HIRT: Annual Report 2010
|
|
|
- Caren Brooks
- 9 years ago
- Views:
Transcription
1 Hitachi Incident Response Team :47:37 +9'' HIRT: Annual Report 21 HIRT: Annual Report 21 Hitachi Incident Response Team (HIRT) Kashimada 89, Saiwai, Kawasaki, Kanagawa, Japan 1 Introduction The last ten years of the CSIRT's efforts to fight cyber attacks in Japan can be divided into two phases (Figure 1). The first phase is the acknowledge phase. During this phase, looking at the CSIRT activities developed in the U.S., we introduced the idea of "incident response", where people would handle an incident based on a predefined plan. The second phase is the predawn phase, where Japanese CSIRT got in gear with the feedback from the experience of dealing with network worms that ran riot between 21 and 23. During this phase, the basis of the CSIRT's activities in Japan that reflected our regionality has started to develop, such as the launch of the Information Security Early Warning Partnership, release of the Vulnerability Information Database JVN (Japan Vulnerability Notes) and establishment of Nippon CSIRT Association. On the other hand, cyber attacks continued to develop and their targets began to shift from the operating systems to software applications, especially to web applications. Malicious programs have evolved into more advanced forms, such as malware-infected attachment files, network worms and bots, improving technology for good or bad. In addition, like web malware and USB malware, attacks that exploit vulnerability in the Internet users' psychology and behavior and use it for advantage have become common since around 28. Launch of HIRT Project Considering the change in the nature of incidents, the next five years should be used to penetrate the CSIRT activities into Japan, understanding our regionality. We should also go forward to develop a new trust model between the local CSIRTs and international counterparts. The requirements we think a CSIRT must satisfy to promote vulnerability countermeasure approach and incident response are that it can "predicting and alerting from a technical point of view", "making technical coordination" and "collaborating with external communities on the technical aspects". Here, we do not assume some special occasions. The role of a CSIRT is to "catch the emerging threats and take actions as early as possible" using the experience of incident response operations, where predicting and preventing the damage from possible incidents and implementing the security measures to mitigate the damage should it happen. As an entity that has the necessary skills and the part and as the Hitachi Group's single point of contact for the CSIRT activities, HIRT (Hitachi Incident Response Team) is responsible to lead the fight against vulnerability in products and services and incident response for malware infection and information leakage, and to advance Hitachi's brand image in the security field. This report will introduce a summary of the vulnerabilities and threats and the activities of HIRT in 21. Establishment of HIRT Center [ Local CSIRT Activities ] Acknowledge Phase Predawn Phase Settlement Phase Homogeneous, wide-spread, chain reaction damage Malware-infected attached files Network worms Different and localized damage for each attack Targeted attacks Strategic Attacks Vulnerability in software applications Vulnerability in users' psychology and behavior [ Characteristics of Incident ] Homogeneous, wide-spread, one-shot damage Website defacement [ Targeted Vulnerability ] Vulnerability in operating systems [ HIRT Activities ] Establish an IRT model through the dissemination of vulnerability countermeasure/incident response information Participate in the Information Security Early Warning Partnership through the establishment of a virtual organization structure based on the concept of four IRTs Development of an collaboration model through participation in the international IRT activities (FIRST, WARP) and local IRT activities (Nippon CSIRT Association) Integrate users, products and service areas through coordination of technology, contents and operation and mitigate the issues regarding vulnerability countermeasure approach and incident response Develop a trust model through international and local IRT activities Figure 1: Change in Incidents and HIRT Activities. Copyright Hitachi Incident Response Team (HIRT) All rights reserved.
2 2 Overview of activities in 21 This section focuses on HIRT activities in Overview of Threats and Vulnerabilities (1) Overview of Threats In 21, the attacks that targeted a specific organization (targeted attack) and used an organization's internal network as an attack base (stealth attack) gathered attention, such as the attack that exploited the vulnerabilities in Internet Explore in January (so-called Operation Aurora) and the emergence of Stuxnet in July that targeted control systems. The known threats like web malware (e.g. Gumblar) and USB malware (e.g. Conficker) have continued to cause damage. Especially, in September 21, a large-scale malware infection occurred caused by the contents generated by web service combination (mash-up). The incident showed that we needed to consider security measures from the unique viewpoint of the web services. APT: Advanced Persistent Threats (advanced, stealth attacks that target specific organization) APT is a collective term for "attacks that target a specific organization (targeted attack) and use an organization's internal network as an attack base (stealth attack)". After the "attacks that exploited the vulnerabilities in Internet Explore in January (so-called Operation Aurora)", the term has become well known [1]. The term APT was used earlier in around April 28, in the article "An Evolving Crisis" in the Bloomberg Businessweek magazine. The term is used to explain a new attack method seen in the Byzantine Foothold operations [2] that have started around 26 and targeted the U.S. government and defense industries. The characteristics of a new attack method are that it uses whatever resource available for attack, that it is advanced and sophisticated, that the target is clear and that it never gives up. The name APT reflects those characteristics [3]. In Japan, in an IPA report "Report on APT" released in December 21, it is defined as "attacks that are persisting, viciously exploit vulnerability, combine multiple attack methods tactfully, target a particular business or person through social engineering, and are therefore very difficult to deal with" [4]. In many cases, APT is an attack method that combines the 'common attacks' that are composed of common attack techniques to breach the target system and the 'customized attacks' that are composed of specialized attack techniques to attack the target system (Figure 2). As shown in Figure 3, the attack against more than 3 corporations including Google, Adobe, Symantec and Yahoo, aimed to steal intellectual property in January 21, was composed of the common attacks (1) to (2) that exploited vulnerability in Internet Explorer (MS1-35) and the customized attack (6) that attacked a software configuration management system. Likewise, in the case of Stuxnet that targeted a control system in July 21, after the attacker breached the information network via a USB malware attack exploiting Windows vulnerability, the attack was composed of the common attack (1) and (2) to breach the control information network and the customized attack (3) and (4) to breach the control network and disrupt the operation of the control system as shown in Figure 4. The common attacks use various attack techniques and they are designed to bypass the traditional countermeasures. On top of this, since an APT attack is versatile and can change the customized attack part accordingly to its target, it will continue to be a big threat. A P T It starts as a targeted attack using social engineering. Send an or instant message from a