MITB Grabbing Login Credentials



Similar documents
Factoring Malware and Organized Crime in to Web Application Security

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Protect Your Business and Customers from Online Fraud

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Security A to Z the most important terms

Where every interaction matters.

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

The Top Web Application Attacks: Are you vulnerable?

Information Security Threat Trends

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Protecting Your Business from Online Banking Fraud

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Web attacks and security: SQL injection and cross-site scripting (XSS)

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Thick Client Application Security

Advancements in Botnet Attacks and Malware Distribution

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

A Critical Investigation of Botnet

Guidelines for Web applications protection with dedicated Web Application Firewall

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

Introduction: 1. Daily 360 Website Scanning for Malware

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

Operation Liberpy : Keyloggers and information theft in Latin America

Marble & MobileIron Mobile App Risk Mitigation

DDoS Attacks Can Take Down Your Online Services

Electronic Fraud Awareness Advisory

Using RD Gateway with Azure Multifactor Authentication

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

STABLE & SECURE BANK lab writeup. Page 1 of 21

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Rational AppScan & Ounce Products

Security Evaluation CLX.Sentinel

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Criteria for web application security check. Version

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

What is Web Security? Motivation

Overview of the Penetration Test Implementation and Service. Peter Kanters

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

CS5008: Internet Computing

About Botnet, and the influence that Botnet gives to broadband ISP

FORBIDDEN - Ethical Hacking Workshop Duration


QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Web Application Security

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Pentests more than just using the proper tools

HP WebInspect Tutorial

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

A TASTE OF HTTP BOTNETS

How Attackers are Targeting Your Mobile Devices. Wade Williamson

The Key to Secure Online Financial Transactions

Analytics, Big Data, & Threat Intelligence: How Security is Transforming

Streamlining Web and Security

Web Application Security

Web Application Penetration Testing

Hack Your SQL Server Database Before the Hackers Do

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

IBM Protocol Analysis Module

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Accessing the Media General SSL VPN

MIGRATIONWIZ SECURITY OVERVIEW

Malware & Botnets. Botnets

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

What Do You Mean My Cloud Data Isn t Secure?

Configuration Information

Advanced Endpoint Protection Overview

Stephen Coty Director, Threat Research

Man-in-the-Middle Attacks against the chiptan comfort Online Banking System

Common Criteria Web Application Security Scoring CCWAPSS

Firewalls and Intrusion Detection

Pentests more than just using the proper tools

The HoneyNet Project Scan Of The Month Scan 27

Transcription:

MITB Grabbing Login Credentials Original pre-login fields UID, password & site Modified pre-login fields Now with ATM details and MMN New fields added MITB malware inserted additional fields. Records them, and sends them to the attacker 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 27

MITB Grabbing Login Credentials Modified pre-login fields Now with ATM details and MMN Configuration files XML support, dynamic updates Programmable Interfaces Malware authors developing an extensible platform that can be sold or rented to other criminals 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 28

MITB Focusing on the Money Transfer Change in tactic s move from login to the money transfer First malware generation captured in early 2007 (South America) Change driven by: Widespread use of temporal multi-factor keys for authentication Backend application heuristics for spotting login patterns Inter-bank sharing of login and transfer physical location info Improved malware techniques Transfers happen after the customer logs in, from their own computer, while they are logged in. Session Riding can be conducted manually (attacker C&C) or scripted 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 29

MITB State-of-the-art Banking Proxy Trojan Victim logs in to the bank securely and banks normally Modifies the page that appears to the victim Attacker makes off with the money and the victim is unaware a transaction has occurred Intercepts each transaction Calculates what is supposed to be in the account Steals some money Proxy Trojan starts functioning once the victim logs in 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 30

Honing in on the Transaction Malware Injection Payment Details Submission Background Malware Customer enters Customer clicks Confirmation their transfer In the background, the Malware proxy Submit Fakes to proceed payment details Trojan has created it s own Validation 2 nd transation is The malware fakes a confirmed back to 3 rd Submission 2 nd Validation transfer details validation Customer failure even asked to the customer. In though the provide fake transaction Malware submits the Customer enters a validation key reality, two transfers another worked. Prompts for the transaction user to original real have been conducted validation code try maybe again customer transfer including a bankissued salt value information 2 nd Submission Submit Customer clicks Submit to proceed Submit Submit 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 31

Preventing Transaction Injection Customer enters transaction data the same way From account, To account, Amount, and When Customer creates validation token Computational hash created using transaction data, password, and temporal data Validation token only viable for one specific transaction yet more things the customer must do in order to create a transfer! 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 32

Social Engineering past CAP Transfers - Injected Page (1) Which FROM account? Page (2) How much? Where TO? Page (3) Are details correct? Page (4) CAP instructions and CODE? Page (5) Security CODE? Page (6) Validation complete! Transaction Monitoring The malware continuously monitors the customer as they navigate the pages to conduct a funds transfer HTML Page Insertion An extra page is inserted in to the transfer sequence and requests an additional CAP Security Code. 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 33

