Slide 13

Slide 13 text

13 Copyright © 2014, FireEye, Inc. All rights reserved. Wacky Wall Walker Intelligence The most common approach to “threat intel” I see is… THROW ALL OUR FACTS OUT THERE AND SEE WHAT STICKS. Pros Quick to implement Cons Too many alerts No confidence in results Gives your adversaries a laugh We can do better!

Slide 14

Slide 14 text

14 Copyright © 2014, FireEye, Inc. All rights reserved. Let’s Be Clear… Most people confuse with intelligence.

Slide 15

Slide 15 text

15 Copyright © 2014, FireEye, Inc. All rights reserved. Let’s Be Clear… Captain, I do not believe that to be the correct use of the term.

Slide 16

Slide 16 text

16 Copyright © 2014, FireEye, Inc. All rights reserved. What is an Indicator? A piece of information that points to a certain conclusion

Slide 17

Slide 17 text

17 Copyright © 2014, FireEye, Inc. All rights reserved. What is it Not? ≠

Slide 18

Slide 18 text

18 Copyright © 2014, FireEye, Inc. All rights reserved. Common Indicator Data Types IPv4 Address Domain / FQDN Hash (MD5, SHA1) URL Transaction Element (User- Agent, MTA) File Name / Path Mutex Registry Value User Name Email Address

Slide 19

Slide 19 text

19 Copyright © 2014, FireEye, Inc. All rights reserved. Indicator Characteristics Extractable Can I find this indicator in my data? Actionable If I find this indicator in my data, can I do something with that information? Purposeful To what use will I put this indicator?

Slide 20

Slide 20 text

20 Copyright © 2014, FireEye, Inc. All rights reserved. Indicator Purposes Attribution •  Who/what is responsible for this activity? Detection •  If this event happens, I want to know about it. Profiling •  What are the targeting parameters for this threat? Prediction •  Given the current state, what can I expect from this threat in the future?

Slide 21

Slide 21 text

21 Copyright © 2014, FireEye, Inc. All rights reserved. The Kill Chain Reconaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Actions on Objectives “[…] a systematic process to target and engage an adversary to create desired effects.” Source: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains”, Hutchins, Cloppert, Amin, http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf (Last checked August 2013)

Slide 22

Slide 22 text

22 Copyright © 2014, FireEye, Inc. All rights reserved. Mandiant Attack Lifecycle Diagram

Slide 23

Slide 23 text

23 Copyright © 2014, FireEye, Inc. All rights reserved. The Pyramid of Pain The Pyramid measures potential usefulness of your intel It also measures difficulty of obtaining that intel The higher you are, the more resources your adversaries have to expend. When you quickly detect, respond to and disrupt your adversaries’ activities, defense becomes offense.

Slide 24

Slide 24 text

24 Copyright © 2014, FireEye, Inc. All rights reserved. Intel-Driven Detection Planning § What scenarios do we need to be able to detect? § What are our options for detecting them? § What are the strengths and weaknesses of our detection program today? § What is our detection stance against specific actors? § What is our overall plan for detection across our enterprise?

Slide 25

Slide 25 text

25 Copyright © 2014, FireEye, Inc. All rights reserved. The Bed of Nails Reconaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Actions on Objectives

Slide 26

Slide 26 text

26 Copyright © 2014, FireEye, Inc. All rights reserved. What Scenarios Do We Need to Detect? Reconaissance • File - Name • File • URI - URL • HTTP - GET • HTTP - User Agent String • URI - Domain Name • Address - e-mail • Address - ipv4-addr Weaponization • Code - Binary_Code • File • File - Path • URI - URL Delivery • Behavior • File - Full Path • File - Name • File • URI - URL • HTTP - POST • Email Header - Subject • Email Header - X- Mailer • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - e-mail • Address - ipv4-addr Exploitation • Behavior • Win Registry Key • File - Name • File • URI - URL • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - cidr • Address - ipv4-addr Installation • Code - Binary_Code • Win Process • Win Registry Key • File - Full Path • File - Name • File • File - Path • URI - URL • HTTP - GET • HTTP - User Agent String • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Hash - SSDEEP • Address - e-mail • Address - ipv4-addr Command & Control (C2) • Behavior • Win Process • Win Registry Key • File • URI - URL • HTTP - GET • HTTP - POST • HTTP - User Agent String • URI - Domain Name • Hash - MD5 • Address - e-mail • Address - ipv4-addr Actions on Objectives • Behavior • Win Registry Key • Win Service • File - Full Path • File - Name • File • File - Path • URI - URL • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - ipv4-addr

