Philip Sow Splunk
Philip Sow Splunk
Philip Sow Splunk
Advanced Cyber-Attacks
Ransomware
Online Account Take
over
3
Ransomware : Cybercriminals new attack of choice
http://blog.checkpoint.com/2016/04/06/ransomware-cybercriminals-new-attack-of-choice/
Ransomware : Cybercriminals new attack of choice
http://blog.checkpoint.com/2016/04/06/ransomware-cybercriminals-new-attack-of-choice/
Advance Malware is hard to
prevent
- signature update is always not
fast enough
- On target ( phishing email )
- Cannot be found in Security Logs
Machine data contains a definitive record
of all interactions
Human Machine
Machine Machine
Rarely visited
2013-08-09 16:21:38web site
10.11.36.29 98483 148 TCP_HIT 200 200 0 622 - - OBSERVED GET
www.neverbeenseenbefore.com HTTP/1.1 0 "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR
2.0.50727; InfoPath.1; MS-RTC LM 8; .NET CLR 1.1.4322; .NET CLR 3.0.4506.2152; ) User John Doe,"
Web Proxy User Name
User Name
08/09/2013 16:23:51.0128event_status="(0)The operation completed successfully. "pid=1300
process_image="\John Doe\Device\HarddiskVolume1\Windows\System32\neverseenbefore.exe registry_type
Endpoint ="CreateKey"key_path="\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ Printers
Logs Print\Providers\ John Doe-PC\Printers\{}\ NeverSeenbefore" data_type"" Rarely seen service
8
8
Critical Security, Fraud & Compliance Insights
Sources
[2013-09-04-14.45.54.608000] proc_source="B24A", tmst_target="2013-09-04-14.45.54.724000", serv_id="ISS",
Card ID Amount
proc_input="MAST", proc_target="B24H", interface_acq="BNET_1", interface_iss="02008", cod_msg="1110",
oper_rrn="090448764439", card_id="526430VS350Y2992", oper_amount="000000008000", oper_
Merchant oper_country="380",
currency="978", ID term_id="00599307", circuito="", sett_merc="4722", bin_acq="002111",
id_merc="329017246168", prcode="003000", action_code="000", approval_code ="H8H766", oper_
Client ID auth_rout_dst="INTFHI93", auth_
mod_input="1", channel="O", flag_dupl="Y", flag_onus="N",
Card Payment
System rout_id="HISO_AUTH", msg_subst="", ndg="0000000078507391", station_acq="STA-BNET-MI1", acceptor =
TRAWEL SPA\\MILANO\ 380", tmst_ins="2013-09-04-14.48.56.277466", lpar="B"
2013-08-09 16:21:38 10.11.36.29 98483 148 TCP_HIT 200 200 0 622 - - OBSERVED GET HTTP/1.1 0 "Mozilla/4.0
(compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; www.neverbeenseenbefore.com InfoPath.1; MS-
Source IP
RTC LM 8; .NET CLR 1.1.4322; .NET CLR 3.0.4506.2152; ) User John Doe,"
Referring URL
Web Proxy
9
9
Find Advanced, Hidden Threats
Step 1 Collect ALL the data in one location
11
A lot of web-based attack are using VERY long URL
Mean URL length for 128 Byte looks
Normal
12
Six Windows Events to monitor
Win ID What Impact to Security Activity detected
4688/592 New Process executed Malware executed or New programs installed by
malware actor trying to attacker (not by user)
take action
4624/528 /540 Some account logged in Attacker authenticated to What accounts did and what
the endpoint accounts at what times are
normal?
5140/560 A share was accessed What endpoints were C$ share or File share
accessed accessed
5156 Windows Firewall Network Command and Control or What application was used to
connection by process origin of attack communicate with external
or internal IP
7045/601 Service added to the endpoint Persistence to load malware Service added or modified
on restart
4663/567 File & Registry auditing Modifications to the system Files added and Registry Keys
that create holes or payloads added to audited locations
used at a later time
Detect CryptoLocker Type attack
View of a typical CryptoLocker
events.
EventID4663 = file
deleted/write success
you can see the events and setup alerts to trigger when a threshold outside the norm of your users is reached. E.g.
"> 250 events per hour"
http://hackerhurricane.blogspot.hk/2014/01/how-to-detect-cryptolocker-type-attack.html
14
Sample Use Cases of Security Analytics Detection
Data Attack
What to Look For Why
Source Phase
On single endpoint: Rarely seen inbound email Spear-phishing attack. Malicious link in Mail/ Web/ Infiltration
domain, then visit to rarely seen web site, then email leads to malware being installed. OS / Back
rarely seen service starts Door
Account creation without corresponding IT help Hacker is creating new admin accounts AD/ Help Recon
desk ticket Desk logs
For single employee: Badges in at one location, Stolen credentials Badge/ Data
then logs in countries away VPN/ Auth gathering
Employee makes standard deviations more data Gathering confidential data for theft OS Data
requests from file server with confidential data gathering
than normal
Standard deviations larger traffic flows (incl DNS) Hacker exfiltrating info NetFlow Exfiltration
from a host to a given IP
15
Security Analytics Needs >
What are some of the technical challenges in managing data?
19
Threat Data from Mandiant APT1
20
New Paradigm for Threat intelligence
Needs to be live and real-time
Needs to be current Many services provide information thats days old
Needs to provide risk scoring for prioritization
Correlates among commercial/public threat feeding
21
Splunk + Threat Intelligence Framework
Predictive Custom
analytics Alert dashboard
DNS
SIEM Incident
dashboard
Firewall
Web Forwarder
merge
22
Real time Threat Intelligence Correlation:
Threat List Activity Dashboard
23
Customer Case: Client running P2P ( BT bit torrent )
Client IP : 172.26.228.230
Time : 18:10 5/3/14
Threats :
Accessing following Bad IP
24
Answers to When, What, Where = Visibilty
Security Legal
Data Theft SOP
Control Requirements
ITSI UBA
27
Splunk Enterprise Security
Gartner SIEM Magic Quadrant*
Completeness of
2016: LEADER Vision Leader
2015: Leader
2014: Leader
2013: Leader
*Gartner, Inc., SIEM Magic Quadrant 2011-2015. Gartner does not endorse any vendor, product or service depicted in
its research publication and not advise technology users to select only those vendors with the highest ratings or other
designation. Gartner research publications consist of the opinions of Gartners research organization and should not
be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
28 28
Splunk for Security