attacks from the inside - virus bulletin · the security benefits of cloud computing: • the...

40
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman

Upload: others

Post on 27-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Attacks from the Inside

Eddy Willems, G Data

Righard J. Zwienenberg, Norman

Page 2: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Attacks from the Inside.

Agenda

- Social Networking / Engineering

- Where are the threats coming from- Where are the threats coming from

- Infection vectors

- The Cloud

- Q&A

Page 3: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

New territories:

Social Networking

� Blogs, forums

� Wiki

� MySpace, YouTube

� Other online communities:

Who’s on Facebook, Twitter?

Page 4: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Social networking and privacy

concerns.

Page 5: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

And how it is to be fooled

Page 6: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

The EnterpriseWeb Server

ApplicationServer

Databases

BackendServer/System

The Internet

DoS

Anti-spoofing Web Server

knowvulner-abilities

Cross Site Scripting

Parameter Tampering

Access ControlAnd Firewall IDS/IPS

ApplicationFirewall

The Threats only originatedfrom outside?

• Host protection(server and desktop)

• Layer 4 – 7 protection(content, URL, Web)

• Content Control• Data Leakage management

The Internet

• Anomaly detection• Intrusion prevention• Vulnerability management• Remediation/Patching• Compliance and risk management

• User Identification• Access Control• Encrypted transport of data• Firewall• Universal threat management

Port Scanning

Pattern-BasedAttacks

SQL Injection

Cookie Poisoning

Source:IBM

Page 7: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Today’s Networks Lack Clear, Crisp Boundaries.

ContractorsContractorsContractorsContractors

TelecommutersTelecommutersTelecommutersTelecommuters

• Internal/External network• Individual Users connect from multiple

locations• Managed/Unmanaged devices• Individual devices operate both inside

the network, and on public networks

Internet

ContractorsContractorsContractorsContractors

Mobile Mobile Mobile Mobile

UsersUsersUsersUsers

Network

WirelessWirelessWirelessWireless

UsersUsersUsersUsers

the network, and on public networks• New Devices on the Network eg.

Netbooks, Mobile devices, etc

Page 8: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Today's networks

Page 9: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Department

Infection scenario – Start

Data centreContent

Security

Firewall

Internet

Switch

Page 10: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Department

Infected web site “Drive-by infection” Infected web-site

• Contains malicious script –Day Zero.

• Infects files on disk• Spreads through ARP

Infection scenario –“drive by infection”

Data centre

Internet

Content

Security

Firewall Switch

Page 11: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Department

Infected web site “Infection Payload”- Downloader- Downloads new

Malware- Spreads

Malicous web site

Infection scenario II –“Payload”

Data centre

Internet

Content

Security

Firewall Switch

Page 12: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Malware spread vector: widely used ports

Most used spreading protocols

CIFS/SMB RPC

Page 13: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Why are CIFS and SMB important?

Malware spread vector : widely used ports

CIFS/SMBRPC

Page 14: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Avoid infections

– User training (MSN, unknown pop-up’s, e-mail, etc. )

– Patch management– (Hardware) Remediation– Anti-virus management– Anti-virus management

• Activated, according to policies• Up-to-date definition files• Discovery of unknown nodes in the network• Alerts

– In-line Network traffic content scanning

Page 15: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Network transparent real-time malware-scanner

In-Line Network Content Scanner

Scans HTTP, FTP, SMTP, TFTP, RPC, POP3, IRC, SMB/CIFS

No IPNo IP

Admin IP

Page 16: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Content scanning:where to install?

LegacyNetworks?SCADA

Environments?

Page 17: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Changing Solutions ?

Bad Stuff

VirusesWorms

Adware

Spyware

Spam

PeerToPeerattacks

Data Theft

ExternalHackerInternal

Exploits

User Phishing

Spam

DoS

Identity Theft

DDoS Mailers

HackerInternalHacker

Vulnerabilities

Page 18: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

In the Cloud

Difficult to “lay down” a definition as it depends on the use

“Cloud Computing is an on-demand service model of IT provision often based on virtualization and distributed computing technologies. It’s divided up in several categories.”

Working definition from Enisa

Page 19: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

In the Cloud: SaaS

Software as a Service:

• SaaS is software offered by a third-party provider, available on demand, usually via the Internet and available on demand, usually via the Internet and remotely configurable.

• Examples include online word processing and spreadsheet tools, CRM services and web content delivery services (Google Docs, etc.).

Page 20: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

In the Cloud: PaaS

• Platform as a Service

• PaaS allows customers to develop new applications using APIs deployed and configurable remotely. The using APIs deployed and configurable remotely. The platforms offered include development tools, configuration management and deployment platforms.

• Examples are Microsoft Azure or the Google App engine

Page 21: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

In the Cloud: IaaS

• Infrastructure as a Service

• IaaS provides virtual machines and other abstracted hardware and operating systems which may be hardware and operating systems which may be controlled through a service API.

• Examples are Terremark Enterprise Cloud, Windows Live Skydrive, etc …

Page 22: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Malware Information Initiative (Mii)In the Cloud technology

1000000

1200000

1400000

1600000

1800000

Incidents

File Incidents

0

200000

400000

600000

800000

1000000

January February March April May June July August

File Incidents

Url Incidents

Machines

Files Machines

Urls Machines

2010

Page 23: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

The security benefits of cloud computing:

• The benefits of scale and rapid smart scaling of resources• Standardized interfaces for managed security services• Audit and evidence gathering• More timely, effective and efficient updates and defaults.

We love cloud computing

Questions:Questions:

What about the in-the-cloud

infrastucture ? DDOS?

Could it be circumvented?

How will the user react?

How will the vendor react?

Page 24: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Top 9 “In-The-Cloud”Problems

#9 Identity management

Page 25: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Top 9 “In-The-Cloud”Problems

#8 Nefarious use of Service

Page 26: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Top 9 “In-The-Cloud”Problems

#7 Account/Service Hijacking

Page 27: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Top 9 “In-The-Cloud”Problems

#6 Financial DDOS

Page 28: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Top 9 “In-The-Cloud”Problems

#5 Data Loss/Data Leakage

Page 29: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

#4 Unknown Risk Profile

Top 9 “In-The-Cloud”Problems

Page 30: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

#3 Hidden Logs/Intrusion Attempts

Top 9 “In-The-Cloud”Problems

Page 31: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

#2 Insider abuse

Top 9 “In-The-Cloud”Problems

Page 32: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

#1 Centralized AAA Abuse/Trust (Authentication,Authorization en Accounting)

Top 9 “In-The-Cloud”Problems

Now you see why we love the cloud ...

Page 33: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Clouds

Page 34: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

• AM security model

• Detection rates

• Response to new threats

Frequency of updates

The big change?

Security has changed!!!

• Frequency of updates

• The new security model

• It’s not what your AM knows about

• But what’s allowed to run on your computer

• But what’s allowed to run on your network

Page 35: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for
Page 36: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Viruses on your RADIO?

Page 37: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Viruses on your refrigerator?

Page 38: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Oh no … Crossover viruses!

Page 39: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Nanobots

In his story “A Menace in Miniature” (1937),

Science Fiction ideas that came true (sort of)

Miniature” (1937), Raymond Z. Gallunimagined sinister “ultra-microbots”.

Page 40: Attacks from the Inside - Virus Bulletin · The security benefits of cloud computing: • The benefits of scale and rapid smart scaling of resources • Standardized interfaces for

Eddy WillemsSecurity Evangelist

[email protected]

Righard J. ZwienenbergChief Research Officer

[email protected]