Security Liaison Meeting

Transcription

Security Liaison Meeting
Security Liaison Meeting
September 22, 2011
Agenda
•
•
•
•
•
•
•
•
Welcome
Review of Role of the Security Liaison
Current Threats: Hallmark?
Using IM? Know the Risks
Fake Anti-Virus: Scareware
Remote Access Best Practices
The SL Toolkit
Security Liaison Questions and Concerns
The Security Liaison
• Appointed by Vice Presidents, Deans and Directors
• Understands responsibility for two way
communications, to the department and to the ITU
• Understands the balance between security and
business needs
• Pursues clarity in policy development and revisions
• Understands the impact of policy on departmental
business process and communicates areas of
concern
The Role of the
Security Liaison
• Point of contact in their unit for security recommendations and
requests coming from the VPIT. Responsible for disseminating this
information to the unit’s leadership and their offices.
• Point of contact in their unit for security incidents, suspected and real.
Act as a conduit to the Computer Security Incident Response Team
(CSIRT).
• Initiate Security Risk Assessments by contacting the IT Security Office.
• Inform the VPIT and the President's Chief of Staff of possible gaps in
training and support programs necessary to carry out requirements set
forth in Policies and Directives.
• Review proposed Security Policies. Provide guidance on how to put a
new or revised policy into practice.
Current Threats: Hallmark?
Malicious Downloads hosted by
Webservers are the most significant
current threat.
Hackers Take the Easy Path
• It is now much easier to get an end user to
click on a control on a web site than to find
and exploit a vulnerability in a modern
computer system.
• Compromised end user systems are then
leveraged to:
– harvest credentials, SSN #s and credit card info
– distribute phishing email
– attack other systems
The Hackers Initial Target:
Trusted Web Sites with High Traffic
• FireEye, a malware detection appliance we use,
recorded the following session recently.
• This is an abbreviated record of an alert reported by
FireEye. FireEye only sends an alert when it detects
malicious traffic or a malicious event.
Referer
http://www.hallmark.com/online/hoopsandyoyo/downloads/h
yy-screensavers.aspx
Get
/hoopsandyoyo/images/downloads/screensavers/hyycatsaver_setup.exe
AcceptEncoding
gzip, deflate
What Was In That Download?
Type
Mode/
Class
Details (Path/Message/Protocol/Hostname/Qtype/ListenPort
etc.)
Process
Started
C:\malware.exe
Packed: yes GUI: yes
Parentname: C:\WINDOWS\system32\cmd.exe
Command Line: c:\malware.exe
MD5: b9605749e1fc50ec6bba23c2f4743ebc
SHA1: 25f908d2895bc85bcfd692cc2477e4607dbbe0e6
Folder
Created C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\STF1
File
Created C:\WINDOWS\system32\Macromed\Flash\SET3.tmp
Regkey
Setval
\REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543500\Software\Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000000
Looks Suspicious..
Type
Mode/Cl
ass
Details(Path/Message/Protocol/Hostname/Qtype/ListenPort
etc.)
File
Rename
Old Name:
C:\WINDOWS\system32\Macromed\Flash\SET4.tmp
New Name:
C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe
Imagepath:
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\STF1\flashax.exe
MD5: 2ca63cad2f563abbb25d7aec50ea8f29
SHA1: 4415b3b7880062485456b7401cd2b7fc2edd476c
File
Date
Change
C:\WINDOWS\system32\Macromed\Flash\SET3.tmp
Malicious
Alert
Misc
Anomaly
Message: System file timestamps modified Detail: Malware
modifying system file timestamps
Yep, It’s Malware.
Type
Mode/Cl
ass
Details (Path/Message/Protocol/Hostname/Qtype/ListenPort
etc.)
File
Rename
Old Name:
C:\WINDOWS\system32\Macromed\Flash\SET4.tmp
New Name:
C:\WINDOWS\system32\Macromed\Flash\GetFlash.exe
Imagepath:
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\STF1\flashax.exe
MD5: 2ca63cad2f563abbb25d7aec50ea8f29
SHA1: 4415b3b7880062485456b7401cd2b7fc2edd476c
Malicious
Alert
Misc
Anomaly
Message: System services modified Detail: Malware renaming
exe/dll/sys/vxd file into the WINDOWS or SYSTEM32 directory
Lessons Learned
• While most web based malware is distributed
through questionable web sites, even trusted
sites can harbor malware.
• The Internet is still the wild, wild west. Users
need to become and remain knowledgeable
about the risks.
• Most often, it is end user behavior that leads
to identity theft and computers participating
in bot networks.
Threats Continue
Threats Continue
Using IM? Know the Risks
• Identities can be elusive or ambiguous – it can
be difficult to identify the "person” with
whom you are talking. Accounts may be
compromised, users may forget to log out, or
an account may be shared by multiple people.
Are you sure you know who is really on the
other end of that “chat”?
Using IM? Know the Risks
Cyber criminals trying to convince someone to
run a program or click on a link is a common
attack, but it can be especially effective
through IM and chat rooms. In a setting where
you are comfortable, a malicious piece of
software or an attacker has a better chance of
convincing you to fall into the trap.
Using IM? Know the risks
You don't know who else might be seeing the
conversation - Online interactions are easily
saved, and if you're on a free commercial
service, the “chat” may be archived on a
server. You have no control over what happens
to those logs. Is someone looking over the
shoulder of the person you're talking to?
Using IM? Know the risks
Default security settings may be inappropriate The default security settings in chat software
tend to be relatively permissive to make it
more open and "usable," and this can make
you more susceptible to attacks.
Using IM? Know the risks
Be conscious of what information you reveal Be wary of revealing personal information
unless you know who you are really talking to.
You should not be discussing or sending
anything that might be sensitive university
information over public IM or chat services
(even if you are talking to someone you
know).
Using IM? Know the Risks
Source
• Authors: Mindi McDowell, Allen Householder
• Copyright 2004 Carnegie Mellon University
• United States Computer Emergency Readiness Team (USCERT) (www.us-cert.gov)
Fake Anti Virus Offers or
Scareware
Scareware
Scareware
Scareware
Scareware
• Source for “Scareware”
Remote Access Best Practices
• Accessing Mason resources (desktop
computer, a printer, a server) remotely must
be done via a controlled network
• “Rogue” devices or programs used for remote
access lead to problems for the user, others on
the network, and resources accessed.
Remote Access Best Practices
• New policy in final stages of approval
• Users must use Virtual Private Network (VPN) or
access through an approved device
• VPN accounts are available at
http://tsd.gmu.edu/net/Forms/F0021_A.html
• Office computers should not be left “logged in”
Security Liaisons
• Questions and Concerns