Issue 3 - SeNet International Corporation
Transcription
Issue 3 - SeNet International Corporation
SeNet International Corporation SENET GAMING SECURITY NEWSLETTER Don’t Gamble with Security Volume 1, June 2013 Improving Critical Infrastructure Cyber Security and How it Relates to iGaming By Gus Fritschie IN THIS ISSUE Improving Critical Infrastructure Cyber Security and How it Relates to iGaming On February 12, 2013 President Obama issued Executive Order 13636. Among other items, this order recognized the need for improvement in cyber security, directed the National Institute of Standards and Technology (NIST) to create a framework to be followed, and encouraged sharing of information between private companies and the Government. One week later gaming stakeholders and interested parties convened in Las Vegas, Nevada for the iGaming North America (IGNA) conference. While there was much talk of liquidity, state rights, and the possibility of Federal regulation, there was precious little discussion on the subject of information security. What can the iGaming industry learn from the current Federal initiatives in cyber security, and how can it avoid the mistakes that have been made before? One thing that is clear is that cyber security is in the news, from the advanced persistent threat (APT) and attacks from China to social networking services, such as LinkedIn and Evernote, being compromised. Even the Federal Reserve of the United States had a recent security breach. The media has jumped on these stories for a variety of reasons, and yes, sensationalism has been one of them. The iGaming sector is an area that the mainstream media (and for that matter the information security news outlets) have ignored. This is not because it is safe from threats; one only need to read sites, such as two-plus-two, that focus on gaming and poker. If iGaming is to succeed in a highly regulated environment of the United States, it has to learn from and address security issues that were encountered in the past (cont’d page 2) Live Ace By Gus Fritschie LiveAce The Hidden Risks of Social Media LiveAce is a subscription-based online poker site that allows players to play in ring games (limit hold’em, no limit hold’em, pot limit omaha) and convert their chips into cash and valuable prizes. The team at LiveAce recognized the need for security in their application and software early in the SDLC process. LiveAce contracted with SeNet to perform independent thirdparty vulnerability testing. The testing was performed in two phases, one from a web application testing perspective and the second involving a review of the source code. During the web application assessment SeNet IT Security experts examined not only the gaming functions but also the backend features such as player registration and player profiles. We utilized automated web application vulnerability scanning tools to examine the site as well as proxy software to intercept and modify HTTP requests in an attempt to perform privilege escalation and affect the gameplay. SeNet IT Security experts also conducted a security review of the online gaming application source code. We then produced a detailed report which provided the management and technical staff at LiveAce an overview of potential vulnerabilities with mitigation suggestions and allowed them to make informed risk-based decisions. As LiveAce continues to grow and mature they plan to continue to utilize SeNet to perform periodic security testing and advise them on matter related to information security. Please contact us for how we can help your organization with similar tasks and feel free to reach out to LiveAce to get their view on SeNet’s performance. And remember -”Don’t Gamble with Security”(TM)” SENET Page 2 (for example, the Absolute/Ultimate Bet backdoor, and Cake and other sites not implementing encryption and SSL correctly). The gaming industry understands this and the various regulatory bodies have standards, including security, which the sites must meet. Unfortunately, each regulatory body has adopted different standards that the operators and players must be adhered to. Often these standards are not as strict as they need to be. Compare this to the above mentioned executive order where NIST was given the authority to create a framework for all critical infrastructure organizations. Here we have a central authority that is responsible for setting and enforcing standards.. Of course, regulation and compliance enforcement are not the silver bullets that will eliminate security breaches. There are plenty of companies and organizations that have been tested for meeting compliance with security standards, such as those established by PCI and FISMA, but have still been subjected to security compromises. The primary reason for this is that these companies limit their security goals and activities to compliance with standards. The same trend has already been observed in the iGaming space. I recently had an individual from one of the major testing labs tell me that they have to be careful only to test to what the standard requires, no more. Unless the sites begin to go above and beyond what the regulations require, they will suffer the same fate that many companies in other sectors who just view compliance as checking a box. Regulation alone can't make the sites secure, but it is a necessary starting point. An interesting part of the executive order was the section encouraging information sharing between commercial entities and the Federal government. While this is part of the order that some critical infrastructure organizations are not fond of, I believe it does make sense. Perhaps not as damaging as an attack against critical infrastructure, a significant breach against one of the iGaming sites may have dire consequences for the entire industry. Imagine if one of the online poker sites suffered an attack where player’s hole cards could be