Slide Heading Malware: Money, Methods, and Trends Daimon Geopfert McGladrey LLP. November 14, 2012 Introduction • McGladrey LLP • 5th largest CPA/consulting firm • 6,500+ professionals and 70 offices in US • 70,000+ professionals internationally • Industries • Manufacturing, Finance, Government, Education, Healthcare, NFP, Consumer Products, Real Estate, etc. • Security and Privacy Services • • • • • Testing Architecture PCI Governance IR/Forensics Introduction • Daimon Geopfert • National Leader, Security and Privacy Services • I like standardized tests • CISSP, CISM, CISA, CEH, GCIH, GREM • I am not an auditor but I play one on your network • • • • Penetration Testing & Vulnerability Assessment Security Monitoring Incident Response Forensics & Investigations • Former DoD, AFOSI-CCI, AIA • All business, all the time Agenda or contents slide Overview of Malware Trends Nature of Attackers A Peek at the Markets Slide Heading Methods of Response and Control Summary Overview of Malware Trends Setting the Stage • Types of Malware • • • • • • • • Virus Worms Trojans Adware and Spyware URL Injectors, Redirectors, and Dialers Backdoors, Rootkits, and Keyloggers Rootkits Wabbits (go ahead and ask) • These are just general categories • Modern malware often fits multiple categories Overview of Malware Trends Traditional Trends • Perimeter attacks • Operating System Focus • Single Shot Virus/Worms • One trick pony • Blatant Trojans • Elf bowling anyone? • Little Detection Avoidance • Directly observable • Outright baiting of system owners • Open C3 • Command, control, communications • Zero-Day Races Overview of Malware Trends Current Trends • Massive increase in attacks against people and processes • Shotgun vs. Sniper • • Widespread, generic attacks are still popular but becoming more automated Targeted, detailed attacks are becoming the norm • Hobby vs. Profession • • Previous: Stereotypical “anti-social teenager” or “hermit living in his mom’s basement” Now: Formally trained developers, professional intelligence and industrial operatives, business managers looking for large scale efficiency • Obfuscation and Long Term Infections • Controls Bypass Methods Demo #1: Snort signature bypass • Setup Attacker: 192.168.10.10 • Food for thought… Target: 192.168.10.204 IDS: Snort Overview of Malware Trends Current Trends • Persistence • Multitude of re-infection methods • Anti-Forensics • Timestomp, VM aware, tailored delivery, forensic tool exploits • Hidden C3 • Encrypted tunnels, hidden, anonymous communications • Research and Custom Solutions • • • Specific fit for specific target Purpose built to avoid known controls, technology, and processes Dedicated zero day attacks • Retaliation • • DoS, destroy systems, encrypt data, etc Attack environment, responders, and managed security Overview of Malware Trends Current Trends • Code is no longer static • Constantly mutating or customized • Attackers can purchase subscriptions and appliances and use them to perform QA of their malware • Avoid AV detection by never touching the disk • AV, a signature based product, is limited to what it knows • Heuristics are utilized by most AVs, but these are not the silver bullet that they were once held out to be • Many organizations are dealing with outbreaks of varying scales on a monthly basis • If you’ve gone a significant amount of time between events it is time to start questioning your ability to identify an event Overview of Malware Trends Current Trends • Lower knowledge thresholds • Kits such as Zeus, Spy Eye, Mpack, etc • • A “bleed over effect” from APT into normal malware Non-targetted malware is built in ways that simulates APT, but the controllers have little or no understanding of how they work • This also means not every APT style threat is a cyber-ninja • • • • We consistently run into adversaries that are almost schizophrenic Elegant, targeted attacks followed by pure script kiddie flailing Powerful, unique tools over which they have only partial control Stealthy infiltration followed by blunt, noisy expansion techniques • Recent engagement saw an attacker almost DoS a network after infiltration because they were doing mass ping sweeps from dozens of compromised systems • Complete waste of unique malware Overview of Malware Trends Current Trends Demo #2: Antivirus bypass • Setup Attacker: 192.168.10.10 • Food for thought… Target: 192.168.10.202 AV: Avast Overview of Malware Trends Current Trends • Change in Delivery Methods – Social Engineering • Fancy name for traditional “con games” • • • The attack vector of choice for many advanced attackers • • Attempts to acquire information via fake emails, texts, and web pages Spear Phishing • • Large scale, unfocused attacks direction users to malicious websites Phishing • • Typical