Top Banner
Lessons from Hackwarts Vol 1: Defence Against the Dark Arts 2011 Andy Malone MVP, MCT Senior Instructor [email protected] SIM 302
69

SIM 302. Unprepared UninformedUnaware Untrained Unused.

Jan 11, 2016

Download

Documents

Agnes Fields
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Lessons from Hackwarts Vol 1: Defence Against the Dark Arts 2011

Andy Malone MVP, MCTSenior [email protected]

SIM 302

Page 2: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Andy Malone (UK)

Microsoft Certified Trainer MCT (16 Years)Worldwide Security and Systems ConsultantMicrosoft Most Valuable Professional MVP Enterprise Security (5 Years)International Event SpeakerWinner Microsoft Speaker Idol 2006

Page 3: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Coming up in this Session

Lesson 1: Understanding The Changing WorldLesson 2: Learn Why Security FailsLesson 3: The Rise of the Socio Technical SocietyLesson 4: The Good Guy’s Wear Black! – From Cybercrime to Cyber-warfareLesson 5: Defending against Advanced Persistent Threats (APTs)Lesson 6: Defence Against the Dark ArtsConclusions

Page 4: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Lesson 1: Understand the Changing World…

Page 5: SIM 302. Unprepared UninformedUnaware Untrained Unused.

The Changing World

The evolution of cloud computingIncreased mobile populationIncrease in organized crimeIncreased reliance on technologyProblematic border controlTechnological advances Increase in insider threatBreakup of traditional workforce to home based Focus on cost reduction!Evolution of cyber-warfare

Page 6: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Lesson 1: The Changing WorldLife in a cloud!

Page 7: SIM 302. Unprepared UninformedUnaware Untrained Unused.

I Want It All and I Want It Now!

Page 8: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Lesson 2: Understand Why Security Fails…

Page 9: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Why Security Fails “The 5 U’s!”

Unprepared Uninformed Unaware

Untrained Unused

Page 10: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Security…I just Don’t get it!

Failure to Understand how Security Tools & devices actually Work!Failure to Understand Emerging Technologies e.g. Cloud etc.Inadequate TrainingFailure in Management to Understand “Security Value” to Overall BusinessSecurity Often Seen as a Needless Expense Source: Dreamtime

Page 11: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Hey Old Timer! Failure to understand current trends

E-mail/Texting…Huh? that’s so 90sMassive growth in social networking

Facebook 600m users!

Mobile phone apps – massive marketNext gen high speed protocol developmentsGeo location services (creepy)Near Field Communication (NFC)

Page 12: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Failure to Understand Current Security Trends

Spear Phishing attackMobile malwareFollow the moneyMobile banking, eWalletsFollow the moneyProliferation of devicesData centricityNothing forgotten,everything searchableImportance of IdentityGovernment comeback

DroidDream malware iPhone/Privacy

Page 13: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Lesson 3: The Rise of the Socio Technical Society…

Page 14: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Lesson 3: The Rise of the Socio Technical Society

The interaction between society's complex infrastructures and human behaviour

Page 15: SIM 302. Unprepared UninformedUnaware Untrained Unused.

The Rise of the Socio Technical Society

For the first time in Human history, social networks have fundamentally changed the way the human being interactsEvolved social systems are changingto complex socio technical systemsIn the past we would only pass information to “close friends”, with technologies like Facebook this has become blurredResult = less control and less privacy

Page 16: SIM 302. Unprepared UninformedUnaware Untrained Unused.

What is “Privacy”?

The enforcement/maintenance and control over their personal information (PII)Control over PII” means companies respect customer’s information by

Being transparent about how PII is gathered and usedAllowing customers to direct how we use their PIILimiting use of PIIProviding a means by which customers can update their PII to ensure accuracyStriving to keep PII secureWorking to ensure customers can access their data

Common privacy regulations e.g., customers comply with while using Microsoft Online

HIPAA, GLBA, FERPA, Mass 201, PIPEDA, and the EU Data Protection Directive along with the EU Model Clauses and security requirements in EU national privacy laws

Page 17: SIM 302. Unprepared UninformedUnaware Untrained Unused.

