* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Can We Survive the Next Information Security Attack
Distributed firewall wikipedia , lookup
Information security wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Unix security wikipedia , lookup
Airport security wikipedia , lookup
Cyberwarfare wikipedia , lookup
Wireless security wikipedia , lookup
Cyberattack wikipedia , lookup
Cross-site scripting wikipedia , lookup
Denial-of-service attack wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Security-focused operating system wikipedia , lookup
Mobile security wikipedia , lookup
Can we survive the Next Information Security Attacks S. C. Leung CISSP CISA CBCP IEE Technical Conference on IT Security and Cyber Crime 2005 Disclaimer • This material is NOT intended to be adopted in the course of attacking any computing system, nor does it encourage such act. • PISA takes no liability to any act of the user or damage caused in making use of this report. • The points made here are deliberately kept concise for the purpose of presentation. If you require technical details please refer to other technical references. 2 Can We Survive the Next Security Attack? Copyright • The copyright of this material belongs to the Professional Information Security Association (PISA). • A third party could use this material for non-commercial purpose, given that no change in the meaning or interpretation of the content was made and reference is made to PISA. All rights are reserved by PISA. 3 Can We Survive the Next Security Attack? Agenda • • • • • 4 The Nature of In-Security Vulnerabilities & Threats Development of Security Vulnerabilities Development of Security Attacks What can we do? Can We Survive the Next Security Attack? The Nature of Insecurity of the Ubiquitous Information Society • Internet = untrusted, unregulated (or distributively regulated ) • Virtual World – No physical attribute for TRUST building – Anonymity is much easier • Easy to collect information & resources for doing a constructive job (or an attack) • Any device is becoming a network service node 5 Can We Survive the Next Security Attack? Trust - a barrier to online shopping 30 25 25% Reasons for not buying over the Internet in EU countries (individuals with Internet access), 2003 20 15 10 5 0 Not interested Do not trust Buying over Internet is too Don't have the Internet the Internet is complicated credit cards in buying too anything on complicated the Internet Other reasons Don't Using Internet understand is too expensive the language well enough Don't know Source: European Commission, Special Eurobarometer survey on European Union public opinion on issues relating to business to consumer e-commerce March 2004. 6 Can We Survive the Next Security Attack? Security Vulnerability and Threats RISK = Vulnerability x Threat • Vulnerabilities (漏洞) – Weak policy / enforcement – Weak infrastructure – Security holes of software – Human Vulnerabilities 7 • Threats (威胁) – – – – – Hackers 骇客 / 黑客 Script Kiddies 腳本程式小子 Virus & Worm 病毒和蠕虫 Cyber-criminals Cyber-terrorists Can We Survive the Next Security Attack? Profile of Security Vulnerabilities Security Vulnerabilities Trend 5000 4229 3784 4000 3780 2874 3000 2437 2000 1090 1000 171 345 311 262 417 0 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005Q2 Source : CERT/CC, USA 9 Can We Survive the Next Security Attack? Weak Infrastructure • DNS - the Achilles’ heel – Security researcher Dan Kaminsky: in a scan of 2.5M Domain Name System machines, 9.2% were potentially vulnerable to DNS cache poisoning • http://news.com.com/DNS+servers-an+Internet+Achilles+heel/2100-7349_3-5816061.html?tag=alert • Mobile Devices – Mobile devices have networking function; connected directly to PC or internal network – Devices have no security by default • Web Services – Application of the tomorrow, using HTTP (TCP port 80) only and can bypass all packet filtering firewalls. 