SlideShare une entreprise Scribd logo
1  sur  7
ADVANCED THREATS IN THE ENTERPRISE
Finding an Evil in the Haystack with RSA ECAT


 White Paper
With thousands of workstations and servers under management, most
enterprises have no way to effectively make sure they are free of malware and
other advanced threats. Today, many sophisticated, targeted attacks rely
heavily on unknown (zero-day) vulnerabilities that are delivered leveraging
social engineering tactics. Numerous hacking events made public recently
have highlighted the vulnerabilities of even the most renowned security
companies, government contractors and Fortune 500 enterprises. The problem
can affect any enterprise and a new approach to combat these threats must be
implemented in order to deal with it effectively.


EFFECTIVENESS OF CURRENT PROTECTION AND RECENT
ATTACKS
The Stuxnet worm and related targeted malware, like Duqu and Flame, show how
skilled attackers can use malware to effectively gain access to a company’s most
valuable assets. More troubling is the time it took for companies to realize they were
breached and remediate. One year after the public release of Stuxnet, Iran was still
struggling to identify and remove instances of the infection. Similarly, Flame remained
undetected for over two years.

The questions we should ask regarding these types of attacks are: “What kind of
protection was in place when the intrusions occurred and how effective was it?” Is it
reasonable to think that most compromised entities were at least protected by antivirus
(AV) and other standard security solutions? Of course, the answer is yes, virtually every
victim of targeted attacks had AV and multiple layers of other security products in place
already, and yet they were not able to effectively detect the attack.

ANTIVIRUS AND ADVANCED THREATS
AV companies use known virus signatures to identify malware. Although this technique
worked well in the past when a few thousands viruses were found in the wild each year,
it has been overwhelmed by the growth of malware families. Just one AV vendor alone
created more than 500,000 new signatures in 2010 and this flood doesn’t show any
sign of stopping. Creating signatures requires dedicated, highly skilled personnel that
can’t keep up with the pace. They will be inevitably reactive, not proactive in identifying
threats. They must focus on the most widely distributed malware and put aside those
with low distribution rates, which by definition is the case with a targeted attack.




Fig.1: Unique malware file growth 2005-2012 (Source: AV-Test malware repository)




                                                                                          2
WHAT’S THE SOLUTION?
RSA recognized the need to address the advanced threat problem with a fundamentally
different approach than traditional anti-malware solutions. The technologies and
approaches described in this whitepaper allow enterprises to answer the questions “Do
we have compromised machines and if so, how severe is the threat?” These
technologies, combined with experience working with enterprise customers worldwide,
are the foundation of RSA ECAT (Enterprise Compromise Assessment Tool), our answer
to these questions.

MALWARE DETECTION THROUGH LIVE MEMORY ANALYSIS
The cornerstone of our approach is live memory analysis. Live memory analysis is a
process by which agent software performs the analysis of a computer’s memory to find
traces of compromise and malware behavior. Contrary to the AV or IDS approach of
matching suspected malware or traffic patterns with known malware signatures, the live
memory analysis conducted by the RSA ECAT agent gives the analyst a view from a
centralized console of what is happening inside the computer’s memory. This view can
quickly expose a malware infection, regardless of whether a signature exists or not.

RSA ECAT has several advantages over traditional approaches:

Be where the action is: Most anti-malware solutions work at the computer’s internal
and external interfaces (network, disk, USB drive, email, etc.) to try and block malware.
When malware bypasses those defenses, a payload gets loaded in memory. That’s
exactly where the RSA ECAT agent resides, looking for malware footprints and
monitoring for dangerous behavior.

Monitor all network communications: Since the RSA ECAT agent is on the endpoint it
has the ability to monitor the network communications wherever the computer is. Not
only does it monitor connections when the computer is in the corporate network, it also
monitors connections if the computer is a laptop used at home or at Wi-Fi hotspots,
something appliances are not able to do because of their placement at the enterprise
network border.

