Zero day attacks anatomy
& countermeasures
By
Cade Zvavanjanja
Cybersecurity Strategist
Question?
• How do you secure against something
Your security system can’t capture, your
experts don’t know , your vendors don’t
know and the tech community doesn’t
know?
~ Which is only known by the attacker(s)!
Outline:
• Key terms
• Anatomy of Zero days
• Attack methodology
• Zero day attack(s) Countermeasures
• Way forward
• Economics of cybersecurity
• Q & A
• References
Key term(s):
• Zero-day exploits are cyber-attacks against
software/hardware vulnerabilities that are
unknown and have no patch or fix.
Introduction:
•Traditional security tools rely on malware
binary signatures or the reputation of
outside URLs and servers. By definition,
these defenses identify only known,
confirmed threats.
•At the same time, operating system-level
protections such as Address Space Layout
Randomization (ASLR) and Data Execution
Prevention (DEP) are becoming less
effective
Intro Cont….
•An attacker can easily hijack a legitimate
website to bypass a blacklist.
•Code morphing and obfuscation techniques
generate new malware variants faster than
traditional security firms can generate new
signatures.
•And spam filters will not stop lowvolume,
targeted spear-phishing attacks.
•ASLR bypassing methods to neutere once-
effective safeguard.
Intro Cont….
• Zero day attacks are rising in prominence
• They tend to be behind the most
devastating attacks these days
• Generally used by very high end criminals
and nation states
• You usually don’t know about
the attack unless there are other
indicators
Key term(s)
Lifespan of Zero-day:
•typical zero-day attack lasts an average of
eight months—and can last close to three
years in some cases. That gives attacks
ample time to steal organizations’ most
valuable assets and leave before anyone
knows what happened.
•Not surprisingly, zero-day exploits are
heavily used in targeted attacks. These
secret weapons give attackers a crucial
advantage over their targets.
comesa cybersecurity
Zero Day Anatomy
Introduction
Threat landscape:
Countermeasures:
comesa cybersecurity
comesa cybersecurity
Way Forward
Economics of Cybersecurity
• What is the ratio between events received
and action taken?
• What is the efficacy level in the events &
incidents you identify (i.e. the real cyber
attack event to false positive ratio)?
• How many cycles do you iterate through to
get from an event(s) to an action; is it
timely and cost efficient? (Can you rank
the processes/tools you leverage today in
terms of man-hours and skills required to
get to to action?)
• Do you align, prioritize and qualify events
against against business goals and impact
(How many cycles does this take)?
• Make the assessment using the
framework & success criteria below to
evaluate the key time and cost multipliers
in your event/incident security process, so
you can validate the economic value that
comes from the processes and tools you
leverage today, to see which are effective
and which are not?
Q& A: Thank You
Cade Zvavanjanja
Director - Zimbabwe Cybersecurity
Center
cadezvavanjanja@gmail.com
+263 773796365
References
•Zero Day Malware Threat Prevention Ensuring Document Safety with Outside
In Clean Content Oracle brief | july 2015
•The Best Defenses Against Zero-day Exploits for Various-sized Organizations
SANS I September 21st 2014: David Hammarberg
•http://www.trapx.com/wp-content/uploads/2015/02/Anatomy-of-
Attack__Zombie-Zero.pdf
•http://www.industryweek.com/rockwell-connected-industrial-enterprise/cyber-
threats-hiding-targeting-valuable-assets
• Internet Security Threat ReportInternet Report Symatic, APRIL 2016
•https://www2.fireeye.com/rs/848-DID-242/images/wp-zero-day-danger.pdf
• k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown
Attacks
•A Review on Zero Day Attack Safety Using Different Scenarios 2015 Harshpal
R Gosavi and Anant M Bagade
•Detection and Prevention of Unknown Vulnerabilities on Enterprise IP
Networks IJRITCC | February 2015, Vincy Rose Chacko
• Regulating the zero-day vulnerability trade: a preliminary analysis 2014:
mailyn fidler