10 Can We Survive the Next Security Attack? Weak Policy or Enforcement • CardSystems server hacked Æ 40M credit card No. lost (June2005) – MasterCard, VISA, AE and more … outsourced their operation – Risk escalated because CardSystems stored more customer data than it should on the server! • CS had failed to comply with the card issuer security standard • But CS passed the audit in June 2004! • Citigroup lost credit records of 3.9M customers (June 2005) – United Parcel Service lost a box of backup tapes. Citigroup said they encrypt the data from that point onwards. • Many other examples available at the “Hall of the Shame” • http://www.baselinemag.com/article2/0,1397,1834526,00.asp?kc=BARSS 02129TX1K0000533 11 Can We Survive the Next Security Attack? Human Vulnerability • Insecure password • Giving a too power tool to kids who cannot handle it safely • Giving out Trust in some occasion – After hurricane Katrina, Internet frauds followed up quickly … 12 Can We Survive the Next Security Attack? Vulnerability Exploitation is Becoming Easier and Easier Vulnerability no more obscure • Google Hack – Use Google for effective search and how to query vulnerable sites or servers using Google’s advance syntaxes – Ref: – Santy.A (Dec-2004) targetted at phpBB vulnerability. It used Google to locate a typical phpBB file ““viewtopic.php” Æ 8M sites found! • “Demystifying Google Hacks” written by Debasis Mohanty • http://johnny.ihackstuff.com – W32.MyDoom.O worm (Aug 2004) search for “@<domain_names>” to harvest valid email addresses 14 Can We Survive the Next Security Attack? Other examples of Google Hack • Privacy Exposure via Web Cam 15 Can We Survive the Next Security Attack? 0-day Attack is nearer Time between Vuln. Disclosure & Worm Attack 337 No. of Days 400 300 185 200 28 100 18 0 2001 (Nimda ) 16 2003 Q1 (SQL Slammer) 2003 Q3 (Blaster) 2004 (Sasser) Can We Survive theWorms Next Security Attack? Rapid Exploit Development • Metasploit Framework – a MODULAR platform for developing and applying exploit more efficiently. It is a neutral platform, used by penetration tester and security researcher. – Concept: Recycle of Code – Payload = independent of vulnerability; dependent on platform and service to obtain – Exploit = varies with vulnerability • Underground exploit framework designed for bad guys can be more harmful 17 Can We Survive the Next Security Attack? Rapid Exploit Development Today’s Today’s Set Set Menu Menu (Choose (Choose only only 11 from from each) each) 1.1. Soup Soup of of the the Day Day (Payload) (Payload) Metasploit Framework •• •• •• •• Windows WindowsBind BindDLL DLL Inject Inject Windows Add User Windows Add User Mac Mac OS OSXX PPC PPCBind BindShell Shell Solaris SPARC Reverse Solaris SPARC Reverse Shell Shell 2.2. Main Main Course Course (Exploit) (Exploit) •• •• •• Microsoft MicrosoftRPC RPCDCOM DCOM MSO3-026 MSO3-026 IIS 5.0 Printer Buffer Overflow IIS 5.0 Printer Buffer Overflow CA CABrightStor BrightStorUniversal UniversalAgent Agent Overflow Overflow 3.3. Dissert Dissert (Propagation (Propagation ÆÆ worm) worm) •• •• •• 18 Scan Scanrandom random IP IP File Fileshare share Mass Mass mailing mailing Can We Survive the Next Security Attack? Profile of Security Attacks What is the next big thing? • • • • • • • 20 20002001 2002 2003 2004 2005 2006 Mass Mailing Worm Hacking Worm (IIS) Wireless LAN In-security Hacking Worm (RPC), Spam Phishing, Browser security holes Spyware ?? Can We Survive the Next Security Attack? APCERT: Change of incidents Previous Now • Large scale, widespread attack; highly visible • Pin point incidents using powerful tools; low profile • Script kiddies, manias • Professional, criminals • Motivation: • For theft of ID, personal information, $$$ – For fun / fame / recognition • Format • Format – Worm, DOS, Defacement – Phishing, Spyware, Trojan Ref: APCERT presentation on OECD-APEC Joint Workshop, APELTEL32 meeting 5-Sep-2005, Seoul, South Korea 21 Can We Survive the Next Security Attack? A Cool Hello from Hacker • New hackers might not inform you compromised 22 Can We Survive the Next Security Attack? “Incident Report” by Hackers … • Zone-H.org – 23 http://www.zone-h.org/en/defacements/filter/filter_domain=.hk/ Can We Survive the Next Security Attack? Change of Motivation lead to .. … Change of Attack Strategies • Maintain longer influence on a machine – – – – Stay quiet after compromise Disable AV software, personal firewall and anti-spyware Hiding techniques: rootkit Worms: releases more variants that exist for shorter period of time • Stay in control by the commander – Install Remote Access Trojan (backdoor) after compromise – Phone home: use IRC to communicate with master server to get command and upload stolen information 24 Can We Survive the Next Security Attack? Some recent statistics … • Earthlink, the Atlanta-based ISP (April 2004) – In 1.6M computers studied, 370,000 (37%) found to have Trojan horses and system monitors installed. • Gartner Group (June 2004) – online bank accounts had been looted of US$2.4 Bn in the previous 12 months. Around 1.98M adults had suffered losses. – Much of the problem was traced to “Phishing” malicious programs that surreptitiously collect passwords and other confidential data. • Privacy, Identity Theft are becoming great concerns. – Note the cover story of Newsweek 4-Sep-2005 issue. 