Jessica Payne Microsoft Global Incident Response and Recovery

Slides:



Advertisements
Similar presentations
If a bad guy can alter the operating system on your computer, it's not your computer anymore A bad guy could have altered the operating system on EVERY.
Advertisements

Pierre Sleep tight knowing you’re prepared for outages Protect your environment with Azure ARC32 4.
Cory Banks Beyond Deployment How IT Can Inspire, Motivate, and Drive Sustainable Adoption PRD32 5.
Jordan Knight Developing for the Microsoft Band MOB342.
Karl Thomson, StorageCraft Product Evangelist True Disaster Recovery System recovery is not enough – get true resiliency to face disasters DAT226 B.
Luke Notley Migrating from AWS to Azure Seamlessly CLD32 1.
Andrew Hennessy Automating Server Application migrations to the Cloud – Goodbye Server INF21 3.
Kevin Francis Developing on Windows Devices ARC33 2.
Chris Hewitt Adding magic to your business with Perceptual Intelligence ARC323 B.
Matt McSpirit Software-defined Networking in Windows Server 2016 INF32 4.
Vakhtang Assatrian Asia Communications TSP Lead, Microsoft Architecture options for implementing Skype for Business PRD32 7.
Creating highly available and resilient Microservices on Microsoft Azure Service Fabric
Andrew Coates Advanced Windows 10 development with the Office 365 APIs DEV33 5.
Alessandro Cardoso, Microsoft MVP Creating your own “Private Cloud” with Windows 10 Hyper- V WIN443.
Michael Porfirio and Chris Gondek Beyond Backup The Next Generation Commvault Data Platform DAT22 5.
Jeff Alexander & Andrew McMurray Runtime Provisioning in Windows 10 WIN327.
Michael Niehaus Using the Windows Store for Business: New Capabilities for Managing Apps in the Enterprise WIN335.
Mahesh Krishnan Architecting highly resilient applications on Azure ARC42 7.
Jessica Payne Microsoft Global Incident Response and Recovery
Dr Greg Low Working with SQL Server Spatial Data DAT33 3.
Mike James Building a cross-platform pedometer app with Xamarin & Azure MOB334.
Lars Klint Adaptive UX - A Single UI for Everything MOB234.
James Bannan Freddy vs JSON: Azure Resource Manager CLD44 3.
Warwick Rudd – Henry Rooney – How Available is SQL Server 2016? DAT33 6.
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Nick Application Development for the Universal Windows Platform MOB225.
Vakhtang Assatrian Asia Communications TSP Lead, Microsoft
Matt McSpirit Understanding the Azure Stack INF33 2.
Alec Tucker An Introduction to Cross Platform Native App Development using Xamarin to Develop, Test and Monitor MOB227.
Orin Thomas 30 Bad Habits of Server Administrators INF32 3.
Fai Lai Global IoT Tech Specialist, C+E Specialist Sales Seamless communication between devices and Azure IoT Hub via Azure IoT Protocol Gateway MOB31.
Orin EDP, EFS, BitLocker, RMS, DAC, and IPsec: Protect your files at rest and in transit. WIN341 A.
Building a Microservices solution using Docker,
Ben FletcherRonnie Altit Getting the rest of your Data into Office 365 – archive and offline import introduction and real world experiences PRD23 3.
Basil Apostolou & Craig Pringle The why and how of hybrid cloud CLD22 3.
Ryan Newington From Fortran to FIM: Dragging your identity management system out of the dark ages WIN332 B.
Kevin Francis Big Building Blocks – a tour of Dynamics ARC323 A.
Joe Clancy Deployment Lifecycles and New Policy Features with the Azure Resource Manager ARC22 1.
Marc Soester Project Visualization, Resource Management and Collaboration using Office 365 Project Online PRD32 6.
James Bannan The Cloud That Chuck Norris Built: Resilient Architecture in Azure ARC44 3.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Jake Ginnivan Git for TFS Version Control developers DEV32 4.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Jhong Catane Exchange Hybrid Deployment PRD34 2.
3 Ways to Integrate Business Systems to Partners
30 Tips and Tricks for Managing and Running Ubuntu/Bash/Windows Subsystem for Linux WIN321B Orin Thomas.
Conversation As a Platform - Part 1
Now, let’s implement/trial Windows Defender Advanced Threat Protection
Building Business Application with Office 365 and Other Line Business Systems
Need for Speed: Why Applications With No Database and No Services are Fast ARC334 Nick Randolph – Built to Roam.
Building a Continuous Delivery Pipeline for ASP.NET Core Apps
Darren Neimke and Jonathan Ruckert
Ewan MacKellar & Mario Tevanian
Build vNext in VSO and TFS 2015
What’s new in Visual Studio in 2015?
Microsoft Edge for Developers
Rob Farley, LobsterPot Solutions
Application Insights:
Modern cloud PaaS for mobile apps, web sites, API's and business logic apps
Bare Metal Development for the Universal Windows Platform
The Power of a Great API Damian Brady
Deep Dive into Azure API Apps and Logic Apps
Jonathan Ruckert & Darren Neimke
UI test automation of MVC apps with Microsoft Edge WebDriver
Taking Windows Security to the Next Level with Group Policy
Empower your users with Azure Active Directory Premium
Securing ASP.NET in an Azure Environment
Pass-the-Hash.
Presentation transcript:

Jessica Payne Microsoft Global Incident Response and Recovery Anatomy of the Attack – How Cybersecurity Investigations Actually Work Jessica Payne Microsoft Global Incident Response and Recovery WIN433

Welcome to the worst day of your life

The Phone call This is the FIB. We noticed your server at x.x.x.x is communicating with a server associated with a malicious actor. Good luck with that. . . . Contoso CISO

Typical customer reaction

Television Cybersecurity Takes 45 minutes (without commercials) You see the attack They immediately notice the compromise Investigators are in general omnipotent Has guns Has a non-natural hair colored goth girl. Always.

Statistics (source: 2014/13 Verizon Reports+SIR) Microsoft Ignite 2015 4/25/2017 11:28 PM Statistics (source: 2014/13 Verizon Reports+SIR) Only 9% spot own compromise (sometimes by accident) Majority spotted by external party Attacker is on network an average of 200+ days before detection 75% use stolen credentials – tracking your own people is hard Self remediation pretty much impossible (you’ll see why) http://www.microsoft.com/security/sir http://www.verizonenterprise.com/DBIR/ © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Typical Attack Bad guy targets workstations with malware Power: Domain Controllers Bad guy targets workstations with malware User is compromised, Bad guy elevates privilege and harvests credentials. Data: Servers and Applications Bad guy starts “credentials crabwalk” Bad guy finds host with domain privileged credentials, steals, and elevates privileges Access: Users and Workstations Bad guy owns network, can do what he wants.

  Special just for you IP    Modern malware Bob the non-admin <----packets!--  Special just for you IP ----packet--> SuperLegitService.exe   win32k.sys 

 FIB Provided information FIB FLASH FIB Liason Alert #NC-1701 FIB has obtained information that the actor known as APT2005 “Rapid Rhino” has begun attacks against the kitty litter industry vector. Technical Details : ChriKit is a first generation Trojan that has full remote shell capabilities and credential theft toolsets. Traffic is beaconed over typical HTTP/HTTPs ports with minimal identifying strings. The Trojan is installed as a service, where the name varies.

So what do we know? Malicious host that was being beaconed to (C2 server) Potential threat family Through proxy/firewall logs we have identified host that was beaconing

(Those are time machines) The Incident Response tools we wish we had (Those are time machines)

What fancy tools do y’all use? WOLF – internal tool to gather data Autoruns – gathers ASEPs to indicate malware persistence Event Logs USN Change Journal – file system level details

Other fun tools Volatility/Memory snaps – memory analysis can be really useful, but it’s hard to grab remotely and transfer to us and even harder to catch something in the act YARA – Yet Another Regex Analyzer allows for matching of files against regular expressions PE Analysis – tools for analyzing Portable Executable header data – caution use OFFLINE in targeted attacks IDA Pro – How (some) Reverse Engineers do it.

Dramatic Pause

First do no harm If you have a suspected compromise GET HELP

Band-Aids don’t fix bullet holes Don’t play whackamole – malware has sleeps Holistic diagnosis and recovery are needed in a targeted compromise. You will not find it all with basic tools and firewall logs. Engage a professional. A full compromise means a full recovery More data is more knowledge – but don’t be overwhelmed Don’t rely on tools, this is part art as well as science. Know what is normal, know that persistence can be unexpected – Powershell profiles, etc.

The investigation Jessica Payne

Real live malware Microsoft Ignite 2015 4/25/2017 11:28 PM © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Real live malware Microsoft Ignite 2015 4/25/2017 11:28 PM © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Real live malware Microsoft Ignite 2015 4/25/2017 11:28 PM © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Real live malware

Tips DO - search on file hashes DO NOT – submit files to Virus Total for analysis DO NOT – ping or use DNS lookup DO – Get professional help DO – Submit the sample to us (tagged as DHA if you suspect) https://www.microsoft.com/security/portal/submission/submit.aspx DO – Send us telemetry! DO – Get Professional help!

Using Sigcheck to collect hash

Using Virus Total URL search

Using Virus Total hash search

Using Virus Total URL search

Pretty much undetectable evil Jessica Payne

Monitoring strategies Make sure you have the right logs enabled (this is trickier than it sounds) Central collection of logs is huge Firewalls are also huge (critical) – from a logging perspective but also blocking. Powershell. Lock it up, upgrade it and monitor it. Sysmon Good news in Windows 10! Advanced Threat Analytics – it can detect some of this.

Defense strategies Credential Theft Mitigations Microsoft Ignite 2015 4/25/2017 11:28 PM Defense strategies Credential Theft Mitigations Network and Application Segmentation (Firewalls, Applocker, RemoteApp) EMET against initial compromise Well implemented Cloud solutions actually can help (not just a sales pitch.) Unlike TV, not guns. © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Questions? http://aka.ms/jessica @jepayneMSFT

Complete your session evaluation on My Ignite for your chance to win one of many daily prizes.

Continue your Ignite learning path Microsoft Ignite 2015 4/25/2017 11:28 PM Continue your Ignite learning path Visit Microsoft Virtual Academy for free online training visit https://www.microsoftvirtualacademy.com Visit Channel 9 to access a wide range of Microsoft training and event recordings https://channel9.msdn.com/ Head to the TechNet Eval Centre to download trials of the latest Microsoft products http://Microsoft.com/en-us/evalcenter/ The purpose of this slide is to ensure delegates consider their next steps after your presentation. The learning should not end on 20th November 2015  Option to use this slide in the current generic format or for you to recommend 1 (or more) Microsoft Virtual Academy Course or Channel 9 video that is relevant next steps from your presentation. Thanks © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.