SlideShare ist ein Scribd-Unternehmen logo
1 von 27
1 © 2019 Proofpoint, Inc.
PROOFPOINT
EMERGINGTHREATS
ETPROSURICATA5.0
2 © 2019 Proofpoint, Inc.
The ET team today on the call:
 Richard Gonzalez
 ET Manager
 Jason Williams
 ET Researcher
 @switchingtoguns
 Jack Mott
 ET Researcher
 @malwareforme
 Brad Woodberg
 ET Product Manager
3 © 2019 Proofpoint, Inc.
Agenda
 We've never done this before...please go easy on our lack of webinar
skills.
 Where we've been.
 Where we are.
 Where we're going.
 Thanks and QA
4 © 2019 Proofpoint, Inc.
WHERE WE'VE BEEN
5 © 2019 Proofpoint, Inc.
Where we've been
 It's been ~4 ½ years since ET was acquired by Proofpoint
 We've seen the shifts in landscape from EKs to Ransomware to
Maldocs to Coinminers to Phish and all in between.
 We've been shifting focus in our detections with those changes in the
landscape to help analysts detect network comms best we can.
 ET rules and detection logic are part of many Proofpoint products even
when you might not see it in the traditional sense.
 Visibility gained from Proofpoint has been extremely valuable in writing
new detections, but we're still a small scrappy team.
 The research teams at Proofpoint are fantastic. We work closely with
them and they have helped to fuel our detections.
6 © 2019 Proofpoint, Inc.
Where we've been
 We love the ET ruleset but there are things we know we can improve
The categories & classifications are dated
TROJAN and MALWARE don’t entirely mean what they are called
CURRENT_EVENTS turned into a dumping ground for all the "cool stuff".
 We want to better prune and update older rules within the ruleset.
 That documentation thing
 Yea we read the tweets about us
 These things take people, time, and effort.
 It is complicated and dangerous to make sweeping rule edits.
 It's not just a sed replace for various things.
 We always have perf and QA in mind with our changes
7 © 2019 Proofpoint, Inc.
Where we've been
 We have a LOT of malicious traffic, but we don't have complete visibility
into non-malicious traffic.
 We rely on our users and our partners to give us more visibility into
wider networks and geos. Every network is special.
 We were happy when we were able to fork the ruleset to 4.0 (then 4.1
came out)
 Our internal tools have sometimes kept us from being able to act as
fast as we have wanted. (4.1)
 ET OPEN vs ET PRO – Still the same policies, still committed to
supporting the community
8 © 2019 Proofpoint, Inc.
WHERE WEARE
9 © 2019 Proofpoint, Inc.
What is ET focused on today?
 We tend to spend much of our time writing rules on the things that we
see hitting people today out in the world.
 ITW > !ITW
 We're always writing rules for malware
 This means that we follow today's landscape writing lots of:
 Social Engineering / Credential Theft – Phishing
 Malicious Documents
 Coinminers
 RATs, Keyloggers, VARIOUS CnC
 Things that are SSL encrypted (more on this later)
10 © 2019 Proofpoint, Inc.
We're supporting Suricata 5.0 at launch (today)
 We are actively supporting 60k (PRO) rules across 4 rule engines.
 ~48k active and ~12k disabled
 Snort 2.9.x / Suricata 2 / Suricata 4 / Suricata 5
 Suricata 4 will continue to be supported for the foreseeable future.
 Suricata 2 will be EOL'd in 90 days. (no new rules)
 We look forward to supporting Snort3 when it goes GA.
 The Suricata 5 ruleset will feature new categories and classifications as well
as updates to existing categories and rules to make more sense.
 Some of these things haven't been changed in a decade or more and most
are a result of drift.
11 © 2019 Proofpoint, Inc.
New Categories - msg:"ET $CATEGORY"
