Exploits at the Endpoint: SANS 2016 Threat

Interested in learning
more about security?
SANS Institute
InfoSec Reading Room
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.
Exploits at the Endpoint: SANS 2016 Threat
Landscape Survey
The perfect storm it is upon us: Users with their many devices are falling victim to phishing and ransomware
at alarming rates, with user actions at the endpoint representing the most common entry points allowing
threats into organizations. Results reveal that ransomware, which spreads by phishing and web downloads, is
the No. 1 type of malware making its way into organizations. Read on to learn more.
Copyright SANS Institute
Author Retains Full Rights
Exploits at the Endpoint:
SANS 2016 Threat Landscape Survey
A SANS Survey
Written by Lee Neely
September 2016
Sponsored by
Check Point Software Technologies, Ltd.
©2016 SANS™ Institute
Executive Summary
The perfect storm is upon us: Users with their many devices are falling victim to
phishing and ransomware at alarming rates, based on the results of a new SANS
survey taken by 301 IT professionals. In it, user actions at the endpoint represent the
most common entry points allowing threats into organizations.
Results reveal that ransomware, which spreads by phishing and web downloads,
is the No. 1 type of malware making its way into organizations. In the survey, this
scenario repeats itself industrywide, indicating a dangerous trend. For example, a Los
Angeles hospital hit by ransomware
Key Findings
in February 2016 had all its medical
TAKEAWAY:
records locked up for hours, and
Given the reliance on user
law firms, schools and even city
interaction for propagation
governments fall victim to these
and the prevalence of
ransomware, users—through
attacks. In April, the FBI estimated
1
How Attackers Get into User Endpoints
75%
of identified, impactful threats initially
entered via email attachment
46%
of attacks were executed by users
clicking web links in email
41%
also experienced attacks involving web
drive-by or downloads
a $1billion ransomware market for
2016, with $209 million collected by
no fault of their own—have
cybercriminals in the first three months
become the biggest threat.
of 2016.2
Of threats discovered by survey takers,
39% bypassed the network gateway
firewalls, and 37% went undetected
by IDSes, while endpoint security tools
How Attackers Bypass Endpoint Defenses
detected half, and routine operations
uncovered 85% of threats inside the
enterprise. This reinforces the risks of
48%
through user error
38%
through social engineering
37%
through zero-day/unknown
overreliance on signatures or known
patterns to detect and stop threats.
In our connected and cloud-based
world, solutions that adapt to the
changing work environment are
necessary to keep users, their devices
and the networks they use out of
trouble.
SANS ANALYST PROGRAM
1
www.pbs.org/newshour/bb/ransomware-attack-takes-down-la-hospital-for-hours
2
http://money.cnn.com/2016/04/15/technology/ransomware-cyber-security/index.html?section=money_technology
1
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
About Our Respondents
The purpose of this survey was to uncover the threats organizations encounter in the
real world, when and how they become incidents, how organizations rank threats and
what defenses continue to work. Essentially, we wanted to learn what threat scenarios
keep IT managers and security professionals awake at night and the best means of
combating them.
IT Ops and Security Professionals
The survey was completed by 301 IT and security professionals, balanced between
respondents with security roles and those with IT roles: 33% were security administrators
or analysts, 11% system administrators or analysts, 11% IT managers or directors, and
9% were in security management. These represent key personnel who are hip-deep in
threats and threat responses. They also represent the general SANS membership base.
Although some
threats are industry
specific, the overall
results indicate that
we all face the same
primary threats
Size and Type of Industry
The top seven industries represented by our respondents are government, banking/
finance, technology, healthcare, education, cyber security and manufacturing. No
industry is exempt from threats. Although some threats are industry specific, the overall
results indicate that we all face the same primary threats such as phishing, ransomware
and Trojan horses. See Figure 1.
such as phishing,
ransomware and
Trojan horses.
What is your organization’s primary industry?
20%
16%
12%
8%
4%
Hospitality
Transportation
Media
Nonprofit/Association
Telecommunications/ISP
Retail
Insurance
Utilities
Manufacturing
Cyber security
Other
Education
Healthcare
Technology
Banking and finance
Government
0%
Figure 1. Type of Industry
SANS ANALYST PROGRAM
2
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
About Our Respondents
(CONTINUED)
The responses reflect input from IT professionals from companies of different sizes, with
28% coming from small to midsize companies (101–1,000 employees); 14% representing
very small companies (fewer than 100 employees); then a relatively even split between
medium companies (1,001–2,000 employees), large (2,001–5,000 employees) and very
large (15,001–50,000 employees). See Figure 2.
