530 likes | 1.11k Views
FireEye Overview. John Bolger Manager Channels, US-Central FireEye. Company Overview. The leader in stopping advanced targeted attacks Marquee customers across every industry Top banks, hi-tech, oil and gas, government
E N D
FireEye Overview John Bolger Manager Channels, US-Central FireEye
Company Overview • The leader in stopping advanced targeted attacks • Marquee customers across every industry • Top banks, hi-tech, oil and gas, government • All major Internet search engines, top social networks, and auction sites • One of the fastest growing enterprise technology companies in the world
We Are Only Seeing the Tip of the Iceberg HEADLINE GRABBING ATTACKS THOUSANDS MORE BELOW THE SURFACE APT Attacks Zero-Day Attacks Polymorphic Attacks Targeted Attacks
Chinese Hacking Methodology http://www.thedarkvisitor.com/2008/11/chinese-hacker-attack-flowchart/
Chinese Hacking Methodology - Translated http://www.thedarkvisitor.com/2008/11/chinese-hacker-attack-flowchart/
Characteristics of Malware • Stealth Level • Ranges from High to Low • Target Vulnerability • Unpatched machines, plug-ins, browsers • Intended victim(s) • Specific victims - using Spearphishing • Objectives • Theft? Disruption? Fear?
We Are Only Seeing the Tip of the Iceberg HEADLINE GRABBING ATTACKS THOUSANDS MORE BELOW THE SURFACE APT Attacks Zero-Day Attacks Polymorphic Attacks Targeted Attacks
Defining Advanced Targeted Attacks • Utilizes advanced techniques and/or malware • Unknown • Targeted • Polymorphic • Dynamic • Personalized • Uses zero-dayexploits, commercial quality toolkits, and social engineering • Often targets IP, credentials and often spreads laterally throughout network • AKA—Advanced Persistent Threat (APT) The New Threat Landscape There is a new breed of attacks that are advanced, zero-day, and targeted ADVANCED Advanced Targeted Attack TRADITIONAL
The Enterprise Security Hole Attack Vector NGFW FW Web-based Attacks IPS SECURITYHOLE Spear Phishing Emails Malicious Files SWG AV
Traditional Defenses Don’t Work Networks Are Being Compromised as APTs Easily Bypass Traditional Signature-Based Defenses Like NGFW, IPS, AV, and Gateways Advanced attacks bypass both signature and heuristics-based technologies in existing IT security defenses
Typical Enterprise Security Architecture Firewalls/NGFW Secure WebGateways Anti-SpamGateways Desktop AV IPS Block IP/port connections, application-level control, no visibility into exploits and ineffective vs. advanced targeted attacks Attack-signature based detection, shallow application analysis, high-false positives, no visibility into advancedattack lifecycle Some analysis of script-based malware, AV, IP/URL filtering; ineffective vs. advanced targeted attacks Relies largely on antivirus, signature-based detection (some behavioral); no true spear phishing protection Signature-based detection (some behavioral); ineffective vs. advanced targeted attacks
Attacks Increasingly Sophisticated Multi-Vector • Delivered via Webor email • Blended attacks with email containing malicious URLs • Uses application/OS exploits Dynamic Web Attacks Multi-Stage • Initial exploit stage followed by malware executable download, callbacks and exfiltration • Lateral movement to infect other network assets Malicious Exploits Spear Phishing Emails
The Attack Lifecycle – Multiple Stages Compromised Web server, or Web 2.0 site 1 Callback Server Exploitation of system 1 4 Malware executable download 2 Callbacks and control established 3 File Share 2 IPS 5 Data exfiltration 4 File Share 1 2 3 Malware spreads laterally 5
FireEye Malware-VM™ Filter Global loop sharing into MAX Cloud Intelligence Phase 3 XML/SNMP alerts on infections as well as C&C destinations Fast Path Real-time Blocking in Appliance • Phase 1: Aggressive capture heuristics • Deploys out-of-band/passive or inline • Multi-protocol capture of HTML, files (e.g. PDF), & EXEs • Maximizes capture of potential zero-day attacks • Phase 2: Virtual machine analysis • Confirmation of malicious attacks • Removal of false positives • Phase 3: Block Call Back • Stop data/asset theft
The FireEye Difference Multi-Vector Protection • Protection against Web attacks • Protection against email attacks • Protection against file-based attacks Multi-Stage Protection • Inbound zero-day exploit detection • Outbound malware callback blocking • Malware binary payload analysis • Latent malware quarantine Multi-Stage Multi-Vector
Multi-Vector Protection Blended Web/Email Threats Email MPS Web MPS CMS File MPS Web Threats Email Threats Internal Lateral Movement of Threats
