After WannaCry: Getting Ahead of Ransomware
Tim Bandos, Sr. Director of Cybersecurity, Digital Guardian
After WannaCry: Getting Ahead of Ransomware Tim Bandos, Sr. - - PowerPoint PPT Presentation
After WannaCry: Getting Ahead of Ransomware Tim Bandos, Sr. Director of Cybersecurity, Digital Guardian Tim Bandos Prior Experience: Global Cybersecurity Tim Bandos Manager, 12+ years @ Fortune 100 Company Sr. Director of Cybersecurity
Tim Bandos, Sr. Director of Cybersecurity, Digital Guardian
2
Tim Bandos
CISSP, CISA, CEH & CASS
3 Confidential
4 Confidential
5
Confidential
6
User Clicks on a Link
Email Encryption of files
Once encryption is complete, a ransom is displayed with X amount of time to pay for decryption key
Confidential
7 Confidential
8
are now delivering ransomware
who are targeted by ransomware end up infected
victims refused to pay the ransom
Delivery Mechanisms % of Ransomware Victims Using Security Solutions at Time of Attack
Confidential
9 Confidential
Confidential 10
Confidential 11
vulnerabilities on Microsoft Windows operating system
encrypted, and subsequently demands a payment of $300 in bitcoin within three days.
Confidential 12
It was during the WannaCry outbreak that researchers discovered the worm
Windows 7, causing errors on other platforms, including Windows XP
worm
infected—remains unconfirmed.
Confidential 13
Confidential 14
March 14, 2017 – Microsoft Patch Released for MS17-010 April 14, 2017 - EternalBlue Unveiled by Shadow Brokers – NSA Leak April 28, 2017 – EternalBlue exploit used by Cryptocurrency Mining Malware May 12, 2017 – WannaCry Ransomware Attack
Confidential 15
1) Once vulnerability is exploited, a malicious executable is pushed down to endpoint 2) Executable installs, the ransomware deletes any existing backups 3) Malware creates copies of itself for persistence 4) Searches for files within specific extensions and encrypts files 5) Victim then receives ransom message demanding payment in untraceable bitcoins
Confidential 16
Confidential 17
Confidential 18
Confidential 19
ETERNALBLUE DOUBLEPULSAR ETERNALCHAMPION ETERNALROMANCE ETERNALSYNERGY SMBTOUCH ARCHITOUCH
EXPLOITS
20 Confidential
21 Confidential
22 Confidential
23 Confidential
Incident Responders Field Guide
24
Preparation Detection & Reporting Triage & Analysis Containment & Neutralization Post-Incident Activity
Public
https://info.digitalguardian.com/ebook-incident- responder-field-guide.html
patches for the Operating System / 3rd Party Applications 2. Email Filtering – Actively filtering email attachment types that are potentially dangerous 3. End User Education – Teaching users how to identify potentially malicious links and attachments 4. Install Ad Blockers – Help protect against malicious ads from legitimate sites 5. Exploit Prevention – Microsoft’s Enhanced Mitigation Experience Toolkit 6. Backup & Recovery – Implement an effective backup plan in case you need to restore 7. Data Protection Suite – Consider leveraging a Data Loss Prevention technology with the ability to prevent malware infections and ransomware attempts to encrypt files.
25 Confidential
Confidential 26
Confidential 27
landscape sustain, if not exceed, momentum levels observed over the past several years.
gained significant notoriety in the past year, with illicit profits garnered from highly publicized campaigns
developers are continuing to expand & establish newly created ransomware variants for use in future campaigns.
Confidential 28
Confidential 29
30
EXECUTION INFILTRATION
BACKDOOR INSTALLATION
COMMAND & CONTROL PERSISTENCE EXFILTRATION
ESCALATION OF PRIVILEGES
LATERAL MOVEMENT Identification of the weakest link and exploiting Malware installed
system(s). Adversary’s communication with their own infrastructure. Adversary commands running
system(s). Presence on the compromised system through system restarts
credentials loss Obtaining a higher level of permissions for full control Moving across an environment from one system to the next. The removal of data to an external location.
Spear Phishing Attack Exploits Malicious Network Operations Malware Attacks Registry Modifications Privilege Misuse Exploits Data Theft
Confidential 31
EXPLOIT
Email attachment contains encrypted archive file with windows exploit which bypasses email defenses
INSTALL
Exploit installs ransomware that infects computer
ENCRYPT
Files on the computer are encrypted
DATA COMPROMISE
Ransomware encrypts 20,000+ additional files on mounted file servers
INFILTRATION
Targeted Phishing Email Informational Rule: Double click on Email Attachment Block Rule: Script Launched off Archive Block Rule: Known Ransomware Process Launch Block Rule: Ransomware File Extensions & Note Creation Block Rule: Mass Editing of Files Block Rule: Volume Shadow Copy Deletion Block Rule: Ransomware Outbound TCP Connection
Confidential 32
Achieve faster time to value with data loss prevention as a service Get the latest defense strategies and intelligence now Let us discover, monitor and protect your regulated data
Confidential 33
Technology
Detection and Response Technology that Delivers
Data Aware Threat Protection
People
Cyber Security Experts led by a Fortune 100 Cyber Defense Leader
Process
Proven Methodology for Managed IR and Threat Hunting
Proven Methodology
ONGOING THREAT INTELLIGENCE Our team harnesses both externally and internally generated intelligence feeds for immediate detection based on known threat activity.
Confidential 34
PREVENT ATTACKS IN REAL-TIME
vector, root cause, endpoints affected, etc. 24/7 SUPPORT Round the clock support on any questions or requests regarding the service or around threats that have been discovered within the client’s environment. FULLY MANAGED ATP INFRASTRUCTURE
ONGOING IMPROVEMENT OF YOUR SECURITY POSTURE Monthly expert risk analysis to assess, iterate and improve your incident response policies and procedures. PROACTIVE THREAT HUNTING AND INCIDENT RESPONSE With its proven incident response and threat hunting methodologies, our MSP team hunts, detects and responds to attacks in real-time.
against theft
endpoint - the most challenging use case
data protection with DG appliance
Security Program for DLP and ATP
loss or theft
Confidential 35
#1 IP Protection
37