first2017 - bocek - going undetected€¦ · ©2016 venafi . confidential – do not distribute. 44...

57

Upload: others

Post on 16-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 2: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

GOINGUNDETECTED:

HOWCYBERCRIMINALS,HACKTIVISTS,AND

NATIONSTATESMISUSEDIGITALCERTIFICATES

KevinBocek

Page 3: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

The Future: Machines

Page 4: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

The future is machinesAdversaries exploiting machine identitiesGood news: guidance exists• Reduce risk• Build in agility • Respond faster

Page 5: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

WhatAreMachines?

Device Code ServiceAlgorithm

v=argmaxb�{Yes,No}Pr(b)Qi Pr(ai |b)

Page 6: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

0.0

10.0

20.0

30.0

40.0

50.0

2005 2010 2015 2020 20250.0

50.0

100.0

150.0

200.0

250.0

300.0

2005 2010 2015 2020 2025

SOFTWARE AND DEVICES EXPLODING(EST. IN BILLIONS)

DEVICES

PEOPLE

SOFTWARE

Page 7: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

An entity without an identity cannot exist because it would be nothing

AristotleLaw of IdentityMetaphysics, Book IV, Part 4

Page 8: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Machine Identities

Page 9: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

HUMANSUser name, Password, Biometric

MACHINES

1 0 1 00 1 0 10 1 0 1

Page 10: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

WhatareMachineIdentities?

SSL/TLSCertificates

CodeSigningCertificates

SSHKeys APIKeys

TwL2iGABf9DHoTf09kqeF8tAmbihY

EncryptedTunnel

Authentication Execution

Page 11: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 12: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 13: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 14: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Role&LifecycleLeavesIdentitiesVulnerable

Inception Manufacture Distribution Activation Update Recycle

SSHkeyforcloud-to-cloud DevOpsorchestration

CodesigningcertificatetoauthenticatecoderunningonIoT device

TLScertificatetoauthenticatecloudapptoIoT devices

Page 15: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

MisuseofMachineIdentities

TAKEONTRUSTEDIDENTITY

PhishingeffectivenessMaliciouscodeexecution

ESTABLISHTRUSTEDIDENTITY

CreatebackdoorsBuildprivilege

RUNWITHOUTIDENTITY

Hide,stealth,cloak

Page 16: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Problem: Machine Identities?

Page 17: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 18: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 19: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Would your organization tolerate

with no awareness, policies, or control?

Page 20: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Would your organization tolerate

with no awareness, policies, or control?keys & certificates

Page 21: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Heartbleed:T+1Year

RED=%NOTHEARTBLEEDREMEDIATED

Page 22: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Take On Trusted Identity

Page 23: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 24: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 25: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 26: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Rise of Fast & Free25M certificates

Page 27: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 28: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 29: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 30: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 31: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 32: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

“Stealing Certificates will be the Next Big Market for Hackers”

Page 33: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Up to $980/ea400x more valuable than stolen credit card or identity #

Page 34: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Establishing a trusted identity

Page 35: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 36: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 37: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Misuse Goes Kinetic

Every business and government has the same lack of awareness and control over SSH keys

Page 38: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Run Without An Identity

Page 39: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

SSL/TLSEncryptedTunnel

Page 40: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

“70% OF MALWARE ATTACKS WILL USE SSL BY 2020”

Page 41: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

LESS THAN 20%Of Organizations

with a FW, IPS/IDS, or UTM decrypt

SSL/TLS traffic

Page 42: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 43: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

BLINDTOATTACKOneUnknownCertificate

=Encryptedtunnel

=Can’tseewhat’scoming

Page 44: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

44©2016 Venafi. Confidential – do not distribute.

Weaponizing Machine Identities

• SSH & server key theft

• Code-signing certificate theft

• MITM by CA compromise

• Targeted key & certificate theft

• Sold on Underground

• Multi-year campaigns

• SSL & SSH vulnerabilities

• Price increases on underground

• Digitally-signed malware doubles quarterly

• SSL/TLS used to hide activity

• MitM attacks

• SSH pivoting

• SSL/TLS used to bypass security

• Encrypt Everywhere grows attack surface

• SHA-1 deprecation• SHA-1 collision

succesful

ThreatscapeExpands

• 2010: Blueprint -Stuxnet and Duqu

• 2011: CAs Attacked

• 2012: Online Trust Questioned by Experts

2010-2012 Attacks Become Mainstream

2013 Advanced Campaigns

Launch

2014 Online Trust Crumbles

2015

2016-2017

Attacks Begin

Page 45: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Preparing Your Plans

Page 46: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Crypto-Agility

Page 47: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Crypto-agility

Page 48: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

CA Recovery Plan

Page 49: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Find What’s Out There

Automate Response

Set, Enforce a Policy

Good News: this can be business as usual process

Page 50: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Venafi Maturity Roadmap for TLS/SSLRoadmap: Control of Machine Identities

Level0:

ChaosHaveunquantifiedsecurityrisk,outages,expensiveand

manualprocesses,andcompliancechallenges

Level1:

ControlBuildasecurity

foundationwithfocusonknownandtrustedkeysandcertificates

Level2:CriticalSystems

Secureandprotectallkeysandcertificateson

business-criticalinfrastructure

Level3:EnterpriseProtection

Protectandautomateallkeysandcertificates

enterprise-wideandfurtherreducecostsandextractmorebusinessvalue

Level4:MachineIdentity

ProtectionRapidlyrespondtointernalandexternalthreatsandsecurity

incidentsrelatedtokeysandcertificates

Endpoint/MobileServersVirtual MachinesCloud

Page 51: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

StartChange

Page 52: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

GOINGUNDETECTED:

HOWCYBERCRIMINALS,HACKTIVISTS,ANDNATIONSTATES

MISUSEDIGITALCERTIFICATES

KevinBocek

Page 53: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 54: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Threats of the Future

Page 55: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &
Page 56: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

Taking Action

Page 57: FIRST2017 - Bocek - Going Undetected€¦ · ©2016 Venafi . Confidential – do not distribute. 44 Weaponizing Machine Identities ... 44 Weaponizing Machine Identities • SSH &

57©2016Venafi.Confidential– donotdistribute.

• SSL/TLSEncryption

• WiFi &VPNAccess

• Cloud

• DevOps

• Mobility

• InternetofThings

• SSHPrivilegedAccess

KeysandCertificatesAretheFoundationof

YourSecurityInfrastructure