countermeasures such as firewalls, anti-virus, and intrusion detection systems are almost worthless Pharming • • Attacking an environment via manipulating people Focused on user habits, mannerisms, human nature, entrenched organizational procedures and activities Small scale, focused attacks against a limited audience Whaling • Ultra focused attacks against a high-profile targets Overview of Malware Trends Current Trends • Change in Delivery Methods – Social Engineering • • • Social Networks are easier to target and users are more likely to fall for scams because of inherent trust relationships • Users can receive messages including URLs and attachments • Easier for attackers to find and target individuals in positions of privilege Cyber criminals are increasingly turning to social networks, as opposed to email services, to attack users as it is much more difficult to monitor and control • Attacks are happening “inside the castle” with mainly local anti-virus as the last line of defense which is a scary thought Allows for attacks against browsers (aka. “Drive-bys”) that formerly were only really useful when users went to known, dodgy websites that were traditionally blocked as trusted agents (“friends”) can more easily bait users into clicking URLs Demo #3: Social Media/Engineering • Setup Google Mail Target: 192.168.10.202 OS: Patched WinXP Linkedin.com Attacker: 192.168.10.10 LinkedIn Clone Overview of Malware Trends Current Trends • Change in Delivery Methods – Beyond the OS • Internet Infrastructure • DNS & Routing • Encryption Methods • Certificates • • Sslstrip DigiNotar et al Overview of Malware Trends Current Trends • Change in Delivery Methods – Beyond the OS • Client Side Attacks • • • • • • Java Applets ActiveX Quicktime Flash Browser specific • Business critical/common document types • • • PDF DOC XLS • Many organizations are “fighting the last war” by focusing on OS Demo #4: Web Client Side Attack • Setup Attacker: 192.168.10.10 Malicious Website • Food for thought… Target: 192.168.10.201 Vulnerable IE Overview of Malware Trends Current Trends • Change in Delivery Methods – Mobile • Many of the risks inherent to wireless • • Many of the risks inherent to web/cloud solutions • • Passwords, session management, MitM Portable is Latin for “easy to leave in the back of a taxi” • • • • Interception, plain-text or “crackable” encryption Many high-profile “data breaches” are actually lost or stolen devices Mature encryption policies for laptops, not for tablets & smart phones Easily available software can unlock smartphones in seconds or minutes Attacks • • • • Patching and updates are necessary just as with any other device There are traditional attacks available for these devices Malware… and iOS folks shouldn’t get all high-and-mighty Lack of attacks for Mac/Apple was a function of economics not technology Nature of Attackers Some Misconceptions • “If I’m not a financial organization or contain military secrets they don’t care about me.” • • • You will be hard pressed to make appropriate risk management decisions until you understand who they are and why they act “Attackers” are not a vague, all-encompassing, generic horde Begin to think of attackers as a spectrum rather than a generic entity • • • “Script Kiddies” <- -> APT (Advanced Persistent Threat) Not every attacker is a cyber-ninja, the reality is somewhere between what you hope and what you fear Recognize that attackers have differing, shifting motives • • • • • • Targets of opportunity Bandwidth and equipment Hacktivism Financial data and Intellectual Property* • *#1 asset on underground market Revenge and retribution None of the above Nature of Attackers Some Misconceptions • “We’re too small for anyone to bother with us” • • • • The old threat models no longer apply Historically attackers went after big targets because the payday justified their investment, while small targets consumed similar resources for minimal return That model has flipped, big targets are often “hard” targets while new methods reduce the resource costs for small, “soft” targets Smaller companies often: • • • • • • Use COTS software with many basic, default settings Do not invest in advanced security technologies Do not have security specialists on staff But DO contain highly valuable information, just not in the quantities of a large target Attackers now use a variety of automation techniques to lower the resources necessary to handle large numbers of small hacks Congratulations, you’ve been monetized Nature of Attackers A Look Back • Historical Structures • • • Loan Wolf Attackers Tight-knit “gangs” Historical Motivation of Attackers • • • • Bragging rights Complete destruction Curiosity and research Free stuff • • Pizza, merchandise, phone calls, storage, CPU time