We Need Better Defensive Tools

Monday, April 02, 2012

Gabriel Bassett

C70bb5cfd0305c9d18312d92f820c321

We Need Better Defensive Tools

Period.  The tools we have right now are basic, non-interoperable, and non-granular.  There is no Metasploit framework for defense.  Let me paint a picture of a particular aspect - intel:

Current State

Many times after a security breach, we see a web of interactions between domains, malicious tools, C&C servers, personal information (email addresses, names, aliases), etc.

The Dell analysis of the RSA breach is one example (http://www.secureworks.com/research/threats/sindigoo/). These webs all seem to be manually generated after-the-fact.


Where We Should Be

Why couldn't we generate a significant amount of this in an automated fashion? Using Mandiant IOCs, IP reputation lists, or other intel feeds as well as the data from our own networks should let us build a very robust web of malicious activity.  This web can help us identify the reputation and actor behind an event (packet, netflow, higher level interaction) we observe on our networks.

Let's say you start with a database of Mandiant IOCs and suspicious IPs from updated Snort rules.  We are collecting the regular information from HIDS, NIDS, AV, Netflow, SNMP, Syslog, etc.  We compare the information we get to our database and something matches (an IP/domain, the attack vector, the malware, etc).  We now have a point connecting the event to our intelligence web.

Through the web we identify domains associated with the malware and scrape the domain for information.  The scrape pulls up multiple executables which are identified as malicious.  A Google search for the domain turns up posts linking personal information to the domain. 

A Whois search turns up other associated domains.  This can then all be fed into the web stored in the database to improve it. At the same time, we know at some level of confidence whether the event can be attributed to an attacker we know of.


Now What

The next step is to automate the response. (This is the same as your bank calling you when your credit card is used on the other side of the country or Facebook throttling your ability to send messages.) 

You can attribute an event to an attacker, and that attacker can have a response associated with them: (throttle them, block them, redirect to a honeypot, etc).  The response could be implemented automatically or with a human in the loop.

The end result is, based on your intelligence web, you degraded service to an attacker and collected more information to better identify them the next time they attack. All with minimal work on your part.

Nothing about this is revolutionary.  Marketers, Google, Facebook, etc are all able to piece information together to identify you even when you don't explicitly say who you are.  Banks, online video games, and major web services all degrade service based on perceived threats.  It's simply time for infosec defense to step into the modern world.

Prologue

I've left many things out above to keep the post clear.  However, There is certainly more to this idea once you start thinking more about it.
 
The first is existing tools.  Mandiant OpenIOC, Verizon VERIS, Microsoft Threat Intelligence Feed, Snort VRT rules, Maltego, Incident Object Description and Exchange Format, I could go on.  I think we are getting to where we have both robust sources of intelligence as well as formats and frameworks to describe them. What we lack is away to make them actionable.

Most of the above tools/frameworks are incompatible and many aren't even actionable except manually.  We lack a single intel data storage tool that can be extended to accept whatever formats are available.  (Or if we have one, we're certainly not using it.) 

Additional the tool needs to be extendable to facilitate response and remediation.  Making response a manual effort is a losing battle when offense is push-button easy.

Another issue is sharing.  We all have intel that would be helpful but that we, frankly, are not allowed to share.  That's ok.  If the tool is flexible, we will all join the circles of sharing we are allowed in to.  Corporations can run their own sharing groups, choosing who's in and who's out. 

Industries can choose to share with each other.  Some intel feeds might be available to everyone.  Some organizations may even choose to provide access to their web as a service.  You submit an event.  They reply with associations, keeping the actual web private.

And let's not forget the benefits.  Because your defense improves every time you are attacked, you have raised the cost of attacking. Every failed attack makes the next attack more likely to fail.  That means, to be successful, attacks must be of higher quality which means they cost more resources.  Because they cost more, minor threats are priced out of the market.

Repeat attackers will have an even harder time.  They will need to stage completely from scratch for every attack. Different domains, IPs, tools, browser headers, email address, attack times of day, everything.  Otherwise they risk being associated with the web and having all of what they DID change associated with their profile. 

The flexibility to start from scratch requires a large amount of skill which again prices many attackers out of the market. It's time.  Let's build the tools to bring our intel together to execute a better defense.

Possibly Related Articles:
11467
Network->General
Information Security
Incident Response Tools Attacks hackers Infosec Cyber Defense Attribution Remediation Cyber Intelligence
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.