{"id":21296,"date":"2018-10-05T09:13:35","date_gmt":"2018-10-05T13:13:35","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/cyberpaleontology-managed-protection\/21296\/"},"modified":"2019-11-15T22:31:16","modified_gmt":"2019-11-15T11:31:16","slug":"cyberpaleontology-managed-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/cyberpaleontology-managed-protection\/21296\/","title":{"rendered":"Cyber-paleontology: Sounds impressive; its results \u2013 more so"},"content":{"rendered":"<p>Hi folks!<\/p>\n<p>Let me kick off by paraphrasing a rather <a href=\"https:\/\/en.wikipedia.org\/wiki\/Social_consciousness\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">famous<\/a> philosophical postulate: \u2018Does a profession determine man\u2019s social being, or does his social being determine his profession?\u2019 Apparently this question (actually, the original) has been hotly debated for more than 150 years. And since the invention and spread of the Internet, this holy war only looks set to be extended for another 150, at least. Now, I personally don\u2019t claim to support one side or the other; however, I do want to argue (based on personal experience) in favor of the <em>dualism<\/em> of a profession and being, since they mutually affect each other \u2013 in many ways and continually.<\/p>\n<p>Toward the end of the 1980s, computer virology came about as a response to the growing proliferation of malicious programs. Fast-forward 30 years, and virology has evolved (rather, merged \u2013 in ecstasy \u2013 with adjacent fields) into the cybersecurity industry, which now often dictates the development of <span style=\"text-decoration: line-through\">being<\/span> IT: given inevitable competition, only the technology with the best protection survives.<\/p>\n<p>In the 30 years since the end of the 1980s, we (AV companies) have been called quite a few different colorful and\/or unsavory names. But the most accurate in recent years, IMHO, is the meme <em>cyber-paleontologists<\/em>.<\/p>\n<p>Indeed, the industry has learned how to fight mass epidemics: either proactively (like we protected users from the largest epidemics of recent years \u2013 <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-ransomware\/16518\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Wannacry<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/new-ransomware-epidemics\/17314\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">ExPetr<\/a>), or reactively (using cloud-based threat-data analysis and prompt updates) \u2013 it doesn\u2019t matter. But when it comes to <em>targeted<\/em> cyberattacks, there\u2019s still a long way to go for the industry on the whole: only a few companies have sufficient technical maturity and resources to be able to cope with them, but if you add an unwavering commitment to expose any and all cyber-baddies no matter where they may come from or what their motives might be \u2013 you\u2019re left with just one company: KL! (Which reminds me of something Napoleon Hill once said: \u2018The ladder of success is never crowded at the top\u2019.) Well it\u2019s no wonder we\u2019re in a lonely position (at the top of the ladder): maintaining that unwavering commitment to expose literally anyone is waaaaay more expensive than not maintaining it. And it\u2019s waaaay more troublesome given the ongoing geopolitical upheavals of late, but our experience shows it\u2019s the right thing to do \u2013 and users confirm this with their <a href=\"https:\/\/eugene.kaspersky.com\/2018\/01\/19\/kl-2017-the-proof-of-the-pudding-is-in-the-preliminary-financial-results\/\" target=\"_blank\" rel=\"noopener noreferrer\">wallets<\/a>.<\/p>\n<p>A cyber-espionage operation is a very long, expensive, complex, hi-tech project. Of course, the authors of such operations get very upset and annoyed when they get caught, and many <a href=\"https:\/\/www.av-comparatives.org\/spotlight-on-security-politics-and-cyber-security-a-troubled-relationship\/\" target=\"_blank\" rel=\"noopener nofollow\">think<\/a> that they try to get rid of \u2018undesirable\u2019 developers by using different methods via <a href=\"https:\/\/eugene.kaspersky.com\/2018\/06\/12\/dutch-hacker-big-cyber-politics-and-the-anatomy-of-real-fake-news\/\" target=\"_blank\" rel=\"noopener noreferrer\">manipulation of the media<\/a>. There are other, similar theories too:<\/p>\n<p><a href=\"https:\/\/twitter.com\/malwrhunterteam\/status\/1029276290900262913\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2018\/10\/08102125\/tweet_dino.jpg\" alt=\"\" width=\"673\" height=\"377\" class=\"aligncenter size-full wp-image-21299\"><\/a><\/p>\n<p>But I digress\u2026<\/p>\n<p>Now, these cyber-espionage operations can remain under the radar for years. The authors take good care of their <span style=\"text-decoration: line-through\">investments<\/span> kit: they attack just a few specially selected targets (no mass attacks, which are more easily detected), they test it on all the popular cybersecurity products out there, they quickly change tactics if the need arises, and so on. It\u2019s no stretch of the imagination to state that the many <a href=\"https:\/\/apt.securelist.com\/#!