 This will be the first iteration of the ruleset that steps into the current
malware landscape in terms of metadata
*These changes are only affecting the new Suricata 5 ruleset
 MALWARE will be renamed to ADWARE_PUP
 TROJAN will be renamed to MALWARE
 New Categories:
- PHISHING (phishing.rules)
- COINMINER (coinminer.rules)
- JA3 (ja3.rules)
- EXPLOIT_KIT (exploit_kit.rules)
- HUNTING (hunting.rules)
12 © 2019 Proofpoint, Inc.
New Classtypes - classtype:this-stuff-is-new;
 classtype:credential-theft; (phishing)
 classtype:social-engineering;
 classtype:command-and-control; (replacing lots of trojan-activity)
 classtype:coin-mining;
 classtype:external-ip-lookup;
 classtype:domain-c2;
 classtype:exploit-kit;
 classtype:pup-activity; (possibly unwanted program)
 classtype:targeted-activity;
https://github.com/OISF/suricata/blob/master/classification.config
13 © 2019 Proofpoint, Inc.
New things/trends in the Suricata 5 ruleset
 New sticky buffers utilized immediately, and old rules will be converted
over time. There are some perf bonuses to be had here:
 content:".php"; http_uri; isdataat:!1,relative; (old)
 http.uri; content:".php"; endswith; (new hotness)
 Support for JA3 and JA3S hash rules:
 https://suricata.readthedocs.io/en/latest/rules/ja3-keywords.html
 Usage of transforms:
 https://suricata.readthedocs.io/en/suricata-5.0.0-beta1/rules/transforms.html
 More frequent usage of XBITS:
 https://suricata.readthedocs.io/en/suricata-5.0.0-beta1/rules/xbits.html
 Datasets...?
14 © 2019 Proofpoint, Inc.
Suricata 5 rule examples (1)
#
alert tls $HOME_NET any -> $EXTERNAL_NET any (msg:"ET
JA3 Observed Malicious Hash (Trickbot CnC)";
flow:established,to_server; ja3_hash;
content:"6734f37431670b3ab4292b8f60f29984";
classtype:command-and-control; sid:1; rev:1;)
#
alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET
EXPLOIT_KIT Spelevo EK Landing";
flow:established,to_client; file_data;
compress_whitespace; content:"function
CheckVersionFlash("; classtype:exploit-kit; sid:2;
rev:1;)
15 © 2019 Proofpoint, Inc.
Suricata 5 rule examples (2)
#
alert dns $HOME_NET any -> any any (msg:"ET MALWARE
Observed Glupteba CnC Domain in DNS Query"; dns_query;
content:"postnews.club"; bsize:13; nocase;
classtype:domain-c2; sid:3; rev:1;)
#
alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET
MALWARE Observed Cobalt Strike User-Agent";
flow:established,to_server;
http.user_agent; content:"Mozilla/5.0 (compatible|3b
20|MSIE 9.0|3b 20|Windows NT 6.1|3b 20|WOW64|3b
20|Trident/5.0|3b 20|BOIE9|3b|ENGB)"; bsize:82;
classtype:command-and-control; sid:4; rev:1;)
16 © 2019 Proofpoint, Inc.
Rule Migrations
 If you've been watching the rulesets, we've had some big rule
migrations
 Things leaving CURRENT_EVENTS:
- Some things being disabled, like a SSL cert that hit for a week in 2017
- Some things being moved, like Maldoc signatures into the MALWARE category
- Some other things being moved, like EK signatures into the WEB_CLIENT
category (this includes Suri4)
 Things being rewritten:
- We had a lot of DNS rules that were written for *most* cases, but not all. Rewritten
for all engines and updated for dns_query where possible.
 Things generally being disabled that haven't hit in a long, long time or are no
longer around.
17 © 2019 Proofpoint, Inc.
WHERE WE GOIN'
18 © 2019 Proofpoint, Inc.
Where we're going – Our Vision for ET ruleset
 Enable analysts to make informed decisions about what actions to take
on their network. Suricata is NSM not just IDS.
 The old way of thinking "An alert means something bad" should
not always be applied to every alert.
 If you see something fire from the MALWARE (or TROJAN) category, it
