State of the Hack: One Year after the APT1 Report

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
(upbeat music) (applause) - Good afternoon. They told me I couldn't start speaking 'til I'd reached the X. So, here I am at the X. Great to see you, I have 24 1/2 minutes to give you an update. I'm gonna talk about three things, because the Air Force trained me that every presentation only has three things to it. I'm gonna give you an update on the APT1 report and the behaviors that we've seen from PLA unit 61398 since we released the report. For those of you that haven't read it, which is about 98% of you, I'm gonna tell you what was the dialogue in that report, and then we'll end with some conclusions on lessons that we learned during responding to breaches in 2013. On the refresh, basically what happened about a year ago today is we released the report, but predating that report the New York Times was compromised in the fall of 2012. During that compromise, the investigation by Mandiant led to the revelation that there's Chinese hackers breaking into U.S. media. And specifically in the cover page when this was released on January 31 of 2013, the New York Times did an interesting thing. They (a) went public about the breach, and the second thing they did is said, and some consultants think this is the Chinese military. So a little bit of a baiting that, hey, this is the Chinese military that did these intrusions, and that's a very interesting fact, because in general throughout my career, when I first started in the Air Force, government entities generally hacked government entities for purposes of security. Government entities do not hack the private sector to learn what the media is up to, or doing. So here was the response, the response to that claim by the New York Times that the Chinese military had hacked them was, that it is unprofessional and groundless to accuse the Chinese military of launching cyber attacks without any conclusive evidence. And I agree. It is unprofessional and groundless, if you don't have the evidence. So when you get charged with something like, Hey, the Chinese military is compromising people, in general the response coulda came back, Yes, we are--but nobody wants to say that--or, No, we're not. And whenever you get an answer like this, which is what I call truthiness, you know, it's sorta true, it's a true answer, it's obvious to me that in fact the Chinese military was behind it. And we knew that anyway. So our response to this was, okay, let's show the evidence. And the evidence was in the form of about a 60-something page report, 3000 different indicators, 141 different victim companies. And we'll step through that. When we released this report in February of 2013, there's a couple reasons why we did it. First, we took our nomenclature at Mandiant of of APT1, and we linked it to PLA unit 61398, a military unit with people in uniform being charged to compromise private sector entities. We released also 3000 different indicators of compromise, meaning bad domain names, bad IP addresses, and basically the C-2 infrastructure of APT1's backbone, where they launched the attacks. Five-minute video just to kinda show you, hey, here's what the attacks looked like, because we had responded to 'em so much time. And, I wanna tell you why we did this. Why we released this report. And there's about 10 different reasons, but here's a couple of 'em. First and foremost, there's a general intolerance in the the C-level across the companies that we've been responding to. Over the last 10 years, we've responded at Mandiant to hundreds of different computer intrusions, by this unit, in fact 141 of them. And as we've responded to them, you could feel frustration brewing, because all these companies are spending not five million, but 10, 20 million dollars every year on their security infrastructure, but they're still getting compromised, and it's kind of an unfair fight when you have the government being resourced, and then picking on the private sector. It raises our cost of business, adds to this frustration. So first reason, C-level frustration. We gotta do something about this. Second thing is as we respond to all the breaches that matter at Mandiant, what we learned is we only answered two questions at the end of every breach. What happened, and what to do about it. That was it, over and over again. What happened, what do we do about it. What happened, what do we do about it. And as we responded to these breaches, we started learning what technologies worked, what processes worked, and what people needed to know to adequately detect and go from alert to fix in under 10 minutes. And here's the reality: there's no silver bullet. There's no technology that we could buy, no pill we could swallow to make this problem go away. Fine, let's try something non-technical. Let's see if there's a diplomatic way to approach this. So after 10 years of responding to Chinese intrusions from military units into the private sector, we decided, let's elevate the dialogue. Let's see if a back-office conversation can make rules of engagement work here. So we released the report-- another, third reason actually, besides-- and the first one again, C-level frustration, second one: no technology's working, let's try a non-technical solution. Third thing is we had a bunch of ex-military folks at Mandiant that were tracking this for a long time, and quite frankly everybody knew the Chinese were doing this, but nobody could really talk about it. So we had to get that out in the open. And I think the final straw is, as I was editing this report, the state of the union happened, last February, and the president of the United States said, we've gotta do something about gun control, because of the horrible things that happened in Connecticut, over a year ago. We have to get more jobs, and do something about jobs, cause every state of the union talks about getting more jobs. And then the third topic was, and we have to do something about the cyber espionage campaigns against the United States, and all the intellectual property being