SlideShare a Scribd company logo
Targeted  &  Persistent  Attacks  in  EU  

   The  need  for  coordination  and  information  
      sharing  between  EU  member  states  
                            
         Eoghan  Casey,  CASEITE  &  DFLabs  
 
  
       




                                2012  Copyright  Eoghan  Casey  and  CASEITE  
                                            All  rights  reserved  
          Attack  against  RSA  -­‐  http://blogs.rsa.com/rivner/anatomy-­‐of-­‐an-­‐attack/  
Large-­‐scale  credit  card  robbery  
Initial  intrusion  into  regional  office  
Weak  internal  security  
    Servers  with  well  known  vulnerabilities  
    Unrestricted  access  to  central  servers  
Weak  egress  filtering  
    File  transfer  permitted  from  central  servers  to  Internet  
Weak  system  monitoring  
    Intruder  created  account  on  central  server  
    Installed  sniffer  on  server  
    Sniffer  and  file  transfer  log  files  created  on  server  
Weak  network  monitoring  
    Network  level  logs  recorded  file  transfers  

                            2012  Copyright  Eoghan  Casey  and  CASEITE  
                                        All  rights  reserved  
Coordinated  Linux  intrusions  
Attacker's  modus  operandi  
  Repository  of  stolen  SSH  credentials  
  Privilege  escalation  
  LKM  rootkits  &  tricky  backdoor  
  Trojanized  SSH  daemon  
  Resilient  C2  and  exfiltration  
  Destroy  digital  evidence  

                  2012  Copyright  Eoghan  Casey  and  CASEITE  
                              All  rights  reserved  
Common  mistakes  
1)  Underestimating  the  adversary  
     Too  quick  to  containment  
    
2)  Lack  of  evidence  
     No  centralized  logging  infrastructure  
  
3)  Improper  evidence  handling  
     Update  antivirus  and  scan  compromised  systems  

                    2012  Copyright  Eoghan  Casey  and  CASEITE  
                                All  rights  reserved  
Know  the  adversary  
Initial  intrusions  not  necessarily  sophisticated  
  Spear  phishing  or  vulnerable  servers  
Once  inside,  they  spread  virulently  
Inside  out  attacks  circumvent  egress  filtering  
Undermine  security  monitoring  
  File  system  tampering  
  Multiple  malware  versions  with  custom  packing  
  Blend  in  with  normal  traffic  
  Encrypt  command,  control  and  exfiltration  
               2012  Copyright  Eoghan  Casey  and  CASEITE  
                           All  rights  reserved  
Quick  containment?  
Current  recommendation:  
When an incident has been detected and analyzed, it is
important to contain it before the spread of the
incident overwhelms resources or the damage increases.
Most incidents require containment, so it is
important to consider it early in the course of handling each
incident.

- NIST SP800-61 Rev. 1, page 3-19


                   2012  Copyright  Eoghan  Casey  and  CASEITE  
                               All  rights  reserved  
Managing  a  data  breach  effectively  
   




             2012  Copyright  Eoghan  Casey  and  CASEITE  
                         All  rights  reserved  
Effective  eradication  of  intruders    




            2012  Copyright  Eoghan  Casey  and  CASEITE  
                        All  rights  reserved  
Cross  border  information  sharing  
Same  attackers  targeting    
all  EU  member  states  >  
  
     
     
   Consolidate  adversary  knowledge  
   Trust  between  government  and  industry  
   Confidentiality  agreements  
   More  information  to  examine  the  better  
   Sanitize  what  is  shared  to  protect  victims  
                     2012  Copyright  Eoghan  Casey  and  CASEITE  
                                 All  rights  reserved  
Information  exchange  standards  
STIX     Structured  Threat  Information  eXpression  




                           2012  Copyright  Eoghan  Casey  and  CASEITE  
                                       All  rights  reserved  
    STIX  Whitepaper  -­‐  makingsecuritymeasurable.mitre.org/docs/STIX-­‐Whitepaper.pdf  
Get  in  touch  
                          
