Shut the Front Door and the Back Door Too!
Transcription
Shut the Front Door and the Back Door Too!
Shut the Front Door and the Back Door Too! (How and Why Hackers Attack and What to Do About It) Jim Nitterauer Senior Systems Administrator A Little About Me • Senior Systems Administrator at AppRiver, LLC since 2006 • Is Responsible for global network deployment & security in 10 datacenters • Manages SecureTide global infrastructure • Filtering for more than 850,000 mailboxes • 600 plus servers • Manages SecureSurf global DNS infrastructure • Anycast DNS Security • 100 Plus servers • Founded Creative Data Concepts Limited, Inc. in 1994 • Founded GridSouth Networks, LLC in 2006 • President of Gulf Breeze Area Chamber of Commerce 2003 & 2004 • B.S Biology 1985 Ursinus College • M.S. Microbiology 1989 University of Alabama • Regular Black Hat and DEFCON attendee • Completed Sans 560 – Network Penetration Testing and Ethical Hacking Talk Overview • Review key security (data) breaches and network attacks that have occurred over the past 12 months (What Do Hackers Do?) • Discuss the major motivations driving these attacks (Why Do Malicious Hackers Hack?) • Outline the most common attack vectors in use (How Do Malicious Hackers Hack?) • What is FUD? • Learn how to uncover, mitigate and prevent common attacks (What Do I Do When Hackers Hack?) Recent Data Breach Summary • Timeline September 2013 – August 2014 – Total Reported Breaches – 259 – Total Identities Exposed – 598 million • Top Causes of Data Breaches – – – – Malicious Hackers – 53% Accidentally Made Public – 21% Theft or Loss of Computer or Drive – 20% Inside Theft – 6% Symantec Intelligence Report – August, 2014 Recent Data Breach Summary Symantec Intelligence Report – August, 2014 Recent Data Breach Timeline • Timeline September 2013 – August 2014 Symantec Intelligence Report – August, 2014 Recent Data Breach Top Ten Symantec Intelligence Report – August, 2014 Recent Data Breaches in the News http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Recent Data Breaches in the News • EBay – Hackers obtain a small number of employee login credentials – Use that info to access database containing user records in late February and early March – Data copied and posted for sale • Home Depot – Malware installed on POS systems across 2,200 stores – Syphoned credit card details of up to 56 million customers – May be same Russian group that hit Target, Sally Beauty, P.F. Chang’s, Neiman Marcus and Michael’s Recent Data Breached in the News • Adventura Hospital (Florida) – 82,000 patients impacted by third data breach in two years – Latest began just one day after previous breach had ended and lasted two years • JPMorgan Chase & Company – Break-in acknowledged 9/20/2014 – Details not provided – No fraudulent use of compromised data detected • Apple iCloud – Celebrity accounts hacked due to a flaw in iCloud Web API – Compromising photos copied and made available publically Recent Network Attacks • Destiny and Call of Duty Servers – Used by PlayStation and Xbox – Hit with DDoS attack by Lizard Squad • Silk Road 2.0 – Hit by sophisticated DDoS Attack – 9/20/2014 – Last February lost $2.6 million in bitcoin due to attack • Codespaces – June 2014 - Amazon cloud account hacked – All virtual servers and backups deleted – Business closed on the day of the attack • Spamhaus – Hit with 300 Gbps DNS amplification attack The Face of Cybercrime Today “The Web has become the new threat vector of choice by hackers and cyber criminals to distribute malware and perpetrate identity theft, financial fraud and corporate espionage.” -- IDC Malware • What is Malware? – Software or code that is executed on a computer without the knowledge or consent of the operator – Designed to • Assess and exploit security vulnerabilities in systems • Provide remote command and control access to unauthorized parties (botnet participation) • Distribute confidential or personal information to unauthorized parties – Distributed by multiple vectors – May permanently damage data • Ex. Ransomware Malware Top Ten - Windows Symantec