• No results found

APT Advanced Persistent Threat Time to rethink?

N/A
N/A
Protected

Academic year: 2021

Share "APT Advanced Persistent Threat Time to rethink?"

Copied!
36
0
0

Loading.... (view fulltext now)

Full text

(1)

© 2012 Deloitte Hungary

23 November 2012

Gergely Tóth | Senior Manager, Security & Privacy

APT – Advanced Persistent Threat Time to rethink?

(2)

© 2012 Deloitte Hungary 2 APT – Advanced Persistent Threat – Time to rethink?

Agenda

APT examples

How to get inside?

Remote control

Once we are inside Conclusion

(3)

© 2012 Deloitte Hungary 3 APT – Advanced Persistent Threat – Time to rethink?

APT – Advanced Persistent Threat

Definition

“The term is commonly used to refer to cyber threats, in particular that of Internet- enabled espionage using a variety of intelligence gathering techniques to access sensitive information...” -- Wikipedia

• Advanced

‒ Sophisticated attack potentially

• combining several types of techniques

• including zero-day exploits and social engineering

• Persistent

‒ Targeted instead of being opportunistic: i.e. attack is tailored to the organization at hand

• Threat

(4)

© 2012 Deloitte Hungary

APT example

Spear phishing attack

4 APT – Advanced Persistent Threat – Time to rethink?

(5)

© 2012 Deloitte Hungary 5 APT – Advanced Persistent Threat – Time to rethink?

Spear Phishing

Example #1

(6)

© 2012 Deloitte Hungary 6 APT – Advanced Persistent Threat – Time to rethink?

Spear Phishing

Example #1, cont’d

(7)

© 2012 Deloitte Hungary 7 APT – Advanced Persistent Threat – Time to rethink?

Spear Phishing

Details of the attack

• Attack lasted two days

• Two user groups received “spear phishing” e-mails

‒ They were not privileged users

• Interesting e-mails

‒ “2011 Recruitment Plan”

• At least one user

‒ Retrieved the e-mail from the “Junk e-mails” folder

‒ Opened the attachment

Source: http://blogs.rsa.com/rivner/anatomy-of-an-attack/

(8)

© 2012 Deloitte Hungary 8 APT – Advanced Persistent Threat – Time to rethink?

Spear Phishing

Details of the attack, cont’d

• The payload

‒ Excel document with embedded Flash object

‒ “Zero-day” (CVE-2011-0609) Flash exploit

• Modified Poison Ivy installed by the payload

‒ Well-known remote management software

‒ “Reverse connect” mode  workstation connects to attacker’s server

• Privilege escalation

‒ Domain users

‒ Service users

‒ Domain admins

• Internal attacks

‒ Internal servers

‒ “Staging” server  storage, compression, encryption

• FTP out collected data to a cracked server

• Clean-up after the attack: wipe traces

Source: http://blogs.rsa.com/rivner/anatomy-of-an-attack/

(9)

© 2012 Deloitte Hungary

APT example

“Traditional” systems compromise

9 APT – Advanced Persistent Threat – Time to rethink?

(10)

© 2012 Deloitte Hungary 10 APT – Advanced Persistent Threat – Time to rethink?

“Traditional” systems compromise

Example #2

DMZ Office LAN Secure

LAN

(11)

© 2012 Deloitte Hungary 11 APT – Advanced Persistent Threat – Time to rethink?

“Traditional” systems compromise

Details of the attack

• Attack lasted one month

• Systems compromise route

‒ Web server in the DMZ  used as file manager and “proxy”

‒ Office LAN systems

‒ Secure LAN

• Scale of the attack

‒ All CA servers compromised

‒ Certificates issued using the HSM module  used later in a large-scale attack (300k+ victims potentially)

‒ Log files tampered with to hide traces of activity

Source: http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/rapporten/2012/08/13/black-tulip- update/black-tulip-update.pdf

(12)

© 2012 Deloitte Hungary

HSM

Myths and reality

• We use HSM (Hardware Security Module) in business critical systems for sensitive transactions

12 APT – Advanced Persistent Threat – Time to rethink?

HSM used in batch processes or automatically

Compromised systems will to use the HSM just

as easily

(13)

© 2012 Deloitte Hungary

How to get inside?

The “Spear”

13 APT – Advanced Persistent Threat – Time to rethink?

(14)

© 2012 Deloitte Hungary

The “Spear”

Example #3

14 APT – Advanced Persistent Threat – Time to rethink?

Source: http://www.securitynewsdaily.com/-cyberattack-hits-oak-ridge-national-laboratory-0709/

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::

::::::::::::::::::::::::::::::::::::::::::::::::

::::::::::::::::::::::::::::::::::::::::::::::::

::::::::::::::::::::::::::::::::::::::::::::::::

::::::

::::::

::::::

::::::

::::::

::::::

::::::

:::::

:::::

:::::

Approx. 5000 users

Approx. 530 targets

57 clicks

::

2 successful exploits

(15)

© 2012 Deloitte Hungary

The “Spear”

The “Ignore the security warnings” training course

15 APT – Advanced Persistent Threat – Time to rethink?

(16)

© 2012 Deloitte Hungary

The “Spear”

Myths and reality

• Anti-virus and IDS/IPS stops such attacks

16 APT – Advanced Persistent Threat – Time to rethink?

Signature-based mechanisms are ineffective against unknown attack

types (e.g. “zero-day”

vulnerabilities, customized payloads)

(17)

© 2012 Deloitte Hungary

The “Spear”

Experiences (1)

17 APT – Advanced Persistent Threat – Time to rethink?

‒ Targeted users

(18)

© 2012 Deloitte Hungary

The “Spear”

Experiences (2)

18 APT – Advanced Persistent Threat – Time to rethink?

‒ Fooled users

‒ Insider info (disgruntled employee)

‒ Stolen laptop

‒ Compromised e-mail account

‒ Corporate templates

‒ Culture/language habits

‒ Systems, typical e-mail

? Does it really matter?

