Defend Your SCADA Network from Zero Day Threats with the WildFire Appliance

Palo Alto Networks recently announced availability of PAN-OS 6.1, the newest version of our operating system.  As with all our operating system releases, there is an amazing list of new features to help our customers better secure their networks, respond more quickly to incidents and reduce operational overhead.  Given my focus on cybersecurity for Industrial Control Systems, the one feature I am particularly excited about is the capability of the WildFire appliance, the WF-500, to generate threat prevention signatures on premises.

WildFire is of course a service available in our security platform that isolates suspicious payloads (e.g. executables, MS-Office documents) at the network, detonates them in our Threat Intelligence Cloud, then sends a report back to the user about the nature of a payload.  Not only that, if the payload is malicious, the cloud sends threat prevention signatures (anti-virus, malicious URL, malicious DNS) back to the firewall, essentially converting the unknown threat into a known, stoppable threat.

Many of the critical infrastructure and manufacturing asset owners I work with have told me they like the idea of WildFire and the threat intelligence cloud, but faced constraints in sending files out to the public cloud. Many have general privacy concerns, some have regulatory constraints, and on occasion, they cite the unavailability of an internet connection (airgap).

We are excited to announce with the release of PAN-OS 6.1 that we can now address these concerns via the WF-500’s ability to generate on-premise malware signatures in as little as 5 minutes. This update will come in very handy in securing several perimeters and even internal zone traffic within the automation environment — assuming you have proper segmentation! – and here’s how:

  • Corporate-to-SCADA perimeter: Some of the traffic which you may be allowing on a limited basis from the Enterprise IT side may be file-bearing. Use the WF-500 to inspect this for malicious content.
  • Vendor/Partner-to-SCADA: Just because you are using a secure VPN to let your partner or vendor into your SCADA system doesn’t mean the content is secure. Implement a zero-trust model and inspect all traffic.
  • Operator/Engineering to Server: Files may be introduced by removable media at HMIs and Engineering workstations or via mobile laptops connected in the LAN. Use WF-500 to detect and block zero days that originate from within.
  • Inter-plant traffic: Yes other plants are behind the IT-OT firewall and considered trusted, but again, don’t assume anything and be vigilant of malware that may come from other sites within the organization.

Remember: one WF-500 supports multiple next-generation firewalls, essentially transforming each firewall into a sensor for detecting unknown threats in hundreds of file-bearing applications across standard and non-standard ports, with the ability to automatically prevent them as well.  This is a fundamental difference from other detection-only, point solutions which require one or more application-specific sandboxing appliances at each point of inspection in the network, resulting in partial, open-loop security at high costs to you.

WildFire is of course one element of our entire solution.  For more details on our complete security platform which spans network security (Next-Generation Firewall), endpoint (Traps Advanced Endpoint Protection) and the cloud (Threat Intelligence Cloud), please feel free to read our brief whitepaper on protecting critical infrastructure.

[Palo Alto Networks Blog]

ISACA’s 2014 IT Risk/Reward Barometer Survey Results Reveal Internet of Things Trends

Like many people, my office tends to be airports and wherever in the world I have traveled. The advent of connected devices, wearable tech and the Internet of Things enables me to be more productive and have more contact with colleagues and friends. This is a good thing.

But at the same time, these amazing advancements are also causing disruption in our lives and workplaces. We don’t always know who has use of or control over our sensitive personal and corporate information. And since new developments are always making their way into the workplace, it is critical that we understand attitudes and actions of consumers as well as the professionals and executives on the front lines of enterprise technology.

ISACA helps build this understanding with its annual IT Risk/Reward Barometer, and the 2014 survey results show some interesting trends with significant implications. For example, 68 percent of US consumers plan to use wearable tech or connected devices at work. But despite the surge in wearable tech at work, only 11 percent of enterprises have a policy that addresses it.

Enterprises need to be aggressively proactive here, and start educating staff on the risks and the opportunities of wearable tech. Devices such as smart watches and glasses collect and transmit information that provides great value. But if this information gets into the wrong hands or is mishandled, it can be used to damage a company’s reputation, financial position, compliance activities and even its existence.

According to the latest IT Risk/Reward Barometer, “increased security threats” and “data privacy issues” are two of the biggest challenges that ISACA members list regarding the Internet of Things.