What is the size of the workforce at your organization, including employees,
contractors and consultants?
TAKEAWAY:
30%
All types of organizations are
25%
experiencing similar threats,
20%
regardless of their size or
15%
geographic location.
10%
5%
More than 100,000
50,001–100,000
15,001–50,000
10,001–15,000
5,001–10,000
2,001–5,000
1,001–2,000
101–1,000
Fewer than 100
0%
Figure 2. Workforce Size
SANS ANALYST PROGRAM
3
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
About Our Respondents
(CONTINUED)
Across the Globe
Threats also do not confine themselves to geographic regions. In this survey,
respondents were from around the world, and all indicated experiencing similar
phishing and ransomware threats. Most companies were United States-based and
headquartered, with a concentration of operations in Europe and Asia. See Figure 3.
In what countries or regions does your organization have operations?
Where is your corporate headquarters? Select all that apply.
80%
60%
40%
20%
Headquarters
Middle East
Africa
Australia/New Zealand
South/Central America
Canada
Asia
Europe
United States
0%
Operations
Figure 3. Operations and Headquarters
U.S. responses were about 2.3 times the volume of European responses; however,
results were similar between regions. Phishing, including spearphishing and whaling,
combined with ransomware make up the top significant impact threats for both regions,
but respondents in the U.S. and Europe rank them slightly differently. See Table 1 for the
specific U.S.-Europe regional breakdowns.
SANS ANALYST PROGRAM
4
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
About Our Respondents
(CONTINUED)
Table 1. Threats Manifested and Discovered, United States and Europe
Threats that Caused Significant Impact
U.S.
Europe
Experienced significant impact from all forms of phishing
43%
39%
Experienced significant impact from ransomware
19%
12%
Experienced significant impact from APTs
11%
11%
Experienced significant impact from SQL
5%
7%
Experienced significant impact from Trojans
5%
6%
Phishing
71%
63%
Spearphishing/Whaling
54%
51%
Ransomware
50%
55%
Spyware
26%
25%
DDoS
19%
27%
As email attachments
76%
76%
As web link in email
45%
44%
Browser drive-by or download
44%
33%
Endpoint security tools
54%
42%
Calls to help desk
49%
39%
Alerts from IPS/UTM at gateway
38%
43%
Log or event review
37%
39%
Monitoring for unusual activity
36%
46%
Threats on the Rise
How Impactful Threats Get In
How Threats Are Discovered
In Europe, calls to the help desk are tied with “log or event review” for fourth place,
whereas in the U.S. they were the second top means by which significant threats are
discovered. In the U.S., monitoring for unusual activities is last on respondents’ list of
how they discover such threats, as opposed to being the top means of discovery, as it
was in Europe. These results show that how organizations find threats is the only variable
in which European and U.S. differences manifest themselves.
However, for the most part, location was not significant, except that the European
respondents may be ahead of their U.S. counterparts in deploying automated
monitoring and alerting solutions.
SANS ANALYST PROGRAM
5
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
The Threat Landscape
Just over 80% of respondents’ organizations reported having a phishing incident
in the past 12 months, and 27% said those threats resulted in a significant impact.
Spearphishing or whaling occurred in 58% of organizations, with 13% reporting a
significant impact. While Trojan horses were the next most common threat seen by 53%
of participants, the impact was generally low at 7%, when compared to ransomware,
reported by 49% of respondents, with 19% seeing a significant impact from the incident.
See Figure 4.
Over the past 12 months, which of the following types of threats have you seen in your
organization? Of those, please indicate which types of threats had the most significant
impact on your organization? Select all that apply.