25 Can We Survive the Next Security Attack? Spyware threat is rising • What is Spyware? – a category of malicious programs that are installed on the computer without sufficient notice to users and obtaining their consent, with a threat to information leakage • Many users are not aware they are infected – National Cyber Security Alliance Survey 2004 • 80% of home PCs in US infected with Adware and Spyware • 88% infected users were not aware Reference: http://www.staysafeonline.info/news/NCSA-AOLIn-HomeStudyRelease.pdf • There was a difficulty in definition of spyware and the appropriate law to regulate it. – OECD-APEC Joint Workshop, APECTEL32 Meeting Seoul, Sep-5 2005. 26 Can We Survive the Next Security Attack? Case Study Marketscore (MKSC) software – MKSC hit many US Universities in Dec-2004 – Some banks in HK issued notification letter to customers in 2005, warning of suspected installation of the software • MKSC packaged as • an Internet accelerator using proxy server • a mail filter for virus – In exchange of • user personal information on web browsing activities 27 Can We Survive the Next Security Attack? What is installed? User had admin right, prompted to click OK to install MKSC. Root Cert 1: Marketscore Inc Root Cert 2: Netsetter 28 Can We Survive the Next Security Attack? Threat 1 : Web traffic proxied • All Traffic Route through Marketscore proxy server 29 Can We Survive the Next Security Attack? Threat 2 : SSL encryption broken Fake Server certificate signed by Marketscore, verified OK with Marketscore public key in its Root certificate 30 Can We Survive the Next Security Attack? Man-in-the-middle attack web browser web server Marketscore proxy server plain text MKSC cert. End User Encrypted pseudo server Log pseudo client Encrypted Real cert. Marketscore.com Research – User sees encrypted traffic using Marketscore certificate. – The Marketscore proxy server decrypted client traffic using her server SSL key, taking some “statistics”, and encrypted the traffic with the bank web server SSL key to sent to the bank web site. – The proxy server requested an SSL session to bank web site on behalf and the bank build such session using the Bank’s certificate. 31 Can We Survive the Next Security Attack? Zombie Army Attacker Handler Agent Handler Agent Agent Agent Victim Handler Agent Agent Agent Zombies Control data streams Attack data streams 32 Can We Survive the Next Security Attack? Zombie Army • Hackers are assembling big “network of zombies” (or bot networks) that they can then turn into profit-making machines – to steal confidential information; – to be used as spam relay • e.g. Bagle and MyDoom infected machines serve as open mail relay for spamming – to host phishing web site; – to launch DDoS attack – army hired to attacking business rivals • 33 e.g. in March 2005, a 16-year-old hacker and a businessman were arrested in New Jersey Can We Survive the Next Security Attack? Theft of Server Identity • Fake domain name similar to real one, OR use IP address in URL – Easy to resist by manually enter URL • DNS poisoning – Spoof the web site even if user type in URL manually Methodology – Modifying HOSTS file - by malicious software • HOSTS file override DNS resolution – Reference: http://www.vnunet.com/news/1159171 – Pharming 34 Can We Survive the Next Security Attack? Pharming By poisoning the victim DNS server, attacker can redirect the traffic of a legitimate site to the attacker server where the attacker can sniff password information even in the HTTPS connection. Legitimate web server The victim thought that he is talking to the legitimate site Victim PC Actually, the victim is talking to the attack server Attacker server which sniff the password information and proxy the HTTPS traffic between the victim and legitimate web server 35 Can We Survive the Next Security Attack? Move towards Organized Cyber Crime Fraud Ring invaded Choicepoint • Choicepoint fraud (publicized Feb 2005) – A fraud ring has stolen the personal and financial information of an estimated 100,000 consumers from computer databases maintained by ChoicePoint, Inc. – The ring established at least 50 fake client accounts with ChoicePoint, giving them access to the company's vast data banks with records on millions of people. – The individuals allegedly used the information to divert the mail of more than 700 people to false addresses, and then stole the identities of many of those people and made purchases in their names 37 Can We