50
Cyber Security Professionals Awards – Gold Winner Smart City Consortium Security SIG Chairman Chief Technology Officer Cisco Hong Kong, Macau, Taiwan Nov 2017 Ransomware Update Garrick Ng

Ransomware Update - edb.gov.hk · PDF fileChief Technology Officer Cisco Hong Kong, Macau, Taiwan ... of exploit kits and phishing, ... Cisco MCR and Goggle research report

  • Upload
    letuong

  • View
    222

  • Download
    5

Embed Size (px)

Citation preview

Cyber Security Professionals Awards – Gold Winner

Smart City Consortium Security SIG Chairman

Chief Technology Officer

Cisco Hong Kong, Macau, Taiwan

Nov 2017

Ransomware UpdateGarrick Ng

The Evolution of Ransomware VariantsThe confluence of easy and effective encryption, the popularity of exploit kits and phishing, and a willingness for victims to pay have caused an explosion of ransomware variants.

PC Cyborg

2001

GPCoder

2005 2012 2013 2014

Fake Antivirus

2006

First commercial

Android phone

2007

QiaoZhaz

20081989 2015 2016

CRYZIP

Redplus

Bitcoin network launched

RevetonRansomlock

Dirty DecryptCryptorbitCryptographic LockerUrausy

Cryptolocker

CryptoDefenseKolerKovterSimplelockCokriCBT-LockerTorrentLockerVirlockCoinVaultSvpeng

TeslaCrypt

VirlockLockdroidReveton

ToxCryptvaultDMALockChimeraHidden TearLockscreenTeslacrypt 2.0

Cryptowall

SamSamWannaCry

Nyetya

Bad Rabbit

Locky

CerberRadamantHydracryptRokkuJigsawPowerware

73V3NKerangerPetyaTeslacrypt 3.0Teslacrypt 4.0Teslacrypt 4.1

Worm typeransomware

Ransomware in 2016: $1 billionLocky, Cerber, CryptXXX, Cryptowall, …

Source: Cisco MCR and Goggle research report

RaaS

RaaS: Karmen

L ive Chat with customer ser v ices

Padcrypt

CTB-Locker

Jigsaw

June 2017

Swansea Police, Massachusetts $750

Dickson County Police, Tennessee $572

Tewksbury Police, Massachusetts $500

Midlothian Police, Chicago $500

Melrose Police, Massachusetts $450

Feb 2016

Melrose Police Dept, MA. $500

We have FW, and we have Anti-Virus

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

COMPROMISED

SITES AND

MALVERTISING

PHISHING

SPAM

Web

link

Web

redirect

C2

File

drop

Email attachment

EXPLOIT

KIT

DOMAINSC2

RANSOMWARE

PAYLOAD

Malicious

Infrastructure

Encryption Key

Infrastructure

Angler

Nuclear

Neutrino

How Ransomware Works

User Clicks a Link or Malvertising Ad

Email w/ Malicious Attachment

Initial Exploit Using Angler or

other malware kits

Ransomware payload

downloaded and installed

Command & Control callback

Key retrieval and payment information

CTHSEC-1000 14

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

COMPROMISED

SITES AND

MALVERTISING

PHISHING

SPAM

Web

link

Web

redirect

C2

File

drop

Email attachment

EXPLOIT

KIT

DOMAINSC2

RANSOMWARE

PAYLOAD

Malicious

Infrastructure

Encryption Key

Infrastructure

Most Ransomware Relies on DNS and C2 Callbacks

Angler

Nuclear

Neutrino

CTHSEC-1000 15

NAME DNS IP NO C&C TOR PAYMENT

Locky DNS

SamSam DNS (TOR)

TeslaCrypt DNS

CryptoWall DNS

TorrentLocker DNS

PadCrypt DNS (TOR)

CTB-Locker DNS

FAKBEN DNS (TOR)

PayCrypt DNS

KeyRanger DNS

Encryption C&C Payment MSG

Predictive

100Brequests per day

12Kenterprise customers

85Mdaily active

users

160+countriesworldwide

https://youtu.be/acwD_OA3QZ4

Basic defense: Prevent, Detect and Contain Ransomware with

Cisco Email Security, Umbrella, and AMP for Endpoint

PHISHING

SPAM

Web

link

Email attachment

Blocked by Cisco

Cloud Email Security

with AMP Threat Grid

COMPROMISED

SITES AND

MALVERTISING

Web

redirect

EXPLOIT

KIT

DOMAINS

Angler

Nuclear

Neutrino

Blocked by

Cisco Umbrella

(Cloud DNS Security)

C2Command &

Control Communication

Malicious

Infrastructure

File

drop

Blocked by Cisco

AMP for Endpoints

(Host Anti-Malware)

C2 Asymmetric

Key Exchange

RANSOMWARE

PAYLOAD

Encryption Key

Infrastructure

Detection with Threat Grid

Continuous Analysis and Retrospective SecurityOnly AMP for Endpoints Continuously Monitors, Records, and Analyzes All File Activity, Regardless of Disposition

Recording

Identify a

point of origin

progression and how it spread

See what it is doing

See where it's been

Surgically targetand remediate

Monitor +

Detect

What customers are saying about AMP for Endpoints

Visit https://www.techvalidate.com/collections/amp-for-endpoints-survey-results for more

quotations and metrics

Ransomware 2.0

Targeted Ransomware (APT)

