41
Virtual Roundtable Series Ransomware

Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Virtual Roundtable Series

Ransomware

Page 2: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Email us at [email protected]

Paul WatsonCTO

Matt ManesSecurity Sales Director

Gene BallardSecurity SE

Alyson GoodmanProject Manager

Today’s Panel

[email protected] [email protected]@peakresources.com [email protected]

Brian BlackDeep Instinct

[email protected]

2

Page 3: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Anatomy of a Ransomware Attack 10 minutes

Best Practices 13 minutes

Open Forum Q&A 15 minutes

Future Thought 15 minutes

• This session is being recorded

• You will get a PDF copy of the slides

• Use the Q&A function to ask a question before we go live for the open forum

• Keep an eye out for other’s questions and upvote those you would like answered!

Today’s Agenda

3

Page 4: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Ransomware: The Problem Statement... 4

• Virus' have been around since the late 1980s and here to stay!

• Ransomware is Malware - Malicious software that encrypts and holds

data/systems hostage for a ransom payment.

• Organizations will use Bitcoin or other methods for ransom payment that are

practically impossible to trace.

• Pay to prevent embarrassment – if publicized can have negative effect on

companies’ reputation, stock price, etc.

• PEAK is seeing multiple industries/verticals specifically targeted.

• PEAK is seeing that many companies don’t have sufficient controls in place to

effectively detect/respond to or recover from a Ransomware attack, let

alone prevent it.

• Are your backups alone a 'good enough' strategy?

Page 5: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

RansomwareAnatomy of an Attack

Page 6: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Stages of A Ransomware Attack

Stage 1: Campaign

Stage 2: Infection

Stage 3: Staging

Stage 4: Scanning

Stage 5: Encryption

Stage 6: Payday

6

Page 7: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Stage 1: Campaign7

• Attack Vectors− Phishing (Attachments, URLs)

− Vulnerable Websites (Exploit Kits, Trojans)

− Compromised USB Drives

− Vulnerable Systems (RDP/Gateways/VPN, Endpoints, Applications)

− Credential Scraping

− Brute Force (RDP, Dictionary Attacks)

• Reconnaissance− Intruder selects target, researches it, and attempts to identify vulnerabilities in the target

network

• Weaponization− Intruder creates remote access malware weapon, such as a virus or worm, tailored to one

or more vulnerabilities

• Delivery− Intruder transmits weapon to target

Page 8: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Stage 2: Infection8

• Exploitation- Malware weapon's program code triggers, which

takes action on target network to exploit vulnerability

• Installation- Malware weapon installs access point (e.g.,

"backdoor") usable by intruder

• Command and Control - Malware enables intruder to have "hands on the

keyboard" persistent access to target network

• Actions on Objective- Intruder takes action to achieve their goals, such as

data exfiltration, data destruction, or delivery or ransomware, etc

Page 9: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Stage 3: Staging9

• Ransomware-Specific Stage of Infection− Initial Dropper or Infection Process has been terminated

− Ransomware Payload has been delivered/executed

− Recon of local permissions

− C2C Communication for Key Exchange

− C2C Communication for any Exfil Activities

• Housekeeping− Moves itself to new folders/processes

− Cleans up original footprint

− Sets to run upon reboot

− Delete local Shadow Copy files (Windows)

Page 10: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Stage 4: Scanning10

• Targets for Encryption− Local files, Filesystems, Drives/MBR, etc

− Network file share locations - SMB/CIFS, NFS, mapped drives, etc

− Cloud - SaaS, IaaS, synced folders, etc

• Timing & Frequency− Varies by type & variant - seconds/minutes to hours

− Local/cloud scanning often quick

− Network scanning often delayed / set to a schedule

− Hide from controls

Page 11: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Stage 5: Encryption11

Page 12: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Stage 6: Payday12

• Facts− 96 percent of organizations that paid the ransom received a decryption tool from the hackers.

(Source: Coveware)− Decryption success depends on the type of virus. Dharma variants were often unreliable after

paying the ransom, compared to GrandGrab TOR which almost always delivered a successful decryption tool after a ransom was paid. (Source: Coveware)

− Bitcoin was the primary method of payment for ransomware. Around 98 percent of payments were made in Bitcoin. (Source: Coveware)

• Demands− Timed for a date that will have the most

impact− Typically demands are well thought out an

provide a painful, but easy out for those under attack

− IBM study - A quarter of executives would be willing to pay between $20K and $50K to regain access to encrypted data.

Page 13: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Stage 6: Payday13

To Pay or Not To Pay?

− Are you able to restore from back-up

− How critical is the data

− Business impact

Advantages Disadvantages− Reduce Disruption - No Guarantees

− Cheaper - Decryptor may not work

− Insurance may help - May be targeted again

− May save your business - Ethical and future Implications

Page 14: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

RansomwareBest Practices

Page 15: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Ransomware: Best Practices

Vulnerability/Patch Management

Network Security

Identity Access Management

Endpoint Security

Data Protection

Security User and Awareness Training

Continuous Monitoring

Security Policies/Plans

15

Page 16: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Best Practice: Vulnerability/Patch Management

• Scan regularly

• Prioritize vulnerability remediation

• Patch, patch, patch

− OS (Critical and Security related)

− Common apps (Adobe, Java, Office, browsers, etc)

− Services (IIS, Apache, SQL, PostgreSQL, MySQL, etc)

• Disable/remove unnecessary services

16

Page 17: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Best Practice: Network Security

• Network segmentation/filtering

• Network access control

• NGFW

• Explicit firewall rules

• Email threat prevention

• IDS/IPS

• Traffic analysis – source of truth!!

