how malops changes the game for secops and apt objective
play

How MalOPS Changes the Game for SECOPS and APT objective Case - PowerPoint PPT Presentation

How MalOPS Changes the Game for SECOPS and APT objective Case overview blackhole & APT case illustrating gap between OPS for malware vs. APT Moving toward success Visibility, Intelligence, Response Outcome-based metrics


  1. How MalOPS Changes the Game for SECOPS and APT

  2. objective • Case overview – blackhole & APT case illustrating gap between OPS for malware vs. APT • Moving toward success – Visibility, Intelligence, Response™ – Outcome-based metrics for MalOPS / APT

  3. @j_j_thompson • Hoosier native, Hawkeye alum • Former EY smoke jumping team (OCA) • ISC2 Indy, CISSP • (2) x RTW • 1.5M amex pts, 30K aa miles last month • Quadrupling size of SOC!!!! • Entrepreneur, husband, father. Infosec, cybercrime, intelligence & management consultant. Into mountaineering, hunting, fishing, shooting, photo & tactical gear. Don't blink.

  4. definitions – see next slide • APT • Hacking • Malware

  5. THIS IS CALLED HACKING case 2 - apt • Case overview – blackhole & APT case illustrating gap between OPS for malware vs. APT • Moving toward success – Visibility, Intelligence, Response™ – Outcome- based metrics™ for MalOPS / APT

  6. THIS IS APT 0. demand Wiift ? what’s in it for them? To be Promoted to a cyber Warfare unit? To make Money? To be famous? You tell me. What did your last risk assessment show would be valuable to ___ based on _____ (scenarios)?  THIS IS PART OF WHAT A RISK ASSESSMENT DOES.

  7. THIS IS CALLED MALWARE case 1 - malware • Case overview – blackhole & APT case illustrating gap between OPS for malware vs. APT • Moving toward success – Visibility, Intelligence, Response™ – Outcome- based metrics™ for MalOPS / APT From bromium.com

  8. case 1a - malware • Palo detected bh2*.jar • Policy in place, grab machine, analyze. SLA: 15m • Ran redline, gmer, sophos, kaspersky , … • Re- built user’s machine • Wish list?

  9. case 1b - malware • AL detected bh2*.jar • Alerted local IT, ran AV, nothing. • 2 hr spent on packet analysis proving not a FP • Local team asks us not to send tickets • Local team unplugs AL • Wish list?

  10. case 2 - apt • Alerted by FBI • Kernel level, blackout on HDD timeline • Compromised accounts and points of persistence • Known data exfil, visualized via netflow • Massive response effort boatloads of IOCs

  11. to success and beyond – Visibility, Intelligence, Response™ • How do you detect malware? APT? • What is the context around it that changes the approach? • How do you respond appropriately based on threat, adversary, and data at risk? – Outcome-based metrics for MalOPS / APT • Measure only if it will result in an action or change of strategy

  12. Visibility, Intelligence, Response™

  13. intelligence

  14. response

  15. response

  16. response Sanitized excerpts from Rook’s SOC Threat Classifications Table more obtained at www.rooksecurity.com

  17. response CASE: SEA targeted probe to sensitive server INCIDENT PRIORITIZATION & COMMUNICATION DATA CLASSIFICATION CATEGORY of THREAT of TARGET INTEL on ATTACKER

  18. Outcome-based metrics • Measure only if it will result in an action or change of strategy

  19. ASK questions @j_j_thompson rooksecurity.com jj@rookconsulting.com 888.712.9531

Recommend


More recommend