Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the...

33
Nexthink V5 Demo Security – Malicious Anomaly

Transcript of Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the...

Page 1: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Nexthink V5 DemoSecurity – Malicious Anomaly

Page 2: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Situation

› Avoid damage resulting from the incident itself and the cost of the unplanned response

› Protection is not enough anymore to deal with advanced targeted malware detection and prevention• By 2018, 80% of endpoint protection platforms

will include user activity monitoring, analytics and forensic capabilities, up from less than 5% in 2013 (Source: Prevention Is Futile in 2020: Protect Information Via Pervasive Monitoring and Collective Intelligence, 30 May 2013, ID G00252476, by Neil MacDonald)

Page 3: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Solution

› Add behavior and anomaly detection to uncover risky activity and compromised devices

› Need to deal with a mix of malware, negligence and technology glitches. It’s all about 360 degrees insight all the time to:• Quickly mitigates the risks of employees' malware infected PCs.

Nexthink automatically analyzes the local and network activity to find PCs that connect to rogue destinations that aren't typical

• Become aware early enough about suspicious activity, misused systems, privileges abuse or careless behaviors before it turns into damaging attacks or activities

• Validate if appropriate configurations and policies remain enforced overtime

Page 4: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Alert came into our system to notify about a malicious activity in our infrastructure. Here is the alert displayed in the Finder.

Page 5: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Let’s drill-down to the alert…

Page 6: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

4 devices with dangerous activity…

Page 7: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Let’s see what binary(ies) are involved

Page 8: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

We can see a background running process (no user interaction) send quite some traffic out and already flagged as

high threat by the analytics platform

Page 9: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Let’s look at the network behavior and related anomalies… Here we see a periodic outbound connection sending 4MG of data each time

to a web domain in China. 4 internal computers are compromised. We have all the data here (ports, IP addresses, devices name, binary

name and path,..) to already react and stop an further impact

Page 10: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Here is how to extract all the data behind the visualization…

Page 11: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

One click and here you are… copy/paste into xls works like a charm to share with your colleagues

Page 12: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Let’s look at where the data is going…

Page 13: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Oh the Chineese dropbox-like service…

Page 14: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Now that the malware is not running and all related ports and domains have been

blocked, let’s go back in time to understand how we got hit and why, and put in place to

relevant preventive measures

Page 15: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Here is the alert related to this device….

Page 16: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

In all started from this toolbar installation….

Page 17: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

That looks like executing 2 binaries….

Page 18: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Let’s see more…

Page 19: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

First we have the setup.exe (to install the toolbar)… where what

this running from?

Page 20: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Hummm…. USB key (again!)

Page 21: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

How but not only executed locally, also connected to the outside… not for long and not a lot of traffic. But long enough to bring

the malware in grrrrr!!!

Page 22: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Let’s look at the domain the malware came from…. But initiated from inside to go through our

perimeter defense… we need to enhance our protection there for sure!

Page 23: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Let’s add some additional information coming from

centralized Nexthink Library

Page 24: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

That’s a web site you don’t want to connect Let’s also block it!

Page 25: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Curious why our endpoint security did not detect and block this activity and malware code…. Let’s see how the AV, Anti-Spyware are configured and

up to date… We might have a hole there….

Page 26: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Let’s select the security compliance checks I want to make…

Page 27: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Here are the 4 infected machines… with all protection in

place and well running….

Page 28: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

So let’s view what this malware is exporting the hash to VirusTotal

for an analysis…

Page 29: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Ok 16 AV identified this binary as a trojan kind of code. We are running Microsoft

ForeFront… Let’s find it….

Page 30: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Here it is…. Ok got it… No luck this time… Thanks we did not only rely on protection but had real-time activity monitoring and anomaly analytics otherwise I don’t know him much date would have gone out

from how many computers

Page 31: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Let implement a watch on exe running from USB key and connecting to the outside, such awareness can definitely help catching many other variants of

such type of threats

Page 32: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Any time any exe on any device would connected to the outside,

now I will know!

Page 33: Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.

Let’s use the Portal to report such dangerous activities in a dashboard

(for our CISO)