SlideShare a Scribd company logo
1 of 48
Download to read offline
How Targeted Attacks Evade
   Anti-Virus Software




      © 2012 Imperva, Inc. All rights reserved.
Agenda

    Compromised insiders defined
    The anatomy of a compromised insider campaign
    Non mitigation techniques: Anti-virus
    Mitigating compromised insiders in theory
      + Real world case study: RSA
  Mitigating compromised insiders in practice




 2                     © 2012 Imperva, Inc. All rights reserved.
Today’s Presenter
Rob Rachwald, Dir. of Security Strategy, Imperva

 Research
    + Directs security strategy
    + Works with the Imperva Application Defense Center
 Security experience
    + Fortify Software and Coverity
    + Helped secure Intel’s supply chain software
    + Extensive international experience in Japan, China, France, and
       Australia
 Thought leadership
    + Presented at RSA, InfoSec, OWASP, ISACA
    + Appearances on CNN, SkyNews, BBC, NY Times, and USA Today
 Graduated from University of California, Berkeley

                       © 2012 Imperva, Inc. All rights reserved.
Insider threat defined


                           Insider Threat

      Someone who has trust and access and acquires
      intellectual property and/or data in excess of
      acceptable business requirements.

      They do so:
       + Maliciously
       + Accidentally
       + By being compromised



  4                     © 2012 Imperva, Inc. All rights reserved.
Compromised insider defined


                 Compromised Insider

     A 3rd party who gains access and acquires
     intellectual property and/or data in excess via client
     infection. The client, often employees in
     government, military or private industry, are
     unknowing accomplices and have no malicious
     motivation.




 5                   © 2012 Imperva, Inc. All rights reserved.
In recent events …


   Saudi Aramco
     + Malicious Insider,
         30,000 computers
         hacked, full service
         disruption.
   Global Payments
     + Compromised Insider,
         causes 1.5M payment
         cards compromised.




 6   6                 © 2012 Imperva, Inc. All rights reserved.
Malware: Compromised insiders on the rise


             2012 Verizon Data Breach Report
             • Malware is on the rise: “69% of all data breaches
               incorporated Malware”. A 20% increase over 2011.
             • Malicious insider incidents declining: “4% of data breaches
               were conducted by implicated internal employees.” A 13%
               decrease compared to 2011.



             Director of National Intelligence
             • “Alm ost half of all com puters in the United States
               have been com prom ised in som e m anner and
               ~60,000 new pieces of malware are identified per day”.




                    © 2012 Imperva, Inc. All rights reserved.
The 1% to be really concerned about




                                                                 “Less than 1% of your
                                                                   employees may be
                                                                 malicious insiders, but
                                                                100% of your employees
                                                                have the potential to be
                                                                 compromised insiders.”


  Source:
  http://edocumentsciences.com/defend-against-compromised-insiders

                                            © 2012 Imperva, Inc. All rights reserved.
Who does it?

           Governments
           - Stealing Intellectual Property (IP) and raw data, as well as,
           espionage.
           - Motivated by politics and nationalism.


           Private hackers
           - Stealing IP and data.
           - Motivated by profit.


           Hacktivists
           - Exposing IP and data, but also compromising infrastructure.
           - Motivated by almost anything - have attacked, nations, people,
           religion, commerce, etc…

 9                  © 2012 Imperva, Inc. All rights reserved.
Where do they attack?

 Desktop                                                    Multimillion
 and the                                                      dollar
  user                                                      datacenter
                       Both
                    access the
  Not well          same data                                  Well
 protected                                                   protected




 10             © 2012 Imperva, Inc. All rights reserved.
Anatomy of a Compromised Insider Campaign




11                  © 2012 Imperva, Inc. All rights reserved.
With social networks, smart bombing is not hard




 12              © 2012 Imperva, Inc. All rights reserved.
With social networks, smart bombing is not hard




 13              © 2012 Imperva, Inc. All rights reserved.
Industrialized approach

  Specialized frameworks and hacking tools, such as BlackHole 2.0
   and others, allow easy setup for Host Hijacking and Phishing.


 How easy is it ?
 For $700: 3 month license for BlackHole available online.
 Includes support!




  14                        © 2012 Imperva, Inc. All rights reserved.
Is this real?


  Recent “iPhone 5 Images Leak” was a Trojan Download Drive-By.