trusted source that includes a link and lure the target to a malicious website. (>>Gumblar) Use a USB malware and exploits the Windows vulnerabilities. (>>Conficker) While being stealthy, the malware keeps a communication environment it can communicate with external computers. Communicates with a command and control server. Downloads new features or files to update itself. The final goal (final threat) differs depending on the target. Attack the software configuration management system (>> Operation Aurora) Disrupt the control system's operation (>> Stuxnet) Steal classified information (>> Night Dragon, RSA SecureID incident) Common Attacks Customized Attacks Figure 2: APT = Common Attacks and Customized Attacks. Software Configuration Management System Information Network Common Attacks Customized Attacks (6) (5) (3) (1) (4) (2) (1) Sends an or instant message from a trusted source that includes a link (2) Redirect the target to a website embedded with malicious JavaScript code upon clicking the link (3) Malicious JavaScript code that exploits vulnerability in Internet Explorer (MS1-35) is executed (4) Download a new binary and execute it (5) Setup a backdoor and communicate with the command and control server (6) Attack the software configuration management system (such as Perforce) accessible from the breached system Figure 3: Operation Aurora Scenario. Copyright HIRT All rights reserved. 2
3 PLC 6ES PLC 6ES index.html Legitimate website (without injection) Legitimate Website <script src= </script> Control Network (2) Control Information Network Information Network (1) SIMATIC WinCC (3) SIMATIC STEP 7 Process Computer SIMATIC PCS js Legitimate website access is redirected to the malicious website Exploit code and malware Injected Advertisement Website Injection Injected Malicious Code Malicious Website document.write( // 広 告 表 示 '<script src= document.write( " '<img src="nca.jpg />); </script>'); Exploit code and malware (1) USB Interface (1) (1) Breach the information network Spread infection exploiting vulnerabilities in Windows (MS8-67, MS1-46, MS1-61, Common MS1-73, MS1-92) Attacks (2) Breach the control information network Win Infect SIMANTIC WinCC, PCS7 and STEP7 exploiting vulnerabilities in Windows and Siemens software (CVE ) (3) Infect the control network Exploit a Siemens software (SIMANTIC Step7), insert a malicious code into PLC (programmable Customized Logic Controller) Attacks (4) Disrupt the control system's operation Change the output frequencies for short periods of time over the months >>> disrupt the operation of the control system Figure 4: Control System Attack Scenario (Stuxnet). Web Malware exploiting Mash-up An attack exploiting mash-up is a technique that guides users who have visited a website to a malicious website and infects their PC with malware without their knowledge by altering a component file stored on the other website. For example, if an advisement file that the website displays is altered (embedded with a malicious code to guide to the malicious website), the users' browser will load the malicious website by executing the malicious code (Figure 5). If the advertisement file is linked by many websites, a single alteration can achieve the same result with the alteration of nth number of websites, and impact will be broad. Also, since the advertisement file is stored on the other website and it would be difficult for the website administrator to find the cause, a countermeasure from a unique viewpoint of the web services, in this case, mash-up, is necessary. Figure 5: Web Malware Exploiting Mash-up Conficker Conficker emerged as a worn that exploited Vulnerability in Windows, "Server Service Could Allow Remote Code Execution (MS8-67)" in around November 28. In December 28, by modification of Conficker (enhanced with the feature to infect via a USB memory stick), infection spread to the closed networks via a physical meditational means. Since 29, the number of reports on the USB malware infection in Japan has been decreasing (Figure 6) [5]. However, according to the report of the Conficker Work Group, the number of computers infected with Conficker is about 5 million on the IP address base (Figure 7) [6]. Considering such situation, in addition to the deployment of security guards (implementation of antivirus software) and training of security guards (application of security patch), we need to educate people to lock the door (disable the Autorun feature for the external media[a*]. (2) Overview of Vulnerabilities The total number of the vulnerabilities added to the U.S. NIST NVD (National Vulnerability Database) [7] in 21 is 4,639. Among them, a web software application products account for about 3 percent (1,458) and has shown an increasing tendency since 28 (Figure 8). Looking at the breakdown, the situation where cross-site scripting (XSS) and SQL injection account for about 8 percent does not change (Figure 9). Likewise, among the reports to IPA on the in-service websites, cross-site scripting and SQL injection account for about 7 percent and the number of reports on these two vulnerabilities is more than 2 in a year (Figure 1) [8]. [a*] Microsoft reported that as the result of sending out an update program that would disable the Autorun feature through the auto update channel, the infection rate of malware that exploit the Autorun feature was dramatically decreased (as of May 211, 62 percent decrease for Windows XP 3SP and 74 percent decrease for Windows Vista overall). 3 Copyright HIRT All rights reserved.
4 Number of reports WORM_DOWNAD(Conflicker) WORM_AUTORUN MAL_OTORUN 8/2 8/4 8/6 8/8 8/1 8/12 9/2 9/4 9/6 9/8 9/1 9/12 1/2 1/4 1/6 1/8 1/1 1/12 11/2 Figure 6: Number of Infection of USB Malware (per month). 7 (M) /4 29/1 21/4 21/1 211/4 Figure 7: Number of Infection of ConfickerA+B (per day). Number of Vulnerabilities 2,5 2, 1,5 1, 5 Cross-Site Request Forgery (CSRF) Path Traversal SQL Injection Cross-Site Scripting (XSS) Figure 9: Changes in the number of vulnerabilities reported for software products of web application (Source: NIST NVD). Number of Vulnerabilities Cross-Site Request Forgery (CSRF) Path Traversal SQL Injection Cross-Site Scripting (XSS) Figure 1: Changes in the number of vulnerabilities reported for websites (Source: IPA and JPCERT/CC) Number of vulnerabilities 7, 6, 5, 4, 3, 2, 1, Web Application Other Figure 8: Number of Vulnerabilities Reported (Source: NIST NVD). Number of Vulnerabilities Ichitaro Adobe Flash Player Adobe Acrobat Adobe Reader JDK JRE Microsoft Internet Explorer Microsoft Office Meanwhile, the number of reports on the applications often used on the client computers, so-called standard software, is on the increase. Especially, the number for Adobe Acrobat, Adobe Reader and Adobe Flash Player tripled (2 to 57 for Adobe Flash Player) or quadrupled (17 to 68 for Adobe Acrobat and Adobe Reader) from 28 to 21 (Figure 11). Since the web-based passive attack (web malware attack) has been becoming common, in addition to vulnerability countermeasure approach for standard software, promotion of that for web application development and operation is needed to prevent the websites from being used as an attack base. Figure 11: Number of Vulnerability in Standard Software. 2.2 HIRT Activities This subsection describes the HIRT activities in 21. (1) Improve Hitachi Group's CSIRT Activities (Phase 1) Each business division and group company that belongs to the Information and Communication Systems Company have an IRT that consists of an operating officer for IRT activities, a vulnerability-related information handling officer and an IRT liaison staff. To install incident response operations into the whole Hitachi Group, however, not only the collaboration among the existing IRTs is necessary but also it is absolutely imperative to take a new effort, for instance, expanding the IRTs or establishing a close partnership with a person who belongs to a Copyright HIRT All rights reserved. 4
