SlideShare a Scribd company logo
Live Demo: How to Detect Data
Exfiltration & System Compromise
About AlienVault
AlienVault has unified the security products, intelligence and
community essential for mid-sized businesses to defend against
today’s modern threats
Introductions
Garrett Gross
Sr. Technical Product Marketing Mgr
Mark Allen
Technical Sales Engineer
Agenda
• The changing threat landscape
• Data infiltration methods
• Data exfiltration methods
• Tips to mitigate these threats
• Demo: using USM to detect system compromise
• Correlation directives
• Incident investigation
• More and more organizations are finding
themselves in the crosshairs of various bad
actors for a variety of reasons.
• The number of organizations experiencing high
profile breaches is unprecedented.
• The “security arms race” cannot continue
indefinitely as the economics of securing your
organization is stacked so heavily in favor of
those launching attacks that incremental
security investments are seen as impractical.
Threat landscape: Our new reality
84%
of organizations breached
had evidence of the
breach in their log files…
Source: Verizon Data Breach Report, 2014
“There are two types of companies that use
computers. Victims of crime that know they are
victims of crime and victims of crime that don’t
have a clue yet.”
- James Routh, 2007
CISO Depository Trust Clearing Corporation
Prevention is elusive
How to Detect System Compromise & Data Exfiltration with AlienVault USM
“How would you change your strategy if you
knew for certain that you were going to be
compromised?”
- Martin Roesch, 2013
Founder & CTO Sourcefire, Author SNORT
Infiltration (How they get in)
• Man in the middle
• Ad-hoc methods (sniffin packets)
• Purpose-built devices (wifi pineapple)
• Social Engineering
• Easier than you think (who has the keys to your castle?)
• Brute Force password enumeration
• Used in iCloud hack
• Watering Hole/Drive by/Spearphishing
• Deploying RootKits/Trojans
Exfiltration (How they get it out)
• Simple encrypted transmission
• HTTP/HTTP
• Posting to WordPress or other sites
• FTP/SFTP/SCP
• Slow & low
• Hide & Seek
• Images
• Video
• Audio (via VOIP)
• New Methods created every day
Prevent Detect & Respond
The basics are in
place for most
companies…but
this alone is a
‘proven’ failed
strategy.
New capabilities to develop
Get (Very) good at detection & response
Mitigation
• Educate your users to prevent
• Phishing, Social Engineering, etc
• Monitoring
• Netflow/Sflow
• Service Availability
• Direct Monitoring of traffic
• Tagging
• Prevention at proxy level to detect sensitive docs
• Identification of known bad actors
Firewalls/Antivirus are not enough
• Firewalls are usually not the target – too difficult to effectively penetrate
• Endpoints are the target, usually via email, url redirects, misc malicious
files, etc.
• With 160,000 new malware
samples seen every day,
antivirus apps will not find
every threat
• Needs to be bolstered by
regular and comprehensive
monitoring
@AlienVault
Asset Discovery
• Active Network Scanning
• Passive Network Scanning
• Asset Inventory
• Host-based Software
Inventory
Vulnerability Assessment
• Network Vulnerability Testing
• Remediation Verification
Threat Detection
• Network IDS
• Host IDS
• Wireless IDS
• File Integrity Monitoring
Behavioral Monitoring
• Log Collection
• Netflow Analysis
• Service Availability Monitoring
Security Intelligence
• SIEM Event Correlation
• Incident Response
AlienVault Labs Threat Intelligence
• Weekly updates to correlation directives to detect emerging threats
• Recent updates related to data exfiltration methods:
• AV Malware, Ajax Security Team Data
Exfiltration
• AV Malware, Operation Machete FTP
exfiltration
• AV attack, malware sending exfiltrating
command output
Now for some Q&A…
Test Drive AlienVault USM
Download a Free 30-Day Trial
http://www.alienvault.com/free-trial
Try our Interactive Demo Site
http://www.alienvault.com/live-demo-site
Questions? hello@alienvault.com

More Related Content

PPTX
How to Detect a Cryptolocker Infection with AlienVault USM
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
Alienvault threat alerts in spiceworks
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
PPTX
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
PPTX
Demo how to detect ransomware with alien vault usm_gg
PPTX
Malware detection how to spot infections early with alien vault usm
How to Detect a Cryptolocker Infection with AlienVault USM
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
Alienvault threat alerts in spiceworks
Improve Situational Awareness for Federal Government with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Demo how to detect ransomware with alien vault usm_gg
Malware detection how to spot infections early with alien vault usm

