Spice world 2014 hacker smackdown
About AlienVault
“There are two types of companies that use
computers. Victims of crime that know they are
victims of crime and victims of crime that don’t
have a clue yet.”
- James Routh (CISO
Depository Trust Clearing Corporation)
“In today’s modern world, technology alone is not enough to
combat the threats that now face organizations of all types and
sizes. With the integration of continuous threat intelligence
updates from OTX and AlienVault Labs, we can now provide
millions of Spiceworks users with insight into the threats that
could impact their business, and the guidance they need to take
preventative measures.”
- Russ Spitler
What is this SpiceWorks / AlienVault Integration?
Where does the threat data come from?
What should I do when I get an AlienVault alert in SpiceWorks?
Introduction to AlienVault USM.
Demo with Victor Obando, systems engineer.
Agenda
AlienVault Threat Alerts in Spiceworks
Spice world 2014 hacker smackdown
Alerts in Spiceworks:
Dashboard & Device Details Page
“SpiceWorks has found a connection with a potentially suspicious
IP Address 77.240.191.89 on device tmg-mbh.“
Investigating You Threat Alert
Threat Details
Remediation Advice
Spice world 2014 hacker smackdown
False Positives… The Root Cause
IPs Change
IPs may be assigned to a different server, owner
Threats Get Remediated
In the case of compromised/slaved servers, system owners may
remediate threat
Threats Naturally Expire
Campaigns and targeted attacks end per orchestrator’s plans
windows.update.nsatc.net
safe.happy.unicorns.malware.hackyou.com
The world’s largest crowd-sourced
threat repository
Provides access to real-time,
detailed information about threats
and incidents
Enables security professionals to
share threat data and benefit from
data shared by others
Powers the AlienVault Threat Alerts
in SpiceWorks
What is Open Threat Exchange (OTX)?
OTX + AlienVault Labs
Threat Intelligence Powered by Open Collaboration
Updates every
30 minutes
200,000 – 350,000
IP addresses
validated daily
8,000 Collection
Points
140 Countries and
growing
Threat Types Detected
Malware Domain
Distributing malware or hosting exploit code
Malware IP
Instrumental in malware, including malicious redirection
Command and Control
Sending command and control instructions to malware or a botnet
Scanning Host
Observed repeatedly scanning or probing remote systems
APT
Observed to be actively involved in an APT campaign
Spamming Host
Actively propagating or instrumental in the distribution of spam
Malicious Host
Engaged in malicious but uncharacterized activity
Data Expiry & Privacy
122.225.118.219 # Scanning Host
CN,Hangzhou,30.2936000824,120.161399841
122.225.118.66 # Scanning Host
CN,Hangzhou,30.2936000824,120.161399841
188.138.100.156 # Malware IP;Scanning Host DE,,51.0,9.0
211.87.176.197 # Scanning Host CN,,35.0,105.0
95.163.107.201 # Spamming RU,,60.0,100.0
188.138.110.48 # Malicious Host;Scanning Host DE,,51.0,9.0
72.167.131.220 # Malware IP US,Scottsdale,33.6119003296,-
111.890602112
174.120.172.125 # Malware IP US,Houston,29.7523002625,-
95.3669967651
210.148.165.67 # Malware IP JP,,36.0,138.0
75.75.253.84 # Spamming US,Henderson,36.0312004089,-115.073898315
What OTX Collects
External IPs connecting to system
Traffic Patterns (Timestamps)
What OTX Does NOT Collect
System data
System information
Internal IP traffic
Any personally identifiable
information
Contributed Data
Expires after 30 Days
Scanning
Expires after 30 Days without
additional evidence
Contributed Data
Expires after 30 Days
Scanning
Expires after 30 Days without
additional evidence
Spice world 2014 hacker smackdown
August 7th
August 28th
September 4th
August 20th
Aug 7, 2014
September 2nd
September 10th
August 15th
August 27th
Recent Breach Disclosures
More and more organizations are finding
themselves in the crosshairs of various bad
actors for a variety of reasons.
The number of organizations experiencing
high profile breaches is unprecedented.
The “security arms race” cannot continue
indefinitely as the economics of securing your
organization is stacked so heavily in favor of
those launching attacks that incremental
security investments are seen as impractical.
Threat Landscape: Our New Reality
84%
of organizations breached
had evidence of the
breach in their log files…
Source: 2012 Verizon Data Breach Investigations Report
OR
UNIFIED SECURITY
MANAGEMENT
You’ve Got Options:
Many Point Solutions… Integration Anyone?
Asset Discovery
• Active Network Scanning
• Passive Network Scanning
• Asset Inventory
• Host-based Software
Inventory
Vulnerability Assessment
• Network Vulnerability Testing
• Remediation Verification
Threat Detection
• Network IDS
• Host IDS
• Wireless IDS
• File Integrity Monitoring
Behavioral Monitoring
• Log Collection
• Netflow Analysis
• Service Availability Monitoring
Security Intelligence
• SIEM Event Correlation
• Incident Response
Unified, Coordinated Security Monitoring in a single console
Simple Security Event Management and Reporting
Cutting edge, crowd-sourced threat intelligence from
AlienVault Labs and Open Threat Exchange™ (OTX)
SIEM, Network IDS, Host IDS, Wireless IDS, File Integrity
Monitoring, Vulnerability Assessment and more.
Full suite of compliance reporting
Fast Deployment – Be up and running in 1 hour
Designed and Priced for the Midmarket – Starts at $3600!
Why AlienVault for Your Environment
Spice world 2014 hacker smackdown
AlienVault Labs Threat Intelligence:
Coordinated Analysis, Actionable Guidance
Weekly updates that cover all your coordinated rule sets:
• Network-based IDS signatures
• Host-based IDS signatures
• Asset discovery and inventory database updates
• Vulnerability database updates
• Event correlation rules
• Report modules and templates
• Incident response templates / “how to” guidance for each alarm
• Plug-ins to accommodate new data sources
Fueled by the collective power of AlienVault’s Open Threat Exchange (OTX)
Award-Winning Solution Used by 10,000+ for Threat Detection,
Incident Response and Compliance Management
Now Lets See
It In Action
More Questions?
Email Hello@AlienVault.com
Thank You! Any Questions?
Test Drive AlienVault USM
Download a Free 30-Day
Trialhttp://www.alienvault.com/free-trial
Try Our Product Sandbox
http://www.alienvault.com/live-demo-site

