sim 302. unprepared uninformedunaware untrained unused

69
Lessons from Hackwarts Vol 1: Defence Against the Dark Arts 2011 Andy Malone MVP, MCT Senior Instructor [email protected] SIM 302

Upload: agnes-fields

Post on 11-Jan-2016

229 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SIM 302. Unprepared UninformedUnaware Untrained Unused

Lessons from Hackwarts Vol 1: Defence Against the Dark Arts 2011

Andy Malone MVP, MCTSenior [email protected]

SIM 302

Page 2: SIM 302. Unprepared UninformedUnaware Untrained Unused

Andy Malone (UK)

Microsoft Certified Trainer MCT (16 Years)Worldwide Security and Systems ConsultantMicrosoft Most Valuable Professional MVP Enterprise Security (5 Years)International Event SpeakerWinner Microsoft Speaker Idol 2006

Page 3: SIM 302. Unprepared UninformedUnaware Untrained Unused

Coming up in this Session

Lesson 1: Understanding The Changing WorldLesson 2: Learn Why Security FailsLesson 3: The Rise of the Socio Technical SocietyLesson 4: The Good Guy’s Wear Black! – From Cybercrime to Cyber-warfareLesson 5: Defending against Advanced Persistent Threats (APTs)Lesson 6: Defence Against the Dark ArtsConclusions

Page 4: SIM 302. Unprepared UninformedUnaware Untrained Unused

Lesson 1: Understand the Changing World…

Page 5: SIM 302. Unprepared UninformedUnaware Untrained Unused

The Changing World

The evolution of cloud computingIncreased mobile populationIncrease in organized crimeIncreased reliance on technologyProblematic border controlTechnological advances Increase in insider threatBreakup of traditional workforce to home based Focus on cost reduction!Evolution of cyber-warfare

Page 6: SIM 302. Unprepared UninformedUnaware Untrained Unused

Lesson 1: The Changing WorldLife in a cloud!

Page 7: SIM 302. Unprepared UninformedUnaware Untrained Unused

I Want It All and I Want It Now!

Page 8: SIM 302. Unprepared UninformedUnaware Untrained Unused

Lesson 2: Understand Why Security Fails…

Page 9: SIM 302. Unprepared UninformedUnaware Untrained Unused

Why Security Fails “The 5 U’s!”

Unprepared Uninformed Unaware

Untrained Unused

Page 10: SIM 302. Unprepared UninformedUnaware Untrained Unused

Security…I just Don’t get it!

Failure to Understand how Security Tools & devices actually Work!Failure to Understand Emerging Technologies e.g. Cloud etc.Inadequate TrainingFailure in Management to Understand “Security Value” to Overall BusinessSecurity Often Seen as a Needless Expense Source: Dreamtime

Page 11: SIM 302. Unprepared UninformedUnaware Untrained Unused

Hey Old Timer! Failure to understand current trends

E-mail/Texting…Huh? that’s so 90sMassive growth in social networking

Facebook 600m users!

Mobile phone apps – massive marketNext gen high speed protocol developmentsGeo location services (creepy)Near Field Communication (NFC)

Page 12: SIM 302. Unprepared UninformedUnaware Untrained Unused

Failure to Understand Current Security Trends

Spear Phishing attackMobile malwareFollow the moneyMobile banking, eWalletsFollow the moneyProliferation of devicesData centricityNothing forgotten,everything searchableImportance of IdentityGovernment comeback

DroidDream malware iPhone/Privacy

Page 13: SIM 302. Unprepared UninformedUnaware Untrained Unused

Lesson 3: The Rise of the Socio Technical Society…

Page 14: SIM 302. Unprepared UninformedUnaware Untrained Unused

Lesson 3: The Rise of the Socio Technical Society

The interaction between society's complex infrastructures and human behaviour

Page 15: SIM 302. Unprepared UninformedUnaware Untrained Unused

The Rise of the Socio Technical Society

For the first time in Human history, social networks have fundamentally changed the way the human being interactsEvolved social systems are changingto complex socio technical systemsIn the past we would only pass information to “close friends”, with technologies like Facebook this has become blurredResult = less control and less privacy

Page 16: SIM 302. Unprepared UninformedUnaware Untrained Unused

What is “Privacy”?

