The Role of Application Control in a Zero-Day Reality

32
The Role of Application Control in a Zero-Day Reality

description

With end users often downloading unwanted and unknown applications, more than 1.6 million new malware signatures appearing every month and a rising tide of zero-day attacks, there is more risk to your systems and information than ever before.Find out: * How to defend against zero-day threats - without waiting for the latest anti-virus signatures * Why application control / whitelisting should be a central component of your security program * How application control has evolved to enforce effective security in dynamic environments

Transcript of The Role of Application Control in a Zero-Day Reality

Page 1: The Role of Application Control in a Zero-Day Reality

The Role of Application Control in a Zero-Day Reality

Page 2: The Role of Application Control in a Zero-Day Reality

Today’s Speakers

2

Paul ZimskiVP of Solution StrategyLumension

Richard StiennonChief Research AnalystIT-Harvest

Page 3: The Role of Application Control in a Zero-Day Reality

Today’s Agenda

Evolution of Game Changing Threats

Securing Endpoints from Zero-Day Attacks

Q&A

Page 4: The Role of Application Control in a Zero-Day Reality

Game Changers: Targeting, Custom Trojans and Zero-Day

Malware

Page 5: The Role of Application Control in a Zero-Day Reality

Threat hierarchy is a time line!

• Information Warfare• CyberCrime• Hactivism• Vandalism• Experimentation

Page 6: The Role of Application Control in a Zero-Day Reality

Custom Trojans, tools of the trade

Michael Haephrati shows us how.

Page 7: The Role of Application Control in a Zero-Day Reality

China knows Trojans

• In the UK, the Home Office has warned about a spate of attacks in recent months involving e-mail Trojans. "We have never seen anything like this in terms of the industrial scale of this series of attacks," said Roger Cumming, director of NISCC

Page 8: The Role of Application Control in a Zero-Day Reality

Shawn Carpenter uncovers Titan Rain

• From Z-machine mechanic to IDS analyst

• Fort Dix attack

• Sandia

Page 9: The Role of Application Control in a Zero-Day Reality

Ghost Net

• 1,200 computers including ministry and NATO machines

• Looking for attribution

• Attacks on the office of the Dalai Lama

• A special purpose botnet

Page 10: The Role of Application Control in a Zero-Day Reality

Joint Strike Fighter

Page 11: The Role of Application Control in a Zero-Day Reality

Project Aurora • Social networks used

as vectors to target Google employees

• Zero-day vulnerability in IE

Result• Loss of customer

data

• Loss of source code

Page 12: The Role of Application Control in a Zero-Day Reality

Cyber Sabotage: Stuxnet

Step 7 software DLLRootkit

DLLoriginal

Programmable Logic Controller

New data blocks added

s7otbxdx.dll s7otbxsx.dll

Page 13: The Role of Application Control in a Zero-Day Reality

Other advanced features of Stuxnet

• Stolen digital certificates!

• Multiple zero-day vulnerabilities

• Command and control for morphing

Page 14: The Role of Application Control in a Zero-Day Reality

What do control systems control?

Page 15: The Role of Application Control in a Zero-Day Reality

What to do?

• Allow only that which is good. Deny all else.

• Vet and test all new apps.

• Use intelligence to determine reputation of applications.

• Monitor behavior.

• Stay sane.

Page 16: The Role of Application Control in a Zero-Day Reality

Blog: www.threatchaos.com

email: [email protected]

Twitter: twitter.com/cyberwar

Page 17: The Role of Application Control in a Zero-Day Reality

Securing Endpoints from Zero-Day Attacks

Page 18: The Role of Application Control in a Zero-Day Reality

18

A Perfect Storm At The Endpoint

18

Increasing sophistication

& attack targeting

Rising 3rd party application risk

& zero day vulnerabilities

Ineffectiveness of AntiVirus as a stand-alone

defense

Page 19: The Role of Application Control in a Zero-Day Reality

Attack Originates from the network (Internet, LAN, WAN) and actively attacks a listening service on the endpoint.

End-user is working with a “client application” and opening code that was downloaded from the network.

Attacker has physical access to the target machine and can mount drives, hardware, insert disks.

