Top Banner
RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer
19
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

RSA Attack Analysis

Karl F. Lutzen, CISSP

S&T Information Security Officer

Page 2: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

RSA Attack

• March 2011, RSA had a data breach– Attacker stole information which affected

some 40 million two-factor authentication tokens

– Devices are used in private industry and government agencies

– Produces a 6 digit number every 60 seconds.

Page 3: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

RSA Attack Analysis

• An Advanced Persistent Threat (APT)A structured (advanced),

targeted attack (persistent),

intent on gaining information (threat)

Page 4: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

RSA Background

• RSA is a security company that employs a great number of security devices to prevent such a data breach

• Methods used bypassed many of the controls that would otherwise prevented direct attack

Page 5: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Attacker Initial Steps

• Attackers acquired valid email addresses of a small group of employees.

• If the attackers did a full spam to all possible addresses, it gives them away and prevention/detection by RSA is much easier.

Page 6: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Phishing Emails

• Two different phishing emails sent over a two-day period.

• Sent to two small groups of employees, not particularly high profile or high value targets.

• Subject line read: 2011 Recruitment Plan• SPAM filtering DID catch it but put in the

Junk folder

Page 7: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Employee Mistake

• One employee retrieved the email from the Junk mail folder

• Email contained an Excel spreadsheet entitled: 2001 Recruitment Plan.xls

• Spreadsheet contained a zero-day exploit through Adobe Flash (since patched).– Installed a backdoor program to allow access.

Page 8: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Remote Administration Tool (RAT)

• Attackers chose to use the Poison Ivy RAT.– Very tiny footprint– Gives attacker complete control over the

system– Set in reverse-connect mode. System

reaches out to get commands. Fairly standard method of getting through firewalls/IPS

Page 9: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Digital Shoulder-Surfing

• Next the attackers just sat back and digitally listened to what was going on with the system

• The initial system/user didn’t have adequate access for their needs so they needed to take a step to another system to go further.

Page 10: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Harvesting

• Initial platform wasn’t adequate, attackers harvested credentials: user, domain admin, service accounts)

• Next, performed privilege escalation on non-admin users on other targeted systems. Goal: gain access to high value systems/targets.

Page 11: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

The Race

• During the stepping from system to system, security controls detected an attack in progress. The race was now on.

• Attacker had to move very quickly during this phase of finding a valuable target.

Page 12: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Data Gathering

• Attacker established access at staging servers at key aggregation points to retrieve data.

• As they visited servers of interest, data was copied to staging servers.

• Staging servers aggregated, compressed, encrypted and then FTP’d the data out.

Page 13: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Receiving Host

• Target receiving data was a compromised host at an external hosting provider.

• Attacker then removed the files from the external compromised host to remove traces of the attack.

• This also hid the attacker’s true identity/location.

Page 14: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.
Page 15: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Lessons Learned

• Weakest link: A human

• Layered Security: Not adequate to prevent

• Upside: Able to implement new security controls to this point were considered too restrictive.

Page 16: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Karl’s Changes

• What follows would be the changes I’d make at RSA.

• Note, they are a commercial company and do not have the open requirements higher education has. Two different beasts.

• If I were to implement these, very likely I’d be doing a different job…

Page 17: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Changes

• Traffic shaping both ways. (Firewall port blocking isn’t enough)

• Block all but specific protocols• IDS/IPS on all those protocols• Aggressive use of DMZ: Isolate systems• Isolate workstations from one another• Clean Access Solutions on all systems

Page 18: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

Biggest Change

• Mandatory Monthly Security Awareness training for everyone.

• (breaking it into monthly modules makes it tolerable)

• Needs to be interesting/fun, Door prizes, etc.

Page 19: RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.

RSA Attack: Credits

• http://www.satorys.com/rsa-attack-analysis-lessons-learned/