The enforcement/maintenance and control over their personal information (PII)Control over PII” means companies respect customer’s information by

Being transparent about how PII is gathered and usedAllowing customers to direct how we use their PIILimiting use of PIIProviding a means by which customers can update their PII to ensure accuracyStriving to keep PII secureWorking to ensure customers can access their data

Common privacy regulations e.g., customers comply with while using Microsoft Online

HIPAA, GLBA, FERPA, Mass 201, PIPEDA, and the EU Data Protection Directive along with the EU Model Clauses and security requirements in EU national privacy laws

Page 17: SIM 302. Unprepared UninformedUnaware Untrained Unused

The Rise of the Socio Technical Society

Gatherer/hunter

Learn

Communicate

Socio interactivity

Socio isolation

Loss of information control

Page 18: SIM 302. Unprepared UninformedUnaware Untrained Unused

Threats in the Socio Technical Society

STS Security is difficult to define let alone manageNew STS crimes are evolving at a frightening pace

Cyber stalkingCyber bullyingID theftFraud

Nobody really understands what security is!Nobody really knows how the security tools workSecurity focus is often too much on the “distant” attack – hacking, etc.

Page 19: SIM 302. Unprepared UninformedUnaware Untrained Unused

Welcome to Creepyville…

Page 20: SIM 302. Unprepared UninformedUnaware Untrained Unused

Data in the Socio Technical Society

Moore's Law rule is becoming blurredAlmost everything we do produces dataData is like nuclear waste, it’s cheap and thus NEVER depreciates, stays around forever!STS has allowed personal security to be breached because of a fundamental lack of understanding or control“Normal” security mechanisms fail because of these changes in human behaviour and interactivity

Page 21: SIM 302. Unprepared UninformedUnaware Untrained Unused

Lesson 4: Cyberwarfare… When the Good Guy’s Wear Black!

Page 22: SIM 302. Unprepared UninformedUnaware Untrained Unused

Think About This

What if the Internet went awayFor a dayA weekA month

No e-mailsNo BlackBerry’s (Er sorry, Windows Phones)No eCommerce

Virtual business services of all sorts, accounting, payroll, and even sales would come to a halt, as would many companies

Page 23: SIM 302. Unprepared UninformedUnaware Untrained Unused

War versus Cyberwar!

$1.5 to $2 billion

$80 to $120 million

What does a stealth bomber cost?

What does a stealth fighter cost?

$1 to $2 millionWhat does an cruise missile cost?

$300 to $50,000What does a cyber weapon cost?

Page 24: SIM 302. Unprepared UninformedUnaware Untrained Unused

Find the Weapons of Mass Disruption!

Nuclear Weapons Facility Cyber Weapons Facility

Where’s the Cyber Weapons Facility?

Page 25: SIM 302. Unprepared UninformedUnaware Untrained Unused

Cyber-WarfareWhy!

The Internet is vulnerable to attackHigh return on investmentInadequacy of cyber DefencesPlausible deniabilityParticipation of non-state actors

Page 26: SIM 302. Unprepared UninformedUnaware Untrained Unused

The Internet is Vulnerable to Attack

Imperfect designHackers can read, delete, and modify information on or traveling between computersCommon vulnerabilities and exposures (CVE)Database grows dailyDifficult to guard all holes into your network

Page 27: SIM 302. Unprepared UninformedUnaware Untrained Unused

Plausible Deniability

Maze-like architecture of InternetInvestigations often find only hacked box

Smart hackers route attacks throughMultiple routes/servers

Poor diplomatic relationsNo law enforcement cooperation

The problem of the last hop, retaliation

Page 28: SIM 302. Unprepared UninformedUnaware Untrained Unused

Cyber Warfare Tactics

EspionagePropagandaDenial-of-Service (DoS)Data modificationInfrastructure manipulation

Page 29: SIM 302. Unprepared UninformedUnaware Untrained Unused

(1) The New Espionage

Universal media and intelligence gathering

Binoculars, satellites, mass media, NMAP?Territorial sovereignty not violatedMetadata and reading between the linesPicture taking, not physical invasion… right?If indefensible, normally not espionage!

Page 30: SIM 302. Unprepared UninformedUnaware Untrained Unused

Top Tip: Counter-Surveillance Techniques

Check for mysterious holes or spots on objects in the room, such as books, cases, folders, electronic goods, conduits, alarm systems, soft furnishings, etc.Do any objects look out of place? Are any objects alien to the type of room that you’re in? Is the object meant to be there? Something could be concealed in that objectWith respect to flooring, ceilings, walls and furniture, are any panels lose or have been tampered with?Are you getting interference on any TVs, radios, phones or wireless networks? This might indicate a nearby electronic deviceCheck cables for computers, TVs, video systems, networks, etc. for Keyloggers, tampering or splicing

Page 31: SIM 302. Unprepared UninformedUnaware Untrained Unused

(2) Propaganda

Easy, cheap, quick, safe, powerful

Audience is the worldDrop behind enemy linesDoes not need to be true

Recruitment, fund raising, hacktivism

Censored information replaced in seconds

Tech expanding rapidly (multimedia, Skype, etc.)Appearance of technical prowess!

