owasp e crime-london-2012-final

18
Copyright © 2011 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation OWASP http://www.owasp.org Marco Morana Global Industry Committee OWASP Foundation Email: [email protected] Twitter: marcomorana E-Crime Congress Meeting 25th October 2012, London UK Adapting to evolving cyber attack scenarios: a focus on hacking and malware threats targeting financial applications

Upload: marco-morana

Post on 27-Jan-2015

108 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Owasp e crime-london-2012-final

Copyright © 2011 - The OWASP FoundationPermission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License.

The OWASP Foundation

OWASP

http://www.owasp.org

Marco Morana Global Industry CommitteeOWASP FoundationEmail: [email protected]: marcomorana

E-Crime Congress Meeting25th October 2012, London UK

Adapting to evolving cyber attack scenarios: a focus on hacking and malware threats targeting financial applications

Page 2: Owasp e crime-london-2012-final

OWASP 2

Page 3: Owasp e crime-london-2012-final

OWASP

Presentation Agenda

PART I: The evolution of the threat landscape for hacking and malware, the impact of data breaches

and online fraud

PART II: How to adapt application security measures, activities and security tools to protect

web applications from hacking and malware threats

PART III: What the future holds as the cyber threat landscape continues to change: processes, skills, tools

and techniques that can support enterprise security strategy

3

Page 4: Owasp e crime-london-2012-final

OWASP 4

PART IThe evolution of the threat landscape for

hacking and malware and the impact of data breaches and online fraud

“If you know your enemy and know yourself you need not fear the results of a hundred battles”

Sun Tzu

Page 5: Owasp e crime-london-2012-final

OWASP

Dissecting The Hacking and Malware Threats

5

Threat

Attacks

Weaknesses DDoS,

SQLi,Phishing,Session Hijacking,Key logging

Fraudsters, Cyber

criminals,Hackivists,

Cyber Spies,Script

Kiddies Social Engineering,Application

VulnerabilitiesGaps/

Weaknesses in security controls

Page 6: Owasp e crime-london-2012-final

OWASP

The Evolution of Cyber Threats

6Time

Th

reat

Sev

erit

y

20001995 2005 2010

Threats: Script Kiddies, Viruses, Worms

Motives: Notoriety and Fame, Profit from renting Botnet for spamming

Attacks: DoS, Buffer Overflow Exploits, Spamming, Sniffing Network Traffic, Phishing emails with viruses

Threats: Fraudsters, Malware, Trojans

Motives: Identity Theft, Online and Credit/Debit Card Fraud

Attacks: SQLi, Sniffing Wireless Traffic, Session Hijacking, Phishing, Vishing, Drive by Download

Threats: Hacktivists, Cyber crime, Cyber Espionage, Fraudsters, Malware

Motives: Political, Stealing Company Secrets and Clients Confidential and Credit Card Information for Fraud

Attacks: DDoS, Defacing, Account Take Over/Session Hijacking, SQLi, Spear Phishing, APT, RAT

2012

Threats: Basic Intrusions and Viruses

Motives: Testing and Probing Systems and Data Communications

Attacks: Exploiting Absence of Security Controls, Sniffing Data Traffic, Defacing

WHATNEXT ?

Page 7: Owasp e crime-london-2012-final

OWASP

Data Breach Incidents: 2011-2012 Statistics

7

1. Threats: Hacking and malware are the major causes 2. Attacks: SQLi and HTTP injection for uploading

scripts for remote server commands (also increased of 50% from 2010)

3. Likelihood: 90% of organizations had at least one data breach over the period of 12 months

4. Targets: 54% of incidents target web applications 5. Data Lost: Log in credentials, emails and personal

identifiable information are the major data types6. Business Impact: The average cost of data breach is

estimated as $ 222 per record 7. Incident Response: Majority of incidents is

discovered after weeks/months from the time of initial data compromise

Sources: OSF, DataLossDb.org http://www.datalossdb.orgPonemon Institute and Juniper Research, June 2011 Perceptions about network security, Ponemon Institute and Symantec, Research March 2012 2011 Cost of a Data Breach: United

StatesVerizon’s Investigative data Breach Report 2012 Verizon Investigative data breach report,

Page 8: Owasp e crime-london-2012-final

OWASP

Man in the Browser Attacks

8

Page 9: Owasp e crime-london-2012-final

OWASP

Examples of Malware & Hacking Attacks Used for Online And Credit/Debit Card Fraud

