Are Threat Indicators Enough or Should We Be Looking at Threat DNA?

As the speed and volume of threats today shows no abatement, there is much discussion that the only way to keep pace is through automation and self-learning. Although the answer sounds simple, the tough part is figuring out how we achieve this.

Most attackers look at the broad dossier of attack techniques today and, like any playbook, take some of what has been done before and try to sprinkle in a hint of their personalization to make it unique.  In today’s world this is no longer about simply creating a bad binary object and emailing it around with a smart, socially engineered subject line.

Take, as an example, Cryptowall v3.0. Ransomware is a simple concept; but, to succeed at that, attackers have had to leverage multiple campaigns with over 4,000 iterations of the attack binary using multiple exploits, including exploit tools such as the Angler exploit kit, compromising large numbers of public WordPress sites and building a complex array of over 800 command and control sites, just to name some of the aspects of the overall attack.  Once compromised, payments could hop through up to 80 bitcoin wallets before reaching their final destination. Why is all of this so important? The more we can map out attackers, the better we can find and block future iterations of their attacks.

In the physical world, criminals typically look just like every other person; and, today, with over 7 billion people on the planet, finding them can seem like an impossible task. Over the years, law enforcement experts have built techniques to uniquely identify criminal, such as photofits and, now, DNA. Such techniques not only uniquely identify criminals but also help link them to the crimes they have committed.

The same concepts apply in cyber, but today under a less mature guise. We rely on tools to identify unique characteristics much like looking for eye or hair color. The challenge being, when you look at any such characteristics in isolation, such as looking for a bad email characteristics or a certain hair color, the level of false alerts can be unreal. The once unique binary is like a face with makeup, so many different permutations are quickly achieved. As such we need to look at all the attributes and try to see the whole face of the attack – better still, the DNA of the attack. If we can do this, we can start to see existing attacks more accurately, allowing us to automate. The more we can automate the quicker we can detect. And, if we can gather the whole DNA, we can start to identify new attacks as they happen by their genetic links.

Source: Wikipedia

Going back to CryptoWall, when v4 came out, it had some enhancements. Of course the email messages delivering it changed, as did the binary, requiring many traditional approaches to need an update. However, most of the underlying infrastructure stayed the same. In the sci-fi film Jurassic Park, they filled in the DNA gaps to rebuild dinosaurs. Here we have the ability to make fiction into fact by mapping out the whole attack lifecycle (the DNA of the attack), which includes all of the indicators aligned to it (rather than just the indicators we see as compromising the victim), we can better detect and block not just the current attack but all future instances, forcing the attack to effectively create a whole new dinosaur. Effectively, we use the broader attack architecture DNA to fill in the gaps created by the dynamic components, such as the changing binary and delivery wrapping.

Why don’t we all do this today? DNA analysis happens in one lab; most security solutions simply look for an element of the attack. Much like the criminal photofit, they look at maybe the eyes or the nose or the hair — perhaps all three. But they typically don’t see the whole face, and they certainly don’t gather the entire DNA. It’s like having a bunch of labs looking at different atoms trying to join together the strands, which was not historically their goal. Their goal was to block the attack, not understand what makes the attack function in the broader sense.

To identify the DNA, we need to be able to join the right elements together. This means analyzing and correlating these characteristics; looking at the known and mapping against the unknown, we need to pull this into a single point of analysis so we can see the big picture. To achieve this at a vendor level, you need solutions that were nativity designed to talk the same language; otherwise they are not comparing like for like.

No vendor spans all the security requirements today. This is why protocols such as STIX, TAXII and Cybox have been developed to allow multiple vendors to collaborate in a virtual common lab, such as the Cyber Threat Alliance, acting as the interpreter to automatically exchange big data through a common translation structure to support better mapping of the attack DNA. Through this approach, the Cyber Threat Alliance worked collaboratively to uncover CryptoWall 3.

There are many ways of trying to keep pace with today’s threats; each has its own advantages and disadvantages. The challenge, however, is that most are still looking to improve the identification of a characteristic. To better spot the criminal among the billions of faces, we need to leverage every aspect we can to make them stand out as unique and at the same time identify commonality. What’s more important is that, with big data tools and common frames of reference, we can then look for these attributes to find their future faces. At the end of the day, you can easily change individual aspects of your appearance, but it’s extremely hard to change your DNA.

[Palo Alto Networks Blog]

Social Engineering: Placing Obstacles in the Path of Least Resistance

Organizations battle daily with social engineering-based cyberattacks and unfortunately often find themselves on the losing side. What can be done? To determine this, we need to step back from our technological tools and start with the psychological basis of why social engineering works and why it is a tactic of choice for cyber attackers. Armed with that knowledge, organizations can begin to mount a more effective defense.

When people think of social engineering they tend to think of phishing, which is a huge problem. According to the 2015 Verizon Data Breach Incident Report (DBIR), 23 percent of phishing recipients open messages, and 11 percent click on attachments. The 2013 DBIR reported 95 percent of incidents attributed to state-sponsored actors used phishing, and more than two-thirds of cyber-espionage incidents involved phishing.

A cybercrime campaign of only 10 emails yields a greater than 90 percent chance that one person will click on a malware link. Fifty percent of users open emails and click within the first hour of receiving.

Going Beyond Phishing
But the social engineering problem goes well beyond phishing.

It is no wonder hackers use social engineering techniques; they work. Hackers are in business and are looking for a return on investment. Whether it is stolen identities, bank account numbers, intellectual property or just notoriety, they are looking for a return for their time.

Think of it this way: If you had a choice to spend hundreds of hours scanning networks, identifying operating systems and applications in use, determining vulnerabilities, and crafting malware, or making one phone call pretending to be from the help desk and talking a user out of his/her password, which would you do? Social engineering provides a greater return on investment.

Social engineering is not an invention of the information or even the industrial age; it has been around throughout history—look at the original Trojan horse. There is a psychological basis for why social engineering works. All of the following can be turned against a target to gain a goal:

  • Trust
  • Sense of urgency
  • Desire to be helpful
  • Curiosity

There are many tools available to cybercriminals to conduct social engineering and gain valuable information from individuals, including Google and other search engines, dumpster dives, simple phone calls to just ask, burner phones (prepaid cell phones replaced frequently to avoid leaving a trail), caller ID spoofing, doppelganger domains, fake public Wi-Fi access points, and, yes, phishing email.