Page 32: SIM 302. Unprepared UninformedUnaware Untrained Unused

(3) Denial of Service (DoS)

Simple strategyDeny computer resource to legitimate usersMost common: flood target with bogus data so it cannot respond to real requests for services/info

Other DoS attacksPhysical destruction of hardwareElectromagnetic interference designed to destroy unshielded electronics via current or voltage surges

Page 33: SIM 302. Unprepared UninformedUnaware Untrained Unused

(4) Data Modification

The Holy Grail of HacksControl weapons, command and control (C2) systems and you control everything!

 Extremely dangerousLegitimate users (human or machine) may make important decisions based on maliciously altered information

Website defacement“Electronic graffiti” can carry propaganda or disinformation

Page 34: SIM 302. Unprepared UninformedUnaware Untrained Unused

(5) Infrastructure ManipulationCritical infrastructures connecting to Net

SCADA: Supervisory Control and Data Acquisition; refers to industrial control systems: computer systems that monitor and control industrial, infrastructure, or facility-based processesSCADA security may not be robustElectricity especially importantInfrastructure in private handsSeized hard drives: Microstran, AutoCAD, etc.White House briefed on certain 0-days

Page 35: SIM 302. Unprepared UninformedUnaware Untrained Unused

Lesson 5: Defending against (APT) Advanced Persistent Threats…

Page 36: SIM 302. Unprepared UninformedUnaware Untrained Unused

Advanced Persistent Threat: What’s that?

The APT as a group of sophisticated, determined and coordinated attackers that have been systematically compromising U.S. Government and Commercial networks for years. The vast majority of APT activity initially observed by Mandiant has been linked to AsiaAPT is a term coined by the U.S. Air Force in 2006

Page 37: SIM 302. Unprepared UninformedUnaware Untrained Unused

Advanced Persistent Threats

Internet malware infectionsDrive-by downloadsE-mail attachmentsFile sharingPirated software and keygenSpear PhishingDNS and Routing Mods

Physical malware infectionsInfected USB memory sticksInfected CDs and DVDsInfected memory cardsInfected appliancesBackdoor IT equipment

External exploitationProfessional hackingMass vulnerability exploitsCo-location host exploitationCloud provider penetrationRogue Wi-Fi penetrationSmartphone bridging

Insider threatRogue employeeMalicious sub-contractorSocial engineering expertFunded placementCriminal break-in Dual-use software installation

Trusted connectionsStolen VPN credentialsHijacked roaming hostsB2B connection tappingPartner system breachesExternally hosted system breachesGrey market network equipment

Page 38: SIM 302. Unprepared UninformedUnaware Untrained Unused

APT Delivery Systems

Worms – software that spreads on own with harmful consequencesVirus – malware attached to other software (e.g., e-mail attachment)Trojan horse – software that appears to be positive but have harmful effectsLogic bomb – software planted to activate at a later date/time with harmful consequencesAdvanced Persistent Threats (APTs) is a term coined by the U.S. Air Force in 2006

Page 39: SIM 302. Unprepared UninformedUnaware Untrained Unused

APTs Objectives

Political Includes suppression of their own population for stability

EconomicTheft of IP, to gain competitive advantage

TechnicalObtain source code for further exploit development

MilitaryIdentifying weaknesses that allow inferior military forces to defeat superior military forces

Page 40: SIM 302. Unprepared UninformedUnaware Untrained Unused

APT’s: Understand Targeting and Exploitation Cycle

Step 1

Reconnaissance

Step 2

Initial intrusion into the network

Step 3

Establish a backdoor into

the network

Step 4

Obtain user credentials

Step 5

Install various utilities

Step 6

Privilege escalation /lateral

movement /data exfiltration

Step 7

Maintain persistence

Page 41: SIM 302. Unprepared UninformedUnaware Untrained Unused

Reconnaissance

In multiple cases, example company Mandiant identified a number of public website pages from which a victim’s contact information was extracted and subsequently used in targeted social engineering messages

