Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia



Similar documents
Fast overview about the CERT-TCC. Helmi Rais CERT-TCC Team Manager

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

What legal aspects are needed to address specific ICT related issues?

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Attacks from the Inside

Networking for Caribbean Development

Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

US-CERT Overview & Cyber Threats

Current counter-measures and responses by CERTs

Cyber Security and Critical Information Infrastructure

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Top tips for improved network security

Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Security Information Management (SIM)

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Radware s Behavioral Server Cracking Protection

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Promoting Network Security (A Service Provider Perspective)

Modular Network Security. Tyler Carter, McAfee Network Security

Information Security Threat Trends

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Protecting Your Organisation from Targeted Cyber Intrusion

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Current Threat Scenario and Recent Attack Trends

How To Perform A Large Scale Attack On A Large Network

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Malicious Network Traffic Analysis

Integrated Protection for Systems. João Batista Territory Manager

THE ROLE OF IDS & ADS IN NETWORK SECURITY

External Supplier Control Requirements

A Decision Maker s Guide to Securing an IT Infrastructure

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

AT&T Real-Time Network Security Overview

BitDefender Client Security Workstation Security and Management

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Security Toolsets for ISP Defense

Firewall Testing Methodology W H I T E P A P E R

24/7 Visibility into Advanced Malware on Networks and Endpoints

INFORMATION SECURITY TRAINING CATALOG (2015)

CYBERTRON NETWORK SOLUTIONS

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Reducing Application Vulnerabilities by Security Engineering

About Botnet, and the influence that Botnet gives to broadband ISP

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

How To Protect A Network From Attack From A Hacker (Hbss)

Introduction: 1. Daily 360 Website Scanning for Malware

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Next Generation IPS and Reputation Services

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

How To Protect Your Network From Attack From A Hacker On A University Server

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Honeypot as the Intruder Detection System

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Quarterly Report: Symantec Intelligence Quarterly

End-user Security Analytics Strengthens Protection with ArcSight

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Defending Against Data Beaches: Internal Controls for Cybersecurity

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Virtualization Journey Stages

BotNets- Cyber Torrirism

Computer Crime & Security Survey

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

REPORT on the cyber security alerts received by CERT-RO during 2013

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

Cyber Security for Start-ups: An Affordable 10-Step Plan

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Transcription:

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia helmi.rais@ansi.tn helmi.rais@gmail.com

Framework 2

CERT-TCC Collaboration Network CISOs (Ministries, Bank, Critical networks ) Vulnerabilities, Exploit, 0days Internet Service Providers Managers, Decision Makers Malwares, Botnets, Webmaster, Network admin, developpers, Certs, International Partners Mailing List, Web site, Data Base, Call Center Internet Community 3

Watch, Warning, Information & Alert Investigation & Incident Response Team Information Sharing and Analysis Center 4

Watch, Warning, Information & Alert Investigation & Incident Response Team Information Sharing and Analysis Center 5

CERT-TCC Watch Center (24/7) 6

Information and Alert Threat alert : Analyse the state of Internet security and convey that information to the system administrators, network managers, and wide public in the Internet community. Monitor sources of vulnerability information and regularly sends reports and alerts on those vulnerabilities (mailing-lists, publication on the web site). We analyze the potential vulnerability and try to work with other CERTs and technology producers to track the solutions to these problems. We also make vulnerability information widely available through a vulnerability database. 7

Information and Alert 1000 Vulnerabilities published in 2007-2008 35 Malwares published in 2007-2008 630 Vulnérabilités publiées en 2007 70 60 50 40 30 Série1 20 10 0 Janvier Avril Juillet Octobre 8

Information and Alert 15 Minor Alerts in 2007-2008 Microsoft Word 0day (CERT-TCC/Vuln.2007-045) Sun Solaris Worm (CERT-TCC/Vuln.2007-66) Microsoft Windows DNS Service ( CERT-TCC/Vuln.2007-190) Firefox et Netscape Navigator 0day (CERT-TCC/Vuln.2007-368) Propagation of "Storm Worm" "Zhelatin.LJ (CERT-TCC/MAL-2007-009) RSTP QuickTime Vulnerability (CERT-TCC/Vuln.2007-577) Asprox Botnet Propagation (CERT-TCC / MAL-2008-011) Exploits of Adobe Reader Vulnerabilities (CERT-TCC/Vuln.2008-081) Kaminisky DNS vulnerability (CERT-TCC/Vuln.2008-330) Netmonster : The First Virus «made in Tunisia» (CERT-TCC/Malw.2007-023) Other Alerts on Scams/SPAMS and Hoaxes 9

Information and Alert More than 8000 Voluntary subscribers More than 600 calls Monthly served (Call Center 24/7 + Green Number) More than 800 Advisories sent Since 2005 Vulnerabilities Malwares Spam &Hoax Open Source Books Tools Announces Inscription is free: a@ansi.tn (FR) 10

Internal Workflow Solutions شاطر Arabic) Chater (Smart in RSS Reader, Filter, Task Management Free and Open Source Vulnerability and Malwrae Database into CERT-TCC Back Office Website 11

Watch, Warning, Information & Alert Investigation & Incident Response Team Information Sharing and Analysis Center 12

CERT/TCC provides : o A CSIRT team in charge of providing (free of charge) Assistance for Incident Handling o Call-center, available 24Hours/24 and 7 days/week Article 10 of the Law No. 2004-5 relative to IT security (Public & Private institutions, must inform the National Agency for Computer Security about any Incident, which can affect other Information Systems) Article 9 of the Law No. 2004-5 relative to IT security Stipulate that The employees of the National Computer Security Agency and security auditors are Responsible about the preservation of confidentiality and are liable to penal sanctions Private and public organizations should trust the CERT/TCC Call for assistance A Citizen s assistance service, To which Home users can bring their PC to solve security problems or install security tools (anti-virus, PC firewall, anti-spam,..), free for domestic use. Acting for the emergence of corporate CSIRT in some sensitive sectors (E-gov, E-Banking Energy, Transportation, Health ) 13