Fighting Back Against Social Engineering
So how do you block this path of least resistance and prevent attacks, detect attacks sooner and lessen impact? First, it is critical to know what information hackers are looking for in social engineering attacks and how to protect it. Having some technical security controls in place is critical, as well. And, finally, awareness training—making your people social engineering attempt detectors—will go a long way in addressing the weakest link in these sorts of attacks—humans.

Douglas Rausch is President of Aurora Cybersecurity Consultants, and an assistant professor of cybersecurity at Bellevue University, Bellevue, NE. His expertise centers on providing risk management, cybersecurity, governance and awareness training expertise to organizations worldwide. He brings 25 years of experience as a cyber operations officer in the US Air Force, leading risk management activities, assessing cybersecurity, and recommending cybersecurity policy and technologies for Department of Defense and Air Force terrestrial and space systems. He was recently appointed to the National Initiative for Cybersecurity Education (NICE), Training and Certification Sub-Working group.

Rausch will present a webinar, Social Engineering: Placing Obstacles on the Path of Least Resistance, on Tuesday, 23 February, at 11AM Central Standard Time. To sign up, click here.

Douglas Rausch, CISSP
President
Aurora CyberSecurity Consultants, Inc.

[ISACA Now Blog]

 

Locky: New Ransomware Mimics Dridex-Style Distribution

Ransomware persists as one of the top crimeware threats thus far into 2016. While the use of document-based macros for ransomware distribution remains relatively uncommon, a new family calling itself “Locky” has borrowed the technique from the eminently successful Dridex to maximize its target base. We first learned of Locky through Invincea and expanded on qualifying this threat with the help of PhishMe. Locky has also gained enough traction to find its way onto Dynamoo’s Blog and Reddit.

Using Palo Alto Networks AutoFocus, Unit 42 observed over 400,000 individual sessions containing the Bartallex macro downloader, which in turned dropped Locky ransomware onto victim machines. Researchers suspect there is a link between the Dridex botnet affiliate 220 and Locky due to similar styles of distribution, overlapping filenames, and an absence of campaigns from this particularly aggressive affiliate coinciding with the initial emergence of Locky. This blog post explores this threat further and offers recommendations on mitigating its impact.

Delivery and Installation

Palo Alto Networks telemetry showed that Locky focuses primarily on e-mail delivery through massive phishing campaigns with Microsoft Word document attachments. The subjects for these malicious messages adhere to the following convention:

ATTN: Invoice_J-< 8-digits>

The naming convention of respective malicious Word document carrier files match the e-mail subject line portion after the “ATTN: “, switch the “i” in invoice to lowercase, and append a “.doc” extension. An example follows:

Subject: ATTN: Invoice J-11256978
Attachment: invoice_J-11256978.doc

Our analysis revealed that this ransomware requires command and control (C2) communication for a key exchange, prior to encrypting victim files. It performs its key exchange in memory for this process. This is interesting, as most ransomware generates a random encryption key locally on the victim host and then transmits an encrypted copy to attacker infrastructure. This also presents an actionable strategy for mitigating this generation of Locky by disrupting associated C2.

Unfortunate victims unable to mitigate this threat would see the following ransom demand.

And a subsequent visit to the referenced Locky payment portal site would reveal the following options for victims.

Threat Volume and Targeting

We observed approximately 446,000 sessions for this threat, over half of which targeted the United States (54%). For comparison, the next most impacted countries, Canada and Australia, only accounted for another nine percent combined.

Industry analysis for targeting reveals expected indiscriminant distribution within impacted countries; however, Higher Education, Wholesale and Retail, and Manufacturing make up over a third of observed targeting.

Pairing this volume with the “decryption cost” advertised for Locky victims, it is clear why ransomware in general continues to thrive in the threat landscape. Using some napkin math furnished by our friends at PhishMe, even if one assumed a 50% efficacy / infection rate for these 446,000 sessions and a 1% payment rate of 0.5 bitcoins (BTC) from victims, the currently observed activity alone yields several hundred thousands of dollars in profits for Locky’s malicious actors.

Conclusion

Locky is aiming high in an effort to join the ranks of other big name ransomware families. Despite some weaknesses in its current implementation, we can expect to see further developments for this threat in the future. Ultimately, successes experienced by one attacker group embolden and inspire others. It goes without saying that cybercrime adversaries will continue to advance efforts to commoditize the already lucrative extortion of victims through encryption-based extortion.

Defending against ransomware first requires a focus on the basics of a strong security posture: security awareness and the hardening and patching of systems. Ransomware can be especially damaging in enterprises, where this class of threat commonly targets network shares and other media attached to corporate assets. To further reduce associated risks, layered preventive controls are a must.

Palo Alto Networks customers are protected through our next-generation security platform:

  • WildFire successfully detects this threat as malware
  • AutoFocus identifies this threat under the Unit 42 “Locky” tag
  • The C2 domains and files mentioned in this report are blocked in our Threat Prevention product

Indicators of Compromise (IOCs)

