27
SESSION ID: #RSAC Lavi Lazarovitz From Strategy to Tactics: Targeting and Protecting Privileged Accounts GPS1-F01 Security Researcher Cyberark @LaviLazarovitz

From Strategy To Tactics - Targeting And Protecting Privileged Accounts

Embed Size (px)

Citation preview

Page 1: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

SESSION ID:

#RSAC

Lavi Lazarovitz

From Strategy to Tactics: Targeting and Protecting Privileged Accounts

GPS1-F01

Security ResearcherCyberark@LaviLazarovitz

Page 2: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Squirrels Vs. Hackers

* https://www.washingtonpost.com/news/the-switch/wp/2016/01/12/are-squirrels-a-bigger-threat-to-the-power-grid-than-hackers/

2

Page 3: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Cyber Squirrels

http://www.bayd.info/pictures-5412-squirrel_hacker.html

3

Page 4: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Perimeter Compromise

Spear-phishing

1Endpoints infected

2

Attackers gain access

3

Reconnaissance

4

4

Page 5: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Lateral Movement

5

Page 6: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

The Reality

The RealityOutside:

The RealityInside:

Attackers cut power Operators could not interfere

6

Page 7: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

The Role of Privileged Accounts

Initial foothold

IT to OT

Shutdown power

1

2

3

7

Page 8: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

The End (Of The Heist)

8

Page 9: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Swift System

SWIFTNet

6.1+ billionFIN messages

99.999%SWIFTNet availability

99.999%FIN availability

11,000+Institutions connectedto SWIFT

200+Countries & territoriesconnected

9

Page 10: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

The Compromised Path

PERIMETER

IT N

ETW

ORK

SWIF

T-CO

NN

ECTE

D SY

STEM

S

RTGS

SNL

32 compromised machines

10

Page 11: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

The ExecutionSW

IFT-

CON

NEC

TED

SYST

EMS

SWIF

TNet

US

FED

SWIF

T SY

STEM

S

SNL SNL

11

Page 12: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

The Role of Privileged Accounts

Initial foothold

IT to Swift

Execute orders

1

2

3

12

Page 13: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

The Strategy

“With regard to narrow passes, if you canoccupy them first, let them be stronglygarrisoned and await the advent of the enemy.”

Sun Tzu

13

Page 14: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

DEMO

Page 15: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Highly Threatening Accounts

The Root Cause

Page 16: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

10% 50% 100%

Low Medium High

Network Risk Benchmark

Page 17: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

17%

44%

39%

Low risk: <10%

Medium risk: 10-50%

High risk: >50%

Those Are Our Networks

Page 18: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Narrowing The Pass #1

Domain accounts Local accounts

One-time passwords

Zoning credentials

18

Page 19: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Narrowing The Pass #2 - Passwords

Eliminate common passwords

Page 20: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Narrowing The Pass #2 - Passwords

Introducing Easy-Peasy

https://github.com/CyberArkLabs/EasyPeasy

Page 21: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

WiFi Routers, Smart TVs

Privileged Service Accounts

Routers, Firewalls, Hypervisors, Databases, Applications

Routers, Firewalls, Servers, Databases, Applications

Laptops, Tablets, Smartphones

Power Plants, Factory Floors

Narrowing The Pass #3 – Service Accounts

Page 22: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

WiFi Routers, Smart TVs

Compromised Privileged Service Accounts

Laptops, Tablets, Smartphones

Power Plants, Factory Floors

Routers, Firewalls, Hypervisors, Databases, Applications

Routers, Firewalls, Servers, Databases, Applications

Narrowing The Pass #3 – Service Accounts

Page 23: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Narrowing The Pass #3 – Service Accounts

Crackable service accountsIntroducing Risky-SPNs

https://github.com/CyberArkLabs/RiskySPN

Page 24: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Strategy to Tactics

RespondRespond live to

malicious activity

ProtectSecure and manage

privileged credentials

MonitorMonitor privileged

accounts usage

Page 25: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Strategy to Tactics

Narrow the passes, monitor and respond

Privileged Accounts

25

Page 26: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Q&A

26

Page 27: From Strategy To Tactics - Targeting And Protecting Privileged Accounts

#RSAC

Thank You

Lavi.LazarovitzSecurity research @[email protected]