Top Banner
Threats in video game industry Dmitry Korzhevin – Crytek CSIRT
65

Crytek CSIRT CERT-EE Symposium 2016

Jan 12, 2017

Download

Software

CrytekCSIRT
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Crytek CSIRT CERT-EE Symposium 2016

Threats in video game industry

Dmitry Korzhevin – Crytek CSIRT

Page 2: Crytek CSIRT CERT-EE Symposium 2016

COMPANY OVERVIEW

Page 3: Crytek CSIRT CERT-EE Symposium 2016

Crytek Games

Page 4: Crytek CSIRT CERT-EE Symposium 2016

CRYENGINE® is Crytek’s key differentiator for success

World leading game development software for sophisticated computer and video games

Highest graphics quality and unique Realtime-3D-Technology

Innovation leadership as a result of 15 years of development know-how

Licensed by numerous third-party game developers and publishers

Sole integrated all-in-one solution for games on platforms of the current and future generation:

CRYENGINE

Page 5: Crytek CSIRT CERT-EE Symposium 2016

CRYENGINE

Page 6: Crytek CSIRT CERT-EE Symposium 2016

Crytek STUDIOS and CSIRT constituency

FRANKFURT HQ

BUDAPEST ISTANBUL KIEV

SEOUL SHANGHAI SOFIA

Page 7: Crytek CSIRT CERT-EE Symposium 2016

WARFACE in Numbers

Page 8: Crytek CSIRT CERT-EE Symposium 2016

● 36 200 000 registered users

More, than population in Canada

WARFACE in Numbers

Page 9: Crytek CSIRT CERT-EE Symposium 2016

● 2 557 557 334 340 warbucks gained

More, than United Arab Emirates GDP

for 4 years

WARFACE in Numbers

Page 10: Crytek CSIRT CERT-EE Symposium 2016

● 3 758 496 797 reanimation by medics

More than half the world's population

WARFACE in Numbers

Page 11: Crytek CSIRT CERT-EE Symposium 2016

● 273 509 398 237 shots

That's enough for the continuous

shooting from M137 minigun for 32

years

WARFACE in Numbers

Page 12: Crytek CSIRT CERT-EE Symposium 2016

● 3 044 154 697 coop-climbs

performed

Players have raised 48 Cheops

pyramids

WARFACE in Numbers

Page 13: Crytek CSIRT CERT-EE Symposium 2016

Threats

Page 14: Crytek CSIRT CERT-EE Symposium 2016

● Aimed at Users

● Aimed at Servers and Services

● Aimed at Network and Infrastructure

Threats categories

Page 15: Crytek CSIRT CERT-EE Symposium 2016

● Aimed at Users

● Aimed at Servers and Services

● Aimed at Network and Infrastructure

Threats categories

Page 16: Crytek CSIRT CERT-EE Symposium 2016

Threats aimed at Users

Page 17: Crytek CSIRT CERT-EE Symposium 2016

Cheats

Countermeasure: Anti-Cheat Systems

Threats aimed at Users – Cheats

Page 18: Crytek CSIRT CERT-EE Symposium 2016

Anti-Cheat Systems:

User (Client) Side

Server Side

Hybrid

Threats aimed at Users – Cheats

Page 19: Crytek CSIRT CERT-EE Symposium 2016

FairFight

Starforce

EasyAntiCheat

Custom

Threats aimed at Users – Cheats

Page 20: Crytek CSIRT CERT-EE Symposium 2016

Social engineering

Page 21: Crytek CSIRT CERT-EE Symposium 2016

Forums

In game messaging

Chats

Threats aimed at Users – Social Engineering

Page 22: Crytek CSIRT CERT-EE Symposium 2016

User awareness

Info banners

Informational e-mails

StaySafeOnline (NCSA)

Threats aimed at Users – Social Engineering

Page 23: Crytek CSIRT CERT-EE Symposium 2016

Phishing attacks

Page 24: Crytek CSIRT CERT-EE Symposium 2016

● User awareness

● Info banners

● Informational e-mails

● Cooperation with Law Enforcements

Phishing Attacks

Page 25: Crytek CSIRT CERT-EE Symposium 2016

Password-Based Attacks

Page 26: Crytek CSIRT CERT-EE Symposium 2016

Bruteforce, dictionary, hybrid

Websites

User accounts

API / single sign on

Password-Based Attacks

Page 27: Crytek CSIRT CERT-EE Symposium 2016

User awareness

Strict password policies

Detection on API / Server level

Threshold on API level

Password-Based Attacks

Page 28: Crytek CSIRT CERT-EE Symposium 2016

Browser attacks (Web)

Page 29: Crytek CSIRT CERT-EE Symposium 2016

XSS (both reflected and stored)

CORS Violation

Links Manipulation

Browser attacks (Web)

Page 30: Crytek CSIRT CERT-EE Symposium 2016

Browser update reminders

Active Penetration tests

Code Review

Automated code security review

Browser attacks (Web)

