SlideShare a Scribd company logo
Jeff Olen, Senior Product Manager, AlienVault
Kate MacLean, Senior Product Marketing Manager, Cisco
Sacha Dawes, Principal Product Marketing
Manager
Meltdown and Spectre – How
to Detect the Vulnerabilities
and Exploits
2
In this Webcast
What are Meltdown and Spectre, and their impact?
Detecting and Protecting your Environments with
AlienVault® USM Anywhere™
USM Anywhere Live Demo
Ask Us Questions!
3
The News Since Jan 3rd 2018
4
Timeline
Google informs
affected
companies of
Spectre flaw
June
2017
Google informs
affected
companies of
Meltdown flaw
July
2017
Vulnerabilities
made public
Jan
2018
First CPUs
susceptible to
Spectre/Meltdown
shipped
Jan
1995
5
Comparing Meltdown & Spectre
Meltdown Spectre
Affected CPU Types Intel, Apple Intel, Apple, ARM, AMD
Attack Vector
Execute Code
on the System
Execute Code
on the System
Method
Intel Privilege Escalation &
Speculative Execution
(CVE-2017-5754)
Branch Prediction &
Speculative Execution
(CVE-2017-5715 / -5753)
Exploit Path
Read Kernel Memory from
User Space
Read Memory Contents
from Other Applications
Remediation Software Patches Software Patches
Source: “A Simple Explanation of the Differences Between Meltdown and Spectre (Jan 3 2018)”, Daniel Miessler,
https://danielmiessler.com/blog/simple-explanation-difference-meltdown-spectre/
6
What Have AlienVault Labs Seen?
• Meltdown or Spectre are not known
to have been used to steal data
 That said, compromise can be
difficult to detect
• AlienVault Labs has seen samples
of malware attempting to exploit
the vulnerabilities
 Most are variants of the samples
provided by the disclosing teams
Source: https://otx.alienvault.com/pulse/5a50d6d41f9dd76baa10458c
7
Are Software Patches Available?
• Yes – Early software patches exist for:
 Devices: Apple devices, Surface & Surface
Book, Android devices
 OS: Windows, various Linux distributions
(CentOS, Red Hat, Fedora and Ubuntu)
 Cloud providers (AWS, Azure, Google)
indicate they’ve patched
• GitHub* has the latest status on patches
• When applying patches, some have seen
 System slowdowns
 System crashes
Source: https://medium.com/implodinggradients/meltdown-c24a9d5e254e
* https://github.com/hannob/meltdownspectre-patches
8
Decrease Your Risk from Meltdown and
Spectre
• Evaluate and fully test the available patches for your different systems
 Apply those patches where possible
• Apply the same protections for any malware or ransomware
 Evaluate need for services (e.g. SMB), and disable those that are not required
 Architect your environment to include network segmentation, and a least-privilege model, to
limit ability for any ransomware to traverse the network
 Train your organization on how to watch for phishing attempts, and how to report and protect
your organization if they think they’ve become infected
 Implement a backup plan with offline backups
• Deploy AlienVault USM Anywhere to detect vulnerabilities and threats that could be
Meltdown/Spectre sourced across your cloud, on-premises & hybrid environments
9
Vulnerability Assessment
Know where the vulnerabilities are to avoid
easy exploitation and compromise
Behavioral Monitoring
Identify suspicious behavior and potentially
compromised systems
Intrusion Detection
Know when suspicious activities happen in
your environment
SIEM Log Management
Correlate, analyze, and report on security event
data from your network
Asset Discovery
Know who and what is connected to your cloud or
on-premises environments at all times
AlienVault USM Anywhere: A Unified Approach to
Threat Detection & Response
10
Actionable Threat Intelligence Powered
by
AlienVault Labs Security Research
• AlienVault researches emerging threats–so
you don’t have to
• Continuous Threat Intelligence updates
built into your USM Anywhere include:
• Correlation directives
• IDS signatures
• Vulnerability audits
• Asset discovery signatures
• IP reputation data
• Data source plugins & AlienApps
• Incident response guidance
Supplemented by the AlienVault Open
Threat Exchange™ (OTX)
• The world’s first truly open threat intelligence
community
• Collaborate with 65,000+ global participants
to investigate emerging threats in the wild
• Pulses created within minutes of the first
detection of an in-the-wild attack
• Subscribe to threat research updates from 73
public groups and other OTX contributors
• Leverage the latest OTX threat
intelligence directly in your
AlienVault USM environment
Optimize Threat Detection & Response
11
Automate & Orchestrate Containment
Cloud InfrastructureProductivity Apps IT VirtualizationIT OperationsIT Security
A Growing “Galaxy” of AlienApps
Respond
Automate and orchestrate your
threat responses for efficiency
Monitor
AlienApps collect and enrich
data from your environment
Detect
USM Anywhere uses that data
to detect threats and alerts you
12
It’s Demo Time!
13
Decrease Your Risk from Meltdown and
Spectre
• Evaluate and fully test the available patches for your different systems
 Apply those patches where possible
• Apply the same protections for any malware or ransomware
 Evaluate need for services (e.g. SMB), and disable those that are not required
 Architect your environment to include network segmentation, and a least-privilege model, to
limit ability for any ransomware to traverse the network
 Train your organization on how to watch for phishing attempts, and how to report and protect
your organization if they think they’ve become infected
 Implement a backup plan with offline backups
• Deploy AlienVault USM Anywhere to detect vulnerabilities and threats that could be
Meltdown/Spectre sourced across your cloud, on-premises & hybrid environments
888.613.6023
ALIENVAULT.COM
CONTACT US
HELLO@ALIENVAULT.COM
Test Drive USM Anywhere in our Online Demo:
Get instant access, no download, no install
https://www.alienvault.com/products/usm-anywhere/demo
Try it for Free in your Environment :
Start detecting threats in less than an hour
https://www.alienvault.com/products/usm-anywhere/free-trial
Review Pricing and Get a Quote:
Multiple tiers available, low annual subscription pricing
https://www.alienvault.com/products/usm-anywhere/pricing
Questions?

