YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Null Mumbai 14th May News bytes by Dhawal Shah

News Bytes Chapter: Mumbai

May,2016

Dhawal Shah

Page 2: Null Mumbai 14th May News bytes by Dhawal Shah

./About_me

>> Part of Incident response team at HDFC bank

>> Student of M.Tech(Information Security) at

KJSCE,Mumbai

>> Fields of interest: SOC, SIEM, Computer Forensics

Page 3: Null Mumbai 14th May News bytes by Dhawal Shah

./Agenda

>> Panama Papers Leak.

>> Qatar National Bank Data Breach

>> Investigative summary of Bangladesh Bank Heist.

>> Other NEWS

Page 4: Null Mumbai 14th May News bytes by Dhawal Shah

Panama Papers Leak

Page 5: Null Mumbai 14th May News bytes by Dhawal Shah

./Panama_Papers >> 2.6 terabytes of leaked data

>> Email Server Hacked

>> Vulnerable front end of

Website.

Page 6: Null Mumbai 14th May News bytes by Dhawal Shah

./Panama_Papers >> Technical Flaws:

– Outlook Web Access login since 2009 and not updated its client login portal since 2013.

– Client portal was vulnerable to the DROWN attack.

– Drupal open source CMS, was last updated in August 2013

– Drupal had 25 vulnerabilities, including a high-risk SQL injection vulnerability that allows anyone to remotely execute arbitrary commands.

– Directory Traversal

– WordPress version was three months out of date

– Emails were also not encrypted

Page 7: Null Mumbai 14th May News bytes by Dhawal Shah

./Panama_Papers

>> Suspected Methodology:

– Wordpress Revolution Slider vulnerability

– Versions of Revslider all the way up to 3.0.95 are

vulnerable to attack.

Page 8: Null Mumbai 14th May News bytes by Dhawal Shah

./Panama_Papers

>> Suspected Methodology:

– Web server and Mail server were on same network

– Web server was not behind a firewall

– Sensitive data was accessible though Web Based Portal

Page 9: Null Mumbai 14th May News bytes by Dhawal Shah

./Panama_Papers

>> Suspected Methodology:

– Exploiting Wordpress Revolution Slider vulnerability

– Demo: https://player.vimeo.com/video/161966079

Page 10: Null Mumbai 14th May News bytes by Dhawal Shah

./Panama_Papers

>> Suspected Methodology:

– Other Possible Vulnerability Exploited:

– Two plugins were used in addition to Revolution slider:

• WP SMTP plugin

– ability to send mail from your website via a mail server

– plugin stores email server address and login information in plain text in the WordPress

database

• ALO EasyMail Newsletter plugin

– to receive bounced emails from a mail server and automatically

remove those bounced mails from the subscriber list

– plugin also stores email server login information in the WordPress

database in plain text

Page 11: Null Mumbai 14th May News bytes by Dhawal Shah

./Panama_Papers

>> WP SMTP plugin

Page 12: Null Mumbai 14th May News bytes by Dhawal Shah

./Panama_Papers

>> ALO EasyMail Newsletter plugin

Page 13: Null Mumbai 14th May News bytes by Dhawal Shah

Qatar National Bank Data Breach

Page 14: Null Mumbai 14th May News bytes by Dhawal Shah

./QNB_Data_leak

>> Thousands of bank records, totalling 1.4GB of data

>> Uploaded to a file-sharing website called "global-

files.net“

>> Consisted of Critical Information

– bank credentials.

– telephone numbers.

– payment card details.

>>@bozkurthackers shared an online video claiming

responsibility for the breach

Page 15: Null Mumbai 14th May News bytes by Dhawal Shah

./QNB_Data_leak

>>Suspected Methodology

• Attacker Runs SQLMAP to identify the vulnerability

• Webshell was implemented

• Lateral movement to compromise rest of the database.

• Out of 11, 7database were exposed

• The data was arranged into nine various folders, including those

named “Al-Jazeera”, “Police Security”, “Defence and etc”, and

“Mukhabarat”.

Page 16: Null Mumbai 14th May News bytes by Dhawal Shah

Bangladesh Bank Heist

Page 17: Null Mumbai 14th May News bytes by Dhawal Shah

./Bangladesh_bank_Heist >> resulted in theft from the institutes' Federal Reserve bank account.

>>Total Loss incurred $81 million.

>>On Feb 5, 2016, Nearly 36 Requests hit Federal Reserve bank using spoofed Bangladesh Bank identity.

>>4 requests were got processed resulting in amount of $81 million.

>>5th transfer request had typo – error in the beneficiary account name “Shalika Foundation” named as “Fandation”.

>>This typo error caught by beneficiary bank ”Deutsche bank” brought eyes on the incident.

>>Possible attacked planed was about $950 Million.

Page 18: Null Mumbai 14th May News bytes by Dhawal Shah

./Bangladesh_bank_Heist

Page 19: Null Mumbai 14th May News bytes by Dhawal Shah

./Bangladesh_bank_Heist

Page 20: Null Mumbai 14th May News bytes by Dhawal Shah

./Bangladesh_bank_Heist >> Module Patching

Page 21: Null Mumbai 14th May News bytes by Dhawal Shah

./News >> Encryption Trends

– wordpress

– Whatsapp

– Blackberry

– Viber

>> Kiddicare Hacked! 794,000 Accounts Leaked

>> UserVoice Hacked! Users’ Accounts Breached

>> Google Suffers Insider Data Breach

>> London Clinic fined £180,000 for Leaking HIV Patients Data

>> Ransomware hits various companies.

Page 22: Null Mumbai 14th May News bytes by Dhawal Shah

Discussion…

Thank You!!


Related Documents