34
1 / 34 Evolution of the Attack Surface R. R. Brooks – [email protected] Clemson University, Electrical and Computer Engineering July, 2019

Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

1 / 34

Evolution of the Attack Surface

R. R. Brooks – [email protected] University, Electrical and Computer Engineering

July, 2019

Page 2: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Traditional Security

Larger Battlefield

⊲TraditionalSecurity

Attack Surface

Larger Battlefield

Attack Surface isFictionAttack Surface isFictionAttack Surface isFictionAttack Surface isFictionAttack Surface isFiction

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

2 / 34

Page 3: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Attack Surface

Larger Battlefield

Traditional Security

⊲ Attack Surface

Larger Battlefield

Attack Surface isFictionAttack Surface isFictionAttack Surface isFictionAttack Surface isFictionAttack Surface isFiction

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

3 / 34

� Network firewalls block questionable access.� Communications pass through manageable gateways.� Outward facing interfaces are limited.� Incoming connections/interfaces are armored.� Meant to limit attacker access to the system.� Ports of entry will be fortified.

Page 4: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Larger Battlefield

Larger Battlefield

Traditional Security

Attack Surface

⊲ Larger Battlefield

Attack Surface isFictionAttack Surface isFictionAttack Surface isFictionAttack Surface isFictionAttack Surface isFiction

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

4 / 34

Page 5: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Attack Surface is Fiction

Larger Battlefield

Traditional Security

Attack Surface

Larger Battlefield

⊲Attack Surface isFiction

Attack Surface isFictionAttack Surface isFictionAttack Surface isFictionAttack Surface isFiction

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

5 / 34

� Why?

Page 6: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Attack Surface is Fiction

Larger Battlefield

Traditional Security

Attack Surface

Larger Battlefield

Attack Surface isFiction

⊲Attack Surface isFiction

Attack Surface isFictionAttack Surface isFictionAttack Surface isFiction

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

6 / 34

� Why?� Because you do not control which machines

connect to your network.

Page 7: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Attack Surface is Fiction

Larger Battlefield

Traditional Security

Attack Surface

Larger Battlefield

Attack Surface isFictionAttack Surface isFiction

⊲Attack Surface isFiction

Attack Surface isFictionAttack Surface isFiction

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

7 / 34

� Why?� Because you do not control which machines

connect to your network.� Because your hardware vendors do not control

what is in their products.

Page 8: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Attack Surface is Fiction

Larger Battlefield

Traditional Security

Attack Surface

Larger Battlefield

Attack Surface isFictionAttack Surface isFictionAttack Surface isFiction

⊲Attack Surface isFiction

Attack Surface isFiction

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

8 / 34

� Why?� Because you do not control which machines

connect to your network.� Because your hardware vendors do not control

what is in their products.� Because your software vendors do not control

what is in their products.

Page 9: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Attack Surface is Fiction

Larger Battlefield

Traditional Security

Attack Surface

Larger Battlefield

Attack Surface isFictionAttack Surface isFictionAttack Surface isFictionAttack Surface isFiction

⊲Attack Surface isFiction

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

9 / 34

� Why?� Because you do not control which machines

connect to your network.� Because your hardware vendors do not control

what is in their products.� Because your software vendors do not control

what is in their products.� Because no one controls Internet routing.

Page 10: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Supporting Infrastructure

Larger Battlefield

Who is on yourNetwork

⊲SupportingInfrastructure

Target Breach

Bring your owndevice – BYODWho is on yournetwork?

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

10 / 34

Page 11: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Target Breach

Larger Battlefield

Who is on yourNetworkSupportingInfrastructure

⊲ Target Breach

Bring your owndevice – BYODWho is on yournetwork?

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

11 / 34

� In Dec 2013, Target data breach exposed.� 40 million credit cards and PII of 70 million people.� Target settlement cost $18.5 million.� Malware stole credentials from HVAC vendor.� HVAC vendor interfaced with Target for electronic billing and

project management.� Once in network attackers maneuvered to POS devices.� Estimated >= 55,000 HVAC vendors have access to

companies for remote monitoring of energy, etc.� BACNet systems: elevators, security, smart grid, power

meters, etc.