80%
60%
40%
20%
Seen in Our Organization
Other
Man-in-the-middle attack
Keylogger
Privilege escalation
Mobile malware
Advanced persistent threat (APT)
Worm
SQL injection, cross-site scripting
or other web app attack
DDoS
Spyware
Ransomware
Trojan
Spearphishing or whaling
Phishing
0%
Significant Impact
Figure 4. Phishing, Ransomware and APT Cause Greatest Impact
SANS ANALYST PROGRAM
6
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
The Threat Landscape
(CONTINUED)
This scenario is ripe for enabling the propagation of ransomware. In 2015, the FBI received
2,453 reports of ransomware holdups, costing victims more than $24 million.3 Recent
estimates indicate that 390 thousand new malicious programs (malware) emerge every
day,4 while others suggest that 93% of all phishing attacks now include ransomware.5
The top reported threats (phishing, spearphishing or whaling, and ransomware) will
consume a lot of our attention, and the next-level threats are still out there and can’t be
disregarded: Trojans, DDoS and APT are next in line when factoring significant impact
into the weighting.
On the Rise
Here again, phishing, followed by ransomware and spearphishing or whaling, are the
fastest-rising types of threats entering into organizations. The lower occurrence of
worms and keyloggers is also noteworthy. See Figure 5, which reflects responses of
only those respondents who knew whether they were seeing changes in frequency
of these threats.
Please indicate if you’ve seen an increase or decrease in these types of threats
over the past 12 months.
Phishing
Ransomware
Spearphishing or whaling
Spyware
APT
DDoS
Trojan
Other
SQL injection, cross-site scripting or other web app attack
Privilege escalation
Worm
Man-in-the-middle attack
Keylogger
0%
20%
40%
Increase
60%
No change
80%
100%
Decrease
Figure 5. Phishing, Ransomware, Spearphishing Most on the Rise
SANS ANALYST PROGRAM
3
http://money.cnn.com/2016/04/04/technology/ransomware-cybercrime/index.html?iid=EL
4
www.av-test.org/en/statistics/malware
5
www.csoonline.com/article/3077434/security/93-of-phishing-emails-are-now-ransomware.html
7
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
The Threat Landscape
(CONTINUED)
As these phishing and ransomware trends intersect, they create the perfect storm for
legitimate user actions to result in significant, costly consequences to the organization,
such as having to pay tens of thousands of dollars in ransom to retrieve critical access to
maliciously encrypted data or to regain control of keys, or experiencing service denials
that cause loss of business.
To respondents, the significance of the impact is tied to key corporate concerns: the cost
to recover and the loss of sensitive information. Clearly, IT professionals know what’s at
stake. See Figure 6.
What were the top three reasons you consider this incident to be the most significant?
Please rank your top three reasons in order of impact, with “First” being the most significant.
TAKEAWAY:
Spending money on new
tools to address the latest
50%
40%
threat specifically is often
problematic and expensive.
Organizations should look at
their environments holistically,
even in the midst of a breach,
30%
20%
10%
as they make decisions on
First
Second
Third
Other
DDoS affected availability
Financial loss to the organization
Triggered investment in new
tools or processes
Compromise of credentials
Damage to brand or reputation
Loss of sensitive data
policies and processes.
0%
Cost to respond/recover
applying tools or updating
Figure 6. Cost, Loss and Damage to Reputation Top Measures of Impact
Respondents also listed damage to brand or reputation and compromise of credentials
as indications of a significant incident. Interestingly, an incident that results in
investments in new tools or processes ranked as a stronger indicator than financial loss
to the organization.
SANS ANALYST PROGRAM
8
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
The Threat Landscape
(CONTINUED)
How Threats Get In
The top ways threats are entering respondents’ organizations are via email attachments,
clicking a link in an email, and via a web drive-by or download. See Figure 7.
How did the threats with the most impact to your organization enter your infrastructure?
Select all that apply.
80%
70%
60%
50%
40%
30%
20%
10%
Other
Remote access
service (VPN, RDP)
compromise
Firewall vulnerability
or weakness
Lateral movement
from another device
Web server
vulnerability
Unknown
Removable storage
device
Compromised
credentials
Application
vulnerability
Web browser via driveby or download
Web browser via link
in email
Email attachment
0%
Figure 7. Threats Entering from User Endpoints
This hints at gaps in our protections, either technical or administrative, which include
training users not to click on links or attachments, because these are the principal ways
ransomware infections start. Counting on the user alone to “do the right thing” is not a
viable security strategy. Endpoint security tools, help desk operations and security teams
should work in unity to automate education and prevention.
Gaps in Protections
Based on survey results, we know that user, operational and technical gaps leave vulnerabilities that allowed
threats to bypass existing endpoint security:
• U ser gaps. The top successful bypasses were user-based, such as opening an attachment, clicking a link, or
installing software, either by a user acting alone (deliberately or in error) or through deception (social engineering).
