SlideShare a Scribd company logo
© 2017 Cybereason Inc. All rights reserved.
What’s in your toolkit? The Case for EDR
© 2017 Cybereason Inc. All rights reserved.
Index
• This presentation:
• About Me
• About Cybereason
• My Job
• Disclaimers
• Products/Vendors
• Defense In Depth
• Examples
• Q/A
© 2017 Cybereason Inc. All rights reserved.
About me
• Hometown boy!
• CAL Alumni 2001
• Education
• USF (Double BA in Poly Sci and Finance)
• UofL (Post Bac Cert in Accounting)
• Boston University MET (MS in Comp Sci)
• Work
• American Well: Security Analyst (2015)
• PayPal: Security Engineer (2016-2018)
• Cybereason: Security/Malware Analyst (2019)
• Other
• Jit-Jitsu Whitebelt (Black belt in training)
© 2017 Cybereason Inc. All rights reserved.
About Cybereason
• Founded in 2012 by former
members of the elite Israeli
Defense force 8200
• Currently around 500 employees
with $100+ million dollars in
funding, most from Japanese
Softbank
• Offices in Boston, Tel Aviv,
Tokyo, London and Sydney
(more coming soon)
© 2017 Cybereason Inc. All rights reserved.
What’s my job?
• Identify the Malware before it spreads
• Drop unidentified Malware into sandbox
• Reverse Engineer Malware
• Triage and make recommendations based on the type of
Malware
• Quarantine vs Re-Image the machine
© 2017 Cybereason Inc. All rights reserved.
Disclaimer!
• I’m still learning!!!
© 2017 Cybereason Inc. All rights reserved.
Other Disclaimer
• EDR is not meant there is a be all end
all solution!
© 2017 Cybereason Inc. All rights reserved.
Which products? Who are the vendors?
Anti-virus
Firewall
WAF
© 2017 Cybereason Inc. All rights reserved.
New Generation Products
EDR
© 2017 Cybereason Inc. All rights reserved.
Defense in Depth
Recognize this?
© 2017 Cybereason Inc. All rights reserved.
Defense in Depth
The Layers
© 2017 Cybereason Inc. All rights reserved.
What is EDR?
Endpoint Detection and ResponseRemediation
• Gives a full story
• Shows behaviors and uses data and predictive
analytics to determine malicious behavior
• Addresses the need for continuous monitoring
• Combines many tools for a single purpose which
empowers the analyst as well as the party to
make sure the proper actions are taken
• In other words its helpful!
© 2017 Cybereason Inc. All rights reserved.
Attack Lifecycle
© 2017 Cybereason Inc. All rights reserved.
Different types of Malware
© 2017 Cybereason Inc. All rights reserved.
APT vs. Commodity Malware
WannaCry
• NSA Leak
• Eternal Blue & Double Pulsar
© 2017 Cybereason Inc. All rights reserved.
APT vs. Commodity Malware
Stuxnet
© 2017 Cybereason Inc. All rights reserved.
Types of Malware
• PUP (potentially unwanted program)
• Applications that would be considered unwanted
despite often having been downloaded by the user.
• Ransomware
• Threatens to publish the victim's data or perpetually
block access(encrypt) to it unless a ransom is paid.
© 2017 Cybereason Inc. All rights reserved.
Types of Malware
• Dropper
• Malicious code that exists only to download other malicious