Page 12: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Bring your own device – BYOD

Larger Battlefield

Who is on yourNetworkSupportingInfrastructure

Target Breach

⊲Bring your owndevice – BYOD

Who is on yournetwork?

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

12 / 34

� Employee devices behind firewall, on wireless, etc.� Companies enforced BYOD policies, but stopped.� Too many devices, operating systems, and apps.� Unsafe behavior of employees outside of work.� Too expensive and employees not cooperating.� Banning mobile devices results in geriatric work force.

Page 13: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Who is on your network?

Larger Battlefield

Who is on yourNetworkSupportingInfrastructure

Target Breach

Bring your owndevice – BYOD

⊲Who is on yournetwork?

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

13 / 34

� HVAC, power, security, elevator, all IoT.� Tried to buy a non-smart TV lately?� All employee devices.� Poorly secured consumer devices.� Device designs help vendors spy on customers.� IoT devices not designed for security.� Device security maintained by non-experts.� Not to mention cloud based out-sourcing.� You lost control years ago.

Page 14: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Hardware Implant

Larger Battlefield

Who is on yourNetwork

Hardware

⊲ Hardware Implant

Can you see it?

Hardware implant 1

Hardware implant 2

Hard Disk Malware

TritonHardwareconclusions

Software supplychain

Network routing

Solutions

Conclusions

Questions

14 / 34

Page 15: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Can you see it?

Larger Battlefield

Who is on yourNetwork

Hardware

Hardware Implant

⊲ Can you see it?

Hardware implant 1

Hardware implant 2

Hard Disk Malware

TritonHardwareconclusions

Software supplychain

Network routing

Solutions

Conclusions

Questions

15 / 34

Page 16: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Hardware implant 1

Larger Battlefield

Who is on yourNetwork

Hardware

Hardware Implant

Can you see it?

⊲Hardware implant1

Hardware implant 2

Hard Disk Malware

TritonHardwareconclusions

Software supplychain

Network routing

Solutions

Conclusions

Questions

16 / 34

� Bloomberg reports hardware implants in AWS servers.� Claims implants Chinese backdoors to servers.� Bloomberg story controversial.� Amazon denies. US Intel sources confirm.� No one claims impossible or unlikely.� Hardware supply chains pass through multiple

companies/countries.� Implants hard to detect with quality control.

Page 17: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Hardware implant 2

Larger Battlefield

Who is on yourNetwork

Hardware

Hardware Implant

Can you see it?

Hardware implant 1

⊲Hardware implant2

Hard Disk Malware

TritonHardwareconclusions

Software supplychain

Network routing

Solutions

Conclusions

Questions

17 / 34

� Snowden – NSA implants inserted during shipment.� Suspected hardware kill switch stopped Syrian radar when

Israel attacked Dayr al-Zawr facility.� Suspected French remote ability to stop advanced

capabilities in military hardware.� Detection of hardware Trojans unsolved research problem.� Made worse by outsourcing of production.� Nano-scale Trojans possible.� Nano-Trojan detection would require electron microscope.

01_May_2008_The_Hunt_for_the_Kill_Switch_IEEE_Spectrum

Page 18: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Hard Disk Malware

Larger Battlefield

Who is on yourNetwork

Hardware

Hardware Implant

Can you see it?

Hardware implant 1

Hardware implant 2

⊲Hard DiskMalware

TritonHardwareconclusions

Software supplychain

Network routing

Solutions

Conclusions

Questions

18 / 34

� Hard disk drive (HDD) firmware malware.� Invisible and almost indestructible.� Equation cyber-espionage group.� “Rare as pandas walking across the street”

www.kaspersky.com/blog/equation-hdd-malware/7623/

Page 19: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Triton

Larger Battlefield

Who is on yourNetwork

Hardware

Hardware Implant

Can you see it?

