Knowlton Project Analysis Study: Examining Trends in Cyber Security: Merging Network Defense and Analysis



Similar documents
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Defending Against Cyber Attacks with SessionLevel Network Security

Top Ten Cyber Threats

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

ANTIVIRUS BEST PRACTICES

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Penetration Testing Service. By Comsec Information Security Consulting

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Computer Security DD2395

Protecting Your Organisation from Targeted Cyber Intrusion

Comprehensive Advanced Threat Defense

Fighting Advanced Threats

Detailed Description about course module wise:

Network Intrusion Prevention Systems Justification and ROI

Defending Against. Phishing Attacks

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Network Incident Report

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Hacking Database for Owning your Data

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

A Case for Managed Security

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Advanced & Persistent Threat Analysis - I

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

BlackRidge Technology Transport Access Control: Overview

How We're Getting Creamed

The Key to Secure Online Financial Transactions

Beyond the Hype: Advanced Persistent Threats

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

How To Prevent Hacker Attacks With Network Behavior Analysis

Internet threats: steps to security for your small business

Innovative Defense Strategies for Securing SCADA & Control Systems

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

COSC 472 Network Security

Keystroke Encryption Technology Explained

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Spear Phishing Attacks Why They are Successful and How to Stop Them

Firewall and UTM Solutions Guide

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

INDUSTRY OVERVIEW: FINANCIAL

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

ICTN Enterprise Database Security Issues and Solutions

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

What is Really Needed to Secure the Internet of Things?

Top tips for improved network security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Deploying Firewalls Throughout Your Organization

CMPT 471 Networking II

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

CS 356 Lecture 9 Malicious Code. Spring 2013

Incident Response. Six Best Practices for Managing Cyber Breaches.

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

13 Ways Through A Firewall

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Covert Operations: Kill Chain Actions using Security Analytics

Information Security Threat Trends

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Unknown threats in Sweden. Study publication August 27, 2014

Defending Against Data Beaches: Internal Controls for Cybersecurity

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Network Security and the Small Business

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Networking for Caribbean Development

Top five strategies for combating modern threats Is anti-virus dead?

Transcription:

Knowlton Project Analysis Study: Examining Trends in Cyber Security: Merging Network Defense and Analysis March 2013 Security is a journey, not a destination www.praescientanalytics.com

INTRODUCTION Somewhere deep in the business network of a U.S. bank, a computer s hard drive spins. A few lines of hidden code written to the system s directory come alive to complete the simplest of commands. This beaconing code 1 reaches out and connects with a malicious server to create a remote connection. The hacker who surreptitiously hooked an employee with a phishing attack 2 now has complete access to the bank s network. The scenario illustrated above has become commonplace in modern computer networks. But how can this happen today if network security experts have been around for forty years? As far back as 1972, reports commissioned by the U.S. Air Force identified significant security problems in government computer networks. Today cyber security is cited as a top priority among policymakers. President Obama is seeking to allocate $769 million to the Department of Homeland Security alone for information security initiatives. Despite the resources directed towards this effort, private and public organizations continue to lose billions of dollars while their networks are hacked and their intellectual property is stolen. The cyber security community has not fundamentally changed the way networks have been protected over the past four decades. Much effort has been placed on building a bigger firewall - expanding the virtual moats and perimeter defenses that surround networks. This approach proved sufficient until about five years ago, when cyber threats evolved. To circumvent static defenses, malware embedded stealthily within standard network traffic. The summer and fall of 2008 were turbulent times. The troop surge in Iraq was underway, the presidential race was reaching a fever pitch, and a meltdown on Wall Street plunged the world economy into recession. Yet there was another equally massive shift quietly occurring amid the turmoil. The world s computer networks and the cyber security community were forever changed by the advanced threats proliferating across the globe. 1 Periodic communications from the malicious program to a command and control node. 2 Specific or mass email which targets a victim with hidden malware. Praescient Analytics LLC 635 Slaters Lane, Suite 200, Alexandria VA 22314 2