code.
• Information-stealing malware
• Collects information from a victim’s computer and usually sends
it to the attacker.
• Rootkit
• Malicious code designed to conceal the existence of other
code.
© 2017 Cybereason Inc. All rights reserved.
Fileless Malware
• What is it?
• Legitimate process being ran in the background
• Data saved in Registry can be called by wscript
• Powershell process one liner process base64 etc pushses straight to
RAM
• Calling invoke expression can run via admin and collect and receive data
and go undetected to typical AV as this is a legitimate process
• Using Operating System against itself
• Cobalt kitty --------------------------
© 2017 Cybereason Inc. All rights reserved.
Fileless Malware
• Current Trends
• 42% of companies surveyed by the
Ponemon Institute reported experiencing at
least one fileless malware attack in 2017
and 77% of all successful attacks were
fileless. (https://digitalguardian.com/blog/what-fileless-malware-or-non-malware-attack-
definition-and-best-practices-fileless-malware)
• In the first half of 2018 there was a 94%
increase in fileless malware attacks and 5.2
Powershell attacks per 1000 endpoint
according to Threatpost (https://threatpost.com/threatlist-
ransomware-attacks-down-fileless-malware-up-in-2018/136962/)
© 2017 Cybereason Inc. All rights reserved.
Mimikatz
• What is it?
• Open source application (Used both
by Red team and malicious
individuals) to dump clear text
authentication credentials
• By default since windows 8.1 wont
spit out clear text passwords
(Wdigest)
© 2017 Cybereason Inc. All rights reserved.
Emotet/Trickbot/Ryuk
© 2017 Cybereason Inc. All rights reserved.
Emotet/Trickbot/Ryuk
© 2017 Cybereason Inc. All rights reserved.
Emotet/Trickbot/Ryuk
© 2017 Cybereason Inc. All rights reserved.
Emotet/Trickbot/Ryuk
© 2017 Cybereason Inc. All rights reserved.
Emotet/Trickbot/Ryuk
© 2017 Cybereason Inc. All rights reserved.
Tiny Banker
© 2017 Cybereason Inc. All rights reserved.
Tiny Banker
© 2017 Cybereason Inc. All rights reserved.
Tiny Banker
The process ran a DNS query to the following:
vqwgqnbtectr.pw > 216.218.185[.]162
sucjuv.in > 216.218.185[.]162
hbsnmsmlsvib.in > 216.218.185[.]162
ehhrupqrycm.pw > 216.218.185[.]162
uatuwc.pw > 216.218.185[.]162
fpexkrdtxpfs.in > 216.218.185[.]162
okzhyctznzft.pw > 216.218.185[.]162
zawmg.pw > 216.218.185[.]162
lxpcbahva.pw > 216.218.185[.]162
bifcp.in > 216.218.185[.]162
pojde.in > 216.218.185[.]162
And many many more….
© 2017 Cybereason Inc. All rights reserved.
Tiny Banker
© 2017 Cybereason Inc. All rights reserved.
Tiny Banker
© 2017 Cybereason Inc. All rights reserved.
Tiny Banker
© 2017 Cybereason Inc. All rights reserved.
Tiny Banker
© 2017 Cybereason Inc. All rights reserved.
Demo
https://www.youtube.com/watch?v=Hc7h-rIyd5A
© 2017 Cybereason Inc. All rights reserved.
Q/A
• Feedback
• Joshua.chou@cybereason.com
• jdudeoflife
© 2017 Cybereason Inc. All rights reserved.
you.Thank
www.cybereason.com