  15                  © 2012 Imperva, Inc. All rights reserved.
Is this real?


       Persistent XSS Vulnerable Sites provide the Infection Platform.

          GMAIL, June 2012




                                                                       TUMBLR, July 2012


  16                       © 2012 Imperva, Inc. All rights reserved.
Is this real?

       Sep 24th 2012, FBI Issued a warning of Targeted Scams.




         • “Once compromised, keyloggers and RATs installed on the
           financial institution employee's computer provided the
           criminals with "complete access“.

         • “Unauthorized transactions were preceded by unauthorized
           logins that occurred outside of normal business hours”

         • "The DDoS attacks were likely used as a distraction”
  17                   © 2012 Imperva, Inc. All rights reserved.
Non Mitigations: Anti-Virus




18          © 2012 Imperva, Inc. All rights reserved.
The media view




             “Flame was a failure for the antivirus
             industry. We really should have been able
             to do better. But we didn’t. We were out of
             our league, in our own game.”
             Source: http://www.wired.com/threatlevel/2012/06/internet-security-fail/




                                © 2012 Imperva, Inc. All rights reserved.
The hacker view




          An entire industry exists to bypass anti-virus.
            Today, anti-virus stops between 6-27%
                            of viruses.


 Source:
 http://adamonsecurity.com/?p=323

                                    © 2012 Imperva, Inc. All rights reserved.
The anti-virus vendor view




                Hackers exploit ‘zero-day' bugs for 10
              months on average before they're exposed.

 Source:
 http://www.forbes.com/sites/andygreenberg/2012/10/16/hackers-exploit-software-bugs-for-10-months-on-average-
 before-theyre-fixed/
                                                   © 2012 Imperva, Inc. All rights reserved.
Protect and monitor the cheese

  Problem: Most organizations
   chase the mice and don’t focus
   enough on protecting the cheese.
      + Much of security budgets spent on:
          – Malware detection
          – Virus prevention
      + Front-line/end-user defenses must
        be 100% accurate.
          – If one mouse gets past them the cheese
            is gone.




 22                         © 2012 Imperva, Inc. All rights reserved.
Mitigating Compromised Insiders




23            © 2012 Imperva, Inc. All rights reserved.
Step 1: Know what users do with data

   Classify Sensitive Information
      + Identifying the information within the corporate databases and
        file servers allows understanding of risk and severity of data
        access.
   Persistent Security Policy
      + A good security policy will allow you to put compensating
        controls in place while not disrupting business needs and
        maintaining security.
   User Rights
      + Map your users’ rights. Understand who has access to what,
        and why there are dormant accounts?
   Analyze, Alert, and Audit on Activity
      + By keeping track of access and access patterns, it becomes easy
        to understand who accessed your data, what was accessed, and
        why.
 24                     © 2012 Imperva, Inc. All rights reserved.
Step #2: Look for aberrant behavior

                                       What: weirdness probably
                                        means trouble.
                                       How:
                                                + Profile normal, acceptable
                                                      usage and access to sensitive
                                                      items by
                                                             – Volume
                                                             – Access speed
                                                             – Privilege level
                                                + Put in place monitoring or
                                                      “cameras in the vault.”




 25              © 2012 Imperva, Inc. All rights reserved.
Example: Databases

   Checks the entry method. Legitimate individuals
    should, typically, access data through a main door.
   Monitor the activity of the individuals. If employees
    have been granted miscellaneous access permissions,
    monitor what they are doing. Malware from spear
    phishing typically causes unusual behavior.
   Monitor the activity of privileged users. Database
    controls should track the activity of the privileged users
    and monitor what these privileged users are accessing.




 26                  © 2012 Imperva, Inc. All rights reserved.
Example: File Systems

           Copying Folders                                                                  Routine Access
                   Nonselective                                                                   Selective
    All subfolders and files accessed


     Temporally continuous                                                           Temporally irregular


                       Recursive                                                             Random order

          Directory accessed                                                      Files can be accessed
            before its files                                                         without directory
 Source:
 Catching Insider Data Theft with Stochastic Forensics, presented at Black Hat USA August 2012.
                                                © 2012 Imperva, Inc. All rights reserved.
Conclusion: Rebalance the portfolio




  28             © 2012 Imperva, Inc. All rights reserved.
Worldwide anti virus spend: 2002 vs 2012



                2002                                                                      2012           (est.)