Type Indicator
E-mail Subject ATTN: Invoice_J-<8-digits>
Attachment Filename invoice_J-<8-digits>.doc
C2 109.234.38.35
C2 173.214.183.81
C2 193.124.181.169
C2 195.154.241.208
C2 195.64.154.14
C2 46.4.239.76
C2 66.133.129.5
C2 86.104.134.144
C2 91.195.12.185
C2 iynus.net
C2 http://www.iglobali.com
C2 http://www.jesusdenazaret.com.ve
C2 http://www.southlife.church
C2 http://www.villaggio.airwave.at
SHA256 ee6abe4a9530b78e997d9c28394356216778eaf2d46aa3503999e7d6bfbefe90
SHA256 5466fb6309bfe0bbbb109af3ccfa0c67305c3464b0fdffcec6eda7fcb774757e
SHA256 add7794c4d70fd49c96c11dc924c6b65c4459d6295331414b40768867dab0350
SHA256 e7277e4aa4905168f6890c6b7b80515030806db46b7ec41a8afa33d6dda231dc
SHA256 6e2a597d8c6b4ebc6474c4a96bce61340a1a66b7e8e33cdf42f3e34cef1a94fe
SHA256 76bcba80045b043e8e69f7a2a92bc8879e7b13e29d50f10b41c11bd114a288ae
SHA256 e37cb6cb2d39e3ceeb946e4a55890cd278a0ba3d541c0d18a22a0bf84c1dcadb
SHA256 18f7150992020e369dbc2aa32fdec2e3003d782716a79be654b9e4eecff0113a
SHA256 c9bfb22f9655e53dacbce66c4bfba1e5b42250f0b41973c1e4433f285ed73d79
SHA256 41a7bfe77c89b3c151f0e847e44e8f58d63ed82a8ad370bc679c29d89a20a657
SHA256 1833ea2138d21962d6f47def5d01cbec299eb6deb89fe729fd5b80c0f603a766
SHA256 03da53e5fe550a1914179d5102479771651d4fa8797f46df3e4f66a05fa64bd6
SHA256 338f15ac0d07db13e1f291c53aa004f46d994ee5bacd2787c0d536284b465f9e
SHA256 1d8cc4e8416b5ac16864583e8bb0d8f8d8ad4b32de7de111067c38da0cfc57b1
SHA256 abdbc74907d7670a65b5a4cc8c08da751cc837a11d1abb43e3ddaa932bdbf60c
SHA256 8877b9a036b76495d9f4add16d56c8819d12a92cd32ae0e4c06be4faa719a991
SHA256 4ae1f9229bfb5385949a4dfe0ac89a49d785646389be556f90ad5d29e5ecc35f
SHA256 b10733a1aa02d973d00bd780c7f1a7d1e71fd50155f2cfecfb2a8f1662aa1cd5
SHA256 8a248e85579cde3e0e8e20f254ec2c15ce063f580084be2dca1f8e725ae7f148
SHA256 11206eb0cfa0df32ef0b4d2cd2a704be11cbd6e6bc6a2d83eaf0ddf977d76ac5
SHA256 521d2885aec43104e3903988f23e42a2543682556afc51bff44bb939c74eb421
SHA256 3d84dd3f392eadaf3916c3f71cf98606c25f48feaad60b74af7196171aade0a7
SHA256 17c3d74e3c0645edb4b5145335b342d2929c92dff856cca1a5e79fa5d935fec2
SHA256 329197ec2fffb6365adee8b7302912c8ef0f7550f63c92887d2cfae432a15df4
SHA256 f81d543f5144fe8dc1d0bb84625ed298867d9b34f805c7d26ce26f37d325467a
SHA256 5843c22f9e27cd8a217114b21ccc706dafe40f626dc9fcef0000a7f79b2aad66
SHA256 d0df113d589fe481bc045bda948ace1f2b9c43b4bd0652f00b0fbb096a2fb39c
SHA256 a6189f9796f1c782b95eb6e0bc030e8d1de924efdafff8e329876b09b2b5173f
SHA256 f3712d591fbf403d23eed006d5c5bb5b94e13360920a04095968d1a914bc3ff8
SHA256 348c92b47a27fbf427d1093f09ef662dbd11846ca1f3e8cf9ba2dda8008f9c4f
SHA256 1083fd1d0a02d36582b78fdba4478e75401f7ec37359f6d8142426f8f3523328
SHA256 2e1305b440274e1f4340a10180709b83f5aad182963d6f6594613e71b309d7d5
SHA256 e6079af75b4a06f6ce95cb95d3de3b8af89afbf7722a64a6f7b04f3c643024b2
SHA256 dca90037836376ce5634f277ee21e779462b6faaff83ade1ba36f75fc0bc255b
SHA256 5fc15b920f00f427350987ae192b9baf2eb0fecfc662985fb612e8ebc60f9b30
SHA256 0c38c96617436fadf66852e48365def3e00b297c7f160617768bebd09f15658d
SHA256 13bd70822009e07f1d0549e96b8a4aec0ade07bea2c28d42d782bacc11259cf5
SHA256 9b5653a986529c2eebc429387f3dea52ea167ccb259b6f57491d14ea4b86627e
SHA256 55645af2a4c54c6c1141b7261ca598d2e250a5a1b51731920cf7c09264c4c160
SHA256 1c5c1c287cd6151da44571b8cfae526b0b6e6d09faaa6723fdd040cb595b9fd0
SHA256 89b732003c08f0f1c2f8a0412b1c2f0efc216ae0204103326571e1831e28b09e
SHA256 711147bfafee1b3f71b0c8e9d00bb139401c207ca5518e2c02a6b0a7367cc9c2
SHA256 53e91bbc1de973265ef3366201a70bce385951f805d2d9ebc9ab5f2d7627b7d3
SHA256 f56655bfbd1be9eab245dc283b7c71991881a845f3caf8fb930f7baabae51059
SHA256 555fb717902e671c26848ee80788769a1c88ac00c9f8440250f9936632597bc8
SHA256 a5b2d0f5367bebd70137e0ebf3286d80434789e95aca488ffd8391905dd98fd9
SHA256 da21dbe14f408ddb3de2e57fb77fd94e8615cb6cce5b7c541b8fe4e309b7fb6c
SHA256 fd5c0d976292b233328ea085f101bbef9c6cae2007d275a5e6e07149d86c7968
SHA256 7c3651cb149cb5f9a4db6b64e412fcd23977f5c083bdfd3ee8c7bbf929e20b4d
SHA256 7b39dfb32220e3f653ce8ec124a3f1541230c158533ea4b799e766bb1f77b96f
SHA256 e77aec1984755d69692487acbf1ce4743726714ffe9168610a49e05723e891cd
SHA256 0661bd8cefcc41bba4322077b6ab96d49054074c6aa2a917acf87ff815d53e49