More Related Content

PPTX
Research: From zero to phishing in 60 seconds
PDF
Intelligence driven defense webinar
PDF
Save Time and Act Faster with Playbooks
PPTX
Cyber Resilency VANCOUVER, BC Nov 2017
PPTX
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
PPTX
Advanced Threat Hunting - Botconf 2017
PDF
Managing Indicator Deprecation in ThreatConnect
PPTX
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Research: From zero to phishing in 60 seconds
Intelligence driven defense webinar
Save Time and Act Faster with Playbooks
Cyber Resilency VANCOUVER, BC Nov 2017
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Advanced Threat Hunting - Botconf 2017
Managing Indicator Deprecation in ThreatConnect
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...

What's hot (20)

PPTX
The Business Benefits of Threat Intelligence Webinar
PDF
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
PDF
A Blueprint for Web Attack Survival
PPTX
Cerdant Security State of the Union
PDF
[OWASP Poland Day] Embedding security into SDLC + GDPR
PDF
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
PPTX
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
PDF
CEH Vs CISSP: Which one is better?
POTX
Ransomware: Why Are Backup Vendors Trying To Scare You?
PPTX
Solnet dev secops meetup
PDF
Robert Hurlbut - Threat Modeling for Secure Software Design
PDF
ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps» GO DevOps
PPTX
Maltego Webinar Slides
PDF
Building a Strategic Plan for Your Security Awareness Program
DOCX
Why security is the kidney not the tail of the dog v3
PDF
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
PPTX
Malware: To The Realm of Malicious Code (Training)
PDF
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
PPTX
API Security Survey
PPTX
The Top 7 Causes of Major Security Breaches
The Business Benefits of Threat Intelligence Webinar
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
A Blueprint for Web Attack Survival
Cerdant Security State of the Union
[OWASP Poland Day] Embedding security into SDLC + GDPR
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
CEH Vs CISSP: Which one is better?
Ransomware: Why Are Backup Vendors Trying To Scare You?
Solnet dev secops meetup
Robert Hurlbut - Threat Modeling for Secure Software Design
ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps» GO DevOps
Maltego Webinar Slides
Building a Strategic Plan for Your Security Awareness Program
Why security is the kidney not the tail of the dog v3
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Malware: To The Realm of Malicious Code (Training)
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
API Security Survey
The Top 7 Causes of Major Security Breaches
Ad

Similar to The Case for EDR: What's In Your Toolkit (20)

PDF
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
PDF
When Security Tools Fail You
PPTX
Malware Analysis
PDF
Threat Landscape Lessons from IoTs and Honeynets
PDF
endpoint-detection-and-response-datasheet.pdf
PPTX
Advanced Threats In The Enterprise
PPTX
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PDF
CNIT 152: 4 Starting the Investigation & 5 Leads
PDF
Can_We_Really_Detect_These_So_Called_Sophisticated_Attacks?
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
PDF
4 Getting Started & 5 Leads
PDF
PPTX
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
PPTX
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
PDF
The attack lifecycle. Cybereason can help you answer: Are you under attack?
PPTX
Exploring the Capabilities and Economics of Cybercrime
PDF
Practical Incident Response - Work Guide
PDF
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
When Security Tools Fail You
Malware Analysis
Threat Landscape Lessons from IoTs and Honeynets
endpoint-detection-and-response-datasheet.pdf
Advanced Threats In The Enterprise
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
PHDays 2018 Threat Hunting Hands-On Lab
CNIT 152: 4 Starting the Investigation & 5 Leads
Can_We_Really_Detect_These_So_Called_Sophisticated_Attacks?
Today's Breach Reality, The IR Imperative, And What You Can Do About It
4 Getting Started & 5 Leads
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
The attack lifecycle. Cybereason can help you answer: Are you under attack?
Exploring the Capabilities and Economics of Cybercrime
Practical Incident Response - Work Guide
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
Ad

More from Dawn Yankeelov (20)

PDF
What's Ahead: Ways to Stay Engaged in Cyber Security Trends, Policy & Inform...
PPT
TALK Public Policy 2022
PPTX
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
PPTX
Discussing Guidance & Liabilities Regarding Reopening
PPTX
DHS Cybersecurity Services for Building Cyber Resilience
PPTX
Cyber Security Threats Facing Small Businesses--June 2019
PPTX
A Look at Cyber Insurance -- A Corporate Perspective
PPTX
Cyber Security Resilience by KY CISO David Carter
PPTX
Cyber Security Resilience from Metro Louisville Govt.
PPTX
Cybersecurity Information From KY's CISO
PDF
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
PDF
Kentucky's Cyber Enclave
PPTX
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
PDF
RCM Brain: AI Bots in Healthcare
PPTX
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
PPTX
PSST: Seamless Data Solutions
PDF
RCM Brain: AI Bots in Healthcare
PPTX
Cybersecurity Trends & Startups by Gula Tech Adventures
PPTX
How I Will Phish You
POTX
Understanding Research & Development Tax Credits in KY
What's Ahead: Ways to Stay Engaged in Cyber Security Trends, Policy & Inform...
TALK Public Policy 2022
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
Discussing Guidance & Liabilities Regarding Reopening
DHS Cybersecurity Services for Building Cyber Resilience
Cyber Security Threats Facing Small Businesses--June 2019
A Look at Cyber Insurance -- A Corporate Perspective
Cyber Security Resilience by KY CISO David Carter
Cyber Security Resilience from Metro Louisville Govt.
Cybersecurity Information From KY's CISO
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
Kentucky's Cyber Enclave
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
RCM Brain: AI Bots in Healthcare
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
PSST: Seamless Data Solutions
RCM Brain: AI Bots in Healthcare
Cybersecurity Trends & Startups by Gula Tech Adventures
How I Will Phish You
Understanding Research & Development Tax Credits in KY

