building an android scale incident response process

45
MBS-R03 Building an Android Scale Incident Response Process Adrian Ludwig Lead - Android Security

Upload: priyanka-aash

Post on 13-Apr-2017

227 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Building an Android Scale Incident Response Process

MBS-R03

Building an Android Scale Incident Response Process

Adrian LudwigLead - Android Security

Page 2: Building an Android Scale Incident Response Process

Who am I?

Android

Protect 1.5 Billion+ Users

Adobe

Protect the web

NSA

Offense

@stake

Offense for Hire

Page 3: Building an Android Scale Incident Response Process

Goals

Describe strategies we’ve developed for incident response

Share thought process and lessons learned

Include Android-specific considerations (case studies)

Page 4: Building an Android Scale Incident Response Process

The Incident Response Process

Take Action Establish Situational Awareness

Accept Risk

Eliminate Risk

Manage the Risk

Environment

Actors + Actions

Risks

Data

Page 5: Building an Android Scale Incident Response Process

The Android Ecosystem

1.5B+Android

30DA Users

300M+Users added

in 2015

50B+App downloads

in 2015

600+New devices

launched in 2015

Page 6: Building an Android Scale Incident Response Process

Ecosystem

OEMs

Carriers

SOCs

App Developers

Security Team

Product Engineering + QA

PR / Communications

Operations + Support

Executives

Legal

Consumers

Enterprises

Press

Researchers

Governments

Security Companies

The Good The Bad The Ugly

Attackers

Attackers

Malware Authors

Thiefs

Opportunists

Network MITM

Complex Actors

Actors

Page 7: Building an Android Scale Incident Response Process
Page 8: Building an Android Scale Incident Response Process

Malware

Vulnerabilities

Local Exploits

Hardware / Physical Attacks

Remote Exploits

Network Traffic Interception

Supply chain compromise

Threats

Page 9: Building an Android Scale Incident Response Process

Data Sources

Billions of new pieces of data including apps, developers, app behavior, relationships, and third-party analyses are added every day.

Verify Apps

Android Safety Net

Android Device Manager

Google Play

Safebrowsing for Chrome

Page 10: Building an Android Scale Incident Response Process

Platform

Build Features

Attack

Find Bugs

Review

Trust, but Verify

Respond

Fix bugs

App Review

Improve App Safety

SafetyNet

Endpoint Protection

Organization

Page 11: Building an Android Scale Incident Response Process

Google Public

Statement

Google Play Update

Google Service Update

(Verify Apps, SafetyNet)

Patch to AOSP

Warn users

Joint statement with partners

Major 3rd Party App Patch

Publish Research

Change an API

Patch a Google app

Publish a best practice

3rd Party Apps (Google Play)

Ecosystem Wide patch delivery

3rd Party App Upgrade

Release a major update

Nexus Update

Warn developers

Responses

And many more...

Page 12: Building an Android Scale Incident Response Process

Frequency

How often is the threat realized?

Velocity

How quickly is a threat realized?

Scope

What portion of the ecosystem is at risk?

Impact

What happens if a threat is realized?

Strategy Lenses

Page 13: Building an Android Scale Incident Response Process

Incident Frequency

Page 14: Building an Android Scale Incident Response Process

Incident Frequency

Monthly Thousands/dayDaily

● Media / Press Reaction● New Exploit

(Remote)

Yearly (or less)

● Publicly Disclosed Vulnerability

● Lost / Stolen Device

● 0-day Malware

● New Exploit (Local)

● Copycat malware

Weekly

Rare

Common? Traffic Interception? Supply Chain Compromise

Page 15: Building an Android Scale Incident Response Process

Change the attacker economics

Move the target

Strategies to Reduce Frequency

Page 16: Building an Android Scale Incident Response Process

“Smart phone thefts rose to 3.1 million in 2013”

Source: Consumer Reports

Page 17: Building an Android Scale Incident Response Process

Responses

PreventReact

Lockscreen

Encryption

Factory Reset Protection

Device Manager

“Find my phone”

“Lock my phone”

“Wipe my phone”

2.5 Million Monthly Users of Device Manager “Find my Phone”

Lockscreen usage up 50% between 2014 and 2015 Nexus devices

Encryption and FRP Enabled by default

Page 18: Building an Android Scale Incident Response Process

Source: Consumer Reports

Smart phone thefts declined from 3.1 in 2013 to 2.1 million in 2014

Page 19: Building an Android Scale Incident Response Process

g.co/AndroidSecurityRewards$200,000 paid in 2015

Up to $38,000per security issue

Page 20: Building an Android Scale Incident Response Process

Incident Velocity

Page 21: Building an Android Scale Incident Response Process

Incident Velocity

HoursWeeks DaysYears Months

Slow

Instant

● Media / Press Reaction

● New Exploit Developed (remote)

● Lost / Stolen Device

● 0-day Malware

● New Exploit Developed (Local)

