Internet Security Threat in Malaysia
Transcription
Internet Security Threat in Malaysia
Ministry of Science, Technology & Innovation Internet Security Threat in Malaysia Bengkel Pembudayaan Pengukuhan Keselamatan ICT Kota Kinabalu, Sabah 12/10/2010 Adnan bin Mohd Shukor (GPEN, SANS/GIAC Advisory Board) [email protected] Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia Background Adnan Mohd Shukor – [email protected] Intrusion Analyst at MyCERT, CyberSecurity Malaysia. Currently involved with Cyber Early Warnings. Education background comprises of Degree in Information Technology, majoring in Security Technology from Multimedia University in 2008. A GPEN (GIAC Penetration Tester) certified and member of the SANS Advisory Board since December 2009 Has been involved in the computer security field for over 4 years and his current area of focus and interest is in web security technologies and client side security. Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 2 Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 3 Cyber Early Warning Technical and Global Coordination Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 4 Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 5 MyCERT’s Vision: ‘To reduce the probability of successful attack & lower the risk of consequential damage’ MyCERT’s Mission: ‘To address the computer security concerns of local Internet users’ Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 6 Cyber Early Warning Research Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 7 Cyber Early Warning Malware Research LebahNet Advisory and Alerts Emerging Threats Threats Visualization Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 8 Technical and Global Coordination Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 9 Technical Co-ordination National Cooperation Cyber Security Experts ISPs gcert Regulators MCMC Law Enforcement, Authorities Vendors Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 10 Technical Coordination Centre Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 11 International Collaboration European Government CSIRTs Group (EGC) Organizatio n of American States (OAS) CERT Forum of Incident Response Teams MyCERT is an SC member European Network and Information Security Agency (ENISA) Pakistan Qatar Pakistan Egypt Oman Saudi Bangladesh Tunisia Bahrain “OIC CYBER EMERGENCY RESPONSE TEAM” Malaysia Brunei UAE Organization of Islamic Countries Computer Emergency Response Teams Morocco Indonesia Jordan Nigeria Turkey Securing Our Cyberspace Syria Kuwait Home OIC-CERT Task Force Member Copyright © 2010 CyberSecurity Malaysia 12 Current Trend and Threats Overview Phishing Malware Botnet Web Hacking Client Side Attack Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 13 What threat is this? Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 14 Phishing Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 15 Phishing Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication [source: wikipedia] Still works today Targeting favourite banks in Malaysia / international Uses long URL that masquerading the original website Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 16 Phishing Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 17 Phishing Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 18 Phishing Does it really works? Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 19 Phishing Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 20 Prevention Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 21 Phishing : Prevention Do not respond to e-mails requesting for your personal information Do not open attachments or download files Do not click on links provided in e-mails. Firefox user might install DontPhishMe https://addons.mozilla.org/firefox/addon/142878/ Report to MyCERT by forwarding the email to [email protected] Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 22 DontPhishMe in Action Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 23 23 DontPhishMe in Action Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 24 24 Demo Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 25 What threat is this? Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 26 Malware Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 27 Malware A computer program created with malicious intents. It performs malicious tasks: Stealing your identity Key logging Disrupt system Damage data Attack other computers Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 28 Malware We can get infected by malware from almost everywhere: Web (drive by download, web exploitation, flash) Fake antivirus Email (email attachment, links) Files (pdf, doc, jpeg, etc.etc [file exploitation]) Video/Mp3 (fake codec, file exploitation) Portable hardisk Errr..your USB storage? Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 29 Malware Unpatched systems or systems with vulnerable applications will easily become target to malware. Malicious software includes Trojan horse Virus Worms Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 30 Malware: What MyCERT Observed? MyCERT have been collected more than 26113 unique samples (based on MD5 hash). Most of it are positive with detection from antivirus software. Using honeypot concept (low interaction) for collecting malware. Most likely coming from host which infected by sort of malware. Malware is normally distributed by IRC, FTP and HTTP Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 31 Malware: What MyCERT Observed? Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 32 Malware: Scenario (Conficker) Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 33 Malware : Conficker : What MyCERT Observed? Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 34 Malware : Conficker : What MyCERT Observed? Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 35 Malware : Conficker : What MyCERT Observed? Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 36 Malware : Conficker : What MyCERT Observed? Top Country Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 37 Malware : Conficker : What MyCERT Observed? Top .my Domain Requested Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 38 Botnet Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 39 Botnet Botnet is collection of compromised computers (called Zombie computers) running software, usually installed via worms, Trojan horses, or backdoors, under a common command-andcontrol infrastructure. Use to perform DDoS, Automated hacking, Spamming, etc..etc.. Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 40 Botnet : Scenario 1. Botnet operator sends out viruses or worms • infect ordinary users [trojan application is the bot] 2. The bot on the infected PC logs into an IRC server • Server is known as the command-and-control server 3. Spammer gets access to botnet from operator 4. Spammer sends instructions to the infected PCs 5. Infected PCs send out spam messages Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 41 Botnet : DDoS Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 42 Prevention Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 43 Malware : Prevention Patch.. Patch.. Patch.. and Patch (update) your OS & Applications Make sure Antivirus installed and up-to-date Stay away from illegal/questionable sites Be careful with mail attachments! Be careful with ‘autorun’ thumbdrive Report to MyCERT : [email protected] Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 44 Demo Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 45 Web Hacking Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 46 What threat is this? Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 47 Remote File Inclusion + Steganography Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 48 Statistics The following graph shows the breakdown of domains defaced in Q4 2009. Out of the 362 websites defaced in Q4 2009, 70% of them are those with a com and com.my extensions.Defacers generally target web applications that are prone to SQL injection or sites that are not secured. Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 49 Statistics Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 50 Web Hacking Most Common methods: Remote File Inclusion (RFI) SQL Injection Remote Code Execution Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 51 Web Defacement Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 52 Web Defacement Tracker Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 53 Web Defacement Tracker Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 54 Prevention Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 55 Web Hacking : Prevention Patch.. Patch.. Patch.. and Patch (OS & Applications) Secure coding practice Secure configurations 3rd party applications (GreenSQL, PHP-IDS) Log analysis (time to time) Report to MyCERT : [email protected] Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 56 Demo Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 57 What’s now/next? Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 58 Client Side Attack Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 59 Client Side Attack Target vulnerabilities in client applications that interact with a malicious server or process malicious data. Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 60 Client Side Attack Common Target Browser (IE, Firefox, Chrome, Safari) PDF Reader (Adobe Acrobat, Foxit) Flash Player Multimedia Plugin (Java, Quicktime, ActiveX) Microsoft Office Apps (Excel, PowerPoint) Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 61 Client Side Attack Used in ‘Targeted Attack’ o Scenario: Receive file with attachment from boss Normally used current propaganda to conduct social engineering: o o o o o US Presidential Election Tibetan Movement Pharmacy spam Swine Flu .. OR MAYBE .. Laporan Kewangan Bengkel Pembudayaan Pengukuhan Keselamatan ICT Negeri Sabah ?? Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 62 Client Side Attack : Acrobat Reader (1) Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 63 Client Side Attack : Acrobat Reader (2) Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 64 Prevention Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 65 Client Side Attack : Prevention Patch.. Patch.. Patch.. and Patch (OS & Applications) Make sure Antivirus installed and up-to-date Be careful with mail attachments and URL! Stay away from questionable sites Use extra protection :) (Firewall, F-Secure Exploit Shield, Google Safe Browsing API) Subscribe to MyCERT Advisory http://www.mycert.org.my/en/feed http://www.twitter.com/mycert Report to MyCERT : [email protected] Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 66 Demo Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 67 Conclusion Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 68 BIG Problem Security is OUR Responsibility Small Issues Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 69 Q&A THANK YOU [email protected] [email protected] [email protected] Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 70 Our Websites and emails for http://www.cybersecurity.my Corporate website http://www.mycert.org.my for http://www.esecurity.org.my for Technical website Awareness Portal http://cnii.cybersecurity.my [email protected] for → [email protected] → for general inquiries for incidence reporting Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia 71 Our Corporate Website: Securing Our Cyberspace Securing Our Cyberspace Copyright © 2010 CyberSecurity Malaysia Copyright © 2008 CyberSecurity Malaysia 72