Hack… ?... Profit! • Not what you would call a formal business plan Nature of Attackers Modern Day • • Fortune vs. Fame Botnets and Zombie Herds • • • Spam, music and movies Rental weapon platforms and C3 for malware Lots of “pro-bono” support as well • • Intelligence, warfare, and terrorism • • Very pretty name for very ugly business methods Large Scale Money Laundering • • • Focus on destroying/compromising “enemy” infrastructure “Competitive Intelligence” • • Bit torrents, anonymizers and shadow networks Money/resource transfers EGold, Paypal, Liberty Reserve, WebMoney, etc Profit (pardon the obvious) Nature of Attackers Modern Day • Roles • Reconnaissance • • Developers • • Pull the trigger The guys who get arrested Mules Market Makers • • • • Coders, Hackers, Social Engineers Execution • • • • People, Process, Technology The business leaders Control the pricing a usage of results of the exploit The ones who turn individual crimes into industries Bankers • • Money Laundering Currency/Product exchanges (escrow) Nature of Attackers Modern Day • Hackers get famous, the business leaders get rich • • Most of the actual field work comes from areas of soft legal standards • • They get paid for products Hacking kits/frameworks Custom builds In competition with each other for best products and reputation • Limbo 2 - Guaranteed non-detection with warranty Bankers have multiple layers of legal protection • • • Criminals plan crimes to cross as many borders and jurisdictions as possible Developers hard to punish as they often don’t directly commit a crime, or at least a crime recognized in their jurisdiction • • • • • Stay hands off, field work done by others Nothing different from old school mob money laundering Sleepers Cell structure • Players often don’t even know each other Nature of Attackers The Dreaded APT • Advanced: • The adversary can bring the entire spectrum of computer intrusion to bear against an objective. This can range from trivial exploits that have been known for a decade to never seen before zero-day attacks, social engineering, and unique malware. • Persistent: • Attackers are endeavoring to accomplish a clearly defined mission. They are highly motivated and will not cease their activities if their initial attempts fail, or even if their previously successful pathways into an environment are closed forcing them to APT is about motivation and mindset, not any develop new methods. The title “persistent” applies both to the nature of the particular adversaries to continue attacks over a technology long period of time, as well as the nature of the technical methods they use in order to maintain continuous access to compromised networks. • Threat: • This threat has motivated, thinking, goal-oriented humans on the other end. It is not mindless, bulk code grinding away on the Internet hitting all possible targets of opportunity. These individuals are organized, funded, and work directly or indirectly for major interests such as governments, organized crime, and (rumored) competitive business interests. Nature of Attackers Tactics Nature of Attackers The Wild Card • Hacktivism • • • • Motivation out of line with all other threats Normal risk management often consists of the old joke about “not needing to out-running the bear” That concept does not apply as these attackers of often driven by any variety of emotional and political drivers Hacktivism breaches often differ from normal breaches because the attackers attempt to make it as public as possible A Peek at the Markets About that Profit… • Food For Thought: • Legacy Universe of Attackers Attackers of Concern Attackers with the Skill Attackers with the Motivation • Underground markets bringing the two sides together • Motivated attackers place bounties for the skilled attackers to chase • Skilled attackers breach environments and sell access to motivated A Peek at the Markets • Unique items go for a premium • • • • Intellectual property High profile accounts or identities Access to specialty equipment Anyone surprised by the low value of individual personal data? • Economic slumps and credit crunches are not good for CC data A Peek at the Markets • Possibly the last true free market on earth… • Commercialization • Decreased time to market for exploits • Versioning and standard/gold/platinum editions • Commoditization • What was rare is now commonplace • Competition • What was unique now has competitors • Combined with prior point, this is reflected in pricing: • Zeus in 2008 = $10,000, Zeus in 2012 = $400 • Specialization • Since the foundational elements (malware source code) is so widely available, it has let developers focus on specific offerings such as antivirus bypass, industry specific, and geography specific offerings • Fraud as a Service • Niche