60
Pivoting During the Hunt for Malware

Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Pivoting During the Hunt for Malware

Page 2: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

• Fidelity : both low, medium and high • Pivot : what is it• Gains : from a pivot• Pivot Fields : within the chart• Pivot Chart : identifying data sources• Example• Curiosity and thinking• System Automation

Page 3: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

fidelity

Page 4: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

fidelitynounpl. -·tiespl. fi·del·i·ties

1. accuracy of a description, translation, etc.2. exact correspondence with fact or with a given quality, condition, or

event; accuracy

Page 5: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 6: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

•Syslogs•Event logs•NetFlow/IPFIX•Packet Capture

Page 7: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

•Syslogs•Event logs•NetFlow/IPFIX•Packet Capture

LOW

MEDIUM

HIGH

Page 8: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

• Syslogs• Event logs• NetFlow/IPFIX• Packet Capture

LOW

MEDIUM

HIGH

Page 9: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

LOW

MEDIUM

HIGH

Page 10: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Agenda

• Fidelity : both low, medium and high • Pivot : what is it• Gains : from a pivot• Pivot Fields : within the chart• Pivot Chart : identifying data sources• Example• Curiosity and thinking• System Automation

Page 11: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

What is a Pivot?

• The ability to pass context between autonomous systems while researching a security or application performance event.

• Goal: to quickly gather additional details that could be related to the event being investigated.

• A good pivot will lower the cost of the event for the defending investigator and increase the cost of the attacker.

Page 12: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Pivoting Lets You …

• Connect data sources• Move from host to network

based data• Shorten investigative times• Pivot from lower to higher

context data - seldom do you start with pcap “Start with flow data which is very fast to parse, very

low in size you can parse it really quickly and then pivot from that to packet capture data.”

Page 13: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Example Pivots

• Move from internal (e.g. NetFlow or syslogs) to external data sources (E.g. virustotal, passivetotal, Talos Intelligence) .

• Example: Move from a proxy server log that is user name aware to a windows event log

“Both server and Network data is needed in every security investigation” - Chris Sanders

Page 14: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Efficient Pivoting Requires …

• Meta cognition – curiosity and next-step investigative mindset• Ask good questions, stick to answering those questions• Good data collection• Integration of pivoting across systems

Page 15: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Agenda

• Fidelity : both low, medium and high • Pivot : what is it• Gains : from a pivot• Pivot Fields : within the chart• Pivot Chart : identifying data sources• Example• Curiosity and thinking• System Automation

Page 16: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 17: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

System logsEvent logsNetFlow & IPFIXPCAPDNS logs

Page 18: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

NetFlow& IPFIX

PacketCapture

DNS

BroFirewall

IDS

External

System LogsSyslogs &

Event Logs

Page 19: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

NetFlow& IPFIX

PacketCapture

DNS

BroFirewall

IDS

External

System LogsSyslogs &

Event Logs

What are your pivoting fields?

• Alert name? • IP addresses (most common pivot)• Communication ports• Time frame

Page 20: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

NetFlow& IPFIX

PacketCapture

DNS

BroFirewall

IDS

External

System LogsSyslogs &

Event Logs

IP AddressTime FramePorts

IP AddressPortsTime Frame

IP AddressPortsTime FrameNAT Details

Alert NameIP AddressPortsTime Frame

Alert NameIP AddressPortsTime Frame

IP Address

IP AddressTime Frame

Alert NameIP AddressTime Frame

Page 21: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

NetFlow& IPFIX

PacketCapture

DNS

BroFirewall

IDS

External

System LogsSyslogs &

Event Logs

IP AddressPortsTime Frame

IP AddressPortsTime Frame

IP AddressPortsTime Frame

Alert NameIP AddressPortsTime Frame

Alert NameIP AddressPortsTime Frame

IP Address

IP AddressTime Frame

Alert NameIP AddressPortsTime Frame

Page 22: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

NetFlow& IPFIX

PacketCapture

DNS

BroFirewall

IDS

External

System LogsSyslogs &

Event Logs

Page 23: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

DNS Bro

Firewall

IDS

External

System LogsSyslogs &

Event LogsSIEM

Flow Collector

NetFlow& IPFIX

PacketCapture

Page 24: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

External

SIEMFlow

Collector

PacketCapture

Page 25: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 26: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 27: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 28: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

External

SIEMFlow

Collector

PacketCapture

Page 29: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 30: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Investigative Process

Page 31: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Investigative Process

• Observation - How you find out:• Receive a call• Receive an alarm

Page 32: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Investigative Process

• Observation - How you find out:• Receive a call• Receive an alarm

• Generate a Hypothesis – humans are biased and that is a good thing

Page 33: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Investigative Process

• Observation - How you find out:• Receive a call• Receive an alarm

• Generate a Hypothesis• Try to define what you are looking

for before you look!

Page 34: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Investigative Process

• Observation - How you find out:• Receive a call• Receive an alarm

• Generate a Hypothesis• Define what you are looking for

before you look! • What data do you have that will

allow you to answer questions?

Page 35: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Agenda

• Fidelity : both low, medium and high • Pivot : what is it• Gains : from a pivot• Pivot Fields : within the chart• Pivot Chart : identifying data sources• Examples• Curiosity and thinking• System Automation

Page 36: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 37: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 38: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 39: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 40: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 41: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Training.mp4

Page 42: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Example 2

Page 43: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Hypothesis: I’m thinking user error

Page 44: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

I have an IP address, show me all the things I can pivot to.

Page 45: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 46: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 47: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 48: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 49: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Return Code503

Page 50: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 51: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 52: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 53: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

External

SIEMFlow

Collector

PacketCapture

“100% of analysts use pivots” - Chris Sanders

Page 54: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Agenda

• Fidelity : both low, medium and high • Pivot : what is it• Gains : from a pivot• Pivot Chart : identifying data sources• Pivot Fields : within the chart• Example• Curiosity and thinking• System Automation

Page 55: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Curiosity

Page 56: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Curiosity makes Effective Hunters

• The desire to find out• Create a curiosity culture by

promoting discussion • Learn how to ask the right questions.

“Is this an anomaly or something I haven’t run into before?”

• Don’t be intimidated. Years at the job does not make someone proficient

• Be careful: Years of experience can lead to less curiosity

Page 57: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 58: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting
Page 59: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

“Reviewing network perimeter NetFlow will help determine whether a network has experienced suspicious activity.”

Oct 21, 2017

https://www.us-cert.gov/ncas/alerts/TA17-293A

Page 60: Pivoting During the Hunt for Malwarecybersummitusa.com/wp-content/uploads/2017/11/Cyber... · 2017-11-15 · • The desire to find out • Create a curiosity culture by promoting

Summary on Pivoting

• Single pivots almost never happen. Plan for at least 4.• Pivots often require decisions by the analyst. (e.g. should you pivot to

the event logs, the flows or external site for details). Pivot decisions are guided by the questions you are trying to answer.

• Keep economy in mind. The Defense team absolutely must have efficiencies. Pivots need to be fast to improve speed.

• Extra pivot steps defeats efficiency• Pivots need to be short to decrease time spent• Improves accuracy to bridge the perception to reality gap

• Share frequently used pivots with others