Top Banner
The State of the Hack Kevin Mandia MANDIANT
39

The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

Jun 15, 2018

Download

Documents

vokiet
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

The State of the Hack

Kevin MandiaMANDIANT

Page 2: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

1

Who Am I?Adjunct Professor• Carnegie Mellon University

95-856 Incident ResponseMaster of Information System Management

• The George Washington University

Computer Forensics IIIMasters in Forensic Science

Author for McGraw-HillHoneynet Project

Page 3: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

2

Who Am I?Last 5 Years • Responded to over 300

Potentially Compromised Systems.

• Responded to Intrusions at Over 40 Organizations.

• Created IR Programs at Several Fortune 500 Firms.

Page 4: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

3

Evolution of IT Attacks

-- 1998- Technical Problem- Unix Systems- Servers- Attacks were a Nuisance

1998 -- 2002- Technical/Business Problem- Windows Systems- Servers- Attacks Were About Money

2002 -- Now- Technical/Business/Legal Problem- Windows Systems- Client Systems / End Users - Attacks Are About Money

Page 5: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

4

AgendaIncident DetectionCase StudiesChallenges When Responding to Security Incidents

Page 6: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

Incident Detection

How Organizations are Detecting Incidents?

Page 7: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

6

1. How are Organization’s Detecting Incidents? Antivirus Alerts?• Perhaps, but do not Count on

It…• Alerts are Often Ignored – and

Perhaps Value-less Without an In-Depth Review of the System.

• Quarantined Files Often Remain a Mystery

Anti-Virus Merely Alerts an Organization that Something Bad Might have Occurred. No

Confirmation. Potential Loss of Critical Data

Anti-Virus Merely Alerts an Organization that Something Bad Might have Occurred. No

Confirmation. Potential Loss of Critical Data

Page 8: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

7

Page 9: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

8

2. How are Organization’s Detecting Incidents? IDS Alerts?• Rare Detection Mechanism.

Port 22

Port 443

VPN

Port 22

Port 443

VPN

IDS

Page 10: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

9

3. How are Organization’s Detecting Incidents?

Clients (Outside Company)• Malicious Software Discovered on Compromised

End-User Systems. • Account Manipulation (Online Trading).

Page 11: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

10

4. How are Organization’s Detecting Incidents?

End Users (Internal)• System Crashes (Blue Screens of Death)• Continual Termination of Antivirus Software.• Installing New Applications Simply Does Not

Work.• Commonly Used Applications Do Not Run.• You Cannot “Save As”.• Task Manager Closes Immediately When You

Execute It.

Page 12: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

11

5. How Are Organization’s Detecting Incidents?Proactive Audits or Security Scans

Page 13: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

12

Something Obvious …

6. How Are Organization’s Detecting Incidents?

Page 14: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

13

Rogue ASP Pages

Page 15: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

14

7. How are Organizations Detecting Incidents?Notification from other Victims.Notification from Government Agencies.

Page 16: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

15

Types of Intrusions - 2008Last 20 Computer Intrusions in 2008:• 10 Financial Services• 5 Retailers• 2 Government• 2 EDU• 1 Insurance

Type of Intrusion

FS 11

APT 3

Other 6

APT FS Other

Page 17: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

16

Detection – Last 20 IncidentsAntivirus .5IDS .5Clients/External 1End Users 6• IT

Audits 0Obvious 0External 12

Type of Intrusion

FS 11

APT 3

Other 6

APT FS Other

Page 18: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

A Walkthrough of Real Cases

CSI – Computer Intrusion Forensics!!!

Page 19: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

18

Incident is Detected

Incident Detected on

Host 1

InternetCorporate Network

Backdoor Channel

Network Monitoring

Page 20: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

19

Performing Live Response

Incident Detected on

Host 1

1. Last Accessed Time of Files2. Last Written Time of Files3. Creation Time of Files4. Volatile Information 5. Services Running6. Event Logs7. Registry Entries8. Host Status (Uptime, Patch Level)9. IIS and Other Application Logs

Respond on Host 1

Live Data Collection Performed to Verify Incident and Determine Indicators / Signature of the Attack

Page 21: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

How Are Attackers Gaining Initial Entry?

Page 22: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

21

How are Attackers Gaining Entry?Vulnerable Services?Not Nearly as Common as 1998-2003.

Page 23: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

22

How are Attackers Gaining Entry?Web Application Vulnerabilities?• SQL Injection

Page 24: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

23

How Are Attackers Gaining Entry?End User Attacks

Page 25: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

24

How Are Attackers Gaining Entry?Never Find Victim 0?Valid Credentials

Page 26: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

25

What Attackers are Doing NowDepends on Attack Type

1.1. Attacks for MoneyAttacks for Money2.2. Attacks for InformationAttacks for Information3. Attacks for Access4. Attractive Nuisances5. Information Warfare

Page 27: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

Case Studies

The State of the Hack

Page 28: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

Case Studies – Attacks for Information

Page 29: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

Case Studies – Attacks for Money

Page 30: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

29

ChallengeKnowing the Constituencies you are Investigating the Breach for:• Executive Management• Technical Management• Legal Counsel• Insurance• Clients/Customers

There are Conflicts Amongst these Constituencies

Page 31: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

30

Executive ConcernsLegal ConcernsTechnical Concerns

Evolution of Incident Response

Page 32: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

31

Management Concerns (Board and CEO)What is the Incident’s Impact on Business?Do We have to Notify our Clients?Do We have to Notify our Regulators?Do We have to Notify our Stock Holders?What is Everyone Else Doing about this Sort of thing?

Page 33: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

32

Legal Counsel ConcernsAre we required to notify our clients, consumers, or employees about the security breach?What constitutes a “reasonable belief” that protected information was compromised – the standard used in many states to determine whether notification is required?

Page 34: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

33

Legal Counsel ConcernsWhat are the applicable regulations or statutes that impact our organization’s response to the security breach?Which state laws are applicable? Which might be in the future?Are there any contractual obligations that impact our incident response strategy?

Page 35: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

34

Legal Counsel ConcernsHow might public knowledge of the compromise impact the organization? What is our liability if PII was compromised? What is our liability if the compromised network hosted copyrighted content (pirated movies, music, software…)Does notifying our customers increase the likelihood of a lawsuit?

Page 36: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

35

Legal Counsel ConcernsIs it permissible to monitor/intercept the intruder’s activities? How far can/should we go to identify the intruder?Who knows about the incident?Should the organization notify our regulators? Law enforcement?

Page 37: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

36

Technical Management (CIO)How long were we exposed?How many systems were affected?What data, if any, was compromised (i.e., viewed, downloaded, or copied)? Was any Personal Identifiable Information (PII) compromised?What countermeasures are we taking?

Page 38: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

37

Technical Management (CIO)What are the chances that our countermeasures will succeed?Who else knows about the security breach?Is the incident ongoing? Preventable? Is there a risk of insider involvement?

Page 39: The State of the Hack - cdn.ttgtmedia.comcdn.ttgtmedia.com/searchSecurity/downloads/TheStateOfTheHack...• SQL Injection. 23 ... The State of the Hack. Case Studies – Attacks for

38