cisco connect dubrovnik · 2000s 2015 spam email malware spear phishing social engattacks business...

42
Cisco Connect Dubrovnik Croatia • 28.03.2019 Global vision. Local knowledge.

Upload: others

Post on 14-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Cisco Connect DubrovnikCroatia • 28.03.2019

Global vision.Local knowledge.

Page 2: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Vedran FranjićSystem Engineer Sales29.03.2019.

Zaš̌titite svoj najosjetljiviji dio sustava od napadaCisco Email Security

Page 3: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Agenda

• Email importance

• Multilayer approach

• DP and APP

• Securing o365

• Architecture

• Intelligence

• Licensing

Page 4: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Email Importance

Page 5: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks
Page 6: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks
Page 7: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

It’s easy for attackers to exploit95% of breaches start with email

Email was not built with security

Page 8: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Business Email Compromise (BEC)

Phishing

$5.3 Billion in losses2 $9.1 Billion in 20183 54% of legitimate domains used in phishing campaigns4

Domain Compromise

Attackers Use Multiple Ways to Get In

Malware

Ransomware detections up 90% in 20181

Page 9: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Multilayered Approach

Page 10: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

John Doe ([email protected])group.apac (mailer list); group.emear (mailer list)Monday, July 23, 2018 at 12:02 PM

Team,

At Cisco, it’s our mission to design secure products. Now it’s your mission to protect data and assets belonging to Cisco, our customers, and our partners from threats lurking around every corner.Engage now: http//thislinkisagiantscam.youresilly.cisc0.com/swagIt’s times like these when it is critical that we come together, support each other, and have each other’s backs.

Thank you,John

Sender

Attachment

URL

Solution: Protect Every Part of An Incoming Email

Promo300kb

Content

Page 11: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks
Page 12: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Data Loss Prevention (DLP)Protect personal information and IP

Control what leaves the network and customize policies

Scan email content for sensitive information

Prevent data exfiltration automatically

Scanned against 100+ predefined

DLP policies

Cisco Email Security

Critical violation: Info redirected and not sent

Minor violation: Content sent with encryption

Admin

Manage policies such as:• Specific users• Groups• Locations• Federal compliance• State regulations

With multi-language support

No violation: Content sent with optional encryption

Page 13: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Cisco Registered Envelope Service (CRES)Extend security to external communications

Scan messages for keywords, policies, and sender

Apply authentication mechanisms to access encryption keys

Maintain control over your sent messages

Cisco Email Security

CRES

Sender controls

Push Open attachment & confirm identity

Page 14: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

DP and APP

Page 15: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Advanced phishing attacks use identity impersonation

Sources: CSOonline.com, Cybersecurity ventures, Nucleus Research, FBI I3C (Jan ‘15 – Dec ‘16)

2000s 2015

Spam EmailMalware

SpearPhishing

Social Eng Attacks Business Email

Compromise

2017

Content Deception Identity Impersonation

Zero DayAttacks

30% open malicious emails13% click on malicious attachments3:45 until first user is compromised

Volume of Threats

$

Page 16: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

DMARC, DKIM and SPFBlock fraudulent senders

Inspect sender details on inbound messages

Block invalid senders and identify next steps

Determine whether asender is reputable

Signed

Fraudulent

Delete

Send

Quarantine

Verified

TrustedPartner.com

TrustedPartner.comSPF

Checks if mail from a domain is being sent

from an authorized host

DMARCTies SPF and DKIM

results to 'From' header

DKIMMatches public key to

sender domain’s private key records

DNS

Cisco Email Security

Page 17: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

What gets authenticated?

Page 18: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

DMARC, DKIM and SPF

Page 19: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Email Authentication Overview

DMARC

SPF DKIM

• Authenticates Message Path• Authorized senders in DNS

• Authenticates Message Content• Public Encryption keys in DNS

Reliable Visibility Action-Based Policies RUA RUF

Page 20: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

FBI defines it as Business Email Compromise (BEC)Forged Email Detection

Match sender address against company directory

Send appended mail to warn users of potential forgery

Inspect SMTP envelope for True sender address

Record a log of attempts and actions taken

Compare againstCompany directory

• Allison Johnson• Barry Smith• Chuck Robbins• Dave Tucker

From: Chuck <[email protected]>

Subject: [URGENT] Need help transferring funds

Inspects the SMTP envelope address:

$ telnet mail-smtp-in.l.mail.com 25 Trying 74.125.206.26... Connected to mail-smtp-in.l.mail.com. Escape character is '^]'. 220 mx.mail.com ESMTP i11si22058766wmh.67 - gsmtp

HELO mail.outside.com 250 mx.mail.com at your service MAIL FROM:<[email protected]> 250 2.1.0 OK i11si22058766wmh.67 - gsmtp RCPT TO:<[email protected]>250 2.1.5 OK i11si22058766wmh.67 – gsmtp Data

SMTP

Env

elop

e

From: [email protected]