Page 42: SIM 302. Unprepared UninformedUnaware Untrained Unused

Initial Intrusion into the Network

Most malware attacksHave no iconsNo description or company nameUnsigned Microsoft imagesMost Live in Windows Directory or System32, Update,Typically are Packed, Compressed or Encrypted (UP0 Signature)Many Include Strange URLs in StringsMany have open TCP/IP Endpoints (ET phone home)Most Host suspicious services or DLLs

Page 43: SIM 302. Unprepared UninformedUnaware Untrained Unused

Establish a Backdoor into the Network

Attempt to obtain domain administrative credentials… transfer the credentials out of the networkThe attackers then established a stronger foothold in the environment by moving laterally through the network and installing multiple backdoors with different configurationsThe malware is installed with system level privileges through the use of process injection, registry modification or scheduled services

Page 44: SIM 302. Unprepared UninformedUnaware Untrained Unused

Obtain User Credentials

The attackers often target domain controllers to obtain user accounts and corresponding password hashes en-masseThe attackers also obtain local credentials from compromised systemsThe APT intruders access approximately 40 systems on a victim network using compromised credentials

Page 45: SIM 302. Unprepared UninformedUnaware Untrained Unused

Privilege Escalation/Lateral Movement/Data Exfiltration

Once a secure foothold has been established

Exfiltration data such as e-mails and attachments, or files residing on user workstations or project file serversThe data is usually compressed and put into a password protected RAR or Microsoft Cabinet FileThey often use “Staging Servers” to aggregate the data they intend to stealThey then delete the compressed files they exfiltrated from the “Staging Servers”

Page 46: SIM 302. Unprepared UninformedUnaware Untrained Unused

Maintain Persistence

Page 47: SIM 302. Unprepared UninformedUnaware Untrained Unused

Top Tip: Malware – Know What to Look For!

Typical malware characteristicsMalware is continually updatedUsually have no icons, description or company nameLive in the Windows Directory or System32, UpdateMalware uses encryption and obfuscation techniques of its network trafficThe attackers’ malware uses built-in Microsoft librariesThe attackers’ malware uses legitimate user credentials so they can better blend in with typical user activityDo not listen for inbound connections Often include Strange URLs in StringsHas open TCP/IP EndpointsHost suspicious services or DLLs

Page 48: SIM 302. Unprepared UninformedUnaware Untrained Unused

Top Tip: How to Get Rid of Malware

Disconnect from networkIdentify malicious processes and driversEnd suspend and terminate identified processesIdentify and delete malware and auto startsDelete malware filesReboot and repeat

Page 49: SIM 302. Unprepared UninformedUnaware Untrained Unused

Cyberwarfare: Three Real World Examples

Page 50: SIM 302. Unprepared UninformedUnaware Untrained Unused

1) Google (2009 – 2010)

Highly sophisticated and targeted attack originating from China that resulted in the theft of intellectual property At least twenty other large companies have also been targeted Suggestions that primary goal was to access Gmail accounts of Chinese human rights activistsDiscovered accounts of dozens of U.S., China, and Europe-based Gmail users who are advocates of human rights in China appear to have been routinely accessed by third parties These attacks and surveillance have uncovered attempts over the past year to further limit free speech on the web – have led us to conclude that we should review the feasibility of it’s business operations in China

http://googleblog.blogspot.com/2010/01/new-approach-to-china.html

Page 51: SIM 302. Unprepared UninformedUnaware Untrained Unused

Thanks to Dreamtime

Page 52: SIM 302. Unprepared UninformedUnaware Untrained Unused

2) The Stuxnet Worm

Very complex Windows-specific computer worm that infects computers and connected industrial control equipment (PLCs)First known worm to attack industrial infrastructureSpreads through USB thumb drives as well as network connectionsUtilizes four “zero-day” exploitsUses stolen valid security certificates

Page 53: SIM 302. Unprepared UninformedUnaware Untrained Unused

(2) The Stuxnet Worm

Thanks to BBC.co.uk

Page 54: SIM 302. Unprepared UninformedUnaware Untrained Unused

(3) Estonia (April 2007)

Sometimes referred to as “Web War 1”Followed Estonia relocating the Bronze Soldier of Talinn, a Russian monumentSophisticated and large set of denial of service (DoS) attacks on Estonian parliament, banks, ministries, newspapers, other web sitesSevere effect on above institutions for approximately three weeks

