Compromising Remote Access: A Live Hack Demonstration

Similar documents
SECURING YOUR REMOTE DESKTOP CONNECTION

V ISA SECURITY ALERT 13 November 2015

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS

Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

SecurityMetrics Introduction to PCI Compliance

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Cyber Security An Exercise in Predicting the Future

SESSION 507 Thursday, March 26, 11:15 AM - 12:15 PM Track: Desktop Support

SecurityMetrics. PCI Starter Kit

SecurityMetrics Vision whitepaper

IT Compliance Volume II

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

Cybersecurity Health Check At A Glance

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

E-Virus in Six Cisco Routers

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments

Why The Security You Bought Yesterday, Won t Save You Today

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

MITIGATING LARGE MERCHANT DATA BREACHES

CHIS, Inc. Privacy General Guidelines

See page 16. Thomas A. Vallas

Welcome to part 2 of the HIPAA Security Administrative Safeguards presentation. This presentation covers information access management, security

I ve been breached! Now what?

Oakland Family Services - Was Your Hacked?

Franchise Data Compromise Trends and Cardholder. December, 2010

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Cyber Exploits: Improving Defenses Against Penetration Attempts

Guide to Vulnerability Management for Small Companies

INFORMATION SECURITY FOR YOUR AGENCY

Introduction. PCI DSS Overview

FACT SHEET: Ransomware and HIPAA

A brief on Two-Factor Authentication

Securing SharePoint 101. Rob Rachwald Imperva

Part 14: USB Port Security 2015

How To Protect Your Data From Being Stolen

New PCI Standards Enhance Security of Cardholder Data

White Paper. Data Security. The Top Threat Facing Enterprises Today

Data Breach Lessons Learned. June 11, 2015

VoipSwitch Security Audit

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

Windows Remote Access

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Data Access Request Service

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

Remote Access Securing Your Employees Out of the Office

GFI White Paper PCI-DSS compliance and GFI Software products

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

2012 Data Breach Investigations Report

Policy Title: HIPAA Security Awareness and Training

InfoGard Healthcare Services InfoGard Laboratories Inc.

Digital Pathways. Penetration Testing

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

N-Dimension Solutions Cyber Security for Utilities

Information Security for the Rest of Us

HIPAA Security COMPLIANCE Checklist For Employers

Cybersecurity. Are you prepared?

The Business Case for Security Information Management

Penetration Testing //Vulnerability Assessment //Remedy

Identity Theft 101 and Beyond. Bryan Stanwood, CPCU, ARM, CIC, AAI Partner, pureprm LLC and The Virtuoso! Experience

Creating, Developing and Instituting an Effective Incident Response Plan. Webinar. 15 April 2015

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Locking down a Hitachi ID Suite server

NATIONAL CYBER SECURITY AWARENESS MONTH

PCI Compliance in Multi-Site Retail Environments

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Software that provides secure access to technology, everywhere.

ALERT LOGIC FOR HIPAA COMPLIANCE

PCI Compliance. Top 10 Questions & Answers

Protecting Your Organisation from Targeted Cyber Intrusion

RemotelyAnywhere. Security Considerations

Securing Virtual Desktop Infrastructures with Strong Authentication

USM IT Security Council Guide for Security Event Logging. Version 1.1

Nine Network Considerations in the New HIPAA Landscape

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Presented by Evan Sylvester, CISSP

Common Cyber Threats. Common cyber threats include:

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Security Management. Keeping the IT Security Administrator Busy

10 Quick Tips to Mobile Security

The Top Web Application Attacks: Are you vulnerable?

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

Data Security for the Hospitality

Passing PCI Compliance How to Address the Application Security Mandates

Log Management as an Early Warning System

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Why is a strong password important?

HELPFUL TIPS: MOBILE DEVICE SECURITY

Transcription:

Compromising Remote Access: A Live Hack Demonstration Gary Glover, Sr. Director of Security Assessments About SecurityMetrics Helping organizations comply with mandates, avoid security breaches, and prevent data theft since 2000. 1 1

About Me Gary Glover CISSP, CISA, QSA, PA-QSA 10+ yrs security exp. 2 Healthcare Under Attack Medical identify theft incidents increased 21.7% since 2014 (Ponemon Institute) 29.3 million records stolen since 2009 (HHS) 90% of all healthcare orgs had a compromise within the last 2 years (Ponemon Institute) 3 2

Data Breaches Affect Everyone 4 Insecure Remote Access #1 compromise pathway of today s hackers Used to access PHI from home, on-the-go Common applications RDP LogMeIn RemotePC pcanywhere GoToMyPC VPN 5 3