More Related Content

PPT
Counter Measures Of Virus
PPTX
How to Investigate Threat Alerts in Spiceworks!
PPTX
AlienVault Threat Alerts in Spiceworks
PDF
Introduction to the advanced persistent threat and hactivism
PPTX
FireEye Engineering
PDF
Chapter 1, Transformasi antivirus
PDF
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
PPTX
What endpoint protection solutions are available on the market today?
Counter Measures Of Virus
How to Investigate Threat Alerts in Spiceworks!
AlienVault Threat Alerts in Spiceworks
Introduction to the advanced persistent threat and hactivism
FireEye Engineering
Chapter 1, Transformasi antivirus
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
What endpoint protection solutions are available on the market today?

What's hot (20)

PPTX
Extracting the Malware Signal from Internet Noise
PPTX
Advanced Threat Protection - Sandboxing 101
PDF
Sophos Day Belgium - The IT Threat Landscape and what to look out for
PDF
Revolutionizing Advanced Threat Protection
PPTX
Malicious software
 
PPTX
Malicious Client Detection using Machine learning
PPT
Network Security Tools and applications
PPTX
Drive by downloads-cns
PPTX
How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks
PDF
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
PDF
CAS MAA Infographic
PPTX
Chasing the Adder. A tale from the APT world...
PDF
Advanced Threat Protection Lifecycle Infographic
PPTX
Nessus-Vulnerability Tester
PPSX
SonicWALL Advanced Features
PPTX
S4 krotofil afternoon_sesh_2017
PPTX
The next generation of IT security
PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
PDF
Panda Security - Endpoint Protection
Extracting the Malware Signal from Internet Noise
Advanced Threat Protection - Sandboxing 101
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Revolutionizing Advanced Threat Protection
Malicious software
 
Malicious Client Detection using Machine learning
Network Security Tools and applications
Drive by downloads-cns
How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
CAS MAA Infographic
Chasing the Adder. A tale from the APT world...
Advanced Threat Protection Lifecycle Infographic
Nessus-Vulnerability Tester
SonicWALL Advanced Features
S4 krotofil afternoon_sesh_2017
The next generation of IT security
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
Panda Security - Endpoint Protection