\/threats\/\" target=\"_blank\" rel=\"noopener noreferrer\">targeted attacks<\/a> that have been detected are just the tip of the iceberg. And the only really effective means of uncovering such attacks is with <a href=\"https:\/\/securelist.com\/the-art-of-finding-cyber-dinosaur-skeletons\/67928\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber-paleontology<\/a>; that is, long-term, meticulous collection of data for building the \u2018big picture\u2019; cooperation with experts from other companies; detection and analysis of anomalies; and subsequent development of protection technologies.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2018\/10\/08102133\/regin_dino.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2018\/10\/08102133\/regin_dino.jpg\" alt=\"\" width=\"970\" height=\"567\" class=\"aligncenter size-full wp-image-21301\"><\/a><\/p>\n<p>In the field of cyber-paleontology there are two main sub-fields: ad hoc investigations (after detecting something by chance and pursuing it), and systemic operational investigations (the process of planned analysis of the corporate IT landscape).<\/p>\n<p>The obvious advantages of operational cyber-paleontology are highly valued by large organizations (be they state or commercial ones), which are always the primary target in targeted attacks. However, not all organizations have the opportunity or ability to undertake operational cyber-paleontology themselves: true specialists (for hire) in this niche line of work are few and far between \u2013 and they\u2019re expensive too. We should know \u2013 we\u2019ve <a href=\"https:\/\/www.kaspersky.com\/about\/team\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">plenty<\/a> of them <a href=\"https:\/\/great.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">all around the world<\/a> (with outstanding experience and world-renowned names). Thus, recently, given our strength in this field and the great need for it on the part of our corporate customers \u2013 true to the market principles of supply and demand \u2013 we decided to come up with a new service for the market \u2013 <em><a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/threat-hunting\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><em>Kaspersky Managed Protection<\/em><\/a><\/em>.<\/p>\n<p><!--more Read on...-->Kaspersky Managed Protection, essentially, is our outsourcing of cyber-paleontology.<\/p>\n<p>First, our cloud service collects metadata of network and system activity. This then gets aggregated with data from our <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-security-network-explained\/8657\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">KSN<\/a>; then all that is analyzed by both smart systems and <span style=\"text-decoration: line-through\">cyber-paleontologists<\/span> experts (thus, the <a href=\"https:\/\/www.kaspersky.com\/blog\/what-humachine-intelligence-is\/17995\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">HuMachine<\/a> approach).<\/p>\n<p>Back to the collection of metadata\u2026 \u2013 what\u2019s really cool about it is that Kaspersky Managed Protection doesn\u2019t require installation of extra sensors for the collection of metadata. The service works in unison with already installed products (in particular, <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint-product\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Endpoint Security<\/a> and <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/anti-targeted-attack-platform\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky AntiTargeted Attack<\/a>; and in the future, potentially, other developers\u2019 products), whose telemetry it uses as the basis of its \u2018medical examination\u2019 &gt; diagnosis &gt; treatment prescription.<\/p>\n<p>But more interesting is what\u2019s hidden in the aggregation with KSN data.<\/p>\n<p>The service already has in its possession gigabytes of raw telemetry from different sensors: OS events, behavior of processes and their network interaction, activity of system services and applications, security products\u2019 verdicts (including unusual behavior detection, IDS, sandboxing, objects\u2019 reputation checking, Yara-rules\u2026 (head stopped spinning yet?!)). But if done properly, out of this chaos you can come up with <a href=\"https:\/\/attack.mitre.org\/wiki\/Main_Page\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">techniques<\/a> that can help eventually uncover targeted attacks.<\/p>\n<p>At this stage, to separate the wheat from the chaff, we use patented technology of cloud detection, investigation and elimination of targeted attacks. First, received telemetry is automatically tagged by KSN as per the popularity of objects, a belonging to this or that group, similarities with known threats, and many other parameters. In other words, we filter out the chaff, and on all the useful stuff left (different grains of wheat) we attach special tags.<\/p>\n<p>Then the tags are automatically processed by a correlational mechanism with machine learning, which puts forth hypotheses on potential cyberattacks. In the language of paleontologists, we study the dug up fragments to find similarities with already discovered dinosaurs, and also look for unusual combinations of fragments that could be characteristic of dinosaurs as yet unknown to science.