3. “There are two types of companies that use
computers. Victims of crime that know they are
victims of crime and victims of crime that don’t
have a clue yet.”
- James Routh (CISO
Depository Trust Clearing Corporation)
4. “In today’s modern world, technology alone is not enough to
combat the threats that now face organizations of all types and
sizes. With the integration of continuous threat intelligence
updates from OTX and AlienVault Labs, we can now provide
millions of Spiceworks users with insight into the threats that
could impact their business, and the guidance they need to take
preventative measures.”
- Russ Spitler
5. What is this SpiceWorks / AlienVault Integration?
Where does the threat data come from?
What should I do when I get an AlienVault alert in SpiceWorks?
Introduction to AlienVault USM.
Demo with Victor Obando, systems engineer.
Agenda
8. Alerts in Spiceworks:
Dashboard & Device Details Page
“SpiceWorks has found a connection with a potentially suspicious
IP Address 77.240.191.89 on device tmg-mbh.“
13. False Positives… The Root Cause
IPs Change
IPs may be assigned to a different server, owner
Threats Get Remediated
In the case of compromised/slaved servers, system owners may
remediate threat
Threats Naturally Expire
Campaigns and targeted attacks end per orchestrator’s plans
16. The world’s largest crowd-sourced
threat repository
Provides access to real-time,
detailed information about threats
and incidents
Enables security professionals to
share threat data and benefit from
data shared by others
Powers the AlienVault Threat Alerts
in SpiceWorks
What is Open Threat Exchange (OTX)?
17. OTX + AlienVault Labs
Threat Intelligence Powered by Open Collaboration
Updates every
30 minutes
200,000 – 350,000
IP addresses
validated daily
8,000 Collection
Points
140 Countries and
growing
18. Threat Types Detected
Malware Domain
Distributing malware or hosting exploit code
Malware IP
Instrumental in malware, including malicious redirection
Command and Control
Sending command and control instructions to malware or a botnet
Scanning Host
Observed repeatedly scanning or probing remote systems
APT
Observed to be actively involved in an APT campaign
Spamming Host
Actively propagating or instrumental in the distribution of spam
Malicious Host
Engaged in malicious but uncharacterized activity
19. Data Expiry & Privacy
122.225.118.219 # Scanning Host
CN,Hangzhou,30.2936000824,120.161399841
122.225.118.66 # Scanning Host
CN,Hangzhou,30.2936000824,120.161399841
188.138.100.156 # Malware IP;Scanning Host DE,,51.0,9.0
211.87.176.197 # Scanning Host CN,,35.0,105.0
95.163.107.201 # Spamming RU,,60.0,100.0
188.138.110.48 # Malicious Host;Scanning Host DE,,51.0,9.0
72.167.131.220 # Malware IP US,Scottsdale,33.6119003296,-
111.890602112
174.120.172.125 # Malware IP US,Houston,29.7523002625,-
95.3669967651
210.148.165.67 # Malware IP JP,,36.0,138.0
75.75.253.84 # Spamming US,Henderson,36.0312004089,-115.073898315
What OTX Collects
External IPs connecting to system
Traffic Patterns (Timestamps)
What OTX Does NOT Collect
System data
System information
Internal IP traffic
Any personally identifiable
information
Contributed Data
Expires after 30 Days
Scanning
Expires after 30 Days without
additional evidence
Contributed Data
Expires after 30 Days
Scanning
Expires after 30 Days without
additional evidence
20.
21. August 7th
August 28th
September 4th
August 20th
Aug 7, 2014
September 2nd
September 10th
August 15th
August 27th
Recent Breach Disclosures
22. More and more organizations are finding
themselves in the crosshairs of various bad
actors for a variety of reasons.
The number of organizations experiencing
high profile breaches is unprecedented.
The “security arms race” cannot continue
indefinitely as the economics of securing your
organization is stacked so heavily in favor of
those launching attacks that incremental
security investments are seen as impractical.
Threat Landscape: Our New Reality
84%
of organizations breached
had evidence of the
breach in their log files…
Source: 2012 Verizon Data Breach Investigations Report
25. Unified, Coordinated Security Monitoring in a single console
Simple Security Event Management and Reporting
Cutting edge, crowd-sourced threat intelligence from
AlienVault Labs and Open Threat Exchange™ (OTX)
SIEM, Network IDS, Host IDS, Wireless IDS, File Integrity
Monitoring, Vulnerability Assessment and more.
Full suite of compliance reporting
Fast Deployment – Be up and running in 1 hour
Designed and Priced for the Midmarket – Starts at $3600!
Why AlienVault for Your Environment
26.
