Download - Ransomware - Prepare: Have a Plan

Transcript
Page 1: Ransomware - Prepare: Have a Plan

Ransomware – Prepare: Have a Plan

Jim Olmstead

Incident Response Consultant

Page 2: Ransomware - Prepare: Have a Plan

Ransomware

• It is Prevalent

• It is Profitable

• If you Pay the ransom, you provide incentive for the Bad Actors to continue

• Let’s break the cycle

• Prepare now

2

Page 3: Ransomware - Prepare: Have a Plan

Threat Vectors

• Delivery methods of ransomware

• Email (Mass spam and possible targeted spam)

• Locky, Teslacrypt, …

• Exploits weaknesses in your security

• Launched by employees eager to “click” on email

• Hack and Attack

• Samsa, Samas (aka, samsam.exe and other variant names)

Secure:

» Computers on your network and under your control (Password & Kerberos Reset)

» 3rd Party Vendor or Unmanaged systems on your network

» Review computers placed in your DMZ and their connectivity back to your network

3

Page 4: Ransomware - Prepare: Have a Plan

Response: Initial

• If infected, immediately detach the system from your network

• Physically disconnect system, or use

• Host Intrusion Protection System (HIPS)

• Automate the response if a detection occurs, or

• Manually isolate

• Ensure your Anti-Virus is up-to-date with signatures

• Schedule FULL (Daily) workstations and Servers

• Any excluded systems or portions of systems MUST be scanned

• Schedule Additional (Daily) targeted scans

• Remediate the system or wipe it clean?

• Have you done enough to prepare?

4

Page 5: Ransomware - Prepare: Have a Plan

Response: Be Proactive - Prepare

• BACKUP your data to an offsite location or detach your backup storage

• Block or reduce access to Open and Mapped Shares

• Update, Upgrade, and patch your Operating System (OS)

• Use Whitelisting / Application Control

• Block and Filter email & attachments

• Remove or reduce Remote Desktop (RDP) use

• Educate your end-users (To be Suspicious of email and attachments)

• Run up-to-date Anti-virus protection & signatures (Use extra.dat’s)

5

Page 6: Ransomware - Prepare: Have a Plan

Be Ready- Prepare Now

• Incidents are going to happen

• Incidents are part of doing business

• Need for an endpoint solution & other security products

• Have a Plan before you have the Need to Respond

6

Page 7: Ransomware - Prepare: Have a Plan

The RansomWare Landscape

@ChristiaanBeek

Page 8: Ransomware - Prepare: Have a Plan

TeslaCrypt

CryptoWall Crysis

Locky

Reveton

CryptoFortress

Criakl

Tobfy

CTB-Locker

LockScreen

CrypTear

Samas

Other

8

RansomWare Statistics Q1 - 2016

272,712240,767

674,778

Jan Feb Mar

Page 9: Ransomware - Prepare: Have a Plan

9

“In Q1 2016, TeslaCrypt hit many European

countries, where Turkey was hit the most

according to our statistics.”

Page 10: Ransomware - Prepare: Have a Plan

Countries hit by RansomWare

10

Page 11: Ransomware - Prepare: Have a Plan

11

“Where we started with around 10 families

in Jan 2016, Currently we are tracking 57+

different ransomware families..”

Page 12: Ransomware - Prepare: Have a Plan

Observations Q1

- Ransomware as a Service increased massively

- Source-code for ransomware publicly available

- Targeted ransomware campaign on mostly Healthcare industry

- Ransomware encrypting Master-Boot-Record

- Apple users hit with Ransomware

- Ransomware going after web-content management systems

12

Page 13: Ransomware - Prepare: Have a Plan

#who s behind ransomware?

Wannabee Affiliate Organized Crime

Page 14: Ransomware - Prepare: Have a Plan

Wannabee

Page 15: Ransomware - Prepare: Have a Plan

Wannabee

Page 16: Ransomware - Prepare: Have a Plan

Affiliate

Page 17: Ransomware - Prepare: Have a Plan

Ransomware as a Service

Botnet Affiliate/Service

Provider

RAAS

Operator

Cash Management

Page 18: Ransomware - Prepare: Have a Plan

Organized Crime

Experienced group

Involved in multiple (ransomware) campaigns

Fast response times

Server image for fast deployment

Cautious in affiliate program

Tracking news, forums around their ‘product’ and adjust

Page 19: Ransomware - Prepare: Have a Plan

Profitable business?

