Attacks from the Inside



Similar documents
Web Applications The Hacker s New Target

Cloud Security:Threats & Mitgations

Keyword: Cloud computing, service model, deployment model, network layer security.

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

Chapter 15: Computer and Network Security

Cybercrime & solutions for Home users and Small Businesses

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Reducing Application Vulnerabilities by Security Engineering

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Countermeasures against Bots

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Section 12 MUST BE COMPLETED BY: 4/22

INSTANT MESSAGING SECURITY

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Cloud-Security: Show-Stopper or Enabling Technology?

Devising a Server Protection Strategy with Trend Micro

Ten Tips to Avoid Viruses and Spyware

Firewall and UTM Solutions Guide

THE HACKERS NEXT TARGET

Security Issues in Cloud Computing

Devising a Server Protection Strategy with Trend Micro

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

The Mobile Malware Problem

Web App Security Audit Services

Building A Secure Microsoft Exchange Continuity Appliance

External Supplier Control Requirements

Integrated Protection for Systems. João Batista Territory Manager

Your Web and Applications

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

The Leading Provider of Endpoint Security Solutions

CEH Version8 Course Outline

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Ethical Hacking Course Layout

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

The Education Fellowship Finance Centralisation IT Security Strategy

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

New IBM Security Scanning Software Protects Businesses From Hackers

for businesses with more than 25 seats

Seven for 7: Best practices for implementing Windows 7

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Barracuda Intrusion Detection and Prevention System

THE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite

Codes of Connection for Devices Connected to Newcastle University ICT Network

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

A Decision Maker s Guide to Securing an IT Infrastructure

Network/Cyber Security

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Endpoint Security Management


SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

74% 96 Action Items. Compliance

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Security Solution Architecture for VDI

Securing Web Applications...at the Network Layer

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

10 Things Every Web Application Firewall Should Provide Share this ebook

Detailed Description about course module wise:

FIREWALL POLICY November 2006 TNS POL - 008

Ovation Security Center Data Sheet

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEB APPLICATION SECURITY

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

AVG AntiVirus. How does this benefit you?

Network Instruments white paper

Symantec Endpoint Protection Analyzer Report

Security Practices for Online Collaboration and Social Media

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Ovation Security Center Data Sheet

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Streamlining Web and Security

Chapter 4 Application, Data and Host Security

Rational AppScan & Ounce Products

Networking for Caribbean Development

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

VESZPROG ANTI-MALWARE TEST BATTERY

Cloud Courses Description

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass

Where every interaction matters.

Top tips for improved network security

Advanced Persistent Threats

Looking Ahead The Path to Moving Security into the Cloud

White Paper. McAfee Web Security Service Technical White Paper

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Network Monitoring Tool to Identify Malware Infected Computers

HoneyBOT User Guide A Windows based honeypot solution

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Transcription:

Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman

Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The Cloud - Q&A

Blogs, forums Wiki MySpace, YouTube Other online communities: Who s on Facebook, Twitter? New territories: Social Networking

Social networking and privacy concerns.

And how it is to be fooled

The Threats only originated from outside? Access Control And Firewall IDS/IPS Application Firewall DoS Web Server The Enterprise Databases The Internet Antispoofing Parameter Tampering Web Server know Cross Site vulnerabilities Scripting Application Server Backend Server/System Port Scanning Pattern- Based Attacks SQL Injection Cookie Poisoning User Identification Access Control Encrypted transport of data Firewall Universal threat management Anomaly detection Intrusion prevention Vulnerability management Remediation/Patching Compliance and risk management Host protection (server and desktop) Layer 4 7 protection (content, URL, Web) Content Control Data Leakage management Source:IBM

Today s Networks Lack Clear, Crisp Boundaries. Internal/External network Individual Users connect from multiple locations Managed/Unmanaged devices Individual devices operate both inside the network, and on public networks New Devices on the Network eg. Netbooks, Mobile devices, etc Network Telecommuters Contractors Internet Mobile Users Wireless Users

Today's networks

Infection scenario Start Department Internet Firewall Content Switch Data centre Security

