18
Security: The Changing Threat Environment David Aucsmith Architect and CTO Security Business & Technology Unit awk @ microsoft.com Microsoft Corporation

Security: The Changing Threat Environment

Embed Size (px)

DESCRIPTION

Security: The Changing Threat Environment. David Aucsmith Architect and CTO Security Business & Technology Unit awk @ microsoft.com Microsoft Corporation. Session Outline. The World Today Threats Bad Guys How We Got There Legacy Crime Evolving the Solution Security Strategy - PowerPoint PPT Presentation

Citation preview

Page 1: Security:  The Changing Threat Environment

Security: The Changing Threat Environment

David AucsmithArchitect and CTOSecurity Business & Technology Unitawk @ microsoft.comMicrosoft Corporation

Page 2: Security:  The Changing Threat Environment

Session OutlineSession Outline

The World TodayThreats

Bad Guys

How We Got ThereLegacy

Crime

Evolving the SolutionSecurity Strategy

A Look Ahead

Page 3: Security:  The Changing Threat Environment

Vulnerability TimelineVulnerability Timeline

Undiscovered

Vulnerability Discovered

Correction

Component Fixed

Packaging

Customer FixAvailable

Module Gap

Customer Testing /Deployment

Actual Vulnerability To Attack

ResponsibleDisclosure

Experimentation

VulnerabilityDisclosed

Software Ship Fix Deployed

Early Disclosure

Rarely discovered

Attacks occur here

Why does this gap exist?

The World Today

Page 4: Security:  The Changing Threat Environment

Vulnerability TimelineVulnerability Timeline

Undiscovered

Vulnerability Discovered

Correction

Component Fixed

Packaging

Customer FixAvailable

Module Gap

Customer Testing /Deployment

Actual Vulnerability To Attack

ResponsibleDisclosure

Experimentation

VulnerabilityDisclosed

Software Ship Fix Deployed

Early Disclosure

151151180180

331331

BlasterBlasterWelchia/ Welchia/ NachiNachi

NimdaNimda

2525SQL SQL

SlammeSlammerr

Days between patch & exploitDays between patch & exploit Days From Patch To Days From Patch To

ExploitExploit Have decreased so that Have decreased so that

patching is not a defense in patching is not a defense in large organizationslarge organizations

Average 6 days for patch to Average 6 days for patch to be reverse engineered to be reverse engineered to identify vulnerabilityidentify vulnerability

The World Today

Source: Microsoft

Page 5: Security:  The Changing Threat Environment

The Forensics of a VirusThe Forensics of a Virus

Blaster shows the complex interplay between security researchers, software companies, and hackers

Vulnerability reported to us /

Patch in progress

Bulletin & patch available

No exploit

Exploit code in public Worm in the world

July 1 July 16 July 25 Aug 11

ReportReport Vulnerability in Vulnerability in

RPC/DDOM RPC/DDOM reportedreported

MS activated MS activated highest level highest level emergency emergency response processresponse process

BulletinBulletin MS03-026 delivered MS03-026 delivered

to customers to customers (7/16/03)(7/16/03)

Continued outreach Continued outreach to analysts, press, to analysts, press, community, community, partners, partners, government government agenciesagencies

ExploitExploit X-focus (Chinese X-focus (Chinese

group) published group) published exploit toolexploit tool

MS heightened MS heightened efforts to get efforts to get information to information to customerscustomers

WormWorm Blaster worm Blaster worm

discovered –; discovered –; variants and other variants and other viruses hit viruses hit simultaneously (i.e. simultaneously (i.e. “SoBig”)“SoBig”)

The World Today

Source: Microsoft

Page 6: Security:  The Changing Threat Environment

Understanding the LandscapeUnderstanding the Landscape

National InterestNational Interest

Personal GainPersonal Gain

Personal FamePersonal Fame

CuriosityCuriosity

Script-KiddyScript-Kiddy HobbyistHobbyistHackerHacker

ExpertExpert SpecialistSpecialist

Vandal

Thief

Spy

Trespasser

The World Today

Tools created Tools created by experts by experts now used by now used by less-skilled less-skilled attackers and attackers and criminalscriminals

Fastest Fastest growing growing segmentsegment

Author

Page 7: Security:  The Changing Threat Environment

Legacy and EnvironmentLegacy and Environment

The security kernel of Windows NT was written

Before there was a World Wide Web

Before TCP/IP was the default communications protocol

The security kernel of Windows Server 2003 was written:

Before buffer overflow tool kits were generally available

Before Web Services were widely deployed

How We Got Here

Page 8: Security:  The Changing Threat Environment

Honey Pot ProjectsHoney Pot Projects

Six computers attached to InternetDifferent versions of Windows, Linux and Mac OS

Over the course of one weekMachines were scanned 46,255 times

4,892 direct attacks

No up-to-date, patched operating systems succumbed to a single attack

All down rev systems were compromised Windows XP with no patches

Infested in 18 minutes by Blaster and Sasser

Within an hour it became a "bot"

How We Got Here

Source: StillSecure, see http://www.denverpost.com/Stories/0,1413,36~33~2735094,00.html