Hardware implant 1

Hardware implant 2

Hard Disk Malware

⊲ TritonHardwareconclusions

Software supplychain

Network routing

Solutions

Conclusions

Questions

19 / 34

� Triton industrial control system malware.� Inserts malware into safety control system logic.� Meant for high impact damage to industrial control.

www.antiy.net/p/antiy-released-technical-analysis-of-industrial-control-malware-trisis

Page 20: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Hardware conclusions

Larger Battlefield

Who is on yourNetwork

Hardware

Hardware Implant

Can you see it?

Hardware implant 1

Hardware implant 2

Hard Disk Malware

Triton

⊲Hardwareconclusions

Software supplychain

Network routing

Solutions

Conclusions

Questions

20 / 34

� Hardware attacks rare for now.� Known attacks mainly by nation states.� Industry vulnerable as critical infrastructure.� Nation state attacks leak the technology to less

sophisticated attackers.� Lower level attackers re-use the technology.� Kaspersky sells UEFI (hardware root of trust) anti-virus.� Existence of hardware root of trust anti-virus market is

worrisome.� Hardware is mainly firmware (software).� Hardware is not inherently more secure.� Replacing hardware costs money, so hardware vendors

test.

Page 21: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

On Trusting Trust

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

⊲On TrustingTrust

CCleaner and ASUS

Supply Chain

DynamicLibraries/SharedObjects

Network routing

Solutions

Conclusions

Questions

21 / 34

� Nice to be able to fix Unix systems.� Insert backdoor into login.� Remove login backdoor insert into C compiler.� Compiler inserts login backdoor.� Use compiler to compile C compiler with clean source.� Able to insert malware with nothing bad in source code.

Page 22: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

CCleaner and ASUS

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

On Trusting Trust

⊲CCleaner andASUS

Supply Chain

DynamicLibraries/SharedObjects

Network routing

Solutions

Conclusions

Questions

22 / 34

� Stolen TeamViewer credentials used to infect Crap Cleaner,which was used to infect 40 companies with ShadowPad.

� ASUS ShadowHammer update pushed signed infectedupdates to BIOS and UEFI.

� Up to 1,000,000 ASUS machines infected, concentrated on600 specific machines identified by MAC address.

� ShadowHammer linked to ShadowPad.

Page 23: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Supply Chain

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

On Trusting Trust

CCleaner and ASUS

⊲ Supply Chain

DynamicLibraries/SharedObjects

Network routing

Solutions

Conclusions

Questions

23 / 34

� Security orthodoxy: Keep patches up to date!� Really? Similar attacks:

– NotPetya,– Havex(Industrial Control systems),– Juniper networks source code,– iOS fake developer tool,– Android,– Python,– Javascript.

� According to NIST: Supply chain attacks the New Normal.

Page 24: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Dynamic Libraries/Shared Objects

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

On Trusting Trust

CCleaner and ASUS

Supply Chain

DynamicLibraries/SharedObjects

Network routing

Solutions

Conclusions

Questions

24 / 34

� Standard malware reversing text 2 DLL chapters.� Chapter 11 – Malware behavior, DLL Hijacking.� Chapter 12 – Covert malware launching, DLL injection.� Standard way to insert malware into processes.

Practical_Malware_Analysis_Sikorski_and_Honig

Page 25: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Network Routes Insecure

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

Network routing

⊲Network RoutesInsecure

Network RoutesInsecure-RussiaNetwork RoutesInsecure-Hong Kong

Solutions

Conclusions

Questions

25 / 34

BGPStream.com

Page 26: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Network Routes Insecure-Russia

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Network RoutesInsecure

⊲Network RoutesInsecure-Russia

Network RoutesInsecure-Hong Kong

Solutions

Conclusions

Questions

26 / 34

� Interdomain routing not secured.� Denial of Service is trivial.� Routing of traffic for surveillance is trivial.