● Copycat malware

● Publicly Disclosed Vulnerability ? Traffic Interception

? Supply Chain Compromise

Page 22: Building an Android Scale Incident Response Process

Centralize your response

Batching and Cadence

Quality and Automation

Strategies to Reduce Velocity

Page 23: Building an Android Scale Incident Response Process

Monthly Security Updates

3 years from device availability

Monthly Security Bulletins

Page 24: Building an Android Scale Incident Response Process
Page 25: Building an Android Scale Incident Response Process

Month 0 Month 1 Month 2

Partner Bulletin(Patch, Backports, Severity Guidance)

Compatibility Requirement

Public Security Bulletin

AOSP Updated Device OTAs Begin

Issue

foun

d Patc

h dev

eloped

Backp

ort

Other Remediations: SafetyNet, Google Play, Verify Apps

OEM Integration Testing

Carrier Testing

Android Security Monthly Process

Page 26: Building an Android Scale Incident Response Process

Incident Impact

Page 27: Building an Android Scale Incident Response Process

Incident Impact

Perception Limited Partial Months CompleteRecoverable

Potential

Realized

● Media / Press Reaction

● New Exploit (remote)

● Lost / Stolen Device

● 0-day Malware

● New Exploit (Local)

● Copycat malware

● Publicly Disclosed Vulnerability

? Traffic Interception

? Supply Chain Compromise

Page 28: Building an Android Scale Incident Response Process

Provide a safer path

Isolate high risk components

Focus on recovery

Strategies to Reduce Impact

Page 29: Building an Android Scale Incident Response Process

SecurityProvider :

GmsCore_OpenSSL

SafetyNetApi.attest

Developer APIs

Page 30: Building an Android Scale Incident Response Process

Developer Security Warnings

85% Reduction in Installs of Vulnerable Apps in 2015

Page 31: Building an Android Scale Incident Response Process

Root Root Root Root Root Root

System

System

System

System

System

System

Kernel

Hardware

Trust Zone

Phone Messaging

Contacts Email Google Play

Phone Messaging

Contacts Email Google Play

User 1

User 2

Isolation at every level

Page 32: Building an Android Scale Incident Response Process

Focus on recovery

Verified Boot + SafetyNet =

Page 33: Building an Android Scale Incident Response Process

Incident Scope

Page 34: Building an Android Scale Incident Response Process

Incident Scope

Probabilistic One Device One Model Months All DevicesPlatform Version

● Media / Press Reaction

● New Exploit (remote)

● Lost / Stolen Device

● 0-day Malware

● New Exploit (Local)

● Copycat malware

● Publicly Disclosed Vulnerability

? Traffic Interception

Few

Many? Supply Chain

Compromise

Page 35: Building an Android Scale Incident Response Process

Add Speed Bumps

Embrace diversity

Reduce Incident Scope

Page 36: Building an Android Scale Incident Response Process

Sandbox & permissions

Runtime Security Checks

Verify Apps Warning

Verify Apps Consent

Install Confirmation

Unknown Sources Warning

Google Play

Page 37: Building an Android Scale Incident Response Process

Application Review

Google Web CrawlerGoogle Play <Others>

Application Scanner

Collect Apps

Analyze Apps

Suspend Apps Notify DevelopersEnforcement

Page 38: Building an Android Scale Incident Response Process

Application scanner details

Static analysis Dynamic analysis Machine learning Intelligence- based discovery

Signature-based discovery

Page 39: Building an Android Scale Incident Response Process

80% Reduction of Russian Bank Phishing Trojans

Infected devices in RussiaInfected devices worldwide

Page 40: Building an Android Scale Incident Response Process

ASLR

Update Frequently

Coordination is the most important (and difficult) part of incident response.

Intentional Natural

OEM

SOC

Hardware Architecture

Build Time Changes

Embrace Diversity

Page 41: Building an Android Scale Incident Response Process

Vulnerability Initial Claim HeadlineUnique

APKs

Peak exploitation after public release (per

install)

Exploitation before public release

(absolute)

Master Key99% of devices

vulnerable1231 < 8 in a million 0

FakeID82% of Android users at

risk258 <1 in a million 0

Stagefright95% of devices

vulnerableN/A None confirmed N/A

Source: Google Safety Net Data; Masterkey data collected from 11/15/2012 to 8/15/2013 and previously published at VirusBulletin 2013. Fake ID data collected data collected from 11/15/2012 to 12/11/2014 and previously published at the RSA Conference 2015. Stagefright data current through February 2016.

Predicting “real” scope is hard

Page 42: Building an Android Scale Incident Response Process

To recap

Page 43: Building an Android Scale Incident Response Process

Frequency

Use economicsChange the target

Velocity

CentralizeBatch and Cadence

Automate

Scope

Speed BumpsDiversity

Impact

Another PathIsolationRecovery

Strategy Lenses

Page 44: Building an Android Scale Incident Response Process

Key Learnings

Execute existing responses, try

new ones

Identify incident features

Analyze response effectiveness,

Incident Response

Response Feedback

● Use data as your source of truth (not stories!)

● Look for new responses ( think offensively!)

● Try not to get lost in the details (this is hard!)

Page 45: Building an Android Scale Incident Response Process

Thank [email protected]