• O perational gaps. Despite advances in network and endpoint security, email monitoring, threat intelligence
and event management, attackers take advantage of deployments in detection-only mode, conducting attacks or
establishing footholds for APT activity before defenders are able to remediate events.
• T echnical gaps. Too much of detection still depends on knowing what to look for, and while signatures are
helpful, they are no match for the beasts of zero-day exploits, polymorphic malware, and modern exploit kits, for
which there simply are no signatures.
SANS ANALYST PROGRAM
9
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
The Threat Landscape
(CONTINUED)
Also, as malware evolves, the signature changes, so until the new signature propagates
from the vendor all the way to the detection infrastructure, that new malware will not
be detected. The same is true for network devices monitoring for threats active in their
networks, as shown in Figure 8.
10%
0%
0%
Unknown
Other
10%
Detected by sandbox,
but too late
20%
Not detected by
sandbox
20%
Other
30%
Multistage or APT
30%
Unknown
40%
Zero-day/No signature
40%
Social engineering
50%
User error
50%
Not detected by
IDS/IPS
How did the threat (malware) get past your existing
network security? Select all that apply.
Not detected by
existing firewall/NGFW
How did the threat (malware) get past your existing
endpoint antivirus or security? Select all that apply.
Figure 8. Bypassing Endpoint and Network Security
Firewall/next-generation firewall (NGFW), IDS/IPS and sandboxes are all catching
TAKEAWAY:
Users should only be able to
some of the threats, but clearly not enough of them. The success of detection is
dependent on the placement of network protections. A threat could evade network
security via a hotspot or thumb drive; or worse, if an organization filters or blocks
reach vetted web services from
only inbound connections, malware could then communicate externally, download
the corporate network. Take
additional material, be commanded to move laterally within the organization or
precautions, such as always
otherwise evolve unchecked.
requiring a VPN through the
corporate network when
connecting corporate assets
to other networks, so your
corporate protections remain
in effect.
SANS ANALYST PROGRAM
10
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
The Threat Landscape
(CONTINUED)
Where Are Tools Challenged (Shortfalls)
For decades, the detection of threats was principally a matter of catching the right
information because it matched a database of known threat signatures. Results of this
survey show that threats without signatures will not be detected reliably. Some 83% find
endpoint scanning helpful, while 70% find IDS/IPS/unified threat management (UTM)
systems helpful, even though today’s threats are mostly slipping past them. Network
monitoring/deep packet inspection (DPI) and threat intelligence are also helpful,
according to respondents, as illustrated in Figure 9.
What tools or services do you find most helpful in accurately detecting impactful threats
before they take a foothold in your enterprise? Please respond to all that apply.
80%
70%
60%
50%
40%
30%
20%
10%
Tools
Both
Other
Anti-bot
Threat hunting
Sandboxing
Behavior modeling/DLP
Security analytics
platform
SIEM
Threat intelligence
Network monitoring/DPI
IDS/IPS/UTM
Endpoint security
scanning or firewalls
0%
Services
Figure 9. Endpoint and Network Tools Still Helpful in Detection
Additional opportunities exist for extension of the network perimeter to include services
to protect mobile or remote users wherever they are. For example, a VPN that simply
relays traffic from a mobile endpoint to the Internet, not providing corporate services,
with strong but automatic authentication, could help protect the user regardless of
location or network connection security.
SANS ANALYST PROGRAM
11
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
The Threat Landscape
(CONTINUED)
Behavior modeling/data loss prevention (DLP), while reported by only 47% of
respondents, is an area that Gartner predicts will grow as the use of analytics to detect
threat increases.6 While subscribing to threat intelligence sources helps increase
awareness for the blue team, automated mechanisms to implement protections (block,
observe, notify, etc.) from these newly identified threats are critical. In most cases when
threats are occurring, analysts don’t have time to implement new controls manually
before the threat manifests itself.
Threats, Vectors and Incidents
When describing the ecosystem of an attack, we need to start with definitions. The
SANS Internet Storm Center has a nice glossary of industry standard definitions of the
following terms:7
• A threat is a potential for violation of security, which exists when there is
Is the User a Threat,
a Vulnerability—or Both?
a circumstance, capability, action or event that could breach security and
“By commonly used definitions, the user is a
threat, not a vulnerability. What the user does
may be a vulnerability. The user’s behavior, the
user’s lack of knowledge, the process the user
relies on … those may have vulnerabilities. But
the user is not a vulnerability, just as a criminal is
not a vulnerability.”