But along with the inherent risk in the Internet of Things, enterprises are also reaping benefit, such as the 29 percent that have achieved greater accessibility to information and the 26 percent that have used it to improve services. Also 22 percent have gained efficiencies and improved employee productivity. With new technology there is always the need to balance risks and rewards—and there are plenty of both in the case of the Internet of Things.

To keep tabs on evolving perceptions and trends, ISACA has fielded the IT Risk/Reward Barometer for five years. This survey is unique in that it has two components—a consumer survey and an ISACA-member survey. Globally, more than 4,200 consumers and more than 1,600 ISACA members responded this year, giving us an excellent pool of responses.

Wearable tech, connected devices and other cool advancements in the Internet of Things are making their way into every aspect of our lives. The gates are open and the tide is flowing, and we encourage you to take an “embrace and educate” approach. Having an informed and alert customer/employee/stakeholder base is a key aspect of making connected devices work for you and your enterprise.

I invite you to review the full report, infographic and news announcement for the 2014 IT Risk/Reward Barometer. I need to take off now. My smart refrigerator just told my smart watch that I need to pick up some bread on the way home from the airport.

Robert E Stroud, CGEIT, CRISC
2014-2015 ISACA International President

[ISACA]

“Know Your Enemy”— Is It Enough?

Usually attributed to the ancient treatise The Art of War by Sun Tzu, the phrase “Know your enemy” is often repeated in military and security environments and is given as guidance to junior level staff in these environments. While it is good guidance, this article will explore why it is incomplete and why this is important.
One reference gives the full quotation, rendered in modern Chinese script as “故曰:知彼知己,百戰不殆;不知彼而知己,一勝一負;不知彼,不知己,每戰必殆” complete with the English translation:

“So it is said that if you know your enemies and know yourself,
you can win a hundred battles without a single loss.
If you only know yourself, but not your opponent, you may win or may lose.
If you know neither yourself nor your enemy, you will always endanger yourself.”

The full quotation provides much fuller and richer guidance and it is important to consider the meaning and impact of the full text. Below I will examine each sentence from the English translation.

“If you know neither yourself nor your enemy, you will always endanger yourself.”
The third sentence reminds us that lack of knowledge is dangerous. If you do not know your own capabilities, structures, processes, strengths and weaknesses it is unlikely that you will be able to use your resources effectively, or be able to resist your own weaknesses being exploited. A lack of knowledge about your enemy could lead you into a false sense of security—or to overestimate the abilities of your enemy—perhaps leading you to direct defences where the attacker is weakest and the attack least likely to succeed even without your efforts. For example, you would not want to concentrate all your defences on a Windows exploit being run against a Linux server. In short, you are totally unprepared for the battle and you may well contribute to your own defeat by making incorrect decisions!

“If you only know yourself, but not your opponent, you may win or may lose.”
The second sentence reminds us that it is only slightly better to know your own strengths and weaknesses. While you will know what you have to work with, and how best to engage your resources, you will not be prepared for the actions of your opponent so it is unlikely that you will be able to effectively direct them to the best effect against the threat. Your opponent will be able to surprise you and you will thus battle to take the initiative. As you will be unlikely to be able to anticipate the actions of your enemy they will find it easier to exploit your weaknesses. Put another way, you will likely be ‘behind the game’ for much of the time and the enemy will dictate the battle.

“…know your enemies and know yourself…”
The first sentence brings this together and essentially advises that you must know yourself and your enemy. This allows you to predict the strategy and attacks of your enemy and counter them with your defences quickly and effectively. While doing this you should also be able to start active defences. For example, you can implement a honeypot to direct them away from your real assets. You may even be able to counter-attack, directing your strengths at the weak areas of your attacker. For example, you can initiate civil action against the ISP that your attacker is using to launch the attack. At the very least you will keep them guessing and they will have to divert resources from attacking you to try to predict or interpret your actions. At its most effective, this will allow you to deflect or counter most attacks quickly and effectively.