Survive the Next Security Attack? Online Trade of Credit Card -------------www.carderportal.org To: [email protected] domain closed down recently Subject: My LoVe - www.carderportal.org From: "Ramon Thorpe" <[email protected]> Date: Sat, 31 Jan 2004 21:39:48 +0100 Message-id: <[email protected]> Old-return-path: <[email protected]> -------------Hello, Thank you for registration on our board - http://www.carderportal.org Welcome to our underground Site! http://www.carderportal.org In our site you will find: Spam Hosting - from 20$ per mounth. Fraud Hosting - from 30$ per mounth. Stoln Credit Cards, Fake ID, DL's. Spam For free only from 1.02.2004 to 5.02.2004. Welcome - http://www.carderportal.org and http://forum.carderportal.org ------- 38 Can We Survive the Next Security Attack? Site openly advertises service for fraud HangUp Team (Russia) http://rat.net.ru/index.php - advertises its programming services to custom design Remote Access Trojan (RAT) to defraud the bank or credit card company of your choice Altavista Russian-to-English Translator http://world.altavista.com/babelfish/tr 39 Can We Survive the Next Security Attack? Zombie network Identity Theft Spyware Pharming Attack What are we going to do with this? 40 Can We Survive the Next Security Attack? Identify the Major Battlefields • Identity Theft of Users and Websites for Money • • • • • • • 41 Users tempted to download & install malware Silent agent, only phone home periodically How to respond to unknown attacks? Man-in-the-middle (MITM) Attack Evasion (hiding) Remote Controlled Zombies Legal grey area, hurdles of cross-border law enforcement Can We Survive the Next Security Attack? Defense Strategies • • • • • • • • • 42 Legislation Incident Response and Collaboration Automated Response Stronger Policy and Enforcement Stronger Trust Mechanism User Education System Secure Design to Minimize User Risk Detection Prevention Can We Survive the Next Security Attack? Legislation – Legislation Area • Local legislation fine tuning • Harmonize the international framework of cybercrime legislation to minimize discrepancies – e.g. Cybercrime Convention of EU – Cross-border collaboration and enforcement, • e.g. bilateral MOU signed by Asia Pacific countries on anti-spam strategy – Digital Divide • Helping Developing Countries 43 Can We Survive the Next Security Attack? Incident Response & Collaboration • CERTs around the world are developing close collaboration in information exchange and pin down of bogus website. FIRST Forum of Incident Response and Security Teams APCERT CERT – Computer Emergency Response Team 44 Can We Survive the Next Security Attack? http://www.cert.org/csirts/images/map-full.gif Stronger Policy Compliance • External Party Security Enforcement – BS7799:2005 include outsourcing controls • PISA and others encourage the Govt to promote Information Security Management Standard like BS7799 and CoBit to commerce 70% 64% 62% Proposition: The standards for IT governance and IS (such as COBIT and ISO17799) are well-deployed 60% 50% 40% 26% 30% 26% Public sector Private sector 20% 10% 12% 10% 0% Disagree or Strongly Disagree 45 No idea Agree or Strongly Agree Can We Survive the Next Security Attack? User Education • Security Hygience: baseline security for everyone – My Security depends on Your Security, vice versa – Clean Your PC 1-2-3 (www.infosec.gov.hk) • Antivirus • Personal Firewall • Patch your system Plus – Don’t forget Anti-spyware now! – Care when handle software • Safe downloading (do not trust public utility download site) 46 Can We Survive the Next Security Attack? Building Trust (Client) • Secure Client – Two-factor authentication • Internet banks in Hong Kong mandatory to “high risk transaction” • It can resist Replay Attack when hacker got user PIN. But it cannot resist MITM attack. – Browser empowerment • Detect and prevent malicious URL and content – e.g. Deepnet Explorer • Protect certificate store!! – Insufficient protection NOW! 47 Can We Survive the Next Security Attack? Building Trust (Provider) • Service Provider (Server) also need to authenticate themselves to the users! – Brand management – Good practice in the consistent use of domain name • Banks are exploring technologies to display personalized image and greeting to user to authenticate the online banking web site. – Can resist pharming and phishing to some extent 48 Can We Survive the Next Security Attack? Walkthrough of emerging security technologies Reforming the Perimeter • Network Admission Control: no one is to be believed – Security Baseline Met? – Qualify or Quarantine