SHA256 5bae6d580e1e16d29233f7164ce6aadfabcbd562b9137e92997e4ad3854926fd
SHA256 ec9ac36b8ef41ecda870ed41297592a34e3250db821c8d518701c0e486c9379f
SHA256 1c8ebb27ad656d720c854a476d6f0e1de4288e9f2a4c60ae35bb7020dedf5239
SHA256 db3bc157f8f6bda96c63d2ba40c74e7bfd4d451d87eaa8ed02ce9ee692098d15
SHA256 9cc592720e4d859f7cd2995587e1f724133ff3008164261ea7fb7e3269ac597a
SHA256 c866dcfa95c50443ed5e0b4d2c0b63c1443ad330cb7d384370a244c6f58ce8a5
SHA256 2dbfd8f5e20168a52dadf694fc9e63c8f09356dae60fd79e00897dc094a48cb6
SHA256 78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a
SHA256 708bae89b1866c85243f02b011d4d1e9585305845bf7a4df4430927cd5af8c27
SHA256 7c9c451a3a3bded9aad02297f611e425b3649e629e4c5e24a7ccb7928babb006
SHA256 069464563ca340ef167b29b55797bbb63792c00700a867437fdd9f640e99aa09
SHA256 cba9de885f30b627d9c30079a22956e61cd1b03d10ec972ef9c90f8d23cff8aa
SHA256 1f126aabbf32507f4385fe335b46fbb46234b2c25909ed6884ed664a5c93d0f9
SHA256 1bad53ce984f652bc03ecb96fad5746357968c2fdccdea82995231f1099773e4
SHA256 62a19c7a08db69a45ecf009955e6d8aa441079dea06770af1a953b681a0d81a2
SHA256 1450fa0c4f5973ebf3efa06fb03259105065baba29690362014926583bc85f48
SHA256 d6772478ab901d81514b0d04852380932ee214b364dff246c3f91963d9ec6927
SHA256 ec9bfe9c9d44437c04209269fcd26815dc99416722bb4f4a4a2049bc41c63cc6
SHA256 acf01ba44f916a8f82f76c0b91021fd79d4968e3aa312fb77904a9757058b5ac
SHA256 d69b7f196fa8a2298e261333d4794ac34a8a4503c26750c3d5a012b2b7b327f5
SHA256 134ef8198282652fb98e4174deda4d105db53c54d50039a2c0f6eb283eed8a1b
SHA256 50c2b1f4b32fcd43fa9871f51f72d2b227eab1a3e5d04159d326a22e56305dc8
SHA256 e5aecadf8f132b64384bba0f1ffbf317637eed11398a0d6ef789b1dc10db4cb1
SHA256 87068696c0291fe976f62afb23ff2720d53dfd638a6953c0d0867d9ad4ea451a
SHA256 c7ab7c65e65cdc13bbb991403c1338c556500472114ba79bb31356eecabd0089
SHA256 eaa4d072b1eb53b2dae7d5396e67c03e523fe05f76f793c991119463b1f8522c
SHA256 3eb1e97e1bd96b919170c0439307a326aa28acc84b1f644e81e17d24794b9b57
SHA256 2059727c6447781b2dc2e4c51c126bc0b7f05b9c23b3edf365332d90c078b7f6
SHA256 d9de8ff8c82baeeab0e1e355f9f5025547ba40cb8d95e9cad9dc25ffdb690057
SHA256 915be79a2330c1fcb9e0cf392913986dbe9bf7a404cdf88a65ae148586b162d5
SHA256 5549b000fd38a2634adbe956d46f7bb649eda8efd768ef8919a703378885186b
SHA256 bc98c8b22461a2c2631b2feec399208fdc4ecd1cd2229066c2f385caa958daa3
SHA256 83279bbeb581892ccee9cfa7d37b73674d55380d55d78123781b3c38a2d8ffe0
SHA256 f519f99c9b49cf730cb092d83350002fb0d90fd705c86ed306c36f38fd6af10a
SHA256 50a2235f356d59269b98f1d6420afa257651b33e9d9af5af56ab777c331dc6dd
SHA256 d7d23b516041299868eb67a814e22064a05f06283a673a186e24d184521fa33e
SHA256 8545aa956982bf6f5763058cbde3f8c92e1dcbfb699a7248969ef12bb59a615c
SHA256 3d08eb860a2a13e7fc36f7750a4a87cf11b994a19343234b8e0621fa951e5a38
SHA256 488947790c6aba7dff05c5f1c9ce1d24b3f9e5a0677f1695bbd6ae2bd9d48236
SHA256 d2369ae9977cbb23cfe1c63f6deb0d7fabe9ee38980831c8a636f91342f716c1
SHA256 b16ed0060bd5359fc695b965ce4c459bbe73e083094aff720837739487fd2900
SHA256 3c305696f35fe10eb27a97bb76bc737654727b33e81333c8fe73aeded98b6ca8
SHA256 cf836b6a36bffc5a4545a27cc66bc9ddfd49483500aa1f055671e40f06e34221
SHA256 66bf8957d55e0aacc3c2472ebd8966dc3370503e59d57f27ddbc1a83bcf5102a
SHA256 2114322ecc57f0fab5dd1e5b348a066fcfd7baf8ced89fcdb23df172e30a4189
SHA256 971b389bd82806942c44b48bdd0a4ac560377b7fcb5c872264796705b769414a
SHA256 8426bdde88e8e59c56ab4ff6b32dfd1080dfc0fc86980a853802e9aea1773c47
SHA256 fa3f2cf4b2f1a0393383294dae8ba20709b1ce0985b6fe8e51ccd90cb609ca6e
SHA256 20c37d343ba95aed4180d75825a06828783e924f81a1237c4a68252e0ce97f2d
SHA256 46cf36241696d4127b5d32cbde63a672d9a037d9d47bd59ae8346d83424b53c9
SHA256 892fe60e489e229eb46627241b6078a5b213a4d1840bd39cc939f90cf903a560
SHA256 4d203ae53a96b8207c81ecc0167bb06db3e67bb365639972b9ef22dafbbc189a
SHA256 a32f9eff7fca4f8b98b553b90915b28d4e11e523d36bb64b41f1793c2ed7cf94
SHA256 7f540e391b55221f7696031471b6f8d2068677a67ed8782d52a67872096d23a2
SHA256 408f10baec56c62cc4692d1ba98aa77e7847a7b6f1d3cf812dd2f51c93d580a3
SHA256 2410b7f81082b216c5edd99b4b0a22e7709b0e05b0f6961d4f93ee1a05590237
SHA256 566878276748089f6e87b20fd18bfab4018d9e33fae6e28cb87ffb43b1b80582
SHA256 0a6f1b58819fe0d5f0595be96847f9cb9722777501771d3066d1e7fd39fa3d48
