threat hunting with qualys€¦ · threat hunting with qualys: going beyond your edr solutions....

31
QUALYS SECURITY CONFERENCE 2020 Chris Carlson VP Product Management, Qualys, Inc. Threat Hunting with Qualys: Going Beyond Your EDR Solutions

Upload: others

Post on 05-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

QUALYS SECURITY CONFERENCE 2020

Chris CarlsonVP Product Management, Qualys, Inc.

Threat Hunting with Qualys:Going Beyond Your EDR Solutions

Page 2: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Adversary Threat Tactics are Changing

Early 2010s Zero-day Vulnerabilities

(Nation State, Industrial Espionage, Black Market)

TodayRapidly weaponizing newly-disclosed vulnerabilities

(Good, Fast, Cheap – Pick 3)

Page 3: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Known Critical Vulnerabilities are Increasing

14-16K vulnerabilities are disclosed 2017-2019

30-40% are ranked as “High” or “Critical” severity

Worm-able Vulnerabilities are increasing (WannaCry, BlueKeep)

“Mean Time to Weaponize” is rapidly decreasing year/year

Page 4: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Let’s Talk About BlueKeep(RDP Vulnerability)

June 2019

July 2019

Aug 2019

Page 5: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

November 2019

Page 6: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

This week Tuesday!

Page 7: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Immediately discover assets and vulnerabilities

Patch and verify remediation / stop the instance

Change configuration to limit unauthorized access

Control network access / cloud security groups

Add Endpoint Detection and Response

AI

CSA

IOC

PC

PM

SCA

VM

Get Proactive – Reduce the Attack Surface

Page 8: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Proactively Hunt, Detect, and Respond

Security Analytics(Summer 2020)

Indication of Compromise

Detect malware, IOCs, IOAs, and verify threat intel Augment SIEMs by finding

attacks using behavioral analytics and MITRE ATT&CK

Page 9: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Qualys IOC – Hunt Using Threat Intel

Find the object there.Threat intelligence lists attack information …

1

Search for the file hash here…2

3

Page 10: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Detect Malware Missed by Anti-Virus

Qualys IOC discovered…- Dridex Banking Trojan (51)- 4 domain controllers infected- Backdoors (7) installed due to

phishing campaigns- Netcat (8) root kits installed- 46 PUAs installed

UK Government Contractor- “Big 4” anti-virus installed- Qualys Agent for Vulnerability Mgmt- Added Qualys IOC on existing agents- 256 hosts

Page 11: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Demoa0c68e476f55d0b7cdd87b1b20a1e021672eec41f96e056d6289d8734491f9bb

Page 12: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Beyond Endpoint Detection and Response:How can I better protect my crown jewels?

Threat Hunting Assumptions:

• Every user machine can be compromised – it only takes one click

• Every Remote Code Execution (RCE) vulnerability can be exploited

• Local Privilege Escalation and Credential Harvesting to move laterally

• System misconfigurations are often overlooked and easy to exploit

• Network segmentation is rarely used internally due to management

All attacks are not equal: can Adversaries reach my Critical Servers?

Page 13: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Adversary Lateral Movements (Attack Paths)

Tier 0 Systems“Crown Jewels”Business Apps / IT SystemsUser Segments

Security Tierslower higher

1 Bad actor compromises a user machine (email, phishing, watering hole, etc.).Takes remote control of the machine.

2 Find systems in higher security tiers by looking for existing connections or network reconnaissance.

3 Laterally move to new system by:- Exploiting open vulnerabilities- Take advantage of misconfigurations- Use compromised credentials

4 Laterally move to new system by:- Exploiting open vulnerabilities- Take advantage of misconfigurations- Use compromised credentials

Page 14: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Attack Path Discovery (Summer 2020)

Network ReachabilityDetermine connections between hosts using Cloud Agent

Passive + Active network collectionStore these connections in a Graph Database for fast query

+Asset Security Posture

Remotely Exploitable VulnerabilitiesSystem Misconfigurations

Malware, IoCs, and Indicators of Activity

CA

PC SCA

TPVM

IOC

Page 15: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed
Page 16: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed
Page 17: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Attack Path Discoveryfor

Proactive Threat Huntingand Response Priority

Page 18: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed
Page 19: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed
Page 20: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed
Page 21: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Attack path leads to this critical server

Page 22: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Quickly investigate the host to see the active

attack

Page 23: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Take action on this host to stop the

attacker in their tracks

Page 24: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed
Page 25: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Scale Human Response with Automation

Qualys finds active attacks on endpoint using Indication of Compromise

Go beyond endpoint detection with Security Analytics – correlate user, network, application, cloud, container

Use attack path discovery as metadata to detect attacks that can reach critical assets

Automate response to protect critical assets using Security Orchestration response playbooks

Page 26: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Attack Path Discoveryto

Prioritize Patchingand

Improve Security Defenses

Page 27: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed
Page 28: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Attack path leads to this critical server

Page 29: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Patch this one asset to break the attack path to

critical server

Page 30: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

Vulnerability Remediation Prioritization

CVSSv2 / CVSSv3 scores

Qualys QID Severity score

Qualys Tagging for Asset Business Criticality

Qualys Threat Protection Real-Time Indicators(based on threat intel and live attacks)

Qualys VMDR Threat Prioritization(Machine Learning model + Contextual Awareness)

Qualys Attack Path Discovery

Page 31: Threat Hunting with Qualys€¦ · Threat Hunting with Qualys: Going Beyond Your EDR Solutions. Adversary Threat Tactics are Changing Early 2010s Zero ... Rapidly weaponizing newly-disclosed

QUALYS SECURITY CONFERENCE 2020

Chris [email protected]

Thank You