38
Terremark Secure Information Services Ralph Echemendia Terremark Secure Virtualization Secure Information Services Emerging Threats in Cyberspace

Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Embed Size (px)

Citation preview

Page 1: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Terremark

Secure Information Services

Ralph Echemendia Terremark Secure Virtualization

Secure Information Services

Emerging Threats in Cyberspace

Page 2: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Ralph Echemendia Secure Virtualization,

Secure Information Services

•! Over 17 years experience as Information security expert, researcher, ethical hacker and instructor in many IT areas

•! Specializing in Security of Virtualized Architectures

•! IT Architect, Security Expert and Ethical Hacker

•! Featured in many articles and reports in main media outlets

•! As a consultant conducted security audits, technical education and penetration tests for many Fortune 1000 companies including:

•! Oracle

•! Microsoft

•! Google and American Express

•! Government institutions such as: •! United Nations

•! NASA

•! FBI

•! DOD and GSA to name a few.

About me

Page 3: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Overview

•! History of Cyber-Threats

•! 2008 at a Glance

•! Online Threats

•! State Sponsored Threats

•! Arrests

•! The Future

Page 4: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

History of Cyber-Threats

Source : http://jeremiahgrossman.blogspot.com/

Page 5: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

2008 at a Glance

•! Biggest malware threats – SQL injection attacks against websites

and the rise of scareware

•! New web infections – one new infected webpage discovered by

Sophos every 4.5 seconds

•! Malicious email attachments – five times more at the end of 2008

than at the beginning

•! Spam-related webpages – one new webpage discovered by every 15 seconds

•! New scareware websites – five identified every day

•! Top malware-hosting country – US with 37 percent

•! Top spam-relaying continent – Asia with 36.6 percent

•! Amount of business email that is spam – 97 percent Source: Sophos

Page 6: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

The ONLINE Threats

•! Exploitation of legitimate websites

(Client Side attacks)

•! eMail Threats

•! Malware

•! Apple

•! Mobile devices and Wifi

•! Data Leakage

•! State-sponsored activities

Page 7: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Exploitation of legitimate websites

CLIENT-SIDE EXPLOITS

Client-side exploits take advantage of vulnerabilities in client software, such as web browsers, email applications and media players (e.g., Internet Explorer, Firefox, Microsoft Outlook, Microsoft Media Player and RealNetworks' RealPlayer).

They can also exploit vulnerabilities in system-wide libraries used by client applications. For example, a vulnerability in an image library that renders JPEG images might be exploitable via a web browser or an email application.

January 2008: Thousands of websites belonging to Fortune 500

companies, government agencies and schools were infected with malicious code.

Page 8: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Exploitation of legitimate websites

Source: Scunia

Page 9: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Exploitation of legitimate websites

February 2008: UK broadcaster ITV was the victim of a poisoned web advert campaign, designed to deliver scareware to Windows and Mac users.

March 2008: A site selling tickets for the Euro 2008 football championship was hacked, while anti-virus firm Trend Micro found some of its webpages had been compromised.

April 2008: Cambridge University Press’s website was compromised so that visitors to its online dictionary were subject to unauthorized hacker scripts.

Source: Sophos

Page 10: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Exploitation of legitimate websites

June 2008: As the Wimbledon tennis tournament opened in the UK, the Association of Tennis Professionals site was infected.

July 2008: Sony’s US PlayStation website suffered an SQL injection assault which put visiting consumers at risk from a scareware attack.

September 2008: BusinessWeek magazine was infected with an SQL injection attack that attempted to download malware from a Russian-based server.

October 2008: An area of the Adobe website designed to offer support to video bloggers was compromised by an SQL injection attack.

Source: Sophos

Page 11: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Exploitation by Impact

Source: Scunia

Page 12: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

eMail Threaths

Year Emails with infected

attachments

(average)

2005 1 in 44

2006 1 in 337

2007 1 in 909

2008 1 in 714

Source: Sophos

Page 13: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

eMail Threaths

Year Emails with infected

attachments

(average)

2005 1 in 44

2006 1 in 337

2007 1 in 909

2008 1 in 714

Source: Sophos

Troj/Agent-FZA is a Trojan for the Windows platform.

Troj/Agent-FZA has functionality to communicate with a remote server via HTTP.

Troj/Invo-Zip is a family of zip files that contain malware.

Members of Troj/Invo-Zip are usually sent in spam pretending to relate to an invoice or receipt, often one related to a UPS transaction or to tax.

Page 14: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Spam by Location

Source: Sophos

Page 15: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Add Malicious links and BAM!!!