Infected web site Infection scenario drive by infection Drive-by infection Infected web-site Contains malicious script Day Zero. Infects files on disk Spreads through ARP Department Internet Firewall Content Switch Data centre Security

Infection scenario II Infected web site Payload Malicous web site Infection Payload - Downloader - Downloads new Malware - Spreads Department Internet Firewall Content Switch Data centre Security

Most used spreading protocols Malware spread vector: widely used ports CIFS/SMB RPC

Why are CIFS and SMB important? Malware spread vector : widely used ports CIFS/SMB RPC

Avoid infections User training (MSN, unknown pop-up s, e- mail, etc. ) Patch management (Hardware) Remediation Anti-virus management Activated, according to policies Up-to-date definition files Discovery of unknown nodes in the network Alerts In-line Network traffic content scanning

In-Line Network Content Scanner Network transparent real-time malware-scanner Scans HTTP, FTP, SMTP, TFTP, RPC, POP3, IRC, SMB/CIFS No IP No IP Admin IP

Content scanning: where to install? SCADA Legacy Environments? Networks?

Changing Solutions? Worms Spyware Viruses Data Theft PeerToPeer attacks Adware Internal Hacker Bad Stuff Spam External Hacker Exploits Identity Theft User Phishing DoS Vulnerabilities DDoS Mailers

In the Cloud Difficult to lay down a definition as it depends on the use Cloud Computing is an on-demand service model of IT provision often based on virtualization and distributed computing technologies. It s divided up in several categories. Working definition from Enisa

In the Cloud: SaaS Software as a Service: SaaS is software offered by a third-party provider, available on demand, usually via the Internet and remotely configurable. Examples include online word processing and spreadsheet tools, CRM services and web content delivery services (Google Docs, etc.).

In the Cloud: PaaS Platform as a Service PaaS allows customers to develop new applications using APIs deployed and configurable remotely. The platforms offered include development tools, configuration management and deployment platforms. Examples are Microsoft Azure or the Google App engine

In the Cloud: IaaS Infrastructure as a Service IaaS provides virtual machines and other abstracted hardware and operating systems which may be controlled through a service API. Examples are Terremark Enterprise Cloud, Windows Live Skydrive, etc

Malware Information Initiative (Mii) In the Cloud technology 1800000 1600000 1400000 1200000 1000000 800000 600000 Incidents File Incidents Url Incidents Machines Files Machines Urls Machines 400000 200000 0 January February March April May June July August 2010

The security benefits of cloud computing: The benefits of scale and rapid smart scaling of resources Standardized interfaces for managed security services Audit and evidence gathering More timely, effective and efficient updates and defaults. We love cloud computing Questions: What about the in-the-cloud infrastucture? DDOS? Could it be circumvented? How will the user react? How will the vendor react?

Top 9 In-The-Cloud Problems #9 Identity management

Top 9 In-The-Cloud Problems #8 Nefarious use of Service

Top 9 In-The-Cloud Problems #7 Account/Service Hijacking

Top 9 In-The-Cloud #6 Financial DDOS Problems

Top 9 In-The-Cloud Problems #5 Data Loss/Data Leakage

Top 9 In-The-Cloud Problems #4 Unknown Risk Profile

Top 9 In-The-Cloud Problems #3 Hidden Logs/Intrusion Attempts

#2 Insider abuse Top 9 In-The-Cloud Problems

Top 9 In-The-Cloud Problems #1 Centralized AAA Abuse/Trust (Authentication,Authorization en Accounting) Now you see why we love the cloud...

Clouds

The big change? Security has changed!!! AM security model Detection rates Response to new threats Frequency of updates The new security model It s not what your AM knows about But what s allowed to run on your computer But what s allowed to run on your network

Viruses on your RADIO?

Viruses on your refrigerator?

Oh no Crossover viruses!

Nanobots Science Fiction ideas that came true (sort of) In his story A Menace in Miniature (1937), Raymond Z. Gallun imagined sinister ultramicrobots.

Eddy Willems Security Evangelist Eddy.Willems@gdata.de Righard J. Zwienenberg Chief Research Officer Righard.Zwienenberg@norman.com