Remote Access Integrated solutions Ports used: 3389, 5631, 5632, 443, 80, 5900 Over 90,000 estimated with port 3389* open (using Remote Desktop Connection software) Hackers simply need credentials * 4% of SecurityMetrics unique targets in 2013/2014 had 3389 open. 4% times 7M US merchants = 94,400 merchants 6 Case Study: Target Hacker gained access via HVAC remote access account Leapfrog to other systems inside network Result? Theft of 40 million cards Affected over 70 million cards 7 4

Sample Attack 1. Scan Internet for open remote access ports 2. Brute force credentials w/ online password list 3. Test remote access credentials 4. If they re successful, gain access to system 5. Download malware onto system 6. Capture patient information 8 Stolen Credentials 9 5

Pivot Attacks EHR 10 Malware 6

Malware Unauthorized Software 156 million phishing emails 16 million make it past firewalls and filters 8 million opened 800,000 embedded links opened 80,000 fall for scam and share sensitive info this repeats every day (Sophos) Phishing: common point of malware introduction 12 Example Malware: Infostealer.Rawpos Creation? Earliest record of infected systems Feb 2013 Discovered Feb 18, 2014 First anti-virus to detect Sept 5, 2014? 1 year 7 months Antivirus alone will not protect your system sufficiently! 14 7

POS Malware Installation Attack vectors Inside job (USB) Phishing/social engineering Vulnerabilities exploitation Weakly configured remote access 15 Biggest Concerns Malware is not being detected by anti-virus It can remain on systems for a long time before noticed It s being customized for attacks 16 8

Live Hack Attack Fundamentals Scan for port 3389 to identify potential targets Dictionary/ brute force 3389 on potential targets Test access (where credentials validated) Go exploring Install malware 18 9

19 HIPAA Security Rule Protect ephi created, received, used, or maintained by a covered entity Appropriate administrative, technical and physical safeguards to ensure the confidentiality, integrity and security of ephi. 20 10

Risk Analysis Annual review of vulnerabilities, threats, and risks Scope analysis Data collection Vulnerabilities/threat identification Assessment of current security measures Likelihood of threat occurrence Potential impact of threat Risk level Periodic review/update as needed 21 Defining Scope is Critical 22 11

Risk Management Plan Evidence of good faith compliance Be sure to include: Action items Milestones Completion dates Daily/weekly progress 23 Take a Multilayered Approach to Security 12

Get Business Associates on Board ~30% of patient records breached have involved a business associate from 2009-2014. (HHS) Be a professional skeptic about third parties Most don t realize they re part of HIPAA regulations 25 26 13

Get Employees on Board Your weakest link: Employees Workforce member negligence will continue to be the leading cause of security incidents in the next year. (Experian) 15 minute meetings every month are better than 3 hour trainings every year 28 Controlling Employee Access Role based access: All staff should have separate user accounts 85% of recent breaches could have been prevented by reducing admin/access privileges, whitelisting applications, and system patching. (DHS) 29 14

Employee Training Physical security Phishing Passwords Policies Personal email HIPAA Security Rule 30 Change Default Username Change admin to something more difficult to guess DrBrown Officeadmin Attacker must correctly guess both username and password at the same time to gain access 31 15

Set Lock Out Limits (Login Attempts) Enable user lockouts after a certain number of failed attempts Best practice: set lockout to zero to lock account indefinitely 32 Implement 2-Factor Authentication Two different forms of authentication necessary to access an application Must contain: User knows (e.g., a username and password) User has (e.g., a cell phone or RSA token) User is (e.g., a fingerprint) 34 16

Use a Passphrase No common passwords Complex passwords can be easy to guess 123!@#qwe (keyboard patterns) Jessica123 (social engineering + common password) Best practice: passphrase I wear my sunglasses at night Iwmsg@n1980! 35 Start Vulnerability Scanning Vulnerability scans: automatic tests that run on software, hardware, and network structures. Some can find more than 50,000 unique vulnerabilities Important: remediation Once a scan completes, fix any vulnerabilities immediately 36 17

File Integrity Monitoring Software Install and monitor file integrity monitoring software on all critical systems. Enable logging on critical systems Review log alerts Employ log alerting software to receive alerts of suspicious activity 37 Anti-Virus Antivirus alone will not protect your system sufficiently Keep up-to-date Run regularly 38 18

Get Help Consult with a security expert Provides best security practices customized to your organization HIPAA experts are IT experts, security experts, and HIPAA experts 39 This hack demo was a simple attack. But easy to thwart through simple controls. 40 19

Questions? gglover@securitymetrics.com www.securitymetrics.com 20