An innovative and comprehensive framework for Social Driven Vulnerability Assessment. 20 November 2014



Similar documents
Enrico Frumento. (twitter: enricoff) ICT Security CEFRIEL. Social Engineering and SE February 2016

THE HUMAN FACTOR AS A NECESSARY PART OF

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Spear Phishing Attacks Why They are Successful and How to Stop Them

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

APT Advanced Persistent Threat Time to rethink?

Top Ten Cyber Threats

Malware & Botnets. Botnets

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

NATIONAL CYBER SECURITY AWARENESS MONTH

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

IBM Security re-defines enterprise endpoint protection against advanced malware

Can We Become Resilient to Cyber Attacks?

10 Smart Ideas for. Keeping Data Safe. From Hackers

Agenda , Palo Alto Networks. Confidential and Proprietary.

Perspectives on Cybersecurity in Healthcare June 2015

Security Intelligence Services.

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Security A to Z the most important terms

Don t Fall Victim to Cybercrime:

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Internet threats: steps to security for your small business

Data Security. So many businesses leave their data exposed, That doesn t mean you have to Computerbilities, Inc.

Marble & MobileIron Mobile App Risk Mitigation

Uncover security risks on your enterprise network

Attack Intelligence: Why It Matters

Defending Against Data Beaches: Internal Controls for Cybersecurity

After the Attack: RSA's Security Operations Transformed

Managing Web Security in an Increasingly Challenging Threat Landscape

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

I D C A N A L Y S T C O N N E C T I O N

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

ENABLING FAST RESPONSES THREAT MONITORING

Department of Homeland Security

RSA Security Anatomy of an Attack Lessons learned

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

A Case for Managed Security

Technical Testing. Network Testing DATA SHEET

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

V ISA SECURITY ALERT 13 November 2015

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Network Security Redefined. Vectra s cybersecurity thinking machine detects and anticipates attacks in real time

Collateral Effects of Cyberwar

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

ONLINE RECONNAISSANCE

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Reinventing Network Security Vectra s cyber-security thinking machine delivers a new experience in network security

isheriff CLOUD SECURITY

UNCLASSIFIED. General Enquiries. Incidents Incidents

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

What Do You Mean My Cloud Data Isn t Secure?

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

2015 TRUSTWAVE GLOBAL SECURITY REPORT

Practical Steps To Securing Process Control Networks

Almost 400 million people 1 fall victim to cybercrime every year.

Securing Cloud-Based

Cyber Security Metrics Dashboards & Analytics

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Fostering Incident Response and Digital Forensics Research

Secure Your Mobile Workplace

Things To Do After You ve Been Hacked

Fighting Advanced Threats

Understanding the Advanced Threat Landscape an MSPs Guide. IT Security: Enabled

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Designing & Building an Information Security Program. To protect our critical assets

GlobalSign Malware Monitoring

EVILSEED: A Guided Approach to Finding Malicious Web Pages

IBM Security Strategy

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Transcription:

An innovative and comprehensive framework for Social Driven Vulnerability Assessment 20 November 2014

Who are we? Enrico Frumento (twitter: enricoff) ICT Security Specialist @ CEFRIEL Main Activities: unconventional security, phreak, tweak, psychohistorian, Roberto Puricelli (twitter: robywankenoby) ICT Security Consultant @ CEFRIEL Main Activities: Social-driven Vulnerability Assessment, Security research, passionate of technology 2

LOW HIGH Who is cefriel Who is CEFRIEL? Bridging the gap between industries and academia to BOOST INNOVATION CEFRIEL Unique Value Proposition Industrial companies CEFRIEL Academic universities RESEARCH INNOVATION MARKET 3

What will you get? What is SE today? How companies react? How vulnerable are? Real numbers a lot of phun, but no beers

What s cybercrime today? From geek-driven to business-driven. 5

What s cybercrime today? Selling is selling! What do you need to sell cybercriminals products? Who s the customer? 6

