14
The Anatomy of a Targeted Attack Eric Chien Distinguished Engineer

The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

The Anatomy of a Targeted Attack

Eric Chien Distinguished Engineer

Page 2: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014

A targeted attack is an attack on a narrow set of recipients based on their association with a targeted organization in order to gain access to intellectual property and confidential information.

Anatomy of a Targeted Attack 2

Page 3: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014

91% Anatomy of a Targeted Attack 3

increase in targeted attacks in 2013

Page 4: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014

RECONNAISANCE

INCURSION

DISCOVERY

CAPTURE

EXFILTRATION

5 Stages

Anatomy of a Targeted Attack 4

Page 5: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014

REC

ON

NA

ISA

NC

E

Anatomy of a Targeted Attack 5

Page 6: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014

INC

UR

SIO

N

Anatomy of a Targeted Attack 6

spear phishing email

@

watering hole websites

Page 7: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014

INC

UR

SIO

N

Anatomy of a Targeted Attack 7

spear phishing email

@

watering hole websites

Trojan.Naid

Page 8: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014

DIS

CO

VER

Y

Anatomy of a Targeted Attack 8

Trojan.Naid

@

@ Domain Controller

Page 9: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014

DIS

CO

VER

Y

Anatomy of a Targeted Attack 9

C:\> ipconfig /all

C:\> net localgroup administrators

C:\> net localgroup administrators /domain

C:\> net group "domain admins" /domain

C:\> net view /domain

C:\> net view

C:\> netstat -an -p tcp

C:\> nbtstat -a

Trojan.Naid

Page 10: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014

CA

PTU

RE

Anatomy of a Targeted Attack 10

Trojan.Naid

@

@ Domain Controller

crack passwords

Page 11: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014

EXFI

LTR

ATI

ON

Anatomy of a Targeted Attack 11

Trojan.Naid

@

@ Domain Controller

Page 12: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014

EXFI

LTR

ATI

ON

Anatomy of a Targeted Attack 12

Trojan.Naid

@

@ Domain Controller

Page 13: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

SYMANTEC VISION 2014 Anatomy of a Targeted Attack 13

Email security (.cloud)

Intrusion prevention system (IPS)

Generic exploit protection (Canary)

Reputation (Insight)

Antivirus

Behavior blocking (SONAR) System lockdown (CSP)

Two-factor authentication (VIP)

Data leakage prevention (DLP)

No Administrator Proxy

The Kill Chain

@

C2 server

Page 14: The Anatomy of a Targeted Attack - Veritasvox.veritas.com › legacyfs › online › veritasdata › 1.30pm_1435... · 2016-07-04 · SYMANTEC VISION 2014 A targeted attack is an

Thank you!

Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Anatomy of a Targeted Attack 14