should be malware. You probably need to do something about it.
 If you see something fire from the INFO category, it is just trying to save
you some time and help provide context to other events around it.
 Lots of rule migration will continue to occur... HUNTING.
 The community matters.
19 © 2019 Proofpoint, Inc.
Where we're going
 We will continue to support both the PRO and OPEN rulesets along
with the ETPRO Telemetry edition.
 Writing more rules with the stipulation that they require SSL MITM to
trigger. See metadata tag 'SSLDecrypt' for 'Signature Deployment'
 More automation around the signature "performance impact"
metadata tag to help provide some more accurate data here based on
larger datasets.
 Actively seeking organizations who can share pcap data for usage in
our QA processes.
20 © 2019 Proofpoint, Inc.
Where we're going
 We don't expect to be making large changes in category and
classification like this outside of major engine releases.
 Like we saw in Suricata 4.1, which had many new features, we don't
expect to be able to fork the ruleset for minor versions.
 Suricata 2 will be EOL'd in 90 days (no new rules)
 Working on more documentation™.
 We do expect to be adding more metadata to the rules such as:
 Mitre ATT&CK Framework
 Backfilling Legacy Rules with Metadata
 Source
 SSL_Decrypt
21 © 2019 Proofpoint, Inc.
What do I do if I see a FP in an ET rule?
 https://feedback.emergingthreats.net
 If you're seeing it, other people are seeing it.
 We always want to know about it.
 We can see a lot of data, but chances are we can't see YOUR data--so
help us help you help everyone.
 If you want to discuss the rule the mailing list is a great option. If you
want it fixed the feedback portal is the fastest way to do so. We check
the twitters, but it's not part of our ticketing workflow.
 POLICY rule firing on stuff you don’t care about is not a FP.
 Local tunes vs global tune
22 © 2019 Proofpoint, Inc.
I'm an ET user, what do I need to do?
 If you're on Suri 2, you need to look at migrating in the next 90 days to Suri 4
or 5 to continue getting rule updates. If you're lower than 2, update. Please.
 If you're on Suri 4 and you don't have the ability to update, update when you
can. This ruleset will continue to get new rules.
 I want to Upgrade
 Upgrade Suricata on your sensors
 Change your download links to point to the Suricata 5 download location
- OPEN: https://rules.emergingthreats.net/open/suricata-5.0/
- PRO: https://rules.emergingthreatspro.com/[LICENSE_CODE]/suricata-5.0/
 If you are only pulling in certain rulesets – You may want to re-eval which
ones you are grabbing. Eg. CURRENT_EVENTS won't have any EKs
23 © 2019 Proofpoint, Inc.
How can I participate?
 The mailing list
 https://lists.emergingthreats.net/mailman/listinfo/
 Twitter
 @et_labs (research and cool stuff)
 @emergingthreats (probably more marketing type stuff)
 The Malware Exchange
 Join our team (senior researcher role open)
 ETPRO Telemetry edition
 Custom sharing agreements (NDA)
 Report issues via feedback portal
 https://feedback.emergingthreats.net
24 © 2019 Proofpoint, Inc.
Thanks from the whole ET team to the
community
 PT Security – Contributing some great rules to ET Open
 Travis Green – OG ET, still contributing to the community
 Protectwise – Thank you for all the reports of ways various rules could
be improved
 Opnsense – Thank you for the partnership in helping bring the ETPRO
Telemetry to life
 MS-ISAC
 GM CIRT
 The Suricata and OISF Teams (Suricon 2019)
25 © 2019 Proofpoint, Inc.
Q & A
26 © 2019 Proofpoint, Inc.
27 © 2019 Proofpoint, Inc.

