Current Threat Scenario and Recent Attack Trends



Similar documents
Cyber Security and Critical Information Infrastructure

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Information Security Threat Trends

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Korea s experience of massive DDoS attacks from Botnet

Certified Cyber Security Analyst VS-1160

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Malicious Network Traffic Analysis

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Threat Events: Software Attacks (cont.)

Countermeasures against Bots

WEB ATTACKS AND COUNTERMEASURES

Security A to Z the most important terms

About Botnet, and the influence that Botnet gives to broadband ISP

Malware & Botnets. Botnets

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Detailed Description about course module wise:

Spyware. Summary. Overview of Spyware. Who Is Spying?

Network Incident Report

Promoting Network Security (A Service Provider Perspective)

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Stopping zombies, botnets and other - and web-borne threats

Current counter-measures and responses by CERTs

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Protecting Your Organisation from Targeted Cyber Intrusion

A Critical Investigation of Botnet

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

GlobalSign Malware Monitoring

Using big data analytics to identify malicious content: a case study on spam s

Phishing Activity Trends Report for the Month of December, 2007

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

BE SAFE ONLINE: Lesson Plan

Cybercrime in Canadian Criminal Law

BotNets- Cyber Torrirism

Common Cyber Threats. Common cyber threats include:

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Spyware: Securing gateway and endpoint against data theft

FORBIDDEN - Ethical Hacking Workshop Duration

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

ZNetLive Malware Monitoring

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cyber security Indian perspective & Collaboration With EU

ACCEPTABLE USE AND TAKEDOWN POLICY

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Overview of computer and communications security

DDoS Attacks Can Take Down Your Online Services

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Emerging Security Technological Threats

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

A TASTE OF HTTP BOTNETS

Attacks from the Inside

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report

Course Content: Session 1. Ethics & Hacking

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Network Security and the Small Business

CYBERTRON NETWORK SOLUTIONS

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

INFORMATION SECURITY REVIEW

Innovations in Network Security

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

How To Protect Your Network From Attack From A Hacker On A University Server

Quarterly Report: Symantec Intelligence Quarterly

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Certified Ethical Hacker Exam Version Comparison. Version Comparison

IBM Protocol Analysis Module

WHITE PAPER. Understanding How File Size Affects Malware Detection

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

How To Perform A Large Scale Attack On A Large Network

SECURING APACHE : DOS & DDOS ATTACKS - II

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

Top Ten Cyber Threats

CRYPTUS DIPLOMA IN IT SECURITY

COB 302 Management Information System (Lesson 8)

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

Transcription:

Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In)

Objectives Current Cyber space Nature of cyberspace and associated risks Current Threat Scenario Recent Attack Trends Countering cyber attacks

The Complexity of Today s Network Changes Brought in IT Large network as backbone for connectivity across the country Multiple Service providers for providing links BSNL, MTNL, Reliance, TATA, Rail Tel Multiple Technologies to support network infrastructure CDMA, VSAT, DSL Multiple Applications Trends shaping the future Ubiquitous computing, networking and mobility Embedded Computing Security IPv6 VoIP Laptops Unmanaged Devices Desktops Intranet Servers New PC Internet Router Network Infrastructure Router Perimeter Network Extranet Servers Router Perimeter Network Servers Unmanaged Device Router Branch Offices Router Unmanaged Devices Remote Workers Branch Offices Router Internet Home Users 3

The Nature of Cyber Space Proliferation of Information Technology Rapid growth in Internet Increasing online transactions Information systems are essential part of critical infrastructure 4

Security of Cyber space: Risks Internet Systems vulnerable target for attack Systems not securely configured In recent years the attack techniques have become sophisticated Rapid proliferation of viruses and worms Attackers are not confined to geographical boundaries 5

Waledac worm Spreading mechanism Spam Mail with subject lines related to valentine day messages, leading naive users to malicious URLs (Source: McAfee)

Malicious website look like this...

And like this...

On clicking anywhere on this webpage, malicious file getting download with the file name related to love messages

Global Trends

Vulnerabilities discovered Source : X-Force

Consequence of exploitation Source : X-Force

Web Application Vulnerabilities Source : X-Force

Web Application Vulnerabilities (contd.) Source : X-Force

Automated SQL Injection based attacks Source : X-Force

Critical vulnerabilities Source : X-Force

Vulnerability Exploitation Source : X-Force

Cyber attacks being observed Web defacement Spam Spoofing Scanning and probing Denial of Service Distributed Denial of Service Malicious Code Botnets Crimeware Data Theft and Data Manipulation Identity Theft Financial Frauds Social engineering Scams 18

Incidents handled by CERT-In year 2008

Phishing The word phishing comes from the analogy that Internet scammers are using email lures to fish for passwords and financial data from the sea of Internet users. Techniques E-Mail Phishing Pharming Phlash Phishing Vishing (Voice Phishing) Phishing in Sessions (Man-in-Middle attack) Rock-Phish Fast-flux Phishing 20

Phishing Phishing Web site Legitimate Web Site 21

Understanding Botnets Botnet A network of compromised computers (Infected with Bots) work as zombies Bot infected machines opens a backdoor and listen for commands issued by attackers Media for controlling botnets IRC channel P2P Instant Messaging Web sites 22

Botnets Activities and Impact Recent DDoS attacks Attacks on websites of Estonia 27 th April- 15 th May, 2007 ICMP and TCP Syn Floods Upto 100 Mbps traffic for 10 Hours DDoS on websites of Canada (August 2007) Due to Spam by Storm Botnet Attacks on root DNS servers (February 2007) DDoS attack on website of National Australia Bank (October 2006) Georgia website attacks (2008) 23