Crytoworm

Source: Cisco MCR and Goggle research report

Hollywood Presbyterian Medical Center

Methodist Hospital in Henderson, KentuckyChino Valley Medical Center in Chino, Ontario, CaliforniaDesert Valley Hospital in Victorville, Ontario, CaliforniaOttawa Hospital, CanadaMedStar managed hospitals in Baltimore, Washington, MarylandKing’s Daughter’s Health, IndianaAlvardo Hospital Medical Center, San DiegoChino Valley Medical Center, CaliforniaDesert Valley Hospital, California

LA Hollywood Presbyterian Medical Center, $17000

May 2016

Email, financial aid, voice mail, phone system. $28,000 ransom

Dec 2016

San Francisco MUNI Railway, 900 computer encrypted, demand for $73,000

Nov 2016

Nov 2016

Large amount ransomware

June 2017

153 Linux servers, 3400 websites encrypted. $1 million US paid

WannaCry

12/5/2017

300,000 victims in 150 countries

NotPetya / Petrwrap / Nyetya

27/6/2017

Reckitt Benckiser - $117 million Maersk - $200-$300 million

Fedex and TNT: $300 million Merck: $310 million

Why so powerful?

WannaCry = Ransomware + Exploit + Worm

WannaCry

NSA SMB

Lateral MovementSMB

In Sandbox? (Anti-Sandbox technique)Check domain (Kill Switch)

Windows SMB ExploitMS17-010

WannaCry Defense

NSA SMB

Lateral MovementSMB

In Sandbox? (Anti-Sandbox technique)

NGFW/IPS/AMPDNS Security

NGFW/IPS/AMP

Windows SMB ExploitMS17-010

Network Visibility, Behavior Analysis

Email Security Endpoint security

Identity, Posture &

SD-Segmentation

Best Practices – Things I Can Do!

1. Do you have good disaster recovery (People/Process/Tools)? Train to implement it on a regular basis.

2. Do you have good offline back ups? Test them regularly.

3. Patch your systems, update your AV ASAP

4. Additional layer of defense such as DNS (Umbrella) and Anti-malware solution

5. End of life hardware / software?

6. Educate users on emails with links and attachments

CTHSEC-1000 41

www.cisco.com/go/ransomware

Ransomware Defense for Dummies

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Tested against >20 REAL Ransomware Attack families to validate the solution

• Cisco Umbrella

• Cloud Email Security w/AMP

• AMP for Endpoints

• AMP ThreatGrid

Cloud and software solution that enables quick deployment and protection

Ransomware Defense Prevention Validation

CTHSEC-1000 43

www.cisco.com/go/safe

44

https://mkto.cisco.com/Security-Scholarship.html

Cisco Networking Academy, a Cisco Corporate Social Responsibility program, is an IT skills and career building program available to learning institutions and individuals worldwide.

46© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

The Networking Academy Learning PortfolioCollaborate for Impact

* Available within 12 months

September 2017

Aligns to Certification

Mobility Fundamentals

CCNA R&S: Introduction to Networks, R&S

Essentials, Scaling Networks, Connecting

Networks

CCNP R&S: Switch, Route, TShoot

Introduction to Cybersecurity

Introduction to IoT

CCNA SecurityCybersecurity Essentials

CCNA Cyber Ops*

Exploratory Foundational Career-Ready

Networking Essentials

Networking

Security

IoT

Be Your Own Boss EntrepreneurshipBusiness

Get ConnectedDigital Literacy

NDG Linux UnhatchedNDG Linux Essentials

IT Essentials

Programming

OS & IT

CLP: Advanced Programming in C*

CPP: Advanced Programming in C++*

NDG Linux II

Current & Planned

CLA: Programming Essentials in C

NetRiders InternshipsPrototyping LabHackathonsPacket Tracer

CPA: Programming Essentials in C++

NDG Linux I

IoT Security*

Emerging Tech Workshop: Collaboration /

Spark API*

IoT Fundamentals:

Connecting Things, Big Data & Analytics

Hackathon Playbook

Instructor Training required

Emerging Tech Workshop: Network

Programmability*

Self-paced

Introduction to

Packet Tracer

PCA: Programming Essentials in Python*

47© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Specifically for Self-Paced Courses

• Packet Tracer 101

• Packet Tracer 101 Mobile

• Introduction to Packet Tracer

• Introduction to IoT

• Introduction to the

Internet of Everything

IoT

• Entrepreneurship

Business Literacy

• Introduction to Cybersecurity

• Cybersecurity Essentials

Security

Networking

• Get Connected

Digital Literacy

48© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

To get this slide and more about NetAcadProgram, pls leave your contact by scanning this QR code:

WannaCry

Garrick Ng - CTO: [email protected]

Shania Ting - Security Sales Manager: [email protected]

Tommy Mak - Security Consultant : [email protected]

Eric Tsoi - Security Consultant: [email protected]

Garrick Ng - CTO: [email protected]

Shania Ting - Security Sales Manager: [email protected]

Tommy Mak - Security Consultant : [email protected]

Eric Tsoi – Security Consultant: [email protected]