Page 55: SIM 302. Unprepared UninformedUnaware Untrained Unused

demo

Tools of the Trade

Page 56: SIM 302. Unprepared UninformedUnaware Untrained Unused

Lesson 6:Defence Against the Dark Arts…

Page 57: SIM 302. Unprepared UninformedUnaware Untrained Unused

First Understand the Difficulties in Defense

Most networks have many entry points to internetEncryption is not a silver bulletDifficult to trace attacksMany from robot networks (botnets) of compromised PCsInternet created for convenience, not securityInternet technology does not support easy defenseUnknown capabilities of other nations, criminal gangs/groupsLittle deterrence existsDefenders have to defend against many possible attacks, but attackers only have to find one hole

Page 58: SIM 302. Unprepared UninformedUnaware Untrained Unused

Difficulties in Defense

Internet created in an environment of intellectual freedom, mostly under private (not government) control

Efforts to change – e.g., “Kill Switch” bill (2010) in Congress giving government power to take over parts of internet in national emergencyOther countries can more easily mount Defense (e.g., fewer entry points, government can already control networks)

Military cyber-capabilities are significantly focused on offense, not Defense

Page 59: SIM 302. Unprepared UninformedUnaware Untrained Unused

Use Risk Management Techniques?

Ensures good management practiceProcess steps that enable improvement in decision makingA logical and systematic approachIdentifying opportunitiesAvoiding or minimising losses

RiskManagement

Page 60: SIM 302. Unprepared UninformedUnaware Untrained Unused

Security Planning is Everything…

Conduct regular business risk analysis Adopt security policiesDesign and implement an in-depth security solutionEnsure physical securityUnderstand firewall rulesService packs/patching/anti virusDeploy intrusion prevention system (IPS)Secure mobile devices/laptops

Page 61: SIM 302. Unprepared UninformedUnaware Untrained Unused

Adopt a Multi-Layered Defense

Security Management Threat and Vulnerability Management, Monitoring and Response

Edge Routers, Firewalls, Intrusion Detection, Vulnerability ScanningNetwork Perimeter

Dual-factor Authorization, Intrusion Detection, Vulnerability ScanningInternal Network

Access Control and Monitoring, Anti-Malware, Patch and Configuration ManagementHost

Secure Engineering (SDL), Access Control and Monitoring, Anti-MalwareApplication

Access Control and Monitoring, File/Data IntegrityData

User Account Management, Training and Awareness, Screening

Facility Physical Controls, Video Surveillance, Access Control

Strategy: Employ a risk-based, multi-dimensional approach to safeguarding services and data

Page 62: SIM 302. Unprepared UninformedUnaware Untrained Unused

Review

Lesson 1: Understanding The Changing WorldLesson 2: Learn Why Security FailsLesson 3: The Rise of the Socio Technical SocietyLesson 4: The Good Guy’s Wear Black! – From Cybercrime to Cyber-warfareLesson 5: Defending against Advanced Persistent Threats (APTs)Lesson 6: Defence Against the Dark ArtsConclusions

Page 63: SIM 302. Unprepared UninformedUnaware Untrained Unused

My Other Sessions…

SIM 301 Monty WiFion and the Quest for the Holy Grail of Network Security!

SIM 302 Lessons from Hackwarts Vol 1: Defense against the Dark Arts 2011

SIM 327 Rethinking Cyber Threats: Experts Panel

Find Me Later At…

Page 64: SIM 302. Unprepared UninformedUnaware Untrained Unused

Andy Malone (UK)

E: [email protected]: AndyMaloneLinkedIn: Andy Malone (UK)

Thanks For Listening & Enjoy TechEd!

Page 65: SIM 302. Unprepared UninformedUnaware Untrained Unused

Safety and Security Centerhttp://www.microsoft.com/security

Security Development Lifecyclehttp://www.microsoft.com/sdl

Security Intelligence Reporthttp://www.microsoft.com/sir

End to End Trusthttp://www.microsoft.com/endtoendtrust

Trustworthy Computing

Page 66: SIM 302. Unprepared UninformedUnaware Untrained Unused

Resources

www.microsoft.com/teched

Sessions On-Demand & Community Microsoft Certification & Training Resources

Resources for IT Professionals Resources for Developers

www.microsoft.com/learning

http://microsoft.com/technet http://microsoft.com/msdn

Learning

http://northamerica.msteched.com

Connect. Share. Discuss.

Page 67: SIM 302. Unprepared UninformedUnaware Untrained Unused

Complete an evaluation on CommNet and enter to win!

Page 68: SIM 302. Unprepared UninformedUnaware Untrained Unused

Scan the Tag to evaluate this session now on myTech•Ed Mobile

Page 69: SIM 302. Unprepared UninformedUnaware Untrained Unused