Slides
Transcription
Slides
TalesofInsecurity Evergreens,developments,andinsights forintegratorsandserviceproviders Dr.DominikHerrmann UniversityofHamburg UniversityofSiegen Downloadslidesat https://dhgo.to/tales researchonsecurity,privacy,onlinetracking,forensics PhDandPostdoc @UniversityofHamburg Temporaryprofessorship @UniversityofSiegen JuniorFellowofGermanInformaticsSociety Dr.DominikHerrmann For common Internet Crime Schemes see http://www.ic3.gov/crimeschemes.aspx 2 DAILYNEWS:THEGENIEISOUTOFTHEBOTTLE– WEAREDOOMED 3 Cloud Services Attackson CriticalInfrastructure Big Data Data Leaks Mobile Apps Ransomware andFraud NEW OPPORTUNITIES NEW THREATS 4 datawillbecome theoilofthe21st century datahasbecome atoxicasset,aliability Big Data Data Leaks Meglena Kuneva EUConsumerCommissioner BruceSchneier https://www.schneier.com/blog/archives/2016/03/data_is_a_toxic.html 5 www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Inthelastdecadewehavewitnessedmanyhigh-profiledataleaks. Largenumberofhigh-profiledataleaks 6 Dataleakshaveaninterestingproperty:collateraldamagethataffects (1)citizensand(2)contractorsofthevictim. http://futurezone.at/digital-life/datenleck-20-000-wiener-linien-kunden-betroffen/158.677.940 7 Collateraldamageallowsdataleakstobemonetized. 2015 “forthelulz” THEN HACKING http://www.csoonline.com/article/2996883/data-breach/talktalk-hit-by-data-breach-and-ransom-demand.html forprofit NOW 8 Tworecentdevelopmentshelpadversaries getawaywiththeirdemands. cryptocurrencies anonymized communications collateral damage leverage forprofit https://bitcoin.org,https://torproject.org 9 Howdidthegeniegetofoutthebottle? FIVEWEAKNESSES 10 Weakness1: Outofsight,outofmind 11 Exploitingknownvulnerabilitiesisstillaverysuccessfulattackvector. Vendorsandusersfailtopatchtheirsoftwareinatimelymanner. Mossack Fonsecaranold Outlook WebAccess(2009), Drupal(2013, 25vulns) http://www.wired.co.uk/news/archive/2016-04/06/panama-papers-mossack-fonseca-website-security-problems 12 UltraReset attackonMiFare Ultralight(NewJersey&SanFrancisco,2012) …stillworksin2016(Vancouver) http://bc.ctvnews.ca/security-flaw-lets-smartphone-users-hack-transit-gates-1.2852464 13 Weakness2: Foolswithtools…don’tknowtheirtrade 14 Duetounawareness,carelessness,andhaste,vendorsshipproductswith embarrassingsecurityholes,forinstanceinuserauthentication. Maginon webcams (2015) 1. 2. bypassesfirewallof DSLrouterviaUPnP comeswithempty defaultpassword thousandsofcameras soldatALDIandHofer 15 Insecuredevicescannowbediscoveredbyeveryonewithinshorttimeby queryingspecializedsearchengineslikeshodan.io. Maginon webcams (2015) 1. 2. bypassesfirewallofDSL routerviaUPnP comeswithempty defaultpassword 16 Manyindustriesarecurrentlylearninghowtodosecurityproperly. Vaillant heatings (2015): authenticationandpassword checkperformedbyaJava appletintheuser’sbrowser http://www.hotforsecurity.com/blog/vulnerability-in-vaillant-heating-systems-allows-unauthorize d-access-5926.htm l 17 Weakness3: Underestimatingtheadversary 18 Insecuredesignsresultfromsoftwaredevelopersmakingpoordecisions becauseofwrongassumptions. BMWConnectedDrive (2015) – allcarsusedthesame cryptographickey – communicationwithBMW serverswasnot protected Impact: cardoorscouldbe unlockedbysendingafaked SMStothecar 19 Insecuredesignsresultfromsoftwaredevelopersmakingpoordecisions becauseofwrongassumptions. BMWConnectedDrive (2015) – allcarsusedthesame cryptographickey – communicationwithBMW serverswasnotprotected “Nooneisableto…” – reverseengineerthehardwarewherethekeyisstored – setupafakeGSMnetwork tosendanSMStothecar Impact: cardoorscouldbe unlockedbysendingafaked SMStothecar 20 Insecuredesignsresultfromsoftwaredevelopersmakingpoordecisions becauseofwrongassumptions. BMWConnectedDrive (2015) – allcarsusedthesame cryptographickey – communicationwithBMW serverswasnotprotected Researchersjustdidit. – reverseengineerthehardwarewherethekeyisstored – setupafakeGSMnetwork tosendanSMStothecar Impact: cardoorscouldbe unlockedbysendingafaked SMStothecar 21 proposaltousesamecryptographickeyon53mn.devices https://www.fau.eu/2015/11/03/news/research/an-easy-target-for-hackers, http://www.theinquirer.net/inquirer/news/2451793/gchq-intervenes-to-prevent-catastrophically-insecure-uk-smart-meter-plan 22 Insecuredesignsresultfromsoftwaredevelopersmakingpoordecisions becauseofwrongassumptions. proposaltorunbankingapp andTANapponthesamephone proposaltousesamecryptographickeyon53mn.devices https://www.fau.eu/2015/11/03/news/research/an-easy-target-for-hackers, http://www.theinquirer.net/inquirer/news/2451793/gchq-intervenes-to-prevent-catastrophically-insecure-uk-smart-meter-plan 23 Weakness4: Relyingonsoftwarelibraries… …cangetoutofhandquickly 24 Thesecurityofcloud-basedandmobileapplicationsreliesonencrypted communications