In memory activity: Network communication is just one behavioral aspect of malware
and advanced threats. Many more behaviors can reside in computer memory that can be
analyzed and detected and may be more obvious than complex extrusion patterns.
Behaviors such as file hiding, key logging or code injection bubble up quickly when
performing a complete memory analysis and allow rapid malware detection.

Investigate with all the information needed: The RSA ECAT agent acts as an
extension to the analyst’s knowledge, allowing him/her to remotely access all the
information needed for the analysis, avoiding costly visits and user or server downtime.

Reduce the cost of taking action: Usually, when an abnormal event is detected, the
typical reaction is to scan the system with different commercial AV software and if
nothing is discovered, reimage the whole system. With the RSA ECAT agent, you know
exactly where the malware is installed, what files are running in memory, how they
launch at startup and how they interact with trusted applications to bypass your installed
security solution. This level of information is invaluable for remediation, incident
response and forensics.

Build knowledge about the attackers: It’s easier to find the source of an attack and
to prevent it from happening again when you have all the information pertaining to it.
With access to the offending files, it is possible to investigate how the malware got in,
how it works and to put in place the protections required to block similar attacks from
happening again.



                                                                                            3
Fig.2: Live memory view of code injected by the Stuxnet into trusted processes. This
can be automatically extracted for analysis


FIGHTING ADVANCED THREATS WITH RSA ECAT
SYSTEMATICALLY
In order to effectively detect advanced threats within the network, a systematic
approach is needed, seamlessly integrating and deploying the technologies outlined
here. RSA ECAT does exactly that. Agents can be deployed across the endpoints for
scanning and managed from a central console and server(s).

Deploying ECAT in the Enterprise




Fig.3: Architecture Diagram




                                                                                       4
Collecting Data

Either automatically or manually, the RSA ECAT agents can be instructed to perform a
scan of the system’s memory. A typical memory scan takes between 4 to 10 minutes to
complete and can be done in parallel on all systems. It can be performed as a low
priority task to avoid slowing the user applications and can be throttled to generate very
little activity.

This scan focuses on identifying the code currently running in memory and all the
programs that are configured to run automatically at startup like services and autoruns.
EXEs, DLLs and drivers are all identified and reported to the server.

Integrity Check- Finding Code Injection

Most malware rely on a decade-old technique, called code injection, to hide their
presence on a system and bypass the installed security products. Instead of creating
their own process and risk detection, malware will inject code within trusted applications
like Internet browsers or Windows services using various techniques, often evading
completely antivirus systems.

In order to detect this, all running applications are validated by comparing their memory
image to the original disk image. This technique identifies programs that have been
modified in memory and locates blocks of injected code.




Fig.4: Code Injection into Acrobat Reader using Metasploit


FINDING ANOMALIES
Aside from injecting code into applications, malware often modifies internal operating
system structures in order to hide its activity without the user or installed security
products noticing. By validating important internal kernel and application structures,
anomalies can be identified that are typically generated by malware like hooking, kernel
object modification, file/process/registry/communication hiding, and more.

Managing Suspect Files

An effective detection system must allow the analyst to quickly validate if a suspect file
is indeed malware or if it is a trusted file exposing abnormal behavior for a legitimate
purpose. For example, security or DRM software can use techniques that are similar to
those used by malware. To make a clear decision, the analyst should have as much
intelligent data as possible about the suspicious module. RSA ECAT delivers this in a
variety of ways:

– Static signature analysis: RSA ECAT integrates with antivirus multi-scanners, such
  as OPSWATTM Metascan®. Verifying a file against eight or more antivirus signature
  databases and their heuristics engines provides a fast path to identifying ‘known bad’
  files.

                                                                                             5
– Digital certificate validation: Code signature validation of the “digital stamp” on
  files published by legitimate software vendors.