stolen. So we released the report for a bunch of different reasons. But let's elevate the dialogue. Specifically when we released this report, we absolutely at Mandiant only knew the lower bounds of what PLA unit 61398 had done over the last seven years. We had responded to 141 different victim companies, and every time we tracked these intrusions at these 141 companies, the technical evidence brought us to Shanghai, and the anecdotal non-technical evidence brought us to Shanghai. So let's take a look at some of that. To me, 97%'s an A. 98%'s an A+. At the end of the day as we traced these attacks back, 97% of the time, you know, we responded to 2672 separate intrusions, the IP addresses went back ultimately to IPs registered in Shanghai. When we looked at the command and control being used, there's about 97% of the time as well. And the neat thing about most intrusions is as soon as a bad guy breaks into your network, they try to get valid user IDs and passphrases, and they use them. In fact, 100% of the incidents that Mandiant has responded to in the last 24 months, the bad guys did get user IDs and passphrases, and then they used 'em. But when you use the remote desktop protocol that comes with Microsoft Windows, you actually set your character keyboard setting in the protocol itself. So if someone's sitting at a Cyrillic keyboard, and they're doing an RDP, we can say, Hey, whoever's hacking us, or logging in, is at a Cyrillic keyboard. In this case, 97% of the remote desktop sessions were in fact set to a mainland Chinese character set. So that's just the technical gibberish. Let's get to the non-technical, which are a little more obvious. As we Googled the internet for Chinese character set 61398, PLA unit 61398 and a few other things, we would find résumés that would just kinda spout up and then go away. And when we checked out these résumés, some of these résumés are from students that said, Hey, I used to work at PLA unit 61398, and while I was there, I did computer network coperations, I compromised institutes and organizations in the West, and it was a fun job kinda thing. And then we also found résumés that said, they wanted to work there. And we found a lot more anecdotal evidence than what we shared in our report. But when you're the CEO of a small company and you're about to accuse the largest country in the world of doing cyber espionage rather directly, you may wanna dial back that evidence so that there's no pie in the face of anybody, and you leave plausible deniability. The document you see there, if you had it translated, would just read, it was an agreement between PLA unit 61398 and Chinese telecom to put all the bandwidth into a building that looked like the one I showed you a slide ago. So who do these guys target? Every industry. You can go through this, this is 141 plots. Someone out there's counting the dots real quickly right now, and you're not gonna finish before I change slides. But there's 141 dots, 21 different industries, actually I think it's 20. And in a way this is totally misleading, because the whole infrastructure that PLA unit 61398 used to launch attacks into these 141 companies were in fact in the Western countries as well. So there's another real 3000 victims you can plop up here if you wanted to. But these are the companies we saw data exfiltration from. So they hacked everyone. They hacked everywhere. You know, here's a globe picture, cause everybody likes maps this late in the afternoon. So they did it. And I don't have enough time to give you more of the evidence, but if you wanna read about it, we had a 60-something-page report about it. How did the Chinese government respond? And this is the important part about today, is when we released this report, we were hoping we'd see behavioral change. The problem is, two days before the president of the United States met with the president of China in California, the Prism documents leaked to the press on that Wednesday. On that Friday, hours before the two heads of state were going to meet to talk about this cyber espionage, Snowden leaked, and I'm pretty sure that put a damper on the discussions. So we didn't get impact there. We really are strong supporters of the legislation that says let's share threat intelligence. You saw both prior speakers, the Cicso folks as well as Quaalus, said sharing threat intelligence is important. Hard to do that if you share with somebody, and there's a punitive step against you for sharing. I don't think that'll happen, but if you incent sharing of information with a safe harbor, everybody can ultimately potentially be as secure as the company that unfortunately got compromised. If we can learn from that single compromise and disseminate the knowledge quickly, we all benefit from the compromise. Right now with current disclosure laws, virtually nobody's benefiting from current compromise, and the company that has to disclose is getting penalized. Anyway, we tried to elevate the information sharing dialogue by sharing 3000 indicators that were immediately actionable. You could plug in the-- in fact, we even gave 'em in electronic format. Look for all traffic to these IP address. Look for all traffic to these domains. Go through your log files, do something about it. And when we burned PLA unit 61398's infrastructure, on the last day of the Chinese New Year, right before they came back to work from vacation, you can see in the slide, and it's not up there, so if you can that slide back up, I'll show you. There's a demarcation line. What we plotted in this, and the dates didn't show up when we transferred the slides, but over on the dots to the left there's a whole bunch of dots on where the Chinese PLA unit 61398 was doing their C-2 from. So every time they'd compromise an entity, they were using these domains, these IP addresses. We released our report right here, and guess what? We did alter their behavior: they never used any of that infrastructure again. Okay. But what we also did is created a whole bunch of new victims, because they built up their new architecture, or infrastructure to compromise