01.03.2019 Views

CDM-CYBER-DEFENSE-eMAGAZINE-March-2019

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

solutions simply played or executed this zero-day-file that was not seen before in a safe<br />

environment where its behavior was analyzed to see if it displayed malicious behavior. Likewise,<br />

machine learning was used to look at files that have taken source code from a known exploit but<br />

changed the code a bit to create a new executable and hence a new hash. This form of attack,<br />

where you changed a known malware slightly to create a brand-new malware with a new hash<br />

value, but the source code was essentially the same, was called polymorphism.<br />

The Birth of Endpoint Detection and Response (EDR)<br />

The security industry changed with Operation Aurora, a series of cyber-attacks conducted against<br />

well-known technology companies by a nation state. Operation Aurora exploited a well-known<br />

vulnerability in Internet Explorer to spawn a PowerShell that could be used to execute commands<br />

on the target system. The earlier approach of checking file hashes would not have worked as<br />

Internet Explorer and PowerShell are legitimate commands; it is the sequence that is illegitimate.<br />

A browser could spawn another browser, it could spawn a music player but should not be<br />

spawning a power-shell under normal circumstances.<br />

The rise of nation state attackers who kept infiltrating each other’s private enterprise and critical<br />

sectors such as finance and energy contributed to this trend.<br />

Endpoint detection and response tools work by monitoring endpoint and network events and<br />

recording the information in a central database where further analysis, detection, investigation,<br />

reporting, and alerting take place. Endpoint Detection and Response solutions had four<br />

components:<br />

1. Detection<br />

2. Threat hunting<br />

3. Response & Remediation<br />

4. Managed Services<br />

It all starts by recording everything at the endpoint – every file access, every registry call and<br />

every network connection was recorded from the endpoint and sent to the cloud. These actions<br />

were stitched together and scanned to see if there were malicious or suspicious sequences of<br />

activities, such as an internet browser spawning a PowerShell. Likewise, an attacker running port<br />

scans and scanning systems laterally using known windows utilities would evade signature<br />

defenses but be caught by an endpoint detection and response system as his behavior would<br />

trigger an alarm.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!