THE GOOD OLD DAYS Malicious code is nearly as old as computing itself. Some of the earliest viruses spread via floppy disk by imbedding in the boot sector 3. Proliferation of such code was limited by human interaction. As computers were increasingly networked together, a new medium emerged that further enabled the spread of malware. Effective cyber security is defined according to three core pillars: confidentiality, integrity, and availability. The confidentiality of data is the guarantee that only those who are properly authorized may have access to a system s information. Integrity of data is the concept that all information within a system is holistic, complete, and free of errors. Availability of data refers to the amount of time a system is functioning, or has is available to be accessed by the user. Prior to the mid-2000 s the purpose of most malware was to disrupt the availability of networks. Threats came primarily from anarchists who sought to corrupt hard drives and bring down large corporations. Ultimately, the goal of most attacks was to deny the availability aspect of networks. This occurred either through intentional Denial of Service (DoS) attacks or through a flood of network traffic from aggressive scanning 4. The following are examples of threats targeting network availability, each of which had a significant impact on networks worldwide: Name: Melissa (1999) Category: Mass mailing virus Infection Vector: Email Payload: Text injection into open word documents At the time of its release, the Melissa virus spread across the globe within hours, faster and any known virus had before. Melissa spread through an email attachment called LIST.DOC and then sent itself to 50 people in the victim s address book. The actual payload was minor, injecting text into open word documents. The real threat from Melissa was a second order effect: it generated a Denial of Service attack against mail servers as a result of its rapid proliferation. Melissa was one of the first well known viruses spread via networks. 3 An area on a data storage device which allows the boot process of a computer to load a program. 4 A method used to discovers hosts on a network and determine what services they are running. Praescient Analytics LLC 635 Slaters Lane, Suite 200, Alexandria VA 22314 3

Name: SQL Slammer (2003) Category: Network Worm Infection Vector: Remote execution, buffer overflow 5 Payload: Machine shutdown (inadvertent) SQL Slammer was a surprisingly efficient network worm consisting of only 376 bytes and spreading through the network via User Datagram Protocol (UDP) 6. This worm exploits a buffer overflow vulnerability in Windows SQL Server Resolution Service 7. The effectiveness of SQL Slammer had been unprecedented, within ten minutes it infected over 90% of vulnerable hosts. The payload for the Slammer worm was little more than instructions for it to propagate. It did not even write itself to disk, only existing in memory. The worm s aggressive scanning and propagation significantly impacted network availability. South Korea s entire internet was shutdown after the crash of their gateway routers. Name: Sasser (2004) Category: Network Worm Infection Vector: Remote execution, buffer overflow Payload: Machine shutdown (inadvertent) Purportedly created by a German teenager, this worm self-propagated through networks. The network worm exploits a buffer overflow vulnerability in Window s Local Security Authority Subsystem Service (LSASS) 8. After Sasser infects the host it begins to scan IP addresses in the network for the same vulnerability - then it continues to spread. Errors in the coding of Sasser caused it to shut down systems, and its aggressive scans ate up the bandwidth in networks. Sasser had serious effects on networks worldwide, from banking systems to airline communication systems. 5 A vulnerability which allows an attacker to overrun expected memory and execute code on a victim. 6 User Datagram Protocol is a connectionless protocol that can be sent in a one-way stream of data. 7 A function in windows which allows resolution of data within SQL databases. 8 Process in Windows operating system that controls the security policy of the system. Praescient Analytics LLC 635 Slaters Lane, Suite 200, Alexandria VA 22314 4

PARADIGM SHIFT: 2007-2008 2007 and 2008 represent a turning point for the cyber security industry. According to a study by Kaspersky labs, there was a 189% increase in malware by the end of 2008 9. The drastic increase alone is troubling, but around 93% of the new malware found were trojan programs, also known as backdoors 10 and rootkits 11 (fig 1). These malicious programs can allow a hacker to gain remote access to a computer, while hiding the connection so it is harder to detect. This fundamental shift began to impact the integrity and confidentiality of information assurance. Threats that target the integrity and confidentiality of a network s information are in many ways more dangerous than threats to availability. By only slightly modifying a user s data, a hacker can compromise and entire organization s perceived integrity. Also, by using covert backdoors, a malicious actor can bypass most encryption security measures. Once deployed, trojan and rootkit type malware can be very hard to detect. Often the code can hide in the kernel of a system where anti-virus programs don t routinely look. Some more advanced versions create a passive backdoor, triggered when the attacker wants to gain access. The emergence of two specific trojan intrusion sets during 2007 to 2008 showcase these properties.!! fig. 1 - Number of malicious programs detected 2007-2008 9 Sergey Golovanov et al. Kaspersky Security Bulletin 2008: Malware Evolution. June 2008. 10 An unintended and unauthorized way to access a computer system. 11 An advanced type of malicious software that allows an attacker persistent access to a system. Praescient Analytics LLC 635 Slaters Lane, Suite 200, Alexandria VA 22314 5

