62

Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Embed Size (px)

Citation preview

Page 1: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?
Page 2: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

SEC 203

Steve RileySr. Security StrategistMicrosoft Trustworthy Computing Group

[email protected]://blogs.technet.com/steriley

Making the Tradeoff:Be Secure or

Get Work Done

Page 3: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Old vs. new

Traditional approaches vs. contemporary attacksHow have bad-guy methods changed?What motivates them now?

Page 4: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

What’s changing?

Largeglobalevents

Massiveworms

Makingheadlines

Identity theft,financial fraud

Spyware

Exploitenterprises

Makingmoney

Page 5: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Meta-trend

Identitytheft

SpammingPhishingExtortion

Page 6: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

So what’s going on?

Increasingly sophisticated

Poly- and metamorphic

Evading anti-virus software

Act as vulnerability assessment tools

Use search engines for reconnaissance

Better targeting

Don’t advertise presence

Common to modify existing proven attack codeMore variants of successful wormsMight result in new and hidden entry points

Criminals hire attackersCriminals reuse their codeHuge market in unknown vulnerabilitiesCapitalizing on shrinking window of exposure

Malware becomesmore sophisticated

Attacks are usefulfor longer times

Vulnerabilitieshave street value

Page 7: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Direct losses

How bad is it?

$13,000

small company, modest infection

(FBI 2005 Computer Crime Survey)

$83,000(Counterpane Internet Security)

grows with frequency, extent, severity

$millions

Indirect losses

$? reputation, customer trust

Counterpane Internet Security and MessageLabs

Page 8: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Trojan attacksTop 5 by industry

0

5

10

15

20

25

30

35

40

Financial services,banking

Materials,manufacturing

Entertainment,media

Parmaceutical,healthcare

Travel,transportation

Counterpane Internet Security and MessageLabs

Page 9: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Probes and enumerationsTop 5 by industry

0

5

10

15

20

25

30

35

Financial services,banking

Pharmaceutical,healthcare

Insurance, realestate

Travel,transportation

Retail, wholesale

Counterpane Internet Security and MessageLabs

Page 10: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

SpywareTop 5 by industry

0

10

20

30

40

50

60

Pharmaceuticals,healthcare

Insurance, realestate

Utilites, power,energy

Retail, wholesale Materials,maufacturing

Counterpane Internet Security and MessageLabs

Page 11: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Direct attacksTop 5 by industry

0

5

10

15

20

25

30

Insurance, realestate

Pharmaceuticals,healthcare

Materials,manufacturing

Retail, wholesale Government,education

Counterpane Internet Security and MessageLabs

Page 12: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Security's link to economics

An economic opportunity lurks inside every security problemLearn how to express security issues in economic termsLook for ways to shift the balance in your favor

Page 13: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Spyware is costing you big

$72,000 User annual salary

260 Working days per year

2 Time to fix (hours)

2 People involved (user, tech)

138$day per hours 8hours 2 people 2

days 260000,72$

1,000 Employees in organization

5% Infection rate, per month

800,82$138$12%)51000(

Network World Magazine

Page 14: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

A law firm

$600 Hourly rate for a partner

260 Working days per year

2 Time to fix (hours)

1 Partner

1200$day per hours 8hours 2 partner 1

days 2602080 600$

1,000 Employees in organization

5% Infection rate, per month

000,720$1200$12%)51000(

Network World Magazine

Page 15: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Is email even useful anymore?

Postini

Page 16: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Is email even useful anymore?

Postini

Page 17: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Is email even useful anymore?

Postini

Page 18: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Is email even useful anymore?

Postini

Page 19: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

An affiliates program

“Our first program pays you $0.50 for every validated free-trial registrant your website sends to [bleep]. Commissions are quick and easy because we pay you when people sign up for our three-day free-trial. Since [bleep] doesn't require a credit card number or outside verification service to use the free trial, generating revenue is a snap.

The second program we offer is our pay per sign-up plan. This program allows you to earn a percentage on every converted (paying) member who joins [bleep]. You could make up to 60% of each membership fee from people you direct to join the site.

Lastly, [bleep] offers a two tier program in addition to our other plans.  If you successfully refer another webmaster to our site and they open an affiliate account, you begin earning money from their traffic as well! The second tier pays$0.02 per free-trial registrant or up to 3% of their sign-ups.”

Page 20: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Let’s do the math

10% Read email and clicked link 10,000,000

SoBig spammed 100,000,000 mailboxes. What if…

1% Signed up for a three-day trial 100,000$0.50

$50,000

1% Enrolled for 1 year 1,000$144

$144,000

Would you do it???

