Attack Trends 2011. software security? Gary McGraw, Ph.D. Chief Technology Officer, Cigital. 2011 Cigital



Similar documents
Cyber Security: Software Risk Management for Utilities

Software Security Touchpoint: Architectural Risk Analysis

Exploiting Online Games: Cheating massively distributed systems

Scaling a Software Security Initiative: Lessons from the BSIMM

Software Security Testing: Seeking security in an insecure world

Who, What, Where, How: Five Big Questions in Mobile Security

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

The Mobile Malware Problem

FORBIDDEN - Ethical Hacking Workshop Duration

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

5 Steps to Advanced Threat Protection

Combating the Next Generation of Advanced Malware

Detailed Description about course module wise:

Web Application Worms & Browser Insecurity

Secure Programming Lecture 9: Secure Development

In Building Security In, Gary McGraw proposes three pillars to use throughout the lifecycle: I: Applied Risk Management

Loophole+ with Ethical Hacking and Penetration Testing

Introduction. Secure Software Development 9/03/2015. Matias starts. Daan takes over. Matias takes over. Who are we? Round of introductions

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Development Processes (Lecture outline)

Emerging Security Technological Threats

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Penetration Testing The Red Pill

VESZPROG ANTI-MALWARE TEST BATTERY

(General purpose) Program security. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.

Security Evaluation CLX.Sentinel

WHITE PAPER. Understanding How File Size Affects Malware Detection

Incident Response 101: You ve been hacked, now what?

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Stuxnet Malware. Official communication presented at CIP Seminar by Thomas Brandstetter. Siemens AG All Rights Reserved.

CISA, CISM, CGEIT, CRISC COBIT Foundations Certificate CISSP, OSCP ITIL v3 Foundations Certificate

Certified Cyber Security Expert V Web Application Development

Ethical Hacking & Cyber Security Workshop

Botnets Die Hard Owned and Operated

Innovations in Network Security

Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware

Analysis of advanced issues in mobile security in android operating system

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Mobile Application Security Sharing Session May 2013

A Systems Engineering Approach to Developing Cyber Security Professionals

Jort Kollerie SonicWALL

Security Testing in Critical Systems

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Attacks from the Inside

Top five strategies for combating modern threats Is anti-virus dead?

Five Trends to Track in E-Commerce Fraud

The Key to Secure Online Financial Transactions

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Windows Operating Systems. Basic Security

Post-Stuxnet Industrial Security

Advancements in Botnet Attacks and Malware Distribution

The Leading Provider of Endpoint Security Solutions

THE HACKERS NEXT TARGET

A Network Administrator s Guide to Web App Security

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Enterprise Mobile Threat Report

Trust Digital Best Practices

RMAR Technologies Pvt. Ltd.

The Silver Bullet Security Podcast, episode 21: A Panel Discussion with Cigital s Principals

IBM Smarter Cities Cybersecurity Update

Tutorial on Smartphone Security

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Application Code Development Standards

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Your Web and Applications

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2

CEH Version8 Course Outline

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

FERPA: Data & Transport Security Best Practices

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note

Promoting Network Security (A Service Provider Perspective)

WEB ATTACKS AND COUNTERMEASURES

A Critical Investigation of Botnet

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

Smartphone Botnets. Berlin Institute of Technology FG Security in Telecommunications SPRING 2010

Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks

WHITE PAPER Security in M2M Communication What is secure enough?

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

10 Smart Ideas for. Keeping Data Safe. From Hackers

Information Security. CS526 Topic 1

Securing your Mobile Applications. Karson Chan Security Consultant

[CEH]: Ethical Hacking and Countermeasures

Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic)

Securing mobile devices in the business environment

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Smartphone Security. A Holistic view of Layered Defenses. David M. Wheeler, CISSP, CSSLP, GSLC. (C) 2012 SecureComm, Inc. All Rights Reserved

I Hunt Penetration Testers!

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

OPC & Security Agenda

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Security threats and attackers are turning

Network Security in Building Networks

CS 356 Lecture 9 Malicious Code. Spring 2013

Transcription:

Attack Trends 2011 -orwhy software security? Gary McGraw, Ph.D. Chief Technology Officer, Cigital

Cigital n n Founded in 1992 to provide software security and software quality professional services Recognized experts in software security and software quality n Widely published in books, white papers, and articles n Industry thought leaders

What do wireless devices, cell phones, PDAs, browsers, operating systems, servers, routers, personal computers, public key infrastructure systems, and firewalls have in common? Pop quiz Software badness-ometer

Technology Trends

Today s computer and network security mechanisms are like the walls, moats, and drawbridges of medieval times. At one point, effective for defending against isolated attacks, mounted on horseback. Unfortunately, today s attackers have access to airplanes and laser-guided bombs! Defending castles is passé

Attaining software security gets harder The Trinity of Trouble n n n Connectivity n The Internet is everywhere and most software is on it Complexity n Networked, distributed, mobile code is hard Extensibility n Systems evolve in unexpected ways and are changed on the fly issimple this complex program This interface

Social networking technology Twitter Facebook Myspace AIM Wave/buzz Orkut Tumblr Risk tradeoffs are very interesting and often counter-intuitive Spearfishing anyone? Security and social networking All 20-somethings expect this stuff---at work! is hacking around controls a "gateway drug"? is there a line between purely social interaction and professional interaction? is there a parallel to the history of phones in the workplace? how about e-mail?

