SlideShare a Scribd company logo
©LogRhythm 2017. All rights reserved. Company Confidential
PIE
Active Defense Against Phishing
Greg Foss
Manager, Global Security Operations
OSCP, GMON, GAWN, GPEN, GWAPT, GCIH, CEH, APT
Email is the Gateway
Corporate boundaries are a thing of the past…
Most Common Attack - Phishing
242 Phishing Attacks in Q4
Average 5 emails received per case – many 100+ email cases
31%
12%
12%
11%
10%
9%
5%
5%
3%
2%
Phishing Attack by Type
Credential Theft Link
Spam
Social Engineering
Malicious Link
Wire Fraud Attempt
Credential Theft Attachment
Malicious PDF
Macro Enabled Document
Encrypted Attachment
False Positive
Metrics are only from the ones that make it through
Majority of
Spam and
Malware are
Blocked
Automatically
It’s not Just Emails from Phishers to Worry About
• Exchange OWA / O365 password spraying
• Targeted mail scraping and extraction
• Malicious rule creation
• Passive account monitoring
• Auto Forwarding
• Email Spoofing
• VoIP and SMS Spoofing
• Data leakage
• General Malware
• …
https://github.com/LogRhythm-Labs/PIE
PIE - BSides Vancouver 2018
• Extract email from specific users
• Extract email from all affected users
• Block senders
• Unblock senders
• Reset Office 365 credentials
• Evaluate Message Forwarding rules
• Create and update LogRhythm Cases
• And more…
Story Time!
Quick Metrics
• 90% of phishing attacks that make it through Office365 filters are never seen
by LogRhythm Employees…
• Those that make their way to inboxes are tracked, documented, and
quarantined following a report from a user.
• Of messages reported 75% are quarantined automatically
Story #1 – Phishing Exercise
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
Users Reporting to Phishing Address
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
Automate Metric Collection - Basics
Automate Metric Collection – Focus on the Positive
Automate Cleanup and Email Quarantine
Story #2
November 2017
What are you
asking, Andy?
Poof
PIE - BSides Vancouver 2018
We had
been
watching
the
whole
time…
Actually registered logrhytthm.com under real name
Turns out he was an older script kiddie
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
Story #3 – Operation Nigerian Rhythm
Low and Slow dictionary attacks against O365 – going on for months
~3.5k attempts in 1-week
Eventually – they got in via credential phishing
And blasted the entire Sales org an hour later…
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
It
happened
again…
PIE - BSides Vancouver 2018
Round 2 – Bigger, better, and more disruptive
Initial Phish Second Wave
Nick
David
Bob
PIE - BSides Vancouver 2018
ENABLE MFA!
Story #4 - Mailsploit
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
PIE Future Plans and Development Priorities
• 7.3.2 Case API Integration
• O365 URL Rewriting integration
• IDS, Firewall, and Endpoint integration
• Support for On-Premise Exchange
• Web Leaderboard and Open Metrics
• Implement Active Defense Scripts
• Seamless SIEM integration
• Community Integrations!
- What tools are you using?
- What else do you want to see PIE do?
©LogRhythm 2017. All rights reserved. Company Confidential
https://github.com/LogRhythm-Labs/PIE
©LogRhythm 2017. All rights reserved. Company Confidential
Bonus
Messing with Phishers…
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
PIE - BSides Vancouver 2018
What About VoIP and SMS?
What About VoIP and SMS?
Thank You!
Questions?
Greg . Foss [at] logrhythm . com
@heinzarelli
https://github.com/LogRhythm-Labs/PIE/

More Related Content

PDF
Phishing Intelligence Engine - BlueHat v17
PDF
Activated Charcoal - Making Sense of Endpoint Data
PDF
Security Automation and Orchestration
PDF
Anatomy of the Compromised Insider
PDF
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
PPTX
Open Source Malware Lab
PDF
Threat Intelligence Field of Dreams
PDF
The Non-Advanced Persistent Threat
Phishing Intelligence Engine - BlueHat v17
Activated Charcoal - Making Sense of Endpoint Data
Security Automation and Orchestration
Anatomy of the Compromised Insider
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Open Source Malware Lab
Threat Intelligence Field of Dreams
The Non-Advanced Persistent Threat

What's hot (20)

PDF
TA505: A Study of High End Big Game Hunting in 2020
PDF
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
PDF
The Anatomy of Comment Spam
PPTX
Cyber Resiliency
PDF
Top 5 Cloud Security Predictions for 2016
PPTX
Defcon 27 - Phishing in the Cloud Era
PPTX
Solnet dev secops meetup
PPTX
#ALSummit: Cyber Resiliency: Surviving the Breach
PPTX
Content Disarm Reconstruction and Cyber Kill Chain - Muhammad Sahputra
PDF
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
PPTX
Mastering Next Gen SIEM Use Cases (Part 3)
PPTX
Putting MITRE ATT&CK into Action with What You Have, Where You Are
PPTX
Kent King - PKI: Do You Know Your Exposure?
PPTX
Cloud security live hack - final meetup
PDF
Mobile App Security - Best Practices
PDF
Pactera - Cloud, Application, Cyber Security Trend 2016
PDF
The Cost of Doing Nothing: A Ransomware Backup Story
PDF
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
TA505: A Study of High End Big Game Hunting in 2020
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
The Anatomy of Comment Spam
Cyber Resiliency
Top 5 Cloud Security Predictions for 2016
Defcon 27 - Phishing in the Cloud Era
Solnet dev secops meetup
#ALSummit: Cyber Resiliency: Surviving the Breach
Content Disarm Reconstruction and Cyber Kill Chain - Muhammad Sahputra
BlueHat v18 || software supply chain attacks in 2018 - predictions vs reality
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Journey to the Cloud: Securing Your AWS Applications - April 2015
Mastering Next Gen SIEM Use Cases (Part 3)
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Kent King - PKI: Do You Know Your Exposure?
Cloud security live hack - final meetup
Mobile App Security - Best Practices
Pactera - Cloud, Application, Cyber Security Trend 2016
The Cost of Doing Nothing: A Ransomware Backup Story
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
Ad