               Eoghan  Casey  
          DFLabs  Business  Partner  
Risk  Prevention  and  Response  Co-­‐manager  
                          
            eoghan@dflabs.com  
              www.dflabs.com  

              2012  Copyright  Eoghan  Casey  and  CASEITE  
                          All  rights  reserved  

More Related Content

PPTX
Tech Demo: Take the Ransom Out of Ransomware
PDF
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
PPTX
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
PPTX
Why Your Approach To Data Governance Needs a Major Update
POTX
Ransomware: Why Are Backup Vendors Trying To Scare You?
PPTX
The GDPR and What It Means to You
PPTX
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
PDF
Skyport Systems: Securing Your Biggest IT Risk: Microsoft Active Directory
Tech Demo: Take the Ransom Out of Ransomware
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Why Your Approach To Data Governance Needs a Major Update
Ransomware: Why Are Backup Vendors Trying To Scare You?
The GDPR and What It Means to You
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Skyport Systems: Securing Your Biggest IT Risk: Microsoft Active Directory

What's hot (20)

PPTX
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
PPTX
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
PDF
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
PPTX
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
PDF
Cisco Connect 2018 Vietnam - data center transformation - vn
PPTX
Ransomware Has Evolved And So Should Your Company
PPTX
Security Kung Fu: SIEM Solutions
PDF
Moving Beyond Zero Trust
PDF
A Migration Imperative With Windows 10 Enterprise-Grade Security
PDF
Cyber supply chain risk management ASDE
PPTX
Security Kung Fu: Firewall Logs
PDF
Cisco Connect 2018 Philippines - security keynote
PPTX
GDPR Fast Start
PPTX
How to Recover from a Ransomware Disaster
PPTX
Security Kung Fu: SIEM Solutions
PDF
Protect your company from zero-day with ESET Dynamic Threat Defense
PPTX
Security is Hard
PDF
Applying intelligent deception to detect sophisticated cyber attacks
PPTX
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
PDF
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
Cisco Connect 2018 Vietnam - data center transformation - vn
Ransomware Has Evolved And So Should Your Company
Security Kung Fu: SIEM Solutions
Moving Beyond Zero Trust
A Migration Imperative With Windows 10 Enterprise-Grade Security
Cyber supply chain risk management ASDE
Security Kung Fu: Firewall Logs
Cisco Connect 2018 Philippines - security keynote
GDPR Fast Start
How to Recover from a Ransomware Disaster
Security Kung Fu: SIEM Solutions
Protect your company from zero-day with ESET Dynamic Threat Defense
Security is Hard
Applying intelligent deception to detect sophisticated cyber attacks
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Ad

Similar to Targeted  &  Persistent  Attacks  in  EU (20)

PDF
Information Securityfind an article online discussing defense-in-d.pdf
DOCX
The Maple County court is redesigning its network to ensure more secu.docx
PDF
Trustwave 2012 Global Güvenlik Raporu
DOCX
4777.team c.final
PDF
A6704d01
PDF
Top Security Trends for 2013
PDF
One Technique, Two Techniques, Red Technique, Blue Technique
PPT
Port of seattle security presentation david morris
PDF
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
PPT
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
PPTX
Cyber Security
PDF
RSA 2010 Francis De Souza
PDF
RSA 2010 Francis De Souza
PPTX
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
PDF
PPTX
Introduction to cyber security
PPTX
Defense-in-Depth - ITE-Defense-in-Depth - ITE-Defense-in-Depth - ITE.pptx
PDF
CSFI Stuxnet Report
PPT
Lecture1 Introduction
PDF
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Information Securityfind an article online discussing defense-in-d.pdf
The Maple County court is redesigning its network to ensure more secu.docx
Trustwave 2012 Global Güvenlik Raporu
4777.team c.final
A6704d01
Top Security Trends for 2013
One Technique, Two Techniques, Red Technique, Blue Technique
Port of seattle security presentation david morris
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
Cyber Security
RSA 2010 Francis De Souza
RSA 2010 Francis De Souza
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Introduction to cyber security
Defense-in-Depth - ITE-Defense-in-Depth - ITE-Defense-in-Depth - ITE.pptx
CSFI Stuxnet Report
Lecture1 Introduction
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Ad

More from DFLABS SRL (11)

PDF
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
PDF
DFlabs corporate profile 01-2013
PPTX
Data Breach e Garante Privacy: Problemi e soluzioni
PDF
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
PDF
L'evoluzione degli standard in materia di computer forensics e investigazioni...
PDF
Dario Forte's SST Moscow Keynote
PPTX
Using Encase for Digital Investigations
PPTX
Iamers presentation-2
PPTX
IT GRC, Soluzioni Risk Management
PDF
PTK 1.0 official presentation
PDF
D.I.M.
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
DFlabs corporate profile 01-2013
Data Breach e Garante Privacy: Problemi e soluzioni
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
L'evoluzione degli standard in materia di computer forensics e investigazioni...
Dario Forte's SST Moscow Keynote
Using Encase for Digital Investigations
Iamers presentation-2
IT GRC, Soluzioni Risk Management
PTK 1.0 official presentation
D.I.M.

