defending$against$ ransomware - black hat dns$(tor) teslacrypt dns cryptowall dns torrentlocker dns...

Post on 21-May-2018

213 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Meg DiazOpenDNS ProductsJuly 21,2016

Defending Against Ransomware

2© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

3

NAME DNS IP NO C&C TOR PAYMENT

Locky DNS

SamSam DNS (TOR)

TeslaCrypt DNS

CryptoWall DNS

TorrentLocker DNS

PadCrypt DNS (TOR)

CTB-­Locker DNS

FAKBEN DNS (TOR)

PayCrypt DNS

KeyRanger DNS

Encryption C&C Payment MSG

4© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

5© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Blocking Ransomware: Real World Example with a Locky Domainglslindia[.]com (detection Date: 15/03/2016)

6© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Blocking RansomwareLocky: Real World Example

Domains in Red are automatically blocked by OpenDNS

Hash of the malicious file downloaded from these domains

Malware Download URLThese domains

co-occurr

These domains share the same infrastructure

7© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Current Malware distribution

Point

Infection Point

Next Malware Distribution Points

Expose the attacker’s infrastructure (Nameservers and IPs) to predict the next moves

Blocking RansomwareLocky: Real World Example

8© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Discover the Threats Before They Happen (1)VT Link: https://virustotal.com/en/file/07bed9baa42996bded75dacf5c2611ba5d3a3f19b8588ea734530f74c2586087/analysis/(first VT submission: 2016-­03-­18 16:51:45 three daysOpenDNS)

9© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Best Practice Recommendations

• Solid patch management

• Non-­native document rendering PDF + Office

• Users run as non-­privileged users (no admin)

• Disable RDP

• Firewall enabled on endpoints

• Segmented and secured backups (tested)

• Encryption of backups and local documents

• Look into adding Endpoint Threat Detection & Response and DNS-­layer security

10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

INTERNET

MALWAREC2/BOTNETSPHISHING

AV

AV

AV AV

ROUTER/UTM

AV AV

ROUTER/UTM

SANDBOXPROXY

NGFWNETFLOW

AV AV

AV AV

MID LAYER

LAST LAYERMID LAYER

LAST LAYER

MID LAYER

FIRST LAYER

Where Do You Enforce Security?

Perimeter

Perimeter Perimeter

Endpoint

Endpoint

BENEFITSAlerts Reduced 2-­10x;; Improves Your SIEM

Traffic & Payloads Never Reach Target

Provision Globally in UNDER 30 MINUTES

top related