2012 Global Threats and Trends



Similar documents
Global Security Report 2011

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

Web Hacking Incidents Revealed: Trends, Stats and How to Defend. Ryan Barnett Senior Security Researcher SpiderLabs Research

2015 TRUSTWAVE GLOBAL SECURITY REPORT

IBM Security Strategy

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

CYBERTRON NETWORK SOLUTIONS

Where every interaction matters.

Global Partner Management Notice

External Supplier Control Requirements

The Key to Secure Online Financial Transactions

Protecting Your Organisation from Targeted Cyber Intrusion

How to complete the Secure Internet Site Declaration (SISD) form

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

A Decision Maker s Guide to Securing an IT Infrastructure

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

The Cloud App Visibility Blindspot

Cloud Security:Threats & Mitgations

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How To Manage Security On A Networked Computer System

Course Content: Session 1. Ethics & Hacking

Becoming PCI Compliant

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

That Point of Sale is a PoS

IT Security Risks & Trends

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Data Security for the Hospitality

MANAGED SECURITY TESTING

Franchise Data Compromise Trends and Cardholder. December, 2010

End-user Security Analytics Strengthens Protection with ArcSight

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Evaluation Report. Office of Inspector General

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Managing Web Security in an Increasingly Challenging Threat Landscape

A Network Administrator s Guide to Web App Security

Magento Security and Vulnerabilities. Roman Stepanov

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Presented by Evan Sylvester, CISSP

Reducing Application Vulnerabilities by Security Engineering

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Passing PCI Compliance How to Address the Application Security Mandates

WEB ATTACKS AND COUNTERMEASURES

Gateway Security at Stateful Inspection/Application Proxy

Content Security: Protect Your Network with Five Must-Haves

How To Protect Your Data From Being Stolen

Keystroke Encryption Technology Explained

Defending Against Cyber Attacks with SessionLevel Network Security

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Guidelines for Web applications protection with dedicated Web Application Firewall

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

CRYPTUS DIPLOMA IN IT SECURITY

PCI Compliance Updates

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

THE WEB HACKING INCIDENTS DATABASE 2009

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Thoughts on PCI DSS 3.0. September, 2014

Template for PFI Final Incident Report for Remote Investigations

CEH Version8 Course Outline

RSA Security Analytics

Cyber Security & Data Privacy. January 22, 2014

Thick Client Application Security

Protect Your Business and Customers from Online Fraud

Common Cyber Threats. Common cyber threats include:

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

INDUSTRY OVERVIEW: FINANCIAL

Securing SharePoint 101. Rob Rachwald Imperva

Introduction: 1. Daily 360 Website Scanning for Malware

Breach Found. Did It Hurt?

PCI DSS: An Evolving Standard

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.0.

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Payment Card Industry Self-Assessment Questionnaire

Reducing the Cost and Complexity of Web Vulnerability Management

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

Importance of Web Application Firewall Technology for Protecting Web-based Resources

The Top Web Application Attacks: Are you vulnerable?

What is Web Security? Motivation

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.1.

Transcription:

2012 Global Threats and Trends Presented by: Nicholas J. Percoco Trustwave SVP & Head of SpiderLabs

Agenda Introduction 2011 Incident Investigations The Breach Triad Malware Trends Security Weaknesses Under the Microscope Our Defenses Conclusion Questions? 2

Introduction

Trustwave SpiderLabs Trustwave SpiderLabs uses real-world and innovative security research to improve Trustwave products, and provides unmatched expertise and intelligence to customers. THREATS PROTECTIONS Real-World Customers Discovered Learned Response and Investigation (R&I) Analysis and Testing (A&T) Research and Development (R&D) Products Partners 4

Trustwave 2012 Global Security Report Results from more than 300 incident response and forensic investigations performed in 18 countries. Research analysis performed on data collected from SpiderLabs engagements combined with Trustwave s Managed Security Service and SSL offerings. Analysis from more than 2,000 manual penetration tests and 2 million network and application vulnerability scans. Review of more than 25 different anti-virus vendors. Trends from 16 billion emails collected from 2008-2011. Review of 300 publically disclosed Web-based breaches from 2011. Usage and weakness trends of more then 2 million real-world passwords from corporate information systems. 5

Focus In this presentation, we will: Highlight the threats targeting your organization's assets Explain state-of-the-art attack methods as seen through our data breach investigations Place the most common weaknesses under the microscope based upon our real-world security research 6