                     $1.44                                                                      $7.84
                     Billion                                                                    Billion
             A 5x increase without the 5x improvement.
 Source:
 Gartner, Worldwide Spending on Security by Technology Segment, Country and Region, 2010-2016 and 2002

 29                                           © 2012 Imperva, Inc. All rights reserved.
Real World Incident




30      © 2012 Imperva, Inc. All rights reserved.
Organizations known to have been compromised:

•    Saudi Aramco
•    Goldman Sachs
•    Global Payments
•    SF Computer Systems
•    Sandia National Labs
•    CardSystems
•    EPA
•    Motorola
•    Sberbank
•    Google (Aurora)
•    RSA
•    Toyota

The list goes on ….
                      © 2012 Imperva, Inc. All rights reserved.
RSA – phishing mail

   Mass phishing campaign against RSA employees




 32                © 2012 Imperva, Inc. All rights reserved.
RSA – the exploit

   Excel file with embedded Flash
   0 day Flash vulnerability




  33                © 2012 Imperva, Inc. All rights reserved.
Proliferation within the network

 “With the trojan
 downloaded, the attackers
 then started harvesting
 credentials and made their
 way up the RSA food chain
 via both IT and non-IT
 personnel accounts, until
 they finally obtained
 privileged access to the
 targeted system.”

 Source:
 http://www.pcmag.com/article2/0,2817,2382970,00.asp

  34                                         © 2012 Imperva, Inc. All rights reserved.
RSA – the result

   SecureID hacked




  35                  © 2012 Imperva, Inc. All rights reserved.
Mitigation in Action




                                               36
   © 2012 Imperva, Inc. All rights reserved.
Imperva SecureSphere – Database coverage



            Coverage for Heterogeneous Databases

                                                              DB2
                                                              DB2 z/OS
                                                              DB2400
                                                              Informix
                                                              Netezza




                  © 2012 Imperva, Inc. All rights reserved.
Imperva Database Security Products



                   Database Activity
                      Monitoring
                Full auditing and visibility into
                      database activities



              Discovery & Assessment
                      Server
                   Vulnerability assessment,
                  configuration management,
              database discovery and classification




  38             © 2012 Imperva, Inc. All rights reserved.
Deployment options

                        DBA/Sys admin
                                                          Agent
                  Database                               Auditing
                   Activity
                  Monitoring


                                                                      Agent
     Users                     Network            Database           Auditing
                               Auditing            Activity
                               Gateway
                                                  Monitoring


    Management                                                          DBA/Sys admin
    Server (MX)                                           Network
                                                          Auditing
                                                          Gateway




                     © 2012 Imperva, Inc. All rights reserved.
Auditing database activity


        Audit trail captures all database activity, including SELECT,
         DML, DDL, privileged activities.
        Details answer the who?, what?, where?, when? and how?
                DB2 for z/OS Activity

                                                          Complete Audit Trail
                     When?    Where?            Who?                        What?, How?


                                                           Privileged Operations




  40                         © 2012 Imperva, Inc. All rights reserved.
Audit analytics

   Pre-defined audit views provide quick and flexible access to audit details

                                                                        Graphical Analysis




                               Drill down to audit data




                            © 2012 Imperva, Inc. All rights reserved.
Real-time alerts on security events

                                                  Profiling violation – unauthorized database and
   SecureSphere provides                                           schema access

    real-time alerts on any
    security event and policy
    violation.
   Dynamic Profiling                                               Destination
    enables identification of
    abnormal behaviors.
                                                     User         Source application
   Alerts enable immediate
    response to minimize the                              Alert Details

    impact of a breach.                                 Date and Time




  42                  © 2012 Imperva, Inc. All rights reserved.
Universal user tracking




       Universal User
                                                                               User A
         Tracking                                                              User B

   Full user visibility and
                                      User A
   accountability
   • Map application users to
    database activity

                                                                            Tech User

                                                        User B




                                © 2012 Imperva, Inc. All rights reserved.
44   CONFIDENTIAL - Imperva
     © 2012 Imperva, Inc. All rights reserved.
Unified policies across heterogeneous platforms


   No need to define special                              Define and apply policies to
    policies for mainframe                                  heterogeneous databases
    databases.
   Granular policies defined
    and managed through a                                                DB2 for z/OS
    centralized, friendly
    interface.                                                               Other
   Preconfigured compliance                                                 databases

    policies and reports for
    SOX, PCI, and data
    privacy.