Page 31: Crytek CSIRT CERT-EE Symposium 2016

Rootkits and web-shells

Page 32: Crytek CSIRT CERT-EE Symposium 2016

Forums

Avatars

Rootkits and web-shells

Page 33: Crytek CSIRT CERT-EE Symposium 2016

Linux Malware Detect for all uploads

Notification

Rootkits and web-shells

Page 34: Crytek CSIRT CERT-EE Symposium 2016

Threats aimed at Servers and Services

Page 35: Crytek CSIRT CERT-EE Symposium 2016

SSL attacks

Page 36: Crytek CSIRT CERT-EE Symposium 2016

NGINX

Up-To date versions

Web server tuning (A+ Certs)

Customized NGINX configuration

Own repos with signed packages

SSL attacks

Page 37: Crytek CSIRT CERT-EE Symposium 2016

SSL attacks

Page 38: Crytek CSIRT CERT-EE Symposium 2016

Unpatched software

Page 39: Crytek CSIRT CERT-EE Symposium 2016

Automated checks and notification

Critical security updates auto install

RSS subscriptions for team

E-mail subscriptions for team

Unpatched software

Page 40: Crytek CSIRT CERT-EE Symposium 2016

Denial of service

Page 41: Crytek CSIRT CERT-EE Symposium 2016

N+1

DC Anti-DDOS

WAF ModSecurity (Atomicorp)

Host firewalls (Netfilter)

CDN Protection

Non-standard ports

TCP/UDP Knock-In

Denial of service

Page 42: Crytek CSIRT CERT-EE Symposium 2016

Attacks on custom services

Page 43: Crytek CSIRT CERT-EE Symposium 2016

Honeypots

Rsyslog

Logs distribution (DC, Studios)

Encrypted relay chains (TLS-protected)

NTP – OpenNTPD (N+1)

Monitoring (N+1)

Attacks on custom services

Page 44: Crytek CSIRT CERT-EE Symposium 2016

Configuration mistakes

Page 45: Crytek CSIRT CERT-EE Symposium 2016

Least privileges

PXE + Foreman

Puppet

Ansible

Git and Gitlab

Configuration mistakes

Page 46: Crytek CSIRT CERT-EE Symposium 2016

CIA Triad Compliance

Page 47: Crytek CSIRT CERT-EE Symposium 2016

Confidentiality - only authorized access to data.

Integrity - data has not been improperly altered.

Availability - data and services are always available.

CIA Triad Compliance

Page 48: Crytek CSIRT CERT-EE Symposium 2016

Center for Internet Security Benchmarks (CIS)

Defense Information Systems Agency (DISA) STIGs

ISO 27002/17799 Security Standards

National Institute of Standards (NIST) guidelines

National Security Agency (NSA) guidelines

Payment Card Industry Data Security Standards

Site Data Protection (SDP)

CIA Triad Compliance

Page 49: Crytek CSIRT CERT-EE Symposium 2016

Nessus

Lynis

CIA Triad Compliance

Page 50: Crytek CSIRT CERT-EE Symposium 2016

OS and Services integrity

Page 51: Crytek CSIRT CERT-EE Symposium 2016

HIDS

Samhain

OS and Services integrity

Page 52: Crytek CSIRT CERT-EE Symposium 2016

Use static binary not linked to shared libraries

Strip the binary

GPG signed configuration and baseline database

Own HIDS built-in SMTP

Stealth mode of operation (config hidden in image)

Disable command line parsing without magic word

Rename every installed file to custom name

Pack and encrypt executable

HIDS Additional options

Page 53: Crytek CSIRT CERT-EE Symposium 2016

Threats aimed at Network

Page 54: Crytek CSIRT CERT-EE Symposium 2016

Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow

Vulnerability

More than 19 Critical vulnerabilities in last 5 years

Ipsec attacks

Page 55: Crytek CSIRT CERT-EE Symposium 2016

DoS

Code execution

Overflow

Bypass

Gain information (Disclosure)

Ipsec attacks

Page 56: Crytek CSIRT CERT-EE Symposium 2016

Latest firmware for HW firewalls (NGFW)

StrongSwan IPSec

Auth logs to RADIUS

Least Privileges

DMZ and separate segments

Different security levels

Ipsec attacks

Page 57: Crytek CSIRT CERT-EE Symposium 2016

IPsec IKEv2 EAP-TLS with authentication based on

X.509 certificates, elliptic curve DH groups and

ECDSA with built-in integrity and crypto tests for

plugins and libraries.

PacketFence network access control (NAC)

Ipsec attacks

Page 58: Crytek CSIRT CERT-EE Symposium 2016

Network Planning

Page 59: Crytek CSIRT CERT-EE Symposium 2016

Security Policy

Levels of acceptable risks (Risk Management)

Network Segmentation and VLANs

Network Planning

Page 60: Crytek CSIRT CERT-EE Symposium 2016

Defense in depth

Page 61: Crytek CSIRT CERT-EE Symposium 2016

SSH with RSA auth keys only

Tokens (Yubikey)

FreeIPA

Defense in depth

Page 62: Crytek CSIRT CERT-EE Symposium 2016

We are open!

Page 63: Crytek CSIRT CERT-EE Symposium 2016

Welcome to the Crytek Kiev Studio

Page 64: Crytek CSIRT CERT-EE Symposium 2016

QUESTIONS?Dmitry Korzhevin

Head of Crytek CSIRT

[email protected]

Page 65: Crytek CSIRT CERT-EE Symposium 2016

©2016 Crytek GmbH