Page 9: Security:  The Changing Threat Environment

MalwareMalware

Spam

Phishing

Spyware

Bots

Root Kit Drivers

How We Got Here

Page 10: Security:  The Changing Threat Environment

SpamSpam

Mass unsolicited email

For commerceDirect mail advertisement

For Web trafficArtificially generated Web traffic

Harassment

For fraudPhishing

Identity theft

Credential theft

How We Got Here

Affiliates Programs

Example

•$0.50 for every validated free-trial registrant

•60% of each membership fee from people you direct to join the site

SoBig spammed > 100 million inboxesIf 10% read the mail and clicked the link

= 10 million peopleIf 1% signed up for 3-days free trial

= (100,000 people) x ($0.50) = $50,000If 1% of free trials sign up for 1 year

= (1,000 people) x ($144/yr) = $144,000/yr

Page 11: Security:  The Changing Threat Environment

PhishingPhishing

Most people are spoofedOver 60% have visited a fake or spoofed site

Many people are tricked Over 15% have provided personal data

Economic loss ~ 2% of people

Average loss of $115

How We Got Here

Source: TRUSTe

Page 12: Security:  The Changing Threat Environment

SpywareSpyware

Software that:Collects personal information from you

Without your knowledge or permission

Privacy15 percent of enterprise PCs have a keylogger

Source: Webroot's SpyAudit

Number of keyloggers jumped three-fold in 12 monthsSource: Sophos

ReliabilityMicrosoft Watson

~50% of crashes caused by spyware

How We Got Here

Page 13: Security:  The Changing Threat Environment

BotsBots

Bot EcosystemBots

Botnets

Control channels

Herders

It began en masse with MyDoom.AEight days after MyDoom.A hit the Internet

Scanned for the back door left by the worm

Installed Trojan horse called Mitglieder

Then used those systems as their spam engines

Millions of computers across the Internet were now for sale to the underground spam community

How We Got Here

Page 14: Security:  The Changing Threat Environment

Bot-Nets Tracked (3 Sep 2004 snapshot)Bot-Nets Tracked (3 Sep 2004 snapshot)

Age (days) Name Server MaxSize

02.00 nubela.net dns.nubela.net 10725

10.94 winnt.bigmoney.biz (randex) winnt.bigmoney.biz 2393

09.66 PS 7835 - y.eliteirc.co.uk y.eliteirc.co.uk 2061

09.13 y.stefanjagger.co.uk (#y) y.stefanjagger.co.uk 1832

03.10 ganjahaze.com ganjahaze.com 1507

01.04 PS 8049 - 1.j00g0t0wn3d.net 1.j00g0t0wn3d.net 3689

10.93 pub.isonert.net pub.isonert.net 537

08.07 irc.brokenirc.net irc.brokenirc.net 649

01.02 PS 8048 - grabit.zapto.org grabit.zapto.org 62

10.34 dark.naksha.net dark.naksha.net UNK

08.96 PS 7865 - lsd.25u.com lsd.25u.com UNK

UNK PS ? - 69.64.38.221 69.64.38.221 UNK

How We Got Here

Page 15: Security:  The Changing Threat Environment

In The NewsIn The News

Botnet with 10,000 Machines Shut DownSept 8, 2004

A huge IRC "botnet" controlling more than 10,000 machines has been shut down by the security staff of Norwegian provider Telenor, according to the Internet Storm Center. The discovery confirms beliefs about the growth of botnets, which were cited in the recent distributed denial of service (DDoS) attack upon Akamai and DoubleClick that sparked broader web site outages. […]http://news.netcraft.com/archives/2004/09/08/botnet_with_10000_machines_shut_down.html

How We Got Here

CERT Polska Takes Down Virut BotnetJanuary 21, 2013

Security giant Symantec recently estimated Virut’s size at 300,000 machines; Russian security firm Kaspersky said Virut was responsible for 5.5 percent of malware infections in the third quarter of 2012. [...]

http://www.esecurityplanet.com/malware/cert-polska-takes-down-virut-botnet.html

Page 16: Security:  The Changing Threat Environment

PayloadsPayloads

Keystroke loggers for stealing CC, PII

SYN or application flooding code Used for DDoS

DDoS has been used many times

Including public attacks against Microsoft.com

Spam relays: 70-80% of all spam Source SpecialHam.com, Spamforum.biz

Piracy

Future features

How We Got Here

Page 17: Security:  The Changing Threat Environment

Botnet Damage PotentialBotnet Damage Potential

Attack Requests/bot Botnet Total Resource exhausted

Bandwidth flood (uplink)

186 kbps 1.86 Gbps T1, T3, OC-3, OC-12

Bandwidth flood (downlink)

450 kbps 4.5 Gbps T1, T3, OC-3, OC-12, OC-48 (2.488Gbps)

50% of Taiwan/US backbone

Syn flood 450 SYNs/sec 4.5M SYN/sec 4 Dedicated Cisco Guard (@$90k) OR

20 tuned servers

Static http get (cached)

93/sec 929,000/sec 15 servers

Dynamic http get 93/sec 929,000/sec 310 servers

SSL handshake 10/sec 100,000/sec 167 servers

10,000-member botnet

>$350.00/weekly - $1,000/monthly (USD) >Type of service: Exclusive (One slot only)>Always Online: 5,000 - 6,000>Updated every: 10 minutes

>$220.00/weekly - $800.00/monthly (USD)>Type of service: Shared (4 slots)>Always Online: 9,000 - 10,000>Updated every: 5 minutes

September 2004 postings to SpecialHam.com, Spamforum.bizHow We Got Here

Page 18: Security:  The Changing Threat Environment

GO TO GO TO MANDIANT SLIDES…SLIDES… - FALL 2013, FALL 2014 - FALL 2013, FALL 2014