The Rise of the Socio Technical Society

Gatherer/hunter

Learn

Communicate

Socio interactivity

Socio isolation

Loss of information control

Page 18: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Threats in the Socio Technical Society

STS Security is difficult to define let alone manageNew STS crimes are evolving at a frightening pace

Cyber stalkingCyber bullyingID theftFraud

Nobody really understands what security is!Nobody really knows how the security tools workSecurity focus is often too much on the “distant” attack – hacking, etc.

Page 19: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Welcome to Creepyville…

Page 20: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Data in the Socio Technical Society

Moore's Law rule is becoming blurredAlmost everything we do produces dataData is like nuclear waste, it’s cheap and thus NEVER depreciates, stays around forever!STS has allowed personal security to be breached because of a fundamental lack of understanding or control“Normal” security mechanisms fail because of these changes in human behaviour and interactivity

Page 21: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Lesson 4: Cyberwarfare… When the Good Guy’s Wear Black!

Page 22: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Think About This

What if the Internet went awayFor a dayA weekA month

No e-mailsNo BlackBerry’s (Er sorry, Windows Phones)No eCommerce

Virtual business services of all sorts, accounting, payroll, and even sales would come to a halt, as would many companies

Page 23: SIM 302. Unprepared UninformedUnaware Untrained Unused.

War versus Cyberwar!

$1.5 to $2 billion

$80 to $120 million

What does a stealth bomber cost?

What does a stealth fighter cost?

$1 to $2 millionWhat does an cruise missile cost?

$300 to $50,000What does a cyber weapon cost?

Page 24: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Find the Weapons of Mass Disruption!

Nuclear Weapons Facility Cyber Weapons Facility

Where’s the Cyber Weapons Facility?

Page 25: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Cyber-WarfareWhy!

The Internet is vulnerable to attackHigh return on investmentInadequacy of cyber DefencesPlausible deniabilityParticipation of non-state actors

Page 26: SIM 302. Unprepared UninformedUnaware Untrained Unused.

The Internet is Vulnerable to Attack

Imperfect designHackers can read, delete, and modify information on or traveling between computersCommon vulnerabilities and exposures (CVE)Database grows dailyDifficult to guard all holes into your network

Page 27: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Plausible Deniability

Maze-like architecture of InternetInvestigations often find only hacked box

Smart hackers route attacks throughMultiple routes/servers

Poor diplomatic relationsNo law enforcement cooperation

The problem of the last hop, retaliation

Page 28: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Cyber Warfare Tactics

EspionagePropagandaDenial-of-Service (DoS)Data modificationInfrastructure manipulation

Page 29: SIM 302. Unprepared UninformedUnaware Untrained Unused.

(1) The New Espionage

Universal media and intelligence gathering

Binoculars, satellites, mass media, NMAP?Territorial sovereignty not violatedMetadata and reading between the linesPicture taking, not physical invasion… right?If indefensible, normally not espionage!

Page 30: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Top Tip: Counter-Surveillance Techniques

Check for mysterious holes or spots on objects in the room, such as books, cases, folders, electronic goods, conduits, alarm systems, soft furnishings, etc.Do any objects look out of place? Are any objects alien to the type of room that you’re in? Is the object meant to be there? Something could be concealed in that objectWith respect to flooring, ceilings, walls and furniture, are any panels lose or have been tampered with?Are you getting interference on any TVs, radios, phones or wireless networks? This might indicate a nearby electronic deviceCheck cables for computers, TVs, video systems, networks, etc. for Keyloggers, tampering or splicing

Page 31: SIM 302. Unprepared UninformedUnaware Untrained Unused.