•! As well as using malicious email

attachments, attackers continue

to embed malicious links in emails and execute

creative and timely attacks email attacks designed

to lure users and gather more information and

access resources.

+! =!

Page 16: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Case Study

In September 2008, an email was widely spammed containing a link to what was said to be a pornographic video of US

presidential candidate Barack Obama. However, the webpage really installed the

Mal/Hupig-D malware.

Source: Sophos

Page 17: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Malware Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent.

The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

The term "computer virus" is often used by consumers as a catch-all phrase to include all types of malware, including true viruses.

Source: Wikipedia & F-Secure

Page 18: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Malware by Location

Location %

English-speaking world 24.5 percent

Chinese 11.6 percent

German 3.7 percent

French 3.1 percent

Russian 3.0 percent

Brazilian Portuguese 1.6 percent

Other 4.6 percent

Page 19: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

One significant method used by attackers to fuel their moneymaking during 2008 was the use of fake anti-virus software, also known as scareware or rogueware.

Such attacks prey on IT security fears and fool users into believing their computer has a problem when it has nothing of the kind.

Source: Wikipedia & Sophos

Scareware comprises several classes of scam software, often with limited or no benefit, sold to consumers via certain unethical marketing practices.

The selling approach is designed to cause shock, anxiety, or the perception of a threat, generally directed at an unsuspecting user. Some forms of spyware and adware use scareware tactics.

Scareware

Page 20: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

In February 2008, a new Flash-based Trojan, Troj/Gida-B36, was designed to scare users into purchasing bogus security software. This scareware attack used poisoned web adverts that worked equally well on Mac and Windows

computers.

The OSX/Hovdy-A Trojan37, discovered in June 2008, is also capable of infecting Mac OS X computers and attempts to steal passwords, open

firewalls and disable security settings. It takes advantage of the ARDAgent vulnerability in Mac OS X to gain root access. Once a computer has been infected the hacker can gain complete control and cover their tracks by disabling system logging.

Source: Sophos

The Apple malware problem is tiny compared

to the situation for Windows users.

However, since the emergence of the first financially motivated malware for Mac OS X in late 2007 there have been more attempts by hackers to infect

Mac computers.

Apple users a soft target?

Page 21: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Source: Sophos

Apple users a soft target?

Malware aimed at

Macs will continue to be written, and users

should continue to follow safe

computing best

practices such as running an anti-virus

product and keeping up-to-date

with security

patches.

Page 22: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Mobile devices and Wi-Fi

Security flaws in smartphones???? NOOOOO

To great fanfare, in 2008:

•! The 3G version of the Apple iPhone was released.

•! Also the first phones to use the Google Android mobile operating system.

Page 23: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Mobile devices and Wi-Fi

These users should also be aware that they may be more vulnerable to phishing attacks than their desktop counterparts because:

•! They have to enter URLs via the touch-sensitive screen, and may be more willing to just click on email links.

•! The iPhone’s version of Safari does not display URLs that are embedded in emails. *So easy to send them to a bogus banking website.*

•! The iPhone’s browser only displays partial URLs in its address bar, making it far easier for attackers to fool users into believing they are on a legitimate website.

Page 24: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Data Leaks

•! Unprotected or Unsafe Data

Data leakage filled the headlines in 2008 as corporations and government

proved themselves to be lax in protecting their confidential data.

•! Organizations of all sizes are finding that today’s mobile and collaborative workforce needs access to information inside and outside

the office, along with the ability to share data with co-workers and

partners.

•! Users are routinely using and sharing data without giving thought to confidentiality and regulatory requirements.

•! Almost 30 percent store contract and financial data, customer information, sales targets, contact details and personal account data on

removable media.

Page 25: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Data Leaks cost MONEY????

•! In August 2008 US authorities charged 11 men with being involved in a hack that stole more than 40 million credit and debit card numbers. The

retailers affected included OfficeMax, Barnes & Noble, Boston Market, and TJX, which operates retail stores TJ Maxx and Marshall’s.

•! According to the Secret Service and Department of Justice, the “wardriving” gang installed malicious programs and then sold the stolen

information to other criminals in the US and Eastern Europe.

•! Tens of thousands of dollars were then illegally withdrawn from ATMs

using forged credit cards.

In another incident, the British Home Office confirmed that a USB memory stick containing the unencrypted personal details of some 130,000 convicted criminals had gone missing. Information included names, addresses, dates of birth and, in some instances, prisoners’ release dates. The USB stick was being used by external contractor, which as a result, lost a £1.5 million contract with the British government.

Page 26: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Data Leaks are everywhere!

Used hardware?