Weitere ähnliche Inhalte

Was ist angesagt?

2014 Security Onion Conference
2014 Security Onion Conference2014 Security Onion Conference
2014 Security Onion ConferenceDefensiveDepth
 
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)Martin Schütte
 
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]RootedCON
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиPositive Hack Days
 
Chapter 8 security tools ii
Chapter 8   security tools iiChapter 8   security tools ii
Chapter 8 security tools iiSyaiful Ahdan
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)Martin Schütte
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
I psec
I psecI psec
I psecnlekh
 
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali LinuxJason Murray
 
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolFastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolPavel Odintsov
 
DeiC DDoS Prevention System - DDPS
DeiC DDoS Prevention System - DDPSDeiC DDoS Prevention System - DDPS
DeiC DDoS Prevention System - DDPSPavel Odintsov
 
Security Onion Conference - 2015
Security Onion Conference - 2015Security Onion Conference - 2015
Security Onion Conference - 2015DefensiveDepth
 
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Santiago Bassett
 
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on..." Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...PROIDEA
 

Was ist angesagt? (20)

2014 Security Onion Conference
2014 Security Onion Conference2014 Security Onion Conference
2014 Security Onion Conference
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
 
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
 
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
 
Python Cryptography & Security
Python Cryptography & SecurityPython Cryptography & Security
Python Cryptography & Security
 
05 06 ike
05   06 ike05   06 ike
05 06 ike
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атаки
 
Chapter 8 security tools ii
Chapter 8   security tools iiChapter 8   security tools ii
Chapter 8 security tools ii
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Shamoon
ShamoonShamoon
Shamoon
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
I psec
I psecI psec
I psec
 
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux
 
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolFastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection tool
 
DeiC DDoS Prevention System - DDPS
DeiC DDoS Prevention System - DDPSDeiC DDoS Prevention System - DDPS
DeiC DDoS Prevention System - DDPS
 
IPsec on Mikrotik
IPsec on MikrotikIPsec on Mikrotik
IPsec on Mikrotik
 
Security Onion Conference - 2015
Security Onion Conference - 2015Security Onion Conference - 2015
Security Onion Conference - 2015
 
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014
 
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on..." Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
 

Ähnlich wie Proofpoint Emerging Threats Suricata 5.0 Webinar

Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
 
Sydney mule soft meetup 30 april 2020
Sydney mule soft meetup   30 april 2020Sydney mule soft meetup   30 april 2020
Sydney mule soft meetup 30 april 2020Royston Lobo
 
From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018Christophe Rochefolle
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Berezha Security Group
 
2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdfSavinder Puri
 
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docxIT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docxvrickens
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESIJNSA Journal
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesIJNSA Journal
 
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019Rod Soto
 
TotalEconomicBenefitOfSparqlycode 1.2
TotalEconomicBenefitOfSparqlycode 1.2TotalEconomicBenefitOfSparqlycode 1.2
TotalEconomicBenefitOfSparqlycode 1.2Paul Worrall
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
The Developer is the New CIO: How Vendors Adapt to the Changing Landscape
The Developer is the New CIO: How Vendors Adapt to the Changing LandscapeThe Developer is the New CIO: How Vendors Adapt to the Changing Landscape
The Developer is the New CIO: How Vendors Adapt to the Changing LandscapeLauren Cooney
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?Leonard Lee
 

Ähnlich wie Proofpoint Emerging Threats Suricata 5.0 Webinar (20)

Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
DotNetnuke
DotNetnukeDotNetnuke
DotNetnuke
 
Sydney mule soft meetup 30 april 2020
Sydney mule soft meetup   30 april 2020Sydney mule soft meetup   30 april 2020
Sydney mule soft meetup 30 april 2020
 
From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018
 
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
 
Safecrossroads ep01
Safecrossroads ep01Safecrossroads ep01
Safecrossroads ep01
 
2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf
 
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docxIT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
 
DotNetnuke
DotNetnukeDotNetnuke
DotNetnuke
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
 
