22
Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting http://www.lucent.com/security Lucent Worldwide Services Security Practices

Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting Lucent Worldwide

Embed Size (px)

Citation preview

Page 1: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Emerging Threats:What’s next?

George G. McBrideManaging PrincipalLucent Technologies Professional Consultinghttp://www.lucent.com/security

Lucent Worldwide ServicesSecurity Practices

Page 2: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 2

Agenda Introduction

– What are we going to talk about today?

Past performance is not necessarily indicative of future performance

– What we used to see

Emerging Threats

– What will we be seeing

Countermeasures

Wrap-Up

Audience Thoughts

Page 3: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 3

Phishing

Mass e-mails sent to millions of users– Can be targeted, usually not

Directs users to a malicious “cloned” site– Sign up for a new service

– Account updates

– Potential fraud

Quantity Sent: Up Effectiveness: Down Countermeasures:

– Awareness

– ISP Blocking

– Quick take-down of phishing sites

Page 4: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 4

Pharming

User’s don’t have to “click” on a e-mailed link

Browser independent

DNS or host file poisoning

How do you detect?

Effective countermeasures

– Anti-Virus/Malware software

– Checking site server certificates

Page 5: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 5

Script-Kiddies are growing upThere are plenty of sites available to educate the “script-kiddie”. Have they grown up yet?

What’s out there?– 0-Day Exploits

– Worms

– Trojans

– Viruses

– Unauthorized users

– Unauthorized systems

– Remote control applications

– Keystroke loggers

– And a lot more….

Page 6: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 6

The “Graduating Class”

Have you looked at your Firewall logs lately?

What is your SOC seeing?

Slow, persistent, targeted scans?

No longer looking for fame and notoriety

Effective countermeasures:– Event correlation

– Log retention

– Well trained SOC staff

Page 7: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 7

Business Continuity and Disaster Recovery

We’re seeing more catastrophic and severe weather patterns, terrorism, and “acts of god” such as typhoons, floods, and earthquakes.

What used to be “too rare to plan for”, now must be!

Plans are not “actionable” – they have not been tested and verified

Countermeasures:

– Designate BC/DR accountability and ownership

– Test plan regularly and update plan as factors change

Page 8: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 8

Complex networks

Trying to find the risks and vulnerabilities is a challenge (but not impossible)

Service providers have hundreds of firewalls, VPN points, web portals, FTP sites, SSH inbound

Often have unknown ingress points, business partner connections, long forgotten dial-up access

Countermeasures:

– ITU X.805 assessment

– Regular assessments

Page 9: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 9

Obscure applications and operating systems move to the “Mainstream”

Mac OSX, Linux, Firefox, and others used to enjoy relative solitude based on their minority stakes

As application and OS acceptance increases, so does the “return on investment” for the malicious individual

Security solutions selections may be limited compared to the “very mainstream” Microsoft Windows

Countermeasures:

– Apply Security just like the Windows users!

• Firewalls, Anti-virus and anti-spyware tools

Page 10: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 10

Voice Over IP: VoIP

Spam over VoIP aka SPIT

– Like spam, but generally costs you money!

– Will evolve to include offensive materials

VoIP vulnerabilities

– Consumer services (CLID Spoofing)

• What’s reviewable

– Enterprise solutions (Hack the PSTN Interface!)

Countermeasures

– Assessments to identify the risk and then developing and following a remediation plan

– Awareness and security by default!

– Open standards

– Understand the technology and utilize the security features

Page 11: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 11

Governance and Regulatory Compliance Gramm-Leach-Bliley Act (GLBA), Sarbanes-Oxley Act, SAS-

70 Audits or CICA 5900 Audits, Health Insurance Portability and Accountability Act, etc, etc, etc.

The risk here is non-compliance:

– Not aware of compliance requirements

– Customer demands

– Audit findings are a surprise

Countermeasures:

– Pre-assessments

– Compliance officers

– Governance boards

Page 12: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 12

Mobile Security and data loss

Research firms continue to predict increases in mobile devices (iPAQs, Palm Pilots, Blackberry devices, etc) and laptops as prices drop and functionality increases

Data is unencrypted. Devices lack authentication.