Viewers also liked (20)

PDF
Alien vault sans cyber threat intelligence
PDF
20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
PDF
Digital transformation in 50 soundbites
PDF
40 Tools in 20 Minutes: Hacking your Marketing Career
PDF
What REALLY Differentiates The Best Content Marketers From The Rest
PDF
2015 Travel Trends
PDF
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
PDF
Eco-nomics, The hidden costs of consumption
PDF
Creating Powerful Customer Experiences
PDF
6 Snapchat Hacks Too Easy To Ignore
PDF
Build a Better Entrepreneur Pitch Deck
PPTX
All About Beer
PDF
SMOKE - The Convenient Truth [1st place Worlds Best Presentation Contest] by ...
PDF
Pixar's 22 Rules to Phenomenal Storytelling
PDF
You Suck At PowerPoint! by @jessedee
PDF
Healthcare Napkins All
PDF
What 33 Successful Entrepreneurs Learned From Failure
PDF
Digital, Social & Mobile in 2015
PDF
The What If Technique presented by Motivate Design
PDF
The Seven Deadly Social Media Sins
Alien vault sans cyber threat intelligence
20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
Digital transformation in 50 soundbites
40 Tools in 20 Minutes: Hacking your Marketing Career
What REALLY Differentiates The Best Content Marketers From The Rest
2015 Travel Trends
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
Eco-nomics, The hidden costs of consumption
Creating Powerful Customer Experiences
6 Snapchat Hacks Too Easy To Ignore
Build a Better Entrepreneur Pitch Deck
All About Beer
SMOKE - The Convenient Truth [1st place Worlds Best Presentation Contest] by ...
Pixar's 22 Rules to Phenomenal Storytelling
You Suck At PowerPoint! by @jessedee
Healthcare Napkins All
What 33 Successful Entrepreneurs Learned From Failure
Digital, Social & Mobile in 2015
The What If Technique presented by Motivate Design
The Seven Deadly Social Media Sins

Similar to Spice world 2014 hacker smackdown (20)

PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PDF
Incident Response Whitepaper - AlienVault
PPTX
SpiceWorks Webinar: Whose logs, what logs, why logs
PPTX
How to Simplify Audit Compliance with Unified Security Management
PPTX
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
PPTX
How to Detect a Cryptolocker Infection with AlienVault USM
PPTX
Alienvault threat alerts in spiceworks
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PPTX
Crowd-Sourced Threat Intelligence
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PPTX
Otx introduction sw
PPTX
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
PPTX
How Malware Works
PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PPTX
How to Leverage Log Data for Effective Threat Detection
PPTX
Improve threat detection with hids and alien vault usm
PPTX
Security Operations Center (SOC) Essentials for the SME
PPTX
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
PPT
Best Practices for Leveraging Security Threat Intelligence
Improve Situational Awareness for Federal Government with AlienVault USM
Incident Response Whitepaper - AlienVault
SpiceWorks Webinar: Whose logs, what logs, why logs
How to Simplify Audit Compliance with Unified Security Management
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
How to Detect a Cryptolocker Infection with AlienVault USM
Alienvault threat alerts in spiceworks
How to Solve Your Top IT Security Reporting Challenges with AlienVault
Crowd-Sourced Threat Intelligence
Improve Threat Detection with OSSEC and AlienVault USM
Otx introduction sw
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
How Malware Works
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
How to Leverage Log Data for Effective Threat Detection
Improve threat detection with hids and alien vault usm
Security Operations Center (SOC) Essentials for the SME
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Best Practices for Leveraging Security Threat Intelligence

More from AlienVault (20)