CSIRT Investigation team Intervention team Computer forensics Evidence analysis Investigation (Log, Hard Drive, memory dump, ) On-site Incident handling process Evidence collection 14

Incident handling plateform CSIRT Collaboration network Trained team Technical facilities (Investigation) Policies / Procedures Incident management framword Information sharing Hacker tracking Technical assistance Incident reporting system 24/7 Watch CSIRT ISAC Email : cert-tcc@ansi.tn Call center: 71 843200 Green N : 80 100 267 Email : incident@ansi.tn Web : Online form Phone : 71 846020 Detection of massive attack Detection of critical breakdown Detection of web attack 15

Most relevant cases Web defacement Phishing Sabotage Identity theft Massive virus infection Denial of service 16

Watch, Warning, Information & Alert Investigation & Incident Response Team Information Sharing and Analysis Center 17

ISAC Saher A Watch- center (based on open-source solutions), which permits to monitor the National Cyber-Space security in Real time, Early Detection of Mass attacks, D-Dos Attacks (Estonia 2007, Georgia 2008) For the early Detection of potential threats and evaluation of their impact. (First prototype, deployed at the level of ISP, during phase 2 of WSIS) For Vulnerabilities exploitation and malwares propagation evaluation

«Saher» Architecture System developed based on a set of Open Souce tools Saher Web : Tunisian Web Sites monitoring Saher SRV : Internet services availability monitoring (Mail server, DNS, ) SAHER IDS: Massive attack detection Web defacement DoS Web Deterioration of web access Mail Bombing Breakdown of DNS servers DNS POISONING Viral attack Intrusion DDoS 19 19

Intrusion Detection Anomaly Detection Corporate Networks IDCs ISP Darknet Traffic Analysis Vuln. Exploit. Evaluation Malw. Propag. Evaluation Event Gathering Database Gathering and Filtering of large sets of network data to identify unauthorized and potentially malicious activity (Worms, attacks, scans ).. National Reaction Plan +/- Alerting the Community Web, Pop SMTP DNS Critical Node Monitoring (Integrity, Availibility) Log Correlation Server Automatic Alert-Triggers - Scripts for Traces Correlation. - Tools for Flows Control & analysis. - Trace Tools. - Scripts for Smart Honey- Poting - Technical proactive and Counter-measures. 20

Saher Web : Tunisian web sites monitoring 21 21

SAHER SRV: Internet services availability monitoring (server Mail, DNS, ) 22 22

Saher IDS : Massive attack detection 23 23

NRP: National Reaction Plan - Formal Global Reaction Plan. - Establishment of Coordinating Crisis Cells ( ISPs, IDCs, Acess Providers). With CERT/TCC acting as a coordinator between them Finance and Banks Transport Sector Industry Sectors Health Sector NACS Cert-Tcc Coordination Energy Sector ISPs Telecom Operators Administration Constructors Vendors Media 24

NRP: National Reaction Plan was deployed 7 times, During Sasser& MyDoom worms attack, during suspicious hacking activity and, proactively, during big events hosted by Tunisia ( only with ISPs and telecommunication operator) ONU Conference about Terrorism 25

Case Studies 26

Kaminsky DNS Vulnerability - In July 2008, Kaminsky had discovered a fundamental flaw in the DNS protocol. ("Most overhyped security vulnerability") -The flaw could allow attackers to easily perform cache poisoning attacks on any nameserver -All internet protocols (HTTP, FTP, Email )are affected - Kaminsky informed DNS vendors in secret to develop a patch to make exploiting the vulnerability more difficult, which was released on July 8, 2008 -Kaminsky had intended not to publicize details of the attack until 30 days after the release of the patch, but it was accidentally leaked on July 21, 2008 - DNS Exploits has been published + Reverse Engineering on released patches - Kaminisky had published more information about the vulnerability on August 8, 2008 at Black Hat 2008 27

Kaminsky DNS Vulnerability Watch Process & Incident Handling Information Collection Test and Analysis Identify Affected Tunisian Servers Inform Concerned parts Crisis Cell Inform ISPs Inform CiSOs Technical Advisories (Patches, workarounds, Watch Process on DNS resolutions for Tunisian Servers ( for the 10 most visited websites in Tunisia) Add Snort Signatures in SAHER system Inform Tunisian Internet Communuty (Media, Press,..) Public Advisory Intrusion detection Monitoring with SAHER system (attack tentative) Share Blacklist IPs with ISPs 28

Exchanger. JT (August 2008) 29

Exchanger. JT (August 2008) Recieve Malware Spam Malware Analysis (static and dynamic anysis) Identify C&C Servers Identifiy Malicious Servers Identify Malware communication protocls Coordinate with ISPs Coordinate with International Partners and CERTs Stop Bad URLs Share Black List IPs Test Malware propagation in the Tunisian Cyber Space with SAHER System (Snort Signatures ) Intrusion detection Monitoring with SAHER system (attack tentative) Share Blacklist IPs with ISPs Public Advisory for Tunisian Internet Communuty (Media, Press,..) 30

Projects in progress 31

National Backup Center National Security Policy Tunisian Honeynet Project IT Security Labs: Forensics, Malware Analysis, Code Auditing, Software Assurance Assistance to set up Security and CERT/ CSIRT Cells in Ministries, GOV Establishments and also Private CERTs/CSIRTs for industrial sectors (Banks, ) Assistance to set up CERTs & Cyber Security Centers in Africa 32

Thank you for your attention