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
KodekX | Application Modernization Development
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MIND Revenue Release Quarter 2 2025 Press Release
NewMind AI Weekly Chronicles - August'25 Week I
Dropbox Q2 2025 Financial Results & Investor Presentation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Chapter 3 Spatial Domain Image Processing.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
Unlocking AI with Model Context Protocol (MCP)
KodekX | Application Modernization Development

Targeted  &  Persistent  Attacks  in  EU

  • 1. Targeted  &  Persistent  Attacks  in  EU   The  need  for  coordination  and  information   sharing  between  EU  member  states     Eoghan  Casey,  CASEITE  &  DFLabs  
  • 2.       2012  Copyright  Eoghan  Casey  and  CASEITE   All  rights  reserved   Attack  against  RSA  -­‐  http://blogs.rsa.com/rivner/anatomy-­‐of-­‐an-­‐attack/  
  • 3. Large-­‐scale  credit  card  robbery   Initial  intrusion  into  regional  office   Weak  internal  security   Servers  with  well  known  vulnerabilities   Unrestricted  access  to  central  servers   Weak  egress  filtering   File  transfer  permitted  from  central  servers  to  Internet   Weak  system  monitoring   Intruder  created  account  on  central  server   Installed  sniffer  on  server   Sniffer  and  file  transfer  log  files  created  on  server   Weak  network  monitoring   Network  level  logs  recorded  file  transfers   2012  Copyright  Eoghan  Casey  and  CASEITE   All  rights  reserved  
  • 4. Coordinated  Linux  intrusions   Attacker's  modus  operandi   Repository  of  stolen  SSH  credentials   Privilege  escalation   LKM  rootkits  &  tricky  backdoor   Trojanized  SSH  daemon   Resilient  C2  and  exfiltration   Destroy  digital  evidence   2012  Copyright  Eoghan  Casey  and  CASEITE   All  rights  reserved  
  • 5. Common  mistakes   1)  Underestimating  the  adversary   Too  quick  to  containment     2)  Lack  of  evidence   No  centralized  logging  infrastructure     3)  Improper  evidence  handling   Update  antivirus  and  scan  compromised  systems   2012  Copyright  Eoghan  Casey  and  CASEITE   All  rights  reserved  
  • 6. Know  the  adversary   Initial  intrusions  not  necessarily  sophisticated   Spear  phishing  or  vulnerable  servers   Once  inside,  they  spread  virulently   Inside  out  attacks  circumvent  egress  filtering   Undermine  security  monitoring   File  system  tampering   Multiple  malware  versions  with  custom  packing   Blend  in  with  normal  traffic   Encrypt  command,  control  and  exfiltration   2012  Copyright  Eoghan  Casey  and  CASEITE   All  rights  reserved  
  • 7. Quick  containment?   Current  recommendation:   When an incident has been detected and analyzed, it is important to contain it before the spread of the incident overwhelms resources or the damage increases. Most incidents require containment, so it is important to consider it early in the course of handling each incident. - NIST SP800-61 Rev. 1, page 3-19 2012  Copyright  Eoghan  Casey  and  CASEITE   All  rights  reserved  
  • 8. Managing  a  data  breach  effectively     2012  Copyright  Eoghan  Casey  and  CASEITE   All  rights  reserved  
  • 9. Effective  eradication  of  intruders     2012  Copyright  Eoghan  Casey  and  CASEITE   All  rights  reserved  
  • 10. Cross  border  information  sharing   Same  attackers  targeting     all  EU  member  states  >         Consolidate  adversary  knowledge   Trust  between  government  and  industry   Confidentiality  agreements   More  information  to  examine  the  better   Sanitize  what  is  shared  to  protect  victims   2012  Copyright  Eoghan  Casey  and  CASEITE   All  rights  reserved  
  • 11. Information  exchange  standards   STIX    Structured  Threat  Information  eXpression   2012  Copyright  Eoghan  Casey  and  CASEITE   All  rights  reserved   STIX  Whitepaper  -­‐  makingsecuritymeasurable.mitre.org/docs/STIX-­‐Whitepaper.pdf  
  • 12. Get  in  touch     Eoghan  Casey   DFLabs  Business  Partner   Risk  Prevention  and  Response  Co-­‐manager     eoghan@dflabs.com   www.dflabs.com   2012  Copyright  Eoghan  Casey  and  CASEITE   All  rights  reserved