PDF
Malware Invaders - Is Your OS at Risk?
PPTX
Simplify PCI DSS Compliance with AlienVault USM
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PDF
Insider Threat Detection Recommendations
PDF
Open Source IDS Tools: A Beginner's Guide
PPTX
Malware detection how to spot infections early with alien vault usm
PDF
Security operations center 5 security controls
PDF
PCI DSS Implementation: A Five Step Guide
PDF
The State of Incident Response - INFOGRAPHIC
PPTX
Incident response live demo slides final
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
PPTX
Best Practices for Configuring Your OSSIM Installation
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
PPTX
Security by Collaboration: Rethinking Red Teams versus Blue Teams
PPTX
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
PPTX
How to Detect System Compromise & Data Exfiltration with AlienVault USM
PPTX
Demo how to detect ransomware with alien vault usm_gg
Malware Invaders - Is Your OS at Risk?
Simplify PCI DSS Compliance with AlienVault USM
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Insider Threat Detection Recommendations
Open Source IDS Tools: A Beginner's Guide
Malware detection how to spot infections early with alien vault usm
Security operations center 5 security controls
PCI DSS Implementation: A Five Step Guide
The State of Incident Response - INFOGRAPHIC
Incident response live demo slides final
Improve Security Visibility with AlienVault USM Correlation Directives
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
AWS Security Best Practices for Effective Threat Detection & Response
Best Practices for Configuring Your OSSIM Installation
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
How to Detect System Compromise & Data Exfiltration with AlienVault USM
Demo how to detect ransomware with alien vault usm_gg

Recently uploaded (20)

PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
Module 1 Introduction to Web Programming .pptx
PPTX
Configure Apache Mutual Authentication
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Statistics on Ai - sourced from AIPRM.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Taming the Chaos: How to Turn Unstructured Data into Decisions
Rapid Prototyping: A lecture on prototyping techniques for interface design
Build Your First AI Agent with UiPath.pptx
Module 1 Introduction to Web Programming .pptx
Configure Apache Mutual Authentication
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
sustainability-14-14877-v2.pddhzftheheeeee
giants, standing on the shoulders of - by Daniel Stenberg
Co-training pseudo-labeling for text classification with support vector machi...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Training Program for knowledge in solar cell and solar industry
Custom Battery Pack Design Considerations for Performance and Safety
Statistics on Ai - sourced from AIPRM.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
MuleSoft-Compete-Deck for midddleware integrations
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf

Spice world 2014 hacker smackdown

  • 3. “There are two types of companies that use computers. Victims of crime that know they are victims of crime and victims of crime that don’t have a clue yet.” - James Routh (CISO Depository Trust Clearing Corporation)
  • 4. “In today’s modern world, technology alone is not enough to combat the threats that now face organizations of all types and sizes. With the integration of continuous threat intelligence updates from OTX and AlienVault Labs, we can now provide millions of Spiceworks users with insight into the threats that could impact their business, and the guidance they need to take preventative measures.” - Russ Spitler
  • 5. What is this SpiceWorks / AlienVault Integration? Where does the threat data come from? What should I do when I get an AlienVault alert in SpiceWorks? Introduction to AlienVault USM. Demo with Victor Obando, systems engineer. Agenda
  • 6. AlienVault Threat Alerts in Spiceworks
  • 8. Alerts in Spiceworks: Dashboard & Device Details Page “SpiceWorks has found a connection with a potentially suspicious IP Address 77.240.191.89 on device tmg-mbh.“
  • 13. False Positives… The Root Cause IPs Change IPs may be assigned to a different server, owner Threats Get Remediated In the case of compromised/slaved servers, system owners may remediate threat Threats Naturally Expire Campaigns and targeted attacks end per orchestrator’s plans
  • 16. The world’s largest crowd-sourced threat repository Provides access to real-time, detailed information about threats and incidents Enables security professionals to share threat data and benefit from data shared by others Powers the AlienVault Threat Alerts in SpiceWorks What is Open Threat Exchange (OTX)?
  • 17. OTX + AlienVault Labs Threat Intelligence Powered by Open Collaboration Updates every 30 minutes 200,000 – 350,000 IP addresses validated daily 8,000 Collection Points 140 Countries and growing
  • 18. Threat Types Detected Malware Domain Distributing malware or hosting exploit code Malware IP Instrumental in malware, including malicious redirection Command and Control Sending command and control instructions to malware or a botnet Scanning Host Observed repeatedly scanning or probing remote systems APT Observed to be actively involved in an APT campaign Spamming Host Actively propagating or instrumental in the distribution of spam Malicious Host Engaged in malicious but uncharacterized activity
  • 19. Data Expiry & Privacy 122.225.118.219 # Scanning Host CN,Hangzhou,30.2936000824,120.161399841 122.225.118.66 # Scanning Host CN,Hangzhou,30.2936000824,120.161399841 188.138.100.156 # Malware IP;Scanning Host DE,,51.0,9.0 211.87.176.197 # Scanning Host CN,,35.0,105.0 95.163.107.201 # Spamming RU,,60.0,100.0 188.138.110.48 # Malicious Host;Scanning Host DE,,51.0,9.0 72.167.131.220 # Malware IP US,Scottsdale,33.6119003296,- 111.890602112 174.120.172.125 # Malware IP US,Houston,29.7523002625,- 95.3669967651 210.148.165.67 # Malware IP JP,,36.0,138.0 75.75.253.84 # Spamming US,Henderson,36.0312004089,-115.073898315 What OTX Collects External IPs connecting to system Traffic Patterns (Timestamps) What OTX Does NOT Collect System data System information Internal IP traffic Any personally identifiable information Contributed Data Expires after 30 Days Scanning Expires after 30 Days without additional evidence Contributed Data Expires after 30 Days Scanning Expires after 30 Days without additional evidence
  • 21. August 7th August 28th September 4th August 20th Aug 7, 2014 September 2nd September 10th August 15th August 27th Recent Breach Disclosures
  • 22. More and more organizations are finding themselves in the crosshairs of various bad actors for a variety of reasons. The number of organizations experiencing high profile breaches is unprecedented. The “security arms race” cannot continue indefinitely as the economics of securing your organization is stacked so heavily in favor of those launching attacks that incremental security investments are seen as impractical. Threat Landscape: Our New Reality 84% of organizations breached had evidence of the breach in their log files… Source: 2012 Verizon Data Breach Investigations Report
  • 23. OR UNIFIED SECURITY MANAGEMENT You’ve Got Options: Many Point Solutions… Integration Anyone?
  • 24. Asset Discovery • Active Network Scanning • Passive Network Scanning • Asset Inventory • Host-based Software Inventory Vulnerability Assessment • Network Vulnerability Testing • Remediation Verification Threat Detection • Network IDS • Host IDS • Wireless IDS • File Integrity Monitoring Behavioral Monitoring • Log Collection • Netflow Analysis • Service Availability Monitoring Security Intelligence • SIEM Event Correlation • Incident Response
  • 25. Unified, Coordinated Security Monitoring in a single console Simple Security Event Management and Reporting Cutting edge, crowd-sourced threat intelligence from AlienVault Labs and Open Threat Exchange™ (OTX) SIEM, Network IDS, Host IDS, Wireless IDS, File Integrity Monitoring, Vulnerability Assessment and more. Full suite of compliance reporting Fast Deployment – Be up and running in 1 hour Designed and Priced for the Midmarket – Starts at $3600! Why AlienVault for Your Environment
  • 27. AlienVault Labs Threat Intelligence: Coordinated Analysis, Actionable Guidance Weekly updates that cover all your coordinated rule sets: • Network-based IDS signatures • Host-based IDS signatures • Asset discovery and inventory database updates • Vulnerability database updates • Event correlation rules • Report modules and templates • Incident response templates / “how to” guidance for each alarm • Plug-ins to accommodate new data sources Fueled by the collective power of AlienVault’s Open Threat Exchange (OTX)
  • 28. Award-Winning Solution Used by 10,000+ for Threat Detection, Incident Response and Compliance Management
  • 29. Now Lets See It In Action
  • 30. More Questions? Email [email protected] Thank You! Any Questions? Test Drive AlienVault USM Download a Free 30-Day Trialhttp://www.alienvault.com/free-trial Try Our Product Sandbox http://www.alienvault.com/live-demo-site

