Presentation Title * Arial 32 pt, Bold, Black

Anatomy of an Attack
Patti Sauder
Senior Security Engineer
October 4, 2012
2
- CONFIDENTIAL -
Imperva Overview
Our mission.
Protect the data that drives business
Our market segment.
Enterprise Data Security
Our global business.
• Founded in 2002;
•
•
•
Global operations; HQ in Redwood Shores, CA
375+ employees
Customers in 50+ countries
Our customers.
1,700+ direct; Thousands cloud-based
•
•
•
•
•
3
4 of the top 5 global financial data service firms
4 of the top 5 global telecommunications firms
4 of the top 5 global computer hardware companies
3 of the top 5 US commercial banks
150+ government agencies and departments
Next Generation Threats Require New Approach
Tech. Attack
Protection
Usage
Audit
Logic Attack
Protection
User Rights
Management
Fraud
Prevention
Access
Control
External
Internal
Customers
Staff, Partners
Hackers
Employees
Malicious Insiders
Compromised Insiders
Data Center
Systems and Admins
Imperva’s Mission is to Provide a Complete Solution
4
© Copyright 2012 Imperva, Inc. All rights reserved.
“Never been easier”
…to become a cybercriminal.
Hacking
- Foreign Secretary William Hague
Foreign Secretary William Hague reported
to an international conference that it has
“never been easier” to become a
cybercriminal.
-- BBC News October 4, 2012
5
Motivation
Hacking
• Hacking for reputation, military or financial
gain. Typically underground or secretive teams
and organizations using significant effort to hide
their nefarious activities.
• Often an income source for organized crime.
• Significant steps to hid their activities
Social
Hacktivism
• Combination
of hacking and activism, often
powered by the use of social media
• Usually political or ethical opinion drivers.
•Proven to be quite effective
• Verizon Data Breach report states that 58% of
stolen records in 2011 were due to hacktivism.
With zero losses were attributed to hacktivism in
previous years.
6
Types of Threats
Malicious
Insiders
According to the Verizon 2011 Data Breach Investigations Report,
the number of incidents implicating malicious insiders
doubled in 2011. Example: Wikileaks and Zappos
Compromised
Insiders
According to the Office of the Director of National Intelligence,
almost half of all computers in the United States have been
compromised in some manner and ~60,000 new pieces of
malware are identified per day.
Automated
Attacks
7
“External agents have created economies of scale by refining
standardized, automated, and highly repeatable attacks
directed at smaller, vulnerable, and largely homogenous targets.”
– Verizon 2011 Data Breach Investigations Report
Industrialization of Hacking and Automation
Roles
Optimization
Researching Vulnerabilities
Direct Value – i.e. IP, CC#
Developing Exploits
Command & Control
Growing Botnets
Malware Distribution
Exploiting Targets
Phishing & spam
Creating Tools
DDoS
Consumers
Use & Rent Resources
Great at using
information/tools already in
place
8
Automation
Growing Botnets and
Exploiting Vulnerabilities
Selecting Targets via Search
Engines
Templates & Kits
Centralized Management
Service & Support
Department
Situation Today
# of websites
(estimated: July 2011)
: 357,292,065
x
230
But which will be
1%
exploited?
# of
vulnerabilities :
821,771,600
vulnerabilities in active circulation
http://news.netcraft.com/archives/2011/07/08/july-2011-web-server-survey.html
https://www.whitehatsec.com/home/resource/stats.html
Data is hacker currency
Canadian credit cards:
Visa: $3
MasterCard: $3
American Express: $6
Discover: $6
US credit cards:
Visa: $2
MasterCard: $3
American Express: $5
Discover: $6
EU credit cards:
Visa: $6
MasterCard: $6
American Express: $8
Discover: $8
Website Access up for Sale
11
- CONFIDENTIAL -
Website Access up for Sale
12
- CONFIDENTIAL -
Automation Makes It Easy
 In one hacker forum, it was boasted that one hacker had found
5012 websites vulnerable to SQLi through automation tools.
