41
E-banking security Iman Rahmanian Noore Touba University – Iran Advisor: Dr Sekhavati Dec 2010

E banking security

Embed Size (px)

DESCRIPTION

this slide describe security issues in ebanking..

Citation preview

Page 1: E banking security

E-banking security

Iman RahmanianNoore Touba University – IranAdvisor: Dr SekhavatiDec 2010

Page 2: E banking security

eBanking Security – Quo Vadis?

Is eBanking still safe? What are the security trends in

eBanking? What can we learn from eBanking

trends for other online applications?

Page 3: E banking security

agenda

eBanking Attacks Security Measures Secure Communication Implementations Outlook / Thesis

Page 4: E banking security

eBanking Attacks

Page 5: E banking security

Target of Attacks

Phishing Attacks Trojan Attacks

PharmingDNS SpoofingNetwork Interception

Web Application AttacksAttacking Server

Page 6: E banking security

Client Attacks

Most promising attack on the client: Phishing

• Motivate user to enter confidential information on fake web site

Simple Trojans• Limited to a handful of eBanking applications• Steal username, password and one time password• Steals session information and URL and sends it to attacker• Attacker imports information into his browser to access the same

account

Generic Trojans• In the wild since 2007, but still in development• Can attack any eBanking (and any web application)• New configuration is downloaded continously

Page 7: E banking security

Generic Trojans

Infection of client with user interaction Email attachments (ZIP, Exe, etc.) Email with link to malicious web site Links in social networks Integrated in popular software (downloads) File transfer of instant messaging/VoIP/file sharing CD-ROM/USB Stick

Infection of client without user interaction Malicious web sites (drive by) Infection of trusted, popular web sites (IFRAME …) Misusing software update functionality (like Bundestrojaner) Attacks on vulnerable, exposed computer (network/wireless)

Note: About 1% of Google search query results point to a web site that can lead to a drive by attack.

Page 8: E banking security

Generic Trojans

Features of Generic Trojans Hide from security tools

(anti-virus/personal firewall) Inject code in running processes /

drivers / operating system Capture/Redirect/Send data Download new configuration /

functionality Remote control browser instance

Page 9: E banking security

Generic Trojans(cont)

Features useful for eBanking attacks Send web pages of unknown eBanking to attacker Download new patterns of eBanking transaction

forms Modify transaction in the background (on the fly) Collect financial information

Page 10: E banking security

Generic Trojans(cont)

Tips and Tricks Every Trojan binary is unique (packed differently)

Not detectable by Anti Virus Patterns Trojan code is injected into other files or other

processes Personal Firewall can not block communication

Installs in Kernel Full privileges on system Invisible

Bot Networks

Page 11: E banking security

Traded Goods

Symantec Internet Security Threat Report July-December 2007http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_exec_summary_internet_security_threat_report_xiii_04-2008.en-us.pdf

Page 12: E banking security

Security Measures

Page 13: E banking security

Security Measures

Attack Detection Second Channel / Secured Channel Secure Client

Secure Client Second ChannelSecured Channel

Attack Detection

Page 14: E banking security

Attack Detection

Detect session hijacking attacks Monitor and compare request

parameters Identify SSL Session and IP address

changes Transaction verification / user

profiling Statistic about normal user behaviour Compare transaction with normal user

behaviour White list target accounts Limits on transaction amount

Page 15: E banking security

Security Measures(cont)

Second Channel Send verification using another channel Another application on the client

computer Another medium like mobile phones

(SMS) Secured Channel

Enter data on an external device External device can not be controlled by

Trojan Externel device contains a secret key

Page 16: E banking security

Security Measures

Secure Platform A computer that is only used for eBanking Bootable CD-ROM, Bootable USB Stick Virtual Machine eBanking Laptop

Secure Environment Start an application (eg Browser) that protects

itself from Trojans Downstripped Browser Proprietary Application (fat client) Verify environment before login is possible

Page 17: E banking security

Security Trends

Current client security approaches: A) Secured Application/Virtualization

Hardened Browser on USB stick Application to secure the client Virtual operating system on host system Bootable CD-ROM/USB stick

B) Transaction Signing Transaction details and unlock code on mobile

(SMS) External device with SmartCard Read information from screen and decrypt on

external device

Page 18: E banking security

A) Secured Application/Virtualization

Solutions (some examples): Portable Apps, Thinstall CLX Stick, Kobil mIdentity Browser Appliance (eg VMWare, VirtualPC, etc.)