Intelligence Report – August, 2014 Malware Top Ten - Mac Symantec Intelligence Report – August, 2014 Malware – Ransomware Trends Symantec Intelligence Report – August, 2014 Malware – Activity by Source (Bots) Symantec Intelligence Report – August, 2014 Vulnerabilities • What are Vulnerabilities? – Any design or coding flaw that exposes data or systems to potential exploitation or results in unexpected behavior or performance – Also called an attack surface – Requires three elements for exploitation • A susceptible system • Attacker access to the flaw • Attacker capable of exploiting the flaw – Not all vulnerabilities pose same level of risk – A “Zero Day” vulnerability usually refers to a software flaw that is exposed and exploited before the vendor is aware of the issue and can release a fix Vulnerabilities – Zero Day • Most Recent Zero Day Exploits – Bash shell environment variable manipulation (Shellshock) – Open SSL Heartbleed private SSL certificate disclosure (Memory scraping) – Microsoft Internet Explorer Use-after Free flash exploit • Excellent Resource – http://blog.beyondtrust.com/zd_threat Vulnerability Disclosure Timeline Symantec Intelligence Report – August, 2014 Vulnerabilities – Zero Day Symantec Intelligence Report – August, 2014 Vulnerabilities - Browser Symantec Intelligence Report – August, 2014 Vulnerabilities – Plug-in Symantec Intelligence Report – August, 2014 Mobile Threats • Mobile Threats – Place personal mobile devices at risk by • • • • • • • Tracking user activity Stealing personal information Creating backdoors Reconfiguring device Displaying annoyances Redirecting content Spamming – Many mobile devices are connected to corporate resources including email services Mobile Threat Classifications Symantec Intelligence Report – August, 2014 Social Media • Social Media (Twitter, Facebook, etc.) – – – – – – Fake offerings Manual Sharing Life jacking Comment Jacking Fake Apps Misleading news stories or links • Ultimately leads to attempted malware infection or attempt to steal credentials Social Media Symantec Intelligence Report – August, 2014 Email – Phishing, SPAM and Viruses • Email trends – Phishing rate down in August from 1 in 1290 to 1 in 1587 email messages – Global SPAM rate for August was 62.6 percent meaning 62 out of 100 messages were SPAM • AppRiver’s SecureTide customers see SPAM rates closer to 87.7% • More U.S. based customers – more valuable targets – One out of every 270 contained a virus – 3.2% of all email contained a malicious URL • AppRiver’s customer base sees a higher percentage of emails with malicious URLs • More U.S. based customers – more valuable targets Email – Phishing Rates Symantec Intelligence Report – August, 2014 Email – Global SPAM Rates Symantec Intelligence Report – August, 2014 Email – Viruses Per Message Symantec Intelligence Report – August, 2014 Email – Viruses Per Message • What does antivirus software protect against? – On average, less than 1% of all threats are due to virus infiltration Email – Messages w/ Malware URL Symantec Intelligence Report – August, 2014 Malicious Hackers • What they are NOT . . . – Some teenager hacking a Web site for bragging rights – A Script Kiddie – White Hat vs. Black Hat Malicious Hackers • What they ARE . . . – Well-trained experts with a plethora of tools at their disposal – Sell themselves to the highest bidder – Work for or are part of sophisticated criminal enterprises – Members of global activist networks • • • • Anonymous Syrian Electronic Army LulzSec Others Malicious Hacker Motivations • Making social statements – Hacktivism – Bring down specific targets based upon political views • Theft – Stealing data that can be resold for profit • Personal info – Credit Cards – SSNs – Medical Records • Corporate info – Financial info – Trade Secrets – Espionage Malicious Hackers Target • Three Basic Targets – Revenue • • • • What can they steal that can be sold? Steal items that have cash value (Bank transfers, Bitcoin) Access bank accounts Steal intellectual property – Reputation • Defile your Web site and other public resources • Smear you reputation • Degrade service – Upset customers – Break SLAs – Result in revenue loss Malicious Hackers Target – Resources • Own your network, servers and workstations – Continuous data gathering – Access higher level computing resources and data • Use these resources to attack others – Botnet participation – Anonymous proxy Malicious Hackers • Use a combination of attack vectors – Often the most visible attack is NOT the real attack • DDoS to create panic • Physical compromise occurs during chaos – Vectors include • Physical attacks • Social engineering • Network attacks (local and hosted resources) – Wired – Wireless Common Attack Mechanisms • Overall Process – Seven stages • • • • • • • Recon Lure Redirect Exploit Place malicious code Call home Data Theft Common Attack Mechanisms – Process much like a structured penetration test except that hackers • • • • Are not limited by budget Are not limited by “Rules of Engagement” Are not motivated to play by the rules Are not easily caught and prosecuted Web Sense - The Seven Stages of Advanced Threats and Data Theft - 2012 Common Attack Mechanisms • Information gathering – Publically available info • • • • • • • • • Web sites (Maltego) Google, Bing, etc. (Search Diggity Suite) Facebook, Twitter, Instagram, LinkedIn Dumpster diving Web file (document) metadata (ExifTool, FOCA, others) Internet Registries (ARIN, Network Solutions, GoDaddy, etc.) DNS Tools (DNSstuff.com, dnstools.com, dig) Job Postings Links (BiLE – BiLateral Link Extractor) Common Attack Mechanisms • Information gathering (continued) – Social Engineering • • • • Phishing Phone scams Social media profile impersonation Physical entry (break-in or tailgating) – Wireless network exploitation • • • • Man in the middle attack Open or WEP Protected Wi-Fi connected to corporate LAN Wireless Redirection attack Bluetooth or RFID scanning Common Attack Mechanisms • Information gathering (continued) – Public network analysis • • • • • • • Network scanning (nmap, Zenmap, masscan) Packet sniffing (Wireshark, TCPdump) Vulnerability scans (Nessus, Qualis) Web site exploitation (BeEF, metasploit) DNS poisoning DNS zone transfers Google Dorks (http://www.exploit-db.com/google-dorks/) – Rouge device placement • Compromised USB keys (ex. USB Rubber Ducky) • Rogue Wi-Fi sniffer (ex. Wi-Fi Pineapple) • Raspberry Pi device Common Attack Mechanisms • Exploitation Attacks – DDoS (Distributed Denial of Service) • • • • • SYN floods NTP Amplification DNS Amplification UDP floods Pings floods – SQL Injection • Attacks Web site to reveal back-end database info – Structure – Actual data • Can lead to Web site defacement or data poisoning Common Attack Mechanisms • Exploitation Attacks (continued) – Brute Force password cracking • Somewhat limited but can still be done – Remote key logging – Cross Site Scripting • Hijack user browser sessions • Gather credentials or hack accounts – BGP Hijacking • ISP starts announcing BGP routes for IP blocks they do NOT own • Upstream ISP allows advertisement through filter • Causes traffic redirection to rouge end points Common Attack Mechanisms • Exploitation Attacks (continued) – Client Side Exploitation • • • • • Breaching network Pivoting to workstation Gather more info to access additional resources Steal confidential data Tools – Metasploit, Armitage – Cain, John the Ripper, THC Hydra, Ophcrack, RainbowCrack – Netcat, Scapy Common Attack Mechanisms • Exploitation Attacks (continued) – Wireless Exploitation • • • • • Man in the Middle attack Fake access points (Impersonation) Router hacking based on known exploits DoS w/ radio interference WEP or WPA password cracking – Packet sniffing • Read unencrypted credentials • Ex. Wall of Sheep at DEFCON – Internet of Things (IoT) Hacks • Household devices (thermostats, TVs, DVD players, etc.) Common Attack Mechanisms • Exploitation Attacks (continued) – Ex: DNS Amplification • Recursive DNS resolvers respond to spoofed IP with large amounts of data • ~500 byte request in with up to 4096 byte response out • 4096/500 = 8.192 x amplification • Hundreds or