Botnets Activities and Impact Spyware, Adware Installation of BHOs Keyloggers Info stealers, CD Keys Piracy, IP theft Malware Propagation Downloaders Emails with malicious attachments Ransomware Encrypts user s data and demands money 24

Trends of Incidents Sophisticated attacks Attackers are refining their methods and consolidating assets to create global networks that support coordinated criminal activity Rise of Cyber Spying and Targeted attacks Mapping of network, probing for weakness/vulnerabilities Malware propagation through Website intrusion Large scale SQL Injection attacks like Asprox Botnet Malware propagation through Spam on the rise Storm worm, which is one of the most notorious malware programs seen during 2007-08, circulates through spam 25

Trends of Incidents Phishing Increase in cases of fast-flux phishing and rock-phish Rise in Phishing toolkits Domain name phishing and Registrar impersonation Crimeware Targeting personal information for financial frauds Information Stealing through social networking sites Rise in Attack toolkits Toolkits like Mpack and Neospolit can launch exploits for browser and client-side vulnerabilities against users who visit a malicious or compromised sites 26

Recent Attack Trends

iframe injection attack Intrude & adds IFRAME Snippet iframe Snippet Malicious Code injected into users PC 28

HTML Injection

Attack toolkit - VIP

Global Attack Trend Source: Websense 31

Asprox Botnet A trojan horse, started to spread in July, 08 Used for sending phishing scams, SQL injection attacks to hack websites attacks and formulate a botnet The trojan contains an automated SQL injection attack tool to automatically hack websites Inject iframe into web pages that redirects to malicious domains

Conficker/downadup worm Spreading at a fast speed by exploiting a windows server service vulnerability MS08-067 Attack vectors network shares removable drives, scareware and most recently Metasploit payload Infecting Windows systems with specific language operating systems such as English, Chinese, Arabic, Portugese. A list of malicious domains (randomly generated by the worm) are hosting the copy of the worm and are requested for further downloading from the infected machine. High traffic on port 445 in the affected network.

How Conficker/Downadup worm work? Source: Microsoft

Evolution of Conficker/Downadup Exploits started in September 2008 Runs as a DLL attached to svchost.exe Chinese hackers were selling the exploits for $38 Patch released by Microsoft on October 23,2008 Spreads exponentially from the unpatched systems Primarily from the unregistered(pirated) versions of the Windows Does not infects Ukrainian systems

TCP/445 Scan Volume Source: SRI

Cybercrime economy Evolution of Cybercrime economy At the beginning, vulnerabilities were being sold online (2006) Professional hackers offered Software packages, i.e. Crimeware toolkits, for sale for less technology-savvy attackers.. (2007) More sophisticated Crimeware- with update features, sophisticated, antiforensic attack techniques. (2007) Malicious code affiliation networks for users (2007) Crimeware-as-a-Service (2008) Data supplier model (2008) Pricing policies are deployed. (2008) Low Price commodities, e.g. stolen credit cards bank accounts High Price Commodities, e.g. Stolen healthcare related information, Single sign-on login credentials for organizations, email exchanges, Outlook accounts and FTP accounts Cybercrime economy has become a close copy of the real economy and following the same kind of business processes.

Cyber Security Strategy India Security Policy, Compliance and Assurance Legal Framework IT Act, 2000 IT (Amendment) Bill, 2006 Data Protection & Computer crimes Best Practices ISO 27001 Security Assurance Framework- IT/ITES/BPO Companies Security Incident Early Warning & Response CERT-In National Cyber Alert System Information Exchange with international CERTs Capacity building Skill & Competence development Training of law enforcement agencies and judicial officials in the collection and analysis of digital evidence Training in the area of implementing information security in collaboration with CMU, USA Setting up Digital Forensics Centres Domain Specific training Cyber Forensics Research and Development Network Monitoring Biometric Authentication Network Security International Collaboration 38

CERT-In Work Process CERT-In Work Process Detection Analysis Dissemination & Support Major ISPs Foreign Ptns Department of Information Technology ISP Hot Liners Private Sectors Home Users Analysis Detect Dissemination Press & TV / Radio Recovery 39

Activities of CERT-In Activities 2003 2004 2005 2006 2007 2008 E-mail messages received - 625 1822 1948 3283 4073 Incidents handled - 23 254 552 1237 2565 Security Alerts/ Incident Notes 4 20 30 48 44 49 Advisories 17 23 25 50 66 76 Vulnerability Notes 16 74 120 138 163 197 Security Guidelines 9 4 2 1 1 1 White papers - 3 6 2 2 3 Trainings 1 7 6 7 6 18 Indian Website Defacement tracked Open Proxy Servers tracked 1687 1529 4705 5211 5863 5475-236 1156 1837 1805 2332 Bot Infected systems tracked - - - - 25915 146891

Incident Response Incident Response Help Desk Internet PSTN Make a call using 1800 11-4949 Send fax using 1800 11-6969 Communicate through email at incident@cert-in.org.in Number of security incidents handled during 2008: 2565 Vulnerability Assessment Service 41

Linkages with International Forums and CERTs FIRST (Full Member) APCERT (Full Member) APWG (Research Partner) CERT/CC US-CERT JPCERT Korean CERT 42

Need of Today It s important to get in at the beginning Experience teaches us that these concerns are hard to add after the fact The Internet experience inform us: It is also a social system, not simply a technology Once we give up privacy or security, we may not be able to regain it Important to assert a leadership role while we can! 43

Thank you http://www.cert-in.org.in