threat hunting with qualys - information security and ... · security analytics –correlate user,...

29
QUALYS SECURITY CONFERENCE 2020 Chris Carlson VP Product Management, Qualys, Inc. Threat Hunting with Qualys Going Beyond Your EDR Solutions

Upload: others

Post on 06-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

QUALYS SECURITY CONFERENCE 2020

Chris CarlsonVP Product Management, Qualys, Inc.

Threat Hunting with QualysGoing Beyond Your EDR Solutions

Page 2: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Adversary Threat Tactics are Changing

Early 2010s Zero-day Vulnerabilities

(Nation State, Industrial Espionage, Black Market)

TodayRapidly weaponizing newly-disclosed vulnerabilities

(Good, Fast, Cheap – Pick 3)

Page 3: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Known Critical Vulnerabilities are Increasing

14-16K vulnerabilities are disclosed 2017-2019

30-40% are ranked as “High” or “Critical” severity

Worm-able Vulnerabilities are increasing (WannaCry, BlueKeep)

“Mean Time to Weaponize” is rapidly decreasing year/year

Page 4: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Time to WeaponizeVuln Disclosure Exploit Date First Exploit TypeTime

BlueKeep May 2019 Nov 2019 Cryptominer6 months

WannaCry RansomwareMarch 2017 May 2017* 2 months

Crypto DLLVulnerability

Jan 2019 ??? ??????

Citrix ADC Dec 2019 Jan 2020 Cryptominer1 month

Page 5: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Immediately discover assets and vulnerabilities

Patch and verify remediation / stop the instance

Change configuration to limit unauthorized access

Control network access / cloud security groups

Add Endpoint Detection and Response

AI

CSA

IOC

PC

PM

SCA

VM

Get Proactive – Reduce the Attack Surface

Page 6: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Proactively Hunt, Detect, and Respond

Security Analytics(Summer 2020)

Indication of Compromise

Detect malware, IOCs, IOAs, and verify threat intel Augment SIEMs by finding

attacks using behavioral analytics and MITRE ATT&CK

Page 7: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Qualys IOC – Hunt Using Threat Intel

Find the object there.Threat intelligence lists attack information …

1

Search for the file hash here…2

3

Page 8: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Detect Malware Missed by Anti-Virus

Qualys IOC discovered…- Dridex Banking Trojan (51)- 4 domain controllers infected- Backdoors (7) installed due to

phishing campaigns- Netcat (8) root kits installed- 46 PUAs installed

UK Government Contractor- “Big 4” anti-virus installed- Qualys Agent for Vulnerability Mgmt- Added Qualys IOC on existing agents- 256 hosts

Page 9: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Demoa0c68e476f55d0b7cdd87b1b20a1e021672eec41f96e056d6289d8734491f9bb

Page 10: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Beyond Endpoint Detection and Response:How can I better protect my crown jewels?

Threat Hunting Assumptions:

• Every user machine can be compromised – it only takes one click

• Every Remote Code Execution (RCE) vulnerability can be exploited

• Local Privilege Escalation and Credential Harvesting to move laterally

• System misconfigurations are often overlooked and easy to exploit

• Network segmentation is rarely used internally due to management

All attacks are not equal: can Adversaries reach my Critical Servers?

Page 11: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Adversary Lateral Movements (Attack Paths)

Tier 0 Systems“Crown Jewels”Business Apps / IT SystemsUser Segments

Security Tierslower higher

1 Bad actor compromises a user machine (email, phishing, watering hole, etc.).Takes remote control of the machine.

2 Find systems in higher security tiers by looking for existing connections or network reconnaissance.

3 Laterally move to new system by:- Exploiting open vulnerabilities- Take advantage of misconfigurations- Use compromised credentials

4 Laterally move to new system by:- Exploiting open vulnerabilities- Take advantage of misconfigurations- Use compromised credentials

Page 12: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Attack Path Discovery (Summer 2020)

Network ReachabilityDetermine connections between hosts using Cloud Agent

Passive + Active network collectionStore these connections in a Graph Database for fast query

+Asset Security Posture

Remotely Exploitable VulnerabilitiesSystem Misconfigurations

Malware, IoCs, and Indicators of Activity

CA

PC SCA

TPVM

IOC

Page 13: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to
Page 14: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to
Page 15: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Attack Path Discoveryfor

Proactive Threat Huntingand Response Priority

Page 16: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to
Page 17: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to
Page 18: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to
Page 19: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Attack path leads to this critical server

Page 20: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Quickly investigate the host to see the active

attack

Page 21: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Take action on this host to stop the

attacker in their tracks

Page 22: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to
Page 23: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Scale Human Response with Automation

Qualys finds active attacks on endpoint using Indication of Compromise

Go beyond endpoint detection with Security Analytics – correlate user, network, application, cloud, container

Use attack path discovery as metadata to detect attacks that can reach critical assets

Automate response to protect critical assets using Security Orchestration response playbooks

Page 24: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Attack Path Discoveryto

Prioritize Patchingand

Improve Security Defenses

Page 25: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to
Page 26: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Attack path leads to this critical server

Page 27: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Patch this one asset to break the attack path to

critical server

Page 28: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

Vulnerability Remediation Prioritization

CVSSv2 / CVSSv3 base scores

Qualys QID Severity score

Qualys Tagging for Asset Business Criticality

Qualys Threat Protection Real-Time Indicators(based on threat intel and live attacks)

Qualys VMDR Threat Prioritization(Machine Learning model + Contextual Awareness)

Qualys Attack Path Discovery

Page 29: Threat Hunting with Qualys - Information Security and ... · Security Analytics –correlate user, network, application, cloud, container Use attack path discovery as metadata to

QUALYS SECURITY CONFERENCE 2020

Chris [email protected]

Thank You