thousands of open DNS resolvers hit and respond to victim IP all at once • Some attacks can have an amplification factor of over 60 • 5 Mbps cable modem could generate an attack of 3 Gbps • Consider a botnet network with thousands of members acting all at once Common Attack Mechanisms • Exploitation Attacks (continued) – DNS Amplification Attack Diagram Common Attack Mechanisms – Tools • Tools – Pre-built Linux distributions • • • • • • • Kali Linux Backtrack Linux (Deprecated) Pentoo Node Zero BlackBox Blackbuntu Others – All are open source and basically free http://www.blackmoreops.com/2014/02/03/notable-penetration-test-linuxdistributions-of-2014/ Common Attack Mechanisms - Tools • Information gathering tools (continued) – These distros already have most of the tools used regularly for penetration testing – They are maintained by various organizations • Ex: Kali maintained by Offensive Security – Easily updatable using normal Linux update processes • apt-get • yum – Have a wealth of public instruction available Proliferation of FUD • What is FUD? – Fear, Uncertainty and Doubt – Marketing technique first used by IBM in 1970s – Examples • Microsoft – Windows vs. OS/2 & other flavors of DOS • SCO vs. IBM – Accused IBM of giving away SCO code • Apple – iPhone jail breaking could allow hackers to crash cell towers • Recent FUD in the news • • • • NBC story regarding device hacking at Sochi Death of Windows XP Y2K Doomsday predictions LinkedIn and Yahoo security breaches Proliferation of FUD • So What is Wrong with FUD? – – – – Distracts us from acting upon facts Harms our reputation as IT professionals Overuse by the media desensitizes people Causes mistrust and skepticism • Can FUD be beneficial? – Can, for the short term, motivate people to take action – As facts become clear, FUD should be dramatically reduced Detecting, Mitigating & Preventing Attacks • Detecting Attacks – First, know what is normal! – Log everything and analyze • • • • • Local syslog Windows event logs AD DNS Logging Kiwi, BRO, PRTG Elastic Search (ELK) – Monitor critical devices, services, files, interfaces, etc.. • PRTG or Nagios • Netflow • Monitor port on Internet port to router for sniffing, IDS Detecting, Mitigating & Preventing Attacks • Detecting Attacks (continued) – Configure alerting • For abnormal behavior (slower or faster than normal responses, file sizes, etc..) • For abnormal system and resource usage • Track over time • Analyze trends – Deploy Honeypots • Kfsensor, Honeyd, Honeybot, HoneyDrive • Use that data to understand how your network is… – being exploited or owned – being attacked in hopes of being owned Detecting, Mitigating & Preventing Attacks • Detecting Attacks (continued) – Employ deep packet inspection • Security Onion – – – – – – Linux distro Snort Snorby BRO ELSA TCP Replay • Network Security Toolkit – Remote monitoring • Network paths • DNS Detecting, Mitigating & Preventing Attacks • Mitigating Attacks – Understand the attack • What does the data reveal? – – – – – Malware DDoS Data breach Physical compromise Web site compromise • How critical is the incident? – Determine the source and scope • Packet captures (Wireshark or TCP Dump) • DNS logging on AD controller • Use TCP Replay to analyze the data (Security Onion) Detecting, Mitigating & Preventing Attacks • Mitigating Attacks (continued) – Take steps to block the current attack • • • • • Port block Rate limit traffic IP block Web fix Isolate infected PC or server – Once blocked, do post mortem • Plug holes • Change policies • Patch, etc. Detecting, Mitigating & Preventing Attacks • Preventing Attacks – Know that there is no one “Silver Bullet” • If a vendor says they have a device that will solve all your problems, quickly show them the door • Security is a multi-layered approach • Design security from the outside in and inside out – Web site • • • • • Tight coding Limit information disclosure Secure customer PII DO NOT host site internally Test with Web application vulnerability testers Detecting, Mitigating & Preventing Attacks • Preventing Attacks (continued) – Email