Advanced Threat Solution: Tentokrát Více o Koncovém Zařízení
Advanced Threat Solution: Tentokrát Více o Koncovém Zařízení
Jiří Tesař
[email protected]
We see more so you can block more and respond faster to threats.
More threats blocked Proofpoint
Zscaler
Fortinet
800K
972M
20B
Check Point
700K
Trend Micro
250M Symantec
4M
Palo Alto
1M
See it once, protect everywhere
NGIPS ISE Cloudlock Umbrella AMP
ThreatSource Newsletter
Talos Blog
cs.co/TalosUpdate
blog.talosintelligence.com
Recording
ExPrev Beta Test leads to 0-day Remote Code Execution Minimalist (evolutionary) code
backdoor discovery in vulnerability prevented, prevents injection technique prevented
CCleaner software from Avast exfiltration and remote admin by ExPrev technology
CCleaner: https://blog.talosintelligence.com/2017/09/avast-distributes-malware.html
0-day Flash: http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
IcedID: Talos Analysis: https://blog.talosintelligence.com/2018/04/icedid-banking-trojan.html
In Memory
System Process Protection
• Session Manager Subsystem (smss.exe)
• Client/Server Runtime Subsystem (csrss.exe)
• Local Security Authority Subsystem (lsass.exe)
§ Protects Windows system processes • Windows Logon Application (winlogon.exe)
from being compromised through • Windows Start-up Application (wininit.exe)
memory injection attacks
Customer
premises
§ On-prem server gets updates from AMP Public Cloud
TETRA
Update Server
Public Wi-Fi
Visibility
• App-layer auditing and correlation via net new iOS 11 functionality
• Logs encrypted URL requests without SSL decryption
• Available to AMP for Endpoints customers at no extra charge
if subscription already covers iOS devices
Process
Sample is executed and analyzed using
Analyze, Correlate, and multiple techniques
2. Enhance • Proprietary techniques for static and
dynamic analysis
• “Outside looking in” approach
• 1000+ Behavioral Indicators
• 9 Default Playbooks
AMP on Web
Security Appliance
AMP on Email AMP Private Cloud Threat Intelligence Engine
Security Appliance
Process names
AMP Endpoint Registry Keys
Agents IP Addresses
DNS Names
FMC
Virus
NGFW TALOS ThreatGrid AMP Umbrella SMA
Total
Stealthwatch Cryptographic
Catalyst Stealthwatch Custom Security Audit
9000 Enterprise Event
Cognitive Malware
Intelligence Detection
ETA data
Sequence of packet
Initial Data Packet Global Risk Map
lengths and times
C2 Message
Data Exfiltration
Self-Signed Certificate
Make the most of Identify the content type through Know who’s who of the
unencrypted fields the size and timing of packets Internet’s dark side
encrypted traffic
src dst
Packets
src dst
server_
hello_
Server Information done
Behavioral Information
© 2018 Cisco and/or its affiliates. All rights reserved. Global
Sales Training
ETA Data Features, TLS 1.3
app_data
Application Information
app_data
client_
hello
app_data
Server Information
Behavioral Information
© 2018 Cisco and/or its affiliates. All rights reserved. Global
Sales Training
ETA Topology
Threats Detected
v ~400 Detections using ETA
v Ransomware detected
v C&C and Data Exfiltration
v Multiple Critical, High- and Medium-risk Detections
v Numerous Malware Instances including Cryptomining & Botnet activities
v Several Applications using TLS 1.0
Security that works together
nvzFlow
Attributing a flow to:
• Process name Endpoint Flow
• Process hash Concentrator Collector
• Process account AnyConnect with
• Parent process name Network Visibility Module
• Parent process hash
• Parent process account
CISCO ISE
pxGrid Integrations for
IOT, Orchestration,
Deception, Endpoint,
Vulnerability
Management
CISCO Firepower
Threat Intelligence Director for
NGFW Enrichment, Firepower
integrations
CSTA September Announcement Summary
57 new integrations from network to endpoint to cloud…
Block: 10
(global policy) Block: 1
1 Doctors Monitor: (global policy) (global policy)
Monitor: 78
367
2 Doctors BYOD (global policy) Block: 1 Block: 10 (global policy) (global policy)
Monitor: 78 Monitor:
367
Global Policies No blocked items Monitor: 79 Monitor: No Blocked Items Web Reputation: Enabled
367 Anti-Malware Scanning: Enabled
ISE as a source of Context • Live Sessions Table of ISE
• Device/User Authentication
• Device Profiling
Cisco ISE • NAD details
PxGRID
NGIPS/ASA +
Firepower
Qualys Tenable
Drives Threat-based
Network Policy in ISE
Use Cases – Host Input API
• Allows the import of Host and
Vulnerability Data
Vendor, Product,
Version, and
Mobile Device
Information
Server Applications
and Versions
FMC
Client Applications
and Version
Vulnerability
© 2018 Společnost Cisco a její pobočky.
Names and IDs
Qualys – ISE Integration
CTA/AMP – ISE Integration Difference: vulnerable (Qualys) vs
compromised (CTA/AMP) endpoints
Quarantine
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
What is Threat Centric NAC: Threat
Threat EndPoints based on Incidents and Indicators
Incident Response: Rapid Threat Containment
Cisco AMP, Firepower, Stealthwatch, ISE & CSTA Partners
A
Co
pxGrid ANC API Dynamic ACLs,
SG
T Increase Inspection
Contractors Datacenter
& Partners