Slide 27

Slide 27 text

27 Copyright © 2014, FireEye, Inc. All rights reserved. Detection Options - Snort Reconaissance • File - Name • File • URI - URL • HTTP - GET • HTTP - User Agent String • URI - Domain Name • Address - e-mail • Address - ipv4-addr Weaponization • Code - Binary_Code • File • File - Path • URI - URL Delivery • Behavior • File - Full Path • File - Name • File • URI - URL • HTTP - POST • Email Header - Subject • Email Header - X- Mailer • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - e-mail • Address - ipv4-addr Exploitation • Behavior • Win Registry Key • File - Name • File • URI - URL • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - cidr • Address - ipv4-addr Installation • Code - Binary_Code • Win Process • Win Registry Key • File - Full Path • File - Name • File • File - Path • URI - URL • HTTP - GET • HTTP - User Agent String • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Hash - SSDEEP • Address - e-mail • Address - ipv4-addr Command & Control (C2) • Behavior • Win Process • Win Registry Key • File • URI - URL • HTTP - GET • HTTP - POST • HTTP - User Agent String • URI - Domain Name • Hash - MD5 • Address - e-mail • Address - ipv4-addr Actions on Objectives • Behavior • Win Registry Key • Win Service • File - Full Path • File - Name • File • File - Path • URI - URL • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - ipv4-addr

Slide 28

Slide 28 text

28 Copyright © 2014, FireEye, Inc. All rights reserved. Detection Options - HIPS Reconaissance • File - Name • File • URI - URL • HTTP - GET • HTTP - User Agent String • URI - Domain Name • Address - e-mail • Address - ipv4-addr Weaponization • Code - Binary_Code • File • File - Path • URI - URL Delivery • Behavior • File - Full Path • File - Name • File • URI - URL • HTTP - POST • Email Header - Subject • Email Header - X- Mailer • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - e-mail • Address - ipv4-addr Exploitation • Behavior • Win Registry Key • File - Name • File • URI - URL • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - cidr • Address - ipv4-addr Installation • Code - Binary_Code • Win Process • Win Registry Key • File - Full Path • File - Name • File • File - Path • URI - URL • HTTP - GET • HTTP - User Agent String • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Hash - SSDEEP • Address - e-mail • Address - ipv4-addr Command & Control (C2) • Behavior • Win Process • Win Registry Key • File • URI - URL • HTTP - GET • HTTP - POST • HTTP - User Agent String • URI - Domain Name • Hash - MD5 • Address - e-mail • Address - ipv4-addr Actions on Objectives • Behavior • Win Registry Key • Win Service • File - Full Path • File - Name • File • File - Path • URI - URL • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - ipv4-addr

Slide 29

Slide 29 text

29 Copyright © 2014, FireEye, Inc. All rights reserved. Detection Options – Email Gateway Logs Reconaissance • File - Name • File • URI - URL • HTTP - GET • HTTP - User Agent String • URI - Domain Name • Address - e-mail • Address - ipv4-addr Weaponization • Code - Binary_Code • File • File - Path • URI - URL Delivery • Behavior • File - Full Path • File - Name • File • URI - URL • HTTP - POST • Email Header - Subject • Email Header - X- Mailer • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - e-mail • Address - ipv4-addr Exploitation • Behavior • Win Registry Key • File - Name • File • URI - URL • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - cidr • Address - ipv4-addr Installation • Code - Binary_Code • Win Process • Win Registry Key • File - Full Path • File - Name • File • File - Path • URI - URL • HTTP - GET • HTTP - User Agent String • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Hash - SSDEEP • Address - e-mail • Address - ipv4-addr Command & Control (C2) • Behavior • Win Process • Win Registry Key • File • URI - URL • HTTP - GET • HTTP - POST • HTTP - User Agent String • URI - Domain Name • Hash - MD5 • Address - e-mail • Address - ipv4-addr Actions on Objectives • Behavior • Win Registry Key • Win Service • File - Full Path • File - Name • File • File - Path • URI - URL • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - ipv4-addr