Many organisations expend time and effort conducting threat identification and analysis. This is important but only helps you understand your enemies. Technical vulnerability analysis is slightly better in that it helps you understand your weaknesses. It is equally important but less common for organisations to spend time studying themselves. Your own strengths, weaknesses and vulnerabilities contribute as much to the outcome of any battle as do those of your enemy—but you have far greater ability to know yourself—use the opportunity before an attacker does!

To help you start your journey of discovery, I have listed some recommended activities to help you “Know your enemy” and “Know yourself:”

Know your enemy

  • Threat identification and analysis
  • Future threats and trends intelligence gathering
  • Research hacking and attack tools
  • Install detection and warning systems (e.g., intrusion detection/prevention systems)
  • Consider implementing honeypots or honeynets

Know yourself

  • Conduct vulnerability scans and penetration tests.
  • Review and test incident process, including staff contact details.
  • Ensure that asset register and Configuration Management Data Base (CMDB) are current and complete.
  • Create baselines for normal conditions (e.g. network utilisation, normal traffic flows).
  • Review patching and anti-malware update process to identify any weaknesses.
  • Engage specialist incident management/forensic support (on retainer or pre-paid to ensure quick response when needed).

Richard Norman, CGEIT, CISA, CISM, CRISC
Head of Information Security, Risk and Compliance for the British Council
London, England

[ISACA]

Palo Alto Networks News of the Week – November 8

Check out all of the top Palo Alto Networks news from this week.

Have you ever seen love like this?

We recently published a new research paper on WireLurker, a family of malware targeting both Mac OS and iOS systems for the past six months.

Shortly after we released the above research paper, Jaime Blasco from AlienVault Labs notified us about Windows executable file that contains WireLurker’s command and control server address. After analyzing and investigating the sample, it is confirmed that it is an older version of WireLurker. Read the follow on post here.

 

If you love great cybersecurity books we hope you will get involved in the Cybersecurity Canon by writing a review of your favorite and submitting it for consideration. Rick Howard explains how.

 

Tsugunori Sugawara on how PAN-DB will add more protection to your Palo Alto Networks Enterprise Security Platform by protecting your network from advanced attacks and playing a critical role in the Cyber “Kill Chain.”

Ask firewall administrators about their day-to-day challenges and sooner or later they will come around to a challenge that Matt Keil describes as policy chaos. Here, he explores bringing a semblance oforder to this policy chaos.

There are many ways to look at cloud computing and what it means for your business. Overall, cloud governance means discovery, control and safe enablement. In this post from Isabelle Dumont, learn tips on doing your security due diligence on cloud services.

 

 

We’re on the road with VMware and VMUG in the U.S. and Canada to discuss how you can strengthen your data center security without compromising application performance. Find an event near you to learn best practices for implementing advanced security services in a SDDC, to hear customer insights for deploying VMware NSX with micro-segmentation, and to get hands-on experience test-driving an integrated VMware-Palo Alto Networks solution.

 

 

We’re also on the road across North and South America with Citrix and CA for the next few weeks to talk about how enterprises can streamline virtualized data centers, radically simply network services for delivering critical applications and reduce complexity and cost, all without sacrificing performance and security. Join us at an event near you.

 

 

Here are upcoming events around the world that you should know about:

Datacenter Consolidation Seminar Series – Chicago, IL

  • When: November 11, 2014 11:00 AM – 1:00 PM CST
  • Where: Rosemont, IL

Datacenter Consolidation Seminar Series – Nashville, TN

  • When: November 11, 2014 2:30 PM – 5:00 PM CST
  • Where: Nashville, TN

You Can Have It All

  • When: November 11, 2014 11:30 AM – 1:30 PM CST
  • Where: New Orleans, LA

11月12日(水)製品導入・運用支援トレーニング [Japanese]

  • When: November 12, 2014 1:30 PM – 5:00 PM GMT+9:00
  • Where: 千代田区

Datacenter Consolidation Seminar Series – Salt Lake City, UT

  • When: November 12, 2014 11:00 AM – 1:00 PM MST
  • Where: Salt Lake City, UT

Datacenter Consolidation Seminar Series – Santiago, Chile

  • When: November 12, 2014 12:00 PM – 2:00 PM GMT-4:00
  • Where: Las Condes Región Metropolitana