– Known good hash lookup: The counterpart to verifying a file against AV signatures
  is verifying it against databases of known good files by hash match. For example, RSA
  ECAT verifies a given file by doing a hash match against several whitelists like NIST
  NSRL, Silicium’s own hash set that includes the full Microsoft file list from MSDN, and
  the Bit9 GSR.

– Environment correlation: Know where the file is installed and on how many systems
  in the scanned environment.

Once a file has been deemed good or bad, it is flagged as such and, in the case of good
files, filtered from the alerting system.

Behavior and Suspect Level

With all the information available, performing an analysis of the data from the endpoint
gives a grade of the level of suspicion, or compromise of the machine. RSA ECAT can
flag the files that are the most suspect by attributing a “Machine Suspect Level” (MSL),
a numeric indicator used to triage the potentially infected systems and prioritize the
analysis process.

Monitoring and Maintaining the Health of the Network

Once the initial assessment process is completed and the infected machines are
cleaned, scheduled scanning should be automatically performed to alert when systems
reach predetermined threshold suspect levels. RSA ECAT has a built-in scheduler for
this purpose.


KEY FEATURES OF RSA ECAT
RSA ECAT Agent

    -    Custom low-level access parsers for disk, memory access and registry access

    -    Code integrity check finds malware hiding in trusted applications, such as
         Internet Explorer

    -    Internal structures and code validation (SSDT, IAT/EAT, IDT, inline hooks,
         etc.)

    -    Remote memory dumps compatible with Volatility memory forensics
         framework

    -    Abnormal communication pattern recognition

    -    Active tracing for network connections, module loading, file access and registry
         access

    -    MFT Viewer: Locate and remotely download hacked and deleted files in a
         forensically sound manner

    -    Optional integrated remediation agent

RSA ECAT Server

    -    Integration with OPSWATTM Metascan® using 6+ antivirus engines

    -    External code-signing validation. The certificates are validated at the server
         level to avoid being fooled at the workstation level

    -    Complete enterprise environment correlation to quickly find all instances of
         malware among thousands of machines

    -    File and memory whitelisting system

    -    Built-in monitoring and alerting system

    -    NIST NSRL and Bit9 GSR whitelist integration
                                                                                            6
CONCLUSION

                  Malware authors today rely on multiple techniques and technologies to evade detection.
                  By the same token, the core of any effective security strategy is layered defense in
                  depth utilizing multiple approaches. Traditional signature-based approaches, like most
                  AV products on the market, fall short on blocking or detecting the most recent,
                  advanced threats. Comprehensive detection and remediation of advanced threats
                  requires tools like RSA ECAT, which combines the technologies and techniques
                  described above to help protect your organization against the latest threats.




                    ABOUT RSA
                    RSA, The Security Division of EMC, is the premier provider of security, risk
                    and compliance management solutions for business acceleration. RSA helps
                    the world’s leading organizations succeed by solving their most complex
                    and sensitive security challenges. These challenges include managing
                    organizational risk, safeguarding mobile access and collaboration, proving
                    compliance, and securing virtual and cloud environments.

                    Combining business-critical controls in identity assurance, encryption &
                    key management, SIEM, Data Loss Prevention and Fraud Protection with
                    industry leading eGRC capabilities and robust consulting services, RSA
                    brings visibility and trust to millions of user identities, the transactions that
                    they perform and the data that is generated. For more information, please
                    visit www.RSA.com and www.EMC.com.




                   EMC2, EMC, RSA and the RSA logo are registered trademarks or trademarks of EMC Corporation in the
                   United States and other countries. All other trademarks used herein are the property of their respective
                   owners. ©2012 EMC Corporation. All rights reserved. Published in the USA.
www.emc.com/rsa

Contenu connexe

Tendances

Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalJerome Chapolard
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalCMR WORLD TECH
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMAlienVault
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516Yasser Mohammed
 
Panda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malwarePanda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malwarePanda Security
 