somewhere else. So that was the effect we had, which was a temporary hiatus, or potential loss of visibility in what they did. End of story, is that they're still doing it today, it's not gonna go away. So now we have a nation state sponsoring intrusions into what we'd call the private sector here in the West. So conclusions when responding to incidents in 2013, and really over the last 15 years of my career, here's some of the things that I've learned. When you compromise a lot of countries, there are no risks or repercussions. Some of the attacks that we're seeing today when it comes from Russian criminal entities are the same people that we were responding to in 2003, 2004, 2005. So if we had a way to go from electronic evidence to grabbing the people and doing something about it, it probably woulda had some impact. Quite frankly, it's still happening today. Safe harbors do exist. People can hack other countries without risks or repercussions. You can commit crimes from 6-10,000 miles away. Future conflict's gonna have a cyber component. We learned that in 2013. In August of 2013 the United States was considering potential armed steps in Syria based on the use of gas in Syria, from pro-Assad troops against rebels. Okay, we're thinking of a conflict. The response to that impending potential armed conflict was computer intrusions. First into the western media, to figure out who's leaking all the conditions of what's going on in Syria to the western media, let's break in and figure out who that is. So it's a way to pierce anonymity behind some of the folks who are the sources of information. But second, you see some of the threats that were made. If the USA launch attacks on Syria, we may use methods of causing harm, rather than just the attractive nuisances of doing things like tweeting, "President Obama was hurt in an explosion." So, most people noticed the Syrian Electronic Army last year if you're a part of this security community. And you think, that's just an attractive nuisance to tweet things like this. But the more sinister purpose behind these intrusions were in fact to figure out who's communicating with western reporters. Hard to stop those attacks. I don't have time to go in the detail of it. But I think the Syrian Electronic Army actually had a smart way of doing their intrusions. Vulnerability has been human, in my opinion, since 2003, meaning when attackers target a network, they're targeting the humans that work behind your safeguards. Everybody's heard the MOTE analogy, it still applies. You can think about back in the late 90s to early 2000s, all this standards legislation and regulations popped up, that hodge-podge of ways to benchmark your cyber security program. We raised the watermark and we got better security for internet-facing systems. Vulnerability management, patch management. All the things that we did. As we hardened that eternal shell- (clears throat) Excuse me, people started targeting that avenue straight to your people. Let's Skype somebody and get 'em to click on a link. Let's e-mail somebody and if they open up that PDF document or Office document, we can compromise their machine. So the attackers are still targeting people today, and you can feel us scrambling around, trying to find a way to prevent that. The people surface is a large surface to attack. It's also made security a decentralized problem. We harden the exterior, now how do we harden beyond our borders? Unfortunately, cyberspace is absolutely asymmetrical right now. Meaning, the attackers have all the advantages. And I always hear, the attackers are smarter, I don't really think that's true. It's just so much easier to shatter crystal than to shape it, right? Same thing in cyberspace. Quite frankly the defenders are trying to defend hundreds of thousands of machines, while an attacker is just trying to break into one. That's not a very fair fight. Second thing is, what we're using to defend our networks as we bring security software to everybody, they go, Did you QA this, does it run on 18 different operating systems, is it inoperable with 5000 other things? We actually can't develop the defensive software as fast as the offensive software, which is not QA'd, simply works, and let's run it real quickly and get it out there. So, just the nature of the business offense is always going to be a little bit more effective. I've shown this slide for a long time, and a lotta people say that simply can't be true, so I'll try to explain it this way. I think it is true, for the attacks that Mandiant responds to, I believe if you're an F in cyber security, or an A in cyber security, the attacks have the same chance of being successful, because the attackers we respond to will elevate or escalate their sophistication to break in. If you're an F in cyber security, and someone hacks you, you just won't know about it. You'll never find out, and ignorance is bliss. You'll be like, woo! Nothing happened. If you're an A in cyber security you're getting dynamic threat intelligence, you have signature-based detection, you have signature-list-based detection, you have custom-based ways of finding evil on your network, and at the end of the day, if you are compromised, you're aware of it, you go to alert-to-fix in a reasonable time frame, you eliminate the consequence of the breach, and most breaches are limited to a single host. And there are companies that got here. It's hard to get there, it's expensive commitment, but we're rounding the corner to make that more effective and affordable. So the moral of the story is if you're an F in security you're gonna get compromised, period. People who come up with cyber-com levels, and threat score levels, and at the end of the day, if you can be compromised, you will be compromised, cause we can automate this, and if you're an F you'll never be aware of it. If you're an A, you're aware of it, you have great people, and you pounce on it like the amoeba defense. The liabilities are exceptionally high, and they're still high, and I've seen this throughout my career be like a sine-wave. There are years where