9

Account takeover: hijack web session to take over the victim’ s bank account and conduct unauthorized transfer of money from the victim account to a bank account outside the bank

Money laundering: transferring money from illegal proceeds (e.g. sale of drugs) into hacked banking accounts

Application fraud: using stolen credit card and bank account information for opening bank accounts to steal information from the victim and to make payments

Card non present fraud: conducting online purchases with stolen credit card and cardholder data

Card counterfeiting: use of credit and debit card data stolen online to counterfeit card and conduct fraud with ATM/ABM, POS channels

Carding: validation of stolen or purchased debit/credit card data such as CCN, PINs, DOBs, ACC# by using online web forms

Identity theft theft of personal data by phishing/social engineering the victim, using malware (e.g. MitB, keyloggers) as well as by log in into the victim’s online banking account

Page 10: Owasp e crime-london-2012-final

OWASP

TodayYesterday

New Technologies Challenge Security And Creates Opportunities for New Attack Vectors

10

Page 11: Owasp e crime-london-2012-final

OWASP 11

PART IIHow to adapt application security measures,

activities and security tools to protect web applications from hacking and malware threats

“To improve is to change; to be perfect is to

change often”Winston Churchill

Page 12: Owasp e crime-london-2012-final

OWASP

Identification and Risk Mitigation of Web Application Vulnerabilities

1212

AutomatedVulnerabilityScanning

AutomatedStatic Code

Analysis

ManualPenetrationTesting

ManualCode

Review

Page 13: Owasp e crime-london-2012-final

OWASP

Mitigating Hacking and Malware Attacks Against Financial Web Applications

Client PC and browser based security measures: Awareness of social engineering: alerts and pointed

information for customers on phishing and malware threats Secure Browser and PC: keep O.S. and browsers up to

date, anti-malware, PC used for online banking with no email, facebook

Web application security measures: Fixing web application vulnerabilities: SQL injection,

XSS, invalidated redirection, remote command invocations, session management and the rest of OWASP TOP ten vulnerabilities

Validating security of transactions/payments: positive pay, dual verification & authorizations, anomaly and fraud detection

Out of band transaction validation/authentication: two way notification confirmation via independent mobile/voice channels

Prevention and detection measures: strong multi-factor authentication, malicious data filtering/white-listing malicious, web traffic monitoring with WAF and SIEM, behavioral fraud detection

13

Page 14: Owasp e crime-london-2012-final

OWASP 14

PART III: What the future holds as the cyber threat

landscape continues to change: skills, tools and techniques that can support enterprise security

strategy“I do not feel obliged to believe that the same

God who has endowed us with sense, reason, and intellect has intended us to forgo their use.”

Galileo Galilei

Page 15: Owasp e crime-london-2012-final

OWASP 15

Adapting Application Security Strategy To Hacking and Malware Threats

People trained/hired to conduct threat modeling, design secure applications, build secure software and conduct security testing

Processes for gather threat intelligence analyze threats and vulnerabilities. Risk frameworks for identifying gaps and countermeasures that mitigate malware and hacking risks

Technologies that are effective in protecting and detecting malware attacks, including security tools for testing applications for new vulnerabilities

Page 16: Owasp e crime-london-2012-final

OWASP 16

Application Security Plan For Protecting Applications from Malware and Hacking

Move on from tactical processes:Response to Incidents, Catch and Patch for Vulnerabilities

To strategic security activities:Secure Software Assurance, Governance, Compliance & Risk Management

Page 17: Owasp e crime-london-2012-final

OWASP 17

Q&Q U E S T I O N SA N S W E R S

Page 18: Owasp e crime-london-2012-final

OWASP

OWASP References

Top Ten Vulnerabilities http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%

202010.pdf

Testing Guide https://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf

Development Guide https://www.owasp.org/index.php/OWASP_Guide_Project

Application Threat Modeling http://www.owasp.org/index.php/Application_Threat_Modeling

Open Software Assurance Maturity Model (SAMM) http://www.opensamm.org/

Enterprise Security API for JAVA http://code.google.com/p/owasp-esapi-java/

Cheat Sheets https://www.owasp.org/index.php/Cheat_Sheets

OWASP Live CD and Web Application Security http://appseclive.org/

Application Security Guide for CISO (in progress) https://www.owasp.org/index.php/Application_Security_Guide_For_CISOs

18