Top 10 Security Trends



Similar documents
Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Current counter-measures and responses by CERTs

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Using big data analytics to identify malicious content: a case study on spam s

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Promoting Network Security (A Service Provider Perspective)

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Current Threat Scenario and Recent Attack Trends

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Security A to Z the most important terms

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Information Security Threat Trends

Countermeasures against Bots

Protect Yourself in the Cloud Age

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

What is Cyber Liability

Spyware: Securing gateway and endpoint against data theft

Open an attachment and bring down your network?

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Stopping zombies, botnets and other - and web-borne threats

Using Windows Update for Windows XP

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

The Mobile Malware Problem

Emerging Security Technological Threats

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

What is Web Security? Motivation

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

Managing Security Risks in Modern IT Networks

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Managing Web Security in an Increasingly Challenging Threat Landscape

End to End Security do Endpoint ao Datacenter

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

Secure Your Mobile Workplace

Top 5 Security Trends and Strategies for 2011/2012 Peter Sandkuijl Europe SE manager network security psandkuijl@checkpoint.com

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

Vulnerability Assessment & Compliance

Hacking Database for Owning your Data

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Vulnerabilità e Attacchi alle Infrastrutture IT Simone Riccetti. Sr. IT Security Architect

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

The Onslaught of Cyber Security Threats and What that Means to You

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Data Center security trends

Using Windows Update for Windows Me

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

7 Cs of WEB design - Customer Interface

The FBI and the Internet

Detecting P2P-Controlled Bots on the Host

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

What are the common online dangers?

Cyber Security and Critical Information Infrastructure

Microsoft Security Intelligence Report volume 7 (January through June 2009)

Topic 1 Lesson 1: Importance of network security

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Firewall and UTM Solutions Guide

Cyber-Security Risk in the Global Organization:

Nuclear Security Requires Cyber Security

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

WEB APPLICATION SECURITY

Innovations in Network Security

Network attack and defense

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Security Business Review

Transcription:

Top 10 Security Trends Keynote at e-irt Open Workshop on e-infrastructure Audimax HG F30, ETH Zurich April 24th, 2008 Dr. Thomas Dübendorfer, CISSP President ISSS / Software Engineer Tech Lead Google thomas@duebendorfer.ch Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 1

Economic Value of Information Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 2

E-Underground Economy Prices (Symantec) Source: Symantec Corporation, Threat Report 2007, published April 2008 http://www.symantec.com/content/de/de/about/downloads/presscenter/internet_security_threat_report-zusammenfassung.pdf Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 3

E-Underground Economy Prices (GData) Game Accounts: EUR 6.- per World of Warcraft (WoW) Account Renting out a bot network for DDoS Attack: US$ 20.- / h US$ 100.- / day E-Mail Addresses: EUR 100.- for 10 million email addresses EUR 140.- for do-it-yourself spam starter package: 5 million email addresses with tool for sending email spam included EUR 350.- for 20 million email addresses EUR 35.000 per new exploit Source: GData Newsletter, Oct 22, 2007, http://www.gdata.de/unternehmen/de/articleview/3920/1/160/ Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 4

Critical Infrastructure Outages Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 5

Power Blackout Incidents 2003 US/Canada Northeast Blackout (Aug 14) - 50 million people affected; $6 billion USD losses - Cause: FirstEnergy Corporation's failure to trim trees in part of its Ohio service area, then cascading failures 2003 Italy Blackout (Sept 28) - 56 million people affected during 9 hours - Cause: Power line which supplied electricity to Italy from Switzerland damaged by storm, then cascading failures 2005 SBB Switzerland Blackout (June 22) - 100 000 passengers captured in trains - Full SBB train network comes to a halt - Cause: Too little power in Tessin with cascading effects 2008 Florida Blackout (Feb 26) - 2.5 million people affected - Cause: Overheated voltage switch caught fire in a power substation near Turkey Point Nuclear Generating Station Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 6

Data Link Outages 2006 (Dec 26) Taiwan/Hong Kong: Six out of seven submarine cables snapped by earthquake off Taiwan Internet connectivity back to normal after 50 days. 2007 (May 3-11): 12 DDoS attacks at 70+ Mbps on Estonian websites; 7 attacks lasting for 10+ hours 2008 (Jan/Feb): 9 cuts of three submarine Internet cables in the Mediterranean, Suez Canal, Persian Gulf, near Bandar Abbas in Iran and near Penang, Malaysia 91 million people affected Sources: http://home.att.net/~thehessians/quakethreat.html, http://asert.arbornetworks.com/2007/05/estonian-ddos-attacks-a-summary-to-date/ Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 7

