Q1. What are some of the biggest challenges that enterprise organizations face with respect to threat hunting? Where do the biggest capability gaps exist?
The first challenge they will encounter is gaining proper visibility and telemetry into the enterprise. Not all telemetry is created equal; network data is easy to get - for example taking it directly from the span port of a router - but it suffers from a lack of actionable insight due to the pervasive use of encryption. Security is often blind to activity occurring outside the physical network perimeter, which is especially important today with so many organizations adjusting to rapid work from home adoption. Telemetry collected at the endpoint is typically the most valuable as this is where the "action" is from an adversary perspective.
Identifying and collecting the right event data is just half of the job; the other key to success is being able to store it in a centralized location and make it available in real-time and at a scale to support hundreds of thousands of devices.
The second challenge comes when it's time to convert the millions of events and records you collect from all of the devices into hunting leads, investigating them, and making the right decisions. Tools and technology can help here and are vital when it comes to improving efficiency through automation, but ultimately there is no substitute for human experts. Hunting teams should be dedicated rather than moonlighting in their spare time (who actually has spare time in this business?). The difference between normal and unusual behavior can be slight and nuanced and can evade even the most sophisticated AI models; teams need deep experience in technology, signals, and human intelligence, to be able to efficiently look at a series of events and quickly determine if it is benign or suspicious and warrants further investigations.
Most organizations struggle to find and retain these experts - the skills shortage in cybersecurity is well documented - and being able to staff a 24x7 team is even harder. This is where CrowdStrike spends a lot of time thinking about how we can help our customers do more with their existing staff; how can we provide more actionable context, how can we guide analysts to the right decision point, and how can we give them the confidence to take action.
Q2. What kind of endpoint controls do organizations require these days to deal with the latest threats and adversary tactics? What's the most significant way in which endpoint threats have evolved/changed in recent years?
I'll answer this question in reverse order as I believe the threat landscape is what should guide the controls organizations use to deal with them. It is well known that adversaries are increasingly using native tools and techniques (living off the land) to achieve their objectives. Even when malware is involved, we are seeing a steady decline in traditional binary-based attacks in favor of malicious scripts.
Ransomware for example continues to evolve at a rapid pace and remains one of the most existential threats to an organization. The trend now is towards "Big Game Hunting" and extensive use of Ransomware as a Service (RaaS) platforms. That said, the execution of the ransomware itself is usually the last step in the attack. Usually it's preceded by an extensive campaign that typically starts with social engineering or phishing to gain initial access, followed by elevation of privileges, credential theft, lateral movement, and extensive reconnaissance that often utilizes living off the land techniques.
In a recently publicized event, an adversary using "Ragnar Locker" made recommendations to their ransomware victim while negotiating for the restoration of their data. Many were basic security measures and hygiene protocols - disabling local admin accounts, restricting use of domain administrator accounts, minimizing privileges to existing accounts to the bare minimum necessary, and changing passwords frequently to name a few.
More interestingly, the attackers said "Don't count on the Anti-Virus, there is no AV that really helps" while simultaneously recommending the deployment of Endpoint Detection and Response (EDR). Despite its source I would second all their advice and add that an EDR tool is only as good as the team operating it. I discussed the challenges organizations will face in building out an effective threat hunting program in the previous question. For many organizations a managed threat hunting service in combination with a managed service provider operating their EDR platform will be the most effective solution.
Q3. What does Crowdstrike plan on highlighting at the Black Hat USA 2020 virtual event?
At the first ever virtual Black Hat, the CrowdStrike team will present informative sessions on critical topics, demonstrations of the powerful CrowdStrike Falcon platform and opportunities for one-on-one meetings with CrowdStrike world-class experts.
During the sessions, we'll be exploring the uptick in sophistication behind ransomware attacks, and what tactics, techniques and procedures (TTPs) the more prolific ransomware operators are employing to prey upon the remote workforce.
We'll also be sharing lessons from the front lines of incident response and real world applications from our CrowdStrike Services team. Last but not least, another session will take a deep dive into the CrowdStrike Falcon platform's APIs for threat intelligence feeds, real-time reporting and dynamic response. Below are the full details for each session:
Dealing with Ransomware While Your Workforce is Remote
Jesse Travis, CrowdStrike Sales Engineering Manager
Thursday, August 6, 11:00-11:40 a.m. PDT
Avoid the Breach, Save the Weekend: Top Lessons Learned with CrowdStrike Services
Tim Parisi, CrowdStrike Services Director of Incident Response
Thursday, August 6, 1:30-2:10 p.m. PDT
Working with CrowdStrike API
Adam Hogan, CrowdStrike Sales Engineering Manager
On Demand