Innovations in Network Security



Similar documents
Glasnost or Tyranny? You Can Have Secure and Open Networks!

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

AT&T Real-Time Network Security Overview

BigData and (in)security Considerations

Modular Network Security. Tyler Carter, McAfee Network Security

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

BigData and (in)security Considerations

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Malicious Network Traffic Analysis

Networking for Caribbean Development

Streamlining Web and Security

Description: Course Details:

Internet threats: steps to security for your small business

Secure Your Mobile Workplace

Security A to Z the most important terms

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Marble & MobileIron Mobile App Risk Mitigation

Advanced Persistent Threats

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Presented by:!!dave Kennedy (RELIK)"!!!!!Ryan Macfarlane "

Stop DDoS Attacks in Minutes

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Defending Against Cyber Attacks with SessionLevel Network Security

WHITE PAPER. Understanding How File Size Affects Malware Detection

DDoS Attacks Can Take Down Your Online Services

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

Countering Insider Threats Jeremy Ho

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

Security Analytics for Smart Grid

Security Challenges and Solutions for Higher Education. May 2011

BlackRidge Technology Transport Access Control: Overview

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

RSA Security Analytics

Operation Liberpy : Keyloggers and information theft in Latin America

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Presented By: Corporate Security Information Security Treasury Management

Detailed Description about course module wise:

The Hillstone and Trend Micro Joint Solution

WEB ATTACKS AND COUNTERMEASURES

IBM Advanced Threat Protection Solution

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Protecting your business from fraud

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

SECTOR 2015 Malware Activity in Mobile Networks Kevin McNamee (Alcatel-Lucent)

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

ENABLING FAST RESPONSES THREAT MONITORING

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Stopping zombies, botnets and other - and web-borne threats

How to Identify Phishing s

Protect Your Business and Customers from Online Fraud

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

Rashmi Knowles Chief Security Architect EMEA

Data Center security trends

Malware & Botnets. Botnets

1 Introduction. Agenda Item: Work Item:

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

All Information is derived from Mandiant consulting in a non-classified environment.

STOP Cybercriminals and. security attacks ControlNow TM Whitepaper

Protecting Your Organisation from Targeted Cyber Intrusion

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

Practical Steps To Securing Process Control Networks

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

D m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M Black market of cybercrime in Russia

Why The Security You Bought Yesterday, Won t Save You Today

Domain 6.0: Network Security

TRENDS IN THE THREAT LANDSCAPE

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Personal Data Security. Grand Computers Club New Technologies SIG May 21, 2014

Firewall Testing Methodology W H I T E P A P E R

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Top Ten Cyber Threats

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

Threat Containment for Facebook

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Current Threat Scenario and Recent Attack Trends

Information Security Threat Trends

Defending Against Data Beaches: Internal Controls for Cybersecurity

Security Solutions for the New Threads

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Trust the Innovator to Simplify Cloud Security

Transcription:

Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.

Global Security Threats and Trends Botnets System Control, Recruiting, DDoS, Spamming, Click- Fraud, Captcha Breaking Fake Anti-Virus Scams, Account Theft Targeted Attacks Phishing, Spear Phishing, Whaling, Advanced Persistent/Evasive Threat (APT/AET) Cybercrime Made Easy Hackers for Hire, Do-It-Yourself Kits 2

AT&T Approach to Network-Based Security 24x7 Situational Awareness function with near real-time analysis of security indicators: Internet and Intranet information Volumetric and behavioral algorithms Leverage output of malware, botnet and APT analysis Embed security capabilities into the network itself Security Enforcement Nodes Managed Security Services 3

Cyber Intelligence Flash 4

Threat Reconnaissance Index Pop-up spam Activity 5

Active Botnets 6

Botnet Trends in Monetization DDoS ing victims (as extortion) Spam email advertising Click fraud Affiliate based Fake Anti-Virus software Affiliate based programs of spreading Fake Anti-Virus software (scare ware) to victims generated hundreds of thousands of dollars of income for botnet operators (Koobface, Waledac, Conficker). 7

Active Botnets 8

Zeus Propagation Methods The Zeus toolkit does not ship with a mechanism to infect victims. Buyers must pick their own method to spread. Most are spread via drive-by download and phishing. Messages posted to Facebook and other social websites used to lure victims. E-mail phishing lures are most common: 9

Zeus Modules and Pricing Zeus Kit for Version 1.3.4.x ($3,000 to $4,000) The Private Version of the Zeus Kit is running between $3,000 and $4,000. The latest private version of ZeuS, as of this date, is 1.3.4.x. Backconnect $1500 The backconnect module allows an attacker to 'connect back' to the infected computer and make financial transactions from it. This way, banks that try to track where money transfers originate will always trace it back to the computer of the account holder. Firefox form grabber $2000 The Firefox form grabber module grabs data out of fields that are submitted using the Firefox web browser. This data can include personally identifiable information (PII) as well as usernames and passwords for bank accounts, trading accounts, online payment accounts, and anything else that would require the use of a username and password. Jabber (IM) chat notifier $500 The Jabber module allows an attacker to receive stolen data in "real time". If a bank account is being protected with a token that generates random numbers, then the attacker can access the victim s account in real time after the victim logs in using the token. VNC (Virtual Network Computing) private module $10,000 The VNC module is similar to the backconnect module, except that it allows you to establish a fully functioning virtual connection. The attacker can take control of the infected computer without the victim being aware of it. Essentially, the VNC provides the hacker with not just a Network Proxy but with a Total Presence Proxy (it is the total package), allowing the hacker to use all of the victim s hardware and software, including its browser, so as to avoid a bank s fraud detection systems. Windows 7 Support $2000 This module allows the ZeuS trojan to infect these Windows 7 and Vista systems. Without it, the botnet controller is limited to Windows XP systems. 10 * Source: Secureworks, http://www.secureworks.com/research/threats/zeus