Datacenter Consolidation Seminar Series – Toronto, ON

  • When: November 12, 2014 11:00 AM – 2:00 PM EST
  • Where: Toronto, ON

Palo Alto Networks: Live Demo

  • When: November 12, 2014 9:00 AM – 10:00 AM PST
  • Where: Online

Datacenter Consolidation Seminar Series – Buenos Aires, Argentina

  • When: November 13, 2014 12:00 PM – 3:00 PM GMT-3:00
  • Where: Buenos Aires

Datacenter Consolidation Seminar Series – Los Angeles, CA

  • When: November 13, 2014 11:00 AM – 2:00 PM PST
  • Where: Los Angeles, CA

Datacenter Consolidation Seminar Series – Montreal, QC

  • When: November 13, 2014 11:00 AM – 2:00 PM EST
  • Where: Montreal, QC

Er du forberedt til å håndtere ukjente trussler i ditt nettverk? [Norwegian]

  • When: November 13, 2014 1:00 PM – 1:30 PM CET
  • Where: Online

11月14日(金)製品実感トレーニング [Japanese]

  • When: November 14, 2014 1:30 PM – 5:00 PM GMT+9:00
  • Where: 千代田区

Lunch: Scott Stevens discusses a Zero Trust model for Security

  • When: November 17, 2014 12:30 PM – 2:00 PM GM
  • Where: Brisbane, QLD

Datacenter Consolidation Seminar Series – Washington, DC

  • When: November 18, 2104 11:00 AM – 2:00 PM EST
  • Where: Washington DC

Join Unit 42 and Uncover a New Source of Cyberthreats

  • When: November 18, 2014 8:30 AM – 10:30 AM EST
  • Where: Toronto, ON

Take the Ultimate Test Drive!

  • When: November 18, 2014 8:30 AM – 12:30 PM EST
  • Where: Bohemia, NY

Webinar Santé

  • When: November 18, 2014 10:30 AM – 11:30 AM EET
  • Where: Online

11月19日(水)製品実感トレーニング(大阪) [Japanese]

  • When: November 19, 2014 1:30 PM – 5:00 PM GMT
  • Where: 大阪市北区

Datacenter Consolidation Seminar Series – Lima, Peru

  • When: November 19, 2014 12:00 PM – 3:00 PM EST
  • Where: Lima, Peru

Join Unit 42 and Uncover a New Source of Cyberthreats

  • When: November 19, 2014 8:30 AM – 10:30 AM MST
  • Where: Calgary, AB

Online Demonstration og oplev vores Næste Generations Firewall’s

  • When: November 19, 2014 1:00 PM – 2:00 PM CET
  • Where: Online

Palo Alto Networks: Live Demo

  • When: November 19, 2014 9:00 AM – 10:00 AM PST
  • Where: Online

Palo Alto’s Next-Generation Security

  • When: November 19, 2014 10:00 AM – 3:00 PM EST
  • Where: Wayne PA

Ultimate Test Drive Workshop on NSX

  • When: November 19, 2014 9:00 AM – 12:30 PM
  • Where: Melbourne, VIC

Black Hat Webcast Series – Amazon Web Services Security Basics

  • When: November 20, 2014 11:00 AM – 12:00 PM PST
  • Where: Online

Er du forberedt til å håndtere ukjente trussler i ditt nettverk? [Norweigen]

  • When: November 20, 2014 1:00 PM – 1:30 PM MEZ
  • Where: Online

Join Unit 42 and Uncover a New Source of Cyberthreats

  • When: November 20, 2014 8:30 AM – 10:30 AM PST
  • Where: Vancouver, BC

11月21日(金)製品体感 [Japanese]

  • When: November 21, 2014 1:30 PM – 5:00 PM GMT
  • Where: 千代田区

[Palo Alto Networks Blog]

Kuluoz Trends – October 2014

The Asprox/Kuluoz malware family has a special place in our hearts at Palo Alto Networks. This botnet-related Trojan malware has evolved from its 2007 roots into a simple and yet robust mass e-mail phishing threat that is the origin of a significant percentage of Internet spam today. This post further explores trends for this malware family, based on October 2014 data from ourWildFire platform.