5 business division or group company and working with the HIRT Center to actively promote the HIRT activities (hereinafter referred to as an "IRT supporting staffs"). In 21, to improve the Hitachi Group's CSIRT activities, with a goal of installing incident response operations into the whole Hitachi Group, we launched the efforts divided into three phases (Figure 12). (2) Disseminate Countermeasure Information through HIRT Open Meetings A HIRT Open Meeting is an activity to popularize the HIRT community based on the trust relationship. A meeting is held reflecting the policy that "it offers an opportunity for the HIRT Center members to share information about the HIRT activities", that "it offers an open event for people of the Hitachi Group to learn about the HIRT Center's activities and for the HIRT Center members to share information with and get opinions from non HIRT Center members, and that "it provides a opportunity to call for participation to the HIRT community based on the trust". Phase 3 Establish a virtual, horizontal incident response framework 'HIRT Center - IRT - IRT supporting staffs) >>> Install and promote the incident response operations throughout the whole Hitachi Group HIRT Center All Business Divisions of Hitachi & Groups Companies - Security information SI Vender IRT - Security review consulting - Technical support for evaluation tools Business Division and 事 Group 業 部 グループ company IRT 会 社 IRT - Education planning and offering Operation Chief 実 行 責 任 者 Units that need support Vulnerability 脆 弱 性 関 Handling 連 情 報 Chief ハンドリング 責 任 者 IRT Liaison Staff IRT 連 絡 窓 口 担 当 者 Product Vendor IRT Internal User IRT Phase 1 Improve Collaboration with Business Divisions and Group Companies' IRT IRT supporting staffs Phase 2 Strengthen Partnership with IRT supporting staffs Category Concrete Measures Phase 1 Improve Collaboration with IRT of Business Divisions and Group Companies Promote support activities with the collaboration between the IRT of Business Divisions and Group Companies Establish an IRT coalition framework and mechanism to share technological know-how using the HIRT open meetings Disseminate information about solutions/countermeasures for the problems discussed in the security review consultation. Phase 2 Strengthen Partnership with IRT supporting staffs Trial collaboration with IRT supporting staffs (of business divisions and group companies) Bottom up the IRT activities with the IRT supporting staffs as a starting point Phase 3 Establish Virtual, Horizontal Incident Response System Promote various support activities by the HIRT Center, IRTs and IRT collision support members Develop a HIRT in a broad sense (virtual organization model) by combining the user collaboration model (Phase 1,2) and entity collaboration model (Phase 3). Figure 12:Scenario on a Virtual, Horizontal Incident Response System. In 21, to start with the Phase 1 to improve the Hitachi Group's CSIRT activities, we established an operation system for IRT collaboration and a mechanism for disseminating technical know-how using HIRT Open Meetings. To be specific, based on the policies of the HIRT Open Meeting, we set up two types of regular liaison meetings (operational and technical meeting) for the vulnerability related information handling officers and IRT liaison staff. Operational Meeting (once per half year): A meeting for the vulnerability related information handling officers and IRT liaison staff to share and learn know-how on the operation of an IRT. Technical Meeting (2-4 times per half year): A meeting for the designers, system engineers and those who are willing to share their technical know-how to share and learn the technical know-how necessary to implement security into products and services. Especially for the technical meetings, since we wanted to pick up a timely topic, we have held three meetings in December 21. Control System Security Seminar Trends in Control System Security and Stuxnet Case Studies Mobile Website Security Discussed and shared the experiences on the development and operation of mobile websites with a focus on easy login. Year 21 issues on cryptographic algorithms Transition of cryptographic algorithms (3) Survey on Malware Circulating within the P2P File Exchange Environment As for information leakage via file-sharing software, we thought that it was necessary to work with the external entity. HIRT, with the System Development Laboratory, gained the cooperation of the P2P Study Group of the Secure Trusted Network Forum and conducted a research. In particular, since 27, many Antinny-type, known malware that could cause information leakage have been swarming on a P2P file-sharing environment "Winny". Most of them disguised themselves as safe contents (disguise with folder/file icon) to tactfully lure users into executing the malware. The users must be careful about them. Malware is found in one in every 2-3 files (Figure 13) As for archive files, such as.zip,.lzh and.rar, which circulate widely in significant quantities, malware is found in one in every 5-7 files. Antinny and its subspecies, which cause information leakage, account for 7% of the known malware. About 9% of malware fakes itself as an icon, such as a folder, which resembles safe content. About 3% use faked file names. 5 Copyright HIRT All rights reserved.
6 2% Information leakage malware ratio in all files Information leakage malware ratio in archive files Organization A Ex. NTT-CERT Organization B Ex. Domestic CSIRT Organization C Ex. Overseas CSIRT Academic Organization Ex. Tokai University 15% 1% 5% % Figure 13: Change in Malware Circulating in Winny That Causes Information Leakage. (4) Strengthening Partnership with the CSIRT Community As part of activities to strengthen partnerships among organizations, we have had meeting with NTT-CERT [9] on a regular basis since 26 to exchange information to help improve CSIRT activities. Also, as part of the activity to strengthen the inter-organizational collaboration, we supported the Nippon CSIRT Association in organizing an international partnership workshop in December [1]. At the workshop, the experts on malware and Botnet were invited and they gave a lecture and hands-on exercise (Figure 14). Figure 14: International Partnership Workshop (Source: Nippon CSIRT Association). "Honeywell and virtual honeypots" by David Watson from Honeynet Project "Becoming Criminal-A Botnet Exercise" by Richard e. of Shadowserver As for the Hitachi SOX-IX (Security Operation Center Information exchange) (Figure 15), which was a framework for organizations to mutually utilize the information such as observational data for threat analysis, we collaborated with the Incident Information Utilization Framework Working Group and disseminated the following information [11]. Hitachi SOC-IX (Security Operation Center Information exchange) Business divison Subsidiary company A Subsidiary company B Creating a framework or mechainism for exchange information, such as observation data, has the following advantages: - It allows analysis using a large amount of various observation data. - It allows you to use observation data you do not have - It allows you to use technology and know-how in fields in which each CSIRT excels. Figure 15: Schematic view of the Hitachi SOC-IX. A website with the information about Gumblar countermeasure Information on the SSL attack by the Botnet PushDo A DDoS incident where a large volume of ill-formed SSL requests had been sent against the port 443/tcp (https) from a number of sources since February 3, 21. About 4.jp domains had been targeted. Information about Stuxnet (5) Other Activity Reported on an industry-university joint event "Anti-Malware Engineering Workshop (MWS29)" held at the 21 FIRST Symposium, Hamburg [12] Supported an organization of "Academy CERT Meeting" in July 21 with JPCERT/CC to help Indonesian academic CSIRT activities [13] Contributed an article "Must-Read Vulnerability Information" to ITPro CSIRT (Computer Security Incident Response Team) Forum, Nikkei Business Publications Inc. [14] Published a report on the HIRT activities on the security information portal (Table 1) Table 1: Reports Published on the Security Information Portal. Number Title HIRT-PUB18 Hitachi Vulnerability Disclosure Process HIRT-PUB14 Zero-Day Response (21) HIRT-PUB13 Malware Circulating in P2P File-Sharing Environment (21) HIRT-PUB12 HIRT: Annual Report 29 3 HIRT To give you an in-depth understanding of HIRT, this section describes the organizational model adopted, the HIRT/CC, a coordinating unit, and the activities currently promoted by the HIRT/CC. 3.1 Organizational Model We have adopted an organizational model consisting of four IRTs (See Figure 16 and Table 2). In the case of the Hitachi Group, it has three faces: the face of a developer Copyright HIRT All rights reserved. 6