Page 27: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Network Routes Insecure-Hong Kong

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Network RoutesInsecureNetwork RoutesInsecure-Russia

Network RoutesInsecure-HongKong

Solutions

Conclusions

Questions

27 / 34

� China points of presence can hijack US traffic at will.� Nigerian Google Traffic routed through China and Russia.� Taiwan DNS traffic routed through Brazil.

Page 28: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Deterministic builds

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

⊲Deterministicbuilds

Combinatorial GameTheory

Traffic AnalysisResistant Network(TARN)

Block chain

Smart contracts

Conclusions

Questions

28 / 34

� Tor software produces identical (linux) binary builds on anysystem.

� Allows local build from source, comparison to downloads.� Resistance to supply chain attacks.� Odd that we have to rely on crypto-anarchists for this.

Page 29: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Combinatorial Game Theory

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Deterministic builds

⊲CombinatorialGame Theory

Traffic AnalysisResistant Network(TARN)

Block chain

Smart contracts

Conclusions

Questions

29 / 34

� Pardon my math.� Game shown == {970|880||{610| − 105|| − 280| − 840}, {280| − 840}}� We are now competing at many levels on many machines.� Math to find best answer PSPACE complete, much worse than NP

Complete.� Finding answer within known constant offset of optimal is O(N).� We can use math to prioritize responses.

Page 30: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Traffic Analysis Resistant Network (TARN)

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Deterministic buildsCombinatorial GameTheory

Traffic AnalysisResistantNetwork (TARN)

Block chain

Smart contracts

Conclusions

Questions

30 / 34

� Alternative network architecture removes vulnerabilities exploited by a varietyof attacks (DNS/IP filtering, DDoS attacks, MITM attacks, etc.) bydisassociating the relationship between IP prefixes and destination.

� End-to-end communication sessions have dynamic, short-lived, pseudo-randomIPv6 addresses drawn from a range of IP prefixes rather than one.

� BGP injection and cyber-squatting integrated into software-defined Internetexchange points (SDX).

Page 31: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Blockchain

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Deterministic buildsCombinatorial GameTheory

Traffic AnalysisResistant Network(TARN)

⊲ Block chain

Smart contracts

Conclusions

Questions

31 / 34

� Cryptocurrency is ’Honestly Useless’: Harvard Cryptographer– Bruce Schneier

� Economist Nouriel Roubini Says ’Blockchain Is Useless, AllICOs Are Scams’

� “Blockchain is not only crappy technology but a bad visionfor the future” –Kai Stinchcombe

� “Bitcoin Is Ridiculous. Blockchain Is Dangerous” – PaulFord

� “Blockchain is a useless technology” – Glenn Chan

Page 32: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Smart contracts

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Deterministic buildsCombinatorial GameTheory

Traffic AnalysisResistant Network(TARN)

Block chain

⊲ Smart contracts

Conclusions

Questions

32 / 34

� Secure distributed computation.� Computation correctness guaranteed by parallel execution and BGP.� Challenges:

– Currently run in parallel on all nodes.– Currently dialect of javascript :(– Inputs restricted.

Page 33: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Summary

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Conclusions

⊲ Summary

Questions

33 / 34

� Attack surface can no longer be limited:

– Current electronics allow network access everywhere.– Hardware from vendors no longer secure.– Supply chain attacks make all software vulnerable.– Network paths can go anywhere.

� Possible solutions:

– Deterministic builds against software supply chain.– Network traffic obfuscation.– Build strategic thinking into security tools.– Blockchain and smart contracts create security from

distributed computers.

Page 34: Evolution of the Attack Surface · Tried to buy a non-smart TV lately? All employee devices. Poorly secured consumer devices. Device designs help vendors spy on customers. IoT devices

Questions?

Larger Battlefield

Who is on yourNetwork

Hardware

Software supplychain

Network routing

Solutions

Conclusions

Questions

⊲ Questions?

34 / 34

ohttps://www.jstor.org/stable/j.ctt1dwst10