Activated Charcoal Making Sense of Endpoint Data Company - - PowerPoint PPT Presentation

activated charcoal
SMART_READER_LITE
LIVE PREVIEW

Activated Charcoal Making Sense of Endpoint Data Company - - PowerPoint PPT Presentation

Powered by Activated Charcoal Making Sense of Endpoint Data Company Confidential Greg Foss Sarah Miller Head of Global Security Operations Threat Intelligence Analyst LogRhythm Carbon Black The Endpoint is the new Perimeter The easiest


slide-1
SLIDE 1

Company Confidential

Powered by

Activated Charcoal

Making Sense of Endpoint Data

slide-2
SLIDE 2

Greg Foss

Head of Global Security Operations LogRhythm

Sarah Miller

Threat Intelligence Analyst Carbon Black

slide-3
SLIDE 3

The Endpoint is the new Perimeter

slide-4
SLIDE 4

Company Confidential

The easiest path into any network…

slide-5
SLIDE 5

Company Confidential

Social Engineering

Nothing like a little pretext to get people to click

  • n your links…
slide-6
SLIDE 6

Company Confidential

  • Phishing
  • 91% of ‘advanced’ attacks began with a phishing email
  • r similar social engineering tactics.
  • http://www.infosecurity-magazine.com/view/29562/91-of-

apt-attacks-start-with-a-spearphishing-email/

  • 2014 Metrics
  • Average cost per breach => $3.5 million
  • 15% Higher than the previous year
  • http://www.ponemon.org/blog/ponemon-institute-

releases-2014-cost-of-data-breach-global-analysis

slide-7
SLIDE 7

Company Confidential

Drive By Downloads, Malvertizing, and Watering Hole Attacks

Image Source: https://blog.kaspersky.com/what-is-malvertising/5928/

slide-8
SLIDE 8

Company Confidential

slide-9
SLIDE 9

Training is Critical to Success

slide-10
SLIDE 10

Company Confidential

Key Focus Areas:

  • Employees

Image Source: http://www.cloudpro.co.uk/hr/5803/gov-offers-hr-workers-free-cyber-security-training

slide-11
SLIDE 11

Company Confidential

End User Tips - Phishing

slide-12
SLIDE 12

Company Confidential

All You Need is +

slide-13
SLIDE 13

Company Confidential

Shortened URL Tracking

slide-14
SLIDE 14

Company Confidential

Feedback Loop

slide-15
SLIDE 15

Testing and Validation

slide-16
SLIDE 16

Company Confidential

Rogue Wi-Fi Network – Threat Simulation

slide-17
SLIDE 17

Company Confidential

USB Drop – Training Exercise : Case Study

slide-18
SLIDE 18

Company Confidential

Building a Believable Campaign

Use realistic files with somewhat realistic data Staged approach to track file access and exploitation

slide-19
SLIDE 19

Company Confidential

“Nobody’s going to an an exe from some random USB” - Greg

Yep… They ran it...

slide-20
SLIDE 20

Company Confidential

Now we have our foothold…

Fortunately they didn’t run this as an admin

slide-21
SLIDE 21

Company Confidential

slide-22
SLIDE 22

Company Confidential

Key Focus Areas:

  • Employees
  • IT Staff
  • Roles and Responsibilities
  • Incident Response Duties
  • Configuration Monitoring
  • Malware Removal
  • Security Infrastructure
slide-23
SLIDE 23

Company Confidential

Key Focus Areas:

  • Employees
  • IT Staff
  • Security Staff
  • Table Top and Red vs Blue Exercises
  • Threat Simulation Leads to Process Improvement
  • Announced vs Unannounced Simulations or Penetration Testing
slide-24
SLIDE 24

Company Confidential

Purple Team FTW!

  • Employees
  • IT Staff
  • Security Staff
  • Table Top and Red vs Blue Exercises
  • Threat Simulation Leads to Process Improvement
  • Announced vs Unannounced Simulations or Penetration Testing
slide-25
SLIDE 25

Company Confidential

Key Focus Areas:

  • Employees
  • IT Staff
  • Security Staff
  • Leadership
slide-26
SLIDE 26

Company Confidential

Key Focus Areas:

  • Employees
  • IT Staff
  • Security Staff
  • Leadership
  • Processes and Procedures
slide-27
SLIDE 27

Continuous Monitoring and Detection

slide-28
SLIDE 28

Company Confidential

Automating OSINT and Response

Domain Tools Passive Total VirusTotal Cisco AMP ThreatGRID Netflow / IDS Firewalls Proxy / DNS Endpoint

SIEM

API Integration SecOps Infrastructure

slide-29
SLIDE 29

Company Confidential

slide-30
SLIDE 30

Company Confidential

Malware Beaconing

slide-31
SLIDE 31

Company Confidential

slide-32
SLIDE 32

Company Confidential

Malware Beaconing

slide-33
SLIDE 33

Company Confidential

Correlate Network / Log Activity with Endpoint Data

slide-34
SLIDE 34

Company Confidential

Macro Phishing Attacks

  • Common
  • Bypasses Most AV
  • Heavily Obfuscated
  • Newer attacks

targeting Office 365

slide-35
SLIDE 35

Company Confidential

Macro Attack Detection

slide-36
SLIDE 36

Company Confidential

Full Command Line Details

slide-37
SLIDE 37

Company Confidential

Full Command Line Details

slide-38
SLIDE 38

Company Confidential

Be Careful – Don’t Jump To Conclusions…

slide-39
SLIDE 39

Centralized Logging and Event Management

slide-40
SLIDE 40

Company Confidential

slide-41
SLIDE 41

Company Confidential

Threat Feed Configuration

slide-42
SLIDE 42

Company Confidential

Full Event Alerting

slide-43
SLIDE 43

Company Confidential

Syslog Only

slide-44
SLIDE 44

Company Confidential

Tuning Feeds

slide-45
SLIDE 45

Company Confidential

Watchlist Configuration

slide-46
SLIDE 46

Company Confidential

Carbon Black Event Forwarder

LogRhythm => Use LEEF Format https://github.com/carbonblack/cb-event-forwarder

slide-47
SLIDE 47

Dashboards and Investigations

slide-48
SLIDE 48

Company Confidential

slide-49
SLIDE 49

Company Confidential

slide-50
SLIDE 50

Company Confidential

slide-51
SLIDE 51

Company Confidential

slide-52
SLIDE 52

Company Confidential

slide-53
SLIDE 53

Company Confidential

slide-54
SLIDE 54

Company Confidential

Long Tail Analysis

Strange activity can bubble to the surface when viewing the whole picture

slide-55
SLIDE 55

Company Confidential

slide-56
SLIDE 56

Company Confidential

slide-57
SLIDE 57

Taking it a Step Further…

slide-58
SLIDE 58

Company Confidential

Additional Integration

Alarming Trigger on Specific Watch List Hits

slide-59
SLIDE 59

Company Confidential

Additional Integration

Alarming Admin Tracking

slide-60
SLIDE 60

Company Confidential

Additional Integration

Alarming Admin Tracking Reporting

slide-61
SLIDE 61

Company Confidential

Additional Integration

Alarming Admin Tracking Reporting Automation Perform Actions Based on Alarms Observed

slide-62
SLIDE 62

Company Confidential

Thank You!

QUESTIONS?

Greg Foss Greg . Foss [at] LogRhythm . com @heinzarelli Sarah Miller SMiller [at] CarbonBlack . com @beyazfar3