The Threat Landscape and Security Trends

Transcription

The Threat Landscape and Security Trends
The Threat Landscape
and Security Trends
Jeremy Ward
DTI Survey 2004 - Incidence of breaches
What proportion of UK businesses had a security incident last year?
Threat Landscape & Security Trends
Trends since 2002
What proportion of UK businesses had a malicious security incident in the last
year?
Threat Landscape & Security Trends
General Threat Evolution
Flash threats
Massive worm
driven DDoS
Web Services
Global
Impact
Scope
Sector
Regional
Individual
Orgs.
Individual
PCs
1st gen. viruses
Individual DoS
Web defacement
email worms
DDoS
Credit hacking
1990s
Threat Landscape & Security Trends
2000
Blended threats
Limited Warhol threats
Worm driven DDoS
National credit hacking
Infrastructure hacking
2003
Time
‘Flash to Bang…’
Software
Vulnerability
Announced
Threat Landscape & Security Trends
‘Flash to Bang…’
Firewall/IDS Alert
Software
Vulnerability
Announced
Tell-tale Activity
time
Threat Landscape & Security Trends
‘Flash to Bang…’
Media Circus!
Firewall/IDS Alert
Software
Vulnerability
Announced
Tell-tale Activity
time
Threat Landscape & Security Trends
Sasser Development
1400
Drop Page Fields Here
Sum of Sources
Cisco & Dragon
Signatures
Pushed
1200
1000
Sasser Worm
Released
800
Type
IDS
Firewall
600
400
MS LSASS
Vulnerability
Released
200
0
4/22/04
0:00
4/23/04
1:00
4/24/04
1:00
4/25/04
1:00
4/26/04
1:00
4/27/04
1:00
4/28/04
1:00
4/29/04
1:00
Threat Landscape & Security Trends Date
4/30/04
1:00
5/1/04
1:00
5/2/04
1:00
5/3/04
1:00
5/4/04
1:00
5/5/04
1:00
5/6/04
1:00
Less time to react
Vulnerability Release Date v Time to Active Exploitation
350
300
Code Blue
Days
250
200
Nimda
150
100
Lion
50
0
1-Oct-00
Masana
Code Red
19-Apr-01
5-Nov-01
Modap
Scalper
24-May-02
10-Dec-02
Blaster
Welchia
28-Jun-03
Sasser
14-Jan-04
Date
Threat Landscape & Security Trends
Source: Symantec
DeepSight Analysis
1-Aug-04
Vulnerability Summary
2,636 distinct vulnerabilities documented
by Symantec in 2003
100 serious “potential” vulnerabilities per
month
= 60 easy & prevalent
= 40-45 patches a month
Threat Landscape & Security Trends
Threat Landscape & Security Trends
Vulnerability Trends
6% rise in vulnerabilities requiring no exploit code,
5% increase in vulnerabilities with published exploit code.
350
No Exploit Required
Exploit Available
No Exploit Available
Number of vulnerabilities
300
250
200
150
100
50
0
Jan02
Mar02
May02
Jul02
Sep02
Nov02
Jan03
Mar03
May03
Jul03
Sep03
Nov03
Month
Threat Landscape & Security Trends
Source: Symantec
Internet Threat Report March 2004
Today’s Threat Landscape
Significant increase in mass-mailers
Significant increase in criminal
activity
54% of all attacks are blended
Speed of building is at an all time
record
Highly automated
24% increase in targeting
Threat Landscape & Security Trends
2003 Top 10 Malicious Code
Threats
1
2
3
4
W32.Bugbear.B@mm
W32.Klez.H@mm
HTML.Redlof.A
W95.Hybris.worm
5
6
7
8
9
W32.Sobig.F@mm
W32.Blaster.Worm
W32.Swen.A@mm
W32.Nimda.E@mm
W32.Bugbear.B.Dam
10
W32.Sobig.A@mm
Source: Computer Economics
Growth of ‘Remote Access’ Threat in 2004
16
14
12
10
8
All Malware
Backdors
6
4
2
0
Jul-Dec
2002
Jan-Jun
2003
Jul-Dec
2003
Jan-Jun
2004
Network Threats: Min. Risk = 3. Min. Severity = 5
Threat Landscape & Security Trends
Data from Symantec DeepSight Alert
Why?
…It’s easy – just cut & paste
Threat Landscape & Security Trends
Proof that it’s easy - re-engineered malware
158 Gaobot variants
(25/10/02)
43 Backdoor.Sdbot
variants (09/07/02)
30 Netsky variants
(16/02/04)
26 Beagle variants
(20/01/04)
Threat Landscape & Security Trends
Data from Symantec DeepSight Alert
And it’s worth
money…
Threat Landscape & Security Trends
In the marketplace
Threat Landscape & Security Trends
The Botnet Threat
Botnets can be so large (250,000 PCs) they
could “take whole countries offline” (Met Police
CCU)
Botnet ‘herders’ pay hackers for their botnets
Sell to spammers mostly in eastern Europe
DoS attacks and blackmail
Businesses report being targets of demands for $50k
from a Russian crime Syndicate
Threat Landscape & Security Trends
Threat Landscape & Security Trends
What helps them succeed?