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Hands on Security, Disrupting the Kill Chain, SplunkLive! AustinHands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Hands on Security, Disrupting the Kill Chain, SplunkLive! AustinSplunk
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM AlienVault
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0James Perry, Jr.
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperBhagyashri Chalakh
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through CorrelationAnton Chuvakin
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability AssesmentDedi Dwianto
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 

Tendances (17)

Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_final
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USM
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
 
Panda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malwarePanda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malware
 
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Hands on Security, Disrupting the Kill Chain, SplunkLive! AustinHands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
 
NetWitness
NetWitnessNetWitness
NetWitness
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 
Malware detection
Malware detectionMalware detection
Malware detection
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 

Similaire à Advanced Threats in the Enterprise: Finding an Evil in the Haystack

Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And RiskChandrashekhar B
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and RiskSecPod Technologies
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools usedZoe Gilbert
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....Research Publish Journals (Publisher)
 
Security threats explained
Security threats explained Security threats explained
Security threats explained Abhijeet Karve
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisAntonio Parata
 
Iaetsd evasive security using ac ls on threads
Iaetsd evasive security using ac ls on threadsIaetsd evasive security using ac ls on threads
Iaetsd evasive security using ac ls on threadsIaetsd Iaetsd
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...IJNSA Journal
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023SofiaCarter4
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Akash Karwande
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security ControlsCasey Wimmer
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecCMR WORLD TECH
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecErfan Mallick
 

Similaire à Advanced Threats in the Enterprise: Finding an Evil in the Haystack (20)

Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
Information Security 201
Information Security 201Information Security 201
Information Security 201
 
185
185185
185
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware Analysis
 
Iaetsd evasive security using ac ls on threads
Iaetsd evasive security using ac ls on threadsIaetsd evasive security using ac ls on threads
Iaetsd evasive security using ac ls on threads
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security Controls
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 

Plus de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Plus de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Dernier