Note:
•Due to automation, hackers can
be effective in small groups – i.e.
Lulzsec.
• Automation also means that
attacks are equal opportunity
offenders. They don’t
discriminate between well-known
and unknown sites.
The Story
Understanding the Threat Landscape - Sources
 Hacking data source
+ Categorized attacks across 40 web applications
+ Reviewed all HTTP & HTTPS traffic
+ 6 months: June to November 2011
 Social hacktivism data source
+ Imperva mitigated attack in 2011
+ Activity lasted 25 days
+ Defensive line was network firewall, IDS, WAF, web servers and
anti-virus.
Types of Attackers
Both Hacking
and Social
Hacktivism
Skilled hackers—This group have genuine hacking experience
and are quite savvy with web application exploitation.
Nontechnical—This group can be quite large, ranging from a
Social
few dozen to a few hundred volunteers. Directed by the skilled
Hacktivism Only hackers, their role is primarily to conduct DDoS attacks by either
downloading and using special software or visiting websites
designed to flood victims with excessive traffic.
16
Attack Breakdown – Standard Hacking
PHP in use in +77% of web apps.
* RFI, LFI and DT do not appear in OWASP’s Web Attack top 10 list.
Attack Breakdown– Social Hacktivism
4000
3500
DT
3000
#alerts
2500
Directory Traversal
SQLi
2000
SQL injection
DDoS recon
1500
XSS
1000
XSS
500
0
Day 19
Day 20
Day 21
Date
18
Day 22
Day 23
19
- CONFIDENTIAL -
The Plot
 Attack took place in 2011
over a 25 day period.
 Anonymous was on a
deadline to breach and
disrupt a website, a
proactive attempt at
hacktivism.
 10-15 skilled hackers or
“geniuses.”
 Several hundred to a
thousand “idiots.”
20
Recruiting and Communications
21
An “Inspirational” Video
22
Social Media Helps Recruit
23
Setting Up An Early Warning System
24
Example
25
But That Much Sophistication Isn’t Always Required
26
Hacker Tools
“Avoid strength, attack weakness: Striking where the enemy is
most vulnerable.”
—Sun Tzu
27
Automation is Prevailing
 Tools and kits exist for everything
Finding Vulnerabilities




Tool #1: Vulnerability Scanners
Purpose: Rapidly find application vulnerabilities.
Cost: $0-$1000 per license.
The specific tools:
+ Acunetix (named a “Visionary” in a Gartner 2011 MQ)
+ Nikto (open source)
29
Industrial vs. Social DDOS
 Traditional Application DDOS – Traditional application DDOS
requires a significant effort on the part of the hacker, buying or
building C&C tools, discovering exploits on target systems and
expanding a large enough botnet to execute the DDOS. The
advantage is that the hacker can attack targets at will without the
need to publicly ‘ask’ others for help or meet a specific timeline. But
it requires significant effort upfront.
 Social DDOS – Supporter run DDOS requires far less effort on the
behalf of the attacker, but requires enough supporters ‘willing’ to
assist in the attack before it can be executed. The only effort is in
creating easy to use DDOS tools and providing them to the
‘supporters’.
For more: http://blog.imperva.com/2011/12/top-cyber-security-trends-for-2012-7.html
30
Hacking Tools
 Tool #2: Low-Orbit Ion Canon (LOIC)
 Purpose:
+ DDoS
+ Mobile and Javascript variations
+ Can create 200 requests per second per browser window
32
LOIC Facts
 LOIC downloads
+ 2011: 381,976
+ 2012 (through March 19): 318,340
+ Jan 2012=83% of 2011’s downloads!
 Javascript LOIC:
+ Easy to create
+ Iterates up to 200 requests per minute
+ Can be used via mobile device.
33
Data Extraction
 Tool #3: Havij
 Purpose:
+ Automated SQL injection
and data harvesting
tool.