<\/p>\n<p>The correlational mechanism relies on a multitude of information sources for building hypotheses. Over the 21 years since we established KL we\u2019ve accumulated\u2026 <em>sufficient<\/em> data (if I\u2019m modest:) for such hypotheses, including: on suspicious statistical deviations from normal activity; on tactics, technologies and procedures of various targeted attacks; the data we glean from the investigations of computer crimes we participate in.<\/p>\n<p>Once hypotheses are put together, the time comes to put the brains of the cyber-paleontologist to work. This expert does things artificial intelligence can only dream of: he\/she checks the authenticity of the presented hypotheses, analyzes suspicious objects and actions, eliminates false positives, teaches machine learning robots, and develops rules for finding new threats. One day, though, practically everything that was once done manually by a paleontologist will be done automatically \u2013 it\u2019s a never-ending process of conversion of experience in investigations, and of investigations becoming an automated service.<\/p>\n<p>So, gradually, step-by-step, with the help of cutting-edge technologies and overseen by experts, out of tons of earth, traces can be found of hitherto unknown <span style=\"text-decoration: line-through\">monsters<\/span> targeted attacks. The more unprocessed earth Kaspersky Managed Protection receives, and the further it digs back in time, the greater the likelihood of \u2018discovering the undiscoverable\u2019 and, accordingly, uncovering unknown attacks. What\u2019s most important is that this is the most effective means of protection, since nowhere but in the networks of large organizations is there that unprocessed earth containing fragments of dinosaurs.<\/p>\n<p>In closing, a few words on how Kaspersky Managed Protection complements our Security Operations Center (SOC) \u2013 the control center for information security incidents.<\/p>\n<p>Of course, Kaspersky Managed Protection won\u2019t replace SOC, but (i) it could give a push toward its creation, since it elegantly solves a single (though the most important) task: uncovering attacks of any complexity; (ii) it could expand the competence of an existing SOC by adding to it cyber-paleontology; and (iii) last but most: it could create extra business for MSSP providers by expanding the service applications of scalable functions of cyber-paleontology. I think this third factor may be the main vector in the development of Kaspersky Managed Protection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Given the great need for it on the part of our corporate customers \u2013 true to the market principles of supply and demand \u2013 we decided to come up with a new service for the market \u2013 Kaspersky Managed Protection.<\/p>\n","protected":false},"author":13,"featured_media":21297,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2993],"tags":[499,2998,2999],"class_list":{"0":"post-21296","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-apt","10":"tag-cyber-paleonthology","11":"tag-soc"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cyberpaleontology-managed-protection\/21296\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cyberpaleontology-managed-protection\/14418\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cyberpaleontology-managed-protection\/12056\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cyberpaleontology-managed-protection\/16350\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cyberpaleontology-managed-protection\/14543\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cyberpaleontology-managed-protection\/13509\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cyberpaleontology-managed-protection\/17107\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cyberpaleontology-managed-protection\/16412\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cyberpaleontology-managed-protection\/21448\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cyberpaleontology-managed-protection\/24118\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cyberpaleontology-managed-protection\/11070\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cyberpaleontology-managed-protection\/11443\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cyberpaleontology-managed-protection\/17868\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cyberpaleontology-managed-protection\/17444\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cyberpaleontology-managed-protection\/21303\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/21296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=21296"}],"version-history":[{"count":8,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/21296\/revisions"}],"predecessor-version":[{"id":23966,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/21296\/revisions\/23966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/21297"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=21296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=21296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=21296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}