(2) Propaganda

Easy, cheap, quick, safe, powerful

Audience is the worldDrop behind enemy linesDoes not need to be true

Recruitment, fund raising, hacktivism

Censored information replaced in seconds

Tech expanding rapidly (multimedia, Skype, etc.)Appearance of technical prowess!

Page 32: SIM 302. Unprepared UninformedUnaware Untrained Unused.

(3) Denial of Service (DoS)

Simple strategyDeny computer resource to legitimate usersMost common: flood target with bogus data so it cannot respond to real requests for services/info

Other DoS attacksPhysical destruction of hardwareElectromagnetic interference designed to destroy unshielded electronics via current or voltage surges

Page 33: SIM 302. Unprepared UninformedUnaware Untrained Unused.

(4) Data Modification

The Holy Grail of HacksControl weapons, command and control (C2) systems and you control everything!

 Extremely dangerousLegitimate users (human or machine) may make important decisions based on maliciously altered information

Website defacement“Electronic graffiti” can carry propaganda or disinformation

Page 34: SIM 302. Unprepared UninformedUnaware Untrained Unused.

(5) Infrastructure ManipulationCritical infrastructures connecting to Net

SCADA: Supervisory Control and Data Acquisition; refers to industrial control systems: computer systems that monitor and control industrial, infrastructure, or facility-based processesSCADA security may not be robustElectricity especially importantInfrastructure in private handsSeized hard drives: Microstran, AutoCAD, etc.White House briefed on certain 0-days

Page 35: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Lesson 5: Defending against (APT) Advanced Persistent Threats…

Page 36: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Advanced Persistent Threat: What’s that?

The APT as a group of sophisticated, determined and coordinated attackers that have been systematically compromising U.S. Government and Commercial networks for years. The vast majority of APT activity initially observed by Mandiant has been linked to AsiaAPT is a term coined by the U.S. Air Force in 2006

Page 37: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Advanced Persistent Threats

Internet malware infectionsDrive-by downloadsE-mail attachmentsFile sharingPirated software and keygenSpear PhishingDNS and Routing Mods

Physical malware infectionsInfected USB memory sticksInfected CDs and DVDsInfected memory cardsInfected appliancesBackdoor IT equipment

External exploitationProfessional hackingMass vulnerability exploitsCo-location host exploitationCloud provider penetrationRogue Wi-Fi penetrationSmartphone bridging

Insider threatRogue employeeMalicious sub-contractorSocial engineering expertFunded placementCriminal break-in Dual-use software installation

Trusted connectionsStolen VPN credentialsHijacked roaming hostsB2B connection tappingPartner system breachesExternally hosted system breachesGrey market network equipment

Page 38: SIM 302. Unprepared UninformedUnaware Untrained Unused.

APT Delivery Systems

Worms – software that spreads on own with harmful consequencesVirus – malware attached to other software (e.g., e-mail attachment)Trojan horse – software that appears to be positive but have harmful effectsLogic bomb – software planted to activate at a later date/time with harmful consequencesAdvanced Persistent Threats (APTs) is a term coined by the U.S. Air Force in 2006

Page 39: SIM 302. Unprepared UninformedUnaware Untrained Unused.

APTs Objectives

Political Includes suppression of their own population for stability

EconomicTheft of IP, to gain competitive advantage

TechnicalObtain source code for further exploit development

MilitaryIdentifying weaknesses that allow inferior military forces to defeat superior military forces

Page 40: SIM 302. Unprepared UninformedUnaware Untrained Unused.