Name: Zeus (2007) Category: Trojan/Persistent Infection Vector: Drive-by-download, phishing Payload: Covert information exfiltration, backdoor Originally developed as a do-it-yourself crimeware kit, Zeus malware and its variants have become one of the most widespread infections in the world. Since 2007, millions Zeus infections have been reported on U.S. government and commercial networks worldwide. There are many variants of Zeus that use different infection vectors, but the most common method is through phishing or malicious downloads on the web. Zeus was one of the first large scale intrusions to hide on systems and discreetly extract users sensitive information. Once the trojan is installed, it monitors users key strokes for passwords, account numbers, and other personal identifying information. Using victims personal banking information, networks of hackers then funnel money to overseas bank accounts and money launderers. In 2010, the FBI estimated that thieves had used Zeus to steal more than $70 million 12. Because Zeus usually injects itself onto a system through legitimate traffic it can be difficult to detect. The malware also continues to evolve, avoiding detection from anti-virus software. Name: Conficker (2008) Category: Network Worm Infection Vector: Remote execution, removable media, map shares Payload: Self propagation, backdoor Perhaps no malware intrusion set shocked the information security community more than Conficker. First appearing in late 2008, infections from Conficker were so widespread and dynamic that it was dubbed the world s first superworm. Early versions of Conficker exploited a buffer overflow vulnerability less than 30 days from Microsoft s announcement. Because this network worm did not require user interaction to spread, it completely infected large enterprise networks within minutes. Ultimately, there were more than five main versions of Conficker that were discovered. In subsequent versions, the worm also spread through removable media (like USB thumb drives) and mapping default network shares (fig 2). Conficker was also dangerous in how well it hides on systems. Advanced stealth 12 FBI Press Office. International Cooperation Disrupts Multi-Country Cyber Theft Ring. 21 October 2010. Praescient Analytics LLC 635 Slaters Lane, Suite 200, Alexandria VA 22314 6

measures were seen; from modifying system time of install to mask forensics, to encrypting the file, to creating a pseudorandomly generated algorithm that conducts health checks with one of 50,000 domains every three hours. One of the more frightening aspects about Conficker s hardening is the use of MD6 13 hash based encryption. When Conficker B appeared in late December 2008 it used a 256 bit MD6 hash based encryption. MD6 encryption had only been talked about as a theory by the esteemed cryptographer Ron Rivest 30 days prior! To quote and industry analyst: Not only are we not dealing with amateurs, we are possibly dealing with people who are superior to all of our skills in crypto[grapghy]. Conficker also has the distinction of being one of the only intrusion sets to prompt the formation of worldwide working group, bringing together analysts from government, industry, and security firms to combat the near 15 million unique IP addressees infected. The damage caused by Conficker is almost too diverse to calculate - nearly every country in the world had been infected. There were disruptions and shutdowns in critical government networks, the U.S. Department of Defense even banned all USB media based on this incident. Windows systems with MS08-067 vulnerability Mapped shares with Removable media no/weak passwords fig. 2 - Infection vectors used by the Conficker worm 13 MD5 or MD6 refers to Message Digest Algorithm. It is essentially a 128 or 256 bit value produced by combining data with a cryptographic hash function. The result can be used to check data integrity. Praescient Analytics LLC 635 Slaters Lane, Suite 200, Alexandria VA 22314 7