Page 21: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Postmarks—change the economics

http://research.microsoft.com/research/sv/PennyBlack/

Page 22: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Spam and spyware lead to bots

Attack Requests/bot Botnet total Resource exhausted

Bandwidth flood (uplink)

186 kbps 1.86 Gbps T1, T3, OC-3, OC-12

Bandwidth flood (downlink)

450 kbps 4.5 Gbps T1, T3, OC-3, OC-12, OC-48 (2.488Gbps)50% of Taiwan/US backbone

SYN flood 450 SYNs/sec

4.5M SYNs/sec

4 dedicated Cisco Guard ($90k) or 20 tuned servers

Static http get (cached)

93/sec 929,000/sec 15 servers

Dynamichttp get

93/sec 929,000/sec 310 servers

SSL handshake 10/sec 100,000/sec 167 servers

Consider a 10,000-member botnet

Page 23: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

How to become a bot

Low interest rates!

Gimme credit cards!

Extend your penis!

Get abetter job!

Cheap movie tickets!

Page 24: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Edwin Pena: pioneering VoIP attacks

Page 25: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Edwin’s stats

18 months Duration of scam

10,000,000 Minutes fraudulently sold

$20,000 Paid to buddy

15 VoIP providers attacked

$300,000 Interconnect charges providers had to pay

Lavishly How Edwin spent his takings, until…

Failed To meet bond conditions and fled

35 years Prison time

$1,250,000 Fines

Page 26: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

The tradeoff

Security vs. usabilitySecurity vs. usability vs. cost

Is the security worth the cost?

Page 27: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Secure

Usable Cheap

You get to pick any two!

Page 28: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Examples

Personal securityEvent/city securityNational securityAviation securityInformation security

Page 29: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Personal security: bullet-proof vests

Claim: protects you from gunshot deathCosts

WeightComfortConvenienceLack of style

Risk + likelihood: very lowAnalysis

Risk not worth the cost

Page 30: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Personal security:children and strangers

Claim: talking to strangers is dangerousCosts

Fear of asking for helpDefault stance of distrustReduction in civil society

Risk + likelihood: quite lowAnalysis

More children will suffer

Page 31: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Event/city security:cameras and face recognition

Claim: watch crowds everywhere, find criminalsCosts

MoneyPrivacyHigh error rate

Risk + likelihood: questionableAnalysis

Did the costs actually help find criminals?Tampa: no

Page 32: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

National security: war on terror

Claim: protect United States from terroristsCosts

MoneyLivesAmerican reputationPersonal freedoms and liberties

Risk + likelihood: extremely lowAnalysis

Did we get the most security possible, given the costs?Is there any return in exchange for liberties?

Page 33: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Speaking of war…

Page 34: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Aviation security: how much screening?

Claim: identity + inspection = intentCosts

Privacy (plus embarrassment)Time (plus convenience)Restrictions (liquids, pointy things)Liberties (guilty first, massive profiling databases)Money

Risk + likelihood: lowAnalysis

Does any of it actually make airplanes more secure?Can you pick bad guys out of a crowd?

Page 35: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Aviation security: too much?Transmission x-ray

Page 36: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Aviation security: too much?Backscatter x-ray

Page 37: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Aviation security: too much?Passive-millimeter wave scanner

Page 38: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Information security

PerformanceFreedom and location of accessEase or frequency of usePortabilityTimeCostPrivacy

Will you exchange these?

Page 39: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Tradeoff: complete security

Page 40: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Information security

Passwords: remembering vs. writing downRFID: inventory tracking vs. monitoring locationsSystem config: locked down vs. wild and freeAccess control: strict vs. looseEncryption: privacy vs. lossEmail: availability vs. integrity

Security admin vs. network adminSecurity staff vs. executive management

Page 41: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Virtual keyboards

Seems to be effective…

Screen recordersSteal session after logonCapture credentials from HTTP stream before SSL encryptionHassle factor: forces user to select a short password

So maybe it’s less secure!

Not worth the tradeoff—slow and clunky

Addresses symptom (stolen credential) vs. root cause (malware)Threat scenario is too specific

Page 42: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Privacy tradeoffs

Have a private face-to-face conversation?Drive from A to B without anyone knowing?Fly?Be totally invisible in a crowd?But still leave your cell phone turned on?Make purchases without revealing your identity?Online?Embed tracking devices in pets?In people?Surf the Internet anonymously?Send email anonymously?

Page 43: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Are we designed to make tradeoffs?

YesWhen threats are visible, obvious, immediate, recentBut common threats we forget about

NoWhen threats are invisible, nonobvious, delayed, historicalBut rare threats we tend to hype

Page 44: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Applying the tradeoff

Don’t spend more on mitigation than the asset is worth!Don’t destroy the asset in the processSome risks you have to tolerate

Make the loss cost lessTransfer risk to someone elseOr simply ignore

Page 45: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Everything we do is risk management

Should you apply the patch?Did you make that setting?Did you get rid of Wintendo?How did you configure the firewall?What’s the ACL?