More Related Content

PDF
Open Source IDS Tools: A Beginner's Guide
PPTX
Six Steps to SIEM Success
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PPTX
Simplify PCI DSS Compliance with AlienVault USM
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PPTX
Alienvault threat alerts in spiceworks
PPTX
Beginner's Guide to SIEM
Open Source IDS Tools: A Beginner's Guide
Six Steps to SIEM Success
Improve Situational Awareness for Federal Government with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
IDS for Security Analysts: How to Get Actionable Insights from your IDS
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Alienvault threat alerts in spiceworks
Beginner's Guide to SIEM

What's hot (20)

PPTX
Improve threat detection with hids and alien vault usm
PPTX
Creating Correlation Rules in AlienVault
PPTX
Malware detection how to spot infections early with alien vault usm
PPTX
Incident response live demo slides final
PPTX
How Malware Works
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PPTX
How to Detect SQL Injections & XSS Attacks with AlienVault USM
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
PDF
Avoid Meltdown from the Spectre - How to measure impact and track remediation
PPTX
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
PPTX
How to Detect a Cryptolocker Infection with AlienVault USM
PPTX
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
PPTX
Configuring Data Sources in AlienVault
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PPTX
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
PPTX
Otx introduction sw
PPTX
Vulnerability Assessment Presentation
PPTX
Vulnerability Assessment
Improve threat detection with hids and alien vault usm
Creating Correlation Rules in AlienVault
Malware detection how to spot infections early with alien vault usm
Incident response live demo slides final
How Malware Works
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Detect SQL Injections & XSS Attacks with AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USM
AWS Security Best Practices for Effective Threat Detection & Response
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
How to Detect a Cryptolocker Infection with AlienVault USM
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
Configuring Data Sources in AlienVault
Improve Security Visibility with AlienVault USM Correlation Directives
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
Automating Critical Security Controls for Threat Remediation and Compliance
Otx introduction sw
Vulnerability Assessment Presentation
Vulnerability Assessment
Ad

Similar to Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits (20)