•! Incidents were reported of confidential data ending up in the public domain after old computer hardware, which had not been securely erased, was sold on auction sites like eBay.

•! Analysts suggest that there is a higher demand (and thus higher price

offered) for used hard drives on eBay than for brand new ones.

•! Imagine the amount of confidential information that is potentially recoverable.

Page 27: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Data Leaks on Google?

Page 28: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Advanced Google Tricks

•! Search Engine Ninjitsu

Search engines are your best friend in the search for Information Disclosure. Google is really your one-stop shop for all your information sorting needs

•! Google Groups: USENet search engine

•! Google Cache: They take a page offline? No big deal!

•! Google Addresses: Automatically return addresses and #’s

Page 29: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Advanced Google Tricks

•! link: http://www.yoursite.com query •! site: http://www.yoursite.com query •! cache: http://www.yoursite.com/fullurl •! related: www.yoursite.com •! inurl: query •! intitle: query •! spell: query •! stocks: name or ticker •! street address + zip or city/state •! phone number

Page 30: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Advanced Google Tricks

•! Some of our favorites:

•! Inurl Inurl allows you to search for fun things like ‘inurl:passwd.txt’. Try this in your browser. As of when this was written, I found a ton of things that looks suspiciously like password hashes!

•! Filetype

filetype allows you to search for specific files. This can be very powerful, allowing you to grab every .doc or .pdf or .$foo file off your target’s website. Some favorite targets:

.pst, .pdf, .doc, .xls, .mdf, .sam, .cpp

Mix and match keywords too. You’d be amazed at what you can find.

Page 31: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Encryption

•! The most important step in stopping information leakage is to encrypt sensitive information, laptops, removable storage devices and email.

•! If data is encrypted with a password it cannot be deciphered or used unless the password is known.

•! The goal is to prevent access to this confidential data even if all other security measures fail to prevent a hacker from accessing your computing resources.

Page 32: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

State-Sponsored Attacks

•! Digital espionage increasing

During 2007 it became common for countries to openly accuse each other of engaging in spying via the internet, such as the Chinese military being blamed for a cyberattack on a Pentagon computer system in September.

Concern about state-sponsored cybercrime climaxed at the end of 2007 with the discovery that MI5, the British Security Service, had written to 300 chief executives and security chiefs at UK companies warning them of the “electronic espionage attack”.

Page 33: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

State-Sponsored Attacks

•! Examples

August 2008. As tensions rose over South Ossetia, Russian and Georgian

hackers launched attacks against each other.

A distributed denial of service attack was

performed against the website of the South Ossetian government and the

defacement of the Georgian Ministry of

Foreign Affairs website with a collage of pictures of Georgian president Mikheil

Saakashvili and Adolf Hitler.

Page 34: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

State-Sponsored Attacks

•! Examples

May 2008. Senior Indian government officials in New Delhi were said to have

confirmed that Chinese hackers targeted the Ministry of External Affairs and

the National Informatics Centre, which provides the network backbone for central and state government, as well as other administrative bodies in India.

The unnamed officials were quoted as saying that this was China’s way of

gaining “an asymmetrical advantage” over a potential adversary.

September 2008. Seoul accused its adversaries in North Korea of stealing

documents from military officers through the use of spyware and a female agent.

The spyware attack took the form of a malicious email attachment designed

to steal documents from infected computers.

Page 35: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Arrests and the LAW

•! Behind Bars January 2008. Three men who constructed an elaborate email scam pleaded guilty in a New York court to stealing more than $1.2 million. The men sent emails that claimed to come from a victim of terminal throat cancer who wanted to distribute $55 million to charity.

One of the gang, Nnamdi Chizuba Ainsiobi, is then said to have telephoned recipients, disguising his voice to pretend he was that suffering from the disease.

February 2008. An American teenager pleaded guilty to seizing control of hundreds of thousands of zombie computers and using them to display cash-generating adverts. Some of the compromised computers were based at the

Weapons Division of the US Naval Air Warfare Center and the US Department of Defense.

Page 36: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

The Future

Page 37: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

The Future

•! Growth in attack vectors

•! Growth in complexity of attacks

•! Increase of state-sponsored cybrecrimes

•! Increase in arrests

•! Increase in InfoSec budgets

•! Increase in InfoSec education

•! Increase in IT Security personnel

Page 38: Emerging Threats in Cyberspace - ISACA South Floridaisacasfl.org/.../Ralph-Echemendia-Emerging-Threats-in-Cyberspace.pdfEmerging Threats in Cyberspace . Ralph Echemendia Secure Virtualization,

Thank You

All of you