Slide 30

Slide 30 text

30 Copyright © 2014, FireEye, Inc. All rights reserved. Score Card: Use of Available Indicators Reconaissance • File - Name • File • URI - URL • HTTP - GET • HTTP - User Agent String • URI - Domain Name • Address - e-mail • Address - ipv4-addr Weaponization • Code - Binary_Code • File • File - Path • URI - URL Delivery • Behavior • File - Full Path • File - Name • File • URI - URL • HTTP - POST • Email Header - Subject • Email Header - X- Mailer • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - e-mail • Address - ipv4-addr Exploitation • Behavior • Win Registry Key • File - Name • File • URI - URL • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - cidr • Address - ipv4-addr Installation • Code - Binary_Code • Win Process • Win Registry Key • File - Full Path • File - Name • File • File - Path • URI - URL • HTTP - GET • HTTP - User Agent String • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Hash - SSDEEP • Address - e-mail • Address - ipv4-addr Command & Control (C2) • Behavior • Win Process • Win Registry Key • File • URI - URL • HTTP - GET • HTTP - POST • HTTP - User Agent String • URI - Domain Name • Hash - MD5 • Address - e-mail • Address - ipv4-addr Actions on Objectives • Behavior • Win Registry Key • Win Service • File - Full Path • File - Name • File • File - Path • URI - URL • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - ipv4-addr

Slide 31

Slide 31 text

31 Copyright © 2014, FireEye, Inc. All rights reserved. Score Card: Pyramid Effectiveness of Indicators Reconaissance • File - Name • File • URI - URL • HTTP - GET • HTTP - User Agent String • URI - Domain Name • Address - e-mail • Address - ipv4-addr Weaponization • Code - Binary Code • File • File - Path • URI - URL Delivery • Behavior • File - Full Path • File - Name • File • URI - URL • HTTP - POST • Email Header - Subject • Email Header - X- Mailer • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - e-mail • Address - ipv4-addr Exploitation • Behavior • Win Registry Key • File - Name • File • URI - URL • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - cidr • Address - ipv4-addr Installation • Code - Binary_Code • Win Process • Win Registry Key • File - Full Path • File - Name • File • File - Path • URI - URL • HTTP - GET • HTTP - User Agent String • Streetname - McAfee • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Hash - SSDEEP • Address - e-mail • Address - ipv4-addr Command & Control (C2) • Behavior • Win Process • Win Registry Key • File • URI - URL • HTTP - GET • HTTP - POST • HTTP - User Agent String • URI - Domain Name • Hash - MD5 • Address - e-mail • Address - ipv4-addr Actions on Objectives • Behavior • Win Registry Key • Win Service • File - Full Path • File - Name • File • File - Path • URI - URL • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - ipv4-addr

Slide 32

Slide 32 text

32 Copyright © 2014, FireEye, Inc. All rights reserved. Score Card: Effectiveness Against APT-π Reconaissance • URI – Domain Name • Address - ipv4-addr Weaponization Delivery • Email Header - Subject • Email Header - X- Mailer • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - e-mail • Address - ipv4-addr Exploitation • Win Registry Key • File - Name • File • URI - URL • Streetname - McAfee • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - cidr • Address - ipv4-addr Installation • Code - Binary_Code • Win Process • Win Registry Key • File - Full Path • File - Name • File • File - Path • URI - URL • HTTP - GET • HTTP - User Agent String • Streetname - McAfee • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - ipv4-addr Command & Control (C2) • Behavior • Win Process • Win Registry Key • File • URI - URL • HTTP - GET • HTTP - POST • HTTP - User Agent String • URI - Domain Name • Hash - MD5 • Address - e-mail • Address - ipv4-addr Actions on Objectives • Behavior • Win Registry Key • Win Service • File - Full Path • File - Name • File • File - Path • URI - URL • Streetname - Sophos • URI - Domain Name • Hash - MD5 • Hash - SHA1 • Address - ipv4-addr

Slide 33

Slide 33 text

33 Copyright © 2014, FireEye, Inc. All rights reserved. Enterprise Detection Plan

Slide 34

Slide 34 text

34 Copyright © 2014, FireEye, Inc. All rights reserved. Summary § NSM:IDS :: ESM:NSM § Collect and aggregate across your entire enterprise –  Increased visibility –  Maximum use of resources –  Better for hunting § Organize intel for for better program insights § Big improvements in detection & response capabilities for minimal investment § Smart detection makes for frustrated adversaries!

Slide 35

Slide 35 text

35 Copyright © 2014, FireEye, Inc. All rights reserved. Questions? David J. Bianco [email protected] @DavidJBianco detect-respond.blogspot.com I <3 Feedback! I’d really love to hear from you. Questions, comments, stories about how this worked for you, citations referencing my work are all appreciated!