Similar to PIE - BSides Vancouver 2018 (20)

PPTX
Presentation on Email phishing.pptx
PDF
Are There Any Domains Impersonating Your Company For Phishing?
PPT
Protecting Users from Fraud
PDF
90% of Data Breaches Start with Phishing—Here’s How to Protect Yourself.pdf
PDF
An Introduction to E-Mail Security and Fraud
PDF
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
PDF
AN INTELLECT LEARNING ON E-MAIL SECURITY AND FRAUD, SPAM AND PHISHING
PDF
An intellect learning on e mail
PDF
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
PDF
Security Breaches from Compromised User Logins
PDF
Phishing test
PDF
OWASP ATL - Social Engineering Technical Controls Presentation
PDF
PhishingBox Overview
PPTX
Phishing Attacks - Are You Ready to Respond?
PPT
Security
PDF
The life of breached data and the attack lifecycle
PDF
Protecting Your Business From Cybercrime
PPTX
Information Security Basics for Businesses and Individuals
PDF
Scalar Security Roadshow April 2015
PPTX
How to Keep Your Company Safe from Phishing.pptx
Presentation on Email phishing.pptx
Are There Any Domains Impersonating Your Company For Phishing?
Protecting Users from Fraud
90% of Data Breaches Start with Phishing—Here’s How to Protect Yourself.pdf
An Introduction to E-Mail Security and Fraud
Phishing 101: Part-2 Blog Welcome to this Phishing Blog Part2
AN INTELLECT LEARNING ON E-MAIL SECURITY AND FRAUD, SPAM AND PHISHING
An intellect learning on e mail
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Security Breaches from Compromised User Logins
Phishing test
OWASP ATL - Social Engineering Technical Controls Presentation
PhishingBox Overview
Phishing Attacks - Are You Ready to Respond?
Security
The life of breached data and the attack lifecycle
Protecting Your Business From Cybercrime
Information Security Basics for Businesses and Individuals
Scalar Security Roadshow April 2015
How to Keep Your Company Safe from Phishing.pptx
Ad

More from Greg Foss (11)

PPTX
Cloud Crime Ops
PPTX
Future of Destructive Malware
PDF
Crypto Hacks - Quit your Job and Become a Crypto Farmer
PDF
Deception Driven Defense - Infragard 2016
PDF
SecureSet WarGames - Logging and Packet Capture Training
PDF
DerbyCon 5 - Tactical Diversion-Driven Defense
PDF
Advanced Threats and Lateral Movement Detection
PDF
Honeypots for Active Defense
PDF
Wi-Fi Hotspot Attacks
PDF
CMS Hacking Tricks - DerbyCon 4 - 2014
PDF
Attacking Drupal
Cloud Crime Ops
Future of Destructive Malware
Crypto Hacks - Quit your Job and Become a Crypto Farmer
Deception Driven Defense - Infragard 2016
SecureSet WarGames - Logging and Packet Capture Training
DerbyCon 5 - Tactical Diversion-Driven Defense
Advanced Threats and Lateral Movement Detection
Honeypots for Active Defense
Wi-Fi Hotspot Attacks
CMS Hacking Tricks - DerbyCon 4 - 2014
Attacking Drupal

Recently uploaded (20)

PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
ai-archetype-understanding-the-personality-of-agentic-ai.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Web Security: Login Bypass, SQLi, CSRF & XSS.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
KodekX | Application Modernization Development
PDF
Modernizing your data center with Dell and AMD
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Dell Pro 14 Plus: Be better prepared for what’s coming
PDF
Smarter Business Operations Powered by IoT Remote Monitoring
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Top Generative AI Tools for Patent Drafting in 2025.pdf
PPTX
How to Build Crypto Derivative Exchanges from Scratch.pptx
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
PDF
How AI Agents Improve Data Accuracy and Consistency in Due Diligence.pdf
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
NewMind AI Monthly Chronicles - July 2025
ai-archetype-understanding-the-personality-of-agentic-ai.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Web Security: Login Bypass, SQLi, CSRF & XSS.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KodekX | Application Modernization Development
Modernizing your data center with Dell and AMD
GamePlan Trading System Review: Professional Trader's Honest Take
Dell Pro 14 Plus: Be better prepared for what’s coming
Smarter Business Operations Powered by IoT Remote Monitoring
Understanding_Digital_Forensics_Presentation.pptx
Top Generative AI Tools for Patent Drafting in 2025.pdf
How to Build Crypto Derivative Exchanges from Scratch.pptx
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
How AI Agents Improve Data Accuracy and Consistency in Due Diligence.pdf

PIE - BSides Vancouver 2018