Social Engineering past CAP Transfers - Injected Attackers response ask the victim Social engineer it from them To Account: 9812-3451-23 Amount: $1,500.00 Page Insertion As part of the process, the attacker inserts a fake page (extra step in banks process) in to the Web browser. The fake page asks the victim to use their calculator again but to use a Security Code which is in fact the attackers bank account and submits the second transaction. Validation code: 456123 Validation Code Calculation Customer must type in the To Account number and Amount in to the code calculator. The calculator also uses PIN, Date and time information to calculate the validation code Security Code: 3133731137 Amount: $1,500.00 Validation code: 998543 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 34

5/14/2009 Targeted Protection Against Targeted Attacks 35

The botnet advantage The use of botnets in attacking Web applications holds several advantages Anonymity Chaining of several agents to disguise source of attack Dispersed hosts Slipping under threshold limits The power of many A force multiplier Native automation Advanced scripting engines & user manipulation 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 36

Anonymity through botnet agents Anonymous Proxies Volume of proxy services increasing year over year SOCKS Jump Point Many tools and services rely upon compromised hosts (typically botnet agents) to provide SOCKS proxies as anonymous exit/jump points. 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 37

Anonymity Services SOCKS chaining Devolving method of chaining multiple compromised machines together to anonymously tunnel data Starting from $40 and going to $300 for a quarter of access, with the price increasing based on the level of anonymity added. Commercial Anonymizing Service 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 38

Lease (part of) an existing botnet Web-based portal bot-management For a small fee, attackers can rent/purchase members of a larger botnet. Online tools enable remote management and configuration of the botnet agents Portals include performance monitoring tools how fast is the spam being sent, DDoS throughput, etc. 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 39

How do you use a botnet to attack a Web app? 5/14/2009 Targeted Protection Against Targeted Attacks 40

DDoS Mechanics 1. Hosts infected with malware via drive-bydownload 2. At a specified date & time they launch their attack 5,000 home DSL users launching a simultaneous attack can create: * 1.3 Gbps traffic volume, * 150m emails per hour, * 250k transactions per second 3. Combined volume of attack traffic causes the target to stop functioning 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 41

DDoS Tools 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 42

Several commercial SQL Injection tools make use of backend services/c&c to receive latest exploits Automated SQL Injection with search engines Many rely upon search engine queries to identify likely vulnerable Web servers before commencing their automated attack 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 43

Botnet Command and Control IRC Command and Control is still common for botnet management Command language varies upon nature of botnet capabilities Sdbot/Reptile 1:.udp 208.43.216.195 1995 999999999999 s 2:.ddos.ack 208.43.216.195 1995 9999999999999 s typically used for DDoS Rbots 1: scan.start ms08_067_netapi 25 3 download+exec x.x.x.x 2:.scan 75 1 201.x.x.x 2 1 201.x.x.x 3:.root.start lsass_445 100 3 0 -r s scan hosts within a Class-A for port 443 and attempt to exploit (Conflicker) Sample bot command sequence 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 44

Where Botnets Excel When attacking Web applications, botnets excel at: Application saturation Brute-forcing & iterative processing Bypassing threshold protection Intercepting user credentials Automating user processes Prompt attacks against newly disclosed vulnerabilities 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 45

5/14/2009 Targeted Protection Against Targeted Attacks 46

Protection Improvement Mindset Most important factor? reduce complexity Is it likely additional pages or fields would be spotted by a customer? Is it clear to the customer what s expected of them? How many pages must customers navigate through or scroll through? Are all the steps logical? Are important questions and steps presented as text or as graphics? How would a customer recognize changes to page content? Could the interface be simplified further? 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 47

All-in-one Banking Portal Applications Can the customer change everything online? Address details, delivery details, contact numbers, PIN numbers, passwords, password recovery questions, new accounts, etc. What out-of-band verification of changes are there? Change notification sent to previous contact details? Are there delays before going live? How visible are customer initiated changes? What contact info has changed? Change history goes back how far? Transaction history in HTML and Print/PDF for reconciliation? 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 48

Backend Processing How much protection/detection can be done with backend thresholds? Does the system implement thresholds on transactions per minute? Is there a delay between creation of a new payee account, and ability to transfer money to that account? Anomaly detection of transfers? Is information being shared on To: accounts? Frequency of To: account by other customers Could you identify a frequent mule account? Identity Changes? Primary contact number changing to cellphone? 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 49

Conclusions Application complexity is a root-cause Increased investment by criminals in to new crimeware tools Crimeware is a bigger Webapp threat than some angry pentester 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 50

Further Reading Continuing Business with Malware Infected Customers http://www.technicalinfo.net/papers/malwareinfectedcustomers.html Anti-fraud Image Solutions http://www.technicalinfo.net/papers/antifraudimagesolutions.html 5/14/2009 OWASP 2009 Europe - Factoring Malware and Organized Crime in to Webapp Security 51

Thank You! Questions? Gunter Ollmann - VP of Research gollmann@damballa.com Blog - http://blog.damballa.com 5/14/2009 Blog - http://technicalinfodotnet.blogspot.com Targeted Protection Against Targeted Attacks 52