More Related Content

PPT
Cyber Security 2016 Cade Zvavanjanja1
PPTX
Cyber Threat Intelligence Solution Demonstration
PPTX
Security Analytics Beyond Cyber
PDF
Enumerating your shadow it attack surface
PPTX
6 Steps for Operationalizing Threat Intelligence
PPTX
SurfWatch Labs Threat Intelligence Solution Demo
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PPTX
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
Cyber Security 2016 Cade Zvavanjanja1
Cyber Threat Intelligence Solution Demonstration
Security Analytics Beyond Cyber
Enumerating your shadow it attack surface
6 Steps for Operationalizing Threat Intelligence
SurfWatch Labs Threat Intelligence Solution Demo
Threat Intelligence 101 - Steve Lodin - Submitted
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk

What's hot (20)

PPTX
How to Mitigate Risk From Your Expanding Digital Presence
PDF
Vulnerability management - beyond scanning
PPTX
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
PPTX
Threat intelligence in security
PPTX
Cyber Threat Intelligence: Building and maturing an intelligence program that...
PPTX
Your cyber security webinar
PPTX
Cloud Storage and Security: Solving Compliance Challenges
PDF
Proactive Defense: Understanding the 4 Main Threat Actor Types
PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
PDF
4 Rules for Successful Threat Intelligence Teams
PDF
Pitfalls of Cyber Data
PDF
Cyber Threat Intelligence
PPTX
Roadmap to security operations excellence
PDF
Top 6 Sources for Identifying Threat Actor TTPs
PPTX
Ethical hacking concept-Part 1
PDF
Chapter 15 incident handling
PDF
Threat Intelligence Tweaks That'll Take Your Security to the Next Level
PDF
Improve Your Threat Intelligence Strategy With These Ideas
PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
PDF
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
How to Mitigate Risk From Your Expanding Digital Presence
Vulnerability management - beyond scanning
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Threat intelligence in security
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Your cyber security webinar
Cloud Storage and Security: Solving Compliance Challenges
Proactive Defense: Understanding the 4 Main Threat Actor Types
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
4 Rules for Successful Threat Intelligence Teams
Pitfalls of Cyber Data
Cyber Threat Intelligence
Roadmap to security operations excellence
Top 6 Sources for Identifying Threat Actor TTPs
Ethical hacking concept-Part 1
Chapter 15 incident handling
Threat Intelligence Tweaks That'll Take Your Security to the Next Level
Improve Your Threat Intelligence Strategy With These Ideas
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Ad

Similar to comesa cybersecurity (20)

PDF
What Role Do Zero-Day Vulnerabilities Play In Modern Security Solutions?
PDF
Glasswall - How to Prevent, Detect and React to Ransomware incidents
PDF
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
PPTX
Battlefield network
PDF
Stopping zero day threats
PDF
What Is a Zero-Day Vulnerability? How It
PDF
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
PPTX
Janitor vs cleaner
DOCX
Zero-Day Vulnerability and Heuristic Analysis
PPTX
Cyber-Espionage: Understanding the Advanced Threat Landscape
PPTX
Taking the Attacker Eviction Red Pill [updated]
PDF
Zero Day Vulnerabilities: A threat to security.
PPTX
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
PDF
Cehv8 module 01 introduction to ethical hacking
PDF
CSF18 - Guarding Against the Unknown - Rafael Narezzi
PDF
The Aftermath: You Have Been Attacked! So what's next?
PPTX
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
PDF
Cyber security series advanced persistent threats
PDF
Check point 2015-securityreport
What Role Do Zero-Day Vulnerabilities Play In Modern Security Solutions?
Glasswall - How to Prevent, Detect and React to Ransomware incidents
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
Battlefield network
Stopping zero day threats
What Is a Zero-Day Vulnerability? How It
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Janitor vs cleaner
Zero-Day Vulnerability and Heuristic Analysis
Cyber-Espionage: Understanding the Advanced Threat Landscape
Taking the Attacker Eviction Red Pill [updated]
Zero Day Vulnerabilities: A threat to security.
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
Cehv8 module 01 introduction to ethical hacking
CSF18 - Guarding Against the Unknown - Rafael Narezzi
The Aftermath: You Have Been Attacked! So what's next?
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
Cyber security series advanced persistent threats
Check point 2015-securityreport
Ad

More from Cade Zvavanjanja (9)