SHA256 d9d3acec0620a1395dda087318de075573fa3b4352641aedc01a16a921c11b5d
SHA256 6e10b784d653ceca19a234411df7a570cb0923bef9a3fe1d91da1e8eb10306d3
SHA256 8988323e0c8b26a3cb0166104001c8d5fd818bef72b506bd03403a2c7c552e8d
SHA256 e7d7b7c8b9cba4dcfee5648f25ad0380c86398cd0b6cba59c3ee8256425d19e6
SHA256 057c1fc879ff7fed218ef3142a0f8761b2651a4c060dc7d853e5621cddc0e6f9
SHA256 ca7ea4325e6e55c504d29f0b080a5755aef771772d8c51f5016e4ce6ed88ccd0
SHA256 77ea0b407dece7f22b0b4732ec06fb0e887262d847a49b9f8cd8611a5c865af4
SHA256 5ad06eda999a9f2f28c2057ba40bd2f7b6a7cb2e1915104b2724753649e97de5
SHA256 584a2767e5881c7f91a04ca2cd78e62e9d52841eea5e0ca7fcd197553666a827
SHA256 a756d84edecae5f17726ba1e59cbc3a622f84159e293a875c24bacf1038f69f1
SHA256 6d76567220652b0d03b34feafaef8b32a472bfd9d617b6eff4db5254c959bf6e
SHA256 1227d8b7e375dfaf0ff76053e3ab158c0635cb288dc1a2f083536f5fe1820ddd
SHA256 8d6be9b4df6679cc5db1750500e3e1645f885878223936670e9ce0442cd0e999
SHA256 82761eb506711dd35af4fe7b71a4e926e1bd70d4dacadd1bb3e68bcd3ef480f3
SHA256 9524daf160f35c3217df680f5676c8f177bc9a3de5b6a128d52bc46d97df96c0
SHA256 c9303f7405c88da80d94df5b11c514ce791becab02e06dfbf4796f361fb93108
SHA256 815530458a2e17fd67774a6802c49423088ddde0ae23e179cc4a608e088c276a
SHA256 66314449bc3bd2772ff062c05ba21f1aa408ce4f7ff73ad37f0f7a2388ab819e
SHA256 4b08d86ca080234c2432613e6730d06dd8c703b35ea7effc999a0e3c3b11ec48
SHA256 88718a0ff51b2e7d9e17d8796cfed1f52d78653c42e3c5dd597833ee0036d803
SHA256 feba92e398ba6da41cccffb0e6b5aacdee27fcfa4f6c3a469330be309eaad627
SHA256 73c41e29e75e998a186e6fc74b81fbc537f3b232a5d07b5621e8fd3485506b87
SHA256 06cc1531e8f912ca9e5f1e37f442d2145df6b8cdadf3d1d7abfc9dfae6bb98ab
SHA256 6d74cb6e7e93277cef4a8d62fad53d806be140aaddb89b44d9b7eb8307c5b7f5
SHA256 04e561cf760209b3bef678117366dd184f4474e4ba15ec9b95cddea4e01ade95
SHA256 6314ba359b26e05fba095ac58e3f9451243081cbc331bf60522ad69439b438c4
SHA256 2f45d682260ca936e1c577c845576eef009a7017882ed57b6a8b76f9f6b83ad6
SHA256 cc1afcf52046e08ba1314e74a852eec27211395c77f5b911de52245fae93ab3d
SHA256 97b13680d6c6e5d8fff655fe99700486cbdd097cfa9250a066d247609f85b9b9
SHA256 281d72fe63fae2e3b1b74c3953b3b4c429948d1f56c7897104754393dc0ab38f
SHA256 e2790ea81b297f0b10871b9a16d0adbb670c7ea5900d64bc1d2f65a296d87ade
SHA256 a9e663aa23a75f8574b5e10b4bea1deed22b49ed6dc451e4bb45f217811978a0
SHA256 caac78ebfdb6102c05b82a00cf1acda1797cf4dc1bcc66336286289c8a309b47
SHA256 bb85dedadd0b96084eb6c45b4a7650e33aa149f286d1272f17c56228278fe5b8
SHA256 abffa851076dd0f2d408e66d047a2d50415513a17239b2d2ece33891c9c0ad23
SHA256 9cfd1878606c41624b2e41a96eefcab6ca673d07f8e8f98ce6e86c4c8a806f5e
SHA256 3cc5d88b8a69dec6a606aa01c29789811442b2572dcc51e25aa7711e657b51f3
SHA256 e6ec5b942625bc910b3dc1c8f28940d5e5ba4f5fb89c7c189c61c3b46945f1f1
SHA256 b37f2e7dd94e441a129629d1d352b82bb4a0e9b98a1c9a188f95e6c148e6b407
SHA256 78b7b0eddc1d05cafd0202729f488daa027cac375dcd688c10fae34f65e0224e
SHA256 9b4f6d76d125524f7ac11ddc3251152ca45c79d44a4359e831ebe0ec3142b609
SHA256 5e945c1d27c9ad77a2b63ae10af46aee7d29a6a43605a9bfbf35cebbcff184d8
SHA256 2d79bf996a3f5a10f5b42c6449df14a00395390f5028dca18aa768651ed7bf62
SHA256 e8cbcdac6f39abf67c9c297203312d39f83a150277e0672a83657d38e6ef5446
SHA256 e25d15f721362c6e6110ce21c3ced554a2c8510a6c5627457688fdb397608656
SHA256 c8a7a0a8d702ce8087617a12572c00eefb92508ea6f1cfd95fe14c26107cef67
SHA256 3f8437665c6c7638e5f86d034ac2ce3367ab97533c45476e6beee8863c365ff6
SHA256 1a35563989c5528348713b0246374bb3c8d316561dc6b9bf17f2b20c88fbd178
SHA256 69afcd4b38bf84069c4f520e65ef7df31411d69819d88716cbb5e17178e5b5b0
SHA256 aef677a0a83d1ab1036fde6926e848674d7d53bf5dc3bd984c6c6d51337c4b61
SHA256 76499405dd3cea63f170813d88ab32b2716e5682b8083a94966d494b706eadc7
SHA256 acee75cd346795ceb02fc30aa822d13c4132e64fd36b5244dd822199a5a0c0a7
SHA256 4f2ae18fe003ec4dfd47255f24141b42af1b423c94a1abcbe8af337f251c8789
SHA256 3540b0720b610f93713df454af8ad1e7bd0e0eb3099d115a8cc5a9b7a85d3c50
SHA256 e95cde1e6fa2ce300bf778f3e9f17dfc6a3e499cb0081070ef5d3d15507f367b
SHA256 8c6e41a5e33749c31516b1931e129bbdaeff7f3434c4259c8842b0b9f047b6b7
SHA256 47b27cb727b1ada6c65c7bf30b57537b26080f1f5a6730be91b767427945d731
SHA256 658e17adf469ec61f1cc62a0c3932185e94f9557597dcf4714575706efd71141