“Bypass firewalls to chat with
your friends and download files.
Works with Kazaa, iMesh,
Messenger, ICQ and any other
application that supports the
SOCKS protocol.
No configuration hassles, no
techie-talk or geek-speak.
Not only does hopster configure
itself, it even knows how to
configure Kazaa, MSN Messenger
and many others - so you don't
need to.
Once installed, hopster operates
silently in the background, you
won't even notice it's there.”
Threat Landscape & Security Trends
Blaster reuse & peer-to-peer filesharing
Rank
Percentage
of Attackers
Port
Description
1
TCP/135
Microsoft / DCE-Remote Procedure Call
(Blaster & Variants)
32.9%
2
TCP/80
HTTP / Web
19.7%
3
TCP/4662
E-donkey / Peer-to-peer file sharing
9.8%
4
TCP/6346
Gnutella / Peer-to-peer file sharing
8.9%
5
TCP/445
Microsoft CIFS Filesharing
6.9%
6
UDP/53
DNS
5.9%
7
UDP/137
Microsoft CIFS Filesharing
4.7%
8
UDP/41170
Blubster / Peer-to-peer Filesharing
3.2%
9
TCP/7122
Unknown
2.5%
10
UDP/1434
Microsoft SQL Server (Slammer)
2.4%
Threat Landscape & Security Trends
Source: Symantec
Internet Threat Report March 2004
Pace of Change
The window of opportunity…
? Next development
2002 - ? Internet mature
☺ High predictability
2001 Dotcom bubble bursts
1995-2001 Internet developing fast
Low predictability
Time
Threat Landscape & Security Trends
To detect reconnaissance & attack activity
Pre-attack
Reconnaissance
40%
Exploit Attempts
17%
43%
Worms & Blended
Threats
Threat Landscape & Security Trends
Source: Symantec
Internet Threat Report March 2004
Community Defence
To prioritise patch activities on the basis of
likelihood & damage
To plan defence based on likely attack
mechanisms
To prepare resources for appropriate responses
To understand and detect attacks
Threat Landscape & Security Trends
Community Alerting for Sasser
1400
Sum of Sources
1200
Specific
Alerts
1000
800
Tele
conf
Type
IDS
Firewall
600
Community Alerts
Initial
Alert
400
200
0
4/14/04
4/22/04
0:00
4/23/04
1:00
4/24/04
1:00
4/25/04
1:00
4/26/04
1:00
4/27/04
1:00
4/28/04
1:00
4/29/04
1:00
Date
Threat Landscape & Security Trends
4/30/04
1:00
5/1/04
1:00
5/2/04
1:00
5/3/04
1:00
5/4/04
1:00
5/5/04
1:00
5/6/04
1:00
Community Summary for June 2004
The overall number of varied threats continues to increase
Web and Application attacks continue to rise steadily
DoS attacks continue to increase sharply
After a significant drop over the last few months, O/S
attacks rose dramatically
Malicious code attacks overall have doubled over 6
months.
Threat Landscape & Security Trends
June 2004 Top 10 Attacks
1. Generic UTF8 Encoding in URL Attack
2. Microsoft Indexing Server/Indexing Services ISAPI Buffer Overflow Attack
3. SQLExp Worm Activity
4. Mal HTTP Commands
5. W32.Novarg.A@mm/W32.Mydoom.B@mm
6. Generic TCP Syn Flood Denial of Service Attack
7. Generic X86 Buffer Overflow Attack
8. Suspicious SSH Traffic
9. Dot-Dot Exploit
10. Generic WebDAV/Source Disclosure "Translate: f" HTTP Header Request
Attack
*excludes probes and scans
Threat Landscape & Security Trends
Analysis of variety of attacks on Community in 2004
Total Attack Signatures for Community
2000
1800
1600
1400
1200
1000
800
600
400
200
0
Jan
Feb
Mar
Apr
2004
Threat Landscape & Security Trends
May
Jun
Community Benchmarking – Security Events
Average Security Event Count (Jan-Jun 2004)
250
200
150
100
50
0
P
J
Q
D
M
C
F
S
Z
X
G
L
V
O
Y
H
N
T
K
Community Organisations
Threat Landscape & Security Trends
W
AA
E
R
B
I
A
U
Summary
Vulnerabilities increase –
patch times decrease
Internet parasites come of age –
now they make money
The tools make it easier –
both for the hacker and the careless
But we have an opportunity –
we can use the tools for defence
Community defence could give us the break we need!
Threat Landscape & Security Trends
End – Questions?
Thank you