Listening Services

Client Applications

Local MachineHardware

Physical Access

Client –side

Network-based

Webservers, Databases, RDP (remote desktop, file sharing, registry)

Browsers, email, documents, movies, flash

Drives, USB devices, NICs

Type Target Examples End Goal

Install payloadElevate privilegeEstablish beach-head

Install payloadElevate privilegeRetrieve dataEstablish beach-head

Install payloadElevate privilegeEstablish beach-head

19

Attack Types, Targets and End Goals

Page 20: The Role of Application Control in a Zero-Day Reality

2020

• Malware infections are symptoms of change control failure

Fundamental Breakdown in Change Control

Test & ApproveChange

ImplementChange

Monitor &LockdownChange

20

Page 21: The Role of Application Control in a Zero-Day Reality

Build a Solid Foundation

21

Patch & Configuration Management

Application Control

Enable OS Memory Protection

AntiVirus

Page 22: The Role of Application Control in a Zero-Day Reality

22

Page 23: The Role of Application Control in a Zero-Day Reality

23

Malware is Malware – Payloads are Payloads

Rootkits | Remote Access Trojan | Bots | Keyloggers | SniffersAdware | Spyware | Crimeware | Worms | Virus | Logic Bombs

In the eyes of Application Control these are all the same

23

Page 24: The Role of Application Control in a Zero-Day Reality

24

Preventing Malware

1) Eliminate your Vulnerabilities

• Most attacks rely on known vulnerabilities

• Patching the vulnerability eliminates the attack vector

• Patching endpoints remains a first and best line of defense!

24

Page 25: The Role of Application Control in a Zero-Day Reality

Stopping a Malware Payload

2) Stop the Payload

• Antivirus will provide some protection against known payloads, and remains a good layer for known malware detection and removal

• However as attack sophistication and targeting increases, malware becomes less effective as a primary defense

• Application control is a much better defense to stop unknown payloads from installing

25

Page 26: The Role of Application Control in a Zero-Day Reality

AV Vendors Recognize the Limitation

“You can’t just rely on antivirus software – and we’re an antivirus company..….Antivirus, firewalls and intrusion detection are a start. But “white listing” offers a stronger defense…. McAfee believes that’s where the future is going.” George Kurtz, Worldwide Chief Technology Officer, McAfee

“Looking at the sheer volume of infected systems in the world, one thing is resoundingly clear: basic security protection is not good enough.”

Rowan Trollope, Senior Vice President, Symantec

26

Page 27: The Role of Application Control in a Zero-Day Reality

Malware

What is Application Whitelisting?

27

Authorized•Operating Systems•Business Software

Known• Viruses• Worms• Trojans

Unauthorized•Games•iTunes

•Shareware•Unlicensed S/W

Unknown• Viruses• Worms• Trojans• Keyloggers• Spyware

ApplicationsU

n-T

rust

ed

Page 28: The Role of Application Control in a Zero-Day Reality

Flexible Trust

Trusted Publisher• Authorizes applications based on the vendor that “published” them through

the digital signing certificate.

28

Trusted Updater• Authorizes select systems management solutions to “update” software, patches

and custom remediations, while automatically updating them to the whitelist.

Trusted Path• Authorizes applications to run based on their location.

Local Authorization• Allows end-users to locally authorize applications which have not been otherwise

trusted by the whitelist or any other trust rules.

28

Page 29: The Role of Application Control in a Zero-Day Reality

29

Protecting Against Buffer Overflows

3) Police OS Memory

• Microsoft has developed effective capabilities in the OS itself to stop Buffer Overflow Attacks

• Data Execution Prevention (DEP) - marks unused buffers as “non executable”

• Address Space Layout Randomization (ASLR) – randomizes the memory components that make buffers

29

Page 30: The Role of Application Control in a Zero-Day Reality

A Complete Defense

30

An

tiV

iru

s

Pat

ch M

anag

emen

t

Ap

pli

cati

on

Co

ntr

ol

Mem

ory

Pro

tect

ion

Intelligent Whitelisting

Page 31: The Role of Application Control in a Zero-Day Reality

Q&A

Page 32: The Role of Application Control in a Zero-Day Reality

Global Headquarters8660 East Hartford Drive

Suite 300

Scottsdale, AZ 85255

1.888.725.7828

[email protected]