7 of information system products (Product IRT), the face of a system integrator (SI) and service provider using those products (SI Vendor IRT), and the face of the Internet user to operate and maintain its information systems (Internal User IRT). By adding the HIRT/CC (HIRT Coordination Center) to coordinate these IRTs, we thought that the 4- IRT model could promote a more efficient and effective security countermeasure approach that would prompt the collaboration between IRTs at the same time clarifying the role of each IRT. The name HIRT means the incident response operation promoted by the whole Hitachi Group in a broad sense and means the HIRT/CC (HIRT Center) in a limited sense. In fact, by the time 4 IRTs were established, we went through about four steps shown in Table 3. At each step, there was a "trigger" that encouraged the establishment of the organization. For example, when the Product IRT was launched at the second step, the fact that the vulnerability in SNMP [15] reported by CER/CC had affected a number of Hitachi products gave a push. Also, when the SI Vendor IRT was launched, it was the start of the "Information Security Early Warning Partnership" that gave a boost. The HIRT Center was later set up as a coordinator within and with the entities outside Hitachi after other three IRTs had been mostly formed. 3.2 Position of HIRT/CC The HIRT/CC is positioned under Information and Telecommunication Systems Company and has the role of not only a coordinator within and with the entities outside Hitachi but also a leader in promoting security technology. The main area of activity is to support the Product and Service Security Committee technically, to promote security efforts from the technical and institutional aspect in cooperation with the IT and Security Strategy Division, Information Technology Division and Quality Assurance Division. Information Security Early Warning Partnership The Hitachi group SI Vendor IRT Sections providing SI/services External IRT communities, including FIRST HIRT/CC Provides a point of contact and coordination among IRTs Product Vendor IRT Sections developing products Providing security Vulnerability measures for customer systems for Hitachi products Building a global network with external IRT communities Internal User IRT Sections administering internal infrastructure Providing security for internal infrastructures Figure 16: Four IRTs as an organizational model. Category HIRT/CC SI Vendor IRT Product Vendor IRT Internal User IRT Table 2: Role of each IRT. Role Corresponding sections: HIRT/CC - Provides a point of contact to external CSIRT organizations, such as FIRST, JPCERT/CC and CERT/CC. - Provides coordination among the SI Vendor, Product Vendor and Internal User IRTs. Corresponding sections: Sections providing SI/services - Promotes CSIRT activities for customer systems. - Provides customer systems with equivalent security against reported vulnerabilities to that for internal systems. Corresponding sections: Sections developing products - Provides support to promote vulnerability measures for Hitachi products and the release of information concerning such countermeasures - Promptly investigates whether a reported vulnerability has an impact on Hitachi products, notifies users of the impact, if any, and provides a security fix. Corresponding sections: Sections administering internal infrastructures - Provide support to promote security measures for internal networks lest Hitachi websites should be used as a base for making unauthorized access. Table 3: Phases until the organization was formed Phase Overview April 1998 We started CSIRT activities as a project to establish a Hitachi CSIRT framework. 1st phase In order to run a Hitachi CSIRT on a trial Establishing the basis, we formed a cross-sectional virtual Internal User IRT team within the Hitachi group to start ( ) mailing list based activities. Most of the members comprised internal security experts and those from sections administering 2nd phase Establishing the Product Vendor IRT (From 22 -) 3rd phase Establishing the SI Vendor IRT (From 24 -) October 24 internal infrastructures. In order to start conducting activities seriously as a Hitachi CSIRT, the sections developing products played a central role in establishing an organizational structure of the Product Vendor IRT with related business sites through cooperation from internal security experts, the sections administering internal infrastructures, the sections developing products and the Quality Assurance Department. We started to form an SI Vendor IRT with the sections providing SI/services. In order to swiftly implement proactive measures against vulnerabilities, as well as reactive measures against incidents, via partnership with Internet communities, we started to form HIRT/CC, which provides a point of contact for external organizations and enhances coordination among Internal IRTs. We established the HIRT/CC. 7 Copyright HIRT All rights reserved.
8 Moreover, it also includes helping each business division and group company implement proactive security measures against vulnerabilities, as well as reactive measures against incidents, and promoting security measures through partnerships among organizations as a point of contact for CSIRT activities in the Hitachi group (Figure 17). The organization of the HIRT/CC features the combination of vertical and horizontal collaboration of people and units. More specifically, this model has achieved a flat and cross-sectional organizational system for implementing measures and coordinating ability through distribution if functions by creating a virtual organization consisting of dedicated personnel and those who are assigned to HIRT as an additional task. Such organization is based on the concept that the performance of duties by each section and cooperation among sections are necessary to solve security issues, given the great diversification among components in the information systems. 