the anatomy of a data breach - security interest group …€¦ · the anatomy of a data breach...
TRANSCRIPT
Facts SKyPRO AG
• SKyPRO– founded April 1987– CHF 350‘000 AK– 50 employees– Headquarter in Cham– Development Office in the Ukraine– Sales Office in USA– CHF 7 Mio. Turnover
• we do– Identity & Access Governance (IAG) solution in Bank, Insurance, Industry,
Government, Schools and Service Companies– Conulting, Conception, Implementation and Operation of IAG and security
solutions– 30 years of experience as IT service company and over 15 years in IAG– SailPoint Partner
Facts SKyPRO AG
USASales Office
SwitzerlandHeadquarter
UkraineDevelopment
Switzerland• IAG Services• Consulting• Conception• Implementation• Operation & Support
USA• Distribution IAG Products
Ukraine• Development Office• Support Center• 7x24h Hotline• Marketing
Learn from the past
What can we learn from the past
6
FORENSICS AND POST BREACH ANALYSIS SHOWS• Identity is a common weakness• Entitlement and access is the attack target
FORENSICS AND POST BREACH ANALYSIS SHOWS• Identity is a common weakness• Entitlement and access is the attack target• Files are responsible for 60% of breaches• …..and are the most difficult to detect
SECURITY ERRORS AND WEAKNESSES ARE SPREAD OUT OVER A “CYBER KILL CHAIN”
• Poor account controls• Weak passwords• Orphan accounts• Weak inventory and cataloging• Over assignment of user access• Unstructured Data Insanity
The Cyber Kill Chain
INTRODUCED BY LOCKHEED MARTIN ‘99• Anatomy of a typical cyber breac• Plots the path of an attack• Reference model for cyber defense
PHASES OF ATTACK• Reconnaissance• Weaponization• Delivery• Infiltration
8
The Anatomy of a Data Breach
12
THE VICTIM• A market leading manufacturing company with strong IP• Big B2B and B2C presence on-line
The Players
THE ATTACKER• A known organized crime syndicate in China• Money, time and resources
The Anatomy of a Data Breach
13
Timeline
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
The Anatomy of a Data Breach
14
Reconnaissance
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
External web and network scanning. Fuzz all externally facing resources…
The Anatomy of a Data Breach
15
Reconnaissance
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
External web and network scanning. Fuzz all externally facing resources…
Research on executives, employees, contractors and suppliers.
The Anatomy of a Data Breach
16
Reconnaissance
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
External web and network scanning. Fuzz all externally facing resources…
Research on executives, employees, contractors and suppliers.
Blanket phishing attempts and targeted reconnaissance.
The Anatomy of a Data Breach
17
Infiltration
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
Spear phished an executive. Drive-by download executed. Local admin exploit.
The Anatomy of a Data Breach
18
Infiltration
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
Lateral movement to several windows servers in test with default accounts & passwords
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
Spear phished an executive. Drive-by download executed. Local admin exploit.
The Anatomy of a Data Breach
19
Infiltration
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
Lateral movement to several windows servers in test with default accounts & passwords
Extensive inventory & scanning. Attack on the PAM tool resulting in escalation of privileges
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
Spear phished an executive. Drive-by download executed. Local admin exploit.
The Anatomy of a Data Breach
20
Exploitation
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
Brute force password attacks on AD domain,
local apps and SaaS services.
Found password xls files and powershell scripts with
domain admin credentials
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
The Anatomy of a Data Breach
21
Exploitation
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
Brute force password attacks on AD domain,
local apps and SaaS services.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
Scraped company SharePoint portal. Fake account to request &
receive access to Salesforce.
The Anatomy of a Data Breach
22
Exploitation
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
Brute force password attacks on AD domain,
local apps and SaaS services.
APP & DB access to main LOB system.Escalated AD group access.
Created domain admin account.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
Scraped company SharePoint portal. Fake account to request &
receive access to Salesfoce.
The Anatomy of a Data Breach
23
Exfiltration
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
Downloaded password hashes/database for several internal systems
Pulled down terrabytes of damaging files found in file shares and the internal SharePoint sites.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
The Anatomy of a Data Breach
24
Exfiltration
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
Downloaded password hashes/database for several internal systems.
