HEY! YOU! GET OFF MY CLOUD! ATTACKS AGAINST CLOUD HONEYPOTS. Martin Lee Neil Rankin



Similar documents
Threat Intelligence Report. April, 2015

Managing Ports and System Services using BT NetProtect Plus firewall

Chapter 11 Cloud Application Development

THREAT INTELLIGENCE REPORT

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, AlertLogic_ACID

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

USE HONEYPOTS TO KNOW YOUR ENEMIES

How Vulnerable are Unprotected Machines on the Internet?

Network Monitoring Tool to Identify Malware Infected Computers

Locking down a Hitachi ID Suite server

PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT

Cyber Essentials. Test Specification

VMware vcenter Log Insight Security Guide

Introduction to Network Discovery and Identity

SonicWALL Unified Threat Management. Alvin Mann April 2009

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Network Configuration Settings

Attacks from the Inside

Secret Server Qualys Integration Guide

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Honeypots in the Cloud

Penetration Testing with Kali Linux

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Chapter 1 Network Security

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Protecting the Infrastructure: Symantec Web Gateway

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

D m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M Black market of cybercrime in Russia

Cyber Essentials PLUS. Common Test Specification

Attack and Penetration Testing 101

Security Advice for Instances in the HP Cloud

Global Honeypot Trends

List of Common TCP/IP port numbers

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

IceWarp to IceWarp Server Migration

SAST, DAST and Vulnerability Assessments, = 4

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Windows Server 2003 default services

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Managing your Red Hat Enterprise Linux guests with RHN Satellite

NAVAL POSTGRADUATE SCHOOL THESIS

MSP End User. Version 3.0. Technical Solution Guide

A radical approach to secure LAN network using novel hardening techniques

ICS, SCADA, and Non-Traditional Incident Response. Kyle Wilhoit Threat Researcher, Trend Micro

CTS2134 Introduction to Networking. Module Network Security

Introduction to the EIS Guide

JAMF Software Server Installation and Configuration Guide for Windows. Version 9.3

Firewall Firewall August, 2003

Penetration Testing Report Client: Business Solutions June 15 th 2015

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2

The Advanced Cyber Attack Landscape

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

My FreeScan Vulnerabilities Report

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Defending Against Attacks by Modeling Threat Behaviors

NETWORK SECURITY HACKS *

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.0

Synthetic Application Monitoring

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

OpenText Secure MFT Network and Firewall Requirements

Vulnerability Assessment and Penetration Testing

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Clustered Data ONTAP 8.3

Penetration Testing - a way for improving our cyber security

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Honeypots & Honeynets Overview. Adli Wahid Security Specialist, APNIC.net adli@apnic.net

MyPBX Security Configuration Guide

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.0

Support Guide: Managing the Subject machine s Firewall.

Installing GFI LANguard Network Security Scanner

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

OnCommand Performance Manager 1.1

Web App Security Audit Services

Installing The SysAidTM Server Locally

Security Considerations White Paper for Cisco Smart Storage 1

Basics of Internet Security

OCS Virtual image. User guide. Version: Viking Edition

NAS 109 Using NAS with Linux

Cisco IOS Advanced Firewall

Basic Network Configuration

Mobile Admin Architecture

Tcl and Cloud Computing Automation

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Oracle public Database and Java Cloud for Trials

Virtualization and Cloud Computing

Network Security In Linux: Scanning and Hacking

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Transcription:

HEY! YOU! GET OFF MY CLOUD! ATTACKS AGAINST CLOUD HONEYPOTS Martin Lee Neil Rankin

Cloud Adoption Choose two: Fast Cheap Good

Cloud Models Public IaaS PaaS SaaS Private

Cloud Models Public IaaS PaaS SaaS Private

IaaS Cloud Security Layers SECURE API / GUI Application Code Operating System Your problem Virtual Machine Hypervisor Device Network Provider s responsibility Facility

Threat Model Cyber Criminal Hacktivist APT

Elastic Computing Development Deployment Low utilisation Low cost Heavy utilisation High cost

Elastic Computing Source: Quora.com

Threat Types - Customers Cloud Environment On Premise Environment application-attack brute-force suspicious-activity recon trojan-activity denial-of-service other application-attack brute-force trojan-activity suspicious-activity recon denial-of-service other Source: Alert Logic ASR 2015

Relative Threats - Cloud vs On Premise trojan-activity other application-attack brute-force recon suspicious-activity denial-of-service 0 1 2 3 4 5 6 Source: Alert Logic ASR 2015

Cloud Threats by Customer Industry Vertical Suspicious Recon Brute force 100% 90% 80% 70% 60% 50% 40% DoS Application attack 30% 20% 10% 0% Source: Alert Logic ASR 2015

Subtle Differences Cloud threats On premise threats Your threats Your neighbour s threats