What s cybercrime today? BOTH TRIES TO ENTER, TWEAKING THE PERSON AT THE DOOR.. DOOR-2-DOOR SELLER == MODERN CYBERCRIMINAL-SELLER 7

What s cybersecurity today? YES A TOTALLY DIFFERENT APPROACH, USING THE SAME TECHNIQUES OF MARKETING.. VIRAL, GUERRILLA, UNCONVENTIONAL, AND OF COURSE SOCIAL ENGINEERING 2.0 SO WHAT? ANYTHING NEW?? 8

What s cybercrime today? ADVERTISING ADVERTISING DEVELOPERS SOCIOLOGIST HCI EXPERTS PSYCHOLOGIST SELLERS MARKETING EXPERTS SN INFLUENCERS 9

What is the security team? Our team includes several competences malware expert web designer web developer psychologist expert of HCI interaction marketing expert SN influencer legal advisor 10

SOCIAL ENGINEERING 2.0

The Role of the Human Factor in Hacker Attacks 12

Characteristics of SE 2.0 Malware Ecosystem 2.0 Automatic Social Engineering Attacks (ASE) (ab)use of linked-data Chat-bot (ab)use of psychology, personality profiling systems and cognitive science models Mail attack vector Economic Drivers 13

Malware Ecosystem 2.0 SE became an important part of the malware 2.0 and the main infection strategy 14

Automatic Social Engineering Attacks (ASE) Automation of SE attacks through information collection and mining and through the sentiment analysis from Social Networks 15

(ab)use of linked-data The public bodies and anyone are moving toward the free circulation of data, to the web 3.0. This is the Linked-Open-Data or web-of-data. (ab)using LOD will facilitate the collection of data to fully contextualize attacks to targets. 16

Chat-bot Diffused use of chat-bot, as in ASE attacks to start and maintain conversations with other social networks users and to balance the lack of a real social engineer (mass social engineering attacks) 17

(Ab)use of Psychology and Cognitive Science Professional use of memetics and personality models of the attacked users, especially of models coming from theories of cognitive psychology 18

Mail Attack Vector Massive use of mails - if compared to other attack vectors - since it doesn t need talented hackers and it can reach lot of victims at a time (i.e. new forms of spam) 19

Economic Drivers SE 2.0 is since the beginning an investment (no ways doing it for phun), all attacks have one common aim: making money. 20

Characteristics of SE 2.0 vs vs 21

Characteristics of SE 2.0 (ab)use of psychology and models of cognitive science Professional use of memetics and personality models of the attacked users, especially of models coming from theories of cognitive psychology (ab)use of Social Networks Social Networks are fantastic sources of information about victims, tastes, personalities, profiles, etc. The phase of information collection about the target in a crucial step for each attack. 22

23

The first example RSA THE case study You probably know this email 24

.. the latest one: Darkhotel attacks More than 7 years Target business executives Drive-by download attack Steal data and collect passwords What s in common? Social Engineering at the beginning 25

PROBLEM: IT S NOT ANYMORE SO ADVANCED. ADVANCED ONLY MEANS THAT THE ATTACKERS HAVE A (DEVILISH)BUSINESS PLAN 26

Advanced Persistent Threat Model An APT often begins with a Social Engineering attack Email is the most used attack vector SE attack How to build an effective attack? 27

Advanced Persistent Threat Model Spear phishing is the new evil A contextualized email is more effective Target selection SE attack How to gather information? 28

Advanced Persistent Threat Model Internet and Social Network allow to retrieve lots of information Public information are already available Also active attacks OSINT Target selection SE attack What s the result? 29

Advanced Persistent Threat Model Technological attack can create a backdoor inside the company Known vulnerabilities or zero-day attacks OSINT Target selection SE attack Ad-hoc tech attack What s next? 30

Advanced Persistent Threat Model Inside the network, lateral movement Difficult to detect slow and punctual attacks OSINT Target selection SE attack Ad-hoc tech attack Attack expansion 31