—Ed Skoudis, Pen Test Curriculum Lead
and Faculty Fellow, SANS Institute
cause harm.
• A threat vector is the method a threat uses to get to the target.
• An incident is an adverse network event in an information system or network
or the threat of the occurrence of such an event.
According to OWASP, an attack surface describes all of the different points
where attackers could get into a system and where they could get data out.8
How do these all come together to create a ripe ecosystem for the attacker?
The attacker looks for weaknesses in the system to define the attack surface.
Once he or she identifies an attack surface that includes a threat vector the attacker can
leverage, the attacker can use that vulnerability to compromise the system. For example,
an attacker may send a phishing email that includes a link to zero-day malware, which
establishes a toehold for a remote command and control server. The attacker may then
have someone call the user to entice him or her to click the link and run the malware, or
even direct the user to a “safe” alternative, which is also malware. There is usually more
than one viable attack vector or vulnerability, which is why defensive measures are so
important to get right.
SANS ANALYST PROGRAM
6
www.gartner.com/doc/3294335/market-trends-user-entity-behavior [Subscription required for access.]
7
https://isc.sans.edu/glossary.html
8
www.owasp.org/index.php/Attack_Surface_Analysis_Cheat_Sheet
12
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
The Threat Landscape
(CONTINUED)
Getting Beyond Signatures
Modern adaptive threats, like zero-day vulnerabilities, don’t have a ready supply
of signatures to scan for. This means we need new mechanisms to stop them. The
most common call to action is to whitelist everything that’s allowed to operate on an
endpoint. Another means is to install behavior-based detections, where threat detection
tools flag and stop anomalous or nefarious actions (such as unapproved system calls,
suspicious user activities, unusual traffic, etc.), rather than looking solely at specific
binaries for known signatures.
Organizations should take actions to ensure that corporate network protections, such
as strongly authenticated VPN, travel with mobile workers. Keep corporate assets in
protective envelopes with session sandboxing and other techniques. This includes
requiring access to those services through corporate network controls, even for
outsourcers, to keep the corporate protections embedded in the communication path.
It is advisable to have multiple solutions working together to protect the network and
the endpoint. Reliance on a single solution or single point of protection may leave
gaps in your coverage. Employ a defense-in-depth strategy, with varying tools on
the endpoint, desktop, server, network and in-line with web browsing to increase the
coverage and prepare for threats at multiple layers.
Most important, use automation to protect users from making mistakes that will
be costly. For example, include appropriate restrictions and protections relating to
the introduction of removable media and software installation and vetting. These
restrictions, communicated through appropriate training, must work together to allow
users to get their work done securely.
SANS ANALYST PROGRAM
13
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
The Threat Landscape
(CONTINUED)
Holding Them Back
Lack of signatures for unknown threats, followed by lack of skills and budgets, are the
primary reasons organizations lack confidence in their ability to detect and respond
to threats. In the survey, 60% of respondents say that new, unknown threats without a
signature are challenging their ability to protect against threats, while 56% are limited by
lack of skills and budget to implement protections. See Figure 10.
What challenges do you face in protecting against threats in your enterprise?
Select all that apply.
TAKEAWAY:
Challenges with data collection
from network and endpoint
sources, correlation with
observed and reported results,
and impact analysis all stem
from lack of the right skills
with the right tools in place to
target, defend and otherwise
keep threats in check.
Finding new unknown threats our current
security doesn’t have signatures for
Lack of skills and budget for protecting
against threats
Difficulty in distinguishing real, impactful
threats because of too much noise or false
positive activity
Difficulty in establishing an appropriate
baseline that defines normal
Difficulty in collecting the appropriate data on
which to base our threat detection
Making the connections between threats
that impact multiple systems and threat
actions
Unable to scope threat impact once we
discover the threat
Other
0%
10%
20%
30%
40%
50%
60%
70%
Figure 10. Challenges to Threat Protection
If you don’t have the skills and the corresponding budget to implement controls,
gaps in defense will allow threats to slip past the protections in place. Furthermore,
it will be almost impossible to implement new solutions to bridge any identified
gaps in coverage.