  45                © 2012 Imperva, Inc. All rights reserved.
Webinar Materials




46     © 2012 Imperva, Inc. All rights reserved.
Webinar materials

    Join Imperva LinkedIn Group,
    Imperva Data Security Direct, for…

                                                           Answers to
          Post-Webinar
                                                            Attendee
           Discussions
                                                           Questions



            Webinar
                                                            Join Group
         Recording Link


                    © 2012 Imperva, Inc. All rights reserved.
www.imperva.com




- CONFIDENTIAL -

More Related Content

More from Imperva

API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarImperva
 

More from Imperva (20)

API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

How Targeted APT and Advanced Malware Attacks Evade Anti-virus Software

  • 1. How Targeted Attacks Evade Anti-Virus Software © 2012 Imperva, Inc. All rights reserved.
  • 2. Agenda  Compromised insiders defined  The anatomy of a compromised insider campaign  Non mitigation techniques: Anti-virus  Mitigating compromised insiders in theory + Real world case study: RSA  Mitigating compromised insiders in practice 2 © 2012 Imperva, Inc. All rights reserved.
  • 3. Today’s Presenter Rob Rachwald, Dir. of Security Strategy, Imperva  Research + Directs security strategy + Works with the Imperva Application Defense Center  Security experience + Fortify Software and Coverity + Helped secure Intel’s supply chain software + Extensive international experience in Japan, China, France, and Australia  Thought leadership + Presented at RSA, InfoSec, OWASP, ISACA + Appearances on CNN, SkyNews, BBC, NY Times, and USA Today  Graduated from University of California, Berkeley © 2012 Imperva, Inc. All rights reserved.
  • 4. Insider threat defined Insider Threat Someone who has trust and access and acquires intellectual property and/or data in excess of acceptable business requirements. They do so: + Maliciously + Accidentally + By being compromised 4 © 2012 Imperva, Inc. All rights reserved.
  • 5. Compromised insider defined Compromised Insider A 3rd party who gains access and acquires intellectual property and/or data in excess via client infection. The client, often employees in government, military or private industry, are unknowing accomplices and have no malicious motivation. 5 © 2012 Imperva, Inc. All rights reserved.
  • 6. In recent events …  Saudi Aramco + Malicious Insider, 30,000 computers hacked, full service disruption.  Global Payments + Compromised Insider, causes 1.5M payment cards compromised. 6 6 © 2012 Imperva, Inc. All rights reserved.
  • 7. Malware: Compromised insiders on the rise 2012 Verizon Data Breach Report • Malware is on the rise: “69% of all data breaches incorporated Malware”. A 20% increase over 2011. • Malicious insider incidents declining: “4% of data breaches were conducted by implicated internal employees.” A 13% decrease compared to 2011. Director of National Intelligence • “Alm ost half of all com puters in the United States have been com prom ised in som e m anner and ~60,000 new pieces of malware are identified per day”. © 2012 Imperva, Inc. All rights reserved.
  • 8. The 1% to be really concerned about “Less than 1% of your employees may be malicious insiders, but 100% of your employees have the potential to be compromised insiders.” Source: http://edocumentsciences.com/defend-against-compromised-insiders © 2012 Imperva, Inc. All rights reserved.
  • 9. Who does it? Governments - Stealing Intellectual Property (IP) and raw data, as well as, espionage. - Motivated by politics and nationalism. Private hackers - Stealing IP and data. - Motivated by profit. Hacktivists - Exposing IP and data, but also compromising infrastructure. - Motivated by almost anything - have attacked, nations, people, religion, commerce, etc… 9 © 2012 Imperva, Inc. All rights reserved.
  • 10. Where do they attack? Desktop Multimillion and the dollar user datacenter Both access the Not well same data Well protected protected 10 © 2012 Imperva, Inc. All rights reserved.
  • 11. Anatomy of a Compromised Insider Campaign 11 © 2012 Imperva, Inc. All rights reserved.