Bot Networks Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 8

Kraken Bot Network April 13, 2008: 495,000 computers in the Kraken botnet botnet has infiltrated 50 Fortune 500 companies largest known active bot network Infection path: Manipulated web image that installs a trojan downloader binary (and possibly other infection paths) Source: http://www.damballa.com/mediacenter/kraken_info.php Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 9

Active Bot Networks (ATLAS/Arbor) Source: http://atlas.arbor.net/, Apr 22nd 2008 Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 10

Third Parties Controlling Information Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 11

Who controls your information? Webmail 2003 (July 21): Swiss Freemail Provider Sunrise has lost email account data of 550 000 customers (Freesurf, Freesurf plus und Weboffice) Credit Card Records Medical Records Voice Carriers Paris Hilton / T-Mobile phone data hack Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 12

Complexity Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 13

Linux: Serving A Single Web Page (Apache) Linux 1.0.0 (1994): 0.18 mill. LOC Linux 2.2.0 (1999): 1.8 mil. Linux 2.4.0 (2001): 3.4 mill. Linux 2.6.0 (2003): 5 mill. Source: Sana Security, 2004; http://www.thisisby.us/index.php/content/why_windows_is_less_secure_than_linux Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 14

Windows: Serving A Single Web Page (IIS) Source: Sana Security, 2004 Windows 3.1: 2.5 mill. LOC Windows 95: 15 mill. Windows XP: 40 mill. Windows Vista:>50 mill. Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 15

Criminals Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 16

Criminals Run E-Underground business Biggest threat currently Professional! No longer hobbyist hacker that looks for bragging rights Lack of worldwide regulations and uniform law enforcement Crimes: Identity theft (steal credentials) Industry espionage Spam (>70% of all emails in 2007 acc. to Symantec) Nigerian Money Scams DDoS extortion: sport bet sites etc. and many more Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 17

Drive-By Downloads (Web Browser Exploits) Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 18

Malicious Web Sites >3 million web sites are known to be malicious Popular exploits are linked from >10,000 web sites Domains with malicious URLs marked may harm your computer on Google s search result page. Source: Google 2008, http://research.google.com/archive/ provos-2008a.pdf Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 19

Ratio of Google Search Queries Containing At Least One Malicious URL in Search Results 1.3% Source: Google 2008, http://research.google.com/archive/provos-2008a.pdf Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 20

Ratio of Malicious URLs by Content Category Source: Google 2008, http://research.google.com/archive/provos-2008a.pdf Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 21

Slower Patching and Faster Exploits Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 22

Apple versus Microsoft Apple: Number of unpatched critical vulnerabilities Source: 0-Day Patch - Exposing Vendors (In)security Performance, BlackHat 2008, http://www.techzoom.net/publications/papers.en Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 23

Apple versus Microsoft Microsoft: Number of unpatched critical vulnerabilities Source: 0-Day Patch - Exposing Vendors (In)security Performance, BlackHat 2008, http://www.techzoom.net/publications/papers.en Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 24

Zotob Worm (2005) August 2005: Zotob worm (Rbot worm variant) appeared 5 (!) days after Microsoft released a patch for a Windows plug n play component. Rbot can force an infected computer to continuously restart Its outbreak on Aug 16th, 2005 was covered "live" on CNN television, as the network's own computers got infected. Clean-up per company affected: Average cost of US$ 97,000 80 hours of cleanup Source: http://en.wikipedia.org/wiki/zotob_(computer_worm) Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 25

Exploit Generator (2008) Given: Buggy program with an unknown vulnerability Corresponding Security Patch An exploit generator developed at Carnegie Mellon University can automatically create an exploit for unpatched systems within a few minutes. Shown for several Windows vulnerabilities and patches. Source: http://www.cs.cmu.edu/~dbrumley/pubs/apeg.pdf To appear in May 2008 at IEEE Security and Privacy Symposium Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 26

Vulnerable Internet End Points Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 27

Internet Clients are Most Vulnerable but also servers Image Source: http://www.webpchelp.com/antivirus/antivirus.html Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 28

Lack of Security Aware Software Developers Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 29

Buffer Overflow Buffer: memory used to store user input Buffer overflow: a condition that occurs when more user input is provided than can fit in the buffer; this can lead to code injection and execution 10 char buf[10] 0 Known since 1972; first exploit 1988 (Morris worm) 50% of CERT advisories in 1998! Jan 2008: Two Buffer Overflows in Apple Quicktime Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 30

Summary Top 10 Security Trends Economic Value of Information Critical Infrastructure Outages Bot Networks Third Parties Controlling Information Complexity Criminals Drive-By Downloads Slower Patching and Faster Exploits Vulnerable Internet End Points Lack of Security Aware Software Developers Thanks for your attention! Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 31