SANS ANALYST PROGRAM
14
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
Impact and Discovery
As further evidence about the need to improve network and endpoint protections
from user-enabled threats, only 16% are very confident that they can detect significant
threats on their networks and endpoints, and just 12% of respondents indicated they are
very confident in their ability to prevent impactful threats before they cause damage.
Another 26% feel very confident they could respond to threats. In addition, the majority
(52%) report they are confident or very confident that they have removed all artifacts of
TAKEAWAY:
If you cannot be sure that
you’ve eliminated the
the threat during the remediation phase. See Table 2.
Table 2. Ability to Respond to Threats
Very
Confident
Confident
Somewhat
Confident
Not
Confident
threat, returning to normal
Prevent impactful threats before they cause
damage on your network and endpoints
11.7%
46.1%
30.0%
11.3%
operations is hard to defend
Detect impactful threats occurring on your
network and endpoints
15.7%
44.8%
27.4%
10.4%
Remove all artifacts of impactful threats on
network and endpoints
16.1%
36.1%
34.3%
11.3%
Respond to impactful threats on the network
and endpoints
26.1%
37.0%
27.0%
6.5%
to those who must accept the
risk and attempt to return to
business as usual.
Taken as a whole, the good news is that the majority feel confident or very confident in
their ability to perform these tasks. However, while more than 60% feel confident or very
confident in their ability to detect, prevent and respond to impactful threats, almost 40%
are only somewhat confident in their capabilities or are not confident at all. Clearly there
is room to improve on all fronts. It’s important to realize that efforts to prevent impactful
threats will also yield benefits by reducing the number of events requiring a response.
SANS ANALYST PROGRAM
15
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
Impact and Discovery (CONTINUED)
Impact of Threats
While 43% of threats did not result in sensitive data loss, DDoS or other significant
impact, 34% said 1–5% of their threats resulted in sensitive data loss, another 11% said
their threats resulted in data loss 6–10% of the time, and 12% of threats resulted in data
loss more than 10% of the time. See Figure 11.
What percentage of discovered threats led to an actual compromise of
sensitive data, business outage (DDoS) or other significant impact?
None
1–5%
6–10%
11–25%
26–50%
51–75%
100%
Figure 11. Threats Turned to Compromises9
This means that we’re finding threats quickly. The majority of respondents (70%) report
that the time to discover a threat that actually became an incident takes less than 24
hours, and 64% remediate in under 24 hours, as shown in Figure 12.
Time to Discovery Versus Time to Remediate
30%
20%
10%
>1 year
1–3 months
8–30 days
Remediation
7–12 months
Discovery
2–7 days
6–24 hours
1–5 hours
<1 hour
Unknown
0%
Figure 12. Time to Detect, Remediate10
9
10
SANS ANALYST PROGRAM
No respondents selected 76–99%.
No respondents reported needing 4 to 6 months for discovery or remediation.
16
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
Impact and Discovery (CONTINUED)
These results seem to fly in the face of the lack of confidence respondents have in their
ability to detect, respond to and remediate attacks. It is possible that respondents have
underestimated the speed with which they are able to address threats.
Discovering Threats
Security personnel find most threats (85%) during routine operations, with 24%
discovering them through routine vulnerability assessments, according to the survey.
This is a good indication that most organizations have enough tools and processes to
make detection part of their operational fabric.
For half of the respondents, endpoint security tools are successfully discovering threats,
and 47% reported discovering threats through user calls to the help desk. (Of course, at
system.) Figure 13 also reveals the limited effect of gateway security, discussed earlier in
this paper.
strategic defense at this time,
How were the most impactful threats discovered? Select all that apply.
with their users (by way of
50%
the second greatest discovery
40%
tool for finding the most
30%
significant threats. Having
20%
Other
External third-party
notification
Alerts from sandbox analysis
Monitoring applications
0%
Alert from application
firewall
depth protection.
10%
SIEM alerts or searches
is also critical for defense in-
Endpoint security tools (antimalware, browser plug-in)
tools beyond the endpoint
Log or event review
calls to the help desk) being
Monitoring for unusual
network activity
endpoint security is their most
already had an opportunity to cause damage and potentially spread beyond that user’s
Alerts from gateway security
(firewall/UTM/IDS)
Participants are telling us that
the point where the user is contacting the help desk to request support, the malware has
User call to help desk
TAKEAWAY:
Figure 13. Endpoint Tools for Discovering Threats
Just as endpoints and their users are part of the problem, this figure illustrates that they
are also the most effective tools for detecting threats. As endpoint security tools have
evolved from simple antivirus detection engines to systems that check file, email and
web traffic interaction with the endpoint, visibility into the potential attack surface has
also improved.