Risk management deals with threats

Page 46: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Not risk management

“We have to enable NTLMv2”“Another patch? Let’s switch platforms”“Another patch? OK, deploy it”“All systems should be secure by default”

Page 47: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

One size does not fit all

Every environment is uniqueThe risks differ for each environmentRisk tolerance differsProducts are designed based on assumptionsNo product provides optimal security

Lemma: You cannot design an optimal security strategy without a thorough understanding of the usage and risks

Page 48: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Risk assessment

Low High

Ris

k

Asset Value

High

Risk tolerance

What?Me worry?

Yes!We worry!

Page 49: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

It’s got to cover all layers

People, policies, and process

Physical security

Perimeter

Internal network

Host

Application

Data

Page 50: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Sample classification schemesPhysical Where is the asset? How is access obtained?

Public areaEmployee-onlyControlled

Available during business hoursCard-key readersCard-key, PIN, and palm print

Network Access from where? How to authenticate?

Wired corpnetWireless corpnet

VPNKiosksInternet

Domain logon (human and PC)Domain logon plus certificates(human and computer)Domain logon, smartcard, quarantineDisallowedDisallowed except from corp PC

Page 51: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Valuing assets

Primary factors Annual value

Overall value to the organizationWeb site, runs 24/7, $2,000/hr revenue

$17,520,000

Immediate financial impact of lossUnavailable for six hours: 0.0685% per year(Example ignores time of day, day of week, season, marketing campaigns)

–$12,000

Indirect business impact of lossAttack: $10,000 to counteract negative publicity; 1% lost annual sales: $175,200

–$185,200

Page 52: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Tradeoff: patching

Applying every patch is typically a poor strategyIrritate end usersBurnout patch management team

Some patches are more important than othersScrutinize the Mitigating Factors section of the bulletinUnderstand the risk equation and the burden curve

Page 53: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Risk equation

Where:Access = Degree of access to an asset that an attacker could gain via the vulnerabilityValue = Value of the assetDifficulty = Difficulty of carrying out a successful attack

Risk ≈ Access * Value

Difficulty

Page 54: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

ISO-Risk chart

Difficulty

Ac

ces

s

Critic

al

High

Moder

ate

Low

BlasterBlaster with Mitigations

Page 55: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Cost curve

Time

Bu

rden

Crisisdeployment

Maintenance

Upgrade

Upgrade +1

Annualized cost

Page 56: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

DREAD

Damage potential How great is the damage if the vulnerability is exploited?

Reproducibility How easy is it to reproduce the attack?

Exploitability How easy is it to launch the attack?

Affected users As a rough percentage, how many users are affected?

Discoverability How easy is it to find the vulnerability?

Page 57: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Sample threat ratings

Rating High (3) Medium (2) Low (1)

Damage potential

The attacker can subvert the security system; get full trust authorization; run as administrator; upload content

Leaking sensitive information Leaking trivial information

Reproducibility The attack can be reproduced every time and does not require a timing window

The attack can be reproduced, but only with a timing window and a particular race situation

The attack is very difficult to reproduce, even with knowledge of the security hole

Exploitability A novice programmer could make the attack in a short time

A skilled programmer could make the attack, then repeat the steps

The attack requires an extremely skilled person and in-depth knowledge every time to exploit

Affected users All users, default configuration, key customers

Some users, non-default configuration

Very small percentage of users, obscure feature; affects anonymous users

Discoverability Published information explains the attack. The vulnerability is found in the most commonly used feature and is very noticeable

The vulnerability is in a seldom-used part of the product, and only a few users should come across it. It would take some thinking to see malicious use

The bug is obscure, and it is unlikely that users will work out damage potential

Page 58: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Our job as infosec experts

No!

Page 59: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Avoid tweaking somethingjust because you can

But try these, just in case…HKLM\Software\Microsoft\Windows NT\CurrentVersion\DisableHackers=1 (REG_DWORD)

HKLM\Wetware\Users\SocialEngineering\Enabled=no (REG_SZ)

HKCU\Wetware\Users\CurrentUser\PickGoodPassword=1 (REG_BINARY)

HKLM\Hardware\CurrentSystem\FullyPatched=yes (REG_SZ)

HKLM\Software\AllowBufferOverflows=no (REG_SZ)

Page 60: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

New definition: security professional

It’s all about moneySave money…

Identify and mitigate riskEnsure compliance

Make money…Translate annoyances into differentiators

Select the trade-offs that balance security with business goals

Page 61: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

Steve [email protected]

http://blogs.technet.com/steriley

www.protectyourwindowsnetwork.com

Thanksvery much!

Page 62: Traditional approaches vs. contemporary attacks How have bad-guy methods changed? What motivates them now?

© 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market

conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.