thatisoftenhandledby/inthird-partysoftwarelibraries. Recurrenttheme: failuretovalidateSSLcertificates 2012 Foundtobevulnerable: Amazon’sEC2Javalibrary,Amazon’s andPayPal’smerchantSDKs, osCommerce,ZenCart,Ubercart,and PrestaShop,Chasemobilebanking, ApacheAxis,Axis2,Codehaus XFire, andPushermiddleware 25 Vulnerabilitiesinsoftwarelibrariesareconcerningdueto(1)theirlargeimpact and(2)thefactthatittakeslongeruntilthepatchreachesendusers. AFNetworking (2015) SparkleUpdater (2016) 26 Weakness5: Withbigdatacomesbigresponsibility 27 Problem1:Consumershaveprivacyrights,e.g.toaccessanddeletetheir personaldata.Handlingrequestsisveryfrustratingforconsumersandvendors. Weconductedafieldstudywith 150appsand120websites. Evenafterthesecondmail only 1in2vendorscomplied. 1in4websiteownerscouldbe trickedintosendingthedata toadifferent e-mailaddress. Mostvendorsdeletedour accountswithoutprior confirmation. http://arxiv.org/abs/1602.01804 28 Problem1:Consumershaveprivacyrights,e.g.toaccessanddeletetheir personaldata.Handlingrequestsisveryfrustratingforconsumersandvendors. Weconductedafieldstudywith 150appsand120websites. Evenafterthesecondmail only1in2 vendorscomplied. Compliancewillbecomeimportant withupcomingEUGeneralData ProtectionRegulation (highfees) 1in4websiteownerscouldbe trickedintosendingthedata toadifferent e-mailaddress. Opportunity:operatorscould delegatethe processofhandling privacy-relatedrequeststo(cloud) serviceproviders inthefuture. Mostvendorsdeletedour accountswithoutprior confirmation. 29 Problem2:Misconceptionsabouttheeffectivenessofanonymization and pseudonymi-zation resultsininadvertentdisclosureofsensitivepersonaldata. Famouscase: Thepseudonymized NewYorkTaxiDataset Pseudonymization oflicenseplateandTaxiIDwithhashfunction(noteffective) MD5(9Y99) MD5(5296319) 71B9C3F3EE5EFB81CA05E9B90C91C88F, 98C2B1AEB8D40FF826C6F1580A600853, VTS,5,, 2013-12-0315:46:00,2013-12-0316:47:00,1,3660,22.71, -73.813927,40.698135, GPScoords -74.093307,40.829346 30 Problem2:Anonymization andpseudonymization aredifficultandmayresult ininadvertentdisclosureofsensitivepersonaldata. 31 Implications forvendorsandintegrators 32 Manyvulnerabilitiescouldbeavoided,Ifvendorsfollowedbestpracticesand securitymanagementstandards. https://www.enisa.europa.eu/activities/Resilience-and-CIIP/smart-infrastructures/intelligent-public-transport/goodpractices-recommendations/at_download/fullReport 33 Problem:Bestpracticesareoftenabstractandoforganizationalnature. OPERATORS integratecybersecurityincorporate governance implement astrategy addressing holistically cybersecurity&safetyrisks implementriskmgmt. forcybersecurity inmulti-stakeholder environments incl.contractorsanddependencies clearlyandroutinely specifytheir cybersecurityrequirements annuallyreviewcybersecurityprocesses,practicesandinfrastructures MANUFACTURERS createproducts/solutions thatmatch thecybersecurityrequirements ofendusers collaborateinthedevelopment ofIPTspecificstandards andapplythemtoIPT solutions develop atrustedinformationsharing platform onrisksandvulnerabilities provide securityguidance forsystems, products andsolutions https://www.enisa.europa.eu/activities/Resilience-and-CIIP/smart-infrastructures/intelligent-public-transport/goodpractices-recommendations/at_download/fullReport 34 Furthermore,itischallengingtodeterminewhichsecuritymeasuresto implementwithwhatpriority.Theutilityofmeasuresisdifficulttoassess. Popularmetric: ReturnonSecurityInvestment(ROSI) Calculationreliesongoodestimates for – annuallossexpectancy – mitigationratio https://www.enisa.europa.eu/activities/cert/other-work/introduction-to-return-on-security-investment/at_download/fullReport 35 Intoomuchdiscourse,truthislost:Statistics,organizationalmeasuresand paperauditsdistractfromthesourceofvulnerabilities:thesourcecode. opportunityforvendors bugsuncoveredbythe securitycommunity internalcodereviews expensiveand limitedcoverage penetrationtesting 36 Vendorsoftenmisstheopportunitytocollaboratewithsecurityresearchers. opportunityforvendors bugsuncoveredbythe securitycommunity internalcodereviews expensiveand limitedcoverage penetrationtesting 37 Asaresultthereisaflourishingblackmarketforsecurityvulnerabilities. Inresponsevendorsinthesoftwareindustryhavesetupbugbountyprograms. blackmarket forzero-dayexploits whitemarket bugbountyprograms opportunityforvendors bugsuncoveredbythe securitycommunity internalcodereviews expensiveand limitedcoverage penetrationtesting 38 TalesofInsecurity TAKE-AWAYMESSAGES Cloudcomputing,mobileapps,andbig 1 dataincreasetheimpactofattacks 2 Wewillseemorehigh-profileattacks untilindustrytakessecurityseriously. Vendorsshouldacceptthehelpofthe 3 securitycommunity. Dr.DominikHerrmann [email protected] Slides:https://dhgo.to/tales "campfire"byMarkRoy islicensedunder CreativeCommonsAttribution 2.0.