SANS ANALYST PROGRAM
17
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
Impact and Discovery (CONTINUED)
Determining Impact
Organizations are using good, old-fashioned forensics to determine the impact of
a given manifested threat. They are also leveraging threat intelligence, most likely
processed through their SIEM, which tied with threat intelligence in usefulness, as shown
in Figure 14.
What tools or services do you find most helpful in accurately determining the scope of
events involving the discovered threats? Please respond to all that apply.
80%
60%
40%
20%
Other
Services
Threat hunting
Security analytics
platform
Both
SIEM
Third-party incident
response
Threat intelligence
Forensics
0%
Tools
Figure 14. Forensics, Intelligence and SIEM Most Useful in Scoping Threat Events
Organizations are also able to determine the root cause of significant threats at least
70% of the time, while 14% say they are not able to determine root cause and 16%
don’t know.
SANS ANALYST PROGRAM
18
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
Impact and Discovery (CONTINUED)
Root cause determination processes are still dependent on associated manual processes.
Respondents ranked their top choices for determining root cause as: 1) automated
search, 2) interviews of affected parties and 3) automated hunting for unknown threats.
Their second choices, in order, were manual log analysis, manual analysis of endpoint
data and automated searches using disparate tool and information sources. Considering
that most incidents involve multiple methods of investigation, the heavy reliance on
manual methods (including interviews) is of concern as the volume of threats increases.
While organizations collect much of the right data, the tools they are using are unable to
find it without manual intervention, as shown in Figure 15.
What methods do you use to determine root cause of an incident?
Please rank your top three methods. Rank the method used most often “First.”
40%
30%
20%
10%
Third
Second
Other
Manual hunting for
unknown threats
Automated hunting for
unknown threats
Comparison with
similar incidents
Manual analysis of network data
Automated trigger based on
security analytics
Interview the affected parties
Manual collection and analysis of
all event data
Automated searches
using disparate security
tools and sources
Manual analysis of endpoint data
Automated search through data
gathered in a centralized SIEM
Manual analysis of log data
0%
First
Figure 15. How Root Cause Is Determined
It’s important to get to the root cause of incidents, because such knowledge is the first
step toward preventing recurrence. Root cause provides new intelligence to protect the
endpoint and/or network from future instances of the same threat and threat actor. It is
also important for knowing where and how to apply the best controls.
SANS ANALYST PROGRAM
19
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
Conclusion
The results of this survey remind us that although we are collectively working to install
the greatest detection and defense mechanisms, users and their endpoints are the most
common cause of breaches and the most critical component in our cyber defenses.
Despite the ever-growing landscape of detection-avoiding malware classes, endpoint
security tools are still the primary detection method, followed closely by calls to the help
desk. By that same token, our threat intelligence, monitoring, event review and SIEM
tools also provide much discovery information, indicating that we are not reliant on the
endpoint for all the heavy lifting here.
The call to action stems from the reliance on current endpoint detection in an area
where the No. 1 source of malware (ransomware) is evolving and changing faster than
signature-based detection services can stay abreast of the threat. Next-generation
protections both at the perimeter and within the network have to augment the
endpoint security to detect malicious activity that may have started with the endpoint,
such as unusual system calls, sensitive data transfers, and more. In addition, endpoint
security must augment network security, and the tools should share their data for more
real-time detection and prevention at the endpoint, where most threats originate.
It’s also important to enable mobile worker devices to continue to be protected by
corporate services regardless of location so they never operate without a safety net.
Organizations also need behavior-based comprehensive threat analysis systems and
extensive whitelisting to stay ahead of the current threat landscape.
Threats are always changing. For now, users and their devices are ground zero. Phishing
has turned to spearphishing and whaling exploits that are well-researched and
convincing enough to get corporate officers to click links and download attachments
that open their enterprises to risk. Ransomware is taking hold in organizations through
the user endpoint and via phishing and drive-by downloads into browsers from the web.