27. AlienVault Labs Threat Intelligence:
Coordinated Analysis, Actionable Guidance
Weekly updates that cover all your coordinated rule sets:
• Network-based IDS signatures
• Host-based IDS signatures
• Asset discovery and inventory database updates
• Vulnerability database updates
• Event correlation rules
• Report modules and templates
• Incident response templates / “how to” guidance for each alarm
• Plug-ins to accommodate new data sources
Fueled by the collective power of AlienVault’s Open Threat Exchange (OTX)
30. More Questions?
Email Hello@AlienVault.com
Thank You! Any Questions?
Test Drive AlienVault USM
Download a Free 30-Day
Trialhttp://www.alienvault.com/free-trial
Try Our Product Sandbox
http://www.alienvault.com/live-demo-site
Editor's Notes
Hello SpiceHeads! – my name is Garrett Gross and I’m the Senior technical product marketing manager here at AlienVault. Before that, I was a sales engineer at Solarwinds (you may have heard of them) and, before that a sysadmin at a storage software company. I’ve held many other IT positions as well - help desk, hardware repair, tech support, bounty hunter, etc. Most importantly, I’m very passionate about information security and, of course, bacon.
I’m very excited to be here at SpiceWorld. Its been a great show so far and I cant believe the response we’ve had! I’m also SUPER excited to be speaking to you today and really appreciate your time. There will be a Q&A at the end so make sure to stick around for that!
Let me tell you a bit about AlienVault.
Founded in 2007, AlienVault is the leading provider of Unified Security Management and crowd-sourced threat intelligence, headquartered in San Mateo, CA; with offices in Austin, TX; Madrid and Granada, Spain as well as Cork, Ireland.
You all probably know us from the AlienVault Threat Alerts in your SpiceWorks dashboard, alerting you to any monitored devices in your environment that are in contact with potentially malicious hosts. We’ve gotten a lot of GREAT feedback from the SpiceWorks community and are glad to hear that so many of you are using and enjoying this integration.
I’d like to take some time to talk to you about these Threat Alerts, how we get our data to identify these threats, and what to do when you receive an alert like this.
But first – lets talk about getting hacked…
Famously quoted back in 2007, James Routh (CISO for the Depository Trust Clearing Corporation) said: “There are two types of companies that use computers. Victims of crime that know they are victims of crime and victims of crime that don’t have a clue yet.”
We need to go about our day knowing that we will we get attacked. Not only will we get attacked, there is nothing we can do that will ever 100% prevent someone from compromising assets in our environments.
To quote one of the more talented individuals that I work with, Russ Spitler:
“In today’s modern world, technology alone is not enough to combat the threats that now face organizations of all types and sizes. With the integration of continuous threat intelligence updates from OTX and AlienVault Labs, we can now provide millions of Spiceworks users with insight into the threats that could impact their business, and the guidance they need to take preventative measures.”
And, he’s right – IT pros today need to understand that no amount of security controls will prevent attackers from compromising machines on the perimeter.
So, again – to best prepare for, and understand how to properly mitigate, attacks, we need to operate under the assumption that attackers will breach even the best of security measures. More information about what is going on in your environment from a security perspective will make dealing with these attacks much easier.
That’s where we come in…
Real quick, though - Here’s an agenda of what I’d like to cover today.
What is this SpiceWorks / AlienVault Integration?
Where does the threat data come from?
What should I do when I get an AlienVault alert in SpiceWorks?
Introduction to AlienVault Unified Security Management platform, our commercial product.
Demo with Mark Allen, systems engineer.
SpiceWorks/AlienVault integration
As I mentioned earlier (and as most of you here know), SpiceWorks comes with AlienVault Threat Alerts built-in (at no charge) as of version 7.1 (as you can see up here). There’s nothing additional you need to do to enable these alerts. With all these alerts coming in, SpiceWorlks users are quickly figuring out that there is a lot of communication coming in and out of their environment that they are not aware of.
This integration alerts you when one of your monitored devices is found communicating with a known threat, a host we have a record of in our Open Threat Exchange. This is what they look like in your SpiceWorks dashboard.
Clicking on “View Details of threat” then takes you to the Threat Details page where you will find more information about the potentially malicious host:
It will display the threat type (malware domain, command and control server, scanning host, etc), what domains might be associated with the host, any blacklists that the IP is on, when the threat was first and last seen, and how many alerts have been raised in SpiceWorks from this IP.
Scroll down the page and you get a description of what we think this threat is and how we recommend interacting (or not interacting) with it. Directly to the right, you can see how often this threat comes up in our findings to maybe give you an idea of how active of a threat this is. We’ll also display the download link, file type, and MD5 hash of known malicious payloads delivered by the host.