APT’s: Understand Targeting and Exploitation Cycle

Step 1

Reconnaissance

Step 2

Initial intrusion into the network

Step 3

Establish a backdoor into

the network

Step 4

Obtain user credentials

Step 5

Install various utilities

Step 6

Privilege escalation /lateral

movement /data exfiltration

Step 7

Maintain persistence

Page 41: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Reconnaissance

In multiple cases, example company Mandiant identified a number of public website pages from which a victim’s contact information was extracted and subsequently used in targeted social engineering messages

Page 42: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Initial Intrusion into the Network

Most malware attacksHave no iconsNo description or company nameUnsigned Microsoft imagesMost Live in Windows Directory or System32, Update,Typically are Packed, Compressed or Encrypted (UP0 Signature)Many Include Strange URLs in StringsMany have open TCP/IP Endpoints (ET phone home)Most Host suspicious services or DLLs

Page 43: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Establish a Backdoor into the Network

Attempt to obtain domain administrative credentials… transfer the credentials out of the networkThe attackers then established a stronger foothold in the environment by moving laterally through the network and installing multiple backdoors with different configurationsThe malware is installed with system level privileges through the use of process injection, registry modification or scheduled services

Page 44: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Obtain User Credentials

The attackers often target domain controllers to obtain user accounts and corresponding password hashes en-masseThe attackers also obtain local credentials from compromised systemsThe APT intruders access approximately 40 systems on a victim network using compromised credentials

Page 45: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Privilege Escalation/Lateral Movement/Data Exfiltration

Once a secure foothold has been established

Exfiltration data such as e-mails and attachments, or files residing on user workstations or project file serversThe data is usually compressed and put into a password protected RAR or Microsoft Cabinet FileThey often use “Staging Servers” to aggregate the data they intend to stealThey then delete the compressed files they exfiltrated from the “Staging Servers”

Page 46: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Maintain Persistence

Page 47: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Top Tip: Malware – Know What to Look For!

Typical malware characteristicsMalware is continually updatedUsually have no icons, description or company nameLive in the Windows Directory or System32, UpdateMalware uses encryption and obfuscation techniques of its network trafficThe attackers’ malware uses built-in Microsoft librariesThe attackers’ malware uses legitimate user credentials so they can better blend in with typical user activityDo not listen for inbound connections Often include Strange URLs in StringsHas open TCP/IP EndpointsHost suspicious services or DLLs

Page 48: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Top Tip: How to Get Rid of Malware

Disconnect from networkIdentify malicious processes and driversEnd suspend and terminate identified processesIdentify and delete malware and auto startsDelete malware filesReboot and repeat

Page 49: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Cyberwarfare: Three Real World Examples

Page 50: SIM 302. Unprepared UninformedUnaware Untrained Unused.

1) Google (2009 – 2010)

Highly sophisticated and targeted attack originating from China that resulted in the theft of intellectual property At least twenty other large companies have also been targeted Suggestions that primary goal was to access Gmail accounts of Chinese human rights activistsDiscovered accounts of dozens of U.S., China, and Europe-based Gmail users who are advocates of human rights in China appear to have been routinely accessed by third parties These attacks and surveillance have uncovered attempts over the past year to further limit free speech on the web – have led us to conclude that we should review the feasibility of it’s business operations in China

http://googleblog.blogspot.com/2010/01/new-approach-to-china.html

Page 51: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Thanks to Dreamtime

Page 52: SIM 302. Unprepared UninformedUnaware Untrained Unused.

2) The Stuxnet Worm

Very complex Windows-specific computer worm that infects computers and connected industrial control equipment (PLCs)First known worm to attack industrial infrastructureSpreads through USB thumb drives as well as network connectionsUtilizes four “zero-day” exploitsUses stolen valid security certificates

Page 53: SIM 302. Unprepared UninformedUnaware Untrained Unused.

(2) The Stuxnet Worm

Thanks to BBC.co.uk

Page 54: SIM 302. Unprepared UninformedUnaware Untrained Unused.

(3) Estonia (April 2007)

Sometimes referred to as “Web War 1”Followed Estonia relocating the Bronze Soldier of Talinn, a Russian monumentSophisticated and large set of denial of service (DoS) attacks on Estonian parliament, banks, ministries, newspapers, other web sitesSevere effect on above institutions for approximately three weeks

Page 55: SIM 302. Unprepared UninformedUnaware Untrained Unused.

demo

Tools of the Trade

Page 56: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Lesson 6:Defence Against the Dark Arts…

Page 57: SIM 302. Unprepared UninformedUnaware Untrained Unused.