Under the current landscape, shoring up the end user/endpoint protections should be
top priority for organizations that want to make the biggest impact on reducing their
overall risk.
SANS ANALYST PROGRAM
20
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
About the Author
Lee Neely, a SANS mentor instructor, teaches cyber security courses for SANS. He worked with the
SANS SCORE (Security Consensus Operational Readiness Evaluation) project to develop the iOS
Step-by-Step Configuration Guide, as well as the Mobile Device Configuration Checklist included in
the SEC575 course. Lee holds the GMOB, GPEN, GWAPT, CISSP, CISA, CISM and CRISC certifications. At
the Lawrence Livermore National Laboratory (LLNL), Lee leads LLNL’s cyber security new technology
group, working to develop secure implementations of new technology, including developing the
secure configurations, risk assessments and policy updates required for its corporate and bring-yourown-device mobile devices.
Sponsor
SANS would like to thank this survey’s sponsor:
SANS ANALYST PROGRAM
21
Exploits at the Endpoint: SANS 2016 Threat Landscape Survey
Last Updated: June 15th, 2017
Upcoming SANS Training
Click Here for a full list of all Upcoming SANS Events by Location
DFIR Summit & Training 2017
Austin, TXUS
Jun 22, 2017 - Jun 29, 2017
Live Event
SANS Paris 2017
Paris, FR
Jun 26, 2017 - Jul 01, 2017
Live Event
SANS Cyber Defence Canberra 2017
Canberra, AU
Jun 26, 2017 - Jul 08, 2017
Live Event
SANS Columbia, MD 2017
Columbia, MDUS
Jun 26, 2017 - Jul 01, 2017
Live Event
SEC564:Red Team Ops
San Diego, CAUS
Jun 29, 2017 - Jun 30, 2017
Live Event
SANS London July 2017
London, GB
Jul 03, 2017 - Jul 08, 2017
Live Event
Cyber Defence Japan 2017
Tokyo, JP
Jul 05, 2017 - Jul 15, 2017
Live Event
SANS Los Angeles - Long Beach 2017
Long Beach, CAUS
Jul 10, 2017 - Jul 15, 2017
Live Event
SANS Cyber Defence Singapore 2017
Singapore, SG
Jul 10, 2017 - Jul 15, 2017
Live Event
SANS ICS & Energy-Houston 2017
Houston, TXUS
Jul 10, 2017 - Jul 15, 2017
Live Event
SANS Munich Summer 2017
Munich, DE
Jul 10, 2017 - Jul 15, 2017
Live Event
SANSFIRE 2017
Washington, DCUS
Jul 22, 2017 - Jul 29, 2017
Live Event
Security Awareness Summit & Training 2017
Nashville, TNUS
Jul 31, 2017 - Aug 09, 2017
Live Event
SANS San Antonio 2017
San Antonio, TXUS
Aug 06, 2017 - Aug 11, 2017
Live Event
SANS Hyderabad 2017
Hyderabad, IN
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS Prague 2017
Prague, CZ
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS Boston 2017
Boston, MAUS
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS New York City 2017
New York City, NYUS
Aug 14, 2017 - Aug 19, 2017
Live Event
SANS Salt Lake City 2017
Salt Lake City, UTUS
Aug 14, 2017 - Aug 19, 2017
Live Event
SANS Adelaide 2017
Adelaide, AU
Aug 21, 2017 - Aug 26, 2017
Live Event
SANS Virginia Beach 2017
Virginia Beach, VAUS
Aug 21, 2017 - Sep 01, 2017
Live Event
SANS Chicago 2017
Chicago, ILUS
Aug 21, 2017 - Aug 26, 2017
Live Event
SANS Tampa - Clearwater 2017
Clearwater, FLUS
Sep 05, 2017 - Sep 10, 2017
Live Event
SANS San Francisco Fall 2017
San Francisco, CAUS
Sep 05, 2017 - Sep 10, 2017
Live Event
SANS Network Security 2017
Las Vegas, NVUS
Sep 10, 2017 - Sep 17, 2017
Live Event
SANS Dublin 2017
Dublin, IE
Sep 11, 2017 - Sep 16, 2017
Live Event
SANS Minneapolis 2017
OnlineMNUS
Jun 19, 2017 - Jun 24, 2017
Live Event
SANS OnDemand
Books & MP3s OnlyUS
Anytime
Self Paced