Risiko i praksis: Er du beskyttet mot dagens Trojanere? Tom Lysemose

advertisement
Risiko i praksis:
Er du beskyttet mot dagens Trojanere?
Tom Lysemose
CEO Promon AS
Company Background

2004
−


2005
−
Entry of Technology Transfer Office (TTO) University in Oslo
−
International patent application delivered (pending)
2006
−

Entry of major Norwegian Capital Venture
2009
−

Entry of Seed fund and well known private investor
2008
−

Founded in Norway as limited share Company
2007
−

Research project established (at SINTEF and University of Oslo)
Market launch in Germany with Star Finanz (CeBIT March 2009)
2010
−
Several national and international partner agreements signed
Public funding
received throughout
the whole process
Overview
Problem

Client side malware infects the application which is
used for handling sensitive data
Solution

Integratable (on demand) security solution:

Creates a protected application session on the client
3
Main Threats: Client Side


Man-in-the-browser/Trojan (MITB)

Operates inside the browser with full access

Disclosure of sensitive data

Manipulates transaction data
Spyware


Operates typically from inside the browser, but may
operate from other places
Steals confidential information
4
Example: Zeus
Online banking Trojan

Botkit

Leading Crimeware toolkit in the world

Availability for everybody
−

From 700 USD to 3000-4000 USD for newest
Widespread Man-in-the-browser attack
−
Several milion PC`s in 196 countries:
Focus on Windows operating system
5
AntiVirus Solutions

Security level depending on user configuration
−
Low security settings, system wide

Often not installed or updated

If updated; dependent on signatures
−

Majority of Zeus infected systems had fully updated
AV installed
Sensitive data accessed from remote systems
cannot be protected
−
No ”session based” protection
Architecture
Network Layer
System Layer
Application Layer
Unprotected
Application
Spyware/
Trojan
Attack
Attack
Protected
Application
Promon
Traditional Anti Virus
Firewalls
Main Requirements

Session based protection
−
On demand (no installation)
−
Proactive protection
−
User Convenience (transparency)
−
Non intrusive (responsibility)
8
Protected Session
Client
Infected client initiates
session
Server
Internet
Promon Shield integrated on
server-side
Client connects and Promon Shield is provided
Shield initiates a protected browser/program session...
...Trojan / Spyware are blocked
Promon Architecture

Platform based on internal program monitoring
−

Deep interception, monitoring and control
Security add-ons
−
Shield

−
Protection against MITB and Spyware
Guard (not described here)

Detection of deviation in execution flow

Buffer overflow attacks (Google/Aurora attacks)
10
Shield – Security Features


Standard features:
−
MITB protection (anti-ZeuS!)
−
Anti-keylogging (anti-spyware)
−
Anti-debugging
−
IP/URL restrictions (browser restrictions)
−
Logging (analysis and/or challenge/response)
Extra features:
−
DLP (block: file-save, printing, copy-paste...)
11
Shield – Core Features

Program Start Control

Execution Flow Control

External Interface Control

Code Injection Control

Program integrity control
12
Independent test

Leading Norwegian research institute
−
NISlab - Norwegian Information Security laboratory
−
Independent test

Promon against 4 main world wide AV- providers
Attacking method
RemoteDLL
Browser manipulation
Google
Gossiper
Exactseek
Keylogger:freekgb
Keylogger:Actual Spy
Keylogger: NISlab
Promon
Blocked
Blocked
Blocked
Blocked
Blocked
Blocked
Blocked
Garbaged
I
Undetected
Undetected
Detected
Detected
Detected
Detected
Detected
Undetected
13
II
Undetected
Undetected
Detected
Undetected
Detected
Detected
Detected
Undetected
III
Undetected
Undetected
Detected
Undetected
Detected
Undetected
Detected
Undetected
IV
Undetected
Undetected
Undetected
Undetected
Undetected
Detected
Detected
Undetected
Deployment


Example - Java applet:
−
Java version 1.5 and newer (but also >1.4.2)
−
Total size < 200 KB
−
No admin rights required
−
No installation required (click once to accept
signed applet)
Shield technology succesfullly deployed to
more than 500.000 end-users (licensed)
(January 2011)
14
Customer Feedback

Jan Graffenberger, CTO, StarFinanz:
−
”The delivery was exactly in time, completely
a succes and still runs without any
complications.”
−
”Any request .. were proofed and arranged
with a very high performance. ”
−
”The experience we made working with
Promon is excellent”
15
Key Characteristics

Proactive

Signature independent

Session based


Integrated

No separate installation

Transparent

No user interaction

Non-intrusive

Non-agressive protection
End point security even on
a possible infected system
16
Download