viewed. Even though only one site was affected, the general public’s perception of the safety and integrity of the overall industry could be greatly compromised. I am not suggesting that competitors give away their trade secrets, but sharing information in certain areas would have its benefits. For example, if operators were to share distributed denial of service (DDoS) threats and attack vectors, or if they discussed how they were detecting the latest bots and collusion attempts, the industry would become more mature and respected due to its greatly improved security posture. Perhaps this type of activity already takes place and you have Poker Stars, for example, sharing security information with Bodog, but I doubt it. Before critics claim that this does not happen in other industries, I am here to tell you that it does. For example, one of my customers is in the railroad industry, and the major railroad’s heads of security meet on a regular basis to discuss what each is doing and learn what improvements they can make. I am not going to lie, security comes at an expense. The $64,000 question is: Would players pay more for using a site that they knew took extra steps to verify and ensure the security of the gaming platform and environment? Unfortunately, often businesses look at this additional cost and, because they do not see an immediate return on their investment, it is one of the first items to get cut. This does not occur just in gaming. Under competitive pressure to cut sometimes security becomes the victim. The more visionary site owners do take security seriously, and I have had gaming customers come to me because they don’t want to just comply with regulations and minimum internal control standards, but make sure their systems are actually protected. Would customers be willing to pay ten cents more in rake if that meant that the code was undergoing security reviews on a regular basis, that monthly vulnerability assessments were occurring, and that other security mechanisms were in-place? I am not sure, and the argument can be made that they should not have to. However, unless these types of continuous monitoring approaches are mandated, I don’t believe it will be done unless a portion of that cost can be passed on. Even though operators should realize that they are only going to get one chance. Volume 1, Issue III The Hidden Security Risks of Social Media By Gus Fritschie Social media and social networking play an important part of our lives, both personally and in business. Facebook, LinkedIn, and Twitter are names and services that the majority of us use, including those involved in the iGaming and the poker industry. Of course when using these types of sites you have to accept a certain amount of risk as most have had issues related to privacy and in some cases even security breaches. Issues and vulnerabilities in social networking platforms have been well documented and publicized, but the risks that users of these sites face offline have been largely underreported. While in some instances there is good reason to publically disclose personal information (e.g., marketing) people need to be made aware of the risks involved. This is especially true with professional poker players who are known to have large sums of cash or other valuables. Individual Mapping Let’s start with Twitter as it is one of the more interesting sites in my opinion. Geotagging is one of the more popular practices that often leaks user’s information without their knowledge. Wikipedia defines geotagging as: … the process of adding geographical identification metadata to various media such as a geotagged photograph or video, websites, SMS messages, QR Codes1 or RSS feeds and is a form of geospatial metadata. This data usually consists of latitude and longitude coordinates, though they can also include altitude, bearing, distance, accuracy data, and place names. There are many devices including digital cameras and mobile phones that perform geotagging. Some have the feature enabled by default and in other cases it has to be enabled by the user. From the brief review I performed it seems like the majority of poker players do not have geotagging enabled on the pictures they upload to Twitter. The most likely reason is that the latest phones have this feature disabled by default. “if somebody was to put together pieces from various sources they can begin to build a profile … it can then be used in social engineering attacks, scams, and potentially even more serious crimes.” However, there are some who either have geotagging enabled on purpose or by mistake. We will pick on everybody’s favorite poker player tweeter (well at least mine) Jean-Robert Bellande, @BrokeLivingJRB. Jean-Robert likes to use Twitter to promote which celebrities he is hanging out with and where he is currently playing some cards. Now, much of this isn’t sensitive, but there are some cases where information unintentionally leaks out. A number of tools are available that can use this metadata to map out an individual’s location. Creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. In the figure below we use the tool to query based on Jean-Robert’s twitter handle. Page 3 SENET Page 4 As you can see a lot of information is returned. By selecting one of his posts you can visually see where he was. In this case, he was at the PCA in the Bahamas. This, along with other tweets about playing poker at the Aria, are not that sensitive. However, let’s look at one he tweeted over the holidays while visiting his family. While Jean-Robert’s life may be public, I’m sure his family’s home location is not. With applications like this it is easy for malicious users to target a person for criminal purposes For example, let’s say you tweet a picture of your chip stack from an underground game. If somebody is targeting you they now have the physical location of where you are—and know how much money you