the enemy within - data connectors canary in the coal mine: malware molly 18 varonis systems....

41
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. VARONIS SYSTEMS Our mission is to protect data from insider threats and cyberattacks. The Enemy Within Understanding Insider Threats

Upload: hoangtruc

Post on 06-May-2018

217 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.VARONIS SYSTEMS

Our mission is to protect data from insider threats and cyberattacks.

The Enemy WithinUnderstanding Insider Threats

Page 2: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.2

Agenda

A few thoughts on ransomware

Examples of insider threats

Mitigating insider threats

Page 3: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.3

About Me

David Gibson

VP of Strategy and Market Development

@dsgibson

www.varonis.com

Page 4: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.4

About Me

David Gibson

VP of Strategy and Market Development

@dsgibson

www.varonis.com

Page 5: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

The Varonis Origin Story

Page 6: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

$17,00040 BTC

Page 7: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.7

But what’s a hospital’s data

actually worth?

What are their

services worth?

Page 8: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.8

Page 9: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.9

” – Kevin Beaumont, Malware Analyst

I am seeing around 4,000 new infections per hour, or approximately 100,000 new infections per day.

Page 10: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

Google Trends: Ransomware

Page 11: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.11

Page 12: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.12

Why is Ransomware so

dangerous when it becomes

an insider?

Page 13: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.13

Insiders have a lot of access

62%

29%

of end users say they have access to company data they probably shouldn’t see

of IT respondents say their companies fully enforce a strict least privilege model

Page 14: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.14

Very few watch what insiders are doing

35% of organizations have no searchable records of file system activity

38% do not monitor any file and email activity.

Page 15: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.15

But what changed?

Page 16: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

Bitcoin: Anonymously monetizing malware at scale

Page 17: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

The canary in the coal mine: Malware Molly

Page 18: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.18

Ransomware is the

only threat that

wants you to know

it’s there

Page 19: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.VARONIS SYSTEMS

Let’s Meet The Other

Insider Threats

Page 20: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

Disgruntled Dan

Page 21: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.21Image credit: FBI

Page 22: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.22Image credit: FBIImage credit: Praxis Films / Laura Poitras

Page 23: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

Abusive Admin Andy

Page 24: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.24

As he was getting near retirement, the system administrator received an offer to sell corporate data, which would have allowed him to purchase the house of his dreams and retire as he always wanted.

Page 25: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.25

They was firing me.I just beat them to it. Nothing personal, the upper management need to see what they guys on the floor is capable of doing when they keep getting mistreated. I took one for the team.

Page 26: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

Hijacked Hillary

Page 27: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.27

Page 28: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.28

“The service I examined for this post currently is renting access to nearly 17,000 computers worldwide”

Page 29: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.29

What data is most

vulnerable to insider threats?

Page 30: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.30

” — Gartner, 2015

Data volume is set to grow 800% over the next 5 years and 80% of it will reside as unstructured data.

Page 31: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.31

– Jeff Wagner, OPM’s Director of Security Operations

The attackers primarily focused on utilizing SMB commands to map network file shares of OPM users who had administrator access or

were knowledgeable of OPM’s PIPS system. The attacker would create a shopping list of the

available documents contained on the network file shares.

Page 32: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.32

Page 33: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.VARONIS SYSTEMS

What can you do?

Page 34: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.34

Discovery Timeline

21%

49%

21%

5%

5%

Years

Months

Weeks

Days

Hours

Minutes

Seconds

Source: Verizon 2016 Data Breach Investigations Report

Page 35: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.35

DETECT PREVENT SUSTAIN

insider threats by analyzing

data, account activity, and

user behavior.

disaster by locking down

sensitive and stale data,

reducing broad access,

and simplifying permissions.

a secure state by

automating authorizations,

migrations, & disposition.

Page 36: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.36

DETECTMap directory services, permissions, file systems

Discover sensitive and stale data

Automatically identify administrators, service accounts, and executives

Baseline what normal behavior looks like

Detect suspicious behavior

Crypto intrusion and

other malware infections

Privilege escalations

Abnormal access to

sensitive data

Prioritize where sensitive data is overexposed and at-risk

Audit all file system and email activity

Page 37: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.37

PREVENTLock down sensitive and stale data

Fix Active Directory and file system issues

Eliminate global groups

Simplify permissions structure

Identify Data Owners outside of IT

Data Owners perform entitlement reviews

Prune unnecessary access

Page 38: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.38

SUSTAINContinuously monitor all user & file system activity

Automatically catch and correct deviations from policy and trusted state

Automate quarantiningof sensitive data

Automate archival or disposal of stale data

Automate authorization workflows and entitlement reviews

Automate revocation of access

Page 39: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.39

Ransomware is an epidemic

Its existence, persistence and “success” illustrate how soft our “insides” are

Other insider threats are more dangerous

Files and emails are frequent targets

The approach: Detect, Prevent, Sustain

Summary

Page 40: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.40

Free Data Risk Assessment – http://bit.ly/threatcheck

Page 41: The Enemy Within - Data Connectors canary in the coal mine: Malware Molly 18 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Ransomware is the only threat that wants you to know it’s

VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.VARONIS SYSTEMS

Thank YouDavid Gibson

@dsgibson

www.varonis.com