CYBER SECURITY TODAY What control measures have the public and private sectors implemented to mitigate advanced cyber threats? In 2011 alone the U.S. spent $55 billion on cyber security, a total that is estimated to increase to $86 billion by 2016 14. Most of this spending goes into perimeter defense systems such as firewalls, intrusion detection systems (IDS), and Virtual Private Networks (VPN). These systems are relatively easy to setup and are simple means for assuring minimum security compliance. Additional measures include anti-virus or monitoring systems. The problem with most of these measures are that they are signature-based they are designed to detect threats that they have seen before and know to look for again. If the systems are not loaded up with the latest signatures, threats can still get in. Even algorithmically-based threat detection and encryption methods are only so effective; determined hackers can still manage to find ways around them. Phishing attacks are a good example of this. When an employee opens a malicious email, it often contains an embedded link or invisible code, which then connects to a hacker s listening post and infects the machine. Since all these connections occur over seemingly legitimate traffic, they are almost impossible to detect. Not even cyber industry leaders are free from threat: the security giant RSA was infiltrated using a similar method. Perimeter security also focuses on preventing penetration from the internet and does little to deter the growing challenge of insider threats. In short, cyber hacking events continue to rise because most companies use static security measures to fight the dynamic threat. Private companies lose millions of dollars each year from intellectual property theft. The average organization s cost of a data breach in 2010 was estimated to be $7.2 million. A recent study conducted by Verizon and the U.S. Secret Service illustrates how current cyber security measures fall short of protecting networks 15 : Almost 50 percent of the breaches investigated were attributed to insiders. 87 percent of breached organizations had evidence of the breach in their log files and did not detect it. 48 percent of breaches were attributed to users who intentionally abused their right to access corporate information. Most breaches in their sample (85 percent) were not considered difficult and could have been avoided without hi-tech or expensive measures. 14 Global Security Spending to Hit $86B in 2016. Infosecurity Magazine. 14 September 2012. 15 Verizon RISK Team and United States Secret Service. 2010 Data Breach Investigation Report. 2010. Praescient Analytics LLC 635 Slaters Lane, Suite 200, Alexandria VA 22314 8

CYBER ANALYTICS To truly combat advanced cyber threats one has to understand there is no panacea. Cyber security is a constant fight - it is a journey not a destination. If a system is fully patched and all software is updated it may stop 70% of malicious actors. Adding anti-virus and perimeter defense solutions will likely stop an additional 10%. But the remaining 20% of actors are the top tier who specialize in advanced persistent threats (fig 3). No matter what security measures are in place, a determined hacker will get through them. Static security infrastructure are just a deterrent, much like the lock on your front door. There are a wide array of commercial and government organizations that are targeted by top tier cyber actors. Companies that hold valuable intellectual property are profitable areas where hackers can strike. The military and the defense industrial base are also targeted by state actors trying to steal classified information. fig. 3 - Fighting the advanced 20% of cyber threats Defending against such advanced threats requires a more interactive approach. In addition to meeting all compliance standards, the most effective way to mitigate advanced threats is through a three point solution: network monitoring, penetration testing, and cyber analytics. Historically, only the federal government and intelligence agencies could afford to cultivate the skills needed for these services. Now, modern cyber espionage is so prolific that it has become cost effective to integrate the three point solution in order to stop threats. Through network monitoring, operators can have greater awareness of the network and prioritize critical nodes for defense. Penetration testing can be used periodically to identify vulnerabilities in the network. A complete assessment test should include social engineering attacks to test employee response against Praescient Analytics LLC 635 Slaters Lane, Suite 200, Alexandria VA 22314 9

tailored attacks. Documenting employee response to various social engineering attacks can help produce a stronger information technology policy for an organization. Cyber analytics is perhaps one of the newest fields in information security. This service blends aspects of intelligence analysis and cyber security. Network traffic and system logs are essentially a huge data source for cyber analysts. By using advanced analytics; one can detect infiltrations faster, regardless of their source. Pairing advanced software platforms with a human analyst is the most effective way to detect an infiltration. Intelligence analysts excel in finding unique patterns among massive databases. Consider the four phases of a hacker s attack: reconnaissance, scanning, exploitation, and persistence. If an organization consolidates systems logs and network traffic, analysts can sift through the data at each phase. Analysts can link associated events among multiple sources and replay how an attack occurred. Tracing patterns over time, analysts can determine the signature of a scan and assign it to specific actors. This will enable prediction of when an attack will occur. Traffic from backdoor beaconing can be found quickly and blocked at the gateway. The source of data will be irrelevant - analysts can just as easily identify traffic from an insider threat as they can from internet based attacks. Static cyber defense architecture will continue to be a key tool in the fight against malicious actors, but they are only part of the solution. A holistic approach to cyber security is a much more effective method of minimizing the impact of a network intrusion. By merging the skill sets of information assurance and intelligence analysis, the new field of cyber analytics will soon integrate into business models. Praescient Analytics LLC 635 Slaters Lane, Suite 200, Alexandria VA 22314 10