3.3 Main Activities of HIRT Center The main activities of the HIRT center currently being promoted include CSIRT activities for internal organizations (See Table 4) and those for external organizations (See Table 5). As for internal CSIRT activities, we issued know-how obtained through the collection and analysis of security information as security alerts and advisories, and are promoting activities to provide feedback to product development processes in the form of guidelines and supporting tools. Information and Telecommunication Systems Information Management Headquarters Information Management Committee Information Security Planning Committee Product and Service Security Committee HIRT Center Leader of a technical aspect Point of contact for Hitachi IRTs (Mutual corporation among organizations) External IRT communities Leader of a system aspect Headquarters IT & Security Strategy Division Information Technology Division Quality Assurance Division Mutual cooperation in technical and system aspects - Providing support for vulnerability and incidents response - Providing information, consulting and cooperation Operation Chief Vulnerability Handling Chief IRT Liaison Staff All Bu siness Divi sion s o f Hitachi & Groups Companies - CSIRT organizations (CERT/CC (US), CPNI (UK), JPCERT/CC (JP)) - Governmental organizations (Cabinet Secretariat, Ministry of of Economy, Trade and Industry, Ministry of of Internal Affairs and Communications, National Police Agency, etc.) - Product and software vendors (Microsoft, FFR, etc.) - ISP (NTT, IIJ, etc.) - Security vendors (IBM-ISS, LAC, Trend Micro, Secure Brain) Figure 17: Position of HIRT Center. Table 4: (Internally) promoting projects. Category Overview Collecting, analyzing and providing security information Promoting proactive measures against vulnerabilities, as well as reactive measures against incidents for products/services Enhancing security technology for products/services Developing a framework for research activities Promoting Information Security Early Warning Partnership (Information concerning proactive measures against vulnerabilities, as well as reactive measures against incidents/horizontal deployment of know-how) Building a wide area observation network based on the Hitachi Security Operation Center Information exchange (SOC-IX) Reinforcing the security foundation within the Hitachi Group through education for sections addressing security within the companies Accumulating and deploying technical know-how for countermeasures against vulnerabilities and incident response Promoting the transmission of security information from external websites using the Security Information Integration Site Improving the process to provide security (each guideline for development, inspection and operation) Enhancing and expanding support and processes though internal support activities Enhancing web application security Developing a framework for joint research with the Systems Development Laboratory (for P2P observation, etc) Strengthening the overseas partnership for CSIRT activities Developing a framework for research activities Table 5: (Externally) promoting projects. Category Overview Strengthening the domestic partnership for Deploying proactive measures against vulnerabilities based on the Information Security Early Warning Partnership CSIRT activities Promoting activities related to the Nippon CSIRT Association Improving partnerships with overseas CSIRT organizations/product vendor IRTs through lectures or events at FIRST conferences Promoting UK WARP related activities. Countermeasures against vulnerabilities, such as CVE and CVSS, and standardization of incident response (ISO, ITU-T) [b*] Establish a joint research between Tokai University (Professor Hiroaki Kikuchi) and HIRT. Participating in academic research activities, such as a workshop to develop human resources for research on malware countermeasures [b*] Work had begun in 27 in ISO SC27/WG3 to develop an international standard "Vulnerability Disclosure (29147)". Work had begun in 29 in ITU-T SG17 Q.4 to develop an international standard "Cyber security Information Exchange Framework (X.cybex)". Copyright HIRT All rights reserved. 8
9 As for the internal issue of security alerts and advisories, we have broken down HIRT security information into two types since June 25. HIRT security information that aims to distribute security alerts and hot topics widely and HIRT-FUP information used to request relevant sections to take reactive measures, to take its priority and the needs into account (See Table 6 and Figure 18). To convey information efficiently, we reduce the number of issues of information by aggregating the same, and release the information in collaboration with the IT and Security Strategy Division and Quality Assurance Division. We are now promoting activities to expand the Hitachi Group's commitment to product and service security to Internet users via our security portal website, as a proactive measure against vulnerabilities, as well as reactive measures against incidents. In particular, for issuing security information for vulnerabilities and incidents, to external entities, we also adopt an approach in which an "Emergency Level" of information is determined and a "Website Level" at which the information is to be published is selected, in addition to just routinely publishing security information via our security portal website (See Figure 19). Table 6: Classification of security information issued by HIRT. ID number Usage HIRT-FUPyynnn Priority: Urgent Distributed to: Only relevant sections Is used to notify relevant sections of a vulnerability when an HIRT member has found such vulnerability in a Hitachi group product or a website, or received such information. HIRT-yynnn Priority: Middle High Distributed to: No restriction Is used to widely call attention to proactive measures against vulnerabilities, as well as reactive measures against incidents. HIRT-FYIyynnn Priority: Low Distributed to: No restriction Is used to notify people of HIRT OPEN Meetings or lecture meetings. Number of issues HIRT-FYI HIRT-FUP HIRT Figure 18: Number of issues of security information by ID number. Figure 19: Conceptual view of issuing information based on "Emergency Level" x "Website Level". Basic knowledge Basic course on web application security Quotation Design Support of Support of of security security review review Implementation and construction Test Hands-on Hands-on course course of of web of application web application security inspection inspection Training Training in in in the the use of of inspection use tools of inspection tools Operation Support for Support adpopting for adopting contermeasures countermeasures in in incidents in incidents Support of of of log checking Figure 2: Systematizing HIRT support activities (Web application security). 4 Activity Summary from 1998 to 29 This section describes the activities for each year from 1998 when the HIRT project started. 4.1 The Year 29 (1) The Start of Product/Service Security Feedback To give feedback to the product development processes about the know-how we learned from the experience of vulnerability fighting and incident response, we started to provide support for each process (Figure 2). (2) Providing Security Engineer Training As part of the security engineer training program utilizing the CSIRT activities, we accepted a trainee and trained him for six months with the focus on web system security. (3) Lectures July 29: "Web Application Security" by Hiromitsu Takagi, National Institute of Advanced Industrial Science and Technology (AIST) July 29:"NTT-CERT Activity" by, Takehiko Yoshida, NTT-CERT (4) Other Activities "Survey on Malware Circulating within the P2P File Exchange Environment" [17][18] February 29: Gave an web application development exercise for NTT Group at a workshop organized by NTT-CERT In cooperation with the Incident Information Utilization Framework Working Group of Nippon CSIRT Association, information dissemination using cnotes (Current Status Notes) [19] which tries to visualize the observational data. 9 Copyright HIRT All rights reserved.