+ Solely developed to take
data transacted by
applications
 Developed in Iran
34
Mitigation Techniques
Dork Yourself
Blacklist
WAF + VA
WAF Anti-DDOS
IP Reputation
Code Fixing
Protect Your Organization’s Data
Given all the billions spent
on security,
why the prolific rate of
data breaches?
36
Recent attacker targets….
US Department of Justice
Church of Scientology
US Copyright Office
Muslim Brotherhood
FBI
Zappos.com
MPAA
MilitarySingles.com
Warner Brothers
Amazon
RIAA
Austria Federal Chancellor
HADOPI
HBGary Federal
BMI
Mexican Interior Ministry
SOHH
Mexican Senate
Office of the AU Prime Minister
Mexican Chamber of Deputies
How
many
of
these
organizations
AU House of Parliament
Irish
Department
of Justice have AV, IPS and
AU Department of Communications
Irish Department
of Finance
Next
Generations
Firewalls?
Swiss bank PostFinance
Greek Department of Justice
Fine Gael
Egyptian National Democratic Party
New Zealand
Parliament
Spanish
Police
Why
are the attacks
successful
when these technologies claim
Tunisia Government
Orlando Chamber of Commerce
to prevent them?
Zimbabwe Government
Catholic Diocese of Orlando
Egyptian Government
Bay Area Rapid Transit
Itau
PayPal
Banco de Brazil
Mastercard
US Senate
Visa
Caixa
37
Traditional Security Doesn’t Stop Today’s Threats
What
helped get
us
secure…
isn’t
keeping us
secure
•
•
•
•
•
Router ACLs
Network Firewalls
IDS and IPS
VPNs
Anti-Virus
•
•
•
•
•
•
SQL Injection
(XSS) Cross-site Scripting
Remote File Inclusion
Cross-site Request Forgery
Business Logic Attacks
Insider Abuse
I have IPS and NGFW, am I safe?
 IPS and NGFWs can’t prevent all web application attacks.
+ Don’t confuse “application aware marketing” with Web Application
Security.
 To prevent, WAFs at a minimum must include the
following to protect web applications:
•
•
•
•
•
•
•
39
Web-App Profile
Web-App Signatures
Web-App Protocol Security
Web-App DDOS Security
Web-App Cookie Protection
Anonymous Proxy/TOR IP Security
HTTPS (SSL) visibility
Security Policy Correlation
I have IPS and NGFW, am I safe?
 IPS and NGFWs are not web application firewalls.
+ Don’t confuse “application aware marketing” with Web Application
Security.
 However, IPS and NGFWs at best only partially support
the items in Red:
•
•
•
•
•
•
•
40
Web-App Profile
Web-App Signatures
Web-App Protocol Security
Web-App DDOS Security
Web-App Cookie Protection
Anonymous Proxy/TOR IP Security
HTTPS (SSL) visibility
Security Policy Correlation
The Defenses Required to Protect Web Apps
Correlated Attack Validation
Dynamic Profiling
Attack Signatures
HTTP Protocol Validation
Cookie Protection
IP Reputation
Anti-Scraping Policies
Bot Mitigation Policies
IP Geolocation
Malware Fraud Detection
41
Technical Attack
Protection
© Copyright 2012 Imperva, Inc. All rights reserved.
Business Logic
Attack Protection
Fraud Prevention
42
- CONFIDENTIAL -
References
• http://news.netcraft.com/archives/2011/07/08/july-2011-web-server-survey.html
• https://www.whitehatsec.com/home/resource/stats.html
• http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigationsreport-2011_en_xg.pdf
• http://blog.imperva.com/2011/06/analyzing-the-lulzsec-attacks-.html
• http://www.imperva.com/docs/HI_Search_Engine_Poisoning_SEP.pdf
• http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf
•http://www.imperva.com/docs/HII_Remote_and_Local_File_Inclusion_Vulnerabiliti
es.pdf