- S2 Grupo

Defense against APT compromises
Advanced cyberintelligence
Detecting the unknown
Highlights
Advanced Persistent Threats
• Effective protection against
APT compromises: Protection in
Nowadays, cyber attacks are more sophisticated and targeted than ever. Threats have
evolved from known, isolated and unfocused to very sophisticated, persistent and
targeted. These new types of threats are known as APT (Advanced Persistent Threats). • Unknown threats detection
APT’s level of sophistication, premeditation and persistence has caused the traditional
detection and protection mechanisms focused on detecting and blocking known threats
to become ineffective.
the intrusion and persistence phases.
by behavior analysis and without
signatures.
• Tailor-made detection: develop
your own capabilities for detecting
targeted threats.
• Accelerate the investigation
cycles: facilitate threat detection
APTs do not look for short term benefits, they remain unnoticed and constant until
they accomplish their objective. Their aims have a very high impact and the attacked
organizations rarely know that they are the target of the attacks nor its origin. The
objectives of ATPs can be financial, military, technical or political and they predominantly
affect organizations in strategic sectors or those dealing with sensitive information. To detect an APT compromise, presents an enormous complexity, and in practice can be
compared with looking for a needle in a haystack.
by the security analyst team (threat
hunting) simplifying the data analysis
processes.
• Obtain complete and informed
visibility of non-legitimate information
movements within your organization.
• Fast and easy deployment
using low intrusive technology.
One in every five
companies has suffered
an APT compromise.
94% of the respondents
believe that these types of
attacks represent a threat for
economic stability and national
security.
More than 80% consider
that their company has not
updated its protection against
these types of threats.
63% think that it is only
a matter of time until their
company will be targeted by an
APT attack.
* Source: ISACA’s global cybersecurity survey of more than 1,500 security professionals
Anticipating a cyber secure world
www.s2grupo.com
What is it, and How does it work?
Investigate, detect, and stop
compromises by APTs targeting
your organization
CARMEN is a European capability to detect advanced persistent
threats (APTs), specifically the malware associated with these threats.
CARMEN was developed by S2 Grupo, and supported by the Spanish
National Center of Intelligence, based on their vast experience in the
field of advanced surveillance, and protection.
the objective of identifying information exfiltration or communications
with C&C systems with protocols such as HTTP, DNS or SMTP (the
most common for these types of communications) as well as common
maintenance mechanisms or information theft on the corporate network
(lateral movement).
CARMEN monitors incoming network traffic to identify and stop threats
at the intrusion phase applying advanced sandboxing techniques.
With this objective, network traffic is acquired both passively (via
sniffing and protocol dissection, e.g., Passive Proxy) or processing
logs (e.g. HTTP proxy), and then normalized and stored. Thereafter,
the automatic, semi-automatic and manual analysis may start, turning
CARMEN into a tool to support the security analyst decision-making,
allowing finding the needle in a haystack, and prioritizing the elements
to be analyzed from the entire volume of acquired data.
However, nowadays it must be assumed that protecting the perimeter
is not enough and it should be presumed that threats may have already
passed the intrusion phase.
For this reason, CARMEN focuses on processing and analyzing
outgoing network traffic (Command & Control and exfiltration) with
In order to help the security analyst CARMEN works on several
areas: misuse detection, behavior analysis and anomaly detection,
both statistical and knowledge based (this last aspect is especially
interesting because it allows the exchange of information and the
sharing of intelligence related to advanced malware). In this manner,
Anticipating a cyber secure world
the data related to the acquired and stored network traffic is analyzed,
in order to find behavioral patterns, which with higher or lower
probabilities indicate the exfiltration of information, or alternatively the
communication with C&C servers, or a suspicious lateral movement.
www.s2grupo.com
DATASHEET
Capabilities
• Non-intrusive system. Passive information acquisition
of network protocols such as HTTP, HTTPS, DNS, SMTP or
NETBIOS.
• Breach detection using advanced Sandboxing techniques,
detonating files identified as suspicious in a previous triage
stage.
• Misuse detection by identifying access to non-legitimate
destinations. Catalog of Indicators of Compromise, support for
OpenIOC.
• Lateral movement detection analyzing non-legitimate or
suspicious traffic between endpoints.
• Powerful interface for the development of Plugins
with extensions in Python, which allows customizing the
detection capabilities to the singularities of a targeted threat.
• Support for investigations during the entire life cycle by
facilitating the Threat Hunting process.
• Alarms triggered by anomaly detection with all the
contextual information, that leads to a new investigation or
complements an existing one. • Statistical anomaly detection outlining malware activity
among the huge volume of legitimate traffic.
• Time series anomaly detection using heat maps and
• Exfiltration detection without external movement
in which information is not directly exfiltraded but moved to an
asset that can be reached from the internet.
patterns of recurrent connections.
• Behavior analysis by identifying network traffic patterns,
• Integration with honeypots. Deploy a honeypot network
• URL anomaly detection by entropic analysis.
• Integration with eMas Incident Handling for Incident
from the pre-designed catalog of analyzers or customized by the
user.
within your organization and receive and manage alerts with
CARMEN.
Management.
• Anomaly detection and improper use at the
endpoint, correlation with network activity .
Anticipating a cyber secure world
www.s2grupo.com
Architecture
CARMEN is deployed an appliance with different hardware
specifications depending on the volume of data that needs to be
processed and the required network interfaces to be connected.
analysis functions, as well as responding to more complex scenarios
with multiple collection and processing nodes connected to a central
analysis node.
CARMEN’s flexible architecture allows a centralized deployment with
just a single node, which performs the collection, processing and
RIC (Shared Intelligence Network)
Advanced threats evolve very fast and the protection mechanisms
must do so at the same pace. Sharing intelligence is crucial for their
detection and this is RIC’s objective.
The Shared Intelligence Network is conceived as a collaborative
environment where users can download new capabilities that have
been previously evaluated and validated.
Benefits
Protect sensitive business
information, intellectual
property and critical assets in
your organization
Avoid reputation loss
and brand damages
Reduce financial impact
due to information theft
Get full visibility and
awareness of non - legitimate
information movement within
your organization
Request a demo
For more information about how CARMEN can help you to keep your
organization secure contact your account executive or request a demo.
[email protected]
(+34) 902 882 992
www.s2grupo.com
carmen.ds.en.1.3
Anticipating a cyber secure world
Anticipating a
www.s2grupo.com
cyber secure world