Multi-Staged Attack Pieces Connected Point Products CALLBACK WEB EXPLOIT WEB OR EMAILEXPLOIT CALLBACK LATERAL MOVEMENT LATERAL SPREAD MALWAREEXECUTABLE DOWNLOAD MALWAREEXECUTABLE DOWNLOAD DATAEXFILTRATION DATAEXFILTRATION
Web Malware Protection System • Inline, real-time, signature-less malware protectionat near-zero false positives • Analyzes all web objects, e.g., web pages, flash, PDF, Office docs and executables • Blocks malicious callbacks terminating data exfiltration across protocols • Dynamically generates zero-day malware and malicious URL security content and shares through Malware Protection Cloud network • Integration with Email and File MPS and MAS for real-time callback channel blocking FEATURES http:// • Inline blocking both inbound and outbound • Advanced content analysis (PDF, JavaScript, URLs) • Models up to 1 Gbps at microseconds latency
Multi-Protocol, Real-Time VX Engine PHASE 1 Multi-Protocol Object Capture PHASE 2 Virtual Execution Environments • PHASE 1: WEB MPS • Aggressive Capture • Web Object Filter • DYNAMIC, REAL-TIME ANALYSIS • Exploit detection • Malware executable analysis • Cross-matrix of OS/apps • Originating URL • Subsequent URLs • OS modification report • C&C protocol descriptors Map to Target OS and Applications
Email Malware Protection System • Protection against spear phishing and blended attacks • Analyzes all emails for malicious attachments and URLs • In-line MTA active security or SPAN/BCC for monitoring • Brute-force analysis of all Email attachments in VX Engine • Web MPS integration for malicious URL analysis/blocking • Web MPS integration for blocking of newly discovered callback channels FEATURES • Supports large range of file types (PDF, Office formats, ZIP, etc.) • Attachment analysis • URL analysis • Correlation of malicious URLs to emails at the CMS
Multi-Protocol, Real-Time VX Engine PHASE 1 Multi-Protocol Object Capture PHASE 2 Virtual Execution Environments • PHASE 1: WEB MPS • Aggressive Capture • Web Object Filter • PHASE 1: E-MAIL MPS • Email Attachments • URL Analysis • DYNAMIC, REAL-TIME ANALYSIS • Exploit detection • Malware executable analysis • Cross-matrix of OS/apps • Originating URL • Subsequent URLs • OS modification report • C&C protocol descriptors Map to Target OS and Applications
Protecting Against Blended Threats Secures Against Attacks Using URLs in Email • High priority URL analysis through Web MPS VX engine • Web MPS integration for correlation of malicious URL with spear phished email message • Web MPS integration for blocking of newly discovered callback channels Central Management System Web MPS Email MPS
File Malware Protection System • Protects file sharing servers from latent malware • Addresses malware brought into the network via web or email or file sharing as well as other manual means • Detects the lateral spread of malware through network file shares • Continuous and incremental network file share analysis • Web MPS integration for blocking of newly discovered callback channels FEATURES • Supports large range of file types (PDF, Office, ZIP, etc.) • CIFS support • Malicious file quarantine • Integration via CMS
Multi-Protocol, Real-Time VX Engine PHASE 1 Multi-Protocol Object Capture PHASE 2 Virtual Execution Environments • PHASE 1: WEB MPS • Aggressive Capture • Web Object Filter • PHASE 1: E-MAIL MPS • Email Attachments • URL Analysis • PHASE 1: FILE MPS • Network File Shares • DYNAMIC, REAL-TIME ANALYSIS • Exploit detection • Malware executable analysis • Cross-matrix of OS/apps • Originating URL • Subsequent URLs • OS modification report • C&C protocol descriptors Map to Target OS and Applications
Multi-Layered Threat Intelligence Sharing Local Sharing Cross-Enterprise Sharing Global Sharing Central Management System Web MPS Seconds Internal Feedback Loop Many 3rd party Feeds Validated by FireEye Technology Cross-Enterprise Web MPS Deployment
Summary • Pace of advanced targeted attacks is accelerating, affecting all verticals and all segments • Traditional defenses (NGFW, IPS, AV, and gateways) no longer stop these attacks • Real-time, integrated signature-less solution is required across Web, email and file attack vectors • FireEye has engineered themost advanced threat protection to supplement traditionaldefenses and stop advanced targeted attacks Complete Protection Against Advanced Targeted Attacks Malware Protection Cloud Central Management System Malware Analysis System Web Malware Protection System EmailMalwareProtectionSystem File Malware Protection System
Enjoy the rest of the show! Thank You!