have on you. Jean-Robert is not the only known poker player to have geotagging enabled. Another example is Sam Trickett, @Samtrickett1. Volume 1, Issue III Below is a screenshot from when he posted while playing in a tournament in Italy. And this data from Creepy can be imported into a mapping tool like Google Earth for further interrogation: [Jean-Robert Bellande and Sam Trickett were contacted prior to the publication of this article so they were made aware of the issue and could take appropriate steps. At the request of Bellande, we blurred out lat/long locations and the map of his family home, and helped him remove the information from his twitter account.] Across Social Networks Another tool that does something similar is called PushPin. But unlike Creepy, which takes a user’s name as input, PushPin takes a location and then queries multiple sites including Twitter, YouTube and Instagram to pull additional information. Page 5 Page 6 SENET The figure below shows a screenshot of the tool while running using GPS coordinates of a location that many of you are probably familiar with. The tool maps the data into two different tabs in your browser. The first shows the locations on a map and the second shows the media that was accessed. Volume 1, Issue III By hovering over the push pin on the map you see who was where , and when: Reading through all of the tweets from Vegas can make for an interesting time. While most of this information seems innocent, if somebody was to put together pieces from various sources they can begin to build a profile of you. This information can then be used in social engineering attacks, scams, and potentially even more serious crimes. How to Protect Yourself It is important to be aware of what information you are sharing on social media, and limit posting information that could be used to harm you. Make sure that geotagging is disabled unless you are using it for a business purpose. On twitter, there is an option in your account settings to remove the location from all previous tweets: Always remember that whatever you are posting, you consider it public information. A future article will explore how other sites such as Facebook and LinkedIn can be used for data mining purposes, and how that information can be used in other types of social engineering attacks. Page 7 Page 8 Comprehensive List of SeNet’s Information Security Services Service Description Penetration Testing and Vulnerability Analysis Using the latest set of automated tools combined with manual techniques, SeNet will evaluate the security of your IT infrastructure both from external point of view (“Penetration Testing”) as well as from within your security perimeter (“Internal Vulnerability Analysis”) Compliance Verification & Validation SeNet will verify that your implemented IT security controls (management, operational and technical) meet and exceed the guidelines and requirements which apply to your business (e.g., HIPAA, GLB, SOX, FISMA, PCI etc.) Our security analysts will point out gaps and suggest the most effective means to bridge them. Using state of the art automated code scanning tools, our expert application security testers Application Code Security will identify potential application security vulnerabilities and then manually verify them. Review They will work with your programmers to correct these errors and suggest better coding techniques. Secure Applications Engineering (SAE) We believe that security should be incorporated into the application life cycle from its inception and not as an add-on once it is getting close to be deployed. SeNet provides application design services that integrate “touch points” in the design process of your mission critical software applications. Some of these services include requirements definitions, procurement and source selection assistance, independent testing, and development of key security modules. On Going IT Security Operations SeNet security administrators conduct day-to-day IT security operations including continuous security monitoring, user accounts maintenance, configuration, log reviews, and responding to incidents. IT Security Architecture Development SeNet’s Security Architects and Engineers will identify the most effective security means based on a thorough analysis of your business and technical needs. The resulting security architecture will incorporate multiple measures (“Defense in Depth”) to accommodate the needs of your mission while ensuring compliance with mandated requirements and best industry practices. Security Products Integration Physical Security Business Continuity/ Disaster Recovery Planning SeNet Security Engineers will install and configure IT Security devices, such as firewalls, IDS/IPS and user authentication measures tools, on your IT infrastructure, including outsourced or hosted facilities. We will verify that they operate properly and in accordance with your organizations security policy. SeNet’s professionals will analyze your facility’s physical security posture, identify deficiencies and propose measures for strengthening the facility protection. We can also implement the recommended improvements SeNet Security Analysts will evaluate your business needs and help you develop a strategy and measures to recover from natural and man-made disasters. We will develop the procedures and help you run readiness exercises to ensure that your IT staff and end users are familiar with them. Security breaches often occur despite having the latest technical security measures in End User and Admin-level place as a result of end-user carelessness or IT staff lack of knowledge. SeNet will deSecurity Awareness vise a security awareness training and education program that suits your IT infrastructure, your end-user environment and organizational culture. We will then deliver the Training training using modalities best suited to your budget and logistical constraints.