Honeypot Infrastructure 123.45.67.88 share.example.com 123.45.67.89 sys.example.com 123.45.67.90 db.example.com Cloud Honeypot Cloud Production System Increased Protection Cloud Honeypot Threat Intelligence Threat Intelligence

Honeypot Types Low Interaction Medium Interaction Simulates high level services Collects basic information Simulates generic functions Records interaction High Interaction Simulates specific environment Collects details of attack

Medium Interaction Kippo medium interaction https://github.com/desaster/kippo Simulates SSH shell Fake file system Easily detected! we use heavily modified version We used to log brute force attacks & replay session

Medium Interaction Dionaea medium interaction http://dionaea.carnivore.it/ Simulates network services SMB / HTTP / FTP / MySQL / SIP (VOIP) Simulates shellcode execution We see mostly SMB activity

Low Interaction Amun low interaction http://amunhoney.sourceforge.net/ Modular Honeypot Simulates vulnerable services We see mostly SMB activity

Low Interaction p0f low interaction http://amunhoney.sourceforge.net/ Fingerprint connecting IPs Run in tandem

Custom Interaction Create your own Modify modular honeypot Reflect your environment Respond to new threats Research attacks against specific vulnerabilities

Results What do we find? April 2015

Findings Top 20 IP Addresses 198.101.193.22 177.143.161.1 177.143.167.30 186.92.57.234 43.255.190.130 43.255.190.119 186.92.180.244 186.92.122.154 177.143.161.164 190.204.147.44 43.255.190.167 186.92.36.215 186.92.51.249 36.236.150.66 190.37.94.20 93.118.46.197 186.92.54.111 61.227.174.2 114.47.9.182 82.211.147.147 0 20000 40000 60000 80000 100000 120000 140000 Number of Attacks

Findings Top 20 Source Countries Japan Taiwan Venezuela China Georgia Japan Brazil Unknown United States Georgia Romania Mexico Brazil Russian Federation Netherlands Taiwan Bulgaria United Kingdom China Armenia India Venezuela Kazakhstan Korea, Republic of Ukraine Iran, Islamic Republic of

Findings Attacker OS Win 7/8 Linux 2.2.x Linux 3.1 Win XP Linux 2.4.x Linux 2.4.x Windows XP Linux 3.1-3.10 Linux 2.2.x-3.x Windows 7 or 8 Linux 2.6.x Linux 3.11 and newer Linux 2.4.x-2.6.x Linux 2.2.x-3.x (no timestamps) Linux 3.x Linux 2.2.x-3.x (barebone) Windows NT kernel Linux 2.0

Findings Top 20 Destination Ports Active Directory Service / SMB (445) SSH (22) Secure Shell (SSH) Microsoft Directory Service Remote Desktop Protocol NETBIOS Session Service SMTP HTTP Active API Server Port (Proxy) Telnet POP3 HTTP Alternate (Proxy) MySQL Microsoft SQL Server Abyess Web Server HTTPS FTP Socks (Proxy) Universal Plug 'N Play (UPnP) Microsoft DCOM IMAP Apple OSX RPC Services

Findings Top 20 Brute Forced Usernames Root (98.5%) root oracle support test MGR administrator ftpuser admindb info pi admin ubnt user guest ubuntu operator PlcmSpIp Administrator db01

Findings Top 20 Brute Forced Username/Password root/admin admin/admin root/123654 root/default root/zaq1xsw2 root/a123456 root/11111111 root/changeme root/qwerty root/admin1 root/123456] root/654321 root/administrator root/qazwsx root/888888 root/aaaaaa root/root root/159357 root/meiyoumima root/vision

Findings Top 20 Uploads Troj/Agent-AMRO PsExec?.exe Mal/HckPk-A Troj/Agent-AMRO Unknown Troj/Agent-AMRO Mal/PWS-JJ Mal/HckPk-A Unknown Unknown Unknown Unknown Mal/Spy-Y PsExec Mal/HckPk-A Troj/DLoad-IK W32/Parite-B Mal/Spy-Y Unknown Unknown Unknown Unknown Unknown

Deployment Honeypots in Operation

Honeypots for Managed Services Connecting IPs Cloud Honeypot Customer Cloud System Security Agent Blocklist update Threat Intelligence

Honeypots for Managed Services Malware Cloud Honeypot Customer Cloud System Security Agent Correlate Threat Intelligence

Conclusion Cloud environments have a specific threat profile. Well placed honeypots provide timely intelligence. Apply intelligence to protect production systems.

Get Connected www.alertlogic.com @alertlogic @mlee_security linkedin.com/company/alert-logic alertlogic.com/resources/blog/ youtube.com/user/alertlogictv brighttalk.com/channel/11587

Thank you Will Semple VP ActiveIntelligence Brian Wilson Director, Intelligence Michael Laughlin Tools Engineer

Thank you.