2011 Incident Investigations Data and trends from more than 300 investigations

Active Year for Incident Response More than 300 investigations in 2011 Represented data breaches in 18 different countries 42% more investigations than 2010 Attacks are increasing Organizations more aware of breach disclosure requirements 8

Industries & Data Targeted Food & Beverage and Retail industries continue to be major focus of criminal groups: 77% (2010: 75%) 9

Industries & Data Targeted Customer Records are the data attackers target most, specifically payment card data: 89% (2010: 89%) 10

Demo #1 Targeted Attack

Assets Targeted Assets attackers went after: 75% Software POS terminals (2010: 75%) 20% E-commerce (2010: 9%) 12

System Admin Responsibility 76% of cases: a third party was responsible for a major component of system admin (2010: 88%) What you can do? Contractually build in security requirements Impose your policies and procedures on third parties (e.g., password policies) 13

Detection Method Self-Detection is vital to stop attackers early in their efforts 16% (2010: 20%) Law Enforcement increased their efforts 33% (2010: 7%) Reliance on external detection increases the attack window 173.5 days vs. 43 days 14

Attack Timeline 2011 cases spanned approximately 44 months 35.8% had an initial attack entry within Q3 2010 15

Origin of Attack 32.5% Unknown (2010: 24%) 29.6% Russia (2010: 32%) 10.5% USA (2010: 6%) Caveats Easy to fake origin Anon proxies (like Tor) Route via hacked systems Challenges Cross border LE Do attackers need to hide? 16

The Breach Triad How attackers infiltrate, harvest data and exfiltrate

Infiltration Gaining unauthorized access 62% RAS/RAA (2010:55%) 7% SQLi (2010: 6%) 20% Unknown 2010: 18%) Why are some methods unknown? Weak credentials Client side attacks Insufficient logging/ monitoring 18

Aggregation or Data Harvesting Capturing sensitive data Approximately flat on last year Hiding malware in plain sight In-transit attacks Memory, network and sniffers Key-loggers Data re-redirection Process modification to reroute data to attacks systems or tool 19

Exfiltration Removing compromised data Reuse of Infiltration mechanisms Malware with autoexport functionality Emulate end-user traffic on the network to avoid detection 20

Malware Trends Common and targeted

Many Differences Common Self-propagation through vulnerabilities or user actions Widely distributed Easily detectable by AV vendors Targeted No propagation and may not exploits vulnerabilities Application/system specific Only found in target environments Most found in Trustwave 2011 investigations were undetectable by AV; only 12% by top AV vendors 22

Targeted Malware Types Popular Types Memory Parser obtains data in use out of system memory Keystroke Loggers target user and device input Application Specific hook the applications with access to target data 23

Demo #2 Memory Dumper

Data Export Functionality Malware Delivers HTTPS is the most popular way to get compromised data out Blends into user traffic Some Stay Quiet Some malware does not have ANY export capabilities Found in the highly targeted cases we investigated in 2011 25

Security Weaknesses under the Microscope Four vulnerable resources in the workplace

The Network Trustwave offers a vulnerability scanning service with more than 2 million customers. Trustwave SpiderLabs performs more than 2,000 manual penetration tests annually. The data from these combined efforts revealed the top network issues facing organizations today. 27

The Network Default Credentials Many devices come shipped with default accounts. We found them everywhere: 28% of Apache Tomcat These accounts/password can be easily changed upon installation. 10% of Jboss Installs 9% of phpmyadmin sites Many administrators fail to do so. 2% of ALL Cisco devices 28

The Network Clear Text Traffic Encrypted methods for nearly every Internet protocol have existed for more than a decade. Legitimate reasons exist for unencrypted web traffic but not for: Web Application Logins File Transfers Email 29

The Network Remote Access Remote Access was the number one infiltration method for data breaches in 2011 (62%). Sending clear text credentials over the Internet can result in accounts being compromised. One in five organizations use insecure remote access solutions. 30

The Network Top 10 Issues 1. Weak or Blank Admin Passwords 2. Sensitive Data Transmitted Unencrypted 3. Weak Database Credentials 4. ARP Cache Poisoning 5. Wireless Clients Probe for Stored Profiles 6. Use of WEP in Wireless Networks 7. LAN Manager Response for NTLM 8. Firewalls Allows Access to Internal Systems. 9. Sensitive Information Stored Outside of Secured Networks 10. Sensitive Information Transmitted Over Bluetooth 31

Email Trustwave offers mailmax, a cloudbased secure email service that scans more than 4 billion emails per year. We reviewed all emails processed from 2008 to 2011 to produce email security trends. Spam sharply decreased in 2011 (36% of all email processed) after peaking at 53% in 2010. 32