10 4.2 The Year 28 (1) Supporting countermeasures against DNS cache poisoning vulnerability We held an HIRT OPEN Meeting "Roles of DNS and Use of Related Tools" in December as a countermeasure to DNS cache poisoning vulnerability, in order to describe DNS behavior and how to use tools. To help promote DNS cache poisoning countermeasures in Japan, the materials prepared for the HIRT OPEN Meeting were provided as a reference, based on which "Countermeasures against DNS Cache Poisoning vulnerability" [2] issued from the IPA in January, 29, was created. (2) Holding JWS28 March 25-28, 28, we held the FIRST Technical Colloquium, a FIRST technical meeting, and Joint Workshop on Security 28, Tokyo (JWS28), a domestic CSIRT technical workshop, with a team of domestic FIRST members [21]. (3) Participation in the domestic COMCHECK Drill 28 With a view to ensuring that in-house information security departments of various organizations could communicate with each other, we participated in a domestic COMCHECK Drill (Drill name: SHIWASU, was held by the Nippon CSIRT Association on December 4, 28). (4) Award with the Commerce and Information Policy Bureau Chief Prize, Ministry of Economy, Trade and Industry (Information Security Promotion Section) In the 28 Information Technology Promotion Monthly Period memorial ceremony held by Information Technology Promotion Conference (Ministry of Economy, Trade and Industry, Cabinet Office, Ministry of Internal Affairs and Communications, Ministry of Finance Japan, Ministry of Education, Culture, Sports, Science and Technology, Ministry of Land, Infrastructure and Transport) on October 1, 28. We were awarded with the "Commerce and Information Policy Bureau Chief Prize, Ministry of Economy, Trade and Industry (Information Security Promotion Section)" [22]. (5) Lectures April 28: "Management of High Reliability Organizations" by Aki Nakanishi, the Faculty of Business Administration, Meiji University. (6) Other Activity In order to partially reveal the actual circumstances of targeted attacks as a part of efforts to develop a new inter-organization collaboration, we provided related organizations with a malware-attached , which faked itself as Call for Papers (CFP) for the symposium held by the Computer Security Symposium 28 of Information Processing Societies Japan as a sample. 4.3 The Year 27 (1) Starting Hands-on Security Training at HIRT OPEN Meetings In 27, to promote the practical use of the guideline "Web Application Security Guideline", we provided a hands-on, exercise-based HIRT Open Meeting twice in March and June for the web application developer. (2) Founding the Nippon CSIRT Association In order to develop a system based on a strong trusting relationship among CSIRTs that can successfully and promptly react to events that single CSIRTs find it difficult to solve, we founded the Nippon CSIRT Association with IIJ-SECT (IIJ), JPCERT/CC, JSOC (LAC), NTT-CERT (NTT) and SBCSIRT (Softbank) in April 27 [23]. As of April 211, 2 teams have been joined (Figure 21). Total number of teams Figure 21: Change in Number of Nippon CSIRT Association Members. (3) Joining UK WARP In order to strengthen the overseas partnership on CSIRT activities, we joined the Warning, Advice and Reporting Point (WARP), promoted by the Centre for the Protection of National Infrastructure (CPNI), a British government security organization, in May 27 [24]. (4) Lectures July 28: "Vulnerability Assessment through Static Analysis" by Yuji Ukai, Fourteenforty Research Institute, Inc. 4.4 The Year 26 (1) Providing a Unified Point of Contact for Vulnerability Reporting In November 26, in order to circulate vulnerability-related information properly in the Hitachi group and thereby promote measures against vulnerabilities in Hitachi software products and websites, we provided a unified point of contact for receiving reports on vulnerabilities found in software products and web applications. Copyright HIRT All rights reserved. 1
11 (2) Enhancing Web Application Security In October 26, as part of security measures of web application in the Hitachi group, we created guidelines and checklists and provided support for their implementation in the Hitachi group. We updated "Web Application Security Guide (Development) V2." by adding new vulnerabilities, such as LDAP injection and XML injection, and a method for checking the existence of such vulnerabilities. (3) Calling Attention to Information Leakage Caused by P2P File Exchange Software Antinny is a virus that has penetrated widely via "Winny", file exchange software that appeared in August 23. The virus causes infected PCs to leak information and attack particular websites. In April 26, HIRT issued a security alert entitled "Prevention of Information Leakage Caused by Winny and Proactive Measures against It" based on previous experience of threats. (4) Starting Product Security Activities for Intelligent Home Appliance and embedded Products We have started product security activities for intelligent home appliance and embedded products. HIRT focused on the Session Initiation Protocol (SIP), a call control protocol used for Internet telephony, and summarized related security tools and measures into a report. (5) Strengthening Partnership with the CSIRT Community In March 26, we introduced Hitachi's CSIRT activities in a workshop held by NTT-CERT to exchange information to improve CSIRT activities with each other. (6) Lectures May 26: "Security for embedded systems", by Yuji Ukai, eeye Digital Security September 26: "Measures against Botnet in Telecom-ISAC Japan", by Satoru Koyama, Telecom-ISAC Japan (7) Other Activities Starting to sign a digital signature to technical documents (PDF files) issued from HIRT [25] 4.5 The Year 25 (1) Joining FIRST In January 25, to boost experience in CSIRT activities while creating an organizational structure to address incidents in partnership with CSIRT organizations overseas, we joined the Forum of Incident Response and Security Teams (FIRST), an international community for computer incident handling teams [26]. The preparation period extended for about one year, since any team wishing to join the community must obtain recommendations from two member teams before doing so. As of April 211, 19 Japanese teams have joined the community. They include the CDI-CERT (Cyber Defense Institute), CFC (Info-Communications Bureau, the National Police Agency), HIRT (Hitachi), IIJ-SECT (IIJ), IPA-CERT (Information-technology Promotion Agency), JPCERT/CC, JSOC (LAC), KDDI-SOC (KDDI), KKCSIRT (Kakaku.com), MIXIRT (Mixi), NCSIRT (NRI Secure Technologies), NISC (National Information Security Center), NTT-CERT (NTT), NTT-DATA-CERT (NTT Data), Panasonic PSIRT (Panasonic), Rakuten-CERT (Rakuten), RicohPSIRT (Ricoh), SBCSIRT (Softbank) and YIRD (Yahoo) (See Figure 22). Total number of teams Total number of teams Total number of Japanese teams Total number of Japanese teams Figure 22: Changes in the number of members of FIRST. (2) Setting Up a Security Information Portal Site In September 25, in order to provide Internet users with comprehensive information on security problems applicable to the products and service of the Hitachi group, we set up a security information portal site within which the security information provided through the websites of Hitachi business divisions and group companies is integrated (See Figure 23). We also created "Guidance for Providing Security Information from Websites to External Users, V1.". Request for investigation Releasing information to the public Security information portal site: Japanese: English: IPA, JPCERT/CC Information Security Early Warning Partnership Information disclosure Providing security information via a domestic security portal site Request for investigation Affected products and mesurements HIRT/CC Aggregating status Information disclosure Providing security information via Hitachi group security potal site The Hitachi group Request for investigation Affected products Measurements Sections developing products Investigation and measures Preparing for information disclosure Providing business divisions and subsidiary companies with security information Figure 23: Providing security information on the Hitachi security information portal. 11 Copyright HIRT All rights reserved.