  • 12. With social networks, smart bombing is not hard 12 © 2012 Imperva, Inc. All rights reserved.
  • 13. With social networks, smart bombing is not hard 13 © 2012 Imperva, Inc. All rights reserved.
  • 14. Industrialized approach Specialized frameworks and hacking tools, such as BlackHole 2.0 and others, allow easy setup for Host Hijacking and Phishing. How easy is it ? For $700: 3 month license for BlackHole available online. Includes support! 14 © 2012 Imperva, Inc. All rights reserved.
  • 15. Is this real? Recent “iPhone 5 Images Leak” was a Trojan Download Drive-By. 15 © 2012 Imperva, Inc. All rights reserved.
  • 16. Is this real? Persistent XSS Vulnerable Sites provide the Infection Platform. GMAIL, June 2012 TUMBLR, July 2012 16 © 2012 Imperva, Inc. All rights reserved.
  • 17. Is this real? Sep 24th 2012, FBI Issued a warning of Targeted Scams. • “Once compromised, keyloggers and RATs installed on the financial institution employee's computer provided the criminals with "complete access“. • “Unauthorized transactions were preceded by unauthorized logins that occurred outside of normal business hours” • "The DDoS attacks were likely used as a distraction” 17 © 2012 Imperva, Inc. All rights reserved.
  • 18. Non Mitigations: Anti-Virus 18 © 2012 Imperva, Inc. All rights reserved.
  • 19. The media view “Flame was a failure for the antivirus industry. We really should have been able to do better. But we didn’t. We were out of our league, in our own game.” Source: http://www.wired.com/threatlevel/2012/06/internet-security-fail/ © 2012 Imperva, Inc. All rights reserved.
  • 20. The hacker view An entire industry exists to bypass anti-virus. Today, anti-virus stops between 6-27% of viruses. Source: http://adamonsecurity.com/?p=323 © 2012 Imperva, Inc. All rights reserved.
  • 21. The anti-virus vendor view Hackers exploit ‘zero-day' bugs for 10 months on average before they're exposed. Source: http://www.forbes.com/sites/andygreenberg/2012/10/16/hackers-exploit-software-bugs-for-10-months-on-average- before-theyre-fixed/ © 2012 Imperva, Inc. All rights reserved.
  • 22. Protect and monitor the cheese  Problem: Most organizations chase the mice and don’t focus enough on protecting the cheese. + Much of security budgets spent on: – Malware detection – Virus prevention + Front-line/end-user defenses must be 100% accurate. – If one mouse gets past them the cheese is gone. 22 © 2012 Imperva, Inc. All rights reserved.
  • 23. Mitigating Compromised Insiders 23 © 2012 Imperva, Inc. All rights reserved.
  • 24. Step 1: Know what users do with data  Classify Sensitive Information + Identifying the information within the corporate databases and file servers allows understanding of risk and severity of data access.  Persistent Security Policy + A good security policy will allow you to put compensating controls in place while not disrupting business needs and maintaining security.  User Rights + Map your users’ rights. Understand who has access to what, and why there are dormant accounts?  Analyze, Alert, and Audit on Activity + By keeping track of access and access patterns, it becomes easy to understand who accessed your data, what was accessed, and why. 24 © 2012 Imperva, Inc. All rights reserved.
  • 25. Step #2: Look for aberrant behavior  What: weirdness probably means trouble.  How: + Profile normal, acceptable usage and access to sensitive items by – Volume – Access speed – Privilege level + Put in place monitoring or “cameras in the vault.” 25 © 2012 Imperva, Inc. All rights reserved.
  • 26. Example: Databases  Checks the entry method. Legitimate individuals should, typically, access data through a main door.  Monitor the activity of the individuals. If employees have been granted miscellaneous access permissions, monitor what they are doing. Malware from spear phishing typically causes unusual behavior.  Monitor the activity of privileged users. Database controls should track the activity of the privileged users and monitor what these privileged users are accessing. 26 © 2012 Imperva, Inc. All rights reserved.
  • 27. Example: File Systems Copying Folders Routine Access Nonselective Selective All subfolders and files accessed Temporally continuous Temporally irregular Recursive Random order Directory accessed Files can be accessed before its files without directory Source: Catching Insider Data Theft with Stochastic Forensics, presented at Black Hat USA August 2012. © 2012 Imperva, Inc. All rights reserved.