, and

[Palo Alto Networks Blog]

Traps: Preventing Successful Attacks on Legacy ATM Endpoints

Microsoft discontinued support of the venerable Windows XP operating system (OS) in April 2014. This OS had been a workhorse for over 12 years with a foothold on consumers, enterprises, and embedded systems such as automated teller machines (ATMs).

A year later, it was estimated that 75 percent of the world’s ATMs (2.2 million) were still running on Windows XP. Given the quantity of devices and the geographically dispersed nature of the ATMs, it is reasonable to assume that many of these devices have yet to be upgraded from Windows XP as any upgrade project is logistically daunting. And since Microsoft no longer provides software patches for any security holes, these devices are now more susceptible to malware and viruses. Some financial institutions made custom, extended support arrangements with Microsoft for a short timeframe to provide some protection as upgrade plans were put into motion.

Another factor that many banks and credit unions had to consider was the impending Mastercard deadline for Europay Mastercard Visa (EMV) chip-enabled ATMs. Beginning October 2016, liability for fraud will shift to the ATM owner. Consequently, some institutions opted to accommodate both the Windows XP and EMV chip reader upgrades as part of an overall, strategic plan to refresh their ATM technology.   Based on the age of the installed base, this may require both new hardware and software. ATM industry experts have estimated the cost of this upgrade to range from $1,000 to $3,500 per ATM.

For Windows XP-based ATMs that continue to face delays in upgrades, one option would be to add advanced endpoint protection such as Palo Alto Networks Traps. Windows devices are then protected from malware and exploits — without the use of signatures. Traps can disrupt the relatively small number of techniques that malicious entities must use to compromise Windows systems and the remaining Windows XP-based ATMs can be protected even in the absence of future software patches. By implementing Traps, we can help restore confidence in these aging, but still highly visible customer touch points.

In the more general case for financial institutions, Traps can also be used to protect any Windows-based servers, desktops (both physical and virtual), and laptops from malware and exploits. This extends the benefit across the entire inventory of Windows devices from customer-facing ATMs to corporate personal computers and servers.

To learn more about how Traps can protect your endpoints, please visit:

 

[Palo Alto Networks Blog]

Four Imperatives for Cybersecurity Success in the Digital Age: Part 1

Having joined Palo Alto Networks following a 35-year career in the U.S. military, the past decade of which I served in a variety of leadership positions in cyber operations, strategy and policy, I have found that many of the cybersecurity challenges we face from a national security perspective are the same in the broader international business world.

This blog post series describes what I consider to be four major imperatives for cybersecurity success in the digital age, regardless of whether your organization is a part of the public or private sector.

To provide a sense of what I intend to cover in this series, here are the major themes for each imperative:

  • Imperative #1 – We Must Flip the Scales
  • Imperative #2 – We Must Broaden Our Focus to Sharpen Our Actions
  • Imperative #3 – We Must Change Our Approach
  • Imperative #4 – We Must Work Together

BLOG #1 of 4: Imperative #1

WE MUST “FLIP THE SCALES”

This first blog in the series is about Imperative #1 for cybersecurity success in the digital age.

Before I get to the details of the first imperative, allow me to provide some background and context for all four imperatives, and then I’ll provide an executive summary of the first imperative in case you are pressed for time.

BACKGROUND AND CONTEXT

First, my role as the Federal CSO for Palo Alto Networks requires that I “evangelize” to the various groups of individuals, leaders and organizations with which I interact. My job is to use my past experience to ensure a deeper understanding of the cyberthreat landscape and provide thought leadership about effective concepts to deal with a growing threat while ensuring that leaders can manage risk in ways that enable their business or mission, not detract from or restrict those vital functions.

Second, because of my military experience, I think of effective concepts in terms of several key factors. I use these factors to explain concepts in a comprehensive way, and so I’ll use these factors to describe each of the imperatives for cybersecurity success in the digital age. Figure 1 below provides the four factors that I use; and, below that, I provide some brief definitions:

Figure 1

  • Threat: This factor describes how the cyberthreat is evolving and how we are responding to those changes.
  • Policy and Strategy: Given our assessment of the overall environment, this factor describes what we should be doing and our strategy to align means (resources and capabilities – or the what) and ways (methods, priorities and operations – or the how) to achieve ends (goals and objectives – or the why).
  • Structure: This factor includes both organizational (human dimension) and architectural (technical dimension)
  • Tactics, Techniques and Procedures (TTP): This factor represents the tactical aspects of how we actually implement change where the rubber meets the road.

My last point of background and context is about the digital age, itself. So, what does the digital age environment look like? Two important trends come to my mind.

First, our growing reliance as a society on technology for just about everything we do is only going to increase. This isn’t news to anyone; and, regardless of whether you are talking about pubic or private organizations, or our personal lives, there is no escaping the level of trust that we continue to place in technology. Equally increasing is the level of connectivity not only between us as a human race but in the devices that we use to do almost everything in our daily lives. The phenomenon of the Internet of Things represents this trend.

The second trend isn’t news to anyone either, so I won’t waste your time going into the details. Just look at the growing list of headlines about cyber breaches across government and industry worldwide. Figure 2 below depicts the most recent list of cyber breaches – it’s a mess! And I believe it’s going to get worse before it gets better. You’ve all heard the tired (but, nonetheless, true) saying, “It’s not a matter of if, but when.” The trend is alarming; and, no matter whether you sit in the public or private sector, you have to understand that the cyberthreat is a serious problem, representing an imperative for change if we are going to be able to continue to place trust in all the opportunity that the digital age promises.

Figure 2
(From “Information is Beautiful” website)

IMPERATIVE #1 – WE MUST “FLIP THE SCALES”

Using Figure 3 below as a reference, we must “flip the scales,” or at least rebalance them, to improve the cybersecurity posture that we choose to live with today. Let me explain what I mean, using the concept model I described above, and step through the implications via the categories of Threat, Policy and Strategy, Organizational and Architectural Structure, and finally Tactics, Techniques and Procedures (or TTP).