Some Background

The modern Kuluoz is known for the following:

  • High distribution volume through geolocation-associated spam e-mail templates
  • Use of e-mail attachments and Web links that masquerade as document or media files
  • Modular design, promoting extensibility
  • Distinct, default botnet node roles of spam generator for continued botnet propagation, downloader of additional malware and distributor of generalized commercial spam
  • Platform-specific malware delivery based on user agent detection

Themes for Kuluoz propagation spam have ranged across legal notices (e.g., court order),package delivery messages (e.g., FedEx, UPS, DHL), voicemail service notifications (e.g.,WhatsApp), general current events (e.g., 2014 polar vortex), and online deals (e.g., free pizza from Pizza Hut) – to name a few.

October 2014 Analysis

Figure 1 depicts October 2014 WildFire sessions (individual occurrences) that were flagged as Kuluoz, broken out by day.

Figure 1: WildFire-detected Kuluoz sessions, by day, for October 2014

An interesting pattern emerges for significant session count valleys spaced roughly seven days apart, which are followed by major peaks two to five days out. These valleys correspond with weekends, while the peaks occur mid-week. This makes sense in the context of the standard business workweek and the broad swath of enterprises included in Kuluoz targeting.

Figure 2 displays WildFire unique Kuluoz sample counts (based on SHA256 hash) for the same period.

Figure 2: Unique WildFire-detected Kuluoz samples, by day, for October 2014

This second figure matches the general valleys and peaks trend for total sessions detected by WildFire. Note that this figure does not represent new/never-seen-before sample detections, but instead represents all unique Kuluoz samples detected for a given day. Kuluoz employs low-effort but effective methods of altering binaries enough to evade detection by hash alone, which significantly increases unique sample counts when comparing standard binary hashes. Accordingly, the above figure demonstrates the cumulative effect and possible escalation in unique Kuluoz sample generation, a trend previously noted by FireEye in June.

Closer inspection of WildFire session delivery/receipt for Kuluoz reveals the expected leader: e-mail/webmail (Figure 3).

 

Figure 3: WildFire-detected Kuluoz delivery/receipt for October 2014

Most of the remaining sessions were delivered via the Web, which includes cloud and file sharing services. A relatively small number of Kuluoz sessions leveraged File Transfer Protocol (FTP). Finally, WildFire also received a number of Kuluoz samples through user submission.

Over 98% of WildFire-detected Kuluoz filenames for October 2014 employed one of the following six themes, ordered by prevalence:

  • Notice to Appear in Court
  • Delta Airline Ticketing
  • Purchase Order / Invoice / Shipping
  • Voicemail Message
  • Starbucks eGift
  • Pizza Hut Coupon

Conclusion

Kuluoz continues to thrive, employing various social engineering pressure tactics to successfully propagate and serve as a bridge for other malware families.

Thorough mitigation of this threat includes several layers:

  • User awareness: Awareness and training for users is a good idea to reduce the impact of any type of e-mail phishing. A number of Kuluoz variants require extra steps to be performed by a user (e.g., unzipping of a ZIP archive and then running a malicious binary). Encourage users to be wary of unexpected/unsolicited e-mails, especially those that employ any sort of pressure tactic and/or leverage the themes cited above.
  • Protocol monitoring and control: Visibility into the protocols used by Kuluoz for delivery and Command and Control (HTTP, SMTP, IMAP, FTP) with structured and clearly defined response actions (most of which can and should be automated) prevent or reduce associated impacts. Palo Alto Networks Next Generation Firewall solutions offer this level of granular application monitoring and control.
  • Automated analysis: Automation of static and dynamic analysis for unknown samples addresses the natural gap between the development of a variant for a threat and its coverage through signature-based technology. Anti-virus and other security control related signatures fall short. Solutions such as Palo Alto Networks WildFire platform allow for enterprises to identify new and emerging threats that remain unknown to other security controls in the environment.
  • Intelligence fusion: Leveraging actionable intelligence is a cornerstone of Computer Network Defense (CND) operations. Threats such as Kuluoz rely heavily on embedded initial Command and Control (C2) communications to fully realize the potential of its role(s) within the botnet. Up-to-date feeds on malicious domains, IPs, file signatures and hashes, as well as integration of intelligence gleaned from automated solutions in the environment, enable robust security solutions that empower network defenders.

[Palo Alto Networks Blog]

English
Exit mobile version