Lastly, we have some GREAT remediation advice that gives you an idea what to do once you know one of your machines has come in contact with a known bad actor. For instance – there are quick tips on how to isolate an infected host or quarantine a command and control server. We’ve actually tailored this advice depending on the direction of the communication (inbound, outbound, or bidirectional)
Our labs team works tirelessly to ensure that you are getting the most accurate data and quick enough to deal with current threats. However, even the most thorough analysis has a chance to produce false positives and we welcome your feedback. If you feel that the IP we have listed as a potential threat is not, in fact, malicious in nature, we would like you to let us know. In the top part of the Threat Details page, there is a link to flag the IP address for review. That will alert our labs team and the report will go under further review. They will then either provide additional detail substantiating the notion that the host is malicious or, in the case that it isn’t, purge the record from our database.
So – why the false positives?
IPs change. IPs can easily be assigned to a different server and/or owner.
Threats Get Remediated. In the case of compromised/slaved servers, system owners may respond to and remediate the threat.
And Threats Naturally Expire. Campaigns and targeted attacks end per orchestrator’s plans. Honestly, that’s the case more often than not these days. Multi-stage dynamic attacks tend to be the more prevalent attack where the same compromised hosts (C&C servers, botnets, rootkits) are rarely used again.
Also - some urls can just LOOK malicious. An example of that is one that came up recently. Microsoft is (or was) using CenturyLink (formerly Savvis Communications) to host some update content. Unfortunately,
‘windows.update.nsatc.net’ could look a lot like
safe.happy.unicorns.malware.hackyou.com to some IP reputation scanners out there. Now – these entries are usually auto-purged or thrown out by our team by the time the data reaches us but this would be a great opportunity for one of you to flag the IP for review.
Where does this data come from?
Many of you are probably wondering where our IP reputation data comes from and the short answer is “from our Open Threat Exchange” or “OTX”. OTX is an open information sharing and analysis network, providing access to real-time, detailed information about threats around the world. It is also the same threat intelligence that powers our security platform, USM (which some of you here might be familiar with or even use today).
The Open Threat Exchange is an integrated approach to threat intelligence, comprised of data from 140+ countries and the independent research from our AlienVault Labs’ team. We analyze over 500,000 malware samples per day, updated every 30 minutes, converting this threat data into actionable intelligence. This allows you to call out truly significant events to help you prioritize your efforts and reduce the need for in-house expertise.
OTX derives its data from three primary sources: USM and OSSIM installations that enable OTX sharing, external feeds from public researchers and partners, as well as the research done by our AlienVault Labs team. This data is then run through a powerful discovery engine that is able to granularly analyze the nature of the threat, as well as a similarly powerful validation engine that continually curates the database and certifies the validity of those threats.
Crowd-sourced information remains the core focus of OTX, deriving information from normalized, anonymous event logs: firewalls, content filters, ips/ids logs, etc. We receive approximately 17,000 contributions daily from over 140+ countries. Just to be clear, though: OTX's information is anonymous. OTX does not analyze your data or do anything that would identify you or your activity. We are solely focused on analyzing the nature of the threat jeopardizing your system.
OTX receives a significant amount of data from the security community itself. We work with public research institutions, government organizations, and private companies and partners to share and analyze threat data.
AlienVault Labs’ research is also a critical part of our analysis. Our labs team generates novel research on high profile threats and is responsible for instrumenting the automatic analysis for discovering and certifying all threats coming from OTX partners, OSSIM and USM customers who opt in to share data.
I want to point out that this is the integration point for our app within SpiceWorks, leveraging the cloud services capabilities within the application.
Simply tracking threats isn't enough. To properly architect a solid defense, you need context. OTX is able to use its powerful validation engine to provide introspection to not only whether a threat is valid, but also WHAT kind of threat it is.
I Want to emphasize how powerful this automated engine is: our engine can engage in code-level analysis to discover whether certain threats are part of an APT attack, deconstruct binaries to see whether a threat is a command and control server for a botnet, and even use the taxonomy of a known attack to see where malware is being stored versus where it simply pipes thru.
Data quality is key with OTX, and two big parts of our validation engine are its ability to score and analyze threats as well as continually certify the data. For scoring and validation, we confirm data with other sources to ensure we're not seeing false positives. This includes pruning known security researching hosts, as well as white-listed sources. Our engine also scores and uses feedback to gauge the potential danger associated with the threat.
Like I mentioned earlier: things change. Its very important to not only discover these threats but to continuously monitor for changes in activity. IPs often change ownership, threats get remediated, and threats naturally expire.