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
A comparative analysis of optical character recognition models for extracting...
20250228 LYD VKU AI Blended-Learning.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
Assigned Numbers - 2025 - Bluetooth® Document
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

The Case for EDR: What's In Your Toolkit

  • 1. © 2017 Cybereason Inc. All rights reserved. What’s in your toolkit? The Case for EDR
  • 2. © 2017 Cybereason Inc. All rights reserved. Index • This presentation: • About Me • About Cybereason • My Job • Disclaimers • Products/Vendors • Defense In Depth • Examples • Q/A
  • 3. © 2017 Cybereason Inc. All rights reserved. About me • Hometown boy! • CAL Alumni 2001 • Education • USF (Double BA in Poly Sci and Finance) • UofL (Post Bac Cert in Accounting) • Boston University MET (MS in Comp Sci) • Work • American Well: Security Analyst (2015) • PayPal: Security Engineer (2016-2018) • Cybereason: Security/Malware Analyst (2019) • Other • Jit-Jitsu Whitebelt (Black belt in training)
  • 4. © 2017 Cybereason Inc. All rights reserved. About Cybereason • Founded in 2012 by former members of the elite Israeli Defense force 8200 • Currently around 500 employees with $100+ million dollars in funding, most from Japanese Softbank • Offices in Boston, Tel Aviv, Tokyo, London and Sydney (more coming soon)
  • 5. © 2017 Cybereason Inc. All rights reserved. What’s my job? • Identify the Malware before it spreads • Drop unidentified Malware into sandbox • Reverse Engineer Malware • Triage and make recommendations based on the type of Malware • Quarantine vs Re-Image the machine
  • 6. © 2017 Cybereason Inc. All rights reserved. Disclaimer! • I’m still learning!!!
  • 7. © 2017 Cybereason Inc. All rights reserved. Other Disclaimer • EDR is not meant there is a be all end all solution!
  • 8. © 2017 Cybereason Inc. All rights reserved. Which products? Who are the vendors? Anti-virus Firewall WAF
  • 9. © 2017 Cybereason Inc. All rights reserved. New Generation Products EDR
  • 10. © 2017 Cybereason Inc. All rights reserved. Defense in Depth Recognize this?
  • 11. © 2017 Cybereason Inc. All rights reserved. Defense in Depth The Layers
  • 12. © 2017 Cybereason Inc. All rights reserved. What is EDR? Endpoint Detection and ResponseRemediation • Gives a full story • Shows behaviors and uses data and predictive analytics to determine malicious behavior • Addresses the need for continuous monitoring • Combines many tools for a single purpose which empowers the analyst as well as the party to make sure the proper actions are taken • In other words its helpful!
  • 13. © 2017 Cybereason Inc. All rights reserved. Attack Lifecycle
  • 14. © 2017 Cybereason Inc. All rights reserved. Different types of Malware
  • 15. © 2017 Cybereason Inc. All rights reserved. APT vs. Commodity Malware WannaCry • NSA Leak • Eternal Blue & Double Pulsar
  • 16. © 2017 Cybereason Inc. All rights reserved. APT vs. Commodity Malware Stuxnet
  • 17. © 2017 Cybereason Inc. All rights reserved. Types of Malware • PUP (potentially unwanted program) • Applications that would be considered unwanted despite often having been downloaded by the user. • Ransomware • Threatens to publish the victim's data or perpetually block access(encrypt) to it unless a ransom is paid.