12 (3) Strengthening the Domestic Partnership for CSIRT Activities To strengthen the domestic partnership for CSIRT activities, we hold meetings with domestic teams that are members of FIRST, and individual meetings with NTT-CERT and Microsoft Product Security Team (PST) to exchange opinions, and have established a contact network to be used, for example, when a website is found to have been tampered with. 4.6 The Year 24 (1) Participating in the Information Security Early Warning Partnership The Information Security Early Warning Partnership started in July 24 when the "Standard for Handling Information Related to Vulnerabilities in Software, etc." was implemented [27][28]. The Hitachi group registered itself as a product development vendor to the Partnership, using HIRT as a point of contact, and started publishing Hitachi's vulnerability handling status on JP Vulnerability Notes (JVN) [29]. (2) Enhancing Web Application Security In November 24, we created the "Web Application Security Guide (Development), V1." and distributed it throughout the Hitachi group. The guide summarizes typical problems that need to be considered when designing and developing web applications, and provides an overview of measures taken to solve such problems. (3) Lectures January 24: "Security business affairs after Blaster in the US", by Tom Noonan, President and CEO of Internet Security Systems (ISS) 4.7 The Year 23 (1) Starting Web Application Security Activities We started to consider a method for enhancing web application security and developed the "Procedure for Creating a Security Measure Standard for Web Application Development V1." with business divisions. (2) Disseminating Vulnerability Information from NISCC throughout Hitachi Following the dissemination of vulnerability information from CERT/CC in 22, we started obtaining/publishing information in accordance with the NISCC (currently, CPNI) Vulnerability Disclosure Policy. 6489/H323 of January 24 for security information on a Hitachi product was first published in NISCC Vulnerability Advisory after starting the activity [3]. (3) Providing a Point of Contact for External Organizations In line with the more active reporting and releasing of information concerning the discovery of a vulnerability [31], we provided a point of contact, as shown in Table 7, that initiates actions when vulnerabilities or malicious actions in Hitachi products and Hitachi-related websites are pointed out. 4.8 The Year 22 (1) Disseminating Vulnerability Information from CERT/CC throughout Hitachi SNMP vulnerability [15] reported from CERT/CC in 22 affected a wide range of software and devices. This provided an opportunity to start the Product Vendor IRT and obtaining/publishing information based on the CERT/CC Vulnerability Disclosure Policy [32]. VU# of October 22 for security information on Hitachi product was first published in the CERT/CC Vulnerability Notes Database after commencing this activity [33]. (2) Assisting JPCERT/CC in Building Vendor Status Notes We provided support to build and operate a trial website, JPCERT/CC Vendor Status Notes (JVN) ( in February 23, as an attempt to improve the domestic circulation of security information (See Figure 24) [34][35]. With the implementation of the "Standard for Handling Information Related to Vulnerabilities in Software, etc." in July 24, the roles of the trial site were transferred to Japan Vulnerability Notes (JVN), a site releasing information on reported vulnerabilities ( Table 7: Information on point of contact. Name HIRT : Hitachi Incident Response Team. Address 89 Kashimada, Saiwai, Kawasaki City, Kanagawa, PGP key KeyID = 231A5FA Key fingerprint 7BE3 ECBF 173E 316 F55A 11D F6CD EB6B 231 A5FA pub 124D/ HIRT: Hitachi Incident Response Team /2/3~24/7/7 Trial site running period JVN working group formed in June /7/8~ Running official website Trial site (jvn.doi.ics.keio.ac.jp) to the public in February 23 JVNRSS stared in July 23 VN-CIAC stared in December 23 TRnotes stared in January 24 jvn.jp to the public in June 24 Figure 24: Building and running a JVN trial site. Copyright HIRT All rights reserved. 12
13 4.9 The Year 21 (1) Investigating the Activities of Worms Attacking Web Services We investigated the activities of worms attacking web services in 21, CodeRed I, CodeRed II and Nimda, from June 15, 21 to June 3, 22, based on the log data from the websites on the Internet. For CodeRed II and Nimda (Figure 25), which caused significant damage in Japan, the log reveals that the time span between the time at which the attack was first logged and the date on which attacks occurred most frequently was only approximately two days, indicating that damage caused by the worms had spread rapidly and widely. Number of 痕 access 跡 数 counts 1,8 1,6 1,4 1,2 1, /Jul/15 21/Aug/4 21/Aug/24 21/Sep/13 21/Oct/3 21/Oct/23 21/Nov/12 21/Dec/2 21/Dec/22 22/Jan/11 22/Jan/31 22/Feb/2 22/Mar/12 22/Apr/1 22/Apr/21 22/May/11 22/May/31 22/Jun/2 Figure 25: Changes in the number of Nimda log counts found during the observation period (for Nimda). 4.1 The Year 2 (1) Investigating the Severity Metrics for Vulnerabilities In order to measure the severity level of vulnerability exploited for destructive or security-compromising activities, we investigated the severity metrics used by relevant organizations and summarized the results into a report. CERT/CC publishes notes called "Vulnerability Notes" [36] for vulnerability. It provides the Severity Metric indicating the severity of vulnerability [37] Common Vulnerabilities and Exposures (CVE) classified information security vulnerabilities into "Vulnerabilities" and "Exposures" and focuses on the former [38]. The former is defined as mistakes in software to violate a reasonable security policy and the latter as environment-specific, configuration issues or mistakes in software used to violate a specific policy. The National Institute of Standards and Technology (NIST) uses whether or not a CERT advisory and CVE identifier number has been issued as a guide to determine the severity of vulnerability, and classifies vulnerabilities into three levels in the ICAT Metabase [39], a predecessor of NVD. Note that as severity metrics for vulnerabilities vary, depending on organizations, the Common Vulnerability Scoring System (CVSS) [4] was proposed as a common language with which to evaluate the severity of vulnerability in a comprehensive and general way in The Year 1999 (1) Launch of the hirt.hitachi.co.jp domain To improve the provision of security information to the Hitachi group, we created an internal domain for HIRT projects to set up a website (hirt.hitachi.co.jp) in December (2) Investigation of website defacement Website defacement was a major type of incidents since it occurred for the first time in the US in 1996 until the network worm era started (21-24). We conducted a research on webpage defacing from 1999 to 22 to find out how malicious activities were performed (See Figure 26). Number of website defacements 3, 2,5 2, 1,5 1, /1 1995/7 1996/1 1996/7 1997/1 1997/7 1998/1 1998/7 1999/1 1999/7 2/1 2/7 21/1 21/7 22/1 22/7 Figure 26: Changes in the number of websites defacements The Year 1998 (1) Starting to provide HIRT security information In April 1998, we started to provide information on security measures mainly using an internal mailing list and an internal website for HIRT projects. This information is based on the security information issued by CERT/CC, JPCERT/CC, and product vendors (Cisco, HP, Microsoft, Netscape, Sun Microsystems, etc.). (2) Lectures On June 25-26, 1998, we provided "Network security" training for Hitachi. We invited an US security expert who had also participated in the US Security Conference DEFCON [41] as a speaker as an instructor. 5 Conclusion Attack techniques in cyber attacks have become advanced and sophisticated, and there seems to be a change in the attackers' mind as well and they do not give up easily. It is necessary to respond to an incident not only with the technical consideration but also the physiological consideration as well. Under the circumstances, it is now that we must penetrate the CSIRT activities into Japan understanding our regionality. We should also go forward to develop a new trust model between the local CSIRTs and international counterparts. With the changes surrounding the incident response in mind, HIRT will "catch the emerging threats and take 13 Copyright HIRT All rights reserved.