Advanced Persistent Threat Model OSINT Target selection SE attack Ad-hoc tech attack Attack expansion Data exfiltration How can we measure that risk? 32

OUR FRAMEWORK

Our Framework OSINT Target selection SE attack Ad-hoc tech attack Attack expansion Data exfiltration 34

Our Framework Passive social information mining Spear phishing attack simulation Technological attack simulation OSINT Target selection SE attack Ad-hoc tech attack Attack expansion Data exfiltration 35

Our Framework Setup Passive social information mining Spear phishing attack simulation Framework Technological attack simulation Awareness 36

Setup Prior to start the assessment, it is necessary to provide a startup phase Since the activities is innovative stakeholders need to: share objectives define the boundaries Stakeholders of the company Security IT HR Innovation Legal 37

People are the target of the assessment A potential attacker has no constraints Direct contact with the target (active) Don t care about consequences During an assessment need to take care about the users Ethical vs legal perspective Ethics Legal Only passive scanning Public sources Anonymous results 38

Passive information mining The purpose is to find some evidence regarding the feasibility of the social engineering attack Focus on the company, not on the user Even if the source are public, lot of information retrieved..and it s just the tip of the iceberg 39

40

Source5 91 mail Source2 123 mail Source3 11 mail Source1 633 mail Source4 103 mail emails of employees possibily attacked templates for building effective attack initiatives related to company or employees evidence related to specific risks 41

Spear Phishing Attack Simulation The purpose is to test the user behavior when stimulated with social engineering attack It begins with emails sent to employees Target is a sample of employees We evaluate two different type of risks: 1. 1 The user click on the email Expose to drive by-infection 1. 2 The user also provides the requested credentials Lose of a critical company asset 42

Type of phishing: A SDVA Example An example of email for a SDVA test 43

Type of phishing Example of a website An example of the related phishing website ACME corpora on established ACME a partnership corpora on to established a partnership to propose discount to all the employees propose discount to all the employees Limited offers only for ACME corpora on employees. Limited offers Click only for the ACME link below corpora and on employees. Click on the link below and sign in with your company creden al to obtain sign in the with discounts your company creden al to obtain the discounts ACME 70% corpora on established ACME a partnership 70% corpora on to established a partnership to propose DISCOUNT discount to all the employees propose DISCOUNT ACME discount corporato on all established the employees a partnership to Limited offers only for ACME corpora on employees. Limited offers Click only propose for the ACME link discount below corpora and to on all employees. the employees Click on the link below and sign in with your company creden al to obtain sign in the with discounts Limited your company offers only for creden ACME corpora al to obtain on employees. the discounts Click on the link below and sign in with your company creden al to obtain the discounts Refers to the phishing campaign Lots of discounts Lots of discounts 70% 70% 70% Limited me Limited me DISCOUNT Only DISCOUNT for Employees Only DISCOUNT for Employees SIGN SIGN IN IN Sign in with your company credensign als in with your company creden als SIGN SIGN IN IN Company asset requested (credential) Lots of discounts Limited me Lots Food of discounts Fashion Limited me Only for Employees Technology Lots Food SIGN SIGN IN IN of discounts Sign in with your Fashion Travels company creden Technology als Limited me Travels Only for Employees Only for Employees SIGN SIGN IN IN Sign in with your company credensign als in with your company creden als SIGN SIGN IN IN Food Fashion Technology Travels Food Fashion Technology Food Fashion Travels Technology Travels Both email and website contains clues that allow to identify the risk 44

Collected information The assessment track user behaviors Anonymity vs result analysis Visit website Insert credentials Sample data Report 45

PEOPLE OFTEN HAVE POTENTIALLY DANGEROUS BEHAVIORS MOST PART OF WORKSTATION ANALYZED INCLUDE OBSOLETE OR UNPATCHED SOFTWARE 46 46

Technological attack simulation The aim is to demonstrate the possibility to compromise the company laptop, knowing its configuration Usually through a proof-of-concept Analyze software configuration Correlate with vulnerabilities Create a custom exploit payload 47