Email Spam Subject Lines The majority of spam (83%) consisted of two categories: Pharmaceutical Pills Pornography 33

Email Dangerous Files Our interception of executable files via email has almost doubled each year since 2008. Executables are often use to send malware to victims or part of worm propagation. 34

Email Temporal Analysis Executable Alert! Start: 8:00 AM End: 9:00 AM Virus Alert! Start: 8:00 AM End: 9:00 AM Virus Alert! Start: August End: September 35

The Web Trustwave is a sponsor and active contributor to the Web Hacking Incident Database (WHID) containing more than 300 incidents from 2011. Trustwave SpiderLabs performs hundreds of manual application security tests on an annual basis. The data from these combined efforts revealed the top Web application issues facing organizations today. 36

The Web Top Attacks The top attack category is Unreported which means either: Insufficient Logging Not Configured Correctly No Visibility Into Web Traffic Public Disclosure Resistance Fear of Public Perception Impact to Custom Confidence 37

The Web Top Outcomes There two main motivations for these attacks: Hacking for Profit Extraction of Customer Data Bank Fraud Ideological Hacking Embarrassment Occupy XYZ 38

The Web Vertical Market Attacks SQL injection and denial of service are vertical agnostic. Cross-Site Request Forgery (CSRF) are most common in social networks and shared hosting providers. 39

The Web Top 10 Issues 1. SQL Injection 6. Authentication Bypass 2. Logic Flaw 3. Cross-Site Scripting (XSS) 4. Authorization Bypass 5. Session Handling Flaws 7. Cross-Site Request Forgery (CSRF) 8. Source Code Disclosure 9. Detailed Error Messages 10. Vulnerable Third-Party Software 40

Mobile Trustwave SpiderLabs actively performs research in the area of mobile security. Most organizations treat mobile devices as miniature PCs in their security programs. Attack trends started to appear in 2011 as mobile security just begins to evolve. 41

Mobile Banking Trojans Historically, banking Trojans targets PCs but in 2011: Zeus and SpyEye made an appearance on Android and ios. Targeting Mobile Transaction Authentication Numbers (mtans) Self-propagation ability first appeared in 2012 via SMS 42

Mobile Location Aware Malware Mobile devices are designed to perform GPS tracking. Malware can easily access this information. Creates physical security issues for employees and executives in transit! 43

Mobile The Android Situation Android has > 50% of the Mobile Device Market Google only began screening Apps for security issues. Third-party markets are also littered with malware. 44

Demo #3 Android Malware

Our Defenses Basic controls

Passwords 2.5+ Million Passwords Analyzed All in use within the enterprise Common Weaknesses Shared admin p/w New employee default p/w Poor complexity requirement 5% based on password 1% based on welcome 47

Anti-Virus Not a Silver Bullet Information asymmetry malware authors/ signature writers Arms-race, signature dependence Results 70,000 malicious samples A/V identified 81% of all samples Lowest vendor scored just 70% 48

Firewalls Firewalls commonly use Network Address Translation (NAT) to preserve public address space. Trustwave SpiderLabs found that about 1 of ever 800 hosts were protected by a firewalls with misconfigured NAT. This would allow an attacker to gain access to services thought to be firewall protected. 49

Conclusion 50

2012 Information Security Pyramid Data mining of large volume of events are best performed with the aid of visualizations, making life easier to detect anomalies and suspicious activity Correlating logs and events from physical and digital activities users performs allows for a clearer view of potential security incidents A complete inventory/asset register provides insight needed to help identify and contain malware outbreaks and intrusions Reducing complexity through common hardware and software stacks simplifies management, maintenance and security Every user initiated action within an environment should be linked to a specific user Employees are the foundation of both preventative and detective & monitoring controls

Conclusions Storage of customer records makes any organization a target Don t think in terms of network or application security: be data-security centric. Outsourcing is still a major risk factor associated with data compromise Impose your own policies and procedures on third parties when your data is at stake. Employees and administrators choose poor passwords Enforce better password complexity, use 2-factor and educate users. Out of the box anti-virus is not sufficient Unknown-unknowns are best identified with regular security testing and review. Legacy firewall technologies can be broken Maintain updated technology. Review security configurations frequently and aggressively. 52

Questions?

Resources Download the report: www.trustwave.com/gsr Follow us online: Twitter: @Trustwave / @SpiderLabs Facebook: http://www.facebook.com/trustwave LinkedIn: http://www.linkedin.com/company/trustwave Google+: https://plus.google.com/103260594120163717290