14 actions as early as possible". Through the improvement of Hitachi Group's CSIRT activities and consolidation of inter-organizational collaboration, we will continue to contribute actively to promote vulnerability countermeasure approach and incident response in Japan. (July 1, 211) References 1) Protecting Your Critical Assets (21), l-assets.pdf 2) The New E-spionage Threat (29), 3.htm 3) Under Cyberthreat: Defense Contractors (29), htm 4) Information-technology Promotion Agency, IPA Technical Watch "Report on APT" (21), 5) Trend Micro Incorporated: Report on Internet Threat, ml 6) Conficker Work Group - ANY - Infection Tracking, ntracking 7) NIST NVD (National Vulnerability Database), 8) Information-Technology Promotion Agency, Japan: Quarterly Reports, 9) NTT-CERT (NTT Computer Security Incident Response and Readiness Coordination Team), 1) Nippon CSIRT Association: Report on International Collaboration Workshop (21) 11) Nippon CSIRT Association: incident respond 12) MS29, FIRST Symposium (21/1), 13) SGU MIT Workshop Academy CERT Meeting (21/7), 14) ITpro Security, 15) CERT Advisory CA-22-3, "Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP)" (22/2), 16) Anti-Malware Engineering Workshop (MWS29) 17) 29 Survey on information leakage via P2P File Exchange Software Environment (29/12), 18) Malware Circulating in P2P File Exchange Software Environment (29) (21/3), 19) cnotes: Current Status Notes, 2) Information-Technology Promotion Agency, Japan: Countermeasures against DNS Cache Poisoning (29/2), 21) Recording Site for Joint Workshop on Security 28, Tokyo (28/3), 22) 28 Information Technology Period Promotion - Awarding companies that have contributed to the promotion of information technology in 28 (28/1), 23) CSIRT - Nippon CSIRT Association, 24) WARP (Warning, Advice and Reporting Point), 25) GlobalSign Adobe Certified Document Services, 26) FIRST (Forum of Incident Response and Security Teams), 27) Ministry of Economy, Trade and Industry, Notification No. 235: Standard for Handling Information Related to Vulnerabilities in Software, etc., (24/7), df 28) Information-technology Promotion Agency, Japan: Information Security Early Warning Partnership Guideline (24/7), 29) JVN (Japan Vulnerability Notes), 3) NISCC: NISCC Vulnerability Advisory 6489/H323: Vulnerability Issues in Implementations of the H.323 Protocol (24/1), 31) Information-Technology Promotion Agency, Japan: Research Reports on Policy for Security Vulnerability Information Disclosure (23/9), 32) CERT/CC Vulnerability Disclosure Policy, 33) US-CERT: Vulnerability Note VU#459371: Multiple IPsec implementations do not adequately validate authentication data" (22/1), 34) Considerations on JPCERT/CC Vendor Status Notes DB: JVN, CSS22 (22/1), 35) Development of JVN to Support Dissemination of Security Information (25/5), 36) CERT/CC Vulnerability Notes Database, 37) CERT/CC Vulnerability Note Field Descriptions, 38) CVE (Common Vulnerabilities and Exposures), 39) ICAT, 4) CVSS (Common Vulnerability Scoring System), 41) DEFCON, [Author] Masato Terada After launching HIRT activities in 1998 on a trial basis, he launched a research site ( a predecessor of JVN ( in 22 and acted as a point of contact for HIRT in order to promote external CSIRT activities, including participation in FIRST, an international CSIRT organization in 25. Presently, he works as a technical member of the JPCERT Coordination Center, a researcher of the Information Technology Promotion Agency, Japan, Telecom ISAC a steering committee member, and vice chief of the steering committee for the Nippon CSIRT Association. Copyright HIRT All rights reserved. 14
Trends in Security Incidents and Hitachi s Activities
Hitachi Review Vol. 63 (2014), No. 5 270 Featured Articles Trends in Security Incidents and Hitachi s Activities About HIRT Activities Masato Terada, Dr. Eng. Masashi Fujiwara Akiko Numata Toru Senoo Kazumi
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
About Botnet, and the influence that Botnet gives to broadband ISP
About net, and the influence that net gives to broadband ISP Masaru AKAI BB Technology / SBB-SIRT Agenda Who are we? What is net? About Telecom-ISAC-Japan Analyzing code How does net work? BB Technology
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Vulnerability Disclosure Guideline for Software Developers
Vulnerability Disclosure Guideline for Software Developers Excerpt of Information Security Early Warning Partnership Guideline Appendix 5 Contents 1. Introduction 2 2. Vulnerability Information: Provide
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report
Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report About this Report This report was compiled and published by the Tespok icsirt in partnership with the Serianu Cyber Threat Intelligence
The Electronic Arms Race of Cyber Security 4.2 Lecture 7
The Electronic Arms Race of Cyber Security 4.2 Lecture 7 ISIMA Clermont-Ferrand / 04-February 2011 Copyright 2011 Dr. Juergen Hirte List of Content Why Process Automation Security? Security Awareness Issues
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP) Annual Activity Report FY2012
Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP) Annual Activity Report FY2012 IT SECURITY CENTER (ISEC) INFORMATION-TECHNOLOGY PROMOTION AGENCY, JAPAN Initiative for Cyber
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Legislative Council Panel on Information Technology and Broadcasting. Information Security
LC Paper No. CB(1)2407/10-11(05) For Information on 13 June 2011 Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper informs Members about the progress
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Cyber Security in Japan (v.2)
Cyber Security in Japan (v.2) Ryusuke Masuoka ([email protected]) and Tsutomu Ishino ([email protected]) Cyber Security Policy Research Team Center for International Public Policy Studies (CIPPS) December
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Using Tofino to control the spread of Stuxnet Malware
technical datasheet Application Note Using Tofino to control the spread of Stuxnet Malware This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
Web Security. Discovering, Analyzing and Mitigating Web Security Threats
Web Security Discovering, Analyzing and Mitigating Web Security Threats Expectations and Outcomes Mitigation strategies from an infrastructure, architecture, and coding perspective Real-world implementations
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
6. Exercise: Writing Security Advisories
CERT Exercises Toolset 49 49 6. Exercise: Writing Security Advisories Main Objective Targeted Audience Total Duration Time Schedule Frequency The objective of the exercise is to provide a practical overview
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Data Driven Assessment of Cyber Risk:
Data Driven Assessment of Cyber Risk: Challenges in Assessing and Mitigating Cyber Risk Mustaque Ahamad, Saby Mitra and Paul Royal Georgia Tech InformationSecurity Center Georgia Tech Research Institute
Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware
Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware A White Paper presented by: Torsten Rössel Director of Business Development Innominate Security Technologies
Web Application Firewall (WAF) Guide. Web Application Firewall を 理 解 するための 手 引 き A Handbook to Understand Web Application Firewall
Web Application Firewall (WAF) Guide 2 nd Edition Web Application Firewall を 理 解 するための 手 引 き A Handbook to Understand Web Application Firewall IT SECURITY CENTER, INFORMATION-TECHNOLOGY PROMOTION AGENCY,
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland
Audit Report Effectiveness of IT Controls at the Global Fund Follow-up report GF-OIG-15-20b Geneva, Switzerland Table of Contents I. Background and scope... 3 II. Executive Summary... 4 III. Status of
Current counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol [email protected] April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
The Second Action Plan on. Information Security Measures for. Critical Infrastructures. Safety as a matter of course for our daily lives
The Second Action Plan on Information Security Measures for Critical Infrastructures Safety as a matter of course for our daily lives - Safe and secure social infrastructure for everybody - February 3,
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Microsoft Security Intelligence Report volume 7 (January through June 2009)
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc
Tunisia s experience in building an ISAC Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc 1 Agenda Introduction ISAC objectives and benefits Tunisian approach SAHER system
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Professional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
April 11, 2011. (Revision 2)
Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of
ESET NOD32 ANTIVIRUS 8
ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus
THE SECURITY EXPOSURE
Secunia Whitepaper - February 2010 THE SECURITY EXPOSURE OF SOFTWARE PORTFOLIOS An empirical analysis of the patching challenge faced by the average private user In this paper, we examine the software
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
Using Windows Update for Windows XP
Using Windows Update for Windows XP Introduction This document provides instructions on updating Windows XP with the necessary patches. It is very important to update your operating system software in
The New PCI Requirement: Application Firewall vs. Code Review
The New PCI Requirement: Application Firewall vs. Code Review The Imperva SecureSphere Web Application Firewall meets the new PCI requirement for an application layer firewall. With the highest security
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
ThreatSTOP Technology Overview
ThreatSTOP Technology Overview The Five Parts to ThreatSTOP s Service We provide 5 integral services to protect your network and stop botnets from calling home ThreatSTOP s 5 Parts: 1 Multiple threat feeds
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
How We're Getting Creamed
ed Attacks How We're Getting Creamed By Ed Skoudis June 9, 2011 ed Attacks - 2011 Ed Skoudis 1 $ cut -f5 -d: /etc/passwd grep -i skoudis Ed Skoudis Started infosec career at Bellcore in 1996 working for
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag
Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
