Shutting down the PowerShell Attack Motorway

Presented at Black Hat Europe 2017, Dec. 6, 2017, 1:35 p.m. (25 minutes).

Malware is dead; it's still out there but is used for smash-and-grab, in-your-eye pokes or as distraction at most. The real threat has moved to higher ground, and PowerShell is King there. PowerShell is the vector for over 80% fileless malware executions in attacks. The majority of market endpoint protection solutions either bluntly stop all Powershell sessions or stop nothing as they don't have granular insight intoPowerShell sessions, so sophisticated attackers exploit it by running malicious and obfuscated code inside PowerShell thus infecting the endpoint without being detected or blocked.

Cybereason has announced the unique ability to gain visibility and control on what PowerShell is running within a session. Cybereason analyses all the commands PowerShell attempts to execute and blocks the execution of malicious commands, even if they are obfuscated. The result: scoped PowerShell use and high malop detection rates with low false positives. This session will discuss Powershell attacks and how Cybereason is uniquely able to shut down the Motorway to attackers while still letting administrators use this most versatile of toolkits.


Presenters:

  • Sam Curry - Chief Security Officer, Cybereason
    Sam Curry, Chief Security Officer, is an IT security visionary with over 20 years of IT security industry experience. Sam served as Chief Technology and Security Officer at Arbor Networks, where he was responsible for the development and implementation of Arbor's technology, security and innovation roadmap. Previously, he spent more than seven years at RSA (the Security Division of EMC) in a variety of senior management positions, including Chief Strategy Officer and Chief Technologist and Senior Vice President of Product Management and Product Marketing. Sam has also held senior roles at Microstrategy, Computer Associates, and McAfee.

Links:

Similar Presentations: