Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates...

Preview:

Citation preview

SEC 203

Steve RileySr. Security StrategistMicrosoft Trustworthy Computing Group

steve.riley@microsoft.comhttp://blogs.technet.com/steriley

Making the Tradeoff:Be Secure or

Get Work Done

Old vs. new

Traditional approaches vs. contemporary attacksHow have bad-guy methods changed?What motivates them now?

What’s changing?

Largeglobalevents

Massiveworms

Makingheadlines

Identity theft,financial fraud

Spyware

Exploitenterprises

Makingmoney

Meta-trend

Identitytheft

SpammingPhishingExtortion

So what’s going on?

Increasingly sophisticated

Poly- and metamorphic

Evading anti-virus software

Act as vulnerability assessment tools

Use search engines for reconnaissance

Better targeting

Don’t advertise presence

Common to modify existing proven attack codeMore variants of successful wormsMight result in new and hidden entry points

Criminals hire attackersCriminals reuse their codeHuge market in unknown vulnerabilitiesCapitalizing on shrinking window of exposure

Malware becomesmore sophisticated

Attacks are usefulfor longer times

Vulnerabilitieshave street value

Direct losses

How bad is it?

$13,000

small company, modest infection

(FBI 2005 Computer Crime Survey)

$83,000(Counterpane Internet Security)

grows with frequency, extent, severity

$millions

Indirect losses

$? reputation, customer trust

Counterpane Internet Security and MessageLabs

Trojan attacksTop 5 by industry

0

5

10

15

20

25

30

35

40

Financial services,banking

Materials,manufacturing

Entertainment,media

Parmaceutical,healthcare

Travel,transportation

Counterpane Internet Security and MessageLabs

Probes and enumerationsTop 5 by industry

0

5

10

15

20

25

30

35

Financial services,banking

Pharmaceutical,healthcare

Insurance, realestate

Travel,transportation

Retail, wholesale

Counterpane Internet Security and MessageLabs

SpywareTop 5 by industry

0

10

20

30

40

50

60

Pharmaceuticals,healthcare

Insurance, realestate

Utilites, power,energy

Retail, wholesale Materials,maufacturing

Counterpane Internet Security and MessageLabs

Direct attacksTop 5 by industry

0

5

10

15

20

25

30

Insurance, realestate

Pharmaceuticals,healthcare

Materials,manufacturing

Retail, wholesale Government,education

Counterpane Internet Security and MessageLabs

Security's link to economics

An economic opportunity lurks inside every security problemLearn how to express security issues in economic termsLook for ways to shift the balance in your favor

Spyware is costing you big

$72,000 User annual salary

260 Working days per year

2 Time to fix (hours)

2 People involved (user, tech)

138$day per hours 8hours 2 people 2

days 260000,72$

1,000 Employees in organization

5% Infection rate, per month

800,82$138$12%)51000(

Network World Magazine

A law firm

$600 Hourly rate for a partner

260 Working days per year

2 Time to fix (hours)

1 Partner

1200$day per hours 8hours 2 partner 1

days 2602080 600$

1,000 Employees in organization

5% Infection rate, per month

000,720$1200$12%)51000(

Network World Magazine

Is email even useful anymore?

Postini

Is email even useful anymore?

Postini

Is email even useful anymore?

Postini

Is email even useful anymore?

Postini

An affiliates program

“Our first program pays you $0.50 for every validated free-trial registrant your website sends to [bleep]. Commissions are quick and easy because we pay you when people sign up for our three-day free-trial. Since [bleep] doesn't require a credit card number or outside verification service to use the free trial, generating revenue is a snap.

The second program we offer is our pay per sign-up plan. This program allows you to earn a percentage on every converted (paying) member who joins [bleep]. You could make up to 60% of each membership fee from people you direct to join the site.

Lastly, [bleep] offers a two tier program in addition to our other plans.  If you successfully refer another webmaster to our site and they open an affiliate account, you begin earning money from their traffic as well! The second tier pays$0.02 per free-trial registrant or up to 3% of their sign-ups.”

Let’s do the math

10% Read email and clicked link 10,000,000

SoBig spammed 100,000,000 mailboxes. What if…

1% Signed up for a three-day trial 100,000$0.50

$50,000

1% Enrolled for 1 year 1,000$144

$144,000

Would you do it???

Postmarks—change the economics

http://research.microsoft.com/research/sv/PennyBlack/

Spam and spyware lead to bots

Attack Requests/bot Botnet total Resource exhausted

Bandwidth flood (uplink)

186 kbps 1.86 Gbps T1, T3, OC-3, OC-12

Bandwidth flood (downlink)

450 kbps 4.5 Gbps T1, T3, OC-3, OC-12, OC-48 (2.488Gbps)50% of Taiwan/US backbone

SYN flood 450 SYNs/sec

4.5M SYNs/sec

4 dedicated Cisco Guard ($90k) or 20 tuned servers

Static http get (cached)

93/sec 929,000/sec 15 servers

Dynamichttp get

93/sec 929,000/sec 310 servers

SSL handshake 10/sec 100,000/sec 167 servers

Consider a 10,000-member botnet

How to become a bot

Low interest rates!

Gimme credit cards!

Extend your penis!

Get abetter job!

Cheap movie tickets!

Edwin Pena: pioneering VoIP attacks

Edwin’s stats

18 months Duration of scam

10,000,000 Minutes fraudulently sold

$20,000 Paid to buddy

15 VoIP providers attacked

$300,000 Interconnect charges providers had to pay

Lavishly How Edwin spent his takings, until…

Failed To meet bond conditions and fled

35 years Prison time

$1,250,000 Fines

The tradeoff

Security vs. usabilitySecurity vs. usability vs. cost

Is the security worth the cost?

Secure

Usable Cheap

You get to pick any two!

Examples

Personal securityEvent/city securityNational securityAviation securityInformation security

Personal security: bullet-proof vests

Claim: protects you from gunshot deathCosts

WeightComfortConvenienceLack of style

Risk + likelihood: very lowAnalysis

Risk not worth the cost

Personal security:children and strangers

Claim: talking to strangers is dangerousCosts

Fear of asking for helpDefault stance of distrustReduction in civil society

Risk + likelihood: quite lowAnalysis

More children will suffer

Event/city security:cameras and face recognition

Claim: watch crowds everywhere, find criminalsCosts

MoneyPrivacyHigh error rate

Risk + likelihood: questionableAnalysis

Did the costs actually help find criminals?Tampa: no

National security: war on terror

Claim: protect United States from terroristsCosts

MoneyLivesAmerican reputationPersonal freedoms and liberties

Risk + likelihood: extremely lowAnalysis

Did we get the most security possible, given the costs?Is there any return in exchange for liberties?

Speaking of war…

Aviation security: how much screening?

Claim: identity + inspection = intentCosts

Privacy (plus embarrassment)Time (plus convenience)Restrictions (liquids, pointy things)Liberties (guilty first, massive profiling databases)Money

Risk + likelihood: lowAnalysis

Does any of it actually make airplanes more secure?Can you pick bad guys out of a crowd?

Aviation security: too much?Transmission x-ray

Aviation security: too much?Backscatter x-ray

Aviation security: too much?Passive-millimeter wave scanner

Information security

PerformanceFreedom and location of accessEase or frequency of usePortabilityTimeCostPrivacy

Will you exchange these?

Tradeoff: complete security

Information security

Passwords: remembering vs. writing downRFID: inventory tracking vs. monitoring locationsSystem config: locked down vs. wild and freeAccess control: strict vs. looseEncryption: privacy vs. lossEmail: availability vs. integrity

Security admin vs. network adminSecurity staff vs. executive management

Virtual keyboards

Seems to be effective…

Screen recordersSteal session after logonCapture credentials from HTTP stream before SSL encryptionHassle factor: forces user to select a short password

So maybe it’s less secure!

Not worth the tradeoff—slow and clunky

Addresses symptom (stolen credential) vs. root cause (malware)Threat scenario is too specific

Privacy tradeoffs

Have a private face-to-face conversation?Drive from A to B without anyone knowing?Fly?Be totally invisible in a crowd?But still leave your cell phone turned on?Make purchases without revealing your identity?Online?Embed tracking devices in pets?In people?Surf the Internet anonymously?Send email anonymously?

Are we designed to make tradeoffs?

YesWhen threats are visible, obvious, immediate, recentBut common threats we forget about

NoWhen threats are invisible, nonobvious, delayed, historicalBut rare threats we tend to hype

Applying the tradeoff

Don’t spend more on mitigation than the asset is worth!Don’t destroy the asset in the processSome risks you have to tolerate

Make the loss cost lessTransfer risk to someone elseOr simply ignore

Everything we do is risk management

Should you apply the patch?Did you make that setting?Did you get rid of Wintendo?How did you configure the firewall?What’s the ACL?

Risk management deals with threats

Not risk management

“We have to enable NTLMv2”“Another patch? Let’s switch platforms”“Another patch? OK, deploy it”“All systems should be secure by default”

One size does not fit all

Every environment is uniqueThe risks differ for each environmentRisk tolerance differsProducts are designed based on assumptionsNo product provides optimal security

Lemma: You cannot design an optimal security strategy without a thorough understanding of the usage and risks

Risk assessment

Low High

Ris

k

Asset Value

High

Risk tolerance

What?Me worry?

Yes!We worry!

It’s got to cover all layers

People, policies, and process

Physical security

Perimeter

Internal network

Host

Application

Data

Sample classification schemesPhysical Where is the asset? How is access obtained?

Public areaEmployee-onlyControlled

Available during business hoursCard-key readersCard-key, PIN, and palm print

Network Access from where? How to authenticate?

Wired corpnetWireless corpnet

VPNKiosksInternet

Domain logon (human and PC)Domain logon plus certificates(human and computer)Domain logon, smartcard, quarantineDisallowedDisallowed except from corp PC

Valuing assets

Primary factors Annual value

Overall value to the organizationWeb site, runs 24/7, $2,000/hr revenue

$17,520,000

Immediate financial impact of lossUnavailable for six hours: 0.0685% per year(Example ignores time of day, day of week, season, marketing campaigns)

–$12,000

Indirect business impact of lossAttack: $10,000 to counteract negative publicity; 1% lost annual sales: $175,200

–$185,200

Tradeoff: patching

Applying every patch is typically a poor strategyIrritate end usersBurnout patch management team

Some patches are more important than othersScrutinize the Mitigating Factors section of the bulletinUnderstand the risk equation and the burden curve

Risk equation

Where:Access = Degree of access to an asset that an attacker could gain via the vulnerabilityValue = Value of the assetDifficulty = Difficulty of carrying out a successful attack

Risk ≈ Access * Value

Difficulty

ISO-Risk chart

Difficulty

Ac

ces

s

Critic

al

High

Moder

ate

Low

BlasterBlaster with Mitigations

Cost curve

Time

Bu

rden

Crisisdeployment

Maintenance

Upgrade

Upgrade +1

Annualized cost

DREAD

Damage potential How great is the damage if the vulnerability is exploited?

Reproducibility How easy is it to reproduce the attack?

Exploitability How easy is it to launch the attack?

Affected users As a rough percentage, how many users are affected?

Discoverability How easy is it to find the vulnerability?

Sample threat ratings

Rating High (3) Medium (2) Low (1)

Damage potential

The attacker can subvert the security system; get full trust authorization; run as administrator; upload content

Leaking sensitive information Leaking trivial information

Reproducibility The attack can be reproduced every time and does not require a timing window

The attack can be reproduced, but only with a timing window and a particular race situation

The attack is very difficult to reproduce, even with knowledge of the security hole

Exploitability A novice programmer could make the attack in a short time

A skilled programmer could make the attack, then repeat the steps

The attack requires an extremely skilled person and in-depth knowledge every time to exploit

Affected users All users, default configuration, key customers

Some users, non-default configuration

Very small percentage of users, obscure feature; affects anonymous users

Discoverability Published information explains the attack. The vulnerability is found in the most commonly used feature and is very noticeable

The vulnerability is in a seldom-used part of the product, and only a few users should come across it. It would take some thinking to see malicious use

The bug is obscure, and it is unlikely that users will work out damage potential

Our job as infosec experts

No!

Avoid tweaking somethingjust because you can

But try these, just in case…HKLM\Software\Microsoft\Windows NT\CurrentVersion\DisableHackers=1 (REG_DWORD)

HKLM\Wetware\Users\SocialEngineering\Enabled=no (REG_SZ)

HKCU\Wetware\Users\CurrentUser\PickGoodPassword=1 (REG_BINARY)

HKLM\Hardware\CurrentSystem\FullyPatched=yes (REG_SZ)

HKLM\Software\AllowBufferOverflows=no (REG_SZ)

New definition: security professional

It’s all about moneySave money…

Identify and mitigate riskEnsure compliance

Make money…Translate annoyances into differentiators

Select the trade-offs that balance security with business goals

Steve Rileysteve.riley@microsoft.com

http://blogs.technet.com/steriley

www.protectyourwindowsnetwork.com

Thanksvery much!

© 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market

conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Recommended