Connection request Client Client Qualification Qualification Process Process Rules Rules Qualified Internal Internal Network Network Not Qualified Quarantine Quarantine – Next Generation network switch may have this as default 50 Can We Survive the Next Security Attack? Stronger Infrastructure • Secure DNS protocol (DNSSEC) – Can greatly improve security, but cannot solving all problems • Ref: http://www.linuxsecurity.com/content/view/113965/65/ – Restrict Zone Transfer permission can greatly help • Trusted Computing Base (or Next Generation Secure Computing Base of Microsoft) – Require change in operating system and hardware • sealed storage to store keys, secure I/O – We have heard about it since 5 years ago • Cost to business, Govt. adoption are the issues 51 Can We Survive the Next Security Attack? Incident Response to the Unknown Attack • Detection – Network Monitoring System • Ref: – Internet Storm Centre http://isc.sans.org/ – European CSIRT http://www.ecsirt.net/ – Detect Suspicious Traffic and Track Sources – Some Asia Pacific CERT teams are building theirs, KR, CN, JP, SG, Brunei … 52 Can We Survive the Next Security Attack? Incident Response to the Unknown Attack • Active Detection – Automated Web Patrol with Strider HoneyMonkeys http://www.usenix.org/events/sec05/wips.html http://research.microsoft.com/HoneyMonkey/ http://www.ieee-security.org/TC/SP2005/oakland05-5minutes.html 53 Can We Survive the Next Security Attack? Incident Response to the Unknown Attack • Response – Can we automate signature generation for malicisous software? • Still a R&D topic. Can easily be bypassed with scripts/variants – Ref: Coolaborative Internet Worm Containment (Min Cai et al 2005) IEEE Security and Privacy May-June 2005 Vol 3 No 3 pp25-33 – Can we use heuristics (dynamic – intelligent signatures) over signatures? • Greatly improve the detection against unknown attack • But problems come when packer/ ncryptors appear • Research to find the entry points of the packer/encryptor programs – Ref: Anti-virus Heuristic by Drew Copley at XCON Aug-2005 http://xcon.xfocus.org/archives/2005/Xcon2005_Drew_Copley.pdf 54 Can We Survive the Next Security Attack? Hiding and Anti-hiding an eternal battle between cat and mouse • Maintain longer influence on a machine - hide the tract • Rootkit can wrap existing Trojan and hide them • Rootkit Knowledge publicly available – “Rootkits : Subverting the Windows Kernel” July 2005 by Greg Hoglund, Jamie Butler – Once installed, rootkit tries to fool the virus scanner, task manager ... • Rootkit Detection becomes popular – e.g. Microsoft Malicious Software Removal Tool, F-Secure Blacklight – Strider GhostBuster Rootkit Detection • http://research.microsoft.com/ro otkit/ 55 Can We Survive the Next Security Attack? Minimum Privilege • Why should we use Administrator privilege? – Windows: • I need to install program; • My Nero CD burn program cannot work under user account • Workaround in Windows: “RunAs” administrator • Linux defaults today – No remote root login. Use normal account, then “su” – User can run administrative task (e.g. install programs) by entering root password 56 Can We Survive the Next Security Attack? Security Usability • Security is often easier said than done • Online Survey in August 2005 showed that many users do not understand security options in IE, OE and Word. If they cannot use the features, they will remain unprotected. • Need good default settings (e.g. WinXP SP2), but users still need the option to change things • Need to cater for users at all levels – Ref: Online survey conducted in August 2005 by Steven Furnell, Network Research Group, University of Plymouth, United Kingdom 57 Can We Survive the Next Security Attack? Design and Write Secure Applications • Many existing problems arise from problem of software – design or coding. • Software Architects and Developers play a vital role. • I will leave to the next Speakers would deliver a good talk on this. :-P 58 Can We Survive the Next Security Attack? Conclusion • Multi-party Collaboration – – – – – – – Governments Standards Bodies Corporations Product Vendors Application Developers Researchers Users • Multi-Layer Defense – Legislation and Cross-border collaboration – Technology – Management Policy – Process and Practices – Incident Response – Education is more and more important Creativity Determination Sharing & Collaboration Putting Security in Best Practice 59 Can We Survive the Next Security Attack? Yes NO Can we survive the Next Information Security Attacks? 60 Can We Survive the Next Security Attack?