  • 18. © 2017 Cybereason Inc. All rights reserved. Types of Malware • Dropper • Malicious code that exists only to download other malicious code. • Information-stealing malware • Collects information from a victim’s computer and usually sends it to the attacker. • Rootkit • Malicious code designed to conceal the existence of other code.
  • 19. © 2017 Cybereason Inc. All rights reserved. Fileless Malware • What is it? • Legitimate process being ran in the background • Data saved in Registry can be called by wscript • Powershell process one liner process base64 etc pushses straight to RAM • Calling invoke expression can run via admin and collect and receive data and go undetected to typical AV as this is a legitimate process • Using Operating System against itself • Cobalt kitty --------------------------
  • 20. © 2017 Cybereason Inc. All rights reserved. Fileless Malware • Current Trends • 42% of companies surveyed by the Ponemon Institute reported experiencing at least one fileless malware attack in 2017 and 77% of all successful attacks were fileless. (https://digitalguardian.com/blog/what-fileless-malware-or-non-malware-attack- definition-and-best-practices-fileless-malware) • In the first half of 2018 there was a 94% increase in fileless malware attacks and 5.2 Powershell attacks per 1000 endpoint according to Threatpost (https://threatpost.com/threatlist- ransomware-attacks-down-fileless-malware-up-in-2018/136962/)
  • 21. © 2017 Cybereason Inc. All rights reserved. Mimikatz • What is it? • Open source application (Used both by Red team and malicious individuals) to dump clear text authentication credentials • By default since windows 8.1 wont spit out clear text passwords (Wdigest)
  • 22. © 2017 Cybereason Inc. All rights reserved. Emotet/Trickbot/Ryuk
  • 23. © 2017 Cybereason Inc. All rights reserved. Emotet/Trickbot/Ryuk
  • 24. © 2017 Cybereason Inc. All rights reserved. Emotet/Trickbot/Ryuk
  • 25. © 2017 Cybereason Inc. All rights reserved. Emotet/Trickbot/Ryuk
  • 26. © 2017 Cybereason Inc. All rights reserved. Emotet/Trickbot/Ryuk
  • 27. © 2017 Cybereason Inc. All rights reserved. Tiny Banker
  • 28. © 2017 Cybereason Inc. All rights reserved. Tiny Banker
  • 29. © 2017 Cybereason Inc. All rights reserved. Tiny Banker The process ran a DNS query to the following: vqwgqnbtectr.pw > 216.218.185[.]162 sucjuv.in > 216.218.185[.]162 hbsnmsmlsvib.in > 216.218.185[.]162 ehhrupqrycm.pw > 216.218.185[.]162 uatuwc.pw > 216.218.185[.]162 fpexkrdtxpfs.in > 216.218.185[.]162 okzhyctznzft.pw > 216.218.185[.]162 zawmg.pw > 216.218.185[.]162 lxpcbahva.pw > 216.218.185[.]162 bifcp.in > 216.218.185[.]162 pojde.in > 216.218.185[.]162 And many many more….
  • 30. © 2017 Cybereason Inc. All rights reserved. Tiny Banker
  • 31. © 2017 Cybereason Inc. All rights reserved. Tiny Banker
  • 32. © 2017 Cybereason Inc. All rights reserved. Tiny Banker
  • 33. © 2017 Cybereason Inc. All rights reserved. Tiny Banker
  • 34. © 2017 Cybereason Inc. All rights reserved. Demo https://www.youtube.com/watch?v=Hc7h-rIyd5A
  • 35. © 2017 Cybereason Inc. All rights reserved. Q/A • Feedback • Joshua.chou@cybereason.com • jdudeoflife
  • 36. © 2017 Cybereason Inc. All rights reserved. you.Thank www.cybereason.com