  • 28. Conclusion: Rebalance the portfolio 28 © 2012 Imperva, Inc. All rights reserved.
  • 29. Worldwide anti virus spend: 2002 vs 2012 2002 2012 (est.) $1.44 $7.84 Billion Billion A 5x increase without the 5x improvement. Source: Gartner, Worldwide Spending on Security by Technology Segment, Country and Region, 2010-2016 and 2002 29 © 2012 Imperva, Inc. All rights reserved.
  • 30. Real World Incident 30 © 2012 Imperva, Inc. All rights reserved.
  • 31. Organizations known to have been compromised: • Saudi Aramco • Goldman Sachs • Global Payments • SF Computer Systems • Sandia National Labs • CardSystems • EPA • Motorola • Sberbank • Google (Aurora) • RSA • Toyota The list goes on …. © 2012 Imperva, Inc. All rights reserved.
  • 32. RSA – phishing mail  Mass phishing campaign against RSA employees 32 © 2012 Imperva, Inc. All rights reserved.
  • 33. RSA – the exploit  Excel file with embedded Flash  0 day Flash vulnerability 33 © 2012 Imperva, Inc. All rights reserved.
  • 34. Proliferation within the network “With the trojan downloaded, the attackers then started harvesting credentials and made their way up the RSA food chain via both IT and non-IT personnel accounts, until they finally obtained privileged access to the targeted system.” Source: http://www.pcmag.com/article2/0,2817,2382970,00.asp 34 © 2012 Imperva, Inc. All rights reserved.
  • 35. RSA – the result  SecureID hacked 35 © 2012 Imperva, Inc. All rights reserved.
  • 36. Mitigation in Action 36 © 2012 Imperva, Inc. All rights reserved.
  • 37. Imperva SecureSphere – Database coverage Coverage for Heterogeneous Databases DB2 DB2 z/OS DB2400 Informix Netezza © 2012 Imperva, Inc. All rights reserved.
  • 38. Imperva Database Security Products Database Activity Monitoring Full auditing and visibility into database activities Discovery & Assessment Server Vulnerability assessment, configuration management, database discovery and classification 38 © 2012 Imperva, Inc. All rights reserved.
  • 39. Deployment options DBA/Sys admin Agent Database Auditing Activity Monitoring Agent Users Network Database Auditing Auditing Activity Gateway Monitoring Management DBA/Sys admin Server (MX) Network Auditing Gateway © 2012 Imperva, Inc. All rights reserved.
  • 40. Auditing database activity  Audit trail captures all database activity, including SELECT, DML, DDL, privileged activities.  Details answer the who?, what?, where?, when? and how? DB2 for z/OS Activity Complete Audit Trail When? Where? Who? What?, How? Privileged Operations 40 © 2012 Imperva, Inc. All rights reserved.
  • 41. Audit analytics Pre-defined audit views provide quick and flexible access to audit details Graphical Analysis Drill down to audit data © 2012 Imperva, Inc. All rights reserved.
  • 42. Real-time alerts on security events Profiling violation – unauthorized database and  SecureSphere provides schema access real-time alerts on any security event and policy violation.  Dynamic Profiling Destination enables identification of abnormal behaviors. User Source application  Alerts enable immediate response to minimize the Alert Details impact of a breach. Date and Time 42 © 2012 Imperva, Inc. All rights reserved.
  • 43. Universal user tracking Universal User User A Tracking User B Full user visibility and User A accountability • Map application users to database activity Tech User User B © 2012 Imperva, Inc. All rights reserved.
  • 44. 44 CONFIDENTIAL - Imperva © 2012 Imperva, Inc. All rights reserved.
  • 45. Unified policies across heterogeneous platforms  No need to define special Define and apply policies to policies for mainframe heterogeneous databases databases.  Granular policies defined and managed through a DB2 for z/OS centralized, friendly interface. Other  Preconfigured compliance databases policies and reports for SOX, PCI, and data privacy. 45 © 2012 Imperva, Inc. All rights reserved.
  • 46. Webinar Materials 46 © 2012 Imperva, Inc. All rights reserved.
  • 47. Webinar materials Join Imperva LinkedIn Group, Imperva Data Security Direct, for… Answers to Post-Webinar Attendee Discussions Questions Webinar Join Group Recording Link © 2012 Imperva, Inc. All rights reserved.