service companies: native language translation, bulletproof hosts Methods of Response and Control • Risk management applies to security not just finance • Necessary to create APPROPRIATE controls • Horses and fences… • It is not meant to bring risk to zero • It is only meant to create a rational, non-emotional External Drivers approach to managing risk • Notice the loop… Industry Regulatory Threats Risk Management Oversight Internal Drivers Business Processes Policies and Procedures Metrics Resources Deploy and Educate Implement Analyze and Design Methods of Response and Control An Ounce of Prevention… • • We all know the quote… Basic stuff first • • • • • • Don’t try to build the roof until you’ve laid the foundation Participation in security community • • Patching Access control and segregation of duties Architecture and defense in depth Inventory and asset control Conferences, newsletters, whitepapers, RSS feeds, blogs, etc Planning • • • IR/DRCOOP Backup strategies Legal and public relations Methods of Response and Control • • Understand that modern threats are built to bypass preventative controls, but many organization place almost 100% reliance on these mechanisms for their security You must have robust detective and corrective controls Critical Data and Systems Threat Complexity Vulnerability Management Patch Management Access and Authentication IPS Configuration Management AV Blocking SIEM & MSSP IDS DB Activity Monitoring Compliance Monitoring Operational Monitoring AV Host & Network Alerts Incident Response Forensics AV Quarantine Isolation DR/BC Admin/Legal Actions Methods of Response and Control • • • • Heavy focus on security monitoring Log more. Bring it together. Use it. Period. Treat technical limitations as vulnerabilities. If the response is “the app isn’t robust enough for us to turn on logging” then that should be sending up flares that the app isn’t robust enough for normal use. “87% percent of victims had evidence of the breach in their log files, yet missed it.“ Verizon 2010 Data Breach Report Methods of Response and Control • What is going to cause us problems? • Impact of monitoring on critical technologies • • The volume of raw events • • • “Tuning” Generic, non-tailored signatures Validating that monitoring solutions stay in place • • • Storage, transmission, review Reliance on Off-the-Shelf tech without modification • • • Exercise for the day: Go ask your DBAs to turn on all native logging in the DB Troubleshooting Step #2: disable logging “Boy, that’s a chatty rule… off you go.” Do you know what you have, where it is at, what it does, who does it, and what it is all worth? The Mike Tyson effect… Methods of Response and Control • • Plan for failure. Make your goal to fail gracefully and minimize damage. Comprehensive IR plans • Formal and Preplanned • Assigned Roles: Tech, PR, Legal, Overall Lead • Develop Scenarios • • • • • • What if we want to prosecute? What if we think sensitive data has been exposed? Customer data? What if it can’t be contained? What if we can’t trust our own systems? What if it got into our financial/accounting/reporting/payment systems? Good Example: Fortune Top 100 Bank – IR plans undergo “table top” exercise twice a year, IR plans include pre-built PR announcements, media scripts, letters to regulators, etc. Bad Example: Sony – PlayStation breach was a PR disaster followed by an insurance nightmare Methods of Response and Control Methods of Response and Control Insurance • Policies can cover hazards which can cause security/privacy losses: • • • • • • • Virus/malicious code Denial of service attacks Hacker attacks/unauthorized access Malicious hardware Physical theft of device/media Accidental release and rouge employees Social engineering In a recent PwC security survey (which included more than 12,840 CEOs, CFOs, CIOs, CSOs, vice presidents and directors of IT and information security from 135 countries) almost half (46%) responded that they have an insurance policy that protects it from theft or misuse of assets such as electronic data or customer records. 17% of the respondents had made a claim against the policy and 13% had collected on it. Summary • Don’t Panic • Plan to fail, but plan to fail gracefully • Ability to know when a control has failed • Ability to recover quickly and with minimal damage • We’ve pointed out methods to bypass individual types of controls on a case by case basis • Consolidated, robust controls in a defense-in-depth manner are effective • Do not become a “hacker snack” Slide Heading • Hard and crunchy on the outside, soft and gooey in the middle • Every hoop you force the attacker to jump through is a chance for you to detect them… if you are watching • You don’t need to out run the bear… Questions? Daimon.Geopfert@McGladrey.com