30
Asset & Threats Models Matsuzaki ‘maz’ Yoshinobu <[email protected]> 1

Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

Asset&ThreatsModels

Matsuzaki ‘maz’Yoshinobu<[email protected]>

1

Page 2: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

Thanks

Mostcontentswereprovidedby:

StevenM.Bellovin• https://www.cs.columbia.edu/~smb

2

Page 3: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

StartingOff

•Whatareyoutryingtoprotect?• Againstwhom?

• Allsecuritysystemdesignsshouldstartbyansweringthosetwoquestions.

3

Page 4: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

ThreatsModeling

Threat:Anadversarythatismotivatedandcapableofexploitingavulnerability

• Whatvulnerabilitiesdoyouhave?• Whomightattackthem?• Aretheycapableofexploitingthosevulnerabilities?

4

Page 5: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

Assets

• Myhousehaseasily-breakableglasswindows

• Banksstoretheirmoneyinvaults

• BankshavemoremoneythanIdo…

(CreativeCommons licensed by Flickruser mbrand)

5

Page 6: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

YourAsset

• $moneyand$valuables• credentialsandaccountsinformation• servicesitself• cpu power/bandwidth• software• secretcontents

6

Page 7: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

WhoAreYourEnemies?

• Scriptkiddies:littlerealability,butcancausedamageifyou’recareless

• Moneymakers:hackintomachines;turnthemintospamengines;etc.

• Governmentintelligenceagencies

7

Page 8: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

TheTreatMatricSkill

DegreeofFocus

Joyhacks

Opportunistichacks

Targetedattacks

AdvancedPersistentThreats

8

Page 9: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

JoyHacks

• Hacksdoneforfun,withlittleskill• Somechancefordamage,especiallyonunpatchedcomputers

• Targetsarerandom;noparticularrisktoyourdata(atleastifit’sbackedup)

• Ordinarycarewillsuffice• Mosthackersstartthisway

9

Page 10: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

OpportunisticHacks

• Mostphishers,viruswriters,etc• Oftenquiteskilled,butdon’tcaremuchwhomtheyhit–Mayhavesome“0-days”attacks

• Theeffectsarerandombutcanbeserious• Consequences:bankaccounttheft,computersturnedintobots,etc.

10

Page 11: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

TargetedAttacks

• Attackerswantyou– Sometimes,youhavesomethingtheywant;othertimes,it’ssomeonewithagrudge

• Backgroundresearch-- learnalotaboutthetarget–Maydophysicalreconnaissance

• Watchforthingslike“spear-phishing”orothercarefully-targetedattacks

11

Page 12: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

AdvancedPersistentThreats(APT)

• Veryskillfulattackerswhoareaimingatparticulartargets

• Sometimes-- thoughnotalways-- workingforanation-state

• Very,veryhardtodefendagainstthem• Mayusenon-cybermeans,includingburglary,bribery,andblackmail

• Note:manylesserattacksblamedonAPTs

12

Page 13: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

AreYouTargeted?

• Ifyou’rebig,someoneisprobablytargetingyou,especiallyifyou’reunpopular

• Ifyouhavesomethingsomeonewants--includingmoney-- youcanbetargeted

• Oritcouldberandomchance

13

Page 14: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

ACrazyNeighbor

• Afamilytoldpoliceaboutaneighbor’s(serious)misbehavior

• Theneighborretaliated:hehackedintotheirWiFi,stoletheirpasswords,createdfacepornographicMySpacepages,sentthreateningandharassingletters“from”them,etc.

• Eventually,theFBIwascalledinbecauseofthethreats,buttheyfoundwhowasreallydoingit

• Conclusion:Afamilywastargeted,fornorationalreason

14

Page 15: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

APaintCompany

• Apaintmanufacturerwastargeted,apparentlyforpurposesofindustrialespionage

• Therewerehints-- orclaims-- offoreigngovernmentinvolvement

15

Page 16: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

DefenseStrategies

• Defensestrategiesdependontheclassofattacker,andwhatyou’retryingtoprotect

• Tacticsthatkeepoutteenagerswon’tkeepoutanintelligenceagency

• Butstrongerdefensesareoftenmuchmoreexpensive,andcausegreatinconvenience

16

Page 17: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

JoyHackers

• Bydefinition,joyhackersuseexistingtoolsthattargetknownholes

• Patchesexistformostoftheseholes;thetoolsareknowntoA/Vcompanies– Thebestdefenseisstayinguptodatewithpatches– Also,keepantivirussoftwareuptodate