First Understand the Difficulties in Defense

Most networks have many entry points to internetEncryption is not a silver bulletDifficult to trace attacksMany from robot networks (botnets) of compromised PCsInternet created for convenience, not securityInternet technology does not support easy defenseUnknown capabilities of other nations, criminal gangs/groupsLittle deterrence existsDefenders have to defend against many possible attacks, but attackers only have to find one hole

Page 58: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Difficulties in Defense

Internet created in an environment of intellectual freedom, mostly under private (not government) control

Efforts to change – e.g., “Kill Switch” bill (2010) in Congress giving government power to take over parts of internet in national emergencyOther countries can more easily mount Defense (e.g., fewer entry points, government can already control networks)

Military cyber-capabilities are significantly focused on offense, not Defense

Page 59: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Use Risk Management Techniques?

Ensures good management practiceProcess steps that enable improvement in decision makingA logical and systematic approachIdentifying opportunitiesAvoiding or minimising losses

RiskManagement

Page 60: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Security Planning is Everything…

Conduct regular business risk analysis Adopt security policiesDesign and implement an in-depth security solutionEnsure physical securityUnderstand firewall rulesService packs/patching/anti virusDeploy intrusion prevention system (IPS)Secure mobile devices/laptops

Page 61: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Adopt a Multi-Layered Defense

Security Management Threat and Vulnerability Management, Monitoring and Response

Edge Routers, Firewalls, Intrusion Detection, Vulnerability ScanningNetwork Perimeter

Dual-factor Authorization, Intrusion Detection, Vulnerability ScanningInternal Network

Access Control and Monitoring, Anti-Malware, Patch and Configuration ManagementHost

Secure Engineering (SDL), Access Control and Monitoring, Anti-MalwareApplication

Access Control and Monitoring, File/Data IntegrityData

User Account Management, Training and Awareness, Screening

Facility Physical Controls, Video Surveillance, Access Control

Strategy: Employ a risk-based, multi-dimensional approach to safeguarding services and data

Page 62: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Review

Lesson 1: Understanding The Changing WorldLesson 2: Learn Why Security FailsLesson 3: The Rise of the Socio Technical SocietyLesson 4: The Good Guy’s Wear Black! – From Cybercrime to Cyber-warfareLesson 5: Defending against Advanced Persistent Threats (APTs)Lesson 6: Defence Against the Dark ArtsConclusions

Page 63: SIM 302. Unprepared UninformedUnaware Untrained Unused.

My Other Sessions…

SIM 301 Monty WiFion and the Quest for the Holy Grail of Network Security!

SIM 302 Lessons from Hackwarts Vol 1: Defense against the Dark Arts 2011

SIM 327 Rethinking Cyber Threats: Experts Panel

Find Me Later At…

Page 64: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Andy Malone (UK)

E: [email protected]: AndyMaloneLinkedIn: Andy Malone (UK)

Thanks For Listening & Enjoy TechEd!

Page 65: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Safety and Security Centerhttp://www.microsoft.com/security

Security Development Lifecyclehttp://www.microsoft.com/sdl

Security Intelligence Reporthttp://www.microsoft.com/sir

End to End Trusthttp://www.microsoft.com/endtoendtrust

Trustworthy Computing

Page 66: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Resources

www.microsoft.com/teched

Sessions On-Demand & Community Microsoft Certification & Training Resources

Resources for IT Professionals Resources for Developers

www.microsoft.com/learning

http://microsoft.com/technet http://microsoft.com/msdn

Learning

http://northamerica.msteched.com

Connect. Share. Discuss.

Page 67: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Complete an evaluation on CommNet and enter to win!

Page 68: SIM 302. Unprepared UninformedUnaware Untrained Unused.

Scan the Tag to evaluate this session now on myTech•Ed Mobile

Page 69: SIM 302. Unprepared UninformedUnaware Untrained Unused.