Pulled customer and sales data from Salesforce and stole product plans from the IP DB.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
The Anatomy of a Data Breach
25
Exfiltration
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
Downloaded password hashes/database for several internal systems.
Pulled customer and sales data from Salesforce and stole product plans from the IP DB.
Pulled every file from the file shares including financials, client and employee data.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
The Anatomy of a Data Breach
Damage Assessment
26
• COMPANY FINANCIALS EXPOSED
• EMPLOYEE DATA SOLD ON THE DARK WEB
• COMPANY IN CHINA OPENS SELLING A DUPLICATE PRODUCT
• REPUTATIONAL DAMAGE
• LOSS OF PARTNERS AND CUSTOMERS
• EMPLOYEE DISSATISFACTION
• RESIGNATION OF THE CISO
IAG Protection & Detection
29
INVENTORY & VISIBILITY
STRONGAUTHENTICATION
PASSWORD CONTROLS
LIFECYCLE MANAGEMENT
PAM GOVERNANCE
REQUEST CONTROLS
DATA ACCESS GOVERNANCE
INTEGRATED IAM AWARE SECURITY
IAG Protection & Detection
The Anatomy of a Data Breach - Timeline
30
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
IAG Protection & Detection
Visibility & Inventory
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
VISIBILITY & INVENTORYDefault accounts and passwords.Orphan account management.Automated recertification.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
31
IAG Protection & Detection
Strong Authentication
32
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
STRONG AUTHENTICATIONMulti-factor.Step-up.Context & behavior.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
IAG Protection & Detection
Password Management
33
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
PASSWORD MANAGEMENTStrong password policies.Lifecycle enforcement.Change detection & alerting.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
IAG Protection & Detection
Lifecycle Management
34
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
LIFECYCLE MANAGEMENTKnown JML state transitions.Embedded data triggers.Detective controls & policy checks.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
IAG Protection & Detection
PAM Governance
35
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
PAM GOVERNANCEInventory & modeling for PAM.Visibility & certification.Detective & preventive controls.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
IAG Protection & Detection
Access Request Management
36
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
ACCESS REQUEST MANAGEMENTApprovals & audit. Preventive policy evaluation.Access risk modeling.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
IAG Protection & Detection
Data Access Governance
37
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
DATA ACCESS GOVERNANCEEffective access modeling.Classification & categorization.File access alerts.
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
IAG Protection & Detection
Integrated Identity Aware Security
38
JAN2014
APRIL2015
DEC2015
JAN2016
AUG2015
RECONNAISSANCE INFILTRATION EXPLOITATION EXFILTRATION
INTEGRATED IDENTITY AWARE SECURITYIAM & security as one integrated strategy.Shared IAM context.Integrated IAM response actions.
IAG Protection & Detection
39
INVENTORY & VISIBILITY
STRONGAUTHENTICATION
PASSWORD CONTROLS
LIFECYCLE MANAGEMENT
PAM GOVERNANCE
REQUEST CONTROLS
DATA ACCESS GOVERNANCE
INTEGRATED IAM AWARE SECURITY
IAG Protection & Detection
40
INVENTORY & VISIBILITY
STRONGAUTHENTICATION
PASSWORD CONTROLS
LIFECYCLE MANAGEMENT
PAM GOVERNANCE
REQUEST CONTROLS
DATA ACCESS GOVERNANCE
INTEGRATED IAM AWARE SECURITY
IAM SENSORS
IAG Sensors
Detecting Attacks
42
ACCOUNT “HONEY POTS”• Fake accounts with login alerts• Deliberately weak passwords• Automatically created and managed• Spread out over apps and infrastructure
!
FILE & FOLDER “TRIP WIRES”• Fake files and folders• Appealing names and content• Pre-set file access alerts• Spread out over cloud and on-premises file shares
!
Unpublished Work of SKyPRO, All Rights Reserved.This work is an unpublished work and contains confidential, proprietary, and trade secret information of SKyPRO. Access to this work is restricted to SKyPRO employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of SKyPRO. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General DisclaimerThis document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. SKyPROmakes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features orfunctionality described for SKyPRO products remains at the sole discretion of SKyPRO. Further, SKyPRO reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All SKyPRO marks referenced in this presentation are trademarks or registered trademarks of SKyPRO in Switzerland and other countries. All third-party trademarks are the property of their respective owners.