What's hot (20)

PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PPTX
How to Detect SQL Injections & XSS Attacks with AlienVault USM
PPTX
Improve threat detection with hids and alien vault usm
PPTX
How Malware Works
PPTX
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PPTX
Incident response live demo slides final
PPTX
Six Steps to SIEM Success
PPTX
Vulnerability Assessment
PPTX
Vulnerability assessment & Penetration testing Basics
PPTX
Creating Correlation Rules in AlienVault
PPTX
Simplify PCI DSS Compliance with AlienVault USM
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PPT
Safeguard your enterprise against ransomware
PDF
Open Source IDS Tools: A Beginner's Guide
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPTX
Ransomware Detection: Don’t Pay Up. Backup.
PDF
Alien vault sans cyber threat intelligence
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
How to Detect SQL Injections & XSS Attacks with AlienVault USM
Improve threat detection with hids and alien vault usm
How Malware Works
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Improve Threat Detection with OSSEC and AlienVault USM
Incident response live demo slides final
Six Steps to SIEM Success
Vulnerability Assessment
Vulnerability assessment & Penetration testing Basics
Creating Correlation Rules in AlienVault
Simplify PCI DSS Compliance with AlienVault USM
How to Solve Your Top IT Security Reporting Challenges with AlienVault
Safeguard your enterprise against ransomware
Open Source IDS Tools: A Beginner's Guide
VAPT - Vulnerability Assessment & Penetration Testing
Ransomware Detection: Don’t Pay Up. Backup.
Alien vault sans cyber threat intelligence
Ad

Viewers also liked (7)

PPTX
Advanced OSSEC Training: Integration Strategies for Open Source Security
PPTX
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
PPTX
Otx introduction sw
PPTX
The Evolution of IDS: Why Context is Key
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PPTX
SIEM 101: Get a Clue About IT Security Analysis
Advanced OSSEC Training: Integration Strategies for Open Source Security
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
Otx introduction sw
The Evolution of IDS: Why Context is Key
Improve Security Visibility with AlienVault USM Correlation Directives
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
SIEM 101: Get a Clue About IT Security Analysis
Ad

Similar to How to Detect System Compromise & Data Exfiltration with AlienVault USM (20)

PPTX
Cyber Security and Data Privacy in Information Systems.pptx
PPTX
Security in the enterprise - Why You Need It
PPTX
APT in the Financial Sector
PDF
Unifica la seguridad de tus operaciones con la plataforma de Cortex XDR
PDF
File000119
PPSX
Cyber Security Awareness Month 2017-Nugget 6
PDF
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
PDF
Offensive malware usage and defense
PPTX
The Evolution of Cybercrime
PPTX
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
PPTX
Cyber Security MCQ/Interview Questions - TpointTech
PDF
Stopping zero day threats
PPSX
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
PDF
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
PPTX
Spice world 2014 hacker smackdown
PPTX
LIS3353 SP12 Week 9
PDF
Declaration of Mal(WAR)e
PPTX
The Threat Is Real. Protect Yourself.
PDF
Microsoft Avanced Threat Analytics
Cyber Security and Data Privacy in Information Systems.pptx
Security in the enterprise - Why You Need It
APT in the Financial Sector
Unifica la seguridad de tus operaciones con la plataforma de Cortex XDR
File000119
Cyber Security Awareness Month 2017-Nugget 6
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Offensive malware usage and defense
The Evolution of Cybercrime
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
Cyber Security MCQ/Interview Questions - TpointTech
Stopping zero day threats
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Spice world 2014 hacker smackdown
LIS3353 SP12 Week 9
Declaration of Mal(WAR)e
The Threat Is Real. Protect Yourself.
Microsoft Avanced Threat Analytics

More from AlienVault (9)

PDF
Malware Invaders - Is Your OS at Risk?
PDF
Insider Threat Detection Recommendations
PDF
Security operations center 5 security controls
PDF
PCI DSS Implementation: A Five Step Guide
PDF
The State of Incident Response - INFOGRAPHIC
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
PPTX
Best Practices for Configuring Your OSSIM Installation
PPTX
Security by Collaboration: Rethinking Red Teams versus Blue Teams
PPTX
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
Malware Invaders - Is Your OS at Risk?
Insider Threat Detection Recommendations
Security operations center 5 security controls
PCI DSS Implementation: A Five Step Guide
The State of Incident Response - INFOGRAPHIC
AWS Security Best Practices for Effective Threat Detection & Response
Best Practices for Configuring Your OSSIM Installation
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
Review of recent advances in non-invasive hemoglobin estimation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cuic standard and advanced reporting.pdf
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Monthly Chronicles - July 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Reach Out and Touch Someone: Haptics and Empathic Computing
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf

How to Detect System Compromise & Data Exfiltration with AlienVault USM

  • 1. Live Demo: How to Detect Data Exfiltration & System Compromise
  • 2. About AlienVault AlienVault has unified the security products, intelligence and community essential for mid-sized businesses to defend against today’s modern threats
  • 3. Introductions Garrett Gross Sr. Technical Product Marketing Mgr Mark Allen Technical Sales Engineer
  • 4. Agenda • The changing threat landscape • Data infiltration methods • Data exfiltration methods • Tips to mitigate these threats • Demo: using USM to detect system compromise • Correlation directives • Incident investigation
  • 5. • More and more organizations are finding themselves in the crosshairs of various bad actors for a variety of reasons. • The number of organizations experiencing high profile breaches is unprecedented. • The “security arms race” cannot continue indefinitely as the economics of securing your organization is stacked so heavily in favor of those launching attacks that incremental security investments are seen as impractical. Threat landscape: Our new reality 84% of organizations breached had evidence of the breach in their log files… Source: Verizon Data Breach Report, 2014
  • 6. “There are two types of companies that use computers. Victims of crime that know they are victims of crime and victims of crime that don’t have a clue yet.” - James Routh, 2007 CISO Depository Trust Clearing Corporation Prevention is elusive
  • 8. “How would you change your strategy if you knew for certain that you were going to be compromised?” - Martin Roesch, 2013 Founder & CTO Sourcefire, Author SNORT
  • 9. Infiltration (How they get in) • Man in the middle • Ad-hoc methods (sniffin packets) • Purpose-built devices (wifi pineapple) • Social Engineering • Easier than you think (who has the keys to your castle?) • Brute Force password enumeration • Used in iCloud hack • Watering Hole/Drive by/Spearphishing • Deploying RootKits/Trojans
  • 10. Exfiltration (How they get it out) • Simple encrypted transmission • HTTP/HTTP • Posting to WordPress or other sites • FTP/SFTP/SCP • Slow & low • Hide & Seek • Images • Video • Audio (via VOIP) • New Methods created every day
  • 11. Prevent Detect & Respond The basics are in place for most companies…but this alone is a ‘proven’ failed strategy. New capabilities to develop Get (Very) good at detection & response
  • 12. Mitigation • Educate your users to prevent • Phishing, Social Engineering, etc • Monitoring • Netflow/Sflow • Service Availability • Direct Monitoring of traffic • Tagging • Prevention at proxy level to detect sensitive docs • Identification of known bad actors
  • 13. Firewalls/Antivirus are not enough • Firewalls are usually not the target – too difficult to effectively penetrate • Endpoints are the target, usually via email, url redirects, misc malicious files, etc. • With 160,000 new malware samples seen every day, antivirus apps will not find every threat • Needs to be bolstered by regular and comprehensive monitoring
  • 14. @AlienVault Asset Discovery • Active Network Scanning • Passive Network Scanning • Asset Inventory • Host-based Software Inventory Vulnerability Assessment • Network Vulnerability Testing • Remediation Verification Threat Detection • Network IDS • Host IDS • Wireless IDS • File Integrity Monitoring Behavioral Monitoring • Log Collection • Netflow Analysis • Service Availability Monitoring Security Intelligence • SIEM Event Correlation • Incident Response
  • 15. AlienVault Labs Threat Intelligence • Weekly updates to correlation directives to detect emerging threats • Recent updates related to data exfiltration methods: • AV Malware, Ajax Security Team Data Exfiltration • AV Malware, Operation Machete FTP exfiltration • AV attack, malware sending exfiltrating command output
  • 16. Now for some Q&A… Test Drive AlienVault USM Download a Free 30-Day Trial http://www.alienvault.com/free-trial Try our Interactive Demo Site http://www.alienvault.com/live-demo-site Questions? hello@alienvault.com

Editor's Notes

  • #2: \
  • #6: Most organizations look like this… there’s a myriad of security solutions in their environment all promising to deliver greater visibility.