TotalEconomicBenefitOfSparqlycode 1.2
TotalEconomicBenefitOfSparqlycode 1.2TotalEconomicBenefitOfSparqlycode 1.2
TotalEconomicBenefitOfSparqlycode 1.2
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
The Developer is the New CIO: How Vendors Adapt to the Changing Landscape
The Developer is the New CIO: How Vendors Adapt to the Changing LandscapeThe Developer is the New CIO: How Vendors Adapt to the Changing Landscape
The Developer is the New CIO: How Vendors Adapt to the Changing Landscape
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
 

Kürzlich hochgeladen

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Kürzlich hochgeladen (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Proofpoint Emerging Threats Suricata 5.0 Webinar

  • 1. 1 © 2019 Proofpoint, Inc. PROOFPOINT EMERGINGTHREATS ETPROSURICATA5.0
  • 2. 2 © 2019 Proofpoint, Inc. The ET team today on the call:  Richard Gonzalez  ET Manager  Jason Williams  ET Researcher  @switchingtoguns  Jack Mott  ET Researcher  @malwareforme  Brad Woodberg  ET Product Manager
  • 3. 3 © 2019 Proofpoint, Inc. Agenda  We've never done this before...please go easy on our lack of webinar skills.  Where we've been.  Where we are.  Where we're going.  Thanks and QA
  • 4. 4 © 2019 Proofpoint, Inc. WHERE WE'VE BEEN
  • 5. 5 © 2019 Proofpoint, Inc. Where we've been  It's been ~4 ½ years since ET was acquired by Proofpoint  We've seen the shifts in landscape from EKs to Ransomware to Maldocs to Coinminers to Phish and all in between.  We've been shifting focus in our detections with those changes in the landscape to help analysts detect network comms best we can.  ET rules and detection logic are part of many Proofpoint products even when you might not see it in the traditional sense.  Visibility gained from Proofpoint has been extremely valuable in writing new detections, but we're still a small scrappy team.  The research teams at Proofpoint are fantastic. We work closely with them and they have helped to fuel our detections.
  • 6. 6 © 2019 Proofpoint, Inc. Where we've been  We love the ET ruleset but there are things we know we can improve The categories & classifications are dated TROJAN and MALWARE don’t entirely mean what they are called CURRENT_EVENTS turned into a dumping ground for all the "cool stuff".  We want to better prune and update older rules within the ruleset.  That documentation thing  Yea we read the tweets about us  These things take people, time, and effort.  It is complicated and dangerous to make sweeping rule edits.  It's not just a sed replace for various things.  We always have perf and QA in mind with our changes
  • 7. 7 © 2019 Proofpoint, Inc. Where we've been  We have a LOT of malicious traffic, but we don't have complete visibility into non-malicious traffic.  We rely on our users and our partners to give us more visibility into wider networks and geos. Every network is special.  We were happy when we were able to fork the ruleset to 4.0 (then 4.1 came out)  Our internal tools have sometimes kept us from being able to act as fast as we have wanted. (4.1)  ET OPEN vs ET PRO – Still the same policies, still committed to supporting the community
  • 8. 8 © 2019 Proofpoint, Inc. WHERE WEARE
  • 9. 9 © 2019 Proofpoint, Inc. What is ET focused on today?  We tend to spend much of our time writing rules on the things that we see hitting people today out in the world.  ITW > !ITW  We're always writing rules for malware  This means that we follow today's landscape writing lots of:  Social Engineering / Credential Theft – Phishing  Malicious Documents  Coinminers  RATs, Keyloggers, VARIOUS CnC  Things that are SSL encrypted (more on this later)