 

Figure 3

EXECUTIVE SUMMARY

We have a math problem that is giving today’s cyberthreats a significant advantage over our ability to secure and defend our networks. This problem pits a growing adversary marketplace – that leverages information sharing, automation and the cloud at increasing speed and decreasing costs – against the cybersecurity community, which is slow, clumsy, largely manual and increasingly expensive.

Part of the reason we have this math problem is due to legacy thinking and resulting policies that heavily favor opportunity and convenience over security and risk management rather than a more balanced approach toward both. Flipping the policy scale from a “trust everything” to aZero Trust model (“never trust, always verify”) will help to flip the scales on the attacker/defender math problem.

To change the policy balance and drive a real strategy that aligns limited resources and methods to achieve results also requires that leaders enter the decision-making forum when it comes to cybersecurity. A successful organization enables wise leadership to make decisions through collaboration between their IT and cybersecurity experts, working work in tandem to provide precise, accurate and clear recommendations. This is how the leadership of an organization can drive successful policy and strategy. It is also how the leadership and tech teams can work toward common goals and routinely demonstrate progress with real, measureable results.

Finally, cybersecurity success in the digital age requires a new way of thinking about our TTP. Implementing real change requires rebalancing performance and security together, just as we also rebalance security and privacy together, empowering IT and cybersecurity teams to partner in a win-win dynamic, rather than pitting one community against the other with win-lose priorities. This is how an organization can go about safely enabling the high performance of its users, using the applications and content the organization requires to do its vital functions, including fixed, mobile and virtual capabilities throughout the organization’s enterprise, from the cloud to the network to the endpoint device – BYOD or otherwise.

DETAILED DESCRIPTION OF IMPERATIVE #1

THREAT: Looking at this concept from a threat perspective, we all know that, today, the Attacker has a distinct advantage over the Defender. That’s not news, and we all know that; but let’s look at why that is true and why it’s only going to get worse unless we do something to “flip the scales” or at least rebalance them toward a better security posture than we choose to live with today.

This is what our CEO at Palo Alto Networks, Mark McLaughlin, calls a math problem. Due to the decreasing cost of automation and cloud-based capabilities, a growing marketplace of threat actor information sharing, and the ever-increasing attack surface with vulnerabilities growing in proportion due to the “Internet of Things” phenomenon, the Attacker’s job is getting cheaper and easier ever day. The Attacker only has to be successful once to get into your network and accomplish his or her nefarious intentions.

On the other hand, the Defender has to be everywhere, all the time. Additionally, the Defender, who typically uses manual procedures to respond, doesn’t usually detect the threat in his or her networks until months or even years have passed (the average detection time is more than 6 months according to most cyberthreat research and analysis). This is very costly in terms of time, manpower, technology, complexity, reputation, brand and, of course, money.

To illustrate further, I’d like to use a few numbers to tell a story about the world of protecting your business from cyberattacks and this math problem. I got these numbers from our Regional CSO for Europe and the Middle East, Greg Day.

In 2015, the Application Usage Threat Report from Palo Alto Networks saw 675,000 distinct threats, across almost 3000 applications. These are frightening statistics. But what does this actually mean in real terms to your business, to your team, or to you personally?

To get a feel for that kind of meaning, you need context that’s relevant to your world, so let me give you another number – 1.5 million. According analysts Frost and Sullivan, this will be the shortfall of cybersecurity professionals by 2020.

This demand outstripping supply is good news if you’re a security professional looking for a job, but bad news if you are trying to recruit cybersecurity professionals into your organization or retain your existing workforce. Many organizations have a model that is becoming harder and harder to sustain in this world of more threats and less security staff at the ready.

Who are these Defenders? CISOs and other IT security professionals, of course, defend their organization – against what, though? Today, it’s not just an attacker; it’s a marketplace, and that means groups of people sharing best practices with each other –trading with each other.

A few years ago some governments were investing huge amounts of resources to develop incredibly sophisticated attack approaches. Today anyone can purchase the same attack kit online for a few dollars, complete with instructions and a how to get started video.

This is why it’s getting easier for Attackers: because of their decreasing costs and the abundance of resources available to them. They only have to be successful once to win, but this is probably a tiny percentage of their attack attempts. Contrast that with the CISO, who has to successfully defend 100 percent of the time. Attackers are crowdsourcing, yet CISOs are on their own.

I’d like to show you, in the following sections of the concept model, how many leaders and security professionals are taking action to alter their defensive model to take advantage of the valuable assets they already have – in other words, “flipping the scales” to give the Defender more of an advantage than he or she has today.

POLICY: The legacy view is that technology is driven by opportunity and convenience (which are built-in) while security and risk management chase from behind trying to catch up (and are, therefore, bolted-on afterwards).

The environment, as shown in Figure 2 above and captured in almost daily headlines about the latest breaches, is changing this balance; but the change is slow and uneven. This change is beginning to drive a need to bring the scales in Figure 3 to a better, more responsible balance.

This includes changing a “left side of the scale” assumption that you’re safe, to a “right side of the scale” assumption that the threat is going to get in, if it hasn’t already, resulting in the need for a Zero Trust environment.

All of the security leaders we talk to want to reduce the workload on their organization. Getting back to the math problem from earlier, here’s another number – 65,000. Like some the earlier numbers I used, this one also comes from Greg Day, and it identifies some of the reasons the network defender’s workload is so big.

When the Internet was conceived, that was the number of ports of communication that people thought might be needed for all the different traffic and protocols. This provided lots of scope and scale for flexibility.

Today we use very few of these traditional ports. Most of the traffic consists of either email or web-based protocols; however, within these, there are now thousands of Internet applications and each has its own sub-protocols.

You can block all these ports; but, since almost all the traffic comes through these same few ports, you cannot just block them. Using traditional technology, you have to trust these ports, or you would block out all the traffic you need to run your business.

This policy means that security professionals have to program their legacy firewalls to block traffic using rules that are based on where traffic is coming from, where it’s going to, and what type of traffic it is. And, of course, your organization wants to do new things all the time, so the policies have to change all the time.

So, your starting position is to trust all the traffic going through these few ports. Then you have to block traffic using policies – lots of policies. Policies on top of policies. Rules on top of rules. It’s very difficult to even understand what the policies and rules from the past did and if the new policies and rules conflict in any way. This approach is very costly, labor-intensive and ineffective because it’s using this old frame of reference that only adds complexity and cost to the equation, neither of which are your friends as a cybersecurity professional.

The only way to fix this is to design a totally new type of technology using a different frame of reference – one based on how we use the Internet today. You need technology that understands modern Internet usage and can identify each of the applications that effectively uses its own protocols over the few trusted ports each business has enabled today. This is exactly why Palo Alto Networks has engineered its next-generation firewalls to safely enable the applications and content required by an organization’s users, whether fixed, mobile or virtual, to do the vital functions required for the mission or business (more on this in the TTP portion below).

The balance on the right side of the policy scale is called a Zero Trust model. Trust nothing unless it’s defined as part of how you operate your business. This essential capability is unique. It also allows you to create rules that determine what traffic can flow into your organization. But, instead of being based on the port, the type of traffic, where it’s from, and where it’s going to, it’s based on who wants to communicate and what they want to do. That means the applications and content that they want to use.

The end result is that it’s easy for you to define your company’s way of doing business because you need far fewer policies and they are relevant to how your organization operates. They also make sense, and you can see your security policy written in black and white.

It’s more effective because your starting point is Zero Trust rather than trust everything, and it understands the sub-protocols that modern web applications use. It’s easy to follow and much less work.

ORGANIZATION: The decision-making forum when it comes to dealing with cyberthreats has traditionally been within the technical (CIO/CISO/CSO) community, but the exploding threat problem along with the changing balance between opportunity/convenience and risk are driving the decision-making forums into C-Suites and boardrooms; no longer are they solely within the purview of the IT community. This is becoming and, in more and more cases, has already become a leadership issue rather than just a technical one. So this scale has already begun to flip – and that’s a good thing!

Leadership is one of the most critical aspects of this imperative about changing the balance on these scales and creating an environment where those in the business of driving cybersecurity within an organization can begin to acquire an advantage over the threat.

Leadership from the top drives the prioritization of resources and assets, enables an effective strategy that aligns the ways and means to achieve real goals, and requires that the team routinely bring back results that can be measured in relationship to the bottom line, whether you are a business or a national security organization.

This changing balance within the decision-making forum in no way diminishes the role of the technical community in the overall decision process. The tech community must take greater care than ever before to educate their leadership in clear, accurate ways so that wise decision-making is the result.

Let’s face it – not all of our senior executives have the technical background to readily comprehend all of the details required to address what can be a very mysterious and complex problem set. It’s incumbent on the leader’s technical experts to explain issues in plain English to the maximum extent possible.

Use of analogies can be tempting; and, sometimes, that may be a good way to explain something that is familiar to a leader’s background and experience. But beware, the technology environment associated with cyberspace has some of the most significant distinctions that I’ve personally ever witnessed when compared to the traditional physical “domains.”

Scale, speed, and complexity (especially given the blurring of lines between human interaction with cyberspace and the various layers of technical, logical, physical and geographic segments) make analogies dangerous because, inevitably, the analogy falls apart at some point, and senior executives who think they understand what decision to make based on an imprecise analogy can be making serious mistakes.

TTP: So why is it that it seems we continue to lose, and the problem is getting worse and not better? Why haven’t we all had a “Cyber Pearl Harbor” or “Cyber 9/11” epiphany? From what I can see, it’s because there is still, what I believe to be, a false narrative about the balance between security and performance – that you can only increase one at the expense of the other.

This has traditionally been described as a “win-lose” dynamic.  And, in the world of business just as in the world of national and economic security, performance always wins, which is why most CISOs report to CIOs.  And when they don’t, it’s always a win-lose proposition pitting one community against another.

The fact is that, in this new environment, security and performance go hand in hand.  So how do we enable a “win-win” dynamic? How do we put security into a model that safely and effectivelyENABLES performance, across all users, using all their applications, all their content, including mobile and virtual devices? Is that even possible? If your cybersecurity solution provider isn’t working toward that objective, shouldn’t they be?

As we saw in the threat discussion above, organizations are faced with the situation where the attacker has low costs and automation. And the defender has high costs and human beings performing manual tasks.

This is why leaders are looking for another way because this model is hard to sustain. Perhaps it is even unsustainable.

Imagine if you could change the balance. At the moment this precious resource – your staff – is focused mostly on discovery. Taking productive business action is secondary. This model gives a poor return. What if your people only took productive business action and the discovery part was automated? That model would give you a much higher return. More on manual vs. automated in one of my next blog posts about other imperatives for cybersecurity success in the digital age.

One thing that I think can help us to pursue more of a win-win dynamic is to speak with more clarity and accuracy about what we are trying to do with information sharing in order to provide “cyber” security and distinguish that from some of today’s conflated ideas about providing “traditional” security and the associated “surveillance” issues that get carelessly lumped into the cybersecurity discussions.

So in addition to the false narrative about performance vs. security, I think there’s another false narrative about security vs. privacy. In the cybersecurity world, unlike the world of counterterrorism and surveillance issues, security ensures privacy – it doesn’t detract from it! For example, we should begin to clearly identify exactly what kind of cyberthreat information needs to be shared, and how a narrow focus on that specific information has little (or maybe even nothing) to do with privacy-related information.

I’ll cover more about information sharing in Imperative #4; but, for now, let me summarize the key tenets of this first imperative about “flipping the scales.”

CONCLUSION

Cybersecurity success in the digital age requires us to take action to change several important dynamics that are currently out of balance.

Legacy thinking and resulting policies put the cybersecurity community on the wrong side of a math problem when it comes to the threat, and in a win-lose dynamic with both the IT community and our leadership when it comes to choosing between performance and security. We have to “flip these scales,” and this effort must be driven by the organization’s leadership with the active participation of the IT and cybersecurity communities working toward common goals within an organization.

We also need to start throwing the weight of our technology, processes and people on the side of the scales favoring next-generation technology that recognizes the way the Internet works today, leverages the powerful advantage that automation can bring to discovering threats on a wider scale and in reduced time, and saves our most precious resource – our people – to do what only people can do instead of spending all of our resources in “cleanup on aisle 9” mode.

Next in this blog series will be Imperative #2 for cybersecurity success in the digital age … We Must Broaden Our Focus in Order to Sharpen Our Actions.

 

Written by John A. Davis, Major General (Retired) United States Army, and Vice President and Federal Chief Security Officer (CSO) for Palo Alto Networks

[Palo Alto Networks Blog]

English
Exit mobile version