Editor's Notes

  • #2: Hello SpiceHeads! – my name is Garrett Gross and I’m the Senior technical product marketing manager here at AlienVault. Before that, I was a sales engineer at Solarwinds (you may have heard of them) and, before that a sysadmin at a storage software company. I’ve held many other IT positions as well - help desk, hardware repair, tech support, bounty hunter, etc. Most importantly, I’m very passionate about information security and, of course, bacon.   I’m very excited to be here at SpiceWorld. Its been a great show so far and I cant believe the response we’ve had! I’m also SUPER excited to be speaking to you today and really appreciate your time. There will be a Q&A at the end so make sure to stick around for that!     Let me tell you a bit about AlienVault.
  • #3: Founded in 2007, AlienVault is the leading provider of Unified Security Management and crowd-sourced threat intelligence, headquartered in San Mateo, CA; with offices in Austin, TX; Madrid and Granada, Spain as well as Cork, Ireland.   You all probably know us from the AlienVault Threat Alerts in your SpiceWorks dashboard, alerting you to any monitored devices in your environment that are in contact with potentially malicious hosts. We’ve gotten a lot of GREAT feedback from the SpiceWorks community and are glad to hear that so many of you are using and enjoying this integration.   I’d like to take some time to talk to you about these Threat Alerts, how we get our data to identify these threats, and what to do when you receive an alert like this.   But first – lets talk about getting hacked…
  • #4: Famously quoted back in 2007, James Routh (CISO for the Depository Trust Clearing Corporation) said: “There are two types of companies that use computers. Victims of crime that know they are victims of crime and victims of crime that don’t have a clue yet.”   We need to go about our day knowing that we will we get attacked. Not only will we get attacked, there is nothing we can do that will ever 100% prevent someone from compromising assets in our environments.
  • #5: To quote one of the more talented individuals that I work with, Russ Spitler:   “In today’s modern world, technology alone is not enough to combat the threats that now face organizations of all types and sizes. With the integration of continuous threat intelligence updates from OTX and AlienVault Labs, we can now provide millions of Spiceworks users with insight into the threats that could impact their business, and the guidance they need to take preventative measures.”   And, he’s right – IT pros today need to understand that no amount of security controls will prevent attackers from compromising machines on the perimeter.   So, again – to best prepare for, and understand how to properly mitigate, attacks, we need to operate under the assumption that attackers will breach even the best of security measures. More information about what is going on in your environment from a security perspective will make dealing with these attacks much easier.   That’s where we come in…
  • #6: Real quick, though - Here’s an agenda of what I’d like to cover today.   What is this SpiceWorks / AlienVault Integration? Where does the threat data come from? What should I do when I get an AlienVault alert in SpiceWorks? Introduction to AlienVault Unified Security Management platform, our commercial product. Demo with Mark Allen, systems engineer.
  • #7: SpiceWorks/AlienVault integration   As I mentioned earlier (and as most of you here know), SpiceWorks comes with AlienVault Threat Alerts built-in (at no charge) as of version 7.1 (as you can see up here). There’s nothing additional you need to do to enable these alerts. With all these alerts coming in, SpiceWorlks users are quickly figuring out that there is a lot of communication coming in and out of their environment that they are not aware of.
  • #8: This integration alerts you when one of your monitored devices is found communicating with a known threat, a host we have a record of in our Open Threat Exchange. This is what they look like in your SpiceWorks dashboard.
  • #9: Clicking on “View Details of threat” then takes you to the Threat Details page where you will find more information about the potentially malicious host:
  • #10: It will display the threat type (malware domain, command and control server, scanning host, etc), what domains might be associated with the host, any blacklists that the IP is on, when the threat was first and last seen, and how many alerts have been raised in SpiceWorks from this IP.
  • #11: Scroll down the page and you get a description of what we think this threat is and how we recommend interacting (or not interacting) with it. Directly to the right, you can see how often this threat comes up in our findings to maybe give you an idea of how active of a threat this is. We’ll also display the download link, file type, and MD5 hash of known malicious payloads delivered by the host.
  • #12: Lastly, we have some GREAT remediation advice that gives you an idea what to do once you know one of your machines has come in contact with a known bad actor. For instance – there are quick tips on how to isolate an infected host or quarantine a command and control server. We’ve actually tailored this advice depending on the direction of the communication (inbound, outbound, or bidirectional)
