190 likes | 338 Views
Defending Against Users Executing Malware Code via Email. Streeterville Group M. Aghajanian, M. Blackburn, T. Heller. Introduction. Ultra-secure network to protect their sweet secrets: Enterprise firewalls. Only necessary services with required authentication. Tightly managed systems.
E N D
Defending Against Users Executing Malware Code via Email • Streeterville Group • M. Aghajanian, M. Blackburn, T. Heller
Introduction • Ultra-secure network to protect their sweet secrets: • Enterprise firewalls. • Only necessary services with required authentication. • Tightly managed systems. • Anomalies begin to appear. • CIO wants to know…
Investigation Why?!
Risk Analysis • Risk analysis (quantitative) • Policy • Design • Prevention • Response or countermeasures • Implementation • Control • Rinse and repeat...
Risk Analysis • State of hosts: susceptible, infected, quarantined, recovered, transmitted, and healthy. • Size of host population: small (binomial), large (poisson). • Diversity of hosts (mix of operating systems) • Weight of susceptibility • Weight of business value
Risk Analysis • Paradigm shift to more indirect costs than direct costs overall. • Largest expenses: • Staff hours for support. • Staff hours from downtime. • Hardware, software, vendor support and IT training. • Legal, human resources, and training.
Prevention at the Edge and Perimeter • Layered schema for malware detection. • Prevention by inspection at various points at the edge and perimeter. • ClamAV (open source hardware solution) • Microsoft perspective (proprietary software solution) • Future approaches at the edge or perimeter (next sections)
Prevention at the Edge and Perimeter Layered Protection Microsoft Approach
Responding to User Actions: Clicking on Links • Drive-By Downloads • Exploit browser vulnerabilities. • JavaScript/ECMAScript • Content Parsing • Exploit vulnerabilities in browser add-ons. • Flash • Adobe Reader • Java
Responding to User Actions: Clicking on Links • DNS Blacklisting • Used by spam filtering software. • Repurposed to everyday DNS. • Prevent access to sites known to host malware. • 11.25¢ per user/year. • SSL Proxy with malcode detection • Prevent all malcode delivery. • Including within encrypted sessions.
Responding to User Actions: Clicking on Links • User Training • Detect Suspicious emails. • Close Browser if concerned. • Acceptable Use Policy • Discourage promiscuous behavior. • "Scare tactic" heightens stakes. • Ongoing Communication • Ongoing remediation costs = foregone benefits. • Reinforce desired behavior.
Responding to User Actions: Clicking on Links • Application Selection • Remove Adobe Reader: 55% of all attacks. • Remove IE6, 5% of all attacks. • Update policies • Use Microsoft Group Policy • Update MS products automatically. • Communicate & inform users • Perform software audits • Not feasible in decentralized networks.
Responding to User Actions: Clicking on Links • User cooperation • Accept new updates • Don't install unknown plugins • Vendor support • Push updates to all clients • Centralized patch level monitoring • Create vendor compliance standards
Responding to User Actions: Opening Attachments • Typical approach • Bit-by-bit signatures (a.k.a. "hash") • New approach • Behavioral signature • Influence • Script Kiddies • Policy and enforcement • Additional software may be required • Performance hit • Instrumentation, Legacy systems
Responding to User Actions: Opening Attachments • Antivirus/OS update policies and procedures • Responses to malware/vulnerabilities, a.k.a. Patches • Admins: greater freedom/power or computer security • If users choose when to update... • If admin chooses when to update... • "Managed" antivirus software • Shows who is doing what: Privacy issues • Distributed Support System • Typical of universities • Policies and enforcement up to non-IT personnel
Responding to User Actions: Opening Attachments • User privilege management • Usually centralized • Environment and staff affect leniency • Research environment requires more user privileges • Less IT staff requires more user privileges • Requirements, Reactions & Risk • Users have different tasks, downtime, productivity requirements • Vendor/Instrumentation/Legacy computers • Limited support, no software patching (Vendor not liable) • Various versions of antivirus software • User POV • Updating is confusing, lengthy, slower computer and system re-boot
Responding to User Actions: Opening Attachments • OS's require password authorization before execution • Protects against "accidentally" installing unwanted software • Users can enter password and move on • DEP & ASLR • Windows XP SP2, Mac OS X • Effective as individual solution • Exploits written for IE8 and Firefox (Mac & Win) • Defense-in-Depth: Makes exploits slower • Layering defenses: more obstacles, more opportunities
Responding to User Actions: Opening Attachments • Network level sandbox • Users adept to waiting for emails • Deep-scanning email clients • Number of cores/cpu's growing & Privacy issues • Research: Extent of malware coders sharing/upgrading malware • Executable signatures • Non IT Policies • High level policies (HIPPA, SOX) • Cause more IT support funding and detail • Force everyone to abide (legal consequences) • Northwestern University • Proactive policies, training