📜 ⬆️ ⬇️

When the walls are not enough. How to protect endpoints



Do you think the most important thing in a company is to ensure the security of the corporate network perimeter and server infrastructure? This is only partly true: to create a secure perimeter now is in principle impossible only if the company does not apply the strictest information security rules, “white list” of sites, only paper correspondence and sealing USB ports on computers, and they don’t allow reception at all. If this is not about your company, then keep in mind: today, the final risk devices are becoming the main risk zone, and antivirus alone is not enough to protect them. Yes, the antivirus will block the unpacking of the archive with a dangerous file, and the browser will prohibit visiting the compromised site, but there are many threats against which the basic protection packages are powerless. Then we will talk about some of them - and how to protect.

What can not handle the usual antivirus in the company

- Fileless attacks . Malicious PowerShell scripts that immediately fall into RAM cannot be detected by the antivirus at the system penetration stage — it is not executable programs, but simply a text command set that runs in an existing shell, like PowerShell. In order not to disappear when the computer is turned off, the Trojans register their commands in the registry.
')
It is impossible to detect a fileless attack using traditional methods - a trojan can store a malicious script, for example, in the TXT files of DNS resource records. According to Trend Micro 2018 Midyear Security Roundup , the number of fileless attacks in the world is growing: in January 2018, 24,430 incidents were recorded, and in June - more than 38 thousand.

- Exploits in non-updated OS . Operating system updates fix known vulnerabilities for which exploits can already be written. Before deploying updates on hundreds and thousands of computers, it is worth testing first — sometimes updates contain errors that cause some computers to temporarily fail. Putting the task of installing updates on the shoulders of users is a sure way to create a gap in the network through the fault of an optional or inept employee.

The acclaimed WannaCry and NotPetya used to spread the Windows vulnerability, which were closed for updates two months before the epidemic began: the first revision of WannaCry appeared on January 16, 2017, on March 14, Microsoft distributed a patch for the SMB protocol in all current versions of Windows, and the legendary epidemic began only 12 May. Penetrating on not updated users' computers, the extortioner spread inside corporate networks, paralyzing the activities of companies. Why hundreds of thousands of corporate computers in major companies for two months remained without a critical update of Windows - a serious question to the relevant services.

- Mobile devices . Despite checking applications before publishing in the Play Market and App Store, supposedly useful programs are often screwed with spies and even miners. For example, analysis of 283 VPN applications for Android revealed that 43% of them contain unwanted advertising, and 17% of ads have malicious functions, 29% are the source of Trojan modules, potentially dangerous software is contained in 6% of VPNs, and another 5% are spying for their users .

- Employees who do not know the basic principles of information security . The main hole in the information security of any company remains employees, or rather, their ignorance of the principles of information security . No virus can divert important information and documents with the same elegance and efficiency as an employee who downloads a program that is malicious as a result.

How to protect endpoints

The growing complexity of threats leads to the fact that traditional methods of protection become ineffective. Antivirus alone is not enough to prevent data leakage or intruders from entering the network, and installing several highly specialized solutions often leads to conflicts and errors. In addition, setting up and maintaining the joint work of several security programs is not an easy task. A comprehensive solution is required that will allow users to comfortably perform their work functions, but at the same time ensure the safety of the company's information assets.

The ideal protection complex should be:



Traditional EPP (Endpoint Protection Platform) class solutions protect user devices from known threats well, but the latest types of attacks are much worse. They successfully cope with fixing incidents on separate devices, but, as a rule, are not able to reveal that these incidents are fragments of a complex, complex attack, which in the long run can cause serious damage to an organization. They have almost no opportunities to automatically analyze incidents. Therefore, companies have developed solutions class EDR (Endpoint Detection and Response).

How does a modern EDR solution work?

Let's take a look at how the endpoint security solution works with the example of Trend Micro's Apex One. This product is a significant rebirth of the already known OfficeScan endpoint security solution.

One of the key features of Apex One is just multi-stage protection of endpoints, which prevents malware from spreading over the network, affecting computer performance and stealing confidential data. The solution instantly blocks zero-day threats on physical and virtual desktops, as well as laptops, both online and offline.

What exactly does Apex One do?

- Protects against advanced threats:


- Blocks inappropriate network traffic:


- Makes protection timely:


- Facilitates deployment and management of existing infrastructure:


And now we will tell (and show) how it works.

All information about the state of endpoints, threats is collected in a single panel Apex Central. Analysts have the opportunity to detailed monitoring, in the context of each individual user, and policy management. A single panel allows you to control local, cloud and hybrid environments. It also provides access to operational information from the local sandbox or from the Trend Micro Smart Protection Network infrastructure, which uses cloud-based threat data from around the world and provides real-time information security by blocking threats before they reach computers.


A single panel allows you to not switch between control panels. Here you can see how integrated detection and response are reflected in a single manager. It also provides unified integration with EDR investigations, automated detection and response to the threat



Analysis of the scale of the consequences:

  1. Malicious IP blocked because it has already been detected (red) (1)
  2. "Zero patient." Unknown (orange) and was not blocked (2)
  3. "Zero patient" is isolated and the search for the root cause begins (3)




Search for root causes using Trend Micro global threat information:

- Red (“bad”);
- Orange ("suspicious");
- Black (“satisfactory”)




There are reaction options:
-Stop execution;
-To disseminate information about the threat;
- Investigate


Endpoint Sensor from the Apex One package monitors the security status on the end device with context, registers actions at the system level and generates reports for security personnel so that you can quickly assess the extent of the attack on the network. Including Endpoint Sensor keeps track of advanced threats, such as the notorious fileless attacks. Using EDR, you can conduct a multi-level malware search on all end devices using criteria such as OpenIOC, Yara, and suspicious objects. Also provides protection against fileless attacks.

Even if the malware penetrated through server-side scanning systems, Trend Micro User Protection will examine the executable file prior to its launch using machine learning. When you start the behavior analysis begins on the basis of machine learning. Then the analysis in the sandbox takes place - according to the results of the checks, the application either starts its work or is blocked. Moreover, for security purposes, the entire computer can be automatically blocked to localize the malware and prevent it from penetrating the network.



Apex One uses Trend Micro Vulnerability Protection technology, which protects all network end devices from exploits, even if they are not updated with patches. To do this, Apex One centrally analyzes traffic for exploits / vulnerabilities, service attacks, web malware and illegal traffic. In this case, the scan takes place at high speed, the work of Apex One has virtually no effect on the speed of the network itself.

How leakage protection is provided

Another useful module in the Apex One solution is Data Loss Prevention. It monitors and controls the transfer of content across all possible communication channels to prevent data leakage. You can log or limit the use of USB drives, CD / DVD, exotic IR transmitters, PCMCIA devices, modems, cloud storage and mail servers. Data transfer is controlled both when working with the mail client, and through the web-based mail interface, in instant messengers and most network protocols, such as HTTP / HTTPS, FTP and SMTP.

Data Loss Protection has templates for recognizing more than three hundred file types, including archives, and the rest of the data types are determined by specific patterns, formulas and locations. You can also create a data identifier yourself.
And finally, protection from the “smartest” controls the clipboard, pasting from it and the screen captures. After proper configuration of Data Loss Protection, the probability that valuable data will be removed from a company is significantly reduced.

Bonus: MDR - subscription security service

Under current conditions, the content of a large information security team is becoming a luxury. At the same time, it is extremely important to correctly assess the damage caused by a cyber attack, to formulate a plan of measures to eliminate the threat and prevent repeated attacks - the staff left after “optimization” will hardly find time for such investigations.

Here Trend Micro Managed Detection and Response comes to the rescue - a threat management and response management service that is part of Apex One. MDR is a remote team of Trend Micro professionals who can monitor customer security around the clock. This is an excellent solution for those companies that do not have the ability to maintain a large staff of security guards or there is a shortage of highly competent employees.

The MDR service monitors the logs, identifying critical notifications, examines them and informs the customer of the threat information. Using the data of the end points, the MDR group will detect the root causes and attack vector, as well as evaluate its consequences. The customer can always ask questions to the team of experts to get clarifications and explanations. The MDR will draw up a detailed action plan for recovering the network after an attack.

The subscription includes tracking of both endpoints and networks, servers, even printers and the Internet of things.

In essence, Trend Micro MDR is doing everything that professional staffed information security departments do. But remotely, around the clock and by subscription.

Source: https://habr.com/ru/post/450136/


All Articles