Services • Deploy robust SPAM and Virus filtering – Ex. SecureTide – Be sure it is an OFF SITE (cloud) service • DO NOT Host email internally • Configure archiving if compliance requires • Use an email encryption service when sending sensitive data – Ex. CypherPost Pro • Be sure all connections use SSL or TLS – No transferring credentials in clear text – POP3 and IMAP have both encrypted and non-encrypted ports – Know the difference and use encryption Detecting, Mitigating & Preventing Attacks • Preventing Attacks (continued) – Internet Connection • • • • • • • Deploy a next generation firewall and lock it down Get an SLA from your provider Deploy honeypots Monitor as discussed earlier Deploy IDS / IPS in line Vulnerability Assessments Use BGP Blackholes (Bogons, Spamhaus DROP) – VPN (Remote User Access) • Use PPTP or IPSEC VPN for all remote client access • Use 2 factor authentication – RSA Key (rotating code + PIN) – AD Authentication Detecting, Mitigating & Preventing Attacks • Preventing Attacks (continued) – VPN (continued) • Log all connections – Look for connection patterns – Same user, multiple locations – Connection Frequency • Require VPN connections always – No connection to corporate network from home or open Wi-Fi – No connection to corporate network from shared computers – Wireless • • • • Separate guest access from corporate Wi-Fi No connection to corporate LAN on guest Wi-Fi Use WPA2 / AES as minimum encryption (NO WEP) Scan for rogue access points Detecting, Mitigating & Preventing Attacks • Preventing Attacks (continued) – Physical Access • Know your vendors and repair techs – Have access policies – Require pre-arranged appointments – Accompany visitors when possible • Limit physical access – Doors – Elevators (easily hacked even w/ access control) – Set up trap areas between elevators and office entrances • Deploy cameras • Do weekly walk-throughs – Data rooms, closets, etc. – Investigate suspect devices Detecting, Mitigating & Preventing Attacks • Preventing Attacks (continued) – Physical Access (continued) • • • • • • Validate door locking schedule Deploy swipe locks Require ID badges Review surveillance videos regularly Question all unfamiliar visitors Enforce a visitor policy – LAN Protection • Firewall • VLAN – Separate by need to access – Enforce with access lists on firewall Detecting, Mitigating & Preventing Attacks • Preventing Attacks (continued) – LAN Protection (continued) • Implement NAP (Network Access Protection) – Limit device connections – By MAC and compliance profile – Enforce policies • Test and implement hard drive encryption • Enforce USB device policy • Implement DNS Malware Filtering – SecureSurf – No “whitelisting” for known infected content • Implement Content Filtering – Adjust restrictions based upon user activity – Adjust per department Detecting, Mitigating & Preventing Attacks • Preventing Attacks (continued) – LAN Protection (continued) • Enforce a clear Acceptable Use Policy • Monitor DNS logs • Set robust password policies – Required length, characters – Refresh regularly – expiration policy • Follow OS best security practices • Be proactive and glaringly anal about updates and patches • Set strict BYOD policies – Phones – Tablets – Laptops Detecting, Mitigating & Preventing Attacks • Preventing Attacks (continued) – Hardware Retirement • Implement a device wiping policy • Contract with a shredding company to destroy all defunct hardware – Educate Users • • • • Users are your weakest link! Computer users should have a minimum competency level Must ALWAYS be aware of the potential dangers Discuss and enforce Social Networking practices – Etiquette – Acceptable Use Detecting, Mitigating & Preventing Attacks • Preventing Attacks (continued) – Educate Your IT Staff • • • • • Subscribe to reputable data feeds Podcasts Take online courses Make use of open source security tools Collaborate with peers – SANS – Securing the Human – Bottom line – KNOW YOUR ENEMY Wrap Up • Q &A • Contact Info Jim Nitterauer [email protected] @jnitterauer http://www.linkedin.com/in/gridsouth 850-932-5338 x6468