• Ordinaryenterprise-gradefirewallswillalsorepelthem

17

Page 18: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

OpportunisticHackers

• Sophisticatedtechniquesused– Possiblyevensome0-days

• Youneedmultiplelayersofdefense– Up-to-datepatchesandanti-virus–Multiplefirewalls– Intrusiondetection– Lotsofattentiontologfiles

• Goal:contain theattack

18

Page 19: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

TargetedAttacks

• Targetedattacksexploitknowledge;trytoblockordetectthereconnaissance– Securityproceduresmattersalot– Howdoyourespondtophonecallers?–Whatdopeopledowithunexpectedattachments?

• Hardestcase:disgruntledemployeeorex-employee

19

Page 20: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

AdvancedPersistentThreats

• Very,veryhardproblem!• Useallofthepreviousdefenses• Therearenosureanswers-- evenairgapsaren’tsufficient

• Payspecialattentiontoprocedures• Investigateall oddities

20

Page 21: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

VaryingDefenses

• Don’tusethesamedefensesforeverything• Layerthem;protectvaluablesystemsmorecarefully

• Maybeyoucan’taffordtoencrypteverything-- butyouprobablycanencryptallcommunicationsamongandto/fromyourhigh-valuemachines

21

Page 22: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

AllMachinesAreValuable

• Evenmachineswithnointrinsicvaluecanbeturnedintobots– Sendspam,launchDDoS,hostphishingsite,etc.– Spyonyourlocaltraffic– Defense:watchoutboundtrafficfromyoursite

22

Page 23: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

ComparisonamongTargets

• Values– Higherisbetterforattackers

• Defense–Weakerisbetterforattackers

• Ifhevaluesarethesame,attackermaywanttotargetweakersystems– Youareweakerwhenothersgetsafer

• Conclusion:followBCPsandreviseyourprocedurestokeepituptodate

23

Page 24: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

CaseStudy:AlbertoGonzales

• PenetratedmajorAmericancorporations,startingwithunprotectedWiFi reachablefromtheparkinglot– Stolepasswordsfromloginsessions– UsedSQLinjectionattacks

• Stole180millioncreditcardnumbers• TotaldamagesclaimedtoexceedUS$400million

24

Page 25: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

Lessons

• Usepropercrypto• Don’tuseplaintextpasswordswhenloggingin• Don’tmakesimpleprogrammingmistakes• Theregenerallyweren’tmultiplelinesofdefense

• Noonewaswatchingfordataexfiltration

25

Page 26: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

CaseStudy:Stuxnet

• TargetedIraniannuclearcentrifugeplant• Usedfour0-days;targetedSCADAsystemsaswellasWindows

• StartedwithinfectedUSBdrive-- butunknownhowthatdrivegotintotheplant

• Attackershaddetailedknowledgeoftheplant’sequipment

• GenerallyattributedtotheUSand/orIsrael

26

Page 27: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

Lessons

• Someonepluggedinaninfectedflashdrive– Anagent?(Betterpersonnelsecurity)– Afewinfecteddrivesinaparkinglot?(Betterprocedures)

• Don’tassumethatairgapsandobscuresystemwillprotectyou– 0-dayswereused:patchesandantiviruswon’thelp

• Detectedwhensomeonethoroughly investigatedsomesystemcrashes

27

Page 28: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

Morecases

• SonyPicturesEntertainment– wasstolenunreleasedfilms– wasdemandedthecancelationofreleasingacomedyfilm

28

Page 29: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

Summary

• Usepropercrypto• Usemultilayersecurity– Up-to-datepatchesandanti-virus– firewall– IDSandanomalydetection

• Revisesecurityprocedure

29

Page 30: Asset & Threats Models...data (at least if it’s backed up) •Ordinary care will suffice •Most hackers start this way 9 Opportunistic Hacks •Most phishers, virus writers, etc

Andagain

•Whatareyoutryingtoprotect?• Againstwhom?

30