  • #13: Our labs team works tirelessly to ensure that you are getting the most accurate data and quick enough to deal with current threats. However, even the most thorough analysis has a chance to produce false positives and we welcome your feedback. If you feel that the IP we have listed as a potential threat is not, in fact, malicious in nature, we would like you to let us know. In the top part of the Threat Details page, there is a link to flag the IP address for review. That will alert our labs team and the report will go under further review. They will then either provide additional detail substantiating the notion that the host is malicious or, in the case that it isn’t, purge the record from our database.   So – why the false positives?
  • #14: IPs change. IPs can easily be assigned to a different server and/or owner.   Threats Get Remediated. In the case of compromised/slaved servers, system owners may respond to and remediate the threat.   And Threats Naturally Expire. Campaigns and targeted attacks end per orchestrator’s plans. Honestly, that’s the case more often than not these days. Multi-stage dynamic attacks tend to be the more prevalent attack where the same compromised hosts (C&C servers, botnets, rootkits) are rarely used again.   Also - some urls can just LOOK malicious. An example of that is one that came up recently. Microsoft is (or was) using CenturyLink (formerly Savvis Communications) to host some update content. Unfortunately,
  • #15: ‘windows.update.nsatc.net’ could look a lot like
  • #16: safe.happy.unicorns.malware.hackyou.com to some IP reputation scanners out there. Now – these entries are usually auto-purged or thrown out by our team by the time the data reaches us but this would be a great opportunity for one of you to flag the IP for review.
  • #17: Where does this data come from?   Many of you are probably wondering where our IP reputation data comes from and the short answer is “from our Open Threat Exchange” or “OTX”. OTX is an open information sharing and analysis network, providing access to real-time, detailed information about threats around the world. It is also the same threat intelligence that powers our security platform, USM (which some of you here might be familiar with or even use today).   The Open Threat Exchange is an integrated approach to threat intelligence, comprised of data from 140+ countries and the independent research from our AlienVault Labs’ team. We analyze over 500,000 malware samples per day, updated every 30 minutes, converting this threat data into actionable intelligence. This allows you to call out truly significant events to help you prioritize your efforts and reduce the need for in-house expertise.
  • #18: OTX derives its data from three primary sources: USM and OSSIM installations that enable OTX sharing, external feeds from public researchers and partners, as well as the research done by our AlienVault Labs team. This data is then run through a powerful discovery engine that is able to granularly analyze the nature of the threat, as well as a similarly powerful validation engine that continually curates the database and certifies the validity of those threats.   Crowd-sourced information remains the core focus of OTX, deriving information from normalized, anonymous event logs: firewalls, content filters, ips/ids logs, etc. We receive approximately 17,000 contributions daily from over 140+ countries. Just to be clear, though: OTX's information is anonymous. OTX does not analyze your data or do anything that would identify you or your activity. We are solely focused on analyzing the nature of the threat jeopardizing your system.   OTX receives a significant amount of data from the security community itself. We work with public research institutions, government organizations, and private companies and partners to share and analyze threat data.   AlienVault Labs’ research is also a critical part of our analysis. Our labs team generates novel research on high profile threats and is responsible for instrumenting the automatic analysis for discovering and certifying all threats coming from OTX partners, OSSIM and USM customers who opt in to share data. I want to point out that this is the integration point for our app within SpiceWorks, leveraging the cloud services capabilities within the application.   Simply tracking threats isn't enough. To properly architect a solid defense, you need context. OTX is able to use its powerful validation engine to provide introspection to not only whether a threat is valid, but also WHAT kind of threat it is.
  • #19: I Want to emphasize how powerful this automated engine is: our engine can engage in code-level analysis to discover whether certain threats are part of an APT attack, deconstruct binaries to see whether a threat is a command and control server for a botnet, and even use the taxonomy of a known attack to see where malware is being stored versus where it simply pipes thru.   Data quality is key with OTX, and two big parts of our validation engine are its ability to score and analyze threats as well as continually certify the data. For scoring and validation, we confirm data with other sources to ensure we're not seeing false positives. This includes pruning known security researching hosts, as well as white-listed sources. Our engine also scores and uses feedback to gauge the potential danger associated with the threat.   Like I mentioned earlier: things change. Its very important to not only discover these threats but to continuously monitor for changes in activity. IPs often change ownership, threats get remediated, and threats naturally expire.