Page 19: E banking security

B) Transaction Signing

Devices (some examples): Mobile phones IBM ZTIC, EVM CAP, Axsionics Tricipher

Page 20: E banking security

Security Trends

Page 21: E banking security

Secure CommunicationMost Internet shopping sites use usernames and passwords to authenticate its users, so called 'password authentication'. They are typically more concerned with the validity of the credit card than the identity of the user. This will be our starting point.

Page 22: E banking security

Password authentication

In our fictious example we have a user Alice who wishes to login to her bank. We also have a vicious attacker Eve who is trying to steal Alice's hard-earned money. The bank is using a username and password to protect

Alice's account but no encryption. This scheme is obviously vulnerable to a snooping attack as illustrated in below Figure. One way to improve security is by employing One-time Passwords.

Page 23: E banking security

One-time Passwords

One-time passwords (OTPs) are, like the name suggests, passwords that are used only once.

A code scratch card with OTPs

Page 24: E banking security

OTP implementation

The OTPs can be implemented using a hash-chain.

Page 25: E banking security

SSL

SSL is an abbreviation of Secure Socket Layer and is a protocol designed to provide security and data integrity.

SSL supports a wide range of algorithms, some very strong and some weak. For example Handelsbanken, a Swedish bank, uses SHA-1 for signing and RSA for encryption.

Page 26: E banking security

Security Tokens

we saw how OTPs are constructed and used.

We can further enhance the security by a PIN-code.

This two-factor authentication makes it more dificult to gain access to an account.

Page 27: E banking security

Security Tokens(cont)

Page 28: E banking security

Security Tokens(cont)

SSL connection setup RSA security tokens

Page 29: E banking security

Implementations

Page 30: E banking security

Chip Authentication Program (CAP)

CAP is a relatively new protocol based on the older EMV standard.

It was developed by MasterCard and is based on digitally signing transactions.

CAP can operate in three modes: identify, respond and sign.

Page 31: E banking security

RSA SecurID

This scheme basically works very similar to the identify-mode of CAP.

The 6 to 8-digit response of the SecurID tokens is computed over the PIN,the present time and a 128 bit key, which is unique to every token, using a variant of the AES algorithm.

Page 32: E banking security

Open Authentication (OATH)

The open authentication initiative is an attempt at developing an open standard for 2-factor authentication which should provide means for federated authentication systems like OpenID.

The core of OATH is the HOTP-algorithm, which provides the OTP component.

Page 33: E banking security

Response-mode of the CAP-protocol

Page 34: E banking security

Outlook / Thesis

Page 35: E banking security

Personal Risk Management! How do we manage our personal financial risk?

Only as much money we need at home or in the wallet Different bank accounts for different purposes Limits on bank accounts or ATM cards Insurances for damages we can not afford

Applied to eBanking Only required amount of money accessible by

eBanking Move savings to other accounts / banks Set limit in payment height per month Insurance for eBanking losses?

Page 36: E banking security

We need different solutions for different clients!

Big/medium companies Separate computer only for eBanking

and finance work No connections to Internet except for

eBanking Small companies / Private people

Secure Applications/Virtualization Transaction Signing

Page 37: E banking security

Other Ideas!

Computer only for eBanking Cheap laptops ($100) only for eBanking Boot from USB Stick or CD-ROM

Pool for eBanking claims Take the model of the credit card

industry Cover claims with insurance

Page 38: E banking security

What‘s going on in the future

More Trojans will be installed on client computers The banks will deliver secure devices / secured applications The criminals will focus on weaker eBankings in the

beginning They will eventually attack the eBankings with secure

devices / secure applications. Especially the social engineering attacks will

be improved Attacking other applications may become more interesting.

Like in reality:where the money is, there are the thiefs.

Page 39: E banking security

Is eBanking still safe?

Alternatives: Retrieve your money at the bank and pay at

the post office Fill out a payment order and send it to your

bank by snail mail Send your bank a fax/letter with a payment

order eBanking is safer as old style payment

methods! User‘s have to learn the threats and

precautions with the new technology!

Page 40: E banking security

reference

Page 41: E banking security

references

http://en.wikipedia.org/wiki/Online banking http://www.rsa.com/node.aspx?id=1158 APACS: Online banking usage amongst over 55s

up fourfold in five years http://www.apacs.org.uk/media centre/press/08

24 07.html APACS: APACS announces latest fraud figures http://

www.apacs.org.uk/APACSannounceslatestfraudfigures.htm

Symantec SilentBanker Trojaner description http://www.symantec.com/security_response/writeup.jsp?docid=2007-121718-1009-99&tabid=2