Devices have databases, contacts, e-mail, notes, intellectual property and more

Countermeasures

– Utilize available security products and add-ons

– Enable built-in security or acquire it!

– Awareness

Page 13: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 13

Mal-Ware

How about a Worm, Trojan, or Virus that does that has some of the following characteristics:

– Multi-Exploit

– Multi-Platform

– Zero-Day

– Fast Spreading

– Polymorphic

– Metamorphic

– Destructive Payload

What if it has all of them?

What about custom mal-ware?

Page 14: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 14

Bridging The Firewall

Remember that we used to give guidance “Don’t dial-out while connected to the corporate network?”

– That’s when analog lines were somewhat hard to find and dial-up time was measured in minutes

Now we’ve got eVDO, 3G, and GPRS interface cards that are no longer metered

– Employees on the network and maintaining a network connection

New laptops have built-in and often enabled Wi-Fi in ad-hoc mode ready to be connected to

Countermeasures:

– Technology based controls are quite inefficient (carrier and hardware independent)

– Awareness

– Purchasing and procurement policies, controls, and awareness

Page 15: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 15

Wi-Fi Security Risks

Rogue Access Points:

– Users bringing in their personally or Business Unit purchased access point (AP) into the office and plugging it in

Wi-Fi Fishing or the “evil-twin”:

– A malicious individual somehow disables a legitimate AP and then impersonates the AP to capture credentials

Countermeasures:

– Rogue AP detection at the WLAN or LAN level

– Policy and Awareness

– Train users to look for and recognize certificates of the HotSpot

– Use a VPN to encrypt data (Google!)

Page 16: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 16

Cyber-Espionage, Stalking, and Extortion As more data is stored, more transactions occur, and more

people rely on computer systems:

– Cyber espionage: obtaining information not intended for public consumption

– Cyber stalking: using schedules, school rosters, and personal web-sites to assist in physical or logical stalking

– Cyber extortion: pay $$$ or your site will be hit with a massive DDOS attack, information will be released to the public, etc

Countermeasures:

– Threat and Risk assessments

– Proper authentication, access controls, and encryption

– Minimization of publicly released information. Privacy Policies.

– Opt-Out options. Bogus information submissions

– Does paying help?

Page 17: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 17

Methamphetamine Addicts!

USA Today (9/30/05) Reports that the Methamphetamine problems are growing “in complexity and size”

– Identity Theft

– Phishing e-mail scams

– Selling stolen goods at auction sites

Can stay up for several days performing tasks such as checking credit cards for validity

Countermeasures: ?

Page 18: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 18

RFID Security Issues

Modification of data stored on chip

Interception of data possible at ranges longer than anticipated through stronger transmitters and receivers

RFID Uses: Supply Chain Logistics (asset location tracking), passports, location of students, senior citizens, and more.

Countermeasures:

– Opt-In clauses

– Physical protection of chip

– Effective privacy and usage policies

– Disposal of data when no longer needed

Page 19: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 19

Other Topics

Bluetooth?

– Cars? Mobiles? Other devices? BlueSnarfing?

BGP Risks

– Session Hijacking

– Traffic Injection

DNS Risks

– We’ve talked about “pharming”, but what else?

Unmeasured security at Offshore Development Centers (ODC)s, outsourcers, business partners

Huge databases at data aggregators, clearinghouses, and service providers

Household IP infrastructure attacks: Zigbee DOS!

Page 20: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 20

Anything Else?

Lucent TechnologiesBell Labs Innovations

Lucent Technologies Inc.Room 1B-237A101 Crawfords Corner RoadHolmdel, NJ 07733Phone: +1.732.949.3408E-mail: [email protected]

George G. McBrideManaging Principle

Lucent Worldwide Services

What do you see as emerging risks?

Please contact me with any questions, comments, complaints, or your own “emerging threats”.

Page 21: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 21

Supporting Slides

Page 22: Emerging Threats: What’s next? George G. McBride Managing Principal Lucent Technologies Professional Consulting  Lucent Worldwide

Lucent Technologies – ©2005 22

Sources of risks:

Criminal Groups

Terrorists

Foreign Intelligence Agencies

Hackers

Spyware/Mal-Ware Authors

Spammers

Phishers/Pharmers

Insider Threat

Botnet Operators