Group-IB Security Ecosystem Portfolio update Tim Bobak APAC Sales - - PowerPoint PPT Presentation

group ib security ecosystem
SMART_READER_LITE
LIVE PREVIEW

Group-IB Security Ecosystem Portfolio update Tim Bobak APAC Sales - - PowerPoint PPT Presentation

Group-IB Security Ecosystem Portfolio update Tim Bobak APAC Sales Director Group-IB Moneytaker Case Study Moneytaker Investigation Tracking started in Autumn of 2016 after first Russian Incident What happened after the breaches? Thefts from


slide-1
SLIDE 1

Group-IB Security Ecosystem

Portfolio update Tim Bobak APAC Sales Director Group-IB

slide-2
SLIDE 2

Moneytaker Case Study

Moneytaker Investigation

Tracking started in Autumn of 2016 after first Russian Incident

slide-3
SLIDE 3

What happened after the breaches?

Thefts from card processing and other payment systems

slide-4
SLIDE 4

Document exfiltration

Confidential documents, Personal Data SWIFT and security guidelines

slide-5
SLIDE 5

Breaches go public

But Group-IB stopped other attacks on US banks

slide-6
SLIDE 6

How did we investigate Attackers used SSL certificates across multiple campaigns and attack infrastructure

slide-7
SLIDE 7

What do we use? We survey the internet daily

slide-8
SLIDE 8

Group-IB Ecosystem

Threat Intelligence Driven Products

slide-9
SLIDE 9

How our ecosystem is developed

Very few companies globally have the infrastructure to create Threat Intelligence driven cyber security products Group-IB Infrastructure

  • HoneyNet and botnet analysis
  • Hacker community infiltration
  • Open-source monitoring
  • ISP Level Sensors
  • IDS, EDR & Sandbox deployments
  • Clientside malware detection

Analyst Driven Experience & TI

  • Forensics
  • Investigations
  • Malware monitoring and research
  • CERT-GIB request database
  • Security assessment
  • Domain & Registrar data
slide-10
SLIDE 10

Early warning system to hunt attackers

slide-11
SLIDE 11

Threat Detection System

Threat Detection System is a multi-part platform designed to cover all attack avenues inside of your network

Huntbox TDS Sensors TDS Sandbox TDS Endpoint

slide-12
SLIDE 12

Attack Vectors covered

Customer facing apps

TDS Polygon

Mail

TDS Endpoint TDS Polygon

Browser

TDS Endpoint TDS Sensor

Local network

TDS Sensor TDS Endpoint

Supply chain

TDS Sensor TDS Endpoint

Integrated modules to cover popular attack vectors How can you use this to catch a Moneytaker?

slide-13
SLIDE 13

TDS Sensor

Analyses DNS, HTTP, Hop HTTP / HTTPS, SMB and more

In-depth traffic inspection Unique signatures

Proprietary data from exclusive sources written by our team Mechanisms to work with hidden channels, DG Algorithms

Encrypted Traffic Analysis Detect Lateral movement

Detects tools and techniques used by attackers for persistence

slide-14
SLIDE 14

Detecting network activity

Usage Socks on port 7080 and 1808 VNC clients like as Fileless VNC, VNC, UltraVNC In the US, they used the LogMeIn Hamachi

slide-15
SLIDE 15

TDS Sandbox

Unparalleled Detection Detailed reports for further investigation Stops Anti-evasion Techniques File extraction from emails and traffic Extremely low false positive rates Retrospective analysis Full process tree Get deep technical insights into the malicious files targeting your networks

Hardware | Cloud

slide-16
SLIDE 16

Detecting malicious documents

Emails with malicious

attachments widely

used in targeted attacks Malware Samples hosted on Moneytaker infrastructure Provides another avenue for detection

slide-17
SLIDE 17

TDS Endpoint and Huntbox

Link infrastructure used by attackers Track the incident from start to finish Enrich against data from all your networks All TDS Platform Detections in one

TDS Huntbox TDS Endpoint

Catch and log changes made by malware Send files to Polygon for analysis Link suspicious processes to traffic Respond: clean and isolate infected hosts

slide-18
SLIDE 18

Huntbox & EDR – tracking an actor

slide-19
SLIDE 19

Huntbox & EDR – tracking an actor

slide-20
SLIDE 20

Group-IB Ecosystem

After protecting: Getting smarter…

slide-21
SLIDE 21

Threat Intelligence

DEEP AND DARK WEB MONITORING TTP FROM THE WILD HUMAN INTELLIGENCE KNOWLEDGE OF MALWARE & CYBERCRIME TOOLS FINISHED THREAT INTELLIGENCE UNIQUE COLLECTION INFRASTRUCTURE PERSONALIZED DATA FOR YOUR ORGANISATION

«Group-IB has the advantage of getting visibility on many unique threats»

slide-22
SLIDE 22

Nation State Espionage

slide-23
SLIDE 23

Cybercriminal brand abuse

Fraudsters copy legitimate site using similar domain and replace payment details.

slide-24
SLIDE 24

Detailed TTPs and unique Tactical indicators Dedicated Team Members Reverse Engineering Requests Underground forum sweeps Attack analysis and recommendations Actionable API data for SIEM & TIP Platforms Group-IB CERT 24/7 monitoring and response

Make intelligence actionable

slide-25
SLIDE 25

Group-IB Ecosystem

Protecting your Customers en-masse

slide-26
SLIDE 26

Protecting Clientside

Attackers have developed tools and techniques to steal from your customers These need to be detected Group-IB has developed Secure Bank and Secure Portal, for protecting customers online in banking and e-commerce

slide-27
SLIDE 27

Session analysis on PC and Mobile Devices

Behavioral analysis IP & Device fingerprinting Global user profiling Advanced rule engine Botting and RDP Detection Cross-channel analysis Detects code changes & malware Social engineering and AML detection

Functionality

Deploys via Javascript or SDK

slide-28
SLIDE 28

Investigating with Secure Bank

slide-29
SLIDE 29

Group-IB Ecosystem

Suggestions and Review

slide-30
SLIDE 30

Consulting & Response

Security Assessments Penetration Testing Red Teaming Compromise Assessments Investigations and Computer Forensics Incident Response Pre-Incident Response

Already available and used in ASEAN and APAC

You can remain unaware for months of hidden but active threats in networks Compromise assessment allows for analyst driven detection, advisory and assessment of previously undetected attacks From multiple actors…

Cyber Security Services

slide-31
SLIDE 31

Review – Security driven by Intelligence

slide-32
SLIDE 32

Thank you for your attention! Questions?

Tim Bobak APAC Sales Director Group-IB Twitter: @enablethemacros Email: bobak@group-ib.com