Switzerland under Attack
Transcription
Switzerland under Attack
Switzerland under Attack Werner Thalmeier Director, Security Solutions EMEA 7. April 2016 A Look Into Attack Motives Remember “C.H.E.W.”—Richard Clarke Cyber Crime Hacktivism Financial gain is the primary motive Driven by ideological differences Espionage Gaining information for political, financial, competitive leverage War Damage/destroy centers of power; military or nonmilitary Lines are blurring . . . “multi-motive” attacks Ironically – Evidently the more “secure”, your data risks a cyberattack 3 Over 90% Experienced Attacks in 2015 Half of organizations experienced DDoS and Phishing attacks Almost half had Worm and Virus Damage One in ten have not experienced any of the attacks mentioned DDoS 51% Phishing 50% Worm and Virus Damage 47% Unauthorized Access 34% Criminal SPAM 29% Fraud 25% Advanced Persistent Threat 23% Theft of Prop. Info./Intellectual… 15% Corporate/Geo-political Sabotage 7% None of the above 9% 0% 10% 20% 30% 40% 50% 60% Source: Radware ERT Report 2015 Increased Attacks on Education and Hosting Comparing to 2014 Most verticals stayed the same Education and Hosting – increased likelihood Growing number of “help me DDoS my school” requests Motivations varies for Hosting – Some target end customers – Some target the hosting companies 2015 Source: Radware ERT Report 2015 Change from 2014 Increase in Ransom as a Motive for Cyber-attacks More than 50% increase in ransom as a motivator for attackers Motivation behind cyber-attacks is still largely unknown 70% 60% 50% 40% 30% 20% 10% 0% 69%66% 2014 2015 34%34% 27%27% 25% 22%25% 16% One-third cited political/hacktivism About a quarter referenced competition, ransom, or angry users Q: Which of the following motives are behind any cyber-attacks your organization experienced? Burst Attacks on the Rise More than half of the three biggest attacks experienced lasted 1 hour or less Significant increase from the 27% in 2014 60% 57% 40% 36% 20% 4% Another indication of increased automated attacks 1% 0% 1 hour or less 1 hour to 1 day 2011 Source: Radware ERT Report 2015 2% 2012 1 day to 1 week 2013 Over a week Constantly 2014 2015 Q: What are the three biggest cyber-attacks you have suffered: Duration? Similar Frequency for Network and Application Attacks 100% 80% 60% 40% 20% 0% Network Attacks Application Attacks 19% 22% 22% 43% 17% 20% 22% 23% 25% 17% 20% 42% 37% 38% 21% 22% 24% Rarely-Never 11% 41% 38% 38% 38% 34% 52% 41% 35% 23% 25% 23% 23% 25% 15% 24% Network 38-42% experienced attacks daily, weekly or monthly Daily / Weekly / Monthly Application 38-52% experienced attacks daily, weekly or monthly Complexity of Attacks Continues to Grow Multi-vector attacks target all layers of the infrastructure “Low & Slow” DoS attacks (e.g.Slowloris) SQL Injections XSS, CSRF HTTP Floods Brute Force SSL Floods App Misuse Large volume network flood attacks Network Scan Internet Pipe On-Demand Cloud DDoS Syn Floods Firewall DoS protection IPS/IDS Load Balancer/ADC Behavioral analysis Server Under Attack IP S SSL protection SQL Server WA F Internet Pipe – #1 Failure Point Internet pipe is the bottleneck of DDoS attacks 36 % INTERNET PIPE (Saturation) 21% 10% FIREWALL Internet Pipe IPS/IDS Firewall 3% LOAD BALANCER (ADC) IPS/IDS Load Balancer/ADC 28% THE SERVER UNDER ATTACK Server Under Attack 2 % SQL SERVER SQL Server March 9th - Armada send ransom letter Armada is sending Ransom letter to Swiss Finance institutes They ask for 25 Bitcoins – 9.000,-€ or 9.800,- CHF Swiss GovCert issued an alert – http://www.govcert.admin.ch/blog/ At least one payed... Who is The Armada Collective? Background Either originating from DD4BC or acting as copy cat and using their methods. Focused on hosting providers, e-commerce, financial services primarily in Europe. Two companies we know already have been taken down. Strategy Customers will receive a ransom mail, asking for 30 bitcoins (5.600 € – 8.400 €). Warning attack follows within minutes. If payment refused, attacks increase to up to 1TB Targeted - Emails sent to dedicated and named internal recipients Do their homework – if victim has strong DDoS protection, they will not go after it. Only attack when they can create real damage