  • 10. 10 © 2019 Proofpoint, Inc. We're supporting Suricata 5.0 at launch (today)  We are actively supporting 60k (PRO) rules across 4 rule engines.  ~48k active and ~12k disabled  Snort 2.9.x / Suricata 2 / Suricata 4 / Suricata 5  Suricata 4 will continue to be supported for the foreseeable future.  Suricata 2 will be EOL'd in 90 days. (no new rules)  We look forward to supporting Snort3 when it goes GA.  The Suricata 5 ruleset will feature new categories and classifications as well as updates to existing categories and rules to make more sense.  Some of these things haven't been changed in a decade or more and most are a result of drift.
  • 11. 11 © 2019 Proofpoint, Inc. New Categories - msg:"ET $CATEGORY"  This will be the first iteration of the ruleset that steps into the current malware landscape in terms of metadata *These changes are only affecting the new Suricata 5 ruleset  MALWARE will be renamed to ADWARE_PUP  TROJAN will be renamed to MALWARE  New Categories: - PHISHING (phishing.rules) - COINMINER (coinminer.rules) - JA3 (ja3.rules) - EXPLOIT_KIT (exploit_kit.rules) - HUNTING (hunting.rules)
  • 12. 12 © 2019 Proofpoint, Inc. New Classtypes - classtype:this-stuff-is-new;  classtype:credential-theft; (phishing)  classtype:social-engineering;  classtype:command-and-control; (replacing lots of trojan-activity)  classtype:coin-mining;  classtype:external-ip-lookup;  classtype:domain-c2;  classtype:exploit-kit;  classtype:pup-activity; (possibly unwanted program)  classtype:targeted-activity; https://github.com/OISF/suricata/blob/master/classification.config
  • 13. 13 © 2019 Proofpoint, Inc. New things/trends in the Suricata 5 ruleset  New sticky buffers utilized immediately, and old rules will be converted over time. There are some perf bonuses to be had here:  content:".php"; http_uri; isdataat:!1,relative; (old)  http.uri; content:".php"; endswith; (new hotness)  Support for JA3 and JA3S hash rules:  https://suricata.readthedocs.io/en/latest/rules/ja3-keywords.html  Usage of transforms:  https://suricata.readthedocs.io/en/suricata-5.0.0-beta1/rules/transforms.html  More frequent usage of XBITS:  https://suricata.readthedocs.io/en/suricata-5.0.0-beta1/rules/xbits.html  Datasets...?
  • 14. 14 © 2019 Proofpoint, Inc. Suricata 5 rule examples (1) # alert tls $HOME_NET any -> $EXTERNAL_NET any (msg:"ET JA3 Observed Malicious Hash (Trickbot CnC)"; flow:established,to_server; ja3_hash; content:"6734f37431670b3ab4292b8f60f29984"; classtype:command-and-control; sid:1; rev:1;) # alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT_KIT Spelevo EK Landing"; flow:established,to_client; file_data; compress_whitespace; content:"function CheckVersionFlash("; classtype:exploit-kit; sid:2; rev:1;)
  • 15. 15 © 2019 Proofpoint, Inc. Suricata 5 rule examples (2) # alert dns $HOME_NET any -> any any (msg:"ET MALWARE Observed Glupteba CnC Domain in DNS Query"; dns_query; content:"postnews.club"; bsize:13; nocase; classtype:domain-c2; sid:3; rev:1;) # alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE Observed Cobalt Strike User-Agent"; flow:established,to_server; http.user_agent; content:"Mozilla/5.0 (compatible|3b 20|MSIE 9.0|3b 20|Windows NT 6.1|3b 20|WOW64|3b 20|Trident/5.0|3b 20|BOIE9|3b|ENGB)"; bsize:82; classtype:command-and-control; sid:4; rev:1;)
  • 16. 16 © 2019 Proofpoint, Inc. Rule Migrations  If you've been watching the rulesets, we've had some big rule migrations  Things leaving CURRENT_EVENTS: - Some things being disabled, like a SSL cert that hit for a week in 2017 - Some things being moved, like Maldoc signatures into the MALWARE category - Some other things being moved, like EK signatures into the WEB_CLIENT category (this includes Suri4)  Things being rewritten: - We had a lot of DNS rules that were written for *most* cases, but not all. Rewritten for all engines and updated for dns_query where possible.  Things generally being disabled that haven't hit in a long, long time or are no longer around.
  • 17. 17 © 2019 Proofpoint, Inc. WHERE WE GOIN'