  • #20: Thankfully, we try to reflect that in our data. Our engine ensures that our threat intelligence is fresh and relevant. Generally, data on a threat expires after 30 days unless new information shows it remains active. However, for specific types of threats these expiry rules may change…   As I mentioned earlier, the information that the Open Threat Exchange collects (should you choose to share your data with the OTX community) is anonymous. External IPs connecting to your system as well as traffic patterns (when these connections were made) are collected but specific system information, internal IP traffic, or any other personally identifiable information is not collected. Don’t worry, no one cares that you’re totally into My Little Pony anyway.   So – Back to Spiceworks. You’ve gotten an alert that one of your devices has been in contact with a potentially malicious host… What do you do?
  • #21: What you don’t do is freak out. These alerts that pop up in your dashboard are not meant to cause panic or lead you to believe there has been a compromise. However, they are certainly important enough to pay attention to.   If you don’t have any go-to url reputation sites already (VirusTotal, totalhash, etc), just Google the IP. A word of caution, though – put the IP into the actual search field, not the “hybrid” navigation/search field. That’ll just take you to the potentially malicious host. Not like I’ve done that… earlier today…   Seriously, though – a Google search will usually return results from the top IP rep sites, including the one I mentioned. You might have to be creative with the search query but “<IP in question> malicious, analysis, virus, etc” should do the trick. Try to get information from as many sites as possible to either corroborate the alert and confirm the suspected malicious nature of the host or provide enough proof that this must be a false positive. If so, you can dismiss the alert but not before flagging the IP for our AlienVault Labs team to review.   At that point, you can use your new data to check your IDS logs, run thorough scans on potentially compromised devices, update authentication, even block certain IPs, re-image compromised machines, etc. if necessary. It would also be a smart idea to do an environment-wide AV/malware scan as soon as possible.
  • #22: I imagine I would be hard pressed to find someone in this room that is not aware of any of the recent security breaches involving major retailers and service providers: Target (or is it ‘tar-zjhey’?), Home Depot, um…. iCloud??   These are HUGE corporations with seemingly endless budgets and inexhaustible resources that allow them to not only have the most expensive and elaborate security systems, but also a large and highly skilled team of people to run it all.   But how much importance is put on the security of the environments powering the midmarket?
  • #23: Talk to slide… “50 percent of all data breaches occurred at companies with fewer than 1,000 employees and 31 percent with fewer than 100 employees. - Verizon 2014 Data Breach Investigations Report” The point I’m trying to make is that, while the big companies are getting the spotlight, it’s the smaller companies facing the greatest amount of threats. Most of these companies are fully networked with their environments exposed to the outside and some have no protection whatsoever. You know the old adage of ‘shooting fish in a barrel’?
  • #24: Whats the answer? Buy disparate security controls to address an issue, most of the time AFTER it happens? Manage them autonomous from each other, maybe even have different individuals managing different types of security tech?   We all know that doesn’t work. It doesn’t work when monitoring your network , it doesn’t work when monitoring applications, and it doesn’t work when it comes to security either, especially if you’re a small to midsize shop.
  • #25: I propose a different approach – AlienVault’s Unified Security Management platform, combining Asset Discovery, Vulnerability Assessment, Threat Detection, Behavioral Monitoring, and Security Intelligence. Combined with our Threat Intelligence, this unified set of security controls allows users to effectively monitor their infrastructure and keep up with the latest threats.
  • #26: So – again – why do I need this in my environment?   Unified, Coordinated Security Monitoring in a single console Simple Security Event Management and Reporting Cutting edge, crowd-sourced threat intelligence from AlienVault Labs and Open Threat Exchange™ (OTX) SIEM, Network IDS, Host IDS, Wireless IDS, File Integrity Monitoring, Vulnerability Assessment and more. Full suite of compliance reporting Fast Deployment – Be up and running in 1 hour Designed and Priced for the Midmarket – Starts at $3600!
  • #27: So – not only are we able to offer a comprehensive solution to those that have a tight budget, but also arm organizations that do not have a dedicated security team with expert-level threat intelligence. Think of our AlienVault Labs team as an extension of your own IT team.
  • #28: Regular updates to USM from our labs team include:   Network-based IDS signatures Host-based IDS signatures Asset discovery and inventory database updates Vulnerability database updates Event correlation rules Report modules and templates Incident response templates / “how to” guidance for each alarm Plug-ins to accommodate new data sources   All influenced by the data collected in OTX
  • #29: I want to stress here how we are not only giving you a software solution that is easy to set up and easy to use but also bolstering that with our open threat intelligence network and independent research from our AlienVault Labs team. Check out our sweet awards..
  • #30: Lets see the product in action!!
  • #31: Any questions?