40
SESSION ID: #RSAC MODERATOR: PANELISTS: Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies HTA-F03 Wayne Huang Charlie Lee Danny Yang Fyodor Yarochkin Kristov Atlas VP Engineering Proofpoint, Inc. @waynehuang [email protected] [email protected] Creator, Litecoin Engineering Director, Coinbase @SatoshiLite Founder & CTO, MaiCoin, Inc. @huuep Senior Threat Researcher, VArmour, Inc. @fygrave Bitcoin Security Researcher Independent Security Researcher @kristovatlas

RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

Embed Size (px)

Citation preview

Page 1: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

SESSION ID:

#RSAC

MODERATOR: PANELISTS:

Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

HTA-F03

Wayne Huang Charlie Lee

Danny Yang

Fyodor Yarochkin

Kristov Atlas

VP Engineering

Proofpoint, Inc.

@waynehuang

[email protected]

[email protected]

Creator, Litecoin

Engineering Director, Coinbase

@SatoshiLite

Founder & CTO, MaiCoin, Inc.

@huuep

Senior Threat Researcher, VArmour, Inc.

@fygrave

Bitcoin Security Researcher

Independent Security Researcher

@kristovatlas

Page 2: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

The BIG question…

Why are Bitcoin

targets so attractive?

Page 3: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

3

Page 4: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
Page 5: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
Page 6: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
Page 7: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
Page 8: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

Just before or in parallel:Insider threat,Fraud & scams,Wallet theft,Crime

Page 9: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

Right after:Remote exploitation,DDos

Page 10: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

The BIG question…

Why are Bitcoin

targets so attractive?

Page 11: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Questions

Which threat vector will impact Bitcoin’s future most?

How anonymous is Bitcoin?

Will we see more of CryptoLocker clones in the future demanding

Bitcoin for encrypted file ransom?

Which threat vector is likely under-rated?

What opportunities and impact will Bitcoin bring to the security

industry?

How to boost Bitcoin’s wide adoption?

Page 12: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

HACKED

Page 13: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSACRemote exploitation of server-side vulnerabilities

Vulns in open source Bitcoin projects

3rd party vulns

Application vulns (OWASP)

Page 14: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Mining resources theft

Seizing pro miners, Dell: stealing $9,000 a day

German police: botnet mined €700,000 bitcoins

Miner botnets (ex: DVRs, cams, NAS…)

University servers

Hidden miners (ex: games)

Android app miners(ex: wallpapers apps)

Page 15: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Mining resources theft: Embedded Devices

Compromises: embedded ARM, PPC, MIPS or X86 machines

Attack vector: default passwords, a vuln in /cgi-bin/php

Primary targets: cheap Linux-based embedded devices, ex:

Dahua camera - arm

AFoundry switch - mips

Tera EP Wifi Broadband Switch - mips

Mines MNC coin via p2pool.org

Page 16: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Mining resources theft: Embedded Devices

Page 17: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Mining resources theft: Embedded Devices

Page 18: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Mining resources theft: Embedded Devices

Page 19: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Mining resources theft: Embedded Devices

Page 20: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Mining resources theft: Embedded Devices

Page 21: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Bitcoin mining botnet: sale

Page 22: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Source:http://habrahabr.ru/post/147635/

Page 23: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Mining resources theft

Botnets - Some also have injects for bitcoin theft, i.e this Zeus modification:

https://bigrc.biz/threads/%D0%BF%D1%80%D0%BE%D0%B4%D0%B0%D0%BC-botnet-evolution-

%D0%B1%D0%BE%D1%82%D0%BD%D0%B5%D1%82.9505/

Page 24: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Fraudulent vendors and scams

Bitcoin startup scams (taking investor money)

Miner scams (no shipment)

Bitcoin-denominated ponzi scheme

Exchange scams

Bitcoin asset scams

Page 25: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Wallet theft

Endpoint wallet stealers

Dell: Nearly 150 Strains of Malware Are After Your Bitcoins

Bitcoin-featured banking malware

Trojaned browser plugins

Page 26: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Bitcoin malware trends

Malware is and will be an important tool for coin thieves against end users

Attack wallet files or website logins

Desktop and mobile

Interest from malware authors is proportional to the Bitcoin price and adoption in their target demographic

Dropped in 2014 along with price [Symantec]

As adoption grows, average technical savvy of user will drop

Page 27: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Win32/Spy.Hesperbot

27

Page 28: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Trojan.Dyre/Dyreza

28

Page 29: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Malware Kits

29

Page 30: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Defending Against Bitcoin Malware

For now, most Bitcoin malware will simply be standard financial trojans. Use traditional methods of detection

Behavioral analysis: processes scanning for ‘wallet.dat’, ‘wallet.aes.json’ or Base58Check strings all potentially suspicious

Put private keys offline and into cold storage; use offline signing

Security proportional to amount of funds stored, even during upward price swings

Multi-stage signing protocols such as P2SH multisig, Shamir’s Secret Sharing, or threshold sigs distribute risk

Page 31: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Crime and terrorism

Bitcoin as gaming credits (ex: gambling)

Bitcoin as payment protocol for criminal trade

Bitcoin used to fund or to donate to terrorists

Bitcoin as means to launder money

Page 32: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Insider threat

Current operators or employees

Ex-employees

Fake “compromises”

US Department of Justice: US Secret

Service agent "diverted" more

than $800,000 in Bitcoins to

his personal accounts

Page 33: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Insider Threat: Sh33p Marketplace

33

Page 34: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Federal Agents Accused of Stealing SR Funds

34

Page 35: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

DDoS

Targeted DDoS against exchanges

Cross-exchange DDoS

DDoS against Bitcoin core reference

design

DDoS mining pools for ransom

Page 36: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Phishing

Phishing emails seemingly from blockchain wallet

High click rate

Spear-phising Silk Road auction enquirers

Phishing Bitcoin exchange users

Page 37: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

37

Page 38: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Questions

Which threat vector will impact Bitcoin’s future most?

How anonymous is Bitcoin?

Will we see more of CryptoLocker clones in the future demanding Bitcoin for encrypted file ransom?

Does cryptocurrency promote ransomware

Which threat vector is likely under-rated?

What opportunities does Bitcoin bring to the security industry?

How will Bitcoin impact the security industry?

How to boost Bitcoin’s wide adoption?

Page 39: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

http://bit.ly/rsabit

coinpanel

Page 40: RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies

#RSAC

Questions:

Please Ask!