Mobile security Think the Internet Is big? There are approximately 1,000,000,000 people on the internet There are approximately 3,000,000,000 mobile handsets in use What sort of attack surface, computational power, and force multiplication do cell phones and their apps have? Friday, September 30, 2011 8

Internet connectivity Data convergence Contacts, SMS, Pictures, Location VPN keys?! Location based services A mobile device is a rich target for snoops Attackers know where you are Theft or loss How does a user revoke their own phone/pad? Who do they call? HOW do they call them? Mobile risks

Example: Phishing at the app store Many publishers have sent in applications purporting to be for mobile banking These applications simply prompt for usernames, passwords, PINs, or account numbers... This means the user is at the mercy of the application store s (lame) search function! 10

Cyberwar rears its head Using computer security attacks as weapons of war Reality Fake 1982 pipeline attack 2007 syrian reactor bombing 2010 stuxnet Estonia/Georgia ddos Chinese BGP error We all live in glass houses, so building security in is our only recourse

Malware Trends

Modern malicious code Zeus Banking Trojan toolkit Targets banking info Defeats multi-factor authentication with attacker in the browser pdf, and drive by download install using social network G2 Persistent web threat Zeus, Sinowal.CP, MPACK Wrap the browser in a VM Invincea

Malicious code for the cell phone = not new Blue tooth Blue Snarfing attack (Nov 2003) Connect and gain access silently w/o pairing Nokia 6310i (firmware 5.50) Sony Ericsson T610 (firmware R1A081) Disrupt a phone call Initiate a voice/data/fax call Hijack a phone call by forwarding speaker and microphone to attacker Read / Write Phonebook entries Read / Write Messages Send SMS to any number Send Fax to any number NOKIA Cabir virus (June 2004) Smartphones running on Symbian and Series 60 software Spreads by bluetooth Proof of concept Kills battery PHONE BOTNET?

Stuxnet Very sophisticated, targeted collection of malware Delivery 4 0days Stolen private keys USB injection Network C&C The PAYLOAD matters Inject code into a running control system Siemens SIMATIC PLC (step 7) Cyberwar? Natanz in Iran How to p0wn a Control System with Stuxnet (9/23/10) http://www.informit.com/articles/article.aspx?p=1636983

The attacker s toolkit The standard attacker s toolkit has lots of (software analysis) stuff Disassemblers and decompilers Control flow and coverage tools APISPY32 Breakpoint setters and monitors Buffer overflow Shell code Rootkits

The apex of software exploit complete control of the machine Live in the kernel XP kernel rootkit in Exploiting Software See http://www.rootkit.com Hide files and directories by controlling access to process tables Provide control and access over the network Attacker s toolkit: rootkits Get into the EEPROM (hardware viruses)

The Future

Online games are a bellwether Online games (like World of Warcraft) have up to 900,000 simultaneous users on six continents 10,000,000 people subscribe to WoW 16,000,000+ play MMORPGs Clients and servers are massively distributed Time and state errors are rampant MMORPGs push the limits of software technology Modern distributed systems in other domains are evolving toward similar models SOA, Web 2.0 Time and state errors are the XSS of tomorrow

Thread hijacking in online games Used in a few WoW botting programs WoW.EXE MAIN THREAD INJECTED DLL RenderWorld(..) DETOUR PATCH Loops hundreds of times per second

super MAIN THREAD RenderWorld(..) HARDWARE BP uncloak INJECTED CODE PAGE MAIN THREAD branch CastSpellByID(.. ) ScriptExecute(.. ) ClearTarget(.. ) complete MSG MAIN THREAD RenderWorld(..) restore recloak

Classic arms race

Software Security

The bugs/flaws continuum gets() attacker in the middle BUGS FLAWS Architectural risk analysis Commercial SCA tools: Fortify, Ounce Labs, Coverity Customized static rules (Fidelity) Open source tools: ITS4, RATS, grep()

Code review Widespread Customized tools Training ARA Components help Apprenticeship Training Pen testing No longer solo Security testing Training Abuse cases and security requirements Training Touchpoints adoption

BSIMM: Software Security Measurement n n n n Real data from (42) real initiatives 81 measurements 11 over time McGraw, Chess, & Migues PlexLogic

Intel + 15 anonymous firms 27

Twelve things everybody does (well, 66%) Core activities identify gates know PII obligations awareness training data classification identify features security standards review security features static analysis tool QA boundary testing external pen testers good network security close ops bugs loop

Compare a firm with peers using the high water mark view Descriptive (not prescriptive) Incredible insight for planning BSIMM3 as a measuring stick

BSIMM2 to BSIMM3 n n n BSIMM3 released September 2011 under creative commons n http://bsimm.com n Italian and German translations available soon BSIMM is a yardstick n Use it to see where you stand n Use it to figure out what your peers do BSIMM3à BSIMM4 n BSIMM is growing n Target of 50 firms

Where to Learn More

informit & Justice League www.informit.com No-nonsense monthly security column by Gary McGraw www.cigital.com/justiceleague In-depth thought leadership blog from the Cigital Principals Scott Matsumoto Gary McGraw Sammy Migues John Steven

IEEE Security & Privacy Magazine + Podcast Building Security In Software Security Best Practices column edited by John Steven www.computer.org/security/bsisub/ www.cigital.com/silverbullet

Software Security: the book How to DO software security Best practices Tools Knowledge Cornerstone of the Addison- Wesley Software Security Series www.swsec.com

Cigital s Software Security Group invents and delivers Software Security See the Addison-Wesley Software Security series Send e-mail: gem@cigital.com For more So now, when we face a choice between adding features and resolving security issues, we need to choose security. -Bill Gates