Page 20: Ransomware - Prepare: Have a Plan

SamSa example

• 45.00 BT

• 40.00 BTC

• 21.94 BTC

• 22.00 BTC

• 22.00 BTC

• 40.00 BTC

$100,000.00 so far…...

Page 21: Ransomware - Prepare: Have a Plan

What is Intel Security doing about it?

Page 22: Ransomware - Prepare: Have a Plan

Ransomware Kill-chain

Btc

wallet2

Exploit Kits

URL

URL URL

URL

Many

transactions

Btc wallet1

Final Wallets

Delivery

Infrastructure

Infection Back end

InfrastructurePayment Infra

Phishing

URL

Attachment

Victim infected Proxy

servers

Proxy

URL

1

Proxy

URL

2

Proxy

URL

X

Distribution

servers

Btc wallet3

Page 23: Ransomware - Prepare: Have a Plan

What is Intel Security doing about it?

Ransomware

• Focused group on ransomware

• Participate in investigations and operations with Law Enforcement and other Vendors

• Innovating new technology

23

Page 24: Ransomware - Prepare: Have a Plan

What can we expect next?

Compared to 2015, we already have seen a few new directions like targeted ransomware and encrypting full systems.

We expect that embedded devices, more targeted attacks on certain industries and related business applications will increase in 2016 and beyond.

24

Page 25: Ransomware - Prepare: Have a Plan

There is Hope!!

- Petya (boot-disk encryption)

- Teslacrypt (older versions)

- TorrentLocker

- Jigsaw ransomware

- Linux.Encoder

- Double-DMA

25

Page 26: Ransomware - Prepare: Have a Plan

Ransomware Recommendations

Josh Thurston

Security Strategist – Office of the CTO

Page 27: Ransomware - Prepare: Have a Plan

Avoid RiskFilter run-rate threats and protect data to reduce exploitable surface area and

operational burden

Mitigate RiskOptimize decision making

Compress mean time to resolution Minimize impact

Reduce RiskIsolate signal from noise for rapid, hi-fidelity risk

comprehension and response prioritization

Threat Defense Lifecycle

27

Applied integration, automation, and orchestration driving a defense lifecycle

Disrupt in-bound attacks

Control data access

Automate defensive workflow

Illuminate low-threshold breaches

Discover unmanaged systems

Monitor data access

Contain and repair compromised systems

Programmatically share intelligence

Adjust and extend policies

Optimize Resources

Page 28: Ransomware - Prepare: Have a Plan

Protect Recommendations

• Patch management and Hygiene

• Tune VirusScan and Endpoint Security Access Protection Rules

• KB81095 and KB54812

• Use GTI and leverage +4 million unique ransomware signatures

• Use HIPS signatures to limit unknown processes

• 3894 Prevent SVCHOST.exe executing non Windows .exe‘s

• 6010 and 6011 to block the injection immediately

• Use Whitelisting / Application Control

• Fortify critical Systems

• Legacy Operating Systems & Applications

28

Page 29: Ransomware - Prepare: Have a Plan

Protect Recommendations

• Use Web Security to stop threats before they get to the endpoint

29

Filter Known Bad

Sandbox / Reverse-engineering (zero-day)

Real-time Behavioral Emulation (zero-day)

McAfee Web Protection McAfee ATD

Dynamic and Static Analysis

Gateway Anti-Malware

AV

Input

Quantity

Depth of Inspection

Page 30: Ransomware - Prepare: Have a Plan

Detect Recommendations

30

• Limit software installs with VSE access protection rules

• Use HIPS & Change Control to block changes from unapproved processes

• Use TIE to detect new PE’s

• Use Sandboxing / ATD to inspect “grey” files upon execution

• Use IPS to block TOR traffic used by ransomware to obfuscated communications

• Integrate Endpoint with Network to reveal malicious process communications

Page 31: Ransomware - Prepare: Have a Plan

Correct Recommendations

31

• Use ATD to educate TIE reputations DB

• Use AR to hunt for latent malicious code and eradicate

• USE SIEM and IPS to discover and blacklist malicious IP’s

• Use frequent backups to restore systems (last resort)

Page 32: Ransomware - Prepare: Have a Plan

Neutralize Emerging Threats

Safeguard Vital Data Optimize Security Operations

Fortify Critical Environments

Intel Security: Capability Offerings

Endpoint Protection

Network Security

Data Security

Web Security

Security Management

Endpoint Detection &

Response

Server Security

Threat Sandboxing

Security Services

Threat Intelligence

Page 33: Ransomware - Prepare: Have a Plan

33