literally if you get compromised and you know it, the liabilities just seem less. Right now they feel high again, and I'm seeing people get compromised, and the entities within days of being compromised are coming public and saying, I am truly sorry that somebody stole things from us and victimized us. It is one of the only crimes when somebody hacks in, in fact it's the only crime I can think of where you have to apologize for being a victim. And it's getting that way again and it's startling that it's gotten that way. But either way, because of the consumer protection and consumer disclosure requirements, what we've done is made a very technically complex thing--responding to an intrusion to determine what happened--now non-technically complex, cause now everybody's a stakeholder. Insurance companies, managers, inside counsel, outside counsel, credit card companies or the card brands, your partners, all the contracts and agreements you have with everybody you do business with, and you start responding to these things and realize, you better get someone who knows how to navigate the landmines, because some of the stakeholders, when you're disclosing, and you're creating information to share, actually have conflicts of interest. So it's pretty neat. You have to figure out what you need to share, when you need to share it, and who you actually need to share that information with. Very complex environment. I've witnessed in my career, but I have a skewed viewpoint, because we respond to incidents, that almost every time a company gets compromised, they say, all right, we're gonna transform our security, and we're gonna do all these other things now. And as companies start doing those others things, I've witnessed a victim mindset erode. When you're a victim of a cybercrime, your diligence skyrockets. You feel violated. You feel kinda icky, kind of. And you say I gotta do something about this. You hire people, you expand your team, you buy a bunch of tools, and you aggressively start combating the attackers that are trying to break in. And six months later, you don't think it's gonna happen again. Some companies they get in a battle rhythm, cause they keep getting compromised, some actually just go, you know what, we don't need to do all this stuff anymore, the threat's gone down against us, we've proven it. And you see that victim mindset erode over the course of probably about two years. And everybody's security tends to be a sine wave. They get really, really good, and then they start dipping down a slope. And a lot of times when you get good at cybersecurity, your best people start to leave. They start realizing we can go here and here and here, cause you don't have enough folks. The vigilance fatigue is, you know, when you're a boxer and you're guarding your face, over time you just let your guard down. And bad guys will adjust to everything you do. So if keep extending that Maginot line of defense, we at least can predict where the intruders are gonna go to, and how they're gonna break in, and try to put visibility on that, but our mindfulness on inspecting that visibility goes down over time. So what do we do about this? Cause I always feel like, boy, I give you a lot of bad news. Thinking about the mindset, security breaches happen. I used to say security breaches are inevitable. I first said that in 2004, when I started a company called Mandiant, and everybody went, no, you are absolutely wrong! And it does feel defeatist, and I don't mean it to sound that way. So I'll just say it this way: security breaches happen. (light audience laughter) Just like other things. That's fine when they happen. I say it is our goal as security professionals to reduce your target area to whatever your risk profile happens to be, but always realize that if there's a way to break in, people are going to try to exploit it. Lotta times when I talk to CISOs and people at security conferences, I always think, leave the conference with the idea of let's figure out how we can break into ourselves, because if there's a way to do it, someone may find it, and then monitor the heck out of it. And then, let's adopt the philosophy of, if a breach does happen, instead of saying, Geez, I'm really sorry, sorry world, someone robbed me, it was my fault. I mean, we are responding to hundreds of companies that've been compromised, and a lot of them have a B, B+, A- in security. And when I see the attacks I'm thinking to myself, how would we have prevented this? So there's sometimes the mindset of, Oh, they must have done something wrong, and that's why they got compromised. But in an operational environment with 200,000 employees, it's a real tough job being the CISO. So think about, if you do have a breach, go from alert-to-fix in 10 minutes and eliminate the impact. And I will always brief this because I'm trying to eliminate the load on your backs because at the end of the day, your security posture wanes without the security people even knowing it. At most companies, IT operations is way out in front of provisioning things than security. And the security guy's always chasing things down, saying, What, we put 300 applications online last month? What, we have 2 million iPads on our network right now? What, we just hired 172 employees in the last two weeks, and they all have new desktops and we don't even know the image for 'em? I mean, at the end of the day business moves far faster than the security team that's trying to secure what we're provisioning. So: security breaches will happen, it is our goal to eliminate the impact and continue to evolve, and that's why coming to this conference is great. We get to see all the new technology and innovation that's gonna address this. I'd like to thank you for your time. I appreciate you being here. (applause)
Info
Channel: RSA Conference
Views: 10,023
Rating: 4.9111109 out of 5
Keywords: security, rsac, infosec, rsa, rsaconference, information, cybersecurity
Id: 88o-uifbJSE
Channel Id: undefined
Length: 22min 22sec (1342 seconds)
Published: Fri Feb 28 2014
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.