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 

Dernier (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 

Advanced Threats in the Enterprise: Finding an Evil in the Haystack

  • 1. ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper
  • 2. With thousands of workstations and servers under management, most enterprises have no way to effectively make sure they are free of malware and other advanced threats. Today, many sophisticated, targeted attacks rely heavily on unknown (zero-day) vulnerabilities that are delivered leveraging social engineering tactics. Numerous hacking events made public recently have highlighted the vulnerabilities of even the most renowned security companies, government contractors and Fortune 500 enterprises. The problem can affect any enterprise and a new approach to combat these threats must be implemented in order to deal with it effectively. EFFECTIVENESS OF CURRENT PROTECTION AND RECENT ATTACKS The Stuxnet worm and related targeted malware, like Duqu and Flame, show how skilled attackers can use malware to effectively gain access to a company’s most valuable assets. More troubling is the time it took for companies to realize they were breached and remediate. One year after the public release of Stuxnet, Iran was still struggling to identify and remove instances of the infection. Similarly, Flame remained undetected for over two years. The questions we should ask regarding these types of attacks are: “What kind of protection was in place when the intrusions occurred and how effective was it?” Is it reasonable to think that most compromised entities were at least protected by antivirus (AV) and other standard security solutions? Of course, the answer is yes, virtually every victim of targeted attacks had AV and multiple layers of other security products in place already, and yet they were not able to effectively detect the attack. ANTIVIRUS AND ADVANCED THREATS AV companies use known virus signatures to identify malware. Although this technique worked well in the past when a few thousands viruses were found in the wild each year, it has been overwhelmed by the growth of malware families. Just one AV vendor alone created more than 500,000 new signatures in 2010 and this flood doesn’t show any sign of stopping. Creating signatures requires dedicated, highly skilled personnel that can’t keep up with the pace. They will be inevitably reactive, not proactive in identifying threats. They must focus on the most widely distributed malware and put aside those with low distribution rates, which by definition is the case with a targeted attack. Fig.1: Unique malware file growth 2005-2012 (Source: AV-Test malware repository) 2
  • 3. WHAT’S THE SOLUTION? RSA recognized the need to address the advanced threat problem with a fundamentally different approach than traditional anti-malware solutions. The technologies and approaches described in this whitepaper allow enterprises to answer the questions “Do we have compromised machines and if so, how severe is the threat?” These technologies, combined with experience working with enterprise customers worldwide, are the foundation of RSA ECAT (Enterprise Compromise Assessment Tool), our answer to these questions. MALWARE DETECTION THROUGH LIVE MEMORY ANALYSIS The cornerstone of our approach is live memory analysis. Live memory analysis is a process by which agent software performs the analysis of a computer’s memory to find traces of compromise and malware behavior. Contrary to the AV or IDS approach of matching suspected malware or traffic patterns with known malware signatures, the live memory analysis conducted by the RSA ECAT agent gives the analyst a view from a centralized console of what is happening inside the computer’s memory. This view can quickly expose a malware infection, regardless of whether a signature exists or not. RSA ECAT has several advantages over traditional approaches: Be where the action is: Most anti-malware solutions work at the computer’s internal and external interfaces (network, disk, USB drive, email, etc.) to try and block malware. When malware bypasses those defenses, a payload gets loaded in memory. That’s exactly where the RSA ECAT agent resides, looking for malware footprints and monitoring for dangerous behavior. Monitor all network communications: Since the RSA ECAT agent is on the endpoint it has the ability to monitor the network communications wherever the computer is. Not only does it monitor connections when the computer is in the corporate network, it also monitors connections if the computer is a laptop used at home or at Wi-Fi hotspots, something appliances are not able to do because of their placement at the enterprise network border. In memory activity: Network communication is just one behavioral aspect of malware and advanced threats. Many more behaviors can reside in computer memory that can be analyzed and detected and may be more obvious than complex extrusion patterns. Behaviors such as file hiding, key logging or code injection bubble up quickly when performing a complete memory analysis and allow rapid malware detection. Investigate with all the information needed: The RSA ECAT agent acts as an extension to the analyst’s knowledge, allowing him/her to remotely access all the information needed for the analysis, avoiding costly visits and user or server downtime. Reduce the cost of taking action: Usually, when an abnormal event is detected, the typical reaction is to scan the system with different commercial AV software and if nothing is discovered, reimage the whole system. With the RSA ECAT agent, you know exactly where the malware is installed, what files are running in memory, how they launch at startup and how they interact with trusted applications to bypass your installed security solution. This level of information is invaluable for remediation, incident response and forensics. Build knowledge about the attackers: It’s easier to find the source of an attack and to prevent it from happening again when you have all the information pertaining to it. With access to the offending files, it is possible to investigate how the malware got in, how it works and to put in place the protections required to block similar attacks from happening again. 3