Active Botnets 11

DDOS Tool - Java Version 12

DDOS Tool - Mobile App Timeline: Javascript LOIC Dec 9th 12:06 AM M-LOIC 1.0 Dec 9th 11:38 AM M-LOIC 1.4 Dec 9th 3:54 PM 13

Number of Bots (600Kbps upload) Illustrative Power of Botnets 18,000 16,667 16,000 14,000 12,000 10,000 Non-Remarkable Botnet 8,000 6,000 Power Required to Disrupt a Business 4,000 4,147 2,000 0 3 259 1,037 T1 1.5 Mbps OC3 155 Mbps OC12 622 Mbps OC48 2.4 Gbps OC192 10 Gbps 14 Connection Type

AT&T Botnet Defense Initiatives Improving Detection Algorithms DDoS Defense Service Spam Source Blocking Submitting Malware Samples Customer bot Check Botnet Aware Network 15

Relative rank DDOS Defense Diversion Overview UDP port 2002 relative to other UDP traffic Carrier IP Network 1 10 100 1000 10000 2842 17 20 Date 9/10 9/11 9/12 9/13 9/14 9/15 9/16 5 2 2 8 # flows # packets # bytes 1. Netflow records are used to detect a DDOS attack against a customer s network 2. Attack traffic is re-directed to the carrier s DDOS scrubbers Scrubbing Complex 3. Scrubbed legitimate traffic flows back to customer s devices 16 Non-targeted servers Targeted servers

Advanced Persistent Threats (APT) Victim Targeting Size Stealth Botnets and Worms Not specific Large # victims Generally noisy (spamming, scanning, DDoSing, frequent C&C check-in), somewhat detectable. Advanced Persistent Threats Specific victims Small # victims per target Quiet, low-and-slow, fairly undetectable. 17

Bytes Bytes Exfiltration Event Victim Discovery 40000000 30000000 20000000 10000000 0 1. Small amount of https traffic from victim to exfiltration 6000 server. 4000 # bytes tx/rx from victim to exfiltration drop site 8:25:01 8:40:44 8:53:15 9:01:04 9:09:25 9:10:14 9:10:41 9:11:12 9:11:22 9:14:14 9:14:17 9:14:25 9:57:40 # bytes tx/rx from exfiltration drop site to unknown host 4. Victim transmits ~32MB to drop site. 5. Bytes tx is much higher than bytes rx 12.235.7.30 (bytes tx) 12.235.7.30 (bytes rx) 2000 12.33.114.220 (bytes tx) 12.33.114.220 (bytes rx) 0 8:25:01 8:40:44 8:53:15 9:01:04 9:09:25 9:10:14 9:10:41 9:11:12 9:11:22 9:14:14 9:14:17 9:14:25 9:57:40 18 2. Host makes an RDP connection to an unknown host. 3. Then connects to it over https (443/tcp) briefly

APT Tracking Tools Developed ExfilTracker and AptTracker 19

Example: Spear Phish Email Email From real employee at one company To real employees at another company Targets Similar roles in a common industry. Live in the same general region. They are likely acquaintances Malware Content includes working spreadsheet-based game Game retrieves malware, rootkits, sets-up to run on reboot, phones home IP address that originated email is known contributor to this attack activity Customer contacted and notified 20

Example: Exfiltrated Data Event Discovery Event AT&T ExfilTracker observed a 7MB.rar archive shuttled between one known exfiltration drop server to another known exfiltration drop server. Contents Contained recent email and documents. Email subjects and filenames appear to be highly sensitive. Targets CEO and 4 VP s in a large International corporation. Customer contacted and notified 21

Network-Based Security Platform Internet Attacker AT&T IP Backbone Denial of Service (DDoS) Defense Internet and Private Intranet Protect Managed Security Data Center 22 AT&T Security Node Enterprise IDS/IPS URL DMZ Filtering Email filtering DLP Enterprise DMZ AT&T Proprietary Enterprise Intranet Enterprise Security Responsibility Reduced Enterprise Investment (People, Capital, Software)

Customer Notification Managed Security Service Information Flow Data Collection Analysis AT&T IP Backbone Feeds Flow data Others Others Others Registry Internetbased Intelligence Customer Intranet Feeds Private Intranet Protect Others Others Others FW, IDS, SEG Logs Alarms Customer Intranet Data Correlated Alerts AT&T SOC Customer Portal 23

MTIPS Service 24

Next Generation AT&T Mobile Security Mobile access in the clear No Security No authentication 3G/4G/ WIFI Internet AT&T Mobile Security provides Cloud Security with Botnet, Virus mitigation and secure encrypted transport to security node and enforces security policy Encrypted Mobile access Universal Workstation Device mgmt, strong authentication endpoint security & mobile apps 3G/4G/ WIFI Gemini Secure Virtual Private Gateway AT&T MPLS VPN Traditional Enterprise Network Managed Apps Hosted Enterprise Storage Virtual PBX Cloud Computing Internet 25

Cyber Threat Report techchannel.att.com 26