27
Threat Hunting for Lateral Movement Presented by: Adam Fuchs – CTO Co-conspirator: Ryan Nolette – Security Technologist and CCO Corgi Edition

Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

Threat Hunting for Lateral MovementPresented by: Adam Fuchs – CTOCo-conspirator: Ryan Nolette – Security Technologist and CCO

Corgi Edition

Page 2: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 2

Agenda

Lateral Movement OverviewStructuring the AnalysisDetecting LMs with DataScience™Threat Hunting around Detected LMs

Page 3: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 3

Patient 0: original Infection

Successful Lateral Movement

Failed Data access from compromised host after lateral movement

Failed Data access from Patient 0

Successful Lateral Movement

Successful Data access from compromised host after lateral movement

Company’s Customer Financial Records

What Is Lateral Movement?

Page 4: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 4

Login to new system

• psexec - shell • RDP – GUI• Profit

Late

ral M

ovem

ent

Tools• Mimikatz• Pwdump• Generic memory

dump

Goal• To gather plaintext

credential• Password hashes • Elevate your

privileges

Cre

dent

ial T

heft

Human Attacker interactionExamples of recon:• netstat – see active

network connections• Nmap – network

scanner• Net use – access to

resources• Net user – manage

local/domain accounts

• Task list – what processes are running on systemR

econ

nais

sanc

e

Stages

• Infected system checks in with command and control server/s

• Human Attacker gives command to infected system to allow access

• remote shell • GUI interface

options • Human attacker

starts reconnaissance

Com

prom

ise

Infection to Lateral Movement Process

Infection Techniques

• Phishing email• Drive by • Exploit kit• Flash drive

Infe

ctio

nRinse and Repeat for each system as needed or wanted

Page 5: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 5

Infection– Back-doored executable

Infected Binary

Creating the Malicious Payload

Compromise –Meterpreter Session

Page 6: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 6

Compromise –discovering privileges

Compromise –elevate privileges

Compromise – confirm new privileges

Page 7: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 7

Recon Local Accounts

Recon Domain Accounts

Recon – User accounts

Recon – Network

Mounted Drives

Check ARP table

Running Processes

Processes with Network ConnectionsRecon – Processes

Nmap

Page 8: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 8

Running MimikatzCredential Theft

Recover SAM hashes

Recover the Kerberos Hashes

Lateral Movement – Using Stolen Credentials

Page 9: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

DETECTING LATERAL MOVEMENT WITH DATA

SCIENCE

Page 10: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 10

LM evidence comes from:Windows EventsSyslogVPNEndpoint sensors

Primary fields:SourceDestinationUserTime

Extra Information:

Data

Page 11: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 11

Target Specific Techniques

• e.g. Pass The Hash detection• Very specific means low false positives• May miss new techniques

Search for General Graph Patterns

• Hard to hide from• May pick up unrelated similar patterns

Specialized Generic

Abstraction Spectrum Trade-Off

Page 12: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 12

(3) Rarely-Seen Logins

(4) Fan-outs, including failed logins

(2) Overall Timeframe in expected range

(1) Expected Inter-loginTime Distribution

(5) Not too big,Not too small

LM Graph Pattern Characteristics

Page 13: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 13

Lateral Movement Strategy

Rank individual loginsTrain: learn common user login patterns from the data Predict: assign rank (logLikelihoodRatio) to every login. Rank high those that are unusual

Construct time-ordered connected sequences of loginsPredict: find top N sequences of logins with the highest combined rank

Page 14: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 14

Used to determine base risk for loginsExtensible feature vectors mix numerical, categorical, and text features

TDigests for numericalBag of words for textVectorized categorical statistics

Learns “normal” in-situPriors out-of-the-boxEvery network is different

Scalable spark implementations

Generalized “Rarity” Classifier

Page 15: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 15

Multi-Hop Predict

192.168.1.101 192.168.1.104

192.168.1.78 192.168.1.83

Page 16: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 16

Multi-Hop Predict: Combinatorics

General Problem: Subgraph Isomorphism5 edges 25 = 32 subgraphs10 edges 210 = 1024 subgraphs20 edges 220 = 1,048,576 subgraphs

We run with billions of edges...

Solution: grow small subgraphs in parallelPrune early and oftenAglomerative clustering Message passing

192.168.1.101 192.168.1.104

192.168.1.78 192.168.1.83

Page 17: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 17

Multi-Hop Predict: Message Passing

Page 18: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 18

Multi-Hop Predict: Message Passing

Page 19: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 19

Multi-Hop Predict: Message Passing

Page 20: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 20

Scalable Analytic Implementation

Large scale, parallel implementationMultiple Independent Variable Bayesian Classifier (MIVB)

Spark extension for graph processingHigh performance message passing implementationUsed for agglomerative clustering / detection of LM structures

Page 21: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 21

Processing Workflow

Sqrrl Auth/Login Sources

Spark / GraphX

Classifier Training

Single-Hop Predict

Multi-Hop Predict

Evidence Tables

Sqrrl CounterOpsModel

Trained Classifier

Page 22: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 22

Organizing Security Data

SECURITY DATA

NETWORK DATA

ENDPOINT/IDENTITY DATA

Analytics Threat Intel

ProcessesHR

SIEM Alerts

NetflowProxy

Authentication

DNS

Page 23: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 23

False Positive Reduction

1. Rank:

2. Normalize:• Smooth out discontinuities in ranking function• Apply historical context to determine probability of seeing a given rank• Convert to risk score based on likelihood * impact

3. Threshold:• Analysts usually care about LMs over risk X

Base risk factor Time risk factor Size risk factor

Page 24: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 24

Building the LM Detector

TTP Alignment

Threat Hunters

Behavior and Structural

Decomposition

High-Risk Classifier (Subgraphs)

Data Scientists

Log-Likelihood Ranking

Normality Classifier (MIVB)

Scalable Implementation (Spark, GraphX)

Computer Scientists

Deployable Workflow with In-Situ Training

Rank Statistics Normalization

Security Analyst

Contextual Exploration and Visualization

Page 25: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 25

Lateral Movement

Page 26: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 26

Lateral Movement

Page 27: Webinar: Lateral Movement€¦ · Data Scientists. Log-Likelihood Ranking. Normality Classifier (MIVB) Scalable Implementation (Spark, GraphX) Computer Scientists. Deployable Workflow

© 2018 Sqrrl Data, Inc. All rights reserved. 27

Thank you! threathunting.org

For hunting eCourses, papers and other resources

&threathunting.net

For a repository of hunting techniques