Top Banner
© AKAMAI - EDGE 2016 Barbarians at the Gate(way) Dave Lewis, Global Security Advocate
95

Edge 2016 barbarians at the gateway

Apr 16, 2017

Download

Technology

akamaidevrel
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Barbarians at the Gate(way)Dave Lewis, Global Security Advocate

Page 2: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

#whoami

Dave Lewis@[email protected]

Page 3: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 4: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 5: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 6: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 7: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

We Found Him!

Page 8: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Textå

Page 9: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 10: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 11: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 12: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 13: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 14: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

It left me wanting…

Page 15: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Game Plan

• Actors

• Attacks

• Tools

• Trends

• Data

• Now what?

Page 16: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Actors: For Hire

Page 17: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Current(ish) prices on the Russian underground

• Hacking corporate mailbox: $500

• Winlocker ransomware: $10-20

• Intelligent exploit bundle: $10-$3,000

• Hiring a DDoS attack: $30-$70/day, $1,200/month

• Botnet: $200 for 2,000 bots

• DDoS botnet: $700

Page 18: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 19: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Actors: Bored Kids

Page 20: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Bored Teens

https://www.flickr.com/photos/ardinhasaphotography/8484164608/sizes/l

Page 21: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 22: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Hacktivists

https://www.flickr.com/photos/sklathill/2255718951/sizes/l

Page 23: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Actors: Nation States

Page 24: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Standard VillainsThere are

Page 25: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Arch VillainsAnd there are…

Page 26: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Attacks

Page 27: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Attack Vectors Over HTTP

Page 28: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Attack Vectors Over HTTPS

Page 29: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Types of Attacks

SYN FloodsUDP FloodsICMP FloodsNTP AmplificationHTTP Flood

Page 30: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Attacks: Volumetric

Page 31: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Your website can be overwhelmed…

Page 32: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 33: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 34: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 35: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Attacks: Application Layer

Page 36: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 37: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Application Layer DDoS

Page 38: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 39: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 40: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 41: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Attacks: Extortion

Page 42: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

DD4BC

Began by targeting sites with ransom demandsFailure to pay lead to increased $$$ to stop the attackEarlier attacks focused on businesses that would avoid reporting the attacks to law enforcement.Once research published they relocated their campaigns to APAC

Page 43: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 44: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

More recently…

• DD4BC continues to inform victims that they will launch a DDoS attack of 400-500 Gbps against them.

• To date, DD4BC attack campaigns mitigated by Akamai have not exceeded 50 Gbps in size.

• That’s up from the high of 15-20 Gbps observed

Page 45: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 46: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 47: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Attacks: Amplification

Page 48: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 49: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 50: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools

Page 51: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools: Havij

Page 52: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools: Donut

Page 53: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools: Donut (con’t)

GET / HTTP/1.1

Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/msword, application/vnd.ms-powerpoint, application/vnd.ms-excel, */*

Accept-Language: en-us

Accept-Encoding: gzip, deflate

User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.0.3705)

Host: www.foo.bar

Connection: Close

Page 54: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools: HULK

Page 55: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools: HULK (con’t)GET /?NJB=VURZQ HTTP/1.1

Accept-Encoding: identity

Host: www.foo.bar

Keep-Alive: 112

User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.3) Gecko/20090913 Firefox/3.5.3

Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7

Connection: close

Referer: http://www.foo.bar

Cache-Control: no-cache

Page 56: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools: LOIC

Page 57: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools: HOIC

Page 58: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools: Brobot

Brobot is a PHP trojan that allows an attacker to take control of a victim's compromised hosted Web server and use it to launch DDOS attacks.

Page 59: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools: SSHowDownCVE-2004-1653

Page 60: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools: Mirai

Page 61: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 62: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Tools: WGET

Page 63: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Trends

Page 64: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Media Grandstanding

Page 65: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Commoditization of DDoS

https://www.flickr.com/photos/trophygeek/7309935684/sizes/l

Page 66: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 67: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 68: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

What’s your fancy?

Page 69: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

What’s a Booter?

https://www.flickr.com/photos/chicagobart/4480217217/sizes/l

Page 70: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

OK, What’s a Stresser?

Image Credit: Honda

Page 71: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Stressers or Booters

• xBOOT

• Flash Stresser

• Hyper Stresser

• Grim Booter

• Anonymous Stresser

• Titanium Stresser / Lizards

• Big Bang Booter…and so on.

Page 72: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 73: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Some other highlights

• DDoS agents targeting Joomla and other SaaS apps

• A heap-based buffer overflow vulnerability in Linux systems

• Attackers using new MS SQL reflection techniques

• Data breaches fueling login attacks

Page 74: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

OK so, attribution?

https://www.flickr.com/photos/45909111@N00/8519280338/sizes/l

Page 75: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 76: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 77: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

MEGA MEGA MEGAThese large attacks all contained SYN floods

12:34:04.270528 IP X.X.X.X.54202 > Y.Y.Y.Y.80: Flags [S], seq 1801649395:1801650365, win 64755, length 970

....E.....@...}.6.....6....Pkb......P...c.........................................

..........................<snip>..................................................

Page 78: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

DDoS: Function of Time

Page 79: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Other Observations

• SQLi

• Local/Remote File Inclusion

• IoT botnets coming to the forefront

• PHP Injection

• Malicious File upload

• JAVA …best remote access platform ever!

Page 80: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

SQL Injection…still

Page 81: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 82: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Why this is a problem

Page 83: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 84: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Passwords

Page 85: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 86: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

File Inclusions

Page 87: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Malicious Uploads

• KCFinder file upload vulnerability

• Open Flash Chart file upload vulnerability (CVE-2009-4140)

• appRain CMF (uploadify.php) unrestricted file upload exploit (CVE-2012-1153)

• FCKeditor file upload vulnerability (CVE-2008-6178)

Page 88: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Undead Army

https://www.flickr.com/photos/scabeater/3272684874/sizes/o/

Page 89: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

So, what to do?

• I might know a vendor that could help :-)

• SQL INJECTION IS A SOLVABLE PROBLEM

• Harden systems

• Work with your ISP on mitigation strategies

• Use ACL lists to deal with known bad IPs

• IP Rate limiting

• PATCH PATCH PATCH

Page 90: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 91: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

TextSTATEOFTHEINTERNET.COM

Page 92: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Page 93: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Thanks!

Page 94: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Thanks for listening!

Page 95: Edge 2016 barbarians at the gateway

© AKAMAI - EDGE 2016

Text

Questions?Thanks

Dave Lewis@gattaca

[email protected]