17

Page 18: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Best Practice: Identity & Access Management

• Identity− Federated Identity - One Identity

− Single Identity Policy

− RBAC Easier

• Access Control− Ensure Least Privilege Access

− Privileged Access Management (PAM)

− ACLs

18

Page 19: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Best Practice: Endpoint Security

• Deploy an Effective Prevention Solution

• Effective Enterprise EDR Solution

• Detecting & Responding to Advanced Threats/Attacks at

Scale in Real-Time

• Detecting & Responding to Malicious System Activity

− %APPDATA% , %TEMP%, etc.

− PowerShell, WMI, SSH, VSS, Memory, etc.

− Pre-Execution, On-Execution, Post-Execution

19

Page 20: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Best Practice: Data Protection

• Regular Backups

− Know your critical data

− Understand RTO/RPO requirements

• Protect Your Backups

− Multiple copies / immutable

− Backup data analytics

• Make Time to Test Your Backups – Restore, Restore !!

20

Page 21: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Best Practice: Security User & Awareness Training

• Conduct Ongoing Security Awareness

Training/Campaigns

− e.g. Quarterly internal phishing campaigns

− Newsletters, posters, regular security awareness

communications

• Conduct Ongoing User Training

− Regular shaping of user behavior and knowledge of

corporate policies

− More than the once a year “Check the Box” approach

− e.g. Brown Bag Lunch & Learn

21

Page 22: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Best Practice: Continuous Monitoring

• Formally Define an InfoSec Continuous Monitoring Plan

− Roles, responsibilities, communications, metrics, etc

• Common Monitoring Sources

− EDR, IDS, NGFW, SIEM, user behavioral analytics, threat analytics, network traffic

analysis

− Monitor the network, endpoint, cloud, and user

− Monitor for brute force attempts, account lockouts, clearing of logs, deletion of

critical files, unexpected alteration of critical files, etc

− Implement deceptive technologies

22

Page 23: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Best Practice: Security Policies/Plans

• Administrative Controls Dictate Operational Controls

• Formally Define/Document InfoSec Policies

− Organization infosec policy, risk management, incident response, vulnerability/patch

management, endpoint security, access control (systems, network), continuous

monitoring, security awareness and user training, etc

• e.g. Incident Response, DR/BC, and Risk Management

− IR policy, plan, procedure specific to ransomware, regular tabletop exercises, etc

− DR/BC policy, plan

− Risk management policy, plan/assessment… insurance?

23

Page 24: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Q & A

Do you have a more individual question?

Please email us at [email protected]

Type a question into the Q & A box in Zoom below.

Questions can be submitted and upvoted anonymously.

24

Page 25: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

RansomwareFuture Thought

with Brian Black of Deep Instinct

Page 26: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Facing Future Threats

Brian Black - Technology Evangelist / DSE

2020

Page 27: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

WHAT IS DEEP LEARNING ?

Page 28: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

28The World of Artificial Intelligence (AI)

Artificial Intelligence | 1950

Page 29: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

29The World of Artificial Intelligence (AI)

Artificial Intelligence | 1950

Optimization Method

Logic

Planning

Probabilistic Reasoning

Language Processing

Perception

Robotics

Expert Systems

Search Methods Recommendation

Machine learning | 1980

Page 30: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

30The World of Artificial Intelligence (AI)

Machine learning | 1980

Artificial Intelligence | 1950

Optimization Method

Logic

Planning

Probabilistic Reasoning

Language Processing

Perception

Robotics

Expert Systems

Deep learning | 2010

Multi-Layered Perceptron

Decision Trees

Regression

Support Vector Machines

Nearest Neighbor

Bayesian Models

Evolutionary Computation

Swarm Intelligence

Reinforcement Learning

Search Methods Recommendation

Page 31: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

31

CLASSICAL MACHINE LEARNING

Page 32: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

32Machine Learning Approach

Label = cat Label = dog Label = dog Label = cat

Label = cat Label = dog Label = catLabel = dog

Label = dogLabel = dog Label = cat Label = cat

Label = dog Label = dog Label = dog Label = cat

InferenceModel

Label = cat Label = dog Label = catLabel = cat

Labeldog

Page 33: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

33

CLASSICAL MACHINE LEARNING – HAND CRAFTED FEATURES

Ear = 9cm

Nose = 11.42cm

Eyes = 4.2cm

Page 34: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

34Misleading Features

Page 35: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

35Misleading Features

Dogs Cats

Page 36: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

36Noise

Original Images

Noisy Input

Page 37: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

37Deep Learning Vs. Machine Learning: No Feature Engineering

Mac

hine

Lea

rnin

gDe

ep L

earn

ing

Manual feature engineering

Machine learningVector of featuresRaw data

0.51.8-6.42.3

.

.

.N

Deep learningRaw data

<2% of the data

100% of the data

Page 38: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Private and confidential

Thank you

Page 39: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

39

Page 40: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

PE

AK

RE

SO

UR

CE

S

Closing Statements

Please email us at [email protected]

Thank you to Brian Black and Deep Instinct!

You can reach Brian at [email protected]

40

Page 41: Ransomware - peakresources.com...•Ransomware is Malware -Malicious software that encrypts and holds data/systems hostage for a ransom payment. •Organizations will use Bitcoin or

Thank you for joining today’s session

303-934-12001-800-925-PEAK

www.peakresources.com