  • 18. 18 © 2019 Proofpoint, Inc. Where we're going – Our Vision for ET ruleset  Enable analysts to make informed decisions about what actions to take on their network. Suricata is NSM not just IDS.  The old way of thinking "An alert means something bad" should not always be applied to every alert.  If you see something fire from the MALWARE (or TROJAN) category, it should be malware. You probably need to do something about it.  If you see something fire from the INFO category, it is just trying to save you some time and help provide context to other events around it.  Lots of rule migration will continue to occur... HUNTING.  The community matters.
  • 19. 19 © 2019 Proofpoint, Inc. Where we're going  We will continue to support both the PRO and OPEN rulesets along with the ETPRO Telemetry edition.  Writing more rules with the stipulation that they require SSL MITM to trigger. See metadata tag 'SSLDecrypt' for 'Signature Deployment'  More automation around the signature "performance impact" metadata tag to help provide some more accurate data here based on larger datasets.  Actively seeking organizations who can share pcap data for usage in our QA processes.
  • 20. 20 © 2019 Proofpoint, Inc. Where we're going  We don't expect to be making large changes in category and classification like this outside of major engine releases.  Like we saw in Suricata 4.1, which had many new features, we don't expect to be able to fork the ruleset for minor versions.  Suricata 2 will be EOL'd in 90 days (no new rules)  Working on more documentation™.  We do expect to be adding more metadata to the rules such as:  Mitre ATT&CK Framework  Backfilling Legacy Rules with Metadata  Source  SSL_Decrypt
  • 21. 21 © 2019 Proofpoint, Inc. What do I do if I see a FP in an ET rule?  https://feedback.emergingthreats.net  If you're seeing it, other people are seeing it.  We always want to know about it.  We can see a lot of data, but chances are we can't see YOUR data--so help us help you help everyone.  If you want to discuss the rule the mailing list is a great option. If you want it fixed the feedback portal is the fastest way to do so. We check the twitters, but it's not part of our ticketing workflow.  POLICY rule firing on stuff you don’t care about is not a FP.  Local tunes vs global tune
  • 22. 22 © 2019 Proofpoint, Inc. I'm an ET user, what do I need to do?  If you're on Suri 2, you need to look at migrating in the next 90 days to Suri 4 or 5 to continue getting rule updates. If you're lower than 2, update. Please.  If you're on Suri 4 and you don't have the ability to update, update when you can. This ruleset will continue to get new rules.  I want to Upgrade  Upgrade Suricata on your sensors  Change your download links to point to the Suricata 5 download location - OPEN: https://rules.emergingthreats.net/open/suricata-5.0/ - PRO: https://rules.emergingthreatspro.com/[LICENSE_CODE]/suricata-5.0/  If you are only pulling in certain rulesets – You may want to re-eval which ones you are grabbing. Eg. CURRENT_EVENTS won't have any EKs
  • 23. 23 © 2019 Proofpoint, Inc. How can I participate?  The mailing list  https://lists.emergingthreats.net/mailman/listinfo/  Twitter  @et_labs (research and cool stuff)  @emergingthreats (probably more marketing type stuff)  The Malware Exchange  Join our team (senior researcher role open)  ETPRO Telemetry edition  Custom sharing agreements (NDA)  Report issues via feedback portal  https://feedback.emergingthreats.net
  • 24. 24 © 2019 Proofpoint, Inc. Thanks from the whole ET team to the community  PT Security – Contributing some great rules to ET Open  Travis Green – OG ET, still contributing to the community  Protectwise – Thank you for all the reports of ways various rules could be improved  Opnsense – Thank you for the partnership in helping bring the ETPRO Telemetry to life  MS-ISAC  GM CIRT  The Suricata and OISF Teams (Suricon 2019)
  • 25. 25 © 2019 Proofpoint, Inc. Q & A
  • 26. 26 © 2019 Proofpoint, Inc.
  • 27. 27 © 2019 Proofpoint, Inc.