‒ Autopilot

‒ The myth of templates

(19)

© 2012 Deloitte Hungary

The “Spear”

Experiences (3)

19 APT – Advanced Persistent Threat – Time to rethink?

‒ Successful exploits

‒ Insider info (disgruntled employee)

‒ Stolen laptop

‒ Zero-day exploit

‒ Custom payload

(20)

© 2012 Deloitte Hungary

What would be your conversion rate?

20 APT – Advanced Persistent Threat – Time to rethink?

Targeted users: 1 in 4

Fooled users: 1 in 3

Successful exploits: 1 in 2

(21)

© 2012 Deloitte Hungary

Remote control

21 APT – Advanced Persistent Threat – Time to rethink?

(22)

© 2012 Deloitte Hungary

“Remote control”

Poison Ivy

22 APT – Advanced Persistent Threat – Time to rethink?

(23)

© 2012 Deloitte Hungary

“Remote control”

Metasploit - Meterpreter

23 APT – Advanced Persistent Threat – Time to rethink?

(24)

© 2012 Deloitte Hungary

“Remote control”

Metasploit - Meterpreter

24 APT – Advanced Persistent Threat – Time to rethink?

(25)

© 2012 Deloitte Hungary

Remote control Myths and reality

• We use proxies to access the Internet, which require username-password authentication

25 APT – Advanced Persistent Threat – Time to rethink?

The typical exploit injects the code responsible for

communication into Internet Explorer

IE authenticates

automatically at the proxy as the logged in

(attacked) user

(26)

© 2012 Deloitte Hungary

Once we are inside

26 APT – Advanced Persistent Threat – Time to rethink?

(27)

© 2012 Deloitte Hungary

Once we are inside

An attacker’s heaven

27 APT – Advanced Persistent Threat – Time to rethink?

• Normal ‘business’ user

‒ Application access

‒ E-mail access

‒ Network (share) access

‒ Helpdesk access

• Privilege escalation

‒ Two-tier applications  Direct database access

‒ Weak authentication schemes  Access with admin role

‒ Weak passwords  Unauthorized access

‒ Unpatched systems  Exploits

(28)

© 2012 Deloitte Hungary

Once we are inside

The reality

28 APT – Advanced Persistent Threat – Time to rethink?

Criticality of the system

Length of the patching cycle

Ratio of unpatched devices

(29)

© 2012 Deloitte Hungary

Once we are inside

Where is your data?

29 APT – Advanced Persistent Threat – Time to rethink?

Application Server User

File Server Application Server

Application Server User

User

Printer server

User Mail Server

User

User

Admin

(30)

© 2012 Deloitte Hungary 30 APT – Advanced Persistent Threat – Time to rethink?

Results of systems compromise

• Example #1

‒ Several major VLANs compromised

‒ Access to undisclosed internal sensitive information

• Example #2

‒ Several major VLANs compromised (DMZ, office, secure server)

‒ All critical systems compromised (all CAs and the HSM)

 Bankruptcy within 2 months of the attack

• Example #3

‒ Access to undisclosed internal sensitive information

• Commonalities

‒ Skilled and customized attacks

‒ Access to sensitive information

‒ Sophisticated attempts to hide traces

(31)

© 2012 Deloitte Hungary

Conclusion

31 APT – Advanced Persistent Threat – Time to rethink?

(32)

© 2012 Deloitte Hungary

APT – The schematics

Do they look similar?

32 APT – Advanced Persistent Threat – Time to rethink?

Example #1 – Spear phishing Example #3 – Traditional systems compromise

It’s not a coincidence...

(33)

© 2012 Deloitte Hungary

Defenses

33 APT – Advanced Persistent Threat – Time to rethink?

Prevent • Defense in depth – network zones

• Hardening on the external-facing and internal networks

Detect

• IDS, IPS, anti-virus

• Awareness

• Log analysis

Correct • Incident response

(34)

© 2012 Deloitte Hungary

Conclusion

34 APT – Advanced Persistent Threat – Time to rethink?

Targeted and sophisticated attacks  high probability to succeed

External attacker  internal attacker

Prevent / detect / correct  there is no silver bullet

(35)

© 2012 Deloitte Hungary

Contact

35 APT – Advanced Persistent Threat – Time to rethink?

Gergely Tóth

Senior Manager │ Security & Privacy Tel: + 36 (1) 428 6607

Email: getoth@deloittece.com

(36)

© 2012 Deloitte Hungary Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited

by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.hu/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms.

© 2012 Deloitte Hungary.

References

Related documents

This paper uses institutional theory and understandings of impression management to examine information overload in corporate social responsibility (CSR) disclosures in a sample

Recent research indicated that three factors possibly contribute to this problem, which affected the almost 2,000 English-learning students in the district’s high school

It provides support for the design of timber structures in Australia so that engineering students and practicing engineers have the skills to use structural

Code Private Utilities Site Remarks or Requirements Telephone, Cable, & Data. 8b.1 What is the telephone company which will be

Summarizing, several contributions were made possible by the additional ground truth for semantic labeling we built. We tested various state-of-the-art approaches for urban

Total shoot dry mass (DW), daily transpiration ratio (DTR), volumetric water content on the final day of treatment (h pwp ), volumetric water content at saturation (h fc ), and

Resin flooring will not be affected by most generally available special purpose cleaning materials, when these are used in accordance with the Chemical Cleaning

The research findings presented here show that in producing ideal Bangladeshi migrant construction workers for the Qatari labour market, brokers and other actors in the