  • 4. Fig.2: Live memory view of code injected by the Stuxnet into trusted processes. This can be automatically extracted for analysis FIGHTING ADVANCED THREATS WITH RSA ECAT SYSTEMATICALLY In order to effectively detect advanced threats within the network, a systematic approach is needed, seamlessly integrating and deploying the technologies outlined here. RSA ECAT does exactly that. Agents can be deployed across the endpoints for scanning and managed from a central console and server(s). Deploying ECAT in the Enterprise Fig.3: Architecture Diagram 4
  • 5. Collecting Data Either automatically or manually, the RSA ECAT agents can be instructed to perform a scan of the system’s memory. A typical memory scan takes between 4 to 10 minutes to complete and can be done in parallel on all systems. It can be performed as a low priority task to avoid slowing the user applications and can be throttled to generate very little activity. This scan focuses on identifying the code currently running in memory and all the programs that are configured to run automatically at startup like services and autoruns. EXEs, DLLs and drivers are all identified and reported to the server. Integrity Check- Finding Code Injection Most malware rely on a decade-old technique, called code injection, to hide their presence on a system and bypass the installed security products. Instead of creating their own process and risk detection, malware will inject code within trusted applications like Internet browsers or Windows services using various techniques, often evading completely antivirus systems. In order to detect this, all running applications are validated by comparing their memory image to the original disk image. This technique identifies programs that have been modified in memory and locates blocks of injected code. Fig.4: Code Injection into Acrobat Reader using Metasploit FINDING ANOMALIES Aside from injecting code into applications, malware often modifies internal operating system structures in order to hide its activity without the user or installed security products noticing. By validating important internal kernel and application structures, anomalies can be identified that are typically generated by malware like hooking, kernel object modification, file/process/registry/communication hiding, and more. Managing Suspect Files An effective detection system must allow the analyst to quickly validate if a suspect file is indeed malware or if it is a trusted file exposing abnormal behavior for a legitimate purpose. For example, security or DRM software can use techniques that are similar to those used by malware. To make a clear decision, the analyst should have as much intelligent data as possible about the suspicious module. RSA ECAT delivers this in a variety of ways: – Static signature analysis: RSA ECAT integrates with antivirus multi-scanners, such as OPSWATTM Metascan®. Verifying a file against eight or more antivirus signature databases and their heuristics engines provides a fast path to identifying ‘known bad’ files. 5
  • 6. – Digital certificate validation: Code signature validation of the “digital stamp” on files published by legitimate software vendors. – Known good hash lookup: The counterpart to verifying a file against AV signatures is verifying it against databases of known good files by hash match. For example, RSA ECAT verifies a given file by doing a hash match against several whitelists like NIST NSRL, Silicium’s own hash set that includes the full Microsoft file list from MSDN, and the Bit9 GSR. – Environment correlation: Know where the file is installed and on how many systems in the scanned environment. Once a file has been deemed good or bad, it is flagged as such and, in the case of good files, filtered from the alerting system. Behavior and Suspect Level With all the information available, performing an analysis of the data from the endpoint gives a grade of the level of suspicion, or compromise of the machine. RSA ECAT can flag the files that are the most suspect by attributing a “Machine Suspect Level” (MSL), a numeric indicator used to triage the potentially infected systems and prioritize the analysis process. Monitoring and Maintaining the Health of the Network Once the initial assessment process is completed and the infected machines are cleaned, scheduled scanning should be automatically performed to alert when systems reach predetermined threshold suspect levels. RSA ECAT has a built-in scheduler for this purpose. KEY FEATURES OF RSA ECAT RSA ECAT Agent - Custom low-level access parsers for disk, memory access and registry access - Code integrity check finds malware hiding in trusted applications, such as Internet Explorer - Internal structures and code validation (SSDT, IAT/EAT, IDT, inline hooks, etc.) - Remote memory dumps compatible with Volatility memory forensics framework - Abnormal communication pattern recognition - Active tracing for network connections, module loading, file access and registry access - MFT Viewer: Locate and remotely download hacked and deleted files in a forensically sound manner - Optional integrated remediation agent RSA ECAT Server - Integration with OPSWATTM Metascan® using 6+ antivirus engines - External code-signing validation. The certificates are validated at the server level to avoid being fooled at the workstation level - Complete enterprise environment correlation to quickly find all instances of malware among thousands of machines - File and memory whitelisting system - Built-in monitoring and alerting system - NIST NSRL and Bit9 GSR whitelist integration 6
  • 7. CONCLUSION Malware authors today rely on multiple techniques and technologies to evade detection. By the same token, the core of any effective security strategy is layered defense in depth utilizing multiple approaches. Traditional signature-based approaches, like most AV products on the market, fall short on blocking or detecting the most recent, advanced threats. Comprehensive detection and remediation of advanced threats requires tools like RSA ECAT, which combines the technologies and techniques described above to help protect your organization against the latest threats. ABOUT RSA RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world’s leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention and Fraud Protection with industry leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.RSA.com and www.EMC.com. EMC2, EMC, RSA and the RSA logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. ©2012 EMC Corporation. All rights reserved. Published in the USA. www.emc.com/rsa