IT S POSSIBLE TO FIND A WAY TO COMPROMISE A WORKSTATION INSIDE THE COMPANY 48 48

Awareness The assessment should help to raise awareness inside the company against these threats People is the weak point Management need to be aware Employees need to know Training and awareness is the only (nowadays) effective countermeasure..but need to be properly done. 49

Video Raise awareness through visual information Pills describe correct behaviour Gamification Stimulate users to enhance learning 50

RESULTS

Our experience In the last five years we performed about 15 SDVA in big enterprises with thousands of employees, involving about 12000 users ACME corpora on established a partnership to propose discount to all the employees Limited offers only for ACME corpora on employees. Click on the link below and sign in with your company creden al to obtain the discounts Given an example of a possibile test email 70% DISCOUNT Lots of discounts Limited me Only for Employees Sign in with your company creden als SIGN SIGN IN IN Food Fashion Technology Travels In your opinion, what are the results? 52

Overall results Employees receive the email 34% visit the website 21% also insert the credentials 53

Credential insertion (% of sample) Benchmarking Click on email link (% of sample) 54

Credential insertion (% of sample) Benchmarking 45% 40% 35% 34% 3 emails to obtain one click 30% 25% 20% 15% 10% 21% 5 emails to obtain a valid credential 5% 0% 0% 10% 20% 30% 40% 50% 60% 70% Click on email link (% of sample) 58% conversion rate click/insertion 55

Comparison with other studies 40% 30% 34% Average click rate in our research 20% 10% 10% Average click rate in modern phishing 0% Success ratio (% of overall success) 2% Average click rate in Marketing 0,01% Average success in traditional phishing 56 Source: www.proofpoint.com

Success ratio (% of overall success) Time analysis - Visits We measure relative effectiveness per campaign 100% 90% 80% 70% 60% 50% High effectiveness in the first minutes 41% success in 10 minutes 41% 40% 30% 20% 10% 0% 50% success in 20 minutes 0 10 min 20 40 60 80 100 120 20 min Time (minutes) 57

User reactions The FOOL I inserted the credential, but I don t receive a confirm I inserted the credential, but I think it s phishing and I change the password The GUILTY The GOOD This is definitely phishing. Please do something! 58

User reactions 1% of employess signal the phishing 6 minutes fastest email to antiphishing 20 minutes record on block website The GOOD This is definitely phishing. Please do something! 59

Success ratio (% of overall success) Time analysis - Visits We measure relative effectiveness per campaign 100% 20 min 90% 80% 70% 60% 50% Already 50% success before block website 40% 30% 20% 10% 0% 0 6 min 10 20 30 40 Time (minutes) 32% Success before first report email 60

Awareness Role Age User characterization <30 years 26% 30-40 years 40-50 years 19% 22% Younger employees are more exposed Habits of new generation? >50 years 17% Employee Middle-level Management 18% 20% 23% Also managers are vulnerable Risk is (not enough) lower Awareness No Awareness 19% 24% Targeted training mitigate the risk Behaviour is impacted by awareness 61

CONCLUSIONS

PEOPLE DON T KNOW THAT SHARING INFORMATION ON SOCIAL MEDIA CAN BE DANGEROUS 63 63

COMPANIES ARE EXPOSED TO SOCIAL-DRIVEN RISKS AND OFTEN THERE IS NO PERCEPTION OF HOW EXTENDED THE RISK IS A SOCIAL ENGINEERING ATTACK WITH A CONTEXTUALIZED HOOK CAN BE EFFECTIVE 64

LOTS OF EMPLOYEES COULD BECOME A RISK FOR THE ENTERPRISE JUST FOR A DISCOUNT ON A SANDWICH.. OR A SLICE OF CAKE 65

PS: no chick was harmed during the preparation of these slides. PERFORMING APT ATTACKS IS BECOMING EXTREMELY SIMPLE, IT MAINLY 66 MEANS HAVING A BUSINESS (DEVILISH) PLAN..

THAT S ALL FOLKS 67