Attack Methods Current vectors are amplification attacks (NTP, RIP Reflection Amplification) Warning attacks up to 20GB Risk Effected organizations have short time to act and prepare Very high risk – aggressive and professional attackers Proven results with high volume and taking down companies March 12th – Leading retailer and SBB became target Attacks persisted throughout the week for several companies – – – – – – – – – – Digitec.ch Fust.ch Microspot.ch Interdiscount.ch Denner.ch Leshop.ch Coop.ch Galaxus.com SBB.ch Brack.ch "It is correct that our Webshop did not work for a short time. We currently believe that it was a DDoS attack. We can confirm that the customer data is safe and not affected. The shop is now again," said Nadine, Media Spokesperson at Interdiscount. SBB, Interdiscount and Microspot went offline SBB Interdiscount Microspot Attack Vectors Focus on volumetric attacks on the network layer Network attacks typically exhaust network stack resources, router and switch processing capacity, and/or misuse bandwidth resources, all of which disrupt the victims’ network connectivity – – – – – – – – SSDP NTP DNS TCP RST TCP SYN SYN Flood SYN ACK ICMP Volumetric Attack – DNS Amplification • Most frequently used attack vector • Amplification affect • Regular DNS replies - a normal reply is 3-4 times larger than the request • Researched replies – can reach up to 10 times the original request • Crafted replies – attacker compromises a DNS server and ensures requests are answered with the maximum DNS reply message (4096 bytes) amplification factor of up to 100 times Parrot OS Attack Tool • Popular OS for hacker, like Kali Linux • • • • DNS NTP SNMP SSDP => All are reflective attacks Shenron Attack Tool Lizard Squads public stresser services 19,99$ => 15GB attack for 1200 second – DNS – SNMP – SYN Generic Stresser Attack Tool Unnamed stresser offered via a hacker on twitter telnet, UDP, ACK, Joomala and Portmap attacks They also offer additional services like Skype, domain, and Cloudflare resolvers VDoS Attack Tool One of the most popular tools 19,99 will gain access to 216 GBS Attack Network DNS, NTP, ESSYN, xSYN, TS3, TCPACK, Dominate, VSE, SNMP, PPS, Portmap and TCP-Amp We saw this tool also in Sweden Attacks Hybrid DDoS Mitigation Solution Perimeter Cloud Radware Cloud Scrubbing LAN Defense Messaging Attack Mitigation Device ADC Traffic Attack Attack isbaseline diverted isVolumetric immediately is and synchronized scrubbed DDoS detected attack to in the Radware’s and saturates cloud mitigated freeing internet Cloud at Scrubbing the pipe Perimeter internet Center pipe Radware’s Security Solution Addressing the Multi-Vector Challenge Radware Emergency Response Team 24x7 Security Experts On-Demand Cloud DDoS On-Demand Cloud DDoS Service DefensePipe +2TB mitigation capacity Hybrid or Standalone Models DoS protection Centralized Management & Reporting APSolute Vision Behavioral analysis IPS Attack Mitigation Device DefensePro Throughput ranging 200Mbps – 300Gbps SSL protection WAF Web Application Firewall AppWall, Cloud WAF Service Lessons Learned - Successful Attack Mitigation Proactive Preparation and Planning is Key Need for a Attack Mitigation solution with the widest coverage to protect from multi-vector attacks, including protection from network and application based DDoS attacks. Consider a hybrid solution that integrates onpremise detection and mitigation with cloudbased protection - to block volumetric attacks. Monitor security alerts and examine triggers carefully. Tune existing polices and protections to prevent false positives and accurate detection. A cyber-security emergency response plan that includes an emergency response team and process in place. Identify areas where helped is needed from a third party. A single point of contact is crucial when under attack - it will help to divert internet traffic and deploy mitigation solutions. Thank You [email protected] www.radware.com security.radware.com © Radware 2016
Similar documents
Protect the Internet Pipe with Radware`s Cloud Scrubbing
- Multiple scrubbing centers in the cloud provide global coverage - Single point of contact for emergency response - Post attack and full report analysis
More information