Thankfully, we try to reflect that in our data. Our engine ensures that our threat intelligence is fresh and relevant. Generally, data on a threat expires after 30 days unless new information shows it remains active. However, for specific types of threats these expiry rules may change…
As I mentioned earlier, the information that the Open Threat Exchange collects (should you choose to share your data with the OTX community) is anonymous. External IPs connecting to your system as well as traffic patterns (when these connections were made) are collected but specific system information, internal IP traffic, or any other personally identifiable information is not collected. Don’t worry, no one cares that you’re totally into My Little Pony anyway.
So – Back to Spiceworks. You’ve gotten an alert that one of your devices has been in contact with a potentially malicious host… What do you do?
What you don’t do is freak out. These alerts that pop up in your dashboard are not meant to cause panic or lead you to believe there has been a compromise. However, they are certainly important enough to pay attention to.
If you don’t have any go-to url reputation sites already (VirusTotal, totalhash, etc), just Google the IP. A word of caution, though – put the IP into the actual search field, not the “hybrid” navigation/search field. That’ll just take you to the potentially malicious host. Not like I’ve done that… earlier today…
Seriously, though – a Google search will usually return results from the top IP rep sites, including the one I mentioned. You might have to be creative with the search query but “<IP in question> malicious, analysis, virus, etc” should do the trick. Try to get information from as many sites as possible to either corroborate the alert and confirm the suspected malicious nature of the host or provide enough proof that this must be a false positive. If so, you can dismiss the alert but not before flagging the IP for our AlienVault Labs team to review.
At that point, you can use your new data to check your IDS logs, run thorough scans on potentially compromised devices, update authentication, even block certain IPs, re-image compromised machines, etc. if necessary.
It would also be a smart idea to do an environment-wide AV/malware scan as soon as possible.
I imagine I would be hard pressed to find someone in this room that is not aware of any of the recent security breaches involving major retailers and service providers: Target (or is it ‘tar-zjhey’?), Home Depot, um…. iCloud??
These are HUGE corporations with seemingly endless budgets and inexhaustible resources that allow them to not only have the most expensive and elaborate security systems, but also a large and highly skilled team of people to run it all.
But how much importance is put on the security of the environments powering the midmarket?
Talk to slide…
“50 percent of all data breaches occurred at companies with fewer than 1,000 employees and 31 percent with fewer than 100 employees. - Verizon 2014 Data Breach Investigations Report”
The point I’m trying to make is that, while the big companies are getting the spotlight, it’s the smaller companies facing the greatest amount of threats. Most of these companies are fully networked with their environments exposed to the outside and some have no protection whatsoever. You know the old adage of ‘shooting fish in a barrel’?
Whats the answer? Buy disparate security controls to address an issue, most of the time AFTER it happens? Manage them autonomous from each other, maybe even have different individuals managing different types of security tech?
We all know that doesn’t work. It doesn’t work when monitoring your network , it doesn’t work when monitoring applications, and it doesn’t work when it comes to security either, especially if you’re a small to midsize shop.
I propose a different approach – AlienVault’s Unified Security Management platform, combining Asset Discovery, Vulnerability Assessment, Threat Detection, Behavioral Monitoring, and Security Intelligence. Combined with our Threat Intelligence, this unified set of security controls allows users to effectively monitor their infrastructure and keep up with the latest threats.
So – again – why do I need this in my environment?
Unified, Coordinated Security Monitoring in a single console
Simple Security Event Management and Reporting
Cutting edge, crowd-sourced threat intelligence from AlienVault Labs and Open Threat Exchange™ (OTX)
SIEM, Network IDS, Host IDS, Wireless IDS, File Integrity Monitoring, Vulnerability Assessment and more.
Full suite of compliance reporting
Fast Deployment – Be up and running in 1 hour
Designed and Priced for the Midmarket – Starts at $3600!
So – not only are we able to offer a comprehensive solution to those that have a tight budget, but also arm organizations that do not have a dedicated security team with expert-level threat intelligence. Think of our AlienVault Labs team as an extension of your own IT team.
Regular updates to USM from our labs team include:
Network-based IDS signatures
Host-based IDS signatures
Asset discovery and inventory database updates
Vulnerability database updates
Event correlation rules
Report modules and templates
Incident response templates / “how to” guidance for each alarm
Plug-ins to accommodate new data sources
All influenced by the data collected in OTX
I want to stress here how we are not only giving you a software solution that is easy to set up and easy to use but also bolstering that with our open threat intelligence network and independent research from our AlienVault Labs team.
Check out our sweet awards..