PPTX
Cyber Incident Response Proposed Strategies
PDF
01_Metasploit - The Elixir of Network Security
PDF
Cisco amp everywhere
PDF
Cisco Security Presentation
PPTX
Appsec2013 assurance tagging-robert martin
PPTX
Advanced Threat Protection - Sandboxing 101
PDF
Design and Analyze Secure Networked Systems - 2
PDF
Exploits Attack on Windows Vulnerabilities
PPTX
Cyber Security protection by MultiPoint Ltd.
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PPTX
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
PPTX
Finalppt metasploit
PDF
Cisco amp for networks
PPTX
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
PPTX
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
PDF
Reveelium Smart Predictive Analytics - Datasheet EN
PDF
Ransomware Prevention Guide
PDF
Metasploit Computer security testing tool
PDF
Anti evasion and evader - klaus majewski
PDF
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
Cyber Incident Response Proposed Strategies
01_Metasploit - The Elixir of Network Security
Cisco amp everywhere
Cisco Security Presentation
Appsec2013 assurance tagging-robert martin
Advanced Threat Protection - Sandboxing 101
Design and Analyze Secure Networked Systems - 2
Exploits Attack on Windows Vulnerabilities
Cyber Security protection by MultiPoint Ltd.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
Finalppt metasploit
Cisco amp for networks
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reveelium Smart Predictive Analytics - Datasheet EN
Ransomware Prevention Guide
Metasploit Computer security testing tool
Anti evasion and evader - klaus majewski
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
Ad

More from AlienVault (16)

PDF
Malware Invaders - Is Your OS at Risk?
PDF
Insider Threat Detection Recommendations
PDF
Security operations center 5 security controls
PDF
PCI DSS Implementation: A Five Step Guide
PDF
The State of Incident Response - INFOGRAPHIC
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PPTX
Best Practices for Configuring Your OSSIM Installation
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
PDF
Alien vault sans cyber threat intelligence
PPTX
Security by Collaboration: Rethinking Red Teams versus Blue Teams
PPTX
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
PPTX
How to Detect System Compromise & Data Exfiltration with AlienVault USM
PPTX
Spice world 2014 hacker smackdown
PPTX
Demo how to detect ransomware with alien vault usm_gg
PPTX
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Malware Invaders - Is Your OS at Risk?
Insider Threat Detection Recommendations
Security operations center 5 security controls
PCI DSS Implementation: A Five Step Guide
The State of Incident Response - INFOGRAPHIC
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
Best Practices for Configuring Your OSSIM Installation
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Alien vault sans cyber threat intelligence
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
How to Detect System Compromise & Data Exfiltration with AlienVault USM
Spice world 2014 hacker smackdown
Demo how to detect ransomware with alien vault usm_gg
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball

Recently uploaded (20)

PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Advanced IT Governance
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Machine learning based COVID-19 study performance prediction
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
Advanced Soft Computing BINUS July 2025.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Advanced IT Governance
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
cuic standard and advanced reporting.pdf
Modernizing your data center with Dell and AMD
Diabetes mellitus diagnosis method based random forest with bat algorithm
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)

Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits

  • 1. Jeff Olen, Senior Product Manager, AlienVault Kate MacLean, Senior Product Marketing Manager, Cisco Sacha Dawes, Principal Product Marketing Manager Meltdown and Spectre – How to Detect the Vulnerabilities and Exploits
  • 2. 2 In this Webcast What are Meltdown and Spectre, and their impact? Detecting and Protecting your Environments with AlienVault® USM Anywhere™ USM Anywhere Live Demo Ask Us Questions!
  • 3. 3 The News Since Jan 3rd 2018
  • 4. 4 Timeline Google informs affected companies of Spectre flaw June 2017 Google informs affected companies of Meltdown flaw July 2017 Vulnerabilities made public Jan 2018 First CPUs susceptible to Spectre/Meltdown shipped Jan 1995
  • 5. 5 Comparing Meltdown & Spectre Meltdown Spectre Affected CPU Types Intel, Apple Intel, Apple, ARM, AMD Attack Vector Execute Code on the System Execute Code on the System Method Intel Privilege Escalation & Speculative Execution (CVE-2017-5754) Branch Prediction & Speculative Execution (CVE-2017-5715 / -5753) Exploit Path Read Kernel Memory from User Space Read Memory Contents from Other Applications Remediation Software Patches Software Patches Source: “A Simple Explanation of the Differences Between Meltdown and Spectre (Jan 3 2018)”, Daniel Miessler, https://danielmiessler.com/blog/simple-explanation-difference-meltdown-spectre/
  • 6. 6 What Have AlienVault Labs Seen? • Meltdown or Spectre are not known to have been used to steal data  That said, compromise can be difficult to detect • AlienVault Labs has seen samples of malware attempting to exploit the vulnerabilities  Most are variants of the samples provided by the disclosing teams Source: https://otx.alienvault.com/pulse/5a50d6d41f9dd76baa10458c
  • 7. 7 Are Software Patches Available? • Yes – Early software patches exist for:  Devices: Apple devices, Surface & Surface Book, Android devices  OS: Windows, various Linux distributions (CentOS, Red Hat, Fedora and Ubuntu)  Cloud providers (AWS, Azure, Google) indicate they’ve patched • GitHub* has the latest status on patches • When applying patches, some have seen  System slowdowns  System crashes Source: https://medium.com/implodinggradients/meltdown-c24a9d5e254e * https://github.com/hannob/meltdownspectre-patches
  • 8. 8 Decrease Your Risk from Meltdown and Spectre • Evaluate and fully test the available patches for your different systems  Apply those patches where possible • Apply the same protections for any malware or ransomware  Evaluate need for services (e.g. SMB), and disable those that are not required  Architect your environment to include network segmentation, and a least-privilege model, to limit ability for any ransomware to traverse the network  Train your organization on how to watch for phishing attempts, and how to report and protect your organization if they think they’ve become infected  Implement a backup plan with offline backups • Deploy AlienVault USM Anywhere to detect vulnerabilities and threats that could be Meltdown/Spectre sourced across your cloud, on-premises & hybrid environments
  • 9. 9 Vulnerability Assessment Know where the vulnerabilities are to avoid easy exploitation and compromise Behavioral Monitoring Identify suspicious behavior and potentially compromised systems Intrusion Detection Know when suspicious activities happen in your environment SIEM Log Management Correlate, analyze, and report on security event data from your network Asset Discovery Know who and what is connected to your cloud or on-premises environments at all times AlienVault USM Anywhere: A Unified Approach to Threat Detection & Response
  • 10. 10 Actionable Threat Intelligence Powered by AlienVault Labs Security Research • AlienVault researches emerging threats–so you don’t have to • Continuous Threat Intelligence updates built into your USM Anywhere include: • Correlation directives • IDS signatures • Vulnerability audits • Asset discovery signatures • IP reputation data • Data source plugins & AlienApps • Incident response guidance Supplemented by the AlienVault Open Threat Exchange™ (OTX) • The world’s first truly open threat intelligence community • Collaborate with 65,000+ global participants to investigate emerging threats in the wild • Pulses created within minutes of the first detection of an in-the-wild attack • Subscribe to threat research updates from 73 public groups and other OTX contributors • Leverage the latest OTX threat intelligence directly in your AlienVault USM environment Optimize Threat Detection & Response
  • 11. 11 Automate & Orchestrate Containment Cloud InfrastructureProductivity Apps IT VirtualizationIT OperationsIT Security A Growing “Galaxy” of AlienApps Respond Automate and orchestrate your threat responses for efficiency Monitor AlienApps collect and enrich data from your environment Detect USM Anywhere uses that data to detect threats and alerts you
  • 13. 13 Decrease Your Risk from Meltdown and Spectre • Evaluate and fully test the available patches for your different systems  Apply those patches where possible • Apply the same protections for any malware or ransomware  Evaluate need for services (e.g. SMB), and disable those that are not required  Architect your environment to include network segmentation, and a least-privilege model, to limit ability for any ransomware to traverse the network  Train your organization on how to watch for phishing attempts, and how to report and protect your organization if they think they’ve become infected  Implement a backup plan with offline backups • Deploy AlienVault USM Anywhere to detect vulnerabilities and threats that could be Meltdown/Spectre sourced across your cloud, on-premises & hybrid environments
  • 14. 888.613.6023 ALIENVAULT.COM CONTACT US HELLO@ALIENVAULT.COM Test Drive USM Anywhere in our Online Demo: Get instant access, no download, no install https://www.alienvault.com/products/usm-anywhere/demo Try it for Free in your Environment : Start detecting threats in less than an hour https://www.alienvault.com/products/usm-anywhere/free-trial Review Pricing and Get a Quote: Multiple tiers available, low annual subscription pricing https://www.alienvault.com/products/usm-anywhere/pricing Questions?

Editor's Notes

  • #4: Petya would typically launch the UAC window. If the user did not give access, Mischa would take on.
  • #8: More patches will come Linux KPTI (Kernel Page Table Isolation) patch, originally named KAISER
  • #9: AlienVault’s threat intelligence can help pinpoint bad IP addresses of ransomware C2 servers
  • #13: Want to see orchestration rules in action – use case example Hybrid coverage
  • #14: AlienVault’s threat intelligence can help pinpoint bad IP addresses of ransomware C2 servers