Subject: {Possibly Forged}[URGENT] Need help transferring funds

Post-processing

Pre-processing

Recipient Domain

Sending Domain

Actual Sender

Page 21: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Protect your brand

Protect your brand• Easily analyze, update and take

action against those misusing your domain to send malicious email

• Validate those who use your domain appropriately

Automate DMARC authentication• Drive to DMARC Enforcement with

proven tools and services

Cisco Domain Protection

Block attackers from using your domain

Cisco Domain Protection

Page 22: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Protect against fraudulent senders

Local intelligence

• Learns and authenticates identities and behavioral relationships for enhanced protection

Reduce business email compromise

• Discerns which emails carry targeted phishing attacks and only legitimate emails get delivered

Advanced Phishing Protection

Advanced Phishing Protection

Page 23: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks
Page 24: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Secure o365

Page 25: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

O365 – E3 Cisco Email Security w/O365

Anti-spam filters Anti-spam filters

Anti-virus protection Anti-virus protection*

Policy enforcement Policy enforcement

Disaster recovery Disaster recovery

Directory services Directory services

Advanced Threat Protection (Safe Links, Safe Attachments)* Graymail detection

Message tracking (limited) Outbreak Filters

Email encryption (cloud-based only) Message tracking

Data loss prevention Email encryption (cloud and on premise)

Advanced Malware Protection

Detailed reporting

Zero-day incident management

Data loss prevention

*Anti-virus provided by O365*Only with E5

Page 26: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Easily Integrate with Office 365Cloud Email Security with Office 365

O365 Exchange Online

Inbound Traffic

Outbound Traffic

Cisco EmailSecurity

External DomainCurrent Email Domain

Page 27: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

4. No Quarantine Policy, Email Delivered

Azure Application Permissions:• Send mail as any user• Read and write mail in all

mailboxes• Read mail in all mailboxes• Full access to all mailboxes

6. Remediation (all mailboxes)

AMP Retrospective Event Flow

Customer

CES

AMP CLOUD

2. File Reputation Query (SHA256)

3. AMP Verdict: OK

4. AMP Retrospective Verdict Update: Malicious

1. Email with attachment arrives

Page 28: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Summary scan report with details

Visibility into threats gone undetected

Cisco Threat Analyzer For o365A free assessment tool to identify security gaps

Page 29: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Once the ‘Scan Completed’ is shown

Review the Dashboard, compile the PDF report, and share the report with the customer

2

3

1

Page 30: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Arhitecture

Page 31: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Don’t compromise on features when making a choice

Cloud ClusterHybridOn-Premises(Physical or Virtual)

Page 32: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Cisco Email Security

Increase dedicated instances up to 50% at no cost

Prevent shared-fate with compute

instancesIntegrate easily with

O365Deliver 99.999%

availability

Migrate to new deployment options

easily

Transition to the cloud with confidence

Page 33: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

CES: New Datacenters

Kamloops

Toronto

Santa ClaraLas Vegas

OregonN.Virginia

London Almere

Australia

Japan

Singapore

GermanySwitzerland

Current DC

Planned DC

4 new DCs launched in:• Toronto• Kamloops• Oregon (AWS)• N. Virginia (AWS)

Additional sites • Switzerland• Germany• Australia (x2)• Japan• Singapore• 99.999% Uptime Guarantee

• Geo-Redundant Clusters• Choice of DC location

Page 34: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

ThreatInteligence

Page 35: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

AutomatedAnalysis

Specialized Tools

Telemetry

Domain

Network

URL

IP

File

Flow

The Foundation: Superior Threat Intelligence from Cisco Talos

Visibility across all vectors from a best in class portfolio

Page 36: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

600B1.5M 16B

The Foundation: Cisco Talos Continued

New daily malware samples

Daily email messages Daily web requests

Page 37: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Sender Analysis File Analysis URL Analysis

Monitors 600 billion emails per day to provide more broad visibility

Talos on Cisco Email Security

Content Analysis

Page 38: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Licensing

Page 39: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Product Offering: Licensing• 1. Choose deployment

ESA, vESA, CES

• 2. Choose BundleInbound: Anti-spam + Virus + Outbreak filtersOutbound: Data Loss Prevention + EncryptionPremium: Inbound + Outbound

• 3. Choose add-onAMP – Advanced Malware ProtectionGSU – Graymail Safe-UnsubscribeDP – Domain ProtectionAPP – Advanced Phishing protection

Page 40: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

Proof of Value:1. Cloud Email Security

2. On-premise Email Security

3. Advance Phishing Protection

4. Cisco Threat Analyzer o365

Page 41: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks

CiscoEmailSecurity – Zaštititesvojnajosjetljivijidiosustavaodnapada

Page 42: Cisco Connect Dubrovnik · 2000s 2015 Spam Email Malware Spear Phishing Social EngAttacks Business Email Compromise 2017 Content Deception Identity Impersonation Zero Day Attacks