PPT
Cade zvavanjanja saigf cybercrime & security online
PPT
Cade zvavanjanja iot afigf online
PPT
A case for multi-stakeholder cybersecurity by zvavanjanja
PDF
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
PPT
Cloud computing & service level agreements
PPT
Web application attacks using Sql injection and countermasures
PPT
Introduction to IT Security
PPTX
Gainful Information Security 2012 services
PDF
Top online frauds 2010
Cade zvavanjanja saigf cybercrime & security online
Cade zvavanjanja iot afigf online
A case for multi-stakeholder cybersecurity by zvavanjanja
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Cloud computing & service level agreements
Web application attacks using Sql injection and countermasures
Introduction to IT Security
Gainful Information Security 2012 services
Top online frauds 2010

comesa cybersecurity

  • 1. Zero day attacks anatomy & countermeasures By Cade Zvavanjanja Cybersecurity Strategist
  • 2. Question? • How do you secure against something Your security system can’t capture, your experts don’t know , your vendors don’t know and the tech community doesn’t know? ~ Which is only known by the attacker(s)!
  • 3. Outline: • Key terms • Anatomy of Zero days • Attack methodology • Zero day attack(s) Countermeasures • Way forward • Economics of cybersecurity • Q & A • References
  • 4. Key term(s): • Zero-day exploits are cyber-attacks against software/hardware vulnerabilities that are unknown and have no patch or fix.
  • 5. Introduction: •Traditional security tools rely on malware binary signatures or the reputation of outside URLs and servers. By definition, these defenses identify only known, confirmed threats. •At the same time, operating system-level protections such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) are becoming less effective
  • 6. Intro Cont…. •An attacker can easily hijack a legitimate website to bypass a blacklist. •Code morphing and obfuscation techniques generate new malware variants faster than traditional security firms can generate new signatures. •And spam filters will not stop lowvolume, targeted spear-phishing attacks. •ASLR bypassing methods to neutere once- effective safeguard.
  • 7. Intro Cont…. • Zero day attacks are rising in prominence • They tend to be behind the most devastating attacks these days • Generally used by very high end criminals and nation states • You usually don’t know about the attack unless there are other indicators
  • 9. Lifespan of Zero-day: •typical zero-day attack lasts an average of eight months—and can last close to three years in some cases. That gives attacks ample time to steal organizations’ most valuable assets and leave before anyone knows what happened. •Not surprisingly, zero-day exploits are heavily used in targeted attacks. These secret weapons give attackers a crucial advantage over their targets.
  • 19. • What is the ratio between events received and action taken? • What is the efficacy level in the events & incidents you identify (i.e. the real cyber attack event to false positive ratio)? • How many cycles do you iterate through to get from an event(s) to an action; is it timely and cost efficient? (Can you rank the processes/tools you leverage today in terms of man-hours and skills required to get to to action?)
  • 20. • Do you align, prioritize and qualify events against against business goals and impact (How many cycles does this take)? • Make the assessment using the framework & success criteria below to evaluate the key time and cost multipliers in your event/incident security process, so you can validate the economic value that comes from the processes and tools you leverage today, to see which are effective and which are not?
  • 21. Q& A: Thank You Cade Zvavanjanja Director - Zimbabwe Cybersecurity Center cadezvavanjanja@gmail.com +263 773796365
  • 22. References •Zero Day Malware Threat Prevention Ensuring Document Safety with Outside In Clean Content Oracle brief | july 2015 •The Best Defenses Against Zero-day Exploits for Various-sized Organizations SANS I September 21st 2014: David Hammarberg •http://www.trapx.com/wp-content/uploads/2015/02/Anatomy-of- Attack__Zombie-Zero.pdf •http://www.industryweek.com/rockwell-connected-industrial-enterprise/cyber- threats-hiding-targeting-valuable-assets • Internet Security Threat ReportInternet Report Symatic, APRIL 2016 •https://www2.fireeye.com/rs/848-DID-242/images/wp-zero-day-danger.pdf • k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks •A Review on Zero Day Attack Safety Using Different Scenarios 2015 Harshpal R Gosavi and Anant M Bagade •Detection and Prevention of Unknown Vulnerabilities on Enterprise IP Networks IJRITCC | February 2015, Vincy Rose Chacko • Regulating the zero-day vulnerability trade: a preliminary analysis 2014: mailyn fidler